Configuring Cisco Mainframe Channel Connection Adapters
Configuring Cisco Mainframe Channel Connection Adapters
Configuring Cisco Mainframe Channel Connection Adapters
Note In this chapter, references to Channel Port Adapter (CPA) correspond to both the ECPA and
the PCPA.
For hardware technical descriptions and information about installing the router interfaces, refer to
the hardware installation and maintenance publication for your product. For a complete description
of the CMCC adapter commands in this chapter, refer to the “Cisco Mainframe Channel Connection
Adapter Commands” chapter of the Bridging and IBM Networking Command Reference. To locate
documentation of other commands that appear in this chapter, use the command reference master
index or search online.
TCP/IP
SNA
ESCON or Parallel
7200
13337
with CPA
Channel 1/0
CIP
The CIP for the Cisco 7000 and Cisco 7500 series is designed for high-end network environments
that demand high-performance, high-port density, high-capacity solutions.
The CIP provides support for the IBM ESCON Channel Adapter (ECA) and Bus-and-Tag Parallel
Channel Adapter (PCA) channel-attached interfaces from Cisco 7000 series routers to IBM
mainframes and in most cases, it eliminates the need for a separate front-end processor (FEP).
A single CIP can support up to two physical channel interfaces in any combination of either PCA or
ECA. The CIP’s Parallel channel interface is provided by the PCA, and the ESCON channel
interface is provided by the ECA. Each CIP is pre-configured with the appropriate channel adapters
at manufacturing time.
The Cisco 7000 and Cisco 7500 series routers support online insertion and removal (OIR), which
allows you to install or remove CIPs while the system is operating.
Benefits
The key benefits of the CIP are as follows:
• Maximum throughput for every application—For the individual applications supported on the
CIP, the CIP offers maximum throughput. For example, the number of users supported for
TCP/IP offload is 10,000 and the number of LLC2 session supported is 8000.
• Scalability—The CIP supports up to 22 channel connections on a Cisco 7000 and Cisco 7500
series router platforms.
• Multiple interface support—The CIP supports multiple ESCON and Bus-and-Tag channel
interfaces.
• Higher memory capacity—The CIP offers a high memory capacity of 128 MB that can be useful
for software applications utilizing a high number of sessions. An example of such an application
is the TN3270 server.
• Port density—The CIP contains two channel interfaces, as compared to the CPA which offers one
channel interface.
CPA
The CPA is available for the Cisco 7200 series routers. The CPA expands the value of Cisco’s IBM
channel solution by providing channel connectivity to mid-range mainframe configurations. The
CPA is a standard single-width port adapter supporting ESCON or Parallel channel interfaces to
IBM mainframes.
The only differences between CMCC software applications running on the CIP and a CPA are
performance and capacity. The performance difference is based upon differences in the internal bus
architecture of a CIP vs a CPA, and the capacity difference is based on the difference in maximum
memory configurations (128 MB for CIP and 32 MB for CPA).
Each CPA provides a single channel interface for Cisco 7200-series routers. In some situations, this
eliminates the need for a separate front-end processor (FEP). The CPA contains a single I/O
connector.
The Cisco 7200-series router supports online insertion and removal (OIR), which allows you to
install or remove port adapters while the system is operating.
Benefits
The key benefits of CPA are as follows:
• Cost-effective—Both a CPA and Cisco 7200-series router provide industry-leading price
performance.
• Simplified migration path—The CPA and CIP microcode support the same features and
applications, enabling seamless migration for network expansion.
• Flexibility—The Cisco 7200 series router platform provides a great number of features and
capabilities that can be used in conjunction with a CPA.
ECPA
An ECPA is classified as a high-speed port adapter providing a single ESCON physical channel
interface. Current Cisco 7200 configuration guidelines recommend using no more than three
high-speed port adapters in a single Cisco 7200 router. Refer to the Cisco 7200 Series Port Adapter
Hardware Configuration Guidelines publication for more details.
PCPA
A PCPA provides a single Parallel channel physical interface supporting both 3.0 and 4.5 MBps data
transfer rates.
Supported Environments
The CMCC adapters provide support for the environments discussed in the following sections:
• TCP/IP Environments Using CLAW
• TCP/IP Offload Environments
• IP Host Backup Environment
• TN3270 Server Environments
• Cisco SNA Environments
• Cisco MultiPath Channel Environments
The CLAW packing feature requires changes to the mainframe CLAW driver support. In partnership
with Cisco Systems, Interlink Computer Science has made the corresponding CLAW driver change
to Cisco IOS for S/390 Release 2 and Interlink TCPaccess 5.2. Customers must make the necessary
changes to their host configurations in order to enable the CLAW packing feature.
Note IP Host Backup does not provide single system image or automatic failover to a waiting
backup application. Host operator action on the mainframe is required in these instances.
SNA session switch allows you to eliminate SNA subarea routing between hosts of TN3270
traffic by establishing APPN links with the primary LU hosts directly.
• Telnet Server Functions
From the perspective of a TN3270 client, the TN3270 server is a high-performance Telnet server
that supports Telnet connections, negotiation and data format. The server on the CMCC adapter
card supports Telnet connection negotiation and data format as specified in RFC 1576 (referred
to as “traditional TN3270”) and RFC 1647 (referred to as “TN3270E”).
S4735
Token
Router Router Ring
TN3270
client
SNA TCP/IP
Unless the TN3270 server uses a Token Ring connection to a Front-End Processor (FEP) as its host
connection, it will require CSNA or CMPC support. For this reason, TN3270 configuration issues
and tasks begins in the section “Configure TN3270 on a CMCC Adapter,” later in this chapter.
Note To enable the TN3270 server feature, you must have a CMCC adapter installed in a Cisco
7000 with RSP7000, Cisco 7500 series router, or a Cisco 7200 router. The TN3270 server is very
different from the TN3270 terminal emulation access feature described in the “Configuring Dial-In
Terminal Services” chapter of the Dial Solutions Configuration Guide.
Note You can configure a CMCC adapter interface for any or all of the supported environments. If
you want only CSNA support, for example, you need not configure TCP/IP support.
Command Purpose
interface channel slot/port Select the channel attach interface and enter
interface configuration mode.
Use the show extended channel EXEC commands to display current CMCC adapter status. This
command provides a report for each interface configured to support IBM channel attach.
Command Purpose
state-tracks-signal Enables tracking of the physical interface signal
for an ECPA or PCPA channel interface.
The state-tracks-signal command is valid only on channel interfaces which combine the functions
of both a physical and virtual interface. The ECPA and PCPA are examples of this type of channel
interface. The command is not valid for the CIP, which has a separate channel interface for the virtual
channel functions.
Assign an IP Address
You must assign an IP address to the channel interface so that it can communicate with other devices
(or tasks) on the network. The IP address you assign to the interface must be in the same subnetwork
as the hosts with which you wish to communicate.
To assign an IP address, use the following command in interface configuration mode:
Command Purpose
ip address address mask Assign an IP address and network mask to the
selected interface.
To configure an IBM channel interface, use the following command in interface configuration mode:
Command Purpose
claw path device-address ip-address host-name Define the CLAW parameters for this device.
device-name host-app device-app [broadcast]
[backup]
The CLAW Packing feature requires changes to the mainframe CLAW driver support. In partnership
with Cisco Systems, Interlink Computer Science has made the corresponding CLAW driver change
to Cisco IOS software for S/390 Release 2 and Interlink TCPaccess 5.2. Configuration parameters
in the host TCP/IP applications must change to enable the CLAW packing feature.
See the section “CMCC Interface Configuration Examples” for samples of claw commands for
different configurations.
Command Purpose
channel-protocol [s | s4] Define the Parallel data transfer rate.
Assign an IP Address
You must assign an IP address to the channel interface so that it can communicate with other devices
(or tasks) on the network. The IP address you assign to the interface must be in the same subnetwork
as the hosts with which you wish to communicate.
To assign an IP address, use the following command in interface configuration mode:
Command Purpose
ip address address mask Assign an IP address and network mask to the selected
interface.
Command Purpose
offload path device-address ip-address host-name Define the offload parameters for this device.
device-name host-app device-app host-link
device-link [broadcast] [backup]
See the section “CMCC Interface Configuration Examples” for samples of offload commands for
different configurations.
Command Purpose
channel-protocol [s | s4] Define the Parallel data transfer rate.
Command Purpose
channel-protocol [s | s4] Define the Parallel data transfer rate.
Command Purpose
csna path device [maxpiu value] [time-delay Define the CSNA subchannel device.
value] [length-delay value]
Command Purpose
source-bridge local-ring bridge-number Select source-route bridging for the selected
target-ring LAN interface.
Command Purpose
locaddr-priority list-number Select locaddr priority for the selected LAN
interface.
Command Purpose
sap-priority list-number Select sap priority for the selected LAN
interface.
Command Purpose
adapter adapno mac-address Select the internal adapter to configure.
Command Purpose
name name Select a name for the internal adapter.
Command Purpose
llc2 N1 bytes Maximum size of an I-frame in bytes.
llc2 N2 retry-count Maximum retry count.
llc2 Nw window-size-increase Increase the window size for consecutive good
I-frame received (zero is disabled).
llc2 ack-delay-time milliseconds Maximum time for incoming I-frames to stay
unacknowledged.
llc2 ack-max frame-count Maximum number of I-frames received before an
acknowledgment must be sent.
llc2 idle-time milliseconds Frequency of polls during periods of idle traffic.
llc2 local-window frame-count Maximum number of I-frames to send before
waiting for an acknowledgment.
llc2 recv-window frame-count Receive window.
llc2 t1-time milliseconds Specify amount of time to wait for an
acknowledgment to transmit I-frames.
llc2 busy-time milliseconds Amount of time to wait while the other LLC2
station is in a busy state before attempting to poll
the remote station.
Command Purpose
llc2 tpf-time milliseconds Amount of time to wait for a final response to a
poll frame before resending the original poll
frame.
llc2 trej-time milliseconds Amount of time to wait for resending a rejected
frame before sending the reject command.
Command Purpose
claw path device-address ip-address host-name Define the CLAW parameters for this device.
device-name host-app device-app [broadcast]
backup
See the section “Configuration Tasks” for samples of claw commands for different configurations.
Command Purpose
offload path device-address ip-address host-name Define the offload parameters for this device.
device-name host-ip-link device-ip-link
host-api-link device-api-link [broadcast] backup
See the section “Configuration Tasks” for samples of offload commands for different configurations.
To configure the IP Host Backup using paths, use the following commands beginning in interface
configuration mode:
1 Command Purpose
2 path path [[path ...]] Define the backup path, or paths, for this
group and enter IP Host Backup
configuration mode.
3 claw device-address ip-address host-name Define the CLAW parameters for this
device-name host-app device-app device.
[broadcast]
4 offload path device-address ip-address Alternatively, you can define the offload
host-name device-name host-ip-link parameters for this device
device-ip-link host-api-link device-api-link
[broadcast]
5 exit Exit IP Host Backup configuration mode
and return to interface configuration mode.
In Figure 173, two host systems connect to the ESCON director switch on paths 23 and 29. The
channels both exit the switch on path 1B and attach to Router A.
Figure 173 System with an ESCON Director Switch and a Directly Attached Channel
Host A CH 23
198.92.2.12 ESCON director Router A
15 1B
19 18
Host B CH 29
198.92.2.13
Router B
Host C CH 42
S3027
198.92.2.14
Note that the path between Host A and Host B is dynamically switched within the ESCON director.
A third host is attached directly to Router B through path 42.
The IOCP control unit statements would look similar to the following examples:
• Host A
CNTLUNIT CUNUMBER=0001, PATH=(23), LINK=1B, UNITADD=((00,64)), UNIT=SCTC, CUADD=F
• Host B
CNTLUNIT CUNUMBER=0002, PATH=(29), LINK=1B, UNITADD=((00,64)), UNIT=SCTC, CUADD=A
• Host C
CNTLUNIT CUNUMBER=000A, PATH=(42), UNIT=SCTC, UNITADD=((00,64))
The system administrator can provide you with the values. For example the ESCON director ports
15 and 19 in Figure 173 are the channel attachments from the ESCON director to each host. Given
these values, the claw command path argument for the two channel attachments to Router A
becomes:
claw 150F
claw 190A
The offload command path argument for the two channel attachments to Router A becomes:
offload 150F
offload 190A
The claw command path argument for the directly attached channel to Router B is easy to determine:
claw 0100
Similarly, the offload command path argument for the directly attached channel to Router B is as
follows:
offload 0100
Next, determine the claw, csna, cmpc, or offload command device-address argument value, which
is shown as 00 in the UNITADD parameter for all three devices. Based on the above example, this
value can be any even value.
The UNITADD parameter in the CNTLUNIT macro of the IOCP file defines the valid range for
device addresses. In the example above, a UNITADD parameter of (00,64) means that the first valid
device address is 00 and the number of devices is 64 for a range of 00 to 63. In the hexadecimal
notation used by channel configuration commands this translates to a range of 00 to 3F.
The claw (or offload) commands now become:
• Router A (for the claw command)
claw 150F 00
claw 190A 00
• Host B
DEVICE EVAL CLAW 600 STSYSTEM C7000 NONE 20 20 4096 4096
LINK EVAL1 IP 0 EVAL
HOME 198.92.2.13 EVAL1
• Host C
DEVICE EVAL CLAW 700 RDUSYSTM C7000 NONE 20 20 4096 4096
LINK EVAL1 IP 0 EVAL
HOME 198.92.2.14 EVAL1
The DEVICE statement lists the host-name and device-name values to use, which follows the
CLAW 500 entry in the DEVICE statement.
The LINK statement links the device name, EVAL, to EVAL1. The IP address for EVAL1 appears
in the HOME statement.
Based on this example, you can supply the remainder of the arguments for the sample claw
commands:
• Router A
claw 150F 00 198.92.2.12 VMSYSTEM C7000 TCPIP TCPIP
claw 190A 00 198.92.2.13 STSYSTEM C7000 TCPIP TCPIP
• Router B
claw 0100 02 198.92.2.14 RDUSYSTM C7000 TCPIP TCPIP
• Router B
offload 0100 02 198.92.2.14 RDUSYSTM C7000 TCPIP TCPIP TCPIP API
CNTLUNIT CUNUMBR=0012,PATH=(28),UNIT=SCTC,UNITADD=((00,256))
**** The device-address is the UNITADD value of 00
From this example, the claw command would be similar to the following:
claw 0100 00 197.91.2.12 CISCOVM EVAL TCPIP TCPIP
In the next example, the system administrator has given you an IODEVICE ADDRESS of 350,
which does not correspond exactly to a value in the IOCP file. In this instance you must calculate an
offset device-address argument value for the claw or offload command:
IODEVICE ADDRESS=(0340,64),CUNUMBR=(0008),UNIT=SCTC
IODEVICE ADDRESS=(0380,64),CUNUMBR=(0009),UNIT=SCTC
**** Address 350 (340 + 10) is in the range covered by CUNUMBER 0008
CNTLUNIT CUNUMBR=0008,PATH=(24),UNIT=SCTC,UNITADD=((40,64)),SHARED=N, X
**** The device-address is the UNITADD value of 40, offset by 10
**** The device-address to use is 50
From this example, the claw command would be similar to the following:
claw 0100 50 197.91.2.12 CISCOVM EVAL TCPIP TCPIP
Note In the IOCP examples for the IODEVICE and CNTLUNIT statements, UNIT=SCTC is the
usual value for ESCON channels. Parallel channels will have UNIT=3088 in the CNTLUNIT
statement and UNIT=CTC in the IODEVICE statement.
Caution When you are running MVS, you must disable the missing interrupt handler (MIH) to avoid
introducing errors into the CLAW algorithm. Refer to the IBM publication Transmission Control
Protocol/Internet Protocol TCP/IP Version 2 Release 2.1 for MVS: Planning and Customization (publication
SC31-6085 or later) for information on disabling the MIH.
Command Purpose
show controllers cbus Display the cbus internal state for the Cisco
7000 with RSP7000 and Cisco 7500 series
routers. Also included in the display is
CIP-specific information such as the currently
loaded microcode, currently loaded
microcode application segments, and load
metrics.
show controllers channel [slot/port] Display CPA-specific information, including
the currently loaded microcode.
show extended channel slot/port backup Display information about CLAW and offload
[ip-address] commands for each backup group.
show extended channel slot/port cmpc [path Display information about each CMPC
[device]] subchannel configured on the specified
CMCC adapter interface.
show extended channel slot/port connection-map Display the number of active LLC2
llc2 connections for each SAP and the mapping of
the internal MAC adapter and the SAP to the
resource that activated the SAP.
show extended channel slot/port csna [admin | oper Display information about the CSNA
| stats] [path [device]] subchannels configured on the specified
CMCC adapter interface.
show extended channel slot/port llc2 [admin | oper | Display information about the LLC2 sessions
stats] [lmac [lsap [rmac [rsap]]]] running on the CMCC adapter interfaces.
show extended channel slot/port max-llc2-sessions Display information about the number of
LLC2 sessions supported on the CMCC
adapter.
Command Purpose
show extended channel slot/port icmp-stack Display information about the ICMP stack
[ip-address] running on the CMCC adapter interfaces.
show extended channel slot/port ip-stack Display information about the IP stack
[ip-address] running on the CMCC adapter interfaces
show extended channel slot/port llc2 [admin | oper | Display information about the LCC2 sessions
stats] [lmac [lsap [rmac [rsap]]]] running on the CMCC adapter interfaces.
show extended channel slot/port packing names Display CLAW packing names and their
[path [device]] connection state.
show extended channel slot/port packing stats Display CLAW packing statistics.
[path[device]]
show extended channel slot/port statistics [path Display information about CMCC adapter
[device]] [connected] interfaces for diagnostic purposes.
show extended channel slot/port subchannel Display information about the CMCC adapter
[connected] interfaces
show extended channel slot/port tcp-connections Display information about the TCP sockets
[[loc-ip-addr [loc-port [rem-ip-addr [rem-port]] on a channel interface.
[detail | summary]
show extended channel slot/port tcp-stack Display information about the TCP stack
[ip-address] running on the CMCC adapter interfaces.
show extended channel slot/port tg [oper | stats] Display configuration, operational, and
[detailed] [tg-name] statistics information for CMPC transmission
groups configured on a specified CMCC
adapter internal LAN interface.
show extended channel slot/port tn3270-server Display current configuration parameters and
the status of the PUs defined in each TN3270
server.
show extended channel slot/port tn3270-server Display information about all clients at a
client-ip-address ip-address [disconnected | specific IP address.
in-session | pending]
show extended channel slot/port tn3270-server dlur Display information about the SNA session
switch.
show extended channel slot/port tn3270-server Display information about the DLUIR
dlurlink name components.
show extended channel slot/port tn3270-server Display mappings between a nailed client IP
nailed-ip ip-address address and nailed LUs.
show extended channel slot/port tn3270-server pu Display the PU configuration parameters,
pu-name statistics, and all the LUs currently attached
to the PU.
show extended channel slot/port tn3270-server pu Display information about the TN3270 server
pu-name lu locaddr [history] LUs running on CMCC adapter interfaces.
show extended channel slot/port udp-listeners Display information about the UDP listener
[ip-address] sockets on the CMCC adapter interfaces.
show extended channel slot/port udp-stack Display information about the UDP stack
[ip-address] running on the CMCC adapter interfaces.
show interfaces channel slot/port accounting Display the number of packets for each
protocol type that has been sent through the
channel interface.
Command Purpose
show version Display the hardware configuration, software
version, names and sources of configuration
files, and boot images.
Command Purpose
clear counters [type slot/port] Clear interface counters for router.
Note This command will not clear counters retrieved using Simple Network Management Protocol
(SNMP), but only those seen with the EXEC show interfaces command.
To clear the counters associated with application features configured on the CMCC adapters, use the
following command in EXEC mode:
Command Purpose
clear extended counters channel slot/port [csna | Clear counters for application features
icmp-stack | ip-stack | llc2 | statistics | configured on CMCC adapters.
tcp-connections | tcp-stack | tg | tn3270-server |
udp-stack]
Note This command will not clear counters retrieved using Simple Network Management Protocol
(SNMP), but only those seen with the EXEC show extended channel commands.
Use the following command in EXEC mode to clear and reset interfaces. Under normal
circumstances, you do not need to clear the hardware logic on interfaces.
Command Purpose
clear interface type slot/port Reset the hardware logic on an interface.
In Cisco IOS release 12.0(4.1) and later, you can use the state-tracks-signal configuration command
to control how you want the state of the CPA’s channel interface to be reported. The
state-tracks-signal command is useful in environments where you are using Hot Standby Router
Protocol (HSRP) or SNMP alerts to monitor channel interface status.
Use the following command in interface configuration mode to enable physical interface signal
tracking:
Command Purpose
state-tracks-signal Enables tracking of the physical interface signal
for an ECPA or PCPA channel interface.
When the state-tracks-signal command is used on an interface that is configured for no shutdown,
then the state of the channel interface is reported according to the status of the physical channel
interface signal. If the physical channel interface signal is not present, then the channel interface
status is DOWN/DOWN.
When the channel interface is configured for no state-tracks-signal (the default) and no shutdown,
the channel interface status is always reported as UP/UP, even when there is no signal present on the
physical connection. This configuration is useful for TN3270 server environments that are operating
in a mode without any physical channel interface connections.
To check whether an interface is disabled, use the EXEC command show interfaces. An interface
that has been shut down is shown as administratively down in the show interfaces command display.
Note The exception slot command is only supported on the Cisco 7000 with RSP7000 and Cisco
7500 series routers. On the Cisco 7200 series routers, only FTP is supported.
While the router is running, you can use the write EXEC command to write the contents of a CMCC
adapter that is not halted.
Command Purpose
write Write the contents of a CMCC adapter.
Note The output obtained by the exception slot command can be interpreted by a qualified Cisco
technical support person.
You will also need to understand the following information before proceeding with TN3270
configuration tasks:
• VTAM Host Configuration Considerations for Dynamic LU Allocation
• LU Address Mapping
• TN3270 Configuration Modes
Dynamic LU Allocation
This will be the most common form of request from TN3270 clients emulating a TN3270 terminal.
The user typically wants to specify emulating a particular terminal type and normally is not
interested in what LOCADDR or LU name is allocated by the host, as long as a network solicitor
logon menu is presented. The server will perform the following on such a session request:
• Form an EBCDIC string based on the model type and number requested by the client (see
“Formation of LU Model Type and Number” on the algorithm used). This string is used as a field
in a Reply product set ID (PSID) network management vector transport (NMVT).
• Allocate a LOCADDR from the next available LU in the generic LU pool. This LOCADDR is
used in the NMVT.
• Send the formatted Reply PSID NMVT to VTAM.
When VTAM receives the NMVT, it will use the EBCDIC model type and number string to look up
an LU template under the LUGROUP. For example, the string “327802E” will find a match in the
sample configuration shown in Figure 174. An ACTLU will be sent and a terminal session with the
model and type requested by the client can be established.
Note The “E” in the model string refers to 3270 Extended Datastream. It has no connection with
the “E” in “TN3270E”.
them to different LUGROUP entries at the host. To make this as easy as possible, the SCS
requirement is also encoded into the model string sent to the host. Following the previously
described terminal type string formats accepted by the server, this additional condition is applied:
If the client has negotiated TN3270E support, the character “S” is overlaid on the fifth character of
the string, or appended if the string is less than five characters. See Table 11.
BIND-IMAGE
String from Client (ASCII) Requested? String to Host (EBCDIC)
IBM-3278-4 No 327804
IBM-3279-5E No 327905E
IBM-3279-3-E Yes 3279S5E
IBM-DYNAMIC Yes DYNASIC
ABC Yes ABCS
ABCDEFGH Yes ABCDSFG
Specific LU Allocation
A TN3270E client can request a specific LU name by using the TN3270E command CONNECT as
documented in RFC 1647. The name requested must match the name by which the TN3270 server
knows the LU (see the section “LU Names in the TN3270 Server”), and the host must have activated
the LU (with ACTLU).
PU Adapter
Command Name Idblk IP-address Type number Lsap RMAC RMAC Lu-seed Lu-name
PU X1 05D300 192.195.80.4 tok 1 4 RMAC 4100.cafe.0001 lu-seed TN3X1###
01 0
PU X2 05D300 171.69.176.4 tok 1 8 RMAC 4100.cafe.0002 lu-seed TN3X2###
02 3
From the pu (direct) TN3270 configuration command values shown in Table 12, PU X2 establishes
a link to a host at SAP 4 (the default) on MAC address 4100.cafe.0002. A client connecting to IP
address 171.69.176.43 is allocated an LU from that PU and is routed to that host.
Note that by using the DLUR function, all the LUs in the server can be defined and owned by a
controlling VTAM. When a client requests an application residing on a different VTAM host, the
controlling VTAM will issue the request to the target host which will send a BIND directly to the
client. All LU-LU data will then flow directly between the target host and the client without needing
to go through the controlling VTAM.
Example VTAM host values defining LUSEED and LUGROUP name parameters:
TN3270PU PU . * define other PU parameters
IDBLK=05D,
IDNUM=30001,
LUSEED=TN3X1###, * define the seed component of
the LU names created by DDDLU
(e.g. LOCADDR 42 will have the
name TN3X1042)
LUGROUP=AGROUP * define the LU group name
*
TN3X1100 LU LOCADDR=100, * define a terminal which
MODETAB=AMODETAB requires a specific LU name
*
TN3X1101 LU LOCADDR=101, * define a printer which requires
DLOGMODE=M3287CS a specific LU name
With the configuration shown in Figure 174 defined in the host, the ACTPU sent by VTAM for the
PU TN3270PU will have the “Unsolicited NMVT Support” set in the system services control point
(SSCP) capabilities control vector. This allows the PU to dynamically allocate LUs by sending
network management vector transport (NMVT) with a “Reply Product Set ID” control vector.
After the TN3270 server sends a positive response to the ACTPU, it will wait for VTAM to send
ACTLUs for all specifically defined LUs. In the sample configuration shown in Figure 174,
ACTLUs will be sent for TN3X1100 and TN3X1101. The server sends a positive response and sets
SLU DISABLED. The LOCADDR of these LUs are put into the specific LU cache and reserved for
specific LU name requests only.
To allow sufficient time for the VTAM host to send all the ACTLUs, a 30-second timer is started and
restarted when an ACTLU is received. When the time expires, it is assumed all ACTLUs defined in
VTAM for the PU have been sent. All LUs that have not been activated are available in a generic LU
pool to be used for DDDLU unless they have been reserved by the configuration using the
generic-pool deny TN3270 configuration command.
After the VTAM activation, the server can support session requests from clients using dynamic or
specific LU allocation.
Note If your host computer is customized for a character set other than U.S. English EBCDIC, you
might need to code some VTAM configuration tables differently than indicated in the examples
provided by Cisco.
Some VTAM configurations include the number sign (#) and at symbol (@). In the U.S. English
EBCDIC character set, these characters are stored as the hexadecimal values 7B and 7C,
respectively. VTAM will look for those hexadecimal values when processing the configuration file.
The characters used to enter these values are different in other EBCDIC National Language
character sets. Table 13 lists the languages that have different characters for the 7B and 7C
hexadecimal values and the corresponding symbols used to enter the characters.
For example, the value for the LUSEED parameter in the PU definition called TN3270PU in
Figure 174 has a value of TN3X1###. To properly code this value for LUSEED for the French
National Language character set, the value should be TN3X1£££.
Hexadecimal value
7B 7C
Language Symbol Description Symbol Description
German # Number sign § Section symbol
German (alternate) Ä A-dieresis Ö O-dieresis
Belgian # Number sign à a-grave
Brazilian Õ O-tilde à A-tilde
Danish/Norwegian Æ AE-ligature Ø O-slash
English (U.S./UK) # Number sign @ At symbol
Finnish/Swedish Ä A-dieresis Ö O-dieresis
French £ Pound sterling à a-grave
Greek £ Pound sterling § Section symbol
Hexadecimal value
7B 7C
Language Symbol Description Symbol Description
Icelandic # Number sign D Uppercase eth
Italian £ Pound sterling § Section symbol
Portuguese Õ O-tilde à A-tilde
Spanish Ñ N-tilde @ At symbol
Turkish Ö O-dieresis S S-cedilla
LU Address Mapping
Logical unit (LU) address mapping allows a client IP address to be mapped, or “nailed,” to one or
more LU local addresses on one or more physical units (PUs) by means of router configuration
commands. You can control the relationship between the TN3270 client and the LU.
Clients from traditional TN3270 (non-TN3270E) devices can connect to specific LUs, which
overcomes a limitation of TN3270 devices that cannot specify a “CONNECT LU.” LU nailing is
useful for TN3270E clients, because you can perform the configuration at the router, providing
central control, rather than at the client.
For example, the following LUs are nailed to clients at address 192.195.80.40, and LUs BAGE1004
and BAGE1005, which were connected but are now disconnected.
lu name client-ip:tcp nail state model frames in out idle for
1 BAGE1001 192.195.80.40:3822 Y P-BIND 327904E 4 4 0:22:35
2 BAGE1002 192.195.80.40:3867 Y ACT/SESS 327904E 8 7 0:21:20
3 BAGE1003 192.195.80.40:3981 Y ACT/SESS 327803E 13 14 0:10:13
4 BAGE1004 192.195.80.40:3991 Y ACT/NA 327803E 8 9 0:0:7
5 BAGE1005 192.195.80.40:3997 Y ACT/NA 327805 8 9 0:7:8
Command Purpose
lsap token-adapter 1 84 Create a DLUR LSAP and enter DLUR LSAP
configuration mode.
To return later to the DLUR LSAP configuration mode on the same entity, use the following
command in TN3270 DLUR configuration mode:
Command Purpose
lsap token-adapter 1 Enter DLUR LSAP configuration mode on the
same LSAP.
To remove an entity, the same identification parameters are needed. Use the following command
beginning in TN3270 DLUR configuration mode:
Command Purpose
no lsap token-adapter 1 Remove a previously defined DLUR LSAP entity.
TN3270 Prompt:
configuration
mode tn3270-server>
Prompt:
TN3270 DLUR
configuration tn3270-dlur>
mode
Prompts:
TN3270/PU
TN3270 DLUR PU tn3270-pu>
configuration mode tn3270-dlur>
PU Configuration Mode
There are two paths to PU configuration mode: from the TN3270 server configuration mode, or from
the DLUR configuration mode. In either mode, the pu command puts you in PU configuration mode.
From TN3270 configuration mode, the pu command to create a new PU is:
pu pu-name idblk-idnum ip-address type adapno lsap [rmac rmac] [rsap rsap] [lu-seed
lu-name-stem]
From DLUR configuration mode, the pu command to create a new PU is:
pu pu-name idblk-idnum ip-address
From either mode, to return to PU configuration mode on PU pu-name the command is:
pu pu-name
The following prompts appear, depending on which mode you are in:
tn3270-pu>
tn3270-dlur-pu>
Note You can also use DLUR to reach a mix of APPN and non-APPN hosts. The host owning the
PUs must be an APPN network node that also supports the subarea (that is, an interchange node).
When an SLU starts a session with any of the APPN hosts, it can use session switching to reach that
host directly. When it starts a session with a non-APPN host, the traffic will be routed through the
owning host.
When you use the tn3270-server command, you enter TN3270 configuration mode and can use all
other commands in the task list. You can later override many configuration values you enter in
TN3270 configuration mode from PU configuration mode. On IBM host systems, these types of
commands are often referred to as “sift down” commands because their values can sift down through
several levels of configuration and can be optionally altered at each configuration level.
Configure IP Precedence
To configure IP precedence, use the following command in TN3270 server or TN3270 PU
configuration mode:
Command Purpose
ip precedence {screen | printer} value Configure the IP level.
Use the no ip precedence screen or the no ip precedence printer commands to return the
precedence value to a default of 0.
Configure IP TOS
To configure IP TOS, use the following command in TN3270 server or TN3270 PU configuration
mode:
Command Purpose
ip tos {screen | printer} value Configure the IP TOS delay level.
Use the no ip tos screen or the no ip tos printer commands to return the precedence value to a
default of 0.
Command Purpose
pu pu-name idblk-idnum ip-address type Enter PU configuration mode and create or delete PUs
adapno lsap [rmac rmac] [rsap rsap] [lu-seed with direct host links.
lu-name-stem]
tcp-port port-nbr (Optional) Assign a TCP port other than the default of
23. This command is also available in TN3270
configuration mode.
idle-time num-of-seconds (Optional) Specify the idle time for server disconnect.
This command is also available in TN3270
configuration mode.
Command Purpose
keepalive num-of-seconds Note (Optional) Specify the maximum time allowed
between keepalive marks before the server disconnects.
This command is also available in TN3270
configuration mode. Note: To enable sending of
power-off Reply product set identification (PSID)
network management vector transport (NMVT) to the
host, the value should be set to 50000 more than the
desired value. If the configured value is greater than
50000, the value used for the keepalive function will be
50000 less than the configured value.
unbind-action {keep | disconnect} (Optional) Specify whether the TN3270 session will
disconnect when an UNBIND command is received.
This command is also available in TN3270
configuration mode.
generic-pool {permit | deny} (Optional) Select whether “left-over” LUs can be used
from a generic LU pool. This command is also
available in TN3270 configuration mode.
ip precedence {screen | printer} value (Optional) Specify the precedence level for IP traffic in
the TN3270 server.
ip tos {screen | printer} value (Optional) Specify the TOS level for IP traffic in the
TN3270 server.
When you use the pu command, you enter PU configuration mode and can use all other commands
in this task list. Configuration values you enter in PU configuration mode will override other values
entered while in TN3270 configuration mode. In addition, you can enter PU configuration mode
from DLUR configuration mode when configuring PUs that are connected by means of DLUR.
If you are configuring PUs for directly connected hosts, you need not perform any additional
configuration tasks.
Configure DLUR
This task is required when configuring DLUR connected hosts. To configure DLUR parameters for
the TN3270 server, use the following commands beginning in TN3270 configuration mode:
The pu command entered in DLUR configuration mode has different parameters than when it is
entered from TN3270 configuration mode.
Configure LU Nailing
To configure LU nailing, use the following command in TN3270 PU configuration mode:
Command Purpose
client [printer] ip ip-address [mask] lu first-locaddr Configure the IP address and nail type
[last-locaddr] and specify the locaddr range.
The client command allows a client with multiple TN3270 connections from the same IP address to
nail their screen connections to LUs that are configured as screen LUs at the host and to nail printer
connections to LUs that are configured as printers at the host. When the connection is made, a device
type of “328*” is matched to a printer definition, and any other device type is matched to a screen
definition.
Command Purpose
show extended channel slot/port tn3270-server Display the current server configuration parameters
and the status of the PUs defined in each server.
show extended channel slot/port tn3270-server Display information about all clients at a specific IP
client-ip-address ip-address [disconnected | address.
in-session | pending]
show extended channel slot/port tn3270-server Display the PU configuration parameters, statistics
pu-name and all the LUs currently attached to the PU.
show extended channel slot/port tn3270-server Display information about the TN3270 server LUs
pu pu-name lu locaddr [history] running on a CMCC adapter interface.
show extended channel slot/port tn3270-server Display mappings between a nailed client IP
nailed-ip ip-address address and nailed LUs
show extended channel tn3270-server pu-name Display the status of the LU.
lu lu-number [history]
show extended channel tn3270-server Display the information about LUs that are defined
client-ip-address ip-address under an IP address.
show extended channel slot/port tn3270-server Display information about the SNA session switch.
dlur
show extended channel slot/port tn3270-server Display information about the DLUR components.
dlurlink name
CMPC insulates VTAM from the actual network topology. The MPC protocols are terminated on the
CMCC adapter and converted to LLC protocols. After they are converted to LLC protocols, other
Cisco features can be used to connect VTAM to other APPN nodes in the network. CMPC can be
used in conjunction with DLSw+, RSRB, SR/TLB, SRB, SDLLC, QLLC, ATM LAN emulation,
and FRAS host to provide connectivity to VTAM.
CMPC supports connections to PU 2.1 nodes: APPN NN, APPN EN, and LEN. Subarea connections
are not supported.
The CMPC feature coexists on a CMCC adapter with the TCP/IP Offload, IP Datagram, TN3270,
and CSNA features.
CMPC Requirements
The following are minimum host system requirements to support CMPC:
• VTAM V4.2+, for MPC APPN ISR connections
• VTAM V4.3+, for MPC APPN HPR connections
• You must know how to configure source-bridge ring groups on the CMCC adapter.
• On the router, the combination of one read subchannel definition, one write subchannel
definition, and a transmission group definition, associated by a unique tg-name, makes up a
CMPC transmission group specification.
To help clarify the configuration process, refer to Figure 176, which shows the CMPC link between
the VTAM host, the router, and CMCC adapter card, and the communication to the LLC2 end point.
The read and write addresses defined in the VTAM host correspond to the read and write paths
defined for CMPC. CMPC communicates with the LLC2 stack, which communicates to the end
point of the connection by means of the IEEE 802.2 link.
S6226
TRL node Local SAP Peer SAP
Configuration Tasks
This section describes the following configuration tasks associated with the CMPC feature. The first
two tasks are performed on the VTAM host. The remaining tasks are performed on the router. All
tasks are required.
• Configure the VTAM Transport Resource List Major Node
• Configure the VTAM Local SNA Major Node
• Configure the CMPC Subchannels
• Configure the CMPC Transmission Groups
• Configure the CMCC Adapter Internal LAN for CMPC
In this example, device 2F0 has been configured for read and 2F1 has been configured for write. The
command to activate the TRL should be issued before activating the Local node. If your TRL data
set was named LAGTRLA, the activate command would be as follows:
v net,act,id=lagtrla,update=add
where the ID parameter refers to the name of the data set containing the TRL definition.
Note that “update=add” is preferred and is the default for later versions of VTAM. The argument
“update=all” can cause inactive TRLEs to be deleted unexpectedly from ISTTRL. However,
“update=all” must be used if you change an active TRL data set and wish the changes to become
active. The following commands are useful for displaying the current list of TRLEs:
d net,trl
d net,id=isttrl,e
d net,trl,trle=trle_name
The TRLE parameter in the local node refers to the label on the TRLE statement from the TRL major
node LAGTRLA. Also, if you do not want to run HPR set the HPR parameter to “NO.” The local
SNA major node must be activated after the TRL node has been activated. If your local node data set
was named LAGLNA, the activate command is as follows:
v net,act,id=laglna
These statements define the subchannel addresses that CMPC will use to connect to the host, and
correspond to the definitions in the TRL major network node on the host. Specifically the last two
hexadecimal digits in the read parameter match the device value configuration in the cmpc
command. The last two hexadecimal digits in the write parameter match the device value in the
cmpc command.
Use the no cmpc path device command to remove the definition of a subchannel.
Command Purpose
tg tg-name llc type adaptno lsap [rmac rmac] [rsap rsap] Define the CMPC transmission group
name.
The tg command defines an LLC connection with a complete addressing 4-tuple. The lsap, rmac,
and rsap are specified explicitly by parameters. The lmac is the LMAC of the adapter referred to by
the type and adaptno parameters.
The tg-name must match the name given in the cmpc command issued in the physical interfaces on
the same CMCC adapter.
Use the no tg command to remove a CMPC transmission group from the configuration, which will
deactivate the named CMPC transmission group.
To change any parameter of the tg statement, the statement must be removed by using the no tg
tg-name command.
Use the no lan command to disconnect all LLC2 sessions established through all internal LAN
interfaces configured on a particular internal LAN.
Up to 18 internal adapters can be configured on a CMCC adapter.
Configure SRB
Select the bridging characteristics for Token Ring and FDDI, or Ethernet. Use the following
command in internal LAN configuration mode:
Command Purpose
source-bridge local-ring bridge-number target-ring Select source-route bridging for the selected
LAN interface.
Command Purpose
locaddr-priority list-number Select locaddr priority for the selected LAN
interface.
Command Purpose
sap-priority list-number Select sap priority for the selected LAN
interface.
Command Purpose
adapter adapno mac-address Select the internal adapter to configure.
Command Purpose
name name Select a name for the internal adapter.
Command Purpose
llc2 N1 bytes Maximum size of an I-frame in bytes.
Command Purpose
llc2 N2 retry-count Maximum retry count.
llc2 Nw window-size-increase Increase the window size for consecutive good
I-frame received (zero is disabled).
llc2 ack-delay-time milliseconds Maximum time for incoming I-frames to stay
unacknowledged.
llc2 ack-max frame-count Maximum number of I-frames received before an
acknowledgment must be sent.
llc2 idle-time milliseconds Frequency of polls during periods of idle traffic.
llc2 local-window frame-count Maximum number of I-frames to send before
waiting for an acknowledgment.
llc2 recv-window frame-count Receive window.
llc2 t1-time milliseconds Specify amount of time to wait for an
acknowledgment to transmit I-frames.
llc2 busy-time milliseconds Amount of time to wait while the other LLC2
station is in a busy state before attempting to poll
the remote station.
llc2 tpf-time milliseconds Amount of time to wait for a final response to a
poll frame before resending the original poll
frame.
llc2 trej-time milliseconds Amount of time to wait for resending a rejected
frame before sending the reject command.
Configuring LLC parameters is optional. Default values are used when no parameters are
configured.
After copying a CMCC ucode image to flash memory, a directory command of the flash device
displays the following:
Router#dir slot0:
Directory of slot0:/
1 -rw- 1 Aug 18 1998 12:29:12 xcpa26-2
2 -rw- 344438 Aug 18 1998 12:29:12 xcpa26-2.kernel_xcpa
3 -rw- 237848 Aug 18 1998 12:29:37 xcpa26-2.seg_802
4 -rw- 319960 Aug 18 1998 12:29:56 xcpa26-2.seg_cmpc
5 -rw- 89856 Aug 18 1998 12:30:15 xcpa26-2.seg_csna
6 -rw- 461424 Aug 18 1998 12:30:20 xcpa26-2.seg_eca
7 -rw- 80344 Aug 18 1998 12:31:03 xcpa26-2.seg_offload
8 -rw- 69376 Aug 18 1998 12:31:07 xcpa26-2.seg_pca
9 -rw- 15936 Aug 18 1998 12:31:11 xcpa26-2.seg_push
10 -rw- 158896 Aug 18 1998 12:31:12 xcpa26-2.seg_tcpip
11 -rw- 601784 Aug 18 1998 12:31:32 xcpa26-2.seg_tn3270
7995392 bytes total (5614116 bytes free)
The following example loads the microcode from an individual microcode image that is stored as a
file in Flash memory:
Router(config)# microcode ecpa slot0:xcpa26-2
Router(config)# microcode reload
The following is an example of a CLAW definition in the host configuration file for IOS/390:
000100 *---------------------------------------------
000200 * Member: IOS390R2.V510.PARM(TCPCFGxx)
000300 * Description: TCP task group configuration
000400 *---------------------------------------------
000500
000600 * Define the virtual medium
000700
000800 MEDIA VIRTUAL MTU(4096) NAME(LOOPBACK)
000900
001000 * Define the physical medium
001100
001200 MEDIA CLAW MTU(4096) NAME(ROGCLAW) ASSIST
001300
001400 * Define the host
001500
001600 NETWORK IPADDRESS(172.18.4.50)
001700 SUBNET(255.255.255.248)
001800
001900 *
002000
002100 CLAW DEVADDR(8f2)
002200 BUFSIZE(32768)
002300 IBUF(5)
002400 OBUF(5)
002500 RESTART(60)
002600 HOSTNAME(HOSTA)
002700 WSNAME(RTRA)
002800 START
002900 PACKED
003000
003100 * Define gateway
003200
003300 ROUTE DEST(0.0.0.0) ROUTE(172.18.4.49)
003400
003500 * Define the transport pr
003600
003700 TCP MAXRCVBUF(131072)
003800 MAXSNDBUF(131072)
003900 DEFRCVBUF(131072)
004000 DEFSNDBUF(131072)
004100 DELAYACK(2)
004200 FASTRX(3)
004300 MAXRXMIT(18)
004400 MINDEV(90)
004500 PORTUSE(1:4095)
004600 PORTASGN(4096:8191)
004700
004800 UDP MAXRCVBUF(64000)005200 PORTUS
004900 MAXSNDBUF(64000)
005000 DEFRCVBUF(64000)
005100 DEFSNDBUF(64000)005300 PORTAS
005200 PORTUSE(1:4095)
005300 PORTASGN(4096:8191)
005400
005500 RAW MAXRCV
005600 MAXSND
005700
Switch
Route
processor
processor
MEMD
CBus
MEMD handler
Interface
API link
processor TCP/IP
IP link stack
CIP1 Offload application
CLAW
ECA PCA
162.18.4.57
C3
ESCON
director
C6
162.18.4.59
ESCON channel Bus/Tag channel
CLAW
;START statements
START OFF
!
VTAM 1 VTAM 2
CH4/2 CBus
TCP/IP TB group 1
Bridge 1
S1/0 TR2/0 E3/0 Cisco 7500
10.30.2.2
Token
Ring D2
120 D1
IP cloud
D3
10.30.2.1
D5
Cisco 4500
S3597
Token
Ring D4
201
clockrate 56000
!
interface tokenring 2/0
mac-address 4000.7500.0200
no ip address
ring-speed 16
source-bridge 120 1 2000
source-bridge spanning
!
interface ethernet 3/0
mac-address 0200.ae00.c000
no ip address
bridge-group 1
!
interface channel 4/0
no ip address
no ip directed-broadcast
no keepalive
csna 0100 80
!
interface channel 4/1
no ip address
no ip directed-broadcast
no keepalive
csna E200 20 maxpiu 65535 time-delay 100
!
interface channel 4/2
no ip address
no ip directed-broadcast
no keepalive
max-llc2-sessions 2500
lan TokenRing 3
source-bridge 142 1 2000
adapter 0 4000.7500.4230
llc2 local-window 1
llc2 ack-max 1
adapter 1 4000.7500.4231
lan TokenRing 4
adapter 7 4000.7500.4234
adapter 8 4000.7500.4238
!
bridge 1 protocol ieee
VTAM 1
CH4/0 CBus
TCP/IP TB group 1
Bridge 1
S1/0 TR2/0 E3/0 C7200
10.30.2.2
Token
Ring D2
IP cloud 120 D1
D3
10.30.2.1
D5
Cisco 4500
15017
Token
Ring D4
201
router(cfg-tn3270)#generic-pool permit
The resulting configuration from the initial configuration and the configuration dialog follows:
interface Channel2/2
ip address 10.10.20.126 255.255.255.128
no ip redirects
no keepalive
lan TokenRing 0
source-bridge 223 1 2099
adapter 0 4100.cafe.0001
llc2 N1 2057
adapter 1 4100.cafe.0002
llc2 N1 2057
tn3270-server
pu PU3 05D00001 10.10.20.5 token-adapter 1 24 rmac 4100.cafe.0001 lu-seed
PU3###
pu PU4 05D00002 10.10.20.5 token-adapter 1 28 rmac 4100.cafe.0001 lu-seed
PU4###
dlur SYD.TN3020 SYD.VMG
lsap token-adapter 1
vrn SYD.LAN4
link HOSTB rmac 4000.7470.0009
link HOSTA rmac 4100.cafe.0001 rsap 08
pu PU0 05D99001 10.10.20.1
pu PU1 05D99002 10.10.20.1
pu PU2 05D99003 10.10.20.2
Assuming each PU has three static LUs, which are ACTLU enabled and not connected, then these
LUs are the first to be nailed. That is, the first six connections from client IP address 192.195.80.40
use the static LUs and subsequent connections use the remaining dynamic LUs.
To remove a nailing definition, the complete range of locaddrs must be specified as configured. So
for the example above, the following command would remove the LU nailing definition.
no client ip 171.69.176.28 255.255.255.0 lu 1 50
If an attempt is made to remove a subset of the range of configured locaddrs then the command is
rejected.
no client ip 171.69.176.28 255.255.255.0 lu 1 20
% client ip 171.69.176.28 lu not matched with configured lu 1 50
Normal operation
LPAR 1
LPAR 2
LPAR 3
System A ESCON director
198.92.5.2 Mainframe 1
C0
LPAR 1 C1 C5 CIP
LPAR 2
LPAR 3 C2 Cisco 7500
System B router
198.92.5.3 Mainframe 2
LPAR 1
LPAR 2
LPAR 3
System C
198.92.5.4 Mainframe 3
Mainframe 2 fails
LPAR 1
LPAR 2
LPAR 3
System A ESCON director
198.92.5.2 Mainframe 1
C0
LPAR 1 C1 C5 CIP
LPAR 2
LPAR 3 C2 Cisco 7500
System B router
198.92.5.3 Mainframe 2
LPAR 1
LPAR 2
System C LPAR 3
198.92.5.4 Mainframe 3
LPAR 1
LPAR 2
System C LPAR 3
10408
198.92.5.4 Mainframe 3
The intent of this backup configuration is that the system named A will be loaded on one of the
mainframes in LPAR1 on that mainframe. The DASD for that system will be shared among all the
mainframes but only one of them will ever IPL the system at one time. The same holds for LPAR2
and LPAR3.
The ESCON director has the following connections:
• A Cisco 7500 series router with a CIP connected to port C5
• Mainframe1 connected to C0
• Mainframe2 connected to C1
• Mainframe3 connected to C2
The following examples show how to configure IP Host Backup for three mainframe hosts,
Mainframe 1, Mainframe 2, and Mainframe 3, as shown in Figure 180. Each mainframe is
configured for at least three logical partitions (LPARs).
Excerpts from the host TCP/IP profiles show how the host might be configured. Excerpts from the
router configuration show how the IP Host Backup configuration statements are configured.
Router Configuration
On the router, the CIP is located in slot 3 and port 1 is connected to the ESCON director. The path
commands define the group of paths that are used as the IP Host Backup.
interface channel 3/1
ip address 198.92.5.1 255.255.255.128
path c010 c110 c210
claw 30 198.92.5.2 lpar1 cip1 tcpip tcpip
path c020 c120 c220
claw 30 198.92.5.3 lpar2 cip1 tcpip tcpip
path c030 c130 c230
claw 30 198.92.5.4 lpar3 cip1 tcpip tcpip
Mainframe 1
VTAM
CMPC
LLC2
CIP
APPN
Bridging network
subsystem
S6221
RSP PC running
Communications Server/2
Cisco 7500
Adapter 1
4000.0000.aaaa
Ring 88
3
PC Laguna
Communications
Server/2
Ring 100
S6227
TR0/0
Link: LAGUNAA
4 Ring 500 SAP: 14
LMAC: 4000.0000.beef
The example in Figure 182 shows CMPC running on the CIP and communicating with a PC running
Communications Server/2. APPN is not running on the router. It is only running in VTAM and on
the PC.
The configuration examples for the VTAM host and the router follow.
Mainframe 1
VTAM
CMPC
LLC2
CIP
LLC2
APPN
APPN network
S6222
RSP
PC running
Cisco 7500 Communications
Server/2
CIP. slot 6
2F2 read cmpc-tg lagunab
2F3 write
Adapter 2
SAP 20
4000.bbbb.bbbb
Ring 88
3
PC Laguna
Communications
Server/2
Ring 100
4
2 TR0/0
Link: dynamic
Ring 61 Ring 500 SAP: 14
LMAC: 4000.0000.beef
4000.0000.bbbb
SAP 24
APPN port: rsrport
Dest: 4000.0000.beef
Dest: SAP 14
APPN link: lagunab
APPN CP,
S6228
NETA.HONDURAS
The configuration illustrated in Figure 184 is more complex because you must configure APPN on
the router. There are many different ways to configure APPN. The example is a simple APPN
configuration in which SRB is used to connect the APPN NN on the RSP to VTAM and the
token-ring attached PC.
It is possible to connect directly to the Token Ring port, an option not shown in the example.
When configuring APPN on the router, you must type the complete command before exiting an
APPN configuration subsection. If you need to change an APPN configuration subsection, you must
type the no complete command before you can change the subsection. Remember to type complete
before exiting the subsection. The router ignores the new APPN configuration commands until you
type the complete command.
Honduras Router
interface Channel6/1
no ip address
no keepalive
cmpc C020 F2 LAGUNAB READ
cmpc C020 F3 LAGUNAB WRITE
!
interface Channel6/2
no ip address
no keepalive
lan TokenRing 0
source-bridge 88 3 100
adapter 2 4000.bbbb.bbbb
lan TokenRing 2
tg LAGUNAB llc token-adapter 2 20 rmac 4000.0000.bbbb rsap 24
!
!
appn control-point NETA.HONDURAS
complete
!
appn port RSRBPORT rsrb
local-sap 24
desired-max-send-btu-size 4096
max-rcv-btu-size 4096
rsrb-virtual-station 4000.0000.bbbb 61 2 100
complete
!
appn link-station LAGUNAB
port RSRBPORT
lan-dest-address 4000.0000.beef 14
complete
router eigrp 109
network 172.18.0.0
On the router, use the following command from the global configuration mode:
appn start
Connecting Two VTAM Nodes Using Two CIPs in the Same Router Example
Figure 185 shows the physical components for this example. Figure 186 shows the various
parameters for each component in the configuration example.
Mainframe 1 Mainframe 2
VTAM VTAM
CMPC CMPC
LLC2 LLC2
CIP 1 CIP 2
LLC2 stack
on RSP
RSP is not used
S6223
Cisco 7500
neta.mvs2 neta.cpac
mvs2trlc cpactrlc
mvs2lnc cpaclnc
Adapter 3 Adapter 3
4000.cccc.cccc 4000.0000.cccc
SAP: 30 SAP: 34
Ring 88 Ring 43
S6229
Ring 100
Cisco 7500
Differing solutions can be configured for the example shown in Figure 186. For example, you can
have two CIPs in different routers connected via LLC2. You can also configure host connections
going into the same CIP card rather than two separate CIP cards.
mvs2trlc
mvs2lnc
cpactrlc
cpaclnc
Router
interface Channel4/1
no ip address
no keepalive
cmpc C010 40 CPACC READ
cmpc C010 41 CPACC WRITE
!
interface Channel4/2
no ip address
no keepalive
lan TokenRing 0
source-bridge 43 5 100
adapter 3 4000.0000.cccc
tg CPACC llc token-adapter 3 34 rmac 4000.cccc.cccc rsap 30
!
interface Channel6/1
no ip address
no keepalive
cmpc C020 F4 MVS2C READ
cmpc C020 F5 MVS2C WRITE
!
interface Channel6/2
lan TokenRing 0
source-bridge 88 3 100
adapter 3 4000.cccc.cccc
tg MVS2C llc token-adapter 3 30 rmac 4000.0000.cccc rsap 34
On the MVS system CPAC, use the following commands to activate the configuration:
v net,act,id=cpactrlc,update=add
v net,act,id=cpaclnc
Figure 187 Topology for VTAM-to-APPN NN on a Remote Router with DLUR Connection
VTAM
NN
DLUS
PU 2.0
CMPC
LLC2 APPN
LAN/WAN
DLUR
CIP Remote node
Cisco 7500
S6224
LAN/WAN
PU 2.1
Figure 188 Parameters for VTAM-to-APPN NN on a Remote Router with DLUR Connection
Ring 88
3 PC Laguna
Communications
Ring 100
Server/2
TR0/0
Link: dynamic
Ring 500 SAP: 14
LMAC: 4000.0000.beef
2
Ring 84
Ring 94
4000.0000.dddd
SAP 44
APPN port: rsrport
Dest: 4000.0000.beef
Dest: SAP 14
APPN link: lagunad
DLUR
APPN CP,
S6230
NETA.DUSTIN
Cisco 4000
In the example shown in Figure 188, DLUS is running on the MVS host. DLUR is running on a
remote Cisco 4000 router. The connection from MPC to the APPN stack on the Cisco 4000 is via
LLC2. There is no NN on the Cisco 7500. The PC is running Communications Server/2.
mvs2trld
mvs2lnd
interface Channel6/1
cmpc C020 F6 CONFIGD WRITE
cmpc C020 F7 CONFIGD READ
!
interface Channel6/2
lan TokenRing 0
source-bridge 88 3 100
adapter 4 4000.dddd.dddd
tg CONFIGD llc token-adapter 4 40 rmac 4000.0000.dddd rsap 44
Router Dustin
source-bridge ring-group 84
interface Ethernet0
ip address 172.18.3.36 255.255.255.0
media-type 10BaseT
!
interface TokenRing0
no ip address
ring-speed 16
source-bridge 500 2 84
!
appn control-point NETA.DUSTIN
dlus NETA.MVS2
dlur
complete
!
appn port RSRBPORT rsrb
local-sap 44
desired-max-send-btu-size 4096
max-rcv-btu-size 4096
rsrb-virtual-station 4000.0000.dddd 94 5 84
complete
!
appn link-station LAGUNAD
port RSRBPORT
lan-dest-address 4000.0000.beef 14
complete
!
appn link-station MVS2D
port RSRBPORT
lan-dest-address 4000.dddd.dddd 40
complete
On the router Dustin, use the following command from the global configuration mode:
appn start
Figure 189 Topology for VTAM-to-TN3270 Server DLUR Running on the Same CIP
Connection
VTAM
NN
LLC2 TCP/IP
S6225
TN3270 client
Cisco 7500
Figure 190 Parameters for VTAM-to-TN3270 DLUR Running on the Same Connection
Mainframe neta.mvs2
neta.mvs2
CIP, slot 6
2F8 read cmpc-tg lagunab TN3270 server
2F9 write
mvs2trle Adapter 5
mvs2lne SAP: 50
4000.eeee.eeee Adapter 3
4000.0000.eeee
SAP: 34
S6231
Ring 88
172.18.1.218
PC Laguna
172.18.1.1.30
TN3270 client
mvs2trle
mvs2lne
swlagtn
tngrp1
interface Channel6/1
cmpc C020 F8 CONFIGE READ
cmpc C020 F9 CONFIGE WRITE
!
interface Channel6/2
lan TokenRing 0
source-bridge 88 3 100
adapter 5 4000.eeee.eeee
adapter 6 4000.0000.eeee
tn3270-server
dlur NETA.HOND327S NETA.MVS2
lsap token-adapter 6 54
link MVS2TN rmac 4000.eeee.eeee rsap 50
pu TNPU 017EFEED 172.18.1.218
tg CONFIGE llc token-adapter 6 50 rmac 4000.eeee.eeee rsap 54
On the router Honduras, use the following command from TN3270 configuration mode:
no shutdown