Chapter 2. Network Center Components

This chapter provides a brief overview of each Component. The remainder of the chapter discusses each Component in detail.


Component Overview

Each Network Center Component performs a special function, and can be used alone or together in a network, depending on the desired amount of network control. The following table describes each Components specific function:
Component Description
Access Uses the VTAM Session Management exit to control which LUs may establish sessions with subsystems within the domain.

Can enhance cross-domain and/or cross network node security.

Alias Uses the VTAM Session Management exit to manage the Alias name assignments for Logical Units traversing a network boundary.

Can greatly simplify system interconnection.

Compress Controls which VTAM sessions will have their associated 3270 data streams compressed.

Compression efforts can benefit installations with remote devices where response time is improved through the reduction in the number of actual characters that are transmitted to the device.

Query Interrogates and displays elements of the currently operating VTAM environment. Control blocks related to VTAM based operations (definitions, work queues, etc.) may be dumped and scanned while VTAM is operating.

Provides an excellent tool for significantly improving understanding of the inner workings of VTAM. This understanding can help users increase the availability of the network.

Select Manages the contents of the various VTAM "Lists" that prioritize and define contacts with other domains and networks.

Helps accomplish "Load Balancing" across multiple paths. May improve performance of cross domain and cross network searches. Can help ensure that sensitive data is sent through proper channels.

Timeout Network wide terminal inactivity timer.

Can secure the network from unauthorized usage outside of installation defined time constraints. Improves overall system performance by releasing unused resources.

Trace Displays a hexadecimal display of inbound and outbound data buffers for session traffic associated with a specified VTAM resource.

Permits significantly enhanced diagnostic activities to be performed while VTAM and the PLU-SLU continue to operate. Users may evaluate and interpret whether session traffic is proper.

Component Overview


Access

The Access Component allows an installation to control - from within VTAM - which LUs (such as terminals, subsystems or applications) may go into session with another LU in the VTAM domain. This allows for complete control over session approval or rejection within the local domain. This ability can be particularly beneficial in cross-domain or cross-network (SNI) situations where the remote domain is not secured in a manner that is acceptable to the local data center.

Access accepts installation defined definitions during VTAM initialization or interactively after initialization that control how session requests are approved. These conditions for approval can include LU name, time of day, day of week, originating node (subarea and/or netid), subsystem being requested, etc. Sessions can be conditionally accepted or rejected by Access.

Access allows users to combine multiple session "conditions" to approve or reject certain sessions under certain situations. For example, you can specify that devices from a particular subarea may only use specific subsystems during certain times of the day.
Access Overview

While Access is operating, it produces varying levels of messages in the standard Network Center LOG (SYSOUT or virtual printer). These messages indicate which sessions are accepted, conditionally accepted, or rejected. The Network Center's standard Accounting mechanism (OS SMF or VM Account records) can also record each session being approved, denied, or both. (Access provides this control by using the standard VTAM exit called the Session Management Exit 'ISTEXCAA'.)

Session characteristics

As VTAM processes each session, Access receives control and obtains information that describes the session partners. This information includes the following items: [Adjsscp, Alias, Aliasnet, Hcvname, Hcvtype, Netid, Sscp, and Subarea are collected for both the OLU (SLU) and PLU (DLU). ]

Adjsscp
Identifies the name of the SSCP adjacent to the current node in the direction of the requesting LU (normally, the SLU)
Alias
Identifies the LU's alias, if alias assignment has been made.
Aliasnet
Identifies the network id where the LU's ALIAS is known.
Day
Identifies the day(s) of the week the Rule will be effective. Ranges and groupings of days are valid.
Date
Identifies the calendar date range that the Rule will be effective.
Dlu
Identifies the Destination Logical Unit (typically the requested application or PLU).
From
Identifies the PLU (for instance, a controlling application) initiating the session.
Hcvname
Identifies the name of the major or minor node within VTAMLST that defines the LU.
Hcvtype
Establishes the type of major or minor node for the LU that is acceptable.
Netid
Identifies the home network of the LU.
Olu
Identifies the Originating Logical Unit (typically the terminal or SLU).
Rule type
Establishes the type of Rule matching that will occur when the Rule is evaluated (can be set to OLU-DLU, SLU-PLU, or DUAL).
Session type
Identifies the type of session initiation, such as PLU requested, SLU requested, Autologon, Third Party, or Resource Directed Search.
Sscp
Identifies the SSCP for the domain that manages the LU.
Subarea
Identifies the Subarea associated with the LU's domain.
Time
Identifies the time range that the Rule will be effective.

Rule processing

After collecting session characteristics, the Network Center compares them against the active Access Rules, which control whether the session will be approved or denied.

Access Rules are identified by NAME and TITLE and may be written to ALLOW or DENY the proposed session. Rule status may be ACTIVE, DORMANT, or WARN, where WARN produces an audit of Rule processing but sessions are not rejected.

Consider the following Access Rules:

Note: The Rules are presented in both TNCRULE syntax as well as the actual screen appearance.

The LOCALS Rule allows any LU with "NY" in the first two characters of the name and with the NETID equal to "NRS" to go into session with any application. Access will reject any LU without this naming pattern:
LOCALS     TNCRULE SLU=NY*,NETID=NRS,
     ACTION=ALLOW
The Rule Definition panel would appear as follows:
LOCALS Rule Definition panel

The PAYDEPT Rule allows any LU beginning with "PAY" from subarea "3" to establish a session with "DBDCCICS" between 7:00am and 6:00pm Monday through Friday. Access will deny any session requests from LUs that are outside of these specifications:
PAYDEPT     TNCRULE SLU=PAY*,SUBAREA=3,
     PLU=DBDCCICS,
     TIME=(0700,1800),DAY=WEEKDAYS,
     ACTION=ALLOW

The Rule definition panel would be defined as follows:
PAYDEPT Rule Definition panel

The next three Rules - LOGAPPL, TCAS, and TSO - show how Access can be used "pass" a session's access privileges from one application to another:
LOGAPPL     TNCRULE PLU=DIRECTOR,
     TYPE=AUTOLOGON,ACTION=ALLOW
TCAS     TNCRULE PLU=TSO,
     TYPE=THIRD-PARTY,
     FROM=DIRECTOR
TSO     TNCRULE PLU=TSO0*,
     TYPE=THIRD-PARTY,
     FROM=TSO

The LOGAPPL Rule allows any LU to go into session with a controlling PLU named DIRECTOR. The Rule definition panel would be defined as follows:
LOGAPPL Rule Definition panel

The TCAS Rule allows the Application DIRECTOR to pass ownership of the LU to the "TCAS" application. The Rule definition panel would be defined as follows:
TCAS Rule Definition panel

The TSO Rule allows "TCAS" to pass the LU to the created TSO address space. The Rule definition panel would be defined as follows:
TSO Rule Definition Panel

The next three Rules - MYSITE, OUTSIDE, and DIRECTOR - show how you can use Access Rules to control which sessions from within or outside of your network will be approved or denied. (Remember, the types of Rules and conditions you can actually set are virtually limitless):
MYSITE     TNCRULE SUBAREA=3,
     PLU=*,ACTION=ALLOW
OUTSIDE     TNCRULE SLU=*,
     PLU=DIRECTOR,ACTION=ALLOW
DIRECTOR     TNCRULE FROM=DIRECTOR,
     TYPE=THIRD-PARTY,ACTION=ALLOW

The MYSITE Rule allows any LU from subarea 3 to go into session with any application. The Rule definition panel would be defined as follows:
MYSITE Rule Definition panel

If the session request is not matched by the MYSITE Rule, the request is passed to the OUTSIDE Rule, which allows requesting sessions from outside of Subarea 3 with access to the DIRECTOR application, only. The Rule definition panel would be defined as follows:
OUTSIDE Rule Definition panel

The DIRECTOR Rule allows the DIRECTOR application to forward the device to any application it chooses. The Rule definition panel would be defined as follows:
DIRECTOR Rule Definition panel


Alias

Alias provides the local installation with control over alias name assignment in the gateway SSCP. Alias provides facilities to create Rules, set the Alias names, dynamically maintain the Rules, and produce audit trail information.

You can use Alias to map resource names on a one to one basis. However, Alias also allows you to use very flexible, time-saving tactics including assigning alias names from a "pool" (or range) of predefined aliases, or assigning alias names from a group that contains a set of specific alias assignments.

The local installation defines the conditions under which alias name assignment is done. If no Rule exists mapping the connection, then Alias will allow the connection to function with the originating name.

Each time VTAM needs to obtain an Alias name for a logical unit, it travels through the Alias nucleus code residing in the Session Management Exit location. Alias then extracts the appropriate information for the connection being established, compares the information against the active Rules, and assigns an alias name, if required.

The following figure illustrates the basic Alias placement within a network:
General Alias Network Structure

Session characteristics

As each session is being processed by VTAM, Alias receives control and collects several items that describe the session under evaluation. These items include: [Adjsscp, Alias, Aliasnet, Hcvname, Hcvtype, Netid, Sscp, and Subarea are collected for both the OLU (SLU) and PLU (DLU). ]

Adjsscp
Identifies the name of the SSCP adjacent to the current node in the direction of the requesting LU (normally, the SLU).
Alias
Identifies the LU's alias, if alias assignment has been made.
Aliasnet
Identifies the network id where the LU's ALIAS is known.
COS name
Establishes the Class of Service name to be used if a COS name translation is requested.
Day
Identifies the day(s) of the week the Rule will be effective. Ranges and groupings of days are valid.
Date
Identifies the calendar date range that the Rule will be effective.
Dlu
Identifies the Destination Logical Unit (typically the requested application or PLU).
Dlu alias
Establishes the Alias name, Alias mask, or Alias group describing how an Alias name will be returned to VTAM if a DLU name is to be translated.
From
Identifies the PLU (for instance, a controlling application) initiating the session.
Hcvname
Identifies the name of the major or minor node within VTAMLST that defines the LU.
Hcvtype
Establishes the type of major or minor node for the LU that is acceptable.
Logmode
Identifies the translated logon mode name to be used if VTAM requests a logmode name translation.
Netid
Identifies the home network of the LU.
Olu
Identifies the Originating Logical Unit (typically the terminal or SLU).
Olu alias
Establishes the Alias name, Alias mask, or Alias group describing how an Alias name will be returned to VTAM if a OLU name is to be translated.
Rule type
Establishes the type of Rule matching that will occur when the Rule is evaluated (can be set to OLU-DLU, SLU-PLU, or DUAL).
Session type
Identifies the type of session initiation, such as PLU requested, SLU requested, Autologon, Third Party, Inquire or Resource Directed Search.
Sscp
Identifies the SSCP for the domain that manages the LU.
Subarea
Identifies the Subarea associated with the LU's domain.
Time
Identifies the time range that the Rule will be effective.
To-Network
identifies the network id of the destination network to which this alias translation request applies.

Rule processing

As Alias collects the session characteristics, it compares them against a set of active Alias Rules. The Rules are identified by NAME and TITLE and may be written to TRANSLATE or BYPASS the supplied alias translation request. Rule status may be ACTIVE, DORMANT, or WARN, where WARN produces an audit of Rule processing, but sessions are not rejected.

Consider the following Alias Rules: TNCRULE syntax as well as actual screen appearance.

In the following Alias Rules, one-to-one alias name translation has been defined.
T31001 TNCRULE SLU=T31001,OLUALIAS=OTHER01,
               NETID=OTHER,TO-NETWORK=NRS
T31002 TNCRULE SLU=T31002,OLUALIAS=OTHER02,
               NETID=OTHER,TO-NETWORK=NRS

These Rules each simply translate the name of the incoming device, T31001 and T31002, from the OTHER Network to an LU name that begins with the character string "OTHER" within the local network, NRS. [The TO NETWORK operand must be specified to ensure that translation into our network (NRS) occurs properly. ] The Rule definition panel for T31001 would be defined as follows:
T31001 Rule Definition panel

This is a simple approach to assigning Alias names in the NRS network but requires that you establish a Rule for every device that might contact the system.

Now, let's assume that you would like to define a more general Rule that would allow any device originating from the OTHER network to receive a local Alias translation.

With this Rule, any device from the OTHER network whose LU name begins with "T" will be assigned a name from an Alias Pool, which is defined by the Alias Mask 'OTHER%%': the first device from the OTHER network will be assigned the name OTHER01, the second device will be assigned the name OTHER02 up to OTHER99.
OTHER   TNCRULE SLU=T*,NETID=OTHER,OLUALIAS=OTHER%%,TO-NETWORK=NRS

The Rule definition panel would be defined as follows:
OTHER Rule Definition panel

The Network Center's Rule structure also provides a flexible mechanism called "Value Groups", which allow the local installation to group items together and then reference them once in a Rule.

For example, assume that you would like cause Alias to allow name translation for three different networks. You create a Rule that assigns an Alias name from the USERSnnn Pool for any incoming device from the CREDIT, BANK, or CLIENT networks (this requires you to also define a Value Group for the Network IDs).
USERS   TNCRULE VALUES=(CREDIT,BANK,CLIENT)
NORMAL  TNCRULE NETID=&USERS,TO-NETWORK=NRS,OLUALIAS=USERS%%%

You would first define the networks' into a Value Group by using a Group Definition panel (the "&" at the beginning of the Group's name indicates that it is a Value Group), as follows:
USERS Value Group Definition panel

You would then use this Value Group in the Rule, as in the following figure:
NORMAL Rule Definition panel


Compress

Compress allows users to create Rules, which, based on session type, compress 3270 data streams prior to transmission from local VTAM subsystems and applications. It uses the following mechanisms to compress the data:

Compress gives the installation control over session compression based on criteria such as LU name, time of day, day of week, originating node (subarea and/or netid), and subsystem being requested. Sessions can be compressed or denied compression.

The following figure illustrates the basic Compress placement within a network:
Compress Overview

Compress produces various levels of messages in the standard Network Center LOG (SYSOUT or virtual printer). These messages indicate sessions that are compressed or denied compression. The Network Center's standard Accounting mechanism (OS SMF or VM Account records) can also record each session being compressed, denied compression, or both. Compress provides this control through the use of the standard VTAM exit called the the Session Management Exit.

Session characteristics

As each session is being processed by VTAM, Compress receives control and obtains several items that describe the session being evaluated. These items include: [Adjsscp, Alias, Aliasnet, Hcvname, Hcvtype, Netid, Sscp, and Subarea can be specified for both the OLU (SLU) and DLU (PLU). ]

Adjsscp
Identifies the name of the SSCP adjacent to the current node in the direction of the requesting LU (normally, the SLU).
Alias
Identifies the LU's alias if alias assignment has been made.
Aliasnet
Identifies the network id where the LU's ALIAS is known.
Day
Identifies the day(s) of the week the Rule will be effective. Ranges and groupings of days are valid.
Date
Identifies the calendar date range that the Rule will be effective.
Dlu
Identifies the DLU (typically the requested application or PLU).
From
Identifies the PLU (for instance, a controlling application) forwarding the session.
Hcvname
Is the name of the major or minor node within VTAMLST that defines the LU.
Hcvtype
Establishes the type of major or minor node for the LU that is acceptable
Netid
Identifies the home network of the LU.
Olu
Identifies the Originating Logical Unit (typically the terminal device or SLU).
Rule type
Establishes the type of Rule matching that will occur when the Rule is evaluated. (The Rule matching can be OLU-DLU, SLU-PLU, BOTH, or DUAL.)
Session type
Identifies the type of session initiation (PLU requested, SLU requested, Autologon, Third Party, or Inquire).
Sscp
Identifies the SSCP for the domain that manages the LU.
Subarea
Identifies the Subarea associated with the domain.
Time
Identifies the time range that the Rule will be effective.

Rule processing

Session characteristics are compared against a set of active Compress Rules that control whether or not the session will be compressed.

The Rules are identified by NAME and TITLE and may be written to COMPRESS or DISABLE compression for the session. Rule status may be ACTIVE, DORMANT, or WARN, where WARN produces an audit of Rule processing, but sessions are not rejected.

Consider the following Compress Rules:

Note: The Rules are presented in both TNCRULE syntax as well as the actual screen appearance.

First, we would need to create Rules that disable compression for specific types of sessions. This will ensure that Compress does not compress any sessions that do not need to be compressed, or that should not be compressed.

For example, because TSO already contains compression logic, we could create the following Rule, which disables compression for all TSO sessions originating from our local domain:
REMOTE    TNCRULE ACTION=DISABLE,PLU=TSO*,SLU=R*

The Rule definition panel would be defined as follows:
TSO Rule Definition panel

To further illustrate this point, let's assume that we also want to disable compression for all local sessions (local sessions usually do not benefit from compression). We could create the following Rule, which disables compression for all sessions within our local domain:
LOCAL   TNCRULE ACTION=DISABLE,PLU=*,SLU=L*

The Rule definition panel would be defined as follows:
LOCAL Rule Definition panel

On the other hand, we do want to compress 3270 data that is transmitted to remote devices, so we create a Rule that compresses data between all PLUs and remote SLUs:
REMOTE  TNCRULE ACTION=COMPRESS,PLU=*,SLU=R*

The Rule definition panel would be defined as follows:
REMOTE Rule Definition panel

Finally, we realize that we do not want to compress non-3270 data streams, or anything else other than sessions between local and remote devices. Thus, we create a Rule that sits at the end of our Rule processing chain that denies all sessions that don't match the previous Rules:
OTHERS  TNCRULE ACTION=DISABLE,PLU=*,SLU=*

The Rule definition panel would be defined as follows:
OTHERS Rule Definition panel


Query

The Query Component enhances and extends your ability to interrogate VTAM's operating definitions, active work queues, and other items within its operational environment while VTAM continues to execute.

Query logically consists of the terminal handling routines and the Network Center Server, as the following figure illustrates:
Query Overview

Query is useful for VTAM Systems Programmers who already have, or would like to gain, a working knowledge of VTAM internals. Query can assist in diagnosing and correcting difficulties within an operational network or within VTAM itself.

Query interactively maintains definitions that identify how to map the individual blocks within VTAM. The Network Center includes descriptions for all commonly available releases of VTAM from 3.1.1 and on. The control block mappings that your installation uses is determined by the VTAM release in use.
Query Selection List

The Query menu (Query Selection List) provides the anchor point for Query requests and displays. The results of these requests and displays are produced in a selection list format, simple hexadecimal storage dump, or interpreted format. Individual fields within these displays may lead to another control block, or bit settings in individual control block fields. Control block fields that contain individual bit settings may also produce extended interpretation via a pop up window.

The following example shows an unformatted (i.e. hexadecimal) dump of a SIB (Session Information Block):
Query Hexadecimal Display

The control block can be formatted by placing Query into FORMAT mode, as shown in the following figure:
Query Formatted Display

Query is delivered with a wide range of HELP panels that describe the various control blocks that can be displayed. You can also interpret Query information by referencing the appropriate IBM publications (the SNA Reference Summary, the VTAM Diagnosis Reference, VTAM Programming, VTAM Reference Summary (LY30-5600)), or by requesting that the Network Center format the control block.


Select

Select provides the local installation with control over the various Lists used by VTAM during processing. Select provides a set of conditions called Select Rules, which allow you to manipulate the contents of the following lists:

Select's ability to set the contents of the list can help reduce overhead and improve network performance, restrict certain cross domain and cross network activities, control selection of logical connection between hosts ("Load Balance"), and allow the correct processing order to be set and adjusted interactively.

Each time VTAM needs to determine if a particular List of items is appropriate, it calls the Select routine residing in the Session Management Exit. Select extracts appropriate information associated with the connection being established, compares the information against the active Rules, and assigns or manipulates a Select List, if required.

The following figure illustrates Select's placement within a network:
General Select Network Structure

Session characteristics

Select Rules can be structured to control a wide variety of situations within VTAM. The following session characteristics can be used to define Select Rules: [Adjsscp, Alias, Aliasnet, Hcvname, Hcvtype, Netid, Sscp, and Subarea can be specified for both the OLU (SLU) and DLU (PLU). ]

Adjsscp
Identifies the name of the SSCP adjacent to the current node in the direction of the requesting LU (normally, the SLU).
Alias
Identifies the LU's alias if alias assignment has been made.
Aliasnet
Identifies the network id where the LU's ALIAS is known.
Day
Identifies the day(s) of the week the Rule will be effective. Ranges and groupings of days are valid.
Date
Identifies the calendar date range that the Rule will be effective.
Dlu
Identifies the DLU (typically the requested application or PLU).
From
Identifies the PLU (for instance, a controlling application) forwarding the session.
Hcvname
Is the name of the major or minor node within VTAMLST that defines the LU.
Hcvtype
Establishes the type of major or minor node for the LU that is acceptable.
Netid
Identifies the home network of the LU.
Olu
Identifies the Originating Logical Unit (typically the terminal device or SLU).
Rule type
Establishes the type of Rule matching that will occur when the Rule is evaluated (can be set to OLU-DLU, SLU-PLU, or DUAL).
Select list
Identifies a list of resource names and optional weighting factors to be utilized for the Select exit point logic.
Session type
Identifies the type of session initiation, such as PLU requested, SLU requested, Autologon, Third Party, Inquire, or Resource Directed Search.
Sscp
Identifies the SSCP for the domain that manages the LU.
Subarea
Identifies the Subarea associated with the domain.
Time
Identifies the time range that the Rule will be effective.

Rule processing

Select Rules are identified by NAME and TITLE and may be written to SELECT, REPLACE, or BYPASS associated lists. Rule status may be ACTIVE, DORMANT, or WARN, where WARN produces an audit of Rule processing, but lists are not actually modified.

Each time Select is asked by VTAM to select a route, Select. evaluates the number of sessions that are in operation across the identified routes. Select chooses the route that is most below the desired weighting ratio and orders the list for VTAM such that the desired route is first in the list. In this manner, you can successfully "balance" the workload across the desired routes.

Consider the following Select Rules:

Note: The Rules are presented in both TNCRULE syntax as well as the actual screen appearance.

For our first example, let's say that you wish to assign a load balancing factor to two routes, VR1TP1 and VR2TP1, within the network TODC2. You want the high speed route, VR1TP1, to receive 65% of all session traffic, and VR2TP1 to receive the remainder at 35% of session traffic:
TWOPATHS TNCRULE LIST=(VR1TP1,65,VR2TP1,35)
TODC2    TNCRULE ACTION=SELECT,SLU=*,NETID=TODC2,SELECT=TWOPATHS

First, you would create the TWOPATHS Select List that assigns the weighting factors to these two routes:
TWOPATHS Select List panel

You would then define the TODC2 Rule, which describes when the TWOPATHS Select List should be used:
TODC2 Rule Definition panel

Now, let's say you want to add on to the "load balancing" by prioritizing CICS work over non-CICS work at a higher rate on the link. (Assume that you almost always want the CICS oriented work to be scheduled across the higher capacity link.):
CICSPATH TNCRULE LIST=(VR1TP1,90,VR2TP1,10)
TWOPATHS TNCRULE LIST=(VR1TP1,65,VR2TP1,35)
CICS     TNCRULE ACTION=SELECT,PLU=CICS*,NETID=TODC2,SELECT=CICSPATH
TODC2    TNCRULE ACTION=SELECT,SLU=*,NETID=TODC2,SELECT=TWOPATHS

You would do this by creating a Select List for the new criteria, and a Rule that assigns the CICS work to the Select List, as follows:
CICSPATH Select List panel

This Select List assigns 90% of of session traffic to the high-speed link, VR1TP1, and 10% of session traffic to the link VR2TP1.

You would then define the CICS Rule, which identifies the parameters for the CICSPATH Select List, as follows:
CICS Rule Definition panel

Note: By placing the CICS Rule prior to the TWOPATHS Rule in the Rule processing order, [For more information on setting the Rule processing order, see the Select Manual (publication TNC-0039). ] you would signify that sessions with any system starting with the letters CICS in the TODC2 network should have 90% of the sessions assigned to the higher priority route. All the other work in the network would be assigned to the routes according to the TWOPATHS Rule.


Timeout

Timeout provides a domain wide method for monitoring activity levels of an individual LU session by monitoring each device that is in session with a subsystem, and automatically terminating the session if

Timeout provides assurance to security officers and data center management that abandoned devices (real or virtual) in a subsystem are not available for use by an improper individual. This disconnection also allows unnecessarily allocated resources to be returned to the system and made available for other uses.

Timeout monitoring occurs within the VTAM environment and is not dependent on any other timing facility in the VTAM subsystem (CICS, CMS, TSO, IMS, etc.).

When the interval elapses, Timeout generates a VTAM VARY command to cause the session to be disconnected between the logical units. This activity generates a LOSTERM condition to the subsystem, which causes the subsystem to "clean up" any allocated resources that the device may have held.

The following figure shows Timeout's general architecture:
Timeout Overview

The session disconnect conditions that Timeout applies to any given session is controlled by the standard Network Center Rule processing selection criteria (i.e. session disconnect can be set differently for specific subsets of the network).

Session characteristics

Timeout Rules can be set to cause disconnection based on a variety of session-based characteristics.

The following characteristics may be included in Timeout Rules: [Adjsscp, Alias, Aliasnet, Hcvname, Hcvtype, Netid, Sscp, and Subarea can be specified for both the OLU (SLU) and DLU (PLU). ]

Adjsscp
Identifies the name of the SSCP adjacent to the current node in the direction of the requesting LU (normally, the SLU).
Alias
Identifies the LU's alias if alias assignment has been made.
Aliasnet
Identifies the network id where the LU's ALIAS is known.
Connect
Establishes the maximum interval that the session may last. Any session exceeding this value will be terminated.
Day
Identifies the day(s) of the week the Rule will be effective. Ranges and groupings of days are valid.
Date
Identifies the calendar date range that the Rule will be effective.
Dlu
Identifies the DLU (typically the requested application or PLU).
From
Identifies the PLU (for instance, a controlling application) forwarding the session.
Hcvname
Is the name of the major or minor node within VTAMLST that defines the LU.
Hcvtype
Establishes the type of major or minor node for the LU that is acceptable.
Hours
Establishes the time of day that a session can continue. Sessions that exist outside of this interval will be terminated by Timeout.
Netid
Identifies the home network of the LU.
Olu
Identifies the Originating Logical Unit (typically the terminal device or SLU).
Rule type
Establishes the type of Rule matching that will occur when the Rule is evaluated (can be set to OLU-DLU, SLU-PLU, or DUAL).
Session type
Identifies the type of session initiation, such as PLU requested, SLU requested, Autologon, Third Party, or Resource Directed Search.
Sscp
Identifies the SSCP for the domain that manages the LU.
Subarea
Identifies the Subarea associated with the domain.
Time
Identifies the time range that the Rule will be effective.
Timeout
Establishes an acceptable idle interval. Inactive intervals greater than this value will have their session terminated.

Rule processing

Timeout Rules are identified by NAME and TITLE. Rule status may be ACTIVE, DORMANT, or WARN, where WARN produces an audit of Rule processing but sessions are not actually terminated.

Consider the following Timeout Rules:

Note: The Rules are presented in both TNCRULE syntax as well as the actual screen appearance.

The following Rule establishes an allowable idle time interval of five minutes between sessions, for any LU with "NY" in the first two characters of the name and that is in the NRS network. Once the idle interval exceeds 5 minutes, the session will be terminated:
LOCALS     TNCRULE SLU=NY*,NETID=NRS,
     INACTIVITY=5M

The Rule definition panel would be defined as follows:
LOCALS Rule Definition panel

You can also create Rules that set an idle time interval with a time parameter as well. For example, the PAYDEPT Rule sets a 1 minute idle interval for any LU beginning with "PAY" from SUBAREA "3" when in session with "DBDCCICS" between 7:00am and 6:00pm Monday through Friday. Any other LU's, or those LU's outside of the time and day interval will not have their sessions subject to Timeout idle time checking:
PAYDEPT     TNCRULE SLU=PAY*,SUBAREA=3,
     PLU=DBDCCICS,INACTIVITY=1M
     TIME=(0700,1800),DAY=WEEKDAYS,
     ACTION=MONITOR

The Rule definition panel would be defined as follows:
PAYDEPT Rule Definition panel

The next example, the DAYS Rule, also shows a Timeout Rule with a time parameter. The DAYS Rule will cause any session initiated by devices with "DIAL" in the first four bytes of the LU to be terminated unless the time of day is between 8 am and 5 pm. Any sessions that exist after 5pm will be terminated. When a session occurs within the defined HOURs, it will be subject to a 30 minutes inactivity timer:
DAYS     TNCRULE SLU=DIAL*,ACTION=MONITOR,
     HOURS=(0800,1700),INACTIVITY=30M

The Rule definition panel would be defined as follows:
DAYS Rule Definition panel


Trace

Trace provides the facilities to interactively collect and view the session activity associated with a PLU-SLU pair within VTAM by creating Rules that control what sessions will be traced (or not traced) and whether Inbound or Outbound, User or VTAM buffers are to be traced. (There is no requirement to activate the GTF trace (MVS and OS/390) or any GTRACE (VM), etc. facilities.)

You'll typically use Trace to evaluate and interpret whether session traffic is proper, but it can also help you understand how "normal" traffic flows.

Trace internally activities the actual VTAM internal trace facility to collect information. (This insures that the trace information you receive is identical to that of a standard VTAM trace.) VTAM trace operations are intercepted by Trace, which resides in the VTAM Session Management exit, collected into a storage queue, and staged to external disk files, as necessary. These entries are subsequently available for interactive viewing and evaluation in the Trace queue. The Trace queue allows you to select items for further details.

The following figure illustrates how Trace collects and disperses information:
Trace Overview

Session characteristics

As each session is being processed by VTAM, Trace receives control and obtains several items that describe the session being evaluated. These items include: [Adjsscp, Alias, Aliasnet, Hcvname, Hcvtype, Netid, Sscp, and Subarea are collected for both the OLU (SLU) and PLU (DLU). ]

Adjsscp
Identifies the name of the SSCP adjacent to the current node in the direction of the requesting LU (normally, the SLU)
Alias
Identifies the LU's alias, if alias assignment has been made.
Aliasnet
Identifies the network id where the LU's ALIAS is known.
Day
Identifies the day(s) of the week the Rule will be effective. Ranges and groupings of days are valid.
Date
Identifies the calendar date range that the Rule will be effective.
Dlu
Identifies the Destination Logical Unit (typically the requested application or PLU).
From
Identifies the PLU (for instance, a controlling application) initiating the session.
Hcvname
Identifies the name of the major or minor node within VTAMLST that defines the LU.
Hcvtype
Establishes the type of major or minor node for the LU that is acceptable.
Netid
Identifies the home network of the LU.
Olu
Identifies the Originating Logical Unit (typically the terminal or SLU).
Rule type
Establishes the type of Rule matching that will occur when the Rule is evaluated. The Rule matching can be set to OLU-DLU, SLU-PLU, DUAL, or BOTH).
Session type
Identifies the type of session initiation, such as PLU requested, SLU requested, Autologon, Third Party, or Resource Directed Search.
Sscp
Identifies the SSCP for the domain that manages the LU.
Subarea
Identifies the Subarea associated with the LU's domain.
Time
Identifies the time range that the Rule will be effective.

Rule processing

Trace Rules are identified by NAME and TITLE and may be written to TRACE or DISABLE tracing for a particular session or type of session. Rule status may be ACTIVE, DORMANT, or WARN, where WARN produces an audit of Rule processing, but sessions are not traced.

Consider the following Trace Rules:

Note: The Rules are presented in both TNCRULE syntax as well as the actual screen appearance.

The TSO Rule indicates that any session between the subsystem TSO and any other resources should be traced, and that VTAM and USER, and INBOUND and OUTBOUND buffers are to be traced.
TSO     TNCRULE PLU=TSO*,SLU=*,PROCESS-TYPE=*,SESSION-FLOW=*,ACTION=TRACE

The Rule definition panel would be defined as follows:
TSO Rule Definition panel

The next Rule, HDQTRS, specifically traces sessions between devices that originate from the Network known as FIRMB in Subarea 6 that have access to your TSO subsystem. Specifically, this Rule traces FIRMB sessions that have directly connected to TSO by issuing an Unformatted System Services or equivalent request (E.G. "LOGON APPLID(TSO)"). Outbound buffers only will be traced.
HDQTRS     TNCRULE PLU=*,SLU=*,OLU-NETID=FIRMB,OLU-SUBAREA=6,
     PROCESS-TYPE=*,SESSION-FLOW=OUTBOUND,ACTION=TRACE

The Rule definition panel would be defined as follows:
HDQTRS Rule Definition panel

The following Rule traces sessions between a specific set of devices in subarea 12 and any network starting with an "S". Only buffers produced by the User applications will be traced.
SYSTEMS     TNCRULE PLU=*,SLU=S*,OLU-NETID=NRS,OLU-SUBAREA=12,
     PROCESS-TYPE=USER,SESSION-FLOW=*,ACTION=TRACE

The Rule definition panel would be defined as follows:
SYSTEMS Rule Definition panel


Copyright © 2000 North Ridge Software, Inc.