Prior to establishing a host system connection, you must
define a host connection. 
- Click . 
The first time that you create a BlueZone 6530 Display session, the
       Define New Connection window opens. 
To open this window on
      subsequent connections, click , and then click New or Edit.
     
 
- In the Connection tab, complete the following fields: 
      
       - Telnet Connection
 
       - 
        
         - Connection Name: A unique name used to identify this collection
          of Connection settings.
 
         - Host Address: Specifies the computer name (in Internet format,
          known as DNS Name) or the IP address in either IPv4 or IPv6 format, of the host
          system.
 
         - TCP Port: Specifies the TCP port number. The default is 23.
 
         - Backup Host: Specifies the backup host to which BlueZone
          connects if the primary host is not available. Backup hosts are selected from the
          Connection List.
 
        
        
      
     
 
    - In the Emulation tab, complete the following fields: 
      
       - Emulation Options
 
       - 
        
         - Terminal: : Select the terminal type that you want to emulate
          from the menu. For BlueZone 6530, TANDEM is the only available
          terminal type.
 
         - Terminal ID: The Terminal ID automatically changes with the
          chosen Terminal setting above; however, you can override this value with the setting of
          your choice.
 
        
        
      
      
       - Default Screen Size
 
       - 
        
         - Rows: Sets the number of viewable rows used by the
          host.
 
         - Columns: Sets the number of viewable columns used by the
          host.
 
        
        
      
     
 
- In the Firewall tab, you can configure the firewall and proxy server sign
     on systems. Complete the following fields: 
      
       - Firewall Options 
 
       - 
        
       
 
      
     
 
- In the Security tab, configure the SSL, TLS, or SSH options. BlueZone
     6530 can be preconfigured for distribution with encryption configured and enabled eliminating
     the need for any end user intervention in the installation or configuration process. 
Note: The
      available Security Options change depending on the type of encryption
      selected. This document covers all possible settings
Complete the following fields: 
       
        - Security Options 
 
        - 
         
          
          
          - Security Type: If you want to encrypt your
           session, select one of the following encryption methods from the drop-down list box. The
           method is dictated by the secure Telnet host that you are connecting to.
            - None: Indicates that no encryption is being used. 
 
            - Implicit TLS: Negotiates a secure connection to the host
             first, then negotiates the Telnet connection. 
 
            - Explicit TLS: Encryption is negotiated during the Telnet
             negotiation.
 
            - SSH
 
           
 
          - Minimum TLS Version: Specifies the minimum
           allowable TLS protocol version. A higher version may be negotiated if the server supports
           it: 
            - SSL v3: Allows SSLv3 to be used. SSLv3 has numerous
             vulnerabilities and is no longer considered secure. This setting is NOT
             RECOMMENDED.
 
            - TLS v1.0 (Default): Specifies that at least TLS version 1.0
             is used. This is the default value.
 
            - TLS v1.1: Specifies that at least TLS version 1.1 is used. 
 
            - TLS v1.2: Specifies that at least TLS version 1.2 is used. 
 
            
           
 
          
          - Preferred Cipher Suite: Specifies a specific SSL/TLS or SSH
           cipher suite (encryption algorithm) to use. To allow the client and server to negotiate
           the cipher suite, select Strong only.
Note: The cipher suite
            choices will change depending on if you are using SSL/TLS or SSH.
           Strong only is not available in SSH. 
          - Invalid Certificates: Specifies how to handle an
           invalid server certificate.
            - Always Reject: Specifies that an invalid server certificate
             must always be rejected.
 
            - Ask Before Accepting: Specifies that the user must be asked
             whether to accept an invalid server certificate.
 
            - Always Accept: (Default) Specifies that an invalid server
             certificate must always be accepted.
 
           
 
          - Check for Certificate Revocation: Specifies how
           to perform revocation checking on the server certificate chain at connect time, which
           will result in a connection failure if a certificate has been revoked, if the revocation
           server cannot be contacted, or if revocation information is not listed in the
           certificate. 
            - Do Not Check: Performs no certificate revocation
             checking.
 
            - Server Certificate Only: Performs revocation checking on the
             end server certificate only.
 
            - Server and Chain Certificates: Performs revocation checking
             on the end server certificate and the intermediate certificates in the chain.
 
            - Server, Chain, and Root Certificates: Performs revocation
             checking on the end server certificate, the intermediate certificates in the chain, and
             the root certificate.
 
           
 
          - Alternate Principal Name: Type a valid address in this field to
           use to validate the server certificate. 
When a host site's server
            certificate's Common Name (CN) or AltSubjectName does not match the address used to
            connect to the host, a certificate error occurs, stating that the host address does not
            match the common name. If it is not possible to connect to the host address listed in
            the certificate, the address from the certificate can be typed into the
             Alternate Principal Name field. This address, rather than the
            host connection address, is used to validate the server certificate.
 
          - Remote Command: Remote Command will take the
           place of Alternate Principal Name when SSH is selected. You can use this text box to send
           remote commands to your SSH connected host. This feature is popular with Linux hosts.
          
 
         
         
       
      
 
 
    - In the Certificate tab, complete the following fields: 
      
       - Client Certificate 
 
       - These parameters specify the type of client certificate to use if any. 
         - No Client Certificate: Specifies that a client certificate must
          not be presented. 
 
         - Client Certificate in Certificate Store: Specifies that a client
          certificate must be presented that is located in the certificate store.
           - Common Name: Specifies the Common Name (CN) of the certificate
            to be presented. 
             - View: Click to view the certificate. 
 
             - Browse: Click to display a list of certificates in the
              certificate store. 
 
            
 
          
 
        
 
      
      
      
     
 
- In the Kerberos tab, you can configure the optional Kerberos
     Authentication Protocol component. If the Kerberos tab is not available,
     the Kerberos component was not installed. Refer to the BlueZone Desktop Administrator's
      Guide in Chapter 2: Installing BlueZone - Optional installation features - Enabling
     Kerberos for information about installing the Kerberos Authentication feature. 
Complete the
      following fields: 
       
        - Kerberos options
 
        - 
         
          - Enable Kerberos Authentication: To enable Kerberos
           Authentication for this session, place a check in this check box.
 
          - Use Windows Credentials: If enabled, your Windows
           credentials (User Name and Domain) are used in lieu of Principal and Realm. Your User
           Name is used as the Principal name and your Domain name is used as the Realm name.
 
          - Forward Credentials: If enabled, your credentials are forwarded
           to the remote session. The credentials are passed as a Kerberos message which includes,
           among other things, the forwarded Kerberos ticket and a session key associated with the
           ticket.
 
          - Principal: If you are not using your Windows credentials,
           type your Principal name here.
 
          - Realm: If you are not using your Windows credentials, type the
           Realm name here. The Realm name must be typed entirely in uppercase.
 
          - Target: Type the name of the Kerberos database.
 
          - Manage Tickets: Click to manage Kerberos tickets. The Kerberos
           Ticket Manager opens.
 
         
         
       
      
 
 
    - The Tunneling tab will only appear when SSH is
     selected on the Security tab.
Complete the following fields:
      
       - Tunneling Options
 
       - 
        
         - Enable X11 forwarding: Select to enable X11 forwarding
 
         - Allow Remote Connections: If enabled, you are allowing remote IP
          addresses to connect to the local listening port used in tunneling.
 
         - Add, Edit or Delete: Used to add, edit or delete port forwarding
          rules.
 
         - Add: When adding a rule, you have to choose either
           Local Port or Remote Port, then enter the
          port number you want to forward. Then you have to add the host name in the
           Name field with the port number on that host.
 
         - Edit: Allows you edit an existing rule.
 
         - Delete: Allows you delete an existing rule.
 
        
        
      
     
 
- Click OK.
 
   Note: If you enable the Direct/Modem feature in the global.ini file, you can
    change the connection type from Telnet to Direct
    or Modem using the Connection Type list that
    appears in the Connection tab. If you select either
     Direct or Modem connections, you will have the
    option to select your desired Baud Rate, Data
    Bits, Parity, Stop Bits,
     Flow Control, and Phone Number (modem only). For
    more information on enabling the Direct/Modem feature, refer to the Rocket BlueZone Desktop
     Adminitrator's Guide.