Getting Started with WebSphere MQ File Transfer Edition V7
An IBM Redbooks publication
Published 23 August 2009, updated 20 January 2010
IBM Form #: SG24-7760-00
Authors: Martin Keen, Ran Gu, Eugene Kuehlthau, Leonard McWilliams, David Ward
WebSphere MQ File Transfer Edition provides an enterprise-ready managed file transfer capability that is both robust and easy-to-use. WebSphere MQ File Transfer Edition exploits the proven reliability and connectivity of WebSphere MQ to transfer files across a wide range of platforms and networks.
In this IBM® Redbooks® publication, we provide a complete guide for getting started with WebSphere MQ File Transfer Edition. In Part one of the book, we provide a technical overview of the product and provide installation, configuration, and administration guidance for distributed and z/OS® platforms.
In Part two, we provide a series of scenarios to show how you can use WebSphere MQ File Transfer Edition to create managed file transfer solutions. These scenarios range from simple point-to-point transfers through to resource monitoring and complex scripted transfers that include the use of Apache Ant. We describe each scenario step-by-step, which allows you to follow along in your own environment.
In Part three of this book, we discuss topics, such as security, user exits, and the integration of WebSphere MQ File Transfer Edition with other products and solutions.
Table of contents
Part 1. WebSphere MQ File Transfer Edition
Chapter 1. Overview of WebSphere MQ File Transfer Edition
Chapter 2. Topologies
Chapter 3. Installing and configuring WebSphere MQ File Transfer Edition
Chapter 4. Configuring WebSphere MQ File Transfer Edition on System z
Chapter 5. Administering WebSphere MQ File Transfer Edition
Part 2. Usage scenarios
Chapter 6. The business scenario that we use in this book
Chapter 7. Phase 1: Basic file transfers
Chapter 8. Phase 2: Multi-step transfers
Chapter 9. Phase 3: Complex transfers
Part 3. Additional use of WebSphere MQ File Transfer Edition
Chapter 10. File transfer auditing and logging
Chapter 11. Recovering and troubleshooting
Chapter 12. Security considerations
Chapter 13. Advanced topics
Chapter 14. Integration
Appendix A. Additional material
Others who read this publication also read
Follow IBM Redbooks
Follow IBM Redbooks