zERT TLS Summary

Navigation:  Table of Contents > Reports > TCP/IP zERT Summary >

zERT TLS Summary

Previous pageReturn to chapter overviewNext page

This report lists zERT entries and encryption attributes for TLS connections.

 

Entries are grouped by local IP address, server port and cryptographic attributes.

 

The report is divided into Server and Client tabs.

 

Report Parameters

 

Parameter

Description

System

The SMF ID of the system that wrote the record.

Jobname

Local job name.

Userid

Local userid.

IP Address

Local or remote IP address

Port

Server port

Exclude Loopback

Exclude connections to the loopback address 127.0.0.1 or ::1 from the report.

TLS Level

Filter by TLS protocol version.

Cipher

Filter by cipher suite.

Enc Alg

Filter by symmetric encryption algorithm.

Msg Auth

Filter by message authentication algorithm.

Kex Alg

Filter by key exchange algorithm.

Sig Method

Filter by signature method (server or client certificate, server or client handshake).

Cert Enc Method

Filter by certificate encryption method (server or client).

Cert Digest Alg

Filter by certificate digest algorithm (server or client).

Key Type

Filter by key type (server or client).

 

Columns

 

Column

Description

System

The system that wrote the record.

Server IP

IP Address of the server end of the connection.

Client IP

IP Address of the client end of the connection.

Port

The server port for the connection, or the starting value of the port range.

Port End

The end value of the port range.

Active FTP

The entries represent an outbound connection from the server for active mode FTP (as opposed to passive mode FTP).

TLS Level

TLS protocol version.

Cipher

Negotiated cipher suite.

Entries

The number of entries in this grouping.

Jobname

The z/OS job name associated with the socket.

Userid

The z/OS userid associated with the socket.

From

The start time of the first grouped interval.

To

The end time of the last grouped interval.

Connections

The count of connections in the group - the end connection count minus start connection count for each interval.

Short Connections

The count of short connections (less than 10 seconds).

Partial Connections

The count of partial connections: connections where the connection existed before or continued to exist after the security session.

Enc Alg

Symmetric encryption algorithm.

Msg Auth Alg

Message authentication algorithm.

Kex Alg

Key exchange algorithm.

Server Cert Sig Method

Server certificate signature method.

Server Cert Enc Method

Server certificate encryption method.

Server Cert Digest Alg

Server certificate digest algorithm.

Server Cert Key Type

Server certificate key type.

Server Cert Key Len

Server certificate key length.

Server Handshake Sig Method

Server handshake signature method (TLS 1.2 and later).

Client Cert Sig Method

Client certificate signature method.

Client Cert Enc Method

Client certificate encryption method.

Client Cert Digest Alg

Client certificate digest algorithm.

Client Cert Key Type

Client certificate key type.

Client Cert Key Len

Client certificate key length.

Client Handshake Sig Method

Client handshake signature method (TLS 1.2 and later).

Negotiated Key Share

Negotiated key share.

Source

Source of the information: Observation or Provider.