SlideShare una empresa de Scribd logo
1 de 73
Descargar para leer sin conexión
© 2014 IBM Corporation
z/OS Communication Server
Overview
Mike Fox, Software Architect
IBM Enterprise Networking Solutions
mjfox@us.ibm.com
© 2014 IBM Corporation© 2014 IBM Corporation
Trademarks
Notes:
Performance is in Internal Throughput Rate (ITR) ratio based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput that any user will experience will vary
depending upon considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that
an individual user will achieve throughput improvements equivalent to the performance ratios stated here.
IBM hardware products are manufactured from new parts, or new and serviceable used parts. Regardless, our warranty terms apply.
All customer examples cited or described in this presentation are presented as illustrations of the manner in which some customers have used IBM products and the results they may have achieved. Actual environmental
costs and performance characteristics will vary depending on individual customer configurations and conditions.
This publication was produced in the United States. IBM may not offer the products, services or features discussed in this document in other countries, and the information may be subject to change without notice. Consult
your local IBM business contact for information on the product or services available in your area.
All statements regarding IBM's future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only.
Information about non-IBM products is obtained from the manufacturers of those products or their published announcements. IBM has not tested those products and cannot confirm the performance, compatibility, or any
other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products.
Prices subject to change without notice. Contact your IBM representative or Business Partner for the most current pricing in your geography.
This information provides only general descriptions of the types and portions of workloads that are eligible for execution on Specialty Engines (e.g, zIIPs, zAAPs, and IFLs) ("SEs"). IBM authorizes customers to use IBM
SE only to execute the processing of Eligible Workloads of specific Programs expressly authorized by IBM as specified in the “Authorized Use Table for IBM Machines” provided at
www.ibm.com/systems/support/machine_warranties/machine_code/aut.html (“AUT”). No other workload processing is authorized for execution on an SE. IBM offers SE at a lower price than General Processors/Central
Processors because customers are authorized to use SEs only to process certain types and/or amounts of workloads as specified by IBM in the AUT.
The following are trademarks or registered trademarks of other companies.
* Other product and service names might be trademarks of IBM or other companies.
The following are trademarks of the International Business Machines Corporation in the United States and/or other countries.
* Registered trademarks of IBM Corporation
Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries.
Cell Broadband Engine is a trademark of Sony Computer Entertainment, Inc. in the United States, other countries, or both and is used under license therefrom.
Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel
Corporation or its subsidiaries in the United States and other countries.
IT Infrastructure Library is a registered trademark of the Central Computer and Telecommunications Agency which is now part of the Office of Government Commerce.
ITIL is a registered trademark, and a registered community trademark of the Office of Government Commerce, and is registered in the U.S. Patent and Trademark Office.
Java and all Java based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates.
Linear Tape-Open, LTO, the LTO Logo, Ultrium, and the Ultrium logo are trademarks of HP, IBM Corp. and Quantum in the U.S. and
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both.
OpenStack is a trademark of OpenStack LLC. The OpenStack trademark policy is available on the OpenStack website.
TEALEAF is a registered trademark of Tealeaf, an IBM Company.
Windows Server and the Windows logo are trademarks of the Microsoft group of countries.
Worklight is a trademark or registered trademark of Worklight, an IBM Company.
UNIX is a registered trademark of The Open Group in the United States and other countries.
AIX*
BladeCenter*
CICS*
Cognos*
DataPower*
DB2*
DFSMS
EASY Tier
FICON*
GDPS*
PowerHA*
PR/SM
PureSystems
Rational*
RACF*
RMF
Smarter Planet*
Storwize*
System Storage*
System x*
System z*
System z10*
Tivoli*
WebSphere*
XIV*
zEnterprise*
z10
z10 EC
z/OS*
z/VM*
z/VSE*
HiperSockets*
HyperSwap
IMS
InfiniBand*
Lotus*
MQSeries*
NetView*
OMEGAMON*
Parallel Sysplex*
POWER7*
© 2014 IBM Corporation© 2014 IBM Corporation
What is Communications Server?
Overview of SNA
Overview of TCP/IP
Overview of RDMA and RoCE
Communications Server Product Structure
Communications Server Configuration and operation
Communications Server Technology and Applications
Network connectivity
Clustering
Security
Agenda
© 2014 IBM Corporation© 2014 IBM Corporation
What is Communications
Server?
© 2014 IBM Corporation© 2014 IBM Corporation
The Communications Server name is used for
products running on different platforms:
System z and zSeries, pSeries, xSeries, or OEM
Communications Server is currently provided for:
•z/OS, Windows, AIX, UNIX, Linux
With z/OS, Communications Server is a base element
(part of the operating system)
•Consists of TCP/IP and SNA Services
•Consists of prior products, TCP/IP and VTAM, for
MVS
What is Communications Server?
© 2014 IBM Corporation© 2014 IBM Corporation
z/OS Communications Server History
VTAM (“Virtual Telecommunications Access Method”)
implements SNA and has been available as mainframe
software since 1974
Has been continuously enhanced
TCP/IP available as mainframe software since the 1980s
Has been continuously enhanced
Original MVS software was ported from VM
TCP/IP and VTAM were combined into single product
(Communications Server) in 1996
Has been continuously enhanced
© 2014 IBM Corporation© 2014 IBM Corporation
SNA overview
© 2014 IBM Corporation© 2014 IBM Corporation
SNA History
SNA “Systems Network Architecture” developed and
distributed by IBM and announced in 1974
Specifications have also been provided so that a large
number of other vendors also provide products that
implement SNA
SNA is an architecture defining protocols such as:
Link Protocols
Node Intercommunication Protocols
Application Protocols
VTAM is the mainframe and NCP is the front-end SNA
product
Runs with three main operating systems
MVS, VM, VSE
© 2014 IBM Corporation© 2014 IBM Corporation
What is SNA? Subarea APPN/HPR
PeerHierarchical
SNA originally consisted of strictly hierarchical subarea protocols with few dynamics
network resources predefined
Advanced Peer to Peer networking introduced mid 1980s
made SNA more flat and dynamic
High Performance Routing introduced in 1990s
Enterprise Extender (HPR over UDP) introduced in 1999
© 2014 IBM Corporation© 2014 IBM Corporation
Enterprise Extender
Allows use of IP network for SNA
sessions
To an SNA application, the IP network
looks like a link
To the IP network, EE is just a UDP
application
SNA traffic is sent as UDP datagrams
(on ports 12000-12004) over the IP
network
Supported by many platforms:
z/OS
CS/Linux, CS/AIX, CS/Windows
PComm
i5/OS
Cisco SNASw
Microsoft HIS
Typically isolates SNA footprints to the
"outside" of the network.
EE allows enablement of IP applications and
convergence on a single network transport while
preserving SNA application and endpoint investment.
© 2014 IBM Corporation© 2014 IBM Corporation
SNA Viability
SNA is a legacy networking protocol but it’s still in wide use
and support is still required.
There are over a trillion lines of customer written application
code based on CICS, IMS, and DB2
A large percentage of all business data is still accessed
using SNA applications
“The report of my death is an exaggeration”
Mark Twain, 1897
SNA, 2014
© 2014 IBM Corporation© 2014 IBM Corporation
Overview of TCP/IP
© 2014 IBM Corporation© 2014 IBM Corporation
TCP/IP History
TCP/IP really needs no introduction, but for reference…
ARPANET procotol suite introduced concepts of layering and
virtualizing in the world of networking in early 1970s
Funded by Defense Advanced Research Projects Agency
(DARPA)
Later Bolt, Beranek, and Newman (BBN) developed TCP/IP
protocols for Berkeley UNIX on the VAX
Code distributed for free with University of California's Berkeley's
UNIX operating system
First release of Berkeley Software Distribution in 1983 (4.2BSD)
Spread rapidly and several releases followed
New WANs in US created and attached to ARPANET
Developed into the Internet
© 2014 IBM Corporation© 2014 IBM Corporation
TCP/IP Overview
Application Layer
User process cooperating with partner on same or different host, i.e. Telnet, FTP,
SMTP
Transport Layer
TCP (connection oriented) and UDP (connectionless)
Internetwork Layer
Shields higher levels from the physical network architecture
Network Interface Layer
Interface to network hardware, called link or data link layer
Applications
Network Interface and Hardware
Applications
Network Interface and Hardware
Internetwork
Transport TCP/UDP
IP ICMP
ARP/RARP
© 2014 IBM Corporation© 2014 IBM Corporation
TCP/IP Addressing
TCP/IP uses four octet addressing structure (IPv4) e.g., 198.51.100.36
Broken into netID and hostID portion
Subnetting can be used to indicate portion of host bits are to be used to indicate
additional networks
Interface between applications and transport layer is defined by port numbers and
sockets
Each process that wants to communicate with another process identifies itself by
a 16 bit port number
0
Class A:
10
110
8
1
6
2
4
3
1
netID
netID
netID
hostID
hostID
hostID
Class B:
Class C:
© 2014 IBM Corporation© 2014 IBM Corporation
IPv6 is an evolution of the “current” version of IP, which is known as IPv4
Changes from IPv4 to IPv6
Expanded Routing and Addressing
Address space increased from 32 bits
to 128 bits
340 billion billion billion billion addresses (v4 = 1 billion)
Enough to allow every atom on the Earth to have its own IP address – 100
times over!
Header Format Simplification
Reduced common-case processing cost of packet handling
Improved Support for Options
New encoding allows for more efficient forwarding
Greater flexibility for introducing new options in the future
Plug-and-Play Support
Autoconfiguration of host address, default routers, MTU size, and other IP-
related information
What is IPv6?
IPv4 Address:
198.51.100.36
IPv6 Address:
2001:0db8:4545:2::09ff:fef7:62dc
© 2014 IBM Corporation© 2014 IBM Corporation
Why IPv6 now?
The effects of the IPv4 address limitations have
been reduced/postponed for a while using
Network Address Translation
BUT –
A new surge of demand for IP addresses is
coming from:
The far east where the use of the Internet is
accelerating fast
The assignment of IP addresses to cell
phones
The assignment of IP addresses to
household appliances of various types “the
internet of things”
Multiple addresses per person
Government mandates for IPv6 support
Backbone ISPs
Regional
ISPs
Local
ISPs
Large corporations
and universities
AT&T, MCI, GTE, BT,
etc.
The Internet - a worldwide
digital utility.
Connectivity from
anywhere (car,
home, office) to
anything!
This demand cannot be met with IPv4 addressing space and IPv6 is now required for
parts of the internet
IPv6 support is now required to bid on IT contracts for the US government!
© 2014 IBM Corporation© 2014 IBM Corporation
Common TCP and UDP TransportIPv6 Raw
Transport
IPv4 Raw
Transport
AF_INET6 PFS AF_INET PFS
ICMPv6
NeD
MLD
Stateless
autoconfig
ICMPIGMPARP
Firewall Functions Firewall Functions
QoS
TRM
IDS
QoS
TRM
IDS
Common DLC Functions
IPv6 DLCs IPv4 DLCs
Applications
IPv4IPv6
Communications Server TCP/IP dual-stack structure
A dual-mode (or dual-
stack) TCP/IP
implementation supports
both IPv4 and IPv6
interfaces - and both old
AF_INET and new
AF_INET6 applications.
The dual-mode TCP/IP
implementation is a key
technology for IPv4 and
IPv6 coexistance in an
internet.
IPv4 and IPv6 can be overlaid onto the same
physical infrastructure (fabrics, interfaces, etc)
© 2014 IBM Corporation© 2014 IBM Corporation
Overview of RDMA and
RoCE
© 2014 IBM Corporation© 2014 IBM Corporation
RDMA (Remote Direct Memory Access) Technology Overview
Key attributes of RDMA
Enables a host to read or write directly from/to a remote host’s memory with
minimal (or no) involvement from either host’s CPU, by registering specific
memory for RDMA partner use.
• Requires an RDMA network interface card (RNIC)
• Reduces networking stack overhead by bypassing TCP/IP semantics
and offloading networking CPU cycles to the RNIC
– Data is moved directly by the RNICs, bypassing the TCP/IP stack.
Host A
Memory CPU
Host B
Memory CPU
RDMA enabled network
fabric
RDMA enabled network
fabric
RNIC RNICRkey A Rkey B
A B
© 2014 IBM Corporation© 2014 IBM Corporation
RoCE - RDMA over Converged (Enhanced) Ethernet
RDMA based technology has been available in the industry for many years –
primarily based on Infiniband (IB)
IB requires a completely unique network eco system (unique hardware such
as host adapters, switches, host application software, system management
software/firmware, security controls, etc.)
IB is popular in the HPC (High Performance Computing) space
RDMA technology is now available on Ethernet – RDMA over Converged
Ethernet (RoCE)
RoCE uses existing Ethernet fabric but requires advanced Ethernet hardware
(RDMA capable NICs and RoCE capable Ethernet switches)
RoCE is a game changer!
• RDMA technology becomes more affordable and prevalent in data
center networks
© 2014 IBM Corporation© 2014 IBM Corporation
Communications Server
Product Structure
© 2014 IBM Corporation© 2014 IBM Corporation
Applications
SNA APIs Sockets
APIs
SNA,
APPN,
HPR
TCP/IP
Network Attachment
Communi-
cations
Storage
Manager
z/OS Communications ServerProvide common services within CS
Network attachment
Storage management
High Performance Data Transfer
TCP/IP and SNA integration
TN3270
Network access
Internal optimizations
Enterprise Extender
Standard TCP/IP applications
Multi-protocol Solutions
Sockets (TCP/IP) applications
z/OS Unix offers z/OS users access to a
wide range of UNIX-based applications
over IP networks
SNA applications
SNA applications are supported over
SNA or IP networks
z/OS Communications Server
Enterprise Extender
DLCs
RDMA
© 2014 IBM Corporation© 2014 IBM Corporation
LPARs and
Communications
Server
IP
Backbone
TN3270,
or Web
client
SNA
Client
IB
M
IBM
IBM
Only one VTAM per
z/OS image
May run multiple TCP/IP
stacks on a single z/OS
image (but generally not
recommended)
May use different
physical networks
for SNA and
TCP/IP, or may
use a single
network for both
SNA
Backbone
x.x.x.4
y.y.y.5
x.x.x.5
y.y.y.6
ATM
NETA
VTAM1 NETA
VTAM2,VTAM3,VTAM4TCP
Stack1
Stack2
TCP
Stack3
Stack4,
etc.
© 2014 IBM Corporation© 2014 IBM Corporation
P
a
s
c
a
l
R
e
x
x
C
I
C
S
C
a
l
l
A
S
M
-
M
A
C
R
O
EZASOKET
EZASMI TCP/IP provided C sockets API LE provided C/C++ sockets API
UNIX Systems Services provided callable BPX sockets API
X
T
I
SUN
3.9 NCS
X11
R4
DPI
1.2
RFC
1006
R
P
C
R
P
C
X
-
W
I
N
S
N
M
P
X
T
I
XPG
4.2
R
P
C
R
P
C
SUN
4.0 DCE
X
-
W
I
N
X11
R6
S
N
M
P
DPI
2.0
UNIX Systems Services provided Logical File System (LFS)
UNIX Systems Services and TCP/IP provided Physical File Systems (PFS) - AF_INET and AF_INET6
TCP/IP protocol stack
Sockets application programs or subsystems utilizing sockets APIs
Sockets APIs? Yep, we’ve got a few
© 2014 IBM Corporation© 2014 IBM Corporation
Some standardized application protocols
Remote terminal access
Telnet
TN3270(e)
TN5250
Network Management
SNMP
ICMP
File
Transfer
FTP
TFTP
Electronic
mail
CSSMTP
Data
Sharing
NFS
DFS
World Wide Web
HTTP
HTTPS
MIME
Remote
Command
Execution
REXEC
RSH
TCP/IP
Network
Routing
OMPRoute
Mostly provided by CS as applications that ship with the product
© 2014 IBM Corporation© 2014 IBM Corporation
SNA
3270
Appli-
cation
SNA
3270
Appli-
cation
IP
Backbone
Network
SNA
Backbone
Network
SNA 3270
terminal
TN3270
server
SNA/LU2
TCP/IP
TN3270(E)
Workstation
SNA/LU2
TCP/TN3270(E)
z/OS
z/OS
There are
hundreds of
thousands of
SNA LU2-
based
applications
out there
today that
will probably
never be
migrated to
native
sockets.
Many OEM and IBM client products available
IBM products include PCOM and Rational Host On Demand
Why is TN3270 Needed?
© 2014 IBM Corporation© 2014 IBM Corporation
The TN3270 server provides enterprise class capacity, performance,
and reliability
It supports both TN3270 and TN3270E protocols
z/OS CS TN3270E ServerThere are two telnet
servers on z/OS :
The TN3270, TN3270E,
and SNA line mode telnet
server
The UNIX line mode
and raw mode telnet
server
CICS
Transaction
Desktop
PC
TN3270E
Printer
TN3270E
Terminal
z/OS
T
C
P
/
I
P
TN3270E
Server
CICS or
other SNA
Application
V
T
A
M
UNIX
Shell
UNIX
TelnetD
LU1/3
LU2
© 2014 IBM Corporation© 2014 IBM Corporation
Communications Server
Configuration and
Operation
© 2014 IBM Corporation© 2014 IBM Corporation
Configuration basics – TCP/IP
TCP/IP profile specifies configuration for the TCP/IP stack
IP interfaces
Port reservations
Networking options and configuration information including sysplex related
Details are specified in IP Configuration Reference
Accompanying IP Configuration Guide describes best practices and provides
step by step guides to many common configuration tasks
TCP/IP profile is stored in MVS datasets
Location specified in the TCP/IP started PROC (//PROFILE DD statement)
• There are other default places we look if that’s not specified, but make life
easy for people reading your JCL by specifying it
Main profile can include sub-files
TCP/IP configuration can be dynamically changed with VARY OBEY operator
command
Operator specifies a dataset containing the new TCP/IP profile or a subset of
a TCP profile with the new configuration information
E.g., VARY TCPIP,,OBEYFILE,DSN=SYS1.TCPPARMS(NEWPROF)
© 2014 IBM Corporation© 2014 IBM Corporation
Operational basics – TCP/IP
Communication server provides a rich set of displays via the NETSTAT operator
command.
Can be run from the operator console, a TSO session or the z/OS Unix shell
Has options to display just about any configuration or state
Device state, routing tables, connection information, stack information,
etc… far too many to list here
Documented in the IP System Administrator’s Commands.
TCP/IP stack is controlled with the VARY TCPIP,,command operator command.
Values for command include:
OBEYFILE to change configuration (see previous slide)
SYNTAXCHECK to perform a syntax check on a TCP/IP Profile file without
enacting the specified configuration
DATTRACE,PKTTRACE, and OSAENTA to control traces
START and STOP to control network resources (e.g., IP interfaces)
SYSPLEX to control the sysplex configuration of the stack (e.g., quiesce,
leave or join sysplex groups, etc)
PURGECACHE to delete the ARP/Neighbor cache
© 2014 IBM Corporation© 2014 IBM Corporation
Example of a TCP/IP Netstat command
D TCPIP,,NETSTAT,ROUTE
EZZ2500I NETSTAT CS V2R1 TCPIP 278
DESTINATION GATEWAY FLAGS REFCNT INTERFACE
DEFAULT 192.168.246.1 UGS 000013 ETH1
DEFAULT 192.168.247.129 GS 000000 OSATR104
9.21.111.210/32 0.0.0.0 H 000000 SNA1
9.23.246.0/24 0.0.0.0 US 000000 ETH1
9.23.246.0/24 0.0.0.0 S 000000 ETH2
9.23.246.16/32 0.0.0.0 UH 000000 VLINK1
9.23.246.23/32 0.0.0.0 H 000000 ETH2
9.23.246.24/32 0.0.0.0 UH 000000 ETH1
9.23.247.128/25 0.0.0.0 US 000000 OSATR100
9.23.247.128/25 0.0.0.0 S 000000 OSATR104
9.23.247.130/32 0.0.0.0 H 000000 OSATR104
9.23.247.135/32 0.0.0.0 UH 000000 OSATR100
127.0.0.1/32 0.0.0.0 UH 000020 LOOPBACK
13 OF 13 RECORDS DISPLAYED
© 2014 IBM Corporation© 2014 IBM Corporation
Configuration basics – VTAM
All VTAM configuration files are contained within SYS.VTAMLST, which is called the
VTAM definition library.
VTAM is configured using a combination of start options and configuration lists:
Start options control the configuration of VTAM itself and are usually specified in the
ATCSTRxx member of the VTAM definition library.
you specify XX with the LIST=XX parameter when starting VTAM. This would be
in your VTAM JCL
Start options can also be specified as parameters to VTAM (in your JCL)
Configuration lists specify the resources that VTAM will control and are usually
specified in a hierarchy of files starting with the ATCCONxx member of the VTAM
definition library
You specify XX with the CONFIG=XX parameter when starting VTAM
This file contains a list of member names in the VTAM definition library, each
member defines a resource that VTAM will start and control. These are resources
like application programs, physical and logical units, networking domains, etc.
Resources are defined hierarchically.
The reference manual for this configuration is the SNA Network Implementation Guide and
the SNA Resource Definition Refereince
© 2014 IBM Corporation© 2014 IBM Corporation
Example of VTAM configuration hierarchy
SYS1.VTAMLST
ATCSTR01
ATCCON01
NCP1
CHAN1
LOCSNA1
LOCNS1
START OPTION1
START OPTION1
etc
NCP1
CHAN1
LOCSNA1
ATCSTR01
ATCCON01
Start these
immediately
This one can be started later
using an operator command
© 2014 IBM Corporation© 2014 IBM Corporation
Configuration interdependency – VTAM and TCP/IP
All DLC services in Communications Server are provided by VTAM
This means that when configuring TCP/IP interfaces, part of the definition is in
VTAM
– The DLC port is defined in VTAM as a Transport Resource List Entry (TRLE)
– The IP interface is defined in TCP/IP
– The IP definition refers to the VTAM definition by TRLE PORTNAME
– Some IP interface type dynamically create their own TRLE definitions
INTERFACE OSAQDIO24
DEFINE IPAQENET
PORTNAME OSAQDIO2
IPADDR 100.1.1.1/24
TCP/IP profile statement
TRLHYDRA VBUILD TYPE=TRL
HYD1 TRLE LNCTL=MPC,
READ=(2EC0),
WRITE=(2EC1),
MPCLEVEL=QDIO,
DATAPATH=(2EC2,2EC3),
PORTNAME=(OSAQDIO2),
PORTNUM=1
VTAMLST member
© 2014 IBM Corporation© 2014 IBM Corporation
Operational basics – VTAM
VTAM displays are done on the operator console with the DISPLAY (VTAM
Jobname) command
A rich set of display commands is provided, similar to TCP/IP Netstat in
scope and coverage
Documented in SNA Operation
VTAM is controlled with the MODIFY (VTAM jobname) and VARY (VTAM
jobname) operator commands
In general, the MODIFY command controls configuration and resources and
VARY command controls state
For example, VARY command is used to start and stop resources and
MODIFY command is used change configuration information
But this rule is very loosely followed and is only a general guideline
Documented in SNA Operation
© 2014 IBM Corporation© 2014 IBM Corporation
Example of a VTAM display command (Enterprise Extender
information)
D NET,EE
IST097I DISPLAY ACCEPTED
IST350I DISPLAY TYPE = EE
IST2000I ENTERPRISE EXTENDER GENERAL INFORMATION
IST1685I TCP/IP JOB NAME = TCPCS
IST2003I ENTERPRISE EXTENDER XCA MAJOR NODE NAME = XCAEE2
IST2004I LIVTIME = (10,0) SRQTIME = 15 SRQRETRY = 3
IST2005I IPRESOLV = 0
IST2231I CURRENT HPR CLOCK RATE = STANDARD
IST2232I HPR CLOCK RATE LAST SET TO HIGH ON 11/14/06 AT 22:58:41
IST2233I HPR CLOCK RATE LAST EXITED HIGH ON 11/14/06 AT 22:58:45
IST924I -------------------------------------------------------------
IST2006I PORT PRIORITY = SIGNAL NETWORK HIGH MEDIUM LOW
IST2007I IPPORT NUMBER = 12000 12001 12002 12003 12004
IST2008I IPTOS VALUE = C0 C0 80 40 20
IST924I -------------------------------------------------------------
IST2017I TOTAL RTP PIPES = 4 LU-LU SESSIONS = 3
IST2018I TOTAL ACTIVE PREDEFINED EE CONNECTIONS = 2
IST2019I TOTAL ACTIVE LOCAL VRN EE CONNECTIONS = 0
IST2020I TOTAL ACTIVE GLOBAL VRN EE CONNECTIONS = 0
IST2021I TOTAL ACTIVE EE CONNECTIONS = 2
IST314I END
© 2014 IBM Corporation© 2014 IBM Corporation
Diagnostic information – TCP/IP
TCP/IP makes extensive use of the MVS component trace facility and when reporting a
problem you will typically be asked to provide this trace. There are multiple TCP/IP
component traces including:
SYSTCPIP – for TCP/IP stack and Telnet internals
SYSTCPRT – for the OMPROUTE routing daemon
SYSTCPDA – packet and data trace
SYSTCPIK – for the IKE daemon
SYSTCPRE – for the resolver (interfaces with DNS to find resources in the network)
SYSTCPOT – OSA trace
And others.. Documented in IP Diagnosis
TCP/IP also provides a large set of IPCS commands for analyzing TCP/IP dumps
Also documented in IP Diagnosis
You will usually be asked to provide an SVC dump of TCP/IP when reporting a
problem
• Be sure to provide the following:
• TCP/IP and VTAM address spaces.
• SDATA options RGN, CSA, LSQA, NUC, PSA, and LPA.
• CSM data spaces. Add DSPNAME=(1.CSM*) to the DUMP command to include them in the
dump.
© 2014 IBM Corporation© 2014 IBM Corporation
Diagnostic information – VTAM
VTAM has its own trace called the VTAM Internal Trace (VIT)
Similar to CTRACE in that what’s captured is controlled by TRACE option
specified in VTAMLST and/or modified by MODIFY TRACE command
Is in 64 bit HVCOMMON storage and is captured when VTAM is dumped if
CSA is specified on the dump command.
If too much information than can fit in the VTAM address space is needed,
MVS Generalized Trace Facility (GTF) can be used to write this trace to
external datasets.
Format of trace records is documented in SNA Diagnosis volume 2
Like TCP/IP SNA provides a large set of IPCS commands for analyzing dumps
Documented in SNA Diagnosis volume 1.
Also like TCPIP, you will likely be asked to provide a dump of the VTAM
address space to diagnose problems
Should be acquired similarly to how TCP dumps are described on the
previous page
© 2014 IBM Corporation© 2014 IBM Corporation
Communications Server
Technology and
Applications
© 2014 IBM Corporation© 2014 IBM Corporation
Communications Server
Network Connectivity
Technologies
© 2014 IBM Corporation© 2014 IBM Corporation
The Open Systems Adapter is the
strategic communications device for the
mainframe architecture.
OSA integrates several hardware
features and supports many
networking transport protocols.
Powerful virtualization capabilities
allow the OSA-Express adapter to
be shared by all LPARs and stacks
on a CEC, providing economical
scalability
• zLinux, z/VM, and z/OS LPARS
can all share an OSA adapter
The OSA-Express adapter includes
the NIC and the network controller
Open Systems Adapter (OSA) background
Protocols supported include
Ethernet and Token Ring
© 2014 IBM Corporation© 2014 IBM Corporation
VNIC
CEC
z/VM LPAR
VNIC VNIC
z/OS Guest Linux Guest
L2
VSwitch
z/OS LPAR
VNIC
Linux LPAR
OSA
Uplink Port
Guest
Port
Guest
Port
Server B
(native)
Server A
(native)
Server E
(simulated)
Server C
(real)
z/OS Guest
Server F
(simulated)
VNIC
Server D
(real)
Linux Guest
PR/SM
If 1 If 1
If A
If A
If A
If A
LAN
z/VM Real Devices z/VM Simulated Devices
VNIC
OSA sharing and connectivity summary
Simulated mode benefits:
Large scalability (1000s of virtual
servers can share an OSA in this
configuration)
Link aggregation (z/VM can make
multiple OSAs appear as a single link to
the guests, simplifying redundancy)
z/VM Connectivity
modes:
Real mode: z/VM
provides direct
access to the OSA
adapter; works like
a native LPAR
Linux OSA drivers are
included in Red Hat
Enterprise Linux and
SUSE Linux Enterprise
Server
Native LPARs
LPAR
OSA adapter
Simulated mode:
z/VM provides a
virtual switch and a
network of virtual
adapters to connect
to an OSA-Express
adapter. (Note that
checksum and
segmentation
offloads are not
supported in
simulated mode).
© 2014 IBM Corporation© 2014 IBM Corporation
OSA Offload capabilities
The OSA-Express adapter is a powerful network controller that can offload many
processing-intensive networking tasks from the stack and the general purpose CPU
Address Resolution Protocol (ARP)
The stack registers its local IP addresses to the OSA adapter and the adapter
responds to ARP requests for those addresses on the stack’s behalf
Key value: If multiple OSAs are attached to the same physical LAN segment and
one fails, the others detect the failure and automatically take over its ARP
responsibilities (seamlessly moving adapter IP addresses from the failed adapter to
the surviving ones!)
Checksum
When enabled, OSA can generate checksums on outgoing packets and validate
them on incoming packets, on behalf of the TCP/IP stack
Key value: reducing CPU cost
Segmentation
When enabled, transfers the overhead of segmenting TCP outbound data into
individual IP packets to the OSA-Express device.
Key value: significantly reduces CPU cost of TCP streaming (e.g., FTP)
Multiple Queues (z/OS only): OSA adapters can be configured pre-sort different types of
inbound traffic onto separate I/O queues to keep incompatible types of traffic (e.g., bulk
data and encrypted packets) apart. Key value: makes z/OS processing more efficient
© 2014 IBM Corporation© 2014 IBM Corporation
zOSPG0550
HTTP
server
or
caching
proxy
server
Firewall FirewallAppli-
cation
Server
Data
Server
HTTP/DMZ Zone Application Zone Data Zone
IDS IDS
OSA-E
Tier-1 Tier-2 Tier-3
z/OS z/OS
zSeries
zSeries
Linuxz/OS z/VM
z/OS
z/OS
HiperSockets
Hipersockets provides IP networking among
virtual servers within a zSeries CEC
Up to 16 internal IP networks that
interconnect z/OS, Linux on zSeries,
VSE/ESA, and z/VM including z/VM guest
operating systems
Improved response time due to very low
latency
Highly secure (no external cables to tap into)
Highly available
Cost savings (no external switch equipment
needed)
Flexible
Simple to install, operate, maintain
System z HiperSockets – The IP network within the box
HiperSockets on
zSeries allows
operating system
images on the
same processor
complex to
exchange IP traffic
virtually at
memory speed.
A Hipersockets network
looks like an internal
LAN
© 2014 IBM Corporation© 2014 IBM Corporation
Shared Memory communications over RDMA (SMC-R)
Shared Memory Communications over RDMA (SMC-R) is a protocol
that allows TCP sockets applications to transparently and
autonomically exploit RDMA over your datacenter Ethernet network
using RoCE.
SMC-R is a “hybrid” solution that:
– Uses TCP connection to establish SMC-R connection
– Each TCP end point exchanges TCP options to dynamically learn
whether the connection is eligible for the SMC-R protocol
• If eligible, RDMA attributes are then exchanged within the TCP data stream
– Socket application data is exchanged via RDMA write operations
– TCP connection remains active and controls SMC-R connection
– This model preserves many critical operational and network
management features of TCP/IP with minimal IP admin changes
• Resilience/failover
• Load balancing
• Connection based security (IP filters, policy, VLAN, SSL)
© 2014 IBM Corporation© 2014 IBM Corporation
SMC-R and 10GbE RoCE Express Requirements
Operating system requirements
– Requires z/OS 2.1 (GA 9/30/13) which supports the SMC-
R protocol
Server requirements
– Exclusive to zEC12 (with Driver 15E) and zBC12
– New 10 GbE RoCE Express feature for PCIe I/O drawer
(FC#0411)
Single port enabled for use by SMC-R
Each feature must be dedicated to one LPAR
– Recommended minimum configuration two features per LPAR
for redundancy
Up to 16 features supported
– OSA Express – either 1 GbE or 10 GbE
Configured in QDIO mode (OSD CHPIDs only, not OSX)
Does not need to be dedicated to the LPAR
– Standard 10GbE Switch or point to point configuration
supported
Does not need to be CEE capable
Switch must support and have enabled Global pause
frame (a standard Ethernet switch feature for Ethernet
flow control described in the IEEE 802.3x standard)
© 2014 IBM Corporation© 2014 IBM Corporation
Use cases for SMC-R and 10GbE RoCE Express for z/OS to
z/OS communications
Use Cases
Application servers such as the z/OS WebSphere Application Server communicating (via TCP
based communications) with CICS, IMS or DB2 – particularly when the application is network
intensive and transaction oriented
Transactional workloads that exchange larger messages (e.g. web services such as WAS to DB2
or CICS) will see benefit.
Streaming (or bulk) application workloads (e.g. FTP) communicating z/OS to z/OS TCP will see
improvements in both CPU and throughput
Applications that use z/OS to z/OS TCP based communications using Sysplex Distributor
Plus … Transparent to application software – no changes required!
© 2014 IBM Corporation© 2014 IBM Corporation
Up to 50% CPU savings for FTP
binary file transfers across z/OS
systems when using SMC-R vs
standard TCP/IP **
40% reduction in overall
transaction response time for
WebSphere Application Server v8.5
Liberty profile TradeLite workload
accessing z/OS DB2 in another
system measured in internal
benchmarks *
SMC-Rz/OS SYSA z/OS SYSB
RoCE
WAS
Liberty
TradeLite
DB2
JDBC/DRDA
Linux on x
Workload Client
Simulator
(JIBE)
HTTP/REST
TCP/IP
WebSphere to DB2 communications using SMC-R
SMC-Rz/OS
SYSA
z/OS
SYSB
RoCE
FTP Client FTP Server
FTP
File Transfers (FTP) using SMC-R
Performance impact of SMC-R on real z/OS workloads
* Based on projections and measurements completed in a controlled environment. Results may vary by customer based on individual workload, configuration and software levels.
** Based on internal IBM benchmarks in a controlled environment using z/OS V2R1 Communications Server FTP client and FTP server, transferring a 1.2GB binary file using SMC-R
(10GbE RoCE Express feature) vs standard TCP/IP (10GbE OSA Express4 feature). The actual CPU savings any user will experience may vary.
© 2014 IBM Corporation© 2014 IBM Corporation
Up to 48% reduction in response time and
up to 10% CPU savings for CICS
transactions using DPL (Distributed Program
Link) to invoke programs in remote CICS
regions in another z/OS system via CICS IP
interconnectivity (IPIC) when using SMC-R
vs standard TCP/IP *
SMC-Rz/OS
SYSA
z/OS
SYSB
RoCE
CICS A
DPL calls
CICS B
Program X
IPIC
CICS to CICS IP Intercommunications (IPIC) using SMC-R
Performance impact of SMC-R on real z/OS workloads (cont)
WebSphere MQ for z/OS realizes up to
200% increase in messages per second
it can deliver across z/OS systems when
using SMC-R vs standard TCP/IP ****
SMC-Rz/OS
SYSA
z/OS
SYSB
RoCE
WebSphere
MQ
WebSphere
MQ
MQ messages
WebSphere MQ for z/OS using SMC-R
* Based on internal IBM benchmarks using a modeled CICS workload driving a CICS transaction that performs 5 DPL (Distributed Program Link) calls to a CICS region on a remote z/OS system
via CICS IP interconnectivity (IPIC), using 32K input/output containers. Response times and CPU savings measured on z/OS system initiating the DPL calls. The actual response times and CPU
savings any user will experience will vary.
** Based on internal IBM benchmarks using a modeled WebSphere MQ for z/OS workload driving non-persistent messages across z/OS systems in a request/response pattern. The benchmarks
included various data sizes and number of channel pairs The actual throughput and CPU savings users will experience may vary based on the user workload and configuration.
© 2014 IBM Corporation© 2014 IBM Corporation
The hybrid nature of SMC-R
(beginning with TCP/IP, then
switching to SMC-R) allows all
existing IP and TCP layer security
features to automatically apply for
SMC-R connections
• Without requiring any
changes from a customer
perspective
• And without requiring these
functions to be retrofitted into
a new protocol
Note: IPSec tunnels are not
supported with SMC-R. When IPSec
is enabled for a TCP connection then
z/OS will automatically opt out of
using SMC-R
Connection level security
(SSL, TLS, AT-TLS)
IP Filters, Traffic
regulation, IDS
SAF based network
resource controls (e.g.
NETACCESS,
STACKACCESS, etc.)
Auditing based on IP
addresses/ports (e.g.
based on SMF records)
etc.
SMC-R preserves existing security model
Note: Security functions which require TCP packet inspection or modification are not supported because RDMA
replaces TCP packets. These include: IPSec tunnels, filters that deny packets during an active connection, or
methods that require packet tagging such as MLS.
z/OS will automatically opt out of using SMC-R for TCP connections that require these security types.
© 2014 IBM Corporation© 2014 IBM Corporation
SMC-R roadmap
First platform to support SMC-R is z/OS V2R1 (GA 9/30/13)
– z/OS to z/OS communications within the datacenter
IBM intends for SMC-R to be an open, pervasive protocol
– To allow RDMA communication between any closely coupled enterprise platforms
• E.g., zLinux, Linux on other platforms, etc. IBM intends to work with the Linux
community to distribute SMC-R on Linux
– Specification is published to the IETF to enable pervasiveness
• http://tools.ietf.org/html/draft-fox-tcpm-shared-memory-rdma-02
Future considerations:
– Virtualization support for the RoCE Express feature
– z/VM guest support for PCIe devices (statement of direction issued)
• RoCE Express feature is a PCIe device
© 2014 IBM Corporation© 2014 IBM Corporation
Summary: TCP/IP Data Link Controls
Discussed previously:
MPCIPA - to other TCP/IP hosts via QDIO or HiperSockets
HiperSockets -- to other TCP/IP (z/OS, Linux, and/or VM) hosts on the
same zSeries CEC
RoCE – RDMA to other TCP/IP hosts using SMC-R
Others:
CTC - channel to another IBM zSeries
MPCPTP - to another zSeries via channel or XCF, to another stack, or
to routers/R6K via channel
LCS - to other TCP/IP hosts via 3172, 8232, router, OSA, etc.
SAMEHOST - to other address spaces or stacks in same LPAR
Also: CDLC, CLAW, HYPERCHANNEL, MPCOSA (legacy, not
recommended)
© 2014 IBM Corporation© 2014 IBM Corporation
SNA Data Link Controls
CDLC
To 3745/3746 or 3x74 via channel
LSA
To 3172 or router via channel
To LAN via OSA2 or OSA-Express (non-QDIO mode)
CTC
To another VTAM via channel using subarea protocols
Subarea MPC
To another VTAM via multiple subchannels using subarea protocols
MPC
To another VTAM or router via channel (APPN)
MPC+
To another VTAM via channel or XCF (HPR) or to a router via channel –
uses CSM
EE LDLC
To Enterprise Extender partner (using IP network)
© 2014 IBM Corporation© 2014 IBM Corporation
Communications Server
Clustering Technologies
© 2014 IBM Corporation© 2014 IBM Corporation
1
12
2
3
4
5
6
7
8
9
10
11
1
12
2
3
4
5
6
7
8
9
10
11
SwitchSwitch
I want to use
Application A
and its data, but
I do not care
where it is in
this Sysplex!
Application
A
CEC-1
Application
A
CEC-2OS and
middle-
ware infra-
structure
supporting
data
sharing
OS and
middle-
ware infra-
structure
supporting
data
sharing
A tightly coupled cluster of
z/OS systems that
cooperate to provide a
single system image to the
wider network
Cross-system
coupling facility
(XCF)
z/OS systems in a parallel
sysplex are independent
instances that cooperate using
the Cross-System Coupling
Facility (XCF)
Basic definition of a parallel sysplex
© 2014 IBM Corporation© 2014 IBM Corporation
Sysplex Workload Distribution and Load Balancing
Sysplex Distributor manages load balancing and
distribution within a sysplex
Performance
Workload management across a cluster of server
instances
One server instance on one hardware node may not
be sufficient to handle all the workload
Availability
As long as one server instance is up-and-running, the
“service” is available
Individual server instances and associated hardware
components may fail without impacting overall
availability
Capacity management / horizontal growth
Transparently add/remove server instances and/or
hardware nodes to/from the pool of servers in the
cluster
Single System Image
Give users one target hostname to direct requests to
Number of and location of server instances is
transparent to the user
Server
Server
Server
Server
Sysplex
Distibutor
All server instances must be able
to provide the same basic service.
In a z/OS Sysplex that means the
applications must be Sysplex-
enabled and be able to share data
across all LPARs in the Sysplex.
In order for the load balancing decision maker
to meet those objectives, it must be capable of
obtaining feedback dynamically, such as server
instance availability, capacity, performance,
and overall health.
Feedback
loop
Server Cluster
Data
Data
Mirroring w.
HyperSwap
Coupling
Facility
© 2014 IBM Corporation© 2014 IBM Corporation
TN3270e
Server
VIPA#1
CICS Appl-A
VIPA#2
FTP
Services
VIPA#3
DB2
subsystem
VIPA#4
OSA OSAOSA
CICS Appl-B
VIPA#5
Web Services
VIPA#6
IP#10 IP#11 IP#12
Connect to
VIPA#1
Connect to CICS-Appl-
A.xyz.com
My z/OS IP host
Resolve CICS-Appl-
A.xyz.com
Use IP address VIPA#2
Name
server
A VIPA is an IP
address that is not
tied to a specific
physical interface
and instead
represents a higher
level concept such as
a host, an
application, or a load
balancer.
VIPA#7
Virtual IP Address (VIPA) definition
© 2014 IBM Corporation© 2014 IBM Corporation
Dynamic VIPA Support
VIPAs can survive any outage by moving to another stack
in Sysplex via VIPA Takeover
Another application instance can pick up workload or
Application can be restarted on takeover stack
Connections broken but Reset sent to client upon
takeover
• Significantly reduces down time
Dynamic VIPA Takeback
VIPA moves back to recovered primary owner
• New Connections Handled By Primary Owner again
• Connections Established To Backup are allowed to
continue
Data forwarded from primary owner to backup
• Allows Movement Of Application Server Without
Impacting Existing Workload
Works in conjunction with dynamic routing
OSPF (implemented by the z/OS OMPROUTE daemon)
recommended
Useful for planned outages as well
Operator commands allow you to move Dynamic VIPAs
non-disruptively
Network
COUPLING
FACILITY
VIPA
192.168.253.1
VIPA
192.168.253.2
VIPA
192.168.253.3
VIPA
192.168.253.4 VIPA
192.168.253.5
VIPA
192.168.253.6
192.168.253.4
Cached IP
address
1 2
Dynamic VIPA movement – stack managed DVIPAs
© 2014 IBM Corporation© 2014 IBM Corporation
A Distributed Dynamic VIPA represents a Sysplex
Distributor and the servers it manages
Only the distributor node advertises the
address
Back-end servers use the address as well but
do not advertise it to the network
Clients connect to the distributor using the
distributed DVIPA address and the distributor
forwards the connection to the appropriate
back-end server.
In this manner, distributed dynamic VIPA provides
the single system image for the entire cluster
managed by the Sysplex Distributor!
Network
Coupling
Facility and
z/OS
Worklod
Manager
192.168.1.1
(SD DVIPA)
(192.168.1.1) (192.168.1.1) (192.168.1.1)
(192.168.1.1)
(192.168.1.1)
Connect to
192.168.1.1 (Sysplex
Distributor’s distributed
dynamic VIPA
address)
1
2
3
Distributed Dynamic VIPA
© 2014 IBM Corporation© 2014 IBM Corporation
Communications Server
Security Technologies
© 2014 IBM Corporation© 2014 IBM Corporation
Roles and Objectives: Communications Server security technologies
IP Filtering
IPSec
IP Filtering
IDS
IDS
AT-TLS
SAF protection
Native
SSL / TLS
Kerberos
SAF protection
Application specific
IP Networking layer
TCP/UDP transport layer
API layer
Application layer
IP filters specify traffic that requires
IPsec protection.
IP filtering blocks out all IP traffic that
this systems doesn't specifically
permit. Can be configured or applied
dynamically as “defensive” filters
Intrusion detection services protect
against attacks of various types on the
system's legitimate (open) services. IDS
protection is provided at both the IP and
transport layers.
z/OS CS TCP/IP applications use SAF
to authenticate users and prevent
unauthorized access to datasets, files,
and SERVAUTH protected resources.
The SAF SERVAUTH class is used to
prevent unauthorized user access to
TCP/IP resources (stack, ports, networks).
Protect the system
Examples of application protocols with built-in
security extensions are SNMPv3, DNS, and OSPF.
SSH (not part of z/OS CS) provides an umbrella of
secure applications (secure shell access, secure file
transfer, etc.)
Both Kerberos and SSL/TLS are located as extensions
to the sockets APIs and applications have to be
modified to make use of these security functions. Both
SSL/TLS and Kerberos are connection-based and only
applicable to TCP (stream sockets) applications, not
UDP.
AT-TLS is a TCP/IP stack service that provides
SSL/TLS services at the TCP transport layer and is
transparent to applications.
IPSec resides at the networking layer and is
transparent to upper-layer protocols, including both
transport layer protocol and application protocol.
Protect data in the network
© 2014 IBM Corporation© 2014 IBM Corporation
Policy-based network security on z/OS: Overview
Networking
DLC
Transport
Sockets API
TCP/IP
Application
AT-TLS
IPSecurity
IDS Policy Agent
IDS Policy
IPSecurity
Policy
AT-TLS
Policy
Security policy
administrator
Policy is created through Configuration
Assistant for z/OS Communications
Server
– GUI-based tool
– Configures each security discipline (AT-TLS,
IP security and IDS) using consistent model
– Generates and uploads policy files and related
content to z/OS
Policy Agent processes and installs
policies into TCP/IP stack
– Policies are defined per TCP/IP stack
– Separate policies for each discipline
– Policy agent also monitors and manages the
other daemons and processes needed to
enforce the policies (IKED, syslogd, trmd, etc.)
Provides network security without
requiring changes to your applications
– Security policies are enforced by TCP/IP stack
– Different security disciplines are enforced
independent of each other
© 2014 IBM Corporation© 2014 IBM Corporation
Policy-based network security on z/OS: Configuration Assistant
z/OSMF-based web interface
Configures all policy
disciplines
Separate perspectives but
consistent model for each
discipline
Supports import of existing
policy files
Supports current z/OS release
plus past two
Actively imports certain
configuration information
Focus on concepts, not details
– what traffic to protect
– how to protect it
– De-emphasize low-level details
(though they are accessible
through advanced panels)
Builds and maintains
– Policy files
– Related configuration files
– JCL procs and RACF directives
© 2014 IBM Corporation© 2014 IBM Corporation
DataPower
DataPower appliances integrate with z/OS security
z/OS Network Security Server (NSS) enables both logical and physical
integration between DataPower and z/OS security.
DataPower accesses centralized SAF services via z/OS NSS for:
– SAF access service: Provides SAF-based authentication (of DP users) and
access control (of DP resources) with SMF auditing
– Certificate service: Provides retrieval of RSA certificates from a SAF keyring
– Private key service provides:
• Private RSA key retrieval (clear key only)
• RSA signature and decryption operations (secure key only)
z/OS security administered through z/OS facilities like RACF (SAF), ICSF
DataPower
NSS Client
infrastructure
NSS Server
RACF
RACF Profiles
z/OSWeb
Services
request
DataPower
SMF
SMF
Audit
RecordsXML and Web
Services
processing
SAF request
NSS client
Secured TCP
Connections
Private Key
Service
SAF Access
Service
Certificate
Service
XMLAppliance
Discipline
RACF
Keyring
ICSF
DataPower
Appliance
(logical
integration)
DataPower
XI50z
Integrated
Blade
(physical
integration)
WebSphere DataPower Appliances
–Advanced WebServices operations
–Message format transformation for traditional z/OS applications
–Offload XML and WebServices security
© 2014 IBM Corporation© 2014 IBM Corporation
Transport Layer Security (TLS) overview
Traditionally a socket layer service
TCP only
– Requires reliable transport
Application-to-application protection
Partner authentication via digital
certificates
Data protection using “cipher suites”
that combine data authentication,
integrity and encryption algorithms.
z/OS implementations:
– System SSL (part of z/OS
Cryptographic Services) for use
with C and C++ applications
– Java Secure Sockets Extension
(JSSE)
Source code changes are
required to use either of these
Networking
IPv4, IPv6
DLC
Transport
TCP,UDP,RAW
Sockets API
TCP/IP
Application
Networking
IPv4, IPv6
DLC
Transport
TCP,UDP,RAW
Sockets API
TCP/IP
Application
IP networkIP network
SSL/TLS
Security
Per connection
© 2014 IBM Corporation© 2014 IBM Corporation
New in
V2R1 encrypted
Application Transparent TLS on z/OS overview
Basic TCP/IP stack-based SSL/TLS
– SSL/TLS process performed at TCP layer (via
System SSL) without requiring any application
change (transparent)
– AT-TLS policy specifies which TCP traffic is to be
SSL/TLS protected based on a variety of criteria
Application transparency
– Can be fully transparent to application
– Application has option to inspect or control certain
aspects of ATTLS processing – “application-aware”
and “application-controlled” ATTLS, respectively
Available to TCP applications
– Includes CICS Sockets
– All programming languages except PASCAL
supported
Supports standard configurations
– z/OS as a client and server
– Supports both server and client authentication
– Supports SSLv2, v3, TLSv1.0, v1.1, v1.2
Uses System SSL for SSL/TLS protocol processing
– Remote endpoint sees an RFC-compliant
implementation
– Interoperates with other compliant implementations
Networking
IPv4, IPv6
DLC
Transport (TCP)
Sockets API
TCP/IP
Application
AT-TLS
AT-TLS
policy
Optional
APIs for
applications
to inspect or
control
aspects of
TLS session.
AT-TLS
policy
administrator
Enabling most z/OS TCP-
based applications for use of
SSL/TLS without requiring
any modifications to those
applications on z/OS.
Enabling most z/OS TCP-
based applications for use of
SSL/TLS without requiring
any modifications to those
applications on z/OS.
System SSL
• Local address, port
• Remote address, port
• Connection direction
• z/OS userid, jobname
• Time, day, week, month
© 2014 IBM Corporation© 2014 IBM Corporation
Some z/OS applications that use AT-TLS
Communications Server applications
– TN3270 server
– FTP client and server
– CSSMTP
– Load Balancing Advisor
– IKED NSS client
– NSS server
– Policy Agent
DB2 DRDA
IMS Connect
JES2 NJE
Tivoli NetView applications
– MultiSystem Manager
– NetView Management Console
RACF Remote Sharing Facility
CICS Sockets applications
3rd party applications
Customer applications
© 2014 IBM Corporation© 2014 IBM Corporation
Advantages of using AT-TLS on z/OS
• Reduce costs
– Application development
• Cost of System SSL integration
• Cost of application’s TLS-related configuration support
– Consistent TLS administration across z/OS applications
– Gain access to new features with little or no incremental
development cost
• Ongoing performance improvements
Focus on efficiency in use of System SSL
• Great choice if you haven’t already invested in System SSL integration
Even if you have, consider the long-term cost of keeping up vs. short term
cost of conversion
• Complete and up-to-date exploitation of System SSL features
– AT-TLS makes the vast majority of System SSL features
available to applications – V2R1 is a perfect example!
– AT-TLS keeps up with System SSL enhancements – as new
features are added, your applications can use them by changing
AT-TLS policy, not code
© 2014 IBM Corporation© 2014 IBM Corporation
IDS: Protecting against intentional and unintentional
attacks on your system
Intrusion Detection and
Prevention
Packet filtering
Enterprise network
or intranet
Enterprise network
or intranet
Public network or
Internet
Public network or
Internet
Zombie
attacker
Internal
end-user
attacker
External
attacker
Company Firewall
What is an intrusion?
– Information Gathering
• Network and system topology
• Data location and contents
– Eavesdropping/Impersonation/Theft
• On the network/on the host
• Base for further attacks on others
through Amplifiers, Robots, or Zombies
– Denial of Service - Attack on availability
• Single packet attacks - exploits system or
application vulnerability
• Multi-packet attacks - floods systems to
exclude useful work
Attacks can occur from Internet or intranet
– Company firewalls and intrusion prevention
appliances can provide some level of
protection from Internet
– Perimeter security strategy alone usually not
sufficient.
• Some access is permitted from Internet –
typically into a Demilitarized Zone (DMZ)
• Trust of intranet
Attacks can be intentional (malicious) but
often occur as a result of errors on nodes in
the network (config, application, etc.)
© 2014 IBM Corporation© 2014 IBM Corporation
IDS: z/OS Communications Server IDS features
z/OS in-context IDS broadens overall intrusion detection coverage, complements network-based IDS:
“In-context” because z/OS is the communications end point, not an intermediary
Ability to evaluate inbound encrypted data - IDS applied after decryption on the target system
Avoids overhead of per packet evaluation against table of known attacks - IDS policy checked after attack
probe fires
Detects statistical anomalies realtime - target system has stateful data / internal thresholds that generally are
unavailable to external IDSs
Policy can control prevention methods on the target, such as connection limiting and packet discard
Defensive actions
• Packet discard
• Limit connections
• Drop connections (V1R13)
Reporting
• Logging
• Console messages
• IDS packet trace
• Notifications to external
event managers (like Tivoli
NetView)
IDS Events
Scans – attempts by remote nodes to discover
information about the z/OS system
Attacks – numerous types
• Malformed packets
• IP option and IP protocol restrictions
• Specific usage ICMP
• Interface and TCP SYN floods
• and so forth… including several new attack types
added to V1R13
Traffic Regulation
– TCP - limits the number of connections any
given client can establish
– UDP – limits the length of data on UDP
queues by port
© 2014 IBM Corporation© 2014 IBM Corporation
For More Information....
URL Content
http://www.ibm.com/systems/z/ IBM System z
http://www.ibm.com/systems/z/hardware/networking/index.html IBM System z Networking
http://www.ibm.com/software/network/commserver/zos/
http://www.ibm.com/software/network/commserver/z_lin/
http://www.ibm.com/software/network/ccl/
http://www.ibm.com/software/network/commserver/library
http://www.redbooks.ibm.com
http://www.ibm.com/software/network/commserver/support
http://www.ibm.com/support/techdocs/
http://www.rfc-editor.org/rfcsearch.html
IBM z/OS Communications Server
IBM Communications Server for Linux on zSeries
IBM Communication Controller for Linux on System z
IBM Communications Server Library - white papers,
product documentation, etc.
IBM Redbooks
IBM Communications Server Technical Support
Technical Support Documentation (techdocs, flashes,
presentations, white papers, etc.)
Request For Comments (RFCs)
IBM Education Assistanthttp://publib.boulder.ibm.com/infocenter/ieduasst/stgv1r0/index.jsp
http://www.twitter.com/IBM_Commserver IBM Communications Server Twitter Feed
IBM Communications Server Facebook Fan Pagehttp://www.facebook.com/IBMCommserver
© 2013 IBM Corporation73

Más contenido relacionado

La actualidad más candente

z/OS Communications Server: z/OS Resolver
z/OS Communications Server: z/OS Resolverz/OS Communications Server: z/OS Resolver
z/OS Communications Server: z/OS ResolverzOSCommserver
 
Introduction to IBM Shared Memory Communications Version 2 (SMCv2) and SMC-Dv2
Introduction to IBM Shared Memory Communications Version 2 (SMCv2) and SMC-Dv2Introduction to IBM Shared Memory Communications Version 2 (SMCv2) and SMC-Dv2
Introduction to IBM Shared Memory Communications Version 2 (SMCv2) and SMC-Dv2zOSCommserver
 
Upgrade to IBM z/OS V2.5 Planning
Upgrade to IBM z/OS V2.5 PlanningUpgrade to IBM z/OS V2.5 Planning
Upgrade to IBM z/OS V2.5 PlanningMarna Walle
 
Upgrade to IBM z/OS V2.4 technical actions
Upgrade to IBM z/OS V2.4 technical actionsUpgrade to IBM z/OS V2.4 technical actions
Upgrade to IBM z/OS V2.4 technical actionsMarna Walle
 
Introduction of ISPF
Introduction of ISPFIntroduction of ISPF
Introduction of ISPFAnil Bharti
 
Z OS IBM Utilities
Z OS IBM UtilitiesZ OS IBM Utilities
Z OS IBM Utilitieskapa rohit
 
z16 zOS Support - March 2023 - SHARE in Atlanta.pdf
z16 zOS Support - March 2023 - SHARE in Atlanta.pdfz16 zOS Support - March 2023 - SHARE in Atlanta.pdf
z16 zOS Support - March 2023 - SHARE in Atlanta.pdfMarna Walle
 
DB2 for z/OS Real Storage Monitoring, Control and Planning
DB2 for z/OS Real Storage Monitoring, Control and PlanningDB2 for z/OS Real Storage Monitoring, Control and Planning
DB2 for z/OS Real Storage Monitoring, Control and PlanningJohn Campbell
 
Parallel Sysplex Implement2
Parallel Sysplex Implement2Parallel Sysplex Implement2
Parallel Sysplex Implement2ggddggddggdd
 
JCL MAINFRAMES
JCL MAINFRAMESJCL MAINFRAMES
JCL MAINFRAMESkamaljune
 
Upgrade to IBM z/OS V2.5 technical actions
Upgrade to IBM z/OS V2.5 technical actionsUpgrade to IBM z/OS V2.5 technical actions
Upgrade to IBM z/OS V2.5 technical actionsMarna Walle
 
Presentation db2 connections to db2 for z os
Presentation   db2 connections to db2 for z osPresentation   db2 connections to db2 for z os
Presentation db2 connections to db2 for z osxKinAnx
 
Vsam interview questions and answers.
Vsam interview questions and answers.Vsam interview questions and answers.
Vsam interview questions and answers.Sweta Singh
 
Upgrade to IBM z/OS V2.4 planning
Upgrade to IBM z/OS V2.4 planningUpgrade to IBM z/OS V2.4 planning
Upgrade to IBM z/OS V2.4 planningMarna Walle
 
Z4R: Intro to Storage and DFSMS for z/OS
Z4R: Intro to Storage and DFSMS for z/OSZ4R: Intro to Storage and DFSMS for z/OS
Z4R: Intro to Storage and DFSMS for z/OSTony Pearson
 
ALL ABOUT DB2 DSNZPARM
ALL ABOUT DB2 DSNZPARMALL ABOUT DB2 DSNZPARM
ALL ABOUT DB2 DSNZPARMIBM
 

La actualidad más candente (20)

z/OS Communications Server: z/OS Resolver
z/OS Communications Server: z/OS Resolverz/OS Communications Server: z/OS Resolver
z/OS Communications Server: z/OS Resolver
 
Introduction to IBM Shared Memory Communications Version 2 (SMCv2) and SMC-Dv2
Introduction to IBM Shared Memory Communications Version 2 (SMCv2) and SMC-Dv2Introduction to IBM Shared Memory Communications Version 2 (SMCv2) and SMC-Dv2
Introduction to IBM Shared Memory Communications Version 2 (SMCv2) and SMC-Dv2
 
Upgrade to IBM z/OS V2.5 Planning
Upgrade to IBM z/OS V2.5 PlanningUpgrade to IBM z/OS V2.5 Planning
Upgrade to IBM z/OS V2.5 Planning
 
Upgrade to IBM z/OS V2.4 technical actions
Upgrade to IBM z/OS V2.4 technical actionsUpgrade to IBM z/OS V2.4 technical actions
Upgrade to IBM z/OS V2.4 technical actions
 
Introduction of ISPF
Introduction of ISPFIntroduction of ISPF
Introduction of ISPF
 
Mvs commands
Mvs commandsMvs commands
Mvs commands
 
Z OS IBM Utilities
Z OS IBM UtilitiesZ OS IBM Utilities
Z OS IBM Utilities
 
z16 zOS Support - March 2023 - SHARE in Atlanta.pdf
z16 zOS Support - March 2023 - SHARE in Atlanta.pdfz16 zOS Support - March 2023 - SHARE in Atlanta.pdf
z16 zOS Support - March 2023 - SHARE in Atlanta.pdf
 
Networking on z/OS
Networking on z/OSNetworking on z/OS
Networking on z/OS
 
DB2 for z/OS Real Storage Monitoring, Control and Planning
DB2 for z/OS Real Storage Monitoring, Control and PlanningDB2 for z/OS Real Storage Monitoring, Control and Planning
DB2 for z/OS Real Storage Monitoring, Control and Planning
 
Parallel Sysplex Implement2
Parallel Sysplex Implement2Parallel Sysplex Implement2
Parallel Sysplex Implement2
 
JCL MAINFRAMES
JCL MAINFRAMESJCL MAINFRAMES
JCL MAINFRAMES
 
Upgrade to IBM z/OS V2.5 technical actions
Upgrade to IBM z/OS V2.5 technical actionsUpgrade to IBM z/OS V2.5 technical actions
Upgrade to IBM z/OS V2.5 technical actions
 
Presentation db2 connections to db2 for z os
Presentation   db2 connections to db2 for z osPresentation   db2 connections to db2 for z os
Presentation db2 connections to db2 for z os
 
Vsam interview questions and answers.
Vsam interview questions and answers.Vsam interview questions and answers.
Vsam interview questions and answers.
 
Upgrade to IBM z/OS V2.4 planning
Upgrade to IBM z/OS V2.4 planningUpgrade to IBM z/OS V2.4 planning
Upgrade to IBM z/OS V2.4 planning
 
Smpe
SmpeSmpe
Smpe
 
Z4R: Intro to Storage and DFSMS for z/OS
Z4R: Intro to Storage and DFSMS for z/OSZ4R: Intro to Storage and DFSMS for z/OS
Z4R: Intro to Storage and DFSMS for z/OS
 
Sqa esqa-shortage
Sqa esqa-shortageSqa esqa-shortage
Sqa esqa-shortage
 
ALL ABOUT DB2 DSNZPARM
ALL ABOUT DB2 DSNZPARMALL ABOUT DB2 DSNZPARM
ALL ABOUT DB2 DSNZPARM
 

Destacado

Motivations and Considerations for Migrating from SMTPD/Sendmail to CSSMTP
Motivations and Considerations for Migrating from SMTPD/Sendmail to CSSMTPMotivations and Considerations for Migrating from SMTPD/Sendmail to CSSMTP
Motivations and Considerations for Migrating from SMTPD/Sendmail to CSSMTPzOSCommserver
 
Shared Memory Communications-Direct Memory Access (SMC-D) Overview
Shared Memory Communications-Direct Memory Access (SMC-D) OverviewShared Memory Communications-Direct Memory Access (SMC-D) Overview
Shared Memory Communications-Direct Memory Access (SMC-D) OverviewzOSCommserver
 
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesThe Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesNRB
 
What is different about the ibm mainframe
What is different about the ibm mainframeWhat is different about the ibm mainframe
What is different about the ibm mainframeJim Porell
 
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...IBM Security
 
yaSSL 2010-2011 Technical and Community Update
yaSSL 2010-2011 Technical and Community UpdateyaSSL 2010-2011 Technical and Community Update
yaSSL 2010-2011 Technical and Community UpdatewolfSSL
 
Securing memcache
Securing memcacheSecuring memcache
Securing memcachewolfSSL
 
Kerberos + Android: A Tale of Opportunity
Kerberos + Android: A Tale of OpportunityKerberos + Android: A Tale of Opportunity
Kerberos + Android: A Tale of OpportunitywolfSSL
 
Securing Data in Transit -
Securing Data in Transit - Securing Data in Transit -
Securing Data in Transit - wolfSSL
 
Introduction to Total Library Solution- TLS
Introduction to Total Library Solution- TLSIntroduction to Total Library Solution- TLS
Introduction to Total Library Solution- TLSAta Rehman
 
Securing MySQL with a Focus on SSL
Securing MySQL with a Focus on SSLSecuring MySQL with a Focus on SSL
Securing MySQL with a Focus on SSLwolfSSL
 
wolfSSL Year In Review, 2013
wolfSSL Year In Review, 2013wolfSSL Year In Review, 2013
wolfSSL Year In Review, 2013wolfSSL
 
Sysplex in a Nutshell
Sysplex in a NutshellSysplex in a Nutshell
Sysplex in a NutshellzOSCommserver
 
So you want to retire in florida 1997 far
So you want to retire in florida 1997 farSo you want to retire in florida 1997 far
So you want to retire in florida 1997 farJames Lavigne
 
z/OS Through V2R1Communications Server Performance Functions Update
z/OS Through V2R1Communications Server Performance Functions Updatez/OS Through V2R1Communications Server Performance Functions Update
z/OS Through V2R1Communications Server Performance Functions UpdatezOSCommserver
 
Pengenalan Pillow Lava di Berbah,Sleman,Yogyakarta
Pengenalan Pillow Lava di Berbah,Sleman,YogyakartaPengenalan Pillow Lava di Berbah,Sleman,Yogyakarta
Pengenalan Pillow Lava di Berbah,Sleman,YogyakartaNicholas Vincento
 
Investor alert—investment scams exploit immigrant investor program
Investor alert—investment scams exploit immigrant investor programInvestor alert—investment scams exploit immigrant investor program
Investor alert—investment scams exploit immigrant investor programJames Lavigne
 
Marvella city a complete township in haridwar
Marvella city a complete township in haridwarMarvella city a complete township in haridwar
Marvella city a complete township in haridwarMarvella city
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentationmkajiwara1
 

Destacado (20)

Motivations and Considerations for Migrating from SMTPD/Sendmail to CSSMTP
Motivations and Considerations for Migrating from SMTPD/Sendmail to CSSMTPMotivations and Considerations for Migrating from SMTPD/Sendmail to CSSMTP
Motivations and Considerations for Migrating from SMTPD/Sendmail to CSSMTP
 
Shared Memory Communications-Direct Memory Access (SMC-D) Overview
Shared Memory Communications-Direct Memory Access (SMC-D) OverviewShared Memory Communications-Direct Memory Access (SMC-D) Overview
Shared Memory Communications-Direct Memory Access (SMC-D) Overview
 
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesThe Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
 
What is different about the ibm mainframe
What is different about the ibm mainframeWhat is different about the ibm mainframe
What is different about the ibm mainframe
 
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
 
Mitigate attacks with IBM BigFix and Q-Radar
Mitigate attacks with IBM BigFix and Q-RadarMitigate attacks with IBM BigFix and Q-Radar
Mitigate attacks with IBM BigFix and Q-Radar
 
yaSSL 2010-2011 Technical and Community Update
yaSSL 2010-2011 Technical and Community UpdateyaSSL 2010-2011 Technical and Community Update
yaSSL 2010-2011 Technical and Community Update
 
Securing memcache
Securing memcacheSecuring memcache
Securing memcache
 
Kerberos + Android: A Tale of Opportunity
Kerberos + Android: A Tale of OpportunityKerberos + Android: A Tale of Opportunity
Kerberos + Android: A Tale of Opportunity
 
Securing Data in Transit -
Securing Data in Transit - Securing Data in Transit -
Securing Data in Transit -
 
Introduction to Total Library Solution- TLS
Introduction to Total Library Solution- TLSIntroduction to Total Library Solution- TLS
Introduction to Total Library Solution- TLS
 
Securing MySQL with a Focus on SSL
Securing MySQL with a Focus on SSLSecuring MySQL with a Focus on SSL
Securing MySQL with a Focus on SSL
 
wolfSSL Year In Review, 2013
wolfSSL Year In Review, 2013wolfSSL Year In Review, 2013
wolfSSL Year In Review, 2013
 
Sysplex in a Nutshell
Sysplex in a NutshellSysplex in a Nutshell
Sysplex in a Nutshell
 
So you want to retire in florida 1997 far
So you want to retire in florida 1997 farSo you want to retire in florida 1997 far
So you want to retire in florida 1997 far
 
z/OS Through V2R1Communications Server Performance Functions Update
z/OS Through V2R1Communications Server Performance Functions Updatez/OS Through V2R1Communications Server Performance Functions Update
z/OS Through V2R1Communications Server Performance Functions Update
 
Pengenalan Pillow Lava di Berbah,Sleman,Yogyakarta
Pengenalan Pillow Lava di Berbah,Sleman,YogyakartaPengenalan Pillow Lava di Berbah,Sleman,Yogyakarta
Pengenalan Pillow Lava di Berbah,Sleman,Yogyakarta
 
Investor alert—investment scams exploit immigrant investor program
Investor alert—investment scams exploit immigrant investor programInvestor alert—investment scams exploit immigrant investor program
Investor alert—investment scams exploit immigrant investor program
 
Marvella city a complete township in haridwar
Marvella city a complete township in haridwarMarvella city a complete township in haridwar
Marvella city a complete township in haridwar
 
Internet safety presentation
Internet safety presentationInternet safety presentation
Internet safety presentation
 

Similar a z/OS Communications Server Overview

OpenStack and z/VM – What is it and how do I get it?
OpenStack and z/VM – What is it and how do I get it?OpenStack and z/VM – What is it and how do I get it?
OpenStack and z/VM – What is it and how do I get it?Anderson Bassani
 
z/VSE - News - Announcements -Trends
z/VSE - News - Announcements -Trendsz/VSE - News - Announcements -Trends
z/VSE - News - Announcements -TrendsIBM
 
2016 02-16-announce-overview-zsp04505 usen
2016 02-16-announce-overview-zsp04505 usen2016 02-16-announce-overview-zsp04505 usen
2016 02-16-announce-overview-zsp04505 usenDavid Morlitz
 
z/OS V2.4 Preview: z/OS Container Extensions - Running Linux on Z docker cont...
z/OS V2.4 Preview: z/OS Container Extensions - Running Linux on Z docker cont...z/OS V2.4 Preview: z/OS Container Extensions - Running Linux on Z docker cont...
z/OS V2.4 Preview: z/OS Container Extensions - Running Linux on Z docker cont...zOSCommserver
 
Linux on Z13 and Simulatenus Multithreading - Sebastien Llaurency
Linux on Z13 and Simulatenus Multithreading - Sebastien LlaurencyLinux on Z13 and Simulatenus Multithreading - Sebastien Llaurency
Linux on Z13 and Simulatenus Multithreading - Sebastien LlaurencyNRB
 
z/VSE Networking Options and News
z/VSE Networking Options and Newsz/VSE Networking Options and News
z/VSE Networking Options and NewsIBM
 
Title News on z/VSE Security, Crypto Support and OpenSSL
Title	News on z/VSE Security, Crypto Support and OpenSSLTitle	News on z/VSE Security, Crypto Support and OpenSSL
Title News on z/VSE Security, Crypto Support and OpenSSLIBM
 
Unisanta - Visão Geral de hardware Servidor IBM System z
Unisanta - Visão Geral de hardware Servidor IBM System zUnisanta - Visão Geral de hardware Servidor IBM System z
Unisanta - Visão Geral de hardware Servidor IBM System zAnderson Bassani
 
z/OS Small Enhancements - Episode 2014B
z/OS Small Enhancements - Episode 2014Bz/OS Small Enhancements - Episode 2014B
z/OS Small Enhancements - Episode 2014BMarna Walle
 
z/OS V2R3 Communications Server Content Preview
z/OS V2R3 Communications Server Content Previewz/OS V2R3 Communications Server Content Preview
z/OS V2R3 Communications Server Content PreviewzOSCommserver
 
z/OS Small Enhancements - Episode 2014A
z/OS Small Enhancements - Episode 2014Az/OS Small Enhancements - Episode 2014A
z/OS Small Enhancements - Episode 2014AMarna Walle
 
MongoDB Linux Porting, Performance Measurements and and Scaling Advantage usi...
MongoDB Linux Porting, Performance Measurements and and Scaling Advantage usi...MongoDB Linux Porting, Performance Measurements and and Scaling Advantage usi...
MongoDB Linux Porting, Performance Measurements and and Scaling Advantage usi...MongoDB
 
CICS TS for z/VSE Update including CICS connectivity options
CICS TS for z/VSE Update including CICS connectivity optionsCICS TS for z/VSE Update including CICS connectivity options
CICS TS for z/VSE Update including CICS connectivity optionsIBM
 
z/VSE Connectors Introduction, Use Cases, and News
z/VSE Connectors Introduction, Use Cases, and Newsz/VSE Connectors Introduction, Use Cases, and News
z/VSE Connectors Introduction, Use Cases, and NewsIBM
 
z/VSE Base Installation - Step by Step
z/VSE Base Installation - Step by Stepz/VSE Base Installation - Step by Step
z/VSE Base Installation - Step by StepIBM
 
Relative Capacity por Eduardo Oliveira e Joseph Temple
Relative Capacity por Eduardo Oliveira e Joseph TempleRelative Capacity por Eduardo Oliveira e Joseph Temple
Relative Capacity por Eduardo Oliveira e Joseph TempleJoao Galdino Mello de Souza
 
z/VSE Service and Support
z/VSE Service and Supportz/VSE Service and Support
z/VSE Service and SupportIBM
 

Similar a z/OS Communications Server Overview (20)

OpenStack and z/VM – What is it and how do I get it?
OpenStack and z/VM – What is it and how do I get it?OpenStack and z/VM – What is it and how do I get it?
OpenStack and z/VM – What is it and how do I get it?
 
z/VSE - News - Announcements -Trends
z/VSE - News - Announcements -Trendsz/VSE - News - Announcements -Trends
z/VSE - News - Announcements -Trends
 
2016 02-16-announce-overview-zsp04505 usen
2016 02-16-announce-overview-zsp04505 usen2016 02-16-announce-overview-zsp04505 usen
2016 02-16-announce-overview-zsp04505 usen
 
z/OS V2.4 Preview: z/OS Container Extensions - Running Linux on Z docker cont...
z/OS V2.4 Preview: z/OS Container Extensions - Running Linux on Z docker cont...z/OS V2.4 Preview: z/OS Container Extensions - Running Linux on Z docker cont...
z/OS V2.4 Preview: z/OS Container Extensions - Running Linux on Z docker cont...
 
Linux on Z13 and Simulatenus Multithreading - Sebastien Llaurency
Linux on Z13 and Simulatenus Multithreading - Sebastien LlaurencyLinux on Z13 and Simulatenus Multithreading - Sebastien Llaurency
Linux on Z13 and Simulatenus Multithreading - Sebastien Llaurency
 
Maximize o valor do z/OS
Maximize o valor do z/OSMaximize o valor do z/OS
Maximize o valor do z/OS
 
z/VSE Networking Options and News
z/VSE Networking Options and Newsz/VSE Networking Options and News
z/VSE Networking Options and News
 
Server pac 101
Server pac 101Server pac 101
Server pac 101
 
Title News on z/VSE Security, Crypto Support and OpenSSL
Title	News on z/VSE Security, Crypto Support and OpenSSLTitle	News on z/VSE Security, Crypto Support and OpenSSL
Title News on z/VSE Security, Crypto Support and OpenSSL
 
Unisanta - Visão Geral de hardware Servidor IBM System z
Unisanta - Visão Geral de hardware Servidor IBM System zUnisanta - Visão Geral de hardware Servidor IBM System z
Unisanta - Visão Geral de hardware Servidor IBM System z
 
z/OS Small Enhancements - Episode 2014B
z/OS Small Enhancements - Episode 2014Bz/OS Small Enhancements - Episode 2014B
z/OS Small Enhancements - Episode 2014B
 
z/OS V2R3 Communications Server Content Preview
z/OS V2R3 Communications Server Content Previewz/OS V2R3 Communications Server Content Preview
z/OS V2R3 Communications Server Content Preview
 
z/OS Small Enhancements - Episode 2014A
z/OS Small Enhancements - Episode 2014Az/OS Small Enhancements - Episode 2014A
z/OS Small Enhancements - Episode 2014A
 
MongoDB Linux Porting, Performance Measurements and and Scaling Advantage usi...
MongoDB Linux Porting, Performance Measurements and and Scaling Advantage usi...MongoDB Linux Porting, Performance Measurements and and Scaling Advantage usi...
MongoDB Linux Porting, Performance Measurements and and Scaling Advantage usi...
 
IBM Wave for z/VM
IBM Wave for z/VMIBM Wave for z/VM
IBM Wave for z/VM
 
CICS TS for z/VSE Update including CICS connectivity options
CICS TS for z/VSE Update including CICS connectivity optionsCICS TS for z/VSE Update including CICS connectivity options
CICS TS for z/VSE Update including CICS connectivity options
 
z/VSE Connectors Introduction, Use Cases, and News
z/VSE Connectors Introduction, Use Cases, and Newsz/VSE Connectors Introduction, Use Cases, and News
z/VSE Connectors Introduction, Use Cases, and News
 
z/VSE Base Installation - Step by Step
z/VSE Base Installation - Step by Stepz/VSE Base Installation - Step by Step
z/VSE Base Installation - Step by Step
 
Relative Capacity por Eduardo Oliveira e Joseph Temple
Relative Capacity por Eduardo Oliveira e Joseph TempleRelative Capacity por Eduardo Oliveira e Joseph Temple
Relative Capacity por Eduardo Oliveira e Joseph Temple
 
z/VSE Service and Support
z/VSE Service and Supportz/VSE Service and Support
z/VSE Service and Support
 

Más de zOSCommserver

z/OS Communications Server Technical Update
z/OS Communications Server Technical Updatez/OS Communications Server Technical Update
z/OS Communications Server Technical UpdatezOSCommserver
 
IBM Configuration Assistant for z/OS Communications Server update
IBM Configuration Assistant for z/OS Communications Server updateIBM Configuration Assistant for z/OS Communications Server update
IBM Configuration Assistant for z/OS Communications Server updatezOSCommserver
 
IBM Design Thinking with z/OS Communications Server
IBM Design Thinking with z/OS Communications ServerIBM Design Thinking with z/OS Communications Server
IBM Design Thinking with z/OS Communications ServerzOSCommserver
 
ISPF Recent and Coming Enhancements
ISPF Recent and Coming EnhancementsISPF Recent and Coming Enhancements
ISPF Recent and Coming EnhancementszOSCommserver
 
CSM Storage Debugging
CSM Storage DebuggingCSM Storage Debugging
CSM Storage DebuggingzOSCommserver
 
Integrated Intrusion Detection Services for z/OS Communications Server
Integrated Intrusion Detection Services for z/OS Communications Server Integrated Intrusion Detection Services for z/OS Communications Server
Integrated Intrusion Detection Services for z/OS Communications Server zOSCommserver
 
Enabling Continuous Availability and Reducing Downtime with IBM Multi-Site Wo...
Enabling Continuous Availability and Reducing Downtime with IBM Multi-Site Wo...Enabling Continuous Availability and Reducing Downtime with IBM Multi-Site Wo...
Enabling Continuous Availability and Reducing Downtime with IBM Multi-Site Wo...zOSCommserver
 

Más de zOSCommserver (7)

z/OS Communications Server Technical Update
z/OS Communications Server Technical Updatez/OS Communications Server Technical Update
z/OS Communications Server Technical Update
 
IBM Configuration Assistant for z/OS Communications Server update
IBM Configuration Assistant for z/OS Communications Server updateIBM Configuration Assistant for z/OS Communications Server update
IBM Configuration Assistant for z/OS Communications Server update
 
IBM Design Thinking with z/OS Communications Server
IBM Design Thinking with z/OS Communications ServerIBM Design Thinking with z/OS Communications Server
IBM Design Thinking with z/OS Communications Server
 
ISPF Recent and Coming Enhancements
ISPF Recent and Coming EnhancementsISPF Recent and Coming Enhancements
ISPF Recent and Coming Enhancements
 
CSM Storage Debugging
CSM Storage DebuggingCSM Storage Debugging
CSM Storage Debugging
 
Integrated Intrusion Detection Services for z/OS Communications Server
Integrated Intrusion Detection Services for z/OS Communications Server Integrated Intrusion Detection Services for z/OS Communications Server
Integrated Intrusion Detection Services for z/OS Communications Server
 
Enabling Continuous Availability and Reducing Downtime with IBM Multi-Site Wo...
Enabling Continuous Availability and Reducing Downtime with IBM Multi-Site Wo...Enabling Continuous Availability and Reducing Downtime with IBM Multi-Site Wo...
Enabling Continuous Availability and Reducing Downtime with IBM Multi-Site Wo...
 

Último

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 

Último (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

z/OS Communications Server Overview

  • 1. © 2014 IBM Corporation z/OS Communication Server Overview Mike Fox, Software Architect IBM Enterprise Networking Solutions mjfox@us.ibm.com
  • 2. © 2014 IBM Corporation© 2014 IBM Corporation Trademarks Notes: Performance is in Internal Throughput Rate (ITR) ratio based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput that any user will experience will vary depending upon considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve throughput improvements equivalent to the performance ratios stated here. IBM hardware products are manufactured from new parts, or new and serviceable used parts. Regardless, our warranty terms apply. All customer examples cited or described in this presentation are presented as illustrations of the manner in which some customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics will vary depending on individual customer configurations and conditions. This publication was produced in the United States. IBM may not offer the products, services or features discussed in this document in other countries, and the information may be subject to change without notice. Consult your local IBM business contact for information on the product or services available in your area. All statements regarding IBM's future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. Information about non-IBM products is obtained from the manufacturers of those products or their published announcements. IBM has not tested those products and cannot confirm the performance, compatibility, or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. Prices subject to change without notice. Contact your IBM representative or Business Partner for the most current pricing in your geography. This information provides only general descriptions of the types and portions of workloads that are eligible for execution on Specialty Engines (e.g, zIIPs, zAAPs, and IFLs) ("SEs"). IBM authorizes customers to use IBM SE only to execute the processing of Eligible Workloads of specific Programs expressly authorized by IBM as specified in the “Authorized Use Table for IBM Machines” provided at www.ibm.com/systems/support/machine_warranties/machine_code/aut.html (“AUT”). No other workload processing is authorized for execution on an SE. IBM offers SE at a lower price than General Processors/Central Processors because customers are authorized to use SEs only to process certain types and/or amounts of workloads as specified by IBM in the AUT. The following are trademarks or registered trademarks of other companies. * Other product and service names might be trademarks of IBM or other companies. The following are trademarks of the International Business Machines Corporation in the United States and/or other countries. * Registered trademarks of IBM Corporation Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. Cell Broadband Engine is a trademark of Sony Computer Entertainment, Inc. in the United States, other countries, or both and is used under license therefrom. Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. IT Infrastructure Library is a registered trademark of the Central Computer and Telecommunications Agency which is now part of the Office of Government Commerce. ITIL is a registered trademark, and a registered community trademark of the Office of Government Commerce, and is registered in the U.S. Patent and Trademark Office. Java and all Java based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates. Linear Tape-Open, LTO, the LTO Logo, Ultrium, and the Ultrium logo are trademarks of HP, IBM Corp. and Quantum in the U.S. and Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. OpenStack is a trademark of OpenStack LLC. The OpenStack trademark policy is available on the OpenStack website. TEALEAF is a registered trademark of Tealeaf, an IBM Company. Windows Server and the Windows logo are trademarks of the Microsoft group of countries. Worklight is a trademark or registered trademark of Worklight, an IBM Company. UNIX is a registered trademark of The Open Group in the United States and other countries. AIX* BladeCenter* CICS* Cognos* DataPower* DB2* DFSMS EASY Tier FICON* GDPS* PowerHA* PR/SM PureSystems Rational* RACF* RMF Smarter Planet* Storwize* System Storage* System x* System z* System z10* Tivoli* WebSphere* XIV* zEnterprise* z10 z10 EC z/OS* z/VM* z/VSE* HiperSockets* HyperSwap IMS InfiniBand* Lotus* MQSeries* NetView* OMEGAMON* Parallel Sysplex* POWER7*
  • 3. © 2014 IBM Corporation© 2014 IBM Corporation What is Communications Server? Overview of SNA Overview of TCP/IP Overview of RDMA and RoCE Communications Server Product Structure Communications Server Configuration and operation Communications Server Technology and Applications Network connectivity Clustering Security Agenda
  • 4. © 2014 IBM Corporation© 2014 IBM Corporation What is Communications Server?
  • 5. © 2014 IBM Corporation© 2014 IBM Corporation The Communications Server name is used for products running on different platforms: System z and zSeries, pSeries, xSeries, or OEM Communications Server is currently provided for: •z/OS, Windows, AIX, UNIX, Linux With z/OS, Communications Server is a base element (part of the operating system) •Consists of TCP/IP and SNA Services •Consists of prior products, TCP/IP and VTAM, for MVS What is Communications Server?
  • 6. © 2014 IBM Corporation© 2014 IBM Corporation z/OS Communications Server History VTAM (“Virtual Telecommunications Access Method”) implements SNA and has been available as mainframe software since 1974 Has been continuously enhanced TCP/IP available as mainframe software since the 1980s Has been continuously enhanced Original MVS software was ported from VM TCP/IP and VTAM were combined into single product (Communications Server) in 1996 Has been continuously enhanced
  • 7. © 2014 IBM Corporation© 2014 IBM Corporation SNA overview
  • 8. © 2014 IBM Corporation© 2014 IBM Corporation SNA History SNA “Systems Network Architecture” developed and distributed by IBM and announced in 1974 Specifications have also been provided so that a large number of other vendors also provide products that implement SNA SNA is an architecture defining protocols such as: Link Protocols Node Intercommunication Protocols Application Protocols VTAM is the mainframe and NCP is the front-end SNA product Runs with three main operating systems MVS, VM, VSE
  • 9. © 2014 IBM Corporation© 2014 IBM Corporation What is SNA? Subarea APPN/HPR PeerHierarchical SNA originally consisted of strictly hierarchical subarea protocols with few dynamics network resources predefined Advanced Peer to Peer networking introduced mid 1980s made SNA more flat and dynamic High Performance Routing introduced in 1990s Enterprise Extender (HPR over UDP) introduced in 1999
  • 10. © 2014 IBM Corporation© 2014 IBM Corporation Enterprise Extender Allows use of IP network for SNA sessions To an SNA application, the IP network looks like a link To the IP network, EE is just a UDP application SNA traffic is sent as UDP datagrams (on ports 12000-12004) over the IP network Supported by many platforms: z/OS CS/Linux, CS/AIX, CS/Windows PComm i5/OS Cisco SNASw Microsoft HIS Typically isolates SNA footprints to the "outside" of the network. EE allows enablement of IP applications and convergence on a single network transport while preserving SNA application and endpoint investment.
  • 11. © 2014 IBM Corporation© 2014 IBM Corporation SNA Viability SNA is a legacy networking protocol but it’s still in wide use and support is still required. There are over a trillion lines of customer written application code based on CICS, IMS, and DB2 A large percentage of all business data is still accessed using SNA applications “The report of my death is an exaggeration” Mark Twain, 1897 SNA, 2014
  • 12. © 2014 IBM Corporation© 2014 IBM Corporation Overview of TCP/IP
  • 13. © 2014 IBM Corporation© 2014 IBM Corporation TCP/IP History TCP/IP really needs no introduction, but for reference… ARPANET procotol suite introduced concepts of layering and virtualizing in the world of networking in early 1970s Funded by Defense Advanced Research Projects Agency (DARPA) Later Bolt, Beranek, and Newman (BBN) developed TCP/IP protocols for Berkeley UNIX on the VAX Code distributed for free with University of California's Berkeley's UNIX operating system First release of Berkeley Software Distribution in 1983 (4.2BSD) Spread rapidly and several releases followed New WANs in US created and attached to ARPANET Developed into the Internet
  • 14. © 2014 IBM Corporation© 2014 IBM Corporation TCP/IP Overview Application Layer User process cooperating with partner on same or different host, i.e. Telnet, FTP, SMTP Transport Layer TCP (connection oriented) and UDP (connectionless) Internetwork Layer Shields higher levels from the physical network architecture Network Interface Layer Interface to network hardware, called link or data link layer Applications Network Interface and Hardware Applications Network Interface and Hardware Internetwork Transport TCP/UDP IP ICMP ARP/RARP
  • 15. © 2014 IBM Corporation© 2014 IBM Corporation TCP/IP Addressing TCP/IP uses four octet addressing structure (IPv4) e.g., 198.51.100.36 Broken into netID and hostID portion Subnetting can be used to indicate portion of host bits are to be used to indicate additional networks Interface between applications and transport layer is defined by port numbers and sockets Each process that wants to communicate with another process identifies itself by a 16 bit port number 0 Class A: 10 110 8 1 6 2 4 3 1 netID netID netID hostID hostID hostID Class B: Class C:
  • 16. © 2014 IBM Corporation© 2014 IBM Corporation IPv6 is an evolution of the “current” version of IP, which is known as IPv4 Changes from IPv4 to IPv6 Expanded Routing and Addressing Address space increased from 32 bits to 128 bits 340 billion billion billion billion addresses (v4 = 1 billion) Enough to allow every atom on the Earth to have its own IP address – 100 times over! Header Format Simplification Reduced common-case processing cost of packet handling Improved Support for Options New encoding allows for more efficient forwarding Greater flexibility for introducing new options in the future Plug-and-Play Support Autoconfiguration of host address, default routers, MTU size, and other IP- related information What is IPv6? IPv4 Address: 198.51.100.36 IPv6 Address: 2001:0db8:4545:2::09ff:fef7:62dc
  • 17. © 2014 IBM Corporation© 2014 IBM Corporation Why IPv6 now? The effects of the IPv4 address limitations have been reduced/postponed for a while using Network Address Translation BUT – A new surge of demand for IP addresses is coming from: The far east where the use of the Internet is accelerating fast The assignment of IP addresses to cell phones The assignment of IP addresses to household appliances of various types “the internet of things” Multiple addresses per person Government mandates for IPv6 support Backbone ISPs Regional ISPs Local ISPs Large corporations and universities AT&T, MCI, GTE, BT, etc. The Internet - a worldwide digital utility. Connectivity from anywhere (car, home, office) to anything! This demand cannot be met with IPv4 addressing space and IPv6 is now required for parts of the internet IPv6 support is now required to bid on IT contracts for the US government!
  • 18. © 2014 IBM Corporation© 2014 IBM Corporation Common TCP and UDP TransportIPv6 Raw Transport IPv4 Raw Transport AF_INET6 PFS AF_INET PFS ICMPv6 NeD MLD Stateless autoconfig ICMPIGMPARP Firewall Functions Firewall Functions QoS TRM IDS QoS TRM IDS Common DLC Functions IPv6 DLCs IPv4 DLCs Applications IPv4IPv6 Communications Server TCP/IP dual-stack structure A dual-mode (or dual- stack) TCP/IP implementation supports both IPv4 and IPv6 interfaces - and both old AF_INET and new AF_INET6 applications. The dual-mode TCP/IP implementation is a key technology for IPv4 and IPv6 coexistance in an internet. IPv4 and IPv6 can be overlaid onto the same physical infrastructure (fabrics, interfaces, etc)
  • 19. © 2014 IBM Corporation© 2014 IBM Corporation Overview of RDMA and RoCE
  • 20. © 2014 IBM Corporation© 2014 IBM Corporation RDMA (Remote Direct Memory Access) Technology Overview Key attributes of RDMA Enables a host to read or write directly from/to a remote host’s memory with minimal (or no) involvement from either host’s CPU, by registering specific memory for RDMA partner use. • Requires an RDMA network interface card (RNIC) • Reduces networking stack overhead by bypassing TCP/IP semantics and offloading networking CPU cycles to the RNIC – Data is moved directly by the RNICs, bypassing the TCP/IP stack. Host A Memory CPU Host B Memory CPU RDMA enabled network fabric RDMA enabled network fabric RNIC RNICRkey A Rkey B A B
  • 21. © 2014 IBM Corporation© 2014 IBM Corporation RoCE - RDMA over Converged (Enhanced) Ethernet RDMA based technology has been available in the industry for many years – primarily based on Infiniband (IB) IB requires a completely unique network eco system (unique hardware such as host adapters, switches, host application software, system management software/firmware, security controls, etc.) IB is popular in the HPC (High Performance Computing) space RDMA technology is now available on Ethernet – RDMA over Converged Ethernet (RoCE) RoCE uses existing Ethernet fabric but requires advanced Ethernet hardware (RDMA capable NICs and RoCE capable Ethernet switches) RoCE is a game changer! • RDMA technology becomes more affordable and prevalent in data center networks
  • 22. © 2014 IBM Corporation© 2014 IBM Corporation Communications Server Product Structure
  • 23. © 2014 IBM Corporation© 2014 IBM Corporation Applications SNA APIs Sockets APIs SNA, APPN, HPR TCP/IP Network Attachment Communi- cations Storage Manager z/OS Communications ServerProvide common services within CS Network attachment Storage management High Performance Data Transfer TCP/IP and SNA integration TN3270 Network access Internal optimizations Enterprise Extender Standard TCP/IP applications Multi-protocol Solutions Sockets (TCP/IP) applications z/OS Unix offers z/OS users access to a wide range of UNIX-based applications over IP networks SNA applications SNA applications are supported over SNA or IP networks z/OS Communications Server Enterprise Extender DLCs RDMA
  • 24. © 2014 IBM Corporation© 2014 IBM Corporation LPARs and Communications Server IP Backbone TN3270, or Web client SNA Client IB M IBM IBM Only one VTAM per z/OS image May run multiple TCP/IP stacks on a single z/OS image (but generally not recommended) May use different physical networks for SNA and TCP/IP, or may use a single network for both SNA Backbone x.x.x.4 y.y.y.5 x.x.x.5 y.y.y.6 ATM NETA VTAM1 NETA VTAM2,VTAM3,VTAM4TCP Stack1 Stack2 TCP Stack3 Stack4, etc.
  • 25. © 2014 IBM Corporation© 2014 IBM Corporation P a s c a l R e x x C I C S C a l l A S M - M A C R O EZASOKET EZASMI TCP/IP provided C sockets API LE provided C/C++ sockets API UNIX Systems Services provided callable BPX sockets API X T I SUN 3.9 NCS X11 R4 DPI 1.2 RFC 1006 R P C R P C X - W I N S N M P X T I XPG 4.2 R P C R P C SUN 4.0 DCE X - W I N X11 R6 S N M P DPI 2.0 UNIX Systems Services provided Logical File System (LFS) UNIX Systems Services and TCP/IP provided Physical File Systems (PFS) - AF_INET and AF_INET6 TCP/IP protocol stack Sockets application programs or subsystems utilizing sockets APIs Sockets APIs? Yep, we’ve got a few
  • 26. © 2014 IBM Corporation© 2014 IBM Corporation Some standardized application protocols Remote terminal access Telnet TN3270(e) TN5250 Network Management SNMP ICMP File Transfer FTP TFTP Electronic mail CSSMTP Data Sharing NFS DFS World Wide Web HTTP HTTPS MIME Remote Command Execution REXEC RSH TCP/IP Network Routing OMPRoute Mostly provided by CS as applications that ship with the product
  • 27. © 2014 IBM Corporation© 2014 IBM Corporation SNA 3270 Appli- cation SNA 3270 Appli- cation IP Backbone Network SNA Backbone Network SNA 3270 terminal TN3270 server SNA/LU2 TCP/IP TN3270(E) Workstation SNA/LU2 TCP/TN3270(E) z/OS z/OS There are hundreds of thousands of SNA LU2- based applications out there today that will probably never be migrated to native sockets. Many OEM and IBM client products available IBM products include PCOM and Rational Host On Demand Why is TN3270 Needed?
  • 28. © 2014 IBM Corporation© 2014 IBM Corporation The TN3270 server provides enterprise class capacity, performance, and reliability It supports both TN3270 and TN3270E protocols z/OS CS TN3270E ServerThere are two telnet servers on z/OS : The TN3270, TN3270E, and SNA line mode telnet server The UNIX line mode and raw mode telnet server CICS Transaction Desktop PC TN3270E Printer TN3270E Terminal z/OS T C P / I P TN3270E Server CICS or other SNA Application V T A M UNIX Shell UNIX TelnetD LU1/3 LU2
  • 29. © 2014 IBM Corporation© 2014 IBM Corporation Communications Server Configuration and Operation
  • 30. © 2014 IBM Corporation© 2014 IBM Corporation Configuration basics – TCP/IP TCP/IP profile specifies configuration for the TCP/IP stack IP interfaces Port reservations Networking options and configuration information including sysplex related Details are specified in IP Configuration Reference Accompanying IP Configuration Guide describes best practices and provides step by step guides to many common configuration tasks TCP/IP profile is stored in MVS datasets Location specified in the TCP/IP started PROC (//PROFILE DD statement) • There are other default places we look if that’s not specified, but make life easy for people reading your JCL by specifying it Main profile can include sub-files TCP/IP configuration can be dynamically changed with VARY OBEY operator command Operator specifies a dataset containing the new TCP/IP profile or a subset of a TCP profile with the new configuration information E.g., VARY TCPIP,,OBEYFILE,DSN=SYS1.TCPPARMS(NEWPROF)
  • 31. © 2014 IBM Corporation© 2014 IBM Corporation Operational basics – TCP/IP Communication server provides a rich set of displays via the NETSTAT operator command. Can be run from the operator console, a TSO session or the z/OS Unix shell Has options to display just about any configuration or state Device state, routing tables, connection information, stack information, etc… far too many to list here Documented in the IP System Administrator’s Commands. TCP/IP stack is controlled with the VARY TCPIP,,command operator command. Values for command include: OBEYFILE to change configuration (see previous slide) SYNTAXCHECK to perform a syntax check on a TCP/IP Profile file without enacting the specified configuration DATTRACE,PKTTRACE, and OSAENTA to control traces START and STOP to control network resources (e.g., IP interfaces) SYSPLEX to control the sysplex configuration of the stack (e.g., quiesce, leave or join sysplex groups, etc) PURGECACHE to delete the ARP/Neighbor cache
  • 32. © 2014 IBM Corporation© 2014 IBM Corporation Example of a TCP/IP Netstat command D TCPIP,,NETSTAT,ROUTE EZZ2500I NETSTAT CS V2R1 TCPIP 278 DESTINATION GATEWAY FLAGS REFCNT INTERFACE DEFAULT 192.168.246.1 UGS 000013 ETH1 DEFAULT 192.168.247.129 GS 000000 OSATR104 9.21.111.210/32 0.0.0.0 H 000000 SNA1 9.23.246.0/24 0.0.0.0 US 000000 ETH1 9.23.246.0/24 0.0.0.0 S 000000 ETH2 9.23.246.16/32 0.0.0.0 UH 000000 VLINK1 9.23.246.23/32 0.0.0.0 H 000000 ETH2 9.23.246.24/32 0.0.0.0 UH 000000 ETH1 9.23.247.128/25 0.0.0.0 US 000000 OSATR100 9.23.247.128/25 0.0.0.0 S 000000 OSATR104 9.23.247.130/32 0.0.0.0 H 000000 OSATR104 9.23.247.135/32 0.0.0.0 UH 000000 OSATR100 127.0.0.1/32 0.0.0.0 UH 000020 LOOPBACK 13 OF 13 RECORDS DISPLAYED
  • 33. © 2014 IBM Corporation© 2014 IBM Corporation Configuration basics – VTAM All VTAM configuration files are contained within SYS.VTAMLST, which is called the VTAM definition library. VTAM is configured using a combination of start options and configuration lists: Start options control the configuration of VTAM itself and are usually specified in the ATCSTRxx member of the VTAM definition library. you specify XX with the LIST=XX parameter when starting VTAM. This would be in your VTAM JCL Start options can also be specified as parameters to VTAM (in your JCL) Configuration lists specify the resources that VTAM will control and are usually specified in a hierarchy of files starting with the ATCCONxx member of the VTAM definition library You specify XX with the CONFIG=XX parameter when starting VTAM This file contains a list of member names in the VTAM definition library, each member defines a resource that VTAM will start and control. These are resources like application programs, physical and logical units, networking domains, etc. Resources are defined hierarchically. The reference manual for this configuration is the SNA Network Implementation Guide and the SNA Resource Definition Refereince
  • 34. © 2014 IBM Corporation© 2014 IBM Corporation Example of VTAM configuration hierarchy SYS1.VTAMLST ATCSTR01 ATCCON01 NCP1 CHAN1 LOCSNA1 LOCNS1 START OPTION1 START OPTION1 etc NCP1 CHAN1 LOCSNA1 ATCSTR01 ATCCON01 Start these immediately This one can be started later using an operator command
  • 35. © 2014 IBM Corporation© 2014 IBM Corporation Configuration interdependency – VTAM and TCP/IP All DLC services in Communications Server are provided by VTAM This means that when configuring TCP/IP interfaces, part of the definition is in VTAM – The DLC port is defined in VTAM as a Transport Resource List Entry (TRLE) – The IP interface is defined in TCP/IP – The IP definition refers to the VTAM definition by TRLE PORTNAME – Some IP interface type dynamically create their own TRLE definitions INTERFACE OSAQDIO24 DEFINE IPAQENET PORTNAME OSAQDIO2 IPADDR 100.1.1.1/24 TCP/IP profile statement TRLHYDRA VBUILD TYPE=TRL HYD1 TRLE LNCTL=MPC, READ=(2EC0), WRITE=(2EC1), MPCLEVEL=QDIO, DATAPATH=(2EC2,2EC3), PORTNAME=(OSAQDIO2), PORTNUM=1 VTAMLST member
  • 36. © 2014 IBM Corporation© 2014 IBM Corporation Operational basics – VTAM VTAM displays are done on the operator console with the DISPLAY (VTAM Jobname) command A rich set of display commands is provided, similar to TCP/IP Netstat in scope and coverage Documented in SNA Operation VTAM is controlled with the MODIFY (VTAM jobname) and VARY (VTAM jobname) operator commands In general, the MODIFY command controls configuration and resources and VARY command controls state For example, VARY command is used to start and stop resources and MODIFY command is used change configuration information But this rule is very loosely followed and is only a general guideline Documented in SNA Operation
  • 37. © 2014 IBM Corporation© 2014 IBM Corporation Example of a VTAM display command (Enterprise Extender information) D NET,EE IST097I DISPLAY ACCEPTED IST350I DISPLAY TYPE = EE IST2000I ENTERPRISE EXTENDER GENERAL INFORMATION IST1685I TCP/IP JOB NAME = TCPCS IST2003I ENTERPRISE EXTENDER XCA MAJOR NODE NAME = XCAEE2 IST2004I LIVTIME = (10,0) SRQTIME = 15 SRQRETRY = 3 IST2005I IPRESOLV = 0 IST2231I CURRENT HPR CLOCK RATE = STANDARD IST2232I HPR CLOCK RATE LAST SET TO HIGH ON 11/14/06 AT 22:58:41 IST2233I HPR CLOCK RATE LAST EXITED HIGH ON 11/14/06 AT 22:58:45 IST924I ------------------------------------------------------------- IST2006I PORT PRIORITY = SIGNAL NETWORK HIGH MEDIUM LOW IST2007I IPPORT NUMBER = 12000 12001 12002 12003 12004 IST2008I IPTOS VALUE = C0 C0 80 40 20 IST924I ------------------------------------------------------------- IST2017I TOTAL RTP PIPES = 4 LU-LU SESSIONS = 3 IST2018I TOTAL ACTIVE PREDEFINED EE CONNECTIONS = 2 IST2019I TOTAL ACTIVE LOCAL VRN EE CONNECTIONS = 0 IST2020I TOTAL ACTIVE GLOBAL VRN EE CONNECTIONS = 0 IST2021I TOTAL ACTIVE EE CONNECTIONS = 2 IST314I END
  • 38. © 2014 IBM Corporation© 2014 IBM Corporation Diagnostic information – TCP/IP TCP/IP makes extensive use of the MVS component trace facility and when reporting a problem you will typically be asked to provide this trace. There are multiple TCP/IP component traces including: SYSTCPIP – for TCP/IP stack and Telnet internals SYSTCPRT – for the OMPROUTE routing daemon SYSTCPDA – packet and data trace SYSTCPIK – for the IKE daemon SYSTCPRE – for the resolver (interfaces with DNS to find resources in the network) SYSTCPOT – OSA trace And others.. Documented in IP Diagnosis TCP/IP also provides a large set of IPCS commands for analyzing TCP/IP dumps Also documented in IP Diagnosis You will usually be asked to provide an SVC dump of TCP/IP when reporting a problem • Be sure to provide the following: • TCP/IP and VTAM address spaces. • SDATA options RGN, CSA, LSQA, NUC, PSA, and LPA. • CSM data spaces. Add DSPNAME=(1.CSM*) to the DUMP command to include them in the dump.
  • 39. © 2014 IBM Corporation© 2014 IBM Corporation Diagnostic information – VTAM VTAM has its own trace called the VTAM Internal Trace (VIT) Similar to CTRACE in that what’s captured is controlled by TRACE option specified in VTAMLST and/or modified by MODIFY TRACE command Is in 64 bit HVCOMMON storage and is captured when VTAM is dumped if CSA is specified on the dump command. If too much information than can fit in the VTAM address space is needed, MVS Generalized Trace Facility (GTF) can be used to write this trace to external datasets. Format of trace records is documented in SNA Diagnosis volume 2 Like TCP/IP SNA provides a large set of IPCS commands for analyzing dumps Documented in SNA Diagnosis volume 1. Also like TCPIP, you will likely be asked to provide a dump of the VTAM address space to diagnose problems Should be acquired similarly to how TCP dumps are described on the previous page
  • 40. © 2014 IBM Corporation© 2014 IBM Corporation Communications Server Technology and Applications
  • 41. © 2014 IBM Corporation© 2014 IBM Corporation Communications Server Network Connectivity Technologies
  • 42. © 2014 IBM Corporation© 2014 IBM Corporation The Open Systems Adapter is the strategic communications device for the mainframe architecture. OSA integrates several hardware features and supports many networking transport protocols. Powerful virtualization capabilities allow the OSA-Express adapter to be shared by all LPARs and stacks on a CEC, providing economical scalability • zLinux, z/VM, and z/OS LPARS can all share an OSA adapter The OSA-Express adapter includes the NIC and the network controller Open Systems Adapter (OSA) background Protocols supported include Ethernet and Token Ring
  • 43. © 2014 IBM Corporation© 2014 IBM Corporation VNIC CEC z/VM LPAR VNIC VNIC z/OS Guest Linux Guest L2 VSwitch z/OS LPAR VNIC Linux LPAR OSA Uplink Port Guest Port Guest Port Server B (native) Server A (native) Server E (simulated) Server C (real) z/OS Guest Server F (simulated) VNIC Server D (real) Linux Guest PR/SM If 1 If 1 If A If A If A If A LAN z/VM Real Devices z/VM Simulated Devices VNIC OSA sharing and connectivity summary Simulated mode benefits: Large scalability (1000s of virtual servers can share an OSA in this configuration) Link aggregation (z/VM can make multiple OSAs appear as a single link to the guests, simplifying redundancy) z/VM Connectivity modes: Real mode: z/VM provides direct access to the OSA adapter; works like a native LPAR Linux OSA drivers are included in Red Hat Enterprise Linux and SUSE Linux Enterprise Server Native LPARs LPAR OSA adapter Simulated mode: z/VM provides a virtual switch and a network of virtual adapters to connect to an OSA-Express adapter. (Note that checksum and segmentation offloads are not supported in simulated mode).
  • 44. © 2014 IBM Corporation© 2014 IBM Corporation OSA Offload capabilities The OSA-Express adapter is a powerful network controller that can offload many processing-intensive networking tasks from the stack and the general purpose CPU Address Resolution Protocol (ARP) The stack registers its local IP addresses to the OSA adapter and the adapter responds to ARP requests for those addresses on the stack’s behalf Key value: If multiple OSAs are attached to the same physical LAN segment and one fails, the others detect the failure and automatically take over its ARP responsibilities (seamlessly moving adapter IP addresses from the failed adapter to the surviving ones!) Checksum When enabled, OSA can generate checksums on outgoing packets and validate them on incoming packets, on behalf of the TCP/IP stack Key value: reducing CPU cost Segmentation When enabled, transfers the overhead of segmenting TCP outbound data into individual IP packets to the OSA-Express device. Key value: significantly reduces CPU cost of TCP streaming (e.g., FTP) Multiple Queues (z/OS only): OSA adapters can be configured pre-sort different types of inbound traffic onto separate I/O queues to keep incompatible types of traffic (e.g., bulk data and encrypted packets) apart. Key value: makes z/OS processing more efficient
  • 45. © 2014 IBM Corporation© 2014 IBM Corporation zOSPG0550 HTTP server or caching proxy server Firewall FirewallAppli- cation Server Data Server HTTP/DMZ Zone Application Zone Data Zone IDS IDS OSA-E Tier-1 Tier-2 Tier-3 z/OS z/OS zSeries zSeries Linuxz/OS z/VM z/OS z/OS HiperSockets Hipersockets provides IP networking among virtual servers within a zSeries CEC Up to 16 internal IP networks that interconnect z/OS, Linux on zSeries, VSE/ESA, and z/VM including z/VM guest operating systems Improved response time due to very low latency Highly secure (no external cables to tap into) Highly available Cost savings (no external switch equipment needed) Flexible Simple to install, operate, maintain System z HiperSockets – The IP network within the box HiperSockets on zSeries allows operating system images on the same processor complex to exchange IP traffic virtually at memory speed. A Hipersockets network looks like an internal LAN
  • 46. © 2014 IBM Corporation© 2014 IBM Corporation Shared Memory communications over RDMA (SMC-R) Shared Memory Communications over RDMA (SMC-R) is a protocol that allows TCP sockets applications to transparently and autonomically exploit RDMA over your datacenter Ethernet network using RoCE. SMC-R is a “hybrid” solution that: – Uses TCP connection to establish SMC-R connection – Each TCP end point exchanges TCP options to dynamically learn whether the connection is eligible for the SMC-R protocol • If eligible, RDMA attributes are then exchanged within the TCP data stream – Socket application data is exchanged via RDMA write operations – TCP connection remains active and controls SMC-R connection – This model preserves many critical operational and network management features of TCP/IP with minimal IP admin changes • Resilience/failover • Load balancing • Connection based security (IP filters, policy, VLAN, SSL)
  • 47. © 2014 IBM Corporation© 2014 IBM Corporation SMC-R and 10GbE RoCE Express Requirements Operating system requirements – Requires z/OS 2.1 (GA 9/30/13) which supports the SMC- R protocol Server requirements – Exclusive to zEC12 (with Driver 15E) and zBC12 – New 10 GbE RoCE Express feature for PCIe I/O drawer (FC#0411) Single port enabled for use by SMC-R Each feature must be dedicated to one LPAR – Recommended minimum configuration two features per LPAR for redundancy Up to 16 features supported – OSA Express – either 1 GbE or 10 GbE Configured in QDIO mode (OSD CHPIDs only, not OSX) Does not need to be dedicated to the LPAR – Standard 10GbE Switch or point to point configuration supported Does not need to be CEE capable Switch must support and have enabled Global pause frame (a standard Ethernet switch feature for Ethernet flow control described in the IEEE 802.3x standard)
  • 48. © 2014 IBM Corporation© 2014 IBM Corporation Use cases for SMC-R and 10GbE RoCE Express for z/OS to z/OS communications Use Cases Application servers such as the z/OS WebSphere Application Server communicating (via TCP based communications) with CICS, IMS or DB2 – particularly when the application is network intensive and transaction oriented Transactional workloads that exchange larger messages (e.g. web services such as WAS to DB2 or CICS) will see benefit. Streaming (or bulk) application workloads (e.g. FTP) communicating z/OS to z/OS TCP will see improvements in both CPU and throughput Applications that use z/OS to z/OS TCP based communications using Sysplex Distributor Plus … Transparent to application software – no changes required!
  • 49. © 2014 IBM Corporation© 2014 IBM Corporation Up to 50% CPU savings for FTP binary file transfers across z/OS systems when using SMC-R vs standard TCP/IP ** 40% reduction in overall transaction response time for WebSphere Application Server v8.5 Liberty profile TradeLite workload accessing z/OS DB2 in another system measured in internal benchmarks * SMC-Rz/OS SYSA z/OS SYSB RoCE WAS Liberty TradeLite DB2 JDBC/DRDA Linux on x Workload Client Simulator (JIBE) HTTP/REST TCP/IP WebSphere to DB2 communications using SMC-R SMC-Rz/OS SYSA z/OS SYSB RoCE FTP Client FTP Server FTP File Transfers (FTP) using SMC-R Performance impact of SMC-R on real z/OS workloads * Based on projections and measurements completed in a controlled environment. Results may vary by customer based on individual workload, configuration and software levels. ** Based on internal IBM benchmarks in a controlled environment using z/OS V2R1 Communications Server FTP client and FTP server, transferring a 1.2GB binary file using SMC-R (10GbE RoCE Express feature) vs standard TCP/IP (10GbE OSA Express4 feature). The actual CPU savings any user will experience may vary.
  • 50. © 2014 IBM Corporation© 2014 IBM Corporation Up to 48% reduction in response time and up to 10% CPU savings for CICS transactions using DPL (Distributed Program Link) to invoke programs in remote CICS regions in another z/OS system via CICS IP interconnectivity (IPIC) when using SMC-R vs standard TCP/IP * SMC-Rz/OS SYSA z/OS SYSB RoCE CICS A DPL calls CICS B Program X IPIC CICS to CICS IP Intercommunications (IPIC) using SMC-R Performance impact of SMC-R on real z/OS workloads (cont) WebSphere MQ for z/OS realizes up to 200% increase in messages per second it can deliver across z/OS systems when using SMC-R vs standard TCP/IP **** SMC-Rz/OS SYSA z/OS SYSB RoCE WebSphere MQ WebSphere MQ MQ messages WebSphere MQ for z/OS using SMC-R * Based on internal IBM benchmarks using a modeled CICS workload driving a CICS transaction that performs 5 DPL (Distributed Program Link) calls to a CICS region on a remote z/OS system via CICS IP interconnectivity (IPIC), using 32K input/output containers. Response times and CPU savings measured on z/OS system initiating the DPL calls. The actual response times and CPU savings any user will experience will vary. ** Based on internal IBM benchmarks using a modeled WebSphere MQ for z/OS workload driving non-persistent messages across z/OS systems in a request/response pattern. The benchmarks included various data sizes and number of channel pairs The actual throughput and CPU savings users will experience may vary based on the user workload and configuration.
  • 51. © 2014 IBM Corporation© 2014 IBM Corporation The hybrid nature of SMC-R (beginning with TCP/IP, then switching to SMC-R) allows all existing IP and TCP layer security features to automatically apply for SMC-R connections • Without requiring any changes from a customer perspective • And without requiring these functions to be retrofitted into a new protocol Note: IPSec tunnels are not supported with SMC-R. When IPSec is enabled for a TCP connection then z/OS will automatically opt out of using SMC-R Connection level security (SSL, TLS, AT-TLS) IP Filters, Traffic regulation, IDS SAF based network resource controls (e.g. NETACCESS, STACKACCESS, etc.) Auditing based on IP addresses/ports (e.g. based on SMF records) etc. SMC-R preserves existing security model Note: Security functions which require TCP packet inspection or modification are not supported because RDMA replaces TCP packets. These include: IPSec tunnels, filters that deny packets during an active connection, or methods that require packet tagging such as MLS. z/OS will automatically opt out of using SMC-R for TCP connections that require these security types.
  • 52. © 2014 IBM Corporation© 2014 IBM Corporation SMC-R roadmap First platform to support SMC-R is z/OS V2R1 (GA 9/30/13) – z/OS to z/OS communications within the datacenter IBM intends for SMC-R to be an open, pervasive protocol – To allow RDMA communication between any closely coupled enterprise platforms • E.g., zLinux, Linux on other platforms, etc. IBM intends to work with the Linux community to distribute SMC-R on Linux – Specification is published to the IETF to enable pervasiveness • http://tools.ietf.org/html/draft-fox-tcpm-shared-memory-rdma-02 Future considerations: – Virtualization support for the RoCE Express feature – z/VM guest support for PCIe devices (statement of direction issued) • RoCE Express feature is a PCIe device
  • 53. © 2014 IBM Corporation© 2014 IBM Corporation Summary: TCP/IP Data Link Controls Discussed previously: MPCIPA - to other TCP/IP hosts via QDIO or HiperSockets HiperSockets -- to other TCP/IP (z/OS, Linux, and/or VM) hosts on the same zSeries CEC RoCE – RDMA to other TCP/IP hosts using SMC-R Others: CTC - channel to another IBM zSeries MPCPTP - to another zSeries via channel or XCF, to another stack, or to routers/R6K via channel LCS - to other TCP/IP hosts via 3172, 8232, router, OSA, etc. SAMEHOST - to other address spaces or stacks in same LPAR Also: CDLC, CLAW, HYPERCHANNEL, MPCOSA (legacy, not recommended)
  • 54. © 2014 IBM Corporation© 2014 IBM Corporation SNA Data Link Controls CDLC To 3745/3746 or 3x74 via channel LSA To 3172 or router via channel To LAN via OSA2 or OSA-Express (non-QDIO mode) CTC To another VTAM via channel using subarea protocols Subarea MPC To another VTAM via multiple subchannels using subarea protocols MPC To another VTAM or router via channel (APPN) MPC+ To another VTAM via channel or XCF (HPR) or to a router via channel – uses CSM EE LDLC To Enterprise Extender partner (using IP network)
  • 55. © 2014 IBM Corporation© 2014 IBM Corporation Communications Server Clustering Technologies
  • 56. © 2014 IBM Corporation© 2014 IBM Corporation 1 12 2 3 4 5 6 7 8 9 10 11 1 12 2 3 4 5 6 7 8 9 10 11 SwitchSwitch I want to use Application A and its data, but I do not care where it is in this Sysplex! Application A CEC-1 Application A CEC-2OS and middle- ware infra- structure supporting data sharing OS and middle- ware infra- structure supporting data sharing A tightly coupled cluster of z/OS systems that cooperate to provide a single system image to the wider network Cross-system coupling facility (XCF) z/OS systems in a parallel sysplex are independent instances that cooperate using the Cross-System Coupling Facility (XCF) Basic definition of a parallel sysplex
  • 57. © 2014 IBM Corporation© 2014 IBM Corporation Sysplex Workload Distribution and Load Balancing Sysplex Distributor manages load balancing and distribution within a sysplex Performance Workload management across a cluster of server instances One server instance on one hardware node may not be sufficient to handle all the workload Availability As long as one server instance is up-and-running, the “service” is available Individual server instances and associated hardware components may fail without impacting overall availability Capacity management / horizontal growth Transparently add/remove server instances and/or hardware nodes to/from the pool of servers in the cluster Single System Image Give users one target hostname to direct requests to Number of and location of server instances is transparent to the user Server Server Server Server Sysplex Distibutor All server instances must be able to provide the same basic service. In a z/OS Sysplex that means the applications must be Sysplex- enabled and be able to share data across all LPARs in the Sysplex. In order for the load balancing decision maker to meet those objectives, it must be capable of obtaining feedback dynamically, such as server instance availability, capacity, performance, and overall health. Feedback loop Server Cluster Data Data Mirroring w. HyperSwap Coupling Facility
  • 58. © 2014 IBM Corporation© 2014 IBM Corporation TN3270e Server VIPA#1 CICS Appl-A VIPA#2 FTP Services VIPA#3 DB2 subsystem VIPA#4 OSA OSAOSA CICS Appl-B VIPA#5 Web Services VIPA#6 IP#10 IP#11 IP#12 Connect to VIPA#1 Connect to CICS-Appl- A.xyz.com My z/OS IP host Resolve CICS-Appl- A.xyz.com Use IP address VIPA#2 Name server A VIPA is an IP address that is not tied to a specific physical interface and instead represents a higher level concept such as a host, an application, or a load balancer. VIPA#7 Virtual IP Address (VIPA) definition
  • 59. © 2014 IBM Corporation© 2014 IBM Corporation Dynamic VIPA Support VIPAs can survive any outage by moving to another stack in Sysplex via VIPA Takeover Another application instance can pick up workload or Application can be restarted on takeover stack Connections broken but Reset sent to client upon takeover • Significantly reduces down time Dynamic VIPA Takeback VIPA moves back to recovered primary owner • New Connections Handled By Primary Owner again • Connections Established To Backup are allowed to continue Data forwarded from primary owner to backup • Allows Movement Of Application Server Without Impacting Existing Workload Works in conjunction with dynamic routing OSPF (implemented by the z/OS OMPROUTE daemon) recommended Useful for planned outages as well Operator commands allow you to move Dynamic VIPAs non-disruptively Network COUPLING FACILITY VIPA 192.168.253.1 VIPA 192.168.253.2 VIPA 192.168.253.3 VIPA 192.168.253.4 VIPA 192.168.253.5 VIPA 192.168.253.6 192.168.253.4 Cached IP address 1 2 Dynamic VIPA movement – stack managed DVIPAs
  • 60. © 2014 IBM Corporation© 2014 IBM Corporation A Distributed Dynamic VIPA represents a Sysplex Distributor and the servers it manages Only the distributor node advertises the address Back-end servers use the address as well but do not advertise it to the network Clients connect to the distributor using the distributed DVIPA address and the distributor forwards the connection to the appropriate back-end server. In this manner, distributed dynamic VIPA provides the single system image for the entire cluster managed by the Sysplex Distributor! Network Coupling Facility and z/OS Worklod Manager 192.168.1.1 (SD DVIPA) (192.168.1.1) (192.168.1.1) (192.168.1.1) (192.168.1.1) (192.168.1.1) Connect to 192.168.1.1 (Sysplex Distributor’s distributed dynamic VIPA address) 1 2 3 Distributed Dynamic VIPA
  • 61. © 2014 IBM Corporation© 2014 IBM Corporation Communications Server Security Technologies
  • 62. © 2014 IBM Corporation© 2014 IBM Corporation Roles and Objectives: Communications Server security technologies IP Filtering IPSec IP Filtering IDS IDS AT-TLS SAF protection Native SSL / TLS Kerberos SAF protection Application specific IP Networking layer TCP/UDP transport layer API layer Application layer IP filters specify traffic that requires IPsec protection. IP filtering blocks out all IP traffic that this systems doesn't specifically permit. Can be configured or applied dynamically as “defensive” filters Intrusion detection services protect against attacks of various types on the system's legitimate (open) services. IDS protection is provided at both the IP and transport layers. z/OS CS TCP/IP applications use SAF to authenticate users and prevent unauthorized access to datasets, files, and SERVAUTH protected resources. The SAF SERVAUTH class is used to prevent unauthorized user access to TCP/IP resources (stack, ports, networks). Protect the system Examples of application protocols with built-in security extensions are SNMPv3, DNS, and OSPF. SSH (not part of z/OS CS) provides an umbrella of secure applications (secure shell access, secure file transfer, etc.) Both Kerberos and SSL/TLS are located as extensions to the sockets APIs and applications have to be modified to make use of these security functions. Both SSL/TLS and Kerberos are connection-based and only applicable to TCP (stream sockets) applications, not UDP. AT-TLS is a TCP/IP stack service that provides SSL/TLS services at the TCP transport layer and is transparent to applications. IPSec resides at the networking layer and is transparent to upper-layer protocols, including both transport layer protocol and application protocol. Protect data in the network
  • 63. © 2014 IBM Corporation© 2014 IBM Corporation Policy-based network security on z/OS: Overview Networking DLC Transport Sockets API TCP/IP Application AT-TLS IPSecurity IDS Policy Agent IDS Policy IPSecurity Policy AT-TLS Policy Security policy administrator Policy is created through Configuration Assistant for z/OS Communications Server – GUI-based tool – Configures each security discipline (AT-TLS, IP security and IDS) using consistent model – Generates and uploads policy files and related content to z/OS Policy Agent processes and installs policies into TCP/IP stack – Policies are defined per TCP/IP stack – Separate policies for each discipline – Policy agent also monitors and manages the other daemons and processes needed to enforce the policies (IKED, syslogd, trmd, etc.) Provides network security without requiring changes to your applications – Security policies are enforced by TCP/IP stack – Different security disciplines are enforced independent of each other
  • 64. © 2014 IBM Corporation© 2014 IBM Corporation Policy-based network security on z/OS: Configuration Assistant z/OSMF-based web interface Configures all policy disciplines Separate perspectives but consistent model for each discipline Supports import of existing policy files Supports current z/OS release plus past two Actively imports certain configuration information Focus on concepts, not details – what traffic to protect – how to protect it – De-emphasize low-level details (though they are accessible through advanced panels) Builds and maintains – Policy files – Related configuration files – JCL procs and RACF directives
  • 65. © 2014 IBM Corporation© 2014 IBM Corporation DataPower DataPower appliances integrate with z/OS security z/OS Network Security Server (NSS) enables both logical and physical integration between DataPower and z/OS security. DataPower accesses centralized SAF services via z/OS NSS for: – SAF access service: Provides SAF-based authentication (of DP users) and access control (of DP resources) with SMF auditing – Certificate service: Provides retrieval of RSA certificates from a SAF keyring – Private key service provides: • Private RSA key retrieval (clear key only) • RSA signature and decryption operations (secure key only) z/OS security administered through z/OS facilities like RACF (SAF), ICSF DataPower NSS Client infrastructure NSS Server RACF RACF Profiles z/OSWeb Services request DataPower SMF SMF Audit RecordsXML and Web Services processing SAF request NSS client Secured TCP Connections Private Key Service SAF Access Service Certificate Service XMLAppliance Discipline RACF Keyring ICSF DataPower Appliance (logical integration) DataPower XI50z Integrated Blade (physical integration) WebSphere DataPower Appliances –Advanced WebServices operations –Message format transformation for traditional z/OS applications –Offload XML and WebServices security
  • 66. © 2014 IBM Corporation© 2014 IBM Corporation Transport Layer Security (TLS) overview Traditionally a socket layer service TCP only – Requires reliable transport Application-to-application protection Partner authentication via digital certificates Data protection using “cipher suites” that combine data authentication, integrity and encryption algorithms. z/OS implementations: – System SSL (part of z/OS Cryptographic Services) for use with C and C++ applications – Java Secure Sockets Extension (JSSE) Source code changes are required to use either of these Networking IPv4, IPv6 DLC Transport TCP,UDP,RAW Sockets API TCP/IP Application Networking IPv4, IPv6 DLC Transport TCP,UDP,RAW Sockets API TCP/IP Application IP networkIP network SSL/TLS Security Per connection
  • 67. © 2014 IBM Corporation© 2014 IBM Corporation New in V2R1 encrypted Application Transparent TLS on z/OS overview Basic TCP/IP stack-based SSL/TLS – SSL/TLS process performed at TCP layer (via System SSL) without requiring any application change (transparent) – AT-TLS policy specifies which TCP traffic is to be SSL/TLS protected based on a variety of criteria Application transparency – Can be fully transparent to application – Application has option to inspect or control certain aspects of ATTLS processing – “application-aware” and “application-controlled” ATTLS, respectively Available to TCP applications – Includes CICS Sockets – All programming languages except PASCAL supported Supports standard configurations – z/OS as a client and server – Supports both server and client authentication – Supports SSLv2, v3, TLSv1.0, v1.1, v1.2 Uses System SSL for SSL/TLS protocol processing – Remote endpoint sees an RFC-compliant implementation – Interoperates with other compliant implementations Networking IPv4, IPv6 DLC Transport (TCP) Sockets API TCP/IP Application AT-TLS AT-TLS policy Optional APIs for applications to inspect or control aspects of TLS session. AT-TLS policy administrator Enabling most z/OS TCP- based applications for use of SSL/TLS without requiring any modifications to those applications on z/OS. Enabling most z/OS TCP- based applications for use of SSL/TLS without requiring any modifications to those applications on z/OS. System SSL • Local address, port • Remote address, port • Connection direction • z/OS userid, jobname • Time, day, week, month
  • 68. © 2014 IBM Corporation© 2014 IBM Corporation Some z/OS applications that use AT-TLS Communications Server applications – TN3270 server – FTP client and server – CSSMTP – Load Balancing Advisor – IKED NSS client – NSS server – Policy Agent DB2 DRDA IMS Connect JES2 NJE Tivoli NetView applications – MultiSystem Manager – NetView Management Console RACF Remote Sharing Facility CICS Sockets applications 3rd party applications Customer applications
  • 69. © 2014 IBM Corporation© 2014 IBM Corporation Advantages of using AT-TLS on z/OS • Reduce costs – Application development • Cost of System SSL integration • Cost of application’s TLS-related configuration support – Consistent TLS administration across z/OS applications – Gain access to new features with little or no incremental development cost • Ongoing performance improvements Focus on efficiency in use of System SSL • Great choice if you haven’t already invested in System SSL integration Even if you have, consider the long-term cost of keeping up vs. short term cost of conversion • Complete and up-to-date exploitation of System SSL features – AT-TLS makes the vast majority of System SSL features available to applications – V2R1 is a perfect example! – AT-TLS keeps up with System SSL enhancements – as new features are added, your applications can use them by changing AT-TLS policy, not code
  • 70. © 2014 IBM Corporation© 2014 IBM Corporation IDS: Protecting against intentional and unintentional attacks on your system Intrusion Detection and Prevention Packet filtering Enterprise network or intranet Enterprise network or intranet Public network or Internet Public network or Internet Zombie attacker Internal end-user attacker External attacker Company Firewall What is an intrusion? – Information Gathering • Network and system topology • Data location and contents – Eavesdropping/Impersonation/Theft • On the network/on the host • Base for further attacks on others through Amplifiers, Robots, or Zombies – Denial of Service - Attack on availability • Single packet attacks - exploits system or application vulnerability • Multi-packet attacks - floods systems to exclude useful work Attacks can occur from Internet or intranet – Company firewalls and intrusion prevention appliances can provide some level of protection from Internet – Perimeter security strategy alone usually not sufficient. • Some access is permitted from Internet – typically into a Demilitarized Zone (DMZ) • Trust of intranet Attacks can be intentional (malicious) but often occur as a result of errors on nodes in the network (config, application, etc.)
  • 71. © 2014 IBM Corporation© 2014 IBM Corporation IDS: z/OS Communications Server IDS features z/OS in-context IDS broadens overall intrusion detection coverage, complements network-based IDS: “In-context” because z/OS is the communications end point, not an intermediary Ability to evaluate inbound encrypted data - IDS applied after decryption on the target system Avoids overhead of per packet evaluation against table of known attacks - IDS policy checked after attack probe fires Detects statistical anomalies realtime - target system has stateful data / internal thresholds that generally are unavailable to external IDSs Policy can control prevention methods on the target, such as connection limiting and packet discard Defensive actions • Packet discard • Limit connections • Drop connections (V1R13) Reporting • Logging • Console messages • IDS packet trace • Notifications to external event managers (like Tivoli NetView) IDS Events Scans – attempts by remote nodes to discover information about the z/OS system Attacks – numerous types • Malformed packets • IP option and IP protocol restrictions • Specific usage ICMP • Interface and TCP SYN floods • and so forth… including several new attack types added to V1R13 Traffic Regulation – TCP - limits the number of connections any given client can establish – UDP – limits the length of data on UDP queues by port
  • 72. © 2014 IBM Corporation© 2014 IBM Corporation For More Information.... URL Content http://www.ibm.com/systems/z/ IBM System z http://www.ibm.com/systems/z/hardware/networking/index.html IBM System z Networking http://www.ibm.com/software/network/commserver/zos/ http://www.ibm.com/software/network/commserver/z_lin/ http://www.ibm.com/software/network/ccl/ http://www.ibm.com/software/network/commserver/library http://www.redbooks.ibm.com http://www.ibm.com/software/network/commserver/support http://www.ibm.com/support/techdocs/ http://www.rfc-editor.org/rfcsearch.html IBM z/OS Communications Server IBM Communications Server for Linux on zSeries IBM Communication Controller for Linux on System z IBM Communications Server Library - white papers, product documentation, etc. IBM Redbooks IBM Communications Server Technical Support Technical Support Documentation (techdocs, flashes, presentations, white papers, etc.) Request For Comments (RFCs) IBM Education Assistanthttp://publib.boulder.ibm.com/infocenter/ieduasst/stgv1r0/index.jsp http://www.twitter.com/IBM_Commserver IBM Communications Server Twitter Feed IBM Communications Server Facebook Fan Pagehttp://www.facebook.com/IBMCommserver
  • 73. © 2013 IBM Corporation73