Network Utility User's Guide
Part 3. Configuration and Management Specifics
Partial Table-of-Contents
Chapter 11. Overview
Major Network Utility Functions
Chapter Layout and Conventions
Chapter Layout
Example Configuration Table Conventions
Chapter 12. TN3270E Server
Overview
What is TN3270?
Placement of the TN3270 Server Function
Network Utility TN3270E Server Function
Standards Compliance
Host Connectivity
General TN3270E Server Configuration
Configuring TN3270 Subarea under the APPN Protocol
Configuring in the APPN Environment
Implicit and Explicit LU Naming and Mapping
Example Configurations
TN3270 via a Subarea Connection to an NCP
Keys to Configuration
TN3270 via a Subarea Connection through a Channel Gateway
Keys to Configuration
TN3270 through an OSA Adapter
Keys to Configuration
TN3270 Subarea SNA over DLSw
Highly Scalable, Fault-Tolerant TN3270E
Keys to Configuration
TN3270 Via DLUR over APPN
Keys to Configuration
Distributed TN3270E Server
Keys to Configuration
Managing the TN3270E Server
Command-Line Monitoring
Event Logging Support
SNA Management Support
SNMP MIB and Trap Support
Network Management Application Support
TN3270 Server Enhancements
Dynamic Definition of Dependent LUs
TN3270 Host Initiated Dynamic LU Definitions
TN3270 Host On-Demand Client Caching
Chapter 13. TN3270E Server Example Configuration Details
TN3270 via LAN Subarea, via DLUR, and using Network Dispatcher
Dynamic Definition of Dependent LUs
Monitoring the configuration
Host Initiated Dynamic LU Definition
Monitoring the configuration
TN3270E Host On-Demand (HOD) Client Cache
Monitoring the Configuration
TN3270E Subarea SNA over DLSw
Monitoring the TN3270E Over DLSw SNA Subarea Configuration
TN3270E LSA SNA Subarea Connection
Monitoring the Configuration
Chapter 14. Channel Gateway
Overview
Configurations Supported
Host LAN Gateway Function
ESCON Channel Concepts
Subchannels
Channel Protocols
Example Configurations
ESCON Channel Gateway
Keys to Configuration
Parallel Channel Gateway
Keys to Configuration
Channel Gateway (APPN and IP over MPC+)
Keys to Configuration
Dynamic Routing Protocols on the ESCON Interface
Importing the ESCON Subnet into OSPF
ESCON Channel Gateway - High Availability
Keys to Configuration
Managing the Gateway Function
Command-Line Monitoring
Event Logging Support
SNA Management Support
SNMP MIB and Trap Support
Network Management Application Support
Chapter 15. Channel Gateway Example Configuration Details
Chapter 16. Data Link Switching
Overview
What is DLSw?
Network Utility DLSw Function
Example Configurations
DLSw LAN Catcher
Keys to Configuration
DLSw LAN Channel Gateway
Keys to Configuration
X.25 Channel Gateway
Keys to Configuration
Managing DLSw
Command-Line Monitoring
Event Logging Support
SNA Management Support
SNMP MIB and Trap Support
Network Management Application Support
Chapter 17. DLSw Example Configuration Details
Chapter 18. Sample Host Definitions
Overview
Definitions at the Channel Subsystem Level
Sample Host IOCP Definitions
RESOURCE Statement
Channel Path ID (CHPID) Statement
Control Unit (CNTLUNIT) Statement
IODEVICE Statement
Defining the Network Utility in the Operating System
Network Utility Definition for VM/SP
Network Utility Definition for VM/XA and VM/ESA
Network Utility Definition for MVS/XA and MVS/ESA without HCD
Network Utility Definition for MVS/ESA with HCD
Network Utility Definition for VSE/ESA
VTAM Definitions
VTAM XCA Major Node Definition
LINE Statement
VTAM Definitions for an MPC+ Connection
VTAM Definitions for APPN
VTAM Static Definition of TN3270 Resources
VBUILD Statement
PU Statement
LU Statement
PATH Statement
VTAM Dynamic Definition of TN3270 Resources
Host IP Definitions
DEVICE Statement
LINK Statement
HOME Statement
GATEWAY Statement
Direct Routes
Indirect Routes
Default Routes
START Statement
Host TCP/IP Definitions for LCS
Host TCP/IP Definitions for MPC+
Chapter 19. Virtual Private Networks
VPN Introduction and Benefits
The IETF's IP Security Framework
Authentication Header
IP Encapsulating Security Payload
Combining the Protocols
Internet Key Exchange (IKE)
VPN Customer Scenarios
Branch Office Connection Network
Business Partner/Supplier Network
Remote Access Network
Policy Based Networking
Manually Defined Policies
Policies from an LDAP Server
IKE
IKE Pre-Shared Key and Digital Certificates
Tunneling Protocols
Layer 2 Tunneling
Layer 2 Forwarding
Point-to-Point Tunneling Protocol
Voluntary Tunneling with PPTP
Compulsory Tunneling with L2TP
VPN Event Logging Support (ELS)
L2 Subsystem
PLCY Subsystem
IPSP Subsystem
IKE Subsystem
Chapter 20. Virtual Private Networks Examples
IPSec Router to Router VPN Using Pre-Shared Keys
Create a Policy for the IPSec Tunnel for VPNRTR1
Enable IP Security
Create the Pre-Shared Key
Add the Policy
Add the Profile
Add the Validity Period
Add the IPSec Action
Add an IPSec Proposal
Add an IPSec Transform
Add ISAKMP Action
Add ISAKMP Proposal
Confirm the Policy
Create a Policy on VPNRTR1 to Drop Public Traffic
Add the Policy
Add the Profile
Specify the Interface Pairs
Add the Validity Period
Add the IPSec Action
Confirm the Policy is Correct
Create a Policy for the IPSec Tunnel for VPNRTR2
Create a Policy on VPNRTR2 to Drop Public Traffic
Monitoring/Troubleshooting the Policies
Router to Router VPN Using Digital Certificates
Create a Policy for the IPSec Tunnel for VPNRTR1
Add an ISAKMP Proposal
Configure TFTP Server for Loading Certificates
Request a Router Certificate
Obtaining the Certificates from the CA
Load Router Certificate
Save the Router Certificate
Obtain a CA Certificate
Load the CA Certificate
Save the CA Certificate
Create a Policy on VPNRTR1 to Drop Public Traffic
Create a Policy for the IPSec Tunnel for VPNRTR2
Create a Policy on VPNRTR2 to drop public traffic
Monitoring/Troubleshooting from Talk 5
Voluntary PPTP Tunnel with IBM Router Termination
Configuration of the Network Utility
Enable PPTP
Add Layer 2 Nets
Enable mschap and mppe
Add PPP User
Enable Arp Subnet Routing
Configure the DUN Client
Monitoring
IBM Network Utility Initiated Voluntary PPTP Tunnel
Configure the Branch Router
Configure NT Remote Access Server
Monitoring/Troubleshooting the Configuration
IBM Network Utility Initiated Voluntary L2TP Tunnel
L2TP Tunnel Terminated at an IBM Network Utility LNS
Connecting Dial-in Remote Users
Configuring the Branch Router For DIAL-in Access Server
Configuring L2TP in the Branch Router
Configuring L2TP in the Network Utility
Monitoring L2TP
[
Top of Page
|
Previous Page
|
Next Page
|
Table of Contents
]