HPlogo Configuring and Managing Host-Based X.25 Links: HP 3000 MPE/iX Computer Systems > Chapter 2 Preparing to Configure DTCs

Plan the Network Configuration

» 

Technical documentation

Complete book in PDF
» Feedback

 » Table of Contents

 » Glossary

 » Index

Before you use NMMGR to configure DTS (the DTCs and DTC connections for your system), you must define the physical layout and configuration parameters for the computer, its DTCs, and all DTC-connected devices.

Configuration values that you must determine include a name for the computer and a link name and physical path for the link between the computer and its DTCs. You also need to associate a name with each DTC and define the characteristics of the devices connected to each DTC.

You must also define X.25 network values to be configured for each DTC that contains a DTC/X.25 Network Access card. You can configure each DTC/X.25 Network Access card to allow PAD device connections, system-to-system X.25 connections, or both.

If you are configuring PAD connections, you can also configure incoming security. Security can be specified to either reject or accept incoming calls from specific addresses. The Incoming PAD Security flowchart shown in Figure 2-1 “Incoming PAD Security Flowchart” describes how incoming PAD calls are processed to allow or disallow access to the host-based MPE/iX system.

On the pages that follow, information and worksheets are provided to help define these required configuration parameters.

Incoming PAD Security

Figure 2-1 “Incoming PAD Security Flowchart” shows how incoming PAD calls are processed to allow or disallow access to the host-based MPE/iX system.

Figure 2-1 Incoming PAD Security Flowchart

[Incoming PAD Security Flowchart]