RDF System Management Manual for H-Series RVUs (RDF 1.8)

The default security restrictions for all RDFCOM commands are summarized in Table 8-2.
RDF State Requirement
Some RDFCOM commands can only be entered after RDF has been started; others must be
entered before the subsystem has been started or after it has been stopped. In each command
description, these constraints are listed under the heading “RDF State Requirement.”
Usage Guidelines
Details about the proper use of a command appear in “Usage Guidelines.” These details include
information about when to apply the command, possible constraints and unexpected effects of
the command, hints on enhancing performance and avoiding errors, and other considerations.
When a command is extremely basic or straightforward, the command description omits the
“Usage Guidelines.”
Table 8-1 Systems for RDFCOM Commands
Other
Objects
TriggerNetworkRDFNETVolumeUpdatePurgerReceiverRDFMonitorImage
Trail
Extractor
EPPPPPPPPPADD
EPPPPPPPPALTER
BCOPYAUDIT
EPPDELETE
EEXIT
EFC
EHELP
EHISTORY
EEEEEEEEEEINFO
PINITIALIZE
EOBEY
EOPEN
EOUT
EPPPPPPPPPRESET
EPPPPPPPPPSET
EEEEEEEEEESHOW
PPSTART
E**EEEEEESTATUS
P*PESTOP
Legend
P = Primary
only
B = Backup
only
E = Either
* = SYNCH
** =
RTDWARNING
174 Entering RDFCOM Commands