Thu, Jun
3 New Articles

Understanding and Configuring the NetManage NS/Router

  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

Normally, signing on to the AS/400 involves no more thought on your part than double-clicking a desktop icon and then grabbing a cup of coffee while your connection is being made. You’re probably presented with a sign-on panel asking for your AS/400 user ID and password, and, within a few moments, your connection is made. Unless you have problems, you probably don’t think twice about what enables a PC to connect to the AS/400. However, when something goes wrong with your connection, the first place you look is the Client Access/400 router program. What is NS/Router? How does it work? What are the options for this important component of IBM’s Client Access/400 product?

The Most Commonly Used Router in the Industry

NetManage NS/Router is undoubtedly the most widely used router in the PC-to- AS/400 communications industry. The NS/Router is the standard by which other AS/400 router programs are judged. NS/Router is used by most of the popular emulation packages, including Client Access/400, Rally!, and WinAPPC. In fact, NS/Router is supported by over 80 independent software vendors (ISVs) and is the only router that is supported by IBM’s Client Access Support Center and comes bundled with Client Access/400. Introduced in 1993, NS/Router was the first native Advanced Program-to-Program Communications (APPC) engine for Windows-to-AS/400 connectivity. When Windows 95 was released, NetManage also released its 32-bit version of the NS/Router. NS/Router is a binary adapter handler that replaced the old PC Support adapter handler, EHNAPPC.DLL—a DOS-based router and a terrible memory manager. By contrast, NS/Router works with the Windows memory manager and supports Windows 3.1, and Windows 95, and Windows NT.

Let’s Dig a Little Deeper

NetManage has made life easier for all of us who must delve into the world of computer-to-computer communications by providing us with a product that demands very

little from us in the way of setup or support. However, don’t you wonder what’s really going on when a connection is being made? Are you even sure of what a router is?

A router is a protocol engine that takes your request—in this case your request to log on to the AS/400—and determines the path or route to deliver it. The routing process is simply one step in a seven-tier layer known as the Open Systems Interconnection (OSI) model, which ties together the pieces that let one computer communicate with another.

The OSI model was developed in 1974 by the International Organization for Standardization (ISO). The OSI model defines the standard for connectivity, but not the hardware or software needed to make it a reality. The model is divided into seven layers, with each layer performing a specific function that allows application software on disparate systems to talk to each other as if they both resided on the same system. These seven layers are as follows:

1. Application Layer—The application layer includes such familiar interfaces as 5250 emulation, FTP, Simple Mail Transfer Protocol (SMTP), Multi-purpose Internet Mail Extension (MIME), and Simple Network Management Protocol (SNMP).

2. Presentation Layer—The presentation layer handles data formatting, character code conversion, and data encryption.

3. Session Layer—The session layer is where the negotiation and establishment of a connection between nodes is made. An example of this would be the “handshake” between two modems.

4. Transport Layer—The transport layer provides the mechanism for reliable endto-end delivery of data.

5. Network Layer—The network layer is responsible for the routing of packets of information across multiple networks. NS/Router operates at this layer.

6. Data Link Layer—The data link layer handles the transfer of addressable units of information, frames, and error checking. Serial Line Internet Protocol (SLIP) and Point-to- Point Protocol (PPP) operate in this layer.

7. Physical Layer—The physical layer is responsible for the transmission of binary data over a communications network. IEEE 802.2 is an example of this type of throughput.

For the sake of brevity, these layers are often referred to by numbers, with the Application Layer being referred to as Layer 1 and the Physical Layer often called Layer 7. The NetManage NS/Router operates at the Network Layer, or Layer 5. It is at this layer that the configuration of a router is defined.

This configuration can take many forms. Once again, these different configurations are merely sets of instructions defining the process. Seven different protocols, or instruction sets, can be used by a router: Internet Protocol (IP), Address Resolution Protocol (ARP), Reverse Address Resolution Protocol (RARP), Internet Control Message Protocol (ICMP), Open Shortest Path First Protocol (OSPF), Border Gateway Protocol (BGP), and Internet Group Management Protocol (IGMP).

Each of these protocols uniquely defines a method of routing a datagram, the smallest unit in which data is sent. Without getting too much deeper here, suffice it to say that the NS/Router will choose the correct protocol based upon which connection method is defined in the NS/Administrator.

Configuring the NS/Router Couldn’t Be Easier

If you are using Client Access/400, you configure the NS/Router while creating a new Client Access connection using the NetManage Administrator. There are several ways to do this. You can start the NetManage Administrator from the panel shown in Figure 1. You can also choose to start NetManage Administrator from the NetManage folder inside

the Client Access folder. Or, you can manually run the NS ADMIN.EXE program from the Start/Run prompt of Windows 95. The NSADMIN.EXE program can be found in directory C:Program FilesIBMClient Access. Once NetManage Administrator is started, you are presented with the Administrator panel (shown in Figure 2). From here, you can add a new router configuration to existing workspaces or create new workspaces. A workspace is a grouping of collected router configurations. You might want to create separate workspaces when you want the same PC to connect to multiple systems. Each workspace can have one or more router configurations defined within it.

To define a router configuration, click on the Properties button in the toolbar (or right-click on the router icon and select Properties). You will be presented with a Properties panel like the one shown in Figure 3. The first thing you must do is choose the Link type. This is the method you want the NS/Router to use to physically connect to another computer. The link type works in concert with the definition of the CA/400 connection type to set the protocol the NS/Router will use to communicate with the AS/400.

A Chain Is Only as Strong as Its Weakest Link

Using Client Access/400, you can choose to connect your PC to the AS/400 through six different connection links:

• 8022—Used to communicate directly with your token-ring or Ethernet adapter
• AnyNet—Uses TCP/IP to communicate to an AS/400 with the IBM AnyNet protocol

• Asynch—Used to communicate with a host through the PC serial port
• NetWare for SAA—Used to communicate with a host using Novell NetWare for SAA Server

• SDLC—Used to communicate with a host using a supported SDLC adapter
• Twinax—Used to communicate with a host using a twinax adapter The NetManage NS/Router is flexible enough to allow a PC to use any or all of these connections simultaneously, provided the PC has all the requisite hardware and software installed. For example, you might have a 5250 emulation card and an Ethernet adapter card installed in your PC. The 5250 card would allow you to communicate to one system through that AS/400’s twinax controller while the Ethernet card would allow you to access other AS/400s in the network. All of these connections could be active at the same time, orchestrated by the NS/Router.

Pick a System, Any System

The Systems panel (shown in Figure 4) allows you to define the name of the connected AS/400 system. You add a new system by clicking on the Add button and entering the system’s name and network ID. This ID must correspond to the NETID parameter of the connected AS/400. You can find this NETID by keying the Display Network Attributes (DSPNETA) command on the AS/400. You may also enter the AS/400 user ID and password you want NS/Router to use to connect to the AS/400. If a user ID and password are not entered here, the NS/Router will automatically use the user ID and password from the Common properties tab shown in Figure 5. If the user ID and password are left blank in both tab boxes, the user will be prompted to enter them before he or she is allowed to connect to the AS/400.

Now, here is something to note: This user ID/password pair may not necessarily be the same values required to actually sign on to an AS/400 workstation session. They may be defined differently, and are actually stored separately. The second user ID/password pair is actually configured in a separate CA/400 configuration panel outside of NetManage Administrator and is stored in the Windows 95 password cache. That

second pair can be set by clicking on the Windows 95 Passwords icon in Control Panel. The NS/Router user ID and password are only used by the NS/Router program itself to route commands to the AS/400.

Who Says Redundancy Is a Bad Thing?

Looking back at the Systems tab (Figure 4), you will see you can also set the Router Redundancy List. Use this feature if you have more than one router configuration defined to connect to the same AS/400. This can be very handy. For example, you might have three phone numbers set up to dial for an asynchronous connection. One phone number might be used if you’re dialing from an office that requires a 9 to get an outside line. Another phone number might use an 8 to get an outside line; most hotel phone systems require this. The third configuration might not require any extra digits to access an outside line. The Router Redundancy List will also let you synchronize the order in which the different router configurations will be executed. This parameter only affects those routers defined within the same workspace.

Define Common Information

Let’s look closer at the Common properties tab (shown in Figure 5), used to define the user ID and password. The password and user ID pair entered here will be used across all NS/Router configurations within a given workspace. This means you only need to enter this information once for a given router configuration. Within this panel, you can also identify the code page and other advanced session properties that are common to all systems. If you need to, you can specify additional parameters such as Local Transaction Programs to be started when the router session starts, set security by user ID and password for a given transaction program, and add CPI-C Side information such as remote user ID and symbolic destination name.

Local Names Are Important, Too

The Local LU properties panel (shown in Figure 6) is used to define configuration data that is uniquely localized to the defined systems. For instance, you use this panel to specify the network ID of the AS/400 you are connecting to, as well as the PC location name to be used when connecting to the AS/400. The PC location name is a unique name defined for each workstation. If your AS/400 has Auto Configure Virtual Devices turned on in the system value, this will be the name generated when the PC first connects to the AS/400. Otherwise, this value must correspond to an already defined device. This is useful when a particular PC must attach to the AS/400 to a particular device configuration.

Within the NS/Router Properties panel, the Link Type, System Name, and Local LU properties all contain required entries. The Common properties are optional. Once you have configured these tabs, save the data and close the NetManage Administrator. If you started the Administrator while configuring a new Client Access session, you will be returned to the screen shown in Figure 1, and you can continue the remaining Client Access/400 configuration tasks.

Nothing Works Perfectly All the Time

The NS/Router is one of the most reliable routers in the industry. However, even the best of us have bad days. One common problem that many people experience is the infamous CWBSY1000 “A communication error occurred while validating your user ID and password on the specified system” message. This is not really a problem with the NS/Router product, but rather a problem with the way routers must sign on to hosts and their ability to report user validation errors. The CWBSY1000 message appears any time an attempt to connect to an AS/400 fails. Of course, a cursory review of the error message might lead you to believe that the user ID on the AS/400 was invalid. This could be the case, but it could also be caused by any number of situations. More often than not, the real

cause can be traced to a failure of the physical connection that is occurring before the user ID and password are validated. The router itself has no way of communicating back to Client Access/400 what type of error it has received, and Client Access/400 merely interprets NS/Router’s failure as a validation problem.

Other problems can occur when you are using the Run Remote Command (RUNRMTCMD) command from your PC to send instructions between the PC and the AS/400. Errors associated with this APPC function are often cryptic, taking the form of Sense Code or Invalid Parameter errors. Often, they relate to the fact that the NS/Router doesn’t support certain parameter passing, such as the common PCID common control vector, or because NS/Router doesn’t support data compression or session-level encryption.

There are a few other rather esoteric errors that could occur when using NS/Router, but in general, once the software has been properly configured, errors are rare occurrences.

Making the Complex Simple

NetManage NS/Router is a tool that performs very complex steps behind the scenes, while presenting the user with a simple interface. The next time you use your PC to connect to an AS/400, give a little thought to the many events that had to occur to get that 5250 session displayed on your screen. If you do, you’re sure to appreciate what this little piece of the PC-to-AS/400 connection process does to simplify your life.

Figure 1: You can start the NetManage Administrator using this panel

Understanding_and_Configuring_the_NetManage_...05-00.png 900x616

Figure 2: The NetManage Administrator panel

Understanding_and_Configuring_the_NetManage_...06-00.png 900x600

Figure 3: The Properties panel

Understanding_and_Configuring_the_NetManage_...07-00.png 768x862

Figure 4: You can define the name of the connected AS/400 system using the Systems panel

Understanding_and_Configuring_the_NetManage_...08-00.png 772x862

Figure 5: The Common properties tab is used to define the user ID and password

Understanding_and_Configuring_the_NetManage_...09-00.png 770x864

Figure 6: The Local LU properties panel

Understanding_and_Configuring_the_NetManage_...10-00.png 777x864
Shannon O'Donnell has held a variety of positions, most of them as a consultant, in dozens of industries. This breadth of experience gives him insight into multiple aspects of how the AS/400 is used in the real world. Shannon continues to work as a consultant. He is an IBM Certified Professional--AS/400 RPG Programmer and the author of an industry-leading certification test for RPG IV programmers available from ReviewNet.net.


Support MC Press Online

$0.00 Raised:

Book Reviews

Resource Center

  • SB Profound WC 5536 Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. You can find Part 1 here. In Part 2 of our free Node.js Webinar Series, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Brian will briefly discuss the different tools available, and demonstrate his preferred setup for Node development on IBM i or any platform. Attend this webinar to learn:

  • SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation. Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects. The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the company are not aligned with the current IT environment.

  • SB HelpSystems ROBOT Generic IBM announced the E1080 servers using the latest Power10 processor in September 2021. The most powerful processor from IBM to date, Power10 is designed to handle the demands of doing business in today’s high-tech atmosphere, including running cloud applications, supporting big data, and managing AI workloads. But what does Power10 mean for your data center? In this recorded webinar, IBMers Dan Sundt and Dylan Boday join IBM Power Champion Tom Huntington for a discussion on why Power10 technology is the right strategic investment if you run IBM i, AIX, or Linux. In this action-packed hour, Tom will share trends from the IBM i and AIX user communities while Dan and Dylan dive into the tech specs for key hardware, including:

  • Magic MarkTRY the one package that solves all your document design and printing challenges on all your platforms. Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product. Make sure your data survives when catastrophe hits. Request your trial now!  Request Now.

  • SB HelpSystems ROBOT GenericForms of ransomware has been around for over 30 years, and with more and more organizations suffering attacks each year, it continues to endure. What has made ransomware such a durable threat and what is the best way to combat it? In order to prevent ransomware, organizations must first understand how it works.

  • SB HelpSystems ROBOT GenericIT security is a top priority for businesses around the world, but most IBM i pros don’t know where to begin—and most cybersecurity experts don’t know IBM i. In this session, Robin Tatam explores the business impact of lax IBM i security, the top vulnerabilities putting IBM i at risk, and the steps you can take to protect your organization. If you’re looking to avoid unexpected downtime or corrupted data, you don’t want to miss this session.

  • SB HelpSystems ROBOT GenericCan you trust all of your users all of the time? A typical end user receives 16 malicious emails each month, but only 17 percent of these phishing campaigns are reported to IT. Once an attack is underway, most organizations won’t discover the breach until six months later. A staggering amount of damage can occur in that time. Despite these risks, 93 percent of organizations are leaving their IBM i systems vulnerable to cybercrime. In this on-demand webinar, IBM i security experts Robin Tatam and Sandi Moore will reveal:

  • FORTRA Disaster protection is vital to every business. Yet, it often consists of patched together procedures that are prone to error. From automatic backups to data encryption to media management, Robot automates the routine (yet often complex) tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:

  • FORTRAManaging messages on your IBM i can be more than a full-time job if you have to do it manually. Messages need a response and resources must be monitored—often over multiple systems and across platforms. How can you be sure you won’t miss important system events? Automate your message center with the Robot Message Management Solution. Key features include:

  • FORTRAThe thought of printing, distributing, and storing iSeries reports manually may reduce you to tears. Paper and labor costs associated with report generation can spiral out of control. Mountains of paper threaten to swamp your files. Robot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing. Manage your reports with the Robot Report Management Solution. Key features include:

  • FORTRAFor over 30 years, Robot has been a leader in systems management for IBM i. With batch job creation and scheduling at its core, the Robot Job Scheduling Solution reduces the opportunity for human error and helps you maintain service levels, automating even the biggest, most complex runbooks. Manage your job schedule with the Robot Job Scheduling Solution. Key features include:

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed. Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

  • LANSASupply Chain is becoming increasingly complex and unpredictable. From raw materials for manufacturing to food supply chains, the journey from source to production to delivery to consumers is marred with inefficiencies, manual processes, shortages, recalls, counterfeits, and scandals. In this webinar, we discuss how:

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • Profound Logic Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: