4.1.1 Common connection settings

These options are common to all supported host types.

  • Connect at startup

    By default, sessions are configured to connect to the host automatically when you create or open a session. However, you can set up a session so that it doesn't automatically connect to the host. Choose No to manually connect to the host.

  • Reconnect when host terminates connection

    When set to Yes, Host Access for the Cloud attempts to reconnect as soon as the host connection terminates.

  • Protocol

    From the drop down list, select the protocol you want to use to communicate with the host. To establish a host connection, both the web client and the host computer must use the same network protocol. The available values are dependent on the host to which you are connecting. They are:

    Table 4-1 Protocol Descriptions

    Protocol

    Description

    TN3270

    TN3270 is a form of the Telnet protocol, which is a set of specifications for general communication between desktop and host systems. It uses TCP/IP as the transport between desktop computers and IBM mainframes.

    TN3270E

    TN3270E or Telnet Extended is for users of TCP/IP who connect to their IBM mainframe through a Telnet gateway that implements RFC 1647. The TN3270E protocol allows you to specify the connection device name (also known as LU name), and provides support for the ATTN key, the SYSREQ key, and SNA response handling. If you try to use Telnet Extended to connect to a gateway that doesn’t support this protocol, standard TN3270 will be used instead.

    TN5250

    TN5250 is a form of the Telnet protocol, which is a set of specifications for general communication between desktop and host systems. It uses TCP/IP as the transport between desktop computers and AS/400 computers.

    Secure Shell (VT)

    You can configure SSH connections when you need secure, encrypted communications between a trusted VT host and your computer over an insecure network. SSH connections ensure that both the client user and the host computer are authenticated; and that all data is encrypted

    There are two authentication options available:

    • Keyboard Interactive - You can use this authentication method to implement different types of authentication mechanisms. Any currently supported authentication method that requires only the user's input can be performed with Keyboard Interactive.

    • Password - This option prompts the client for a password to the host after a host connection is made. The password is sent to the host through the encrypted channel.

    Telnet (VT)

    Telnet is a protocol in the TCP/IP suite of open protocols. As a character stream protocol, Telnet transmits user input from character mode applications over the network to the host one character at a time, where it is processed and echoed back over the network.

    INT1 (UTS)

    Provides access to Unisys 1100/1200 hosts using the TCP/IP network protocol.

    TCPA (T27)

    Use this protocol to connect to Unisys ClearPath NX/LX series or A Series hosts. TCPA Authentication is the process of verifying user login information. When properly configured, you can request a security credential from your application's credential server and send the credential back to the server. If the credential is valid, your application will be logged in; you do not have to enter a user ID or password. If the credential is not valid however, you will be prompted for a user ID and a password.

    MATIP (ALC)

    Mapping of Airline Traffic Over Internet Protocol (MATIP) uses TCP/IP for airline reservation, ticketing, and messaging traffic.

  • Enable emulation tracing

    You can choose to generate host traces for a session. No is the default. Select Yes to create a new emulation host trace each time the session is launched. The trace file is stored in <install directory>/sessionserver/logs/hosttraces/<date(yyyymmdd>/<trace-file>. Host trace files are created each time a session is launched.