IPSec and VPNs

IPSec is defined by the IPSec Working Group of the IETF. It provides authentication, integrity, and data privacy between any two IP entities. Management of cryptographic keys and security associations can be done manually or dynamically using an IETF-defined key management protocol called Internet Key Exchange (IKE).

There are two versions of the IKE protocol:
  • IKE version 1.0 (IKEv1) is defined by RFC 2409, The Internet Key Exchange (IKE), and related RFCs. This is the version that has been supported by z/OS® Communications Server for a number of years.
  • IKE version 2.0 (IKEv2) is defined by RFC 5996, Internet Key Exchange Protocol: IKEv2, and related RFCs. Support for IKEv2 is introduced with z/OS V1R12.
With IPSec, you can create virtual private networks (VPN). A VPN enables an enterprise to extend its private network across a public network, such as the Internet, through a secure tunnel called a security association. IPSec VPNs enable the secure transfer of data over the public Internet for same-business and business-to-business communications, and protect sensitive data within the enterprise's internal network.
Figure 1. e-business scenarios with virtual private networks
Example of different IPSec VPN configurations

z/OS provides support for IKE and IPSec VPNs, including the following options:

  • AH and ESP protocols
  • Triple DES
  • AES with several choices of mode or key length
  • IPSec transport and tunnel mode encapsulation
  • IKEv1 and IKEv2 negotiations with support for both aggressive and main mode in IKEv1
  • Pre-shared key and digital signature methods of authentication
  • NAT traversal (IPv4 only)

For more information about configuring IPSec and VPNs, see IP security.

For more information on using IPSec with Dynamic VIPAs, see Sysplex-Wide Security Associations.