Home Page Icon
Home Page
Table of Contents for
IBM Redbooks promotions
Close
IBM Redbooks promotions
by Rene Trumpp, Don Stoever, Karsten Graul, Ingo Franzki, Jeffrey Barnard, Joerg Sc
Enhanced Networking on IBM z/VSE
Front cover
Notices
Trademarks
Preface
The team who wrote this book
Now you can become a published author, too!
Comments welcome
Stay connected to IBM Redbooks
IBM Redbooks promotions
Summary of changes
December 2014, Second Edition
Chapter 1. Networking options overview
1.1 Overview
1.2 Hardware options
1.2.1 OSA-Express
1.2.2 OSA-Integrated Console Controller
1.2.3 OSA-Express in QDIO mode
1.2.4 OSA-Express
1.2.5 OSA for NCP support
1.2.6 Intra-Ensemble Data Network support
1.2.7 OSA-Express multi-port support
1.2.8 Using VTAM (SNA) and TCP/IP (non-QDIO) parallel on the same CHPID
1.2.9 HiperSockets (IQD)
1.2.10 Virtual local area network
1.2.11 Shared OSA adapter versus HiperSockets
1.2.12 Using HiperSockets to communicate with Linux on System z
1.2.13 QDIO buffer configuration
1.2.14 Virtual OSA devices and VMAC
1.2.15 OSAX Hotswap support
1.3 Software options
1.3.1 IPv4
1.3.2 IPv6
1.3.3 Why IPv6?
1.3.4 Dual stack support
1.3.5 Migration from IPv4 to IPv6
1.3.6 IPv6 products for z/VSE
1.3.7 Securing your connections with Secure Sockets Layer
1.3.8 Options for printing
1.3.9 Overview of APIs
1.3.10 Available applications
1.3.11 Choosing a socket API when designing your applications
1.3.12 Enabling your applications for IPv6
1.4 Known problems
1.4.1 ERROR DURING OSA EXPRESS PROCESSING,REASON=002C CUU=nnnn,RETCODE=E00A
Chapter 2. TCP/IP for VSE/ESA
2.1 Overview
2.2 Standard features
2.3 Other optional features
2.4 Applications that are provided with TCP/IP for VSE
2.5 Application programming interfaces
2.6 Setting up and running TCP/IP for VSE
2.7 FTP hints
2.7.1 Internal FTP server suggestions
2.7.2 Using external FTPBATCH servers
2.8 Partition priorities
2.9 Security
2.10 Remote running with REXX
2.11 Version checking
2.12 Datagram analysis
2.13 Known problems
2.13.1 Routing in a subnet
2.13.2 Using SSL ciphers
2.13.3 Secure SSL port
2.13.4 SSL client does not verify the server certificate
2.13.5 TLS issue with IBM Personal Communications 6.0.7
Chapter 3. IPv6/VSE
3.1 Overview
3.2 Obtaining and activating a license key
3.3 Stack setup
3.3.1 IPv4 stack setup
3.3.2 IPv6 stack setup
3.3.3 Mixed IPv4 and IPv6 network setup
3.3.4 Setting up a dual-stacked system
3.3.5 UDPv4 in a coupled stack environment
3.3.6 Connectivity considerations
3.4 Setting up FTP
3.4.1 Security
3.4.2 VSE as a server
3.4.3 VSE as a client
3.5 Setting up TN3270
3.5.1 Setting up VTAM
3.5.2 Starting a TN3270 server
3.5.3 Controlling the terminal type
3.5.4 Connecting with IBM Personal Communications
3.5.5 Connecting with Open Text Exceed
3.5.6 Connecting with wc3270
3.5.7 Recovering from broken connections
3.6 Setting up TN3270E printing
3.6.1 TN3270E setup
3.6.2 BSTTVNET JCL
3.6.3 Node error program
3.7 Setting up SSL
3.7.1 Installing the prerequisite programs
3.7.2 Creating the keystore
3.7.3 Removing the private CA key from the client keyring file
3.7.4 Deciding whether to use the SSL proxy server or AT-TLS
3.7.5 Specifying parameters
3.7.6 Configuring the SSL proxy server
3.7.7 Configuring the AT-TLS server
3.7.8 Considerations on SSL performance
3.7.9 Considerations on blocking clear ports
3.7.10 Configuring wc3270 for SSL
3.7.11 Configuring IBM Personal Communications for SSL
3.7.12 Configuring secure FTP
3.7.13 Configuring VSE Connector Server
3.7.14 SSL client authentication
3.7.15 Using TLSv1.2
3.8 Setting up CICS Web Support
3.8.1 Modifying the CICS startup job
3.8.2 Defining the TCP/IP host name
3.8.3 Considerations for SSL
3.9 Known problems
3.9.1 VSE cannot be reached
3.9.2 BSTT075E LUNAME NOT AVAIL
3.9.3 SSL connect error with wc3270
3.9.4 Other SSL connect errors
3.9.5 Hang situation with BSTTATLS/BSTTPRXY
3.9.6 Return codes 3100 / 1700 from IJBCRLIB
3.9.7 BSTTFTPC fails to connect to Windows Server 2008
3.9.8 Batch email cannot relay mail
3.9.9 LDAP sign on by using SSL does not work
3.9.10 GnuTLS error -53: Error in the push function
Chapter 4. Fast Path to Linux on System z
4.1 Overview
4.2 Concept of LFP instances and LFP daemons
4.3 LFP in a z/VM environment
4.3.1 Linux guest setup
4.3.2 VSE guest setup
4.4 z/VM IP Assist
4.4.1 Configuration user setup
4.4.2 Setting up the VIA guest
4.4.3 Setting up VSE guest
4.4.4 Using the LFP trace with VIA
4.5 LFP in an LPAR environment
4.5.1 Prerequisites
4.5.2 Hardware setup
4.5.3 VSE setup
4.5.4 Linux setup
4.6 IBM applications that support LFP
4.6.1 VSE Connector Server
4.6.2 Using the Virtual z/VSE FTP Daemon
4.7 Using secure connections with SSL
4.7.1 Using a VIA guest
4.7.2 Using a Linux on System z guest
4.7.3 Configuring the z/VSE virtual FTP daemon for SSL
4.8 Known problems
4.8.1 Error accessing the config disk
4.8.2 SE file transfer had a problem
4.8.3 User ID not authorized for SMSG
4.8.4 Invalid command response from VIA user
4.8.5 No response from VIA user
4.8.6 Profile cannot be loaded
Chapter 5. OpenSSL
5.1 Overview
5.1.1 What is available on z/VSE
5.1.2 What is unique in z/VSE
5.1.3 Runtime variables
5.1.4 What is not available in z/VSE
5.2 Access to the OpenSSL API
5.3 Creating random numbers
5.3.1 Characteristics of random number generators
5.3.2 Random number generation in OpenSSL
5.3.3 Alternatives
5.3.4 Considerations for the z/VSE crypto device driver
5.3.5 Performance
5.4 Keystore considerations
5.4.1 Creating a PEM keystore
5.4.2 Exporting PEM to PFX
5.4.3 Importing PFX to PEM
5.4.4 Password-protected keystores
5.5 Programming
5.5.1 Include files
5.5.2 Passed socket number
5.5.3 Socket calls
5.5.4 Switching between GSK and OpenSSL socket calls
5.5.5 Specifying the key ring
5.5.6 Using a password-protected keyring
5.5.7 Supported cipher suites
5.5.8 Specifying cipher suites
5.5.9 Supported RSA key lengths
5.5.10 Debugging
5.5.11 Hardware crypto support
5.5.12 Programming example
5.6 Performing the OpenSSL speed test
5.6.1 Test parameters
5.6.2 Test results
5.7 How OpenSSL is used on z/VSE
5.8 OpenSSL vulnerabilities
5.9 Considerations on TLSv1.2
5.10 Considerations about Diffie-Hellman
5.10.1 RSA
5.10.2 Diffie-Hellman
5.10.3 Variants of Diffie-Hellman
5.11 Using DHE-RSA with OpenSSL on z/VSE
5.11.1 Generating DH parameters
5.11.2 Using DHE-RSA with Java-based connector
5.12 Considerations on Elliptic Curve Cryptography
5.13 Using ECDHE-RSA with OpenSSL on z/VSE
5.13.1 Generating the EC key
5.13.2 Uploading the EC key to VSE
5.13.3 Using ECDHE-RSA with Java-based connector
5.14 Restrictions
5.14.1 No SHA-512 support
Chapter 6. Comparison of stacks and protocols
6.1 Stacks comparison
6.1.1 Licensing
6.1.2 Installation libraries
6.1.3 Virtual storage organization
6.1.4 Commands
6.1.5 Comparison of protocols
6.2 Applications comparison
6.2.1 FTP server
6.2.2 FTP clients
6.2.3 Uploading a virtual tape into VSAM
6.2.4 AutoFTP
6.2.5 TN3270
6.2.6 Printing
6.2.7 AutoLPR
6.2.8 Inserts coding
6.2.9 Email
6.2.10 Creating PDF documents
6.2.11 Remote EXEC client
6.3 Performance
6.4 SSL
6.5 Comparison of APIs
6.5.1 Socket APIs
6.5.2 SSL APIs
6.5.3 Crypto APIs
6.6 Considerations for DB2 Server for VSE interfaces
6.7 Considerations for IBM applications
6.7.1 VSE Connector Server
6.7.2 Virtual tape
6.7.3 CICS Web Support
6.7.4 Encryption Facility for z/VSE
6.7.5 Basic Security Manager
6.7.6 Uploading PTF files to IJSYSPF
6.8 Known problem: ftp.exe hangs on Windows 7
6.8.1 Symptom
6.8.2 Solution
Appendix A. API reference
Socket APIs
SSL APIs
Related publications
IBM Redbooks
Other publications
Online resources
Help from IBM
Back cover
IBM System x Reference Architecture for Hadoop: IBM InfoSphere BigInsights Reference Architecture
Introduction
Business problem and business value
Reference architecture use
Requirements
InfoSphere BigInsights predefined configuration
InfoSphere BigInsights HBase predefined configuration
Deployment considerations
Customizing the predefined configurations
Predefined configuration bill of materials
References
The team who wrote this paper
Now you can become a published author, too!
Stay connected to IBM Redbooks
Notices
Trademarks
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Preface
Next
Next Chapter
Summary of changes
IBM Redbooks promotions
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset