Previous topic |
Next topic |
Contents |
Glossary |
Contact z/OS |
PDF
Diagnostic TCP/IP commands Networking on z/OS |
|
Commands used to display TCP/IP and network information include NETSTAT, PING, and TRACERTE. The following commands can be issued from an ISPF/TSO session. By omitting
the TSO prefix, the same commands can be entered at a UNIX System Services
prompt. However, the command must be in lower case. The UNIX command options
for Netstat are shown in parentheses.
Alternatively, these commands can be issued at the z/OS console using a
syntax such as:
DISPLAY TCPIP,tcpproc,NETSTAT,ROUTE Other commands that are available for network diagnostics (either from
a ISPF/TSO environment or from UNIX System Services) are:
Figure 1 illustrates a sample of these commands placed into a batch job. The batch output can be kept for further analysis. Figure 1. Statistics JCL
//NETSTAT JOB 1,REGION=0M //NETSTAT EXEC PGM=IKJEFT01 //SYSPRINT DD SYSOUT=* //SYSTSPRT DD DSN=hlq.NETSTAT.OUTPUT,DISP=SHR //SYSTERM DD DUMMY //SYSTSIN DD * NETSTAT CONFIG NETSTAT DEV NETSTAT ROUTE NETSTAT STATS NETSTAT BYTE NETSTAT SOCKETS NETSTAT CLIENT PING 127.0.0.1 /* Notice the program executed in this sample, IKJEFT01. IKJEFT01 executes in TSO, which means this NETSTAT command is really running in a batch TSO environment. Figure 2 shows NETSTAT ROUTE command output. Figure 2. NETSTAT ROUTE
output
Destination Gateway Flags Refcnt Interface ----------- ------- ----- ------ --------- Default 9.12.4.92 UGS 000001 OSA23A0LNK 9.12.4.0/23 0.0.0.0 US 000000 OSA23A0LNK 9.12.4.20/32 0.0.0.0 UH 000000 OSA23A0LNK 9.12.4.21/32 0.0.0.0 UH 000000 STAVIPA1LNK 10.1.100.0/24 0.0.0.0 US 000000 IQDIOLNK0A016404 10.1.100.4/32 0.0.0.0 H 000000 EZASAMEMVS 10.1.100.4/32 0.0.0.0 UH 000000 IQDIOLNK0A016404 Following is an explanation of the flags in the NETSTAT output.
Figure 3 shows the command output from a NETSTAT HOME command. Figure 3. NETSTAT
HOME output
Home address list: Address Link Flg ------- ---- --- 9.12.4.20 OSA23A0LNK P 9.12.4.21 STAVIPA1LNK 10.1.100.4 EZASAMEMVS 10.1.100.4 IQDIOLNK0A016404 10.1.100.4 EZAXCF47 10.1.100.4 EZAXCF48 10.1.100.4 EZAXCF52 10.1.100.4 EZAXCF49 10.1.100.4 EZAXCF54 10.1.100.4 EZAXCF55 10.1.100.4 EZAXCF69 127.0.0.1 LOOPBACK
The interfaces beginning with EZAXCF all have the same IP address and represent various dynamic XCF links to other TCP/IP stacks running on other LPARs within the sysplex. |
Copyright IBM Corporation 1990, 2010
|