Planning worksheet for dynamic connections

 

Complete this worksheet before you configure a dynamic connection.

Before you create your dynamic VPN connections, complete this worksheet. The worksheet assumes you will use the New Connection Wizard. The wizard allows you to set up a VPN based on your basic security requirements. In some cases, you may need to refine the properties that the wizard configures for a connection. For example, you may decide that you require journaling or that you want the VPN server to start each time TCP/IP starts. If this is the case, right-click the dynamic-key group or connection that the wizard created and select Properties.

Answer each question before you proceed with your VPN setup.

Table 1. System requirements
Prerequisite checklist Answers
Is your operating system OS/400® V5R2 (5722-SS1) or later? Yes
Is the Digital Certificate Manager option (5722-SS1 Option 34) installed? Yes
Is iSeries™ Access for Windows® (5722-XE1) installed? Yes
Is iSeries Navigator installed? Yes
Is the Network subcomponent of iSeries Navigator installed? Yes
Is TCP/IP Connectivity Utilities (5722-TC1) installed? Yes
Did you set the retain server security data (QRETSVRSEC *SEC) system value to 1? Yes
Is TCP/IP configured on your system (including IP interfaces, routes, local host name, and local domain name)? Yes
Is normal TCP/IP communication established between the required endpoints? Yes
Have you applied the latest program temporary fixes (PTFs)? Yes
If the VPN tunnel traverses firewalls or routers that use IP packet filtering, do the firewall or router filter rules support AH and ESP protocols? Yes
Are the firewalls or routers configured to permit IKE (UDP port 500), AH, and ESP protocols? Yes
Are the firewalls configured to enable IP forwarding? Yes

Table 2. VPN configuration
You need this information to configure a dynamic VPN connection Answers
What type of connection are you creating?

  • Gateway-to-gateway

  • Host-to-gateway

  • Gateway-to-host

  • Host-to-host
What will you name the dynamic-key group?
What type of security and system performance do you require to protect your keys?

  • Highest security, lowest performance

  • Balance security and performance

  • Lowest security and highest performance
Are you using certificates to authenticate the connection? If no, what is the preshared key?
What is the identifier of the local key server?
What is the identifier of the local key server?
What is the identifier of the remote key server?
What is the identifier of the remote data endpoint?
What type of security and system performance do you require to protect your data?

  • Highest security, lowest performance

  • Balance security and performance

  • Lowest security and highest performance

 

Parent topic:

Completing VPN planning worksheets