The default security restrictions for all RDFCOM commands are summarized in
Table 8-2
.
RDF State Requirement
Some RDFCOM commands can only be entered after RDF has been started; others must be
entered before the subsystem has been started or after it has been stopped. In each command
description, these constraints are listed under the heading “RDF State Requirement.”
Usage Guidelines
Details about the proper use of a command appear in “Usage Guidelines.” These details include
information about when to apply the command, possible constraints and unexpected effects of
the command, hints on enhancing performance and avoiding errors, and other considerations.
When a command is extremely basic or straightforward, the command description omits the
“Usage Guidelines.”
Table 8-1 Systems for RDFCOM Commands
Other
Objects
Trigger
Network
RDFNET
Volume
Update
Purger
Receiver
RDF
Monitor
Image
Trail
Extractor
P
P
P
P
P
P
P
P
P
P
ADD
E
P
P
P
P
P
P
P
P
ALTER
B
COPYAUDIT
E
P
P
DELETE
E
EXIT
E
FC
E
HELP
E
HISTORY
E
E
E
E
E
E
E
E
E
E
INFO
P
INITIALIZE
E
OBEY
E
OPEN
E
OUT
P
P
P
P
P
P
P
P
P
P
RESET
P
P
P
P
P
P
P
P
P
P
SET
E
E
E
E
E
E
E
E
E
P
SHOW
P
P
START
E**
E
E
E
E
E
E
STATUS
P*
P
E
STOP
Legend
P = Primary
only
B = Backup
only
E = Either
* = SYNCH
** =
RTDWARNING
188
Entering RDFCOM Commands
Содержание NonStop RDF
Страница 68: ...68 ...
Страница 186: ...186 ...
Страница 260: ...260 ...
Страница 278: ...278 ...
Страница 284: ...284 ...
Страница 290: ...290 ...
Страница 308: ...308 ...
Страница 322: ...322 ...
Страница 336: ...336 ...
Страница 348: ...348 ...
Страница 464: ...464 ...
Страница 478: ......