z/OS Communications Server: SNA Customization
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Command verification exit routine

z/OS Communications Server: SNA Customization
SC27-3666-00

The example that follows is intended as an educational tool. It shows how a command verification exit routine can be used to control VTAM® functions. The code in this example is only part of a complete exit routine and will not work as presented here.

You can use a command verification exit to screen commands that affect critical nodes in your network. If you use the exit for this function, include a list of critical nodes in the exit. The following sample code illustrates how the exit routine can be coded to perform the screening function. The sample code also illustrates how you can create the list of critical nodes.

In this sample, if the node's ID is in the list of critical nodes, but the OVERRIDE=YES option is not specified on the command, the exit does not modify the command.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014