Ethernet Switching Reference Guide

Secure IPSec tunnels are initiated between the
user and the core Contivity
Contivity authentication tunnel initiation request
against local data stores – may be RADIUS from
old RAS infrastructure, LDAP etc.
Secure IPSec tunnels encrypt and encapsulate
traffic between the user and the Contivity
Firewalls in each Contivity switch protect the site
LAN from outside threats
Split-tunneling on the IPSec client protects
customer’s machine from outside threats while
tunnel is up
Solution Value Proposition
Reduces corporate remote access expenses
by 60-80%
Accommodates an increasing dispersed and
mobile workforce, estimated to be 83% of all
employees by 2003
Gain anywhere access with minimal
access charges
Reduces ongoing expense of dial access
Eliminates costly toll-free access numbers
Eliminates dedicated RAS infrastructure
Secures access from anywhere where the
Internet is
Allows use of broadband access, increasing
productivity
More effective use of work at home models
Increases geographic coverage
For further information contact your local
Nortel Networks Representative
226
Remote Access IP-VPN Solution