Configuring and Managing Host-Based X.25 Links - Edition 5 (36939-90054)

26 Chapter2
Preparing to Configure DTCs
Plan the Network Configuration
Plan the Network Configuration
Before you use NMMGR to configure DTS (the DTCs and DTC
connections for your system), you must define the physical layout and
configuration parameters for the computer, its DTCs, and all
DTC-connected devices.
Configuration values that you must determine include a name for the
computer and a link name and physical path for the link between the
computer and its DTCs. You also need to associate a name with each
DTC and define the characteristics of the devices connected to each
DTC.
You must also define X.25 network values to be configured for each DTC
that contains a DTC/X.25 Network Access card. You can configure each
DTC/X.25 Network Access card to allow PAD device connections,
system-to-system X.25 connections, or both.
If you are configuring PAD connections, you can also configure incoming
security. Security can be specified to either reject or accept incoming
calls from specific addresses. The Incoming PAD Security flowchart
shown in Figure 2-1 describes how incoming PAD calls are processed to
allow or disallow access to the host-based MPE/iX system.
On the pages that follow, information and worksheets are provided to
help define these required configuration parameters.
Incoming PAD Security
Figure 2-1 shows how incoming PAD calls are processed to allow or
disallow access to the host-based MPE/iX system.