Networking on z/OS
|
Previous topic |
Next topic |
Contents |
Glossary |
Contact z/OS |
PDF
SNA security Networking on z/OS |
||
|
SNA can be roughly divided into two types of implementation: subarea and APPN. The security considerations are slightly different between them. Subarea security The networks that contain genuine SNA traffic are generally not public–or at least are considered to be secure networks, again reducing the security requirements of SNA traffic. In
the event that security measures are considered appropriate for SNA traffic,
the following features can be used:
APPN security It is reasonable to state that the majority of APPN traffic is now encapsulated when it is on the network using UDP/IP (that is, using Enterprise Extender). In other words, SNA has evolved from being a network architecture. Instead, it is being transformed into a set of protocols that define the architecture for interapplication communications. From an IP standpoint, APPN is an application architecture, not a networking architecture. When APPN traffic is carried over UDP/IP, standard IP-based security methods can be used, such as VPN tunnels. For APPN traffic
that is not traveling over an IP network, or if IP-based security measures
are not considered appropriate or adequate, APPN has the following features
available:
|
Copyright IBM Corporation 1990, 2010 |