thanks for earlier feedback here
I have another question
We backup some of our VM volumes from a z/OS system
The backup command is like this
DUMP TRACKS((0,0,))'
INDYNAM('volser')'
OUTDDNAME(ddname)
ADMINISTRATOR CPVOLUME
COMPRESS CONCURRENT
OPTIMIZE(4)
Some of our
Thanks you Mark for the info. Yes, I used IE6 and forgot the checksum.
Dumb error. I will transfer the file again.
Lea Stahr
Linux, zLinux, and zVM Administrator
Navistar, Inc.
630-753-5445
[EMAIL PROTECTED]
-Original Message-
From: Linux on 390 Port [mailto:[EMAIL PROTECTED] On
On VM you can do a format of cylinder 0. That will not affect any thing else on
the volume. Be very
careful you get all the parameters right the first time. (You may not get a
second chance.)
Andy Robertson wrote:
It appears that some of the dasd were formatted with an OS-compatible vtoc
I'm not sure this will help you but we run multiple VLANs thru a single
vswitch. We define our cisco router port to the OSA as a vlan trunk
defining the default gateway for each of our zVM linux VLANs. Our
vswitch is defined as VLAN unaware so all the VLAN s forward traffic up
the trunk to each
What would be the security implications of a setup like this if, for
example, you were running untrusted linux guests? I guess in a broader
sense, where are the security boundaries?
There's a lot about VLAN operation I do not yet understand, so forgive
me if this is a naive question.
ok
r.
Basically my security is layered. I have firewall appliances in front of
my zVM cisco routers blocking all traffic entering the trusted network.
So I am really dealing with trusted network partners although I also
need separation of these partners. Communication between zVM guests
within the same