01.01.2013 Views

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

CICS Transaction Gateway V5 The WebSphere ... - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>CICS</strong> <strong>Transaction</strong><br />

<strong>Gateway</strong> <strong>V5</strong><br />

<strong>The</strong> <strong>WebSphere</strong> Connector for <strong>CICS</strong><br />

Install and configure<br />

the <strong>CICS</strong> TG on z/OS,<br />

Linux, and Windows<br />

Configure TCP/IP,<br />

TCP62, APPC or EXCI<br />

connections to <strong>CICS</strong><br />

TS V2.2<br />

Deploy J2EE<br />

applications to<br />

<strong>WebSphere</strong><br />

Application Server<br />

V4 on z/OS or<br />

Windows<br />

SG24-6133-01 ISBN 0738426687<br />

Back cover<br />

<strong>The</strong> <strong>CICS</strong> <strong>Transaction</strong> <strong>Gateway</strong> (<strong>CICS</strong> TG) is widely used to<br />

provide access to <strong>CICS</strong> COMMAREA-based programs and<br />

3270 transactions from Java environments. This <strong>IBM</strong><br />

Redbook shows you how to build a robust <strong>CICS</strong> TG<br />

configuration for a variety of different configurations.<br />

First we introduce the facilities of the <strong>CICS</strong> TG, followed by<br />

step-by-step explanations of how to use the different<br />

protocols (TCP/IP, TCP62, APPC and EXCI) used for<br />

communication with a <strong>CICS</strong> TS V2.2 region on z/OS, and how<br />

to secure your <strong>CICS</strong> region when receiving External Call<br />

Interface (ECI) or External Presentation Interface (EPI)<br />

requests.<br />

Next, we provide details on how to configure the <strong>CICS</strong> TG <strong>V5</strong><br />

on either z/OS or Linux to connect a Java client application to<br />

a <strong>CICS</strong> region. <strong>The</strong> use of the Secure Sockets Layer (SSL)<br />

protocol to encrypt the communication from the Java<br />

application to the <strong>CICS</strong> TG is included in these scenarios.<br />

Finally, we offer two scenarios to illustrate how to configure<br />

<strong>WebSphere</strong> Application Server V4 on the Windows or z/OS<br />

platforms, to use the supplied ECI resource adapter to allow<br />

J2EE applications to make ECI calls to <strong>CICS</strong>.<br />

INTERNATIONAL<br />

TECHNICAL<br />

SUPPORT<br />

ORGANIZATION<br />

®<br />

BUILDING TECHNICAL<br />

INFORMATION BASED ON<br />

PRACTICAL EXPERIENCE<br />

<strong>IBM</strong> <strong>Redbooks</strong> are developed by<br />

the <strong>IBM</strong> International Technical<br />

Support Organization. Experts<br />

from <strong>IBM</strong>, Customers and<br />

Partners from around the world<br />

create timely technical<br />

information based on realistic<br />

scenarios. Specific<br />

recommendations are provided<br />

to help you implement IT<br />

solutions more effectively in<br />

your environment.<br />

For more information:<br />

ibm.com/redbooks

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!