RDF System Management Manual for J-series and H-series RVUs (RDF 1.10)
VALIDATE CONFIGURATION............................................................................................247
Where Issued.............................................................................................................247
Security Restrictions.....................................................................................................247
RDF State Requirement.................................................................................................247
Usage Guidelines.......................................................................................................247
Example....................................................................................................................248
9 Entering RDFSCAN Commands................................................................250
About the EMS Log...............................................................................................................250
Elements of RDFSCAN Command Descriptions.........................................................................250
RDFSCAN Commands...........................................................................................................251
AT.................................................................................................................................251
Usage Guidelines.......................................................................................................251
Examples...................................................................................................................251
DISPLAY..........................................................................................................................251
Usage Guidelines.......................................................................................................252
Examples...................................................................................................................252
EXIT...............................................................................................................................252
Usage Guidelines.......................................................................................................252
Examples...................................................................................................................253
FILE................................................................................................................................253
Usage Guidelines.......................................................................................................253
Examples...................................................................................................................253
HELP..............................................................................................................................254
Usage Guidelines.......................................................................................................254
Examples...................................................................................................................254
LIST................................................................................................................................254
Usage Guidelines.......................................................................................................254
Output Displayed........................................................................................................255
Examples...................................................................................................................255
LOG...............................................................................................................................255
Usage Guidelines.......................................................................................................256
Output Displayed........................................................................................................256
Examples...................................................................................................................256
MATCH..........................................................................................................................256
Usage Guidelines.......................................................................................................256
Examples...................................................................................................................257
NOLOG.........................................................................................................................257
Usage Guidelines.......................................................................................................257
Examples...................................................................................................................258
SCAN............................................................................................................................258
Usage Guidelines.......................................................................................................258
Examples...................................................................................................................258
10 Triple Contingency................................................................................260
Overview............................................................................................................................260
Requirements.......................................................................................................................260
How Triple Contingency Works..............................................................................................260
Hardware Requirements........................................................................................................261
Software Requirements..........................................................................................................261
The RETAINCOUNT Configuration Parameter...........................................................................262
The COPYAUDIT Command...................................................................................................263
COPYAUDIT Restartability......................................................................................................264
Using ZLT to Achieve Triple Contingency Protection for Auxiliary Audit Trails.................................264
Triple Contingency Without ZLT..........................................................................................264
Using ZLT to Achieve the same Protection............................................................................264
14 Contents










