X.25_for_OpenVMS____________________________________ Configuration Order Number: AA-Q2P5B-TE October 1996 Revision/Update Information: This revised manual supersedes Part Number AA-Q2P5A-TE. Operating System and Version: OpenVMS[R] Software Version: V1.0g. Digital Equipment Corporation (Australia) Pty. Limited. ________________________________________________________________ First Printing February 1994 Revision October 1996 The information in this document is subject to change without notice and should not be construed as a commitment by Digital Equipment Corporation. Digital Equipment Corporation assumes no responsibility for any errors that may appear in this document. The software described in this document is furnished under a license and may be used or copied only in accordance with the terms of such license. Possession, use, or copying of the software described in this publication is authorized only pursuant to a valid written license from Digital or an authorized sublicensor. No responsibility is assumed for the use or reliability of software on equipment that is not supplied by Digital Equipment Corporation or its affiliated companies. Restricted Rights: Use, duplication, or disclosure by the U.S. Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013. Digital Equipment Corporation makes no representations that the use of its products in the manner described in this publication will not infringe on existing or future patent rights, nor do the descriptions contained in this publication imply the granting of licenses to make, use, or sell equipment or software in accordance with the description. © Digital Equipment Corporation 1994 All Rights Reserved Printed in Australia The postpaid Reader's Comments forms at the end of this document request your critical evaluation to assist in preparing future documentation. The following are trademarks of Digital Equipment Corporation: DEC DECUS MUXserver VAX DEC/CMS DECstation OpenVMS VAXcluster DEC/LSEDIT DECsystems PDP VAXstation DEC/MMS DECwindows P.S.I. VMS DECnet DNA Q-bus VT DECnet-DOS DTM TSM XUI DECnet-ULTRILAT ULTRIX DECnet-VAX MASSBUS UNIBUS DECserver MCC UWS DIGITAL Alpha, the Alpha logo and the Alpha signature are trademarks of Digital Equipment Corporation. This document is available on CDROM. This document was prepared using VAX DOCUMENT, Version 2.1. _________________________________________________________________ Contents Preface................................................... ix 1 Introduction 1.1 Configuration Overview........................ 1-1 1.2 Configuration Program Modes................... 1-1 1.2.1 Selecting the Configuration Mode.......... 1-3 1.3 Changing Your Configuration................... 1-4 1.4 Obtaining Help................................ 1-4 1.5 Steps in Configuring Your System.............. 1-4 1.6 Configuration Considerations.................. 1-5 1.6.1 Required Licenses......................... 1-5 1.6.2 Network Profiles.......................... 1-6 2 Using the Configuration Program 2.1 Introduction.................................. 2-1 2.2 Invoking the Configuration Program............ 2-1 2.3 Common Operations............................. 2-4 2.3.1 Entering Information...................... 2-4 2.3.1.1 Horizontal Scrolling.................... 2-5 2.3.1.2 Data Entry Mode......................... 2-5 2.3.2 Moving Within a Section................... 2-5 2.3.3 Moving Between Sections................... 2-5 2.3.4 Keys Used in the Configuration Program.... 2-7 2.3.5 Accessing the Options Menu................ 2-8 2.4 Obtaining Help................................ 2-10 2.4.1 Obtaining Help on a Specific Field or Menu Choice.................................... 2-10 2.4.2 Obtaining General Help.................... 2-10 2.4.3 Obtaining Help on the Program............. 2-10 2.5 Creating the Configuration File............... 2-10 2.6 Quitting from the Configuration Program....... 2-13 iii 2.7 Leaving the Configuration Program............. 2-13 2.8 Post-configuration Tasks...................... 2-14 Part I Basic Configuration Mode 3 Overview of Basic Mode 3.1 Introduction to the Basic Mode................ 3-1 3.2 Configuration Program Structure............... 3-1 3.3 Configuration Sections........................ 3-3 4 Required Configuration Data 4.1 Overview...................................... 4-1 5 Flowcharts and Associated Notes 5.1 Introduction.................................. 5-1 5.1.1 Creating a New Configuration.............. 5-2 5.1.2 Modifying an Existing Configuration....... 5-2 5.1.3 Exiting the Configuration Program......... 5-4 5.2 X.25 over Wide Area Networks.................. 5-5 5.3 X.25 over Local Area Networks................. 5-7 5.4 X.25 Client................................... 5-9 5.5 PVCs.......................................... 5-11 5.6 Incoming Call Security........................ 5-12 5.7 X.29 Support.................................. 5-14 5.8 X.25 Mail..................................... 5-15 Part II Advanced Configuration Mode 6 Overview of Advanced Mode 6.1 Introduction to the Advanced Mode............. 6-1 6.2 Configuration Program Structure............... 6-1 6.3 Configuration Sections........................ 6-2 iv 7 Required Configuration Data 7.1 Overview...................................... 7-1 8 Flowcharts and Associated Notes 8.1 Introduction.................................. 8-1 8.1.1 Creating a New Configuration.............. 8-1 8.1.2 Modifying an Existing Configuration....... 8-2 8.1.3 Exiting the Configuration Program......... 8-4 8.2 Remote DTE Classes............................ 8-5 8.3 Lines and DTEs................................ 8-6 8.4 LLC2.......................................... 8-9 8.5 Session Connections........................... 8-12 8.6 PVCs.......................................... 8-13 8.7 Groups........................................ 8-14 8.8 X.29 Support.................................. 8-15 8.9 X.25 Mail..................................... 8-16 8.10 Applications.................................. 8-17 8.11 Filters....................................... 8-21 8.12 Templates..................................... 8-22 8.13 Reachable Addresses........................... 8-23 8.14 Security...................................... 8-24 8.15 Incoming Security: Applications............... 8-25 8.16 Incoming Security: Filters.................... 8-26 8.17 Outgoing Security: Local Processes............ 8-27 8.18 NCL Script.................................... 8-28 Part III Configuration Verification and Modification 9 Verifying the Configuration 9.1 Testing Your Configuration.................... 9-1 9.1.1 Running the CTP for Loopback Testing...... 9-1 9.1.2 Running the CTP for Remote System Testing................................... 9-2 9.2 Preparing to Run the CTP...................... 9-2 9.3 Running the CTP............................... 9-4 9.3.1 Running the CTP Interactively............. 9-4 9.3.2 Running the CTP as a Network Object....... 9-4 9.4 CTP Test Modes................................ 9-4 9.4.1 Receive-Only Mode......................... 9-5 v 9.4.2 Send-Only Mode............................ 9-6 9.4.3 Send/Receive Mode......................... 9-6 9.5 Testing SVCs and PVCs......................... 9-6 9.5.1 Testing SVCs.............................. 9-8 9.5.2 Testing PVCs.............................. 9-10 9.5.3 Test Summary.............................. 9-12 9.6 CTP Failure Reasons........................... 9-14 9.6.1 Test Failure.............................. 9-14 9.6.2 CTP Exits................................. 9-14 10 Modifying the Configuration 10.1 Overview of Methods........................... 10-1 10.2 Using the Configuration Program............... 10-3 10.3 Editing the User NCL Script Files............. 10-5 10.4 Modifying a Configuration Dynamically......... 10-6 10.5 Discarding a Configuration.................... 10-6 10.6 Re-using a Saved Configuration File........... 10-6 A Values Specific to Your Configuration A.1 Basic Mode Configuration Parameter Values..... A-3 A.2 Advanced Mode Configuration Parameter Values........................................ A-7 B Example Startup Script C Characteristic Values of the "Default" and "OSI Transport" Templates D Configuration Files-Location and Use Index vi Figures 5-1 Introduction.............................. 5-1 5-2 X.25 over Wide Area Networks Section...... 5-6 5-3 X.25 over Local Area Networks Section..... 5-8 5-4 X.25 Client............................... 5-10 5-5 PVCs Section.............................. 5-11 5-6 Incoming Call Security.................... 5-13 5-7 X.29 Support Section...................... 5-14 8-1 Introduction.............................. 8-1 8-2 Remote DTE Classes........................ 8-5 8-3 Lines and DTEs............................ 8-8 8-4 LLC2 DTEs................................. 8-11 8-5 PVCs...................................... 8-13 8-6 Groups.................................... 8-14 8-7 X.29 Support.............................. 8-15 8-8 Applications.............................. 8-20 8-9 Filters................................... 8-21 8-10 Templates................................. 8-22 8-11 Reachable Addresses....................... 8-23 8-12 Incoming Security: Applications .......... 8-25 8-13 Incoming Security: Filters ............... 8-26 8-14 Outgoing Security: Local Processes........ 8-27 8-15 NCL Script................................ 8-29 9-1 Configuration Test Procedure Flowchart.... 9-7 Tables 1-1 Configurations and License Requirements... 1-5 2-1 Available Keys............................ 2-7 4-1 Configuration Information: X.25 over Wide Area Networks............................. 4-2 4-2 Configuration Information: X.25 over Local Area Networks............................. 4-3 4-3 Configuration Information: X.25 Client.... 4-4 4-4 Configuration Information: PVCs........... 4-4 4-5 Configuration Information: Incoming Call Security.................................. 4-5 4-6 Configuration Information: X.29 Support... 4-5 vii 6-1 Configuration Sections Applicable to Client and Host-based Systems............. 6-3 7-1 Configuration Information: Remote DTE Classes................................... 7-1 7-2 Configuration Information: Lines and DTEs .......................................... 7-3 7-3 Configuration Information: LLC2 .......... 7-5 7-4 Configuration Information: Session Connections............................... 7-8 7-5 Configuration Information: PVCs .......... 7-8 7-6 Configuration Information: Groups ........ 7-9 7-7 Configuration Information: X.29 Support... 7-9 7-8 Configuration Information: Applications... 7-11 7-9 Configuration Information: Filters........ 7-12 7-10 Configuration Information: Templates ..... 7-14 7-11 Configuration Information: Reachable Addresses................................. 7-17 7-12 Configuration Information: Incoming Security - Applications................... 7-18 7-13 Configuration Information: Incoming Security-Filters ......................... 7-20 7-14 Configuration Information: Outgoing Security - Local Processes ............... 7-23 9-1 CTP Errors................................ 9-14 A-1 X.25 over Wide Area Networks.............. A-3 A-2 X.25 over Local Area Networks............. A-4 A-3 X.25 Client............................... A-4 A-4 PVCs...................................... A-5 A-5 Incoming Call Security.................... A-5 A-6 X.29 Support.............................. A-6 A-7 X.25 Mail................................. A-6 A-8 Remote DTE Classes........................ A-7 A-9 Lines and DTEs............................ A-7 A-10 LLC2...................................... A-9 A-11 Session Connections....................... A-11 A-12 PVCs...................................... A-11 A-13 Groups.................................... A-12 A-14 X.29 Support.............................. A-12 viii A-15 X.25 Mail................................. A-13 A-16 Applications.............................. A-13 A-17 Filters................................... A-14 A-18 Templates................................. A-15 A-19 Reachable Addresses....................... A-17 A-20 Incoming Security: Applications........... A-17 A-21 Incoming Security: Filters................ A-18 A-22 Outgoing Security: Local Processes........ A-18 C-1 Characteristic Values of "Default" and "OSI Transport" Templates................. C-1 D-1 Configuration Files Common to Both Basic and Advanced Modes........................ D-1 D-2 Configuration Files Specific to Basic Mode...................................... D-2 D-3 Configuration Files Specific to Advanced Mode...................................... D-3 ix _________________________________________________________________ Preface This guide explains how to configure X.25 for OpenVMS. Audience This guide is intended for use by anyone who is configuring an X.25 system for the first time, or is reconfiguring an existing system. This manual assumes that you understand and have some experience of: o Local Area Networks (LANs) o Wide Area Networks (WANs) o X.25 communications The configuration program can be run in two modes: basic mode, and advanced mode. To run the utility in advanced mode, you should have a good understanding of Enterprise Management Architecture (EMA) entities, and the relationship between those entities. Such information is given in the X.25 for OpenVMS- Management Guide. Structure The guide consists of ten chapters and four appendices: o Chapter 1 outlines the modes in which the configuration program can be used to configure a system and explains the areas you need to consider before you run the utility. ix o Chapter 2 details how to run the utility and how to access help information, and provides details of the keys that can be used while running the configuration program. Chapters 3 to 10 are divided logically into three Parts: o Part I details how to run the configuration program in basic mode. It consists of three chapters: - Chapter 3 provides an overview of running the configuration program in basic mode and describes each of the available configuration sections. - Chapter 4 details the data that you need to obtain before running the utility. - Chapter 5 provides flowcharts to illustrate the flow of data entry and data required within each section. Each flowchart is accompanied by a set of associated notes. o Part II details how to run the configuration program in advanced mode. It consists of three chapters: - Chapter 6 provides an overview of running the configuration program in advanced mode and describes each of the available configuration sections. - Chapter 7 details the data that you need to obtain before running the utility. - Chapter 8 provides flowcharts to illustrate the flow of data entry and data required within each section. Each flowchart is accompanied by a set of associated notes. o Part III details how to verify the configuration created and how to modify an existing configuration. This Part consists of two chapters: - Chapter 9 explains how to test your configuration using the Configuration Test Procedure (CTP). - Chapter 10 explains how to modify an existing configuration, that is, to reconfigure a system. x o The four appendices are: - Appendix A contains a series of blank forms in which you can write the values of configuration parameters specific to your system. - Appendix B contains an example configuration file produced by the configuration program. - Appendix C lists the characteristic values of the parameters in the "Default" and "OSI Transport" templates. - Appendix D lists the location and use of each of the configuration files either created as a result of running the configuration program in basic and advanced modes or supplied with the product. At the end of this manual are two Reader's Comment forms. If you have any suggestions or criticisms that you think would improve this manual, please fill in one of the forms and return it to Digital. Associated Documentation Product Documentation The following manuals in the X.25 for OpenVMS documentation set may be useful to network managers. - X.25 for OpenVMS- Management Guide This manual describes how to manage and monitor an X.25 system, and details the tools provided to administer an X.25 system. - X.25 for OpenVMS- Security Guide This manual describes the X.25 Security model and the tasks required to manage X.25 Security. - X.25 for OpenVMS- Problem Solving Guide This manual provides guidance on how to solve problems that may occur when using the product. - X.25 for OpenVMS- Accounting This manual describes how to use X.25 Accounting to obtain performance records and information on how X.25 is being used on your system. xi NCL Command Information Detailed information on Network Control Language (NCL), which is used to manage an X.25 network, is given in the following manual: o DECnet/OSI-Network Control Language Reference Conventions The following conventions are used in this guide: UPPERCASE and The OpenVMS[R] Alpha[R] operating system lowercase does not differentiate between lowercase and UPPERCASE characters. Literal strings that appear in text, examples, syntax descriptions, and function descriptions can be entered using UPPERCASE characters, lowercase characters, or a combination of both. user input In interactive examples, user input is shown in bold print. system output This typeface is used in interactive and code examples to indicate system output. In text, this typeface is used to indicate the exact name of a command, option, partition, pathname, directory, or file. $ In this manual, a dollar sign ($) is used to represent the default user prompt. In procedures, a sequence such as indicates that you must hold down the key labelled Ctrl while you press another key or a pointing device button. In procedures, a key name is shown enclosed to indicate that you press the corresponding key on the keyboard. xii 1 _________________________________________________________________ Introduction X.25 for OpenVMS needs to be configured before your system can communicate with remote systems via a Packet Switching Data Network (PSDN). This chapter provides an overview of the configuration process, and outlines the steps you should take before running the configuration program. 1.1 Configuration Overview After installing X.25 for OpenVMS it must be configured specifically for your system. X.25 for OpenVMS provides a configuration program that enables you to define configuration parameter values specific to your system. The program generates an NCL script containing the NCL commands necessary to set up your X.25 configuration. The X.25 startup script starts processes and initializes databases required by X.25. When invoked, the X.25 startup script executes the NCL script. An NCL script is a series of NCL commands, each of which relates to a specific aspect of configuration. To make each script more readable, the NCL commands are interspersed with comments that indicate what actions the subsequent NCL commands perform. An example NCL script is shown in Appendix B. 1.2 Configuration Program Modes The configuration program, which is supplied as the utility x25$configure, can be run in one of two modes to configure a system: o basic mode, which is used to create a basic working configuration. This mode provides a mechanism for configuring a system, without the need to have knowledge of, or understand, Enterprise Management Architecture Introduction 1-1 Introduction 1.2 Configuration Program Modes (EMA) entities. Full details of using this mode are given in Part I of this guide. o advanced mode, which is used to create more complex working configurations. This mode of operation requires you to have a good understanding and working knowledge of EMA entities. Full details of using this mode are given in Part II of this guide. 1-2 Introduction Introduction 1.2 Configuration Program Modes 1.2.1 Selecting the Configuration Mode The configuration mode you need to choose depends on the type of X.25 configuration you want to generate. A basic configuration consists of: o One DTE connected to a PSDN, with X.25 Mail and/or X.29 operating over that connection. The use of PVCs and DECnet OSI Transport services are also supported. or o One or more DTEs configured to run over a single LAN device, with X.25 Mail and/or X.29 operating over those connections. The use of PVCs and DECnet OSI Transport services are also supported. or o One X.25 client system connected to one or more PSDNs via one or more gateways, with X.25 Mail and/or X.29 operating over that connection. If one of these configurations satisfies your X.25 requirements, then the basic mode will be sufficient to configure your system. If, however, you require any of the following: o more than one connection to a PSDN; o connections to a Local Area Network over more than one LAN device; o both a WAN connection and a LAN connection; o more than one X.25 client system; o your own X.25 or X.29 applications to service incoming X.25 calls; or o Closed User Group support, then you will need to use the advanced mode to create your X.25 configuration. Note that any configuration data entered using the basic mode is available when the configuration program is subsequently run using the advanced mode. Therefore, you can create a simple configuration using basic mode, and Introduction 1-3 Introduction 1.2 Configuration Program Modes then add to it by running the advanced mode (using the "Modify an existing configuration script" option). 1.3 Changing Your Configuration To allow flexibility, configurations need to be modified on either a temporary or permanent basis. X.25 for OpenVMS provides a number of methods in which an existing configuration can be modified. These methods are detailed in Chapter 10. 1.4 Obtaining Help A comprehensive Help facility is available in both basic and advanced mode and can be used if further information is required while running the configuration program. Full details of the help facility available in each mode are given in Chapter 2. 1.5 Steps in Configuring Your System To configure your X.25 for OpenVMS system: 1. Plan your configuration. As part of this task you should take note of the information given in Section 1.6. Time spent planning your configuration will obviate the need to perform major or constant reconfigurations at later stages. 2. Record the information you will need during the configuration program. Tables are provided in Appendix A for this purpose. For the basic mode, use Chapter 3 and Chapter 4 to determine the information required. For the advanced mode, use Chapter 6 and Chapter 7 to determine the information required. 3. Run the configuration program in either basic mode or advanced mode (refer initially to Chapter 2 and then to Chapter 3 (basic mode) or to Chapter 6 (advanced mode)). 1-4 Introduction Introduction 1.6 Configuration Considerations 1.6 Configuration Considerations This section introduces aspects of your proposed configuration that you need to consider before you run the configuration program. 1.6.1 Required Licenses Systems running X.25 for OpenVMS have direct access to one or more PSDNs conforming to CCITT recommendation X.25 and to ISO standards 7776 and 8208, or to communicate with another node on the LAN via LLC2. In addition, X.25 for OpenVMS allows OpenVMS[R] Alpha[R] systems on a DECnet/OSI for OpenVMS Alpha network to connect to PSDNs through one or more connector nodes. This enables communication between the X.25 for OpenVMS system and a remote DTE. To run X.25 for OpenVMS you must have one or both of the following licenses: o DECnet/OSI for OpenVMS Alpha; o X.25 for OpenVMS. The type(s) of X.25 system you can configure depend on the license(s) that you have installed. Table 1-1 summarizes the possible configurations and the licenses required to run them. Table_1-1_Configurations_and_License_Requirements__________ License(s)____________Possible_X.25_Configurations_________ DECnet/OSI for CONS over LLC2 OpenVMS Alpha only CLNS over DEC-HDLC X.25 for OpenVMS X.25 over Local Area Networks only X.25 over Wide Area Networks ______________________X.25_Client_(via_a_connector_node)___ Introduction 1-5 Introduction 1.6 Configuration Considerations 1.6.2 Network Profiles A network profile contains all the pertinent network parameters for a specific X.25 network. For example, a profile contains the default value and permissible range for the X.25 window size. 1-6 Introduction 2 _________________________________________________________________ Using the Configuration Program 2.1 Introduction This chapter explains how to invoke the configuration program and provides details on the facilities and keys that are available to help you to complete the configuration. If you have not already done so, you should record the required configuration parameter values. Details of the Configuration Program Sections required for X.25 for OpenVMS systems are given in Chapter 3 (basic mode) and Chapter 6 (advanced mode). Details of the required configuration parameters for each Section in the program are given in Chapter 4 (basic mode) and Chapter 7 (advanced mode). It is recommended that you do not invoke the configuration program unless you have values for each of the required configuration parameters. ________________________ Note ________________________ Throughout this and subsequent chapters, reference is made to the keys available on a DEC terminal (VT200 or higher). Refer to Section 2.3.4 for keys that are supported on this and other terminals. ______________________________________________________ 2.2 Invoking the Configuration Program To run the configuration program: 1. Log in to a suitably privileged account. 2. Invoke the configuration program in either basic or advanced mode. Using the Configuration Program 2-1 Using the Configuration Program 2.2 Invoking the Configuration Program To invoke the configuration program in basic mode, enter the command: $ @sys$startup:x25$configure basic To invoke the configuration program in advanced mode, enter the command: $ @sys$startup:x25$configure advanced or $ @sys$startup:x25$configure When the configuration program is invoked (in either mode), the wide area network device driver configuration utility (WANDD$CONFIGURE) is run. This utility allows you to configure the synchronous device drivers to permit direct connection to a wide area network via a serial port. o If WANDD has not been configured, you are prompted whether to configure the device drivers. o If WANDD has been configured, you are prompted whether to reconfigure the device drivers. In both cases, you are then prompted whether to load the WANDD management software and the auto-configurable synchronous devices. If you select to load the auto-configurable synchronous devices, you are further prompted whether to configure the built-in serial port as a synchronous device. An example showing these prompts and example responses is given below. $ @sys$startup:x25$configure Configuring WANDD... ['?' for HELP] %WANDD$CONFIGURE-I-WANDDNOTCONFIG, WANDD has not been configured. Configure WANDD? [YES] Load WANDD? [YES] All installed synchronous devices will be automatically configured. However, the built--in serial port will only be configured at your request. Configure built-in serial port as synchronous? [YES] 2-2 Using the Configuration Program Using the Configuration Program 2.2 Invoking the Configuration Program ! SYS$STARTUP:WANDD$CONFIG.DAT ! Created by SYSTEM on 10-FEB-1994 14:28:09.02 ! load_wandd YES load_zrdriver YES ! ! End of SYS$STARTUP:WANDD$CONFIG.DAT Are you satisfied with your answers? [YES] %NET-I-LOADED, executive image X25$KERNEL_RTL.EXE loaded %NET-I-LOADED, executive image X25$MEL.EXE loaded %NET-I-LOADED, executive image X25$L2.EXE loaded %NET-I-LOADED, executive image X25$L1.EXE loaded %SYSMAN-I-OUTPUT, command execution on node SPTENZ %IOGEN-I-PREFIX, searching for ICBM with prefix SYS$ %IOGEN-I-PREFIX, searching for ICBM with prefix X25$ %IOGEN-I-SCSIPOLL, scanning for devices through SCSI port PKA0 %IOGEN-I-SCSIPOLL, scanning for devices through SCSI port PKB0 %RUN-S-PROC_ID, identification of created process is 00000092 Available Synchronous Communication Ports: 1. ZRA0 - SSCC-0-0 Press RETURN to continue... Once WANDD$CONFIGURE has been run, the initial screen of the X.25 configuration program is displayed. Using the Configuration Program 2-3 Using the Configuration Program 2.3 Common Operations 2.3 Common Operations The configuration program consists of a number of Sections, each corresponding to a logical group of information. Most Sections are optional, that is you do not have to enter information unless you want to. Such Sections begin with a question in the form: "Do you want to set up X?" If you respond "Yes" to the prompt, the rest of that Section is presented to allow you to complete it. If you respond "No" to the prompt, the next new Section is presented. You can decide at a later stage to complete any Section that you bypass (refer to Section 2.3.5). Each Section commences with a screen of introductory information and is followed by one or more screens on which you can enter data. Each data entry screen contains one or more fields in which you can enter data. Some fields are mandatory, others are optional. 2.3.1 Entering Information You can enter data in two ways: o By selecting an option from a displayed menu. To select an option, move the cursor over that option using the arrow keys (refer to Section 2.3.4) and then press . o By entering data in a field. To enter data, move to the field (refer to Section 2.3.4), key in the data, and then press . When you have entered all the required information on a screen, a new screen is automatically displayed. You cannot move to a new screen until you have completed all the mandatory fields on the current screen. 2-4 Using the Configuration Program Using the Configuration Program 2.3 Common Operations 2.3.1.1 Horizontal Scrolling Usually, when you enter data into a field, all the data you enter is displayed. However, in some cases, the maximum number of data characters you are allowed to enter is greater than the length of the field displayed on the screen. In such cases, the entered data will scroll horizontally when you have entered the maximum number of characters that can be displayed. Note that horizontal scrolling works only if the data entry screen is in Insert mode. Refer to Section 2.3.1.2. 2.3.1.2 Data Entry Mode By default, each data entry screen is invoked in Overstrike mode. In this mode, any characters entered overwrite any characters currently displayed in the data entry field. If required, a data entry screen can be placed in Insert mode. In this mode, any characters entered are inserted into the characters currently displayed; any previously entered characters are moved to the right. To change from one mode to the other, press . The current mode is displayed in the upper right-hand corner of the data entry screen. 2.3.2 Moving Within a Section To move backwards within a Section to a previous screen, press . You are allowed to move backwards within a Section whether you have completed all the screens in that Section or not. However, you can move backwards only as far as the first screen of the Section. If you have moved back to look at completed screens, you can move forward again by pressing . You can only move forward until you reach an incomplete screen. The mandatory fields on the incomplete screen must then be completed before moving on. 2.3.3 Moving Between Sections The methods available for moving between Sections depend on whether you are running the configuration program in basic or advanced mode and whether you are creating or modifying a configuration. Using the Configuration Program 2-5 Using the Configuration Program 2.3 Common Operations Basic Mode When creating a configuration, the next uncompleted Section is displayed automatically when the current Section has been completed. When the last Section (the NCL Script Section) is displayed, you are prompted whether to create the NCL script or review/modify the information you have entered. Entering "No" to this prompt displays the Sections Menu from which you can select a Section to be reviewed or modified. When modifying a configuration, a specific Section can be selected from the Sections Menu. The Sections Menu is displayed automatically after you select the type of X.25 connection required, or can be accessed from the Options Menu of the current Section by selecting the option "Go to Sections Menu" (refer to Section 2.3.5). Advanced Mode When creating a configuration, an Options Menu is displayed when you complete the last data entry screen in a Section. This menu includes options that allow you to move to the next uncompleted Section or to move to a previously completed Section (via the Sections Menu): o To move to the next uncompleted Section, select the option "Continue to a new section". o To move to a previously completed Section, select the option "Go to Sections Menu". Full details of the Options Menu are provided in Section 2.3.5. When modifying a configuration, a specific Section can be selected from the Sections Menu. The Sections Menu is displayed automatically after you select the option Modify an existing configuration script, or can be accessed from the Options Menu of the current Section by selecting the option "Go to Sections Menu" (refer to Section 2.3.5). 2-6 Using the Configuration Program Using the Configuration Program 2.3 Common Operations 2.3.4 Keys Used in the Configuration Program Table 2-1 lists the keys you can use when running the configuration program in either basic or advanced mode. Note that if your terminal does not support cursor keys, you cannot move between fields and therefore you will not be able to run the configuration procedure. To use the cursor keys, you must ensure that the "TERM" environment variable is set correctly so that it reflects the terminal being emulated. To set the TERM environment variable, enter the command: SET TERM/DEVICE=terminal_type where terminal_type is specified as vt300, vt200 etc. ________________________ Note ________________________ If you intend to run the configuration program in a DECterm window, the terminal type must be set to vt320. To set the correct terminal type: 1. Display the General Options pull-down menu. 2. Select VT300 Mode, 7--Bit Control and Terminal ID VT320 ID. 3. Select OK ______________________________________________________ Table_2-1_Available_Keys___________________________________ DEC Terminal (VT200 or higher)_Keys__________________Function_____________________ Movement Keys UP and DOWN arrow keys Moves cursor between fields LEFT and RIGHT arrow keys Moves cursor within a field or Takes you to the previous screen in the current section (continued on next page) Using the Configuration Program 2-7 Using the Configuration Program 2.3 Common Operations Table_2-1_(Cont.)_Available_Keys___________________________ DEC Terminal (VT200 or higher)_Keys__________________Function_____________________ or Takes you to the next screen in the current section or Moves cursor to end of input field Moves cursor to start of input field Edit Keys ,