NS X.25 Migration: NS 3000/V to NS 3000/iX

Differences in X.25 Support

padded with blanks.

Facilities

The supported facilities of the DTC/X.25 XL Network Link are shown in Table B-1.

Table B-1 Supported Facilities

Supported Facilities

1984 CCITT X.25 Reference

 

 

Extended packet sequence number

6.2

 

 

Incoming calls barred

6.5

 

 

Outgoing calls barred

6.6

 

 

Nonstandard default packet size

6.9

 

 

Nonstandard default window size

6.10

 

 

Flow control parameter negotiation

6.12

 

 

Throughput class negotiation

6.13

 

 

Closed user group selection (1980 CCITT)

6.14

 

 

Fast select request and acceptance

6.16–17

 

 

Reverse charging and acceptance

6.18–19

 

 

Local charging prevention

6.20

 

 

Hunt group

6.25

 

 

Supported Facilities with X.25 Level 3 Programmatic Access

 

 

Closed user group related facilities

6.14

 

 

Bilateral closed user groups

6.15

 

 

Network user identification

6.21

 

 

Called line modified address notification

6.26

 

 

Call redirection and notification

6.25–27

 

 

Transit delay selection and indication

6.28

 

 

Security

When configuring a host, you can now set security for each remote system using the Security field on the X.25 SVC Address Key Paths screen. System to System Local User Groups (LUGs) are now assigned on the DTC instead of on the host. The LUG provides security in the same way a CUG does, but you don’t have to subscribe to a CUG.

Appendix B

205