[ Previous | Next | Table of Contents | Index | Library Home | Legal | Search ]

System Management Guide: Communications and Networks


Table of Contents

About This Book

  • Who Should Use This Book
  • Highlighting
  • ISO 9000
  • Related Publications
  • Trademarks
  • Chapter 1. Communications and Networks Overview

  • Communications Functions Introduction
  • Network Introduction
  • Physical Networks Introduction
  • System Communications Support
  • Protocols
  • Addresses
  • Domains
  • Gateways and Bridges
  • Routing
  • Local and Remote Nodes
  • Client and Server
  • Communicating with Other Operating Systems
  • Chapter 2. Mail

  • Mail Management Tasks
  • Configuring the /etc/rc.tcpip File to Start the sendmail Daemon
  • Managing Mail Aliases
  • /etc/mail/aliases File
  • Creating Local System Aliases for Mail
  • Building the Alias Database
  • Managing the Mail Queue Files and Directories
  • Printing the Mail Queue
  • Mail Queue Files
  • q Control File
  • Specifying Time Values in sendmail
  • Forcing the Mail Queue
  • Setting the Queue Processing Interval
  • Moving the Mail Queue
  • Starting the sendmail Daemon
  • Stopping the sendmail Daemon
  • Managing Mail Logging
  • Managing the Log
  • Logging Traffic
  • Logging Mailer Statistics
  • Displaying Mailer Information
  • Debugging sendmail
  • Internet Message Access Protocol (IMAP) and Post Office Protocol (POP)
  • Configuring IMAP and POP Servers
  • Prerequisites
  • Procedure
  • Running Configuration Tests
  • syslog Facility
  • Mail Reference
  • List of Mail Commands
  • List of Mail Files and Directories
  • Using the Mail Program
  • Using the sendmail Command
  • List of Internet Message Access Protocol and Post Office Protocol Commands
  • Chapter 3. Transmission Control Protocol/Internet Protocol

  • Planning Your TCP/IP Network
  • Installation and Configuration for TCP/IP
  • Configuring TCP/IP
  • Configuring Hosts
  • Configuring Hosts as Servers
  • Configuring Gateways
  • TCP/IP System Manager Commands
  • Configuring a TCP/IP Network Checklist
  • Prerequisites
  • Procedure
  • TCP/IP Protocols
  • Internet Protocol (IP) Version 6 Overview
  • Expanded Routing and Addressing
  • Routing Simplification
  • Header Format Simplification
  • Improved Quality-of-Service/Traffic Control
  • Tunneling
  • IPv6 Security
  • IPv6 Multihomed Link-Local and Site-Local Support
  • Packet Tracing
  • Network Interface Packet Headers
  • Ethernet Adapter Frame Headers
  • Token-Ring Frame Headers
  • 802.3 Frame Headers
  • Internet Network-Level Protocols
  • Address Resolution Protocol
  • Internet Control Message Protocol
  • Internet Control Message Protocol Message Types
  • Internet Protocol
  • Internet Transport-Level Protocols
  • User Datagram Protocol
  • Transmission Control Protocol
  • TCP Header Field Definitions
  • Internet Application-Level Protocols
  • Domain Name Protocol
  • Exterior Gateway Protocol
  • Autonomous Systems
  • EGP Message Types
  • File Transfer Protocol
  • Telnet Protocol
  • Trivial File Transfer Protocol
  • Name/Finger Protocol
  • Distributed Computer Network Local-Network Protocol
  • Remote Command Execution Protocol
  • Remote Login Protocol
  • Remote Shell Protocol
  • Routing Information Protocol
  • Time Server Protocol
  • Assigned Numbers
  • TCP/IP Local Area Network Adapter Cards
  • Installing a Network Adapter
  • Configuring and Managing Adapters
  • Configuring and Using Virtual Local Area Networks (VLANs)
  • Troubleshooting
  • Restrictions
  • Using ATM Adapters
  • ATM Technology
  • ATM Connections
  • TCP/IP over ATM
  • Configuring an ATM Adapter
  • ATM Adapter Statistics
  • Additional Microchannel ATM Statistics
  • PCI ATM Adapter Specific Statistics
  • TCP/IP Network Interfaces
  • Automatic Configuration of Network Interfaces
  • Ethernet Default Configuration Values
  • 802.3 Default Configuration Values
  • Token-Ring Default Configuration Values
  • SLIP Default Configuration Values
  • Serial Optical Default Configuration Values
  • ATM Default Configuration Values
  • Implications of Multiple Network Interfaces on the Same Network
  • Managing Network Interfaces
  • Interface-Specific Network Options
  • Example
  • TCP/IP Addressing
  • Internet Addresses
  • Class A Addresses
  • Class B Addresses
  • Class C Addresses
  • Internet Addresses Using Zeros
  • Subnet Addresses
  • Subnet Masks
  • Address Comparison
  • Broadcast Addresses
  • Local Loopback Addresses
  • TCP/IP Address and Parameter Assignment - Dynamic Host Configuration Protocol (DHCP)
  • The DHCP Server
  • The DHCP Database
  • The DHCP Protocol Engine
  • DHCP Threaded Operations
  • Planning DHCP
  • Configuring DHCP
  • The Configuration File
  • Customizing a Configuration File
  • DHCP and the Dynamic Domain Name System (DDNS)
  • DHCP Compatibility with Older Versions
  • DHCP Server File Known Options
  • Preboot Execution Environment (PXE) Vendor Container Suboption
  • Configuration File Examples Supporting PXE Clients
  • DHCP Server File Syntax for General Server Operation
  • DHCP Server File Syntax for db_file Database
  • DHCP and Network Installation Management (NIM) Suggestions
  • Preboot Execution Environment Proxy DHCP Daemon (pxed)
  • The PXE Proxy DHCP Server
  • The PXED Database
  • The PXED Protocol Engine
  • PXED Threaded Operations
  • Configuring the PXED Server
  • The Configuration File
  • PXE Vendor Container Suboptions
  • PXED Server File Syntax for General Server Operation
  • PXED Server File Syntax for db_file Database
  • Boot Image Negotiation Layer Daemon (BINLD)
  • The BINLD Server
  • The BINLD Database
  • The BINLD Protocol Engine
  • BINLD Threaded Operations
  • Configuring BINLD
  • The Configuration File
  • BINLD Server File Syntax for General Server Operation
  • BINLD Server File Syntax for db_file Database
  • Configuring TCP/IP
  • Prerequisites
  • Updating the Hosts List
  • TCP/IP Daemons
  • Subsystems and Subservers
  • System Resource Control (SRC)
  • SRC Commands
  • Configuring the inetd Daemon
  • Client Network Services
  • Server Network Services
  • TCP/IP Name Resolution
  • Naming
  • Naming Authority
  • Naming Conventions
  • Choosing Names for the Hosts on Your Network
  • Name Servers
  • Name Resolution
  • Reverse Address Resolution Protocol
  • Performing Local Name Resolution (/etc/hosts)
  • Planning for DOMAIN Name Resolution
  • Configuring Name Servers
  • Configuring a Master Name Server
  • Configuring a Slave Name Server
  • Configuring a Hint Name Server
  • Configuring a Domain Mail Server
  • Configuring a Forwarder
  • Configuring a Forward Only Name Server
  • Configuring a Host to Use a Name Server
  • Configuring Dynamic Zones on the DNS Name Server
  • Example
  • Planning and Configuration for LDAP Name Resolution
  • TCP/IP Routing
  • Static and Dynamic Routing
  • Gateways
  • Interior and Exterior Gateways
  • Gateway Protocols
  • Planning for Gateways
  • Consider the Number of Gateways to Use
  • Decide on the Type of Routing to Use
  • Configuring a Gateway
  • Restricting Route Use
  • Dead Gateway Detection
  • Manually Removing Dynamic Routes
  • Configuring the routed Daemon
  • Configuring the gated Daemon
  • Configuring the gated Daemon To Run IPv6
  • Getting an Autonomous System Number
  • Path MTU Discovery
  • SLIP
  • Configuring SLIP over a Modem
  • Configuring SLIP over a Null Modem Cable
  • Deactivating a SLIP Connection
  • Removing a TTY
  • Asynchronous Point-to-Point Protocol (PPP) Subsystem
  • User-Level Processes
  • Configuring the Asynchronous Point-to-Point Protocol
  • PPP and SNMP
  • Enabling PPP SNMP
  • TCP/IP Quality of Service (QoS)
  • QoS Models
  • Integrated Services
  • Differentiated Services
  • Supported Standards and Draft Standards
  • QoS Installation
  • QoS Configuration
  • Stopping and Starting the QoS Subsystem
  • Configuring the RSVP agent
  • Configuring the Policy Agent
  • QoS Problem Determination
  • Policy Specification
  • ReadFromDirectory
  • ServiceCategories
  • ServicePolicyRules
  • Guidelines for DiffServ Environments
  • Sample policyd Configuration File
  • policyd Configuration File
  • Loading Policies into IBM SecureWay Directory Server
  • LDAP Schema
  • System Configuration
  • Overlapping Policies
  • UDP usage
  • Policy Conflicts with RSVP Reservations
  • Token Bucket Depth Specification
  • Policy Modification
  • Standards Compliance
  • IntServ Model
  • DiffServ Model
  • IPv6 Support
  • Controlling the Policy Daemon
  • QoS Reference
  • Commands
  • Methods
  • TCP/IP Security
  • Operating System-Specific Security
  • Access Control
  • Auditing
  • Network Trusted Computing Base (NTCB)
  • Trusted Path, Trusted Shell, and Secure Attention Key (SAK)
  • TCP/IP-Specific Security
  • TCP/IP Command Security
  • Remote Command Execution Access (/etc/hosts.equiv)
  • Restricted File Transfer Program Users (/etc/ftpusers)
  • Trusted Processes
  • Network Trusted Computing Base (NTCB)
  • Data Security and Information Protection
  • TCP/IP Problem Determination
  • Communication Problems
  • Name Resolution Problems
  • Client Host
  • Name Server Host
  • Routing Problems
  • Other Possibilities
  • Problems with SRC Support
  • telnet or rlogin Problems
  • Screen Distortion
  • telnet Debugging
  • telnetd Daemon Debugging
  • Programs Using Extended Curses
  • Configuration Problems
  • Common Problems with Network Interfaces
  • Problems with a SLIP Network Interface
  • Problems with an Ethernet Network Interface
  • Problems with a Token-Ring Network Interface
  • Problems with a Token-Ring/Ethernet Bridge
  • Problems with a Token-Ring/Token-Ring Bridge
  • Problems with Packet Delivery
  • Communicating with a Remote Host
  • snmpd Response to Queries
  • Problems with Dynamic Host Configuration Protocol (DHCP)
  • TCP/IP Reference
  • List of TCP/IP Commands
  • List of TCP/IP Daemons
  • List of Methods
  • List of TCP/IP Files
  • List of RFCs
  • Chapter 4. Internet Protocol (IP) Security

  • IP Security Overview
  • Benefits of a Virtual Private Network (VPN)
  • IP Security and the Operating System
  • IP Security Features
  • IKE Features
  • Security Associations
  • Tunnels and Key Management
  • IKE Tunnel Support
  • Manual Tunnel Support
  • Native Filtering Capability
  • Digital Certificate Support
  • IP Security Installation
  • Loading IP Security
  • Planning IP Security Configuration
  • Tunnels versus Filters
  • Tunnels and Security Associations
  • Choosing a Tunnel Type
  • Using IKE with DHCP or Dynamically Assigned Addresses
  • Configuring IKE Tunnels
  • Basic Configuration Wizard
  • Advanced IKE Tunnel Configuration
  • Key Management Parameters and Policy
  • Data Management Parameters and Policy
  • Setting up, Key Management
  • Setting up, Data Management
  • Group Support
  • Activating a Tunnel
  • Command Interface to IKE Tunnel Creation
  • AIX IKE and Linux affinity
  • Examples of IKE Tunnel Configurations
  • Digital Certificate Configuration
  • Format of Digital Certificates
  • Security Considerations for Digital Certificates
  • Certificate Revocation Lists (CRLs)
  • Uses for Digital Certificates in Internet Applications
  • Digital Certificates and Certificate Requests
  • Using the IBM Key Manager Tool
  • Creating a Key Database
  • Adding a CA Root Digital Certificate
  • Establishing Trust Settings
  • Deleting a CA Root Digital Certificate
  • Requesting a Digital Certificate
  • Adding (Receiving) a New Digital Certificate
  • Deleting a Digital Certificate
  • Changing a Database Password
  • Creating IKE Tunnels using Digital Certificates
  • Configuring Manual Tunnels
  • Setting Up Tunnels and Filters
  • Creating a Manual Tunnel on Host A
  • Creating a Manual Tunnel on Host B
  • Setting Up Filters
  • Static Filter Rules and Examples
  • Autogenerated Filter Rules and User Specified Filter Rules
  • Predefined Filter Rules
  • Subnet Masks
  • Host-Firewall-Host
  • Logging Facilities
  • Labels in Field Entries
  • IP Security Problem Determination
  • Troubleshooting Manual Tunnel Errors
  • Troubleshooting IKE Tunnel Errors
  • IKE Tunnel Process Flow
  • IKE Logging
  • Parse Payload Logging Function
  • Digital Certificate and Signature Mode Problems
  • Tracing Facilities
  • ipsecstat
  • IP Security Reference
  • List of Commands
  • List of Methods
  • Chapter 5. TTY Devices and Serial Communications

  • TTY Overview
  • TERM Values for Different Displays and Terminals
  • Setting TTY Characteristics
  • Setting Attributes on the Attached TTY Device
  • Managing TTY Devices
  • Dynamic Screen Utility
  • dscreen Terminal Configuration Information File
  • Key Action Assignments
  • Select Keys
  • Block Keys
  • New Keys
  • End and Quit Keys
  • Previous Key
  • List Key
  • Dynamic Screen Assignment
  • dsinfo File
  • Entry Format for dsinfo
  • String Types
  • Example 1
  • Example 2
  • Modems
  • Modem Overview
  • Telecommunications Standards
  • ITU-TSS Communications Standards
  • MNP Communications Standards
  • Generic Modem Setup
  • Attaching the Modem with Appropriate Cables
  • Adding a TTY for the Modem
  • Configuring the Modem
  • Sending AT Commands with the cu Command
  • Sending AT Commands Using a C Program
  • Hayes and Hayes-Compatible Modems
  • Troubleshooting Modem Problems
  • Software Services Modem Questionnaire
  • AT Command Summary
  • S-Register Summary
  • Result Codes Summary
  • Dial modifiers
  • ATE Overview
  • Setting Up ATE Overview
  • Customizing ATE
  • Changing ATE Characteristics
  • Setting Up ATE
  • Prerequisites
  • Procedure
  • TTY Troubleshooting
  • Respawning Too Rapidly Errors
  • Possible Causes
  • Procedures for Recovery
  • Error Log Information and TTY Log Identifiers
  • Important Error Logging Files and Commands
  • Common Error Report Messages
  • Chapter 6. Micro Channel, ISA, and PCI Adapters

  • Micro Channel Wide Area Network (WAN) Adapters
  • Supported Multiport/2 Adapters
  • Supported Portmaster Adapters
  • Device Driver Support
  • Configuring Multiport/2 and Portmaster Adapters
  • Prerequisites
  • ISA/PCI Wide Area Network (WAN) Adapters
  • Multiport Model 2 Overview
  • Configuring the Multiport Model 2 Adapter
  • Multiport Model 2 Adapter Object Information and Attributes
  • Predefined Device Object Information
  • Predefined Connection Object Information
  • Predefined Attribute Object Information
  • Multiport Model 2 Power Management
  • Impact to External Connection - Network Provider
  • 2-Port Multiprotocol HDLC Network Device Driver Overview
  • Configuring the 2-Port Multiprotocol Adapter
  • ARTIC960HX PCI Adapter Overview
  • Configuring the MPQP COMIO Emulation Driver over the ARTIC960HX PCI Adapter
  • Chapter 7. Data Link Control

  • Generic Data Link Control Environment Overview
  • Meeting the GDLC Criteria
  • Implementing the GDLC Interface
  • Installing GDLC Data Link Controls
  • GDLC Interface ioctl Entry Point Operations
  • Service Access Point
  • Link Station
  • Local-Busy Mode
  • Short-Hold Mode
  • Testing and Tracing a Link
  • Statistics
  • GDLC Special Kernel Services
  • Managing DLC Device Drivers
  • Chapter 8. Basic Networking Utilities

  • BNU Overview
  • How BNU Works
  • National Language Support for BNU Commands
  • BNU File and Directory Structure
  • BNU Public Directories
  • BNU Configuration Files
  • BNU Administrative Directories and Files
  • BNU Lock Files
  • BNU Security
  • uucp Login ID
  • BNU Login IDs
  • Security and the Systems and remote.unknown Files
  • Security and the Permissions File
  • BNU Daemons
  • Using the uucico Daemon
  • Using the uusched Daemon
  • Using the uuxqt Daemon
  • Using the uucpd Daemon
  • Configuring BNU
  • Prerequisites
  • Information to Collect before Configuring BNU
  • Procedure
  • Setting Up Automatic Monitoring of BNU
  • Prerequisites
  • Procedure
  • Setting Up BNU Polling of Remote Systems
  • Prerequisites
  • Procedure
  • Using the /etc/uucp/Systems File
  • Editing Devices Files for Hardwired Connections
  • Prerequisites
  • Procedure to Set Up a System Name Entry
  • Procedure to Set Up a Direct Entry
  • Editing Devices File for Autodialer Connection
  • Prerequisites
  • Procedure
  • Editing Devices File for TCP/IP
  • Prerequisites
  • Procedure
  • Maintaining BNU
  • Working with BNU Log Files
  • Log Files in the .Log and .Old Directories
  • Other BNU Log Files
  • Systemwide Log Files used by BNU
  • BNU Maintenance Commands
  • Cleanup Commands
  • Status-checking Commands
  • Shell Procedures
  • Monitoring a BNU Remote Connection
  • Prerequisites
  • Procedure
  • Monitoring a BNU File Transfer
  • Prerequisites
  • Monitoring a File Transfer
  • Debugging BNU Problems
  • PHASE 1 Status Messages
  • PHASE 2 Status Messages
  • PHASE 3 Status Messages
  • PHASE 4 Status Messages
  • PHASE 5 Status Messages
  • PHASE 6 Status Messages
  • Debugging BNU Login Failures Using the uucico Daemon
  • Prerequisites
  • Procedure
  • Contacting Connected UNIX Systems Using the tip Command
  • tip Command Variables
  • tip Command Configuration Files
  • BNU Configuration Files
  • BNU Configuration for a TCP/IP Connection Example
  • Entries in the Local System Files
  • Entries in the Remote System's Files
  • BNU Configuration for a Telephone Connection Example
  • Entries on the Local System
  • Entries on the Remote System
  • BNU Configuration for a Direct Connection Example
  • Entries in the Local System's Files
  • Entries in the Remote System Files
  • BNU Files, Commands, and Directories Reference
  • BNU Directories
  • BNU Files
  • BNU Commands
  • BNU Daemons
  • Chapter 9. Network Management

  • SNMP for Network Management
  • SNMP Access Policies
  • SNMP Daemon
  • Configuring the SNMP Daemon
  • SNMP Daemon Processing
  • Message Processing and Authentication
  • Request Processing
  • Response Processing
  • Trap Processing
  • Generation of linkUp and linkDown Traps
  • SNMP Daemon Support for the EGP Family of MIB Variables
  • Examples
  • SNMP Daemon RFC Conformance
  • SNMP Daemon Implementation Restrictions
  • SNMP Daemon Logging Facility
  • Logging Directed from the snmpd Command Line
  • Logging Directed from the Configuration File
  • Logging by the syslogd Daemon
  • Problem Determination for the SNMP Daemon
  • Daemon Termination Problem
  • Daemon Failure Problem
  • MIB Variable Access Problem
  • MIB Variable Access in Community Entry Problem
  • No Response from Agent Problem
  • noSuchName Problem
  • Chapter 10. Network File System

  • Network File System Overview
  • NFS Services
  • NFS Access Control Lists (ACL) Support
  • Cache File System (CacheFS) Support
  • NFS Mapped File Support
  • Three Types of Mounts
  • NFS Mounting Process
  • /etc/exports File
  • /etc/xtab File
  • Implementation of NFS
  • Remote Procedure Call (RPC) Protocol
  • eXternal Data Representation (XDR) Protocol
  • The portmap Daemon
  • Controlling NFS
  • Change the Number of biod and nfsd Daemons
  • Change Command Line Arguments for Daemons Controlled by SRC
  • Start the NFS Daemons at System Startup
  • Start the NFS Daemons
  • Stop the NFS Daemons
  • Get the Current Status of the NFS Daemons
  • NFS Installation and Configuration
  • Checklist for Configuring NFS
  • Configuring an NFS Server
  • Configuring an NFS Client
  • Exporting an NFS File System
  • Unexporting an NFS File System
  • Changing an Exported File System
  • Enabling Root User Access to an Exported File System
  • Mounting an NFS File System Explicitly
  • Using AutoFS to Automatically Mount a File System
  • Establishing Predefined NFS Mounts
  • Unmounting an Explicitly or Automatically Mounted File System
  • Removing Predefined NFS Mounts
  • PC-NFS
  • PC-NFS Authentication Service
  • PC-NFS Print-Spooling Service
  • Configuring the rpc.pcnfsd Daemon
  • Starting the rpc.pcnfsd Daemon
  • Verifying the rpc.pcnfsd Daemon Is Accessible
  • WebNFS
  • Network Lock Manager
  • Network Lock Manager Architecture
  • Network File Locking Process
  • Crash Recovery Process
  • Starting the Network Lock Manager
  • Troubleshooting the Network Lock Manager
  • Secure NFS
  • Secrecy
  • Data Encryption Standard
  • Public Key Cryptography
  • Authentication
  • Secrecy in NFS
  • Public Key Cryptography for Secure NFS
  • Authentication Requirements
  • Authentication Process
  • Naming Network Entities for DES Authentication
  • /etc/publickey File
  • Booting Considerations of Public Key Systems
  • Performance Considerations
  • Administering Secure NFS Checklist
  • Configuring Secure NFS
  • Exporting a File System Using Secure NFS
  • Mounting a File System Using Secure NFS
  • NFS Problem Determination
  • Identifying Hard-Mounted and Soft-Mounted File Problems
  • Identifying NFS Problems Checklist
  • Asynchronous Write Errors
  • NFS Error Messages
  • nfs_server Error Message
  • mount Error Messages
  • Identifying the Cause of Slow Access Times for NFS
  • Checking Processes
  • Checking Network Connections
  • Setting MTU Sizes
  • Setting Transmit Queue Sizes
  • Fixing Hung Programs
  • Permissions and Authentication Schemes
  • Name Resolution on an NFS Server
  • Limitations on the Number of Groups in the NFS Structure
  • Mounting from NFS Servers That Have Earlier Version of NFS
  • Problems That Occur If the NFS Kernel Extension Is Not Loaded
  • NFS Reference
  • List of Network File System (NFS) Files
  • List of NFS Commands
  • List of NFS Daemons
  • Locking Daemons
  • Network Service Daemons and Utilities
  • Secure Networking Daemons and Utilities
  • Sun Diskless Client Support
  • NFS Subroutines
  • Chapter 11. AIX Fast Connect

  • AIX Fast Connect Overview
  • Features
  • Requirements
  • Server Hardware Requirements
  • Server Software Requirements
  • Client Hardware Requirements
  • Client Software Requirements
  • Known Conflicts with other Server Software
  • Migrating from AIX Connections
  • Packaging and Installation
  • Packaging
  • Installation
  • Configuration of Network Interfaces
  • Initial Configuration
  • Limitations
  • Windows Networking Concepts (NetBIOS, SMB, WINS)
  • AIX Fast Connect Configuration and Administration
  • Overview
  • Configurable Parameters
  • Configuration of File and Print Shares (Exports)
  • User Administration
  • Overview of User-Authentication Mechanisms
  • Configuring Encrypted Passwords
  • Basic Server Administration
  • Starting and Stopping the AIX Fast Connect Server
  • Showing Server Status Information
  • Web-based System Manager, SMIT fast paths, and net commands
  • NetBIOS Name Service (NBNS)
  • Configuring Client PCs for use with AIX Fast Connect
  • TCP/IP Configuration
  • Windows 95, Windows 98 Clients
  • Windows NT Clients
  • Windows 2000 Clients
  • Windows For Workgroups (Windows 3.11) Clients
  • OS/2 Clients
  • NetBIOS Name Resolution
  • Workgroups, Domains, and User Accounts
  • Enabling Windows Clients for Plain Text Passwords
  • Browsing the Network
  • Mapping Drives
  • Using AIX Fast Connect Printers
  • Support for Windows 2000 Clients
  • Support for Windows Terminal Server
  • Advanced AIX Fast Connect Features
  • AIX-based User Authentication (Plain Text Passwords)
  • CIFS Password Encryption Protocols
  • NT Passthrough Authentication
  • Network Logon to AIX Fast Connect
  • DCE/DFS Support
  • Guest Logon
  • Share-Level Security
  • User Name Mappings
  • AIX Fast Connect User Management and File Access
  • User-Session Management Using net session
  • Establishing Resource Limits
  • Changing the umask
  • Specifying Per-Share Options
  • Support for AIX JFS ACLs
  • Sending Messages to Clients
  • Mapping Long AIX File Names to 8.3 DOS File Names
  • Support for DOS File Attributes
  • Specifying NetBIOS Aliases for HACMP support
  • Performance Considerations
  • Large Directories
  • Search Caching
  • SendFile API support
  • AIX Fast Connect Problem Determination
  • Traces
  • Logs
  • Troubleshooting Connection Problems
  • Technical Service Information
  • Connection Checking Procedure
  • Configuring Network Logon for AIX Fast Connect
  • Configuration Options
  • Enabling the Network Logon Feature
  • Setting Up Startup Scripts
  • Setting Up Home Directories (Profile Directories)
  • Windows Configuration Policy Files
  • Configuring Win 95/98 Clients for Network Logon
  • Configuring Network Logon for NT clients from Remote Subnets
  • Configuring LanServer (OS/2) Clients for Network Logon
  • AIX Fast Connect NetLogon Limitations
  • AIX Fast Connect Configurable Parameters for the net Command
  • Migrating to AIX Fast Connect from AIX Connections
  • Saving ACONN Configuration Data Before ACONN Uninstall
  • Appendix A. Notices

    Index


    [ Previous | Next | Table of Contents | Index | Library Home | Legal | Search ]