A.4.2 Description

crmlkon starts all of the CRM links named on the command line. This command is useful if one or more individual links failed to start when the CRM server booted. Use this command from any machine located on the same TCP/IP network as the machine running the CRM server. When used in a script, crmlkon will return 0 if the command could be sent to the target CRM. It will return 1 if the command could not be sent to the target CRM.

-n
Names the machine and port running the CRM server; indicates that the parameters immediately following are the hostname and port of the machine running the CRM where the linkname is located.
-v
Specifies verbose. Normally the command will not produce any messages, facilitating use in a script.
-i
Ignores errors. When specifying multiple links, any error encountered when issuing CRM commands will cause crmlkon to stop processing links and return. Errors can be ignored for individual links and processing continued with the next named link.
-u
Establishes that process authentication is in effect for communications between this process and the CRM.
<keyfile>
Is the location of a file containing a hash key known to both this process and the CRM. The file contains a single line specifying a unique hash key (limited to eight characters). The file should be protected.
<linkname>
Names the link to be started. This is the DM_SNALINKS entry in the DMCONFIG that defines this link. Multiple link names can be specified.
<hostname:port>
Specifies the IP host name and port of the machine running the CRM where the linkname is located.
h
Invokes a help screen that shows the syntax usage for this command.
-S <ssl_config_file>
Indicates the path to a file that contains SSL configuration, similar to ubbconfig. The following settings must be included in this file:
  • The principal name of the Oracle SSL wallet: SEC_PRINCIPAL_NAME=ISH_tuxqa
  • The location of Oracle SSL wallet: SEC_PRINCIPAL_LOCATION=/scratch/username/CRM/bin/wallet
  • The wallet password: SEC_PRINCIPAL_PASSVAR=abcd1234
  • Set the SSL trace level: SEC_TRACE_LEVEL=3
-N <type>:<min>:<max>
Establishes that encryption is in effect for this process. Encryption type, currently, the valid entries are GPE (for general purpose encryption) and SSL.

For GPE:

min Designates the minimum number of bits to be used for encryption. These levels are used during the negotiation between the CRM and client process. Any number is acceptable, but the negotiated values resolve to 0, 56, or 128.

max Designates the maximum number of bits to be used for encryption. These levels are used during the negotiation between the CRM and client process. Any number is acceptable, but the negotiated values resolve to 0, 56, or 128

For SSL:

min Determines the minimum number of bits of cipher suite to be used for SSL encryption. They are used during the SSL negotiation between the CRM and GWSNAX. It must be less than or equal to 256. The negotiated values resolve to 128 or 256. The strongest supported cipher suite is used finally.

max Determines the maximum number of bits of cipher suite to be used for SSL encryption. They are used during the SSL negotiation between the CRM and GWSNAX. The negotiated values resolve to 128 or 256. The strongest supported cipher suite is used finally.