In addition to the common configuration settings, 3270 and 5250 host types require these specific settings.
Specify the terminal model (also known as a display station) you want Host Access for the Cloud to emulate. There are different terminal models available depending on the host type.
If you choose
you can set the number of columns and rows to customize the terminal model.(3270 only)
When Host Access for the Cloud connects to a Telnet host, the Telnet protocol and the host negotiate a terminal ID to use during the initial Telnet connection. In general, this negotiation will result in the use of the correct terminal ID, and so you should leave this box empty.
SSL and TLS protocols allow a client and server to establish a secure, encrypted connection over a public network. When you connect using SSL/TLS, Host Access for the Cloud authenticates the server before opening a session, and all data passed between and the host is encrypted using the selected encryption level. The following options are available:
Table 2 TLS/SSL Descriptions
Security options |
Description |
---|---|
None |
No secure connection is required. |
TLS 1.2 - 1.0 |
Allow connection through TLS 1.2, TLS 1.1, TLS 1.0 depending on the capabilities of the host or server to which you are connecting. When is set to Yes, the client checks the server or host name against the name on the server certificate. |
TLS 1.2 |
Select this value to connect using TLS. As part of the TLS protocol, the client checks the server or host name against the name on the server certificate when is set to Yes. This is highly recommended. |
NOTE:See the section on Securing connections for information on adding trusted certificates, key stores, using SSH, and other advanced security information.
When TLS/SSL security is set to TLS 1.2 or TLS 1.2-1.0, you have the option to verify the host name against the name on the server certificate. It is highly recommended that you enable host name verification for all sessions.
If you selected TN3270, TN3270E, or TN5250 as the protocol, specify the device name to use when the session connects to the host. The device name is also known as the host LU or pool. You can also choose to:
. An unique device name will be automatically generated.
which displays additional settings to complete.
. When you select this option the end user will be prompted for the device ID each time a connection is attempted.
If you do not specify a device name for the session, the host dynamically assigns one to the session. A device name that is set within a macro will override this setting.
If you selected Terminal ID Manager in the Management and Security Server Installation Guide.
you can use it to provide IDs to client applications at runtime. You can use the Terminal ID Manager to manage pooled IDs for different host types. An ID is connection data that is unique for an individual host session. To use Terminal ID Manager, you must have a Terminal ID Manager server configured. SeeIf you decide to use Terminal ID Manager and have configured the Terminal ID Manager server, then you can select from the options below to configure the criteria for acquiring an ID. All criteria must be met in order for an ID to be returned.
NOTE:Keep in mind that by specifying a criterion, you are indicating that the ID should be allocated only when an ID that has that specific value is found. The set of criteria selected here must be an exact match of the set of criteria specified on at least one Pool of IDs in Terminal ID Manager before the ID request can succeed.
Table 3 Terminal ID Manager Criteria
Criterion |
Description |
---|---|
Pool name |
Include this attribute and enter the name of the pool to limit the ID search to a specified pool. |
Client IP address |
The IP address of the client machine will be included as part of the request for an ID. |
Host address |
The address of the host configured for this session will be included as part of the request for an ID. |
Host port |
The port for the host configured for this session will be included as part of the request for an ID. |
Session name |
When selected, requires that the ID is configured to be used by this session exclusively. |
Session type |
The session type (for example, IBM 3270, IBM 5250, UTS, ALC or T27) is always included as part of any request for an ID. |
User name |
Use this criterion to ensure that only IDs created for exclusive use by specific users will be allocated. The current user’s name, which must be found on an ID before it can be allocated, is the name of the user that the session is allocated to at runtime. To configure a session based on user names, a default place holder user name is available: .For the administrator to configure sessions using <install-dir>/sessionserver/conf/container.properties file as follows: , the Terminal ID Manager needs to have IDs provisioned for tidm-setup. You can override the default name with one of your own by modifying theid.manager.user.name=custom-username Where custom-username is replaced by the name you want to use. |
Application name (UTS) |
The name of the host application will be used as part of the request for an ID. |
To determine the connection attempt behavior if Terminal ID Manager does not successfully allocate an ID to this session, use
:-If selected, the session will not attempt to connect when an ID is not allocated.
-If selected, the session will attempt to connect when an ID is not allocated. The attempt may be rejected by the host. There are some host types that permit a user to connect without an ID.
To confirm that Terminal ID Manager can provide an ID using the criterion and value selections you have made, click Test.
- Use this setting to provide a constant check between your session and the host so that you become aware of connection problems as they occur. Choose from the following types of keep alive packets:
This option |
Does this.... |
---|---|
None |
The default. No packets are sent. |
System |
The TCP/IP stack keeps track of the host connection and sends keep alive packets infrequently. This option uses fewer system resources than the Send NOP Packets or Send Timing Mark Packets options. |
Send NOP packets |
Periodically a No Operation (NOP) command is sent to the host. The host is not required to respond to these commands, but the TCP/IP stack can detect if there is a problem delivering the packet. |
Send timing mark packets |
Periodically a Timing Mark Command is sent to the host to determine if the connection is still active. The host should respond to these commands. If a response is not received or there is an error sending the packet, the connection shuts down. |
- If you choose to use either the Send NOP packets or the Send timing mark packets option, select the interval between the keep alive requests set. The values range from 1 to 36000 seconds (1 hour); the default is 600 seconds.