Technical data

VMSINSTAL.COM command procedure (cont’d)
getting help in, Vo l 1 , 3–5
installing layered products, Vo l 1 , 3–2
options, Vo l 1, 3–10
option list parameter, Vo l 1 , 3–8
specifying, Vo l 1 , 3–8
table of, Vo l 1, 3–8
preparing to use, Vo l 1 , 3–3
product list parameter, Vo l 1 , 3–5
product save-set format, Vo l 1 , 3–12
Release Notes option, Vo l 1 , 3–13
saving answers, Vo l 1 , 3–10
source parameter, Vo l 1 , 3–7
starting, Vo l 1, 3–5
system failure
conditions for, Vo l 1 , 3–9
system shutdown following, Vo l 1 , 3–9
temporary working directory
specifying location of, Vo l 1 , 3–11
VMSKITBLD.COM command procedure
ADD option, Vo l 1 , 2–32
BUILD option, Vo l 1, 2–28
compared to CLUSTER_CONFIG.COM
command procedure, Vo l 1 , 2–32
completing a system disk created with the
BUILD option, Vo l 1 , 2–30
configuring a system root added with, Vo l 1 ,
2–34
copying system files from the system disk, Vo l
1, 2–27
COPY option, Vo l 1 , 2–31
options, Vo l 1, 2–27
reliance on .TEMPLATE version of site-specific
command procedures, Vo l 1 , 5–3
VMSMAIL logical name
defining to reduce system disk I/O, Vo l 2, 17–7
VMSMAIL_PROFILE.DATA file, Vo l 1, 7–41
moving to reduce system disk I/O, Vo l 2 , 17–7
VMSMAIL_PROFILE logical name
defining during system startup, Vol 1 , 5–8
VMSTAILOR
See Tailoring utilities
VOLPRO privilege, Vo l 1 , 9–21
VOLSET.SYS file
See Volume set list file
Volume
definition, Vo l 1, 9–2
Volume identifier field, Vo l 1, 9–53
Volume integrity, Vo l 1 , 9–73
Volume labels
assigning to devices, Vo l 1 , 5–11
changing, Vo l 1 , 3–30
definition, Vo l 1, 11–59
format, Vo l 1, 9–31
specifying for magnetic tape, Vo l 1 , 11–15
used with BACKUP command, Vo l 1 , 11–59
Volume protection
See Protection, volumes
Volume Protection Override (VOLPRO)
See VOLPRO privilege
Volumes
See also Disk volumes; Private volumes; Public
volumes; Tape volumes; Volume sets
adding to an existing disk set, Vo l 1 , 9–47
advantages of using separate, Vo l 1, 9–43
availability
OPCOM message, Vo l 1 , 9–73
binding into volume set, Vol 1 , 9–29
canceling mount verification, Vo l 1 , 9–77
continuation, Vo l 1, 9–56
controlling cache size, Vo l 1 , 9–73
disabling mount messages, Vo l 1 , 9–31
disk
See Disk volumes
dismounting, Vo l 1, 9–57, 11–17
restriction, Vo l 2 , 17–17
foreign
copying files to and from, Vo l 1, 10–33
mounting, Vo l 1, 9–28, 10–22
group, Vo l 1, 9–14
initializing, Vo l 1, 9–16, 11–14
mounting, Vo l 1, 9–35, 11–16
See also MOUNT command
continuation tape, Vo l 1 , 9–54
if device is unavailable, Vol 1 , 9–35
operator functions, Vo l 1 , 9–25
public, Vo l 1 , 9–27
steps, Vo l 1 , 9–34
mount verification aborted
OPCOM message, Vo l 1 , 9–79
mount verification timeout, Vo l 1 , 9–75
OPCOM message, Vo l 1 , 9–75
operator-assisted mount, Vo l 1, 9–35
private
See Private volumes
protection, Vo l 1, 9–21
public
See Public volumes
rebuilding, Vo l 1, 9–64
determining if needed, Vo l 1 , 8–5
recovering from errors, Vo l 1 , 9–74
sharing, Vo l 1, 9–31
substituting, Vo l 1, 9–35
system
See System volumes
tape
See Tape volumes
Volume security profile
reserved file, Vo l 2 , A–9
SECURITY.SYS, Vo l 2 , A–9
Index65