IBM Z/OS V1R13 Communications Server TCP/IP Implementation: Volume 2 Standard Applications

IBM Z/OS V1R13 Communications Server TCP/IP Implementation: Volume 2 Standard Applications

Front cover IBM z/OS V1R13 Communications Server TCP/IP Implementation: Volume 2 Standard Applications Provides information about z/OS Communications Server TCP/IP standard applications Discusses how to take advantage of TCP/IP standard applications for your needs Includes TCP/IP application implementation examples Mike Ebbers Rama Ayyar Octavio L Ferreira Yohko Ojima Gilson Cesar de Oliveira Mike Riches Maulide Xavier ibm.com/redbooks International Technical Support Organization IBM z/OS V1R13 Communications Server TCP/IP Implementation: Volume 2 Standard Applications December 2011 SG24-7997-00 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. First Edition (December 2011) This edition applies to Version 1, Release 13 of IBM z/OS Communications Server (product number 5694-A01). © Copyright International Business Machines Corporation 2011. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . .x Preface . xi The team who wrote this book . xii Now you can become a published author, too! . xiii Comments welcome. xiv Stay connected to IBM Redbooks . xiv Chapter 1. The syslog daemon . 1 1.1 Conceptual overview of syslogd . 2 1.1.1 What is syslogd. 2 1.1.2 How syslogd works . 3 1.1.3 How can syslogd be deployed . 3 1.2 Log messages to different files and to a single file . 5 1.2.1 Description of logging to multiple files and to a single file. 5 1.2.2 Configuration of multiple files and a single file . 5 1.2.3 Verification of multiple files and a single file . 13 1.3 Starting two syslogd instances . 14 1.3.1 Description of two syslogd instances . 14 1.3.2 Configuring two syslogd instances . 14 1.3.3 Verification for running two syslogd instances . 17 1.4 The syslogd functions . 18 1.4.1 The syslogd operator commands . 19 1.4.2 Description of syslogd automatic archival. 19 1.4.3 The syslogd browser and search facility . 25 1.5 Problem determination for syslogd logging . 33 1.6 Additional information sources for syslogd . 34 Chapter 2. TN3270E Telnet server . 35 2.1 Conceptual overview of the TN3270E server . 36 2.1.1 What is the TN3270E server. 36 2.1.2 How does the TN3270E server work . 37 2.1.3 Possible uses for the TN3270E server . 42 2.2 TN3270E server in a single image . 43 2.2.1 Description of our TN3270E server scenario . 44 2.2.2 Configuration of the TN3270E server . 44 2.2.3 Activation of the TN3270E server . 53 2.2.4 Verification of the TN3270E server . 53 2.2.5 Administration and management of the TN3270E server . 66 2.3 Multiple TN3270E servers in a multiple image environment . 77 2.3.1 Multiple TN3270E servers within the sysplex . 78 2.3.2 Configuration of multiple TN3270E servers within the sysplex . 80 2.3.3 Activation and verification of multiple TN3270E servers in the sysplex . 86 2.4 Multiple TN3270E servers using LU name server and LU name requester . 95 2.4.1 Description of TN3270E servers using LU name server and requester . 96 2.4.2 Configuration of TN3270E servers within sysplex using LU name server and requester. 102 2.4.3 Activation and verification of LU name server and requester within sysplex . 109 © Copyright IBM Corp. 2011. All rights reserved. iii 2.4.4 Scenario: LU name server automated takeover when active name server fails . 124 2.5 TN3270E server in a single image using SHAREACB . 128 2.5.1 Overview of SHAREACB utilization . 128 2.5.2 Configuration of the TN3270E server with SHAREACB option. 129 2.5.3 Activation of the TN3270E server . 130 2.5.4 Verification of the TN3270E server with SHAREACB defined . 131 2.6 TN3270 support of TSO logon reconnect . 132 2.7 Problem determination for the TN3270E servers . 132 2.7.1 Review the definition statements within the profile . 132 2.7.2 Use TCP/IP and Telnet commands. 133 2.7.3 Use the MSG07 statement in the TN3270 profile . 138 2.7.4 Use SMF records to capture TN3270 connection activity. 139 2.7.5 Use trace data. 139 2.7.6 Tips for multiple TN3270E servers in a Parallel Sysplex environment . 140 2.7.7 Tips for LU name server and LU name requester diagnosis. 140 2.8 Additional information sources for the TN3270E server . 141 Chapter 3. File Transfer Protocol. 143 3.1 Conceptual overview of FTP . 144 3.1.1 What is FTP . 144 3.1.2 How does FTP work . 145 3.1.3 How can FTP be used . 146 3.2 Basic FTP without security . 148 3.2.1 Description of basic FTP without security . 148 3.2.2 Planning for the basic FTP environment without security . 149 3.2.3 Configuration of basic FTP without security . 162 3.2.4 Activation and verification for basic FTP without security . 165 3.3 Multiple FTP servers in a sysplex . 173 3.3.1 Description of multiple FTP servers in a sysplex . 173 3.3.2 Configuration for multiple FTP servers in the sysplex. 175 3.3.3 Activation and verification of FTP servers within sysplex . 178 3.4 FTP client using batch. 187 3.4.1 Description of FTP client using batch . 187 3.4.2 Configuration of FTP client using batch . 188 3.4.3 Activation and verification of FTP client batch job. 189 3.5 FTP client application program interface. 190 3.5.1 FTP client API for REXX . 190 3.5.2 FTP client API for Java . 191 3.6 FTP access to UNIX named pipes . 192 3.6.1 What are UNIX named pipes . 192 3.6.2 Description of FTP access to UNIX named pipes. ..

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    512 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us