CONTENTS Title Page Copyright Page Preface 1 Introduction 1.1 Configuration Overview 1.2 Configuration Program Modes 1.2.1 Selecting the Configuration Mode 1.3 Changing Your Configuration 1.4 Obtaining Help 1.5 Steps in Configuring Your System 1.6 Configuration Considerations 1.6.1 Required Licenses 1.6.2 Network Profiles 2 Using the Configuration Program 2.1 Introduction 2.2 Invoking the Configuration Program 2.3 Common Operations 2.3.1 Entering Information 2.3.1.1 Horizontal Scrolling 2.3.1.2 Data Entry Mode 2.3.2 Moving Within a Section 2.3.3 Moving Between Sections 2.3.4 Keys Used in the Configuration Program 2.3.5 Accessing the Options Menu 2.4 Obtaining Help 2.4.1 Obtaining Help on a Specific Field or Menu Choice 2.4.2 Obtaining General Help 2.4.3 Obtaining Help on the Program 2.5 Creating the Configuration File 2.6 Quitting from the Configuration Program 2.7 Leaving the Configuration Program 2.8 Post-configuration Tasks Part I Basic Configuration Mode 3 Overview of Basic Mode 3.1 Introduction to the Basic Mode 3.2 Configuration Program Structure 3.3 Configuration Sections 4 Required Configuration Data 4.1 Overview 5 Flowcharts and Associated Notes 5.1 Introduction 5.1.1 Creating a New Configuration 5.1.2 Modifying an Existing Configuration 5.1.3 Exiting the Configuration Program 5.2 X.25 over Wide Area Networks 5.3 X.25 over Local Area Networks 5.4 X.25 Client 5.5 PVCs 5.6 Incoming Call Security 5.7 X.29 Support 5.8 X.25 Mail 5.9 NCL Script Part II Advanced Configuration Mode 6 Overview of Advanced Mode 6.1 Introduction to the Advanced Mode 6.2 Configuration Program Structure 6.3 Configuration Sections 7 Required Configuration Data 7.1 Overview 8 Flowcharts and Associated Notes 8.1 Introduction 8.1.1 Creating a New Configuration 8.1.2 Modifying an Existing Configuration 8.1.3 Exiting the Configuration Program 8.2 Remote DTE Classes 8.3 Lines and DTEs 8.4 LLC2 8.5 Session Connections 8.6 PVCs 8.7 Groups 8.8 X.29 Support 8.9 X.25 Mail 8.10 Applications 8.11 Filters 8.12 Templates 8.13 Reachable Addresses 8.14 Security 8.15 Incoming Security: Applications 8.16 Incoming Security: Filters 8.17 Outgoing Security: Local Processes 8.18 NCL Script Part III Configuration Verification and Modification 9 Verifying the Configuration 9.1 Testing Your Configuration 9.1.1 Running the CTP for Loopback Testing 9.1.2 Running the CTP for Remote System Testing 9.2 Preparing to Run the CTP 9.3 Running the CTP 9.3.1 Running the CTP Interactively 9.3.2 Running the CTP as a Network Object 9.4 CTP Test Modes 9.4.1 Receive-Only Mode 9.4.2 Send-Only Mode 9.4.3 Send/Receive Mode 9.5 Testing SVCs and PVCs 9.5.1 Testing SVCs 9.5.2 Testing PVCs 9.5.3 Test Summary 9.6 CTP Failure Reasons 9.6.1 Test Failure 9.6.2 CTP Exits 10 Modifying the Configuration 10.1 Overview of Methods 10.2 Using the Configuration Program 10.3 Editing the User NCL Script Files 10.4 Modifying a Configuration Dynamically 10.5 Discarding a Configuration 10.6 Re-using a Saved Configuration File A Values Specific to Your Configuration B Example Startup Script C Characteristic Values of the `Default' and `OSI Transport' Templates D Configuration Files - Location and Use FIGURES 5-1 Introduction 5-2 X.25 over Wide Area Networks Section 5-3 X.25 over Local Area Networks Section 5-4 X.25 Client 5-5 PVCs Section 5-6 Incoming Call Security 5-7 X.29 Support Section 5-8 X.25 Mail 5-9 NCL Script 8-1 Introduction 8-2 Remote DTE Classes 8-3 Lines and DTEs 8-4 LLC2 DTEs 8-5 Session Connections 8-6 PVCs 8-7 Groups 8-8 X.29 Support 8-9 X.25 Mail 8-10 Applications 8-11 Filters 8-12 Templates 8-13 Reachable Addresses 8-14 Incoming Security: Applications 8-15 Incoming Security: Filters 8-16 Outgoing Security: Local Processes 8-17 NCL Script 9-1 Configuration Test Procedure Flowchart TABLES 1-1 Configurations and License Requirements 2-1 Available Keys 4-1 Configuration Information: X.25 over Wide Area Networks 4-2 Configuration Information: X.25 over Local Area Networks 4-3 Configuration Information: X.25 Client 4-4 Configuration Information: PVCs 4-5 Configuration Information: Incoming Call Security 4-6 Configuration Information: X.29 Support 4-7 Configuration Information: X.25 Mail 6-1 Configuration Sections Applicable to Client and Host-based Systems 7-1 Configuration Information: Remote DTE Classes 7-2 Configuration Information: Lines and DTEs 7-3 Configuration Information: LLC2 7-4 Configuration Information: Session Connections 7-5 Configuration Information: PVCs 7-6 Configuration Information: Groups 7-7 Configuration Information: X.29 Support 7-8 Configuration Information: X.25 Mail 7-9 Configuration Information: Applications 7-10 Configuration Information: Filters 7-11 Configuration Information: Templates 7-12 Configuration Information: Reachable Addresses 7-13 Configuration Information: Incoming Security - Applications 7-14 Configuration Information: Incoming Security - Filters 7-15 Configuration Information: Outgoing Security - Local Processes 9-1 CTP Errors A-1 X.25 over Wide Area Networks A-2 X.25 over Local Area Networks A-3 X.25 Client A-4 PVCs A-5 Incoming Call Security A-6 X.29 Support A-7 X.25 Mail A-8 Remote DTE Classes A-9 Lines and DTEs A-10 LLC2 A-11 Session Connections A-12 PVCs A-13 Groups A-14 X.29 Support A-15 X.25 Mail A-16 Applications A-17 Filters A-18 Templates A-19 Reachable Addresses A-20 Incoming Security: Applications A-21 Incoming Security: Filters A-22 Outgoing Security: Local Processes C-1 Characteristic Values of `Default' and `OSI Transport' Templates D-1 Configuration Files Common to Both Basic and Advanced Modes D-2 Configuration Files Specific to Basic Mode D-3 Configuration Files Specific to Advanced Mode