4 z990 cryptographic feature codes – IBM 990 User Manual

Page 139

Advertising
background image

Chapter 5. Cryptography

127

Table 5-1 PCI Cryptography features

5.3.4 z990 cryptographic feature codes

What follows is a list of the cryptographic features available with the z990.

Feature code

Description

3863

Crypto enablement

Crypto enablement feature. Prerequisite to use the CPACF, PCIXCC, and
PCICA hardware features.

0868

PCIX Cryptographic Coprocessor (PCIXCC) feature

0862

PCI Cryptographic Accelerator (PCICA) feature

0886

TKE hardware for Token Ring

TKE workstation hardware with Token Ring connection, DVD drive, and
17-inch monitor.

0851

TKE 4.0 code

0852

TKE 4.1 code (available May 2004)

0889

TKE hardware for Ethernet

TKE workstation hardware with Token Ring connection, DVD drive, and
17-inch monitor.

0851

TKE 4.0 code

0852

TKE 4.1 code (available May 2004)

The z990 requires TKE Version 4.0 or 4.1 code. In case a z900 with a TKE 3.x workstation is
upgraded to a z990, the TKE Version 3.x workstations can be retained to control other
servers, but cannot be used on the z990. To control the z990, TKE Version 4.0 or 4.1 code is
required. TKE 3.x workstations that are carried forward are automatically updated to the 4.1
TKE code when a PCIXCC feature is ordered or present on the sever.

The TKE Version 4.0 or 4.1 code supports all models back to CCF support on a G3 CMOS
processor.

TKE 4.1 code provides local and a remote key entry with a master key.

Maximum
number
of
features
per z990
server

Number of
cryptographic
coprocessors
per feature

Maximum
number of
cryptographic
coprocessors
per z990
server

Number of
cryptographic
domains per
coprocessor

a

a. Two partitions, defined to the same LCSS or to different LCSSs, can use the same domain
number when assigned to different cryptographic coprocessors.

Number of
logical partitions
per z990 server
(Defined/Active)

PCICA

6

2

12

16

30/30

PCIXCC

4

1

4

16

30/30

Note:

The z990 (and the z890) are the last zSeries servers offering Token Ring adapters

on the Trusted Key Entry (TKE) workstations. Timely planning is advised to prepare for
migration to the Ethernet environment.

Advertising