
3270 Intrusion Detection Services
You can configure and monitor the VTAM 3270 Intrusion Detection Services (IDS) to determine problems in application 3270 data streams. The specific problem that is detected is the modification of protected fields in the data stream that 3270 emulators return.
This topic includes the following information:
3270 IDS overview introduces the
overview and background of the VTAM 3270 IDS function.
3270 IDS considerations and assessment
describes the various factors to consider before deploying the 3270 IDS solutions, including
assessing your environment, deployment strategy, and known application 3270 solutions provided by
IBM.
- Configuring 3270 IDS describes how to configure the monitoring of the 3270 data streams.
- Displaying and modifying 3270 IDS configuration describes the configuration and status of 3270 IDS.
- 3270 IDS incidents describes the messages when 3270 data stream errors are detected.
- GTF trace data describes how to capture and format 3270 IDS incident trace data when 3270 IDS incidents are written to the GTF.
- Using SMF describes how to capture 3270 IDS incident trace data when 3270 IDS incidents are written to the SMF.
- Incident validation describes methods for gathering information about incidents.

