Previous Topic: Virtual Terminal Masking RulesNext Topic: Special Characters and Blanks


How Virtual Terminal Masks Are Used

When a user initiates a session with an application that uses virtual terminal masking, the product uses the masking rules table to determine what virtual terminal should be assigned for the session. It compares the physical terminal ID with the physical terminal masks in the table. If it finds a mask that matches the physical terminal ID, it then compares the corresponding virtual terminal mask with the available virtual terminals. When the software finds a matching virtual terminal, it assigns that virtual terminal to the session. If it cannot find a matching physical terminal mask in the table, or if it cannot locate an available virtual terminal, it uses the next pair of physical and virtual terminal masks in the table.