Installation manual
The Redirector sets security for each local port. Security choices are:
v Pass-through - data between the client and the host is not altered
v Client side - encrypts data between the client and the redirector
v Host side - encrypts data between the redirector and the host
v Both - encrypts data both ways
You must enable security for the Redirector before you can enable client-side
security, server-side security or both.
You can use pass-through when encryption by the Redirector is not necessary,
either because the data-stream does not need to be encrypted, or because the
data-stream is already encrypted between the client and the host. You must use
pass-through if the Host On-Demand client is connecting through the Redirector to
a host that requires client authentication.
Telnet-negotiated security
Telnet-negotiated security allows the security negotiations between the client and
the Telnet server to be done on the established Telnet connection. You can
configure Telnet-negotiated security for Host On-Demand 3270 display and printer
sessions. It is based on INTERNET-DRAFT TLS-based Telnet Security, which
defines extensions to Telnet so that Transport Layer Security (TLS) can be
negotiated over a Telnet connection. The TLS Protocol 1.0 allows security
negotiation down from TLS 1.0 to SSL. Host On-Demand clients will always
negotiate down to SSL Version 3, since Host On-Demand supports
INTERNET-DRAFT TLS-based Telnet security, but not TLS Protocol 1.0.
The Telnet server must support TLS-based Telnet security for the Host On-Demand
clients to use Telnet-negotiated security. The Communications Server for OS/390
Version 2 Release 10 and later supports TLS-based Telnet security. Communications
Server for OS/390 documentation refers to Telnet-negotiated security as ″negotiable
SSL.″
For more information regarding Telnet-negotiated security, see Telnet-negotiated
security overview in the Host On-Demand online help.
For assistance in configuring Telnet-negotiated security on a 3270 display or printer
session, see configuring Telnet-negotiated security; in the Host On-Demand online
help.
Chapter 9. Security 51