XYGATE Access Control Reference Manual

XYGATE
®
Access Control Reference Manual
Appendix D: XAC Interactive Commands
XYPRO Technology Corporation 236 Proprietary and Confidential
D7: <<LOG
This command generates a user owned Log of an XAC session showing prompts,
responses and output:
<<LOG <filename> Start logging to the file named
<<LOG Turn off logging if in effect
Syntax:
<<LOG [<filename>]
Example:
$SYSTEM.SECURITY 12> XAC FUP-255
XYGATEAC 5.75 XYPRO \N1 20991231 (see <<CONFIG for Copyright)
File Utility Program - T6553H02 - (17JAN2013) System \N1
(C)1981 Tandem (C)2006 Hewlett Packard Development Company, L.P.
(255,255)1-
(255,255)1-<<LOG $S.#XAC.LOG
Log file \N1.$S.#XAC.LOG opened
(255,255)1-
From this point on, all input and output will be written to the log.
Note: If <filename> is a diskfile and it does not already exist, one will be created for
you.