Openvms User's Manual
Total Page:16
File Type:pdf, Size:1020Kb
OpenVMS User’s Manual Order Number: AA–PV5JE–TK April 2001 This manual describes how to use the Compaq OpenVMS operating system. The information contained in this manual is intended for all OpenVMS users and is applicable to all computers running the OpenVMS operating system. Revision/Update Information: This manual supersedes the OpenVMS User’s Manual, Version 7.2. Software Version: OpenVMS Alpha Version 7.3 OpenVMS VAX Version 7.3 Compaq Computer Corporation Houston, Texas © 2001 Compaq Computer Corporation Compaq, VAX, VMS, and the Compaq logo Registered in U.S. Patent and Trademark Office. OpenVMS is a trademark of Compaq Information Technologies Group, L.P. in the United States and other countries. Microsoft, MS, and MS–DOS are registered trademarks of Microsoft Corporation. Motif, OSF, OSF/1, and OSF/Motif are registered trademarks, and Open Software Foundation is a trademark of The Open Group. All other product names mentioned herein may be trademarks of their respective companies. Confidential computer software. Valid license from Compaq required for possession, use, or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor’s standard commercial license. Compaq shall not be liable for technical or editorial errors or omissions contained herein. The information in this document is provided "as is" without warranty of any kind and is subject to change without notice. The warranties for Compaq products are set forth in the express limited warranty statements accompanying such products. Nothing herein should be construed as constituting an additional warranty. ZK6489 The Compaq OpenVMS documentation set is available on CD-ROM. Contents Preface ............................................................ xxiii 1 Introduction: OpenVMS Concepts and Definitions 1.1 Logging In to the System ...................................... 1–2 1.1.1 Access Requirements ...................................... 1–2 1.2 Networks . ................................................ 1–2 1.2.1 Network Nodes . ........................................ 1–3 1.2.2 Executing Programs over Networks ........................... 1–3 1.3 DIGITAL Command Language (DCL) ............................ 1–3 1.3.1 Usage Modes ............................................ 1–3 1.3.2 Types of DCL Commands . ................................ 1–4 1.3.3 DCL Command Line ...................................... 1–4 1.4 Files and Directories . ........................................ 1–5 1.4.1 File Name, File Type, and File Version . ....................... 1–5 1.4.2 Directory Structures ...................................... 1–5 1.4.3 Subdirectories . ........................................ 1–6 1.4.4 File Specifications ........................................ 1–6 1.4.5 Characters for Directory and File Names ....................... 1–6 1.4.5.1 Base Character Set .................................... 1–6 1.4.5.2 Extended Character Set . ................................ 1–6 1.5 OpenVMS Utilities . ........................................ 1–7 1.5.1 Mail and MIME Utilities . ................................ 1–7 1.5.2 Phone Utility ............................................ 1–7 1.5.3 Text Editors ............................................. 1–7 1.5.4 DIGITAL Standard Runoff (DSR) ............................ 1–7 1.5.5 Sort/Merge Utility ........................................ 1–7 1.6 Devices .................................................... 1–8 1.6.1 Mass Storage Devices ...................................... 1–8 1.6.2 Record-Oriented Devices . ................................ 1–8 1.6.3 Disks and Magnetic Tapes . ................................ 1–8 1.7 Logical Names .............................................. 1–8 1.7.1 Readability .............................................. 1–8 1.7.2 File Independence ........................................ 1–8 1.8 Symbols . ................................................ 1–9 1.9 Command Procedures ........................................ 1–9 1.9.1 System Login Command Procedures . ....................... 1–9 1.9.2 Personal Login Command Procedures . ....................... 1–9 1.10 Lexical Functions ............................................ 1–9 1.11 Processes and Programs ....................................... 1–10 1.11.1 User Authorization Files (UAFs) ............................. 1–10 1.11.2 Creating Image Files ...................................... 1–10 1.12 System Security ............................................. 1–10 1.12.1 Protected Objects . ........................................ 1–10 iii 2 Getting Started: Interacting with the OpenVMS Operating System 2.1 Logging In to the System . .................................... 2–1 2.1.1 Successful Logins ......................................... 2–2 2.1.2 Login Errors . ............................................ 2–2 2.2 Choosing Passwords for Your Account ............................ 2–3 2.2.1 Obtaining Your Initial Password . ............................ 2–3 2.2.2 Changing Your Initial Password . ............................ 2–4 2.2.3 Restrictions on Passwords .................................. 2–4 2.2.4 Types of Passwords . .................................... 2–4 2.2.5 Entering a System Password ................................ 2–5 2.2.6 Entering a Secondary Password . ............................ 2–5 2.2.7 Password Requirements for Different Types of Accounts ........... 2–6 2.3 Reading Informational Messages ................................ 2–6 2.3.1 Suppressing Messages . .................................... 2–7 2.3.2 Successful Login Messages .................................. 2–7 2.4 Types of Logins and Login Classes . ............................ 2–8 2.4.1 Interactive Logins ........................................ 2–8 2.4.2 Noninteractive Logins . .................................... 2–8 2.5 Login Failures . ............................................ 2–9 2.5.1 Terminals That Require System Passwords . ................... 2–9 2.5.2 Login Class Restrictions .................................... 2–10 2.5.3 Shift Restrictions ......................................... 2–10 2.5.4 Batch Jobs During Shift Restrictions .......................... 2–10 2.5.5 Failures During Dialup Logins . ............................ 2–10 2.5.6 Break-In Evasion Procedures ................................ 2–10 2.6 Changing Passwords ......................................... 2–11 2.6.1 Selecting Your Own Password . ............................ 2–11 2.6.2 Using Generated Passwords ................................. 2–11 2.6.3 Generated Passwords: Disadvantages ......................... 2–12 2.6.4 Changing a Secondary Password . ............................ 2–13 2.6.5 Changing Passwords at Login . ............................ 2–13 2.7 Password and Account Expiration Times .......................... 2–13 2.7.1 Expired Passwords ........................................ 2–13 2.7.2 Using Secondary Passwords ................................. 2–14 2.7.3 Failure to Change Passwords ................................ 2–14 2.7.4 Expired Accounts ......................................... 2–14 2.8 Guidelines for Protecting Your Password .......................... 2–14 2.9 Recognizing System Responses ................................. 2–16 2.9.1 Default Actions .......................................... 2–16 2.9.2 Informational System Messages . ............................ 2–16 2.9.3 System Error Messages .................................... 2–16 2.9.4 Checking Your Current Process . ............................ 2–17 2.10 Getting Help About the System ................................. 2–18 2.10.1 Using Online Help ........................................ 2–18 2.10.2 Getting Help on Specific Commands .......................... 2–19 2.10.3 Getting Help on System Messages ............................ 2–19 2.11 Logging Out of the System . .................................... 2–19 2.11.1 Obtaining Accounting Information ............................ 2–20 2.11.2 Ending a Remote Session ................................... 2–20 2.11.3 Lost Network Connections .................................. 2–20 2.12 Logging Out Without Compromising System Security ................ 2–21 2.12.1 Reasons to Clear Your Terminal Screen ........................ 2–21 2.12.2 Disposing of Hardcopy Output . ............................ 2–21 2.12.3 Breaking the Connection to a Dialup Line . ................... 2–22 iv 3 The DIGITAL Command Language: Interacting with the System 3.1 Using DCL Commands ........................................ 3–1 3.1.1 Entering Commands ...................................... 3–2 3.1.2 Commonly Used DCL Commands ............................ 3–2 3.1.3 Key Sequences . ........................................ 3–2 3.2 Constructing DCL Commands . ................................ 3–3 3.2.1 Other Components of Command Lines . ....................... 3–4 3.2.2 Syntax . ................................................ 3–4 3.3 Entering DCL Commands ..................................... 3–4 3.3.1 Canceling Commands ...................................... 3–5 3.3.2 Using Defaults . ........................................ 3–5 3.3.3 Entering Multiple Line Commands ........................... 3–5 3.4 Rules for Entering DCL Commands .............................. 3–6 3.4.1 Case Sensitivity . ........................................ 3–6 3.4.2 Required Spaces . .......................................