OpenVMS System Manager's Manual

*HyperReader

CONTENTS

  Title Page

  Copyright Page

  Preface

  1      Overview of This Manual
    1.1 Using the OpenVMS System Manager's Manual
    1.2 How This Manual Relates to Other System Management Documentation
    1.3 Finding Information About Managing Complex Environments
    1.4 Finding Information About Managing Small Systems

  2      Using OpenVMS System Management Utilities and Tools
    2.1 Understanding OpenVMS System Management Tools
      2.1.1      OpenVMS Management Station
        2.1.1.1      Managing Resources
        2.1.1.2      Managing Operations
      2.1.2      DCL Commands
      2.1.3      System Messages
      2.1.4      DCL Command Procedures
      2.1.5      System Management Utilities
      2.1.6      MGRMENU.COM Command Procedure
    2.2 Logging In to the SYSTEM Account
    2.3 Using the System Management Utility (SYSMAN) to Centralize System Management
      2.3.1      Understanding SYSMAN
        2.3.1.1      Privileges Required
        2.3.1.2      Tools and Commands
      2.3.2      Enabling a Remote System to Execute SYSMAN Commands
      2.3.3      Understanding a SYSMAN Management Environment
      2.3.4      Defining the SYSMAN Management Environment
        2.3.4.1      Defining Another Node as the Environment
        2.3.4.2      Using Logical Names to Organize Management Environments
        2.3.4.3      Defining a VMScluster Environment
      2.3.5      Understanding Your SYSMAN Profile
      2.3.6      Adjusting Your SYSMAN Profile
        2.3.6.1      Changing Your Current Privileges
        2.3.6.2      Changing Your Default Device and Directory
      2.3.7      Setting DCL Verification
      2.3.8      Executing DCL Commands from SYSMAN
      2.3.9      Creating SYSMAN Command Procedures
      2.3.10     Setting Up SYSMAN with an Initialization File
    2.4 Using OPCOM to Communicate with System Users
      2.4.1      Starting OPCOM
      2.4.2      Sending Messages to Users
      2.4.3      Controlling the Use of OPA0:  as an Operator Terminal
      2.4.4      Designating Operator Terminals
      2.4.5      Sending Requests to an Operator
      2.4.6      Replying to Operator Requests
    2.5 Using VMSKITBLD.COM to Modify a System Disk
      2.5.1      Using VMSKITBLD.COM to Build a New System Disk
        2.5.1.1      Completing a System Disk Built with VMSKITBLD.COM
      2.5.2      Using VMSKITBLD.COM to Copy System Files to an Existing Disk
      2.5.3      Using VMSKITBLD.COM to Add an Alternate System Root Directory
        2.5.3.1      Configuring a System Root Added with VMSKITBLD

  3      Installing, Upgrading, and Updating Software
    3.1 Installing, Upgrading, and Updating the Operating System
      3.1.1      Installing or Upgrading the OpenVMS Alpha Operating System
      3.1.2      Installing or Upgrading from a Running Alpha System
      3.1.3      Installing the OpenVMS VAX Operating System
      3.1.4      Upgrading the OpenVMS VAX Operating System
      3.1.5      Updating the OpenVMS Alpha or OpenVMS VAX Operating System
    3.2 Installing or Upgrading Layered Products
    3.3 Preparing Your System to Run VMSINSTAL.COM
      3.3.1      Performing Preliminary Operations
      3.3.2      Registering and Loading Licenses
      3.3.3      Preventing Nodes from Sharing PAKs
    3.4 Running VMSINSTAL.COM
      3.4.1      Selecting a Product List
      3.4.2      Selecting the Source
      3.4.3      Selecting Options
      3.4.4      Selecting the Destination
      3.4.5      Verifying, Logging, and Confirming the Operation
      3.4.6      Completing the Installation
    3.5 Recovering from a System Failure
    3.6 Selecting VMSINSTAL.COM Options
      3.6.1      Using the Autoanswer Option ( A ) (Layered Products Only)
      3.6.2      Using the Alternate Working Device Option (AWD=)
      3.6.3      Using the Get Save Set Option ( G ) (Layered Products Only)
        3.6.3.1      Storing a Product Save Set
        3.6.3.2      Installing a Product
        3.6.3.3      Specifying Backup Qualifiers
      3.6.4      Using the File Log Option ( L )
      3.6.5      Using the Release Notes Option ( N )
      3.6.6      Using the Alternate Root Option ( R )
    3.7 Using the POLYCENTER Software Installation Utility
      3.7.1      Interfaces to Use
      3.7.2      Operations to Perform
      3.7.3      Product Files and Databases
      3.7.4      Format of Software Product Kits
      3.7.5      Software Product Name Conventions
        3.7.5.1      Version Identification Format
        3.7.5.2      Looking at Software Product Name Examples
      3.7.6      Creating a Product Configuration File (PCF)
        3.7.6.1      Configuration Options
        3.7.6.2      Configuration Commands
        3.7.6.3      Recording Configuration Choices
        3.7.6.4      Modifying an Existing PCF
      3.7.7      Using a Product Database
        3.7.7.1      Adding Information to the Database
        3.7.7.2      Registering a Noncompliant Product
        3.7.7.3      Detecting and Tracking Software Dependencies
    3.8 Installing with the POLYCENTER Software Installation Utility
      3.8.1      Performing Preliminary Steps
        3.8.1.1      Assigning Privileges
        3.8.1.2      Installing Prerequisite Software
        3.8.1.3      Identifying Postinstallation Procedures
      3.8.2      Extracting a Product's Release Notes
      3.8.3      Installing a Product
        3.8.3.1      Using an Existing PCF
        3.8.3.2      Creating a New PCF During the Installation
      3.8.4      Responding to Installation Questions
        3.8.4.1      Requesting an Explanation to Questions
        3.8.4.2      Accepting Default Answers
      3.8.5      Confirming Your Answers
      3.8.6      Performing the Installation as a Batch Job
    3.9 Performing Other Operations on Installed Software Products
      3.9.1      Reconfiguring an Installed Product
      3.9.2      Recording a Change in Volume Label in the Product Database
      3.9.3      Copying a Software Kit to a New Location
      3.9.4      Converting a Software Kit from One Format to Another
      3.9.5      Retrieving Product Information
        3.9.5.1      Displaying Information About Objects
        3.9.5.2      Displaying Information About the Products
    3.10 Removing Installed Software Products and Kits
    3.11 Using the DECwindows Motif Interface
      3.11.1     The POLYCENTER Software Installation Utility Main Window
      3.11.2     Specifying Operations to Perform
      3.11.3     Selecting Products and Product Options
      3.11.4     Performing an Operation
      3.11.5     Customizing the DECwindows Motif Interface

  4      Starting Up and Shutting Down the System
    4.1 Understanding Booting and System Startup
      4.1.1      Booting and Startup Processes
      4.1.2      Types of Booting Operations
        4.1.2.1      Nonstop Boot:  The Most Common Booting Operation
        4.1.2.2      Conversational Boot:  For Special Booting Functions
      4.1.3      System Startup and STARTUP.COM
      4.1.4      Messages Indicating Booting and Startup Progress
    4.2 Booting with Modified System Parameter Values
      4.2.1      Booting After Showing or Modifying Individual System Parameter Values
      4.2.2      Booting with an Alternate System Parameter File
    4.3 Booting in an Emergency
      4.3.1      Booting with Default System Parameters
      4.3.2      Booting Without Startup and Login Procedures
      4.3.3      Booting Without the User Authorization File
    4.4 Booting with Controlled Startup
      4.4.1      Booting with an Alternate Site-Independent Startup Procedure
      4.4.2      Specifying an Alternate Default Startup Command Procedure
      4.4.3      Booting with Minimum Startup
      4.4.4      Booting While Displaying Startup Procedure Commands
      4.4.5      Displaying Startup Procedure Commands with SYSMAN
    4.5 Solving Booting Problems
    4.6 Writing a New Boot Block on the System Disk
    4.7 Using the Snapshot Facility to Reboot Nonclustered Systems (VAX Only)
      4.7.1      Preparing Your Workstation for a System Image Snapshot (VAX Only)
      4.7.2      Taking the Saved Image Snapshot (VAX Only)
      4.7.3      Problem Solving When Using the Snapshot Facility (VAX Only)
    4.8 Shutting Down the System
      4.8.1      Performing an Orderly Shutdown with SHUTDOWN.COM
      4.8.2      Understanding the Order of Shutdown Events
      4.8.3      Customizing SHUTDOWN.COM to Perform Site-Specific Operations
        4.8.3.1      Defining Logical Names
        4.8.3.2      Modifying the Site-Specific Shutdown Command Procedure
      4.8.4      Performing an Orderly Shutdown with the System Management Utility (SYSMAN)
      4.8.5      Performing an Emergency Shutdown with the OPCCRASH.EXE Program
      4.8.6      Performing an Emergency Shutdown Using Console Commands

  5      Customizing the Operating System
    5.1 Adding and Deleting Optional Files
    5.2 Modifying Site-Specific Startup Command Procedures
      5.2.1      Understanding Site-Specific Startup Command Procedures
      5.2.2      Understanding the Order of Startup Events
      5.2.3      Modifying SYPAGSWPFILES.COM to Install Page and Swap Files
      5.2.4      Modifying SYCONFIG.COM to Configure Devices
        5.2.4.1      Connecting Nonstandard Devices
        5.2.4.2      Suppressing Autoconfiguration of Devices
      5.2.5      Modifying SYLOGICALS.COM to Define Systemwide Logical Names
      5.2.6      Modifying SYSECURITY.COM to Set Up Security Auditing
      5.2.7      Modifying SYSTARTUP_VMS.COM to Perform General Operations
        5.2.7.1      Mounting Public Disks
        5.2.7.2      Mounting Disks That Must Be Available Early in Startup
        5.2.7.3      Setting Terminal and Printer Characteristics
        5.2.7.4      Starting Queues and Enabling Autostart for Queues
        5.2.7.5      Installing Known Images
        5.2.7.6      Installing Resident Images (Alpha Only)
        5.2.7.7      Setting Up the OpenVMS InfoServer Client Software
        5.2.7.8      Running the System Dump Analyzer
        5.2.7.9      Purging the Operator Log File
        5.2.7.10     Submitting Batch Jobs to Run at Startup Time
        5.2.7.11     Creating Systemwide Announcements
        5.2.7.12     Starting Up and Customizing the LAT Protocol Software
        5.2.7.13     Starting the DECnet for OpenVMS Network
        5.2.7.14     Starting the DIBOL Message Manager
        5.2.7.15     Defining the Number of Interactive Users
    5.3 Modifying Login Command Procedures to Customize User Environments
    5.4 Customizing Startup Databases with the System Management Utility (SYSMAN)
      5.4.1      Understanding Startup Databases
      5.4.2      Understanding the Layered Product Startup Database
      5.4.3      Specifying the Current Startup Database
      5.4.4      Showing the Name of the Target Startup Database
      5.4.5      Showing the Contents of a Startup Database
      5.4.6      Adding Startup Files to a Startup Database
      5.4.7      Changing Information Associated with a Startup File
      5.4.8      Deleting a Record from a Startup Database
      5.4.9      Preventing a Startup File from Executing
      5.4.10     Allowing a Previously Disabled Startup File to Execute
    5.5 Registering Images That Have System Version Dependencies (VAX Only)
      5.5.1      Understanding System Version Dependency and the Image Registry (VAX Only)
      5.5.2      Using the Image Registry Facility (VAX Only)
    5.6 Customizing the Help Message Database
      5.6.1      Accessing $STATUS Values for Uninstalled Messages
      5.6.2      Creating System-Level Database Search Paths
      5.6.3      Deleting Digital-Supplied Messages from the Database
      5.6.4      Adding Comments to Digital-Supplied Messages
      5.6.5      Changing Digital-Supplied Data
      5.6.6      Adding Messages to Digital-Supplied Database Files
    5.7 Customizing MAIL
    5.8 Setting Up Your System to Compensate for Different Time Zones
      5.8.1      Understanding the Time Differential Factor (TDF)
      5.8.2      Determining Your System's Time Differential Factor (TDF)
      5.8.3      Using the UTC$CONFIGURE_TDF.COM Command Procedure
      5.8.4      Setting Your System's TDF Using DAYLIGHT_SAVINGS.COM
      5.8.5      Setting Time in a VMScluster Environment
    5.9 Choosing Languages, and Date and Time Formats
      5.9.1      Specifying Languages Other Than English
      5.9.2      Invoking LIB$DT_STARTUP.COM
      5.9.3      Defining System Default Date and Time Formats
        5.9.3.1      Defining Your Own Format
        5.9.3.2      Using Predefined Formats
      5.9.4      User Definitions of Language, and Date and Time Formats
    5.10 Saving Your Customization

  6      Managing User Accounts
    6.1 Understanding the User Authorization File (UAF)
      6.1.1      Priority
      6.1.2      Limits and Quotas
      6.1.3      Privileges
    6.2 Understanding the Protection of Authorization Files
    6.3 Understanding UAF Login Checks
    6.4 Managing System-Supplied UAF Accounts
      6.4.1      Understanding System-Supplied UAF Accounts
      6.4.2      Creating Accounts on Alpha Systems (Alpha Only)
        6.4.2.1      Creating Field Service Accounts (Alpha Only)
        6.4.2.2      Creating SYSTEST and SYSTEST_CLIG Accounts (Alpha Only)
      6.4.3      Maintaining System-Supplied Accounts (VAX Only)
      6.4.4      Using the SYSTEM Account
      6.4.5      Using AUTHORIZE to Maintain UAF Accounts
    6.5 Preparing to Add User Accounts
      6.5.1      Choosing an Account Type
      6.5.2      Performing Additional Tasks
        6.5.2.1      Selecting a User Name and Password
        6.5.2.2      Assigning the User Identification Code (UIC)
        6.5.2.3      Adding a Disk Quota Entry
        6.5.2.4      Setting the User Default Device for an Interactive Account
        6.5.2.5      Setting the User Default Device for a Captive Account
      6.5.3      Understanding Account Security
    6.6 Adding User Accounts
      6.6.1      Adding a User Account with AUTHORIZE
      6.6.2      Adding a User Account with a Command Procedure
    6.7 Maintaining User Accounts
      6.7.1      Using Command Procedures for Interactive Accounts
      6.7.2      Modifying a User Account
      6.7.3      Listing User Accounts
      6.7.4      Maintaining the User Environment
      6.7.5      Deleting a User Account
      6.7.6      Using BACKUP to Remove User Files
      6.7.7      Disabling a User Account
    6.8 Restricting the Use of Accounts
      6.8.1      Setting Day Types
      6.8.2      Restricting Logins to Specific Times
      6.8.3      Restricting Login Functions
      6.8.4      Using Login Command Procedures for Restricted or Captive Accounts
      6.8.5      Setting Priorities for User Processes
    6.9 Setting Up Special Accounts
      6.9.1      Setting Up an Automatic Login Account with SYSMAN
      6.9.2      Setting Up a Project Account with ACL Identifiers
      6.9.3      Understanding Network Proxy Accounts
      6.9.4      Creating Network Proxy Authorization Files
      6.9.5      Adding Proxy Accounts
      6.9.6      Removing Proxy Accounts
      6.9.7      Displaying Proxy Accounts
      6.9.8      Controlling Proxy Logins
    6.10 Managing MAIL
      6.10.1     Modifying a User Record
      6.10.2     Removing a User Record
      6.10.3     AUTHORIZE Flags and MAIL
    6.11 Managing System Resources
      6.11.1     Understanding Pages and Pagelets
      6.11.2     Setting Limits on System Resources

  7      Managing Peripheral Devices
    7.1 Understanding Device Names
    7.2 Getting Information About Devices on the System
      7.2.1      Determining If Volumes Need Rebuilding
      7.2.2      Getting Information About ISO 9660-Formatted Devices
    7.3 Setting Security Protection Characteristics on Devices
    7.4 Connecting Devices and Loading Device Drivers
      7.4.1      Manually Connecting Devices and Loading Device Drivers (VAX Only)
      7.4.2      Manually Connecting Devices and Loading Device Drivers (Alpha Only)
      7.4.3      Suppressing Autoconfiguration of Devices
    7.5 Managing Terminals
      7.5.1      Setting Terminal Characteristics
        7.5.1.1      Setting Default Characteristics with System Parameters
        7.5.1.2      Setting Characteristics in System Startup
      7.5.2      Managing Virtual Terminals
        7.5.2.1      Using Virtual Terminals for Dynamic Asynchronous DECnet for OpenVMS (VAX Only)
        7.5.2.2      Determining the Physical Terminal Type of a Virtual Terminal
    7.6 Managing Printers
      7.6.1      Setting Printer Characteristics
      7.6.2      Using Spooled Printers
        7.6.2.1      Spooling Printers
        7.6.2.2      Despooling a Spooled Printer
        7.6.2.3      Testing a Spooled Printer
    7.7 Managing Tape Drives
      7.7.1      Getting Magnetic Tape Device Information
      7.7.2      Modifying Magnetic Tape Device Characteristics
    7.8 Managing a Card Reader (VAX Only)
      7.8.1      Distinguishing the Type of Card Deck (VAX Only)
        7.8.1.1      Batch Job Card Deck (VAX Only)
        7.8.1.2      Data Card Deck (VAX Only)
        7.8.1.3      Setting Card Reader Translation Modes (VAX Only)
      7.8.2      Running the Input Symbiont Interactively (VAX Only)

  8      Managing Storage Media
    8.1 Understanding Storage Media Concepts
      8.1.1      Disk Concepts
        8.1.1.1      Disk Terminology
        8.1.1.2      Disk File Structures
        8.1.1.3      CD-ROM File Structures
      8.1.2      Tape Concepts
      8.1.3      Public and Private Disk Volumes
        8.1.3.1      Public Disk Volumes
        8.1.3.2      Private Disk Volumes
    8.2 Allocating and Deallocating Drives
      8.2.1      Allocating Drives
      8.2.2      Deallocating Drives
    8.3 Initializing Volumes
      8.3.1      Using INITIALIZE Command Qualifiers
      8.3.2      Assisting Users in Accessing and Initializing Volumes
    8.4 Protecting Volumes
      8.4.1      Protecting Disk Volumes
        8.4.1.1      Specifying Protection When You Initialize Disk Volumes
        8.4.1.2      Changing Protection After Disk Volumes Are Mounted
        8.4.1.3      Displaying UIC- and ACL-Based Protection
      8.4.2      Protecting Tape Volumes
        8.4.2.1      Using the /PROTECTION Qualifier with Tape Volumes
        8.4.2.2      Protecting Tape Volumes for Interchange Environments
      8.4.3      Auditing Volume Access
    8.5 Mounting Volumes
      8.5.1      Using MOUNT Command Qualifiers When You Mount Disks
      8.5.2      Using MOUNT Command Qualifiers When You Mount Tapes
      8.5.3      Assisting Users in Mounting Volumes
      8.5.4      Mounting a Volume with Protected Subsystems
      8.5.5      Modifying Disk Volume Characteristics
      8.5.6      Speeding Up Disk Mounting
    8.6 Setting Up Disk Volume Sets
      8.6.1      Understanding Disk Volume Sets
        8.6.1.1      Guidelines for Creating Disk Volume Sets
        8.6.1.2      Using the /BIND Qualifier
      8.6.2      Creating a Disk Volume Set from New Volumes
      8.6.3      Creating a Disk Volume Set from an Existing Volume
      8.6.4      Adding Volumes to an Existing Disk Volume Set
    8.7 Mounting ISO 9660 Volume Sets and Groups
      8.7.1      Mounting ISO 9660 Volume Sets
      8.7.2      Mounting ISO 9660 Volume Groups
      8.7.3      Handling Partially Mounted ISO 9660 Volume Sets
      8.7.4      Handling ISO 9660 Restrictions
    8.8 Mounting Tape Volume Sets
      8.8.1      Creating a Tape Volume Set
      8.8.2      Mounting Continuation Volumes in a Tape Volume Set
        8.8.2.1      Creating Labels
        8.8.2.2      Enabling Automatic Volume Switching
        8.8.2.3      Disabling Automatic Switching
        8.8.2.4      Sending Messages Back to Users
      8.8.3      Modifying Magnetic Tape Characteristics
    8.9 Dismounting Volumes and Volume Sets
      8.9.1      Dismounting a Single Volume
        8.9.1.1      Dismounting Before Unloading a Volume
        8.9.1.2      Dismounting Allocated Devices
        8.9.1.3      Using DISMOUNT Command Qualifiers
      8.9.2      Dismounting a Volume Set
      8.9.3      Dismounting Foreign Volumes
      8.9.4      Dismounting a Volume in a VMScluster System
    8.10 Using Command Procedures for Media Setup
      8.10.1     Sample Command Procedure for Setting Up Disk Volumes
      8.10.2     Sample Command Procedure for Setting Up Tape Volumes
    8.11 Managing Disk Space
      8.11.1     Understanding Disk Quotas
      8.11.2     Establishing Disk Quotas
        8.11.2.1     Creating a Quota File
        8.11.2.2     Monitoring Disk Quotas
        8.11.2.3     Suspending Quota Operations
      8.11.3     Purging Files
      8.11.4     Setting Version Limits on Files
      8.11.5     Setting File Expiration Dates
    8.12 Using the Analyze/Disk_Structure Utility to Check and Repair Disks
      8.12.1     Reporting Errors
      8.12.2     Reporting and Repairing Errors
      8.12.3     Recovering Lost Files
      8.12.4     Erasing Old Home Blocks
      8.12.5     Creating a Disk Usage File
    8.13 Using Mount Verification for Recovery
      8.13.1     Understanding Mount Verification
      8.13.2     Using Mount Verification
        8.13.2.1     Enabling Mount Verification
        8.13.2.2     Controlling Timeout Periods for Mount Verification
        8.13.2.3     Recovering from Offline Errors
        8.13.2.4     Recovering from Write-Lock Errors
        8.13.2.5     Canceling Mount Verification
    8.14 Using the Bad Block Locator Utility to Detect Media Errors

  9      Using Files and Directories
    9.1 Using DCL Commands with Files
    9.2 Getting File Information
    9.3 Protecting Files
      9.3.1      Understanding File Protection Concepts
      9.3.2      Displaying File Ownership and Protection
      9.3.3      Protecting Disk Files
        9.3.3.1      Setting Default Disk File Protection
        9.3.3.2      Setting Explicit Disk File Protection
        9.3.3.3      Modifying Disk File Protection Characteristics
          9.3.3.3.1       Changing File Protection Characteristics
          9.3.3.3.2       Using the SET FILE Command
      9.3.4      Protecting Disk Directories
        9.3.4.1      Changing Directory UIC Protection Characteristics
        9.3.4.2      Changing Default ACL Protection
      9.3.5      Protecting Magnetic Tape Files
    9.4 Accessing Disk Files
    9.5 Accessing Tape Files
      9.5.1      Understanding Tape File Names
      9.5.2      Locating Standard-Labeled Tape Files
      9.5.3      Using Wildcard Characters with Tape Volumes
      9.5.4      Reading Files on Tape Volumes
      9.5.5      Writing Files to Tape Volumes
        9.5.5.1      Writing New Files That Overwrite Existing Files
        9.5.5.2      Appending or Updating Files
    9.6 Copying and Transferring Files
      9.6.1      Copying Files to Disk Volumes
      9.6.2      Copying Files to Tape Volumes
      9.6.3      Continuing to Copy at the End of a Tape
      9.6.4      Using the Exchange Utility (EXCHANGE)
      9.6.5      Using the EXCHANGE/NETWORK Command

  10     Using BACKUP
    10.1 Overview of BACKUP Tasks
    10.2 Understanding Types of Backups
    10.3 Formulating a Backup Strategy
    10.4 Understanding the Backup Interfaces
      10.4.1     The BACKUP Command Line
      10.4.2     The Backup Manager
        10.4.2.1     Backup Manager Features
        10.4.2.2     Getting Started with Backup Manager
    10.5 Understanding Save Sets
      10.5.1     Magnetic-Tape Save Sets
      10.5.2     Files-11 Disk Save Sets
      10.5.3     Network Save Sets
      10.5.4     Sequential-Disk Save Sets
    10.6 Understanding BACKUP File Formats
    10.7 Setting Process Quotas for Efficient Backups
    10.8 Using Disks and Tapes
      10.8.1     Understanding Volume Initialization
        10.8.1.1     When to Initialize Volumes
        10.8.1.2     Initializing Tapes
        10.8.1.3     Initializing Disks
      10.8.2     Mounting a Volume
      10.8.3     Dismounting a Volume
    10.9 Understanding OPCOM and Volumes
      10.9.1     Requesting Operator Assistance
    10.10 Listing the Contents of a BACKUP Save Set
    10.11 Understanding Multivolume BACKUP Operations
      10.11.1    Multivolume Tape Labeling
    10.12 Understanding BACKUP Tape Label Processing
    10.13 Backing Up Files and Directories
      10.13.1    Copying Files to Other Files
      10.13.2    Backing Up Files and Directories to a Save Set
      10.13.3    Comparing Files
      10.13.4    Creating and Listing BACKUP Journal Files
    10.14 Restoring Files and Directories
      10.14.1    Accessing Files in Deep Directory Structures
    10.15 Backing Up User Disks
      10.15.1    Preparing to Back Up User Disks
      10.15.2    Performing Image Backups to Tape
      10.15.3    Performing Image Backups to Disk
      10.15.4    Performing Incremental Backups to Tape
      10.15.5    Performing Incremental Backups to Disk
      10.15.6    Backing Up Your Workstation Disk
        10.15.6.1    Using a Command Procedure for Nightly Image Backups
        10.15.6.2    Using a Command Procedure for Nightly Incremental Backups
        10.15.6.3    Using an Interactive Command Procedure for Backups
      10.15.7    Backing Up Volume Shadow Sets
        10.15.7.1    Mounting a Disk in a Host-Based Shadow Set
        10.15.7.2    Assisted Merging in Mixed-Architecture Clusters
    10.16 Restoring User Disks
      10.16.1    Restoring Image Backups
      10.16.2    Restoring Incremental Backups
        10.16.2.1    Restoring to Target Disk Structures
      10.16.3    Restoring Volume Shadow Sets
    10.17 Backing Up and Restoring the System Disk
      10.17.1    Starting the Menu-Driven Procedure
        10.17.1.1    How to Perform This Task
        10.17.1.2    Example
      10.17.2    Understanding Standalone BACKUP (VAX Only)
        10.17.2.1    Building Standalone BACKUP on a Disk (VAX Only)
        10.17.2.2    Booting Standalone BACKUP from a Disk (VAX Only)
        10.17.2.3    Building Standalone BACKUP on a Tape Cartridge (VAX Only)
        10.17.2.4    Booting Standalone BACKUP from a Tape Cartridge (VAX Only)
      10.17.3    Backing Up the System Disk to Tape
      10.17.4    Restoring the System Disk from Tape
      10.17.5    Backing Up the System Disk to a Disk
      10.17.6    Using InfoServer Tapes to Back Up and Restore System Disks
    10.18 Ensuring Data Integrity
      10.18.1    /CRC Qualifier
      10.18.2    /GROUP_SIZE Qualifier
      10.18.3    /IGNORE Qualifier
      10.18.4    /LOG Qualifier
      10.18.5    /VERIFY Qualifier
    10.19 Troubleshooting
      10.19.1    BACKUP Fatal Error Options
      10.19.2    Tape Label Errors

  11     Security Considerations
    11.1 Understanding Security Management
    11.2 Managing Passwords
      11.2.1     Initial Passwords
      11.2.2     System Passwords
      11.2.3     Primary and Secondary Passwords
      11.2.4     Enforcing Minimum Password Standards
      11.2.5     Guidelines for Protecting Passwords
      11.2.6     Password History
    11.3 Using Intrusion Detection Mechanisms
    11.4 Understanding Ways to Protect Objects
      11.4.1     Interpreting a User Identification Code
      11.4.2     Understanding Protection Codes
    11.5 Creating Access Control Lists (ACLs)
      11.5.1     Kinds of Entries in an ACL
      11.5.2     Types of Identifiers
    11.6 Assigning ACLs
    11.7 Using the ACL Editor
      11.7.1     Adding an Identifier ACE
      11.7.2     Setting a Default Protection Code
      11.7.3     Generating Security Alarms and Audits
    11.8 Auditing Security-Relevant Events
      11.8.1     Enabling Classes of Security Alarms
    11.9 Analyzing Audit Log Files

  12     Managing the Queue Manager and Queue Database
    12.1 Understanding the Queue Manager
      12.1.1     Queue Manager Failover
      12.1.2     Multiple Queue Managers
    12.2 Understanding the Queue Database
    12.3 Specifying the Location of Queue Database Files
      12.3.1     Master File
      12.3.2     Queue and Journal Files
    12.4 Starting the Queue Manager and Creating the Queue Database
    12.5 Customizing Queue Manager Failover
    12.6 Stopping the Queue Manager
    12.7 Restarting the Queue Manager
    12.8 Creating an Additional Queue Manager
    12.9 Displaying Information About the Queue Manager
    12.10 Saving the Queue Database
    12.11 Restoring the Queue Database
    12.12 Maximizing Queue System Performance
    12.13 Solving Queue Manager Problems
      12.13.1    Avoiding Common Problems:  A Troubleshooting Checklist
      12.13.2    If the Queue Manager Does Not Start
        12.13.2.1    Investigating the Problem
      12.13.3    If the Queuing System Stops or the Queue Manager Does Not Run on Certain Nodes
        12.13.3.1    Investigating the Problem
        12.13.3.2    Cause
        12.13.3.3    Correcting the Problem
      12.13.4    If the Queue Manager Becomes Unavailable
        12.13.4.1    Correcting the Problem
      12.13.5    If the Queuing System Does Not Work on a Certain VMScluster Node
        12.13.5.1    Investigating the Problem
        12.13.5.2    Cause
        12.13.5.3    Correcting the Problem
      12.13.6    If You See Inconsistent Queuing Behavior on Different VMScluster Nodes
        12.13.6.1    Investigating the Problem
        12.13.6.2    Cause
        12.13.6.3    Correcting the Problem
    12.14 Reporting a Queuing System Problem to Digital

  13     Managing Batch and Print Queues
    13.1 Managing Queues on Small Systems
    13.2 Understanding the Queuing Process
    13.3 Understanding Types of Queues
      13.3.1     Batch Execution Queues
      13.3.2     Output Execution Queues
      13.3.3     Generic Batch Queues
      13.3.4     Generic Output Queues
        13.3.4.1     Logical Queues
    13.4 Understanding the Autostart Feature
    13.5 Designing Your Batch Queue Environment
      13.5.1     Simple Batch Queue Configuration:  For Limited Batch Needs
      13.5.2     Specialized Batch Queues:  Meeting Special Needs
      13.5.3     Generic Batch Queues in a VMScluster:  Distributing the Work Load
    13.6 Designing Your Output Queue Environment
      13.6.1     Simple Output Queue Configuration:  For Limited Printing Needs
      13.6.2     Mixed Printers:  Specialized Output Execution Queues
      13.6.3     PostScript Printing
      13.6.4     LAT Printers:  Sharing Printers Among Multiple Systems
      13.6.5     Generic Output Queues:  Distributing the Work Load
      13.6.6     VMScluster Queues:  Sharing Devices in a Cluster
      13.6.7     Spooled Printers:  Printing from Applications
      13.6.8     Distributed Printing
    13.7 Setting Up and Starting Queues
      13.7.1     Setting Up Output Devices
      13.7.2     Creating and Starting Queues
        13.7.2.1     Autostart Execution Queues
        13.7.2.2     Nonautostart Execution Queues
        13.7.2.3     Generic Queues
      13.7.3     Creating a Command Procedure to Restart Execution Queues on Reboot
    13.8 Using Queue Options
      13.8.1     Controlling Access to Queues
        13.8.1.1     Understanding UIC-Based Queue Protection
        13.8.1.2     Setting and Showing UIC-Based Queue Protection
        13.8.1.3     Understanding ACL-Based Queue Protection
        13.8.1.4     Setting and Showing ACL-Based Queue Protection
        13.8.1.5     Understanding How Privileges Affect Queues
      13.8.2     Understanding Job Retention Options
      13.8.3     Understanding Queue Characteristics
      13.8.4     Specifying Queue Characteristics Options
      13.8.5     Specifying Batch-Processing Options
        13.8.5.1     Base Process Priority
        13.8.5.2     Job Limit
        13.8.5.3     Working Set Default, Quota, and Extent
        13.8.5.4     CPU Default and Maximum
        13.8.5.5     Swapping
        13.8.5.6     Setting Up Batch Queues on Memory-Constrained Systems
        13.8.5.7     Optimizing Batch Queues for the Sort/Merge Utility
      13.8.6     Specifying Job Scheduling Options
      13.8.7     Understanding Banner Pages
        13.8.7.1     Flag and Burst Pages
        13.8.7.2     Trailer Pages
      13.8.8     Specifying Banner Page Options
      13.8.9     Understanding Forms
      13.8.10    Specifying Forms Options
      13.8.11    Specifying Options for Controlling Page and Line Overflow
        13.8.11.1    Controlling Line Overflow with Forms
        13.8.11.2    Controlling Page Overflow with the Form-Feed Character
      13.8.12    Understanding Device Control Libraries
      13.8.13    Specifying Device Control Library Options
      13.8.14    Understanding the Order of Device Control Module Output
    13.9 Maintaining the Queues
      13.9.1     Managing Queues
        13.9.1.1     Initializing Queues
        13.9.1.2     Starting Nonautostart Queues
        13.9.1.3     Enabling Autostart on a Node to Start Autostart Queues
        13.9.1.4     Activating an Autostart Queue
        13.9.1.5     Monitoring Queue Information
        13.9.1.6     Modifying a Queue
        13.9.1.7     Pausing a Queue
        13.9.1.8     Closing a Queue
        13.9.1.9     Stopping a Queue
        13.9.1.10    Preventing Autostart Queues from Starting
        13.9.1.11    Disabling Autostart on a Node
        13.9.1.12    Stopping All Queues on a Node
        13.9.1.13    Stopping Queues Before Shutting Down a System
        13.9.1.14    Assigning a Logical Queue
        13.9.1.15    Moving All Jobs from One Queue to Another
        13.9.1.16    Deleting a Queue
      13.9.2     Managing Characteristics
        13.9.2.1     Defining Characteristics
        13.9.2.2     Displaying Characteristics Defined on a System
        13.9.2.3     Assigning Characteristics to a Queue
        13.9.2.4     Displaying Characteristics Assigned to a Queue
        13.9.2.5     Canceling Characteristics Assigned to a Queue
        13.9.2.6     Deleting Characteristics
      13.9.3     Managing Banner Pages
      13.9.4     Managing Forms
        13.9.4.1     Defining a Form
        13.9.4.2     Displaying Forms Defined on a System
        13.9.4.3     Changing the Systemwide Default Form
        13.9.4.4     Assigning a Default Form for a Queue
        13.9.4.5     Mounting a Form on a Queue
        13.9.4.6     Displaying the Form Assigned to a Queue
        13.9.4.7     Deleting a Form
      13.9.5     Managing Device Control Libraries
        13.9.5.1     Creating a Device Control Library and Inserting Modules
        13.9.5.2     Assigning a Library to a Queue
        13.9.5.3     Creating Forms for Setup and Page Setup Modules
        13.9.5.4     Assigning a Reset Module to a Queue
      13.9.6     Managing Jobs
        13.9.6.1     Monitoring Jobs
        13.9.6.2     Modifying Job Processing Options
        13.9.6.3     Holding and Releasing a Job
        13.9.6.4     Changing the Scheduling Priority of a Job
        13.9.6.5     Requeuing an Executing Job
        13.9.6.6     Requeuing a Pending Job
        13.9.6.7     Retaining Jobs in a Queue
        13.9.6.8     Deleting a Job
        13.9.6.9     Pausing an Output Queue to Control Print Job Position and Alignment
          13.9.6.9.1      Specifying the Position of Print
          13.9.6.9.2      Aligning Print Forms
    13.10 Solving Queue Problems
      13.10.1    Determining the Cause of General Printer Problems
      13.10.2    Making Pending Jobs Eligible for Scheduling
        13.10.2.1    Fixing Print Jobs That Are Pending Due to Stock Mismatch
        13.10.2.2    Fixing Jobs That Are Pending Because of Characteristics Mismatch
      13.10.3    Fixing a Stalled Output Queue
      13.10.4    Determining Why an Autostart Queue Will Not Start
      13.10.5    Solving Problems Deleting a Queue, Form, or Characteristic
      13.10.6    Adding or Deleting a Device Control Library Module
      13.10.7    Fixing a Disabled Queue
      13.10.8    Reporting Queue Problems to Digital

  14     Managing System Parameters
    14.1 Understanding System Parameters
      14.1.1     Default, Current, and Active Values
      14.1.2     Pages and Pagelets
    14.2 Recommended Method for Changing Parameter Values
    14.3 Converting Your Customized Parameter Settings for Use with AUTOGEN
    14.4 Understanding the AUTOGEN Command Procedure
      14.4.1     AUTOGEN Feedback
      14.4.2     Feedback Report (AGEN$PARAMS.REPORT)
      14.4.3     AUTOGEN Phases
      14.4.4     AUTOGEN Parameter File (MODPARAMS.DAT)
    14.5 Modifying System Parameters with AUTOGEN
      14.5.1     Controlling AUTOGEN's Parameter Settings with MODPARAMS.DAT
        14.5.1.1     Increasing a Value with the ADD_ Prefix
        14.5.1.2     Specifying a Minimum Value with the MIN_ Prefix
        14.5.1.3     Specifying a Maximum Value with the MAX_ Prefix
        14.5.1.4     Specifying an Absolute Value
        14.5.1.5     Defining the Number of VAXcluster Nodes (VAX Only)
        14.5.1.6     Defining the Number of Ethernet Adapters (VAX Only)
        14.5.1.7     Presetting Parameter Values Before Adding Memory (VAX Only)
        14.5.1.8     Overriding Parameters Related to DECnet
      14.5.2     Specifying a Minimum Required Age for Feedback (VAX Only)
      14.5.3     Including an External Parameter File in MODPARAMS.DAT
    14.6 Automating AUTOGEN Reports
      14.6.1     Changing Parameter Values After Reviewing AUTOGEN Reports
    14.7 Managing System Parameters with the System Management Utility (SYSMAN)
      14.7.1     Understanding Parameter Values and SYSMAN
      14.7.2     Showing Parameter Values with SYSMAN
      14.7.3     Modifying a Parameter File with SYSMAN
      14.7.4     Modifying Active Values with SYSMAN
    14.8 Managing System Parameters with the System Generation Utility (SYSGEN)
      14.8.1     Understanding Parameter Values and SYSGEN
      14.8.2     Showing Parameter Values with SYSGEN
      14.8.3     Modifying the System Parameter File with SYSGEN
      14.8.4     Modifying Active Values with SYSGEN
      14.8.5     Creating a New Parameter File with SYSGEN
    14.9 Modifying System Parameters with a Conversational Boot

  15     Managing System Page, Swap, and Dump Files
    15.1 Understanding the System Dump File
    15.2 Understanding Page and Swap Files
    15.3 Displaying Information About Page and Swap Files
    15.4 Manually Calculating Appropriate Sizes for Dump, Page, and Swap Files
      15.4.1     Calculating System Dump File Size
      15.4.2     Calculating Page File Size
      15.4.3     Calculating Swap File Size
    15.5 Minimizing Dump File Size When Disk Space Is Insufficient
    15.6 Using SDA to Analyze the Contents of a Crash Dump
    15.7 Using SDA CLUE Commands to Analyze Crash Dump Files (Alpha Only)
      15.7.1     Understanding CLUE (Alpha Only)
      15.7.2     Displaying Data Using SDA CLUE Commands (Alpha Only)
    15.8 Using CLUE to Obtain Historical Information About Crash Dumps (VAX Only)
      15.8.1     Understanding CLUE (VAX Only)
      15.8.2     Displaying Data Using CLUE (VAX Only)
    15.9 Copying Dump Files to Tape or Disk
    15.10 Dump File Off the System Disk (VAX Systems Only)
      15.10.1    Requirements
    15.11 Saving the Contents of the System Dump File After a System Failure
    15.12 Freeing Dump Information from the Page File
    15.13 Creating Page and Swap Files
      15.13.1    Using AUTOGEN (Recommended Method)
      15.13.2    Using SYSGEN
    15.14 Installing Page and Swap Files
      15.14.1    Installing Interactively
      15.14.2    Installing in SYPAGSWPFILES.COM
    15.15 Removing Page, Swap, and Dump Files
    15.16 Changing Page, Swap, and Dump File Sizes
      15.16.1    Using AUTOGEN (Recommended Method)
        15.16.1.1    Controlling the Size of Page, Swap, and Dump Files in MODPARAMS.DAT
      15.16.2    Using SWAPFILES.COM
      15.16.3    Using SYSGEN

  16     Performance Considerations
    16.1 Understanding Performance Management
    16.2 Knowing Your Work Load
    16.3 Choosing a Workload Management Strategy
    16.4 Distributing the Work Load
    16.5 Understanding System Tuning
    16.6 Predicting When Tuning Is Required
    16.7 Evaluating Tuning Success
    16.8 Choosing Performance Options
    16.9 Using INSTALL to Install Known Images
      16.9.1     Understanding Images and Known Images
      16.9.2     Understanding Known File Lists
      16.9.3     Understanding Attributes You Can Assign to Known Images
      16.9.4     Installing Images to Conserve Memory
      16.9.5     Installing Images to Improve Image Performance
      16.9.6     Installing Resident Images to Improve Performance (Alpha Only)
      16.9.7     Installing Images to Enhance Privileges of Images
        16.9.7.1     Privileged Executable Images
        16.9.7.2     Privileged Shareable Images
      16.9.8     Installing Images to Allow Execution of Images Without Read Access
      16.9.9     Determining Which Images to Install
      16.9.10    Specifying File Names in INSTALL
      16.9.11    Installing Images with INSTALL
      16.9.12    Displaying Known Images with INSTALL
      16.9.13    Defining Logical Names for Shareable Image Files
      16.9.14    Removing Known Images

  17     Testing the System with UETP
    17.1 Overview
      17.1.1     Understanding UETP
      17.1.2     Summary of How to Use UETP
    17.2 Preparing to Use UETP
      17.2.1     Logging In
      17.2.2     Using the SYSTEST Directories
    17.3 Setting Up the Devices to Be Tested
      17.3.1     Check Your Devices
      17.3.2     System Disk Space Required
      17.3.3     How UETP Works on Disks
      17.3.4     Prepare Disk Drives
      17.3.5     Magnetic Tape Drives
      17.3.6     Tape Cartridge Drives
      17.3.7     Compact Disc Drives
      17.3.8     Optical Disk Drives
      17.3.9     Terminals and Line Printers
      17.3.10    Ethernet Adapters
      17.3.11    DR11-W Data Interface (VAX Only)
      17.3.12    DRV11-WA Data Interface (VAX Only)
      17.3.13    DR750 or DR780 (DR32 Interface) (VAX Only)
      17.3.14    Second LPA11-K Device
      17.3.15    Devices That Are Not Tested
      17.3.16    VMScluster Testing
      17.3.17    Testing a Small-Disk System
      17.3.18    DECnet for OpenVMS Phase
      17.3.19    Vector Processors and the VVIEF (VAX Only)
    17.4 Starting UETP
      17.4.1     Running a Subset of Phases
      17.4.2     Single Run Versus Multiple Passes
      17.4.3     Defining User Load for Load Test
      17.4.4     Report Formats
        17.4.4.1     Long Report Format
        17.4.4.2     Short Report Format
    17.5 Stopping a UETP Operation
      17.5.1     Using Ctrl/Y
      17.5.2     Using DCL Commands
      17.5.3     Using Ctrl/C
    17.6 Troubleshooting:  An Overview
      17.6.1     Error Logging and Diagnostics
      17.6.2     Interpreting UETP Output
      17.6.3     Displaying Information on Your Screen
      17.6.4     Example Screen Display (VAX Only)
      17.6.5     Example Screen Display (Alpha Only)
      17.6.6     Defining a Remote Node for UETP Ethernet Testing
      17.6.7     Log Files
    17.7 Troubleshooting:  Possible UETP Errors
      17.7.1     Summary of Common Failures
      17.7.2     Wrong Quotas, Privileges, or Account
      17.7.3     UETINIT01 Failure
      17.7.4     UETVECTOR Failure (VAX Only)
      17.7.5     Device Allocated or in Use by Another Application
      17.7.6     Insufficient Disk Space
      17.7.7     Incorrect Setup of a VMScluster System
      17.7.8     Problems During the Load Test
      17.7.9     DECnet for OpenVMS Error
      17.7.10    Errors Logged but Not Displayed
      17.7.11    No PCB or Swap Slots
      17.7.12    No Keyboard Response or System Disk Activity
      17.7.13    Lack of Default Access for the FAL Object
      17.7.14    Bugchecks and Machine Checks
    17.8 UETP Tests and Phases
      17.8.1     Initialization Phase
      17.8.2     Device Test Phase
        17.8.2.1     How the Device Phase Works
        17.8.2.2     Running a Single Device Test
        17.8.2.3     Format of UETINIDEV.DAT
        17.8.2.4     Running a Test in Loop Mode
        17.8.2.5     Functions of Individual Device Tests
      17.8.3     System Load Test Phase
      17.8.4     DECnet for OpenVMS Test Phase
        17.8.4.1     Environment
        17.8.4.2     How the DECnet Phase Works
      17.8.5     Cluster-Integration Test Phase

  18     Getting Information About the System
    18.1 Understanding System Log Files
    18.2 Understanding Error Logging
    18.3 Using the Error Formatter (ERRFMT)
      18.3.1     Restarting the ERRFMT Process
      18.3.2     Maintaining Error Log Files
      18.3.3     Using ERRFMT to Send Mail
        18.3.3.1     Enabling and Disabling ERRFMT to Send Mail
        18.3.3.2     Sending Mail to Another User
    18.4 Using the Error Log Utility (ERROR LOG)
      18.4.1     Understanding the Error Log Utility (ERROR LOG)
      18.4.2     Producing Error Log Reports
      18.4.3     Producing a Full Error Log Report
      18.4.4     Using Other Error Log Report Options
    18.5 Using the DECevent Event Management Utility (DECevent) (Alpha Only)
      18.5.1     Understanding DECevent (Alpha Only)
      18.5.2     Invoking and Exiting DECevent (Alpha Only)
      18.5.3     Using DECevent Qualifiers (Alpha Only)
      18.5.4     Using Additional DECevent Commands (Alpha Only)
      18.5.5     Producing DECevent Reports (Alpha Only)
        18.5.5.1     Producing a Full Report (Alpha Only)
        18.5.5.2     Producing a Brief Report (Alpha Only)
        18.5.5.3     Producing a Terse Report (Alpha Only)
        18.5.5.4     Producing a Summary Report (Alpha Only)
        18.5.5.5     Producing a Fast Error (FSTERR) Report (Alpha Only)
      18.5.6     DECevent Restrictions
    18.6 Setting Up, Maintaining, and Printing the Operator Log File
      18.6.1     Understanding the Operator Log File
      18.6.2     Understanding OPCOM Messages
        18.6.2.1     Initialization Messages
        18.6.2.2     Device Status Messages
        18.6.2.3     Terminal Enable and Disable Messages
        18.6.2.4     User Request and Operator Reply Messages
        18.6.2.5     Volume Mount and Dismount Messages
        18.6.2.6     System Parameter Messages
        18.6.2.7     Security Alarm Messages
        18.6.2.8     Contents of an Operator Log File
      18.6.3     Setting Up the Operator Log File
        18.6.3.1     Creating a New Version of the Operator Log File
        18.6.3.2     Specifying Logical Names
      18.6.4     Maintaining the Operator Log File
      18.6.5     Printing the Operator Log File
    18.7 Using Security Auditing
      18.7.1     Understanding Security Auditing
        18.7.1.1     Security Audit Log File
        18.7.1.2     Audit Log Files in Mixed-Version Clusters
      18.7.2     Displaying Security Auditing Information
      18.7.3     Delaying Startup of Auditing
      18.7.4     Enabling Security Auditing for Additional Classes
      18.7.5     Disabling Security Auditing
      18.7.6     Enabling a Terminal to Receive Alarm Messages
      18.7.7     Generating Security Reports
      18.7.8     Creating a New Version of the Security Audit Log File
        18.7.8.1     Creating a New Clusterwide Version of the Log File
        18.7.8.2     Creating a New Node-Specific Version of the Log File
    18.8 Monitoring Operating System Performance
      18.8.1     Understanding the Monitor Utility (MONITOR)
        18.8.1.1     MONITOR Classes
        18.8.1.2     Display Data
        18.8.1.3     Output Types
      18.8.2     Invoking the Monitor Utility
      18.8.3     Using Live Display Monitoring
      18.8.4     Using Live Recording Monitoring
      18.8.5     Using Concurrent Display and Recording Monitoring
      18.8.6     Using Playback Monitoring
      18.8.7     Using Remote Playback Monitoring
      18.8.8     Rerecording Monitoring
      18.8.9     Running MONITOR Continuously
        18.8.9.1     Using the MONITOR.COM Procedure
        18.8.9.2     Using the SUBMON.COM Procedure
        18.8.9.3     Using the MONSUM.COM Procedure
      18.8.10    Remote Monitoring in a Mixed-Version VMScluster System

  19     Tracking Resource Use
    19.1 Understanding Accounting Files
    19.2 Determining Which Resources Are Being Tracked
    19.3 Controlling Which Resources Are Tracked
    19.4 Starting Up a New Accounting File
    19.5 Moving the Accounting File
    19.6 Producing Reports of Resource Use
    19.7 Setting Up Accounting Groups
    19.8 Monitoring Disk Space

  20     VMScluster Considerations
    20.1 Understanding VMScluster Systems
      20.1.1     Setting Up a VMScluster Environment
      20.1.2     Clusterwide System Management
    20.2 Using DECamds to Analyze Data
    20.3 Using the Show Cluster Utility (SHOW CLUSTER)
      20.3.1     Understanding the Show Cluster Utility
      20.3.2     Beginning to Use SHOW CLUSTER Commands
        20.3.2.1     Viewing Information That Is Off the Screen
        20.3.2.2     Exiting from a Continuous Display
        20.3.2.3     Using SHOW CLUSTER Qualifiers
      20.3.3     Adding Information to a Report
      20.3.4     Controlling the Display of Data
        20.3.4.1     Entering Commands to Display Data
        20.3.4.2     Removing Broadcast Messages
        20.3.4.3     Refreshing the Screen
      20.3.5     Formatting the Display of Data
        20.3.5.1     Removing Information from a Report
        20.3.5.2     Modifying Field and Screen Size
        20.3.5.3     Moving a Report
        20.3.5.4     Scrolling a Report
      20.3.6     Creating a Startup Initialization File
      20.3.7     Using Command Procedures Containing SHOW CLUSTER Commands
    20.4 Understanding SYSMAN and VMScluster Management
    20.5 Using SYSMAN to Manage Security and System Time
      20.5.1     Modifying the Group Number and Password
      20.5.2     Modifying the System Time
        20.5.2.1     Resetting System Time After January 1
    20.6 Using the SYSMAN DO Command to Manage a VMScluster

  21     Network Considerations
    21.1 Assigning Node Names
      21.1.1     Syntax for Full Names
      21.1.2     Considerations for Assigning Full Names
      21.1.3     Setting Up a Node Name Strategy
    21.2 Understanding DECnet for OpenVMS Networks
      21.2.1     How an OpenVMS System Can Be Part of a Network
      21.2.2     How Nodes Are Connected to the Network
      21.2.3     Connecting Multiple Nodes to a SCSI Bus
      21.2.4     Understanding the Configuration Database
      21.2.5     How Your System Becomes a Node in the Network
    21.3 Preparations for Joining a Network
    21.4 Providing Security for Your Node
    21.5 OpenVMS Support for TCP/IP Networking
      21.5.1     Remote Terminal Service
      21.5.2     Remote File Access
      21.5.3     Remote Directory Listings
    21.6 Managing a Network Node
      21.6.1     Providing Host Services
      21.6.2     Monitoring the Network
        21.6.2.1     Using NCP Display Commands
        21.6.2.2     NCP Counters
        21.6.2.3     Using DECnet Event Logging
        21.6.2.4     Using Other Software Tools
      21.6.3     Testing the Network
      21.6.4     Shutting Down and Restarting the Network

  22     Managing the Local Area Network (LAN) Software
    22.1 Understanding Local Area Networks
      22.1.1     LAN Characteristics
        22.1.1.1     Ethernet LANs
        22.1.1.2     FDDI LANs
        22.1.1.3     Token Ring LANs
      22.1.2     LAN Addresses
    22.2 Managing Local Area Networks
    22.3 Understanding the LANACP LAN Server Process
      22.3.1     Running the LANACP LAN Server Process
      22.3.2     Stopping the LANACP LAN Server Process
    22.4 Understanding the LANCP Utility
      22.4.1     Invoking and Exiting LANCP
      22.4.2     LANCP Commands
      22.4.3     LANCP Miscellaneous Functions
    22.5 Managing LAN Devices
      22.5.1     Displaying System Devices
      22.5.2     Displaying Device Parameters
      22.5.3     Setting Device Parameters
      22.5.4     Updating Device Firmware
    22.6 Managing the LAN Device Databases
      22.6.1     Displaying Devices in the LAN Device Databases
      22.6.2     Entering Devices into the LAN Device Databases
      22.6.3     Deleting Devices from the LAN Device Databases
    22.7 Managing the LAN Node Databases
      22.7.1     Displaying Nodes in the LAN Node Databases
      22.7.2     Entering Nodes into the LAN Node Databases
      22.7.3     Deleting Nodes from the LAN Node Databases
    22.8 Understanding LAN MOP
      22.8.1     Coexistence with DECnet MOP
      22.8.2     Migrating from DECnet MOP to LAN MOP
      22.8.3     Using CLUSTER_CONFIG_LAN.COM and LAN MOP
      22.8.4     Sample Satellite Load
      22.8.5     Cross-Architecture Booting
    22.9 Managing the LAN MOP Downline Load Service
      22.9.1     Enabling MOP Downline Load Service
      22.9.2     Disabling MOP Downline Load Service
      22.9.3     Displaying the Status and Counters Data
      22.9.4     Displaying the Status and Counters Data for Individual Nodes
      22.9.5     Clearing the Counters Data
      22.9.6     OPCOM Messages
      22.9.7     Load Trace Facility
      22.9.8     MOP Console Carrier
      22.9.9     MOP Trigger Boot

  23     Managing InfoServer Systems
    23.1 Understanding InfoServer Functions
      23.1.1     Automatic Service Policies for Multiple Servers
      23.1.2     High-Availability Feature to Reduce Service Interruptions
      23.1.3     Support for X Terminal Clients
    23.2 Understanding LASTport Protocols
      23.2.1     LASTport Transport Protocol
      23.2.2     LASTport/Disk Protocol
      23.2.3     LASTport/Tape Protocol
    23.3 Establishing a Server Management Session
      23.3.1     Server Management Commands
    23.4 Understanding InfoServer Client for OpenVMS Functions
    23.5 Understanding LASTCP Utility Functions
      23.5.1     Invoking and Exiting the LASTCP Utility
      23.5.2     LASTCP Command Summary
      23.5.3     Starting InfoServer Client for OpenVMS Software Automatically
      23.5.4     Startup Restrictions:  PATHWORKS and RSM
      23.5.5     Startup Restrictions:  SYSMAN
      23.5.6     User Account Requirements
      23.5.7     System Parameter MAXBUF Requirement
    23.6 Understanding LADCP Utility Functions
      23.6.1     Invoking and Exiting the LADCP Utility
      23.6.2     LADCP Command Summary
      23.6.3     Making InfoServer Devices Available Automatically

  24     Managing the LAT Software
    24.1 Understanding the LAT Protocol
      24.1.1     How the LAT Protocol Works
      24.1.2     Advantages of the LAT Protocol
    24.2 Understanding the LAT Network
      24.2.1     Service Nodes
        24.2.1.1     Types of Services
        24.2.1.2     Service Announcements
        24.2.1.3     Print Requests
      24.2.2     Terminal Server Nodes
        24.2.2.1     Locating Service Nodes
        24.2.2.2     Setting Up Connections
        24.2.2.3     Servicing Nodes
      24.2.3     Nodes Allowing Outgoing Connections
      24.2.4     Sample LAT Configuration
      24.2.5     LAT Relationship to VMSclusters and DECnet
        24.2.5.1     LAT and DECnet Running on the Same Controller
        24.2.5.2     LAT and DECnet Running on Different Controllers
    24.3 Understanding the LATCP Utility
      24.3.1     Invoking and Exiting LATCP
      24.3.2     LATCP Commands
    24.4 Starting Up the LAT Protocol
    24.5 Customizing LAT Characteristics
      24.5.1     Creating Additional Services
      24.5.2     Setting Up Ports
        24.5.2.1     Setting Up Printers
        24.5.2.2     Setting Up Special Application Services
        24.5.2.3     Setting Up Limited Services
      24.5.3     Queuing Incoming Requests
      24.5.4     Enabling Outgoing LAT Connections
      24.5.5     Sample Edited LAT$SYSTARTUP.COM Procedure
    24.6 Managing the LATACP Database Size

  25     Managing DECdtm Services
    25.1 Understanding Transaction Logs
    25.2 Planning Transaction Logs
      25.2.1     Deciding the Size of a Transaction Log
      25.2.2     Deciding the Location of a Transaction Log
    25.3 Creating Transaction Logs
    25.4 Monitoring Transaction Performance
    25.5 Checking Whether a Transaction Log Is Too Small
    25.6 Changing the Size of a Transaction Log
    25.7 Moving a Transaction Log
    25.8 Dismounting a Disk
    25.9 Adding a Node
    25.10 Removing a Node
    25.11 Disabling DECdtm Services
    25.12 Enabling DECdtm Services
    25.13 Using DECdtm Services in a DECnet/OSI Network
      25.13.1    Understanding the Configuration of a Transaction Group
      25.13.2    Determining SCSNODE Name Uniqueness

  26     Managing Special Processing Environments
    26.1 Understanding Multiprocessing
      26.1.1     Primary and Secondary Processors
      26.1.2     Available and Active Sets
      26.1.3     Processor Capabilities
    26.2 Managing Symmetric Multiprocessing (SMP) Environments
      26.2.1     Creating a Multiprocessing Environment
      26.2.2     Monitoring a Multiprocessing Environment
    26.3 Understanding Vector Processing
      26.3.1     VAX Support for Vector Processing (VAX Only)
      26.3.2     VAX Vector Instruction Emulation Facility (VVIEF) (VAX Only)
    26.4 Managing the Vector Processing Environment (VAX Only)
      26.4.1     Loading the Vector Processing Support Code (VAX Only)
      26.4.2     Configuring a Vector Processing System (VAX Only)
      26.4.3     Managing Vector Processes (VAX Only)
        26.4.3.1     Adjusting System Resources and Process Quotas (VAX Only)
        26.4.3.2     Distributing Scalar and Vector Resources Among Processes (VAX Only)
      26.4.4     Restricting Access to the Vector Processor by Using ACLs (VAX Only)
      26.4.5     Obtaining Information About a Vector Processing System (VAX Only)
        26.4.5.1     DCL Lexical Functions F$GETJPI and F$GETSYI (VAX Only)
        26.4.5.2     SHOW CPU/FULL Command (VAX Only)
        26.4.5.3     SHOW PROCESS and LOGOUT/FULL Commands (VAX Only)
      26.4.6     Loading the VAX Vector Instruction Emulation Facility (VVIEF) (VAX Only)

  A Files-11 Disk Structure
    A.1 Disk Concepts
      A.1.1      Logical Organization of a Disk
      A.1.2      Physical Organization of a Disk
    A.2 Files-11 Structure
      A.2.1      File Identification (FID)
      A.2.2      ODS Directory Hierarchies
    A.3 Reserved Files
      A.3.1      Index File, INDEXF.SYS
        A.3.1.1      Boot Block
        A.3.1.2      Home Block
        A.3.1.3      File Headers
      A.3.2      Storage Bit Map File, BITMAP.SYS
      A.3.3      Bad Block File, BADBLK.SYS
      A.3.4      Master File Directory
      A.3.5      Core Image File, CORIMG.SYS
      A.3.6      Volume Set List File, VOLSET.SYS
      A.3.7      Continuation File, CONTIN.SYS
      A.3.8      Backup Log File, BACKUP.SYS
      A.3.9      Pending Bad Block Log File, BADLOG.SYS
      A.3.10    Quota File, QUOTA.SYS
      A.3.11    Volume Security Profile, SECURITY.SYS
    A.4 Files-11 ODS Level 1 Versus Level 2 (VAX Only)

  B Tables of Time Differential Factors (TDFs)

  Glossary
    access control list (ACL) . . . autostart feature
      autostart queue . . . boot block
      booting . . . configuration database
      connection manager . . . density
      device . . . Error Log Report Formatter (ERF)
      Ethernet . . . file
      file banner page . . . group volume
      header labels . . . incremental backup
      incremental restore . . . LASTport protocol
      LAT protocol . . . local node
      logical block . . . mandatory update
      mass storage control protocol (MSCP) server . . . object
      OPCOM messages . . . PAK
      partition . . . printer queue
      priority . . . queue database
      queue manager . . . scalar
      secondary bootstrap image . . . shared image
      shared resource . . . SYSGEN parameters
      system area . . . target disk
      terminal queue . . . upgrade procedure
      user authorization file (UAF) . . . vector consumer
      vector-present processor . . . write lock