Perform these steps to configure IPIC on IBM® TXSeries®
About this task
To enable communication between CICS® Transaction Gateway and
a TXSeries region, you
need to configure a Listener Definition for IPIC over TCP/IP, and
optionally, security.
Procedure
- Create a Listener Definition (LD) and set the Protocol attribute
to IPIC.
- Set the TCPAddress attribute to define
the network adapter addresses.
The attribute can be specified
as follows:
- The Internet Protocol (IP) address in dotted decimal notation.
For example,
1.23.45.67. Do not use leading zeros
when specifying an address in dotted decimal notation; CICS interprets such an entry as octal.
- The Internet Protocol (IP) address in dotted hexadecimal notation.
For example,
0x01.0x17.0x2D.0x43.
- The host name defined in the Internet name service. For example,
aix5.cicsland.com.
- Set the TCPService attribute to the TCP/IP service
name.
The TCP/IP service name refers to an entry in the
services
file provided by the operating system. In open systems such as AIX®, the services file is in the
/etc/ directory. In Microsoft
Windows, the file is in the
C:\windows\system32\drivers\etc directory. You must add a unique service name
and assign a unique TCP port for the service name in the services file. For
example:
cicsipc1 8598/tcp #TCP listener1 for region regionName
For
more information on services files, see your operating system documentation.
- Set ActivateOnStartup=yes so
the Listener will start when the region starts.
Example
The following sample command adds an LD entry for IPIC to
the CICS region's permanent
database:cicsadd -r cics -P -c ld CICSIPC TCPAddress="aix2.cicsland.com"
TCPService="cicsipic" Protocol=IPIC ActivateOnStartup=yes
You
can predefine or autoinstall IPIC connections in TXSeries.
What to do next
To configure security, modify
RemoteSysSecurity=verify in the default CD Entry. For
more information, see Providing CICS user
security in the TXSeries documentation.
You can configure CICS Systems to communicate over secure
channels. For more information, see this link Configuring CICS systems to
communicate over secure channels.
To enable link security, follow the instructions in Defining CICS link
security