Previous Topic: OUSER

Next Topic: Tracing Problems


Command Examples for Metatransfers and Inquire on Status

This is a sample script file for performing a metatransfer and an inquire, and producing a CA Easytrieve report:

xcomtcp -c5 -f c:\temp\xcomcnf\asm2.cnf stcip=xcomwinca.ca.com
stcport=48316 inq_file=/tmp/xcom.inq.file
xcomtcp -c6 stcip=xcomwinca.ca.com stcport=48316
inq_file=/tmp/xcom.inq.file inq_wait=000005
hist_file=/tmp/xcomhist
echo Process returned $?
$XCOM_HOME/ezt/xcomehrp hist_file=/tmp/xcomhist.histf

Note: The –c5 metatransfer parameters LUSERID and LPASSWORD are not shown in the example above but are required and can be specified in the configuration file.

Suppose this script file is called xmeta.script and is located in /xcomcnf.

To execute this batch file

  1. Submit the following command to change to the directory where xcomtcp is located:
    cd /opt/CA/XCOM/bin
    

    Note: This step is not required if the CA XCOM Data Transport directory is in the system path.

  2. Submit the following command to run the script file:
    /xcomcnf/meta.script
    

How to Send a Ping Request

Use the Ping command at the command prompt to send a request from the Local System to the Remote System to determine whether the system is available to XCOM.

Information about the remote CA XCOM Data Transport Server is returned as a result of this command.

Example:

XCOMTCP -ping REMOTE_SYSTEM=?? {PORT=??} {SECURE_SOCKET=YES|NO} {TRNENCRL_CIPHER=xx}

The Ping request parameters:

TRNENCRL_CIPHER

Parameters

This section describes the parameters of Ping request.

REMOTE_SYSTEM

The name of the remote system that receives the Ping request.

For SNA/APPC protocols, the name is the symbolic destination name from the CPI C side information record.

For TCP/IP protocols, the value can be the remote system's IP address, host name, or domain name.

Range: 1 to 64 characters

Default: None

PORT

The number of the TCP/IP port on the remote CA XCOM Data Transport server. Used for TCP/IP transfers only.

Range: 1 to 65535

Default: 8044

SECURE_SOCKET

Specifies whether to use an OpenSSL socket or non-OpenSSL socket for transfers.

YES

Performs a secure transfer. The transfer uses an OpenSSL socket and connects to an SSL listener on the remote partner.

NO

Performs a non-secure transfer. The transfer uses a non-OpenSSL socket.

Default: NO

TRNENCRL_CIPHER

TRNENCRL_CIPHER specifies the requested list of ciphers which are used to encrypt the password fields for locally initiated transfers.

The cipher list consists of one or more ciphers from the table that colons separate. The characters (!) or (-) can precede each cipher in the cipher list.

If (!), is used then the ciphers are permanently deleted from the list. The ciphers that are deleted can never reappear in the list even if they are explicitly stated.

If (-), is used then the ciphers are deleted from the list, but some or all of the ciphers are added again using later options.

Default: COMPAT

Value

Comments

ALL

ALL ciphers

AES:3DES:RC4:RC2:DES:XCOM

Note: ALL does NOT include the COMPAT value.

DES

All DES ciphers

DES-CBC:DES-ECB:DES-CFB:DES-OFB

DES-CBC

DES cipher with cipher-block chaining

DES-ECB

DES cipher with electronic codebook

DES-CFB

DES cipher with cipher feedback

DEC-OFB

DES cipher with output feedback

3DES

All 3DES ciphers

3DES-CBC:3DES-ECB:3DES-CFB:3DES-OFB

3DES-CBC

3DES cipher with cipher-block chaining

3DES-ECB

3DES cipher with electronic codebook

3DES-CFB

3DES cipher with cipher feedback

3DES-OFB

3DES cipher with output feedback

AES

All AES ciphers

AES256-CBC:AES256-ECB:AES256-CFB:AES256-OFB:AES192-CBC:AES192-ECB:AES192-CFB:AES192-OFB:AES128-CBC:AES128-ECB:AES128-CFB:AES128-OFB

AES128

All AES 128-bit ciphers

AES128-CBC:AES128-ECB:AES128-CFB:AES128-OFB

AES128-CBC

AES 128-bit cipher with cipher-block chaining

AES128-ECB

AES 128-bit cipher with electronic codebook

AES128-CFB

AES 128-bit cipher with cipher feedback

AES128-OFB

AES 128-bit cipher with output feedback

AES192

All AES 192-bit ciphers

AES192-CBC:AES192-ECB:AES192-CFB:AES192-OFB

AES192-CBC

AES 192-bit cipher with cipher-block chaining

AES192-ECB

AES 192-bit cipher with electronic codebook

AES192-CFB

AES 192-bit cipher with cipher feedback

AES192-OFB

AES 192-bit cipher with output feedback

AES256

All AES 256-bit ciphers

AES256-CBC:AES256-ECB:AES256-CFB:AES256-OFB

AES256-CBC

AES 256-bit cipher with cipher-block chaining

AES256-ECB

AES 256-bit cipher with electronic codebook

AES256-CFB

AES 256-bit cipher with cipher feedback

AES256-OFB

AES 256-bit cipher with output feedback

RC2

All RC2 ciphers

RC2-CBC

RC2 cipher with cipher-block chaining

RC2-ECB

RC2 cipher with electronic codebook

RC2-CFB

RC2 cipher with cipher feedback

RC2-OFB

RC2 cipher with output feedback

RC4

RC4 cipher

XCOM

CA XCOM Data Transport proprietary cipher.

COMPAT

Permit the CA XCOM Data Transport proprietary cipher without cipher negotiation that is required for backward password compatibility with CA XCOM Data Transport versions before 11.6.

Note: This cipher is also required for transfers sent to CA XCOM Data Transport for z/OS r11.6 and earlier versions.

Examples:

To request all ciphers except for any of the DES ciphers, use the following command:

TRNENCRL_CIPHER=ALL:!DES

To request only a 3DES or AES cipher, use the following command:

TRNENCRL_CIPHER=3DES:AES

To disable the cipher negotiation or remain backward compatible with the earlier releases of CA XCOM Data Transport, use the following command:

TRNENCRL_CIPHER=COMPAT

Command Example of Ping Request

xcomtcp -ping REMOTE_SYSTEM=XX PORT=XX TRNENCRL_CIPHER=ALL
XCOMN0882I PING INFO FOR <SYSTEMNAME>
XCOMN0882I RELEASE=r11.6 SP00 GEN LEVEL <LEVEL> SYSTEM NAME=<SYSNAME> SYSTEM ID=<SYSID>