No fears. 1) Logon to the userid TCPMAINT. 2) ACCESS 198 P {Just think of filemode 'P' as "Production" - it could be any free filemode} 3) COPYFILE PROFILE TCPIP P = -1TCPIP P (OLDDATE {This makes a backup copy of the current "PROFILE TCPIP P", saving the same file date/time, but named "PROFILE -1TCPIP P", think of it a little like a GDG on z/OS} 4) COPYFILE SYSTEM DTCPARMS P = -1DTCPARMS P (OLDDATE {Same backup story as step 3} 5) Use XEDIT PROFILE TCPIP P to make your changes, then to the same with SYSTEM DTCPARMS P
Note: Be VERY CAREFUL when changing TCPIP files. You can take break your network. Mike Walter Aon Corporation The opinions expressed herein are mine alone, not my employer's. louis.gai...@its.ms.gov Sent by: "The IBM z/VM Operating System" <IBMVM@LISTSERV.UARK.EDU> 11/18/2010 02:54 PM Please respond to "The IBM z/VM Operating System" <IBMVM@LISTSERV.UARK.EDU> To IBMVM@LISTSERV.UARK.EDU cc Subject HiperSockets Definitions I want to use hipersockets on a z/vm 5.3 host and I have the IBM HIPERSOCKETS IMPLEMENTATION GUIDE in section 4.3.1 it talks about the PROFILE TCPIP and the SYSTEM DTCPARMS files my question is how to get to these two files so I can update them. Thanks for your help Z/VM ROOKIE The information contained in this e-mail and any accompanying documents may contain information that is confidential or otherwise protected from disclosure. If you are not the intended recipient of this message, or if this message has been addressed to you in error, please immediately alert the sender by reply e-mail and then delete this message, including any attachments. Any dissemination, distribution or other use of the contents of this message by anyone other than the intended recipient is strictly prohibited. All messages sent to and from this e-mail address may be monitored as permitted by applicable law and regulations to ensure compliance with our internal policies and to protect our business. E-mails are not secure and cannot be guaranteed to be error free as they can be intercepted, amended, lost or destroyed, or contain viruses. You are deemed to have accepted these risks if you communicate with us by e-mail.