SSH Tectia  
Previous Next Up [Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server for IBM z/OS >>
    Using SSH Tectia Server for IBM z/OS >>
    Configuring the Server >>
        Configuration Files >>
            Editing Configuration Files
            Command-Line Options
            Recommended Algorithms for Mainframe Environment
            Crypto Hardware Support
            Configuration Options in Load-Balanced Environments
            Running SSH Tectia and OpenSSH in a z/OS Environment
        Subconfigurations >>
        Ciphers and MACs
        Compression
        Configuring Root Logins
        Restricting User Logins
        Subsystems
        Auditing >>
        Securing the Server >>
        Default sshd2_config Configuration File
        Default ssh_certd_config Configuration File
    Configuring the Client >>
    Authentication >>
    Troubleshooting SSH Tectia Server for IBM z/OS >>
    Examples of Use >>
    Man Pages >>
    Log Messages >>

Recommended Algorithms for Mainframe Environment

The crypto hardware devices available on zSeries machines implement certain algorithms. Although SSH Tectia Server for IBM z/OS includes all the algorithms available in SSH Tectia Client and Server 5.0 products on other platforms, using hardware acceleration is recommended because it will reduce the CPU usage. To take advantage of hardware acceleration, use the following algorithms:

  • Cipher: Triple DES with CBC (3des-cbc)
  • MAC: SHA-1 (hmac-sha1)

These are the defaults in the configuration files that the setup script installs.

Previous Next Up [Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2006 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice