Openvms User's Manual
Total Page:16
File Type:pdf, Size:1020Kb
OpenVMS User’s Manual Order Number: AA–PV5JF–TK June 2002 This manual describes how to use the Compaq OpenVMS operating system. The information contained in this manual is intended for all OpenVMS users and is applicable to all computers running the OpenVMS operating system. Revision/Update Information: This manual supersedes the OpenVMS User’s Manual, Version 7.3. Software Version: OpenVMS Alpha Version 7.3–1 OpenVMS VAX Version 7.3 Compaq Computer Corporation Houston, Texas © 2002 Compaq Computer Corporation Compaq, the Compaq logo, AlphaServer, OpenVMS, POLYCENTER, Tru64, VAX, VMS, and the DIGITAL logo are trademarks of Compaq Information Technologies Group, L.P. in the U.S. and/or other countries. UNIX and X/Open are trademarks of The Open Group in the U.S. and/or other countries. All other product names mentioned herein may be trademarks of their respective companies. Confidential computer software. Valid license from Compaq required for possession, use, or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor’s standard commercial license. Compaq shall not be liable for technical or editorial errors or omissions contained herein. The information in this document is provided "as is" without warranty of any kind and is subject to change without notice. The warranties for Compaq products are set forth in the express limited warranty statements accompanying such products. Nothing herein should be construed as constituting an additional warranty. ZK6489 The Compaq OpenVMS documentation set is available on CD-ROM. Contents Preface ............................................................ xix 1 Getting Started with the OpenVMS Operating System 1.1 Logging In . ................................................ 1–1 1.1.1 Successful Logins . ........................................ 1–2 1.1.2 Login Errors ............................................. 1–3 1.2 Logging In From a PC ........................................ 1–3 1.3 Choosing Passwords for Your Account ............................ 1–3 1.3.1 Obtaining Your Initial Password ............................. 1–4 1.3.2 Changing Your Initial Password ............................. 1–4 1.3.3 Restrictions on Passwords . ................................ 1–4 1.3.4 Types of Passwords ....................................... 1–5 1.3.5 Entering a System Password ................................ 1–5 1.3.6 Entering a Secondary Password .............................. 1–6 1.3.7 Password Requirements for Different Types of Accounts ........... 1–6 1.4 Reading Informational Messages ................................ 1–7 1.4.1 Suppressing Messages ..................................... 1–8 1.4.2 Successful Login Messages . ................................ 1–8 1.5 Types of Logins and Login Classes ............................... 1–8 1.5.1 Interactive Logins ........................................ 1–8 1.5.2 Noninteractive Logins ..................................... 1–9 1.6 Login Failures .............................................. 1–9 1.6.1 Terminals That Require System Passwords ..................... 1–10 1.6.2 Login Class Restrictions .................................... 1–10 1.6.3 Shift Restrictions . ........................................ 1–10 1.6.4 Batch Jobs During Shift Restrictions . ....................... 1–10 1.6.5 Failures During Dialup Logins .............................. 1–11 1.6.6 Break-In Evasion Procedures ................................ 1–11 1.7 Changing Passwords . ........................................ 1–11 1.7.1 Selecting Your Own Password ............................... 1–12 1.7.2 Using Generated Passwords . ................................ 1–12 1.7.3 Generated Passwords: Disadvantages . ....................... 1–13 1.7.4 Changing a Secondary Password ............................. 1–13 1.7.5 Changing Passwords at Login ............................... 1–14 1.8 Password and Account Expiration Times . ....................... 1–14 1.8.1 Expired Passwords ........................................ 1–14 1.8.2 Using Secondary Passwords . ................................ 1–14 1.8.3 Failure to Change Passwords ................................ 1–15 1.8.4 Expired Accounts . ........................................ 1–15 1.9 Guidelines for Protecting Your Password . ....................... 1–15 1.10 Recognizing System Responses . ................................ 1–16 1.10.1 Default Actions . ........................................ 1–16 1.10.2 Informational System Messages .............................. 1–16 iii 1.10.3 System Error Messages .................................... 1–17 1.10.4 Checking Your Current Process . ............................ 1–17 1.11 Getting Help About the System ................................. 1–18 1.11.1 Using Online Help ........................................ 1–18 1.11.2 Getting Help on Specific Commands .......................... 1–19 1.11.3 Getting Help on System Messages ............................ 1–19 1.12 Logging Out of the System . .................................... 1–20 1.12.1 Obtaining Accounting Information ............................ 1–20 1.12.2 Ending a Remote Session ................................... 1–20 1.12.3 Lost Network Connections .................................. 1–20 1.13 Logging Out Without Compromising System Security ................ 1–21 1.14 Networks .................................................. 1–21 1.14.1 Network Nodes .......................................... 1–21 1.14.2 Executing Programs over Networks ........................... 1–22 2 Using DCL to Interact with the System 2.1 Entering Commands ......................................... 2–2 2.1.1 Usage Modes ............................................ 2–2 2.1.2 Types of DCL Commands ................................... 2–3 2.2 The DCL Command Line . .................................... 2–3 2.2.1 Syntax ................................................. 2–4 2.2.2 Canceling Commands . .................................... 2–5 2.2.3 Using Defaults ........................................... 2–5 2.2.4 Entering Multiple Line Commands ........................... 2–5 2.3 Rules for Entering DCL Commands . ............................ 2–6 2.4 Entering Parameters ......................................... 2–7 2.5 Entering Qualifiers .......................................... 2–7 2.5.1 Command Qualifiers . .................................... 2–8 2.5.2 Positional Qualifiers . .................................... 2–8 2.5.3 Parameter Qualifiers . .................................... 2–8 2.5.4 Conflicting Qualifiers . .................................... 2–9 2.5.5 Values Accepted by Qualifiers . ............................ 2–9 2.6 Entering Dates and Times as Values . ............................ 2–9 2.6.1 Absolute Time Format . .................................... 2–10 2.6.2 Delta Time Format ........................................ 2–10 2.6.3 Combination Time Format .................................. 2–11 2.7 Recalling Commands ......................................... 2–12 2.7.1 Pressing Ctrl/B .......................................... 2–12 2.7.2 Using Arrow Keys ........................................ 2–12 2.7.3 Using the RECALL Command . ............................ 2–13 2.8 Editing the DCL Command Line ................................ 2–14 2.8.1 SET TERMINAL Command ................................. 2–14 2.8.2 Deleting Parts of the Command Line .......................... 2–15 2.9 Defining Terminal Keys . .................................... 2–15 2.10 Key Sequences . ............................................ 2–15 iv 3 Storing Information with Files 3.1 Understanding File Names and File Specifications . ............... 3–2 3.1.1 Providing a Complete File Specification . ....................... 3–2 3.1.2 Rules for File Specifications . ................................ 3–3 3.1.3 Default File Types Used by DCL Commands .................... 3–4 3.1.4 Default File Types for Language Source Programs ............... 3–4 3.1.5 File Versions ............................................ 3–5 3.1.6 Network Node Names ..................................... 3–6 3.1.7 Specifying DECnet-Plus Node Full Names ...................... 3–6 3.1.8 Specifying TCP/IP Names and Addresses ...................... 3–7 3.1.9 Accessing Files on Remote Nodes Using DECnet . ............... 3–7 3.1.10 Accessing Files on Remote Nodes Using TCP/IP . ............... 3–8 3.1.11 Using Network File Specifications ............................ 3–8 3.1.11.1 Conventional File Specification ........................... 3–8 3.1.11.2 Foreign File Specification ................................ 3–8 3.1.11.3 Task Specification Strings ............................... 3–8 3.1.12 Access Control String Format ............................... 3–9 3.2 Using Wildcards with File Names ............................... 3–9 3.2.1 Asterisk ( * ) Wildcard Character ............................. 3–9 3.2.2 Percent Sign ( % ) Wildcard Character . ....................... 3–10 3.3 Other File Names . ........................................ 3–10 3.3.1 Null File Names and File Types .............................. 3–11 3.3.1.1 File References with Null File Types ....................... 3–11 3.3.2 Alternate File Names for Magnetic Tapes ...................... 3–11 3.4 Creating and Modifying Files . ................................ 3–12 3.4.1 Creating Files . ........................................ 3–12 3.4.2