Establish Link3270 suitability

You need to establish that your applications are suitable for use with the Link3270 bridge.

This can be done in two ways:
  1. Using the load module scanner to identify if the applications use any instructions that are not supported by the bridge. This involves the following steps:
    • Identify the programs used by the application
    • Run the load module scanner against the programs (see Using the Load Module Scanner Utility ), using the bridge restrictions table DFHEIDBR. If there are any hits this indicates that there may be unsupported EXEC CICS commands.
      Note: note that the load module scanner can occasionally generate a false hit, so you will need to investigate the program to ensure that this has not occurred.
    • If there are unsupported commands you may be able to change them. If not, then the application is not supported by Link3270.
  2. Using the 3270 Bridge Passthrough SupportPak ( See Using the 3270 Bridge Passthrough SupportPac ) to check if the application uses any unsupported interfaces.

    The bridge is designed to support applications conforming to the documented CICS API specified in the Application development reference , subject to the restrictions described in Link3270 programming considerations. To confirm whether the application (and associated vendor products used on the system) conform to this, the application should be run under the Passthrough application. There may be various routes through the program which use different EXEC CICS API commands. Each of these routes should be tested using the Passthrough.