The nickname file, Nickname file, The nickname file -6 – Visara SCON-20L Configuration Manual User Manual
Page 60
6-6
707044-006
SCON-20L/22L/25L/28L Configuration Manual
Entry 7
Line
Port
IP Address
Type
3270 Host
LU
----
----
----------
----
---------
--
FET1
01191 ___ ___ ___ ___
Client ID
3270 Class: ZOS_PROGRAMMERS
__
This entry requires the user connecting in on port 1191 to enter a valid User ID and
password. If a valid User ID and password is given, then a session from the 3270 Host
Class called ‘ZOS_PROGRAMMERS’ will be given. Multiple users can connect through
this same definition, each using the same or different User ID and passwords, as long as
they are valid.
Entry 8
Line
Port
IP Address
Type
3270 Host
LU
----
----
----------
----
---------
--
FET1
02120 ___ ___ ___ ___
Client+CC PW
OS390_prod4
03
This entry supports only TN3270 clients that provide their own handling of Command
Chaining sequences, if this entry is to connect the user to a console session. The user
will be challenged for the configured LINCS Telnet password when they connect to
port 2120.
Entry 9
Line
Port
IP Address
Type
3270 Host
LU
----
----
----------
----
---------
--
FET1
02121 ___ ___ ___ ___
Client+CC ID
OS390_prod4
04
This entry also supports only TN3270 clients that provide their own handling of
Command Chaining sequences for console sessions. In this case the user must provide
a valid User ID and password and connect to port 2121.
Entry 10
Line
Port
IP Address
Type
3270 Host
LU
----
----
----------
----
---------
--
FET1
02122 ___ ___ ___ ___
Client+CC
VMESA_prod3
02
Similar to the previous two entries, only TN3270 clients that provide their own handling
of Command Chaining sequences for console sessions should attempt to use this entry.
In this case the user must connect to port 2122, and must be using the configured IP
address of 207.15.182.137.
The Nickname File
Optionally, a nickname file may be used to assign sessions to users and to help provide
password security. Differently formatted entries may be used to provide resource
assignment, User ID/password security, and resource security.