pcf man page on HP-UX

Man page or keyword search:  
man Server   10987 pages
apropos Keyword Search (all sections)
Output format
HP-UX logo
[printable version]

pcf(4)									pcf(4)

NAME
       pcf - port configuration file used by DDFA software

Description
       A  port configuration file is used by the Datacommunications and Termi‐
       nal Controller Device File Access (DDFA) software to configure individ‐
       ual terminal server ports.  The generic name of the template file is In
       practice, it is renamed for each port that needs	 different  configura‐
       tion  values  and  the  values are altered appropriately for the device
       attached to the port.  A port configuration file is  referenced	by  an
       entry  in the Dedicated Ports file The Dedicated Port Parser parses the
       file and spawns an Outbound Connection Daemon for each valid  entry  in
       the  file.   A valid entry is one in which the fourth field is the name
       of a port configuration file.

       The master port configuration file is and it should only be  referenced
       in  the	file  if  the  default	values it contains are correct for the
       ports.  If different values are needed, should  be  copied  to  another
       directory  and  the copy should be modified and referenced in the file.
       The recommended procedure is to create a directory  to  hold  the  port
       configuration files and the modified file.

       See ddfa(7) for more information on how to configure the DDFA software.

       A  port configuration file consists of the names of variables and their
       values.	The variables are shown terminated by a colon but this is  not
       mandatory.   A  variable	 and  its  value can be separated by spaces or
       tabs.  Only one variable-value pair is  allowed	per  line.   Only  the
       value should be altered.	 The variable name should not be changed.

       A file contains the following information:

       This can have the value
			   or  When it is enabled, data transfer over the net‐
			   work uses the  Telnet  protocol.   This  option  be
			   enabled for a DTC.

       This can have the value
			   or When it is enabled, a telnet timing mark negoti‐
			   ation is sent to the terminal server after all user
			   data	 has  been  transferred.  waits for a reply to
			   the timing mark negotiation before closing the con‐
			   nection.   This ensures that all data has been out‐
			   put from the terminal server to the	device	before
			   the	buffers are flushed.  It should be enabled for
			   a DTC.

       This defines the time in seconds
			   during which the software waits for a  response  to
			   the	telnet timing mark and binary negotiation.  If
			   the timer expires, an error message	is  logged  to
			   and	the  error is transmitted to the user applica‐
			   tion.

       This can have the value
			   or When it is enabled, data transfer over the  net‐
			   work	 is  in	 binary	 mode and treatment of special
			   characters (such as XON/XOFF) is disabled.

			   Due to the absence of flow control, data  integrity
			   cannot be guaranteed when is enabled.

			   Note that even if is disabled, it can be negotiated
			   at any time by the application setting  to  in  the
			   data structure.

       This defines the number of times the software
			   tries  to  open  a connection before giving up.  If
			   the	value  is  the	software   tries   ``forever''
			   (approximately  68  years).	 If  the retry process
			   fails, an error message is logged to and the	 error
			   is transmitted to the user application.

			   The retry process can be interrupted by sending the
			   signal to the process using

			   Note that if the application exits after asking  to
			   open the connection to the terminal server, contin‐
			   ues trying to open until the combination of the and
			   are exceeded.

       This defines the time in seconds between open tries.
			   If  the  value  is uses an exponential retry period
			   algorithm up to 32 seconds (i.e., 1 2 4 8 16 32  32
			   32 ...).

       This defines the time in seconds
			   between  the	 close call made by the application on
			   the pty slave and the moment when the connection is
			   actually  closed.  Setting this value to, for exam‐
			   ple, 5 seconds avoids the overhead of  opening  and
			   closing  the	 connection when a spooler spools sev‐
			   eral files at a time.  Setting a sufficiently  high
			   value effectively leaves the connection permanently
			   open.

       This can have the value
			   or When it is enabled, the software sends a	status
			   request  to	the  device  attached  to the terminal
			   server and processes the reply as follows:
				continues processing.

				retries within the limits of the status timer.

				retries within the limits of the status timer.

				retries within the limits of the status timer.

				retries within the limits of the status timer.

       This defines the time in seconds
			   during which the software waits for	the  reply  to
			   the status request.	If the timer expires, an error
			   message is logged to and the error  is  transmitted
			   to the user application.

       This can have the value
			   or  Normally,  data bytes processed by the pty have
			   bit 7 stripped.  If is enabled,  the	 stripping  is
			   disabled.  If is disabled, stripping is enabled and
			   bit 7 is stripped.  This can also  be  achieved  by
			   changing  the  termio  structure  of	 the pseudonym
			   using ioctl() commands.

       This can have the value
			   or When it is enabled, data is sent to the  LAN  as
			   it is received.  It can be disabled if the software
			   is sending  packets	faster	than  the  server  can
			   accept them.

       The default values are:

WARNINGS
       In  order  to  ensure  that  commands  (such as ps) display the correct
       device file name (that is, the pseudonym),  all	pseudonyms  should  be
       placed into the directory If pseudonyms are not specified for placement
       in this directory, the correct display of device file names  with  many
       commands is not guaranteed.

       In  addition,  in  order to ensure that commands (such as and work cor‐
       rectly, each pseudonym must  be	unique	in  its	 first	17  characters
       (including  the	directory prefix If pseudonyms are not unique in their
       first 17 characters, the correct functioning of many  commands  is  not
       guaranteed.

FILES
SEE ALSO
       dpp(1M), ocd(1M), ocdebug(1M), dp(4), ddfa(7).

									pcf(4)
[top]

List of man pages available for HP-UX

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net