SSH Tectia  
Previous Next Up [Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server (M) >>
    Using SSH Tectia Server (M) >>
        Configuration Files>>
            Recommended Algorithms for Mainframe Environment
            Crypto Hardware Support
            Configuration Options in Load-Balanced Environments
            Running SSH Tectia and OpenSSH in a z/OS Environment
        Running the Server >>
        Setting Up a Shell User>>
        Running Client Programs>>
        Handling MVS Datasets>>
        File Transfer Examples>>
    Troubleshooting SSH Tectia Server (M) >>
    Configuration >>
    Authentication >>
    Application Tunneling >>
    Sample Files >>
    Man Pages
    Log Messages >>

Recommended Algorithms for Mainframe Environment

The crypto hardware devices available on zSeries machines implement certain algorithms. Although SSH Tectia Server (M) includes all the algorithms available in SSH Tectia Client and Server 5.0 products on other platforms, using hardware acceleration is recommended because it will reduce the CPU usage. To take advantage of hardware acceleration, use the following algorithms:

  • Cipher: Triple DES with CBC (3des-cbc)
  • MAC: SHA-1 (hmac-sha1)

These are the defaults in the configuration files that the setup script installs.

Previous Next Up [Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2005 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice