IP security

This topic contains a description of IP filtering, IPSec-protected traffic, and preparing and configuring a z/OS® system for IP security. Various business configurations are explained, including host-to-host, host-to-gateway, gateway-to-gateway, and gateway-to-host.