Broadcom z/OS

CA TCPaccess Communication Server Modernization Guide

Networks and Communication

CA TCPaccess Communication Server is a networks and communication product by Broadcom. Explore technical details, modernization strategies, and migration paths below.

Product Overview

CA TCPaccess Communication Server is a TCP/IP stack designed for z/OS mainframe environments.

A company should consider using it when they require a reliable TCP/IP stack with specific features or performance characteristics not available in the standard IBM TCP/IP stack.

Modernization Strategies

Rehost

Timeline:
6-12 months

Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.

Refactor (Recommended)

Timeline:
18-24 months

Optimize application architecture for cloud while preserving business logic. Best ROI long-term.

Replatform

Timeline:
3-5 years

Complete rewrite to cloud-native architecture with microservices and modern tech stack.

Frequently Asked Questions

General

What does CA TCPaccess Communication Server do?

CA TCPaccess Communication Server is a TCP/IP stack for z/OS. It provides network communication services, including FTP and Telnet servers, for mainframe environments.

Is this a system, application, or tool?

CA TCPaccess is a system providing core network functionality. It includes applications like FTP and Telnet servers.

What types of organizations use this?

Organizations that rely on z/OS mainframe environments for critical applications and require robust TCP/IP communication capabilities use CA TCPaccess. This includes enterprises in banking, finance, insurance, and government.

When should we consider CA TCPaccess Communication Server?

A company should consider CA TCPaccess when they need a reliable and high-performing TCP/IP stack for their z/OS mainframe, especially if they require specific features or performance characteristics not met by the standard IBM TCP/IP stack.

What are the alternatives to CA TCPaccess Communication Server?

Alternatives include the IBM TCP/IP stack for z/OS and other third-party TCP/IP solutions designed for mainframe environments. Barnard TCP/IP Tools and TCP/IP for VSE are also alternatives.

Technical

What infrastructure is required?

CA TCPaccess runs on the z/OS operating system and requires a mainframe environment. It typically runs in an LPAR and is dependent on z/OS subsystems for operation.

For mainframe products: Does this run in an LPAR?

Yes, CA TCPaccess runs in an LPAR on a z/OS system. It is z/OS dependent.

What are the main system components?

CA TCPaccess includes components such as the FTP Server and Telnet Server. These components communicate using standard TCP/IP protocols.

What configuration files are used?

Configuration files are used to define network parameters, security settings, and application-specific options. The exact format and location of these files are specific to CA TCPaccess.

Business Value

What business problems does it solve?

CA TCPaccess provides reliable and high-performance TCP/IP communication for critical mainframe applications. It ensures efficient data transfer and connectivity, which is crucial for business operations.

What would happen if an organization did NOT use this product?

Without CA TCPaccess, organizations might experience performance bottlenecks, compatibility issues, or lack of specific features required for their mainframe TCP/IP communication. This can lead to slower data processing and potential disruptions.

How does this product integrate with enterprise ecosystems?

CA TCPaccess can integrate with enterprise ecosystems through standard TCP/IP protocols and APIs, allowing it to connect with other systems and applications within the organization.

Security

What specific authentication methods are supported?

CA TCPaccess supports authentication methods such as username/password and potentially integrates with external security systems like RACF or ACF2 for enhanced security.

What access control model is used?

The access control model used by CA TCPaccess is likely role-based access control (RBAC), where users are assigned roles with specific permissions to access resources and perform actions.

What audit/logging capabilities exist?

CA TCPaccess includes audit and logging capabilities to track user activity, system events, and security-related incidents. These logs can be used for monitoring and compliance purposes.

Operations

What level of technical expertise is required to implement it?

Implementing CA TCPaccess requires technical expertise in z/OS, TCP/IP networking, and mainframe security. Ongoing operational requirements include monitoring system performance, applying security patches, and managing user access.

What are common implementation challenges?

Common implementation challenges include configuring network parameters, integrating with existing security systems, and ensuring compatibility with other mainframe applications.

What administrative interfaces are available?

Administrative interfaces for CA TCPaccess typically include a command-line interface (CLI) and potentially a web-based console for managing system configuration, user accounts, and monitoring system status.

Ready to Start Your Migration?

Download our comprehensive migration guide for CA TCPaccess Communication Server or calculate your ROI.

Calculate ROI