TCP/IP User's Guide
Total Page:16
File Type:pdf, Size:1020Kb
VSI OpenVMS TCP/IP User's Guide Document Number: DO-DVTUSG-01B Publication Date: August 2019 This document describes how to use the VSI TCP/IP user commands. Included are easy to follow instructions for beginning users and command pages for advanced users. Revision Update Information: This guide supercedes the VSI TCP/IP User's Guide, Version 10.5. Operating System and Version: VSI OpenVMS Version 8.4-2L1 or higher Software Version: VSI TCP/IP for OpenVMS Version 10.6 VMS Software, Inc. (VSI) Bolton, Massachusetts, USA TCP/IP User's Guide: Copyright © 2019 VMS Software, Inc., (VSI), Bolton Massachusetts, USA Legal Notice Confidential computer software. Valid license from VSI required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. The information contained herein is subject to change without notice. The only warranties for VSI products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. VSI shall not be liable for technical or editorial errors or omissions contained herein. HPE, HPE Integrity, HPE Alpha, and HPE Proliant are trademarks or registered trademarks of Hewlett Packard Enterprise. Intel, Itanium and IA64 are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other coun- tries. Java, the coffee cup logo, and all Java based marks are trademarks or registered trademarks of Oracle Corporation in the United States or other countries. Kerberos is a trademark of the Massachusetts Institute of Technology. Microsoft, Windows, Windows-NT and Microsoft XP are U.S. registered trademarks of Microsoft Corporation. Microsoft Vista is either a registered trademark or trademark of Microsoft Corporation in the United States and/or other countries. Motif is a registered trademark of The Open Group UNIX is a registered trademark of The Open Group. The VSI OpenVMS documentation set is available on DVD. ii TCP/IP User's Guide Preface .................................................................................................................................... ix 1. About VSI ..................................................................................................................... ix 2. Intended Audience ......................................................................................................... ix 3. Typographical Conventions ............................................................................................ ix 4. VSI TCP/IP Support ....................................................................................................... x 5. VSI Encourages Your Comments ..................................................................................... x 6. How to Order Additional Documentation ........................................................................ xi Chapter 1. Using VSI TCP/IP .............................................................................................. 1 1.1. Specifying Remote Hosts ............................................................................................. 1 1.1.1. Displaying Names of Other Users ...................................................................... 1 1.1.2. Displaying Host Information .............................................................................. 1 1.1.3. Displaying User Information .............................................................................. 2 1.1.4. Interacting with Another User ............................................................................ 3 1.1.4.1. Sending Reminders to Yourself ............................................................... 4 1.1.4.2. Restrictions for Using TALK ................................................................... 4 1.2. Using DECwindows with VSI TCP/IP .......................................................................... 5 1.2.1. Running DECwindows Applications ................................................................... 6 1.2.2. Authorizing Remote Systems ............................................................................. 6 1.3. Sending and Receiving Electronic Mail ......................................................................... 6 1.3.1. Specifying Addresses ......................................................................................... 6 1.3.2. Specifying a Host Alias ..................................................................................... 8 1.3.3. Specifying Individual Aliases ............................................................................. 8 1.4. Using Kerberos Authentication ..................................................................................... 9 1.4.1. Understanding VSI Kerberos for OpenVMS ....................................................... 9 1.4.2. Making Sure Kerberos is Available .................................................................. 10 1.4.3. Acquiring and Deleting Tickets ........................................................................ 10 1.4.3.1. Obtaining Tickets Under Another User Name ......................................... 10 1.4.4. Using Kerberos with the RCP, RLOGIN, RSHELL, and TELNET Com- mands ....................................................................................................................... 10 1.4.5. Checking Ticket Status .................................................................................... 11 1.4.6. Changing Your Kerberos Password ................................................................... 11 Chapter 2. Accessing Remote Systems (RSHELL, RLOGIN, TELNET) ...................... 13 2.1. Executing Commands on a Remote System Using RSHELL ......................................... 13 2.1.1. Using and Terminating RSHELL ...................................................................... 13 2.2. Logging Into a Remote System with RLOGIN ............................................................. 14 2.2.1. Using and Terminating RLOGIN ...................................................................... 14 2.2.2. "R" Services Authentication ............................................................................. 14 2.2.3. Host Equivalences ........................................................................................... 15 2.2.4. User Equivalences ........................................................................................... 15 2.2.4.1. Cautions Concerning Use of Equivalences .............................................. 16 2.3. Logging Into a Remote System with TELNET ............................................................. 16 2.3.1. Starting a TELNET Connection ........................................................................ 16 2.3.2. Using TELNET Commands ............................................................................. 17 2.3.3. Using TELNET Control Sequences .................................................................. 18 2.3.4. Running Applications over TELNET Connections ............................................. 19 2.3.5. Accessing IBM Hosts with the TELNET Command .......................................... 20 2.3.6. Starting and Stopping an IBM Terminal Emulator Using TELNET ..................... 20 2.3.7. IBM 3278 Models ........................................................................................... 21 2.3.8. Mapping Your Keyboard .................................................................................. 21 2.3.9. Displaying the Current Keyboard Mapping ....................................................... 21 2.3.10. Keyboard Mapping File Format ...................................................................... 23 iii TCP/IP User's Guide 2.3.10.1. Functions ............................................................................................ 23 2.3.11. Specifying Multiple Keystrokes ...................................................................... 24 2.3.12. TN3270 Function Key Mapping ..................................................................... 24 2.3.13. TN5250 Function Key Mapping ..................................................................... 25 2.3.14. Editing the Keyboard Mapping File ................................................................ 27 2.3.15. Capturing Screen Output and Printing Screen Captures .................................... 27 2.3.16. Using Transparent Mode ................................................................................ 28 2.3.17. Application Keypad Access for TN3270 and TN5250 ...................................... 28 2.3.18. TN3270 Emulation ........................................................................................ 28 2.3.19. TN3270 Translation Table Mapping ............................................................... 28 2.3.20. Kerberos V5 Authentication and Encryption .................................................... 30 2.3.21. Troubleshooting TELNET .............................................................................. 30 2.3.21.1. Connection Problems .......................................................................... 30 2.3.21.2. Problems Logging In ........................................................................... 30 Chapter 3. Remote File Access (RCP, FTP, TFTP) .........................................................