What was the primary function of CA STX?
CA STX provided connectivity between SNA networks and X.25 networks, enabling 3270 terminal users to access X.25 services. It acted as a protocol converter, translating SNA protocols to X.25 and vice versa.
How was CA STX configured?
CA STX used configuration files to define the mapping between SNA logical units (LUs) and X.25 addresses. These files specified parameters for protocol conversion, addressing, and security. The administrative interface allowed modification of these configuration files.
What security features did CA STX offer?
CA STX supported authentication through user IDs and passwords, often integrated with the z/OS or z/VM security systems. Access control was typically managed through access control lists (ACLs) that defined which users or groups could access specific X.25 resources.
What monitoring and logging capabilities were available?
CA STX provided logging capabilities to track network activity, errors, and security events. Administrators could use these logs to monitor the performance and security of the SNA-to-X.25 connections. The logs could be configured to capture different levels of detail.