y Supported number of 4764 Cryptographic Coprocessors:

Table 8.8

 

server models

Maximum per server

Maximum per partition

IBM System i5

570 8/12/16W, 595

32

8

IBM System i5

520, 550, 570 2/4W

8

8

y Applications requiring a FIPS 140-2 Level 4 certified, tamper resistant module for storing cryptographic keys should use the IBM 4764 Cryptographic Coprocessor.

y Cryptographic functions demand a lot of a system CPU, but the performance does scale well when

you add a CPU to your system. If your CPU handles a large number of cryptographic requests, offloading them to an IBM 4764 Cryptographic Coprocessor might be more beneficial then adding a new CPU.

8.6 Additional Information

Extensive information about using System i Cryptographic functions may be found under “Security” and “Networking Security” at the System i Information Center web site at: http://www.ibm.com/eserver/iseries/infocenter .

IBM Security and Privacy specialists work with customers to assess, plan, design, implement and manage a security-rich environment for your online applications and transactions. These Security, Privacy, Wireless Security and PKI services are intended to help customers build trusted electronic relationships with employees, customers and business partners. These general IBM security services are described at: http://www.ibm.com/services/security/index.html .

General security news and information are available at: http://www.ibm.com/security .

System i Security White Paper, “Security is fundamental to the success of doing e-business” is available at:

http://www.ibm.com/security/library/wp_secfund.shtml .

IBM Global Services provides a variety of Security Services for customers and Business Partners. Their services are described at: http://www.ibm.com/services/ .

Links to other Cryptographic Coprocessor documents including custom programming information can be found at: http://www.ibm.com/security/cryptocards .

Other performance information can be found at the System i Performance Management website at: http://www.ibm.com/servers/eserver/iseries/perfmgmt/resource.html .

More details about POWER5 and SMT can be found in the document Simultaneous Multi-Threading (SMT) on eServer iSeries POWER5 Processors at: http://www.ibm.com/servers/eserver/iseries/perfmgmt/pdf/SMT.pdf .

IBM i 6.1 Performance Capabilities Reference - January/April/October 2008

 

© Copyright IBM Corp. 2008

Chapter 8 Cryptography Performance

148

Page 148
Image 148
Intel AS/400 RISC Server, 170 Servers manual Additional Information, Supported number of 4764 Cryptographic Coprocessors