SSH Tectia  
Previous Next Up [Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server for IBM z/OS >>
    Using SSH Tectia Server for IBM z/OS >>
        Configuration Files>>
            Recommended Algorithms for Mainframe Environment
            Crypto Hardware Support
            Configuration Options in Load-Balanced Environments
            Running SSH Tectia and OpenSSH in a z/OS Environment
        Running the Server >>
        Setting Up a Shell User>>
        Running Client Programs>>
        Handling MVS Datasets and HFS File System Access>>
        Listing Datasets with SFTP Clients>>
    Configuring the Server >>
    Configuring the Client >>
    Authentication >>
    Troubleshooting SSH Tectia Server for IBM z/OS >>
    Examples of Use >>
    Man Pages >>
    Log Messages >>

Recommended Algorithms for Mainframe Environment

The crypto hardware devices available on zSeries machines implement certain algorithms. Although SSH Tectia Server for IBM z/OS includes all the algorithms available in SSH Tectia Client and Server 5.0 products on other platforms, using hardware acceleration is recommended because it will reduce the CPU usage. To take advantage of hardware acceleration, use the following algorithms:

  • Cipher: Triple DES with CBC (3des-cbc)
  • MAC: SHA-1 (hmac-sha1)

These are the defaults in the configuration files that the setup script installs.

Previous Next Up [Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2006 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice