We have multiple interfaces. The general public does not know about the others.
I monitor them on occasion. If some unauthorized user is using them an explanation is forth coming.

-----Original Message-----
From: MIDRANGE-L <midrange-l-bounces@xxxxxxxxxxxxxxxxxx> On Behalf Of Rob Berendt
Sent: Wednesday, May 15, 2019 3:27 PM
To: Midrange Systems Technical Discussion <midrange-l@xxxxxxxxxxxxxxxxxx>
Subject: RE: Perm vs Temp PTF applies

Well, renaming the entry in the corporate DNS to point to a different IP address as served up on our HA machine, and, ending the TCP/IP interface and setting it to not start up on startup is a big start.

Also, when you slip install like this you will be doing a Manual IPL which steps you through a whole bunch of stuff and you could change startup stuff with that also.

I do four IPLs during this process.
The first IPL is set up to come up in restricted state and is done to permanently apply PTF's.
The second IPL is the slip install. I do not set that to come up in restricted state just in case the install process likes to do some post IPL stuff. (Manual IPL).
The third IPL is the cume IPL. I do not set that to come up in restricted state. Not that it happens during a slip install but in a normal upgrade this would be when the INZSYS would run and you really want to let that run.
Then I bring it down into restricted state, do a full system save, and perform the fourth IPL.

-----Original Message-----
From: MIDRANGE-L <midrange-l-bounces@xxxxxxxxxxxxxxxxxx> On Behalf Of Kevin Monceaux
Sent: Wednesday, May 15, 2019 3:07 PM
To: Midrange Systems Technical Discussion <midrange-l@xxxxxxxxxxxxxxxxxx>
Subject: Re: Perm vs Temp PTF applies

Rob,

On Wed, May 15, 2019 at 05:49:53PM +0000, Rob Berendt wrote:

I never review the cover letters. This may make some gasp but I just don't.

It's encouraging to hear that that approach can work.

A little while back I went through a slip LIC install followed by applying the cume PTF group then the "all groups except cume PTF groups" groups on a retired i5 box to get more familiar with the process. I was adventurous and didn't review any cover letters then. But I'm not sure if I'm ready to be that adventurous on a box that isn't retired.

I would not let a single user on after slipping the lic before
applying the latest cume and groups.

That's what I suspected. What technique do you use to prevent users from accessing the system? The first thing that comes to mind would be to set the startup program system value to *NONE.




As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.