Ethernet Switching Reference Guide
•  Secure IPSec tunnels are initiated between the
user and the core Contivity
•  Contivity authentication tunnel initiation request
against local data stores – may be RADIUS from
old RAS infrastructure, LDAP etc.
•  Secure IPSec tunnels encrypt and encapsulate
traffic between the user and the Contivity
•  Firewalls in each Contivity switch protect the site
LAN from outside threats
•  Split-tunneling on the IPSec client protects
customer’s machine from outside threats while
tunnel is up
Solution Value Proposition
•  Reduces corporate remote access expenses 
by 60-80%
•  Accommodates an increasing dispersed and
mobile workforce, estimated to be 83% of all
employees by 2003
•  Gain anywhere access with minimal 
access charges
•  Reduces ongoing expense of dial access
•  Eliminates costly toll-free access numbers
•  Eliminates dedicated RAS infrastructure
•  Secures access from anywhere where the 
Internet is
•  Allows use of broadband access, increasing
productivity
•  More effective use of work at home models
•  Increases geographic coverage
For further information contact your local
Nortel Networks Representative
226
Remote Access IP-VPN Solution










