- Page 1: z/VM TCP/IP Level 430 User’s Gu
- Page 5 and 6: Contents | | | Preface . . . . . .
- Page 7 and 8: LPRSET Command . . . . . . . . . .
- Page 9 and 10: Preface Who Should Read This Book T
- Page 11 and 12: How to Use This Book Appendix D,
- Page 13 and 14: Syntax Diagram Description Repetiti
- Page 15 and 16: Summary of Changes This section des
- Page 17 and 18: Chapter 1. Introducing Computer Net
- Page 19 and 20: TCP/IP Protocols and Functions This
- Page 21 and 22: IP provides the means to transmit b
- Page 23 and 24: the transport layer. FTP transfers
- Page 25 and 26: TCP/IP Protocols and Functions v Th
- Page 27 and 28: Internet Addressing TCP/IP Protocol
- Page 29 and 30: all the hosts on the network and pr
- Page 31 and 32: Chapter 2. Transferring Files Using
- Page 33 and 34: Transferring Files Using FTP v v In
- Page 35 and 36: Transferring Files Using FTP The NE
- Page 37 and 38: DATACTTIME Statement Transferring F
- Page 39 and 40: INACTTIME Statement Transferring Fi
- Page 41 and 42: MYOPENTIME Statement Transferring F
- Page 43 and 44: FTP Subcommands Table 3. FTP Subcom
- Page 45 and 46: FTP Subcommands Table 3. FTP Subcom
- Page 47 and 48: FTP Subcommands ►► (1) filename
- Page 49 and 50: FTP Subcommands If quotes are encou
- Page 51 and 52: Automatic File Translation The z/VM
- Page 53 and 54:
FTP Subcommands directory and file
- Page 55 and 56:
supplied, but not fully qualified,
- Page 57 and 58:
FTP Subcommands The level of access
- Page 59 and 60:
FTP Subcommands ►► CD CWD 191 u
- Page 61 and 62:
FTP Subcommands v v v For such an e
- Page 63 and 64:
FTP Subcommands DEBUG Use the DEBUG
- Page 65 and 66:
FTP Subcommands v v v v v For more
- Page 67 and 68:
Usage Notes v v v v v FTP Subcomman
- Page 69 and 70:
FTP Subcommands JISROMAN Use JISROM
- Page 71 and 72:
| v v v v v v v v v v FTP Subcomman
- Page 73 and 74:
FTP Subcommands Command: ls t* >>>P
- Page 75 and 76:
Usage Notes FTP Subcommands v Becau
- Page 77 and 78:
FTP Subcommands ►► NOop ►◄
- Page 79 and 80:
| | | | | | | | | | Usage Notes v v
- Page 81 and 82:
FTP Subcommands QUIT Use the QUIT s
- Page 83 and 84:
v FTP Subcommands The directory spe
- Page 85 and 86:
or have the appropriate privileges.
- Page 87 and 88:
Note: JIS is the abbreviation for t
- Page 89 and 90:
FTP Subcommands SYSTEM Use the SYST
- Page 91 and 92:
Usage Notes FTP Subcommands type ha
- Page 93 and 94:
emote_host = ’rdrunner.endicott.i
- Page 95 and 96:
FTP EXIT Return Codes | | where: YY
- Page 97 and 98:
always know the state of the foreig
- Page 99 and 100:
Using FTP with RACF ® For example,
- Page 101 and 102:
Chapter 3. Transferring Files Using
- Page 103 and 104:
TFTP Subcommands ►► Help subcom
- Page 105 and 106:
PUT Use the PUT subcommand to send
- Page 107 and 108:
Chapter 4. Sending and Receiving El
- Page 109 and 110:
Figure 8 is an example of a nondeli
- Page 111 and 112:
v No embedded blanks can appear wit
- Page 113 and 114:
Examples v v v The percent of disk
- Page 115 and 116:
Sending and Receiving Electronic Ma
- Page 117 and 118:
Chapter 5. Logging On to a Foreign
- Page 119 and 120:
TELNET Subcommands v v If you invok
- Page 121 and 122:
TELNET Subcommands When you want to
- Page 123 and 124:
Chapter 6. Monitoring the TCP/IP Ne
- Page 125 and 126:
Monitoring the TCP/IP Network Comma
- Page 127 and 128:
Monitoring the TCP/IP Network v v v
- Page 129 and 130:
Monitoring the TCP/IP Network conne
- Page 131 and 132:
Monitoring the TCP/IP Network | | |
- Page 133 and 134:
Up Displays the date and time that
- Page 135 and 136:
Monitoring the TCP/IP Network VM TC
- Page 137 and 138:
Monitoring the TCP/IP Network VM TC
- Page 139 and 140:
Monitoring the TCP/IP Network VM TC
- Page 141 and 142:
Monitoring the TCP/IP Network VM TC
- Page 143 and 144:
Monitoring the TCP/IP Network VM TC
- Page 145 and 146:
Monitoring the TCP/IP Network PING
- Page 147 and 148:
4 (9.3.8.14) 77 ms 80 ms 87 ms 5 (9
- Page 149 and 150:
Chapter 7. Authenticating Network U
- Page 151 and 152:
Usage Notes KLIST Command v v v v v
- Page 153 and 154:
Usage Notes v Authenticating Networ
- Page 155 and 156:
Chapter 8. Using the Network File S
- Page 157 and 158:
MOUNT Command ►► (1) MOUNT loca
- Page 159 and 160:
Operands MOUNT Command For BFS and
- Page 161 and 162:
Account=local_data Allows additiona
- Page 163 and 164:
MOUNT Command MOUNT -o ro.soft (The
- Page 165 and 166:
Your system administrator has the o
- Page 167 and 168:
MOUNTPW Command Operands Refer to t
- Page 169 and 170:
UMOUNT Command rpcinfo -u server_na
- Page 171 and 172:
UMOUNT Command Table 12. NFS System
- Page 173 and 174:
v v UMOUNT Command storage by the V
- Page 175 and 176:
v v UMOUNT Command Not all file att
- Page 177 and 178:
SMSG Interface to VMNFS ►► SMSG
- Page 179 and 180:
Query Link Requests information abo
- Page 181 and 182:
Name Translation File M VM NFS serv
- Page 183 and 184:
Using NFS with RACF VM NFS Server L
- Page 185 and 186:
Chapter 9. Using the Remote Executi
- Page 187 and 188:
For more information on the NETRC D
- Page 189 and 190:
maintained by the VM host for remot
- Page 191 and 192:
Chapter 10. Using Remote Printing L
- Page 193 and 194:
Examples When specific link and nod
- Page 195 and 196:
Remote Printing Commands ►► LPR
- Page 197 and 198:
Filter codes provide carriage contr
- Page 199 and 200:
Remote Printing Commands NOBINARY C
- Page 201 and 202:
TI Times Italic TP Times Roman TX T
- Page 203 and 204:
Remote Printing Commands lpr deptg7
- Page 205 and 206:
Remote Printing Commands :NODEID :P
- Page 207 and 208:
LPQ Command If you use more than on
- Page 209 and 210:
Remote Printing Commands v v This c
- Page 211 and 212:
Chapter 11. Using GDDMXD/VM with th
- Page 213 and 214:
Using GDDMXD/VM ►► GDDMXD OFF O
- Page 215 and 216:
Using GDDMXD/VM For sizes other tha
- Page 217 and 218:
Using GDDMXD/VM ►► gddmx*GMCPnn
- Page 219 and 220:
Using GDDMXD/VM The following is th
- Page 221 and 222:
Using GDDMXD/VM Table 16. X Window
- Page 223 and 224:
Using GDDMXD/VM F1—F12 Tab Up Dow
- Page 225 and 226:
By default, a file called GDDMX TRA
- Page 227 and 228:
Using GDDMXD/VM 9 PGF Venn Diagram
- Page 229 and 230:
Chapter 12. Managing TCP/IP Network
- Page 231 and 232:
SNMP Commands To issue an SNMP requ
- Page 233 and 234:
Examples You must specify the varia
- Page 235 and 236:
Examples com_name Specifies the com
- Page 237 and 238:
Using SNMP Examples Note: This para
- Page 239 and 240:
Using SNMP SNM040I SNMP Request 100
- Page 241 and 242:
SNMP MIBVNAME Command When you get
- Page 243 and 244:
Using SNMP SNM040I SNMP Request 100
- Page 245 and 246:
Using SNMP No instance identifiers
- Page 247 and 248:
Chapter 13. Using the Network Datab
- Page 249 and 250:
The Server Machine The RPC Client T
- Page 251 and 252:
The NDB Server The NDB server provi
- Page 253 and 254:
Using NDB Please type in your Host
- Page 255 and 256:
SQL Commands from an Application Wh
- Page 257 and 258:
v v NDB supports only the following
- Page 259 and 260:
Chapter 14. Using the Domain Name S
- Page 261 and 262:
Resolvers Using the Domain Name Sys
- Page 263 and 264:
Using the Domain Name System CHAOS
- Page 265 and 266:
Using the Domain Name System Data M
- Page 267 and 268:
NSLOOKUP Command Once you have ente
- Page 269 and 270:
NSLOOKUP Command To select resource
- Page 271 and 272:
class=class [no]brackets [no]d2 [no
- Page 273 and 274:
NSLOOKUP Command In Figure 16, the
- Page 275 and 276:
HEADER: opcode = QUERY, id = 7, rco
- Page 277 and 278:
Operands server Specifies the domai
- Page 279 and 280:
[no]ko Specifies whether to keep th
- Page 281 and 282:
Name System is a TCP/IP well-known
- Page 283 and 284:
DIG Command ;; ANSWERS: wurrup.FOUR
- Page 285 and 286:
DIG Command wurrup.FOUREX.OZ. A 101
- Page 287 and 288:
CMSRESOL Command ►► RESOLV ques
- Page 289 and 290:
The results of the query are placed
- Page 291 and 292:
Types of Queries CMSRESOL QUERY ( (
- Page 293 and 294:
Chapter 15. Using Translation Table
- Page 295 and 296:
The standard translation is loaded
- Page 297 and 298:
Table 19. IBM Translation Tables (c
- Page 299 and 300:
1A 1A 16 1A 1A 1E 1A 04 1A 1A 1A 1A
- Page 301 and 302:
Using Translation Tables 03 03 03 0
- Page 303 and 304:
Using Translation Tables KANJI HANG
- Page 305 and 306:
Appendix A. Specifying Files and Da
- Page 307 and 308:
Specifying Files and Data Sets ’K
- Page 309 and 310:
Appendix B. Using the NETRC DATA Fi
- Page 311 and 312:
Appendix C. Mapping Values for the
- Page 313 and 314:
Table 20. Mapping Values for the AP
- Page 315 and 316:
Table 20. Mapping Values for the AP
- Page 317 and 318:
Appendix D. Using DBCS with FTP and
- Page 319 and 320:
Table 21. FTP TYPE commands Using D
- Page 321 and 322:
Using DBCS with Mail Using DBCS wit
- Page 323 and 324:
Appendix E. Management Information
- Page 325 and 326:
MIB Objects Object Identifier ISO (
- Page 327 and 328:
MIB Objects SNMP Contains informati
- Page 329 and 330:
Table 23. Implementation of the Int
- Page 331 and 332:
Table 23. Implementation of the Int
- Page 333 and 334:
MIB Objects IP Group Table 25 lists
- Page 335 and 336:
Table 25. Implementation of the IP
- Page 337 and 338:
Table 25. Implementation of the IP
- Page 339 and 340:
Table 26. IP Address Translation Ta
- Page 341 and 342:
Table 28. Implementation of the TCP
- Page 343 and 344:
MIB Objects UDP Group Table 29 list
- Page 345 and 346:
Table 31. Implementation of the IBM
- Page 347 and 348:
Table 33. Implementation of the IBM
- Page 349 and 350:
Table 35. Implementation of the IBM
- Page 351 and 352:
Appendix F. IBM 3172 Attribute Inde
- Page 353 and 354:
Appendix G. SNMP Generic TRAP Types
- Page 355 and 356:
Appendix H. Related Protocol Specif
- Page 357 and 358:
RFCs RFC Title Author 1267 A Border
- Page 359 and 360:
Appendix I. Abbreviations and Acron
- Page 361 and 362:
Abbreviations and Acronyms PIOAM PO
- Page 363 and 364:
Notices IBM may not offer the produ
- Page 365 and 366:
Trademarks The following terms are
- Page 367 and 368:
Glossary This glossary describes th
- Page 369 and 370:
incorrectly grouped under the term
- Page 371 and 372:
Corporation for Research and Educat
- Page 373 and 374:
provides the capability to access d
- Page 375 and 376:
clients. Also, intrinsics provide t
- Page 377 and 378:
answered only by those 3172 devices
- Page 379 and 380:
presentation layer. Layer 6 of the
- Page 381 and 382:
simultaneous peripheral operations
- Page 383 and 384:
the Byte File System (BFS) and TFTP
- Page 385 and 386:
Bibliography This bibliography list
- Page 387 and 388:
zSeries 900: Planning for the Open
- Page 389 and 390:
Index Numerics 3172 attributes 335
- Page 391 and 392:
J JIS78KJ 52 JIS83KJ 53 K Kanji EUC
- Page 393 and 394:
translation tables (continued) Hang
- Page 395 and 396:
Readers’ Comments — We’d Like
- Page 398 and 399:
File Number: S370/4300/30XX-50 Prog