?
Solved

IBM 5494 Controller Connected to Cisco 2621

Posted on 2002-04-24
3
Medium Priority
?
344 Views
Last Modified: 2013-11-16
I have a IBM 5494 Controller that I am connecting to a Cisco 2621. Does anyone know of some good documentation for this? I am planning on creating a VPN connection between two sites over a 640K DSL line for the IBM 5494. Is it best to put the Cisco 2621 and IBM 5494 on the outside of the PIX 506 and create the VPN via the routers or better to put this behind the PIX 506 and use IPSec to create the VPN? NAT is enable in the PIX so I uncerstand there is some type of configuration changes I need to make to the PIX in order to allow the DLSw traffic to go through.
I consider this to be very difficult.
0
Comment
Question by:TeckWitt
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 16

Accepted Solution

by:
SteveJ earned 2000 total points
ID: 6968904
I wouldn't use DLSw because of the overhead. I'd use LLC2 for the AS/400 communication and run a separate "channel" for the IP traffic.

But, try this site:

www.redbooks.ibm.com/abstracts/gg244386.html

Good luck.
Steve
0
 
LVL 1

Author Comment

by:TeckWitt
ID: 7162004
The custmer has changed up and went with client access on all workstations eliminating the need for green screens at this location.
0
 

Expert Comment

by:CleanupPing
ID: 9155705
TeckWitt:
This old question needs to be finalized -- accept an answer, split points, or get a refund.  For information on your options, please click here-> http:/help/closing.jsp#1 
EXPERTS:
Post your closing recommendations!  No comment means you don't care.
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
In this article, I am going to show you how to simulate a multi-site Lab environment on a single Hyper-V host. I use this method successfully in my own lab to simulate three fully routed global AD Sites on a Windows 10 Hyper-V host.
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses
Course of the Month14 days, 10 hours left to enroll

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question