[ Previous | Next | Table of Contents | Index | Library Home |
Legal |
Search ]
System Management Guide: Communications and Networks
About This Book
Chapter 1. Communications and Networks Overview
Chapter 2. Mail
Mail Management Tasks
Configuring the /etc/rc.tcpip File to Start the sendmail Daemon
Managing Mail Aliases
/etc/mail/aliases File
Creating Local System Aliases for Mail
Building the Alias Database
Managing the Mail Queue Files and Directories
Printing the Mail Queue
Mail Queue Files
q Control File
Specifying Time Values in sendmail
Forcing the Mail Queue
Setting the Queue Processing Interval
Moving the Mail Queue
Starting the sendmail Daemon
Stopping the sendmail Daemon
Managing Mail Logging
Managing the Log
Logging Traffic
Logging Mailer Statistics
Displaying Mailer Information
Debugging sendmail
Internet Message Access Protocol (IMAP) and Post Office Protocol (POP)
Configuring IMAP and POP Servers
Prerequisites
Procedure
Running Configuration Tests
syslog Facility
Mail Reference
List of Mail Commands
List of Mail Files and Directories
Using the Mail Program
Using the sendmail Command
List of Internet Message Access Protocol and Post Office Protocol Commands
Chapter 3. Transmission Control Protocol/Internet Protocol
Planning Your TCP/IP Network
Installation and Configuration for TCP/IP
Configuring TCP/IP
Configuring Hosts
Configuring Hosts as Servers
Configuring Gateways
TCP/IP System Manager Commands
Configuring a TCP/IP Network Checklist
Prerequisites
Procedure
TCP/IP Protocols
Internet Protocol (IP) Version 6 Overview
Expanded Routing and Addressing
Routing Simplification
Header Format Simplification
Improved Quality-of-Service/Traffic Control
Tunneling
IPv6 Security
IPv6 Multihomed Link-Local and Site-Local Support
Packet Tracing
Network Interface Packet Headers
Ethernet Adapter Frame Headers
Token-Ring Frame Headers
802.3 Frame Headers
Internet Network-Level Protocols
Address Resolution Protocol
Internet Control Message Protocol
Internet Control Message Protocol Message Types
Internet Protocol
Internet Transport-Level Protocols
User Datagram Protocol
Transmission Control Protocol
TCP Header Field Definitions
Internet Application-Level Protocols
Domain Name Protocol
Exterior Gateway Protocol
Autonomous Systems
EGP Message Types
File Transfer Protocol
Telnet Protocol
Trivial File Transfer Protocol
Name/Finger Protocol
Distributed Computer Network Local-Network Protocol
Remote Command Execution Protocol
Remote Login Protocol
Remote Shell Protocol
Routing Information Protocol
Time Server Protocol
Assigned Numbers
TCP/IP Local Area Network Adapter Cards
Installing a Network Adapter
Configuring and Managing Adapters
Configuring and Using Virtual Local Area Networks (VLANs)
Troubleshooting
Restrictions
Using ATM Adapters
ATM Technology
ATM Connections
TCP/IP over ATM
Configuring an ATM Adapter
ATM Adapter Statistics
Additional Microchannel ATM Statistics
PCI ATM Adapter Specific Statistics
TCP/IP Network Interfaces
Automatic Configuration of Network Interfaces
Ethernet Default Configuration Values
802.3 Default Configuration Values
Token-Ring Default Configuration Values
SLIP Default Configuration Values
Serial Optical Default Configuration Values
ATM Default Configuration Values
Implications of Multiple Network Interfaces on the Same Network
Managing Network Interfaces
Interface-Specific Network Options
Example
TCP/IP Addressing
Internet Addresses
Class A Addresses
Class B Addresses
Class C Addresses
Internet Addresses Using Zeros
Subnet Addresses
Subnet Masks
Address Comparison
Broadcast Addresses
Local Loopback Addresses
TCP/IP Address and Parameter Assignment - Dynamic Host Configuration Protocol (DHCP)
The DHCP Server
The DHCP Database
The DHCP Protocol Engine
DHCP Threaded Operations
Planning DHCP
Configuring DHCP
The Configuration File
Customizing a Configuration File
DHCP and the Dynamic Domain Name System (DDNS)
DHCP Compatibility with Older Versions
DHCP Server File Known Options
Preboot Execution Environment (PXE) Vendor Container Suboption
Configuration File Examples Supporting PXE Clients
DHCP Server File Syntax for General Server Operation
DHCP Server File Syntax for db_file Database
DHCP and Network Installation Management (NIM) Suggestions
Preboot Execution Environment Proxy DHCP Daemon (pxed)
The PXE Proxy DHCP Server
The PXED Database
The PXED Protocol Engine
PXED Threaded Operations
Configuring the PXED Server
The Configuration File
PXE Vendor Container Suboptions
PXED Server File Syntax for General Server Operation
PXED Server File Syntax for db_file Database
Boot Image Negotiation Layer Daemon (BINLD)
The BINLD Server
The BINLD Database
The BINLD Protocol Engine
BINLD Threaded Operations
Configuring BINLD
The Configuration File
BINLD Server File Syntax for General Server Operation
BINLD Server File Syntax for db_file Database
Configuring TCP/IP
Prerequisites
Updating the Hosts List
TCP/IP Daemons
Subsystems and Subservers
System Resource Control (SRC)
SRC Commands
Configuring the inetd Daemon
Client Network Services
Server Network Services
TCP/IP Name Resolution
Naming
Naming Authority
Naming Conventions
Choosing Names for the Hosts on Your Network
Name Servers
Name Resolution
Reverse Address Resolution Protocol
Performing Local Name Resolution (/etc/hosts)
Planning for DOMAIN Name Resolution
Configuring Name Servers
Configuring a Master Name Server
Configuring a Slave Name Server
Configuring a Hint Name Server
Configuring a Domain Mail Server
Configuring a Forwarder
Configuring a Forward Only Name Server
Configuring a Host to Use a Name Server
Configuring Dynamic Zones on the DNS Name Server
Example
Planning and Configuration for LDAP Name Resolution
TCP/IP Routing
Static and Dynamic Routing
Gateways
Interior and Exterior Gateways
Gateway Protocols
Planning for Gateways
Consider the Number of Gateways to Use
Decide on the Type of Routing to Use
Configuring a Gateway
Restricting Route Use
Dead Gateway Detection
Manually Removing Dynamic Routes
Configuring the routed Daemon
Configuring the gated Daemon
Configuring the gated Daemon To Run IPv6
Getting an Autonomous System Number
Path MTU Discovery
SLIP
Configuring SLIP over a Modem
Configuring SLIP over a Null Modem Cable
Deactivating a SLIP Connection
Removing a TTY
Asynchronous Point-to-Point Protocol (PPP) Subsystem
User-Level Processes
Configuring the Asynchronous Point-to-Point Protocol
PPP and SNMP
Enabling PPP SNMP
TCP/IP Quality of Service (QoS)
QoS Models
Integrated Services
Differentiated Services
Supported Standards and Draft Standards
QoS Installation
QoS Configuration
Stopping and Starting the QoS Subsystem
Configuring the RSVP agent
Configuring the Policy Agent
QoS Problem Determination
Policy Specification
ReadFromDirectory
ServiceCategories
ServicePolicyRules
Guidelines for DiffServ Environments
Sample policyd Configuration File
policyd Configuration File
Loading Policies into IBM SecureWay Directory Server
LDAP Schema
System Configuration
Overlapping Policies
UDP usage
Policy Conflicts with RSVP Reservations
Token Bucket Depth Specification
Policy Modification
Standards Compliance
IntServ Model
DiffServ Model
IPv6 Support
Controlling the Policy Daemon
QoS Reference
Commands
Methods
TCP/IP Security
Operating System-Specific Security
Access Control
Auditing
Network Trusted Computing Base (NTCB)
Trusted Path, Trusted Shell, and Secure Attention Key (SAK)
TCP/IP-Specific Security
TCP/IP Command Security
Remote Command Execution Access (/etc/hosts.equiv)
Restricted File Transfer Program Users (/etc/ftpusers)
Trusted Processes
Network Trusted Computing Base (NTCB)
Data Security and Information Protection
TCP/IP Problem Determination
Communication Problems
Name Resolution Problems
Client Host
Name Server Host
Routing Problems
Other Possibilities
Problems with SRC Support
telnet or rlogin Problems
Screen Distortion
telnet Debugging
telnetd Daemon Debugging
Programs Using Extended Curses
Configuration Problems
Common Problems with Network Interfaces
Problems with a SLIP Network Interface
Problems with an Ethernet Network Interface
Problems with a Token-Ring Network Interface
Problems with a Token-Ring/Ethernet Bridge
Problems with a Token-Ring/Token-Ring Bridge
Problems with Packet Delivery
Communicating with a Remote Host
snmpd Response to Queries
Problems with Dynamic Host Configuration Protocol (DHCP)
TCP/IP Reference
List of TCP/IP Commands
List of TCP/IP Daemons
List of Methods
List of TCP/IP Files
List of RFCs
Chapter 4. Internet Protocol (IP) Security
IP Security Overview
Benefits of a Virtual Private Network (VPN)
IP Security and the Operating System
IP Security Features
IKE Features
Security Associations
Tunnels and Key Management
IKE Tunnel Support
Manual Tunnel Support
Native Filtering Capability
Digital Certificate Support
IP Security Installation
Loading IP Security
Planning IP Security Configuration
Tunnels versus Filters
Tunnels and Security Associations
Choosing a Tunnel Type
Using IKE with DHCP or Dynamically Assigned Addresses
Configuring IKE Tunnels
Basic Configuration Wizard
Advanced IKE Tunnel Configuration
Key Management Parameters and Policy
Data Management Parameters and Policy
Setting up, Key Management
Setting up, Data Management
Group Support
Activating a Tunnel
Command Interface to IKE Tunnel Creation
AIX IKE and Linux affinity
Examples of IKE Tunnel Configurations
Digital Certificate Configuration
Format of Digital Certificates
Security Considerations for Digital Certificates
Certificate Revocation Lists (CRLs)
Uses for Digital Certificates in Internet Applications
Digital Certificates and Certificate Requests
Using the IBM Key Manager Tool
Creating a Key Database
Adding a CA Root Digital Certificate
Establishing Trust Settings
Deleting a CA Root Digital Certificate
Requesting a Digital Certificate
Adding (Receiving) a New Digital Certificate
Deleting a Digital Certificate
Changing a Database Password
Creating IKE Tunnels using Digital Certificates
Configuring Manual Tunnels
Setting Up Tunnels and Filters
Creating a Manual Tunnel on Host A
Creating a Manual Tunnel on Host B
Setting Up Filters
Static Filter Rules and Examples
Autogenerated Filter Rules and User Specified Filter Rules
Predefined Filter Rules
Subnet Masks
Host-Firewall-Host
Logging Facilities
Labels in Field Entries
IP Security Problem Determination
Troubleshooting Manual Tunnel Errors
Troubleshooting IKE Tunnel Errors
IKE Tunnel Process Flow
IKE Logging
Parse Payload Logging Function
Digital Certificate and Signature Mode Problems
Tracing Facilities
ipsecstat
IP Security Reference
List of Commands
List of Methods
Chapter 5. TTY Devices and Serial Communications
TTY Overview
TERM Values for Different Displays and Terminals
Setting TTY Characteristics
Setting Attributes on the Attached TTY Device
Managing TTY Devices
Dynamic Screen Utility
dscreen Terminal Configuration Information File
Key Action Assignments
Select Keys
Block Keys
New Keys
End and Quit Keys
Previous Key
List Key
Dynamic Screen Assignment
dsinfo File
Entry Format for dsinfo
String Types
Example 1
Example 2
Modems
Modem Overview
Telecommunications Standards
ITU-TSS Communications Standards
MNP Communications Standards
Generic Modem Setup
Attaching the Modem with Appropriate Cables
Adding a TTY for the Modem
Configuring the Modem
Sending AT Commands with the cu Command
Sending AT Commands Using a C Program
Hayes and Hayes-Compatible Modems
Troubleshooting Modem Problems
Software Services Modem Questionnaire
AT Command Summary
S-Register Summary
Result Codes Summary
Dial modifiers
ATE Overview
Setting Up ATE Overview
Customizing ATE
Changing ATE Characteristics
Setting Up ATE
Prerequisites
Procedure
TTY Troubleshooting
Respawning Too Rapidly Errors
Possible Causes
Procedures for Recovery
Error Log Information and TTY Log Identifiers
Important Error Logging Files and Commands
Common Error Report Messages
Chapter 6. Micro Channel, ISA, and PCI Adapters
Micro Channel Wide Area Network (WAN) Adapters
Supported Multiport/2 Adapters
Supported Portmaster Adapters
Device Driver Support
Configuring Multiport/2 and Portmaster Adapters
Prerequisites
ISA/PCI Wide Area Network (WAN) Adapters
Multiport Model 2 Overview
Configuring the Multiport Model 2 Adapter
Multiport Model 2 Adapter Object Information and Attributes
Predefined Device Object Information
Predefined Connection Object Information
Predefined Attribute Object Information
Multiport Model 2 Power Management
Impact to External Connection - Network Provider
2-Port Multiprotocol HDLC Network Device Driver Overview
Configuring the 2-Port Multiprotocol Adapter
ARTIC960HX PCI Adapter Overview
Configuring the MPQP COMIO Emulation Driver over the ARTIC960HX PCI Adapter
Chapter 7. Data Link Control
Generic Data Link Control Environment Overview
Meeting the GDLC Criteria
Implementing the GDLC Interface
Installing GDLC Data Link Controls
GDLC Interface ioctl Entry Point Operations
Service Access Point
Link Station
Local-Busy Mode
Short-Hold Mode
Testing and Tracing a Link
Statistics
GDLC Special Kernel Services
Managing DLC Device Drivers
Chapter 8. Basic Networking Utilities
BNU Overview
How BNU Works
National Language Support for BNU Commands
BNU File and Directory Structure
BNU Public Directories
BNU Configuration Files
BNU Administrative Directories and Files
BNU Lock Files
BNU Security
uucp Login ID
BNU Login IDs
Security and the Systems and remote.unknown Files
Security and the Permissions File
BNU Daemons
Using the uucico Daemon
Using the uusched Daemon
Using the uuxqt Daemon
Using the uucpd Daemon
Configuring BNU
Prerequisites
Information to Collect before Configuring BNU
Procedure
Setting Up Automatic Monitoring of BNU
Prerequisites
Procedure
Setting Up BNU Polling of Remote Systems
Prerequisites
Procedure
Using the /etc/uucp/Systems File
Editing Devices Files for Hardwired Connections
Prerequisites
Procedure to Set Up a System Name Entry
Procedure to Set Up a Direct Entry
Editing Devices File for Autodialer Connection
Prerequisites
Procedure
Editing Devices File for TCP/IP
Prerequisites
Procedure
Maintaining BNU
Working with BNU Log Files
Log Files in the .Log and .Old Directories
Other BNU Log Files
Systemwide Log Files used by BNU
BNU Maintenance Commands
Cleanup Commands
Status-checking Commands
Shell Procedures
Monitoring a BNU Remote Connection
Prerequisites
Procedure
Monitoring a BNU File Transfer
Prerequisites
Monitoring a File Transfer
Debugging BNU Problems
PHASE 1 Status Messages
PHASE 2 Status Messages
PHASE 3 Status Messages
PHASE 4 Status Messages
PHASE 5 Status Messages
PHASE 6 Status Messages
Debugging BNU Login Failures Using the uucico Daemon
Prerequisites
Procedure
Contacting Connected UNIX Systems Using the tip Command
tip Command Variables
tip Command Configuration Files
BNU Configuration Files
BNU Configuration for a TCP/IP Connection Example
Entries in the Local System Files
Entries in the Remote System's Files
BNU Configuration for a Telephone Connection Example
Entries on the Local System
Entries on the Remote System
BNU Configuration for a Direct Connection Example
Entries in the Local System's Files
Entries in the Remote System Files
BNU Files, Commands, and Directories Reference
BNU Directories
BNU Files
BNU Commands
BNU Daemons
Chapter 9. Network Management
SNMP for Network Management
SNMP Access Policies
SNMP Daemon
Configuring the SNMP Daemon
SNMP Daemon Processing
Message Processing and Authentication
Request Processing
Response Processing
Trap Processing
Generation of linkUp and linkDown Traps
SNMP Daemon Support for the EGP Family of MIB Variables
Examples
SNMP Daemon RFC Conformance
SNMP Daemon Implementation Restrictions
SNMP Daemon Logging Facility
Logging Directed from the snmpd Command Line
Logging Directed from the Configuration File
Logging by the syslogd Daemon
Problem Determination for the SNMP Daemon
Daemon Termination Problem
Daemon Failure Problem
MIB Variable Access Problem
MIB Variable Access in Community Entry Problem
No Response from Agent Problem
noSuchName Problem
Chapter 10. Network File System
Network File System Overview
NFS Services
NFS Access Control Lists (ACL) Support
Cache File System (CacheFS) Support
NFS Mapped File Support
Three Types of Mounts
NFS Mounting Process
/etc/exports File
/etc/xtab File
Implementation of NFS
Remote Procedure Call (RPC) Protocol
eXternal Data Representation (XDR) Protocol
The portmap Daemon
Controlling NFS
Change the Number of biod and nfsd Daemons
Change Command Line Arguments for Daemons Controlled by SRC
Start the NFS Daemons at System Startup
Start the NFS Daemons
Stop the NFS Daemons
Get the Current Status of the NFS Daemons
NFS Installation and Configuration
Checklist for Configuring NFS
Configuring an NFS Server
Configuring an NFS Client
Exporting an NFS File System
Unexporting an NFS File System
Changing an Exported File System
Enabling Root User Access to an Exported File System
Mounting an NFS File System Explicitly
Using AutoFS to Automatically Mount a File System
Establishing Predefined NFS Mounts
Unmounting an Explicitly or Automatically Mounted File System
Removing Predefined NFS Mounts
PC-NFS
PC-NFS Authentication Service
PC-NFS Print-Spooling Service
Configuring the rpc.pcnfsd Daemon
Starting the rpc.pcnfsd Daemon
Verifying the rpc.pcnfsd Daemon Is Accessible
WebNFS
Network Lock Manager
Network Lock Manager Architecture
Network File Locking Process
Crash Recovery Process
Starting the Network Lock Manager
Troubleshooting the Network Lock Manager
Secure NFS
Secrecy
Data Encryption Standard
Public Key Cryptography
Authentication
Secrecy in NFS
Public Key Cryptography for Secure NFS
Authentication Requirements
Authentication Process
Naming Network Entities for DES Authentication
/etc/publickey File
Booting Considerations of Public Key Systems
Performance Considerations
Administering Secure NFS Checklist
Configuring Secure NFS
Exporting a File System Using Secure NFS
Mounting a File System Using Secure NFS
NFS Problem Determination
Identifying Hard-Mounted and Soft-Mounted File Problems
Identifying NFS Problems Checklist
Asynchronous Write Errors
NFS Error Messages
nfs_server Error Message
mount Error Messages
Identifying the Cause of Slow Access Times for NFS
Checking Processes
Checking Network Connections
Setting MTU Sizes
Setting Transmit Queue Sizes
Fixing Hung Programs
Permissions and Authentication Schemes
Name Resolution on an NFS Server
Limitations on the Number of Groups in the NFS Structure
Mounting from NFS Servers That Have Earlier Version of NFS
Problems That Occur If the NFS Kernel Extension Is Not Loaded
NFS Reference
List of Network File System (NFS) Files
List of NFS Commands
List of NFS Daemons
Locking Daemons
Network Service Daemons and Utilities
Secure Networking Daemons and Utilities
Sun Diskless Client Support
NFS Subroutines
Chapter 11. AIX Fast Connect
AIX Fast Connect Overview
Features
Requirements
Server Hardware Requirements
Server Software Requirements
Client Hardware Requirements
Client Software Requirements
Known Conflicts with other Server Software
Migrating from AIX Connections
Packaging and Installation
Packaging
Installation
Configuration of Network Interfaces
Initial Configuration
Limitations
Windows Networking Concepts (NetBIOS, SMB, WINS)
AIX Fast Connect Configuration and Administration
Overview
Configurable Parameters
Configuration of File and Print Shares (Exports)
User Administration
Overview of User-Authentication Mechanisms
Configuring Encrypted Passwords
Basic Server Administration
Starting and Stopping the AIX Fast Connect Server
Showing Server Status Information
Web-based System Manager, SMIT fast paths, and net commands
NetBIOS Name Service (NBNS)
Configuring Client PCs for use with AIX Fast Connect
TCP/IP Configuration
Windows 95, Windows 98 Clients
Windows NT Clients
Windows 2000 Clients
Windows For Workgroups (Windows 3.11) Clients
OS/2 Clients
NetBIOS Name Resolution
Workgroups, Domains, and User Accounts
Enabling Windows Clients for Plain Text Passwords
Browsing the Network
Mapping Drives
Using AIX Fast Connect Printers
Support for Windows 2000 Clients
Support for Windows Terminal Server
Advanced AIX Fast Connect Features
AIX-based User Authentication (Plain Text Passwords)
CIFS Password Encryption Protocols
NT Passthrough Authentication
Network Logon to AIX Fast Connect
DCE/DFS Support
Guest Logon
Share-Level Security
User Name Mappings
AIX Fast Connect User Management and File Access
User-Session Management Using net session
Establishing Resource Limits
Changing the umask
Specifying Per-Share Options
Support for AIX JFS ACLs
Sending Messages to Clients
Mapping Long AIX File Names to 8.3 DOS File Names
Support for DOS File Attributes
Specifying NetBIOS Aliases for HACMP support
Performance Considerations
Large Directories
Search Caching
SendFile API support
AIX Fast Connect Problem Determination
Traces
Logs
Troubleshooting Connection Problems
Technical Service Information
Connection Checking Procedure
Configuring Network Logon for AIX Fast Connect
Configuration Options
Enabling the Network Logon Feature
Setting Up Startup Scripts
Setting Up Home Directories (Profile Directories)
Windows Configuration Policy Files
Configuring Win 95/98 Clients for Network Logon
Configuring Network Logon for NT clients from Remote Subnets
Configuring LanServer (OS/2) Clients for Network Logon
AIX Fast Connect NetLogon Limitations
AIX Fast Connect Configurable Parameters for the net Command
Migrating to AIX Fast Connect from AIX Connections
Saving ACONN Configuration Data Before ACONN Uninstall
Appendix A. Notices
Index
[ Previous | Next | Table of Contents | Index |
Library Home |
Legal |
Search ]