35
® 8 2002 IBM Corporation V5R2 iSeries Communications J02_CommsJul24.PRZ1

V5R2 iSeries Communications - IBM

  • Upload
    others

  • View
    12

  • Download
    0

Embed Size (px)

Citation preview

®

8 2002 IBM Corporation

V5R2 iSeries Communications

J02_CommsJul24.PRZ1

8 2002 IBM Corporation

ibm.com/eserver/iseries

Agenda

New Hardware

Network Security Enhancements

TCP/IP Enhancements

Remote Access Enhancements

Withdrawal of Support

J02_CommsJul24.PRZ2

8 2002 IBM Corporation

ibm.com/eserver/iseries

4 new IOAs

Supported in 270, 820, 830, 840, 890 or HSL attached PCI I/O towers/units

OS/400 V5R2 only

Feature Code Description4805 Crypto Graphic Accelerator2849 10/100 Ethernet IOA2742 2-line WAN IOA

2793/9793 2-line WAN with Modem IOA

iSeries Comms I/O Enhancements

J02_CommsJul24.PRZ3

8 2002 IBM Corporation

ibm.com/eserver/iseries

Notes: iSeries Communications I/O Enhancements(#4805) PCI CRYPTOGRAPHIC ACCELERATOR: Feature #4805 provides improved performance for high transaction rate secure web applications which use the secure sockets layer (SSL) or transport layer security (TLS) protocols. Establishing SSL/TLS secure web connections requires very compute intensive cryptographic processing. The Cryptographic Accelerator can be used to offload cryptographic processing. SSL/TLS secure web connections are typically used to protect information (e.g., credit card number) as it is transferred over the Internet -- for example between a web browser and a server.

(#2849) PCI 100/10Mbps ETHERNET IOA: #2849 allows an iSeries server to attach to standardized 100Mbps high-speed Ethernet LANs and allow attachment to existing 10Mbps Ethernet LANs. The adapter comes with an RJ45 connector for attachment to UTP-5 media. The #2849 replaces the #2838 100/10 Mb Ethernet adapter. This PCI card offers a higher performance register interface together with the same functions as they exist on the #2838 today. The #2849 is not supported on any PC server feature (Integrated xSeries Server for iSeries).

(#2742) PCI TWO-LINE WAN IOA: #2742 is a WAN IOA which supports up to two multiple protocol communications (RVX) ports.

(#2793/#9793) PCI 2-LINE WAN w/MODEM: #2793/#9793 features are PCI 2-line WAN w/Modem adapters. #2793 is an optional feature. #9793 is a base PCI 2-line WAN w/Modem. They are the non-CIM (Complex Impedance Matching) version offered in all countries except Australia and New Zealand. Port 0 is the modem port and supports V.92 56K Async PPP, V.92 data modem, V.44 data compression, V.34 FAX modem and FAX functions such as ECM and 2D/1D conversion. Port 0 does not provide Sync modem capabilities (SDLC and Sync PPP). Port 1 is the RVX port and supports multiple communications protocols.

For more details refer to the Hardware presentation

J02_CommsJul24.PRZ4

8 2002 IBM Corporation

ibm.com/eserver/iseries

Network Security Enhancements

J02_CommsJul24.PRZ5

8 2002 IBM Corporation

ibm.com/eserver/iseries

Networking Security

V5R2 EnhancementsVPN and IP Filtering

Enterprise Identity Mapping and Kerberose

J02_CommsJul24.PRZ6

8 2002 IBM Corporation

ibm.com/eserver/iseries

VPN and IP Filtering Enhancements

Firewall friendly VPN

NAT(Network Address Translation) friendly IPsec

Dynamic Policy Filters and Policy Migration Wizard

New Packet Filter editor

J02_CommsJul24.PRZ7

8 2002 IBM Corporation

ibm.com/eserver/iseries

Firewall friendly VPN for end-to-end securityCurrent Firewall technologies such as NAT and SOCKS break IP Security

Requires use of *VIRTUAL IP and changes to Firewall configuration

UDP Encapsulation of IPSec allows VPN system to be protected by a firewallTransparent to the application

Transparent to the firewall

CorporateIntranet

Business Partner/SupplierIntranet

BranchOffice

Intranet

Internet

Remote Access

VPN

J02_CommsJul24.PRZ8

8 2002 IBM Corporation

ibm.com/eserver/iseries

With OS/400 Virtual Private Network (VPN) in V5R2, you no longer need to put your iSeries on the perimeter of the network, use a public address, or use virtual IP in order to create VPN connections. VPN now has Network Address Translation (NAT) compatible IPSec, also known technically as UDP encapsulation, to address the various incompatibilities between IPSec and network address translation (NAT) technologies.

UDP encapsulation allows your iSeries to sit behind a firewall that uses NAT.

OS/400 VPN now supports Advanced Encryption Standard (AES) algorithm for data protection.

Notes: VPN

J02_CommsJul24.PRZ9

8 2002 IBM Corporation

ibm.com/eserver/iseries

NAT friendly IPsec and Policy Filters

NATConventional NAT breaks IPsec

Once NAT is detected, the IPsec packet is wrapped in a UDP packet

The UDP packet can be "NAT-ed"

IPsec devices need to de-envelope the IPsec packet and process as usual

V5R2 iSeries can initiate VPN connections if NAT is present cannot act as a responder

By default, the iSeries Intener Key Exchange (IKE) support will check to see if NAT is present

Both ends of the VPN connection must have this support in order for IPsec to function with a NAT device in-between

"Heartbeat" packets sent to keep NAT session alive

J02_CommsJul24.PRZ10

8 2002 IBM Corporation

ibm.com/eserver/iseries

Network Address Translation (NAT) allows you to hide your unregistered private IP addresses behind a set of registered IP addresses. This helps to protect your internal network from outside networks. NAT also helps to alleviate the IP address depletion problem, since many private addresses can be represented by a small set of registered addresses.

Unfortunately, conventional NAT does not work on IPSec packets because when the packet goes through a NAT device, the source address in the packet changes, thereby invalidating the packet. When this happens, the receiving end of the VPN connection discards the packet and the VPN connection negotiations fail.

UDP encapsulation wraps an IPSec packet inside a new, but duplicate, IP/UDP header. The address in the new IP header gets translated when it goes through the NAT device. Then, when the packet reaches its destination, the receiving end strips off the additional header, leaving the original IPSec packet, which should now pass all other validations. You can only apply UDP encapsulation to VPNs that will use IPSec in either tunnel mode or transport mode. In addition, at V5R2, iSeries can only act as a client for UDP encapsulation. That is, it can only initiate UDP encapsulated traffic.

Notes: NAT friendly IPsec and Policy Filters

J02_CommsJul24.PRZ11

8 2002 IBM Corporation

ibm.com/eserver/iseries

A class of VPN connections that can be started without Policy Filters

This class of connections can be configured as "Does not require policy filter"

Configured on the VPN connection "group" properties page

Migration wizard

Policy Filters

J02_CommsJul24.PRZ12

8 2002 IBM Corporation

ibm.com/eserver/iseries

A policy filter rule defines which addresses, protocols, and ports can use a VPN and directs the appropriate traffic through the connection. In some cases, you may want to configure a connection that does not require a policy filter rule. You can now also create a VPN that does not have a policy filter rule associated with it. Your system manages all filters dynamically for the connection, which means that you do not have to configure packet rules in order to have a VPN connection.

If you have upgraded your system from either V4R4 or V4R5 and want to use the rules you had loaded on that system prior to the upgrade, you should use the Migrate Policy Rules wizard to remove the policy filters from the packet rules files you created. The wizard inserts equivalent policy filters into the set of policy filters that VPN generates. This will help to ensure that your old policy filters and new policy filters will work together as you intend.

Notes: Policy Filters

J02_CommsJul24.PRZ13

8 2002 IBM Corporation

ibm.com/eserver/iseries

Enterprise Identity Mapping and Kerberos

Enterprise Identity Mapping (EIM) is a mechanism for mapping (associating) a person or entity to the appropriate user identities in various registries throughout the enterprise

EIM and Kerberos provides an infrastructure to provide single sign-on solutions.

J02_CommsJul24.PRZ14

8 2002 IBM Corporation

ibm.com/eserver/iseries

Most network enterprises face the problem of multiple user registries, which require each person or entity within the enterprise to have a user identity in each registry. The need for multiple user registries quickly grows into a large administrative problem that affects users, administrators, and application developers. Enterprise Identity Mapping (EIM) enables inexpensive solutions for more easily managing and working with multiple user registries and user identities in your enterprise.

EIM is a mechanism for mapping (associating) a person or entity to the appropriate user identities in various registries throughout the enterprise. EIM provides APIs for creating and managing these identity mapping relationships, as well as APIs used by applications to query this information. In addition, OS/400 exploits EIM and Kerberos capabilities to provide a single sign-on environment.

Kerberos is an encryption-based security system that provides mutual authentication between the users and the servers in a network environment. In summary, Kerberos is a solution to your network security problems. It provides the tools of authentication and strong cryptography over the network to help you secure your information systems across your entire enterprise.

Kerberos authentication itself does not automatically imply that the rest of the session is encrypted. Kerberos does however enable a secure exchange of encryption keys, that could be utilized by a client program for session encryption. iSeries Access for example does not implement the encryption part of Kerberos, however iSeries Access traffic can be encrypted by SSL instead.

GUI interfaces and wizards are provided through iSeries Navigator for configuring and managing EIM. You can also manage Enterprise Identity Mapping relationships for user profiles through iSeries Navigator.

For details on EIM and Kerberos refer to the Security Presentation

Notes: Enterprise Identity Mapping and Kerberos

J02_CommsJul24.PRZ15

8 2002 IBM Corporation

ibm.com/eserver/iseries

TCPIP Enhancements

J02_CommsJul24.PRZ16

8 2002 IBM Corporation

ibm.com/eserver/iseries

TCP/IP - New Features and Enhancements

New and improved technologiesPacket Filter Editor

FTP

QoS

Virtual IP and load balancing

J02_CommsJul24.PRZ17

8 2002 IBM Corporation

ibm.com/eserver/iseries

Packet Filter Editor

New editormore like a text editor

Can "save as" text, and xml

text is ASCII rather than UNICODE

xml is saved according to the PacketFilterRule.dtd and saved as a *.tcpipml file

can open *.tcpipml files

can activate *.tcpipml files

Three wizards for the most common filter tasks

J02_CommsJul24.PRZ18

8 2002 IBM Corporation

ibm.com/eserver/iseries

IP filtering and network address translation (NAT) act like a firewall to protect your internal network from intruders. IP filtering lets you control what IP traffic to allow into and out of your network. Basically, it protects your network by filtering packets according to rules that you define.

Packet filtering and network address translation (NAT) have a new Packet Rules Editor to simplify configuration. You must access the Packet Rules Editor through iSeries Navigator, the graphical interface that enables you to work with your iSeries resources. Use the Packet Rules Editor to get started creating packet rules on your system. You can create a new file, edit an existing one, or you can work with the sample files provided on the system.

Three new wizards that, depending on what type of rules you want to configure, create all of the required filter and NAT statements for you. They are: Permit A Service wizard Address Translation wizard Spoof Protection wizard

Notes: Packet Filter Editor

J02_CommsJul24.PRZ19

8 2002 IBM Corporation

ibm.com/eserver/iseries

FTP Enhancements

FTP server now supports libraries which reside on independent auxiliary storage pools (IASPs).

Transport Layer Security (TLS)/Secure Sockets Layer (SSL) support Basic TLS/SSL support for OS/400 FTP client

compliments FTP server TLS/SSL support introduced in V5R1

New FTP client subcommands and new parameters for STRTCPFTPSECCNNDTAPORT

J02_CommsJul24.PRZ20

8 2002 IBM Corporation

ibm.com/eserver/iseries

Enhancements to FTP server now supports libraries which reside on independent auxiliary storage pools (IASPs).

V5R2 FTP also provides you the ability to use TLS/SSL from the OS/400 FTP client (with server authentication only). TLS is the superset follow on to SSL. This support allows you to specify whether data flowing on the FTP control connection, including the password used for authentication, is encrypted. You can use Transport Layer Security (TLS) / Secure Sockets Layer (SSL) connections to encrypt data transferred over FTP control and data connections. The primary reason for encryption on the control connection is to conceal the password when logging on to the FTP server.

Before using the FTP client to make secure connections to servers, you must use DCM to configure trusted certificate authorities for the FTP Client. Any certificate authorities which were used to create certificates assigned to servers that you want to connect to must be added. If you choose TLS/SSL encryption for the control connection, the FTP client will also encrypt the data sent on the FTP data connection by default. FTP protocol does not allow you to have a secure data connection without a secure control connection. Encryption can have a significant performance cost and can be bypassed on the data connection. This allows you to transfer non-sensitive files without decreasing performance and still protect the system's security by not exposing passwords.

The subcommands which are used as part of the TLS/SSL support are SECOpen: The SECOpen FTP client subcommand opens a secure control connection to an FTP server using the specified security option.SECData: The SECData command is used to specify the protection level to be used for the data connection when there is a secure control connection already established with the remote system.

There are 2 new parameters for STRTCPFTP:Secure connection (SECCNN): This specifies the type of security mechanism to be used for protecting information transferred on the FTP control connection (which includes the password used to authenticate the session with the FTP server). Transport Layer Security (TLS) and Secure Sockets Layer (SSL) are compatible protocols which use encryption to protect data from being viewed during transmission and verify that data loss or corruption does not occur. The FTP client subcommand SECOPEN can be used to open a protected FTP connection during an FTP client session. Data protection (DTAPROT): Specifies the type of data protection to be used for information transferred on the FTP data connection. This connection is used to transfer file data and directory listings. The FTP protocol does not allow protection of the data connection if the control connection is not protected. The FTP client subcommand SECData can be used subsequently to change the data protection level. The FTP client uses the FTP server subcommand PROT to request the specified data protection after a secure control connection has been established.

Notes: FTP Enhancements

J02_CommsJul24.PRZ21

8 2002 IBM Corporation

ibm.com/eserver/iseries

QoS Enhancements

Network Quality of ServiceInbound connection rate control

URL Based Policy

Extensions to outbound bandwidth control

QoS policy support in LDAPPopulate policy from iSeries Navigator

J02_CommsJul24.PRZ22

8 2002 IBM Corporation

ibm.com/eserver/iseries

QoS sees that all traffic in your network receives equal priority. Non-critical browser traffic is considered as important as critical business applications. QoS allows you to request network priority and bandwidth for TCP/IP applications. Packet priority is important to you if you send applications that need predictable and reliable results, such as multimedia.

QoS has been greatly enhanced and also has some design improvements. New functions

Associate policies with local interfaces You can associate policies with a specific local interface or a range of local interfaces on the iSeries. Designating the local interface allows different polices to be based on what interface the client packet arrives on.

Associate policies to multiple clientsYou can now associate a policy to multiple clients. This allows you to create more flexible policy definitions.

Inbound admission policiesYou can now create policies to control external traffic attempting to access your server. There are two new wizards that allow you to control traffic attempting to access a particular IP address or URL value within your network.

Monitor information can be stored and printedYou can now save and print monitor information. When you save the information, it will be accessible for future reference. If you want to print monitor information, you can now specify, "Export as HTML".

Policies stored on LDAP directory serverPolicies are now exported to a directory server with the latest LDAP protocol Version 3. Using a directory server makes your QoS solution easier to manage. Instead of configuring the same QoS policies on each of your servers, you can configure your servers to use policy data created by a single server. The policies are then saved on the directory server. When you first configure quality of service on your server, an Initial Configuration wizard appears. This wizard will prompt you to configure a directory server. If you are using iSeries Navigator, you will already have access to the default QoS Schema.

New design improvements QoS planning advisor

The QoS planning advisor has been updated to give you suggestions and prerequisites before configuring the policies. It is used to help plan by bringing the concepts together in an organized location.

Notes: QoS Enhancements

J02_CommsJul24.PRZ23

8 2002 IBM Corporation

ibm.com/eserver/iseries

Virtual IP with Proxy ARP

Use *Virtual IP to provide continuous availability even through an interface failureSystem stays accessible so long as at least one physical interface remains active

EliminatesThe need to define static routes

The need to run a dynamic routing protocol such as RIP

J02_CommsJul24.PRZ24

8 2002 IBM Corporation

ibm.com/eserver/iseries

With V5R2, there is a new way to approach load balancing. In the event of an adapter failover you can now use proxy Address Resolution Protocol (ARP), along with virtual IP, to provide seamless availability to clients.

Prior to V5R2 you could assign a virtual IP address to the system and its remote clients (clients that are not physically attached to the same LAN as the iSeries) and they would communicate with the iSeries through a external load balancing server such as a network dispatcher. When the IP requests from the remote clients would go through the network dispatcher, the network dispatcher would then route the virtual IP addresses to one of network adapters on the iSeries. But if the LAN that the iSeries is connected to has clients (typically the in-office LAN), these clients would not use the network dispatcher to direct their locally bound traffic because that would unnecessarily overload the network dispatcher. You could create route entries on each client, but given a large number of clients, this would be a very impractical practice. Due to this failure of the network adapter would cause the local LAN to go down.

As of OS/400 V5R2, local clients (clients that are attached to the same LAN as the iSeries) can now connect to the iSeries virtual IP address through ARP. This allows local clients to have an adapter failover solution as well. The solution can also involve using two or more iSeries servers to support each other. If one of the iSeries systems become unavailable, then the second system can serve as a failover.

Example of Adapter failover using Virtual IP and Proxy ARPYour production iSeries handles data entry from both remote and LAN clients. As the company has grown, so has its demand on the iSeries and the network and it has become imperative that this iSeries be available on the network without an unscheduled down time. If, for any reason, a network adapter becomes unavailable, other network adapters on the iSeries should take over and the network clients should be unaware of any failures.Prior to V5R2 Virtual IP interfaces were not directly routable. The iSeries was reachable only via static configured route or by running dynamic routing protocol (RIPv2).

Local clients (clients that are attached to the same LAN as the iSeries) can now connect to the iSeries virtual IP address through ARP. This allows local clients to have an adapter failover solution as well.

So if Physical Interface 10.1.1.4 fails, any direct connections to 10.1.1.4 are lost. But connections to 10.1.1.1, the *Virtual IP address, remain active, as, interfaces 10.1.1.2, 10.1.1.3 remain active; and hence the system stays available.

The solution can also involve using two or more iSeries servers to support each other. If one of the iSeries systems become unavailable, then the second system can serve as a failover

Notes: Virtual IP with Proxy ARP

J02_CommsJul24.PRZ25

8 2002 IBM Corporation

ibm.com/eserver/iseries

Some other TCPIP Enhancements ...1

IPV6

Addressing architecture: xxxx : xxxx : xxxx : xxxx : xxxx : xxxx : xxxx : xxxx

J02_CommsJul24.PRZ26

8 2002 IBM Corporation

ibm.com/eserver/iseries

Notes: Some other TCP/IP Enhancements ...1IPv6 Internet Protocol version 6 (IPv6) is the next evolution in Internet Protocol and is designed to gradually replace Internet Protocol version 4 (IPv4). Most of the Internet currently uses IPv4, and this protocol has been reliable and resilient. However, IPv4 has severe limitations that are causing more problems as the Internet expand. Particularly, there is a growing shortage of IPv4 addresses, which are needed for all new devices added to the Internet. The key to IPv6 enhancement is the expansion of the IP address space from 32 bits to 128 bits, enabling virtually unlimited unique IP addresses.

The new IPv6 address text format is: xxxx : xxxx : xxxx : xxxx : xxxx : xxxx : xxxx : xxxx where each x is a hexadecimal digit representing 4 bits.

The expanded addressing capability of IPv6 provides a solution to the address depletion problem. This is especially important as more people use mobile computers, such as mobile telephones and handheld computers. The increasing demands of wireless users contribute to the depletion of IPv4 addresses. The expanded IP address capability of IPv6 solves this problem by providing enough IP addresses for the growing number of wireless devices.

In addition to this addressing capability, IPv6 provides new functions that simplify the tasks of configuring and managing the addresses on the network. Configuring and maintaining networks is a labor intensive activity. IPv6 reduces some of the workload by automating several of the network administrator's tasks.

If you use IPv6, you will not have to renumber your device addresses when you change to a different Internet Service Provider (ISP). You can keep the same addresses because they are globally unique addresses. The IPv6 auto configuration feature automatically configures interface and router addresses for you. In stateless auto configuration, IPv6 takes the machine's MAC address and a network prefix provided by a local node and combines these two addresses to create a new, unique IPv6 address. This feature eliminates the need for a DHCP server, which saves time for the administrator.

For more details refer to V5R2 Information Center articles.

J02_CommsJul24.PRZ27

8 2002 IBM Corporation

ibm.com/eserver/iseries

User-defined Servers

Directory Services (LDAP)

Some other TCPIP Enhancements ...2

J02_CommsJul24.PRZ28

8 2002 IBM Corporation

ibm.com/eserver/iseries

Notes: Some other TCP/IP Enhancements ...2User-defined serversUser-defined servers allows you to add custom servers to the iSeries. This enables you to perform administrative tasks, such as stopping, starting, andmonitoring servers in the same way as you would administer servers that are included on the iSeries.

The User-defined servers wizard allows you to define servers to be integrated with the iSeries server applications. The wizard requires the following information about a server:

Name Description Server job type Program name Server ID

To create, view, or manage user-defined servers, follow these steps:In iSeries Navigator, expand your iSeries server --> Network --> Servers --> User-Defined. To create a new server, right-click User-Defined and select New Server. To view or change properties of an existing server, right-click the server in the right pane and select Properties.

LDAP - Light Directory Access ProtocolDirectory Services has been enhanced and some new features added. Directory Services is part of the base operating system beginning in V5R1.

Option 32 is no longer available starting in V5R2. New security enhancements have been made to further protect any data stored on the directory server. LDAP directory server can now be used as a domain controller for an Enterprise Identity Mapping (EIM) domain. A new option is available to administrators that can be used to grant administrator access to the directory server for users who have been given access to the Directory Services Administrator. You can select to have the directory server use specific IP addresses or you can select to use all configured IP addresses on the server.

J02_CommsJul24.PRZ29

8 2002 IBM Corporation

ibm.com/eserver/iseries

Remote Access Enhancements

J02_CommsJul24.PRZ30

8 2002 IBM Corporation

ibm.com/eserver/iseries

Remote Access Enhancements - PPPoE

Support PPP over Ethernet (PPPoE) for DSL.Primarily used with DSL

Connect directly to ISP or Corporate Network

With V5R2 iSeries runs Host PPPoE Client SW

J02_CommsJul24.PRZ31

8 2002 IBM Corporation

ibm.com/eserver/iseries

Remote access services is enhanced to include PPP over Ethernet (PPPoE) in this release. You can now support a PPPoE connection to your ISP through your iSeries server.

Example: Connecting your iSeries server to a PPPoE access concentratorSituation: Your business requires a faster Internet connection, so you're interested in a Digital Subscriber Line (DSL) service with a local ISP. Your ISP uses PPPoE to connect its clients and so you too would like to use this PPPoE connection to provide high-bandwidth Internet connections through your iSeries server.

Solution: With V5R2 you can configure a PPPoE connection to your ISP through your iSeries server. The iSeries server makes use of a new PPPoE virtual line type which is bound to a physical Ethernet line configured to use a type 2838 Ethernet adapter. This virtual line supports PPP session protocols over an Ethernet LAN connected to a DSL modem which provides the gateway to the remote ISP. This allows LAN connected users to have high speed Internet access using the iSeries servers PPPoE connection. Once the connection between the iSeries and the ISP has started, individual users on the LAN can access the ISP over PPPoE, using the IP address allocated to the iSeries server. To provide additional security, filter rules can be applied to the PPPoE virtual line to restrict certain inbound Internet traffic.

Note: Remote Access Enhancements - PPPoE

J02_CommsJul24.PRZ32

8 2002 IBM Corporation

ibm.com/eserver/iseries

Withdrawal of Support

J02_CommsJul24.PRZ33

8 2002 IBM Corporation

ibm.com/eserver/iseries

Withdrawal of Support

Beginning with V5R2, IBM will no longer support the following:NetWare 3.x.

IPX on iSeries. The only supported communications protocol for NetWare is TCP/IP.

J02_CommsJul24.PRZ34

8 2002 IBM Corporation

ibm.com/eserver/iseries

Trademarks and Disclaimers8 IBM Corporation 1994-2002. All rights reserved.References in this document to IBM products or services do not imply that IBM intends to make them available in every country.The following terms are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both:

cc:Mail, Domino.Doc, Freelance, LearningSpace, Lotus, Lotus Domino, Lotus Notes, iNotes, QuickPlace, Sametime, and Word Pro are trademarks of Lotus Development Corporation in the United States, other countries, or both.Tivoli and NetView are trademarks of Tivoli Systems Inc. in the United States, other countries, or both.C-bus is a trademark of Corollary, Inc. in the United States, other countries, or both. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. PC Direct is a trademark of Ziff Communications Company in the United States, other countries, or both and is used by IBM Corporation under license. ActionMedia, LANDesk, MMX, Pentium and ProShare are trademarks of Intel Corporation in the United States, other countries, or both. IBM's VisualAge products and services are not associated with or sponsored by Visual Edge Software, Ltd.Linux is a registered trademark of Linus Torvalds.UNIX is a registered trademark of The Open Group in the United States and other countries.SET and the SET Logo are trademarks owned by SET Secure Electronic Transaction LLC. Other company, product and service names may be trademarks or service marks of others.

Information is provided "AS IS" without warranty of any kind.

All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer.

Information in this presentation concerning non-IBM products was obtained from a supplier of these products, published announcement material, or other publicly available sources and does not constitute an endorsement of such products by IBM. Sources for non-IBM list prices and performance numbers are taken from publicly available information, including vendor announcements and vendor worldwide homepages. IBM has not tested these products and cannot confirm the accuracy of performance, capability, or any other claims related to non-IBM products. Questions on the capability of non-IBM products should be addressed to the supplier of those products.

All statements regarding IBM future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. Contact your local IBM office or IBM authorized reseller for the full text of the specific Statement of Direction.

Some information in this presentation addresses anticipated future capabilities. Such information is not intended as a definitive statement of a commitment to specific levels of performance, function or delivery schedules with respect to any future products. Such commitments are only made in IBM product announcements. The information is presented here to communicate IBM's current investment and development activities as a good faith effort to help with our customers' future planning.

Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve throughput or performance improvements equivalent to the ratios stated here.

Photographs shown are of engineering prototypes. Changes may be incorporated in production models.

400 BRMS Host Integration Series JustMail Payment Manager Stylized ADSTAR Client Series Host on Demand MQSeries Payment Server SystemViewAdvanced Function Printing ClusterProven Host Publisher MQSeries Integrator PCOM VisualAge for JavaAFP CODE/400 HTTP Server for AS/400 Net.Commerce PowerPC VisualAge for RPGAIX DataGuide IBM Net.Data PowerPC AS WebSphereAnyNet DB2 IBM Logo Netfinity Print Service Facility WebSphere Advanced EditionApplication Development DB2 Extenders IBM Network Station NetView pSeries WebSphere Commerce SuiteAPPN DB2 UDB for AS/400 Information Warehouse NUMA-Q PSF WebSphere Development Tools for AS/400AS/400 DB2 Universal Integrated Language Environment OfficeVision S/390 WebSphere Standard EditionAS/400e e-business logo Intelligent Printer Data Stream OS/2 SanFrancisco WorkpadAT e(logo) Server IPDS Operating System/400 Screen Publisher xSeriesBrioQuery Enterprise Storage Server iSeries OS/400 SmoothStart

J02_CommsJul24.PRZ35