HP e3000/iX Network Planning and Configuration Guide (36922-90037)
Appendix C 215
NS X.25 Migration: NS 3000/V to NS 3000/iX Release 2.0 or Later
Differences in X.25 Support
Facilities
Following are the supported facilities of the DTC/X.25 XL Network
Link.
Security
When configuring a host, you can now set security for each remote
system using the Security field on the X.25 SVC Address Key Paths
screen. System to System Local User Groups (LUGs) are now assigned
on the DTC instead of on the host. The LUG provides security in the
same way a CUG does, but you don’t have to subscribe to a CUG.
Supported Facilities 1984 CCITT X.25 Reference
Extended packet sequence number 6.2
Incoming calls barred 6.5
Outgoing calls barred 6.6
Nonstandard default packet size 6.9
Nonstandard default window size 6.10
Flow control parameter negotiation 6.12
Throughput class negotiation 6.13
Closed user group selection (1980 CCITT) 6.14
Fast select request and acceptance 6.16–17
Reverse charging and acceptance 6.18–19
Local charging prevention 6.20
Hunt group 6.25
Supported Facilities with X.25 Level 3 Programmatic Access
Closed user group related facilities 6.14
Bilateral closed user groups 6.15
Network user identification 6.21
Called line modified address notification 6.26
Call redirection and notification 6.25–27
Transit delay selection and indication 6.28