Technical data
Managing Storage Media
9.5 Mounting Volumes
2. Enter the REPLY command in one of the following forms:
REPLY Command Qualifiers Description
/ABORT=identification-number
‘‘message-text’’
Indicates that the user request is canceled. (The
user’s MOUNT command exits with an error
status.)
/PENDING=identification-
number ‘‘message-text’’
Indicates that the request has been put in a wait
state until it can be completed. This command
implies that the originating request was either
a REQUEST/REPLY or a MOUNT command.
The user cannot enter other commands until the
operator fulfills or aborts the request.
/TO=identification-number
‘‘message-text’’
Indicates that the request is fulfilled. (Processing
continues.)
If a user enters a MOUNT/ASSIST command and the desired device is
unavailable, you can substitute another device. Whenever you must
substitute a device, load the requested volume on the alternate device and
prepare the device for connection before you enter the REPLY command. Use
the following format:
REPLY/TO=identification-number ‘‘SUBSTITUTE device-name’’
You can abbreviate the word SUBSTITUTE to ‘‘S’’ and use uppercase or
lowercase letters. After a space, use the remainder of the message-text space
to name the substituted device.
Examples
1.
$ REPLY/TO=24 "SUBSTITUTE DUA1:"
This example shows how an operator redirects the mount operation to the
DUA1: device.
2.
$ MOUNT/ASSIST MKB500: MYDATA
%MOUNT-I-OPRQST, Please mount volume MYDATA in device _MKB500:
%MOUNT-I-OPREPLY, Substitute MKA100:
11:44:28.71, request 1 was completed by operator _FTA8:
This is an example of a user’s request and the substitution information the
user receives. In this example, the MKA100: device has been substituted for
the MKB500: device.
Refer to the OpenVMS DCL Dictionary for a complete list of REPLY qualifiers
and their functions. See Section 9.8.2.4 for instructions for entering REPLY
commands after you mount a volume set with automatic switching disabled.
9.5.4 Mounting a Volume with Protected Subsystems
Security is usually based on control rights that are granted or denied to the user.
In a protected subsystem, however, security is based on access controls assigned
to the subsystem. The subsystem acts as a gatekeeper that grants or denies users
access to objects belonging to the subsystem.
Managing Storage Media 9–35










