NS X.25 Migration: NS 3000/V to NS 3000/iX
Differences in X.25 Support
padded with blanks.
Facilities
The supported facilities of the DTC/X.25 XL Network Link are shown in Table
Table
Supported Facilities | 1984 CCITT X.25 Reference |
|
|
Extended packet sequence number | 6.2 |
|
|
Incoming calls barred | 6.5 |
|
|
Outgoing calls barred | 6.6 |
|
|
Nonstandard default packet size | 6.9 |
|
|
Nonstandard default window size | 6.10 |
|
|
Flow control parameter negotiation | 6.12 |
|
|
Throughput class negotiation | 6.13 |
|
|
Closed user group selection (1980 CCITT) | 6.14 |
|
|
Fast select request and acceptance | |
|
|
Reverse charging and acceptance | |
|
|
Local charging prevention | 6.20 |
|
|
Hunt group | 6.25 |
|
|
Supported Facilities with X.25 Level 3 Programmatic Access | |
|
|
Closed user group related facilities | 6.14 |
|
|
Bilateral closed user groups | 6.15 |
|
|
Network user identification | 6.21 |
|
|
Called line modified address notification | 6.26 |
|
|
Call redirection and notification | |
|
|
Transit delay selection and indication | 6.28 |
|
|
Security
When configuring a host, you can now set security for each remote system using the Security field on the X.25 SVC Address Key Paths screen. System to System Local User Groups (LUGs) are now assigned on the DTC instead of on the host. The LUG provides security in the same way a CUG does, but you don’t have to subscribe to a CUG.
Appendix B | 205 |