VMS IP Commands for TCP/IP Services

As the system administrator ("SYSTEM"), one can use and maintain TCP/IP services in various ways. The below are all CLI commands with DCL. Note that exclamation marks, i.e. "!", denote comments relating to VMS IP address commands.

VMS IP commands

To display the current configuration, the most rapid way would be by invoking the following command in the command line: $ SHOW NETWORK

With the following, detailed information is shown for the TCP/IP configuration(s) in particular: $ SHOW NETWORK /FULL "TCP/IP" This command will also list active ports in use.

A computer screen prepared for VMS TCP/IP commands

One of the most common - and probably easiest - ways of setting up TCP/IP networking is with the following utility: $ @SYS$SYSROOT:[SYSMGR]TCPIP$CONFIG.COM

Or, via the UNIX-like command: $ TCPIP

So, for example:
$ TCPIP IFCONFIG (...) ! whatever ! desired ! options & ! values
$ TCPIP PING ! just as an ! example

All the Ethernet adapters should typically be listed as EW* devices, which can be found by typing: $ SHOW DEVICES EW</code?

With advanced descriptions, add the /FULL qualifier, like so: $ SHOW DEVICES /FULL EW

For just one device, say EWA0: $ SHOW DEVICE /FULL EWA0

Alternatively, this also works: $ TCPIP SHOW INTERFACES /FULL $ TCPIP IFCONFIG -A


OpenVMS/VMS has been around since 1977. Despite the operating system being over 30 years old, there's never been a known instance of a VMS hack or a VMS virus. Consequently, high profile systems run on VMS since they are built with security from the ground up.

However, HP has announced the end of its support for OpenVMS. In light of this announcement, the current estimate of 2500 customers will probably diminish. Certainly there will be some diehard OpenVMS users that will refuse to give up on the operating system.

Much like old versions of other operating systems, there's always those who remain nostalgic and keep what's working around. Due to the lack of VMS popularity and also the fact that users aren't familiar with the operating system, it is unlikely to be hacked. In conclusion, from the standpoint of VMS users, it may not always be best to keep up with the newest and brightest tech operating systems.

*Special thanks to Marco Gariboldi!