                                             H                     X.25_for_OpenVMS____________________________________!                     Configuration     -                     Order Number: AA-Q2P5B-TE     !                      October 1996                   E                     Revision/Update Information:  This revised manual H                                                   supersedes Part Number>                                                   AA-Q2P5A-TE.  <                     Operating System and Version: OpenVMS[R]  9                     Software Version:              V1.0g.         B                     Digital Equipment Corporation (Australia) Pty.                     Limited.                 J           ________________________________________________________________&           First Printing February 1994           Revision October 1996   ?           The information in this document is subject to change D           without notice and should not be construed as a commitment=           by Digital Equipment Corporation. Digital Equipment C           Corporation assumes no responsibility for any errors that &           may appear in this document.  D           The software described in this document is furnished underE           a license and may be used or copied only in accordance with $           the terms of such license.  B           Possession, use, or copying of the software described inA           this publication is authorized only pursuant to a valid D           written license from Digital or an authorized sublicensor.  A           No responsibility is assumed for the use or reliability B           of software on equipment that is not supplied by Digital<           Equipment Corporation or its affiliated companies.  C           Restricted Rights: Use, duplication, or disclosure by the D           U.S. Government is subject to restrictions as set forth inB           subparagraph (c)(1)(ii)  of the Rights in Technical Data=           and Computer Software clause at DFARS 252.227-7013.   @           Digital Equipment Corporation makes no representationsA           that the use of its products in the manner described in B           this publication will not infringe on existing or futureB           patent rights, nor do the descriptions contained in thisB           publication imply the granting of licenses to make, use,>           or sell equipment or software in accordance with the           description.  :                        Digital Equipment Corporation 19941                               All Rights Reserved 2                               Printed in Australia  A           The postpaid Reader's Comments forms at the end of this @           document request your critical evaluation to assist in)           preparing future documentation.   ;           The following are trademarks of Digital Equipment            Corporation:  1           DEC         DECUS       MUXserver   VAX 8           DEC/CMS     DECstation  OpenVMS     VAXcluster8           DEC/LSEDIT  DECsystems  PDP         VAXstation1           DEC/MMS     DECwindows  P.S.I.      VMS 0           DECnet      DNA         Q-bus       VT1           DECnet-DOS  DTM         TSM         XUI (           DECnet-ULTRILAT         ULTRIX(           DECnet-VAX  MASSBUS     UNIBUS5           DECserver   MCC         UWS         DIGITAL   ;           Alpha, the Alpha logo and the Alpha signature are 6           trademarks of Digital Equipment Corporation.  .           This document is available on CDROM.  E           This document was prepared using VAX DOCUMENT, Version 2.1.                                  C   _________________________________________________________________   C                                                            Contents       C   Preface...................................................     ix      1  Introduction   C         1.1   Configuration Overview........................    1-1 C         1.2   Configuration Program Modes...................    1-1 C         1.2.1     Selecting the Configuration Mode..........    1-3 C         1.3   Changing Your Configuration...................    1-4 C         1.4   Obtaining Help................................    1-4 C         1.5   Steps in Configuring Your System..............    1-4 C         1.6   Configuration Considerations..................    1-5 C         1.6.1     Required Licenses.........................    1-5 C         1.6.2     Network Profiles..........................    1-6   $   2  Using the Configuration Program  C         2.1   Introduction..................................    2-1 C         2.2   Invoking the Configuration Program............    2-1 C         2.3   Common Operations.............................    2-4 C         2.3.1     Entering Information......................    2-4 C         2.3.1.1     Horizontal Scrolling....................    2-5 C         2.3.1.2     Data Entry Mode.........................    2-5 C         2.3.2     Moving Within a Section...................    2-5 C         2.3.3     Moving Between Sections...................    2-5 C         2.3.4     Keys Used in the Configuration Program....    2-7 C         2.3.5     Accessing the Options Menu................    2-8 C         2.4   Obtaining Help................................   2-10 <         2.4.1     Obtaining Help on a Specific Field or MenuC                   Choice....................................   2-10 C         2.4.2     Obtaining General Help....................   2-10 C         2.4.3     Obtaining Help on the Program.............   2-10 C         2.5   Creating the Configuration File...............   2-10 C         2.6   Quitting from the Configuration Program.......   2-13   C                                                                 iii                    E           2.7   Leaving the Configuration Program.............   2-13 E           2.8   Post-configuration Tasks......................   2-14   
     Part I     Basic Configuration Mode         3  Overview of Basic Mode   E           3.1   Introduction to the Basic Mode................    3-1 E           3.2   Configuration Program Structure...............    3-1 E           3.3   Configuration Sections........................    3-3   "     4  Required Configuration Data  E           4.1   Overview......................................    4-1   &     5  Flowcharts and Associated Notes  E           5.1   Introduction..................................    5-1 E           5.1.1     Creating a New Configuration..............    5-2 E           5.1.2     Modifying an Existing Configuration.......    5-2 E           5.1.3     Exiting the Configuration Program.........    5-4 E           5.2   X.25 over Wide Area Networks..................    5-5 E           5.3   X.25 over Local Area Networks.................    5-7 E           5.4   X.25 Client...................................    5-9 E           5.5   PVCs..........................................   5-11 E           5.6   Incoming Call Security........................   5-12 E           5.7   X.29 Support..................................   5-14 E           5.8   X.25 Mail.....................................   5-15        Part II      Advanced Configuration Mode         6  Overview of Advanced Mode  E           6.1   Introduction to the Advanced Mode.............    6-1 E           6.2   Configuration Program Structure...............    6-1 E           6.3   Configuration Sections........................    6-2                  iv                   &         7  Required Configuration Data  I               7.1   Overview......................................    7-1   *         8  Flowcharts and Associated Notes  I               8.1   Introduction..................................    8-1 I               8.1.1     Creating a New Configuration..............    8-1 I               8.1.2     Modifying an Existing Configuration.......    8-2 I               8.1.3     Exiting the Configuration Program.........    8-4 I               8.2   Remote DTE Classes............................    8-5 I               8.3   Lines and DTEs................................    8-6 I               8.4   LLC2..........................................    8-9 I               8.5   Session Connections...........................   8-12 I               8.6   PVCs..........................................   8-13 I               8.7   Groups........................................   8-14 I               8.8   X.29 Support..................................   8-15 I               8.9   X.25 Mail.....................................   8-16 I               8.10  Applications..................................   8-17 I               8.11  Filters.......................................   8-21 I               8.12  Templates.....................................   8-22 I               8.13  Reachable Addresses...........................   8-23 I               8.14  Security......................................   8-24 I               8.15  Incoming Security: Applications...............   8-25 I               8.16  Incoming Security: Filters....................   8-26 I               8.17  Outgoing Security: Local Processes............   8-27 I               8.18  NCL Script....................................   8-28            Part III3         Configuration Verification and Modification   &         9  Verifying the Configuration  I               9.1   Testing Your Configuration....................    9-1 I               9.1.1     Running the CTP for Loopback Testing......    9-1 9               9.1.2     Running the CTP for Remote System I                         Testing...................................    9-2 I               9.2   Preparing to Run the CTP......................    9-2 I               9.3   Running the CTP...............................    9-4 I               9.3.1     Running the CTP Interactively.............    9-4 I               9.3.2     Running the CTP as a Network Object.......    9-4 I               9.4   CTP Test Modes................................    9-4 I               9.4.1     Receive-Only Mode.........................    9-5     I                                                                         v                    E           9.4.2     Send-Only Mode............................    9-6 E           9.4.3     Send/Receive Mode.........................    9-6 E           9.5   Testing SVCs and PVCs.........................    9-6 E           9.5.1     Testing SVCs..............................    9-8 E           9.5.2     Testing PVCs..............................   9-10 E           9.5.3     Test Summary..............................   9-12 E           9.6   CTP Failure Reasons...........................   9-14 E           9.6.1     Test Failure..............................   9-14 E           9.6.2     CTP Exits.................................   9-14   #     10  Modifying the Configuration   E           10.1  Overview of Methods...........................   10-1 E           10.2  Using the Configuration Program...............   10-3 E           10.3  Editing the User NCL Script Files.............   10-5 E           10.4  Modifying a Configuration Dynamically.........   10-6 E           10.5  Discarding a Configuration....................   10-6 E           10.6  Re-using a Saved Configuration File...........   10-6   ,     A  Values Specific to Your Configuration  E           A.1   Basic Mode Configuration Parameter Values.....    A-3 5           A.2   Advanced Mode Configuration Parameter E                 Values........................................    A-7        B  Example Startup Script     6     C  Characteristic Values of the "Default" and "OSI        Transport" Templates   +     D  Configuration Files-Location and Use     	     Index                          vi                            Figures   I               5-1       Introduction..............................    5-1   I               5-2       X.25 over Wide Area Networks Section......    5-6   I               5-3       X.25 over Local Area Networks Section.....    5-8   I               5-4       X.25 Client...............................   5-10   I               5-5       PVCs Section..............................   5-11   I               5-6       Incoming Call Security....................   5-13   I               5-7       X.29 Support Section......................   5-14   I               8-1       Introduction..............................    8-1   I               8-2       Remote DTE Classes........................    8-5   I               8-3       Lines and DTEs............................    8-8   I               8-4       LLC2 DTEs.................................   8-11   I               8-5       PVCs......................................   8-13   I               8-6       Groups....................................   8-14   I               8-7       X.29 Support..............................   8-15   I               8-8       Applications..............................   8-20   I               8-9       Filters...................................   8-21   I               8-10      Templates.................................   8-22   I               8-11      Reachable Addresses.......................   8-23   I               8-12      Incoming Security: Applications ..........   8-25   I               8-13      Incoming Security: Filters ...............   8-26   I               8-14      Outgoing Security: Local Processes........   8-27   I               8-15      NCL Script................................   8-29   I               9-1       Configuration Test Procedure Flowchart....    9-7            Tables  I               1-1       Configurations and License Requirements...    1-5   I               2-1       Available Keys............................    2-7   A               4-1       Configuration Information: X.25 over Wide I                         Area Networks.............................    4-2   B               4-2       Configuration Information: X.25 over LocalI                         Area Networks.............................    4-3   I               4-3       Configuration Information: X.25 Client....    4-4   I               4-4       Configuration Information: PVCs...........    4-4   @               4-5       Configuration Information: Incoming CallI                         Security..................................    4-5   I               4-6       Configuration Information: X.29 Support...    4-5   I                                                                       vii                    8           6-1       Configuration Sections Applicable toE                     Client and Host-based Systems.............    6-3   9           7-1       Configuration Information: Remote DTE E                     Classes...................................    7-1   =           7-2       Configuration Information: Lines and DTEs E                     ..........................................    7-3   E           7-3       Configuration Information: LLC2 ..........    7-5   6           7-4       Configuration Information: SessionE                     Connections...............................    7-8   E           7-5       Configuration Information: PVCs ..........    7-8   E           7-6       Configuration Information: Groups ........    7-9   E           7-7       Configuration Information: X.29 Support...    7-9   E           7-8       Configuration Information: Applications...   7-11   E           7-9       Configuration Information: Filters........   7-12   E           7-10      Configuration Information: Templates .....   7-14   8           7-11      Configuration Information: ReachableE                     Addresses.................................   7-17   7           7-12      Configuration Information: Incoming E                     Security - Applications...................   7-18   7           7-13      Configuration Information: Incoming E                     Security-Filters .........................   7-20   7           7-14      Configuration Information: Outgoing E                     Security - Local Processes ...............   7-23   E           9-1       CTP Errors................................   9-14   E           A-1       X.25 over Wide Area Networks..............    A-3   E           A-2       X.25 over Local Area Networks.............    A-4_  E           A-3       X.25 Client...............................    A-4   E           A-4       PVCs......................................    A-5r  E           A-5       Incoming Call Security....................    A-5:  E           A-6       X.29 Support..............................    A-6   E           A-7       X.25 Mail.................................    A-6   E           A-8       Remote DTE Classes........................    A-7[  E           A-9       Lines and DTEs............................    A-7   E           A-10      LLC2......................................    A-9   E           A-11      Session Connections.......................   A-11_  E           A-12      PVCs......................................   A-11b  E           A-13      Groups....................................   A-12   E           A-14      X.29 Support..............................   A-12l       viii u  a              I               A-15      X.25 Mail.................................   A-13   I               A-16      Applications..............................   A-13e  I               A-17      Filters...................................   A-14f  I               A-18      Templates.................................   A-15n  I               A-19      Reachable Addresses.......................   A-17o  I               A-20      Incoming Security: Applications...........   A-17z  I               A-21      Incoming Security: Filters................   A-18t  I               A-22      Outgoing Security: Local Processes........   A-18   >               C-1       Characteristic Values of "Default" andI                         "OSI Transport" Templates.................    C-1.  @               D-1       Configuration Files Common to Both BasicI                         and Advanced Modes........................    D-1   =               D-2       Configuration Files Specific to BasicaI                         Mode......................................    D-2   @               D-3       Configuration Files Specific to AdvancedI                         Mode......................................    D-3b                                    I                                                                        ix  s                           I         _________________________________________________________________f  I                                                                   Preface       D               This guide explains how to configure X.25 for OpenVMS.           Audience  I               This guide is intended for use by anyone who is configuring'G               an X.25 system for the first time, or is reconfiguring ant               existing system.  C               This manual assumes that you understand and have some                experience of:  +               o  Local Area Networks (LANs)   *               o  Wide Area Networks (WANs)  $               o  X.25 communications  @               The configuration program can be run in two modes:B               basic mode, and advanced mode. To run the utility inD               advanced mode, you should have a good understanding ofH               Enterprise Management Architecture (EMA) entities, and theF               relationship between those entities. Such information is?               given in the  X.25 for OpenVMS- Management Guide.r           Structurer  E               The guide consists of ten chapters and four appendices:b  H               o  Chapter 1 outlines the modes in which the configurationG                  program can be used to configure a system and explains_B                  the areas you need to consider before you run the                  utility.     I                                                                        ix. .                 @           o  Chapter 2 details how to run the utility and how toA              access help information, and provides details of the.B              keys that can be used while running the configuration              program.   B           Chapters 3 to 10 are divided logically into three Parts:  C           o  Part I details how to run the configuration program in 7              basic mode. It consists of three chapters:.  =              -  Chapter 3 provides an overview of running the.A                 configuration program in basic mode and describes.=                 each of the available configuration sections..  B              -  Chapter 4 details the data that you need to obtain+                 before running the utility..  D              -  Chapter 5 provides flowcharts to illustrate the flowD                 of data entry and data required within each section.D                 Each flowchart is accompanied by a set of associated                 notes.  D           o  Part II details how to run the configuration program in:              advanced mode. It consists of three chapters:  =              -  Chapter 6 provides an overview of running the D                 configuration program in advanced mode and describes=                 each of the available configuration sections..  B              -  Chapter 7 details the data that you need to obtain+                 before running the utility..  D              -  Chapter 8 provides flowcharts to illustrate the flowD                 of data entry and data required within each section.D                 Each flowchart is accompanied by a set of associated                 notes.  E           o  Part III details how to verify the configuration created C              and how to modify an existing configuration. This Part &              consists of two chapters:  A              -  Chapter 9 explains how to test your configuration =                 using the Configuration Test Procedure (CTP)..  =              -  Chapter 10 explains how to modify an existing @                 configuration, that is, to reconfigure a system.       xt                   )               o  The four appendices are:d  H                  -  Appendix A contains a series of blank forms in whichH                     you can write the values of configuration parameters,                     specific to your system.  E                  -  Appendix B contains an example configuration file :                     produced by the configuration program.  E                  -  Appendix C lists the characteristic values of theiC                     parameters in the "Default" and "OSI Transport"a                     templates.  D                  -  Appendix D lists the location and use of each ofF                     the configuration files either created as a resultE                     of running the configuration program in basic and.@                     advanced modes or supplied with the product.  G               At the end of this manual are two Reader's Comment forms..F               If you have any suggestions or criticisms that you thinkH               would improve this manual, please fill in one of the forms'               and return it to Digital.o            Associated Documentation  #               Product Documentation.  I               The following manuals in the X.25 for OpenVMS documentationu4               set may be useful to network managers.  4               -   X.25 for OpenVMS- Management Guide  H                  This manual describes how to manage and monitor an X.25H                  system, and details the tools provided to administer an                  X.25 system.   2               -   X.25 for OpenVMS- Security Guide  F                  This manual describes the X.25 Security model and the8                  tasks required to manage X.25 Security.  9               -   X.25 for OpenVMS- Problem Solving Guide.  G                  This manual provides guidance on how to solve problems.7                  that may occur when using the product.   .               -   X.25 for OpenVMS- Accounting  D                  This manual describes how to use X.25 Accounting toG                  obtain performance records and information on how X.25 .                  is being used on your system.  I                                                                        xi.    -              !           NCL Command Information.  A           Detailed information on Network Control Language (NCL),.B           which is used to manage an X.25 network, is given in the           following manual:.  ;           o   DECnet/OSI-Network Control Language Reference.       Conventions8  ;           The following conventions are used in this guide:.  C           UPPERCASE and    The OpenVMS[R] Alpha[R] operating system.C           lowercase        does not differentiate between lowercase.D                            and UPPERCASE characters. Literal strings@                            that appear in text, examples, syntaxB                            descriptions, and function descriptionsE                            can be entered using UPPERCASE characters, D                            lowercase characters, or a combination of                             both.  A           user input       In interactive examples, user input isc/                            shown in bold print..  C           system output    This typeface is used in interactive andaC                            code examples to indicate system output. E                            In text, this typeface is used to indicaten?                            the exact name of a command, option,uC                            partition, pathname, directory, or file.   D           $                In this manual, a dollar sign ($) is used@                            to represent the default user prompt.  E           <Ctrl/X>         In procedures, a sequence such as <Ctrl/X> D                            indicates that you must hold down the keyD                            labelled Ctrl while you press another key7                            or a pointing device button..  =           <Return>         In procedures, a key name is shown.B                            enclosed to indicate that you press the=                            corresponding key on the keyboard.              xii                          I                                                                         1.I         _________________________________________________________________.  I                                                              Introduction     H               X.25 for OpenVMS needs to be configured before your systemH               can communicate with remote systems via a Packet Switching"               Data Network (PSDN).  D               This chapter provides an overview of the configurationD               process, and outlines the steps you should take before0               running the configuration program.  "         1.1 Configuration Overview  E               After installing X.25 for OpenVMS it must be configured0E               specifically for your system. X.25 for OpenVMS provides0@               a configuration program that enables you to defineE               configuration parameter values specific to your system. D               The program generates an NCL script containing the NCLC               commands necessary to set up your X.25 configuration. F               The X.25 startup script starts processes and initializes)               databases required by X.25.n  D               When invoked, the X.25 startup script executes the NCLE               script. An NCL script is a series of NCL commands, each E               of which relates to a specific aspect of configuration.aE               To make each script more readable, the NCL commands are G               interspersed with comments that indicate what actions thetG               subsequent NCL commands perform. An example NCL script is "               shown in Appendix B.  '         1.2 Configuration Program Modes.  I               The configuration program, which is supplied as the utilitySH               x25$configure, can be run in one of two modes to configure               a system:   D               o  basic mode, which is used to create a basic workingB                  configuration. This mode provides a mechanism forI                  configuring a system, without the need to have knowledge.F                  of, or understand, Enterprise Management Architecture  I                                                          Introduction 1-1. .  .           Introduction#     1.2 Configuration Program Modes.    @              (EMA) entities. Full details of using this mode are+              given in Part I of this guide.   @           o  advanced mode, which is used to create more complexD              working configurations. This mode of operation requiresC              you to have a good understanding and working knowledge.A              of EMA entities. Full details of using this mode are.,              given in Part II of this guide.                                                                               1-2 Introduction .  .      I                                                              Introduction.I                                           1.2 Configuration Program Modese    .         1.2.1 Selecting the Configuration Mode  F               The configuration mode you need to choose depends on the>               type of X.25 configuration you want to generate.  0               A basic configuration consists of:  H               o  One DTE connected to a PSDN, with X.25 Mail and/or X.29D                  operating over that connection. The use of PVCs andB                  DECnet OSI Transport services are also supported.                    oro  E               o  One or more DTEs configured to run over a single LANlH                  device, with X.25 Mail and/or X.29 operating over thoseF                  connections. The use of PVCs and DECnet OSI Transport-                  services are also supported.                     oro  F               o  One X.25 client system connected to one or more PSDNsE                  via one or more gateways, with X.25 Mail and/or X.29o0                  operating over that connection.  @               If one of these configurations satisfies your X.25E               requirements, then the basic mode will be sufficient to $               configure your system.  <               If, however, you require any of the following:  4               o  more than one connection to a PSDN;  G               o  connections to a Local Area Network over more than onei                  LAN device;  <               o  both a WAN connection and a LAN connection;  2               o  more than one X.25 client system;  G               o  your own X.25 or X.29 applications to service incoming                   X.25 calls; or.  +               o  Closed User Group support,   H               then you will need to use the advanced mode to create your!               X.25 configuration..  F               Note that any configuration data entered using the basicA               mode is available when the configuration program is F               subsequently run using the advanced mode. Therefore, youE               can create a simple configuration using basic mode, and   I                                                          Introduction 1-3                 Introduction#     1.2 Configuration Program Modes     @           then add to it by running the advanced mode (using the<           "Modify an existing configuration script" option).  #     1.3 Changing Your Configuration   E           To allow flexibility, configurations need to be modified on 0           either a temporary or permanent basis.  C           X.25 for OpenVMS provides a number of methods in which an C           existing configuration can be modified. These methods aree!           detailed in Chapter 10..       1.4 Obtaining Help  B           A comprehensive Help facility is available in both basicB           and advanced mode and can be used if further informationC           is required while running the configuration program. FullyA           details of the help facility available in each mode areT           given in Chapter 2..  (     1.5 Steps in Configuring Your System  4           To configure your X.25 for OpenVMS system:  E           1. Plan your configuration. As part of this task you should ?              take note of the information given in Section 1.6.   D              Time spent planning your configuration will obviate theB              need to perform major or constant reconfigurations at              later stages.  <           2. Record the information you will need during theE              configuration program. Tables are provided in Appendix A               for this purpose.  ?              For the basic mode, use Chapter 3 and Chapter 4 toT0              determine the information required.  B              For the advanced mode, use Chapter 6 and Chapter 7 to0              determine the information required.  B           3. Run the configuration program in either basic mode orD              advanced mode (refer initially to Chapter 2 and then toE              Chapter 3 (basic mode) or to Chapter 6 (advanced mode))..       1-4 Introduction           I                                                              Introduction.I                                          1.6 Configuration Considerations.    (         1.6 Configuration Considerations  >               This section introduces aspects of your proposedD               configuration that you need to consider before you run(               the configuration program.           1.6.1 Required Licenses   D               Systems running X.25 for OpenVMS have direct access toG               one or more PSDNs conforming to CCITT recommendation X.25.H               and to ISO standards 7776 and 8208, or to communicate with/               another node on the LAN via LLC2.i  F               In addition, X.25 for OpenVMS allows OpenVMS[R] Alpha[R]B               systems on a DECnet/OSI for OpenVMS Alpha network toH               connect to PSDNs through one or more connector nodes. ThisG               enables communication between the X.25 for OpenVMS system                and a remote DTE.   F               To run X.25 for OpenVMS you must have one or both of the!               following licenses:i  .               o  DECnet/OSI for OpenVMS Alpha;  "               o  X.25 for OpenVMS.  H               The type(s) of X.25 system you can configure depend on theF               license(s) that you have installed. Table 1-1 summarizesF               the possible configurations and the licenses required to               run them.   I               Table_1-1_Configurations_and_License_Requirements__________   I               License(s)____________Possible_X.25_Configurations_________i  2               DECnet/OSI for        CONS over LLC26               OpenVMS Alpha only    CLNS over DEC-HDLC  A               X.25 for OpenVMS      X.25 over Local Area Networksg@               only                  X.25 over Wide Area NetworksI               ______________________X.25_Client_(via_a_connector_node)___         I                                                          Introduction 1-5X    m           Introduction$     1.6 Configuration Considerations         1.6.2 Network Profiles  >           A network profile contains all the pertinent network@           parameters for a specific X.25 network. For example, aB           profile contains the default value and permissible range#           for the X.25 window size.e                                                                                   1-6 Introduction                         I                                                                         2 I         _________________________________________________________________   I                                           Using the Configuration Program              2.1 Introduction  C               This chapter explains how to invoke the configuration @               program and provides details on the facilities andA               keys that are available to help you to complete thet               configuration.  D               If you have not already done so, you should record theA               required configuration parameter values. Details ofmB               the Configuration Program Sections required for X.25E               for OpenVMS systems are given in Chapter 3 (basic mode)mD               and Chapter 6 (advanced mode). Details of the requiredF               configuration parameters for each Section in the programI               are given in Chapter 4 (basic mode) and Chapter 7 (advancedhA               mode). It is recommended that you do not invoke theeF               configuration program unless you have values for each of4               the required configuration parameters.  F                 ________________________ Note ________________________  E                 Throughout this and subsequent chapters, reference ispF                 made to the keys available on a DEC terminal (VT200 or                 higher).  E                 Refer to Section 2.3.4 for keys that are supported onr)                 this and other terminals.r  F                 ______________________________________________________  .         2.2 Invoking the Configuration Program  /               To run the configuration program:   9               1. Log in to a suitably privileged account.n  D               2. Invoke the configuration program in either basic or                  advanced mode.r  I                                       Using the Configuration Program 2-1t .         #     Using the Configuration Program *     2.2 Invoking the Configuration Program    E              To invoke the configuration program in basic mode, enter               the command:o  /              $ @sys$startup:x25$configure basic   B              To invoke the configuration program in advanced mode,              enter the command:   2              $ @sys$startup:x25$configure advanced                or   )              $ @sys$startup:x25$configurei  E           When the configuration program is invoked (in either mode), C           the wide area network device driver configuration utilitya>           (WANDD$CONFIGURE) is run. This utility allows you toC           configure the synchronous device drivers to permit directf>           connection to a wide area network via a serial port.  ?           o  If WANDD has not been configured, you are promptedi5              whether to configure the device drivers.t  C           o  If WANDD has been configured, you are prompted whether /              to reconfigure the device drivers.   >           In both cases, you are then prompted whether to loadA           the WANDD management software and the auto-configurablec           synchronous devices.  A           If you select to load the auto-configurable synchronousrD           devices, you are further prompted whether to configure the7           built-in serial port as a synchronous device.   C           An example showing these prompts and example responses is            given below.  &           $ @sys$startup:x25$configure  /             Configuring WANDD... ['?' for HELP]   K           %WANDD$CONFIGURE-I-WANDDNOTCONFIG, WANDD has not been configured.d)           Configure WANDD? [YES] <Return>u$           Load WANDD? [YES] <Return>  C             All installed synchronous devices will be automaticallyaE             configured.  However, the built--in serial port will only *             be configured at your request.  G           Configure built-in serial port as synchronous? [YES] <Return>a  '     2-2 Using the Configuration Program            I                                           Using the Configuration Program I                                    2.2 Invoking the Configuration Program     ,               ! SYS$STARTUP:WANDD$CONFIG.DAT<               ! Created by SYSTEM on 10-FEB-1994 14:28:09.02               ! !               load_wandd      YESe!               load_zrdriver   YES                ! 3               ! End of SYS$STARTUP:WANDD$CONFIG.DAT.  A               Are you satisfied with your answers? [YES] <Return>hF               %NET-I-LOADED, executive image X25$KERNEL_RTL.EXE loaded?               %NET-I-LOADED, executive image X25$MEL.EXE loaded >               %NET-I-LOADED, executive image X25$L2.EXE loaded>               %NET-I-LOADED, executive image X25$L1.EXE loaded  @               %SYSMAN-I-OUTPUT, command execution on node SPTENZB               %IOGEN-I-PREFIX, searching for ICBM with prefix SYS$B               %IOGEN-I-PREFIX, searching for ICBM with prefix X25$L               %IOGEN-I-SCSIPOLL, scanning for devices through SCSI port PKA0L               %IOGEN-I-SCSIPOLL, scanning for devices through SCSI port PKB0K               %RUN-S-PROC_ID, identification of created process is 00000092d  :                 Available Synchronous Communication Ports:  ,                       1.  ZRA0   -  SSCC-0-0  )               Press RETURN to continue...e  F               Once WANDD$CONFIGURE has been run, the initial screen of:               the X.25 configuration program is displayed.                                I                                       Using the Configuration Program 2-3            #     Using the Configuration Program      2.3 Common Operationss         2.3 Common Operations   E           The configuration program consists of a number of Sections,e?           each corresponding to a logical group of information.m  @           Most Sections are optional, that is you do not have toC           enter information unless you want to. Such Sections begine&           with a question in the form:  $           "Do you want to set up X?"  >           If you respond "Yes" to the prompt, the rest of that>           Section is presented to allow you to complete it. IfA           you respond "No" to the prompt, the next new Section iscD           presented. You can decide at a later stage to complete any;           Section that you bypass (refer to Section 2.3.5).   >           Each Section commences with a screen of introductoryE           information and is followed by one or more screens on whichrD           you can enter data. Each data entry screen contains one orB           more fields in which you can enter data. Some fields are)           mandatory, others are optional.        2.3.1 Entering Information  )           You can enter data in two ways:   D           o  By selecting an option from a displayed menu. To selectB              an option, move the cursor over that option using the?              arrow keys (refer to Section 2.3.4) and then pressO              <Return>.  D           o  By entering data in a field. To enter data, move to theA              field (refer to Section 2.3.4), key in the data, and !              then press <Return>.n  ?           When you have entered all the required information on @           a screen, a new screen is automatically displayed. YouB           cannot move to a new screen until you have completed all5           the mandatory fields on the current screen.u          '     2-4 Using the Configuration Program. f  O      I                                           Using the Configuration ProgrameI                                                     2.3 Common Operations     $         2.3.1.1 Horizontal Scrolling  I               Usually, when you enter data into a field, all the data you5E               enter is displayed. However, in some cases, the maximumsC               number of data characters you are allowed to enter is C               greater than the length of the field displayed on the A               screen. In such cases, the entered data will scroll F               horizontally when you have entered the maximum number of/               characters that can be displayed.e  I               Note that horizontal scrolling works only if the data entryaA               screen is in Insert mode. Refer to Section 2.3.1.2.x           2.3.1.2 Data Entry Mode   I               By default, each data entry screen is invoked in Overstrike F               mode. In this mode, any characters entered overwrite anyH               characters currently displayed in the data entry field. IfI               required, a data entry screen can be placed in Insert mode.aD               In this mode, any characters entered are inserted intoH               the characters currently displayed; any previously enteredH               characters are moved to the right. To change from one modeI               to the other, press <Ctrl/A>. The current mode is displayedtF               in the upper right-hand corner of the data entry screen.  %         2.3.2 Moving Within a Sectiont  F               To move backwards within a Section to a previous screen,D               press <Prev Screen>. You are allowed to move backwardsI               within a Section whether you have completed all the screensuE               in that Section or not. However, you can move backwardsg=               only as far as the first screen of the Section.d  F               If you have moved back to look at completed screens, youG               can move forward again by pressing <Next Screen>. You cannE               only move forward until you reach an incomplete screen. H               The mandatory fields on the incomplete screen must then be)               completed before moving on.e  %         2.3.3 Moving Between Sections   I               The methods available for moving between Sections depend onyH               whether you are running the configuration program in basicH               or advanced mode and whether you are creating or modifying               a configuration.  I                                       Using the Configuration Program 2-5     C      #     Using the Configuration Programe     2.3 Common Operations                Basic Mode  E           When creating a configuration, the next uncompleted SectionwA           is displayed automatically when the current Section hasn           been completed.n  ;           When the last Section (the NCL Script Section) iso?           displayed, you are prompted whether to create the NCLtC           script or review/modify the information you have entered.oA           Entering "No" to this prompt displays the Sections Menug?           from which you can select a Section to be reviewed ort           modified..  @           When modifying a configuration, a specific Section canB           be selected from the Sections Menu. The Sections Menu isC           displayed automatically after you select the type of X.25nB           connection required, or can be accessed from the OptionsD           Menu of the current Section by selecting the option "Go to2           Sections Menu" (refer to Section 2.3.5).             Advanced Modem  E           When creating a configuration, an Options Menu is displayed9D           when you complete the last data entry screen in a Section.>           This menu includes options that allow you to move toA           the next uncompleted Section or to move to a previously 4           completed Section (via the Sections Menu):  @           o  To move to the next uncompleted Section, select the0              option "Continue to a new section".  B           o  To move to a previously completed Section, select the*              option "Go to Sections Menu".  :           Full details of the Options Menu are provided in           Section 2.3.5.  @           When modifying a configuration, a specific Section canB           be selected from the Sections Menu. The Sections Menu isD           displayed automatically after you select the option ModifyC           an existing configuration script, or can be accessed fromaB           the Options Menu of the current Section by selecting the@           option "Go to Sections Menu" (refer to Section 2.3.5).    '     2-6 Using the Configuration Program            I                                           Using the Configuration ProgramiI                                                     2.3 Common Operationsf    4         2.3.4 Keys Used in the Configuration Program  C               Table 2-1 lists the keys you can use when running thelE               configuration program in either basic or advanced mode.l  F               Note that if your terminal does not support cursor keys,G               you cannot move between fields and therefore you will not.9               be able to run the configuration procedure.i  E               To use the cursor keys, you must ensure that the "TERM"mG               environment variable is set correctly so that it reflectsf*               the terminal being emulated.  F               To set the TERM environment variable, enter the command:  0                    SET TERM/DEVICE=terminal_type  C               where terminal_type is specified as vt300, vt200 etc.e  F                 ________________________ Note ________________________  A                 If you intend to run the configuration program ineB                 a DECterm window, the terminal type must be set to8                 vt320. To set the correct terminal type:  >                 1. Display the General Options pull-down menu.  D                 2. Select VT300 Mode, 7--Bit Control and Terminal ID                    VT320 ID.                   3. Select OK  F                 ______________________________________________________  I               Table_2-1_Available_Keys___________________________________   $               DEC Terminal (VT200 orI               higher)_Keys__________________Function_____________________                  Movement Keyso  G               UP and DOWN arrow keys        Moves cursor between fieldso  G               LEFT and RIGHT arrow keys     Moves cursor within a field   E               <Prev Screen> or <Ctrl/P>     Takes you to the previousVI                                             screen in the current sectionT  I                                                  (continued on next page)t  I                                       Using the Configuration Program 2-7            #     Using the Configuration ProgramS     2.3 Common Operations     E           Table_2-1_(Cont.)_Available_Keys___________________________               DEC Terminal (VT200 orE           higher)_Keys__________________Function_____________________r  D           <Next Screen> or <Ctrl/N>     Takes you to the next screen>                                         in the current section  D           <F12> or <Ctrl/E>             Moves cursor to end of input-                                         field   @           <Ctrl/H>                      Moves cursor to start of3                                         input fielda             Edit Keys   >           <Return>, <Select> or         Enters/Selects a value           <Enter>   E           <Remove> or <Ctrl-U>          Deletes all characters from a_-                                         field_  B           <Delete>                      Deletes previous character             Action Keys   D           <Help> or <Ctrl/K>            Provides help on the current-                                         fieldo  E           <F9> or <Ctrl/R>              Return to Procedure Help menu   1           <F10> or <Ctrl/Z>             Exit Helpc  ,           <F8> or <Ctrl/Z>              Quit  E           <F14> or <Ctrl/A>             Toggle Insert/Overstrike Mode   E           <Ctrl/W>______________________Redraw_screen________________   $     2.3.5 Accessing the Options Menu  ,           An Options Menu is displayed when:  :           o  you review/modify a Section in basic mode; or  A           o  you complete the last data entry screen of a Section D              while creating or modifying a Section in advanced mode.  @           Generally, the Options Menu for a Section provides the           following choices:  '           o  Continue to a new section;              o  Add / Enable an X;_  '     2-8 Using the Configuration Program_ _  _      I                                           Using the Configuration ProgramaI                                                     2.3 Common Operations                    o  Modify an X;   )               o  Delete/Disable an X; anda  %               o  Go to Sections Menu,   >               where X is the item you created in that Section.  I               For example, the Remote DTE Class Options Menu provides the                 following choices:  +               o  Continue to a new section;h  (               o  Add a Remote DTE Class;  +               o  Modify a Remote DTE Class;i  /               o  Delete a Remote DTE Class; andh  %               o  Go to Sections Menu.e  D               To perform an action, select one of the options on theD               Options Menu. The options have the following meanings:  '               Continue to a new sectionc  @               Choose this option when you have finished enteringA               or amending information in the current Section. ThedE               configuration program then displays the first screen inN+               the next uncompleted Section.                  Add an X  C               Choose this option to add another item to the currentb               Section.                 Modifying an X  I               Choose this option to modify some or all of the information /               previously entered about an item.                  Delete an X_  A               Choose this option to delete an item in the currentu               Section.  !               Go to Sections Menur  H               Choose this option to display the Sections Menu. SelectingG               a Section from the Sections Menu will display the Options #               Menu of that Section.   I                                       Using the Configuration Program 2-9     n      #     Using the Configuration Programi     2.4 Obtaining Help         2.4 Obtaining Help  E           You can get help at any time during the program by pressingm?           the <Help> key. The level of help you receive depends >           on where the cursor is positioned when you press theC           <Help> key. Subsections Section 2.4.1, Section 2.4.2, ando2           Section 2.4.3 detail each level of help.  ;     2.4.1 Obtaining Help on a Specific Field or Menu Choicei  A           If you press <Help> while the cursor is on a particularwB           field or menu choice, lines of text will appear near theE           bottom of the screen. This will tell you what sort of valueuD           is expected in that field, or what the implications are of:           making that choice if further help is available.  B           If you press <Help> again and further help is available,D           the screen will be replaced by further information on thatD           field or menu choice. Press <F10> to leave Help and returnA           to the screen from which you pressed <Help> originally.o        2.4.2 Obtaining General Help  >           If you press <Help> while on any of the introductoryE           screens, the screen will be replaced by general information D           on that section. For example, pressing <Help> while on theC           NCL introduction screen will bring up general information )           on NCL script and NCL commands.e  '     2.4.3 Obtaining Help on the Program   E           You can get help on the configuration program (for example,[D           what keys you can use, how to navigate between screens) byC           pressing <Help> while you are on any other Help screen. A C           list of topics is presented from which you can select thecC           item of interest. Press <F10> to leave Help and return tov>           the screen from which you pressed <Help> originally.  '     2.5 Creating the Configuration File   E           The final Section in the configuration program, NCL Script, C           allows you to initiate the generation of the relevant NCL E           script for the configuration file from the information held (           in the configuration database.  (     2-10 Using the Configuration Program F  D      I                                           Using the Configuration Program I                                       2.5 Creating the Configuration File     E               This Section can be accessed in either of the following                ways:i  E               o  by selecting the NCL Script option from the Sectionse                  Menu; or.  H               o  by completing the penultimate Section and selecting theH                  Continue to a new section option from the Options Menu.  G               When the NCL Script Section is accessed, you are promptedSI               whether to create the NCL script immediately or modify yourI               answers:  6                  "Do you want to modify your answers?"  C               To create the NCL script, enter No in response to the                prompt.r  H               If you want to return to any of the completed Sections andF               modify the existing data before creating the NCL script,G               enter Yes in response to the prompt. The Sections Menu ist               redisplayed.  G               To quit from the configuration program without generating 2               an NCL script, refer to Section 2.6.  H               During the creation of the NCL script a number of messagesF               are displayed on the screen and a number of system files               are created:  5               SYS$SYSTEM:X25$SECURITY_IDENTIFIERS.COM   >                      This command procedure creates the rights?                      identifiers required based on the securitys+                      information you enter.   &               SYS$SYSTEM:MODPARAMS.DAT  F                      This file is modified only if you have configuredB                      X.25 Client and the number of session controlE                      connections is changed. It contains values for afE                      number of system parameters, based on the numbersG                      of session control connections specified. Refer to !                      Section 2.8.c  I                                      Using the Configuration Program 2-11     t      #     Using the Configuration Program)'     2.5 Creating the Configuration Filet      -           SYS$STARTUP:X25$SESSION_STARTUP.COM   ;                  This command procedure defines the process D                  parameters for the X.25 for OpenVMS Session ControlE                  Process. It is run when X.25 for OpenVMS is invoked.o  *           SYS$STARTUP:X25$APPL_STARTUP.COM  ;                  This command procedure defines the process @                  parameters for the X.25 for OpenVMS ApplicationE                  Process. It is run when X.25 for OpenVMS is invoked.   (           SYS$STARTUP:X25$MAIL_SETUP.COM  @                  This command procedure creates the user accountC                  in which X.25 Mail will run. It is created only if C                  the X.25 Utilities Section is completed and is runt;                  before you exit the configuration program.f  B           The command procedure, X25$SECURITY_IDENTIFIERS.COM, canD           be run prior to leaving the configurator. When the commandD           procedure is created, you are prompted whether to run that           procedure.  D           Finally, the Main Menu is redisplayed to allow you to exit$           the configuration program.  @           If, for some reason, the program cannot create the NCLB           script, an error message is displayed at the foot of theB           screen. This may occur if, for example, a file cannot beD           created due to incorrect permissions. You must correct theC           problem before making a further attempt to create the NCL            script.   !           To correct the problem:d  5           1. Press <Return> to display the Main Menu.d  1           2. Select the option Exit this program.o             3. Rectify the error.f  .           4. Re-run the configuration program.  ?           5. Select the option Modify an existing configurationd              script.  ;           6. Access the NCL Section from the Sections Menu.   (     2-12 Using the Configuration Program y  f      I                                           Using the Configuration ProgramiI                                       2.5 Creating the Configuration Filee    1               7. Select to create the NCL script.   F               8. If the course of action detailed in steps 1 to 7 doesF                  not rectify the problem, please report the problem toD                  Digital by submitting a Software Performance Report                  (SPR).d  3         2.6 Quitting from the Configuration Programo    G                 _______________________ Caution _______________________t  C                 Quitting from the configuration program will deleteo@                 all information entered since the NCL script wasE                 last created or since the configuration data was lastaE                 saved. This action should therefore be performed onlyu>                 if you do not want to retain the entered data.  F                 ______________________________________________________  H               To quit from the configuration program without creating an               NCL script:u                 1. Press <F8>.  G                  A warning message is displayed and you are prompted to I                  confirm that you want to quit the configuration program.o  E               2. To quit the program, enter Yes. The system prompt isn                  redisplayed.B  D                  To return to the program, enter No. The screen fromE                  which you chose to quit the configuration program isg                  redisplayed.   -         2.7 Leaving the Configuration Programt  <               Once the configuration program has created theE               configuration file containing the NCL scripts, the Main "               Menu is redisplayed.  H               To leave the configuration program, select the option Exit               this program.t    I                                      Using the Configuration Program 2-13r    t      #     Using the Configuration Program       2.8 Post-configuration Tasks          2.8 Post-configuration Tasks  >           After configuring your system you should perform the           following tasks:  B           1. If you changed the number of session connections, runE              the Autogen utility and reboot your system. For example, C              these actions can be performed by issuing the command:a  >                  @SYS$UPDATE:AUTOGEN SAVPARAMS REBOOT FEEDBACK  D              Further details about configuring the number of session:              control connections are given in Section 8.5.  =           2. Ensure that the NSP attributes maximum transport B              connections and maximum remote nsaps are large enoughC              to support the number of session connections required. C              The default values of these attributes are 200 and 201               respectively.  B           3. If you have run the configurator in Basic mode, grant@              the rights identifier X25_OUTGOING_ALL to all usersD              and processes that are to be permitted to make outgoing              calls.                                           (     2-14 Using the Configuration Program C  i      I                                           Using the Configuration Program I                                              2.8 Post-configuration Taskst    ?               4. For compatibility with VAX P.S.I., a number of C                  logicals have been provided (but commented out) in F                  SYS$STARTUP:X25$STARTUP.COM. Details of the available@                  logicals are provided in the  X.25 for OpenVMS->                  Management Guide. To use these logicals, editG                  X25$STARTUP.COM and remove the comment characters that &                  precede the logicals.  I               5. Run the command procedure SYS$STARTUP:X25$STARTUP.COM to (                  execute the NCL script.                                                                      I                                      Using the Configuration Program 2-15t C  i                    I                                                                    Part I I         _________________________________________________________________             Basic Configuration Mode o  u                    I                                                                         3 I         _________________________________________________________________o  I                                                    Overview of Basic Modem    *         3.1 Introduction to the Basic Mode  G               The basic mode of the configuration program allows you toTE               configure a working X.25 system without needing to haveTG               any knowledge of Enterprise Management Architecture (EMA)dB               entities and the relationship between such entities.  I               To use the basic mode, you only need to have a knowledge ofiI               the network components of your system and a basic knowledgeuF               of X.25. If you are new to X.25 and you have not alreadyD               done so, you are encouraged to read the DECnet/OSI forG               OpenVMS-Introduction, Planning, and Glossary before using (               the configuration program.  +         3.2 Configuration Program Structure_  ?               The configuration program consists of a number ofvE               Configuration Sections, each Section corresponding to aeF               specific function. The following Sections are available:  .               1. X.25 over Wide Area Networks;  /               2. X.25 over Local Area Networks;o                 3. X.25 Client;                  4. PVCs;  (               5. Incoming Call Security;  "               6. X.29 Support; and                 7. X.25 Mail.u  I               You do not need to complete each of the available Sections;TD               you only need to complete the Sections relevant to theE               configuration that you want to set up. For example, youoI               might only want to configure X.25 Client and security. Note I               that only one of the first three Sections can be completed._  I                                                Overview of Basic Mode 3-1s _  _           Overview of Basic Mode'     3.2 Configuration Program Structurel    ?           The data required to complete a configuration depends A           on the Sections to be completed. Details explaining the C           purpose of each Section are given in Section 3.3 and full B           details about the data required to complete each Section!           are given in Chapter 4.                                                                                      3-2 Overview of Basic Mode v  e      I                                                    Overview of Basic ModecI                                                3.3 Configuration SectionsD    "         3.3 Configuration Sections  *               X.25 over Wide Area Networks  D               This Section allows you to enter details about an X.25H               network to which your system is attached. You must provideB               the profile name, DTE address, outgoing and incomingD               channel number ranges, and synchronous line associated:               with the DTE connected to the named network.  +               X.25 over Local Area Networks_  D               This Section allows you to enter details about each ofE               the LAN-based remote hosts you want to access from this H               system. You must select a LAN device to be used by all theG               LAN remote hosts. For each remote host you name, you musttE               provide the DTE address and remote Media Access ControleE               (MAC) address associated with each DTE connected to the G               LAN. A profile does not need to be specified as it is setn               to ISO8881.o                 X.25 Client   D               This Section allows you to enter details about an X.25G               network to which your system is attached and the gatewaysO<               used by the specified network to access PSDNs.                 PVCs  E               This Section allows you to define one or more Permanent B               Virtual Circuits (PVCs). Your PSDN subscription willE               determine whether you are permitted to set up any PVCs.lF               For each PVC you name you must specify a channel number.  H               This Section is not presented if you configure your system               for X.25 Client.  $               Incoming Call Security  F                 ________________________ Note ________________________  D                 Digital strongly recommends that you set up incomingF                 security to protect your system from unauthorised use.  F                 ______________________________________________________  G               This Section allows you to select the type of security tooI               be applied to your X.25 system. One of three options can bee               selected:   +               o  allow all incoming access;e  -               o  allow no incoming access; or   I                                                Overview of Basic Mode 3-3e i  p           Overview of Basic Mode     3.3 Configuration Sections    (           o  restricted incoming access.  ?           If restricted incoming access is selected, remote DTEmB           addresses must be entered for each remote DTE that needsA           to make an incoming call. The remote DTE addresses musto?           be categorized and entered in one of two Access Levelu+           categories: Remote Charge or All.u             X.29 Support  @           X.29 support will be configured on your system so that>           remote users can access the local system via an X.25@           network and local users can access a remote system viaA           an X.25 network. If required, you can specify a NetworkHB           User Identity (NUI) to identify the party that is to pay!           for each outgoing call.p             X.25 Maill  C           X.25 Mail will be configured on your local system so thato>           users can send mail to, and receive mail from, other@           systems that implement the Mail-11 protocol over X.25.D           You must enter a VMS user identification code for the X.25           Mail account.a                                               3-4 Overview of Basic Mode a  u                    I                                                                         4hI         _________________________________________________________________n  I                                               Required Configuration Datar             4.1 Overview  C               This chapter details the information you will need to F               provide while running the configuration program in basic               mode.e  A               Tables 4-1 to 4-6 list all the information you will E               require during the configuration. You should write down H               the configuration parameter values specific to your systemD               in Appendix A (which provides a series of blank forms)G               and refer to that Appendix when you run the configuration                program.  E               Table 4-1 details the information required for the X.25t.               over Wide Area Networks Section.  E               Table 4-2 details the information required for the X.25 /               over Local Area Networks Section.i  E               Table 4-3 details the information required for the X.25H               Client Section.h  E               Table 4-4 details the information required for the PVCse               Section.  F               Table 4-1 lists the information you need to complete theG               X.25 over Wide Area Networks Section of the configuration                program.                I                                           Required Configuration Data 4-1- U  g           Required Configuration Data      4.1 Overview    B           Table 4-1 Configuration Information: X.25 over Wide AreaE           __________Networks_________________________________________   !                           Form indE           Information     which it is   Where to find   Default valuebE           required________required______information_____or_setting___M  9           Profile name    -             Refer to        -c5                                         Section 1.6.2n  9           X.25 address    Max 15        PSDN            -n4                           digits        subscription3                                         informationd  9           Synchronous     Characters    Choose          - 2           line name                     from lines5                                         determined byt/                                         programf  A           Incoming        Range of      PSDN            [1..4095] 4           Logical         numbers       subscription3           Channel                       informationp           Range(s)  A           Outgoing        Range of      PSDN            [1..4095]n4           Logical         numbers       subscription3           Channel                       information E           Range(s)___________________________________________________                                   #     4-2 Required Configuration Data  r  r      I                                               Required Configuration Data I                                                              4.1 Overviewt    F               Table 4-2 lists the information you need to complete theH               X.25 over Local Area Networks Section of the configuration               program.  G               Table 4-2 Configuration Information: X.25 over Local Area I               __________Networks_________________________________________s  %                               Form ineI               Information     which it is   Where to find   Default valueoI               required________required______information_____or_setting___8  =               LAN Device      Characters    Choose from     -n3                                             devicest6                                             determined6                                             by program  =               LAN remote      Max 32        You supply      - (               host name       characters  =               X.25 DTE        Max 15        You supply      -X$               address         digits  =               MAC address     LAN hardware  Remote system   -m%                               address   E               Incoming        Range of      PSDN            [1..4095] 8               Logical         numbers       subscription7               Channel                       information                Range(s)  E               Outgoing        Range of      PSDN            [1..4095]r8               Logical         numbers       subscription7               Channel                       informationbI               Range(s)___________________________________________________r  F               Table 4-3 lists the information you need to complete the?               X.25 Client Section of the configuration program.                 I                                           Required Configuration Data 4-3e i  e           Required Configuration Data      4.1 Overview    E           Table_4-3_Configuration_Information:_X.25_Client___________N  !                           Form ineE           Information     which it is   Where to find   Default valuefE           required________required______information_____or_setting___s  9           Network name    Max 32        You supply      - $                           characters  9           Gateway Node    Max 32        You supply      - E           Name(s)_________characters_________________________________c  B           Table 4-4 lists the information you need to complete the4           PVCs Section of the configuration program.  E           Table_4-4_Configuration_Information:_PVCs__________________   !                           Form in E           Information     which it is   Where to find   Default valuenE           required________required______information_____or_setting___   9           DTE name (if    Max 32        Choose from     - 6           more than       characters    available DTEs           one)+c  =           PVC name(s)     Max 32        You supply      PVC-nn$                           characters  9           Channel         Integer[1]    PSDN            - 4           number(s)                     subscription3                                         information E           [1]The_value_entered_must_lie_outside_the_incoming_and______  8           outgoing channel ranges for the specified DTE.C           +Multiple DTEs are permitted only for LAN configurations. E           ___________________________________________________________   >           Table 4-5 lists the information you need to completeA           the Incoming Call Security Section of the configuration            program.          #     4-4 Required Configuration Data            I                                               Required Configuration DataqI                                                              4.1 Overviewc    I               Table_4-5_Configuration_Information:_Incoming_Call_Security   6                                               Where toI               Information     Form in which   find          Default value I               required________it_is_required__information___or_setting___l  =               Security        Allow all       Choose        -e8               option          incoming        one of the7                               access          available 5                               Allow no        options &                               incoming$                               access(                               Restricted&                               incoming$                               access  =               DTE addresses   Max 15 digits.  You supply    -p+               of systems      Can be a full )               that can call   DTE address )               this system     or a Remoter,               only if they    Address Prefix#               pay for the     (RAP)                call  =               DTE addresses   Max 15 digits.  You supply    -k+               of systems      Can be a fullo)               that can call   DTE addresse)               this system     or a Remoter,               irrespective    Address Prefix#               of who pays     (RAP) I               for_the_call_______________________________________________   F               Table 4-6 lists the information you need to complete the@               X.29 Support Section of the configuration program.  I               Table_4-6_Configuration_Information:_X.29_Support__________x  6                                               Where toI               Information     Form in which   find          Default valuelI               required________it_is_required__information___or_setting___   =               X29 Network     Octet string    You supply    - I               User_Identity______________________________________________     I                                           Required Configuration Data 4-5                 Required Configuration Data-     4.1 Overview                                                                                              #     4-6 Required Configuration Data                          I                                                                         5.I         _________________________________________________________________e  I                                           Flowcharts and Associated Notesl    H               This chapter contains flowcharts illustrating each SectionH               presented when the basic mode of the configuration program=               is run, together with notes about each Section.            5.1 Introduction  >               Figure 5-1 illustrates the Introduction Section.  C               The Introductory Section provides you with options to D               create a new X.25 for OpenVMS configuration, modify anE               existing configuration, or exit from the program. These C               options are detailed more fully in subsections 5.1.1, ,               5.1.2, and 5.1.3 respectively.  %               Figure 5-1 Introduction_                                          I                                       Flowcharts and Associated Notes 5-1            #     Flowcharts and Associated Notes_     5.1 Introduction    &     5.1.1 Creating a New Configuration  (           To create a new configuration:  A           1. Select the option Create a new configuration script.   A              The configuration program displays the types of X.25o7              system you can configure. The choices are:   -                 X.25 over Wide Area Networks;e2                 X.25 over Local Area Networks; and                 X.25 Client.  E           2. Select the type of system you want to configure. You can,6              select only one of the available choices.  8              The configuration program then displays the=              configuration Section associated with the optiona              selected.  >              The Section displayed is the first in a series of?              Sections that can be completed. You do not have to <              complete every Section, only those that present;              functions that you want to configure. When thegB              current Section has been completed, you are given the?              opportunity to amend that Section or to move on to.@              another Section. In some Sections you are given the?              opportunity to move on to the next Section withoute,              completing the current Section.  E           3. Complete the current Section or select to move on to the               next Section.  @           4. Repeat step 2 for each of the Sections. To create aB              configuration script you must complete the NCL Script              Section.e  @           5. Repeat step 3 for each of the Sections. To create aB              configuration script you must complete the NCL Script              Section.r  -     5.1.2 Modifying an Existing Configurationr  .           To modify an existing configuration:  ?           1. Select the option Modify an existing configuration_              script.  @              The Configuration Type screen is displayed with the6              current X.25 connection type highlighted.  '     5-2 Flowcharts and Associated Notese .  t      I                                           Flowcharts and Associated NotesaI                                                          5.1 Introductionn    ?               2. Select the type of X.25 connection you want to D                  configure. You can select only one of the availableG                  choices. The next action depends on whether you select E                  to retain the existing type of X.25 connection or to )                  create a different type:.  B                  o  If you select to retain the existing type, theC                     Sections Menu is displayed. Continue at step 3..  F                  o  If you select to create a different type, you willF                     be prompted to confirm that you want to delete theG                     existing X.25 connection information. If you choose C                     to delete the existing information, the Section I                     associated with the selected (new) configuration typeoG                     is displayed and must be completed. Once completed,uG                     the Sections Menu is displayed. Continue at step 3.e  D               3. The Sections Menu presents the Sections that can be%                  modified. These are:   1                  1. X.25 over Wide Area Networks;o  2                  2. X.25 over Local Area Networks;                     3. X.25 Client;                    4. PVCs;e  +                  5. Incoming Call Security;   !                  6. X.29 Support;i                            I                                       Flowcharts and Associated Notes 5-3w h  u      #     Flowcharts and Associated Notes      5.1 Introduction                  7. X.25 Mail; and                8. NCL Script.   A              Note that a Section is presented in the list only if -              that Section has been completed.c  D              Initially, the first Section is highlighted to indicate,              that it is the current Section.  @              To modify an existing Section, use the up-arrow andC              down-arrow keys to highlight the required Section (and5<              hence make it current) and then press <Return>.  D              The Options Menu for the specified Section is displayed8              and allows you to modify the existing data.  C              To configure a new Section, use the up-arrow and down-sC              arrow keys to highlight any Section other than the NCL_,              Script and then press <Return>.  D              The Options Menu for the specified Section is displayedE              and allows you to select to move on to the next Section. >              This action will display the next Section not yet              configured.  D           For further details on modifying an existing configurationA           and facts that you should be aware of before making anyr-           modifications, refer to Chapter 10.o  C           If you want to modify a Section after creating it you canmC           return to that Section from the Sections Menu. To displaytC           the Sections Menu while creating a configuration, move tomE           the NCL Script Section and, when prompted whether to modify C           your answers, enter Yes. Note that the Sections Menu onlyt;           displays those Sections that have been completed.s  +     5.1.3 Exiting the Configuration Programo  D           To leave the configuration program, select the option Exit*           this program from the Main Menu.  @           Full details of quitting and leaving the configuration,           program are provided in Chapter 2.  '     5-4 Flowcharts and Associated Notes  5  i      I                                           Flowcharts and Associated Notes I                                          5.2 X.25 over Wide Area Networks     (         5.2 X.25 over Wide Area Networks  D               This Section allows you to enter details about an X.25H               network to which your system is attached. You must provideH               information associated with the DTE connected to the namedI               network. It is assumed that the system is to be attached to_G               a public or private network and will have a DTE connected '               to the specified network.n  E               Figure 5-2 illustrates the X.25 over Wide Area Networksd               Section.                 Profile Name  E               An X.25 profile is a set of parameters that indicate to E               X.25 for OpenVMS the correct operating procedures for awE               particular network. The profile name defines a specificdH               profile. The valid profiles are given in the help text forI               this prompt. Typically, the profile name corresponds to the                name of the PSDN.p                 X.25 Address  F               The X.25 address is the X.25 DTE address assigned by theG               PTT when the network connection to a Packet Switched DataeI               Network (PSDN) is purchased. An X.25 address is a series ofX;               numeric digits similar to a telephone number.                  Synchronous Line  C               The synchronous line indicates which of the available G               synchronous communications devices supported by this host F               can be used by the specified DTE for its connection to a6               PSDN. Select one of the available lines.  ,               Incoming Logical Channel Range  F               The incoming channel number range specifies what channelA               numbers can be expected by X.25 for OpenVMS when anaD               incoming call request is received. This information isE               supplied by the PTT authority when the DTE subscription_H               is made. You must enter the channel range in the following               format:h  9                    {[<start of range> .. <end of range>]}d  G               where <start of range> must be less than or equal to <endaI               of range>. For example, to enter the range 1 to 4095, enter                {[1..4095]}.  I                                       Flowcharts and Associated Notes 5-5  i  s      #     Flowcharts and Associated Notes $     5.2 X.25 over Wide Area Networks    C              ________________________ Note ________________________m  @              If you intend to define PVCs, ensure that you leave?              enough channel numbers free to cater for the PVCs.g?              For example, by entering the range {[10..4095]}, 91:              channels are left free for assigning to PVCs.  C              ______________________________________________________g  (           Outgoing Logical Channel Range  B           The outgoing channel number range specifies what channelB           numbers can be used by X.25 for OpenVMS when an outgoingC           call request is made. This information is supplied by the_:           PTT authority when the DTE subscription is made.  D           Enter the channel range in the same format as the incomingC           channel range. For example, to enter the range 1 to 4095, A           enter {[1..4095]}. See also Note under Incoming Logical            Channel Range.  9           Figure 5-2 X.25 over Wide Area Networks Sectiono                                              '     5-6 Flowcharts and Associated Notesf r  o      I                                           Flowcharts and Associated Notes_I                                         5.3 X.25 over Local Area Networks     )         5.3 X.25 over Local Area Networks   D               This Section allows you to enter details about each ofH               the LAN-based X.25 networks (LAN Remote Hosts) you want toI               access from this system. For each LAN Remote Host you name, G               you must provide information on the DTE that is connected                to the LAN.y  F               Figure 5-3 illustrates the X.25 over Local Area Networks               Section.                 LAN Device Name   B               The LAN device name indicates which of the availableH               connections to the LAN the DTEs are to use as a connectionF               to the LAN-based X.25 Network. You are only permitted to%               specify one LAN device.   "               LAN Remote Host Name  G               The LAN Remote Host name is simply a name that is used to G               distinguish between the different remote hosts. This namea8               must be unique. For example, REMOTE-LAN-1.  E               To specify more than one LAN Remote Host, complete this I               Section for the first remote host and then select to define_               another.                 X.25 DTE Address  F               The X.25 DTE address is the X.25 address that is used byD               other nodes in this X.25 network to identify this DTE.D               A DTE address is a series of numeric digits similar toD               a telephone number. It must be unique within each X.25               network.                 MAC AddressN  F               The remote Media Access Control (MAC) address identifiesC               the remote node accessed by this DTE. This address isrG               fixed. A MAC address consists of a series of up to twelve2F               hexadecimal digits, optionally separated by hyphens. For)               example: 1b-34-5f-78-e4-ab.p  G               Note that each DTE may access only one other X.25 node on_               the LAN.  I                                       Flowcharts and Associated Notes 5-7o h  o      #     Flowcharts and Associated Notes_%     5.3 X.25 over Local Area Networks_    (           Incoming Logical Channel Range  B           The incoming channel number range specifies what channel=           numbers can be expected by X.25 for OpenVMS when anr@           incoming call request is received. This information isA           supplied by the PTT authority when the DTE subscription D           is made. You must enter the channel range in the following           format:   5                {[<start of range> .. <end of range>]}   C           where <start of range> must be less than or equal to <end E           of range>. For example, to enter the range 1 to 4095, enter            {[1..4095]}.  C              ________________________ Note ________________________n  @              If you intend to define PVCs, ensure that you leave?              enough channel numbers free to cater for the PVCs._?              For example, by entering the range {[10..4095]}, 9i:              channels are left free for assigning to PVCs.  C              ______________________________________________________   (           Outgoing Logical Channel Range  B           The outgoing channel number range specifies what channelB           numbers can be used by X.25 for OpenVMS when an outgoingC           call request is made. This information is supplied by theo:           PTT authority when the DTE subscription is made.  D           Enter the channel range in the same format as the incomingC           channel range. For example, to enter the range 1 to 4095,_A           enter {[1..4095]}. See also Note under Incoming Logicalu           Channel Range.  :           Figure 5-3 X.25 over Local Area Networks Section                '     5-8 Flowcharts and Associated Notes     i      I                                           Flowcharts and Associated Notes I                                                           5.4 X.25 Client              5.4 X.25 Client   D               This Section allows you to enter details about an X.25C               network to which your system is attached and the X.25 @               gateways through which your system is to access anF               available PSDN. You must provide the node name(s) of theH               gateways that provide the connection to the required PSDN.  =               Figure 5-4 illustrates the X.25 Client Section.g                 Notes   H               It is assumed that the system is to be attached indirectly/               to a network via an X.25 gateway.R  A               The X.25 network name is simply a name that is usedf@               to distinguish between the different Packet SwitchD               Data Networks (PSDNs) to which the local machine has a-               connection via an X.25 gateway.   F                 ________________________ Note ________________________  >                 The names that you choose for the network mustB                 correspond to the name of the DTE Class or Network                 in the gateway.   F                 ______________________________________________________  D               The node name of the X.25 gateway must be specified asG               either the Phase V node name of the X.25 gateway or the 6_F               character Phase IV DECnet node name. Examples of Phase V!               node names include:                     dnu:.zko.star'                  vbo:.afsg.comms.werner :                  miller:.sales.west_coast.salem.WillyLoman6                  OZ:.QLD.Gold_Coast.Research_Park.Wasa                I                                       Flowcharts and Associated Notes 5-9            #     Flowcharts and Associated Notes_     5.4 X.25 Client_                Figure 5-4 X.25 Client                                                                                        (     5-10 Flowcharts and Associated Notes           I                                           Flowcharts and Associated Notes I                                                                  5.5 PVCsn             5.5 PVCs  I               This Section is not presented if the X.25 Client Section isy               completed.  D               This Section allows you to enter details about each ofF               the Permanent Virtual Circuits (PVCs) to be used by yourG               system. Your PSDN subscription will determine whether you5/               are permitted to set up any PVCs.l  6               Figure 5-5 illustrates the PVCs Section.  F                 ________________________ Note ________________________  A                 The information you enter in this Section is usedcA                 in the Incoming Call Security Section. If you re-nA                 do this Section after configuring security, it is F                 recommended that the Incoming Call Security Section is                 also re-done.l  F                 ______________________________________________________                 PVC Name  G               The PVC name is simply a name that is used to distinguishkG               between the different PVCs. This name must be unique. Fory               example, PVC-1.                  Channel Number  D               The channel number must be specified as an integer andH               must lie outside the outgoing and incoming logical channelE               ranges specified in the X.25 over Wide Area Networks or 4               X.25 over Local Area Networks section.  %               Figure 5-5 PVCs Section                   I                                      Flowcharts and Associated Notes 5-11t    f      #     Flowcharts and Associated Notesi     5.6 Incoming Call Security         5.6 Incoming Call Security  D           This section allows you to enter details about the type ofC           incoming call security to be applied to your X.25 system.   D           Figure 5-6 illustrates the Incoming Call Security Section.             NotesC  8           One of three security options can be selected:  '           o  allow all incoming access;p  )           o  allow no incoming access; ore  (           o  restricted incoming access.  C           If the Restricted incoming access option is selected, youaC           must define the access level to be granted to each remoteaB           DTE that needs to make an X.25 call to the local system.  C           The access level granted to each remote DTE can be one off           the following:  A           Remote_Charge    Remote DTEs are only permitted to make_>                            calls that do not contain a reverse?                            charging request, that is, the localtD                            system will never be charged for the call  E           All              Remote DTEs are permitted to make any type @                            of incoming calls to the local system  ?           Separate screens are presented for each access level.eA           On the relevant screen, enter the Remote Address Prefix E           (RAP) of each remote DTE to be granted the specified access            level.  D           Wildcards can also be used to specify an address. EnteringA           only the wildcard, *, implies that the local system can -           receive calls from any DTE address.t  C           Note that any calls from DTE addresses with RAPs that are.(           not specified will be cleared.    (     5-12 Flowcharts and Associated Notes           I                                           Flowcharts and Associated NotesXI                                                5.6 Incoming Call Securityh    /               Figure 5-6 Incoming Call Security                                                                                         I                                      Flowcharts and Associated Notes 5-13o M         #     Flowcharts and Associated Notes      5.7 X.29 Support         5.7 X.29 Support  B           Support for X.29 allows users to access the local systemC           remotely via an X.25 network and to access remote systemse5           via the X.25 network from the local system.n  :           Figure 5-7 illustrates the X.29 Support Section.  $           X.29 Network User Identity  C           The X.29 Network User Identity (NUI) identifies the party E           that is to pay for each outgoing call, and the DTE class tow.           be used for the outgoing X.29 calls.  )           Figure 5-7 X.29 Support Section                                                             (     5-14 Flowcharts and Associated Notes    t      I                                           Flowcharts and Associated NoteshI                                                             5.8 X.25 Mail              5.8 X.25 Maili  F               X.25 Mail allows users to send mail to, and receive mailE               from, other systems that implement the Mail-11 protocolh               over X.25.  D               If you answer "Yes" when prompted whether to configureG               X.25 Mail, the configurator will create an account calledfF               X25MAIL in which X.25 Mail will run when X.25 Mail calls:               are received by the system being configured.  A               The account created is a network account having the #               following attributes:   &               o  TMPMBX privilege; and  0               o  PSI$X25_USER rights identifier.                                                        I                                      Flowcharts and Associated Notes 5-15a n                       I                                                                   Part IIrI         _________________________________________________________________g  #         Advanced Configuration ModeS i  f                    I                                                                         6 I         _________________________________________________________________d  I                                                 Overview of Advanced Mode     -         6.1 Introduction to the Advanced Model  G               The advanced mode of the configuration program allows youeD               to fully configure an X.25 system or to reconfigure an#               existing X.25 system.   >               To use the advanced mode, you should have a goodG               understanding of Enterprise Management Architecture (EMA)oF               entities, the relationship between those entities, and a)               good understanding of X.25.   C               When you invoke the utility in advanced mode, you can D               decide whether to create a new configuration or modify(               an existing configuration.  E               This mode of the configuration program can also be used H               to modify a configuration that was defined using the basicH               mode of the utility. When the utility is run, any existingD               configuration data is retrieved from the configurationA               database so that it can be viewed and, if required,l               modified.d  +         6.2 Configuration Program Structure   ?               The configuration program consists of a number of E               Sections, each Section corresponding to a logical groupt               of information.   F               Details explaining the purpose of each Section are givenH               in Section 6.3 and full details about the data required to;               complete each Section are given in Chapter 7.s          I                                             Overview of Advanced Mode 6-1                 Overview of Advanced Modea     6.3 Configuration Sections         6.3 Configuration Sections  @           The configuration program has 17 sections, but not allA           sections are relevant to both Direct Connect and Clientt=           systems. Table 6-1 shows the sections that apply to B           each type of system. Details on each of the sections are#           provided after Table 6-1.s  C              ________________________ Note ________________________i  <              You must complete at least one of the following              sections:  *              o  Remote DTE Classes Section  &              o  Lines and DTEs Section                o  LLC2 Section  C              ______________________________________________________                                                   !     6-2 Overview of Advanced Modeu i  b      I                                                 Overview of Advanced ModenI                                                6.3 Configuration Sections     G               Table 6-1 Configuration Sections Applicable to Client andtI               __________Host-based_Systems_______________________________r  F                                               Applies to    Applies toB                                               Host-based    ClientI               Configuration_Section___________Systems?______Systems?_____5  ?               Remote DTE Classes              No            Yes   >               Lines and DTEs++                Yes           No  >               LLC2++ [1]                      Yes           No  ?               Session Connections             No            Yesr  >               PVCs                            Yes           No  >               Groups                          Yes           No  ?               X.29 Support                    Yes           Yesl  ?               X.25 Mail                       Yes           Yest  ?               Applications                    Yes           Yes   ?               Filters                         Yes           Yesi  ?               Templates                       Yes           Yesd  ?               Reachable Addresses             Yes           Yesn  ?               Security                        Yes           Yest  ?               Incoming Security:              Yes           Yes                Applications  ?               Incoming Security: Filters      Yes           Yeso  ?               Outgoing Security: Local        Yes           Yesa               Processes   ?               NCL Script                      Yes           YesAI               [1]DECnet/OSI_must_be_installed_and_configured_in_order_to_a  $               complete this section.A               ++You must set up at least one synchronous line ando6               associated DTE or at least one LLC2 DTE.I               ___________________________________________________________h                  Remote DTE Classes  G               This Section allows you to specify the DTE Classes on theoI               gateway(s) that your X.25 Client system is to use to accesss                one or more PSDNs.  F               You must configure at least one gateway node to complete               this Section.e  I                                             Overview of Advanced Mode 6-3o e              Overview of Advanced ModeN     6.3 Configuration Sections               Lines and DTEs  D           This Section allows you to enter details relevant to Lines           and DTEs.e  =           You must configure at least one synchronous line ton@           complete this Section. Choose a line on your system to,           configure for X.25 communications.             LLC2  C           This Section allows you to enter details relevant to LLC2eA           DTEs. This allows your system to communicate using X.25 *           over a local area network (LAN).  E           You must configure at least one LAN device to complete thise           Section.             Session Connectionst  B           This Section allows you to specify the maximum number ofE           session control connections (virtual circuits) supported byuC           the X.25 for OpenVMS interface. This Section is presentedsD           only if the Remote DTE Classes Section has been completed.             PVCs  A           This Section allows you to define one or more Permanent >           Virtual Circuits (PVCs). Your PSDN subscription willA           determine whether you are permitted to set up any PVCs.F>           This Section is presented only if the Lines and DTEs9           Section or the LLC2 Section has been completed.              Groups  A           This Section allows you to enter details of Closed User A           Groups (CUG) and Bilateral Closed User Groups (BCUG) on B           your system. This Section is presented only if the LinesB           and DTEs Section or the LLC2 Section has been completed.  A           If your DTE belongs to a CUG, it can communicate freely @           with remote DTEs that are members of the same CUG. ItsA           communications with other DTEs (outside the CUG) may becB           restricted, depending on your PSDN subscription options.  C           You must complete this Section if you have requested this<"           facility from your PSDN.  !     6-4 Overview of Advanced Mode  a  o      I                                                 Overview of Advanced Mode I                                                6.3 Configuration Sections_                   X.29 Support  =               This Section allows you to add support for X.29 C               communications. X.29 support is required if your X.25rF               for OpenVMS system is to communicate with character-mode               terminals.                 X.25 Mail_  H               This Section allows you to add support for X.25 Mail. X.25I               Mail is required if your X.25 for OpenVMS system is to sendf>               mail to, or receive mail from, other X.25 nodes.                 Applications  >               This Section allows you to specify X.25 and X.29A               applications on your system that are used to accept                incoming calls.s  D               You must specify any X.25 or X.29 applications on yourG               system, to allow incoming calls for those applications tor               succeed.  G               For each application you must define at least one filter,SG               the name of the command file that starts the application,                and a user name.                 Filterss  G               This Section allows you to specify the filters to be used D               to determine the action taken when an incoming call is               received.o  C               You must supply a Filter Name and a Priority for eachmI               Filter. You may leave all the other parameters unspecified.m  C               The more parameters you specify in a Filter, the moredF               specific is that filter. For example, you could create aH               Filter with most of its parameters unspecified, and with aH               low priority, to act as a "catchall" for unexpected calls.                 Templatesn  H               This Section allows you to define the templates to be used,               when an outgoing call is made.  E               Your system uses a template to make outgoing calls. The G               template sets various parameters for each call made using                that template.  I                                             Overview of Advanced Mode 6-5_ _  _           Overview of Advanced Modeu     6.3 Configuration Sections    B           Two templates, called "Default" and "OSI Transport", are@           automatically created on your system. Appendix C listsC           the characteristic values of these templates. If you wanttD           additional templates, then you must complete this Section.                                                                                  !     6-6 Overview of Advanced Mode            I                                                 Overview of Advanced ModefI                                                6.3 Configuration Sectionsn    !               Reachable Addressese  G               This Section allows you to define the addresses of remotewB               DTEs that are permitted to communicate with the X.25               system..  G               If you have local applications that use NSAP addresses to G               communicate with remote DTEs, then you must complete this0I               Section to provide a mapping between NSAP addresses and DTE G               addresses. Reachable Address entities are used to convert 0               NSAP addresses into DTE addresses.                 X.25 Security   H               This Section allows you to specify the type of security toB               be applied to your system. The options allow you to:  H               o  Create/define or modify the X.25 security to be applied  0               o  Permit only outgoing X.25 calls  &               o  Permit all X.25 calls  D               If the option to create or modify the X.25 security isH               selected, a further three security sections that allow youG               to set up security for your system are presented, namely:n  0               o  Incoming Security: Applications  +               o  Incoming Security: Filters   3               o  Outgoing Security: Local Processesy  -               Incoming Security: Applicationsc  I               This Section is available only if you have specified one or 9               more applications to handle incoming calls.   G               Complete this Section if you want your applications to bet8               able to receive calls from remote systems.  (               Incoming Security: Filters  I               This Section is available only if you have specified one or 5               more filters to receive incoming calls.   G               Complete this Section for each filter you want to receive                incoming calls.   0               Outgoing Security: Local Processes  G               Complete this Section if you want users on your system tot6               be able to make calls to remote systems.  I                                             Overview of Advanced Mode 6-7A c  e           Overview of Advanced Modei     6.3 Configuration Sections               NCL Scriptsc  ?           This Section allows you to initiate the generation ofiC           NCL scripts based on the configuration data that you haveu           entered.  ?           This initiation should be performed only when you are B           satisfied that all the data you have entered is complete           and correct.                                                                        !     6-8 Overview of Advanced Modee s  c                    I                                                                         7tI         _________________________________________________________________c  I                                               Required Configuration Datae             7.1 Overview  C               This chapter details the information you will need tokI               provide while running the configuration program in advanced                mode.a  B               Tables 7-1 to 7-14 list all the information you willE               require during the configuration. You should write down H               the configuration parameter values specific to your systemD               in Appendix A (which provides a series of blank forms)G               and refer to that appendix when you run the configurationeF               program. Note that the tables are presented in the orderB               that the Sections are displayed if an X.25 system is8               configured for Client, WAN, and LAN usage.  F               Table 7-1 lists the information you need to complete theF               Remote DTE Classes section of the configuration program.  I               Table_7-1_Configuration_Information:_Remote_DTE_Classes____   %                               Form in I               Information     which it is   Where to find   Default valueeI               required________required______information_____or_setting___S  I               Name            Max 32        You supply      REMOTE-CLASS- =                               characters                    n   G               Outgoing        Max 32        You supply      See DefaulttD               Session         characters                    template               Template  >               Segment size    Decimal       You supply      64$                               number  I                                                  (continued on next page)t  I                                           Required Configuration Data 7-1p    t           Required Configuration Datan     7.1 Overview    A           Table 7-1 (Cont.) Configuration Information: Remote DTEhE           __________________Classes__________________________________e  !                           Form in E           Information     which it is   Where to find   Default value E           required________required______information_____or_setting___s  9           Node name(s)    Max 64        You supply      -w$                           characters  E           ___________________________________________________________                                                                     #     7-2 Required Configuration Data     m      I                                               Required Configuration Data I                                                              7.1 Overview     F               Table 7-2 lists the information you need to complete theB               Lines and DTEs section of the configuration program.  I               Table_7-2_Configuration_Information:_Lines_and_DTEs________c  %                               Form in I               Information     which it is   Where to find   Default valuelI               required________required______information_____or_setting___   =               Line name       Select from   Available       - 1                               list          lines 6                                             determined6                                             by program  ?               Line speed      Select from   Supplier of     4.8 0                               list          line  B               Link name       Max 32        You supply      link-n(                               characters  A               DTE name        Max 32        You supply      dte-n (                               characters  =               X.25 address    Max 15        PSDN            -c8                               digits        subscription7                                             informationu  =               Profile name                  PSDN/Digital    -2  F               Incoming        Number(s) or  You supply     [1...4095])               Logical         range(s) ofs%               Channel         numbers                Range(s)  F               Outgoing        Number(s) or  You supply     [1...4095])               Logical         range(s) of %               Channel         numbers                Range(s)  ?               Packet level    Yes or No     -               Yest               negotiation[1]  I               [1]You_only_need_to_make_this_choice_if_the_Profile_you____   1               have entered supports the facility.b+               Subject to PSDN restrictions   I                                                  (continued on next page)e  I                                           Required Configuration Data 7-3,    u           Required Configuration Data      7.1 Overview    @           Table 7-2 (Cont.) Configuration Information: Lines andE           __________________DTEs_____________________________________g  !                           Form infE           Information     which it is   Where to find   Default valueSE           required________required______information_____or_setting___h  ;           Extended        Yes or No     -               Yese           packet           sequence           numbering[1]  ?           Minimum packet  Decimal       You supply     ProfilewA           size[2]         number                        dependentf  ?           Maximum packet  Decimal       You supply     ProfilecA           size[2]         number                        dependentC  ?           Default packet  Decimal       You supply     Profile A           size            number                        dependenth  ?           Level 3         Decimal       You supply     Profile A           Minimum window  number                        dependent            size[2]e  ?           Level 3         Decimal       You supply     Profile A           Maximum window  number                        dependents           size[2]   ?           Level 3         Decimal       You supply     Profile_A           Default window  number                        dependent            size  ;           Extended        Yes or No     -               Yes            frame sequence           numbering[1]  ?           Level 2 Window  Decimal       You supply     ProfilenA           size            number                        dependenti  ?           Frame size      Decimal       You supply     Profile_A                           number                        dependent   E           [1]You_only_need_to_make_this_choice_if_the_Profile_you____   -           have entered supports the facility.gE           [2]You only need to enter values here if you have chosen to '           use Packet Level Negotiation. '           Subject to PSDN restrictions+  E                                              (continued on next page)   #     7-4 Required Configuration Data  e  o      I                                               Required Configuration Data I                                                              7.1 Overview     D               Table 7-2 (Cont.) Configuration Information: Lines andI               __________________DTEs_____________________________________   %                               Form in I               Information     which it is   Where to find   Default value I               required________required______information_____or_setting___   =               DTE Interface   DTE or DCE    You supply     -e               type  C               Segment Size    Decimal       PSDN            Profile E                               number        Subscription    dependent 7                                             informatione  H               Inbound DTE     Max 32        You supply      Profile name(               Class           charactersI               Subject_to_PSDN_restrictions______________________________   I               ___________________________________________________________   F               Table 7-3 lists the information you need to complete the8               LLC2 section of the configuration program.  I               Table_7-3_Configuration_Information:_LLC2___________________  %                               Form ineI               Information     which it is   Where to find   Default valueEI               required________required______information_____or_setting___t  =               LAN device      -             Available       - 3               name                          devicesp6                                             determined6                                             by program  A               LLC2 DTE name   Max 32        You supply      DTE-n (                               characters  =               LLC2 DTE        Max 15        You supply      -n$               address         digits  >               Local LSAP      2 Hex digits  You supply      7E               addresso  C               Level 3         Max 32        You supply      ISO8881n(               profile         characters  I                                                  (continued on next page)w  I                                           Required Configuration Data 7-5  N              Required Configuration Data      7.1 Overview    E           Table_7-3_(Cont.)_Configuration_Information:_LLC2__________   !                           Form iniE           Information     which it is   Where to find   Default valuelE           required________required______information_____or_setting___s  C           Incoming        Number(s) or  You supply, in  {[1..4095]}n4           logical         range(s) of   consultation3           channel         numbers       with remote .           range(s)                      system  C           Outgoing        Number(s) or  You supply, in  {[1..4095]}u4           logical         range(s) of   consultation3           channel         numbers       with remote .           range(s)                      system  9           Remote MAC      LAN hardware  Remote system   -s!           address         addressd  :           Remote LSAP     2 Hex digits  You supply      7E           addressp  B           DTE Interface   DTE, DCE, or  You supply      Negotiated$           type            Negotiated  :           Packet level    Yes or No     -               No           negotiationt  :           Extended        Yes or No     -               No           packet           sequence           numberingi  :           Minimum packet  Decimal       You supply      16            size[1]         number  <           Maximum packet  Decimal       You supply      1024            size[1]         number  ;           Default packet  Decimal       You supply      128             size            number  9           Level 3         Decimal       You supply      1S            Minimum window  number           size [1]  E           [1]You_need_to_supply_these_values_only_if_you_have_chosen_n  *           to use Packet Level Negotiation.  E                                              (continued on next page)e  #     7-6 Required Configuration Data     5      I                                               Required Configuration Data5I                                                              7.1 Overviewf    I               Table_7-3_(Cont.)_Configuration_Information:_LLC2__________   %                               Form iniI               Information     which it is   Where to find   Default valuesI               required________required______information_____or_setting___   =               Level 3         Decimal       You supply      7 $               Maximum window  number               size [1]  =               Level 3         Decimal       You supply      2n$               Default window  number               size  H               Inbound DTE     Max 32        You supply      llc2-class-n(               class           charactersI               [1]You_need_to_supply_these_values_only_if_you_have_chosen_   .               to use Packet Level Negotiation.I               ___________________________________________________________                                                   I                                           Required Configuration Data 7-7                 Required Configuration Data,     7.1 Overview    B           Table 7-4 lists the information you need to complete theC           Session Connections Section of the configuration program.   E           Table_7-4_Configuration_Information:_Session_Connections___   !                           Form in E           Information     which it is   Where to find   Default value E           required________required______information_____or_setting___a  :           Maximum number  Integer in    You supply      10$           of session      range 1 to           control         512t           connections   E           ___________________________________________________________   B           Table 7-5 lists the information you need to complete the4           PVCs section of the configuration program.    E           Table_7-5_Configuration_Information:_PVCs__________________C  !                           Form invE           Information     which it is   Where to find   Default value E           required________required______information_____or_setting___   =           DTE name        Max 32        Select from     DTE-no,                           characters    list  =           PVC name        Max 32        You supply      PVC-n $                           characters  9           Channel number  Integer[1]    PSDN            - 4                                         subscription3                                         informationt  ?           Packet size     Decimal       You supply     ProfilemA                           number                        dependentd  ?           Window size     Decimal       You supply     ProfilesA                           number                        dependentnE           [1]The_value_entered_must_lie_outside_the_incoming_and_____t  7           outgoing channel ranges specified for the DTEt'           Subject to PSDN restrictionscE           ___________________________________________________________s  #     7-8 Required Configuration Data  r  s      I                                               Required Configuration Data2I                                                              7.1 Overviews    F               Table 7-6 lists the information you need to complete the:               Groups section of the configuration program.  I               Table_7-6_Configuration_Information:_Groups________________   %                               Form inaI               Information     which it is   Where to find   Default value I               required________required______information_____or_setting___   C               Group name      Max 32        You supply      GROUP-n (                               characters  ?               Group type      BCUG, CUG,    You supply     CUG                                 or#                               CUGOAr  =               DTE name        -             Select from     -m0                                             list  =               CUG number      Decimal       PSDN            -e8                               number        subscription7                                             informationo  =               Remote DTE      Max 15        PSDN            - 8               address[1]      digits        subscription7                                             informationuI               [1]You_need_to_supply_this_information_only_if_the_Group___                  type is a BCUG. +               Subject to PSDN restrictions I               ___________________________________________________________   F               Table 7-7 lists the information you need to complete the@               X.29 Support section of the configuration program.  I               Table_7-7_Configuration_Information:_X.29_Support__________   %                               Form inaI               Information     which it is   Where to find   Default valuecI               required________required______information_____or_setting___   I                                                  (continued on next page)       I                                           Required Configuration Data 7-9_ _  _           Required Configuration Data_     7.1 Overview    E           Table_7-7_(Cont.)_Configuration_Information:_X.29_Support__   !                           Form insE           Information     which it is   Where to find   Default valuedE           required________required______information_____or_setting___o  9           X.29 Network    Octet string  You supply      -t           User Identity   9           DTE Class for   An existing   You supply      - #           outgoing X.29   DTE Classe           calls           name  E           ___________________________________________________________                                                               $     7-10 Required Configuration Data t  e      I                                               Required Configuration Data I                                                              7.1 Overviewg      F               Table 7-8 lists the information you need to complete the@               Applications section of the configuration program.    I               Table_7-8_Configuration_Information:_Applications___________  4                               Form in       Where toF               Information     which it is   find         Default valueI               required________required______information__or_setting______   F               Name            Max 20        You supply   APPLICATION-n(                               characters  =               Type            X.25 or X.29  You supply   X.25   :               Command file    OpenVMS       You supply   -&               to start        AXP full&               application     filename%                               Max 128 (                               characters  :               Username for    OpenVMS AXP   You supply   -&               application     username$                               Max 12(                               characters  @               Template+       Max 32        You supply   Default(                               characters  A               Filter          Max 20 chars  You supply   FILTER-n_               name(s)++ I               +If_a_template_that_has_not_yet_been_defined_is_entered,___   E               information about the template is requested. Details ofrH               the information required to define a template are given in               Table 7-10. F               ++Details of the information required to define a filter%               are given in Table 7-9. I               ___________________________________________________________t          I                                          Required Configuration Data 7-11n t              Required Configuration Data      7.1 Overview    A           Table 7-9 lists the information you need to supply when ?           you create filters in the Applications section of the             configuration program.  E           Table_7-9_Configuration_Information:_Filters_______________   !                           Form in E           Information     which it is   Where to find   Default valuelE           required________required______information_____or_setting___g  A           Name            Max 20        You supply      Filter- n $                           characters  9           Priority        Decimal       You supply      1e                            number  9           Incoming DTE    Max 15        You supply      -             Address         digits  9           Call Data Mask  Hex digits    You supply      -   9           Call Data       Hex digits    You supply      -            Value   9           DTE Class       Max 32        You supply      -2$                           characters  9           Sending DTE     Max 15        You supply      -e            Address         digits  9           Receiving DTE   Max 15        You supply      -n            Address         digits  9           Group name      Max 32        You supply      - $                           characters  9           Originally      Max 15        You supply      -9            Called Address  digits  9           Redirect        One of:       You supply      -            Reason          0 %                           Unspecifiedp                            1 Busy"                           2 Out of                           order &                           3 Systematic  E                                              (continued on next page)t  $     7-12 Required Configuration Data _  e      I                                               Required Configuration DataaI                                                              7.1 Overview     I               Table_7-9_(Cont.)_Configuration_Information:_Filters_______   %                               Form iniI               Information     which it is   Where to find   Default valueiI               required________required______information_____or_setting___   =               Called Address  Hex digits    You supply      -_               Extension Mask  =               Called Address  Hex digits    You supply      -                Extension                Valueu  =               Called NSAP     Decimal       You supply      - I               ________________number_____________________________________e                                                            I                                          Required Configuration Data 7-13                 Required Configuration Dataa     7.1 Overview    C           Table 7-10 lists the information you need to complete the 9           Templates section of the configuration program.   E           Table_7-10_Configuration_Information:_Templates____________   !                           Form ineE           Information     which it is   Where to find   Default value E           required________required______information_____or_setting___   B           Name            Max 32        You supply      TEMPLATE-n$                           characters  9           DTE Class       Max 32        You supply      -e$                           characters  9           Call Data       Hex digits    You supply      -   9           Packet Size     Decimal       You supply      -                             Number  9           Window Size     Decimal       You supply      -                             number  9           Destination     Max 15        You supply      -             DTE Address     digits  9           Fast Select     One of:       You supply      0l           Option          0 %                           Unspecified                             1 Fast                            select                            2 With"                           response#                           3 No fastf                            select  :           Reverse         Yes or No     You supply      No           Charging  9           Selected Group  Max 32        You supply      - $                           characters  E                                              (continued on next page)C    $     7-14 Required Configuration Data           I                                               Required Configuration Data I                                                              7.1 Overview_    I               Table_7-10_(Cont.)_Configuration_Information:_Templates____   %                               Form in I               Information     which it is   Where to find   Default value_I               required________required______information_____or_setting___E  @               Throughput      A range of    You supply      0..0)               Class Request   values, thel)                               max and min *                               to be chosen#                               from:m)                               0, 75, 150, '                               300, 600, )                               1200, 2400, )                               4800, 9600,_*                               19200, 48000  =               Network User    Octet string  You supply      -                Id  =               Local           Hex digits    You supply      -                Facilities  >               Charging        Yes or No     You supply      No               Information_  =               RPOA Sequence   Sequence      You supply      -t&                               of octet(                               strings of'                               4 decimalg$                               digits  =               Local           Decimal       You supply      - $               Subaddress      number  =               Target Address  NSAP Address  You supply      -                Extensionr  >               NSAP Mapping    Yes or No     You supply      No  =               Calling         NSAP Address  You supply      -                Address                Extension   =               Transit Delay   Decimal       You supply      - $               Selection       number  I                                                  (continued on next page)p  I                                          Required Configuration Data 7-15                 Required Configuration Datan     7.1 Overview    E           Table_7-10_(Cont.)_Configuration_Information:_Templates____   !                           Form inDE           Information     which it is   Where to find   Default valuenE           required________required______information_____or_setting___   9           End-to-End      Range of      You supply      -u!           Delay           decimalr!                           numbers_  E           Expedited Data  One of:       You supply      Not specifiedn           Option          Useg$                           Do not use                           NotrE           ________________specified__________________________________g                                                            $     7-16 Required Configuration Data l  i      I                                               Required Configuration Data I                                                              7.1 Overviews    G               Table 7-11 lists the information you need to complete theeG               Reachable Addresses section of the configuration program.c  I               Table_7-11_Configuration_Information:_Reachable_Addresses__i  %                               Form inNI               Information     which it is   Where to find   Default value I               required________required______information_____or_setting___   =               Name            Max 32        You supply      - (                               characters  =               Address Prefix  Complete or   You supply      - *                               partial NSAP&                               address,*                               including at'                               least thei!                               AFI   =               DTE Class       Max 32        You supply      -u(                               characters  ?               Address         Yes or No     You supply      Yes                Extensions  A               Conversion      X.121 or      You supply      X.121i$               Mechanism       Manual  =               Destination     Max 15        You supply      - $               DTE address[1]  digitsI               [1]You_need_to_supply_this_value_only_if_you_have_selected_g  1               Manual as the conversion mechanism. I               ___________________________________________________________   C               Table 7-12 lists the information you need to completen@               the Incoming Security: Applications section of the$               configuration program.              I                                          Required Configuration Data 7-17i                Required Configuration Dataa     7.1 Overview    C           Table 7-12 Configuration Information: Incoming Security -uE           ___________Applications____________________________________   !                           Form inaE           Information     which it is   Where to find   Default valueoE           required________required______information_____or_setting____  9           Select an       -             List supplied   - 2           application                   by program  9           DTE addresses   Max 15        You supply      -a!           of systems      digits. "           that can        Can be a"           call this       full DTE$           application     address or"           only if they    a Remote!           pay for the     Addresso            call            Prefix"                           (RAP)[2]  9           DTE addresses   Max 15        You supply      -a!           of systems      digits.u"           that can        Can be a"           call this       full DTE$           application     address or"           irrespective    a Remote!           of who pays     Address &           for the call    Prefix (RAP)  E           [2]The_Remote_Address_Prefix_(RAP)_is_used_to_match_againsti  @           the remote DTE address in incoming and outgoing calls.  E                                              (continued on next page)o                      $     7-18 Required Configuration Data o  i      I                                               Required Configuration Data I                                                              7.1 Overview     D               Table 7-12 (Cont.) Configuration Information: IncomingI               ___________________Security_-_Applications_________________u  %                               Form in I               Information     which it is   Where to find   Default value I               required________required______information_____or_setting___   @               DTE addresses   Max 15        You supply      *[1]%               of systems      digits. &               that cannot     Can be a&               call this       full DTE(               application     address or&                               a Remote%                               Address I               [1]The_wildcard_characterA(*)_means_all_unspecified_DTEs.__   I               Even if you enter specific DTEs that are to have No Access,rE               by default all other unspecified DTEs will also have No_E               Access. However, if you enter the wildcard character to C               stand for DTEs that have Remote Charge or All Access,2H               there will be no default for this value, and the only DTEsH               that will not be allowed access are those that you specify               explicitly.sI               ___________________________________________________________o                                          I                                          Required Configuration Data 7-19  i              Required Configuration Data      7.1 Overview    C           Table 7-13 lists the information you need to complete theaA           Incoming Security: Filters section of the configuration            program.  B           Table 7-13 Configuration Information: Incoming Security-E           ___________Filters_________________________________________   !                           Form in E           Information     which it is   Where to find   Default value E           required________required______information_____or_setting___   9           Select a        -             You supply      -            Filter  9           DTE addresses   Max 15        You supply      -E!           of systems      digits. "           that can call   Can be a"           processes       full DTE$           using this      address or"           filter only if  a Remote!           they pay for    Addresst            the call        Prefix"                           (RAP)[2]  9           DTE addresses   Max 15        You supply      -_!           of systems      digits. "           that can call   Can be a"           processes       full DTE$           using this      address or"           Filter          a Remote!           irrespective    Address_&           of who pays     Prefix (RAP)           for the call  E           [2]The_Remote_Address_Prefix_(RAP)_is_used_to_match_against   @           the remote DTE address in incoming and outgoing calls.  E                                              (continued on next page)             $     7-20 Required Configuration Data           I                                               Required Configuration DataCI                                                              7.1 Overviewg    D               Table 7-13 (Cont.) Configuration Information: IncomingI               ___________________Security-Filters________________________   %                               Form inoI               Information     which it is   Where to find   Default valueuI               required________required______information_____or_setting___t  @               DTE addresses   Max 15        You supply      *[1]%               of systems      digits. &               that cannot     Can be a&               call processes  full DTE(               using this      address or&               Filter          a Remote%                               Address I               [1]The_wildcard_characterA(*)_means_all_unspecified_DTEs.__   I               Even if you enter specific DTEs that are to have no access,-E               by default all other unspecified DTEs will also have notE               access. However, if you enter the wildcard character to_C               stand for DTEs that have Remote Charge or all access, H               there will be no default for this value, and the only DTEsH               that will not be allowed access are those that you specify               explicitly.nI               ___________________________________________________________A                                          I                                          Required Configuration Data 7-21                 Required Configuration Data      7.1 Overview    ?           Table 7-14 lists the information you need to completea?           the Outgoing Security: Local Processes section of the             configuration program.                                                                                    $     7-22 Required Configuration Data           I                                               Required Configuration Data I                                                              7.1 Overview     G               Table 7-14 Configuration Information: Outgoing Security -eI               ___________Local_Processes_________________________________e  %                               Form in I               Information     which it is   Where to find   Default valuerI               required________required______information_____or_setting___   =               Rights          -             You supply      -                Identifier[1]7  =               DTE addresses   Max 15        You supply      -_%               of systems      digits. &               that can be     Can be a&               called by       full DTE(               processes with  address or&               this rights     a Remote%               identifier      Address $               only if they    Prefix&               pay for the     (RAP)[2]               call  =               DTE addresses   Max 15        You supply      -_%               of systems      digits.m&               that can be     Can be a&               called by       full DTE(               processes with  address or&               this rights     a Remote%               identifier      Addressy*               irrespective    Prefix (RAP)               of who payso               for the call  =               Names of PVCs   Name of       You supply      -n*               that can        existing PVC               be used by               processes with               this rights                identifier[4]a  @               DTE addresses   Max 15        You supply      *[3]%               of systems      digits. &               that cannot     Can be a&               be called by    full DTE(               processes with  address or&               this rights     a Remote%               identifier      Addressu*                               Prefix (RAP)  =               Names of PVCs   Name of       You supply      - *               that cannot     existing PVCI               be used by                 Required Configuration Data 7-23d               processes with               this rightso               identifier[4]eI               [1]Specify_the_group_to_which_the_local_process_belongs.___   I               [2]The Remote Address Prefix (RAP) is used to match against D               the remote DTE address in incoming and outgoing calls.G               [3]The wildcard character (*) means all unspecified DTEs.oI               Even if you enter specific DTEs that are to have No Access, E               by default all other unspecified DTEs will also have No E               Access. However, if you enter the wildcard character to_C               stand for DTEs that have Remote Charge or All access, H               there will be no default for this value, and the only DTEsH               that will not be allowed access are those that you specify               explicitly. H               [4]You will be asked for this information only if you have               configuredPVCs.a d  d           Required Configuration Data      7.1 Overview    E           ___________________________________________________________                                                                                         $     7-24 Required Configuration Data                         I                                                                         8 I         _________________________________________________________________   I                                           Flowcharts and Associated Notese    H               This chapter contains flowcharts illustrating each SectionI               in the advanced mode of the configuration program, togetherm,               with notes about each Section.             8.1 Introduction  >               Figure 8-1 illustrates the Introduction Section.  C               The Introductory Section provides you with options toAD               create a new X.25 for OpenVMS configuration, modify anE               existing configuration, or exit from the program. ThesesC               options are detailed more fully in subsections 8.1.1, ,               8.1.2, and 8.1.3 respectively.  %               Figure 8-1 Introductionr              *         8.1.1 Creating a New Configuration  ,               To create a new configuration:  *               1. Select the Create option.  @                  After displaying some introductory screens, theA                  configuration program displays the types of X.25           I                                       Flowcharts and Associated Notes 8-1            #     Flowcharts and Associated Notesh     8.1 Introduction    D              system you can configure and the configuration Sections8              relevant to those choices. The choices are:  @                 X.25 Client through a connector node (Remote DTE!                 Classes Section); =                 X.25 over a wide area network (Lines and DTEs                  Section); andn>                 X.25 over a local area network (LLC2 Section).  D              To create a useable configuration, you must complete at1              least one of the specified Sections.   C              The configuration program then displays the Remote DTEnC              Classes Section. This Section is the first in a series /              of Sections that can be completed.t  B              You do not have to complete every Section, only thoseC              that present functions that you want to configure. Fort@              example, if you do not want to configure any client@              systems, you do not have to complete the Remote DTE?              Classes Section. When the current Section has been @              completed, an Options Menu relevant to that SectionE              is displayed. The Options Menu gives you the opportunity4B              to amend the current Section or to move on to another              Section.0  E           2. Complete the current Section or select to move on to the               next Section.  @           3. Repeat step 2 for each of the Sections. To create aB              configuration script you must complete the NCL Script              Section.o  -     8.1.2 Modifying an Existing Configuratione  .           To modify an existing configuration:  &           1. Select the Modify option.  ?              The Sections Menu is displayed, which presents the 6              Sections that can be modified. These are:  #              1. Remote DTE Classes;                 2. Lines and DTEs;                 3. LLC2;d  $              4. Session Connections;                5. PVCs;   '     8-2 Flowcharts and Associated Notes  o  u      I                                           Flowcharts and Associated Notes I                                                          8.1 Introductiona                      6. Groups;   !                  7. X.29 Support;b                    8. X.25 Mail;  !                  9. Applications;x                    10.Filters;                    11.Templates;  (                  12.Reachable Addresses;                    13.Security;   4                  14.Incoming Security: Applications;  /                  15.Incoming Security: Filters;   ;                  16.Outgoing Security: Local Processes; ando                    17.NCL Script.e  E                  Note that the full list of Sections is determined bynD                  which configuration Sections have been created. TheC                  above list indicates the Sections displayed if alleB                  Sections have been created. Initially, one of theC                  Sections is highlighted to indicate that it is the !                  current Section._                              I                                       Flowcharts and Associated Notes 8-3            #     Flowcharts and Associated Notesi     8.1 Introduction    D           2. To configure a Section, use the up-arrow and down-arrowC              keys to highlight the required Section (and hence make 1              it current) and then press <Return>.e  D              The Options Menu for the specified Section is displayed8              and allows you to modify the existing data.  D           For further details on modifying an existing configurationA           and facts that you should be aware of before making anyn-           modifications, refer to Chapter 10._  +     8.1.3 Exiting the Configuration Program   D           To leave the configuration program, select the option Exit*           this program from the Main Menu.  @           Full details of quitting and leaving the configuration,           program are provided in Chapter 2.                                                      '     8-4 Flowcharts and Associated Notes     e      I                                           Flowcharts and Associated Notes I                                                    8.2 Remote DTE Classes              8.2 Remote DTE Classes  D               Figure 8-2 illustrates the Remote DTE Classes Section.  F               This Section allows you to define remote DTE classes, inI               which you specify the connector system (s) that your Client /               system will use in making a call.   +               Figure 8-2 Remote DTE Classesf                                                                        I                                       Flowcharts and Associated Notes 8-5_           #     Flowcharts and Associated Notesn     8.3 Lines and DTEs         8.3 Lines and DTEs  <           Figure 8-3 illustrates the Lines and DTEs Section.  D           This Section allows you to configure synchronous lines andC           associated DTEs. You must set up at least one synchronousnC           line and associated DTE, unless you intend to set up LLC2r           on your system.u             Synchronous Line  ?           This screen displays the available synchronous lines. A           Only lines configured when the synchronous devices were B           installed are presented. Select a line for the specifiedD           DTE. You will have the opportunity to set up further lines           later.             Line Speed  E           The available line speeds are displayed. Select a speed forp!           the line(s) to be used.   1           Link Name, DTE Name, Address, and Class   A           You will be required to provide a unique link name, DTE D           name, and DTE address to identify the DTE to be associated#           with the line you select.   :           Additionally, before completing this Section theD           configuration program will prompt you to enter a DTE ClassE           to include the DTE you specified. This DTE Class is used to 2           select a DTE when making outgoing calls.             Profile   D           You must provide the name of the Profile to be used by theD           DTE you specified. Information on frame and packet controlB           parameters will be derived from the Profile you specify.  >           If you want to set up a point-to-point link then the.           ISO8208 profile should be specified.             Logical Channel Range   B           Logical channel numbers are required to identify logicalB           links between your system and the PSDN for both incoming           and outgoing calls.   E           If you intend to configure any PVCs, select Logical Channel E           Ranges for the SVCs that leave enough channels free for the            required PVCs.  '     8-6 Flowcharts and Associated Notest    h      I                                           Flowcharts and Associated NotestI                                                        8.3 Lines and DTEsu    0               Extended Packet Sequence Numbering  G               If the profile you have selected supports extended packetlG               sequence numbering, you will be prompted whether you want #               to use this facility.   &               Packet Level Negotiation  D               If the profile you have selected supports packet levelC               negotiation, you will be prompted whether to use this C               facility. If you select to use the facility, you will F               be prompted to specify the minimum, maximum, and defaultI               packet size to be used, and to specify the level 3 minimum,rH               maximum, and default window size. If you select not to useI               the facility, you will be prompted to enter the packet sizec1               and level 3 window size to be used._                 Segment Size  F               The call will be charged based on the number of segmentsD               sent. Thus, this value must be provided if you want toI               generate accounting records. Note that the value must matche+               the value set in the network.   /               Extended Frame Sequence Numberingg  F               If the profile you have selected supports extended frameG               sequence numbering, you will be prompted whether you want_#               to use this facility.                                 I                                       Flowcharts and Associated Notes 8-7e r  _      #     Flowcharts and Associated Notesi     8.3 Lines and DTEs    #           Figure 8-3 Lines and DTEs                                                                                         '     8-8 Flowcharts and Associated Notes  t  n      I                                           Flowcharts and Associated NotesdI                                                                  8.4 LLC2r             8.4 LLC2  6               Figure 8-4 illustrates the LLC2 Section.  =               This Section allows you to configure LLC2 DTEs.                  LAN Device Name   G               The LAN Device(s) available on your system are displayed. F               Choose one to associate with your LLC2 SAP DTE. You willE               have the opportunity to set up further LLC2 DTEs later, H               using either a different LAN device (if you have more than#               one) or the same one.e  ?               LLC2 DTE Name and Address, and Local LSAP Address   H               You must provide a unique name and address to identify theA               LLC2 DTE to be associated with the link you select.   I               In addition, you must specify the Link Service Access Point 0               (LSAP) for the specified LLC2 DTE.                 Profile-  H               You must provide the name of the Profile to be used by theH               LLC2 DTE you specified. For most LANs, the profile used isI               ISO8881. Information on frame and packet control parameters ;               will be derived from the Profile you specify.n  #               Logical Channel Range   F               Logical channel numbers are required to identify logicalH               links between the LLC2 DTEs for both incoming and outgoing               calls.  I               If you intend to configure any PVCs, select Logical Channel I               Ranges for the SVCs that leave enough channels free for thel               required PVCs.  &               Remote System Parameters  D               You must provide the unique Media Access Control (MAC)F               address of the remote system and the Link Service Access,               Point for the remote LLC2 DTE.  I               For two systems to communicate using the LLC2 protocol, onesD               must be configured as a DCE and one as a DTE. You mustC               determine the interface type being used by the remoteyF               system and the select the appropriate type for the localD               system. If the interface type being used by the remoteF               system is unknown, set the interface type to Negotiated.  I                                       Flowcharts and Associated Notes 8-9v i         #     Flowcharts and Associated Notesi     8.4 LLC2    ,           Extended Packet Sequence Numbering  C           If the profile you have selected supports extended packet C           sequence numbering, you will be prompted whether you want            to use this facility.o  "           Packet Level Negotiation  @           If the profile you have selected supports packet level?           negotiation, you will be prompted whether to use this ?           facility. If you select to use the facility, you willgB           be prompted to specify the minimum, maximum, and defaultE           packet size to be used, and to specify the level 3 minimum, D           maximum, and default window size. If you select not to useE           the facility, you will be prompted to enter the packet size -           and level 3 window size to be used.                                                           (     8-10 Flowcharts and Associated Notes p         I                                           Flowcharts and Associated Notes I                                                                  8.4 LLC2     "               Figure 8-4 LLC2 DTEs                                                                                        I                                      Flowcharts and Associated Notes 8-11  T  d      #     Flowcharts and Associated Notes      8.5 Session Connections          8.5 Session Connectionsb  B           This Section is available only if the Remote DTE Classes%           Section has been completed.   B           This Section allows you to specify the maximum number ofE           session control connections (virtual circuits) supported by E           the X.25 for OpenVMS interface. A value must be entered for 2           this parameter. The default value is 10.  ;           The number specified is used to calculate processi:           parameters for the X.25 Session Control and X.25<           Application processes. In addition, values for theD           following system parameters will be calculated and defined&           in SYS$SYSTEM:MODPARAMS.DAT:                 ADD_CHANNELCNT               ADD_NPAGEDYN               ADD_NPAGEVIR  C              ________________________ Note ________________________   >              Whenever you change the number of session control>              connections, you must run the Autogen utility andA              reboot your system after configuring the system. For C              example, these actions can be performed by issuing the               command:r  >                  @SYS$UPDATE:AUTOGEN SAVPARAMS REBOOT FEEDBACK  C              ______________________________________________________s                            (     8-12 Flowcharts and Associated Notes d  t      I                                           Flowcharts and Associated NotesTI                                                                  8.6 PVCse             8.6 PVCs  B               This Section is available only if the Lines and DTEs=               Section or the LLC2 Section has been completed.   6               Figure 8-5 illustrates the PVCs Section.  A               This Section allows you to set up permanent virtualoB               circuits between the host system and specified DTEs.                 DTE Name  G               Each of the DTEs created in the Lines and DTEs Section ornD               the LLC2 Section are listed. Select one from the list.                 PVC Name  (               Enter the name of the PVC.  C               For each PVC you name, you must define values for the ;               channel number, packet size, and window size.                  Channel Number  E               The channel number entered must not be within the range H               of incoming and outgoing logical channel numbers specifiedD               in the Lines and DTEs Section or the LLC2 Section. TheH               logical channel number range currently defined for PVCs isF               displayed beneath the DTE name at the top of the screen.  I               The channel number should be unique amongst PVCs associatedn%               with the specified DTE..  )               Packet Size and Window Sizel  D               The default values for the Packet size and Window sizeG               are taken from the profile specified in the Line and DTEspH               Section. The default values can be overridden if required.                 Figure 8-5 PVCs           I                                      Flowcharts and Associated Notes 8-13, d  1      #     Flowcharts and Associated Notes1     8.7 Groups         8.7 Groups  >           This Section is available only if the Lines and DTEs9           Section or the LLC2 Section has been completed.t  4           Figure 8-6 illustrates the Groups Section.  D           This Section allows you to assign any of the DTEs you haveE           created to Closed User Groups (CUGs), Bilateral Closed UsersD           Groups (BCUGs), or Closed User Groups with Outgoing Access           (CUGOAs).r  3           All the DTEs you have created are listed.   A           To place a DTE in a group, enter the PSDN-assigned CUG,hD           BCUG, or CUGOA Number beside that DTE. The same number can+           be assigned to more than one DTE.)  D           To remove a DTE from a CUG or BCUG, delete the CUG or BCUG*           Number associated with that DTE.             Figure 8-6 Groups(                                              (     8-14 Flowcharts and Associated Notes           I                                           Flowcharts and Associated NotesrI                                                          8.8 X.29 Supportn             8.8 X.29 Support  >               Figure 8-7 illustrates the X.29 Support Section.  A               This Section allows you to provide support for X.29                communications.   I               You are prompted to provide the network user identity (NUI) D               to identify the party that is to pay for each outgoingF               call, and the DTE class to be used for the outgoing X.29               calls.  G               Note that if you answer "No" to configuring X.29 Support,tG               no further questions will be displayed. Instead, the X.29eG               Support Options Menu is displayed from which you can movem%               on to the next Section.m  %               Figure 8-7 X.29 Support.                                                      I                                      Flowcharts and Associated Notes 8-15  i         #     Flowcharts and Associated Notesn     8.9 X.25 Mailg         8.9 X.25 Mailo    C           This Section allows you to provide support for X.25 Mail.o  D           You must provide the account username under which the mail           handler will run.n  C           Note that if you answer "No" to configuring X.25 Mail, no E           further questions will be displayed. Instead, the X.25 Mail4E           Options Menu is displayed from which you can move on to thea           next Section.              Account Name  E           The name of the OpenVMS AXP account in which X.25 Mail will A           run when an incoming X.25 Mail call is received by your D           system. If the required account does not exist, it will be<           created before you exit the configuration program.  =           The account created is a network account having thea           following attributes:a  "           o  TMPMBX privilege; and  ,           o  PSI$X25_USER rights identifier.                                      (     8-16 Flowcharts and Associated Notes           I                                           Flowcharts and Associated NoteseI                                                         8.10 Applications              8.10 Applicationsa  >               Figure 8-8 illustrates the Applications Section.  F               In this Section, you specify any applications running onG               your system. You must specify the name of the applicationt7               and its type. The two possible types are:S                 o  X.25                  o  X.29   F               If you specify either X.25 or X.29, you must provide theI               name of the command file that starts the application, and a 6               username. All other fields are optional.                 Application Namest  9               The name you give an application is used ton6               generate a rights identifier in the fileD               sys$startup:x25$security_identifiers.com. For example,H               if you enter the application name TEST$1, and subsequentlyF               specify (in the Incoming Security: Applications Section)D               that one or more remote DTEs should be given an accessH               level of REMOTE CHARGE, the rights identifier created willG               be APPL_TEST$1_REMOTE. Similarly, if you specify that onemI               or more remote DTEs should be given an access level of ALL,cD               the rights identifier created will be APPL_TEST$1_ALL.  >               The use of the application name to create rights>               identifiers places the following restrictions on                application names:  H               o  they must only consist of alphanumeric characters, "$",                  and "_";   F               o  there must be at least one non-numeric character; and  =               o  they cannot be more than 20 characters long.n  #               Application Templates   D               For an X.29 application, you can specify the name of aH               template in the Application Template field. If you specifyE               a name of a template that has not yet been defined, you I               will be presented with two further screens on which you caneF               enter details specific to the template specified. If youG               do not specify a template, the "Default" template will bes               used.D  I                                      Flowcharts and Associated Notes 8-17n a         #     Flowcharts and Associated Notesa     8.10 Applicationsn    C              ________________________ Note ________________________   C              You cannot specify a template for an X.25 application.sC              The Application Template field is not displayed if youn2              specify the application type as X.25.  C              ______________________________________________________              Application Filtersu  =           You must create at least one unique filter for eachS>           Application. The Filter Name and Priority fields are3           mandatory; the other fields are optional.   >           Note that you can set attributes to "unspecified" by.           leaving the appropriate field blank.  D           If you want to add a further filter to this Application orD           modify an existing filter associated with the application,;           choose Modify from the Applications Options Menu.r                                                  (     8-18 Flowcharts and Associated Notes E  a      I                                           Flowcharts and Associated NotesrI                                                         8.10 Applicationst    '               Applications Options Menuo  A               You can add, delete or modify applications from the I               Applications Options Menu. If you choose the Modify option,tG               you will be asked to select an application to modify. You F               will then be given the opportunity to change the name ofH               the application, the command file, and username associated               with it.  ;               The next screen gives you the opportunity to:e  1               o  add a filter to the application;f  9               o  delete a filter from the application; or   >               o  modify a filter belonging to the application.                                                          I                                      Flowcharts and Associated Notes 8-19     8      #     Flowcharts and Associated Notesd     8.10 Applicationse    !           Figure 8-8 Applicationsu                                                                                        (     8-20 Flowcharts and Associated Notes u  t      I                                           Flowcharts and Associated NotespI                                                              8.11 Filtersy             8.11 Filters  9               Figure 8-9 illustrates the Filters Section.t  E               This Section allows you to create additional filters to H               screen incoming calls. The Filter name and Priority fields               are mandatory.  B               Note that you can set attributes to "unspecified" by2               leaving the appropriate field blank.                 Filter Names  3               The name you give a filter is used to 6               generate a rights identifier in the fileD               sys$startup:x25$security_identifiers.com. For example,H               if you enter the application name TEST$1, and subsequentlyF               specify (in the Incoming Security: Filters Section) thatE               one or more remote DTEs should be given an access level E               of REMOTE CHARGE, the rights identifier created will be F               FILTER_TEST$1_REMOTE. Similarly, if you specify that oneI               or more remote DTEs should be given an access level of ALL, F               the rights identifier created will be FILTER_TEST$1_ALL.  E               The use of the filter name to create rights identifiers @               places the following restrictions on filter names:  H               o  they must only consist of alphanumeric characters, "$",                  and "_";t  F               o  there must be at least one non-numeric character; and  =               o  they cannot be more than 20 characters long.                   Figure 8-9 Filters                    I                                      Flowcharts and Associated Notes 8-21n l         #     Flowcharts and Associated Notes      8.12 Templates         8.12 Templates  8           Figure 8-10 illustrates the Templates Section.  @           The "Default" and "OSI Transport" templates are set upE           automatically. The characteristic values of these templates "           are given in Appendix C.  E           This Section allows you to create additional templates with '           which to make outgoing calls.a  >           Note that you can set attributes to "unspecified" by.           leaving the appropriate field blank.  >           The Template Name field is the only mandatory field.             Figure 8-10 Templatesh                                                        (     8-22 Flowcharts and Associated Notes l         I                                           Flowcharts and Associated Notes I                                                  8.13 Reachable Addresses               8.13 Reachable Addresses  F               Figure 8-11 illustrates the Reachable Addresses Section.  F               This Section allows you to convert NSAP addresses to DTE               addresses.  F               Choose either X.121 or Manual for the mechanism by which6               the destination DTE address is supplied.  -               Figure 8-11 Reachable Addresses,                                                                    I                                      Flowcharts and Associated Notes 8-23     o      #     Flowcharts and Associated Notesu     8.14 Securityu         8.14 Security(  D           This Section allows you to specify the type of security to!           be used on your system.e  D              _______________________ Caution _______________________  =              Digital strongly recommends that you set up bothnB              incoming and outgoing security to protect your system#              from unauthorized use.   C              ______________________________________________________   6           You can choose one of the following options:  +           o  Create or Modify X.25 Securityr  ?              This option allows you to define incoming securitylA              for applications and filters, and to define outgoingd@              security for local processes. Selecting this option9              displays the first of the security sections.t  +           o  Allow outgoing X.25 calls onlye  =              This option allows all outgoing calls to be madeuA              from your system, but does not allow incoming calls. E              Selecting this option bypasses the incoming and outgoingoC              security sections and displays the NCL Script section.y  !           o  Allow all X.25 callsy  C              This option leaves security open, that is, no securityf@              is applied to incoming or outgoing calls. SelectingD              this option bypasses the incoming and outgoing security:              sections and displays the NCL Script section.                    (     8-24 Flowcharts and Associated Notes s         I                                           Flowcharts and Associated NotesnI                                      8.15 Incoming Security: Applications     ,         8.15 Incoming Security: Applications  I               Figure 8-12 illustrates the Incoming Security: Applications                Section.  E               This Section allows you to specify the type of incoming A               access for each application you specified. You mustoG               complete this Section if you want Applications to receive                incoming calls.   9               Figure 8-12 Incoming Security: Applicationsi                                                                    I                                      Flowcharts and Associated Notes 8-25            #     Flowcharts and Associated Notesc#     8.16 Incoming Security: Filters     #     8.16 Incoming Security: Filtersb  @           Figure 8-13 illustrates the Incoming Security: Filters           Section.  A           This Section allows you to specify the type of incomingtB           access for the Filters specified. You must complete thisD           Section if you want Filters to be able to receive incoming           calls.  0           Figure 8-13 Incoming Security: Filters                                                                    (     8-26 Flowcharts and Associated Notes _  _      I                                           Flowcharts and Associated NotesmI                                   8.17 Outgoing Security: Local Processesu    /         8.17 Outgoing Security: Local Processesf  B               Figure 8-14 illustrates the Outgoing Security: Local                Processes Section.  E               You must complete this Section if you want processes onEF               this system to be able to make outgoing calls. Processes(               include X.25 applications.  C               For X.25 applications, enter the name of the group to D               which the process belongs when prompted for the Rights               Identifier.   I               To obtain a list of all valid rights identifiers (and hencecC               groups) on your system, issue the following commands:r  "               $ set def sys$system               $ run authorizel%               UAF> show /identifier *   H               If the rights identifier you enter does not exist, it willB               be defined before you exit the configuration programC               provided that you select to run the command procedures6               sys$system:x25$security_identifiers.com.  <               Figure 8-14 Outgoing Security: Local Processes                                      I                                      Flowcharts and Associated Notes 8-27     h      #     Flowcharts and Associated Notes      8.18 NCL Scriptn         8.18 NCL Script   9           Figure 8-15 illustrates the NCL Script Section.   B           When you reach this Section, you have entered sufficientD           information to create a working X.25 configuration. If youB           want to verify some of the information you have entered,B           or add or delete some information, then answer No to theA           question "Do you want to create an NCL script now?" YounD           will then go back to the Sections Menu, from which you can0           choose the Section you want to review.  D           When you are sure that the information you have entered isD           correct and complete, display the Sections Menu and select+           the option Create the NCL Script.r  B           If the program creates the configuration file, a messageC           is displayed which indicates the filename assigned to the            file.   @           If, for some reason, the program cannot create the NCLA           script, error messages are displayed at the foot of the E           screen. If this occurs, you must correct the problem before <           making a further attempt to create the NCL script.  @           If you have configured the Remote DTE Classes Section,B           you are presented with a screen that details the minimumE           number of executor links required for your X.25 for OpenVMSCC           configuration. The number of links is calculated from the D           number of session control connections you specified in the&           Session Connections Section.  >           The configuration program now displays the number ofB           Session Connections that can be established based on theB           configuration you have defined. You must ensure that theB           NSP attributes maximum transport connections and maximumA           remote nsaps are large enough to support this number of E           session connections. The default values of these attributes '           are 200 and 201 respectively.   ?           If you need to change the values of the specified NSP            attributes:t  ,           1. Exit the configuration program.  /           2. Use NCL to disable the NSP entity.   5           3. Make the required NSP attribute changes.t  (     8-28 Flowcharts and Associated Notes           I                                           Flowcharts and Associated NotesaI                                                           8.18 NCL Script.    '               4. Enable the NSP entity."    $               Figure 8-15 NCL Script                                                                                  I                                      Flowcharts and Associated Notes 8-29     t                    I                                                                  Part III I         _________________________________________________________________N  3         Configuration Verification and Modification  e                       I                                                                         9pI         _________________________________________________________________e  I                                               Verifying the Configurationa    E               This chapter explains how to run the Configuration TestbB               Procedure (CTP) to verify the configuration created.  F               The CTP verifies that the product has been installed andC               configured correctly. It also verifies that the basicnF               operations of X.25 connections, such as data transfer to2               and from the node, have been tested.  H               The CTP consists of a screen-based verification procedure.E               The procedure prompts for information about any DTEs orc$               PVCs you want to test.  D               After installing, rebuilding and configuring X.25, runH               the CTP to verify that the software installed is correctlyG               configured on your system. You might also want to run the I               CTP after a system failure to be sure that users can access                X.25.   &         9.1 Testing Your Configuration  F               You can run the CTP either in loopback (from your systemG               through the PSDN and back to your system), or to a remoteu&               system through the PSDN.  2         9.1.1 Running the CTP for Loopback Testing  H               Use loopback testing if you want to test access to a PSDN,D               or if a remote system running X.25 for OpenVMS V1.0 or%               later is not available.                  Restrictions  G               o  Your PSDN must allow loopback from the network to youra                  system.    I                                           Verifying the Configuration 9-1d n              Verifying the Configurationr"     9.1 Testing Your Configuration    3     9.1.2 Running the CTP for Remote System Testing   E           Use remote system testing if you want to test communication D           with a remote DTE that has X.25 for OpenVMS, V1.0 or later!           configured and running.s             Restrictions  E           o  The remote system must be running X.25 for OpenVMS, V1.0               or later.        9.2 Preparing to Run the CTP  A           This section describes the privileges and system quotascB           required, and the actions that must be taken, before you           can run the CTP.             Privileges Requiredi  0           The following privileges are required:                NETMBX;              TMPMBX;              WORLD;e              CMKRNL;                                        #     9-2 Verifying the Configurationd "         I                                               Verifying the Configuration I                                              9.2 Preparing to Run the CTPp                      DETACH;                  SYSPRV; and                  SECURITY.  $               System Quotas Required  <               The following system quotas must be available:                    ASTLM = 100;d                  BIOLM = 100;l                  BYTLM = 40000;r!                  DIOLM = 100; and                   TQELM = 30.  )               Rights Identifiers Requiredo  A               When CTP is initialized, users are given the rights ?               identifier PSI$X25_USER. This privilege should besE               sufficient. If this provides insufficient privileges toa/               run CTP, assign BYPASS privilege._  '               X.25 for OpenVMS Software_  H               o  X.25 for OpenVMS must be configured and running on your                  system.  G               o  The DTE you want to use to make and receive calls mustiG                  be up and running. Use the following command(s) at the_/                  connector node to verify this:r  M                  ncl> show node connector-node-id x25 protocol dte-name statep  H                  If the status of your DTE is not shown as RUNNING, waitH                  for two minutes and try again. If your DTE is still notI                  RUNNING, refer to the  X.25 for OpenVMS- Problem Solving                   Guide.a                 Partner System  H               Partner systems may be either the local system running theD               CTP or an accessible X.25 for OpenVMS system correctlyB               configured to allow access from the local system and/               running CTP in Receive-Only mode.   C               You must know the X.25 address of the partner system.   I                                           Verifying the Configuration 9-3  p  c           Verifying the Configurationo     9.3 Running the CTPf         9.3 Running the CTP   A           The CTP can be run either interactively or as a networkt           object.   C              ________________________ Note ________________________i  ?              When the CTP is set up as a network object, it can =              only handle incoming calls (either from a remote @              system or calls that have been looped back from the              PSDN).   C              ______________________________________________________d  '     9.3.1 Running the CTP Interactively   :           To run the CTP interactively, enter the command:              $ run sys$test:x25$ctp  C           After some introductory screens, you are asked which mode E           you want to run the CTP in (Send/Receive Mode, Receive-Only C           Mode, or Send-Only Mode). Full details of these modes areu           given in Section 9.4.   -     9.3.2 Running the CTP as a Network Object   @           To run the CTP as a network object, enter the command:  (           $ @sys$test:x25$ctp_add_netobj  C           To run the CTP as a network object automatically when you B           start X.25 for OpenVMS, you should add the above line to           X25$STARTUP.COM.  C           To remove the CTP as a network object, enter the command:   (           $ @sys$test:x25$ctp_rem_netobj       9.4 CTP Test Modes  @           The CTP can be run in one of the following test modes:  B           o  If you run the CTP in Receive-Only Mode, you can testA              your system's ability to receive incoming calls fromm              remote systems.  D           o  If you run the CTP in Send-Only Mode, you can test yourC              system's ability to send calls to a remote system that 5              is running the CTP in Receive-Only Mode.n  #     9-4 Verifying the Configuration     p      I                                               Verifying the Configuration I                                                        9.4 CTP Test ModesE    A               o  If you run the CTP in Send/Receive Mode, you canEF                  test your system's ability to communicate with a PSDN;                  (loopback testing) or with remote systems.h  A               Full details about each of these modes are given in <               Sections 9.4.1, 9.4.2, and 9.4.3 respectively.           9.4.1 Receive-Only Modes  C               Nodes running in Receive-Only Mode are referred to asfC               listeners and the main tasks performed by these nodes                consist of:e  F               o  receiving the X.25 connection requests from the other                  node; and  B               o  setting up PVCs as test receivers, and displaying=                  testing information in the event of failure.l                 Restrictions  I               o  These nodes do not initiate any tests. This is performediE                  by nodes running the Send-Only or Send/Receive Mode.   F               o  You are not allowed to run more than one Receive-Only.                  Mode at a time on any machine  ;               o  The Receive-Only Mode should be run first.   E               When Receive-Only Mode is successfully run on a node itlD               means that the node is ready to receive and respond toH               connection requests and to send data on the resulting X.25               connection.d  F                 ________________________ Note ________________________  C                 Do not exit the Receive-Only Mode until testing hassE                 been completed by the CTP in Send/Receive Mode on thedD                 remote system, otherwise receiving will be disabled.  F                 ______________________________________________________        I                                           Verifying the Configuration 9-5s c  n           Verifying the Configurationo     9.4 CTP Test Modes         9.4.2 Send-Only Mode  ?           Nodes running in Send-Only Mode perform the followingh           tasks:  D           o  initiation of connection requests and transfer of data;              and  8           o  provision of diagnostic and error messages.  E           When running X.25 for OpenVMS, the Send-Only Mode initiates @           the testing of DTEs and accesses connections to server/           nodes of the node on which it is run.l       9.4.3 Send/Receive Modes  A           Nodes running in Send/Receive Mode perform the tasks of_C           both the Send-Only and Receive-Only modes. A node runningt?           in this mode is able to listen for its own connectionn@           requests, so that loopback tests can be performed on a           node.        9.5 Testing SVCs and PVCs_  B           Figure 9-1 provides a flowchart of the testing procedure@           for testing of SVCs and PVCs. For details of the stepsA           required to test SVCs and PVCs, refer to Sections 9.5.1sE           and 9.5.2 respectively. A summary of the tests performed ono8           each SVC or PVC are provided in Section 9.5.3.  >           Note that at the end of testing you will be promptedE           whether to repeat any of the tests. If you choose to repeatTC           tests, only the tests you chose to perform the first timeoA           will be repeated (that is, SVC testing, PVC testing, oriB           both). You cannot change the testing, but you may chooseC           different DTE classes or PVCs to be tested. If during theAB           initial testing you chose to set up PVC receivers, those8           receivers will be used for any repeat testing.              #     9-6 Verifying the Configuration  i  b      I                                               Verifying the ConfigurationeI                                                 9.5 Testing SVCs and PVCsd    ?               Figure 9-1 Configuration Test Procedure Flowcharth                                                                                        I                                           Verifying the Configuration 9-7     i           Verifying the Configurationr     9.5 Testing SVCs and PVCs          9.5.1 Testing SVCs  B           If you choose to carry out SVC testing you will be asked@           whether remote DTE SVCs are to be tested. If you enter@           Y, you may choose to provide a default destination DTE           address.             When prompted, enter:1  B           o  the security filter name (if Send/Receive or Receive-&              Only mode is being used);  @           o  a default destination X25 address to which the test*              connection is to be made; and  E           o  the name(s) of the remote DTE class(es) that you want tou              test.  >           A table will then be displayed containing remote DTE#           information. For example:c  )                    REMOTE DTE SVC TESTINGn  J                           DTE Class         Test   Dest Addr        ResultJ                           ---------         ----   ---------        ------  8                           REMCLASS-0        Yes    123458                           CLASSA            Yes    123457                           REMCLASS-1        Yes    9876   A           You must then enter a destination DTE (X.25) address onaE           which the listener (Receive-Only) resides. If you elect noto:           to specify an address, the default will be used.  D              _____________ Default Destination Address _____________  >              When running the CTP to verify a number of remoteB              DTE classes, you can use the same remote DTE, runningB              the CTP in Receive-Only Mode, as a common partner forB              each of the remote DTE classes. In this case, the DTE@              address of the partner system may be specified as aC              Default Destination Address to avoid having to specify               it repeatedly.   B              You cannot use a single local DTE as a common partner=              system to verify a number of local DTEs, because   #     9-8 Verifying the Configurationh z         I                                               Verifying the ConfigurationyI                                                 9.5 Testing SVCs and PVCst    A                 the CTP enables only the DTE being tested and the 2                 remaining local DTES are disabled.  F                 Therefore you should not specify a default DTE addressD                 and each local DTE should act as its own partner DTE#                 (in loopback Mode).   F                 ______________________________________________________  E               You are then prompted whether to change any of the test 8               information prior to performing the tests.  H               You may test as many DTE classes as you want to. After theI               DTE classes have been tested the system will display eitherfD               Success or Fail as the result of the test for each DTE               class.  I               The results for all the DTE classes are initially displayedn&               in a table. For example:  -                        REMOTE DTE SVC TESTINGt  N                               DTE Class         Test   Dest Addr        ResultN                               ---------         ----   ---------        ------  L                               REMCLASS-0        Yes    12345            FailL                               CLASSA            Yes    12345            FailO                               REMCLASS-1        Yes    9876             Successe                                  I                                           Verifying the Configuration 9-9                 Verifying the Configurationr     9.5 Testing SVCs and PVCs     @           You are then given the option to display more detailedB           test information for each DTE where the test failed. For           example:  ,                  REMOTE DTE SVC TEST FAILURE  4                    DTE Class        Failure Analysis4                    ---------        ----------------  B                    REMCLASS-0       Test:   SVC outgoing call test  P                                     Reason: Unsolic MSG$_DISCON mbx msg receivedK                                             cause code = 00, diag code = 00n  E                                     Cause:  Call cleared unexpectedlyo  +                                     Action:s  C           After reading the diagnostics and rectifying the problem,l-           run the CTP test on the DTEs again.        9.5.2 Testing PVCs  C           After you have completed SVC testing you will be promptediB           whether to test PVCs. The X.25 Client Configuration Test3           Procedure allows you to test Remote PVCs.h  C           If you are running Send/Receive or Receive-Only Modes youiC           will be prompted for the names of PVCs you want to use as            test receivers.t  @           A table will then be displayed containing PVC receiver#           information. For example:   '                     PVC RECEIVER SET UP   J                            PVC              Test   DTE Class        ResultJ                            ---              ----   ---------        ------  9                            CLASSA-RCV       Yes    CLASSA 9                            AUSNAC-RCV       Yes    AUSNAC   E           You must then enter the DTE Class to which the PVC belongs. D           If the logical name PSI$NETWORK is defined on your system,D           the definition will be used as the default DTE class name.  $     9-10 Verifying the Configuration           I                                               Verifying the Configuration I                                                 9.5 Testing SVCs and PVCs     E               The results for all PVCs are initially displayed in the !               table. For example:o  +                         PVC RECEIVER SET UP   N                                PVC              Test   DTE Class        ResultN                                ------           ----   ---------        ------  L                                CLASSA-RCV       Yes    CLASSA           FailO                                AUSNAC-RCV       Yes    AUSNAC           Success                                                                       I                                          Verifying the Configuration 9-11                 Verifying the Configuration      9.5 Testing SVCs and PVCsi    ;           Pressing <Return> will display more detailed testt=           information for each PVC where the test failed. Foro           example:  (                     PVC RECEIVER FAILURE  6                 PVC                   Failure Analysis6                 ---                   ----------------  G                 CLASSA-RCV            Reason: Failed to set up receiver C                                               status = SS$_IVDEVNAMoN                                               2nd status = PSI$C_ERR_NOSUCHPVC  H                                       Cause:  Specified PVC is not known  C                 Action:    The entity you specified does not exist..H                            Ensure that the name was entered correctly inI                            the test data. To determine which entities areh;                            configured, use the ncl command: J                              ncl> show x25 proto dte <dte-name> pvc * name-                            at the remote nodet  C           After reading the diagnostics and rectifying the problem, 2           run the CTP test on PVC receivers again.  ?           If you are running Send/Receive or Send-Only Mode yousB           will be prompted for the names of PVCs you want to test.D           Enter only the names of PVCs for which receivers have been,           successfully set up using the CTP.  ?           The same tables will be displayed as for PVC receiveri@           setup. When prompted, enter the DTE class to which the            specified PVCs belong.  =           The results will be displayed as for PVC receivers.s       9.5.3 Test Summary  C           Each time an SVC or PVC is tested the following tests are '           performed in the order shown:   7           1. SVC outgoing call test or PVC access test;-             2. Reset test;             3. Interrupt test;             4. Write/read test;e  $     9-12 Verifying the Configuration           I                                               Verifying the ConfigurationCI                                                 9.5 Testing SVCs and PVCs                    5. Reset test;                  6. Interrupt test;  %               7. Write/read test; andT  >               8. SVC outgoing clear test or PVC deaccess test.  I               If all the tests succeed the system will display Success as H               the result of the test. Otherwise, the system will displayG               Fail, and the results of the first test which failed will5%               be displayed in detail.                                                                   I                                          Verifying the Configuration 9-13O V  S           Verifying the Configurationp     9.6 CTP Failure Reasonsr         9.6 CTP Failure Reasonss  C           During CTP testing one of the following events may occur:c  &           o  a specific test fails; or             o  the CTP exits.(  E           These events and how to proceed if one occurs are described 3           in Sections 9.6.1 and 9.6.2 respectively.d       9.6.1 Test Failure  B           If a CTP test fails, an error message is displayed. EachE           error message displayed presents the following information:   C           o  the OPERATION being performed when the error occurred;   >           o  the system MESSAGE associated with the error; and  =           o  an X.25-specific REASON for the error and, wheretA              relevant, details of the action that should be takene"              to rectify the error.       9.6.2 CTP Exitsa  A           If the CTP is unable to run on your system it will exit D           with an error message. Table 9-1 details each of the errorC           messages that may be displayed and the action that should-*           be taken to rectify the problem.  A           If an error message other than those given in Table 9-1 C           is generated, please submit a Software Performance Report            (SPR).  E           Table_9-1_CTP_Errors_______________________________________   !           x25$pr file not found -n  E           Reason:       The executable for the receiver process couldr%                         not be found.l  E           Action:       Ensure that the file x25$pr.exe is present in /                         the sys$test directory._  E                                              (continued on next page)t  $     9-14 Verifying the Configuration           I                                               Verifying the ConfigurationeI                                                   9.6 CTP Failure Reasons,    I               Table_9-1_(Cont.)_CTP_Errors_______________________________     '               no connection to X25$PR - 5               timed out trying to connect to x25$pr -   E               Reason:       The CTP could not connect to the receivers$                             process.  D               Action:       Ensure that when the CTP is running, theE                             process X25$PR_PID is also running on theTI                             local system, and either X25$PR_PID or PSI$PRm?                             is running on the receiving system.   D               version mismatch between X25$PR interface and X25$PR -8               x25$ctp and x25$pr images not compatible -  D               Reason:       The sending and receiving processes haveG                             different protocol versions. You cannot usehG                             this version of the Digital X.25 Client for I                             OpenVMS AXP Systems CTP to communicate with aR@                             system that produces these messages.  C               Action:       Use loopback testing if a remote systemfE                             running X.25 for OpenVMS V1.0 or later isC*                             not available.  6               x25$pr has no room for new connections -  E               Reason:       The limit for connections to the receiver 6                             process has been exceeded.  H               Action:       Reduce the number of CTP processes trying toH                             connect to this receiver process, and/or theH                             number of circuits being tested at one time.G                             The maximum number of connections permitted "                             is 16.  0               invalid X.25 Client installation -  G               Reason:       Your X.25 Client licence has either expiredV6                             or has been de-registered.  E               Action:       The licence must be loaded and registeredsF                             before X.25 Client or the CTP can be used.  I                                                  (continued on next page)   I                                          Verifying the Configuration 9-15                 Verifying the Configuration      9.6 CTP Failure ReasonsO    E           Table_9-1_(Cont.)_CTP_Errors_______________________________u    #           X.25 Client not running -   A           Reason:       X.25 Client is installed but not running.   A           Action:       Ensure that X.25 client has been started.   "           invalid receiving mode -  ?           Reason:       The logical PSI$PR_NETOBJ_MODE has been ,                         defined incorrectly.  .           Action:       Issue the DCL command:  :                            show logical PSI$PR_NETOBJ_MODE  B                         If the logical name is defined, it must beA                         either SINK or MIRROR. Any other value is                           invalid.  '           Exceeded <quota type> quota -   C           Reason:       The system quota for the type specified has &                         been exceeded.  @           Action:       Use SYS$SYSTEM:AUTHORIZE to increase theB                         relevant quotas for your process. Refer toB                         Section 9.2 for a list of the quota valuesE           ______________required.____________________________________n                            $     9-16 Verifying the Configuration e  r                    I                                                                        10 I         _________________________________________________________________e  I                                               Modifying the Configuration     G               This chapter describes how to modify an existing X.25 fort$               OpenVMS configuration.            10.1 Overview of Methods  ;               To modify an existing configuration, you can:g  C               o  Re-run the configuration program to generate a newsI                  configuration file, based on the existing configuration. '                  Refer to Section 10.2.   G               o  Add NCL commands to, or edit existing NCL commands in,oI                  the available user NCL script files. The NCL commands in I                  these files are executed in addition to the NCL commands G                  executed by the startup script. Refer to Section 10.3.   =               o  Enter NCL commands to dynamically change the 6                  configuration. Refer to Section 10.4.  D               o  Discard the current configuration data entirely andG                  create a new configuration. This method is detailed in                   Section 10.5.  H               The choice of method determines what effect a modification3               has when the system is next rebooted:   I               o  If you run the configuration program to make the changes I                  required, the NCL script generated contains the requirednG                  configuration data. Whenever the system is started up, ?                  the NCL script is run to configure the system.   I               o  If you add NCL commands to, or edit NCL commands in, thenF                  user NCL script files, the commands are executed when0                  the startup script is next run.    I                                          Modifying the Configuration 10-1d f  u           Modifying the Configurationp     10.1 Overview of Methods    C           o  If you change the configuration dynamically by issuing C              NCL commands, those changes remain in effect until oneO1              of the following actions take place:d  D              -  the commands are revoked by subsequent NCL commands;  C              -  the configuration file is next used when the systema                 is rebooted; or.  B              -  the configuration program is next run (to generate@                 a new configuration file) and the system is then                 rebooted.                                                                   $     10-2 Modifying the Configuration    -      I                                               Modifying the Configuration I                                      10.2 Using the Configuration Program     ,         10.2 Using the Configuration Program  F               To modify a configuration originally created using basicH               mode, you can use either basic or advanced mode. To modifyI               a configuration originally created using the advanced mode,_-               you must use the advanced mode.   F                 ________________________ Note ________________________  @                 The configuration program does not permit you toA                 use basic mode to modify a configuration that was D                 originally created using advanced mode. This ensuresB                 that configuration data entered using the advanced0                 mode is retained for future use.  F                 ______________________________________________________  (               To modify a configuration:  F               1. Invoke the configuration program in basic or advanced*                  mode. Refer to Chapter 2.  C               2. Select the option Modify an existing configuration +                  script from the Main Menu.   D                  The configuration program retrieves the information6                  stored in the configuration database.  ?                  o  If the program is invoked in basic mode, iti@                     will load the information stored in the file5                     sys$startup:x25$basic_config.dat.a  B                  o  If the program is invoked in advanced mode, itI                     determines whether configuration data exists that was I                     entered using the advanced mode, that is, whether the H                     file sys$startup:x25$config.dat has been created. IfG                     this file does not exist, the configuration program G                     loads the data from the file sys$startup:x25$basic_                      config.dat.   I                  Once the configuration data has been loaded, the Sectionn#                  Menu is displayed.   G               3. Use the options on the Section Menu to modify, add to,s7                  or delete the previously entered data.   I                                          Modifying the Configuration 10-3                 Modifying the Configuration5(     10.2 Using the Configuration Program    D              _______________________ Caution _______________________  A              If you have dynamically changed the configuration by A              issuing NCL commands interactively, the changes made >              will be lost when the startup script is next run.  A              If you select to modify the configuration by mistakerA              or while modifying the configuration decide that youf@              want to revert to the previous configuration, press?              <F8> before selecting the option to create the NCL ?              script. Modifications to a configuration are saved-A              only if you select to create the NCL script and that @              script is used when the startup script is next run.  C              ______________________________________________________                                                             $     10-4 Modifying the Configuration    l      I                                               Modifying the Configuration I                                    10.3 Editing the User NCL Script Files     .         10.3 Editing the User NCL Script Files  G               Four user NCL script files are created the first time theeE               configuration program is run. These script files can be D               used to contain user-supplied NCL commands. The scriptE               files are called when the startup script is invoked andbF               any commands defined in them are used to augment the NCLC               commands in the master NCL script file generated as ae:               result of running the configuration program.  6               The available user NCL script files are:  G               sys$startup:x25$extra_        File containing additional, F               create.ncl                    user-supplied NCL commands@                                             specific to creating5                                             entities.t  G               sys$startup:x25$extra_        File containing additional,lF               enable.ncl                    user-supplied NCL commands@                                             specific to enabling5                                             entities.   G               sys$startup:x25$extra_        File containing additional, F               security.ncl                  user-supplied NCL commandsA                                             specific to security.   G               sys$startup:x25$extra_        File containing additional, F               set.ncl                       user-supplied NCL commandsC                                             specific to setting the-?                                             values of entities.   D               A standard text editor can be used to add NCL commandsG               to these script files. Each command should be placed on a G               separate line. Only valid NCL commands should be added to                the script files.1  C               By default, the commands in the user NCL script filessD               are executed only when the startup script is next run.E               To execute the commands immediately, issue the command:   %               ncl> do script-filename   <               where script-filename is one of the following:  1                  sys$startup:x25$extra_create.ncl 1                  sys$startup:x25$extra_enable.ncl 3                  sys$startup:x25$extra_security.ncl .                  sys$startup:x25$extra_set.ncl  I                                          Modifying the Configuration 10-5R S  P           Modifying the Configuration *     10.3 Editing the User NCL Script Files        C              ________________________ Note ________________________   >              The current configuration may have enabled one orC              more of the entities affected by commands specified inrB              the user NCL script files. Such entities will have to@              be disabled before the user NCL script files can be#              executed successfully.   C              ______________________________________________________i  .     10.4 Modifying a Configuration Dynamically  B           To modify an existing configuration dynamically, use NCLB           commands to alter the configuration parameters initiallyD           set up when the configuration file is run. Full details onE           how to use NCL are given in the  DECnet/OSI-Network Control            Language Reference.p  #     10.5 Discarding a Configuratione  D           If you want to discard your existing configuration or makeB           extensive modifications to your configuration, it may beA           more efficient to create an entirely new configuration.CD           This can be achieved by invoking the configuration program=           and selecting the Create option from the Main Menu.c  ?           The existing configuration is superseded when the news*           configuration file is generated.  ,     10.6 Re-using a Saved Configuration File  ;           Whenever a configuration file is generated by thef@           configuration program, the previous script (if any) isD           saved. Provided that you have not manually deleted a savedC           version, a specific version can, if required, be recalled 3           and used in place of the current version.t  8           To re-use a specific saved configuration file:  B           1. rename the required version of the x25$config.ncl_sav(              file to x25$config.ncl; and             2. boot the system.t  $     10-6 Modifying the Configuration d  l      I                                               Modifying the Configuration I                                  10.6 Re-using a Saved Configuration FileO    I               For example, to re-use version 3 of the configuration file,                 enter the command:  7               $ ren x25$config.ncl_sav;3 x25$config.nclm                                                                                  I                                          Modifying the Configuration 10-7                          I                                                                         AtI         _________________________________________________________________p  I                                     Values Specific to Your Configurationg    F               This Appendix provides of a set of blank tables in whichH               you can record the configuration parameter values specificI               to your system. You can then refer to these tables when youd.               run the configuration procedure.  F               For convenience, this Appendix has been divided into two               subsections:  E               o  Subsection A.1 provides tables specific to the basice7                  mode of the configuration program; and   H               o  Subsection A.2 provides tables specific to the advanced+                  mode of the configuration.   G               Note that there is some overlap between the data requiredR)               for each mode of operation._  5               The full list of tables is given below:   '               Forms for the Basic Mode:   6               Table A-1   X.25 over Wide Area Networks  7               Table A-2   X.25 over Local Area Networkst  %               Table A-3   X.25 Client                  Table A-4   PVCs  0               Table A-5   Incoming Call Security  &               Table A-6   X.29 Support  #               Table A-7   X.25 Mail   *               Forms for the Advanced Mode:  ,               Table A-8   Remote DTE Classes  I                                 Values Specific to Your Configuration A-1     a      )     Values Specific to Your Configuration_        $           Table A-9   Lines and DTEs             Table A-10  LLC2  )           Table A-11  Session Connections              Table A-12  PVCs             Table A-13  Groups  "           Table A-14  X.29 Support             Table A-15  X.25 Mailu  "           Table A-16  Applications             Table A-17  Filterss             Table A-18  TemplatesT  '           Table A-19  Reachable Address   5           Table A-20  Incoming Security: Applications   0           Table A-21  Incoming Security: Filters  8           Table A-22  Outgoing Security: Local Processes                                  -     A-2 Values Specific to Your Configurationn           I                                     Values Specific to Your ConfigurationrI                             A.1 Basic Mode Configuration Parameter Valueso    5         A.1 Basic Mode Configuration Parameter Values         I               Table_A-1_X.25_over_Wide_Area_Networks_____________________t  I               Information_required______Your_values______________________i                 Profile name                   X.25 address  #               Synchronous line name     &               Incoming Logical Channel               Range(s)  &               Outgoing Logical Channel               Range(s)  I               ___________________________________________________________e                                          I                                 Values Specific to Your Configuration A-3  n         )     Values Specific to Your Configuration 1     A.1 Basic Mode Configuration Parameter Valueso    E           Table_A-2_X.25_over_Local_Area_Networks____________________m  E           Information_required______Your_values______________________C             LAN device name     "           LAN remote host name(s)+             X.25 DTE address               MAC addressr  "           Incoming Logical Channel           Range(s)    "           Outgoing Logical Channel           Range(s)  E           +Multiple_LAN_remote_hosts_are_permitted.__________________   E           ___________________________________________________________     E           Table_A-3_X.25_Client______________________________________   E           Information_required______Your_values______________________                Network Name             Gateway Node Name(s)  E           ___________________________________________________________.                  -     A-4 Values Specific to Your Configuration  n  e      I                                     Values Specific to Your Configuration I                             A.1 Basic Mode Configuration Parameter Values     I               Table_A-4_PVCs_____________________________________________:  I               Information_required______Your_values______________________                  DTE name (LAN #               configurations only)+                    PVC name(s).                 Channel number(s)   I               +Multiple_DTEs_are_permitted_only_for_LAN_configurations.__e  I               ___________________________________________________________       I               Table_A-5_Incoming_Call_Security___________________________e  I               Information_required______Your_values______________________   A               Security type             Allow all incoming access @                                         Allow no incoming accessB                                         Restricted incoming access  $               If Restricted Incoming               Access:   &                  Remote DTE addresses,  &                  Access level = Remote               Charge  &                  Remote DTE addresses,  #                  Access level = Allo  I               ___________________________________________________________o            I                                 Values Specific to Your Configuration A-5     o      )     Values Specific to Your Configuration 1     A.1 Basic Mode Configuration Parameter Valuesg    E           Table_A-6_X.29_Support_____________________________________c  E           Information_required______Your_values______________________              X29 Network User           Identity  E           ___________________________________________________________o      E           Table_A-7_X.25_Mail________________________________________c  E           Information_required______Your_values______________________o             Account UIC   E           ___________________________________________________________u                                                      -     A-6 Values Specific to Your Configurationd           I                                     Values Specific to Your Configuration I                          A.2 Advanced Mode Configuration Parameter Valuesc    8         A.2 Advanced Mode Configuration Parameter Values      I               Table_A-8_Remote_DTE_Classes_______________________________n  I               Information_required______Your_values______________________e                 Name                 Outgoing Session               Template                   Segment Size  #               Node Names (connector                nodes)  I               ___________________________________________________________i        I               Table_A-9_Lines_and_DTEs___________________________________x  I               Information_required______Your_values______________________i                 Line name                  Line speed                   Link names                 DTE name                   X.25 address  I                                                  (continued on next page)n        I                                 Values Specific to Your Configuration A-7  m  s      )     Values Specific to Your Configuration 4     A.2 Advanced Mode Configuration Parameter Values    E           Table_A-9_(Cont.)_Lines_and_DTEs___________________________t  E           Information_required______Your_values______________________              Profile name  "           Incoming Logical Channel           Range(s)  "           Outgoing Logical Channel           Range(s)    -           Packet level negotiation  Yes or No   -           Extended packet sequence  Yes or Nor           numbering                Minimum packet sizeh             Maximum packet size                Default packet sizeo              Level 3 Minimum window           size                Level 3 Maximum window           size              Level 3 Default window           size    -           Extended frame sequence   Yes or Not           numbering   E                                              (continued on next page)_        -     A-8 Values Specific to Your Configuration            I                                     Values Specific to Your ConfigurationtI                          A.2 Advanced Mode Configuration Parameter Valuesg    I               Table_A-9_(Cont.)_Lines_and_DTEs___________________________s  I               Information_required______Your_values______________________   !               Level 2 Window size_                  Level 2 Frame size  2               DTE Interface type        DTE or DCE                   Segment size                 Inbound DTE Class   I               ___________________________________________________________e  I               Table_A-10_LLC2____________________________________________   I               Information_required______Your_values______________________                  LAN device namet                   LLC2 DTE namet                 LLC2 DTE address                    Local LSAP address                 Level 3 Profilee    &               Incoming Logical Channel               Range(s)  &               Outgoing Logical Channel               Range(s)  I                                                  (continued on next page)         I                                 Values Specific to Your Configuration A-9     e      )     Values Specific to Your Configuration 4     A.2 Advanced Mode Configuration Parameter Values    E           Table_A-10_(Cont.)_LLC2____________________________________a  E           Information_required______Your_values______________________c             Remote MAC address               Remote LSAP address   ;           DTE Interface type        DTE, DCE, or Negotiated     -           Packet level negotiation  Yes or No   -           Extended packet sequence  Yes or No            numbering                Minimum packet sizeu             Maximum packet sizeo               Default packet size2              Level 3 Minimum window           size                Level 3 Maximum window           size              Level 3 Default window           size               Inbound DTE Classi  E           ___________________________________________________________e            .     A-10 Values Specific to Your Configuration o  e      I                                     Values Specific to Your Configuration I                          A.2 Advanced Mode Configuration Parameter Values     I               Table_A-11_Session_Connections_____________________________h  I               Information_required______Your_values______________________                  Maximum Number oft               Session Control                Connectionsn  I               ____________________________________________________________      I               Table_A-12_PVCs____________________________________________   I               Information_required______Your_values______________________                  DTE name                   PVC name                 Channel number                   Packet sizeS                 Window size3  I               ___________________________________________________________s                                I                                Values Specific to Your Configuration A-11            )     Values Specific to Your Configurationh4     A.2 Advanced Mode Configuration Parameter Values    E           Table_A-13_Groups__________________________________________u  E           Information_required______Your_values______________________i             Group name    7           Group type                CUG, BCUG, or CUGOA              DTE name               CUG number  "           Remote DTE address (BCUG           Only)c  E           ___________________________________________________________s  E           Table_A-14_X.29_Support____________________________________c  E           Information_required______Your_values______________________              X.29 Network Userr           Identity                DTE Class for outgoing           X.29 calls  E           ___________________________________________________________                             .     A-12 Values Specific to Your Configuration           I                                     Values Specific to Your Configuration I                          A.2 Advanced Mode Configuration Parameter Values     I               Table_A-15_X.25_Mail_______________________________________u  I               Information_required______Your_values______________________                  X.25 Mail Accounto               Username    #               X.25 Mail Account UICe  I               ___________________________________________________________       I               Table_A-16_Applications____________________________________   I               Information_required______Your_values______________________                  Name  4               Type                      X.25 or X.29    #               Command file to startt               applicationN  &               Username for application                   Template names  %               Template details (referc               to Table A-18)                   Filter name(s)  &               Filter details (refer to               Table A-17)h  I               ___________________________________________________________         I                                Values Specific to Your Configuration A-13c t  c      )     Values Specific to Your Configurationl4     A.2 Advanced Mode Configuration Parameter Values    E           Table_A-17_Filters_________________________________________   E           Information_required______Your_values_______________________             Name               Priority             Incoming DTE address               Call data mask             Call data valuee               DTE classm             Sending DTE addresst               Receiving DTE addresse             Group name               Originally calledN           address              Redirect reasonc    "           Called address extension           mask  "           Called address extension           valuei               Called NSAP   E           ___________________________________________________________     .     A-14 Values Specific to Your Configuration y         I                                     Values Specific to Your Configuration I                          A.2 Advanced Mode Configuration Parameter Valuese    I               Table_A-18_Templates_______________________________________o  I               Information_required______Your_values______________________n                 Name                   DTE classe                 Call datae                   Packet size                  Window sizeo    %               Destination DTE addressn                  Fast select option    =               Reverse charging          Allow or Do not allowd                 Selected group    &               Throughput class request                 Network User               Identification                   Local facilities  A               Charging information      Display or Do not display                    RPOA sequencev  I                                                  (continued on next page)         I                                Values Specific to Your Configuration A-15     o      )     Values Specific to Your Configuration 4     A.2 Advanced Mode Configuration Parameter Values    E           Table_A-18_(Cont.)_Templates_______________________________h  E           Information_required______Your_values______________________              Local subaddress  "           Target address extension  -           NSAP mapping              Yes or NoS               Calling address            extensionl  !           Transit delay selectionr               End-to-end delay  E           Expedited data option     Use, Do not use, or Not specifiedm  E           ___________________________________________________________                                               .     A-16 Values Specific to Your Configuration           I                                     Values Specific to Your Configuration I                          A.2 Advanced Mode Configuration Parameter Values_    I               Table_A-19_Reachable_Addresses_____________________________o  I               Information_required______Your_values______________________h                 Name                   Address prefix                 DTE class     1               Address extensions        Yes or Nos  7               Conversion mechanism      X.121 or Manual     %               Destination DTE addressd               (only for Manual)   I               ___________________________________________________________c  I               Table_A-20_Incoming_Security:_Applications_________________   I               Information_required__________Your_values__________________                  Name  %               DTE addresses, Access =e               Remote Chargee    )               DTE addresses, Access = Allh  *               DTE addresses, Access = None  I               ___________________________________________________________                 I                                Values Specific to Your Configuration A-17o    a      )     Values Specific to Your Configuration54     A.2 Advanced Mode Configuration Parameter Values    E           Table_A-21_Incoming_Security:_Filters______________________S  E           Information_required__________Your_values__________________              Name    !           DTE addresses, Access =E           Remote Charge   %           DTE addresses, Access = All     &           DTE addresses, Access = None  E           ___________________________________________________________       E           Table_A-22_Outgoing_Security:_Local_Processes______________n  E           Information_required__________Your_values__________________              Rights identifier   !           DTE addresses, Access =            Remote Chargec    %           DTE addresses, Access = All   !           PVC names, Access = All             (only required if PVCs           configured)     &           DTE addresses, Access = None  E                                              (continued on next page)u            .     A-18 Values Specific to Your Configuration           I                                     Values Specific to Your Configuration I                          A.2 Advanced Mode Configuration Parameter Values     I               Table_A-22_(Cont.)_Outgoing_Security:_Local_Processes______o  I               Information_required__________Your_values___________________  &               PVC names, Access = None$               (only required if PVCs               configured)_  I               ___________________________________________________________                                                                         I                                Values Specific to Your Configuration A-19                          I                                                                         B I         _________________________________________________________________s  I                                                    Example Startup Scriptu                         !a               !a-               !      X25 CONFIGURATION SCRIPT_1               !  ================================                !mF               ! This script was produced on:  Thu Sep  2 11:49:50 1993               !                !o               !                !D               ! ,               ! Create the x25 access entity               !                ! &               create node 0 x25 access               !                !i<               ! Create the Default Security DTE Class Entity               !_               !_A               create node 0 x25 access security dte class Default_               !_               !_.               ! Create the x25 protocol entity               !_               ! (               create node 0 x25 protocol               !                !_-               ! Create and set Line:  DSY-0-0_&               ! to use device: DSY-0-0    I                                                Example Startup Script B-1  u  S           Example Startup Script                 ! F           create modem connect line DSY-0-0 communication port DSY-0-05           set modem connect line DSY-0-0 speed 256000_;           set modem connect line DSY-0-0 modem control full_E           set modem connect line DSY-0-0 suppress test indicator truef           create node 0 lapb           !a&           ! Create and set DTE:  dte-0"           ! and LAPB link:  link-0            ! using Line:  DSY-0-0           ! 4           create lapb link link-0 profile  "AUSTPAC"G           set lapb link link-0 physical line modem connect line DSY-0-0y2           set lapb link link-0 interface type  dte1           set lapb link link-0 holdback timer 508_5           set lapb link link-0 acknowledge timer 1016 4           set lapb link link-0 maximum data size 270,           set lapb link link-0 window size 2           !            !t&           ! Create and set DTE:  dte-0            ! using Line:  DSY-0-0           !            ! :           create x25 protocol dte dte-0 profile  "AUSTPAC"K           set x25 protocol dte dte-0 link service provider lapb link link-0 >           set x25 protocol dte dte-0 inbound dte class AUSTPAC:           set x25 protocol dte dte-0 x25 address 123456789>           set x25 protocol dte dte-0 interface type negotiated5           set x25 protocol dte dte-0 segment size  64 @           set x25 protocol dte dte-0 outgoing list  {[10..4095]}@           set x25 protocol dte dte-0 incoming list  {[10..4095]}<           set x25 protocol dte dte-0 minimum packet size 128<           set x25 protocol dte dte-0 maximum packet size 256<           set x25 protocol dte dte-0 default packet size 128:           set x25 protocol dte dte-0 minimum window size 1:           set x25 protocol dte dte-0 maximum window size 4:           set x25 protocol dte dte-0 default window size 2           !n           ! %           ! Create and setup LLC2 SAP_           !_           !          B-2 Example Startup Script           I                                                    Example Startup Script                       create node 0 llc2+               create node 0 llc2 sap  sap-0 J               set node 0 llc2 sap  sap-0 lan station  csma-cd station  EAA?               set node 0 llc2 sap  sap-0 local lsap address  7el               !C               !_.               ! Create and setup LLC2 SAP link               !o               !_7               create node 0 llc2 sap  sap-0 link  dte-1g6               set node 0 llc2 sap  sap-0 link  dte-1 -7                   remote mac address  aa-aa-aa-aa-aa-aa L               set node 0 llc2 sap  sap-0 link  dte-1 remote lsap address  7e               ! *               ! Create and setup llc2 dtes               !_E               create node 0 x25 protocol dte dte-1 profile  "ISO8881"lN               set node 0 x25 protocol dte dte-1 inbound dte class llc2-class-0E               set node 0 x25 protocol dte dte-1 x25 address 987654321 W               set node 0 x25 protocol dte dte-1 link service provider llc2 sap  sap-0 -                    link  dte-1 J               set node 0 x25 protocol dte dte-1 outgoing list {[10..4095]}J               set node 0 x25 protocol dte dte-1 incoming list {[10..4095]}1               set node 0 x25 protocol dte dte-1 -_K                   extended packet sequencing false, maximum window size 7 -_A                   , minimum window size 1 , default window size 2 H               set node 0 x25 protocol dte dte-1 maximum packet size 1024F               set node 0 x25 protocol dte dte-1 minimum packet size 16G               set node 0 x25 protocol dte dte-1 default packet size 128 I               set node 0 x25 protocol dte dte-1 interface type negotiateda               ! -               ! Create Local DTE Class: dte-0                ! :               create x25 access dte class dte-0 type localG               set x25 access dte class dte-0 security dte class Default ?               set x25 access dte class dte-0 local dtes (dte-0)                ! /               ! Create Local DTE Class: AUSTPAC_               ! <               create x25 access dte class AUSTPAC type localI               set x25 access dte class AUSTPAC security dte class Default A               set x25 access dte class AUSTPAC local dtes (dte-0)                !     I                                                Example Startup Script B-3n m  o           Example Startup Script      )           ! Create Local DTE Class: dte-1s           ! 6           create x25 access dte class dte-1 type localC           set x25 access dte class dte-1 security dte class Default ;           set x25 access dte class dte-1 local dtes (dte-1)_           !_0           ! Create Local DTE Class: llc2-class-0           !_=           create x25 access dte class llc2-class-0 type localtJ           set x25 access dte class llc2-class-0 security dte class DefaultB           set x25 access dte class llc2-class-0 local dtes (dte-1)           !            ! %           ! Create and set DTE GROUPSe           !e           ! 2           create node 0 x25 protocol group GROUP-0O           set x25 protocol group GROUP-0 members ((dte = dte-1 , index = 4444 - /               ), (dte = dte-0 , index = 8787 )) 8           set node 0 x25 protocol group GROUP-0 type CUG           ! 1           ! Enable commands related to DTE: dte-0s           !Y+           enable modem connect line DSY-0-0f!           enable lapb link link-0 '           enable x25 protocol dte dte-0_           !_           !            ! Create and set PVCs_           !_           !_=           create x25 protocol dte  dte-0 pvc  PVC-0 channel 5L>           set x25 protocol dte  dte-0 pvc  PVC-0 window size 2@           set x25 protocol dte  dte-0 pvc  PVC-0 packet size 1283           set x25 protocol dte dte-0    pvc PVC-0 - 5               acl ((identifier = (*), access = NONE)) =           create x25 protocol dte  dte-1 pvc  PVC-1 channel 8z>           set x25 protocol dte  dte-1 pvc  PVC-1 window size 2@           set x25 protocol dte  dte-1 pvc  PVC-1 packet size 1283           set x25 protocol dte dte-1    pvc PVC-1 - 5               acl ((identifier = (*), access = NONE))_           !_           !e         B-4 Example Startup Script t  o      I                                                    Example Startup Scripti      1               ! Create and set up the DTE CLASSESv               !u5               ! Always 'type remote' for this sectionS               !s               !_L               create node 0 x25 access dte class  REMOTE-CLASS-0 type remote?               set node 0 x25 access dte class  REMOTE-CLASS-0 -e3                   outgoing session template Default M               set node 0 x25 access dte class  REMOTE-CLASS-0 segment size 64 ?               set node 0 x25 access dte class  REMOTE-CLASS-0 -_6                   service nodes {(node = aus:.sydney -I                   , rating = 512), (node = aus:.brisbane , rating = 512)}a?               set node 0 x25 access dte class  REMOTE-CLASS-0 -S,                   security dte class Default               !_               !_2               ! Create and set reachable addresses               !                ! O               create node 0 x25 access reachable address x121 address prefix 37 J               set node 0 x25 access reachable address x121 mapping X . 121R               set node 0 x25 access reachable address x121 address extensions trueP               create node 0 x25 access reachable address x121d address prefix 36K               set node 0 x25 access reachable address x121d mapping X . 121 S               set node 0 x25 access reachable address x121d address extensions true R               create node 0 x25 access reachable address FRED address prefix 37:23S               set node 0 x25 access reachable address FRED dte class remote-class-0 J               set node 0 x25 access reachable address FRED mapping X . 121R               set node 0 x25 access reachable address FRED address extensions true               !                !_4               ! Create and set up X25 Access FILTERS               !                !21               create node 0 x25 access filter X29 <               set node 0 x25 access filter X29 priority 1127E               set node 0 x25 access filter X29 call data value %x01 -n'                   , call data mask %xfflF               set node 0 x25 access filter X29 security filter Default6               create node 0 x25 access filter X25_MAILA               set node 0 x25 access filter X25_MAIL priority 3000 5               set node 0 x25 access filter X25_MAIL - F                   call data value %xFF00000056332E30204D41494C2D3131 -    I                                                Example Startup Script B-5                 Example Startup Script      A               , call data mask %xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF G           set node 0 x25 access filter X25_MAIL security filter Defaultt9           create node 0 x25 access filter "OSI Transport"a8           set node 0 x25 access filter "OSI Transport" -F               call data value '03010100'H , call data mask 'FFFFFFFF'H8           set node 0 x25 access filter "OSI Transport" -+               redirect reason not specified N           set node 0 x25 access filter "OSI Transport" security filter Default2           create node 0 x25 access filter FILTER_0:           set node 0 x25 access filter FILTER_0 priority 1N           set node 0 x25 access filter FILTER_0 incoming dte address 888877273H           set node 0 x25 access filter FILTER_0 call data value %x12fe -%               , call data mask %x12feeP           set node 0 x25 access filter FILTER_0 inbound dte class remote-class-0M           set node 0 x25 access filter FILTER_0 sending dte address 987656789 O           set node 0 x25 access filter FILTER_0 receiving dte address 987655555n1           set node 0 x25 access filter FILTER_0 - 0               security filter APPL_APPLICATION_02           create node 0 x25 access filter FILTER_1:           set node 0 x25 access filter FILTER_1 priority 1N           set node 0 x25 access filter FILTER_1 incoming dte address 987654444H           set node 0 x25 access filter FILTER_1 call data value %x12fe -%               , call data mask %x12fe P           set node 0 x25 access filter FILTER_1 inbound dte class remote-class-0M           set node 0 x25 access filter FILTER_1 security filter FILT_FILTER_1            !8           !_/           ! Create and set application entities            !o           !_8           create node 0 x25 access application X29_LOGIND           set node 0 x25 access application X29_LOGIN type x29 loginC           set node 0 x25 access application X29_LOGIN filters (X29) H           set node 0 x25 access application X29_LOGIN template X29ServerK           set node 0 x25 access application X29_LOGIN maximum activations 5t7           create node 0 x25 access application X25_MAIL =           set node 0 x25 access application X25_MAIL type x25 G           set node 0 x25 access application X25_MAIL filters (X25_MAIL)p6           set node 0 x25 access application X25_MAIL -,               file "sys$system:x25$mail.com"C           set node 0 x25 access application X25_MAIL user "X25MAIL" <           create node 0 x25 access application APPLICATION_0B           set node 0 x25 access application APPLICATION_0 type x25         B-6 Example Startup Script           I                                                    Example Startup Scriptt      P               set node 0 x25 access application APPLICATION_0 filters (FILTER_0)?               set node 0 x25 access application APPLICATION_0 - 1                   file "nac$user:[user1]app0.com" I               set node 0 x25 access application APPLICATION_0 user "fred"-               !                ! (               ! Create and set templates               !                !_8               create node 0 x25 access template X29LoginN               set node 0 x25 access template X29Login dte class remote-class-0J               set node 0 x25 access template X29Login call data %x01000000E               set node 0 x25 access template X29Login packet size 512iC               set node 0 x25 access template X29Login window size 7sU               set node 0 x25 access template X29Login throughput class request [0..0]_L               set node 0 x25 access template X29Login reverse charging falseO               set node 0 x25 access template X29Login fast select not specifiedsR               set node 0 x25 access template X29Login network user identity %x12feP               set node 0 x25 access template X29Login charging information falseO               set node 0 x25 access template X29Login transit delay selection 0cM               set node 0 x25 access template X29Login end-to-end delay [0..0]uR               set node 0 x25 access template X29Login expedited data not specifiedH               set node 0 x25 access template X29Login nsap mapping false9               create node 0 x25 access template X29Server,8               set node 0 x25 access template X29Server -1                   throughput class request [0..0] M               set node 0 x25 access template X29Server reverse charging false P               set node 0 x25 access template X29Server fast select not specifiedQ               set node 0 x25 access template X29Server charging information false_P               set node 0 x25 access template X29Server transit delay selection 0N               set node 0 x25 access template X29Server end-to-end delay [0..0]S               set node 0 x25 access template X29Server expedited data not specifiedAI               set node 0 x25 access template X29Server nsap mapping false_7               create node 0 x25 access template Default_T               set node 0 x25 access template Default throughput class request [0..0]K               set node 0 x25 access template Default reverse charging false,N               set node 0 x25 access template Default fast select not specifiedO               set node 0 x25 access template Default charging information false N               set node 0 x25 access template Default transit delay selection 0L               set node 0 x25 access template Default end-to-end delay [0..0]Q               set node 0 x25 access template Default expedited data not specified G               set node 0 x25 access template Default nsap mapping falsev?               create node 0 x25 access template "OSI Transport"l    I                                                Example Startup Script B-7m o  e           Example Startup Script      N           set node 0 x25 access template "OSI Transport" call data '03010100'HI           set node 0 x25 access template "OSI Transport" packet size 2048_O           set node 0 x25 access template "OSI Transport" reverse charging false R           set node 0 x25 access template "OSI Transport" fast select not specified:           set node 0 x25 access template "OSI Transport" -(               charging information false:           set node 0 x25 access template "OSI Transport" -'               transit delay selection 0 P           set node 0 x25 access template "OSI Transport" end-to-end delay [0..0]:           set node 0 x25 access template "OSI Transport" -*               expedited data not specifiedJ           set node 0 x25 access template "OSI Transport" nsap mapping true6           create node 0 x25 access template TEMPLATE-0L           set node 0 x25 access template TEMPLATE-0 dte class remote-class-05           set node 0 x25 access template TEMPLATE-0 - 0               destination dte address 3234234234B           set node 0 x25 access template TEMPLATE-0 call data %x01C           set node 0 x25 access template TEMPLATE-0 packet size 512 A           set node 0 x25 access template TEMPLATE-0 window size 7 5           set node 0 x25 access template TEMPLATE-0 - -               throughput class request [0..0] J           set node 0 x25 access template TEMPLATE-0 reverse charging falseM           set node 0 x25 access template TEMPLATE-0 fast select not specified_P           set node 0 x25 access template TEMPLATE-0 network user identity %x12feN           set node 0 x25 access template TEMPLATE-0 charging information falseM           set node 0 x25 access template TEMPLATE-0 transit delay selection 0 K           set node 0 x25 access template TEMPLATE-0 end-to-end delay [0..0] P           set node 0 x25 access template TEMPLATE-0 expedited data not specifiedF           set node 0 x25 access template TEMPLATE-0 nsap mapping false           !a           ! #           ! Create Security filters            !n           ! 3           create x25 access security filter Default R           set x25 access security filter Default acl ((identifier =( Default_ALL -?               ), access = ALL),(identifier = ( Default_REMOTE -0G               ), access = REMOTE_CHARGE),(identifier = ( Default_NONE -                 ), access = NONE))>           create x25 access security filter APPL_APPLICATION_0=           set x25 access security filter APPL_APPLICATION_0 - :               acl ((identifier =( APPL_APPLICATION_0_ALL -J               ), access = ALL),(identifier = ( APPL_APPLICATION_0_REMOTE -         B-8 Example Startup Script U  A      I                                                    Example Startup Script       V                   ), access = REMOTE_CHARGE),(identifier = ( APPL_APPLICATION_0_NONE -$                   ), access = NONE))=               create x25 access security filter FILT_FILTER_1 <               set x25 access security filter FILT_FILTER_1 -9                   acl ((identifier =( FILT_FILTER_1_ALL - I                   ), access = ALL),(identifier = ( FILT_FILTER_1_REMOTE - Q                   ), access = REMOTE_CHARGE),(identifier = ( FILT_FILTER_1_NONE -x$                   ), access = NONE))               !e               ! "               ! Create Remote DTEs               !m               ! Q               create x25 access security dte class Default remote dte match_all -l)                   remote address prefix * N               set x25 access security dte class Default remote dte match_all -Q                   rights identifiers (FILT_FILTER_1_NONE,APPL_APPLICATION_0_NONE) N               set x25 access security dte class Default remote dte match_all -E                   acl ( ( identifier = { docwriter }, access = NONE)) P               create x25 access security dte class Default remote dte remdte-0 --                   remote address prefix 9876* M               set x25 access security dte class Default remote dte remdte-0 - U                   rights identifiers (FILT_FILTER_1_REMOTE,APPL_APPLICATION_0_REMOTE)-M               set x25 access security dte class Default remote dte remdte-0 -eN                   acl ( ( identifier = { docwriter }, access = REMOTE_CHARGE))P               create x25 access security dte class Default remote dte remdte-1 --                   remote address prefix 1234* M               set x25 access security dte class Default remote dte remdte-1 -eO                   rights identifiers (FILT_FILTER_1_ALL,APPL_APPLICATION_0_ALL)0M               set x25 access security dte class Default remote dte remdte-1 -oD                   acl ( ( identifier = { docwriter }, access = ALL))               !                !e:               ! Include the user's extra enable ncl script               !                !o3               do sys$startup:x25$extra_security.ncl                !o               !_!               ! Create x25 client                !                !zE               create node 0 x25 client maximum session connections 10     I                                                Example Startup Script B-9                 Example Startup Script      "           enable node 0 x25 client           !5           ! 6           ! Include the user's extra create ncl script           !            !e-           do sys$startup:x25$extra_create.ncl            !a           !C3           ! Include the user's extra set ncl scriptx           !            !y*           do sys$startup:x25$extra_set.ncl           !c            ! Enable the LLC2 SAPs           ! '           enable node 0 llc2 sap  sap-0            ! .           ! Enable the LLC2 SAP links and DTEs           ! 3           enable node 0 llc2 sap  sap-0 link  dte-1 (           enable x25 protocol dte  dte-1           !a           !c           ! Enable x25 access            !2           !c"           enable node 0 x25 access           !            ! '           ! Enable application entitiesa           !S           !m9           enable node 0 x25 access application  X29_LOGINr8           enable node 0 x25 access application  X25_MAIL=           enable node 0 x25 access application  APPLICATION_0e           !d           ! 6           ! Include the user's extra enable ncl script           !e           ! -           do sys$startup:x25$extra_enable.ncl            B-10 Example Startup Scriptr e  5                    I                                                                         CuI         _________________________________________________________________a  I                Characteristic Values of the "Default" and "OSI Transport"OI                                                                 Templatesp    I               Table C-1 contains the characteristic values of the Defaultx*               and OSI Transport templates.  C               Table C-1 Characteristic Values of "Default" and "OSICI               __________Transport"_Templates_____________________________   B                                          Value in         Value inI                                          "Default"        "OSI Transport" I               Characteristic_____________template_________template_______   ;               DTE class                  -                -   D               Call data                  -                %x03010100  >               Packet size                -                2048  ;               Window size                -                -   ;               Destination X.25 address   -                -o  ;               Fast select option         -                -l  ?               Reverse charging           False            Falsee  ;               Selected Group             -                -d  ;               Throughput class request   -                -   ?               Charging information       False            Falset  ;               RPOA sequence              -                -   ;               Local subaddress           -                -r  ;               Target address extension   -                -   >               NSAP mapping               False            True  ;               Calling address extension  -                -   ;               Transit delay selection    -                -   I                                                  (continued on next page)a  I  Characteristic Values of the "Default" and "OSI Transport" Templates C-1i 6         H     Characteristic Values of the "Default" and "OSI Transport" Templates      B           Table C-1 (Cont.) Characteristic Values of "Default" andE           __________________"OSI_Transport"_Templates________________5  >                                      Value in         Value inE                                      "Default"        "OSI Transport"rE           Characteristic_____________template_________template_______   E           End-to-end_delay___________-________________-______________x                                                                          L     C-2 Characteristic Values of the "Default" and "OSI Transport" Templates i                       I                                                                         D I         _________________________________________________________________   I                                      Configuration Files-Location and Use     G               This Appendix lists the location and use of configurationxF               files that are either created as a result of running theG               configuration program in basic and advanced configurationsF               modes or referenced when the system is booted. Table D-1F               lists the location and use of files common to both basicG               and advanced modes. These include user NCL scripts, which I               contain user-supplied NCL commands that are used to augment F               the commands in the master NCL script. These scripts areE               called by x25$config.ncl whenever the system is booted.   H               Table D-2 and Table D-3 list the location and use of files@               specific to basic and advanced modes respectively.  D               Table D-1 Configuration Files Common to Both Basic andI               __________Advanced_Modes___________________________________     (               sys$startup:x25$config.ncl  G                    The master NCL script that contains the NCL commandstA                    to create the X.25 configuration. This file is D                    generated by running the configuration program inB                    either basic or advanced mode and should not be                    edited.  G                    If the configuration needs to be changed, either run D                    x25setup in advanced mode or add the required NCLD                    commands to the appropriate user NCL script (x25_E                    extra_create.ncl, x25_extra_set.ncl, or x25_extra_x                    enable.ncl).s  7               sys$startup:x25$enable_decnet_clients.nclf  I                                                  (continued on next page)     I                                  Configuration Files-Location and Use D-1            (     Configuration Files-Location and Use      D           Table D-1 (Cont.) Configuration Files Common to Both BasicE           __________________and_Advanced_Modes_______________________   ?                The NCL script that contains the NCL commands to C                enable the x25 client entity. This file is generatedsC                by running the configuration program in either basic 9                or advanced mode and should not be edited.a  *           sys$startup:x25$extra_create.ncl  E                File containing additional, user-supplied NCL commandsxC                specific to creating entities. By default, this filee1                does not contain any NCL commands.   *           sys$startup:x25$extra_enable.ncl  E                File containing additional, user-supplied NCL commandsoC                specific to enabling entities. By default, this filef1                does not contain any NCL commands.   ,           sys$startup:x25$extra_security.ncl  E                File containing additional, user-supplied NCL commandsnC                specific to security. By default, this file does note(                contain any NCL commands.  '           sys$startup:x25$extra_set.ncl   E                File containing additional, user-supplied NCL commands =                specific to setting the values of entities. ByaD                default, this file does not contain any NCL commands.  E           ___________________________________________________________e  E           Table_D-2_Configuration_Files_Specific_to_Basic_Mode_______e  *           sys$startup:x25$basic_config.dat  E                                              (continued on next page)s            ,     D-2 Configuration Files-Location and Use    2      I                                      Configuration Files-Location and UseP      E               Table D-2 (Cont.) Configuration Files Specific to Basic I               __________________Mode_____________________________________   B                    File in which the X.25 configuration created byB                    running the configuration program in basic mode?                    is saved. This file is created so that it is B                    available for reloading if the option to modifyA                    the configuration is selected when running thesD                    configuration program in either basic or advanced.                    modes. Refer to Note below.  I               ___________________________________________________________   I               Table_D-3_Configuration_Files_Specific_to_Advanced_Mode____     (               sys$startup:x25$config.dat  B                    File in which the X.25 configuration created by@                    running the configuration program in advancedD                    mode is saved. This file is created so that it isB                    available for reloading if the option to modifyF                    the configuration is selected only when running theH                    configuration program in advanced mode. Refer to Note                    below.a  I               ___________________________________________________________x    F                 ________________________ Note ________________________  ?                 If both x25$config.dat and x25$basic_config.dat <                 have been created and the Modify an existingD                 configuration script option is selected when running@                 the configuration program in advanced mode, then,                 x25$config.dat will be used.  B                 If x25$config.dat is the only file created and theA                 Modify an existing configuration script option iseB                 selected when running the configuration program inD                 basic mode, x25$config.dat will not be used. You can                 either:   B                 o  exit basic mode and re-invoke the configuration+                    program in advanced mode   I                                  Configuration Files-Location and Use D-3  e  o      (     Configuration Files-Location and Use                       or  C              o  choose the Create a new configuration script option #                 from the Main Menu.m  C              ______________________________________________________r                                                                              ,     D-4 Configuration Files-Location and Use o  0                            F      _________________________________________________________________  F                                                                  Index      =      A                                 Advanced Mode (cont'd)xF      _______________________________     Lines and DTEs Section,  6-4,/      Adding configuration                   8-6o@         information, 2-8                 LLC2 Section,  6-4, 8-98      Address extension                   Main Menu,  8-1C        reachable addresses, 7-17         modifying a configuration, /      Address prefix,  7-17                  8-2 A      Advanced Mode                       moving between sections,s4        adding information to a              2-5, 2-6F          section,  2-8                   moving within a section,  2-5B        Applications Section, 6-5,        NCL Script Section,  6-8,0          8-17                               8-28>        changing existing information     obtaining help,  2-10;          ,  2-8                          Options Menu,  2-8rA        common operations, 2-4            Outgoing Security: LocalSC        completing a section, 2-8            Processes Section, 6-7,e0        creating a new configuration,        8-27B          8-1                             overview of configuration9        creating the configuration           sections, 6-2 F          file,  2-10                     pre-requisite knowledge,  6-1@        exiting, 2-13, 8-4                program structure,  6-1A        Filters Section, 6-5, 8-21        PVCs Section,  6-4, 8-13 8        flowcharts, 8-1                   quitting,  2-13E        Groups Section, 6-4, 8-14         Reachable Addresses Section,55        Incoming Security:                   6-7, 8-23eD          Applications Section,           Remote DTE Classes Section,4          6-7, 8-25                          6-3, 8-5E        Incoming Security: Filters        required configuration data, /          Section,  6-7, 8-26                7-1oC        Introduction Section, 8-1         required information,  6-1 A        introductory screens, 8-1         Sections Menu,  2-9, 8-2_@        invoking, 2-1                     Security Section,  8-24        leaving, 2-13, 8-4   F                                                                Index-1    e              :     Advanced Mode (cont'd)             Basic Mode (cont'd)  >       Session Connections Section,      Incoming Call Security7          6-4, 8-12                         Section, 3-3 B       supported keys,  2-7              Introduction Section,  5-1B       Templates Section,  6-5, 8-22     introductory screens,  5-16       X.25 Mail Section,  6-5, 8-16     invoking,  2-1;       X.25 Security Section,  6-7       leaving,  2-13, 5-4 7       X.29 Support Section,  6-5,       Main Menu,  5-1fB          8-15                           modifying a configuration,.     Application filters,  6-5, 8-18        5-2@     Applications,  7-11                 moving between sections,3       Command file,  6-5, 7-11,            2-5, 2-6lE          8-19                           moving within a section,  2-5P=       defining incoming calls to,       obtaining help,  2-10I:          6-5                            Options Menu,  2-8A       Name,  7-11                       overview of configuration 8       Options Menu,  8-19                  sections, 3-3@       security,  7-18                   PVCs Section,  3-3, 5-117       Type,  7-11                       quitting,  2-13 D       Username,  6-5, 7-11, 8-19        required configuration data,.       Using NSAP addresses,  6-7           4-1@       X.25,  6-5, 8-17                  Sections Menu,  2-9, 5-3<       X.29,  6-5, 8-17                  supported keys,  2-7B       X.29 Login,  8-17                 X.25 Client Section,  3-3,.     Applications Section,  6-5,            5-9E        8-17                             X.25 Mail Section,  3-4, 5-15 E                                         X.25 over Local Area Networks <     B______________________________        Section, 3-3, 5-7D     Basic configuration                 X.25 over Wide Area Networks<       X.25 Client,  5-9                    Section, 3-3, 5-5C     Basic Mode                          X.29 Support Section,  3-4,e/       adding information to a              5-14 2          section, 2-8                  BCUGs, 8-14  C       changing existing information    Bilateral Closed User Groupsc  1          , 2-8                          See BCUGsa       common operations,  2-4tF       completing a section,  2-8       C______________________________6       creating a new configuration,    Call data, 7-14;          5-2                           Call Data Mask, 7-12(<       creating the configuration       Call Data Value, 7-12E          file, 2-10                    Called Address Extension Mask, -       exiting,  2-13, 5-4                7-13}       flowcharts,  5-1#       incoming call security,  5-12e       Index-2s f  t              6         Called Address Extension Value    CTP (cont'd)D           ,  7-13                           privileges required, 9-2G         Called NSAP filters, 7-13           Receive-Only Mode, 9-4, 9-5AH         Calling address extension,          rights identifiers required,1           7-15                                9-3 H         Changing a configuration, 10-1      running as a network object,1         Changing configuration                9-4lF           information,  2-8                 running interactively, 9-4D         Channel number for PVCs, 4-4        Send-Only Mode, 9-4, 9-6G         Character-mode terminals, 6-5       Send/Receive Mode, 9-4, 9-6 G         Charging information, 7-15          system quotas required, 9-3   E         Closed User Groups                  testing access to partner ;          See CUGs                             systems,  9-3bD         Configuration files                 testing communication to;          location,  D-1                       remote systeme<          uses,  D-1                            overview, 9-2D         Configuration flowcharts            testing in loopback mode<          advanced mode,  8-1                   overview, 9-1D          basic mode,  5-1                   Testing in loopback mode@         Configuration program                  restrictions, 9-1D          description (advanced mode),       Testing to remote system@             6-1                                restrictions, 9-2;          description (basic mode),          test modes, 9-4x@             3-1                           CUG number,  7-9, 8-147         Configurations                    CUGOAs,  8-14a:          discarding,  10-6                CUGs,  6-4, 8-14  &          editing user NCL script filesI             ,  10-5                       D______________________________   ?          modifying dynamically,  10-6     Data entry mode,  2-5 @         Configuration script              Default template,  C-1F          example,  B-1                      characteristic values, C-1A         Configuration sections            Destination DTE address ;          advanced mode,  6-2                templates, 7-14 A          basic mode,  3-3                 Destination DTE Address_  E         Configuration Test Procedure        reachable addresses, 7-17h6          see CTP                          Device,  7-3E         Connector systems, 8-5            Discarding a configuration, 1         Creating a new configuration         10-6 H          advanced mode,  8-1              DTE addresses,  4-2, 4-3, 6-7,0          basic mode,  5-2                    7-3;         CTP, 9-1                          DTE classes,  7-5_E          as a network object,  9-2          reachable addresses, 7-17 A          failure reasons,  9-14             Remote, 6-3, 7-1, 8-5 ;          overview,  9-1                     templates, 7-14_          preparations,  9-2_  I                                                                   Index-3                    7     DTE Classes                        Filters (cont'd) D       filters,  7-12                    Receiving DTE Address,  7-12>     DTE name,  7-3                      Redirect Reason,  7-127     DTEs                                Security,  7-20 B       name,  7-8                        Sending DTE Address,  7-12E     DTE status                          Unspecified attributes,  8-18tD       verifying,  9-3                   Unspecified parameters,  6-5A     Dynamically modifying              Filters Section, 6-5, 8-21a1        configurations, 10-6            Flowcharts ;                                         advanced mode,  8-1 8     E______________________________     basic mode,  5-1:     End-to-end delay,  7-16            Forms for recordingC     Entering data,  2-4                  configuration values,  A-1           horizontal scrolling,  2-5F     Example startup script,  B-1       G______________________________  >     Exiting Advanced Mode,  8-4        Gateway Node Names, 4-42     Exiting Basic Mode,  5-4           Groups, 7-98     Exiting from the configuration      CUG number,  7-96        program                          DTE name,  7-96       advanced mode,  2-13              filters,  7-122       basic mode,  2-13                 name,  7-9@     Expedited data,  7-16               remote DTE address,  7-92     Extended frame sequence             type,  7-9@        numbering, 7-4                  Groups Section, 6-4, 8-14     Extended packet sequenceF        numbering, 7-4                  H______________________________  +     F                                  Help_<     _______________________________     advanced mode,  2-109     Fast select,  7-14                  basic mode,  2-10e6     Filters,  7-12                      general,  2-106       Application,  6-5, 8-18           leaving,  2-10A       Call Data Mask,  7-12             on how the program works,_/       Call Data Value,  7-12               2-10 A       Called Address Extension          on specific fields,  2-10 @          Mask, 7-13                    Horizontal scrolling, 2-5         Called Address ExtensionF          Value, 7-13                   I______________________________E       Called NSAP,  7-13               Incoming Call Security Sectione/       DTE Class,  7-12                   ,  3-3DA       Group name,  7-12                Incoming DTE Address, 7-12hE       Incoming DTE Address,  7-12      Incoming logical channel ranges4       Originally Called Address,         ,  4-2, 4-3
          7-12s       Priority,  6-5, 7-12       Index-4i h  a              7         Incoming security                 LLC2 (cont'd)n@          Applications,  7-18                level 3 profile, 7-5;          Filter,  7-20                      local LSAP, 7-5pA         Incoming Security:                  logical channels, 7-6aD           Applications Section,  6-7,       maximum packet size, 7-6D           8-25                              maximum window size, 7-7D         Incoming Security: Filters          minimum packet size, 7-6D           Section,  6-7, 8-26               minimum window size, 7-6D         Information required for            outgoing logical channel9           configuration                       range,  7-6eE          advanced mode,  6-1                packet level negotiation,e1          basic mode,  3-1                     7-6 <         Insert mode, 2-5                    packet size, 7-6<                                             remote LSAP, 7-6C         K______________________________     remote MAC address, 7-6cA         Keys used in configuration        LLC2 Section,  6-4, 8-9aH           procedure,  2-7                 Loading network profiles,  1-69         Keys used in configuration        Local processes :           program,  2-4                     security, 7-23A                                           Local subaddress,  7-15 F                                           Logical channels,  4-2, 4-3,0         L______________________________      7-3           LAN device name, 4-3I         LAN Device Name, 8-9              M______________________________m;         LAN remote host name, 4-3         MAC address,  4-3iD         Leaving Advanced Mode, 8-4        Modifying a configuration,1         Leaving Basic Mode, 5-4              10-1n>         Line name, 7-3                      advanced mode, 8-2;         Lines and DTEs, 7-3                 Basic mode, 5-2p$         Lines and DTEs Section, 6-4,+           8-6                             NfI         Line speed, 7-3                   _______________________________t@         LLC2, 7-5                         NCL script,  2-10, 6-8:          default packet size,  7-6          creating, 8-288          default window size,  7-7          example, B-1C          DTE address,  7-5                  failure to create, 8-28xC          DTE name,  7-5                     Failure to create, 2-12uC          DTEs,  8-9                       NCL Script Section,  8-28,5          extended packet sequence         Negotiationm=             numbering,  7-6                 Packet level, 7-3 =          inbound DTE class,  7-7          Network Names,  4-4 :          incoming logical channel         Network profiles8             range,  7-6                     loading, 1-6            interface mode,  7-6_          LAN device,  7-5_  I                                                                   Index-5t a  _              D     NSAP addresses,  6-7               PVCs Section, 3-3, 5-11, 6-4,-     NSAP mapping,  7-15                  8-13s  F     O______________________________    Q______________________________  8     Options Menu,  2-8                 Quitting from the>       Add an item,  2-9                  configuration program<       Continue,  2-9                    advanced mode,  2-139       Delete an item,  2-9              basic mode,  2-13        Go to Sections Menu,  2-9gF       Modify an item,  2-9             R______________________________C     Originally Called Address,         RAP, 7-18, 7-19, 7-20, 7-21,t-        7-12                              7-23l:     OSI Transport template,  C-1       Reachable addresses=       characteristic values,  C-1       address prefix,  7-17iC     Outgoing calls,  8-22               conversion mechanism,  7-17s@     Outgoing logical channel range      destination DTE address,/        , 4-2, 4-3                          7-17 8     Outgoing security                   DTE class,  7-17C       local processes,  7-23           Reachable Addresses Section, 2     Outgoing Security: Local             6-7, 8-23D        Processes Section, 6-7,         Receive-Only Mode of CTP, 9-5B        8-27                            Receiving DTE Address, 7-12<     Overstrike mode,  2-5              Redirect Reason, 7-12  <     P                                  Remote Address Prefix/     _______________________________     See RAPr>     Packet level negotiation,  7-3     Remote DTE classes, 7-1>     Packet size,  7-4                  Remote DTE Classes, 8-5B       for PVCs,  7-8                   Remote DTE classes Section,,       LLC2,  7-6                         6-3B       Templates,  7-14                 Remote DTE Classes Section,,     Planning a configuration,  1-5       8-5B     Post-configuration tasks,  2-14    Required configuration data;     Privileges required for CTP,        advanced mode,  7-1 8        9-2                              basic mode,  4-1=     Profile,  7-3                      Reverse charging, 7-14 A     Profile name,  4-2                 Reviewing information, 2-5 A     PVC name,  4-4                     RPOA sequence number, 7-15 7     PVCs,  7-8, 8-13                   Running CTP, 9-1c@       channel number,  7-8             Running the configuration6       name,  7-8                         program,  2-1A       outgoing security,  7-23          privileges required,  2-1a       packet size,  7-8s       window size,  7-8        Index-6i -  a              <                                           Templates (cont'd)D         S______________________________     Destination DTE address,  2         Sections in the configuration         7-14;           program,  2-4                     DTE class, 7-14 B          optional sections,  2-4            End-to-end delay, 7-16@         Sections Menu, 2-9                  Expedited data, 7-16=         Security                            Fast select, 7-14 B          filter,  7-20                      Local facilities, 7-15B          incoming, applications,  7-18      Local subaddress, 7-15G          Outgoing, local processes,         Network user identity, 7-15 >             7-23                            NSAP mapping, 7-15A         Security Section, 8-24              "OSI Transport", 8-22t=         Segment size, 7-5                   Packet size, 7-14eB         Selected group, 7-14                Reverse charging, 7-14F         Sending DTE Address, 7-12           RPOA sequence number, 7-15@         Send-Only Mode of CTP, 9-6          Selected group, 7-14E         Send/Receive Mode of CTP, 9-6       Target address extension,s2         Session Connections Section,          7-15E           6-4, 7-8, 8-12                    Throughput class request, 2         setld -v, 9-4                         7-14D         Setting the TERM environment        Transit delay selection,2           variable,  2-7                      7-15H         Software licenses, 1-5              Unspecified attributes, 8-22=         Specifying Gateway Node Names,      Window size, 7-14 G           4-4                             Templates Section,  6-5, 8-22iH         Specifying Network Names, 4-4     Testing the X.25 configuration2         Starting the configuration           , 9-1I           program,  2-1                   Throughput class request,  7-14 H         Startup script                    Transit delay selection,  7-15            example,  B-1I         Superseded configurations         U______________________________e  ?          re-using,  10-6                  User NCL Script Files-?         Synchronous line name, 4-2          definition of, 10-1s9         Synchronous lines, 8-6              editing, 10-5-  D                                             for NCL create commands,2         T______________________________       10-5  D         Target address extension, 7-15      for NCL enable commands,2         Templates, 7-14                       10-5D          Call data,  7-14                   for NCL security-related=          Calling address extension,           commands,  10-5 F             7-15                            for NCL set commands, 10-5$          Charging information,  7-15          Default,  6-5          "Default",  8-22n  I                                                                   Index-7     c              5                                        X.25 Mail, 6-5iC     W______________________________    X.25 Mail Section, 6-5, 8-16s>     Window size                         basic mode,  3-4, 5-15D       for PVCs,  7-8                   X.25 over Local Area Networks;       LLC2,  7-7                         Section,  3-3, 5-71C       templates,  7-14                 X.25 over Wide Area Networkso;     Window size (default)                Section,  3-3, 5-5 A       Packet level,  7-4               X.25 Security Section, 6-711     Window size (maximum)              X.29, 7-10 C       packet level,  7-4               X.29 applications, 6-5, 8-17aD     Window size (minimum)              X.29 Login applications, 8-178       packet level,  7-4               X.29 support, 6-5A                                        X.29 Support Section, 6-5, -     X______________________________      8-151>     X.121,  8-23                        basic mode,  3-4, 5-141     X.25 applications,  6-5, 8-17      x25$configa;     X.25 Client Section,  3-3, 5-9      advanced mode,  2-1 8                                         basic mode,  2-1                                                           Index-85