Establish Link3270 suitability
You need to establish that your applications are suitable for use with the Link3270 bridge.
This can be done in two ways:
-
Using the load module scanner to identify if the applications
use any instructions that are not supported by the bridge. This
involves
the following steps:
- Identify the programs used by the application
-
Run the load module scanner against the programs (see
Using the Load Module Scanner Utility
), using the bridge restrictions
table DFHEIDBR. If there are any hits this indicates that there may
be unsupported EXEC CICS commands.
Note: note that the load module scanner can occasionally generate a false hit, so you will need to investigate the program to ensure that this has not occurred.
- If there are unsupported commands you may be able to change them. If not, then the application is not supported by Link3270.
-
Using the 3270 Bridge Passthrough SupportPak ( See
Using the 3270 Bridge Passthrough SupportPac
) to check if the application uses
any unsupported interfaces.
The bridge is designed to support applications conforming to the documented CICS API specified in the Application development reference , subject to the restrictions described in Link3270 programming considerations. To confirm whether the application (and associated vendor products used on the system) conform to this, the application should be run under the Passthrough application. There may be various routes through the program which use different EXEC CICS API commands. Each of these routes should be tested using the Passthrough.