HP TCP/IP Services for Openvms Management

HP TCP/IP Services for Openvms Management

HP TCP/IP Services for OpenVMS Management Order Number: BA548-90006 July 2006 This manual describes how to configure and manage the TCP/IP Services product. Revision/Update Information: This manual supersedes Compaq TCP/IP Services for OpenVMS Management, Version 5.4. Software Version: HP TCP/IP Services for OpenVMS Version 5.6 Operating System: HP OpenVMS Alpha Version 8.3 HP OpenVMS I64 Version 8.3 Hewlett-Packard Company Palo Alto, California © 2006 Hewlett-Packard Development Company, L.P. Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor’s standard commercial license. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. UNIX is a registered trademark of The Open Group. Microsoft, Windows and Windows NT are US registered trademarks of Microsoft Corporation. ZK6526 The HP TCP/IP Services for OpenVMS documentation is available on CD-ROM. This document was prepared using DECdocument, Version 3.3-1b. Contents Preface ............................................................ xxiii Part 1 Connecting to the Network 1 Managing TCP/IP Services 1.1 Getting Started ............................................. 1–1 1.1.1 Logical Names . ........................................ 1–2 1.1.2 Modifying Your Configuration ............................... 1–3 1.1.3 Saving Changes . ........................................ 1–3 1.1.4 Starting and Stopping the Software ........................... 1–4 1.1.5 Editing Configuration Files . ................................ 1–5 1.2 Enabling PATHWORKS/Advanced Server and DECnet-over-TCP/IP Support . ................................................ 1–6 1.2.1 Starting and Stopping the PWIP Driver ....................... 1–6 1.3 Setting Up User Accounts and Proxy Identities ..................... 1–7 1.4 Configuring a TCP/IP Cluster . ................................ 1–8 1.4.1 Setting Up an ARP-Based Cluster ............................ 1–8 1.5 Auxiliary Server ............................................. 1–9 1.5.1 How the Auxiliary Server Works ............................. 1–9 1.5.1.1 Rejecting Client Requests ............................... 1–9 1.5.1.2 Configuring the Auxiliary Server . ....................... 1–9 1.6 Enabling Services ............................................ 1–11 1.6.1 Setting Up Event Logging . ................................ 1–11 2 Configuring Interfaces 2.1 Key Concepts ............................................... 2–1 2.2 Configuring Network Controllers ................................ 2–1 2.3 Configuring Network Interfaces . ................................ 2–2 2.3.1 Specifying the Interface .................................... 2–2 2.3.2 Specifying the Network Mask ............................... 2–3 2.3.3 Specifying Additional IP Addresses ........................... 2–3 3 Configuring and Managing Serial Lines 3.1 Key Concepts ............................................... 3–1 3.1.1 PPP and SLIP . ........................................ 3–1 3.1.2 Assigning an IP Address to Your PPP or SLIP Interface ........... 3–2 3.1.3 Serial Line Internet Protocol ................................ 3–2 3.1.4 Point-to-Point Protocol ..................................... 3–3 3.2 Setting Up a PPP Interface (Alpha Only) . ....................... 3–3 iii 3.2.1 Setting Up Your Host for PPP Connections ..................... 3–4 3.2.1.1 Installing the Terminal Driver ............................ 3–4 3.2.1.2 Configuring the Modem . ................................ 3–5 3.2.1.3 Setting Up an Asynchronous Port . ....................... 3–6 3.2.1.4 Configuring a PPP Interface ............................. 3–7 3.2.1.5 Enabling IP Forwarding (Dialup Provider Only) .............. 3–7 3.2.1.6 Initiating a PPP Connection ............................. 3–8 3.2.2 Removing the PPP Configuration ............................. 3–9 3.3 Setting Up a SLIP Interface . ................................ 3–10 3.3.1 Setting Up Hard-Wired SLIP Lines ........................... 3–11 3.3.2 Setting Up SLIP Dialup Lines ............................... 3–11 3.3.3 Setting Up Your Host as a SLIP Dialup Provider . ............... 3–13 3.3.4 Connecting a Host to the LAN ............................... 3–14 3.3.5 Setting Up a SLIP Gateway with Proxy ARP ................... 3–14 3.3.6 Shutting Down SLIP ...................................... 3–15 3.4 Solving Serial Line Problems . ................................ 3–15 3.4.1 Solving PPP Problems ..................................... 3–16 4 Configuring and Managing Routing 4.1 Key Concepts ............................................... 4–1 4.1.1 Static Routing . ........................................ 4–1 4.1.2 Dynamic Routing . ........................................ 4–1 4.1.2.1 Routing Daemon (ROUTED) ............................. 4–2 4.1.2.2 Gateway Routing Daemon (GATED) ....................... 4–2 4.2 Configuring Static Routes ..................................... 4–3 4.2.1 Creating a Default Route . ................................ 4–3 4.2.2 Manually Defining Static Routes ............................. 4–3 4.2.2.1 Examples ............................................ 4–4 4.2.3 Displaying Manually Defined Routes . ....................... 4–5 4.3 Enabling and Disabling Dynamic Routing . ....................... 4–6 4.4 Configuring GATED . ........................................ 4–6 4.4.1 Datagram Reassembly Time ................................ 4–7 4.4.2 Enabling Forwarding ...................................... 4–7 4.4.3 Extending Routing ........................................ 4–8 4.4.4 Interface Routes . ........................................ 4–9 4.4.5 Manually Configuring a Hardware Address ..................... 4–10 5 Configuring and Managing failSAFE IP 5.1 Key Concepts ............................................... 5–1 5.2 Configuring failSAFE IP ...................................... 5–2 5.2.1 Configuring failSAFE IP Manually ........................... 5–2 5.2.2 Modifying the failSAFE IP Configuration Parameters ............. 5–3 5.2.3 Creating and Displaying Home Interfaces ...................... 5–5 5.3 Managing failSAFE IP ........................................ 5–5 5.3.1 failSAFE IP Logical Names . ................................ 5–6 5.3.2 Customizing failSAFE IP . ................................ 5–7 5.3.3 Reestablishing Static and Dynamic Routing .................... 5–7 5.3.4 Displaying the Status of Interfaces ........................... 5–8 iv 5.3.5 Guidelines for Configuring failSAFE IP . ....................... 5–8 5.3.5.1 Validating failSAFE IP . ................................ 5–8 5.3.5.2 Configuring Failover Time ............................... 5–9 5.3.5.3 Avoiding Phantom Failures .............................. 5–10 5.3.5.4 Creating IP Addresses with Home Interfaces . ............... 5–10 5.3.5.5 Private Addresses Should Not Have Clusterwide Standby Interfaces ............................................ 5–10 Part 2 BIND 6 Configuring and Managing BIND Version 9 6.1 Key Concepts ............................................... 6–2 6.1.1 How the Resolver and Name Server Work Together .............. 6–2 6.1.2 Common BIND Configurations ............................... 6–2 6.1.2.1 Master Servers ........................................ 6–3 6.1.2.2 Slave Servers . ........................................ 6–3 6.1.2.3 Caching-Only Servers . ................................ 6–3 6.1.2.4 Forwarder Servers ..................................... 6–3 6.2 Security Considerations ....................................... 6–4 6.2.1 Access Control Lists ....................................... 6–4 6.2.2 Dynamic Update Security . ................................ 6–5 6.2.3 TSIG . ................................................ 6–5 6.2.4 TKEY . ................................................ 6–8 6.2.5 SIG(0) . ................................................ 6–8 6.2.6 DNSSEC ............................................... 6–8 6.2.6.1 DNSSEC Restrictions . ................................ 6–10 6.3 Migrating from BIND Version 4 to BIND Version 9 . ............... 6–11 6.3.1 Navigating Two Different BIND Environments . ............... 6–11 6.4 BIND Service Startup and Shutdown ............................ 6–12 6.5 Configuring the BIND Server . ................................ 6–13 6.5.1 Configuration File Elements ................................ 6–13 6.5.2 Address Match Lists ...................................... 6–15 6.5.3 Configuration File Format . ................................ 6–16 6.5.3.1 The ACL Statement .................................... 6–18 6.5.3.2 The CONTROLS Statement .............................. 6–18 6.5.3.3 The INCLUDE Statement ............................... 6–19 6.5.3.4 The KEY Statement .................................... 6–19 6.5.3.5 The LOGGING Statement ............................... 6–20 6.5.3.5.1 The Channel Phrase ................................ 6–21 6.5.3.5.2 The Category Phrase ................................ 6–22 6.5.3.6 The MASTERS Statement ............................... 6–24 6.5.3.7 The OPTIONS Statement

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    642 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us