Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
How VTAM determines the level of cryptography for a cryptographic session z/OS Communications Server: SNA Programming SC27-3674-00 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
For an OPNDST request, VTAM® determines
the level of cryptography to be used in a cryptographic session by
examining:
Table 1 shows the combination of values and the levels of sessions established. Table 2 shows how one part of the cryptographic requirement is determined using both the logon mode table entry and the higher cryptographic level specified in the system definition for either end of the session. For an OPNSEC request, VTAM determines
the level of cryptography to be used in a cryptographic session by
examining:
Table 3 shows the combination of values and the levels of sessions established. For information pertaining to LU 6.2 sessions, refer to the z/OS Communications Server: SNA Programmer's LU 6.2 Guide.
|
Copyright IBM Corporation 1990, 2014
|