Start of change

3270 Intrusion Detection Services

You can configure and monitor the VTAM 3270 Intrusion Detection Services (IDS) to determine problems in application 3270 data streams. The specific problem that is detected is the modification of protected fields in the data stream that 3270 emulators return.

Start of changeThis topic includes the following information:
  • Start of change3270 IDS overview introduces the overview and background of the VTAM 3270 IDS function.End of change
  • Start of change3270 IDS considerations and assessment describes the various factors to consider before deploying the 3270 IDS solutions, including assessing your environment, deployment strategy, and known application 3270 solutions provided by IBM.End of change
  • Configuring 3270 IDS describes how to configure the monitoring of the 3270 data streams.
  • Displaying and modifying 3270 IDS configuration describes the configuration and status of 3270 IDS.
  • 3270 IDS incidents describes the messages when 3270 data stream errors are detected.
  • GTF trace data describes how to capture and format 3270 IDS incident trace data when 3270 IDS incidents are written to the GTF.
  • Using SMF describes how to capture 3270 IDS incident trace data when 3270 IDS incidents are written to the SMF.
  • Incident validation describes methods for gathering information about incidents.
End of change
End of change