/sys$common/syshlp/NCLHELP.HLB  —  add
    Some characteristic attributes have a value that consists of a
    set of values. Use the add command to add one or more new values
    to a set value. For example:

    ncl> add node 0 osi transport cons filters {filter_2,filter_3}

    adds two new values, filter_2 and filter_3, to the set of values
    represented by the cons filters characteristic of the OSI
    Transport entity. The values are enclosed in { }, and if more
    than one value is to be added in the same command, each value is
    separated from the previous value by a comma.

    To specify the empty set (that is, a set with no values), specify
    {} as the value.

    Similarly, use the remove command to remove one or more values
    from a set value. For example:

    ncl> remove node 0 osi transport cons filters {filter_3}

    removes the value filter_3 from the set.

    Use the add and remove commands only on characteristics with set
    values (as indicated in the description of the characteristic).

    You can also use the set command to change the values of a set-
    valued characteristic. However, the set command replaces the
    current contents of the set with the values you specified.

1  –  modem_connect

    Adds a set of modem capabilities of a modem connect line.

    add  [node node-id] modem connect line line-id -
          modem options {option[,option...]}

    The modem options are:

    dialout          The modem can dial the remote modem.  Supported
                     only if the value of communications type is
                     switched.  Supported on Tru64 UNIX only.

    direct           The modem is directly connected to the remote
                     modem through a non-switched line.  Supported
                     only if accompanied with dialout and used only
                     when the modem protocol type supports direct
                     dial.  Supported on Tru64 UNIX only.

    rate select      The modem is capable of data rate selection.

    You can issue this command only when the entity is disabled.

    Example:

    add node remnod modem connect line dsb-0-0_callit-zwa-1 -
          modem options {rate select}

2  –  mop_client

    The add command can be used to modify the following attributes
    of a particular MOP Client entity:  addresses, or device types.

2.1  –  addresses

    Modifies the Addresses attribute of the specified MOP Client
    to include at least the address or addresses in the specified set.

    add [node node-id] mop client client-name -
        addresses {lan-address[,lan-address...]}

    For OpenVMS, Phase IV nodes can use an extended DECnet LAN
    address in addition to their hardware address, so you must
    include both of these addresses in the addresses set. To
    calculate the extended DECnet address, express the Phase IV
    node address as a four-digit hex integer, then add the
    prefix AA-00-04-00.

    For example, if the Phase IV node named IMPLY has an
    address of 4.260:

             4.260

    Example:

    add mop client imply -
        addresses {08-00-2b-13-d6-e0, aa-00-04-00-04-11}

2.2  –  device_types

    Modifies the Device Types attribute of the MOP Client to
    include at least the specified device type or types.

    add [node node-id] mop client client-name -
        device types {type[,type...]}

    Use Device Type and omit the address if you want to set up a generic
    client entity.  The entity will be used for any incoming
    load and dump requests that specify a matching communication
    device type.

3  –  osi_transport

    The add command can be used to modify the following attributes of
    the OSI Transport module:  cons nsap addresses, cons filters,
    rfc1006 listener ports, or rfc1006 listener ipaddresses.  For more
    information on those commands select the appropriate attribute.

    Select template for the add command that modifies the classes of
    an osi transport template.

3.1  –  cons_nsap_addresses

    Modifies the CONS NSAP Addresses attribute of the OSI Transport
    entity to include at least the specified NSAP or NSAPs.

    add  [node node-id] osi transport -
          cons nsap addresses {nsap[,nsap...]}

    CONS NSAP Addresses is a set of the valid NSAP addresses for use
    with CONS.  One or more NSAPs must be specified to run COTS over
    CONS.  See the DECnet-Plus Planning Guide for more information.

3.2  –  cons_filters

    Modifies the CONS Filters attribute of the OSI Transport entity to
    include at least the specified filter name or names.

    add  [node node-id] osi transport -
          cons filters {simplename[,simplename...]}

    This CONS Filters attribute specifies the set of X.25 Access module
    filters used to determine which inbound network connection requests
    should be directed to the transport entity.  You can modify this
    characteristic only when the entity is disabled.

    For each CONS Filter, there must be a corresponding X25 Access
    Template with the same name.  One or more of these filters must
    be specified in order to run COTS over CONS.  The X.25 access
    filter named "OSI Transport" is typically used.

    Example:

    add node remnod osi transport cons filters -
        {"OSI Transport"}

3.3  –  template

    Modifies the Classes attribute of the specified OSI Transport
    Template instance to include at least the specified class or
    classes.

    add  [node node-id] osi transport template template-id -
          classes {class[,class...]}

    The Classes attribute is a set of protocol classes that can be
    negotiated for use on a transport connection.  If the value of
    the Network Service attribute is CLNS, the class must be a subset
    of the classes supported by the OSI Transport attribute CLNS
    Classes Supported.  If the value is CONS, the classes must be
    a subset of the classes supported by the OSI Transport attribute
    CONS Classes Supported.  If the value of the Network Service
    attribute is ANY, the classes must be a subset of the combined
    classes in the CLNS Classes Supported and CONS Classes
    supported attributes.

    Example:

    add node remnod osi transport -
          template osit$loop_cons classes {0,2,4}

3.4  –  rfc1006 listener ports (OpenVMS)

    Modifies the RFC1006 Listener Ports attribute of the OSI Transport
    entity to include at least the port or ports specified.

    add  [node node-id] osi transport -
          RFC1006 listener ports {port[,port...]}

    The RFC1006 Listener Ports attribute set contains the names of the
    TCP listener ports used to receive inbound RFC 1006 connection
    requests.  Port 102 is applicable for RFC 1006 (OSI over TCP/IP)
    connections, and port 399 is applicable for RFC 1859 (DECnet over
    TCP/IP) connections.  You can only remove RFC1006 Listener Ports
    when the entity is disabled.

    Example:

    add node remnod osi transport RFC1006 listener -
          ports {102, 399}

3.5  –  rfc1006 listener ipaddresses (OpenVMS)

    Modifies the RFC1006 Listener IPAddresses attribute of the OSI Transport
    entity to include at least the IP Addresses specified.

    add  [node node-id] osi transport -
          RFC1006 listener ipaddresses {ipaddr[,ipaddr...]}

    The RFC1006 Listener IPAddresses attribute set contains the names of the
    IP Addresses of the interfaces used to receive inbound RFC 1006 connection
    requests.  This is applicable for both RFC 1006 (OSI over TCP/IP)
    connections, as well as for RFC 1859 (DECnet over TCP/IP) connections.
    You can only remove RFC1006 Listener IPAddresses when the entity is disabled.

    Example:

    add node remnod osi transport RFC1006 listener -
          ipaddresses {a.b.c.d,w.x.y.z}

4  –  routing

    The add command can be used to modify the following attributes of
    the Routing module:  manual area addresses, or manual network
    entity titles.

    Select one of those attributes for further information, or select
    circuit for information on add commands that apply to the
    routing circuit entity and its reachable address subentity.

4.1  –  circuit

    The add command can be used to modify the manual routers attribute
    of a routing circuit.  Select manual_routers for further
    information on that command.

    Select reachable_address for information on add commands that
    modify the dte addresses and permitted LAN addresses attributes
    of a particular routing circuit reachable address.

4.1.1  –  manual_routers

    Modifies the Manual Routers attribute of the specified Routing
    Circuit instance to include at least the address or addresses
    specified.

    add  [node node-id] routing circuit circuit-name -
         manual routers {address[,address...]}

    Manual Routers

    Support: End
    Default: No router IDs     Value: Set of LAN addresses

    Manually entered IDs of routers. If this set is empty, the
    circuit will auto-configure the routers. This characteristic is
    supported only if the circuit's characteristic type is csma-cd.
    For Tru64 UNIX, a maximum of 5 routers can be in the set.

    Example:

    add routing circuit csmacd-1 manual routers -
         {aa-00-04-00-12-34}

4.1.2  –  reachable_address

    The add command can be used to modify the following attributes
    of a particular routing circuit reachable address entity:
    dte addresses, or permitted lan addresses.

4.1.2.1  –  dte_addresses

    Modifies the DTE Addresses attribute of the specified Reachable
    Address instance on a particular Routing Circuit to include
    at least the address or addresses specified.

    add  [node node-id] routing circuit circuit-name -
         reachable address simplename -
         dte addresses {address[,address...]}

    DTE Addresses

    Support: End,L2
    Default: No DTE addresses        Value: Set of DTE addresses

    A set of DTE addresses to which a call may be directed in order
    to reach an address that matches the address prefix of this
    reachable address.

    This characteristic is supported if the node is a level 2 router,
    where the owning circuit's characteristic type is one of the X.25
    circuit types, and the reachable address's characteristic type
    is outbound. It is also supported by end nodes operating over an
    x25 da circuit. You can modify this characteristic only when the
    entity is disabled.

4.1.2.2  –  permitted LAN addresses

    Modifies the Permitted LAN Addresses attribute of the specified
    Reachable Address instance on a particular Routing Circuit to
    include at least the address or addresses specified.

    add  [node node-id] routing circuit circuit-name -
         reachable address simplename -
         permitted lan addresses {address[,address...]}

    Permitted LAN Addresses

    Support: End
    Default: No LAN addresses        Value: Set of LAN addresses

    This is a set of LAN addresses corresponding to routers that
    are permitted to be used for forwarding to this prefix.  This
    attribute is supported only if the Type characteristic is set
    to "filter" on broadcast circuits only.  At least one LAN
    address is required.

    Example:

    add routing circuit csmacd-1 reachable address to-bulean -
         permitted lan addresses {aa-00-04-00-23-45}

4.2  –  manual_area_addresses

    Modifies the Manual Area Addresses attribute of the Routing
    entity to include at least the specified area or areas.

    add [node node-id] routing manual area addresses -
         {area[,area...]}

    Manual Area Addresses

    Support: L1,L2
    Default: No area addresses        Value: Set of area addresses

    Area addresses to be used for this node. An area address cannot
    be a Phase IV address or the address DefaultArea.

    If the characteristic manual L1 algorithm has the value routing
    vector, this set must be empty, and the characteristic phase iv
    address must not be 0.0. If the characteristic phase iv address
    is 0.0, there must be at least one area address.

4.3  –  manual_network_entity_titles

    Modifies the Manual Network Entity Titles attribute of the Routing
    entity to include at least the specified NET or NETs.

    add [node node-id] routing manual network entity -
         titles {NET[,NET...]}

    Manual Network Entity Titles

    Support: End
    Default: No NETs       Value: Set of NETs

    Network entity titles (NETs) to be used for this node. If the
    characteristic dna address format is set to false, there must be
    at least one NET.

    Example:

    add routing -
        manual network entity titles {49::00-04:AA-00-04-00-45-13:00}

5  –  session_control

    Select application for the add command that modifies the addresses
    of a session control application.

    Select proxy for the add commands that modify the application
    and source end users attributes of a session control proxy.

5.1  –  application

    Modifies the Addresses attribute of the specified Session Control
    Application instance to include at least the specified object name(s)
    and/or number(s).

    add  [node node-id] session control -
         application application-name -
         addresses {object-name-or-number[,object-name-or-number...]}

    Addresses

    Default: Empty set     Value: Set of end-user specifications

    A set of end-user specifications, any one of which, when
    specified in the destination name field of an incoming connection
    request, causes applications defined by this entity to be
    invoked.

    You can identify an application with an object name or an object
    number.  Usually, applications are identified by network object
    number 0, but you can optionally assign it a nonzero object number,
    in the range from 128 to 255.  A nonzero object number can be
    specified without an application name.  Object numbers 1 through
    127 are reserved for use by HP.  Specific network services
    are identified by nonzero object numbers; for example, 27
    represents the mail utility.

    Examples:

    add session control application mail addresses {number=27}

    add session control application task addresses {name=task}

5.2  –  proxy (Tru64 UNIX)

    The add command can be used to modify the following attributes
    of a session control proxy:  application, or source end users.

5.2.1  –  application

    add  [node node-id] session control proxy name -
          application {simplename[,simplename...]}

    Application

    Default: None	Value: Set of simple-name

    Set of application identifiers, one of which must match the
    application requested. If this attribute value is null, any
    requested application will match.

5.2.2  –  source_end_users

    add  [node node-id] session control proxy name -
          source end users {record[,record...]}

    Source End Users

    Default: None	Value: Set of record

    Set of remote end users for whom this proxy entry applies. An
    unspecified end user implies all end users on the node specified
    in the same record. The record format has two fields: node which
    has a data type of fullname, and end user which has a data type
    of enduserspecification.

6  –  x25_access

    Select application for the add command that modifies the filters
    of an x25 access application.

    Select dte_class for the add command that modifies the local dtes
    of an x25 access dte class.

    Select security_dte_class for the add command that modifies the
    rights identifiers of an x25 access security dte class remote dte.

    Select template for the add command to modify the rpoa sequence
    of an x25 access template.

6.1  –  application

    Modifies the Filters attribute of the specified X25 Access
    Application instance to include at least the specified name or
    names.

    add  [node node-id] x25 access application application-name -
          filters {name[,name...]}

    Filters

    Default: None             Value: Set of names

    Set of filters that are associated with filtering calls for
    either X.25 or X.29 applications represented by this entity.

    Example:

    add x25 access application X29_LOGIN filters {X29}

6.2  –  dte_class

    Modifies the Local DTEs attribute of the specified X25 Access
    DTE Class instance to include at least the specified DTE name or
    names:

    add [node node-id] x25 access dte class class-name -
        local dtes {dte-name[,dte-name...]}

    Local DTEs

    Default: No names      Value: Set of DTE names

    Names of the local x25 protocol dte entities that belong to this
    DTE class. Note that these DTE entities need not exist when their
    names are entered in this set; DTEs that do not exist when the
    DTE class is used are not considered when the DTE class is used
    for an outgoing call.

    If an x25 protocol dte entity has status attribute state set to
    running when its name is added to local dtes, you must disable
    the DTE entity and reenable it (see the disable x25 protocol dte
    and enable x25 protocol dte commands) in order for the DTE to be
    considered when this DTE class is used for an outgoing call.

    You can specify this characteristic only for DTE classes with
    characteristic type local.

    Example:

    add x25 access dte class dte-0 local dtes {dte-0,dte-1}

6.3  –  security_dte_class

    Modifies the Rights Identifiers attribute of the specified
    Remote DTE instance for a given X25 Access Security DTE Class
    to include at least the specified identifier name or names.

    add  [node node-id] x25 access security dte class class-name -
         remote dte dte-name  rights identifiers {name[,name...]}

    Rights Identifiers

    Default: No rights identifiers     Value: Set of names

    Rights identifiers possessed by this remote DTE. Wildcards can be
    used in the identifiers that form part of each Access Control
    Entry (ACE) in an Access Control List (ACL). It is used for
    incoming call checking against the ACL attribute of a security
    filter entity that is used to guard a filter.

    Example:

    add x25 access security dte class default -
         remote dte MATCHALL -
         rights identifiers {PSI$OPEN_SECURITY}

6.4  –  template

    Modifies the RPOA Sequence attribute of a given X25 Access
    Template instance to include at least the specified DTE
    address or addresses.

    add  [node node-id] x25 access template template-name -
          rpoa sequence {dte-address[,dte-address...]}

    RPOA Sequence

    Default: No DTE addresses       Value: Set of DTE addresses

    Private Operating Agency sequence of transit networks to be used
    in setting up the call. Format the values to specify a set of
    DTE addresses. Each DTE address is four digits long. An empty set
    indicates that no sequence is included in the outgoing call.

    Example:

    add x25 access template "OSI Transport" -
          rpoa sequence {%x9999,%x8888}

7  –  x25_protocol

    Select dte for the add command that modifies the outgoing list
    of an x25 protocol dte.

    Select group for the add command that modifies the members of an
    x25 protocol group.

7.1  –  dte

    Modifies the Outgoing List attribute of a given X25 Protocol
    DTE instance to include at least the specified range or ranges.

    add  [node node-id] x25 protocol dte dte-name -
          outgoing list {range[,range...]}

    Outgoing List

    Default: [1...4095]    Value: Set of range (0-4095)

    Channel number ranges that define the LCNs that are available
    for calls on outgoing or two-way channels. Format the values to
    specify a set of channel number ranges. Each channel number is
    the concatenation of the logical channel group number and logical
    channel number of an SVC on the DTE.

    Example:

    add x25 protocol dte dte-0 outgoing list {[10..4095]}

7.2  –  group

    Modifies the Members attribute of a given X25 Protocol Group
    instance to include at least the specified member record or
    records.

    add  [node node-id] x25 protocol group group-name -
          members {record[,record...]}

    Members

    Default: No DTEs       Value: Set of records

    DTEs at a gateway system that make up the group. Format the
    values to specify a set of records. Each record consists of a
    name that identifies an X25 protocol dte entity and an integer
    (in the range 0 to 9999) that identifies the CUG number assigned
    by the network. If a DTE is already created and enabled and is
    then added to the set of members, it must be disabled and re-
    enabled to service the specified CUG number or BCUG.

    Example:

    add x25 protocol group group1 -
          members {[dte = dte-1, index = 4444], -
                   [dte = dte-0, index = 8787]}

8  –  x25 relay (Alpha)

    Select client for the add commands that modify the filters and
    rights identifiers attributes of an x25 relay client.

    Select pvc for the add command that modifies the rights identifiers
    of an x25 relay pvc.

8.1  –  client

8.1.1  –  filters

    Modifies the Filters attribute of a given X25 Relay Client
    instance to include at least the specified filter or
    filters.

    add  [node  node-id] x25 relay client client-name -
          filters {simplename[,simplename...]}

    Filters

    Default: No filters    Value: Set of simple names

    Set of filters that are listened to by this client. Each name
    is the name of an x25 access filter entity. For the add and set
    commands, the x25 relay client entity must be in the Off state
    before the filters attribute can be modified.

8.1.2  –  rights_identifiers

    Modifies the Rights Identifiers attribute of a given X25 Relay
    Client instance to include at least the specified identifier
    name or names.

    add  [node  node-id] x25 relay client client-name -
          rights identifiers {simplename[,simplename...]}

    Rights Identifiers

    Default: No rights     Value: Set of simple names
    identifiers

    Set of rights identifiers that this client possesses. It is used
    when placing the outgoing call.

8.2  –  pvc

    Modifies the Rights Identifiers attribute of a given X25 Relay
    Permanent Virtual Circuit instance to include at least the
    specified identifier name or names.

    add  [node  node-id] x25 relay pvc pvc-name -
         rights identifiers {simplename[,simplename...]}

    Rights Identifiers

    Default: No rights identifiers    Value: Set of simple names

    Rights identifiers possessed by this entity. These rights are
    used to access the local PVC and relayed PVC if it resides on
    the local system.

9  –  x25_server

    Select client for the add command that modifies the filters
    of an x25 server client.

    Select security_nodes for the add commands that modify the
    rights identifiers or nodes attributes of an x25 server
    security nodes entity.

9.1  –  client

    Modifies the Filters attribute of a given X25 Server Client
    instance to include at least the specified filter or filters.

    add  [node node-id] x25 server client simple-name -
         filters {simplename[,simplename...]}

    Filters

    Default: No default    Value: Set of simple names

    Set of filters to be used by the server to filter calls for
    this X.25 client. Each name is the name of an x25 access filter
    entity.

9.2  –  security_nodes

    The add command can be used to modify the nodes and rights
    identifiers attributes of an x25 server security nodes entity.

9.2.1  –  nodes

    Modifies the Nodes attribute of a given X25 Server Security
    Nodes instance to include at least the specified fullname or
    fullnames.

    add  [node node-id] x25 server security nodes simple-name -
          nodes {fullname[,fullname...]}

    Nodes

    Default: No node names       Value: Set of full-name

    DNS full names of accessing systems, or the wildcard full name.
    Note, when managing entities on an OpenVMS system, this name must
    be a Phase IV node name.

9.2.2  –  rights_identifiers

    Modifies the Rights Identifiers attribute of a given X25 Server
    Security Nodes instance to include at least the specified
    identifier name or names.

    add  [node node-id] x25 server security nodes simple-name -
          rights identifiers {simplename[,simplename...]}

    Rights Identifiers

    Default: No rights identifiers     Value: Set of simple names

    Set of rights identifiers to be associated with the set of nodes
    named in the nodes characteristic for purposes of access control
    to DTE classes at the gateway node.
Close Help