Configuring IPIC on IBM TXSeries

Perform these steps to configure IPIC on IBM® TXSeries®

About this task

To enable communication between CICS® Transaction Gateway and a TXSeries region, you need to configure a Listener Definition for IPIC over TCP/IP, and optionally, security.

Procedure

  1. Create a Listener Definition (LD) and set the Protocol attribute to IPIC.
  2. Set the TCPAddress attribute to define the network adapter addresses.
    The attribute can be specified as follows:
    • The Internet Protocol (IP) address in dotted decimal notation. For example, 1.23.45.67. Do not use leading zeros when specifying an address in dotted decimal notation; CICS interprets such an entry as octal.
    • The Internet Protocol (IP) address in dotted hexadecimal notation. For example, 0x01.0x17.0x2D.0x43.
    • The host name defined in the Internet name service. For example, aix5.cicsland.com.
  3. Set the TCPService attribute to the TCP/IP service name.
    The TCP/IP service name refers to an entry in the services file provided by the operating system. In open systems such as AIX®, the services file is in the /etc/ directory. In Microsoft Windows, the file is in the C:\windows\system32\drivers\etc directory. You must add a unique service name and assign a unique TCP port for the service name in the services file. For example:
    cicsipc1        8598/tcp  #TCP listener1 for region regionName
    For more information on services files, see your operating system documentation.
  4. Set ActivateOnStartup=yes so the Listener will start when the region starts.

Example

The following sample command adds an LD entry for IPIC to the CICS region's permanent database:
cicsadd -r cics -P -c ld CICSIPC TCPAddress="aix2.cicsland.com" 
TCPService="cicsipic" Protocol=IPIC  ActivateOnStartup=yes

You can predefine or autoinstall IPIC connections in TXSeries.

What to do next

To configure security, modify RemoteSysSecurity=verify in the default CD Entry. For more information, see Providing CICS user security in the TXSeries documentation.

You can configure CICS Systems to communicate over secure channels. For more information, see this link Configuring CICS systems to communicate over secure channels.

To enable link security, follow the instructions in Defining CICS link security