Front cover
IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 2 Standard Applications
Bill White Octavio Ferreira Teresa Missawa Teddy Sudewo
Redbooks
International Technical Support Organization
IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 2 Standard Applications
September 2016
SG24-8361-00 Note: Before using this information and the product it supports, read the information in “Notices” on page ix.
First Edition (September 2016)
This edition applies to Version 2, Release 2 of z/OS Communications Server.
© Copyright International Business Machines Corporation 2016. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents
Notices ...... ix Trademarks ...... x
IBM Redbooks promotions ...... xi
Preface ...... xiii Authors...... xiv Now you can become a published author, too! ...... xv Comments welcome...... xv Stay connected to IBM Redbooks ...... xv
Chapter 1. The syslog daemon ...... 1 1.1 Conceptual overview of syslogd ...... 2 1.1.1 What is syslogd...... 2 1.1.2 How syslogd works ...... 3 1.1.3 How can syslogd be deployed ...... 3 1.2 Log messages to different files and to a single file ...... 5 1.2.1 Description of logging to multiple files and to a single file...... 5 1.2.2 Configuration of multiple files and a single file ...... 5 1.2.3 Verification of multiple files and a single file ...... 13 1.3 Starting two syslogd instances ...... 14 1.3.1 Description of two syslogd instances ...... 14 1.3.2 Configuring two syslogd instances ...... 14 1.3.3 Verification for running two syslogd instances ...... 17 1.4 The syslogd functions ...... 19 1.4.1 The syslogd operator commands ...... 19 1.4.2 Description of syslogd automatic archival...... 19 1.4.3 The syslogd browser and search facility ...... 24 1.5 Problem determination for syslogd logging ...... 33 1.6 Additional information sources for syslogd ...... 34
Chapter 2. TN3270E Telnet server ...... 35 2.1 Conceptual overview of the TN3270E server ...... 36 2.1.1 What is the TN3270E server...... 36 2.1.2 How does the TN3270E server work ...... 37 2.1.3 Possible uses for the TN3270E server ...... 43 2.2 TN3270E server in a single image ...... 44 2.2.1 Description of the exampleTN3270E server scenario...... 44 2.2.2 Configuration of the TN3270E server ...... 44 2.2.3 Activation of the TN3270E server ...... 53 2.2.4 Verification of the TN3270E server ...... 54 2.2.5 Administration and management of the TN3270E server ...... 66 2.3 Multiple TN3270E servers in a multiple image environment ...... 77 2.3.1 Multiple TN3270E servers within the sysplex ...... 78 2.3.2 Configuration of multiple TN3270E servers within the sysplex ...... 80 2.3.3 Activation and verification of multiple TN3270E servers in the sysplex ...... 86
© Copyright IBM Corp. 2016. All rights reserved. iii 2.4 Multiple TN3270E servers using LU name server and LU name requester ...... 95 2.4.1 Description of TN3270E servers using LU name server and requester ...... 95 2.4.2 Configuration of TN3270E servers within sysplex using LU name server and requester...... 101 2.4.3 Activation and verification of LU name server and requester within sysplex . . . 108 2.4.4 Scenario: LU name server automated takeover when active name server fails . 123 2.5 TN3270E server in a single image using SHAREACB ...... 127 2.5.1 Overview of SHAREACB utilization ...... 127 2.5.2 Configuration of the TN3270E server with SHAREACB option...... 128 2.5.3 Activation of the TN3270E server ...... 129 2.5.4 Verification of the TN3270E server with SHAREACB defined ...... 130 2.6 TN3270 support of TSO logon reconnect ...... 130 2.7 Problem determination for the TN3270E servers ...... 131 2.7.1 Review the definition statements within the profile ...... 131 2.7.2 Use TCP/IP and Telnet commands...... 132 2.7.3 Use the MSG07 statement in the TN3270 profile ...... 137 2.7.4 Use SMF records to capture TN3270 connection activity...... 137 2.7.5 Use trace data...... 138 2.7.6 Tips for multiple TN3270E servers in a Parallel Sysplex environment ...... 139 2.7.7 Tips for LU name server and LU name requester diagnosis...... 139 2.8 Additional information sources for the TN3270E server ...... 140
Chapter 3. File Transfer Protocol...... 141 3.1 Conceptual overview of FTP ...... 142 3.1.1 What FTP is ...... 142 3.1.2 How FTP works...... 143 3.1.3 How FTP can be used ...... 144 3.2 Basic FTP without security ...... 146 3.2.1 Description of basic FTP without security ...... 146 3.2.2 Planning for the basic FTP environment without security ...... 147 3.2.3 Configuration of basic FTP without security ...... 160 3.2.4 Activation and verification for basic FTP without security ...... 164 3.3 Multiple FTP servers in a sysplex ...... 172 3.3.1 Description of multiple FTP servers in a sysplex ...... 173 3.3.2 Configuration for multiple FTP servers in the sysplex...... 174 3.3.3 Activation and verification of FTP servers within sysplex ...... 178 3.4 FTP client using batch...... 187 3.4.1 Description of FTP client using batch ...... 187 3.4.2 Configuration of FTP client using batch ...... 188 3.4.3 Activation and verification of FTP client batch job...... 189 3.5 FTP client application programming interface...... 190 3.5.1 FTP client API for REXX ...... 190 3.5.2 FTP client API for Java ...... 191 3.6 FTP access to UNIX named pipes ...... 192 3.6.1 What are UNIX named pipes ...... 192 3.6.2 Description of FTP access to UNIX named pipes...... 193 3.6.3 FTP configuration options ...... 194 3.6.4 Use the z/OS FTP client to create a named pipe in the z/OS FTP server . . . . . 196 3.6.5 Supported z/OS FTP subcommands ...... 197 3.6.6 Storing into a named pipe ...... 197
iv IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 2 Standard Applications 3.7 FTP large data set access ...... 199 3.7.1 The extended address volume ...... 199 3.7.2 FTP support for large format data set ...... 200 3.7.3 Example of EAS-eligible data set allocation for FTP transfer ...... 201 3.8 Miscellaneous configuration settings of FTP...... 201 3.8.1 A single generic FTP server in a multiple stack z/OS image ...... 201 3.8.2 FTP network management interface with SMF...... 202 3.9 Problem determination for FTP ...... 203 3.10 Additional information sources for FTP ...... 203
Chapter 4. Simple Network Management Protocol ...... 205 4.1 Conceptual overview of SNMP ...... 206 4.1.1 What SNMP is...... 206 4.1.2 How SNMP works ...... 207 4.1.3 How SNMP can be applied ...... 209 4.2 z/OS SNMP agent...... 210 4.2.1 Description of the z/OS SNMP agent ...... 210 4.2.2 Configuration of the z/OS SNMP agent ...... 211 4.2.3 Activation and verification of the z/OS SNMP agents ...... 219 4.3 z/OS SNMP subagents ...... 220 4.3.1 Description of SNMP subagents ...... 220 4.3.2 Configuration of SNMP subagents ...... 221 4.3.3 Activation and Verification of SNMP subagents ...... 222 4.4 z/OS SNMP client command...... 226 4.4.1 Description of the SNMP client commands...... 226 4.4.2 Configuration tasks for the SNMP client commands...... 226 4.4.3 Using the osnmp/snmp z/OS UNIX command ...... 227 4.5 Problem determination for the SNMP facilities ...... 235 4.6 Additional information sources for SNMP ...... 236
Chapter 5. IP printing ...... 237 5.1 Conceptual overview of IP printing ...... 238 5.1.1 What IP printing is...... 238 5.1.2 How IP printing works ...... 239 5.1.3 How IP printing can be applied ...... 239 5.2 LPR/LPD ...... 240 5.2.1 Description of LPR/LPD ...... 241 5.2.2 Configuration tasks for LPR/LPD ...... 241 5.2.3 Activation and verification of LPR/LPD ...... 243 5.3 Infoprint Server ...... 245 5.3.1 Description of the Infoprint Server...... 246 5.3.2 Configuration of Infoprint Server ...... 248 5.4 Problem determination for LPR/LPD...... 255 5.5 Additional information sources for IP printing ...... 261
Chapter 6. INETD...... 263 6.1 Conceptual overview of INETD ...... 264 6.1.1 What INETD is ...... 265 6.1.2 How INETD works...... 265 6.1.3 How INETD can be applied...... 266 6.2 A single INETD setup ...... 266 6.2.1 Description of the INETD setup...... 267 6.2.2 Configuration tasks for INETD setup...... 267 6.2.3 Activation and verification of INETD ...... 269
Contents v 6.3 Problem determination for INETD ...... 273 6.4 Additional information sources for INETD ...... 273
Chapter 7. z/OS mail servers ...... 275 7.1 Conceptual overview of z/OS mail applications ...... 276 7.1.1 z/OS mail services ...... 276 7.1.2 How z/OS mail services work ...... 277 7.1.3 How z/OS mail services are applied ...... 278 7.2 z/OS CSSMTP, a mail forwarding SMTP client...... 278 7.2.1 Advantages of using z/OS CSSMTP client ...... 279 7.2.2 Configuration tasks for the z/OS CSSMTP client ...... 280 7.2.3 Verification of the z/OS CSSMTP client ...... 283 7.3 z/OS SMTP as a mail server...... 283 7.3.1 Description of z/OS SMTP server ...... 283 7.3.2 Configuration tasks for the z/OS SMTP server ...... 286 7.3.3 Verification of the z/OS SMTP server ...... 295 7.4 Using sendmail and popper as mail servers ...... 296 7.4.1 Description of sendmail and popper ...... 296 7.4.2 Configuration tasks for sendmail and popper ...... 300 7.4.3 Verification of sendmail and popper setup ...... 305 7.5 Using sendmail as a client ...... 310 7.5.1 Description of the sendmail client ...... 310 7.5.2 Configuration tasks for the sendmail client ...... 310 7.5.3 Verification of the sendmail client ...... 313 7.6 Migrating to CSSMTP ...... 314 7.6.1 CSSMTP compatibility with SMTPD client ...... 314 7.6.2 Configuration tasks for implementing CSSMTP compatibility test mode ...... 315 7.6.3 Migrating from SMTPD to CSSMTP ...... 318 7.7 Problem determination for the mail facilities ...... 318 7.7.1 Problem determination tasks for the z/OS SMTP server ...... 319 7.7.2 Problem determination for sendmail and popper ...... 319 7.7.3 Problem determination for the sendmail client ...... 320 7.8 Additional information sources for mail servers...... 320
Chapter 8. z/OS UNIX Telnet server...... 323 8.1 Conceptual overview of otelnetd ...... 324 8.1.1 What otelnetd is ...... 324 8.1.2 How otelnetd works...... 324 8.1.3 How otelnetd can be applied...... 325 8.2 z/OS UNIX Telnet server implementation ...... 326 8.2.1 Description of the otelnetd server ...... 326 8.2.2 Configuration tasks for otelnetd ...... 327 8.2.3 Activation and verification of otelnetd ...... 331 8.3 Problem determination for otelnetd ...... 333 8.4 Additional information sources for otelnetd ...... 333
Chapter 9. Remote execution...... 335 9.1 Conceptual overview of remote execution ...... 336 9.1.1 What remote execution is ...... 336 9.1.2 How remote execution works ...... 338 9.1.3 How remote execution can be applied ...... 339
vi IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 2 Standard Applications 9.2 TSO remote execution server ...... 341 9.2.1 Description of TSO remote execution server ...... 341 9.2.2 Configuration tasks for TSO remote execution server ...... 342 9.2.3 Activation and verification of TSO remote execution server ...... 348 9.3 z/OS UNIX remote execution server ...... 348 9.3.1 Description of z/OS UNIX remote execution server ...... 348 9.3.2 Configuration tasks for z/OS UNIX remote execution server ...... 349 9.3.3 Activation and verification of z/OS UNIX remote execution server ...... 350 9.4 REXEC TSO client command using user ID/password...... 353 9.4.1 Description of REXEC TSO with user ID and password...... 353 9.4.2 Configuration of REXEC TSO with user ID and password ...... 353 9.4.3 Verification of REXEC TSO with user ID and password ...... 355 9.5 REXEC TSO client command using the NETRC data set...... 357 9.5.1 Description of REXEC TSO client using NETRC ...... 357 9.5.2 Configuration of REXEC TSO client using NETRC...... 357 9.5.3 Verification of REXEC TSO client using NETRC ...... 360 9.6 REXEC UNIX client command ...... 363 9.6.1 Description of the REXEC UNIX client command...... 363 9.6.2 Configuration of the REXEC UNIX client command ...... 364 9.6.3 Verification of the REXEC UNIX client command ...... 365 9.7 Problem determination for z/OS remote execution facilities ...... 366 9.7.1 Problem determination for TSO remote execution ...... 366 9.7.2 Problem determination for REXEC TSO with user ID and password ...... 366 9.7.3 Problem determination of REXEC TSO using NETRC ...... 367 9.7.4 Problem determination for the REXEC UNIX client command ...... 368 9.7.5 Recovery for server job table full condition ...... 369 9.7.6 Diagnostic messages for debugging...... 369 9.8 Additional information sources for remote execution and remote shell...... 370
Appendix A. Environment variables ...... 373 A.1 Description of the environment variable information...... 374 A.2 Native MVS API environment ...... 374 A.3 z/OS UNIX API environment...... 375 A.4 z/OS UNIX System Services environment variables ...... 375 A.5 Language Environment variables ...... 376 A.6 Application-specific environment variables...... 377 A.7 Setting environment variables ...... 382
Appendix B. Sample files provided with TCP/IP ...... 385 B.1 Sample files by component...... 386
Appendix C. Configuration files: TN3270E stand-alone scenario ...... 393 C.1 SC31 TN3270B Server PROC for TN3270 stand-alone scenario ...... 394 C.2 SC31 TN3270B Server profile for TN3270 stand-alone scenario...... 394 C.3 SC31 TCPIPB stack PROC for TN3270 stand-alone scenario...... 396 C.4 SC31 TCPIPB stack PROFILE for TN3270 stand-alone scenario ...... 396 C.5 SC31 OMPROUTE PROC for TN3270 stand-alone scenario ...... 401 C.6 SC31 OMPROUTE STDENV file for TN3270 stand-alone task scenario...... 401 C.7 SC31 OMPROUTE CONFIG for TN3270 stand-alone scenario...... 402
Contents vii Appendix D. Multiple TN3270E Telnet servers and sysplex distribution using the LUNS and LUNR scenario ...... 405 D.1 SC30 files for LUNS and LUNR scenario ...... 406 D.1.1 SC30 TN3270A Server PROC for LUNS and LUNR scenario ...... 406 D.1.2 SC30 TN3270A Server PROFILE for LUNS and LUNR scenario ...... 406 D.1.3 SC30 TNLUNS30 backup LUNS PROC for LUNS and LUNR scenario ...... 410 D.1.4 SC30 TNLUNS30 PROFILE for LUNS and LUNR scenario...... 411 D.1.5 SC30 TCPIPA stack PROC for LUNS and LUNR scenario ...... 411 D.1.6 SC30 TCPIPA stack PROFILE for LUNS and LUNR scenario...... 412 D.1.7 SC30 OMPROUTE PROC for LUNS and LUNR scenario ...... 416 D.1.8 SC30 OMPROUTE STDENV file for LUNS and LUNR scenario ...... 416 D.1.9 SC30 OMPROUTE CONFIG for LUNS and LUNR scenario ...... 416 D.2 SC31 files for LUNS and LUNR scenario ...... 418 D.2.1 SC31 TN3270B Server PROC for LUNS and LUNR scenario ...... 418 D.2.2 SC31 TN3270B Server PROFILE for LUNS and LUNR scenario ...... 419 D.2.3 SC31 TNLUNS31 primary LUNS PROC for LUNS and LUNR scenario ...... 423 D.2.4 SC31 TNLUNS31 PROFILE for LUNS and LUNR scenario...... 423 D.2.5 SC31 TCPIPB stack PROC for LUNS and LUNR scenario ...... 424 D.2.6 SC31 TCPIPB stack PROFILE for LUNS and LUNR scenario...... 424 D.2.7 SC31 OMPROUTE PROC for LUNS and LUNR scenario ...... 429 D.2.8 SC31 OMPROUTE STDENV file for LUNS and LUNR scenario ...... 429 D.2.9 SC31 OMPROUTE CONFIG for LUNS and LUNR scenario ...... 430
Appendix E. FTP and translation tables ...... 433 E.1 Conceptual overview of FTP translation ...... 434 E.1.1 What translation is ...... 434 E.1.2 How translation works...... 434 E.1.3 How FTP translation can be applied...... 437 E.2 Using the RFC2389 and RFC2640 FTP features ...... 439 E.2.1 RFC 2389: Feature negotiation ...... 439 E.2.2 RFC2640: FTP Internationalization ...... 440 E.2.3 Requirements to implement these RFCs ...... 440 E.3 Selecting translation tables...... 441 E.3.1 Using the QUOTE SITE subcommand ...... 441 E.3.2 Using the TRACE option at the server ...... 442 E.3.3 Using the DEBUG option at the client...... 443 E.3.4 Using the TRANSLATE sub command...... 444 E.3.5 Setting a DBCS transfer mode ...... 444 E.3.6 Enabling Unicode transfer mode ...... 446
Appendix F. The example implementation environment ...... 447 F.1 The environment used for all four books...... 448 F.2 The focus for this book ...... 450
Related publications ...... 451 IBM Redbooks ...... 451 Other publications ...... 451 Online resources ...... 452 Help from IBM ...... 453
viii IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 2 Standard Applications Notices
This information was developed for products and services offered in the US. This material might be available from IBM in other languages. However, you may be required to own a copy of the product or product version in that language in order to access it.
IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not grant you any license to these patents. You can send license inquiries, in writing, to: IBM Director of Licensing, IBM Corporation, North Castle Drive, MD-NC119, Armonk, NY 10504-1785, US INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some jurisdictions do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice.
Any references in this information to non-IBM websites are provided for convenience only and do not in any manner serve as an endorsement of those websites. The materials at those websites are not part of the materials for this IBM product and use of those websites is at your own risk.
IBM may use or distribute any of the information you provide in any way it believes appropriate without incurring any obligation to you.
The performance data and client examples cited are presented for illustrative purposes only. Actual performance results may vary depending on specific configurations and operating conditions.
Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products.
Statements regarding IBM's future direction or intent are subject to change or withdrawal without notice, and represent goals and objectives only.
This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to actual people or business enterprises is entirely coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrate programming techniques on various operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of developing, using, marketing or distributing application programs conforming to the application programming interface for the operating platform for which the sample programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these programs. The sample programs are provided “AS IS”, without warranty of any kind. IBM shall not be liable for any damages arising out of your use of the sample programs.
© Copyright IBM Corp. 2016. All rights reserved. ix Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at http://www.ibm.com/legal/copytrade.shtml
The following terms are trademarks or registered trademarks of International Business Machines Corporation, and might also be trademarks or registered trademarks in other countries.
AIX® IMS™ RACF® C/370™ Language Environment® Redbooks® CICS® Lotus® Redbooks (logo) ® DB2® Lotus Notes® System z® Domino® MVS™ Tivoli® Global Business Services® NetView® VTAM® HiperSockets™ Notes® z Systems™ IBM® Parallel Sysplex® z/OS® IBM z Systems™ Print Services Facility™ z13™ IBM z13™ PrintWay™
The following terms are trademarks of other companies:
PostScript, the Adobe logo, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries.
Inc., and Inc. device are trademarks or registered trademarks of Kenexa, an IBM Company.
Linux is a trademark of Linus Torvalds in the United States, other countries, or both.
Microsoft, Windows, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both.
Java, and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates.
UNIX is a registered trademark of The Open Group in the United States and other countries.
Other company, product, or service names may be trademarks or service marks of others.
x IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 2 Standard Applications IBM REDBOOKS PROMOTIONS
IBM Redbooks promotions
Find and read thousands of IBM Redbooks publications
Search, bookmark, save and organize favorites Get personalized notifications of new content Link to the latest Redbooks blogs and videos
Get the latest version of the Redbooks Mobile App
Download Android
iOS Now
Promote your business in an IBM Redbooks publication
® Place a Sponsorship Promotion in an IBM Redbooks® publication, featuring your business or solution with a link to your web site.
Qualified IBM Business Partners may place a full page promotion in the most popular Redbooks publications.
Imagine the power of being seen by users who download ibm.com/Redbooks millions of Redbooks publications each year! About Redbooks Business Partner Programs THIS PAGE INTENTIONALLY LEFT BLANK Preface
For more than 50 years, IBM® mainframes have supported an extraordinary portion of the world’s computing work, providing centralized corporate databases and mission-critical enterprise-wide applications. IBM System z®, the latest generation of the IBM distinguished family of mainframe systems, has come a long way from its IBM System/360 heritage. Likewise, its IBM z/OS® operating system is far superior to its predecessors in providing, among many other capabilities, world-class and state-of-the-art support for the TCP/IP Internet Protocol suite.
TCP/IP is a large and evolving collection of communication protocols that are managed by the Internet Engineering Task Force (IETF), an open, volunteer organization. Because of its openness, the TCP/IP protocol suite has become the foundation for the set of technologies that form the basis of the Internet. The convergence of IBM mainframe capabilities with Internet technology, connectivity, and standards (particularly TCP/IP) is dramatically changing the face of information technology and driving requirements for even more secure, scalable, and highly available mainframe TCP/IP implementations.
The IBM z/OS Communications Server TCP/IP Implementation series provides understandable, step-by-step guidance for enabling the most commonly used and important functions of z/OS Communications Server TCP/IP.
This IBM Redbooks® publication provides useful implementation scenarios and configuration recommendations for many of the TCP/IP standard applications that z/OS Communications Server supports.
For more specific information about z/OS Communications Server base functions, high availability, and security, see the other volumes in the series: IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 1 Base Functions, Connectivity, and Routing, SG24-8360 IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 3 High Availability, Scalability, and Performance, SG24-8362 IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking, SG24-8363
For comprehensive descriptions of the individual parameters for setting up and using the functions described in this book, along with step-by-step checklists and supporting examples, see the following publications: z/OS Communications Server: IP Configuration Guide, SC27-3650 z/OS Communications Server: IP Configuration Reference, SC27-3651 z/OS Communications Server: IP System Administrator’s Commands, SC27-3661 z/OS Communications Server: IP User’s Guide and Commands, SC27-3662
This book does not duplicate the information in those publications. Instead, it complements them with practical implementation scenarios that can be useful in your environment. To determine at what level a specific function was introduced, see z/OS Communications Server: New Function Summary, GC31-8771. For complete details, review the documents that are listed in the additional information section at the end of each chapter.
© Copyright IBM Corp. 2016. All rights reserved. xiii Authors
This book was produced by a team of specialists from around the world working at the International Technical Support Organization (ITSO), Poughkeepsie Center.
Bill White is a Project Leader and Senior IBM z Systems™ Networking and Connectivity Specialist at ITSO at Poughkeepsie, NY.
Octavio Ferreira is a Consulting IT Specialist with IBM Brazil. He has 34 years of experience in IBM software support. His areas of expertise include z/OS Communications Server, SNA and TCP/IP, and Communications Server on all platforms. For the last 15 years, Octavio has worked in the Area Program Support Group. He provides guidance and support to clients and designs networking solutions such as SNA-TCP/IP Integration, z/OS Connectivity, Enterprise Extender design and implementation, and SNA-to-APPN migration. He has also co-authored other ITSO publications.
Teresa Missawa is a Network Project IT Specialist at Banco Bradesco in Brazil, responsible for the mainframe network design and architecture. She has 27 years of experience with IBM mainframes and has a bachelor degree in Computer Science and MBA Business Management with emphasis in business technology. Teresa’s area of expertise includes z/OS Communications Server (VTAM/APPN and TCP/IP), IP routers, and dynamic routing protocols (such as OSPF and BGP). She was also responsible for coordinating and implementing APPN, Enterprise Extender, and TCP/IP high availability solutions at Banco Bradesco. Before that, she worked as an IBM CICS® support analyst.
Teddy Sudewo is an IT Specialist at IBM Indonesia, working with large bank customers. He has over 3 years of experience with IBM z Systems and IBM Systems Storage hardware. He holds a bachelor's degree in Electrical Engineering from Institut Teknologi of Sepuluh Nopember, Surabaya, Indonesia. His areas of expertise include z Systems hardware, z/OS, TCP/IP, encryption, STP, and storage products related to the IBM mainframe infrastructure. He has written extensively about basic TCP/IP configurations, FTP TLS, FTP AT-TLS, and zOSMF.
Thanks to the following people for their contributions to this project
David Bennin Don Brennan Richard Conway Robert Haimowitz IBM Global Business Services®, Development Support Team
Sam Reynolds Jerry Stevens Doris Bunn Sue Huang Mike Stayton IBM z/OS Communications Server Development, IBM Raleigh
xiv IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 2 Standard Applications Thanks to the authors of the previous editions of this book
Finally, we want to thank the authors of the previous z/OS Communications Server TCP/IP Implementation series for creating the groundwork for this series:
Rufus P. Credle, Mike Ebbers, Rama Ayyar, Octavio L Ferreira, Yohko Ojima, Mike Riches, Maulide Xavier, Valirio Braga, WenHong Chen, Demerson Cilloti, Sandra Elisa Freitag, Gwen Dente, Marco Giudici, Adi Horowitz, Michael Jensen, Gazi Karakus, Shizuka Katoh, Uma Maheswari Kumaraguru, Sherwin Lake, Bob Louden, Garth Madella, Yukihiko Miyamoto, Hajime Nagao, Shuo Ni, Carlos Bento Nonato, Gilson Cesar de Oliveira, Roland Peschke, Joel Porterie, Marc Price, Frederick James Rathweg, Micky Reichenberg, Georg Senfleben, Rutsakon Techo, Larry Templeton, Rudi van Niekerk, Thomas Wienert, and Andi Wijaya.
Now you can become a published author, too!
Here's an opportunity to spotlight your skills, grow your career, and become a published author—all at the same time! Join an ITSO residency project and help write a book in your area of expertise, while honing your experience using leading-edge technologies. Your efforts will help to increase product acceptance and customer satisfaction, as you expand your network of technical contacts and relationships. Residencies run from two to six weeks in length, and you can participate either in person or as a remote resident working from your home base.
Find out more about the residency program, browse the residency index, and apply online at: ibm.com/redbooks/residencies.html
Comments welcome
Your comments are important to us!
We want our books to be as helpful as possible. Send us your comments about this book or other IBM Redbooks publications in one of the following ways: Use the online Contact us review Redbooks form found at: ibm.com/redbooks Send your comments in an email to: [email protected] Mail your comments to: IBM Corporation, International Technical Support Organization Dept. HYTD Mail Station P099 2455 South Road Poughkeepsie, NY 12601-5400
Preface xv Stay connected to IBM Redbooks