HP (Hewlett-Packard) E3000/IX Network Hardware User Manual


 
Appendix B 205
NS X.25 Migration: NS 3000/V to NS 3000/iX
Differences in X.25 Support
padded with blanks.
Facilities
The supported facilities of the DTC/X.25 XL Network Link are shown in
Table B-1.
Security
When configuring a host, you can now set security for each remote
system using the Security field on the X.25 SVC Address Key Paths
screen. System to System Local User Groups (LUGs) are now assigned
on the DTC instead of on the host. The LUG provides security in the
same way a CUG does, but you don’t have to subscribe to a CUG.
Table B-1 Supported Facilities
Supported Facilities 1984 CCITT X.25 Reference
Extended packet sequence number 6.2
Incoming calls barred 6.5
Outgoing calls barred 6.6
Nonstandard default packet size 6.9
Nonstandard default window size 6.10
Flow control parameter negotiation 6.12
Throughput class negotiation 6.13
Closed user group selection (1980 CCITT) 6.14
Fast select request and acceptance 6.16–17
Reverse charging and acceptance 6.18–19
Local charging prevention 6.20
Hunt group 6.25
Supported Facilities with X.25 Level 3 Programmatic Access
Closed user group related facilities 6.14
Bilateral closed user groups 6.15
Network user identification 6.21
Called line modified address notification 6.26
Call redirection and notification 6.25–27
Transit delay selection and indication 6.28