AIX 5L System User's Guide Communications and Network

Total Page:16

File Type:pdf, Size:1020Kb

AIX 5L System User's Guide Communications and Network Bull AIX 5L System User’s Guide Communications and Network AIX ORDER REFERENCE 86 A2 25EF 02 Bull AIX 5L System User’s Guide Communications and Network AIX Software October 2002 BULL CEDOC 357 AVENUE PATTON B.P.20845 49008 ANGERS CEDEX 01 FRANCE ORDER REFERENCE 86 A2 25EF 02 The following copyright notice protects this book under the Copyright laws of the United States of America and other countries which prohibit such actions as, but not limited to, copying, distributing, modifying, and making derivative works. Copyright Bull S.A. 1992, 2002 Printed in France Suggestions and criticisms concerning the form, content, and presentation of this book are invited. A form is provided at the end of this book for this purpose. To order additional copies of this book or other Bull Technical Publications, you are invited to use the Ordering Form also provided at the end of this book. Trademarks and Acknowledgements We acknowledge the right of proprietors of trademarks mentioned in this book. AIXR is a registered trademark of International Business Machines Corporation, and is being used under licence. UNIX is a registered trademark in the United States of America and other countries licensed exclusively through the Open Group. The information in this document is subject to change without notice. Groupe Bull will not be liable for errors contained herein, or for incidental or consequential damages in connection with the use of this material. About This Book This book describes the following communications applications: Mail, Message Handler (MH), Transmission Control Protocol/Internet Protocol (TCP/IP), Basic Networking Utilities (BNU), and Asynchronous Terminal Emulation (ATE). It provides overviews, concepts, and procedures on receiving and sending mail and messages, transferring files (ftp command), printing files from and to a remote system, running commands on other systems, communicating between local and remote systems, and customizing the communications environment. Who Should Use This Book This book is intended for end users who need information on communications applications and services for the operating system. Highlighting The following highlighting conventions are used in this book: Bold Identifies commands, subroutines, keywords, files, structures, directories, and other items whose names are predefined by the system. Also identifies graphical objects such as buttons, labels, and icons that the user selects. Italics Identifies parameters whose actual names or values are to be supplied by the user. Monospace Identifies examples of specific data values, examples of text similar to what you might see displayed, examples of portions of program code similar to what you might write as a programmer, messages from the system, or information you should actually type. Case–Sensitivity in AIX Everything in the AIX operating system is case–sensitive, which means that it distinguishes between uppercase and lowercase letters. For example, you can use the ls command to list files. If you type LS, the system responds that the command is ”not found.” Likewise, FILEA, FiLea, and filea are three distinct file names, even if they reside in the same directory. To avoid causing undesirable actions to be performed, always ensure that you use the correct case. ISO 9000 ISO 9000 registered quality systems were used in the development and manufacturing of this product. About this Book i Related Publications The following books contain related information: • AIX 5L Version 5.2 System User’s Guide: Operating System and Devices • AIX 5L Version 5.2 System Management Guide: Communications and Networks ii System User’s Guide: Communications and Networks Table of Contents About This Book . i Who Should Use This Book . i Highlighting . i Case–Sensitivity in AIX . i ISO 9000 . i Related Publications . ii Chapter 1. Introduction to Communication Concepts . 1-1 Mail Applications . 1-2 mail . 1-2 mh . 1-2 bellmail . 1-3 Networking Applications . 1-5 Network Introduction . 1-5 System Hardware and Software Communication Support for End Users . 1-5 User and Application Communications Functions . 1-5 Communicating with Other Operating Systems . 1-6 Host Emulation Applications . 1-7 Emulators Introduction . 1-7 TCP/IP Commands for Emulation . 1-7 BNU Commands for Emulation . 1-7 Asynchronous Terminal Emulation (ATE) . 1-8 Communications System Commands . 1-9 Displaying Your Login Name . 1-9 Displaying Your System Name . 1-9 Determining Whether Your System Has Access . 1-9 Displaying Information about Logged–In Users . 1-10 Chapter 2. Mail Overview . 2-1 Storing Mail . 2-2 System Mailbox . 2-2 Default Personal Mailbox . 2-2 dead.letter File . 2-2 Folders . 2-2 Receiving and Handling Mail . 2-3 Starting the Mail Program . 2-3 Displaying the Contents of Your Mailbox . 2-4 Reading Mail . 2-6 Deleting Mail . 2-7 Exiting Mail . 2-8 Organizing Mail . 2-8 Viewing Mail Help Information . 2-12 Getting Mail Help Information in the Mail Program . 2-12 Getting Mail Help Information by Using Manual Pages . 2-12 Creating and Sending Mail . 2-13 Addressing Mail . 2-13 Starting the Mail Editor . 2-17 Editing a Message . 2-18 Displaying a Message While in the Mail Editor . 2-19 About this Book iii Exiting the Mail Editor without Sending the Message . 2-19 Adding a File and a Specific Message within a Message . 2-20 Changing or Adding to the Heading Fields of a Message . 2-21 Reformatting a Message in the Mail Editor . 2-23 Checking for Misspelling in the Mail Editor . 2-23 Sending Mail . 2-24 Replying to Mail . 2-25 Forwarding Mail . 2-26 Sending a Vacation Message Notice . 2-27 Sending and Receiving Secret Mail . 2-28 Customizing the Mail Program . 2-29 Enabling and Disabling Mail Options . 2-30 Changing the Prompt for the Subject and Carbon Copy (Cc:) Fields . 2-31 Creating an Alias or Distribution List . 2-31 Changing the Number of Message Headers or Message Text Lines Displayed in the Mail Program . ..
Recommended publications
  • Project Glossary Document # 17100-1.02
    Multi-Modal Traveler Information System Project Glossary Document # 17100-1.02 Prepared by: De Leuw, Cather & Company Issue Date: November 4, 1997 GCM ITS Priority Corridor Multi-Modal Traveler Information System November 4, 1997 MULTI-MODAL TRAVELER INFORMATION SYSTEM SYSTEM GLOSSARY TABLE OF CONTENTS 1 INTRODUCTION ....................................................... 1-1 2 DEFINITIONS .......................................................... 2-1 3 ABBREVIATIONS AND ACRONYMS ...................................... 3-1 Document # 17100-1.02 i Project Glossary GCM ITS Priority Corridor Multi-Modal Traveler Information System November 4, 1997 MULTI-MODAL TRAVELER INFORMATION SYSTEM SYSTEM (MMTIS) GLOSSARY 1 INTRODUCTION This report provides definitions for words or acronyms that are used in the ITS, transportation and communication industries and throughout the MMTIS documentation (listed below): • Document #17150 - Gateway TIS System Definition Document • Document #17200 - GCM Corridor Architecture Functional Requirements • Document #17250 - Gateway Functional Requirements • Document #17300 - GCM Corridor Architecture Interface Control Requirements • Document #17350 - Gateway Interface Control Requirements • Working Paper #18250 - Cellular 911 - State of the Practice • Working Paper #18380 - GCM Corridor User Needs and Data Exchange Elements • Working Paper #18400 - Current and Proposed ITS Initiatives • Working Paper #18500 - GCM MMTIS Strategic Plan • Working Paper #18520 - Performance Criteria for Evaluating GCM Corridor Strategies
    [Show full text]
  • AIX Commands Reference Vol.2 Dadmin to Hyphen
    Bull AIX Commands Reference Vol.2 dadmin to hyphen AIX ORDER REFERENCE 86 A2 39JX 02 Bull AIX Commands Reference Vol.2 dadmin to hyphen AIX Software April 2000 BULL ELECTRONICS ANGERS CEDOC 34 Rue du Nid de Pie – BP 428 49004 ANGERS CEDEX 01 FRANCE ORDER REFERENCE 86 A2 39JX 02 The following copyright notice protects this book under the Copyright laws of the United States of America and other countries which prohibit such actions as, but not limited to, copying, distributing, modifying, and making derivative works. Copyright Bull S.A. 1992, 2000 Printed in France Suggestions and criticisms concerning the form, content, and presentation of this book are invited. A form is provided at the end of this book for this purpose. To order additional copies of this book or other Bull Technical Publications, you are invited to use the Ordering Form also provided at the end of this book. Trademarks and Acknowledgements We acknowledge the right of proprietors of trademarks mentioned in this book. R AIX is a registered trademark of International Business Machines Corporation, and is being used under licence. UNIX is a registered trademark in the United States of America and other countries licensed exclusively through the Open Group. Year 2000 The product documented in this manual is Year 2000 Ready. The information in this document is subject to change without notice. Groupe Bull will not be liable for errors contained herein, or for incidental or consequential damages in connection with the use of this material. Commands Reference, Volume 2 Table
    [Show full text]
  • PC Watch Monthly Newsletter
    Perspectives PC Watch Monthly Newsletter PC Watch provides an invaluable source of information on European PC Production and related issues. This Neiusletter brings together the combined intelligence of the Worldwide Electronics Applications Group and the Worldwide Personal Computer Group. Packard Bell Acquires Zenith Data Systems Page 1 Intel Introduces Fourth Generation Pentium Chip Sets Page 2 Memory Developments in the PC Market Page 3 Intel's Motherboard Operation's Semiconductor TAM Page 5 Dell Computer Corporation—Channels and Manufacturing Page 7 Packard Bell Acquires Zenith Data Systems Packard Bell, Groupe Bull and NEC have reached an agreement that gives Packard Bell control of the Bull subsidiary. Zenith Data Systems (ZDS). Under the agreement, NEC will contribute $283 million in new investment alongside Bull's transfer of ZDS, which is valued at $367 milUon. Groupe Bull and NEC will receive convertible preference shares in the combined organization, giv­ ing each 19.9 percent of the new company, just below the 20 percent level at which they would have to consolidate the new company's results in their own figures. Dataquest estimates that Packard Bell was the world's fourth-largest PC maker in 1995 and the second-largest behind Compaq in the United States. ZDS was the thirteenth-largest PC vendor in the world and fourteenth in the United States. Combining their shipments would still leave Packard Bell fourth in the world. It would, however, become the largest PC vendor in the United States. In Europe Packard Bell was seventh and ZDS was thirteenth. Combining the two w^ould result in them rising to fourth position after Compaq, IBM and Apple.
    [Show full text]
  • Operating RISC: UNIX Standards in the 1990S
    Operating RISC: UNIX Standards in the 1990s This case was written by Will Mitchell and Paul Kritikos at the University of Michigan. The case is based on public sources. Some figures are based on case-writers' estimates. We appreciate comments from David Girouard, Robert E. Thomas and Michael Wolff. The note "Product Standards and Competitive Advantage" (Mitchell 1992) supplements this case. The latest International Computerquest Corporation analysis of the market for UNIX- based computers landed on three desks on the same morning. Noel Sharp, founder, chief executive officer, chief engineer and chief bottle washer for the Superbly Quick Architecture Workstation Company (SQAWC) in Mountain View, California hoped to see strong growth predicted for the market for systems designed to help architects improve their designs. In New York, Bo Thomas, senior strategist for the UNIX systems division of A Big Computer Company (ABCC), hoped that general commercial markets for UNIX-based computer systems would show strong growth, but feared that the company's traditional mainframe and mini-computer sales would suffer as a result. Airborne in the middle of the Atlantic, Jean-Helmut Morini-Stokes, senior engineer for the UNIX division of European Electronic National Industry (EENI), immediately looked to see if European companies would finally have an impact on the American market for UNIX-based systems. After looking for analysis concerning their own companies, all three managers checked the outlook for the alliances competing to establish a UNIX operating system standard. Although their companies were alike only in being fictional, the three managers faced the same product standards issues. How could they hasten the adoption of a UNIX standard? The market simply would not grow until computer buyers and application software developers could count on operating system stability.
    [Show full text]
  • IBM Highlights, 1996-1999
    IBM HIGHLIGHTS, 1996 - 1999 Year Page(s) 1996 2 - 7 1997 7 - 13 1998 13- 21 1999 21 - 26 November 2004 1406HE05 2 1996 Business Performance IBM revenue reaches $75.94 billion, an increase of six percent over 1995, and earnings grow by nearly 30 percent to $5.42 billion. There are 240,615 employees and 622,594 stockholders at year end. Speaking in Atlanta to a group of shareholders, analysts and reporters at the corporation’s annual meeting, IBM chairman Louis V. Gerstner, Jr., discusses IBM’s condition, prospects for growth and the importance of network computing to the company’s future. IBM reaches agreement with the United States Department of Justice to terminate within five years all remaining provisions of the Consent Decree first entered into by IBM and the U.S. government in 1956. Organization IBM forms the Network Computer Division in November. The company says it will operate its worldwide services business under a single brand: IBM Global Services. IBM puts its industry-specific business units on a single global general manager. IBM and Tivoli Systems Inc. enter a merger agreement. Tivoli is a leading provider of systems management software and services for distributed client/server networks of personal computers and workstations. IBM’s acquisition of Tivoli extends the company’s strength in host-based systems management to multiplatform distributed systems. IBM and Edmark Corporation, a developer and publisher of consumer and education software, complete a merger in December. IBM acquires The Wilkerson Group, one of the world’s oldest and largest consulting firms dedicated to the pharmaceutical and medical products industry.
    [Show full text]
  • Alerte Internet Sous Surveillance
    Décembre 2011 Alerte : internet sous surveillance ! État des lieux, exportations et contrôle démocratique des outils de surveillance de l’Internet Le « Deep Packet Inspection », exportations d’un savoir-faire français Table ronde du mercredi 14 décembre 2011 à l’Assemblée Nationale à l’initiative et invitation de monsieur le député Christian Paul. Compte rendu textuel non officiel de l’enregistrement sonore agrémenté de liens référents et d’annexes pour comprendre des enjeux discutés. Document finalisé le 31 décembre 2011. Mis à disposition sous licence Creative Commons. Table ronde – Etat des lieux, exportations et contrôle démocratique des outils de surveillance de 2 l’Internet. Table ronde – Etat des lieux, exportations et contrôle démocratique des outils de surveillance de 3 l’Internet. Observations des rédacteurs Cette transcription réalisée -initialement par Lpenet, Patchidem et Seb, puis corrigée, sourcée et mise en forme par des lecteurs de Reflets.info comme Mi0 et d’autre volontaires- à partir du document sonore n’est en rien officielle et ne peut se prévaloir comme telle. Réalisée par des amateurs, dans un outil de traitement de texte grand public, elle peut ne pas observer les règles typographiques en vigueur. Les propos des différents intervenants ont été dans la mesure du possible le plus fidèlement rapportés aux dépens parfois de règles syntaxiques et orthographiques afin de ne pas perdre la spontanéité des échanges et débats. Seules, quand la compréhension des propos l’exigeait, des formules ont été arrangées (syntaxe, ponctuation, répétitions) afin de ne pas perdre en clarté. Certains propos n’ont pu être attribués à un intervenant particulier, faute de savoir qui parlait lors des échanges ; ces derniers sont identifiés comme « intervenant non reconnu ».
    [Show full text]
  • AIX 4.3 Quick Beginnings
    Bull AIX 4.3 Quick Beginnings AIX ORDER REFERENCE 86 A2 75HX 04 Bull AIX 4.3 Quick Beginnings AIX Software September 1999 BULL ELECTRONICS ANGERS CEDOC 34 Rue du Nid de Pie – BP 428 49004 ANGERS CEDEX 01 FRANCE ORDER REFERENCE 86 A2 75HX 04 The following copyright notice protects this book under the Copyright laws of the United States of America and other countries which prohibit such actions as, but not limited to, copying, distributing, modifying, and making derivative works. Copyright Bull S.A. 1992, 1999 Printed in France Suggestions and criticisms concerning the form, content, and presentation of this book are invited. A form is provided at the end of this book for this purpose. To order additional copies of this book or other Bull Technical Publications, you are invited to use the Ordering Form also provided at the end of this book. Trademarks and Acknowledgements We acknowledge the right of proprietors of trademarks mentioned in this book. AIXR is a registered trademark of International Business Machines Corporation, and is being used under licence. UNIX is a registered trademark in the United States of America and other countries licensed exclusively through the Open Group. Year 2000 The product documented in this manual is Year 2000 Ready. The information in this document is subject to change without notice. Groupe Bull will not be liable for errors contained herein, or for incidental or consequential damages in connection with the use of this material. About This Book: AIX 4.3 Quick Beginnings This book contains information for first–time users who have little or no experience with the AIX operating system.
    [Show full text]
  • AIX 4.3 System Management Guide Communications and Networks
    Bull AIX 4.3 System Management Guide Communications and Networks AIX ORDER REFERENCE 86 A2 31JX 02 Bull AIX 4.3 System Management Guide Communications and Networks AIX Software October 1999 BULL ELECTRONICS ANGERS CEDOC 34 Rue du Nid de Pie – BP 428 49004 ANGERS CEDEX 01 FRANCE ORDER REFERENCE 86 A2 31JX 02 The following copyright notice protects this book under the Copyright laws of the United States of America and other countries which prohibit such actions as, but not limited to, copying, distributing, modifying, and making derivative works. Copyright Bull S.A. 1992, 1999 Printed in France Suggestions and criticisms concerning the form, content, and presentation of this book are invited. A form is provided at the end of this book for this purpose. To order additional copies of this book or other Bull Technical Publications, you are invited to use the Ordering Form also provided at the end of this book. Trademarks and Acknowledgements We acknowledge the right of proprietors of trademarks mentioned in this book. AIXR is a registered trademark of International Business Machines Corporation, and is being used under licence. UNIX is a registered trademark in the United States of America and other countries licensed exclusively through the Open Group. Year 2000 The product documented in this manual is Year 2000 Ready. The information in this document is subject to change without notice. Groupe Bull will not be liable for errors contained herein, or for incidental or consequential damages in connection with the use of this material. About This Book This book is for AIX system administrators who maintain the system’s network connections.
    [Show full text]
  • System Management Guide Communications and Networks
    Bull System Management Guide Communications and Networks AIX ORDER REFERENCE 86 A2 27EF 03 Bull System Management Guide Communications and Networks AIX Software June 2003 BULL CEDOC 357 AVENUE PATTON B.P.20845 49008 ANGERS CEDEX 01 FRANCE ORDER REFERENCE 86 A2 27EF 03 The following copyright notice protects this book under the Copyright laws of the United States of America and other countries which prohibit such actions as, but not limited to, copying, distributing, modifying, and making derivative works. Copyright Bull S.A. 1992, 2003 Printed in France Suggestions and criticisms concerning the form, content, and presentation of this book are invited. A form is provided at the end of this book for this purpose. To order additional copies of this book or other Bull Technical Publications, you are invited to use the Ordering Form also provided at the end of this book. Trademarks and Acknowledgements We acknowledge the right of proprietors of trademarks mentioned in this book. AIXR is a registered trademark of International Business Machines Corporation, and is being used under licence. UNIX is a registered trademark in the United States of America and other countries licensed exclusively through the Open Group. Linux is a registered trademark of Linus Torvalds. The information in this document is subject to change without notice. Groupe Bull will not be liable for errors contained herein, or for incidental or consequential damages in connection with the use of this material. About This Book This book is for system administrators who maintain the operating system’s network connections. Familiarity with the Base Operating System and the material covered in AIX 5L Version 5.2 System Management Guide: Operating System and Devices and AIX 5L Version 5.2 System User’s Guide: Communications and Networks is necessary.
    [Show full text]
  • The Organizational and Geographic Configuration of the Personal Computer Value Chain
    Kenney text.qxd 8/1/03 8:55 AM Page 111 part two Kenney text.qxd 8/1/03 8:55 AM Page 112 Kenney text.qxd 8/1/03 8:55 AM Page 113 chapter five The Organizational and Geographic Configuration of the Personal Computer Value Chain james curry martin kenney Frederick Jameson (1991), in one of his ruminations on postmodernism, re- marks that the personal computer (PC) comes up short as a visual emblem in an era that is, at least, in part defined by digital technology.1 Notwithstanding the potent symbolism of the beige (or black) box, the PC falls short as an art object. And yet, the installed base of 500 million PCs worldwide not only pro- vides desktop computing to hundreds of millions but also makes the PC the de- vice that enabled the Internet to become more than just a curiosity for research scientists affiliated with universities and government laboratories. Even if it is not iconic, the PC has in some way touched every other industry discussed in this book, as it has become the ubiquitous information appliance, and the Dell business model has become universally admired. The production and distribu- tion of the PC illustrates, nearly perfectly, the dynamics discussed in the Intro- duction. The tension between the global and the local suffuses the PC industries and is derived from the modular design of the personal computer system. The phys- ical components of the greatest value and technical virtuosity are the semicon- ductors and the hard disk drive. We omit the monitor in this statement, though as Murtha, Lenway, and Hart show in Chapter 7, the flat panel display (FPD) is certainly worthy of placement in this group of components.
    [Show full text]
  • IBM US Nuke-Lab Beast 'Sequoia' Is Top of the Flops (Petaflops, That Is) | Insidehpc.Com
    Advertisement insideHPC Skip to content Latest News HPC Hardware Software Tools Events inside-BigData Search Rock Stars of HPC Videos inside-Startups HPC Jobs IBM US Nuke-lab Beast ‘Sequoia’ is Top of the Flops (Petaflops, that is) 06.18.2012 Mi piace By Timothy Prickett Morgan • Get more from this author For the second time in the past two years, a new supercomputer has taken the top ranking in the Top 500 list of supercomputers – and it does not use a hybrid CPU-GPU architecture. But the question everyone will be asking at the International Super Computing conference in Hamburg, Germany today is whether this is the last hurrah for such monolithic parallel machines and whether the move toward hybrid machines where GPUs or other kinds of coprocessors do most of the work is inevitable. No one can predict the future, of course, even if they happen to be Lawrence Livermore National Laboratory (LLNL) and even if they happen to have just fired up IBM’s “Sequoia” BlueGene/Q beast, which has been put through the Linpack benchmark paces, delivering 16.32 petaflops of sustained performance running across the 1.57 million PowerPC cores inside the box. Sequoia has a peak theoretical performance of 20.1 petaflops, so 81.1 per cent of the possible clocks in the box that could do work running Linpack did so when the benchmark test was done. LLNL was where the original BlueGene/L super was commercialized, so that particular Department of Energy nuke lab knows how to tune the massively parallel Power machine better than anyone on the planet, meaning the efficiency is not a surprise.
    [Show full text]
  • Patrimoine Industriel
    archéologie technique mémoire PATRIMOINE INDUSTRIEL L'INFORMATIQUE N° 73- DÉCEMBRE 2018 ARITHMOMÈTRE THOMAS DE COLMAR, FABRICATION PAYEN, 1900 Colllection Homo Calculus LIGNE DE CODES HTML, 2015 James Osborne -Pixabay Licence LA POUDRIÈRE NUMÉRIQUE Christophe Kicien : Le 5 Studio - Groupe Decima Revue semestrielle du CILAC Dépot légal : mars 2020 ISSN : 0220-5521 Impression : Chirat (Roanne) CILAC - BP 20115 - 75 261 PARIS cedex 06 Le CILAC laisse aux auteurs la responsabilité de leurs propos. Toute reproduction, même partielle, est soumise à l'autorisation préalable du CILAC. Les textes et les clichés sont protégés par des copyrights. N° 73 - DÉCEMBRE 2018 DIRECTRICE DE LA PUBLICATION FLORENCE HACHEZ-LEROY, PRÉSIDENTE DU CILAC DIRECTEUR DE LA RÉDACTION PAUL SMITH COORDINATION FLORENCE HACHEZ-LEROY CONCEPTION GRAPHIQUE AGENCE LES PISTOLEROS CONTACTS MAQUETTAGE FRÉDÉRIC PILLET COMITÉ DE RÉDACTION [email protected] GÉRAUD BUFFA, ANNE-LAURE CARRÉ, SECRÉTAIRE GÉNÉRAL : [email protected] SERGE CHASSAGNE, GRACIA DOREL-FERRÉ, ADHÉSIONS ET ABONNEMENTS : [email protected] GENEVIÈVE DUFRESNE, MARIE-FRANÇOISE GRIBET, RÉDACTION DE LA REVUE : [email protected] FLORENCE HACHEZ-LEROY, JEAN-LOUIS KEROUANTON, SITE WEB : [email protected] ANTOINE MONNET†, NICOLAS PIERROT, www.cilac.com FRÉDÉRIC PILLET, PAUL SMITH, DENIS WORONOFF ANCIENS NUMÉROS PREMIÈRE SÉRIE DEUXIÈME SÉRIE TROISIÈME SÉRIE N°1 AU N°25 (1976/1994) N°26 AU N°64 (1995/2014) N°65 AU N° 72 (2015-2018) Téléchargeable sur Les n°26, 28 et 29 sont épuisés. Les n°65 à 72 sont à commander www.cilac.com au prix Ils sont téléchargeables sur sur www.cilac.com ou auprès de 15 € chaque. www.cilac.com. du secrétariat du CILAC, au prix Les n°27, 30 à 64 sont à unitaire de 25 €, frais de port inclus.
    [Show full text]