If you want to know which Cipher suite / TLS protocol is most popular on your LPAR.
You can use SST to find out. So first run STRSST
1. Start a service tool
4. Display/Alter/Dump
1. Display/Alter storage
2. Licensed Internal Code (LIC) data
14. Advanced analysis
then use -connectionCounts:display command
Select Advanced Analysis Command
Output device . . . . . . : Display
Type options, press Enter.
1=Select
Option Command
1 -CONNECTIONCOUNTS:DISPLAY
FLIGHTLOG
ADDRESSINFO
ALTSTACK
AUINFO
AUINTERNALS
and you will get this report
DISPLAY/ALTER/DUMP
Running macro: SSLCONFIG -CONNECTIONCOUNTS:DISPLAY
TLS Connection Counters: Enabled
TLS Protocol Number of Connections
------------ ---------------------
TLSV1.3 0
TLSV1.2 59141
TLSV1.1 0
TLSV1.0 1473
SSLV3 0
TLS Cipher Suite Number of Connections
--------------------------------------- ---------------------
TLS_AES_128_GCM_SHA256 0
TLS_AES_256_GCM_SHA384 0
TLS_CHACHA20_POLY1305_SHA256 0
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 0
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 19327
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 0
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 0
TLS_ECDHE_ECDSA_CHACHA20_POLY1305_SHA256 0
TLS_ECDHE_RSA_CHACHA20_POLY1305_SHA256 0
TLS_RSA_WITH_AES_128_GCM_SHA256 0
TLS_RSA_WITH_AES_256_GCM_SHA384 39810
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 2
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 0
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 0
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 0
TLS_RSA_WITH_AES_128_CBC_SHA256 0
TLS_RSA_WITH_AES_128_CBC_SHA 0
TLS_RSA_WITH_AES_256_CBC_SHA256 2
TLS_RSA_WITH_AES_256_CBC_SHA 1473
TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA 0
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 0
TLS_RSA_WITH_NULL_SHA256 0
TLS_RSA_WITH_NULL_SHA 0
TLS_RSA_WITH_AES_256_CBC_SHA 1473
TLS_RSA_WITH_NULL_SHA 0
TLS_RSA_WITH_NULL_MD5 0