- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - OpenVMS
- >
- Merging netproxy files
Operating System - OpenVMS
1753269
Members
5282
Online
108792
Solutions
Forums
Categories
Company
Local Language
back
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Forums
Discussions
back
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Blogs
Information
Community
Resources
Community Language
Language
Forums
Blogs
Topic Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-28-2006 08:57 AM
08-28-2006 08:57 AM
Merging netproxy files
Can the netproxy files from 2 different systems be merged. I think its just a case of copying the file over with a diferent name and then running a merge or should it be a convert ?
1 REPLY 1
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-28-2006 09:35 AM
08-28-2006 09:35 AM
Re: Merging netproxy files
Steven,
NETPROXY and NET$PROXY are just simple indexed files. Files from multiple systems can certainly be consolidated (but remember to make sure any node names referenced are defined somewhere on the target system).
First work out if you want NETPROXY or NET$PROXY. On any recent system, I'd expect it's NET$PROXY you're interested in.
Next, it's likely on the target system the file is open, so you can't just CONVERT or MERGE into the "live" file. Instead, you can transfer the records one by one with a DCL loop:
$ OPEN/READ/WRITE/SHARE OUT NET$PROXY ! target
$ OPEN/READ IN OTHER_PROXY.DAT
$ LOOP: READ/END=ENDLOOP IN LINE
$ WRITE OUT LINE
$ GOTO LOOP:
$ ENDLOOP:
$ CLOSE IN
$ CLOSE OUT
Check that the proxies defined are correct, and ensure any unnecessary entries are removed. Used incorrectly, proxies can be a security hole, so the best policy is to keep them to a bare minimum.
Also check that the node names referenced are defined to be the same nodes on source and destination systems. Otherwise, you might be opening access to unauthorized persons.
NETPROXY and NET$PROXY are just simple indexed files. Files from multiple systems can certainly be consolidated (but remember to make sure any node names referenced are defined somewhere on the target system).
First work out if you want NETPROXY or NET$PROXY. On any recent system, I'd expect it's NET$PROXY you're interested in.
Next, it's likely on the target system the file is open, so you can't just CONVERT or MERGE into the "live" file. Instead, you can transfer the records one by one with a DCL loop:
$ OPEN/READ/WRITE/SHARE OUT NET$PROXY ! target
$ OPEN/READ IN OTHER_PROXY.DAT
$ LOOP: READ/END=ENDLOOP IN LINE
$ WRITE OUT LINE
$ GOTO LOOP:
$ ENDLOOP:
$ CLOSE IN
$ CLOSE OUT
Check that the proxies defined are correct, and ensure any unnecessary entries are removed. Used incorrectly, proxies can be a security hole, so the best policy is to keep them to a bare minimum.
Also check that the node names referenced are defined to be the same nodes on source and destination systems. Otherwise, you might be opening access to unauthorized persons.
A crucible of informative mistakes
The opinions expressed above are the personal opinions of the authors, not of Hewlett Packard Enterprise. By using this site, you accept the Terms of Use and Rules of Participation.
News and Events
Support
© Copyright 2024 Hewlett Packard Enterprise Development LP