Eicon Networks CX1 Manual de instalación Pagina 80

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 133
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 79
G&R
The dsa.cfg configuration file
Overview
One or more local session control entities (SC) must be defined. These are
looked up using the value of the -ln line module option and contain the DSA
session control name and number of the local UNIX/Linux or Windows server
system, to be used by applications accepting incoming connects. The SC is also
used to identify the calling Host Links node on outgoing connections.
Remote session control entities (RSC) must be defined. These are looked up
using the value of the -dn or -scid line module options, the corresponding
node name field in Glink or $*$CN commands in Host Links emulator
products. They contain the DSA session control name and number of remote
systems needed by applications making connects. They also define the transport
station where the remote session control entity is to be found. If there are
several paths to the remote session control entity several transport stations can
be defined for backup or for load balancing.
Transport stations (TS) may be defined. They describe how to open transport
connections to reach remote session control entities (DSA nodes).
Transport providers (TP) may be defined. They describe which transport stack
to use on the local UNIX/Linux or Windows server system.
Symbolic ‘connection names’ (CONAME) may be defined. Clients then connect
using these symbolic names instead of directly specifying a long list of
connection parameters. This feature is similar to the ‘correspondent object’ in
the Bull front-end configuration. Security filters (-FILTER) can be used to
restrict access to these connection names.
A connection name may be defined so it picks up different connection
parameters depending on which client is connecting to it, again by the use of
security filters (PARAMS with -FILTER).
Connection names may also include access to pools of connection parameter
lists, typically used to aid in generation of unique TP LIDs or GRTS IDs. These
pools are also subject to security filtering (POOLS with -FILTER).
Gline Line Handlers and Configuration
74
Vista de pagina 79
1 2 ... 75 76 77 78 79 80 81 82 83 84 85 ... 132 133

Comentarios a estos manuales

Sin comentarios