This is a sample script file for performing a metatransfer and an inquire, and producing a CA Easytrieve report:
xcomtcp -c5 -f c:\temp\xcomcnf\asm2.cnf stcip=xcomwinca.ca.com stcport=48316 inq_file=/tmp/xcom.inq.file xcomtcp -c6 stcip=xcomwinca.ca.com stcport=48316 inq_file=/tmp/xcom.inq.file inq_wait=000005 hist_file=/tmp/xcomhist echo Process returned $? $XCOM_HOME/ezt/xcomehrp hist_file=/tmp/xcomhist.histf
Note: The –c5 metatransfer parameters LUSERID and LPASSWORD are not shown in the example above but are required and can be specified in the configuration file.
Suppose this script file is called xmeta.script and is located in /xcomcnf.
To execute this batch file
cd /opt/CA/XCOM/bin
Note: This step is not required if the CA XCOM Data Transport directory is in the system path.
/xcomcnf/meta.script
Use the Ping command at the command prompt to send a request from the Local System to the Remote System to determine whether the system is available to XCOM.
Information about the remote CA XCOM Data Transport Server is returned as a result of this command.
Example:
XCOMTCP -ping REMOTE_SYSTEM=?? {PORT=??} {SECURE_SOCKET=YES|NO} {TRNENCRL_CIPHER=xx}
This section describes the parameters of Ping request.
The name of the remote system that receives the Ping request.
For SNA/APPC protocols, the name is the symbolic destination name from the CPI C side information record.
For TCP/IP protocols, the value can be the remote system's IP address, host name, or domain name.
Range: 1 to 64 characters
Default: None
The number of the TCP/IP port on the remote CA XCOM Data Transport server. Used for TCP/IP transfers only.
Range: 1 to 65535
Default: 8044
Specifies whether to use an OpenSSL socket or non-OpenSSL socket for transfers.
Performs a secure transfer. The transfer uses an OpenSSL socket and connects to an SSL listener on the remote partner.
Performs a non-secure transfer. The transfer uses a non-OpenSSL socket.
Default: NO
TRNENCRL_CIPHER specifies the requested list of ciphers which are used to encrypt the password fields for locally initiated transfers.
The cipher list consists of one or more ciphers from the table that colons separate. The characters (!) or (-) can precede each cipher in the cipher list.
If (!), is used then the ciphers are permanently deleted from the list. The ciphers that are deleted can never reappear in the list even if they are explicitly stated.
If (-), is used then the ciphers are deleted from the list, but some or all of the ciphers are added again using later options.
Default: COMPAT
|
Value |
Comments |
|
ALL |
ALL ciphers AES:3DES:RC4:RC2:DES:XCOM Note: ALL does NOT include the COMPAT value. |
|
DES |
All DES ciphers DES-CBC:DES-ECB:DES-CFB:DES-OFB |
|
DES-CBC |
DES cipher with cipher-block chaining |
|
DES-ECB |
DES cipher with electronic codebook |
|
DES-CFB |
DES cipher with cipher feedback |
|
DEC-OFB |
DES cipher with output feedback |
|
3DES |
All 3DES ciphers 3DES-CBC:3DES-ECB:3DES-CFB:3DES-OFB |
|
3DES-CBC |
3DES cipher with cipher-block chaining |
|
3DES-ECB |
3DES cipher with electronic codebook |
|
3DES-CFB |
3DES cipher with cipher feedback |
|
3DES-OFB |
3DES cipher with output feedback |
|
AES |
All AES ciphers AES256-CBC:AES256-ECB:AES256-CFB:AES256-OFB:AES192-CBC:AES192-ECB:AES192-CFB:AES192-OFB:AES128-CBC:AES128-ECB:AES128-CFB:AES128-OFB |
|
AES128 |
All AES 128-bit ciphers AES128-CBC:AES128-ECB:AES128-CFB:AES128-OFB |
|
AES128-CBC |
AES 128-bit cipher with cipher-block chaining |
|
AES128-ECB |
AES 128-bit cipher with electronic codebook |
|
AES128-CFB |
AES 128-bit cipher with cipher feedback |
|
AES128-OFB |
AES 128-bit cipher with output feedback |
|
AES192 |
All AES 192-bit ciphers AES192-CBC:AES192-ECB:AES192-CFB:AES192-OFB |
|
AES192-CBC |
AES 192-bit cipher with cipher-block chaining |
|
AES192-ECB |
AES 192-bit cipher with electronic codebook |
|
AES192-CFB |
AES 192-bit cipher with cipher feedback |
|
AES192-OFB |
AES 192-bit cipher with output feedback |
|
AES256 |
All AES 256-bit ciphers AES256-CBC:AES256-ECB:AES256-CFB:AES256-OFB |
|
AES256-CBC |
AES 256-bit cipher with cipher-block chaining |
|
AES256-ECB |
AES 256-bit cipher with electronic codebook |
|
AES256-CFB |
AES 256-bit cipher with cipher feedback |
|
AES256-OFB |
AES 256-bit cipher with output feedback |
|
RC2 |
All RC2 ciphers |
|
RC2-CBC |
RC2 cipher with cipher-block chaining |
|
RC2-ECB |
RC2 cipher with electronic codebook |
|
RC2-CFB |
RC2 cipher with cipher feedback |
|
RC2-OFB |
RC2 cipher with output feedback |
|
RC4 |
RC4 cipher |
|
XCOM |
CA XCOM Data Transport proprietary cipher. |
|
COMPAT |
Permit the CA XCOM Data Transport proprietary cipher without cipher negotiation that is required for backward password compatibility with CA XCOM Data Transport versions before 11.6. Note: This cipher is also required for transfers sent to CA XCOM Data Transport for z/OS r11.6 and earlier versions. |
Examples:
To request all ciphers except for any of the DES ciphers, use the following command:
TRNENCRL_CIPHER=ALL:!DES
To request only a 3DES or AES cipher, use the following command:
TRNENCRL_CIPHER=3DES:AES
To disable the cipher negotiation or remain backward compatible with the earlier releases of CA XCOM Data Transport, use the following command:
TRNENCRL_CIPHER=COMPAT
xcomtcp -ping REMOTE_SYSTEM=XX PORT=XX TRNENCRL_CIPHER=ALL XCOMN0882I PING INFO FOR <SYSTEMNAME> XCOMN0882I RELEASE=r11.6 SP00 GEN LEVEL <LEVEL> SYSTEM NAME=<SYSNAME> SYSTEM ID=<SYSID>
| Copyright © [set copyright date variable] CA. All rights reserved. |
|