Two CICS®-supplied transactions, CEMT and CETR, provide operator control of FEPI: you can use the CEMT INQUIRE, SET, and DISCARD commands to control FEPI resources such as nodes, targets, and pools; and the CETR transaction to control FEPI trace. You can also use VTAM® commands to manage communication with target systems.
FEPI application programs, and the CICS resources they use, are controlled just like other CICS applications and resources.
The chapter contains the following topics:
[[ Contents Previous Page | Next Page Index ]]