AIX 4.3 System Management Guide
AIX 4.3 System Management Guide
AIX
ORDER REFERENCE
86 A2 31JX 02
Bull
AIX 4.3 System Management Guide
Communications and Networks
AIX
Software
October 1999
ORDER REFERENCE
86 A2 31JX 02
The following copyright notice protects this book under the Copyright laws of the United States of America
and other countries which prohibit such actions as, but not limited to, copying, distributing, modifying, and
making derivative works.
Printed in France
To order additional copies of this book or other Bull Technical Publications, you
are invited to use the Ordering Form also provided at the end of this book.
AIXR is a registered trademark of International Business Machines Corporation, and is being used under
licence.
UNIX is a registered trademark in the United States of America and other countries licensed exclusively through
the Open Group.
Year 2000
The product documented in this manual is Year 2000 Ready.
The information in this document is subject to change without notice. Groupe Bull will not be liable for errors
contained herein, or for incidental or consequential damages in connection with the use of this material.
About This Book
This book is for AIX system administrators who maintain the system’s network connections.
Familiarity with the Base Operating System and the material covered in AIX 4.3 System
Management Guide: Operating System and Devices and AIX 4.3 System User’s Guide:
Communications and Networks is necessary.
Highlighting
The following highlighting conventions are used in this book:
ISO 9000
ISO 9000 registered quality systems were used in the development and manufacturing of
this product.
Preface iii
Related Publications
The following book contains information about or related to communications:
AIX and Related Products Documentation Overview, order number 86 A2 71WE.
AIX 4.3 System Management Guide: Operating System and Devices,
order number 86 A2 99HX.
AIX 4.3 System User’s Guide: Communications and Networks, order number 86 A2 98HX.
AIX General Programming Concepts: Writing and Debugging Programs,
order number 86 A2 34JX.
AIX Commands Reference, order number 86 A2 38JX to 86 A2 43JX.
AIX 4.3 Installation Guide, order number 86 A2 43GX.
The TTY Subsystem Overview in AIX General Programming Concepts: Writing and
Debugging Programs provides general information on line disciplines and the tty code.
See also the following industry publications:
Token–Ring Network Architecture Reference, order number SC30–3374.
Albitz, Paul and Liu, Cricket, [1992], DNS and BIND in a Nutshell, O’Reilly & Associates,
Inc., Sebastopol, CA, ISBN 0–56592–010–4.
Comer, Douglas E., [1991], Internetworking with TCP/IP, Volume I: Principles, Protocols,
and Architectures, Prentice Hall, Englewood Cliffs, NJ, ISBN 0–13–468505–9.
Comer, Douglas E. and Stevens, David L., [1991], Internetworking with TCP/IP, Volume II:
Design, Implementation, and Internals, Prentice Hall, Englewood Cliffs, NJ, ISBN
0–13–472242–6.
Costales, Bryan, Eric Allman, and Neil Rickert, sendmail, O’Reilly & Associates, Inc.,
Sebastopol, CA, 1993.
Hunt, Craig, [1992], TCP/IP Network Administration, O’Reilly & Associates, Inc., Sebastopol,
CA, ISBN 0–93–717582–X.
Stern, Hal, [1991], Managing NFS and NIS, O’Reilly & Associates, Inc., Sebastopol, CA,
ISBN 0–93–717575–7.
Stevens, Richard W., [1990], UNIX Network Programming, Prentice Hall, Englewood Cliffs,
NJ, ISBN 0–13–949876–1.
Tanenbaum, Andrew S., Computer Networks, Prentice Hall, Englewood Cliffs, NJ, ISBN
0–13–165183–8.
Vanel, Laurent, Steve Gardner, Praben Prima, Simon Robertson, and Oreste Villari, AIX and
Windows NT: Solutions for Interoperability, International Business Machines, Inc.
http://www.redbooks.ibm.com
Ordering Publications
You can order this book separately from Bull Electronics Angers S.A. CEDOC. See address
in the Ordering Form at the end of this book.
To order additional copies of this book, use order number 86 A2 31JX.
Use AIX and Related Products Documentation Overview for information on related
publications and how to obtain them.
Preface v
TCP/IP System Manager Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4
Configuring a TCP/IP Network Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4
TCP/IP Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6
Internet Protocol (IP) Version 6 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-9
IPv6 in AIX: Supplementary Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-16
Packet Tracing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-20
Network Interface Packet Headers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-20
Internet Network–Level Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-23
Internet Transport–Level Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-28
Internet Application–Level Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-31
Assigned Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-35
TCP/IP Network Adapter Cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-36
Installing a Network Adapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-36
Configuring and Managing Adapters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-37
Turboways 100 and 155 Asynchronous Transfer Mode (ATM) Adapters . . . . . . 3-38
TCP/IP Network Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-47
Automatic Configuration of Network Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-47
Implications of Multiple Network Interfaces on the Same Network . . . . . . . . . . . . 3-51
Managing Network Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-51
TCP/IP Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-52
Internet Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-52
Subnet Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-54
Broadcast Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-57
Local Loopback Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-57
Getting an Official Internet Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-57
TCP/IP Address and Parameter Assignment – Dynamic Host Configuration Protocol
(DHCP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-58
The DHCP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-59
Planning DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-62
Configuring DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-62
DHCP and the Dynamic Domain Name System (DDNS) . . . . . . . . . . . . . . . . . . . . 3-67
DHCP Compatibility with Older Versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-69
DHCP Server File Known Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-70
DHCP Server File Syntax for General Server Operation . . . . . . . . . . . . . . . . . . . . 3-73
DHCP Server File Syntax for db_file Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-75
DHCP and Network Installation Management (NIM)
Interactions and Suggestions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-89
Configuring TCP/IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-90
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-90
Updating the Hosts List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-90
TCP/IP Daemons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-91
Subsystems and Subservers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-91
System Resource Control (SRC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-92
Configuring the inetd Daemon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-94
Client Network Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-95
Server Network Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-96
TCP/IP Name Resolution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-97
Naming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-97
Performing Local Name Resolution (/etc/hosts) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-103
Planning for DOMAIN Name Resolution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-104
Configuring Name Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-105
Configuring a Forwarder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-115
Configuring a Forward Only Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-116
Configuring a Host to Use a Name Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-118
Configuring Dynamic Zones on the DNS Name Server . . . . . . . . . . . . . . . . . . . . . 3-119
Preface vii
Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-167
Preface ix
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-10
Information to Collect before Configuring BNU . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-10
Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-11
Setting Up Automatic Monitoring of BNU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-14
Setting Up BNU Polling of Remote Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-15
Using the /etc/uucp/Systems File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-15
Editing Devices Files for Hardwired Connections . . . . . . . . . . . . . . . . . . . . . . . . . . 8-16
Editing Devices File for Autodialer Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-16
Editing Devices File for TCP/IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-17
Maintaining BNU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-18
Working with BNU Log Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-18
BNU Maintenance Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-19
Monitoring a BNU Remote Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-20
Monitoring a BNU File Transfer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-22
Debugging BNU Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-23
Debugging BNU Login Failures Using the uucico Daemon . . . . . . . . . . . . . . . . . . 8-26
Contacting Connected UNIX Systems Using the tip Command . . . . . . . . . . . . . . 8-27
BNU Configuration Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-29
BNU Configuration for a TCP/IP Connection Example . . . . . . . . . . . . . . . . . . . . . . 8-29
BNU Configuration for a Telephone Connection Example . . . . . . . . . . . . . . . . . . . 8-31
BNU Configuration for a Direct Connection Example . . . . . . . . . . . . . . . . . . . . . . . 8-34
BNU Files, Commands, and Directories Reference . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-36
BNU Directories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-36
BNU Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-36
BNU Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-37
BNU Daemons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-38
Preface xi
NFS Reference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-42
List of Network File System (NFS) Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-42
List of NFS Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-42
List of NFS Daemons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-42
NFS Subroutines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-43
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . X-1
This chapter presents the conceptual foundation for understanding computer networking in
general. System administrators unfamiliar with general networking principles should read
this chapter. Those familiar with UNIX networking may safely skip this chapter.
A network is the combination of two or more computers and the connecting links between
them. A physical network is the hardware (equipment such as adapter cards, cables,
concentrators, and telephone lines) that makes up the network. The software and the
conceptual model make up the logical network.
This overview provides the following information on networks:
• Communications Functions Introduction, on page 1-2
• Network Introduction, on page 1-3
• Physical Networks Introduction, on page 1-5
• System Communications Support, on page 1-6
• Communicating with Other Operating Systems, on page 1-8
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
1 Physical
Levels 1 through 3 are network specific, and will differ depending on what physical network
you are using. Levels 4 through 7 comprise network–independent, higher–level functions.
Each layer describes a particular function (instead of a specific protocol) that occurs in data
communications. The seven layers function as follows:
Physical Describes the physical media of the network. For example, the fiber
optic cable required for a Fiber Distributed Data Interface (FDDI)
network is part of the physical layer.
Data Link Provides reliable delivery of data across the physical layer (which is
usually inherently unreliable).
Network Manages the connections to other machines on the network.
Transport Ensures error–free data transmission.
Session Manages the connections between applications.
Presentation Ensures that data is presented to the applications in a consistent
fashion.
Application Comprises the applications that use the network.
Note that while the OSI Reference Model is useful for discussing networking concepts,
many networking protocols do not closely follow the OSI model. For example, when
discussing Transmission Control Protocol/Internet Protocol (TCP/IP), the Application and
Presentation Layer functions can be combined into a single level, as can the Session and
Transport Layers, as well as the Data Link and Physical Layers.
Each layer in the OSI model communicates with the corresponding layer on the remote
machine as shown in the OSI Reference Model figure. The layers pass data only to the
layers immediately above and below. Each layer adds its own header information (and, in
the case of the Data Link layer, footer), effectively encapsulating the information received
from the higher layers.
Individual users as well as organizations use networks for many reasons. A few possibilities
are:
• Data entry
• Data queries
• Remote batch entry
• Resource sharing
• Data sharing
• Electronic mail
Data entry consists of entering data directly into either local or remote data files, reducing
the need for such intermediate steps as posting, recording, or punching. Increased accuracy
and efficiency are natural by–products of a one–step data transfer. Data queries entail
searching data files for specified information. Data updating involves altering, adding, or
deleting data stored in local or remote files. Remote batch entry consists of entering batches
of data from a remote location, an activity often performed at night or during periods of low
system usage. Because of such diverse capabilities, communications and networks are not
only desirable but necessary.
Sharing resources is another function of networks. Users can share data as well as
programs, file–storage space, and peripheral devices (for example, printers, modems,
terminals, and fixed disks). Such sharing of system resources is cost effective (in the case
of peripheral sharing), while eliminating the problems of keeping multiple copies of
programs and data consistent (in the case of program and file sharing).
A communications network also provides a means for users to communicate using
electronic mail. Electronic mail (e–mail) can be used between users on the same system or
between users across the world.
Protocols
All communications software uses protocols, sets of semantic and syntactic rules that
determine the behavior of functional units in achieving communication. Protocols define how
information is delivered, how it is enclosed to reach its destination safely, and what path it
should follow. Protocols also coordinate the flow of messages and their acknowledgments.
Protocols exist at different levels within the kernel and cannot be manipulated directly.
However, they are manipulated indirectly by what the user chooses to do at the application
programming interface (API) level. The choices a user makes when invoking file transfer,
remote login, or terminal emulation programs define the protocols used in the execution of
those programs.
Addresses
A third feature common to communications networks is addresses. Addresses are
associated with both software and hardware. The address is the means by which the
sending or control station selects the station to which it sends data. In effect, addresses are
a means of identifying receiving or storage locations. A physical address is a unique code
assigned to each device or workstation connected to a network.
For example, on a token–ring network, the netstat –iv command displays the token–ring
card address. This is the physical network address. The netstat –iv command also displays
class–level and user–level address information. Addresses are often defined by software
but can be created by the user as well.
Domains
An aspect of addresses common to many communications networks is the concept of
domains. For example, the structure of the Internet illustrates how domains define the
Internet Protocol (IP) address. The Internet is an extensive network that comprises many
different smaller networks. To facilitate routing and addressing, Internet addresses are
hierarchically structured in domains, with very broad categories at the top such as com for
commercial users, edu for educational users, and gov for government users.
Within the com domain are many smaller domains corresponding to individual businesses;
for example, ibm. Within the ibm.com domain are even smaller domains corresponding to
the Internet addresses for various locations, such as austin.ibm.com or
raleigh.ibm.com. At this level, we start seeing names of hosts. A host, in this context, is
any computer connected to the network. Within austin.ibm.com, there may be hosts with
the names hamlet and lear, which are addressed hamlet.austin.ibm.com and
lear.austin.ibm.com.
Routing
Using domain names for addressing and gateways for translation greatly facilitates the
routing of the data being transferred. Routing is the assignment of a path by which a
message reaches its destination. The domain name effectively defines the message
destination. In a large network like the Internet, information is routed from one
communications network to the next until that information reaches its destination. Each
communications network checks the domain name and, based on the domains with which
that network is familiar, then routes the information on to the next logical stop. In this way,
each communications network that receives the data contributes to the routing process.
The mail facility provides a method for exchanging electronic mail with users on the same
system or on multiple systems connected by a network. This section documents the mail
system and the standard mail user interface.
The mail facility provides a method for exchanging electronic mail (e–mail) with users on the
same system or on multiple systems connected by a network. This section documents the
mail system, the standard mail user interface, the Internet Message Access Protocol
(IMAP), and the Post Office Protocol (POP).
The mail system is an internetwork mail delivery facility that consists of a user interface, a
message routing program, and a message delivery program (or mailer). The mail system
relays messages from one user to another on the same host, between hosts, and across
network boundaries. It also performs a limited amount of message–header editing to put the
message into a format that is appropriate for the receiving host.
A mail user interface enables users to create and send messages to, and receive messages
from, other users. The mail system provides two user interfaces, mail and mhmail. The
mail command is the standard mail user interface available on all UNIX systems. The
mhmail command is the Message Handler (MH) user interface, an enhanced mail user
interface designed for experienced users.
A message routing program routes messages to their destinations. The mail system’s
message routing program is the sendmail command, which is part of the Base Operating
System (BOS) and is installed with BOS. The sendmail command is a daemon that uses
information in the /etc/sendmail.cf file, the /etc/aliases file, and the /etc/sendmail.nl file to
perform the necessary routing.
Depending on the type of route to the destination, the sendmail command uses different
mailers to deliver messages (see figure).
Mail MH
sendmail
remote remote
mailbox mailbox
Mail 2-1
Mail Management Tasks
The following is a list of the tasks for which you, the mail manager, are responsible.
1. Configure the /etc/rc.tcpip file so that the sendmail daemon will be started at system
boot time. See the instructions immediately following this list.
2. Customize the configuration file /etc/sendmail.cf. The default /etc/sendmail.cf file is
configured so that local mail can be delivered. In order to deliver mail through TCP/IP or
BNU, you must customize and compile the /etc/sendmail.cf file. See the ”sendmail.cf
File” in AIX Files Reference for more information.
3. Define systemwide and domainwide mail aliases in the /etc/aliases file. See ”Managing
Mail Aliases”, on page 2-3 for more information.
4. Manage the Mail Queue. See ”Managing the Mail Queue Files and Directories”, on page
2-6 for more information.
5. Manage the Mail Log. See ”Managing Mail Logging”, on page 2-11 for more information.
/etc/aliases File
The /etc/aliases file consists of a series of entries in the following format:
Alias: Name1, Name2, ... NameX
where Alias can be any alphanumeric string that you choose (not including special
characters, such as @ or !). Name1 through NameX is a series of one or more recipient
names. The list of names can span one or more lines. Each continued line begins with a
space or a tab. Blank lines and lines beginning with a # (pound sign) are comment lines.
The /etc/aliases file must contain the following three aliases:
Mail 2-3
nobody The ID that is to receive messages directed to programs
such as news and msgs. This name is initially assigned to
/dev/null:
nobody: /dev/null
To receive these messages, define this alias to be a valid
user.
Any time you change this file, you must recompile it into a database format that the
sendmail command can use. See Building the Alias Database, on page 2-4.
Mail 2-5
Managing the Mail Queue Files and Directories
The mail queue is a directory that stores data and controls files for mail messages that the
sendmail command delivers. By default, the mail queue is /var/spool/mqueue.
Mail messages may be queued for several reasons. First, the sendmail command can be
configured to process the queue at certain intervals, rather than immediately. If this is so,
mail messages must be stored temporarily. Second, if a remote host does not answer a
request for a mail connection, the mail system queues the message and tries again later.
d The data file containing the message body without the heading information.
q The queue–control file. This file contains the information necessary to
process the job.
t A temporary file. This file is an image of the q file when it is being rebuilt. It is
quickly renamed to the q file.
x A transcript file that exists during the life of a session and shows everything
that happens during that session.
For example, if a message has a queue ID of AA00269, the following files are created and
deleted in the mail queue directory while the sendmail command tries to deliver the
message:
q Control File
The q control file contains a series of lines, each beginning with a code letter:
B Specifies the body type. The remainder of the line is a text string defining
the body type. If this field is missing, the body type is assumed to be
undefined, and no special processing is attempted. Legal values are 7BIT
and 8BITMIME.
C Contains the controlling address. The syntax is localuser:aliasname.
Recipient addresses following this line are flagged so that deliveries will run
as the localuser (a user name from the /etc/passwd file); aliasname is the
name of the alias that expanded to this address (used for printing
messages).
Mail 2-7
MDeferred: Connection timed out during user open with zeus
Status message
Sgeo ID of the sender
Ramy@zeus ID of the receiver
HLines Header information for the message
s Seconds
m Minutes
h Hours
d Days
w Weeks
If Unit is not specified, the sendmail daemon uses minutes (m) as the default. Here are
three examples illustrating time–value specification:
/usr/sbin/sendmail –q15d
This command tells the sendmail daemon to process the queue every 15 days.
/usr/sbin/sendmail –q15h
This command tells the sendmail daemon to process the queue every 15 hours.
/usr/sbin/sendmail –q15
This command tells the sendmail daemon to process the queue every 15 minutes.
Mail 2-9
Starting the sendmail Daemon
To start the sendmail daemon, enter either of the following commands:
startsrc –s sendmail –a ”–bd –q15”
OR
/usr/lib/sendmail –bd –q15
If the sendmail daemon is already active when you enter one of these commands, you will
see the following message on the screen:
The sendmail subsystem is already active. Multiple instances are
not supported.
If the sendmail daemon is not already active, then you will see a message indicating that
the sendmail daemon has been started.
Mail 2-11
There is a large amount of information that can be logged. The log is arranged as a
succession of levels. At the lowest level, only very unusual situations are logged. At the
highest level, even the insignificant events are logged. As a convention, log levels under ten
are considered ”useful.” Log levels above 64 are reserved for debugging purposes. Levels
from 11–64 are reserved for verbose information.
The types of activities that the sendmail command puts into the log file are specified by the
L option in the /etc/sendmail.cf file.
Logging Traffic
Many SMTP implementations do not fully implement the protocol. For example, some
personal computer–based Simple Mail Transfer Protocols (SMTPs) do not understand
continuation lines in reply codes. These can be very hard to trace. If you suspect such a
problem, you can set traffic logging using the –X flag. For example:
/usr/sbin/sendmail –X /tmp/traffic –bd
Using this command logs all traffic in the /tmp/traffic file.
This logs a lot of data very quickly and should never be used during normal operations.
After starting such a daemon, force the errant implementation to send a message to your
host. All message traffic in and out of sendmail, including the incoming SMTP traffic, will be
logged in this file.
Using sendmail, you can log a dump of the open files and the connection cache by send it
a SIGUSR1 signal. The results are logged at LOG_DEBUG priority.
Mail 2-13
Debugging sendmail
There are a large number of debug flags built into the sendmail command. Each debug flag
has a number and level, where higher levels mean print more information. The convention is
that levels greater than nine print out so much information that you would not want to see
them except for debugging a particular piece of code. Debug flags are set using the –d flag
as shown in the following example:
debug–flag: –d debug–list
debug–list: debug–flag[.debug–flag]*
debug–flag: debug–range[.debug–level]
debug–range:integer|integer–integer
debug–level:integer
For example:
–d12Set flag 12 to level 1
–d12.3Set flag 12 to level 3
–d3–17Set flags 3 through 17 to level 1
–d3–17.4Set flags 3 through 17 to level 4
Available debug flags are as follows:
Procedure
1. Uncomment the imapd and pop3d entries in the /etc/inetd.conf file.
2. Refresh the inetd daemon by running the following command:
refresh –s inetd
Mail 2-15
Running Configuration Tests
You may want to run a few tests to verify your imapd and pop3d servers are ready for
operation.
First, verify the servers are listening on their well–known ports. To do this, enter:
netstat –a | grep imap
netstat –a | grep pop
You should receive the following output from the netstat command:
tcp 0 0 *.imap2 *.* LISTEN
tcp 0 0 *.pop3 *.* LISTEN
If you do not receive this output, recheck the entries in the /etc/inetd.conf file and rerun the
refresh –s inetd command.
To test the configuration of the imapd server, you can telnet into the imap2 port, 143. When
you telnet in, you should get the imapd prompt. You can enter the IMAP Version 4
commands as defined in RFC 1730. To run one of the commands, type a period (.), followed
by a space, and then the command name. For example:
. CommandName
Note that passwords are echoed when you telnet into the imapd server.
In the following telnet example, you must provide your own password where id_password
is indicated in the login command.
telnet e–xbelize 143
Trying...
Connected to e–xbelize.austin.ibm.com.
Escape character is ’^]’.
* OK e–xbelize.austin.ibm.com IMAP4 server ready
. login id id_password
. OK
. examine /usr/spool/mail/root
* FLAGS (\Answered \Flagged \Draft \Deleted \Seen)
* OK [PERMANENTFLAGS (\Answered \Flagged \Draft \Deleted \Seen \*)]
* 0 EXISTS
* 0 RECENT
* OK [UIDVALIDITY 823888143]
. OK [READ–ONLY] Examine completed
. logout
* BYE Server terminating connection
. OK Logout completed
Connection closed.
To test the configuration of the pop3d server, you can telnet into the Post Office Protocol
Version 3 (POP3) port, 110. When you telnet in, you should get the pop3d prompt. You can
enter the POP commands that are defined in RFC 1725. To run one of the commands, type
a period (.), followed by a space, and then the command name. For example:
. CommandName
Note that passwords are echoed when you telnet into the pop3d server.
In the following telnet example, you must provide your own password where id_password
is indicated in the pass command.
syslog Facility
The IMAP and POP server software sends log messages to the syslog facility.
To configure your system for IMAP and POP logging through the syslog facility, you must
be the root user. Edit the /etc/syslog.conf file, and add an entry for *.debug as follows:
*.debug /usr/adm/imapd.log
The usr/adm/imapd.log file must exist before the syslogd daemon re–reads the
/etc/syslog.conf configuration file. To create this file, enter the following command:
touch /usr/adm/imapd.log
Then, refresh the syslogd daemon to re–read its configuration file. Enter the following
command:
refresh –s syslogd
Mail 2-17
Mail Reference
This section provides a quick reference to the various Mail commands, files, and directories.
Mail 2-19
2-20 System Management Guide: Communications and Networks
Chapter 3. Transmission Control Protocol/Internet
Protocol
This chapter describes the Transmission Control Protocol/Internet Protocol (TCP/IP) suite of
networking software. TCP/IP is a powerful and flexible industry–standard way of connecting
multiple computers to other machines.
The topics discussed in this chapter are:
• Planning Your TCP/IP Network, on page 3-2
• Installation and Configuration for TCP/IP, on page 3-3
• TCP/IP Protocols, on page 3-6
• TCP/IP Network Adapter Cards, on page 3-36
• TCP/IP Network Interfaces, on page 3-47
• TCP/IP Addressing, on page 3-52
• TCP/IP Address and Parameter Assignment – Dynamic Host Configuration Protocol
(DHCP), on page 3-58
• Configuring TCP/IP, on page 3-90
• TCP/IP Daemons, on page 3-91
• TCP/IP Name Resolution, on page 3-97
• TCP/IP Routing, on page 3-121
• Serial Line Interface Protocol (SLIP), on page 3-131
• Asynchronous Point–to–Point Protocol (PPP) Subsystem, on page 3-136
• TCP/IP Quality of Service (QoS), on page 3-139
• TCP/IP Security, on page 3-145
• TCP/IP Problem Determination, on page 3-152
• TCP/IP Reference, on page 3-161
Note: Most of the tasks discussed in this chapter require root authority.
Configuring TCP/IP
Once the TCP/IP software is installed on your system, you are ready to begin configuring
your system.
Many TCP/IP configuration tasks can be performed in more than one way, either by:
• Using the Web-based System Manager wsm network application (fast path wsm
network)
• Using the System Management Interface Tool (SMIT)
• Editing a file format
• Issuing a command at the shell prompt
For example, the rc.net shell script performs required minimum host configuration for
TCP/IP during the system startup process (the rc.net script is run by the configuration
manager program during the second boot phase). By using Web-based System Manager or
SMIT to perform the host configuration, the rc.net file is configured automatically.
Alternatively, you can configure the rc.net file using a standard editor. With this method, you
can specify the traditional UNIX TCP/IP configuration commands such as ifconfig,
hostname, and route. (Refer to the ”List of TCP/IP Commands”, on page 3-161 for further
information.)
A few tasks, such as configuring a name server, cannot be done using Web-based System
Manager or SMIT. (Refer to Fast Paths for TCP/IP in AIX 4.3 System Management Guide:
Operating System and Devices for a list of tasks in TCP/IP that can be performed using
SMIT.)
Configuring Hosts
Each host machine on your network will need to be configured to function according to the
needs of the end–users and the network as a whole. For each host on the network, you
must configure the network interface, set the Internet address, and set the host name. You
also need to set up static routes to gateways or other hosts, specify daemons to be started
by default, and set up the /etc/hosts file for name resolution (or set up the host to use a
name server for name resolution).
Prerequisites
1. Network hardware is installed and cabled (refer to ”TCP/IP Network Adapter Cards”, on
page 3-36).
2. TCP/IP software is installed (see the AIX Installation Guide).
LAYER PROTOCOL
Application Layer APPLICATION
Transport Layer UDP TCP
Network Layer INTERNET PROTOCOL
Network Interface Layer NETWORK INTERFACE
Hardware PHYSICAL NETWORK
TCP/IP carefully defines how information moves from sender to receiver. First, application
programs send messages or streams of data to one of the Internet Transport Layer
Protocols, either the User Datagram Protocol (UDP) or the Transmission Control Protocol
(TCP). These protocols receive the data from the application, divide it into smaller pieces
called packets, add a destination address, and then pass the packets along to the next
protocol layer, the Internet Network layer.
The Internet Network layer encloses the packet in an Internet Protocol (IP) datagram, puts
in the datagram header and trailer, decides where to send the datagram (either directly to a
destination or else to a gateway), and passes the datagram on to the Network Interface
layer.
APPLICATION LAYER
DATA
NETWORK LAYER
IP Header TCP Header DATA
Ethernet Frame
PHYSICAL NETWORK
Frames received by a host go through the protocol layers in reverse. Each layer strips off
the corresponding header information, until the data is back at the application layer (see
figure). Frames are received by the Network Interface layer (in this case, an Ethernet
adapter). The Network Interface layer strips off the Ethernet header, and sends the
datagram up to the Network layer. In the Network layer, the Internet Protocol strips off the IP
header and sends the packet up to the Transport layer. In the Transport layer, the
Transmission Control Protocol (in this case) strips off the TCP header and sends the data
up to the Application layer.
NETWORK LAYER
IP Header TCP Header DATA
Ethernet Frame
PHYSICAL NETWORK
Movement of information from Host to Application
Since hosts on a network both send and receive information simultaneously, the ”Host Data
Transmission and Reception” figure more accurately represents a host as it communicates.
APPLICATION LAYER
DATA
NETWORK LAYER
IP Header TCP Header DATA
Ethernet Frame
PHYSICAL NETWORK
Note: Headers are added and stripped in each protocol layer as data
is transmitted and received by a host.
Host Data Transmission and Reception
Meaningful Addresses
With IPv4, the only generally recognizable meaning in addresses are broadcast (typically all
1 or all 0), and classes (for example, a class D is multicast). With IPv6, the prefix can be
quickly examined to determine scope (for example, link–local), multicast versus unicast, and
a mechanism of assignment (provider–based, geography–based, etc.).
Routing information may be explicitly loaded into the upper bits of addresses as well, but
this has not yet been finalized by the IETF (for provider–based addresses, routing
information is implicitly present in the address).
no class No fixed number of bits for prefix or ID, which allows for a
reduction in loss due to over–allocation
nesting An arbitrary number of divisions can be employed by
considering different numbers of bits as the prefix.
Case 1:
128 bits
Node Address
Case 2:
Case 3:
Case 4:
Generally, IPv4 cannot go beyond Case 3, even with VLSM. (This is as much an artifact of
the shorter address length as the definition of variable length prefixes, but is worth noting
nonetheless).
Source Address
Destination Address
Options Padding
IPv6 Header:
Source Address
Destination Address
IPng includes an improved options mechanism over IPv4. IPv6 options are placed in
separate extension headers that are located between the IPv6 header and the
transport–layer header in a packet. Most extension headers are not examined or processed
by any router along a packet’s delivery path until it arrives at its final destination. This
0 uncharacterized traffic
1 ”filler” traffic (for example, netnews)
2 unattended data transfer (for example, electronic mail)
3 (reserved)
4 attended bulk transfer (for example, FTP)
5 (reserved)
6 interactive traffic (for example, Telnet)
7 control traffic (for example, routing protocols)
Non–congestion–controlled traffic is defined as traffic that responds to congestion by
dropping (or simply not resending) packets, such as video, audio, or other real–time traffic.
Explicit levels are not defined with examples, but the ordering is similar to that for
congestion–controlled traffic:
• The lowest value should be used for traffic that the source is most willing to have
discarded.
• The highest value should be used for traffic that the source is least willing to have
discarded.
Flow Labeling
Outside of basic prioritization of traffic, IPv6 defines a mechanism for specifying a particular
flow of packets. In IPv6 terms, a flow is defined as ”a sequence of packets sent from a
particular source to a particular (unicast or multicast) destination for which the source
desires special handling by the intervening routers.”
This flow identification may be used for priority control, but may also be used for any
number of other controls.
The flow label is chosen randomly, and should not be construed as identifying any
characteristic of the traffic other than the flow to which it belongs. This means that a router
cannot determine that a packet is a particular type (for example, FTP) by examining the flow
label. It will, however, be able to determine that it is part of the same sequence of packets
as the last packet containing that label.
Note: In AIX 4.3 and until IPv6 is in general use, the flow label is mostly experimental.
Uses and controls involving flow labels have not yet been defined nor standardized.
Jumbograms
An IPv4 packet size is limited to 64K. Using the jumbo payload extension header, an IPv6
packet can be up to 232 octets (slightly over 4 gigabytes).
Tunneling
The key to a successful IPv6 transition is compatibility with the existing installed base of
IPv4 hosts and routers. Maintaining compatibility with IPv4 while deploying IPv6 streamlines
the task of transitioning the Internet to IPv6.
In most cases, the IPv6 routing infrastructure will evolve over time. While the IPv6
infrastructure is being deployed, the existing IPv4 routing infrastructure can remain
functional, and can be used to carry IPv6 traffic. Tunneling provides a way to use an existing
IPv4 routing infrastructure to carry IPv6 traffic.
IPv6/IPv4 hosts and routers can tunnel IPv6 datagrams over regions of IPv4 routing
topology by encapsulating them within IPv4 packets. Tunneling can be used in a variety of
ways:
IPv6 Security
For details about IP Security, versions 4 and 6, see Chapter 4. Internet Protocol (IP)
Security, on page 4-1.
Option 0 No multihomed actions are taken. Transmits will go out on the first link
local interface. When the Neighbor Discovery Protocol must perform
address resolution, it multicasts a Neighbor Solicitation message out on
each interface with a link local address defined. NDP queues the data
packet until the first Neighbor Advertisement message is received. The
data packet is then sent out on this link.
Option 1 When the Neighbor Discovery Protocol must perform address resolution
(i.e., when sending a data packet to a destination and the the link–layer
information for the next–hop is not in the Neighbor Cache), it multicasts a
Neighbor Solicitation message out on each interface with a link local
address defined. NDP then queues the data packet until it gets the
link–layer information. NDP then waits until a response is received for each
interface. This guarantees that the data packets are sent on the
appropriate outgoing interfaces. If NDP did not wait, but responded to the
first Neighbor Advertisement received, it would be possible for a data
packet to be sent out on a link not associated with the packet’s source
address. Because NDP must wait, a delay in the first packet being sent will
occur. However, the delay will have occurred anyway in waiting for the first
response.
Option 2 Multihomed operation is allowed, but dispatching of a data packet is limited
to the interface specified by main_if6. When the Neighbor Discovery
Protocol must perform address resolution, it multicasts a Neighbor
Solicitation message out on each interface with a link local address
defined. It then waits for a Neighbor Advertisement message from the
interface specified by main_if6 (see the no command). Upon receiving a
response from this interface, the data packet is sent out on this link.
Option 3 Multihomed operation is allowed, but dispatching of a data packet is limited
to the interface specified by main_if6 and site local addresses will only be
routed for the interface specified by main_site6 (see the no command).
The Neighbor Discovery Protocol will operate just as it does for Option 2.
For applications that route data packets using site local addresses, on a
multihomed host only the site local address specified by main_site6 will be
used.
EUI–64
EUI–64 is a 64–bit interface ID automatically built from the MAC IEEE 802 address.
The implementation is described in the addressing architecture draft
draft–ietf–ipngwg–addr–arch–v2–02.txt.
Special Addresses
Mapped Address
A mapped address is an IPv4-based address and is used for compatibility with IPv4 hosts:
• An IPv6 socket can communicate with an IPv4–only host using a mapped address as a
destination address.
• An IPv6 socket can bind to a mapped address to receive packets from IPv4–only host.
A mapped address is represented either as:
• ::FFFF:a.b.c.d where a.b.c.d is an IPv4 address.
or
• ::FFFF:XXXX:YYYY where XXXXYYYY is the hexadecimal representation of the
a.b.c.d IPv4 address.
Unspecified Address
The unspecified address is composed of 16 null bytes, represented as
“0:0:0:0:0:0:0:0”, or simply “::”.
Loopback Address
The loopback address, represented as “0:0:0:0:0:0:0:1”, (or simply “::1”), may be
used by a node to send an IPv6 datagram to itself.
Link-local Address
The stations that are not yet configured with an IPv6 address may use the link-local
address.
The link-local addresses are only defined within a link and can only be used by stations
connected to the same link or to the same local network. They are automatically configured
when the interface is initialised and allow to communicate between neighbor nodes.
These addresses are composed of a link-local prefix (fe80::/64) appended to a 64 bits
interface ID which is generally at the EUI format. For example:
fe80::4260:8cff:fe2c:9c38
Configuration Methods
An IPv6 network is configured in the following manner:
• Perform all IPv4–related configuration
• Run the autoconf6 command to generate link–local addresses, the sit0 interface (on the
existing IPv4), and to install basic unicast and multicast routes.
• Run ndpd–host daemon to listen for Router Advertisements (RA). As RAs are received,
addresses are added to the appropriate interfaces, and routes are created as necessary.
To perform these operations using SMIT, proceed as follows:
1. smit tcpip
2. Select the IPv6 configuration item and follow the menu.
3. Select the IPv6 daemon/Process Configuration item to start the autoconf6 process
and the ndpd–host subsystem.
Tunneling
Tunneling allows IPv6 communication in a primarily IPv4 world, and facilitates gradual
transition to IPv6.
A route directs a packet through a tunnel interface, which encapsulates the packet ( by
prepending an appropriate IPv4 header), and then calls the IPv4 output routine.
AIX 4.3 supports two kinds of IPv6 tunnels:
• Simple Internet Transition (SIT) interfaces
• Configured Tunnel Interface (CTI) interfaces.
CTI Tunneling
CTI tunnels are well suited for router–to–router communication.
The interface is configured using IPv6 and IPv4 source and destination addresses specified
by the user. Traffic is routed through an appropriate cti interface by a particular routing table
entry.
The cti0 (and any other cti interfaces) must be added by a system administrator.
A cti tunnel is closed–ended, in that both ends must be configured.
Name Servers
The name servers process is very similar to IPv4.
• The forward zone uses IPv6 AAAA records instead of A records (see the example).
• The reverse zone uses IP6.INT domain instead of in–addr.arpa domain, but still using
PTR records (see the example).
• IP6.INT domain PTR records are the reversed IPv6 address, with each nibble separated
by a dot.
• The IPv4 connections are used to transmit requests.
Porting Applications
For most (but not all) tokens that contain ”in” or ”inet”, use the IPv6 name instead. Some
examples:
v4 token v6 token
AF_INET AF_INET6
sockaddr_in sockaddr_in6
in_addr in6_addr
<netinet/in.h> <netinet/in.h>
<netinet/ip.h> <netinet/ip6.h>
INADDRSZ IN6ADDRSZ
sin_addr sin6_addr
sin_len sin6_len
Use inet_ntop() and inet_pton() instead of inet_ntoa() and inet_aton() for conversions
between ASCII and binary formats.
Use gethostbyname2() or getaddrinfo() instead of gethostbyname().
Also read RFC 2133.
Applications
IPv6 supports the following applications:
– ping
– telnet/telnetd
– ftp/ftpd
– tftp/tftpd
– crash/ndb
– iptrace/ipreport/tcpdump
– traceroute
– resolver routines/named
– inetd
– rsh/rcp/rshd
– rexec/rexecd
– rlogin/rlogind
– ifconfig/netstat/route/nslookup
– mail/sendmail
– autoconf6/ndpd–host/ndp
– nslookup
– ndpd–router from AIX 4.3.2 and later
– gated with RIPng, BGP4+ from AIX 4.3.2 and later
Anycast address
This function is not supported.
Packet Tracing
Packet tracing is the process by which you can verify the path of a packet through the layers
to its destination. The iptrace command performs network interface level packet tracing.
The ipreport command issues output on the packet trace in both hexadecimal and ASCII
format. The trpt command performs transport protocol level packet tracking for the TCP.
The trpt command output is more detailed, including information on time, TCP state, and
packet sequencing.
Network Layer
Device Driver
SOFTWARE
Packet header information for several of the more common network interfaces follows.
IP 0800
ARP 0806
LAYER PROTOCOL
Application Layer APPLICATION
Transport Layer UDP TCP
Network Layer INTERNET PROTOCOL
Network Interface Layer NETWORK (HARDWARE) INTERFACE
Hardware PHYSICAL NETWORK
Internet Protocol
The third network–level protocol is the Internet Protocol (IP), which provides unreliable,
connectionless packet delivery for the Internet. IP is connectionless because it treats each
packet of information independently. It is unreliable because it does not guarantee delivery
(that is, it does not require acknowledgments from the sending host, the receiving host, or
intermediate hosts).
IP provides the interface to the network interface level protocols. The physical connections
of a network transfer information in a frame with a header and data. The header contains
the source address and the destination address. IP uses an Internet datagram, which
contains information similar to the physical frame. The datagram also has a header
containing Internet addresses of both source and destination of the data.
IP defines the format of all the data sent over the Internet (see figure).
Bits
0 4 8 16 19 31
Version Length Type of Service Total Length
Source Address
Destination Address
Options
Data
Version Specifies the version of the IP used. The current version of the
IP protocol is 4.
Length Specifies the datagram header length, measured in 32–bit
words.
Type of Service Specifies the Type of Service field contains five subfields that
specify the type of precedence, delay, throughput, and reliability
desired for that packet. (The Internet does not guarantee this
request.) The default settings for these five subfields are routine
precedence, normal delay, normal throughput, and normal
reliability. This field is not generally used by the Internet at this
time. This implementation of IP complies with the requirements
of the IP specification, RFC 791, Internet Protocol.
Total Length Specifies the length of the datagram including both the header
and the data measured in octets. Packet fragmentation at
gateways, with reassembly at destinations, is provided. The
total length of the IP packet can be configured on an
interface–by–interface basis with the Web-based System
Manager fast path, wsm network, the ifconfig command, or
the System Management Interface Tool (SMIT) fast path, smit
chinet. Use Web-based System Manager or SMIT to set the
values permanently in the configuration database; use the
ifconfig command to set or change the values in the running
system.
Identification Contains a unique integer that identifies the datagram.
Fragment Flags Controls datagram fragmentation, along with the Identification
field. The Fragment Flags specify whether the datagram may be
fragmented and whether the current fragment is the last one.
Fragment Offset Specifies the offset of this fragment in the original datagram
measured in units of 8 octets.
Time to Live Specifies how long the datagram can remain on the Internet.
This keeps misrouted datagrams from remaining on the Internet
forever. The default time to live is 255 seconds.
Protocol Specifies the high–level protocol type.
Header Checksum Indicates a number computed to ensure the integrity of header
values.
Source Address Specifies the Internet address of the sending host.
LAYER PROTOCOL
Application Layer APPLICATION
Transport Layer UDP TCP
Network Layer INTERNET PROTOCOL
Network Interface Layer NETWORK INTERFACE
Hardware PHYSICAL NETWORK
Bits
0 16 31
SOURCE PORT NUMBER DESTINATION PORT NUMBER
LENGTH CHECKSUM
Source Port Number Address of the protocol port sending the information.
Destination Port Number Address of the protocol port receiving the information.
Basic Data Transfer TCP can transfer a continuous stream of 8–bit octets in
each direction between its users by packaging some
number of bytes into segments for transmission through the
Internet system. TCP implementation allows a segment size
of at least 1024 bytes. In general, TCP decides when to
block and forward packets at its own convenience.
Reliability TCP must recover data that is damaged, lost, duplicated, or
delivered out of order by the Internet. TCP achieves this
reliability by assigning a sequence number to each octet it
transmits and requiring a positive acknowledgment (ACK)
from the receiving TCP. If the ACK is not received within the
time–out interval, the data is retransmitted. The TCP
retransmission time–out value is dynamically determined for
each connection, based on round–trip time. At the receiver,
the sequence numbers are used to correctly order
segments that may be received out of order and to
eliminate duplicates. Damage is handled by adding a
checksum to each segment transmitted, checking it at the
receiver, and discarding damaged segments.
Flow Control TCP governs the amount of data sent by returning a
window with every ACK to indicate a range of acceptable
sequence numbers beyond the last segment successfully
received. The window indicates an allowed number of
octets that the sender may transmit before receiving further
permission.
Multiplexing TCP allows many processes within a single host to use
TCP communications facilities simultaneously. TCP
receives a set of addresses of ports within each host. TCP
combines the port number with the network address and
the host address to uniquely identify each socket. A pair of
sockets uniquely identifies each connection.
Connections TCP must initialize and maintain certain status information
for each data stream. The combination of this information,
including sockets, sequence numbers, and window sizes, is
called a connection. Each connection is uniquely specified
by a pair of sockets identifying its two sides.
Precedence and Security Users of TCP may indicate the security and precedence of
their communications. Default values are used when these
features are not needed.
Bits
0 8 16 31
Source Port Destination Port
Sequence Number
Acknowledgment Number
Options Padding
Data
LAYER PROTOCOL
Application Layer APPLICATION
Transport Layer UDP TCP
Network Layer INTERNET PROTOCOL
Network Interface Layer NETWORK INTERFACE
Hardware PHYSICAL NETWORK
Autonomous Systems
An autonomous system is a group of networks and gateways for which one administrative
authority has responsibility. Gateways are interior neighbors if they reside on the same
autonomous system and exterior neighbors if they reside on different autonomous systems.
Gateways that exchange routing information using EGP are said to be EGP peers or
neighbors. Autonomous system gateways use EGP to provide access information to their
EGP neighbors.
EGP allows an exterior gateway to ask another exterior gateway to agree to exchange
access information, continually checks to ensure that its EGP neighbors are responding,
and helps EGP neighbors to exchange access information by passing routing update
messages.
EGP restricts exterior gateways by allowing them to advertise only those destination
networks reachable entirely within that gateway’s autonomous system. Thus, an exterior
gateway using EGP passes along information to its EGP neighbors but does not advertise
access information about its EGP neighbors outside its autonomous system.
EGP does not interpret any of the distance metrics that appear in routing update messages
from other protocols. EGP uses the distance field to specify whether a path exists (a value
of 255 means that the network is unreachable). The value cannot be used to compute the
shorter of two routes unless those routes are both contained within a single autonomous
Telnet Protocol
The Telnet Protocol (TELNET) provides a standard method for terminal devices and
terminal–oriented processes to interface. TELNET is commonly used by terminal emulation
programs that allow you to log into a remote host. However, TELNET can also be used for
terminal–to–terminal communication and interprocess communication. TELNET is also used
by other protocols (for example, FTP) for establishing a protocol control channel.
TCP/IP implements TELNET in the tn, telnet, or tn3270 user commands. The telnetd
daemon does not provide an API to TELNET.
TCP/IP supports the following Telnet options which are negotiated between the client and
server:
Name/Finger Protocol
The Name/Finger Protocol (FINGER) is an application–level Internet protocol that provides
an interface between the finger command and the fingerd daemon. The fingerd daemon
returns information about the users currently logged in to a specified remote host. If you
execute the finger command specifying a user at a particular host, you will obtain specific
information about that user. The FINGER Protocol must be present at the remote host and
at the requesting host. FINGER uses Transmission Control Protocol (TCP) as its underlying
protocol.
Note: TCP/IP does not provide an API to this protocol.
Assigned Numbers
For compatibility with the general network environment, well–known numbers are assigned
for the Internet versions, networks, ports, protocols, and protocol options. Additionally,
well–known names are also assigned to machines, networks, operating systems, protocols,
services, and terminals. TCP/IP complies with the assigned numbers and names defined in
RFC 1010, Assigned Numbers.
The Internet Protocol defines a 4–bit field in the IP header that identifies the version of the
general Internetwork protocol in use. For IP, this version number in decimal is 4. For details
on the assigned numbers and names used by TCP/IP, refer to the /etc/protocols and
/etc/services files included with TCP/IP. For further details on the assigned numbers and
names, refer to RFC 1010 and the /etc/services file.
–OR–
Task SMIT Fast Path Command or File
Configure an Adapter smit chgtok (token ring) 1. Determine adapter
smit chgenet (Ethernet) name:1
lsdev –C –c adapte
r –t tokenring –H
or
lsdev –C –c adapte
r –t ethernet –H
2. Reset ring speed (token
ring) or connector type
(Ethernet), if necessary.
For example:
chdev –l tok0 –a r
ing_speed=16 –P
or
chdev –l ent0 –a b
nc_select=dix –P
Determining a Network smit chgtok (token ring) lscfg –l tok0 –v
Adapter’s Hardware smit chgenet (Ethernet) (token ring)2
Address lscfg –l ent0 –v
(Ethernet)2
Setting an Alternate smit chgtok (token ring) 1. Define the alternate
Hardware Address smit chgenet (Ethernet) hardware address. For
example, for token
ring:2,3
chdev –l tok0 –a
alt_addr=0X10005A4
F1B7F
For Ethernet:2,3
chdev –l ent0 –a
alt_addr=0X10005A4
F1B7F –p
2. Begin using alternate
address, for token ring:4
chdev –l tok0 –a
use_alt_addr=yes
For Ethernet:4
chdev –l ent0 –a
use_alt_addr=yes
ATM Technology
Asynchronous Transfer Mode (ATM) is a cell–switching, connection–oriented technology. In
ATM networks, end stations attach to the network using dedicated full duplex connections.
The ATM networks are constructed using switches, and switches are inter–connected using
dedicated physical connections. Before any data transfers can begin, end–to–end
connections need to be established. Multiple connections can and do exist on a single
physical interface. Sending stations transmit data by segmenting Protocol Data Units
(PDUs) into 53–byte cells. Payload stays in the form of cells during network transport.
Receiving stations reassemble cells into PDUs. The connections are identified using a
virtual path identifier (VPI) and a virtual channel identifier (VCI). The VPI field occupies one
byte in the ATM cell’s five–byte header; whereas, the VCI field occupies two bytes in the
ATM cell’s five–byte header. Basically, a VPI:VCI pair identifies the source of the ATM cell.
The function of the ATM switch is to recognize the source of the cell, determine the next
hop, and output the cell to a port. The VPI:VCI changes on a hop–by–hop basis. Thus,
VPI:VCI values are not universal. Each virtual circuit is described as a concatenation of
VPI:VCI values across the network.
Permanent Virtual Circuits PVCs are statically and manually configured. The switches
forming the ATM network must first be set up to recognize
each endpoint’s VPI:VCI combination and to route that
endpoint’s ATM cells to the destination endpoint through the
ATM network. Once a link connection through the network
has been established from one endpoint to another, ATM
cells can be transmitted through the ATM network and ATM
switches. The network switches translate the VPI:VCI
values in the appropriate way so as to route the cell to its
destination.
Switched Virtual Circuits SVCs are dynamically set up on an as needed basis. The
ATM end stations are assigned 20–byte addresses. There
is a concept of control plane and data plane. The control
plane uses a signalling channel’s VPI:VCI 0:5. SVCs
involve on demand call setup, whereby an ATM station
sends information elements specifying destination ATM
address (and optionally, source ATM address). There are
many other information elements for specifying ATM
adaptation layer (AAL) parameters, Bandwidth and quality
of service (QOS) parameters, etc. In general, calling
station, network, and called station participate in a
negotiation. Finally, a call is either accepted or rejected. If a
call is accepted, network assigns VPI:VCI values for the
data plane to the calling station and called station. In the
control plane, the ATM network routes (or switches)
signalling packets on the basis of the ATM addresses.
While these packets are being routed, the switches set up
data plane cell routing tables. In the data plane, ATM
networks switch cells on the basis of VPI:VCI much like in
the case of PVCs. When data transfer is over, connection is
terminated.
The ATM address is constructed by registering with the ATM network and acquiring the
most significant 13 bytes. The next 6 bytes are the hardware address ”burnt” in the adapter.
The least significant byte is the selector; the use of this byte is left to the discretion of the
end station. ATM networks do not interpret this byte.
Non-AIX
Host
IP 128.10.1.3 IP 128.10.2.3
Host Host
H1 H6
ATM
Switch
IP 128.10.1.2 IP 128.10.2.2
Host Host
H2 H5
IP 128.10.1.1 IP 128.10.2.1
Two IP addresses
sharing same physical
Host fiber cable Host
H3 H4
IP 128.10.1.5 IP 128.10.2.5
at 0 at 1
Within the Representative ATM Network figure, one logical IP subnet is represented by
dashed lines from each host to the switch. The other IP subnet is represented by solid lines
from each host to the switch.
The following Representative Host Configuration table indicates how AIX hosts, H3 and H4,
should be configured to communicate with a gateway and with each host on its own logical
IP subnet.
SVC Network
Using the Representative ATM Network figure as an example, imagine that AIX host H3
wishes to call H4. H1 is the ARP server for subnet 1 and H6 is the ARP server for subnet 2.
Assuming a subnet mask of 255.255.255.0, stations with addresses 128.10.1.X are
members of one subnet, whereas stations with addresses of 128.10.2.X are members of a
second subnet. See the following list of representative host configurations using SVCs.
Transmit Statistics
Packets: his field contains the number of packets (or PDUs) transmitted.
Bytes: This field contains the count of bytes transmitted. These are the user bytes.
The ATM overhead, for example, ATM cell header, AAL 5 PDU trailer, etc.,
are excluded.
Interrupts:
This field is not used.
Transmit Errors:
This field contains the number of Transmit Errors for this device.
Packets Dropped:
This field contains the number of Transmit Packets that were dropped, for
instance, due to out of buffers condition.
Max Packets on S/W Transmit Queue:
This field does not apply to ATM.
S/W Transmit Queue Overflow:
This field does not apply to ATM.
Current S/W + H/W Transmit Queue Length:
This field contains the current transmit queue length.
Cells Transmitted:
This field contains the number of cells transmitted by this device.
Out of Xmit Buffers:
This field contains the number of packets dropped because of Out of Xmit
Buffers condition.
Current HW Transmit Queue Length:
This field contains the current number of Transmit Packets on the hardware
queue.
Current SW Transmit Queue Length:
This field does not apply to ATM.
Receive Statistics
Packets: This field contains the number of packets (or PDUs) received.
Bytes: This field contains the count of Bytes received. These are the user bytes.
The ATM overhead, for example, ATM cell header, AAL 5 PDU trailer, etc.,
are excluded.
Interrupts:
This field contains the number of Interrupts taken by the system for the
Adapter–to–System indications. Some of the events that cause these
interrupts are packet received, transmit done indication, and so on.
Receive Errors:
This field contains the number of Receive Errors for this device.
Packets Dropped:
This field contains the number of Received Packets dropped, for instance,
due to out of buffers condition.
Bad Packets:
This field does not apply to ATM.
General Statistics
No mbuf Errors:
This field contains the number of mbuf requests that were denied.
Adapter Loss of Signals:
This field contains the number of times the adapter encountered Loss of
Signal.
Adapter Reset Count:
This field contains the number of times the adapter has been reset.
Driver Flags: Up Running Simplex
This field contains the NDD flags.
Virtual Connections in use:
This field contains the number of VCs that are currently allocated or in use.
Max Virtual Connections in use:
This field contains the maximum number of VCs allocated since the last
reset of the statistics.
Virtual Connections Overflow:
This field contains the number of allocate VC requests that have been
denied.
SVC UNI Version:
This field contains the current UNI version of the signaling protocol in use.
–OR–
Task SMIT Fast Path Command or File
List all network devices smit lsinet lsdev –C –c if
Configure a network device smit chinet See the ifconfig command
and the rc.net file
Changing network interface smit chdev1,2 chgif1,2
info with remotely mounted
/usr
Obtaining statistics for a netstat –v
network interface
Note:
1. Changes from a remotely mounted /usr affect only the Information Database (ODM) until
the network is rebooted or until the ifconfig command is used to make the changes take
affect right away.
2. When using a remotely mounted /usr, be careful not to modify the interface being used,
since that is the location of the libraries, commands, and kernel.
Internet Addresses
The Internet Protocol (IP) uses a 32–bit, two–part address field. The 32 bits are divided into
four octets as in the following:
01111101 00001101 01001001 00001111
These binary numbers translate into:
125 13 73 15
The two parts of an Internet address are the network address portion and the host address
portion. This allows a remote host to specify both the remote network and the host on the
remote network when sending information. By convention, a host number of 0 (zero) is used
to refer to the network itself.
TCP/IP supports three classes of Internet addresses: Class A, Class B, and Class C. The
different classes of Internet addresses are designated by how the 32 bits of the address are
allocated. The particular address class a network is assigned depends on the size of the
network.
Class A Addresses
A Class A address consists of an 8–bit network address and a 24–bit local or host address.
The first bit in the network address is dedicated to indicating the network class, leaving 7
bits for the actual network address. Since the highest number that 7 bits can represent in
binary is 128, there are 128 possible Class A network addresses. Of the 128 possible
network addresses, two are reserved for special cases: the network address 127 is
reserved for local loopback addresses, and a network address of all ones indicates a
broadcast address.
Therefore, there are 126 possible Class A network addresses and 16,777,216 possible local
host addresses. In a Class A address (see figure), the highest order bit is set to 0.
Note: The high-order bit (or first bit) will always be 0 in a Class A address.
Class A Address
In other words, the first octet of a Class A address is in the range 1 to 126.
Note: The two highest order bits (or first two bits) will always be 1 and 0 in a
Class B address.
Class B Address
In other words, the first octet of a Class B address is in the range 128 to 191.
Class C Addresses
A Class C address consists of a 24–bit network address and an 8–bit local host address.
The first two bits in the network address are dedicated to indicating the network class,
leaving 22 bits for the actual network address. Therefore, there are 2,097,152 possible
network addresses and 256 possible local host addresses. In a Class C address (see
figure), the highest order bits are set to 1 and 1.
Note: The two highest order bits (or first two bits) will always be 1 and 1 in a
Class C address.
Class C Address
In other words, the first octet of a Class C address is in the range 192 to 223.
When deciding which network address class to use, you need to consider how many local
hosts there will be on the network and how many subnetworks there will be in the
organization. If the organization is small and the network will have fewer than 256 hosts, a
Class C address is probably sufficient. If the organization is large, then a Class B or Class A
address may be more appropriate.
Note: Class D (1–1–1–0 in the highest order bits) addresses provide for multicast
addresses and are supported by UDP/IP under AIX.
Machines read addresses in binary code. The conventional notation for Internet host
addresses is the dotted decimal, which divides the 32–bit address into four 8–bit fields. The
following binary value:
0001010 00000010 00000000 00110100
can be expressed as:
010.002.000.052 or 10.2.0.52
where the value of each field is specified as a decimal number and the fields are separated
by periods.
Note: The hostent command does recognize the following addresses: .08, .008, .09,
and .009. Addresses with leading zeros are interpreted as octal, and numerals in octal
cannot contain 8s or 9s.
Subnet Addresses
Subnet addressing allows an autonomous system made up of multiple networks to share
the same Internet address. The subnetwork capability of TCP/IP also makes it possible to
divide a single network into multiple logical networks (subnets). For example, an
organization can have a single Internet network address that is known to users outside the
organization, yet configure its network internally into departmental subnets. In either case,
fewer Internet network addresses are required while local routing capabilities are enhanced.
A standard Internet Protocol address field has two parts: a network address and a local
address. To make subnets possible, the local address part of an Internet address is divided
into a subnet number and a host number. The subnet is identified so that the local
autonomous system can route messages reliably.
In the basic Class A Internet address (see figure), which consists of an 8–bit network
address and 24–bit local address, the local address identifies the specific host machine on
the network.
Class A Address
To create a subnet address for this Class A Internet address, the local address can be
divided into a number identifying the physical network (or subnet) and a number identifying
the host on the subnet. Senders route messages to the advertised network address, and the
local system takes responsibility for routing messages to its subnets and their hosts. When
deciding how to partition the local address into subnet address and host address, you
should consider the number of subnets and the number of hosts on those subnets.
Note: The high-order bit (or first bit) will always be 0 in a Class A address.
Subnet Masks
When a host sends a message to a destination, the system must determine whether the
destination is on the same network as the source or if the destination can be reached
directly through one of the local interfaces. The system compares the destination address to
the host address using the subnet mask. If the destination is not local, the system sends the
message on to a gateway. The gateway performs the same comparison to see if the
destination address is on a network it can reach locally.
The subnet mask tells the system what the subnet partitioning scheme is. This bit mask
consists of the network address portion and subnet address portion of the Internet address
(see figure). For example, the subnet mask of the Class A address with the partitioning
scheme defined above is shown in this figure.
Address Comparison
The destination address and the local network address are compared by performing the
logical AND and exclusive OR on the subnet mask of the source host.
The comparison process is outlined below:
1. Perform a logical AND of the destination address and the mask of the local subnet
address.
2. Perform an exclusive OR on the result of the previous operation and the local net
address of the local interface.
If the result is all 0’s, the destination is assumed to be reachable directly through one of
the local interfaces.
3. If an autonomous system has more than one interface (and therefore more than one
Internet address), the comparison process is repeated for each local interface.
For example, assume there are two local interfaces defined for a host network, T125. Their
Internet addresses and the binary representations of those addresses are shown in the
following example:
Configuring DHCP
By default, the DHCP server is configured by reading the /etc/dhcpsd.cnf file, which
specifies the server’s initial database of options and addresses. The server is started in the
/etc/rc.tcpip file, or it can be started from Web-based System Manager, from SMIT, or
through SRC commands. The DHCP client can be configured by running Web-based
System Manager, the System Management Interface Tool (SMIT), or editing a flat ASCII file.
Configuring the DHCP server is usually the hardest part of using DHCP in your network.
First, figure out what networks you need to have DHCP clients on. Each subnet in your
network represents a pool of addresses that the DHCP server must add to its database. For
example:
database db_file
{
subnet 9.3.149.0 255.255.255.0
{ option 3 9.3.149.1 # The default gateway clients on this
network should use
option 6 9.3.149.2 # The nameserver clients on this
network should use
}
... options or other containers added later
}
The example above shows a subnet, 9.3.149.0, with a subnet mask 255.255.255.0.
All addresses in this subnet, 9.3.149.1 through 9.3.149.254, are in the pool. Optionally, a
range can be specified on the end of the line or a range or exclude statement can be
included in the subnet container. See DHCP Server File Known Options, on page 3-70 for
common configuration methods and definitions.
The database clause with db_file indicates which database method to use for processing
this part of the configuration file. Comments begin with a # (pound sign). From the # to the
end of the line are ignored by the DHCP server. Each option line is used by the server to
tell the client what to do. DHCP Server File Known Options, on page 3-70 describes the
currently supported and known options. See DHCP Server File Syntax for General Server
Operation, on page 3-73 for ways to specify options that the server does not know about.
If the server does not understand how to parse an option, it uses default methods to send
the option to the client. This also allows the DHCP server to send site–specific options that
are not RFC defined, but may be used be certain clients or client configurations.
Containers
When the DHCP server receives a request, the packet is parsed and identifying keys
determine which containers, options, and addresses are extracted.
The previous example shows a subnet container. Its identifying key is the client’s position in
the network. If the client is from that network, then it falls into that container.
Each type of container uses a different option to identify a client:
• The subnet container uses the giaddr field or the interface address of the receiving
interface to determine which subnet the client came from.
• The class container uses the value in option 77 (User Site Class Identifier).
• The vendor uses the value in option 60 (Vendor Class Identifier).
• The client container uses the option 61 (Client Identifier) for DHCP clients and the chaddr
field in the BOOTP packet for BOOTP clients.
Except for subnets, each container allows the specification of the value that it will match
including regular expression matching.
There is also an implicit container, the global container. Options and modifiers placed in the
global container apply to all containers unless overridden or denied. Most containers can be
placed inside other containers implying a scope of visibility. Containers may or may not have
address ranges associated with them. Subnets, by their nature, have ranges associated
with them.
The basic rules for containers and subcontainers are as follows:
• All containers are valid at the global level.
• Subnets can never be placed inside other containers.
• Restricted containers cannot have regular containers of the same type within them. (For
example, a container with an option that only allows a class of Accounting cannot
include a container with an option that allows all classes that start with the letter ”a”. This
is illegal.)
• Restricted client containers cannot have subcontainers.
Given the above rules, you can generate a hierarchy of containers that segment your
options into groups for specific clients or sets of clients.
If a client matches multiple containers, how are options and addresses handed out? The
DHCP server receives messages, it passes the request to the database (db_file in this
case), and a container list is generated. The list is presented in order of depth and priority.
Priority is defined as an implicit hierarchy in the containers. Strict containers are higher
priority than regular containers. Clients, classes, vendors, and finally subnets are sorted, in
Modifiers
Modifiers are items that modify some aspect of a particular container, such as access or
lease time. After defining the address and option pools, start thinking about the container
modifiers. The most common are leasetimedefault, supportBootp, and
supportUnlistedclients.
leasetimedefault Defines the amount of time an address is to be leased to a client.
supportBootp Defines whether the server should respond to BOOTP clients.
supportUnlistedclients
Indicates whether clients should be explicitly defined by a client
statement to receive addresses. The value for supportUnlistedClients
can be none, dhcp, bootp, or both. This allows for you to restrict
access to bootp client and allow all DHCP clients to get addresses.
Other modifiers are listed in DHCP Server File Syntax for db_file Database, on page 3-75.
Logging
After selecting modifiers, the next item to set up is logging. Logging parameters are
specified in a container like the database, but the container keyword is logging_info. When
learning to configure DHCP, it is advisable to turn logging to its highest level. Also, it is best
to specify the logging configuration prior to any other configuration file data to ensure that
configuration errors are logged after the logging subsystem is initialized. Use the logitem
keyword to turn on a logging level or remove the logitem keyword to disable a logging level.
Other keywords for logging allow the specification of the log filename, file size, and the
number of rotating log files.
Server–specific Options
The last set of parameters to tweak are server–specific options, which allow the user to
control the number of packet processors, how often the garbage collection threads are run,
etc.
For example, two server–specific options are:
reservedTime Indicates how long an address should stay in reserved state after sending
an OFFER to the DHCP client
reservedTimeInterval
Indicates how often the DHCP server should scan through the addresses to
see if there are any that have been in the reserved state long than
reservedTime.
These options are useful if you have several clients that broadcast DISCOVER messages,
but either they do not broadcast their REQUEST message or their REQUEST message gets
lost in the network. Using these parameters keeps addresses from being reserved
indefinitely for a noncompliant client.
Another particularly useful option is SaveInterval, which indicates how often saves should
occur. All server–specific options are listed in DHCP Server File Syntax for General Server
Operation, on page 3-73 with the logging keywords.
The DHCP server also has a set of keywords to remove the DNS entries when a lease is
released or expires. The keywords are:
releasednsA Removes the A record.
releasednsP Removes the PTR record.
removedns Removes both record types.
These keywords specify executable strings that the DHCP server executes when an
address is released or expired. AIX provides a command, dhcpremove, that works similarly
to dhcpaction, but only takes three parameters:
1. The IP address, specified as a %s in the command string
2. Which record to remove (A, PTR, NONE, or BOTH).
3. Whether NIM should be updated (NIM or NONIM).
releasednsA ”/usr/sbin/dhcpremove ’%s’ ’%s’ ’%s’ A NONIM”
# This does the dhcpremove command only the A record
releasednsP ”/usr/sbin/dhcpremove ’%s’ ’%s’ ’%s’ PTR NONIM”
# This does the command only on the PTR record
removedns ”/usr/sbin/dhcpremove ’%s’ ’%s’ ’%s’ BOTH NIM”
# This does the command on both records and updates NIM
The dhcpaction and dhcpremove scripts do some parameter checking, then set up a call
to nsupdate, which has been updated to work with the AIX and OS/2 DDNS servers. See
the nsupdate command description for more information.
If NIM interaction is NOT required by the name update, the DHCP server can be configured
to use a socket transfer between the DHCP daemon and the nsupdate command to
improve performance and enable DNS updates to be retried upon failure. To configure this
option, the updateDNSA, updateDNSP, releaseDNSA, or the releaseDNSP keyword must
specify ”nsupdate_daemon” as the first quoted word. The parameters and flags for this
update are identical to those that are accepted by the nsupdate command. Additionally, the
following variable names can be used for substitution:
Prerequisites
The TCP/IP software must be installed. If you need to install TCP/IP software, you will have
to install the TCP/IP Optional Support optional software product.
You must have root authority to configure TCP/IP.
SRC Commands
SRC commands can affect one daemon, a group of daemons, or a daemon and those
daemons it controls (subsystem with subservers). In addition, some TCP/IP daemons do not
respond to all SRC commands. The following is a list of SRC commands that can be used to
control TCP/IP daemons and their exceptions.
startsrc Starts all TCP/IP subsystems and inetd subservers. The startsrc
command works for all TCP/IP subsystems and inetd subservers.
stopsrc Stops all TCP/IP subsystems and inetd subservers. This
command is also called the stop normal. The stop normal
command allows subsystems to process all outstanding work and
terminate gracefully. For inetd subservers, all pending
connections are allowed to start and all existing connections are
allowed to complete. The stop normal command works for all
TCP/IP subsystems and inetd subservers.
–OR–
Task SMIT Fast Path Command or File
Starting the inetd Daemon smit mkinetd startsrc –s inetd
Changing Restart smit chinetd or
Characteristics of the inetd smit lsinetd
Daemon
Stopping the inetd Daemon smit rminetd stopsrc –s inetd
Listing All inetd Subservers smit inetdconf
Adding an inetd Subserver1 smit mkinetdconf edit /etc/inetd.conf then run
refresh –s inetd or
kill –1 inetdPID2
Change/Show smit inetdconf edit /etc/inetd.conf then run
Characteristics of an inetd refresh –s inetd or
Subserver kill –1 inetdPID2
Removing an inetd smit rminetd edit /etc/inetd.conf then run
Subserver refresh –s inetd or
kill –1 inetdPID2
Note:
1. Adding an inetd subserver configures the inetd daemon so that it will invoke the
subserver when it is needed.
2. Both refresh and kill commands inform the inetd daemon of changes to its
configuration file.
–OR–
Task SMIT Fast Path Command or File
Listing All Services smit lsservices view /etc/services
Adding a Service smit mkservices edit /etc/services
Change/Show smit chservices edit /etc/services
Characteristics of a Service
Removing a Service smit rmservices edit /etc/services
–OR–
Task SMIT Fast Path Command or File
Controlling Remote Access See ”Remote Command Execution Access”, on page 3-148
and
”Restricted File Transfer Program Users”, on page 3-148.
Start, Restart, or Stop smit otherserv See ”System Resource
TCP/IP Subsystems Control”, on page 3-92.
Change/Show smit chgpty chdev –l pty0 –P –a
Characteristics of the pty num=X
Device Driver where X ranges from 0 to 64
Make the pty Device Driver smit pty then select
Unavailable for Use Remove the PTY; Keep
Definition
Make the pty Device Driver smit pty then select
Available for Use Configure the Defined PTY
Generate an Error Report smit errpt
Trace the pty smit trace
Naming
Naming in flat networks is very simple: Host names consist of a single set of characters and
generally are administered locally. In flat TCP/IP networks, each machine on the network
has a file (/etc/hosts) containing the name–to–Internet–address mapping information for
every host on the network. As a TCP/IP network grows, the administrative burden of
keeping each machine’s naming file current grows. When TCP/IP networks become very
large, as on the Internet, naming is divided hierarchically. Typically, the divisions follow the
network’s organization. In TCP/IP, hierarchical naming is known as the domain name
system (DNS) and uses the DOMAIN protocol. The DOMAIN protocol is implemented by the
named daemon in TCP/IP.
As in naming for flat networks, the domain name hierarchy provides for the assignment of
symbolic names to networks and hosts that are meaningful and easy for users to remember.
However, instead of each machine on the network keeping a file containing the
name–to–address mapping for all other hosts on the network, one or more hosts are
selected to function as name servers. Name servers translate (resolve) symbolic names
assigned to networks and hosts into the efficient Internet addresses used by machines. A
name server has complete information about some part of the domain, referred to as a
zone, and it has authority for its zone.
Naming Authority
In a flat network, all hosts in the network are administered by one central authority. This
form of network requires that all hosts in the network have unique host names. In a large
network, this requirement creates a large administrative burden on the central authority.
In a domain network, groups of hosts are administered separately within a tree–structured
hierarchy of domains and subdomains. In this case, host names need to be unique only
within the local domain, and only the root domain is administered by a central authority. This
structure allows subdomains to be administered locally and reduces the burden on the
central authority. For example, the root domain of the Internet consists of such domains as
com (commercial organizations), edu (educational organizations), gov (governmental
organizations), and mil (military groups). New top–level domains can only be added by the
central authority. Naming at the second level is delegated to designated agents within the
respective domains. For example, in the following figure, com has naming authority for all
commercial organization subdomains beneath it. Likewise, naming at the third level (and so
on) is delegated to agents within that level. For example, in the Domain Structure of the
ROOT
Century
Dev Graphics
Century’s Austin subdomain might also be divided into zones, for example, Dev and
Graphics. In this case, the zone austin.century.com would have all the data contained
in the domain austin.century.com, except that which was delegated to Dev and
Graphics. The zone dev.century.com would contain only the data delegated to Dev; it
would know nothing about Graphics, for example. The zone austin.century.com (as
opposed to the domain of the same name) would contain only that data not delegated to
other zones.
Naming Conventions
In the hierarchical domain name system, names consist of a sequence of case–insensitive
subnames separated by periods with no embedded blanks. The DOMAIN protocol specifies
that a local domain name must be less than 64 characters and that a host name must be
less than 32 characters in length. The host name is given first, followed by a . (period), a
series of local domain names separated by periods, and finally the root domain. A fully
specified domain name for a host, including periods, must be less than 255 characters in
length and in the following form:
host.subdomain1.[subdomain2 . . . subdomain].rootdomain
Since host names must be unique within a domain, you can use an abbreviated name when
sending messages to a host within the same domain. For example, instead of sending a
message to smith.eng.lsu.edu, a host in the eng domain could send a message to
smith. Additionally, each host can have several aliases that other hosts can use when
sending messages.
Name Servers
In a flat name space, all names must be kept in the /etc/hosts file on each host on the
network. If the network is very large, this can become a burden on the resources of each
machine.
In a hierarchical network, certain hosts designated as name servers resolve names into
Internet addresses for other hosts. This has two advantages over the flat name space: It
keeps the resources of each host on the network from being tied up in resolving names, and
it keeps the person who manages the system from having to maintain name resolution files
on each machine on the network. The set of names managed by a single name server is
known as its zone of authority.
Note: Although the host machine that performs the name resolution function for a zone of
authority is commonly referred to as a name server host, the process controlling the
function, the named daemon, is the actual name server process.
To further reduce unnecessary network activity, all name servers cache (store for a period of
time) name–to–address mappings. When a client asks a server to resolve a name, the
server checks its cache first to see if the name has been resolved recently. Since domain
and host names do change, each item remains in the cache for a limited length of time
specified by the record’s time to live. In this way, authorities can specify how long they
expect the name resolution to be accurate.
Within any autonomous system there can be multiple name servers. Typically, name servers
are organized hierarchically and correspond to the network’s organization. Referring to the
figure Domain Structure of the Internet, each domain might have a name server responsible
for all subdomains within the domain. Each subdomain name server communicates with the
name server of the domain above it (called the parent name server), as well as with the
name servers of other subdomains.
Century
Dev Graphics
For example, in the figure Domain Structure of the Internet, Austin, Hopkins, and Charlotte
are all subdomains of the domain Century. If the tree hierarchy is followed in the network
design, the Austin name server communicates with the name servers of Charlotte and
Hopkins as well as with the parent Century name server. The Austin name server will also
communicate with the name servers responsible for its subdomains.
There are several types of name servers:
Master Name Server Loads its data from a file or disk and may delegate authority
to other servers in its domain.
Slave Name Server Receives its information at system startup time for the given
zone of authority from a master name server, and then
periodically asks the master server to update its
information. On expiration of the refresh value in the start of
authority (SOA) Resource Record on a slave name server,
or upon receipt of a Notify message from the master name
server, the slave will reload the database from the master if
the serial number of the database on the master is greater
than the serial number in the current database on the slave.
If it becomes necessary to force a new zone transfer from
the master, simply remove the existing slave databases and
refresh the named daemon on the slave name server.
Stub Name Server Although its method of database replication is similar to that
of the slave name server, the stub name server only
replicates the Name Server records of the master database
rather than the whole database.
Hint Server Indicates a name server that relies only on the hints that it
has built from previous queries to other name servers. The
hint name server responds to queries by asking other
servers that have the authority to provide the information
needed if a hint name server does not have a
name–to–address mapping in its cache.
Name Resolution
The process of obtaining an Internet address from a host name is known as name
resolution and is done by the gethostbyname subroutine. The process of translating an
Internet address into a host name is known as reverse name resolution and is done by the
gethostbyaddr subroutine. These routines are essentially accessors into a library of name
translation routines known as resolvers.
Resolver routines on hosts running TCP/IP normally attempt to resolve names using the
following sources:
1. BIND/DNS (named)
2. Network Information Service (NIS)
3. Local /etc/hosts file
When NIS+ is installed, lookup preferences are set using the irs.conf file. For more
information, see AIX 4.3 NIS/NIS+ Guide.
To resolve a name in a domain network, the resolver routine first queries the domain name
server database, which may be local if the host is a domain name server or may be on a
foreign host. Name servers translate domain names into Internet addresses. The group of
names for which a name server is responsible is its zone of authority. If the resolver routine
is using a remote name server, the routine uses the Domain Name Protocol (DOMAIN) to
query for the mapping. To resolve a name in a flat network, the resolver routine checks for
an entry in the local /etc/hosts file. When NIS or NIS+ is used, the /etc/hosts file on the
master server is checked.
By default, resolver routines attempt to resolve names using the above resources.
BIND/DNS will be tried first, if the /etc/resolv.conf file does not exist or if BIND/DNS could
not find the name, NIS is queried if it is running. NIS is authoritative over the local
/etc/hosts, so the search will end here if it is running. If NIS is not running, then the local
/etc/hosts file is searched. If none of these services could find the name, then the resolver
routines return with HOST_NOT_FOUND. If all of the services are unavailable, then the
resolver routines return with SERVICE_UNAVAILABLE.
The default order described above can be overwritten by creating the /etc/irs.conf
configuration file and specifying the desired order. Also, both the default and /etc/irs.conf
orderings can be overwritten with the environment variable, NSORDER. If either the
/etc/irs.conf file or environment variable, NSORDER, are defined, then at least one value
must be specified along with the option.
–OR–
Task SMIT Fast Path Command or File
List All the Hosts smit lshostent view /etc/hosts
Add a Host smit mkhostent edit /etc/hosts
Change/Show smit chhostent edit /etc/hosts
Characteristics of a Host
Remove a Host smit rmhostent edit /etc/hosts
conf This file is read when the named daemon starts. The records in the
conf file tell the named daemon which type of server it is, which
domains it has authority over (its zones of authority), and where to
get the data for initially setting up its database. The default name of
this file is /etc/named.conf. However, you can change the name of
this file by specifying the name and path of the file on the command
line when the named daemon is started. When using the
/etc/named.conf as the conf file, if it does not exist, a message is
generated in syslog and named terminates. However, if an
alternative conf file is specified, and the alternative file does not
exist, no error message will be generated and named will continue.
cache Contains information about the local cache. The local cache file
contains the names and addresses of the highest authority name
servers in the network. The cache file uses the Standard Resource
Record Format. The name of the cache file is set in the conf file.
named.abc.rev
named.abc.local
When modifying the named data files the serial number in the SOA
Resource Record must be incremented for slave name servers to
properly realize the new zone changes.
resolv.conf The presence of this file indicates to a host that it should go to a
name server to resolve a name first. If the resolv.conf file does not
exist, the host looks in the /etc/hosts file for name resolution. On a
name server, the resolv.conf file must exist and can contain the
local host’s address, the loopback address (127.0.0.1), or be empty.
Note: The resolver routines require the default domain be set. If the
default domain is not set in the /etc/resolv.conf file, then it must be
set in the hostname.
Time–to–live (TTL) is specified in resource records. If TTL is not specified in a record, the
length of this time period defaults to the minimum field as defined in the start of authority
(SOA) record for that zone. TTL is used when data is stored outside a zone (in a cache) to
ensure that the data does not stay around indefinitely.
zone ”201.9.192.in–addr.arpa” in {
type master;
file ”/etc/named.abcrev”;
};
d. Define the name of the named local file. For example:
zone ”0.0.127.in–addr.arpa” in {
type master;
file ”/etc/named.local”;
};
2. Edit the /etc/named.ca file. Refer to the ”DOMAIN Cache File Format for TCP/IP” in the
AIX Files Reference for more information and a detailed example of a cache file.
This file contains the addresses of the servers that are authoritative, or root name
servers for the domain. For example:
; root name servers.
1 IN NS relay.century.com.
relay.century.com. 3600000 IN A 129.114.1.2
Note: All lines in this file must be in Standard Resource Record Format.
3. Edit the /etc/named.local file. See the ”DOMAIN Local Data File Format for TCP/IP” in
the AIX Files Reference for more information and a detailed example of a local data file.
a. Specify the start of authority of the zone and the default time–to–live information. For
example:
@ IN SOA venus.abc.aus.cntry.com. gail.zeus.abc.aus.cntry.com.
(
1.1 ;serial
3600 ;refresh
600 ;retry
3600000 ;expire
86400) ;minimum
b. Specify the name server (NS) record. For example:
IN NS venus.abc.aus.century.com.
c. Specify the pointer (PTR) record.
1 IN PTR localhost.
Note: All lines in this file must be in Standard Resource Record Format.
4. Edit the /etc/named.data file. The /usr/samples/tcpip/hosts.awk file contains
directions for creating the /etc/named.data file. Use the
/usr/samples/tcpip/named.data sample file as an example when creating the
/etc/named.data file. See the ”DOMAIN Data File Format for TCP/IP” in the AIX Files
Reference for more information and an example of a hosts data file.
zone ”xyz.aus.century.com” IN {
type slave;
file ”/etc/named.xyz.bak”;
masters { 192.9.201.1; 192.9.201.2; };
};
d. Include slave zone clauses to define the reverse name resolution information for the
name server. For example:
zone ”201.9.192.in–addr.arpa” IN {
type slave;
file ”named.rev.bak”;
masters { 192.9.201.1; 192.9.201.2; };
};
zone ”100.114.128.in–addr.arpa” IN {
type slave;
file ”named.rev.bak”;
masters { 192.9.201.1; 192.9.201.2; };
};
e. To support resolving the loopback network address, specify a zone of type master
with a source of /etc/named.local as well as the domain for which the name server
will be responsible.
zone ”0.0.127.in–addr.arpa” IN {
type master;
file ”/etc/named.local”;
};
2. Edit the /etc/named.ca file. Refer to the ”DOMAIN Cache File Format for TCP/IP” in the
AIX Files Reference for more information and a detailed example of a cache file.
This file contains the addresses of the servers that are authoritative name servers for the
root domain of the network. For example:
; root name servers.
1 IN NS relay.century.com.
relay.century.com. 3600000 IN A 129.114.1.2
Note: All lines in this file must be in Standard Resource Record Format.
3. Edit the /etc/named.local file. See the ”DOMAIN Local Data File Format for TCP/IP” in
the AIX Files Reference for more information and a detailed example of a local data file.
a. Specify the start of authority of the zone and the default time–to–live information. For
example:
@ IN SOA venus.abc.aus.cntry.com. gail.zeus.abc.aus.cntry.com.
(
1.1 ;serial
3600 ;refresh
600 ;retry
3600000 ;expire
86400) ;minimum
b. Specify the name server (NS) record. For example:
IN NS venus.abc.aus.century.com.
c. Specify the pointer (PTR) record.
Procedure
Configure a hint name server according to the following steps:
1. Edit the /etc/named.conf file. If there is no named.conf file in the /etc directory, copy
the /usr/samples/tcpip/named.conf sample file into the /etc directory and edit it. Refer
to the ”named.conf File Format for TCP/IP” in the AIX Files Reference for more
information and a detailed example of a conf file.
– To support resolving the loopback network address, specify a zone of type master with
a source of /etc/named.local as well as the domain for which the name server will be
responsible. For example:
zone ”.” IN {
type hint;
file ”/etc/named.ca”;
};
2. Edit the /etc/named.ca file. Refer to the ”DOMAIN Cache File Format for TCP/IP” in the
AIX Files Reference for more information and a detailed example of a cache file.
This file contains the addresses of the servers that are authoritative name servers for the
root domain of the network. For example:
; root name servers.
1 IN NS relay.century.com.
relay.century.com. 3600000 IN A 129.114.1.2
Note: All lines in this file must be in Standard Resource Record Format.
3. Edit the /etc/named.local file. Refer to the ”DOMAIN Local Data File Format for TCP/IP”
in the AIX Files Reference for more information and a detailed example of a local data
file.
(
1.1 ;serial
3600 ;refresh
600 ;retry
3600000 ;expire
86400) ;minimum
b. Specify the name server (NS) record. For example:
IN NS venus.abc.aus.century.com.
c. Specify the pointer (PTR) record.
1 IN PTR localhost.
Note: All lines in this file must be in Standard Resource Record Format.
4. Create an /etc/resolv.conf file by issuing the following command:
touch /etc/resolv.conf
The presence of this file indicates that the host should use a name server, not the
/etc/hosts file, for name resolution. You may want to enter records to specify the name,
domain, and address of the name server.
5. Perform one of the following steps:
– Enable the named daemon using the following SMIT fast path:
smit stnamed
This initializes the daemon with each system startup. Indicate whether you want to
start the named daemon now, at the next system restart, or both.
– Edit the /etc/rc.tcpip file. Uncomment the line for the named daemon by removing the
comment (#) symbol from the following line:
#start /etc/named ”$src_running”
This initializes the daemon with each system startup.
6. If you chose not to initialize the named daemon through SMIT, start the daemon for this
session by issuing the following command:
startsrc –s named
Note: All lines in this file must be in Standard Resource Record Format.
4. Create an /etc/resolv.conf file by issuing the following command:
touch /etc/resolv.conf
(
1.1 ;serial
3600 ;refresh
600 ;retry
3600000 ;expire
86400) ;minimum
b. Specify the name server (NS) record. For example:
IN NS venus.abc.aus.century.com.
c. Specify the pointer (PTR) record.
1 IN PTR localhost.
Note: All lines in this file must be in Standard Resource Record Format.
4. Create an /etc/resolv.conf file by issuing the following command:
touch /etc/resolv.conf
The presence of this file indicates that the host should use a name server, not the
/etc/hosts file, for name resolution.
Alternatively, the /etc/resolv.conf file may contain the following entry:
nameserver 127.0.0.1
The 127.0.0.1 address is the loopback address, which causes the host to access itself
as the name server. The /etc/resolv.conf file may also contain an entry such as:
domain domainname
In the previous example, domainname would be austin.century.com.
5. Perform one of the following steps:
– Enable the named daemon using the following SMIT fast path:
smit stnamed
This initializes the daemon with each system startup. Indicate whether you want to
start the named daemon now, at the next system restart, or both.
– Edit the /etc/rc.tcpip file. Uncomment the line for the named daemon by removing the
comment (#) symbol from the following line:
#start /etc/named ”$src_running”
This initializes the daemon with each system startup.
6. If you chose not to initialize the named daemon through SMIT, start the daemon for this
session by issuing the following command:
startsrc –s named
–OR–
Task SMIT Fast Path Command or File
Create an /etc/resolv.conf smit stnamerslv2 create and edit
File /etc/resolv.conf1
List All the Name Servers smit lsnamerslv view /etc/resolv.conf
Used by a Host
Add a Name Server smit mknamerslv edit /etc/resolv.conf2
Remove a Name Server smit rmnamerslv edit /etc/resolv.conf
Start/Restart Using Domain smit stnamerslv
Name Resolution
Stop Using Domain Name smit spnamerslv
Resolution
Change/Show the Domain smit mkdomain edit /etc/resolv.conf
Remove the Domain smit rmdomain edit /etc/resolv.conf
Note:
1. On the first line of the /etc/resolv.conf file, enter the word domain followed by the full
name of the domain that this host is in. For example:
domain abc.aus.century.com
2. On any blank line below the line which starts with the word domain, enter the word
nameserver, followed by at least one space, followed by the dotted decimal Internet
address of the name server that this host will use (the name server must serve the
domain indicated by the domain statement). You may have up to 16 name server
entries. For example, your /etc/resolv.conf file might contain the entries:
nameserver 192.9.201.1
nameserver 192.9.201.2
The system will query the name servers in the order listed.
Index Specifies the name used to reference the data in the zone.
ttl Specifies the time to live for this data. This is an optional field.
Example
To ensure security over a host name in a dynamic zone, a line similar to the following needs
to be added to the zone file for the zone containing the hostname.
bears 4660 IN KEY 0x0000 0 1 AQOtg......
The above example indicates that bears has a KEY record defined. Someone wanting to
update bears would need to sign his update with the private key matching the this public
key in the database. For the nsupdate command to succeed, the private key needs to be
placed on the client in a keyfile (defaults to /etc/keyfile). It should be in the format:
hostname mastername base64 key
A similar KEY entry is required in the zone definition section. A zone key is required for
both presecured and controlled modes or the mode is considered to be unsecured.
This can be done as shown in the previous bears example, but the private key is left for the
administrator to use with the nsupdate command’s administrative mode.
To generate a key pair using the nsupdate command, enter:
nsupdate –g –h ZoneName –p ServerName –k AdminKeyFile
This generates a key for the zone. Place the last key of the pair in the beginning section for
the zone as follows:
IN KEY 0x0100 0 1 Key
The zone is ready to be loaded. The administrator should use the zone key to apply updates
and maintenance operations on the zone.
Gateways
Gateways are a type of router. Routers connect two or more networks and provide the
routing function. Some routers, for example, route at the network interface level or at the
physical level.
Gateways, however, route at the network level. Gateways receive IP datagrams from other
gateways for delivery to hosts on the local network, and route IP datagrams from one
network to another. For example, a gateway connecting two Token–Ring networks has two
Token–Ring adapter cards, each with its own Token–Ring network interface. To pass on
information, the gateway receives datagrams through one network interface and sends
them out through the other network interface. Gateways periodically verify their network
connections through interface status messages.
Gateways route packets according to the destination network, not according to the
destination host. That is, a gateway machine is not required to keep track of every possible
host destination for a packet. Instead, a gateway routes packets according to the network of
the destination host. The destination network then takes care of sending the packet to the
destination host. Thus, a typical gateway machine requires only limited disk storage
capacity (if any) and limited main memory capacity.
The distance a message must travel from originating host to destination host depends upon
the number of gateway hops it must make. A gateway is zero hops from a network to which
it is directly attached, one hop from a network that is reachable through one gateway, and
so on. Message distance is usually expressed in the number of gateway hops required, or
hop counts (also called the metric).
Gateway Protocols
All gateways, whether interior or exterior, use protocols to communicate with each other.
Here are brief descriptions of the more commonly used TCP/IP gateway protocols:
HELLO Protocol (HELLO)
HELLO is one protocol that the interior gateways use to communicate
among themselves. HELLO calculates the shortest path to other networks
by determining the path that has the least delay time.
Routing Information Protocol (RIP)
Routing Information Protocol is a protocol that the interior gateways use to
communicate among themselves. Like the HELLO Protocol, RIP calculates
the shortest path to other networks. Unlike HELLO, RIP estimates distance
not by delay time, but by hop counts. Because the gated daemon stores all
metrics internally as time delays, it converts RIP hop counts into time
delays.
Routing Information Protocol Next Generation
RIPng is the RIP protocol that is enhanced to support IPv6.
Open Shortest Path First (OSPF)
OPSF is a protocol that the interior gateways use to communicate among
themselves. It is a link–state protocol that is bettter suited than RIP for
complex networks with many routers. It provides equal cost multipath
routing.
Exterior Gateway Protocol (EGP)
The exterior gateways can use the Exterior Gateway Protocol to
communicate among themselves. The EGP does not calculate the shortest
path to other networks. Instead, it merely indicates whether a particular
network is reachable or not.
Border Gateway Protocol (BGP)
The exterior gateways can use this protocol to communicate among
themselves. It exchanges reachability information between automomous
systems, but provides more capabilities than EGP. BGP uses path
attributes to provide more information about each route as an aid in
selecting the best route.
Border Gateway Protocol 4+
BGP4+ is the BGP protocol version 4, which supports IPv6 and has other
enhancements over past versions of the protocol.
Intermediate System to Intermediate System (IS–IS)
Interior gateways use IS–IS protocol to communicate among themselves. It
is a link–state protocol that can route IP and ISO/CLNP packets and, like
OSPF, uses a ”shorter path first” algorithm to determine routes.
Gateway A Gateway B
However, if Network 2 is very busy, communication between Network 1 and Network 3 may
suffer unacceptable delays. Furthermore, if most of the inter–network communication occurs
between Network 1 and Network 3, you may want to connect Network 1 directly to Network
3. To do this, you could use an additional pair of gateways, Gateway C (on Network 1) and
Gateway D (on Network 3), with a direct connection between these two additional gateways.
This may be an inefficient solution, however, because one gateway can connect more than
two networks.
A more efficient solution may be to connect Gateway A to Gateway B directly, as well as to
Network 2. This would require a second network adapter in both Gateway A and Gateway
B. In general, the number of networks you connect through a single gateway is limited by
the number of network adapter cards the gateway machine can support.
Configuring a Gateway
To configure a machine to act as a gateway, use the following the instructions below. For
clarity, this procedure assumes that the gateway machine will connect two networks, and
that the gateway machine has already been minimally configured (see ”Configuring
TCP/IP”, on page 3-90) on one of the networks.
1. Install and configure the second network adapter, if you have not done so already. (See
”Installing a Network Adapter”, on page 3-36, ”Configuring a High–Performance
Token–Ring Adapter”, on page 3-37, and ”Configuring a High–Performance Ethernet
Adapter”, on page 3-37.)
–OR–
Task SMIT Fast Path Command or File
Displaying the Routing Table smit lsroute netstat –rn1
Adding a Static Route smit mkroute route add destination
gateway2
Removing a Static Route smit rmroute route delete destination
gateway2
Flushing the Routing Table smit fshrttbl route flush
Note:
1. The table is divided into columns for destination address, gateway address, flags,
reference count (hop count), and network interface. (For a detailed discussion of each of
these columns, see the netstat command in the AIX Commands Reference.) If frames
are not reaching their destination and the routing tables indicate the correct route, there
is a good chance that one or more of the following conditions exist:
– Network is failing.
– Remote host or gateway is failing.
– Remote host or gateway is down or not ready to receive frames.
– Remote host does not have a route back to the source network.
2. The destination value is the dotted decimal address or symbolic name of the destination
host or network, and the gateway value is the dotted decimal address or symbolic name
of the gateway. (A default route specifies 0 as the destination.)
egp yes {
group maxup 1 {
neighbor nogendefault 192.9.201.1 ;
neighbor nogendefault 192.9.201.2 ;
} ;
group {
neighbor 192.10.201.1 ;
neighbor 192.10.201.2 ;
} ;
} ;
– If using RIP or HELLO:
– Set the RIP or HELLO statement to yes.
– Specify quiet in the RIP or HELLO statement if you want the gateway only
to accept routing information, not broadcast information. Or specify
supplier in the RIP or HELLO statement if you want the gateway to
broadcast routing information as well as accept routing information.
rip/hello pointopoint {
sourcegateways
101.25.32.1
101.25.32.2 ;
} ;
# Broadcast to all
rip/hello supplier {
interface en0 noripout ;
trustedgateways
101.25.33.1
101.25.33.2 ;
} ;
These first two examples could both be active in the gated.conf file.
# Broadcast to no one
rip/hello quiet {
interface tr0 noripin ;
} ;
– If using BGP:
– Set up the BGP autonomoussystem clause. Obtain an autonomous
system number from the Internet authority if you are on the Internet, or if
not, assign an autonomous system number considering the autonomous
system numbers of other systems on your network.
– Set the BGP statement to yes.
– Set up a peer clause for each neighbor in that autonomous system. For
example:
# Perform all BGP operations
bgp yes {
peer 192.9.201.1 ;
} ;
– If using SNMP:
– Set the SNMP statement to yes.
snmp yes ;
Removing a TTY
To remove a tty, you can use the Web-based System Manager fast path, wsm network, or
the System Management Interface Tool (SMIT) fast path, smit rminet.
User–Level Processes
The Asynchronous Point–to–Point Protocol on AIX utilizes three user–level processes:
1. A control daemon (pppcontrold) executed by root under the System Resource
Controller (startsrc –s pppcontrold). The control daemon’s function encompasses
loading and configuring all kernel extensions associated with the subsystem. It remains
running as long as PPP function is required by the operating system.
2. An attachment process (pppattachd) that binds a TTY stream to an instance of the Link
Control Protocol, Network Control Protocol, and a datagram protocol. An instance of
pppattachd exists for each active PPP connection in the system. Any user of the
attachment process must belong to the uucp group and contain /usr/sbin within their
PATH environment variable.
3. A dialer process (pppdial) that establishes an outgoing connection. The dialer is
intended to be executed by pppattachd as the connector program. Its purpose is to
interact over the asynchronous device prior to PPP negotiation. This interaction is
defined similarly to the UUCP chat dialog format. The dialer capability is provided to
assist in establishing a connection with a remote system. The actual session
establishment is out of the scope of PPP.
–OR–
Task SMIT Fast Path
Create Link Control Configuration smit ppplcp
Add a Link Configuration smit addlcp
Change/Show a Link Configuration smit chglcp
Remove a Link Configuration1 smit rmlcp
Create PPP IP Interfaces smit pppip
Add a Server Interface smit addpppserver
Change/Show a Server Interface smit listserver
Remove a Server Interface1 smit rmlistserver
Add a Demand Interface smit addpppdemand
Change/Show a Demand Interface smit listdemand
Remove a Demand Interface1 smit rmlistdemand
Manipulate PAP users/passwords smit ppppap
Add a PAP User smit addpapuser
Change/Show a PAP User smit listpapuser
Remove a PAP User smit rmpapuser
Manipulate CHAP users/passwords smit pppchap
Add a CHAP User smit addchapuser
Change/Show a CHAP User smit listchapuser
Remove a CHAP User smit rmchapuser
Start PPP2 smit startppp
Stop PPP3 smit stopppp
Note:
1. Selecting this task destroys the existing information.
2. An alternative way to start PPP is to issue the startsrc –s pppcontrold command.
However, the SMIT interface also allows you to set PPP to start at boot time.
3. An alternative way to stop PPP is to issue the stopsrc –s pppcontrold command.
However, the SMIT interface also allows you to have PPP not start at boot time.
QoS Models
The QoS models for the Internet are open standards defined by the IETF. There are two
Internet QoS models currently being standardized within the IETF: integrated services and
differentiated services. These two Internet QoS models augment the traditional best–effort
service model described in RFC 1812.
Integrated Services
Integrated Services (IS) is a dynamic resource reservation model for the Internet described
in RFC 1633. Hosts use a signaling protocol called Resource ReSerVation Protocol (RSVP)
to dynamically request a specific quality of service from the network. QoS parameters are
carried in these RSVP messages and each network node along the path installs the
parameters to obtain the requested quality of service. These QoS parameters describe one
of two currently defined services, guaranteed service and controlled–load service. An
important characteristic of IS is that this signaling is done for each traffic flow and
reservations are installed at each hop along the route. Although this model is well–suited for
meeting the dynamically changing needs of applications, there exist some significant scaling
issues that imply it cannot be deployed in the network in which single routers handle many
simultaneous flows.
Differentiated Services
Differentiated Services (DS) removes the per–flow and per–hop scalability issues, replacing
them with a simplified mechanism of classifying packets. Rather than a dynamic signaling
approach, DS uses bits in the IP type of service (TOS) byte to separate packets into
classes. The particular bit pattern in the IP TOS byte is called the DS codepoint and is used
by routers to define the quality of service delivered at that particular hop, in much the same
way routers do IP forwarding using routing table lookups. The treatment given to a packet
with a particular DS codepoint is called a per–hop behavior (PHB) and is administered
independently at each network node. When the effects of these individual, independent
PHBs are concatenated, this results in an end–to–end service.
Differentiated services is being standardized by an IETF working group, which has defined
three PHBs: the Expedited Forwarding (EF) PHB, the Assured Forwarding (AF) PHB group,
and the Default (DE) PHB. The EF PHB can be used to implement a low latency, low jitter,
low loss, end–to–end service such as a virtual leased line (VLL). AF is a family of PHBs,
called a PHB group, that is used to classify packets into various drop precedence levels.
The drop precedence assigned to a packet determines the relative importance of a packet
within the AF class. It can be used to implement the so–called Olympic service, which
consists of three classes: bronze, silver, and gold. The DE PHB is the traditional best–effort
service model as standardized in RFC 1812.
QoS Installation
QoS for AIX is packaged with bos.net.tcp.server. This fileset must be installed in order to
use QoS. To use the RAPI shared library, bos.adt.include must also be installed.
QoS Configuration
Stopping and Starting the AIX QoS Subsystem
QoS can be started or stopped through SMIT with the smit qos fast path or with the mkqos
and rmqos commands.
To disable the QoS subsystem now and on the next system restart:
/usr/sbin/rmqos –B
To enable the QoS subsystem now only:
/usr/sbin/mkqos –N
See the command descriptions for mkqos and rmqos for the startup and removal
command flags.
Example Configuration
interface 1.2.3.1
interface 1.2.3.2 disabled
interface 1.2.3.3 disabled
interface 1.2.3.4
{
trafficControl
}
rsvp 1.2.3.1
{
maxFlows 64
}
rsvp 1.2.3.4
{
maxFlows 100
}
The above example illustrates a possible RSVP configuration in which the AIX hosts has 4
interfaces (virtual or physical) given by the 4 IP addresses, 1.2.3.1, 1.2.3.2,
1.2.3.3, and 1.2.3.4.
Interface 1.2.3.1 has been enabled for RSVP. However, traffic control has not been
specified and incoming RSVP RESV messages do not cause resource reservation within
the AIX TCP subsystem. This interface can support a maximum of 64 simultaneous RSVP
sessions.
Interfaces 1.2.3.2 and 1.2.3.3 have been disabled. The RSVP agent cannot use this
interface to transmit or receive RSVP messages.
Interface 1.2.3.4 has been enabled for RSVP. In addition, it can install resource
reservations into the AIX TCP subsystem in response to an RSVP RESV message. This
interface may support up to 100 RSVP sessions.
Any other interfaces present on the host but not mentioned explictly in /etc/rsvpd.conf will
be disabled.
Example Configurations
In the following example, a premium service category is created and used in the tcptraffic
policy rule. This service category has a maximum rate of 110000 Kbps, a token bucket
depth of 10000 bits, and an outgoing IP TOS value of 11100000 in binary. The tcptraffic
policy rule gives this premimum service to all traffic with source IP address given by
1.2.3.6, destination address 1.2.3.3, and destination port in the range 0 to 1024. This
rule is only in effect from 8:00am to 11:00pm in the local time zone.
ServicePolicyRules tcptraffic
{
PolicyScope DataTraffic
Direction Outgoing
Permission Allowed
ProtocolNumber 6 # tcp
TimeOfDayRange 8:00–23:00
SourceAddressRange 1.2.3.6–1.2.3.6
DestinationAddressRange 1.2.3.3–1.2.3.3
DestinationPortRange 0–1024
ServiceReference premium
}
The following statements set up a default service category and use it to restrict the UDP
traffic flowing from interfaces 1.2.3.1 through 1.2.3.4 to IP addresses 1.2.3.6 through
1.2.3.10, port 8000.
ServiceCategories default
{
PolicyScope DataTraffic
MaxRate 110000
MaxTokenBucket 10000
OutgoingTOS 00000000
}
ServicePolicyRules udptraffic
{
PolicyScope DataTraffic
Direction Outgoing
Permission Allowed
ProtocolNumber 17 # udp
SourceAddressRange 1.2.3.1–1.2.3.4
DestinationAddressRange 1.2.3.6–1.2.3.10
DestinationPortRange 8000–8000
ServiceReference default
}
The example configuration below can be used to download rules from an LDAP server
using the distinguished subtree name,
ou=NetworkPolicies,o=myhost.mydomain.com,c=us
to lookup the policies on the LDAP server host.
ReadFromDirectory
{
LDAP_Server 1.2.3.27
Base ou=NetworkPolicies,o=myhost.mydomain.com,c=us
}
Statistics:
Compliant packets: 1423 (440538 bytes)
Conditions:
Source address Dest address Protocol
192.168.127.39:8000 192.168.256.29:35049 tcp (1connection)
Action:
Token bucket rate (B/sec): 10240
Token bucket depth (B): 1024
Peak rate (B/sec): 10240
Outgoing TOS (compliant): 0xc0
Outgoing TOS (non–compliant): 0x00
Flags: 0x00001011 (POLICE,MARK)
Type: DS
Statistics:
Compliant packets: 335172 (20721355 bytes)
Non–compliant packets: 5629 (187719 bytes)
Conditions:
Source address Dest address Protocol
192.168.127.39:80 *:* tcp (1 connection)
192.168.127.40:80 *:* tcp (5 connections)
QoS Reference
Commands
• qosstat
• mkqos
• rmqos
Methods
• cfgqos
• ucfgqos
Access Control
The security policy for networking is an extension of the security policy for the operating
system, and it consists of the following major components:
• User authentication
• Connection authentication
• Data import and export security
User authentication is provided at the remote host by a user name and password, the same
as when a user logs in to the local system. Trusted TCP/IP commands, such as ftp, rexec,
and telnet, have the same requirements and go through the same verification process as
trusted commands in the operating system.
Connection authentication is provided to ensure that the remote host has the expected
Internet Protocol (IP) address and name. This prevents a remote host from masquerading
as another remote host.
Data import and export security permits data at a specified security level to flow to and from
network interface adapters at the same security and authority levels. For example, top
secret data can flow only between adapters that are set to the top secret security level.
Auditing
Network auditing is provided by TCP/IP, using the audit subsystem to audit both kernel
network routines and application programs. The purpose of auditing is to record those
actions that affect the security of the system and the user responsible for those actions.
The following types of events are audited:
Kernel Events
• Change configuration
• Change host ID
Application Events
• Access the network
• Change configuration
• Change host ID
• Change static route
• Configure mail
• Connection
• Export data
• Import data
• Write mail to a file
Creation and deletion of objects are audited by the operating system. Application audit
records suspend and resume auditing to avoid redundant auditing by the kernel.
TCP/IP–Specific Security
Some portions of security are specific to TCP/IP. These features (TCP/IP commands and
TCP/IP trusted processes) work together with the operating system security features
discussed to provide the security for TCP/IP.
–OR–
Task SMIT Fast Path Command or File
List Remote Hosts That smit lshostsequiv view /etc/hosts.equiv
Have Command Execution
Access
Add a Remote Host for smit mkhostsequiv *edit /etc/hosts.equiv
Command Execution Access
Remove a Remote Host smit rmhostsequiv *edit /etc/hosts.equiv
from Command Execution
Access
For more information about file procedures preceded by an asterisk (*), refer to the
”hosts.equiv File Format for TCP/IP” in the AIX Files Reference.
–OR–
Task SMIT Fast Path Command or File
List Restricted FTP Users smit lsftpusers view /etc/ftpusers
Add a Restricted User smit mkftpusers *edit /etc/ftpusers
Remove a Restricted User smit rmftpusers *edit /etc/ftpusers
For more information about file procedures preceded by an asterisk (*), refer to the ”ftpusers
File Format for TCP/IP” in the AIX Files Reference.
Trusted Processes
A trusted program, or trusted process, is a shell script, a daemon, or a program that meets a
particular standard of security. These security standards are set and maintained by the U.S.
Department of Defense, which also certifies some trusted programs.
Trusted programs are trusted at different levels. Security levels include A1, B1, B2, B3, C1,
C2, and D, with level A1 providing the highest security level. Each security level must meet
certain requirements. For example, the C2 level of security incorporates the following
standards:
program integrity Ensures that the process will do what it is supposed to do,
no more and no less.
modularity Means that the process source code is broken down into
modules that cannot be directly affected or accessed by
other modules.
principle of least privilege States that at all times a user is operating at the lowest
level of privilege authorized. That is, if a user has access
only to view a certain file, then the user does not
inadvertently also have access to alter that file.
limitation of object reuse Keeps a user from, for example, accidentally stumbling
across a section of memory that has been flagged for
overwriting but not yet cleared, and may contain sensitive
material.
TCP/IP contains several trusted daemons and many nontrusted daemons. The trusted
daemons have been tested to ensure that they operate within particular security standards.
Examples of trusted daemons are:
• ftpd
• rexecd
• telnetd
Examples of nontrusted daemons are:
• rshd
• rlogind
• tftpd
For a system to be trusted, it must operate with a trusted computing base. This means, for a
single host, that the machine must be secure. For a network, this means that all file servers,
gateways, and other hosts must be secure.
/etc Directory
Name Owner Group Mode Permissions
gated.conf root system 0664 rw–rw–r––
gateways root system 0664 rw–rw–r––
hosts root system 0664 rw–rw–r––
hosts.equiv root system 0664 rw–rw–r––
inetd.conf root system 0644 rw–r––r––
named.conf root system 0644 rw–r––r––
named.data root system 0664 rw–rw–r––
networks root system 0664 rw–rw–r––
protocols root system 0644 rw–r––r––
rc.tcpip root system 0774 rwxrwxr––
resolv.conf root system 0644 rw–rw–r––
services root system 0644 rw–r––r––
3270.keys root system 0664 rw–rw–r––
3270keys.rt root system 0664 rw–rw–r––
/usr/bin Directory
Name Owner Group Mode Permissions
host root system 4555 r–sr–xr–x
hostid bin bin 0555 r–xr–xr–x
hostname bin bin 0555 r–xr–xr–x
finger root system 0755 rwxr–xr–x
ftp root system 4555 r–sr–xr–x
netstat root bin 4555 r–sr–xr–x
rexec root bin 4555 r–sr–xr–x
ruptime root system 4555 r–sr–xr–x
rwho root system 4555 r–sr–xr–x
talk bin bin 0555 r–xr–xr–x
telnet root system 4555 r–sr–xr–x
/usr/ucb Directory
Name Owner Group Mode Permissions
tn root system 4555 r–sr–xr–x
/var/spool/rwho Directory
Name Owner Group Mode Permissions
rwho (directory) root system 0755 drwxr–xr–x
Communication Problems
If you cannot communicate with a host on your network:
• Try to contact the host, using the ping command. Run the ping command on the local
host to verify that the local interface to the network is up and running.
• Try to resolve the name of the host, using the host command. If the name does not
resolve, you have a name resolution problem. See ”Name Resolution Problems”, on page
3-152 for more information.
If the name resolves and you are trying to contact a host on another network, you may have
a routing problem. See ”Routing Problems”, on page 3-154 for more information.
• If your network is a token–ring network, check to see if the target host is on another ring.
If so, the allcast field is probably set incorrectly. Use the Web-based System Manager
fast path, wsm network, or the System Management Interface Tool (SMIT) fast path
smit chinet to access the Network Interfaces menu. Then, set the Confine Broadcast to
Local Ring field to no in the token–ring dialog.
• If there are a large number of Address Resolution Protocol (ARP) packets on your
network, verify that your subnet mask is set correctly. This condition is known as a
broadcast storm and may affect your system’s performance.
Other Possibilities
If all else fails, you may want to turn on tracing for your routing daemon (either routed or
gated). Use the SRC traceson command from the command line, or send a signal to the
daemon to specify different levels of tracing. See the gated daemon or the routed daemon
for specifics on sending signals to these daemons.
telnet Debugging
telnet subcommands that may help in debugging problems include:
Configuration Problems
Network interfaces are automatically configured during the first system startup after the
adapter card is installed. However, you still need to set some initial values for TCP/IP
including the host name, the Internet address, and the subnet mask. To do this, you can use
the Web-based System Manager fast path, wsm network, or you can use the SMIT
interface in the following ways:
• Use the smit mktcpip fast path to set the initial values for the host name, the Internet
address, and the subnet mask.
• Use the smit mktcpip fast path to specify a name server to provide name resolution
service. (Note that smit mktcpip configures one network interface only.)
• Use the smit chinet fast path to set other network attributes.
You may also want to set up any static routes the host needs for sending transmitting
information, such as a route to the local gateway. Use the Web-based System Manager fast
path, wsm network, or the SMIT fast path, smit mkroute, to set these up permanently in
the configuration database.
If you are having other problems with your configuration, see the ”Configuring a TCP/IP
Network Checklist”, on page 3-4 for more information.
List of Methods
Device methods are programs associated with a device that perform basic device
configuration operations. See ”List of TCP/IP Programming References” in
AIX Communications Programming Concepts for information about TCP/IP methods.
List of RFCs
For a list of the RFCs (Request for Comments) supported by AIX, see the ”List of TCP/IP
Programming References” in AIX Communications Programming Concepts.
• RFC 1359 ”Connecting to the Internet: What connecting institutions should anticipate”
• RFC 1325 ”FYI on questions and answers: Answers to commonly asked ’new Internet
user’ questions”
• RFC 1244 ”Site Security Handbook”
• RFC 1178 ”Choosing a Name for Your Computer”
• RFC 1173 ”Responsibilities of host and network managers: A summary of the ‘oral
tradition’ of the Internet”
Getting RFCs
Many RFCs are available online. Paper copies of all RFCs are available from SRI, either
individually or on a subscription basis. For more information, contact [email protected], or
call 1–415–859–6387.
Online copies are available using FTP from ftp.nisc.sri.com as rfc/rfcnnnn.txt or
rfc/rfcnnnn.ps (where nnnn is the RFC number without leading zeros). Additionally, RFCs
may be requested through electronic mail from SRI’s automated mail server by sending a
message to mail–[email protected]. In the body of the message, indicate the RFC to be
sent, for example, send rfcnnnn (where nnnn is the number of the RFC). For PostScript
RFCs, specify the extension, for example, send rfcnnnn.ps. Multiple requests can be
sent in a single message by specifying each request on a separate line. The RFC index can
be requested by typing send rfc–index.
Data Structure
AIX provides a data structure required to implement the networks map class, which uses
this structure to communicate with the operating system.
struct nwent {
char *name; /* official name of net */
char **n_aliases; /* alias list */
int n_addrtype; /* net address type */
void *n_addr; /* network address */
int n_length; /* address length, in bits */
};
Procedures
To create and install a module containing a dynamically loading API, follow these steps:
1. First a user has to create the dynamic loadable module based upon AIX specifications.
2. The user must also create an export file (for example, rnd.exp) which exports all the
symbols to be used.
3. AIX provides the sample Makefile for user to create a dynamic loadable module file. (for
example, rnd.so file). The sample Makefile, sample export file and sample user module
file are located at /usr/samples/tcpip/dynload.
4. After compilation, user must put all the dynamic loadable object files under the file path
/usr/lib/netsvc/dynload.
5. Next a user needs to configure
– Environment variable NSORDER
or one of the the configuration files,
– /etc/netsvc.conf
or
– /etc/irs.conf.
6. After this, the dynamic loadable API functionality is ready to be used.
IP Security enables secure communications over the Internet and within company networks
by securing data traffic at the IP layer. This allows individual users or organizations to
secure traffic for all applications, without having to make any modifications to the
applications. Therefore the transmission of any data, such as e–mail or application–specific
company data, can be made secure.
The mechanism for securing data between two nodes is accomplished by creating a virtual
tunnel between two hosts. This is also referred to as creating a Virtual Private Network
(VPN). The secure tunnel encapsulates all IP traffic between the two hosts in a manner
specified by the user. It provides data integrity, privacy, and authentication depending on
how the tunnel is defined.
This chapter discusses the following topics:
• Benefits of a Virtual Private Network (VPN), on page 4-1
• Security, on page 4-2
• IP Security Features, on page 4-3
• Security Associations, on page 4-4
• Tunnels and Key Management, on page 4-4
• Native Filtering Capability, on page 4-5
• IP Security Installation, on page 4-7
• IP Security Configuration, on page 4-8, which includes sections on:
– Basic Configuration, on page 4-10
– Advanced Configuration, on page 4-17
• IP Security Problem Determination, on page 4-29
• IP Security Reference, on page 4-34
IKE Features
The following features are available with Internet Key Exchange, AIX versions 4.3.2 and
later:
• Authentication with preshared keys
• Use of main mode (identify protect mode) and aggressive mode
• Support for Diffie Hellman groups 1 and 2
• ESP encryption support for DES, Triple DES, Null encryption. ESP authentication support
with HMAC MD5 and HMAC SHA1
• AH support for HMAC MD5 and HMAC SHA1
• Separation of security policies with tunnel definition to allow security policy definitions to
be reused
Host Host
A B
SA A SA B
SA = Security Association consisting of:
Destination Address
SPI
Key
Crypto Algorithm and Format
Authentication Algorithm
Key Lifetime
Establishment of a Secure Tunnel between Hosts A & B
Loading IP Security
Attention: Loading IP Security will enable the filtering function. Therefore, before loading, it
is important to ensure the correct filter rules are created, or all outside communication may
be blocked.
If using SMIT or Web-based System Manager, (wsm network fast path) the IP security
modules will be automatically loaded when IP Security is started. This is the prefrerred
method to ensure that the kernel extensions and IKE daemons are loaded in the proper
order.
If the loading completed successfully, the lsdev command will show the IP Security devices
as Available.
lsdev –C –c ipsec
ipsec_v4 Available IP Version 4 Security Extension
ipsec_v6 Available IP Version 6 Security Extension
Once the IP Security kernel extension has been loaded, tunnels and filters are ready to be
configured.
Host Host
A B
SA A SA B
SA = Security Association consisting of:
Destination Address
SPI
Key
Crypto Algorithm and Format
Authentication Algorithm
Key Lifetime
Establishment of a Secure Tunnel between Hosts A & B
The Security Parameter Index (SPI) and the destination address identify a unique security
association. Therefore, these two parameters are required for uniquely specifying a tunnel.
Other parameters such as cryptographic algorithm, authentication algorithm, keys, and
lifetime can be specified or defaults can be used.
host B
host A
Secure Tunnel Imported
Autogen
tunnel
keys
info
Rule 5:
Rule action : permit
Source Address : 5.5.5.8
Source Mask : 255.255.255.255
Destination Address : 5.5.5.19
Destination Mask : 255.255.255.255
Source Routing : yes
Protocol : all
Source Port : any 0
Destination Port : any 0
Scope : both
Direction : inbound
Logging control : no
Fragment control : all packets
Tunnel ID number : 1
Interface : all
Auto–Generated : yes
These filter rules in addition to the default filter rules are activated by the mktun –v 4 –t 1
command.
To set up the other side (when it is another AIX machine), the tunnel definition can be
exported on host A then imported to host B.
To export:
exptun –v 4 –t 1 –f /tmp
This will export the tunnel definition into a file named ipsec_tun_manu.exp and any
associated filter rules to the file ipsec_fltr_rule.exp in the directory indicated by the –f flag.
–v IP version: 4 or 6.
–a Action:
d Deny
p Permit
–s Source address. Can be an IP address or hostname.
–m Source subnet mask.
–d Destination address. Can be an IP address or hostname.
–M Destination subnet mask.
–g Source routing control: y or n.
–c Protocol. Values may be udp, icmp, tcp, tcp/ack, ospf, pip, esp, ah
and all.
–o Source port or ICMP type operation.
–p Source port or ICMP type value.
–O Destination port or ICMP code operation.
–P Destination port or ICMP code value.
–r Routing.
r Forwarded packets
l Local destined/originated packets
b Both
AH ESP
To configure a tunnel using DES CBC MD5, the combined ESP header is used with the ESP
encryption algorithm set to DES_CBC_8 and the AH authentication algorithm set to HMAC
MD5. To use this authentication algorithm, specify it with the –b flag, and its keys with the –c
flag. For example:
gentun –v 4 –t manual –s 5.5.5.19 –d 5.5.5.23
–e DES_CBC_8 –b HMAC_MD5 –N 2349473
This command will generate a tunnel using DES CBC MD5 with autogenerated keys (see
figure). The encrypted data and the authentication data are both contained in the same ESP
header. It also supports replay preventions, which is not recommended for manual tunnels.
It is included in this release for compatibility with other implementations and for testing
purposes.
Pad
Pad Type
Len
Authentication Data
In many cases, the endpoints of the key management (IKE) tunnel will be the same as the
endpoints of the data management (IP Sec) tunnel. The IKE tunnel endpoints are the IDs of
the machines carrying out the negotiation. The IP Sec tunnel endpoints describe the type of
traffic that will use the IP Security tunnel. For simple host–to–host tunnels, in which all traffic
between two tunnels is protected with the same tunnel, the phase 1 and phase 2 tunnel
endpoints are the same. When negotiating parties are two gateways, the IKE tunnel
endpoints are the two gateways, and the IP Sec tunnel endpoints are the machines or
subnets (behind the gateways) or the range of addresses (behind the gateways) of the
tunnel users.
0 permit 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 yes all any 0 any 0 both
both no all packets 0 all
Host–Firewall–Host
The host–firewall–host configuration option for tunnels (see figure) allows you to create a
tunnel between your host and a firewall, then automatically generate the necessary filter
rules for correct communication between your host and a host behind the firewall. The
auto–generated filter rules permit all rules between the two non–firewall hosts over the
tunnel specified. The default rules––for user datagram protocol (UDP), Authentication
Headers (AH), and Encapsulating Security Payload (ESP) headers––should already handle
the host to firewall communication. The firewall will have to be configured appropriately to
complete the setup. You should use the export file from the tunnel you created to enter the
SPI values and keys that the firewall needs.
Host – FW – Host
Remote
Local Host A Tunnel from A to B Firewall B Remote Host C
Local FW
Logging Facilities
This section describes the configuration and format of system logs relating to IP Sec. As
hosts communicate with each other, the transferred packets may be logged to the system
log daemon, syslogd. Other important messages about IP Sec will appear as well. An
administrator may choose to monitor this logging information for traffic analysis and
debugging assistance. The following are the steps for setting up the logging facilities.
1. Edit the /etc/syslog.conf file to add the following entry:
local4.debug var/adm/ipsec.log
Use the local4 facility to record traffic and IP Sec events. Standard AIX priority levels
apply. You should set the priority level of debug until traffic through IP Security tunnels
and filters show stability and proper movement.
isakmpd Logging
The isakmpd daemon logs to a separate log because of the number and size of the logging
messages. Logging is enabled using the ike cmd=log command. The /etc/isakmpd.conf
configuration file can be set up to specify the output files for each logging level. Levels may
be set to none, errors, events, and information.
The isakmpd daemon code will either initiate or respond by sending or evaluating a
proposal. If the proposal is accepted, a security association is created and the tunnel will be
set up. If the proposal is not accepted or the connection times out before the negotation
completes, the daemon indicates an error. The entries in syslog from the tmd indicate
whether the negotiation succeeded. To find out the exact cause of a failed negotiation, the
isakmpd log needs to be checked.
Tracing facilities
Tracing is a debug facility for tracing kernel events. Traces can be used to get more specific
information about events or errors occuring in the kernel filter and tunnel code.
SMIT has an IP Security trace facility available through the Advanced IP Security
Configuration menu. The information captured by this trace facility includes information on
Error, Filter, Filter Information, Tunnel, Tunnel Information, Capsulation/Decapsulation,
Capsulation Information, Crypto, and Crypto Information. By design, the error trace hook
provides the most critical information. The info trace hook can generate a lot of information
and may have an impact on system performance. This tracing will provide clues to you as to
what a problem may be. Tracing information will also be required when speaking with an
IBM IP Security Technician. To access the tracing facility, use the SMIT fast path smit
ips4_tracing (for IP Version 4) or smit ips6_tracing (for IP Version 6).
ipsecstat
You can issue the ipsecstat command to generate the following sample report. This sample
report shows that the IP Security devices are in the available state, that there are three
authentication algorithms installed, three encryption algorithms installed, and that there is a
current report of packet activity. This information may be useful to you in determining where
a problem exists if you are troubleshooting your IP Security traffic.
Authentication Algorithm:
HMAC_MD5 –– Hashed MAC MD5 Authentication Module
HMAC_SHA –– Hashed MAC SHA Hash Authentication Module
KEYED_MD5 –– Keyed MD5 Hash Authentication Module
Encryption Algorithm:
CDMF –– CDMF Encryption Module
DES_CBC_4 –– DES CBC 4 Encryption Module
DES_CBC_8 –– DES CBC 8 Encryption Module
3DES_CBC –– Triple DES CBC Encryption Module
IP Security Statistics –
Total incoming packets: 1106
Incoming AH packets:326
Incoming ESP packets: 326
Srcrte packets allowed: 0
Total outgoing packets:844
Outgoing AH packets:527
Outgoing ESP packets: 527
Total incoming packets dropped: 12
Filter denies on input: 12
AH did not compute: 0
ESP did not compute:0
AH replay violation:0
ESP replay violation: 0
Total outgoing packets dropped:0
Filter denies on input:0
Tunnel cache entries added: 7
Tunnel cache entries expired: 0
Tunnel cache entries deleted: 6
Interoperability Notes
The following sections describe interoperability solutions. For related information, see
Coexistence of IP Security and IBM Secured Network Gateway 2.2/IBM Firewall 3.1 or 3.2,
on page 4-28.
List of methods
defipsec Defines an instance of IP Security for IP Version 4 or IP Version 6
cfgipsec Configures and loads ipsec_v4 or ipsec_v6
ucfgipsec Unconfigures ipsec_v4 or ipsec_v6
This chapter contains information on managing tty terminal devices. Topics discussed are:
• TTY Overview, on page 5-2
• Managing TTY Devices, on page 5-4
• Dynamic Screen Utility, on page 5-6
• Modems, on page 5-13
• ATE Overview, on page 5-38
• Setting Up ATE, on page 5-40
• TTY Troubleshooting, on page 5-41
–OR–
Task SMIT Fast Path Command or File
List Defined TTY Devices smit lsdtty lsdev –C –c tty –H
Add a TTY smit mktty mkdev –t tty1,2
Move a TTY to Another smit movtty chdev –l Name –p
Port3 ParentName –w
ConnectionLocation2,4
Change/Show smit chtty lsattr –l Name –E (to show);
Characteristics of a TTY chdev –l Name (to change)4
Remove a TTY3 smit rmtty rmdev –l Name
Configure a Defined TTY smit mktty mkdev –l Name
(Make Available for Use)
Note:
1. Other flags may be used to further specify the new tty device. For example, to define and
configure an RS–232 tty device connected to port 0 on the 8–port asynchronous adapter
sa3 with the speed attribute set to 19200 and other attributes set to values retrieved
from the foo file:
mkdev –t tty –s rs232 –p sa3 –w 0 –a speed=19200 –f foo
2. The mkdev and chdev commands support options that are not possible with Web-based
System Manager or SMIT.
3. Disable the tty before doing this task. Refer to the pdisable command.
4. Use flags to change specific characteristics about a tty from the command line.
If adding or changing a tty from the command line, consult the following list to find out the
Attribute name you should specify in the –a Attribute=Value flag for the characteristic you
want to set. For example, specify –a speed=Value to set the baud rate of a tty device.
Block Keys
Block keys are used to stop output in a fashion similar to Ctrl–S key when using IXON flow
control. The purpose of these keys is to allow for transparently setting up terminal sessions
on two computers using a terminal that has two serial ports.
New Keys
Pressing a new screen key creates a new logical screen and assigns it to one of the select
keys. Each new screen requires:
• A select key as defined in the dsinfo file
• A dscreen pseudo–terminal device
• Enough memory for the various structures used in screen tracking
• A process to run the shell from
If any of these are not available, the new screen operation will fail with a message indicating
the reason for the failure.
Previous Key
Pressing a previous key will switch the terminal to the screen that was last displayed.
Note:
1. Do not switch screens when the current screen is being written to; an escape sequence
may be truncated and leave the terminal in an unknown state.
2. Some terminal displays may save the cursor position for individual screens but may not
save other states such as insert mode, inverse video, etc. If this is the case, users
should avoid these modes while switching screens.
List Key
Pressing a list key will display a list of keys and their actions on the terminal display. Only
those keys recognized by dscreen will be shown. When a new screen is created using
dscreen, the message Press KEY for help, where KEY is the name of the list key
displayed on the terminal. Note that the message is displayed only if there is a list key
defined.
dsinfo File
The dsinfo file is a database of terminal descriptions used by the dscreen multiple screen
utility. The file contains the following information:
• dscreen keys and the functions they perform
• Number of screen memory pages for the terminal
• Code sequences sent or received to use the above features
The terminal type entries in the default dsinfo file resemble the following 3151 ASCII
terminal values:
# The Cartridge for Expansion (pn: 64F9314) needed for this entry
ibm3151|3151|IBM 3151,
dsks=\E!a^M|Shift–F1|, # Selects first screen
dsks=\E!b^M|Shift–F2|, # Selects second screen
dsks=\E!c^M|Shift–F3|, # Selects third screen
dsks=\E!d^M|Shift–F4|, # Selects fourth screen
dskc=\E!e^M|Shift–F5|, # Creates a new screen
dske=\E!f^M|Shift–F6|\E pA\EH\EJ, # Go to screen 1 and end
dskl=\E!g^M|Shift–F7|, # Lists function keys (help)
dskp=\E!h^M|Shift–F8|, # Go to previous screen
dskq=\E!i^M|Shift–F9|\E pA\EH\EJ, # Go to screen 1 and quit
dsp=\E pA|\EH\EJ, # Terminal sequence for screen 1
dsp=\E pB|\EH\EJ, # Terminal sequence for screen 2
dsp=\E pC|\EH\EJ, # Terminal sequence for screen 3
dsp=\E pD|\EH\EJ, # Terminal sequence for screen 4
dst=10, # Allow 1 second timeout buffer
String Types
The string types are as follows:
dskx A string type that starts with dsk describes a key. The type
must be four letters long, and the fourth letter x indicates
what action is taken when the key is received. The key
types are:
Type Action
dsks Switch Screens
dskb Block Input and Output
dske End dscreen
dskq Quit dscreen (exit status=1)
dskc Create New Screen
dskp Switch to Previous Screen
dskl List Keys and Actions
Any other key type (that is, a string type dskx that does not
end in s, b, e, q, p, or l) will cause no internal dscreen
action, but will show up in the key listing and will be
recognized and acted on. A type of dskn (n for No
Operation) should be used when no internal dscreen action
is desired.
Modem Overview
A modem is a device that allows you to connect one computer to another across ordinary
telephone lines. The current telephone system is incapable of carrying the voltage changes
required for a direct digital connection. A modem overcomes this limitation by modulating
digital information into audio tones for transmission across the phone line, and by
demodulating those tones back into digital information on reception. Modems are commonly
used with Basic Network Utilities (BNU) or other implementations of the UNIX–to–UNIX
Copy Program (UUCP). A high–speed (14,400 bps or greater) modem can be used with
Serial Line Interface Protocol (SLIP) to provide Transmission Control Protocol/Internet
Protocol (TCP/IP) connectivity as well.
Often, the term baud is used to refer to a modem’s speed instead of bps. Baud is actually a
measurement of the modulation rate. In older modems, only 1 bit was encoded in each
signal change, so a modem’s baud rate was equal to the modem’s speed. Modems that
operate at higher speeds, however, still generally operate at 2400 (or even 1200) baud, and
encode two or more bits per signal change. A modem’s bps rate is calculated by multiplying
the number of data bits per signal with the baud (for example, 2400 baud x 6 bits per signal
change = 14,400 bits per second). Most modern modems can communicate at a variety of
speeds (for example, 14,400, 9600, 7800, 4800, and 2400 bps).
Telecommunications Standards
The older speeds of 300, 1200, and 2400 bps were well defined. However, as modem
manufacturers began to devise methods for gaining higher speeds, each modem
manufacturer started to use a proprietary method incompatible with modems from other
manufacturers. Today, the ITU–TSS (formerly the United Nations Consultative Committee
for International Telephony and Telegraphy, abbreviated CCITT) defines standards for most
high–speed communications.
Even high–speed modems are much slower than other methods of computer
communication. A high–speed modem may operate at 28,800 bps, but an Ethernet
connection operates at 10,000,000 bps. In order to boost data throughput, high–speed
modems typically offer one or more data compression algorithms. These algorithms can
boost the throughput of a high–speed modem to speeds of 57,600 bps (if the data rate is
14,400 bps) or 115,200 bps (if the data rate is 28,800 bps). Note that these compression
algorithms are sensitive to the data being transmitted. If the data has already been
compressed (for example, with the compress command), the data compression methods of
high–speed modems will offer little or no benefit, and might even reduce data throughput.
When using a modem with data compression technology, the speed of the data terminal
equipment/data circuit–terminating equipment (DTE/DCE) connection between the
computer and the modem should be greater than the nominal data rate of the connection
between modems, and equal . For example, with a V.32bis modem with V.42bis data
compression, the data rate of the modem (the speed at which the modem communicates
across telephone lines) is 14,400 bps. When the V.42bis compression is active, actual data
throughput can reach 57,600 bps. To accommodate the greater throughput offered by data
compression, the speed of the DTE/DCE between the computer and the modem should be
set to 57,600 bps.
Attention: Some modems implementing data compression and modern modulation
schemes may yield a higher data throughput than some systems and asynchronous
adapters can accommodate.
Generic Modems
To set up a modem:
1. Attach the modem with the appropriate cables.
2. Add a tty for the modem.
3. Configure the modem.
Setting Description
DISABLE The tty is set to off in the /etc/inittab file. No getty is started
on this port at system startup.
ENABLE The port starts a getty immediately. This setting is used
most often for dial–in–only modems, and terminal logins.
TTY tty0
TTY type tty
TTY interface rs232
Description Asynchronous Terminal
Status Available
Location 00–00–s1–00
Parent adapter sa0
PORT number s1
Enable LOGIN share
BAUD rate 2400
PARITY none
BITS per character 8
Number of STOP BITS 1
TIME before advancing to 0
next port setting
XON–XOFF handshaking no
TERMINAL type dumb
INPUT map file none
OUTPUT map file none
CODESET map file sbcs
STTY attributes for RUN TIME should be:
[hupcl,cread,brkint,icrnl,opost,tab3,onlcr,icanon,echo,echoe,echo
k,echoctl, echoke,imaxbel,iexten]
(No ixon/ixoff needed)
STTY attributes for LOGIN should be:
[hupcl,cread,echoe,cs8]
(No ixon/ixoff needed)
2. Add the following line to /usr/lib/uucp/Systems file:
hayes Nvr HAYESPROG 2400
3. Add this to /usr/lib/uucp/Devices file:
# For programming the hayes modem only:
HAYESPROG tty0 – 2400 HayesProgrm2400
#regular ACU entry:
ACU tty0 – Any hayes
Tips:
To make the program more permanent, insert the file
name of the compiled version (complete with path) at
the end of your ”/etc/rc” file and the changes will
take effect again at next reboot.Usage is addrts
/dev/tty##.
_________________________________________________________________
To create: vi addrts.c <enter>
To compile: cc –o addrts addrts.c
_______________________________________________________________*/
/* Program starts now */
#include <stdio.h>
#include <fcntl.h>
#include <termios.h>
#include <sys/tty.h>
main (argc,argv)
int argc;
char *argv[];
{
int fd;
if ( (fd = open(argv[1], O_NDELAY|O_RDWR)) <0 ) {
printf(”%s: could not open %s\n”,argv[0],
argv[1]);
exit (22);
}
ioctl(fd, TXADDCD, ”rts”); /* adds rts to the tty in the
argument */
close(fd);
}
OK
ATL6
S0 S2 S3 S4 S5 S6 S7 S8 S9 S10 S11 S13 S24 S25 S30
001 043 013 010 008 002 045 002 025 007 070 037 020 001 000
OK
ATL7
$A0 &A0 #A0 &B0 &BS1 &C1 $D0 &D2 #DB0 $EB0 %E1 #F0 $F1 &G0 #L0 $MI0 &M0
&P0 #P2 &Q0 $R0 &R1 &RF1 &S0 $SP0 &SF0 #T1 $V0 $V6 $VD0 &X0 Y0
$MB9600 $SB9600 $BA0 &W0
OK
Note: In the example above, the s9 register has been set to 25. The default is 6. The
normal setting should be between 15 and 20.
2. Modems that are set for baud rates at or above 9600 should have RTS/CTS (request to
send/clear to send) hardware handshaking added to the tty port. There are two options
for accomplishing this:
a. Use the following procedure:
– Add clocal to the stty Attributes for Runtime for your tty using smit chtty.
– On the command line, enter: pdisable tty N ( N is your tty number).
– Issue the command stty add rts < /dev/tty N
– Issue the command stty get < /dev/tty N. RTS should appear on line.
b. Use the following C program to add RTS to the port.
/* C Program to add RTS discipline to tty port(s).
TTY tty0
TTY type tty
TTY interface rs232
Description Asynchronous Terminal
Status Available
Location 00–00–s1–00
Parent adapter sa0
PORT number s1
Enable LOGIN share
BAUD rate 19200
PARITY none
BITS per character 8
Number of STOP BITS 1
TIME before advancing to 0
next port setting
XON–XOFF handshaking no
TERMINAL type dumb
INPUT map file none
OUTPUT map file none
CODESET map file sbcs
STTY attributes for RUN TIME should be:
[hupcl,cread,brkint,icrrnl,opost,tab3,onlcr,icanon,echo,echoe,
echok, echoctl,echoke,imaxbel,iexten]
(No ixon/ixoff needed)
STTY attributes for LOGIN should be:
[hupcl,cread,echoe,cs8]
(No ixon/ixoff needed)
3. Add the following line to /usr/lib/uucp/Systems file:
uds Nvr UDSPROG Any
5. To program the modem, enter the command cu –d uds. The cu command is used to
program the modem. Because there is no connection to another computer, the command
fails. Watch the output of the command to see this.
AT Command Summary
The following is a summary of the Hayes Smartmodem command set. These commands
comprise the AT command set used by many popular modems. This information comes
from the Hayes Smartmodem 2400 Quick Reference Card, published by Hayes
Microcomputer Products, Inc.
S–Register Summary
Register Range Description
S0 0–255 Select number of rings
before answer.
S1 0–255 Ring count (incremented
with each ring).
S2 0–127 Define escape sequence
character (ASCII).
S3 0–127 Define carriage return
character (ASCII).
S4 0–127 Define line feed character
(ASCII).
S5 0–32, 127 Define backspace character
(ASCII).
S6 2–255 Select wait–time in seconds
before blind dialing.
S7 1–55 Select wait–time in seconds
for carrier/dial tone.
S8 0–255 Select duration in seconds
of comma.
S9 1–255 Carrier detect response time
in .1 second increments (10
= 1 second).
S10 1–255 Delay between carrier loss
and hangup in .1 second
increments.
Customizing ATE
The first time you run ATE, the program creates an ate.def default file in the current
directory. The ate.def file contains parameters the ATE program uses for:
• Data transmission characteristics
• Local system features
• Dialing directory file
• Control keys
To change the defaults, edit the ate.def file.
If the you need to run ATE with different settings, you can maintain ate.def files in different
directories. You can then run ATE from the appropriate directory depending on the settings
needed for specific sessions. However, running ATE from many directories requires multiple
copies of the ate.def file, which uses system storage.
See ”How to Edit the ATE Default File” in AIX 4.3 System User’s Guide: Communications
and Networks for details about editing the ate.def file.
You can temporarily change settings without modifying the default file. To do this, use the
alter and modify subcommands. Settings you change with the alter or modify
subcommand remain in effect until you exit the program with the quit subcommand. When
you exit ATE, the settings return to the defaults set in the ate.def file.
When installed, ATE uses the /usr/lib/dir system–wide dialing directory file. You can
temporarily change settings in the dialing directory file for a specific modem connection.
Settings changed in this way revert to the default when the connection ends, rather than
when you exit ATE. A user with root authority can modify the /usr/lib/dir file to include
numbers for modems used by everyone on the system. Individual users can also create
their own dialing directory files and modify their copies of the ate.def file to make ATE use
those directories.
”How to Set up an ATE Dialing Directory” in AIX 4.3 System User’s Guide: Communications
and Networks explains how to set up ATE to use a customized dialing directory.
Prerequisites
• The ATE program must be installed on the system. ATE is an optional program product.
• The user must have root user authority to set up the port for the communications device.
Procedure
To prepare ATE to run on the system:
1. Install an asynchronous adapter card in an appropriate slot in the system unit, unless the
system has a built–in serial port.
2. Plug the RS–232C or RS–422A cable into the adapter card or the built–in serial port.
3. Add a tty device for the communications port. To do this, use the Web-based System
Manager fast path, wsm devices, or enter:
smit mktty
4. Select Add a TTY.
5. Select the tty type.
6. Select a parent adapter
7. Select a port.
8. Set the Enable LOGIN field to disable.
9. Set Terminal Type to HFT or dumb.
10.Make the necessary adjustments for the environment. The most common changes are
line speed, parity settings, number of bits per character, and whether the line is to be
driven as a remote or local line. Use BPC 8 and no parity if National Language
Support (NLS) is required.
11. Set up the port for the device.
– To set up a port to call out with ATE, use the pdisable command. For example, to set
up port tty1, enter:
pdisable tty1
– To set up a port so that others can call in, use the penable command. For example, to
let other systems call in to the tty2 port, enter:
penable tty2
12.Ensure the device has previously been defined to the remote system. Once the device is
defined, the ATE program must be customized to reflect the device settings on the
remote system. Customize the default settings with the alter and modify subcommands
or by editing the ate.def default file. To change the default settings for a telephone
connection, use a dialing directory file entry.
Possible Causes
• Incorrect modem configuration
• A port is defined and enabled but no cable or device is attached to it
• Bad cabling or loose connection
• Noise on communication line
• Corruption of, or tampering with, /etc/environment or /etc/inittab files
• tty configuration is corrupted
• Hardware is defective
This chapter provides installation and configuration information for Micro Channel, ISA, and
PCI adapters. Topics discussed are support and configuration for the following:
• Micro Channel adapters (Multiport/2, on page 6-2 and Portmaster, on page 6-2)
• ISA adapters (Multiport Model 2, on page 6-4)
• ISA/PCI Wide Area Network (WAN) Adapters (Multiport Model 2 (ISA), on page 6-4,
2–Port Multiprotocol (PCI), on page 6-8, and ARTIC960HX(PCI)).
Note: Not all adapters are described in this chapter. Please refer also to the documentation
delivered with the system unit or with the adapters ordered separately.
–OR–
Task SMIT Fast Path
Add a Device Driver smit commodev1,2
Add Ports on the Adapter smit commodev, select adapter, then
Manage Ports, then Add a Multiprotocol
Port
Reconfigure Ports on the Adapter smit commodev, select adapter, then
Manage Ports, then Change/Show
Characteristics of a Port
Remove a Port on the Adapter smit commodev, select adapter, then
Manage Ports, then Remove a Port
Make a Defined Port Available smit commodev, select adapter, then
Manage Ports, then Configure a Defined
Port
Transfer Adapter’s Device Driver from smit commodev, select adapter, then
Defined to Available Manage Ports, then Configure a Defined
Device Driver
Remove Adapter’s Device Driver smit commodev, select adapter, then
Manage Ports, then Remove a Device
Driver
Note:
1. This menu varies depending on the software you have installed. The device drivers for
the 4–Port Multiprotocol communications controller are included with the basic operating
system. To use another type of Multiport/2 adapter or Portmaster Adapter/2, you must
have installed the Realtime Interface Co–Processor licensed program, or a device driver
from a business partner or a customer–written device driver.
2. If you are using a device driver other than the 4–Port Multiprotocol communications
controller device driver, consult the documentation for that device driver.
AIX System
System/370 or System/390
Compatible host
Fanout Box
Fan–out box
apm0 apm0
VM/CMS
TSO
Modem CICS Modem
(switched/leased) (switched/leased)
Direct connectivity to an AIX system using the Multiport Model 2 adapter is also possible
over a wide area network using switched modems, through a modem eliminator, or over
leased lines (see the figures).
apm0 Wide
Area apm0
Network
Modem Modem
apm0 apm0
Modem Eliminator
Fan–out box
Fan–out box
Modem Modem
–OR–
Task SMIT Fast Path Command or File
Add a Multiport Model 2 Adapter1 smit makmm2 mkdev2
List All Multiport Model 2 Adapters smit lsmm2 lsdev2
Change/Show a Multiport Model 2 smit chgmm2 chdev2
Adapter
Configure a Defined Multiport Model 2 smit cfgmm2 mkdev2
Adapter
Manage Device Drivers for Multiport smit mm2isa_dd
Model 2 Adapters
Generate an Error Report smit errpt
Trace a Multiport Model 2 Adapter smit mm2trace
Remove a Multiport Model 2 Adapter smit rmvmm2 rmdev2
Manage DLC Services smit mpaserv
Add User–Written Applications smit mm2apps
Note:
1. For information on adding ports, see ”Configuring Multiport/2 and Portmaster Adapters”,
on page 6-2.
2. Details about command line options are provided in the command descriptions for
mkdev, lsdev, chdev, or rmdev in AIX Commands Reference.
Connection Location: 0
Unique Type: /adapter/isa/portmaster
Connection Key: portmaster
–OR–
Task SMIT Fast Path
Add a Device Driver to the Adapter smit mkhdlcdpmpdd
Reconfigure the Device Driver on the Adapter smit chhdlcdpmpdd
Remove a Device Driver on the Adapter smit rmhdlcdpmpdd
Make a Defined Device Driver Available smit cfghdlcdpmpdd
Add an SDLC COMIO Emulator on the Adapter smit mksdlcsciedd
Reconfigure the SDLC COMIO Emulator on the Adapter smit chsdlcsciedd
Remove an SDLC COMIO Emulator on the Adapter smit rmsdlcsciedd
Make a Defined SDLC COMIO Emulator Available smit cfgsdlcsciedd
–OR–
Task SMIT Fast Path
Add a Device Driver smit mktsdd
Reconfigure the MPQP COMIO Emulation Driver smit chtsdd
Remove a Device Driver smit rmtsdd
Configure a Defined Device Driver smit cfgtsdd
Add a Port smit mktsdports
Reconfigure an MPQP COMIO Emulation Port smit chtsdports
Remove a Port smit rmtsdports
Configure a Defined Port smit cfgtsdports
Trace the MPQP COMIO Emulation Driver smit trace_link
Generic data link control (GDLC) is a generic interface definition that allows application and
kernel users a common set of commands to control data link control (DLC) device
managers within the operating system. Topics discussed in this chapter are:
• Generic Data Link Control Environment Overview, on page 7-2
• Implementing the GDLC Interface, on page 7-5
• Installing GDLC Data Link Controls, on page 7-6
• GDLC Interface ioctl Entry Point Operations, on page 7-7
• GDLC Special Kernel Services, on page 7-10
• GDLC Problem Determination, on page 7-11
• Managing DLC Device Drivers, on page 7-14
Kernel
Kernel User
Hardware
Adapter
Kernel
Kernel User
Hardware
Adapter
Null SAP (0x00) Provides some ability to respond to remote nodes even when no
SAP has been enabled. This SAP supports only connectionless
service and responds only to exchange identification (XID) and
TEST Link Protocol Data Units (LPDUs).
SNA Path Control Denotes the default individual SAP address used by Systems
(0x04) Network Architecture (SNA) nodes.
PC Network Used for all DLC communication that is driven by Network Basic
NETBIOS (0xF0) Input/Output System (NetBIOS) emulation.
Discovery SAP Used by the local area network (LAN) name–discovery services.
(0xFC)
Global SAP (0xFF) Identifies all active SAPs.
Link Station
A link station (LS) identifies an attachment between two nodes for a particular SAP pair.
This attachment can operate as a connectionless service (datagram) or
connection–oriented service (fully sequenced data transfer with error recovery). In general,
there is one LS started for each remote attachment.
Local–Busy Mode
When an LS is operating in a connection–oriented mode, it needs to stop the remote
station’s sending of information packets for reasons such as resource outage. Notification
can then be sent to the remote station to cause the local station to enter local–busy mode.
Once resources are available, the local station notifies the remote that it is no longer busy
and that information packets can flow again. Only sequenced information packets are halted
with local–busy mode. All other types of data are unaffected.
Short–Hold Mode
Use the short–hold mode of operation when operating over data networks with the following
characteristics:
• Short call–setup time
• Tariff structure that specifies a relatively small fee for the call setup compared to the
charge for connect time.
During short–hold mode, an attachment between two stations is maintained only while there
is data available for transfer between the two stations. When there is no data to send, the
attachment is cleared after a specified time–out period and only reestablished when there is
new data to transfer.
Statistics
Both SAP and LS statistics can be queried by a GDLC user. The statistics for a SAP consist
of the current SAP state and information about the device handler. LS statistics consist of
the current station states and various reliability, availability, and serviceability counters that
monitor the activity of the station from the time it is started.
Datagram Data Received Called any time a datagram packet is received for the
Routine kernel user.
Exception Condition Routine Called any time an asynchronous event occurs that
must notify the kernel user, such as SAP Closed or
Station Contacted.
I–Frame Data Received Called each time a normal sequenced data packet is
Routine received for the kernel user.
Network Data Received Called any time network–specific data is received for
Routine the kernel user.
XID Data Received Routine Called any time an exchange identification (XID) packet
is received for the kernel user.
The dlcread and dlcselect entry points for DLC are not called by the kernel user because
the asynchronous functional entries are called directly by the DLC device manager.
Generally, any queuing of these events must occur in the user’s function handler. If,
however, the kernel user cannot handle a particular receive packet, the DLC device
manager may hold the last receive buffer and enter one of two special user–busy modes:
User–Terminated Busy Mode (I–frame only)
If the kernel user cannot handle a received I–frame (due to problems such as queue
blockage), a DLC_FUNC_BUSY return code is given back, and DLC holds the buffer
pointer and enters local–busy mode to stop the remote station’s I–frame transmissions.
The kernel user must call the Exit Local Busy function to reset local–busy mode and start
the reception of I–frames again. Only normal sequenced I–frames can be stopped. XID,
datagram, and network data are not affected by local–busy mode.
Timer–Terminated Busy Mode (all frame types)
If the kernel user cannot handle a particular receive packet and wants DLC to hold the
receive buffer for a short period and then re–call the user’s receive function, a
DLC_FUNC_RETRY return code is given back to DLC. If the receive packet is a
sequenced I–frame, the station enters local–busy mode for that period. In all cases, a
timer is started; once the timer expires, the receive data functional entry is called again.
Test Commands Sent Contains a binary count of the test commands sent to the
remote station by GDLC, in response to test commands
issued by the user.
Test Command Failures Contains a binary count of the test commands that did not
complete properly due to problems such as the following:
• Invalid response
• Bad data compare
• Inactivity
Test Commands Received Contains a binary count of valid test commands received,
regardless of whether the response is completed properly.
Sequenced Data Packets Contains a binary count of the total number of normal
Transmitted sequenced data packets transmitted to the remote LS.
Sequenced Data Packets Contains a binary count of the total number of normal
Transmitted sequenced data packets retransmitted to the remote LS.
Maximum Contiguous Contains a binary count of the maximum number of times a
Retransmissions single data packet has been retransmitted to the remote LS
before acknowledgment. This counter is reset each time a
valid acknowledgment is received.
Sequenced Data Packets Contains a binary count of the total number of normal
Received sequenced data packets correctly received.
Trace Channels
The operating system supports up to seven generic trace channels in operation at the same
time. A user must allocate a channel before starting an LS trace, with the DLC_START_LS
ioctl operation or the DLC_TRACE ioctl operation. This is accomplished with the trcstart
and trcon subroutines.
Trace activity in the LS must be stopped either by halting the LS or by issuing an ioctl
(DLC_TRACE, flags=0) operation to that station. Once the LS has stopped tracing, the
channel is disabled with the trcoff subroutine and returned to the system with the trcstop
subroutine.
Trace Entries
For each trace entry, GDLC generates the trcgenkt kernel service to the kernel generic
trace.
–OR–
Task SMIT Fast Path Command or File
Add an Installed DLC Choose one (by device mkdev2
driver name):
smit cmddlc_sdlc
smit cmddlc_token
smit cmddlc_qllc
smit cmddlc_ether1
smit cmddlc_fddi
then select Add
Change DLC Attributes3,4 Choose one (by device chdev2
driver name):
smit cmddlc_sdlc_ls
smit cmddlc_token_ls
smit cmddlc_qllc_ls
smit cmddlc_ether_ls1
smit cmddlc_fddi_ls
Start DLC Local Area smit trace trace –j nnn where the
Network Monitor Trace5 value nnn is the hook ID to
be traced
Stop DLC Local Area smit trcstop trcstop2
Network Monitor Trace
Generate DLC Local Area smit trcrpt trcrpt –d nnn where the
Network Monitor Trace value nnn is the hook ID to
Report be reported
List Current DLC Choose one (by device lsdev2 or lsattr2
Information3 driver name):
smit cmddlc_sdlc_ls
smit cmddlc_token_ls
smit cmddlc_qllc_ls
smit cmddlc_ether_ls1
smit cmddlc_fddi_ls
Remove a DLC3,6 Choose one (by device rmdev2
driver name):
smit cmddlc_sdlc_rm
smit cmddlc_token_rm
smit cmddlc_qllc_rm
smit cmddlc_ether_rm1
smit cmddlc_fddi_rm
This chapter presents information on installing, configuring, and maintaining Basic Network
Utilities (BNU). The following topics are discussed:
• BNU Overview, on page 8-2
• Configuring BNU, on page 8-10
• Maintaining BNU, on page 8-18
• BNU Configuration Files, on page 8-29
• BNU Files, Commands, and Directories Reference, on page 8-36
BNU Security
Because other systems contact your system to log in, transfer files, and enter commands,
BNU provides a means to establish security. BNU security enables you to restrict what
users of remote systems can do on the local system (users of remote systems can also
restrict what you can do on their systems). BNU runs several daemons to complete its
activities and uses administrative directories to store the files it needs. BNU also keeps a log
of its own activities.
BNU security works on several levels. When you configure BNU, you can determine:
• Who on your system has access to BNU files.
• Which remote systems your system can contact.
• How users on remote systems log in to your system.
• What users on remote systems can do on your system once they log in.
LOGNAME Defines login names and the privileges associated with them.
LOGNAME entries take effect when a remote system calls the
local system and attempts to log in.
MACHINE Defines machine names and the privileges associated with them.
MACHINE entries take effect when the remote system attempts to
carry out commands on the local system.
Options in the Permissions file enable you to establish various levels of security for each
remote system. For example, if many remote systems share one login ID on the local
system, use the VALIDATE option to require each remote system to use a unique login ID.
The SENDFILES, REQUEST, and CALLBACK options specify which system has control,
keeping the local system in control of transactions if necessary.
The READ, WRITE, NOREAD, and NOWRITE options define access to specific directories
on the local system. These options also control where on your system remote users can
place data. The COMMANDS option limits the number of commands users on remote
systems can execute on the local system. The COMMANDS=ALL option allows total
privileges to systems closely associated with your system.
Attention: The COMMANDS=ALL option can seriously jeopardize the security of your
system.
Prerequisites
• BNU must be installed on your system.
• You must have root user authority to edit the BNU configuration files.
• If you are using direct connections for BNU communications, the appropriate hardwired
connections between your system and the remote systems must be set up.
• If you are using modems for BNU communications, you must have installed and
configured each modem.
• If one or more of your connections uses TCP/IP, then TCP/IP must be running between
your system and the apropriate remote systems.
• Collect the information you need to configure BNU. This information should include a list
of remote systems and lists of devices and modems to use to connect to the systems.
Procedure
For BNU to function correctly at your site, you must configure the remote communications
facilities to:
• List the devices used to establish a hardwired, telephone, or modem communications
link.
• List the modems used to contact remote systems over the telephone network.
• List the accessible remote systems.
• List the alphabetic abbreviations representing the prefixes of telephone numbers used to
contact the specified remote systems (optional).
• Set access permissions specifying the ways in which local and remote systems may
communicate.
• Schedule monitoring for the networked remote systems (optional).
To create these lists, permissions, schedules, and procedures:
• Modify the BNU configuration files
• Edit the /var/spool/cron/crontabs/uucp file to remove the comment characters (#) from
the beginnings of the lines that schedule the automatic maintenance routines.
You must configure the Systems, Devices, and Permissions files before BNU will run
correctly at your site. However, it is not necessary to modify the BNU configuration files in
any particular order.
To configure BNU on your system:
1. Make sure that BNU is installed on your system by running the command:
lslpp –h bos.net.uucp
If BNU is installed, you will see bos.net.uucp in the output. If you do not see it, install
bosext1 from the install tape.
2. Set up appropriate login IDs and passwords for remote systems that will call your
system, and tell the person responsible for administering BNU or UNIX–to–UNIX Copy
Program (UUCP) on each remote system the login and password you have provided.
This is done by editing the /etc/passwd, /etc/group, /etc/security/login.cfg, and
/etc/security/passwd files.
Attention: Allowing remote systems to log into the local system with the uucp login ID
seriously jeopardizes the security of your system. Remote systems logged in with the
uucp ID can display and possibly modify (depending on the permissions specified in the
LOGNAME entry of the Permissions file) the local Systems and Permissions files. It is
strongly recommended that you create other BNU login IDs for remote systems and
reserve the uucp login ID for the person administering BNU on the local system. For the
best security, each remote system that contacts the local system should a have unique
login ID with a unique UID number. These login IDs should have GIDs of 5.
Procedure
BNU uses the cron daemon to start BNU daemons and to monitor BNU activity. The cron
daemon reads the /var/spool/cron/crontabs/uucp file for instructions about when to start
BNU procedures.
1. Log in as a user with root user authority.
2. Using an ASCII text editor, edit the /var/spool/cron/crontabs/uucp file.
3. Uncomment the lines for the BNU maintenance procedures, uudemon.admin and
uudemon.cleanup. You can change the times these procedures are run if your system
needs maintenance at more or less frequent intervals. It is best, however, to run the
uudemon.admin command at least once a day and the uudemon.cleanup command at
least once a week.
4. You can use the crontabs/uucp file to schedule other BNU maintenance commands,
such as the uulog, uuclean, or uucleanup commands. In addition, you can use the
crontabs/uucp file to instruct the cron daemon to start the uucico, uuxqt, or uusched
daemons at specific times.
Procedure
To enable BNU to poll remote systems for jobs, list the systems in the /etc/uucp/Poll file. In
addition, run the uudemon.hour and uudemon.poll commands periodically.
1. Decide which remote systems to automatically poll. Decide how often you want to poll
each one. Specify times for each system with the Poll file as seldom as once a day or as
often as you wish.
2. Log in as a user with root authority.
3. Using an ASCII text editor or the uucpadm command, edit the Poll file. Add an entry for
each system your system will poll.
Note: The systems listed in the Poll file must also be listed in the /etc/uucp/Systems
file.
4. Using an ASCII text editor, edit the /var/spool/cron/crontabs/uucp file. Remove the
comment characters (#) from the lines that run the uudemon.hour and uudemon.poll
commands. You can change the times these commands are run. However, be sure to
schedule the uudemon.poll command approximately five minutes before you schedule
the uudemon.hour command.
BNU will now automatically poll the systems listed in the Poll file at the times you have
specified.
Procedure
In telephone–connection entries, the Type field is specified as an automatic calling unit
(ACU). Type ACU as the Type field entry in all remote connections established over a phone
line. To set up Device file entries for autodialer connections, make a one–line entry for each
modem:
1. Enter ACU in the first (Type) field.
2. The second (Line) field contains the name of the device that is attached to the modem.
Enter the device name appropriate for your site.
3. Enter a – (hyphen) as a placeholder in the third (Line2) field, unless the autodialer is a
standard 801 dialer. If the autodialer is a standard 801 dialer, enter 801.
Procedure
If your site is using the TCP/IP system, include the relevant TCP/IP entry in the Devices file.
To set up the file for use with the TCP/IP system, enter the following line in the Devices file:
TCP – – – TCP
Cleanup Commands
BNU contains three commands that clean directories and remove files that have not been
sent:
uuclean Deletes all files older than a specified number of hours, from the
BNU administrative directories. Use the uuclean command to
specify a directory to be cleaned or a type of file to be deleted.
You can also instruct the command to notify the owners of the
deleted files. The uuclean command is the Berkeley equivalent of
the uucleanup command.
uucleanup Performs functions similar to the uuclean command. However,
the uucleanup command checks the age of files based on days
rather than hours. Use the uucleanup command to send a
warning message to users whose files have not been transferred,
notifying them that the files are still in the queue. The uucleanup
command also removes files relating to a specified remote
system.
uudemon.cleanu A shell procedure that issues the uulog and uucleanup
commands to compress the BNU log files and remove log and
work files over three days old. The uudemon.cleanu command is
run by the cron daemon.
uuq Displays jobs currently in the BNU job queue. Use the uuq
command to display the status of a specified job or of all jobs.
With root authority, you can use the uuq command to delete a job
from the queue.
uustat Provides information similar to that provided by the uuq
command, in a different format. Use the uustat to check the
status of jobs and delete jobs you own. With root authority, you
can also delete jobs belonging to other users.
uulog Displays a summary of uucp or uux requests, by user or by
system. The uulog command displays the file names. See
”Working with BNU Log Files”, on page 8-18.
uupoll Forces a poll of a remote system. This is helpful when work for
that system is waiting in the queue and needs to be transferred,
before the system is scheduled to be called automatically.
uusnap Displays a very brief summary of BNU status. For each remote
system, this command shows the number of files awaiting
transfer. However, it does not show how long they have been
waiting. The uusnap command is the Berkeley equivalent of the
uustat command.
Shell Procedures
BNU is delivered with two shell procedures used for maintenance:
uucico
Phase 6: Disconnect
Procedure
1. To produce debugging information about a local–to–remote system connection that is not
working, start the uucico daemon with the –x flag as follows:
/usr/sbin/uucp/uucico –r 1 –s venus –x 9
where –r 1 specifies the master, or caller mode; –s venus, the name of the remote
system to which you are trying to connect; and –x 9, the debug level that produces the
most detailed debugging information.
2. If the expect–send sequence entry in a Systems file in the format of /etc/uucp/Systems
is:
venus Any venus 1200 – ”” \n in:––in: uucp1 word:
mirror
the uucico daemon connects the local system to the remote system venus.The
debugging output is similar to:
expect: ””
got it
sendthem (^J^M)
expect (in:)^
M^Jlogin:got it
sendthem (uucp1^M)
expect (word:)^
M^JPassword:got it
sendthem (mirror^M)
imsg >^M^J^PShere^@Login Successful: System=venus
where:
expect: ”” Specifies that the local system will not wait for any
information from the remote system.
got it Acknowledges that the message has been received.
sendthem (^J^M) Specifies that the local system will send the remote
system a carriage return and a new line.
expect (in:) Specifies that the local system will expect to receive the
remote system login prompt, which ends in the in:
character string.
^M^Jlogin:got it Confirms that the local system will receive the remote
login prompt.
sendthem (uucp1^M) Specifies that the local system will send the uucp1 login
ID to the remote system.
PHONES Specifies the name of the user’s phone file. The file can have any
valid file name and must be set up in the format of the file
/usr/lib/phones–file. The default file is etc/phones. If a file is
specified with the PHONES variable, it is used in place of (not in
addition to) the /etc/phones file.
REMOTE Specifies the name of the user’s remote system definition file. The
file can have any valid file name and must be set up in the format
of the /usr/lib/remote–file file. The default file is /etc/remote. If a
file is specified with the REMOTE variable, it is used in place of
(not in addition to) the /etc/remote file.
/etc/remote Defines attributes of remote systems such as the port and type of
device to use to reach the system, as well as the signals to use to
indicate the beginnings and endings of transmissions.
/etc/phones Lists telephone numbers used to contact remote systems over a
modem line.
To establish one of these files, copy a sample file to the correct name and modify it to suit
the needs of your site. Sample remote and phones files are delivered with the bos.net.uucp
package. The sample remote file is named /usr/lib/remote–file. The sample phones file is
named /usr/lib/phones–file.
Note: You must have root authority to create files in the /usr/lib directory.
A tip user can also create customized remote and phones files. An individual remote file
must be in the format of the /usr/lib/remote–file file and specified with the remote variable
or the REMOTE environment variable. An individual phones file must be in the format of the
/usr/lib/phones–file file and specified with the phones variable or the PHONES
environment variable. If an individual phones or remote file is specified with one of the
variables, that file is read in place of (not in addition to) the /etc/phones or /etc/remote file.
Users of tip can use combinations of individual phones and remote files. For example, a
user could read the default remote file, /usr/lib/remote–file, but use an individual phones
file named with the phones variable.
Systems File
The Systems file on system zeus should contain the following entry to allow zeus to
contact system hera:
hera Any TCP,t – – in:––in: uzeus word: birthday
Devices File
A Devices file used by uucico on system zeus should contain the following entry for
TCP/IP connections:
TCP – – – TCP
Because the device type is TCP, there are no Class, Line, or Line2 entries. The Dialer is also
specified as TCP. Accordingly, BNU looks in the Dialers files for a TCP entry.
Dialers File
The Dialers file used by uucico on system zeus should contain a TCP/IP entry as follows:
TCP
This entry specifies that no dialer configuration is required.
Note: Dialer configuration is never required over a TCP/IP connection.
Permissions File
The Permissions file on system zeus contains the following entry specifying system
hera’s access to system zeus:
LOGNAME=uhera SENDFILES=yes REQUEST=yes \
MACHINE=zeus:hera VALIDATE=uhera /
READ=/var/spool/uucppublic:/home/hera \
WRITE=/var/spool/uucppublic:/home/hera COMMANDS=ALL
This combined LOGNAME and MACHINE entry provides the following permissions to
system hera on system zeus:
• System hera can request and send files regardless of who initiated the call.
• System hera can read and write to the public directory and the /home/hera directory on
system zeus.
• System hera can execute all commands on system zeus.
• System hera must log in to system zeus as user uhera and cannot use any other login
ID for BNU transactions.
Note: Because the permissions are the same regardless of which system initiates the call,
the preceding LOGNAME and MACHINE entries are combined. Separately, they are:
LOGNAME=uhera VALIDATE=hera SENDFILES=yes REQUEST=yes& \
READ=/var/spool/uucppublic:/home/hera \
WRITE=/var/spool/uucppublic:/home/hera
Systems File
A Systems file on system hera should contain the following entry to allow hera to contact
system zeus:
zeus Any TCP,t – – ogin:––ogin: uhera ord: lightning
This specifies that system hera can call system zeus at any time, using the t protocol for
communications with system zeus. System hera logs in to system zeus as user uhera
with the password lightning. Again, BNU next checks the Devices files for an entry of
type TCP.
Note: The t protocol supports the tcp protocol. Therefore, always use the t protocol for
BNU communications over TCP/IP connections. However, the t protocol cannot be
used when the Type field is ACU or when a modem connection is being used.
Devices File
The Devices file used by uucico on system hera should contain the following entry for
TCP/IP connections:
TCP – – – TCP
Because the device type is TCP, there are no Class, Line, or Line2 entries. The Dialer is also
specified as TCP. Accordingly, BNU looks in the Dialers files for a TCP entry.
Dialers File
The Dialers file used by uucico on system hera should contain a TCP/IP entry as follows:
TCP
This entry specifies that no dialer configuration is required.
Note: Dialer configuration is never required over a TCP/IP connection.
Permissions File
The Permissions file on system hera contains the following entry specifying system
zeus’s access to system hera:
LOGNAME=uzeus SENDFILES=yes REQUEST=yes \
MACHINE=hera:zeus VALIDATE=zeus COMMANDS=rmail:who:uucp
This combined LOGNAME and MACHINE entry provides the following permissions to
system zeus on system hera:
• System zeus can request and send files regardless of who initiated the call.
• System zeus can read and write only to the public directory (the default).
• System zeus can run only the rmail, who, and uucp commands.
• System zeus must log in to system hera as user uzeus and cannot use any other login
ID for BNU transactions.
Note: Separately, the LOGNAME and MACHINE entries are:
LOGNAME=uzeus VALIDATE=zeus SENDFILES=yes REQUEST=yes
MACHINE=hera:zeus COMMANDS=rmail:who:uucp REQUEST=yes
Systems File
The Systems file on venus should contain the following entry for merlin, including a
phone number and a dialing prefix:
merlin Any ACU 1200 local8784 ”” in:––in: uvenus word: mirror
System venus can call system merlin at any time, using an ACU device at 1200 baud and
logging in as uvenus with the password mirror. The telephone number is expanded
based on the code local in the Dialcodes file, and the device to be used is determined
based on the Type and Class entries. Accordingly, BNU checks the Devices files for a
device of type ACU and class 1200.
Dialcodes File
The Dialcodes file on system venus contains the following dial–code prefix for use with the
number in the Systems file:
local 9=445
Given this code, the telephone number for system merlin in the Systems file is expanded
to 9=4458784.
Devices File
The Devices file on system venus should contain the following entry for the connection to
system merlin:
ACU tty1 – 1200 hayes \T
The port to be used is tty1, and the Dialer entry in the Dialer–Token Pairs field is hayes.
The Token entry, \T, indicates that the telephone number is to be expanded using a code
from the Dialcodes file. BNU checks the Dialers files for a hayes dialer type.
Dialers File
A Dialers file used by uucico on system venus should contain the following entry for the
hayes modem:
hayes =,–, ”” \dAT\r\c OK \pATDT\T\r\c CONNECT
Note: The expect–send characters are defined in the Dialers file format.
Permissions File
The Permissions file on system venus contains the following entries specifying the ways in
which system merlin can conduct uucico and uuxqt transactions with system venus:
LOGNAME=umerlin REQUEST=yes SENDFILES=yes \
READ=/var/spool/uucppublic:/home/merlin \
WRITE=/var/spool/uucppublic:/home/merlin
MACHINE=venus:merlin VALIDATE=umerlin REQUEST=yes SENDFILES=yes
\
COMMANDS=ALL \
READ=/var/spool/uucppublic:/home/merlin \
WRITE=/var/spool/uucppublic:/home/merlin
Systems File
A Systems file on merlin should contain the following entry for venus, including a phone
number and a dialing prefix:
venus Any ACU 1200 intown4362 ”” in:––in: umerlin word: oaktree
System merlin can call system venus at any time, using an ACU device at 1200 baud and
logging in as user umerlin with the password oaktree. The telephone number is
expanded based on the code intown in the Dialcodes file, and the device to be used is
determined based on the Type and Class entries. Accordingly, BNU checks the Devices
file(s) for a device of type ACU and class 1200.
Dialcodes File
The Dialcodes file on system merlin contains the following dial–code prefix for use with
the number in the Systems file:
intown 9=325
Therefore, the expanded telephone number to reach system venus is 9=3254362.
Devices File
A Devices file on system merlin should contain the following entry for the connection to
venus:
ACU tty1 – 1200 hayes \T
The ACU is attached to port tty1, and the dialer is hayes. The telephone number is
expanded with information from the Dialcodes file. BNU checks the Dialers files for an
entry for a hayes modem.
Dialers File
A Dialers file used by uucico on system merlin should contain the following entry for its
modem:
hayes =,–, ”” \dAT\r\c OK \pATDT\T\r\c CONNECT
Permissions File
The Permissions file on system merlin contains the following entries specifying system
venus’s access to merlin:
LOGNAME=uvenus SENDFILES=call REQUEST=no \
WRITE=/var/spool/uucppublic:/home/venus \
READ=/var/spool/uucppublic:/home/venus
MACHINE=merlin:venus VALIDATE=uvenus \
READ=/ WRITE=/ COMMANDS=ALL REQUEST=yes \
NOREAD=/etc/uucp:/usr/etc/secure \
NOWRITE=/etc/uucp:/usr/etc/secure
Permissions File
The Permissions file on the local system zeus contains the following entry specifying the
ways in which the remote system hera can conduct uucico and uuxqt transactions with
zeus:
LOGNAME=uhera MACHINE=hera VALIDATE=uhera REQUEST=yes \
SENDFILES=yes MACHINE=hera READ=/ WRITE=/ COMMANDS=ALL
This entry specifies that system hera logs in as uhera. Since the VALIDATE=uhera
option is included, system hera cannot log in to system zeus with any other login ID, nor
can any other remote system use the uhera ID. System hera can read and write to any
directory on system zeus, and can send and request files regardless of who initiated the
call. System hera can also initiate any commands on system zeus.
Note: Since the permissions that are granted are the same regardless of which system
initiated the connection, the LOGNAME and MACHINE entries have been combined.
Separately, they are:
LOGNAME=uhera REQUEST=yes SENDFILES=yes READ=/ WRITE=/
MACHINE=zeus:hera VALIDATE=uhera READ=/ WRITE=/ REQUEST=yes \
COMMANDS=ALL
Attention: Providing the permissions in the preceding example is equivalent to giving any
user on the remote system a login ID on the local system. Such liberal permissions can
jeopardize your security and should usually be given only to well–trusted remote systems at
the same site.
Systems File
A Systems file on system hera must contain the following entry for zeus:
zeus Any zeus 1200 – ”” \r\d\r\d\r in:––in: uhera word: portent
This entry specifies that system hera can log in to system zeus at any time, using a direct
connection specified in the Devices files. To find the entry in the Devices files, BNU uses
the third and fourth fields of the Systems entry. Thus BNU looks for an entry in the Devices
files with a Type of zeus and a Class of 1200. System hera logs in to system zeus as user
uhera with the password portent.
Devices File
A Devices file on system hera must contain the following entry for communications with
zeus:
zeus tty1 – 1200 direct
This entry specifies that system hera uses the device tty1 at 1200 bps to communicate
with system zeus. Since the Dialer is specified as direct, BNU checks the Dialers files for
a direct entry.
Dialers File
A Dialers file on system hera must contain the following entry for direct connections:
direct
This specifies that no dialer configuration is required on the direct connection.
Permissions File
The Permissions file on system hera contains the following entries specifying the ways
zeus can conduct uucico and uuxqt transactions with hera:
LOGNAME=uzeus REQUEST=yes SENDFILES=yes READ=/ WRITE=/
MACHINE=hera:zeus VALIDATE=uzeus REQUEST=yes COMMANDS=ALL READ=/\
WRITE=/
These entries specify that system zeus logs in to system hera as uzeus. Because the
VALIDATE=uzeus option is included, system zeus cannot log in to system hera with any
other login ID, nor can any other remote system use the uzeus ID. System zeus can read
and write to any directory on system hera, and can send and request files regardless of
who initiated the call. System zeus can also initiate any commands on system hera.
Attention: Providing the permissions in the preceding example is equivalent to giving any
user on the remote system a login ID on the local system. Such liberal permissions can
jeopardize your security and normally should be given only to remote systems at the same
site.
BNU Files
/etc/uucp/Systems A list of systems to which uucico can connect.
/etc/uucp/Devices Defines basic communication parameters for
dial–out connections.
/etc/uucp/Permissions Defines permissions for remote machines
contacting the local machine through BNU.
Maxuuscheds Limits simultaneous scheduled jobs.
Maxuuxqts Limits simultaneous remote command executions.
/etc/uucp/Dialers Specifies dialer and modem type.
/etc/uucp/Dialcodes Contains the initial digits of telephone numbers
used to establish remote connections over a phone
line.
/usr/sbin/uucp/remote.unknown A shell script executed when an unknown remote
computer attempts to communicate.
/usr/sbin/uucp/Sysfiles Assigns alternate or additional Systems, Devices,
and Dialers files.
/etc/uucp/Poll Determines when a remote system is called.
uudemon.admin Sends a BNU status report to a specified login ID.
uudemon.cleanu Cleans BNU spooling directories at prescheduled
times.
uudemon.hour Initiates file transport calls to remote systems.
uudemon.poll Polls remote systems listed in the /etc/uucp/Poll
file.
/var/spool/uucp/audit Contains audit information from BNU activities.
/var/spool/uucp/Foreign Contains error information about BNU activities.
/var/spool/uucp/errors Contains error information about BNU activities.
/var/spool/uucp/xferstats Contains statistical information about BNU
activities.
/var/spool/uucp/Corrupt Contains copies of files that cannot be processed
by the BNU program.
/var/spool/uucp/.Log Contains log files from current BNU transactions.
BNU Commands
ct Connects to another system over a telephone line.
cu Connects to another system.
tip A variation of cu that requires special configuration.
uucp Copies files from one system to another running BNU or a version of the
UNIX–to–UNIX Copy Program (UUCP).
uudecode Reconstructs a binary file encoded with uuencode.
uuencode Encodes a binary file into ASCII form for transmission using BNU.
uuname Provides information about accessible systems.
uupoll Forces a call to a remote system.
uuq Displays the BNU job queue.
uusend Sends a file to a remote host running BNU or UUCP.
uusnap Displays a brief summary of BNU’s status.
uustat Reports the status of BNU operations.
uuto Copies files to another system using BNU or UUCP.
uux Runs a command on a remote system.
uucheck Checks the /etc/uucp/Permissions file for correct configuration.
uuname Shows the names of all systems that can be reached through BNU.
uuclean Cleans BNU spooling directories.
uucleanup Cleans BNU spooling directories.
uukick Contacts a remote system with debugging enabled.
uulog Displays BNU log files.
uutry Contacts a remote system with debugging enabled; allows override of retry
time.
uucpadm Administers the BNU system.
uupick Enables users to claim files in the /var/spool/uucppublic directory.
uucp Login ID with full administrative authority over the BNU subsystem.
Uutry Contacts a remote system with debugging turned on, and saves the
debugging output in a file.
Request Processing
There are three types of request PDUs that may be received by the SNMP daemon. The
request types are defined in RFC 1157, and the PDUs all have the following format:
Trap Processing
Trap PDUs are defined by RFC 1157 to have the following format:
ipForwarding Indicates whether this agent’s host is forwarding datagrams. See ”SNMP
Daemon Implementation Restrictions”, on page 9-27 for more information
on this MIB variable.
ipDefaultTTL The default time–to–live (TTL) value inserted into IP headers of datagrams
originated by the agent’s host.
ipRouteNextHop
The gateway by which a destination IP address can be reached from the
agent’s host (an entry in the route table).
ipRouteType The state of a route table entry on the agent’s host (used to delete entries).
ipNetToMediaPhysAddress
The hardware address portion of an address table binding on the agent’s
host (an entry in the ARP table). This is the same MIB variable as
atPhysAddress.
ipNetToMediaNetAddress
The IP address corresponding to the hardware or physical address
specified in ipNetToMediaPhysAddress. This is the same MIB variable as
atNetAddress.
snmpEnableAuthenTraps
Indicates whether the snmpd agent is configured to generate
authenticationFailure traps.
smuxTstatus The status of a SMUX MIB tree (used to delete MIB tree mounts).
The variables listed below are the settable variables as defined in RFC 1229. The snmpd
daemon allows the user to set these variables. The underlying device might not allow the
setting of such variables. You should check with each device to see what is and is not
supported.
ifExtnsPromiscuous
The status of the promiscuous mode on a given device. This is used to
enable and disable promiscuous mode on a given device. The snmpd
action is final and complete. When snmpd is told to turn off, promiscuous
mode is turned completely off regardless of the other applications on the
machine.
ifExtnsTestType
The test initiation variable. When this variable is set the appropriate test is
run for that device. An Object Identifier is the value of the variable. The
specific value is dependent on the device type and the test wished to be
run. Currently, the only define test that snmpd knows to run is
testFullDuplexLoopBack test.
ifExtnsRcvAddrStatus
The address status variable. When this variable is set, the specified
address comes into existence with the appropriate level of duration. snmpd
The variables listed below are the settable variables as defined in RFC 1231. The snmpd
daemon allows the user to set these variables. The underlying device might not allow the
setting of such variables. You should check with each device to see what is and is not
supported.
dot5Commands
The command the token–ring device should perform.
dot5RindSpeed
The current ring speed or bandwidth.
dot5ActMonParticipate
The object specifies whether the device should participate in the active
monitor selection process.
The following variables are defined in the RFC as read–only but you are encouraged to
make them read–write. They are complex timer manipulations. You should look them up in
the RFC to gain a full understanding of their interactions. snmpd allows the requestor to set
them, but the device may not. Check the device driver documentation for more information.
The variables are:
• dot5TimerReturnRepeat
• dot5TimerHolding
• dot5TimerQueuePDU
• dot5TimerValidTransmit
• dot5TimerNoToken
• dot5TimerActiveMon
• dot5TimerStandbyMon
• dot5TimerErrorReport
• dot5TimerBeaconTransmit
• dot5TimerBeaconReceive
The variables listed below are the settable variables as defined in RFC 1512. The SNMP
daemon allows the user to set these variables. It uses the FDDI Station Management (SMT)
7.2 protocol standard to get the information. This is determined at the microcode level.
Check the microcode on the FDDI documentation to ensure that the SMT 7.2 microcode is
being used.
fddimibSMTUserData
A variable holding 32 bytes of user information.
fddimibSMTConfigPolicy
The status of the configuration policies, specifically the hold policy usage.
fddimibSMTTNotify
The timer, expressed in seconds, used in the Neighbor Notification protocol.
It has a range of 2 seconds to 30 seconds, and its default value is 30
seconds.
fddimibSMTStatRptPolicy
The status of the status reporting frame generation.
fddimibSMTTraceMaxExpiration
This variable defines the maximum timer expiration value for trace.
fddimibSMTStationAction
This variable causes the SMT entity to take a specific action. Refer to the
RFC to get specific information about this variable.
fddimibMACFrameErrorThreshold
Threshold for when a MAC status report should be generated. Defines the
number of error that must occur before a report is generated.
fddimibMACMAUnitdataEnable
This variable determines the value of the MA_UNITDATA_Enable flag in
RMT. The default and initial value of this flag is true (1).
fddimibMACNotCopiedThreshold
A threshold for determining when a MAC condition report will be generated.
The following three variables are timer variables that are interactive among themselves.
Before changing any of these variables, you should have a good understanding of their
meaning as defined in RFC 1512.
• fddimibPATHTVXLowerBound
• fddimibPATHTMaxLowerBound
• fddimibPATHMaxTReq
fddimibPORTRequestedPaths
This variable is a list of permitted paths where each list element defines the
port’s permitted paths. The first octet corresponds to ‘none’, the second
octet to ‘tree’, and the third octet to ‘peer’.
fddimibPORTLerCutoff
The link error rate estimate at which a link connection will be broken. It
ranges from 10**–4 to 10**–15 and is reported as the absolute value of the
base 10 logarithm (default of 7).
fddimibPORTLerAlarm
The link error rate estimate at which a link connection will generate an
alarm. It ranges from 10**–4 to 10**–15 and is reported as the absolute
value of the base 10 logarithm of the estimate (default is 8).
fddimibPORTAction
This variable causes the port to take a specific action. Refer to the RFC to
get specific information about this variable.
Note: RFC 1213 describes all variables in the atEntry and ipNetToMediaEntry tables as
read–write. Set support is implemented only for the atEntry variables atPhysAddress
and atNetAddress, and the ipNetToMediaEntry variables ipNetToMediaPhysAddress,
ipNetToMediaNetAddress, and ipNetToMediaType. To accept set requests that may
specify the remaining unsupported attributes in these two tables, set requests for the
remaining variables are accepted: atIfIndex and ipNetToMediaIfIndex. No error
response is returned to the set request originator, but a subsequent get request will
show that the original values are retained.
Examples
The following examples use the snmpinfo command. It is assumed that the snmpinfo
default community name, public, has read–write access for the respective MIB subtree.
snmpinfo –m set sysContact.0=”Primary contact: Bob Smith, office
phone: 555–5555, beeper: 9–123–4567. Secondary contact: John
Harris, phone: 555–1234.”
This command sets the value of sysContact.0 to the specified string. If an entry for
sysContact.0 already exists, it is replaced.
snmpinfo –m set sysName.0=”bears.austin.ibm.com”
This command sets the value of sysName.0 to the specified string. If an entry for
sysName.0 already exists, it is replaced.
snmpinfo –m set sysLocation.0=”Austin site, building 802, lab
3C–23, southeast corner of the room.”
This command sets the value of sysLocation.0 to the specified string. If an entry for
sysLocation.0 already exists, it is replaced.
snmpinfo –m set ifAdminStatus.2=2
This command disables the network interface adapter which has the ifIndex of 2. If the
assigned value is 1, the interface adapter is enabled.
snmpinfo –m set atPhysAddress.2.1.192.100.154.2=02:60:8c:2e:c2:00
snmpinfo –m set
ipNetToMediaPhysAddress.2.1.192.100.154.2=02:60:8c:2e:c2:00
These two commands change the hardware address in the ARP table entry for
192.100.154.2 to 02:60:8c:2e:c2:00. These two commands affect the same ARP
table entry. The MIB variable atPhysAddress is a deprecated variable and is being replaced
with the MIB variable ipNetToMediaPhysAddress. Thus, atPhysAddress and
ipNetToMediaPhysAddress access the same structure in the TCP/IP kernel ARP table.
snmpinfo –m set atNetAddress.2.1.192.100.154.2=192.100.154.3
snmpinfo –m set
ipNetToMediaNetAddress.2.1.192.100.154.2=192.100.154.3
These commands change the IP address in the ARP table entry for 192.100.154.2 to
192.100.154.3. These two commands affect the same ARP table entry. The MIB variable
atNetAddress is a deprecated variable and is being replaced with the MIB variable
ipNetToMediaNetAddress. Thus, atNetAddress and ipNetToMediaNetAddress access the
same structure in the TCP/IP kernel ARP table.
snmpinfo –m set ipForwarding.0=1
This command sets the TCP/IP kernel so that it can forward packets if the agent’s host has
more than one interface that is up. If the host has only one active interface, then the set
request fails and the snmpd agent returns the error, badValue.
The /var/tmp/snmpd.syslog file must exist before the syslogd daemon rereads the
/etc/syslog.conf configuration file in order for the syslogd daemon to log the snmpd
daemon log messages to this file. To create this file, issue the following command:
touch /var/tmp/snmpd.syslog
Then issue the following command to force the syslogd daemon to reread its configuration
file:
refresh –s syslogd
Note that the syslogd daemon will log all daemon messages to this log file, not just the
snmpd log messages.
If the syslogd daemon is configured to log messages from the daemon facility at the
syslogd LOG_DEBUG severity level and higher, all messages at snmpd debug level 2 or
lower from the snmpd daemon can be logged into a syslogd configured file. If level 3 is
noSuchName Problem
If in attempting to set an MIB variable that the snmpd agent is supposed to support,
noSuchName error message is returned, the following may be the reason:
The set request you issued did not include a community name for a valid community with
write access. The SNMP protocol dictates that a set request with a community with
inappropriate access privileges be answered with the noSuchName error message.
Solution: Issue the set request with a community name for a community that has write
privileges and includes the host from which the set request is issued.
This chapter provides information on the Network File System (NFS), a mechanism for
storing files on a network. The following topics are discussed:
• Network File System Overview, on page 10-2
• NFS Installation and Configuration, on page 10-10
• PC–NFS, on page 10-19
• WebNFS, on page 10-21
• Network Lock Manager, on page 10-22
• Secure NFS, on page 10-25
• NFS Problem Determination, on page 10-34
• NFS Reference, on page 10-42
NFS Services
NFS provides its services through a client–server relationship. The computers that make
their file systems, or directories, and other resources available for remote access are called
servers. The act of making file systems available is called exporting. The computers, or the
processes they run, that use a server’s resources are considered clients. Once a client
mounts a file system that a server exports, the client can access the individual server files
(access to exported directories can be restricted to specific clients).
The major services provided by NFS are:
CacheFS Tasks
Web-based System Manager: wsm network fast path
(wsm network application)
–OR–
Task SMIT Fast Path Command or File
Set up a cache cachefs_admin_create cfsadmin –c
MountDirectoryName1
Specifying Files for cachefs_mount mount –F cachefs –o
Mounting backfstype=FileSysType,
cachedir=CacheDirectory[,o
ptions]
BackFileSystem
MountDirectoryName2
or
edit /etc/filesystems
Modify the Cache cachefs_admin_change remove the cache, then
recreate it using appropriate
mount command options
Display Cache Information cachefs_admin_change cfsadmin –l
MountDirectoryName
Remove a Cache cachefs_admin_remove 1. Unmount the file system:
umount
MountDirectoryName
2. Determine the cache ID:
cfsadmin –l
MountDirectoryName
3. Delete the file system:
cfsadmin –d CacheID
CacheDirectory
Check File System Integrity cachefs_admin_check fsck_cachefsCacheDirector
y3
Note:
1. After you have created the cache, do not perform any operations within the cache
directory (cachedir) itself. This causes conflicts within the CacheFS software.
2. If you use the mount command option to specify files for mounting, the command must
be reissued each time the system is rebooted.
3. Use the –m or –o options of the fsck_cachefs command to check the file systems
without making any repairs.
/etc/exports File
The /etc/exports file indicates all directories that a server exports to its clients. Each line in
the file specifies a single directory. The server automatically exports the listed directories
each time the NFS server is started. These exported directories can then be mounted by
clients. The syntax of a line in the /etc/exports file is:
directory –options[,option]
The directory is the full path name of the directory. Options may designate a simple flag
such as ro or a list of host names. See the specific documentation of the /etc/exports file
and the exportfs command for a complete list of options and their descriptions. The
/etc/rc.nfs script does not start the nfsd daemons or the rpc.mountd daemon if the
/etc/exports file does not exist.
The following example illustrates entries from an /etc/exports file:
/usr/games –ro,access=ballet:jazz:tap
/home –root=ballet,access=ballet
/var/tmp
/usr/lib –access=clients
The first entry in this example specifies that the /usr/games directory can be mounted by
the systems named ballet, jazz, and tap. These systems can read data and run
programs from the directory, but they cannot write in the directory.
The second entry in this example specifies that the /home directory can be mounted by the
system ballet and that root access is allowed for the directory.
The third entry in this example specifies that any client can mount the /var/tmp directory.
(Notice the absence of an access list.)
The fourth entry in this example specifies an access list designated by the netgroup
clients. In other words, these machines designated as belonging to the netgroup
clients can mount the /usr/lib directory from this server. (A netgroup is a
network–wide group allowed access to certain network resources for security or
organizational purposes. Netgroups are controlled by using NIS or NIS+. For more
information, see AIX 4.3 NIS/NIS+ Guide.)
/etc/xtab File
The /etc/xtab file has a format identical to the /etc/exports file and lists the currently
exported directories. Whenever the exportfs command is executed, the /etc/xtab file
changes. This allows you to export a directory temporarily without having to change the
/etc/exports file. If the temporarily exported directory is unexported, the directory is
removed from the /etc/xtab file.
Note: The /etc/xtab file is updated automatically, and should not be edited.
Implementation of NFS
NFS can be, and is, implemented on a wide variety of machine types, operating systems,
and network architectures. NFS achieves this independence using the Remote Procedure
Call (RPC) protocol.
Controlling NFS
The NFS, NIS, and NIS+ daemons are controlled by the System Resource Controller
(SRC). This means you must use SRC commands such as startsrc, stopsrc, and lssrc to
start, stop, and check the status of the NFS, NIS, and NIS+ daemons.
Some NFS daemons are not controlled by the SRC: specifically, rpc.rexd, rpc.rusersd,
rpc.rwalld, and rpc.rsprayd. These daemons are started and stopped by the inetd
daemon.
dev=filesystem_name Specifies the path name of the remote file system being
mounted.
mount=[true|false] If true, specifies that the NFS file system will be mounted
when the system boots. If false, the NFS file system will
not be mounted when the system boots.
Secrecy
Throughout history, various groups of people have sought to communicate in such a way
that only the sender and receiver know the contents of a given message. To achieve this
secrecy, senders and receivers use a cipher, a scheme for converting a plaintext message
into ciphertext and back again. Encryption is the process of converting plain text into cipher
text, and decryption is the process of converting cipher text into plain text.
One of the earliest ciphers, the Caesar cipher, is attributed to Julius Caesar. In this cipher,
one letter is substituted for another. For example, ’A’ becomes ’C’, ’B’ becomes ’D’, ..., ’Y’
becomes ’A’, and ’Z’ becomes ’B’. So, the Caesar cipher encrypts the phrase ATTACK AT
DAWN as CVVCEM CV FCYP.
If the Carthaginians could cryptanalyze the Caesar cipher and break it, the Roman
cryptographers would have to invent an entirely new cipher. Since cipher development is an
expensive process, the Romans might use a cipher key in order to get more use out of their
cipher. For example, instead of specifying a letter–for–letter substitute, the Romans might
specify a key K, where K indicates the number of positions to shift a letter. That is, if K = 2,
then ’A’ becomes ’C’. If K = 4, then ’A’ becomes ’E’, and so on. With this scheme, if the
Carthaginians break the cipher, all the Romans must do is change the key. Of course, the
Carthaginians might realize what algorithm the Italians were using, and exhaustively try
every value of K from 1 to 26. If the Carthaginians had a computer, their task would be a
trivial programming exercise.
Authentication
A primary application of secrecy is authentication. One common method of authentication
(which is the standard UNIX method of authentication) uses a password. In other words,
when a user wants to login, the operating system requires the user to provide a password
known only by the operating system and the user. If the user provides the correct password,
the operating system concludes that the user is who the user claims to be. Note that this
method requires the operating system to store the user’s password in a file on the system,
although in encrypted form. This means that two different entities know a single password.
Public key cryptography provides an alternative to password authentication. Suppose a
sender wants to send a message, and the receiver wants to be certain that the message is
from the sender and not from an intruder pretending to be the sender. The authentication
process will occur in the following manner:
1. First the sender enciphers a ”request to send” message using the receiver’s public key,
and then sends the request.
2. The receiver receives the ”request to send” message and deciphers it using the
receiver’s private key.
3. The receiver enciphers a ”token” message using the sender’s public key, and then sends
the token.
4. The sender receives the token and deciphers it with the sender’s private key. Now, when
the sender sends messages to the receiver, the sender will begin each message with the
token, signifying that the sender is, in fact, the sender. If an intruder attempts to send
Secrecy in NFS
NFS, NIS, and NIS+ use the DES algorithm for different purposes. NFS uses DES to
encrypt a time stamp in the Remote Procedure Call (RPC) messages sent between NFS
servers and clients. This encrypted time stamp authenticates machines just as the ”token”
authenticates the sender, as described in ”Authentication”, on page 10-26. (For information
about NIS and NIS+ see AIX 4.3 NIS/NIS+ Guide.)
Because NFS can authenticate every single RPC message exchanged between NFS clients
and servers, this provides an additional, optional, level of security for each file system. By
default, file systems are exported with the standard UNIX authentication. To take advantage
of this additional level of security, you can specify the secure option when you export a file
system.
Authentication Requirements
Secure NFS authentication is based on the ability of a sender to encrypt the current time,
which the receiver can then decrypt and check against its own clock. This process has two
requirements:
• The two agents must agree on the current time.
• The sender and receiver must be using the same DES encryption key.
K = PK SKA
AB B
where K stands for the common Key, PK stands for Public Key, and SK stands for Secret
Key, and each of these keys is a 128–bit number. The server derives the same common key
by computing the following formula:
K = PK SKB
AB A
Only the server and client can calculate this common key since doing so requires knowing
one secret key or the other. Because the common key has 128 bits, and DES uses a 56–bit
key, the client and server extract 56 bits from the common key to form the DES key.
Authentication Process
When a client wants to talk to a server, it randomly generates a key used for encrypting the
time stamps. This key is known as the conversation key (CK). The client encrypts the
conversation key using the DES common key (described in ”Authentication Requirements”,
on page 10-27) and sends it to the server in the first RPC transaction. This process is
shown in the Authentication Process illustration.
Credential Verifier
A B
(client) CK( t 1– 1 ), ID (server)
ID CK( t 2 )
CK( t2 – 1 ), ID
ID CK( t n )
CK( tn– 1 ), ID
Authentication Process
/etc/publickey File
The /etc/publickey file contains names and public keys, which NIS and NIS+ use to create
the publickey map. The publickey map is used for secure networking. Each entry in the
file consists of a network user name (which may refer to either a user or a host name),
followed by the user’s public key (in hexadecimal notation), a colon, and the user’s
encrypted secret key (also in hexadecimal notation). By default, the only user in the
/etc/publickey file is the user nobody.
Do not use a text editor to alter the /etc/publickey file because the file contains encryption
keys. To alter the /etc/publickey file, use either the chkey or newkey commands.
Performance Considerations
Secure NFS affects system performance in two ways. First, both the client and server must
compute the common key. The time it takes to compute the common key is about 1 second.
As a result, it takes about 2 seconds to establish the initial RPC connection, since both
client and server have to perform this operation. After the initial RPC connection, the key
server caches the results of previous computations, and so it does not have to recompute
the common key every time.
Second, each RPC transaction requires four DES encryption operations:
1. The client encrypts the request time stamp,
2. The server decrypts it,
3. The server encrypts the reply time stamp,
4. And finally, the client decrypts it.
Since system performance is reduced by secure NFS, you will have to weigh the benefits of
increased security and your system’s performance requirements.
If a similar response is not returned, log in to the server at the server console and check
the status of the inetd daemon by following the instructions in ”Get the Current Status of
the NFS Daemons”, on page 10-9.
5. Verify that the mountd, portmap and nfsd daemons are running on the NFS server by
entering the following commands at the client shell prompt:
/usr/bin/rpcinfo –u server_name mount
/usr/bin/rpcinfo –u server_name portmap
/usr/bin/rpcinfo –u server_name nfs
If the daemons are running at the server, the following responses are returned:
program 100005 version 1 ready and waiting
program 100000 version 2 ready and waiting
program 100003 version 2 ready and waiting
The program numbers correspond to the commands, respectively, as shown in the
example output above. If a similar response is not returned, log in to the server at the
server console and check the status of the daemons by following the instructions in ”Get
the Current Status of the NFS Daemons”, on page 10-9.
6. Verify that the /etc/exports file on the server lists the name of the file system that the
client wants to mount and that the file system is exported. Do this by entering the
command:
showmount –e server_name
This command will list all the file systems currently exported by the server_name.
Checking Processes
At the server, enter the following at the command line:
ps –ef
If the server seems fine and other users are getting timely responses, make sure your biod
daemons are running. Try the following steps:
1. Run the ps –ef command and look for the biod daemons in the display.
If they are not running or are hung, continue with steps 2 and 3.
2. Stop the biod daemons that are in use by issuing the following command:
stopsrc –x biod –c
3. Start the biod daemons by issuing the following command:
startsrc –s biod
To determine if the biod daemons are hung, run the ps command as above, copy a large
file from a remote system, and then run the ps command again. If the biod daemons do not
accumulate CPU time, they are probably hung.
Communication Adapter Maximum Transmission Unit (MTU) and Transmit Queue Sizes
Adapter MTU Transmit Queue
Token Ring 1500 50
4Mb 3900 40 (Increase if the nfsstat command times out.)
16Mb 1500 40 (Increase if the nfsstat command times out.)
8500 40 (Increase if the nfsstat command times out.)
Ethernet 1500 40 (Increase if the nfsstat command times out.)
The larger MTU sizes for each token–ring speed reduce processor use and significantly
improve read/write operations.
Note:
1. Apply these values to NFS clients if retransmissions persist.
2. All nodes on a network must use the same MTU size.
NFS Subroutines
cbc_crypt, des_setparity, or ecb_crypt Implements Data Encryption Standard (DES)
routines.
Packaging
Fast Connect packaging includes the following images:
Image Description
cifs.base Fast Connect Server Utilities
cifs.msg Fast Connect Server Messages
cifs.basic Fast Connect Server (Windows only)
or
cifs.advanced Fast Connect Advanced Server (Windows and OS2)
These images contain the following filesets:
Installation
AIX Fast Connect for Windows is installed on AIX Version 4.3.2 or higher. It requires that the
following filesets are already installed and configured:
• bos.net.tcp.client version 4.3.2.0 or higher
• bos.rte.loc version 4.3.2.2. or higher
Also, AIX Version 4.3.2 IX85388 is required for sendfile API support.
In addition to these software requirements, Fast Connect requires approximately 50 MB of
additional disk space. For further details, see the AIX 4.3 Installation Guide.
Once the installation is complete, the following files appear on the system:
Configurable Parameters
Fast Connect is designed for ease of administration without eliminating required
customization. Therefore, only a small set of configurable parameters is available for
configuration.
Note: Most configurable parameters are dynamically configurable and do not require the
server to be stopped and restarted for the changes to become effective.
A brief description of these parameters follows:
Note:
1. S stands for static and D for dynamic. Any changes to static parameters require a
Shutdown/Restart of the server before they take effect.
2. For maxusers, maxconnections, maxopens, and maxsearches, a default or minimum
value of zero means unlimited (no restrictions).
User Configuration
User accounts can be configured on the server using Web-based System Manager, SMIT,
or the net command. Each defined Fast Connect user must also be a defined AIX user. Fast
Connect supports user level authentication using plain text passwords. Resource access is
permitted based on the authenticated user’s AIX credentials.
Guest access is controlled with the help of guest and guestname configuration parameters.
If enabled, Fast Connect allows guest access to server resources when the user ID
received in the server session setup does not match any of the users defined on the server
and is also different from the value of the guestname parameter configured on the server.
Note: If encrypt_passwords is set to 0, the user’s password cannot be in mixed case. If
encrypt_passwords is set to 1 or 2, add usernames to the Fast Connect Users
database using Web-based System Manager, SMIT, or the net command. The Fast
Connect Users database is a subset of the AIX Users database.
Initial Configuration
On a newly installed Fast Connect server, the initial configuration parameters are:
Server Name TCP/IP hostname of the server
Server Description Fast Connect server on hostname
Default Shares HOME, with the following attributes:
Network Name HOME
AIX directory User’s home directory as defined in the user profile
Other server parameters are at default values.
–OR–
Task SMIT Fast Path Command or File
Starting the Server smit smbadminstart net start
Stopping the Server smit smbadminstop net stop
Pausing the Server ––– net pause
Resuming the Server ––– net resume
Changing Parameters smit smbcfghatt net config
Changing Resources smit smbcfgresi net config
Adding Users smit smbcfgusradd net user
Changing Users smit smbchgusrlis net user
Changing a User Password smit smbusrpwd net user
Removing a User smit smbrmusrlis net user
Configuring nbns smit smbwcfgn –––
Adding a NetBIOS name smit smbwcfgadd net nbaddname or
net nbaddgroup or
net nbaddmulti
Deleting a NetBIOS name smit smbwcfgdel net nbdelname
Deleting a NetBIOS name smit smbwcfdadd net nbdeladdr
by address and by name
Backing Up NetBIOS name smit smbwcfgbak net nbbackup
table
Restoring NetBIOS name smit smbwcfgres net nbrestore
table
Listing All Shares smit smbsrvlisall net share
Listing All File Shares smit smbsrvfilist net share
Adding a File Share smit smbsrvfiladd net share
Changing a File Share smit smbsrvfilchg net share
Deleting a File Share smit smbsrvfilrm net share
Adding Printer Share smit smbsrvprtadd net share
Changing Printer Share smit smbsrvprchg net share
Deleting Printer Share smit ssrvprtrm net share
Showing Server Status smit smbadminstatu net status
Showing the Configuration smit smbcfg net config
TCP/IP Configuration
To access the Fast Connect Server, each client PC must be configured for NetBIOS over
TCP/IP (RFC1001/1002). This can be accomplished for the various clients as shown in the
following sections.
Windows NT Clients
Note: You must be logged in as an Administrator.
1. From the Start button, select Settings–>Control_Panel–>Network.
2. On the Services tabbed panel, verify that there are entries for the following services:
– Computer Browser
– NetBIOS Interface
– Workstation
If any is missing, add it from your Windows NT CD.
3. On the Protocols panel, add TCP/IP (if missing), then select Properties.
The TCP/IP Properties dialog box has several tabbed panels. Verify the following:
IP Address panel Configure as needed. (For initial testing, you may find it convenient
to manually specify unique IP addresses for each PC.)
You may also want to configure DNS, WINS Address, and Routing.
4. Test the client’s TCP/IP configuration by ping–ing (by IP address) from the client PC’s
DOS prompt to the Fast Connect server and vice versa.
OS/2 Clients
1. Install TCP/IP and NetBIOS support during OS/2 installation.
2. Use the TCP/IP Configuration program to verify and configure TCP/IP.
3. Use the Multi–Protocol Transport Services program (MPTS) to verify and configure the
following protocols for your network adapter:
– IBM OS/2 TCP/IP
– IBM OS/2 NetBIOS OVER TCP/IP
These protocols should have the same LAN adapter number, which should match your
TCP/IP interface.
Note: The default installation is IBM OS/2 NetBIOS. Be sure to add IBM OS/2
NetBIOS OVER TCP/IP if not already listed.)
4. Test the client’s TCP/IP configuration by ping–ing (by IP address) from the client PC’s
DOS prompt to the Fast Connect server and vice versa.
Requirements
1. Clients must be able to negotiate plain text passwords. This may require enabling plain
text passwords by updating required registry entries for Windows NT, 95, and 98 clients.
2. Fast Connect must be enabled for plain text passwords using SMIT, Web-based System
Manager or the net command
Disadvantages
1. Windows registry update may be required.
2. Windows may require user ID and passwords to be typed again
3. Clear–text passwords are sent over the network.
Requirements
1. Users must be defined to Fast Connect using SMIT, Web-based System Manager or the
net command.
2. AIX Fast Connect for Windows must be enabled for encrypted passwords using SMIT,
Web-based System Manager or the net command.
3. Windows or OS/2 user logon passwords must be same as Fast Connect passwords.
These passwords are not required to be same as AIX logon password.
4. Changing passwords requires root authority.
Advantages
1. No additional logon other than logging into the Windows or OS/2 workstation is required.
2. Clear text passwords are not sent over the network, which provides additional security.
Disadvantages
1. Additional administrative tasks are needed for Fast Connect users.
2. Administrator intervention is needed for password update.
Requirements
1. User must be defined on the Passthrough authentication server.
2. AIX Fast Connect for Windows must be enabled for Passthrough authentication using
SMIT, Web-based System Manager or the net command to define IP address of the NT
server.
3. NT user name must match AIX user name, although passwords can be different.
Advantages
1. No additional logon other than logging into the Windows or OS/2 workstation is required.
Disadvantages
1. Requires an NT server.
[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\VxD\VNETSUP]
”EnablePlainTextPassword”=dword:00000001
2. Using Windows Explorer, double click on the W98plain.reg file namein the directory
where you saved it. This action will update the WindowsRegistry for that client to allow
plain text passwords.
3. Shutdown/Restart the Windows 98 machine. (Shutdown/Restart is requiredfor this patch
to take effect.)
To install the Windows NT 4.0 Enable Plain Text Passwords patch,
1. Use EDIT or the NOTEPAD accessory to create the following text file,named
NT4plain.reg, as a local file on the Windows NT machine:
REGEDIT4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Rdr\Parameters]
EnablePlainTextPassword=dword:00000001
Mapping Drives
Normally, PC clients will need to define drive mappings to use the Fast Connect–exported
file shares. These drive mappings can be done from Windows or from the DOS command
prompt.
You can use the following mechanisms to define/undefine mappings between PC drive
letters and Fast Connect file shares. For the sake of the following examples, assume that
the NetBIOS servername is cifs01, and that file shares apps and pcdata are defined.
From DOS:
DOS> net help (help info for DOS)
DOS> net use H: \\cifs01\home (pre–defined Fast Connect share)
DOS> net use F: \\cifs01\apps
DOS> copy F:\oldfile H:\newfile (uses previous drive–mappings)
DOS> net use F: /delete (delete the drive–mapping)
From Windows:
1. Find the Map Network Drive dialog box.
– Select Windows Explorer –> Tools –> Map Network Drive.
or
Index X-1
automount daemon, NFS (Network File System), BNU files
file systems, 10-14 administrative, 8-4
configuration, 8-3
devices files, TCP/IP, 8-17
B lock files, 8-5
monitoring transfer, 8-22
Basic Networking Utilities, 8-2 permissions, 8-7
remote.unknown file, 8-7
binding, NFS (Network File System), 10-5
structure, 8-3
biod daemons, NFS (Network File System), 10-8 systems files, 8-7
BNU, overview, 8-1 bridges, network, 1-7
BNU directories, administrative, 8-4
BNU files, devices files
autodialer connections, 8-16
C
hardwired connections, 8-16 cache file system support, NFS (Network File
BNU (Basic Networking Utilities) System), 10-3
administrative login ID, 8-6 CacheFS, cache file system, 10-3
monitoring, setting up, 8-14
polling, remote systems, 8-15 client connections to Fast Connect, 11-15
BNU (Basic Networking Utilities) clients, description, 1-7
file transfer, scheduling, 8-9 communications
shell procedures, 8-20 functions, 1-2
TCP/IP, 8-9 network support, 1-6
BNU (Basic Networking Utilities) concepts, 11-2
daemons, overview, 8-8
file transfer, monitoring, 8-22 configuration, TCP/IP, 3-3
log files, 8-18 configuration procedure for Fast Connect, 11-10
logon, 8-6
logon failures, debugging, 8-26
maintenance, 8-18
monitoring
D
automatic, 8-14 daemons
file transfer, 8-22 network services, 10-42
remote connection, 8-20 secure NFS, 10-43
remote systems, transporting files to, 8-8 SRC, 10-8
security, 8-5 TCP/IP, 3-91
tip command, variables, 8-28
data link control (DLC), device manager
BNU commands environment, structure, 7-2
cleanup, 8-19
data link control (DLC)
executing remote, 8-9
device manager environment, components, 7-3
maintenance, 8-19
error logging facility, 7-12
status–checking, 8-20
generic, 7-1
BNU configuration
DDN, 3-57, 3-129
files, 8-3
general, 8-10 debugging, BNU, logon failures, 8-26
BNU directories default route, 3-121
hidden, 8-4 device driver, communications, 4–port
public directory, 8-3 multiprotocol, 6-2
spooling, 8-4
structure, 8-3 direct connections, BNU configuration, example,
8-34
BNU examples
direct connection, 8-34 directories, BNU structure, 8-3
modem connection, 8-31 diskless support, NFS, SUN, 10-43
TCP/IP connection, 8-29
Index X-3
tunnels and key management, 4-4 internet message access protocol, 2-15
IPv4, also see Internet Protocol (IP) security, 4-1 list of
commands, 2-18
IPv6, 4-1 files and directories, 2-18
also see Internet Protocol Version 6, 3-9 list of commands, IMAP and POP, 2-19
log file, how to manage, 2-12
logging, 2-11
K mailers, 2-1
bellmail, 2-1
kernel extension, NFS, 10-41 BNU, 2-1
key management, and tunnels, 4-4 prog, 2-13
statistics, 2-12, 2-13
keylogin command, secure NFS, 10-27 management tasks, 2-2
message access programs, 2-15
message routing program, 2-1
L post office protocol, 2-15
protocol
LAN, monitor trace, 7-13 IMAP, 2-15
LAN (local area network), description, 1-5 POP, 2-15
queue, 2-6
line discipline, 5-2 files, 2-6
link station, 7-8 how to determine processing interval, 2-9
how to force, 2-8
links
how to move, 2-9
testing, 7-8
how to specify processing interval, 2-8
tracing, 7-8
q control file, 2-6
LLC (logical link control), 1-7 system management overview, 2-1
local area network, 1-5 traffic, how to log, 2-12
user interface, 2-1
local node, 1-7
mailers, 2-1
local–busy mode, 7-8
managing TTY devices, 5-4
log files
BNU, 8-18 mapped file support, NFS (Network File System),
10-4
Fast Connect, 11-23
mapping AIX to DOS file names, 11-14
logical link control, 1-7
medium access control, 1-7
logon
BNU, 8-6 methods, TCP/IP, 3-162
UUCP, 8-6 metric, 3-122
LS (link station) MIB (Management Information Base), variables,
definition, 7-8 9-11
statistics, querying, 7-9
trace facility, 7-12 modems, 5-13
channels, 7-12 adding RTS discipline to a tty port, 5-21
entries, 7-13 AT command summary, 5-33
reports, 7-13 dial modifiers, 5-37
result codes summary, 5-36
S–registersSummary, 5-35
M attaching a modem, 5-15
commands, sending AT commands, 5-16, 5-17
MAC (medium access control), 1-7 connections, BNU configuration example, 8-31
data compression, 5-13
mail IBM 7855, 5-21
/etc/aliases file, 2-3 MultiTech MULTIMODEM II, 5-25
aliases, 2-3 practical peripherals, 5-25
how to compile database, 2-4 speed
local system, 2-4 baud, 5-13
debugging, 2-14 bits per second (bps), 5-13
installation, 2-1
Index X-5
list of commands, 10-34 remote, 1-7
permissions, 10-39
soft–mounted files, 10-34
RPC, 10-7
rpc., how to configure, 10-19
O
rpc.pcnfsd other operating systems, 1-8
how to start, 10-20
how to verify accessibility, 10-20
secure NFS, 10-25
administering, 10-30
P
authentication, 10-26 packaging images for Fast Connect, 11-8
authentication requirements, 10-27
packets, 3-6
Caesar cipher, 10-25
cipher, 10-25 Path MTU Discovery, 3-130
ciphertext, 10-25 PC–NFS, 10-19
configuring, 10-31
cryptanalyze, 10-25 PCI adapters, ARTIC960HX, 6-9
cryptographer, 10-25 permissions files, 8-7
decryption, 10-25
DES (Data Encryption Standard), 10-25 point–to–point protocol, user–level processes,
encryption, 10-25 3-136
file systems, 10-32 polling, BNU, remote systems, 8-15
how to export a file system, 10-31
POP server, configuring, 2-15
key, 10-25
net name, 10-29 portmap daemon, NFS (Network File System),
network entities, 10-29 10-7
networking daemons, 10-43 prerequisites for Fast Connect, 11-7
networking utilities, 10-43
performance, 10-30 problems with Fast Connect, 11-22
plaintext, 10-25 protocols
public key cryptography, 10-27 gateway, 3-123
servers, 10-2 network, general, 1-6
how to configure, 10-10
public directory, BNU, 8-3
stateless servers, 10-2
system startup, how to start, 10-9 public key cryptography, secure NFS, 10-27
WebNFS, 10-21
XDR, 10-7
NFS commands, list of, 10-42 Q
NFS daemons queue, mail, 2-6
command line arguments, how to change, 10-8
controlling, 10-7
how to get current status, 10-9
how to start, 10-9
R
how to stop, 10-9 Remote Command Execution Protocol, 3-35
locking, list of, 10-42
secure NFS, 10-43 remote connections, BNU, monitoring, 8-20
NFS diskless support, SUN, clients, 10-43 Remote Login Protocol, 3-35
Index X-7
SRC (System Resource Controller), 3-92, network interfaces, 3-47
3-155 802.3, 3-48
subservers, 3-91 ATM, 3-50
subsystems, 3-91 automatic configuration, 3-47
DNS name server, configuring dynamic zones, automatic creation, 3-47
3-119 Ethernet Version 2, 3-48
examples, BNU configuration, 8-29 managing, 3-51
file formats, 3-163 manual creation, 3-47
frames, definition, 3-6 multiple, 3-51
hosts, 3-3 problem determination, 3-157
installation, 3-3 Serial Optical, 3-50
interfaces, 3-47 SLIP configuration, 3-49
Internet Protocol Version 6, 3-9 Token–Ring, 3-49
IP Security, 4-1 network planning, 3-1
IP security packets
configuration, 4-8 definition, 3-6
features, 4-3 headers, 3-20, 3-21, 3-22
IKE features, 4-3 problem determination, 3-159
installation, 4-7 tracing, 3-20
predefined filter rules, 4-23 parameter assignments, DHCP, 3-58
problem determination, 4-29 point–to–point protocol, 3-136
reference, 4-34 used as an alternative to SLIP, 3-136
list of commands, 3-161 user–level processes, 3-136
list of daemons, 3-162 problem determination, 3-152
list of files, 3-163 communication, 3-152
mail server, 3-112 ESCDELAY, 3-156
methods, 3-162 name resolution, 3-152
name resolution, 3-97 network interface, 3-157, 3-158
how to perform local, 3-103 packet delivery, 3-159
planning for domain, 3-104 routing, 3-154
problem determination, 3-152 SRC, 3-155
process, 3-101 telnet or rlogin, 3-155
name server, 3-99 TERM, 3-155
caching–only, 3-99 protocols, 3-6
configuration files, 3-105 application–level, 3-31, 3-32, 3-33, 3-34, 3-35
forwarder/client, 3-99 assigned numbers, 3-35
how to configure hint, 3-111 network–level, 3-23, 3-24, 3-25
how to configure host to use, 3-118 transport–level, 3-28, 3-29
how to configure mail server, 3-112 RFCs
how to configure master, 3-106 how to get, 3-163
how to configure slave, 3-109 RFC 1010, 3-23
master, 3-99 RFC 1100, 3-23
remote, 3-99 RFC 791, 3-25
slave, 3-99 supported, 3-163
zone of authority, 3-99 route
naming, 3-97 default, 3-121
authority, 3-97 definition of, 3-121
conventions, 3-98 host, 3-121
DNS (Domain Name Service), 3-97 network, 3-121
domain, 3-97 routing, 3-121
flat network, 3-1, 3-97 dynamic, 3-121, 3-124
hierarchical network, 3-1, 3-97 gated, 3-121
how to choose names, 3-99 gateways, 3-4, 3-122, 3-123, 3-124
network adapter cards, 3-36 hop count, 3-122
ATM adapter, 3-43 how to configure gated, 3-127
configuring, 3-42 how to configure routed, 3-126
how to configure, 3-37 how to get an autonomous system number,
how to install, 3-36 3-129
Turboways 100 ATM Adapters, 3-38 metric, 3-122
Turboways 155 ATM Adapters, 3-38 problem determination, 3-154
Index X-9
X-10 System Management Guide: Communications and Networks
Vos remarques sur ce document / Technical publication remark form
Titre / Title : Bull AIX 4.3 System Management Guide Communications and Networks
To order additional publications, please fill up a copy of this form and send it via mail to:
Pour commander des documents techniques, remplissez une copie de ce formulaire et envoyez-la à :
ORDER REFERENCE
86 A2 31JX 02
Utiliser les marques de découpe pour obtenir les étiquettes.
Use the cut marks to get the labels.
AIX
AIX 4.3 System
Management
Guide
Communications
and Networks
86 A2 31JX 02
AIX
AIX 4.3 System
Management
Guide
Communications
and Networks
86 A2 31JX 02
AIX
AIX 4.3 System
Management
Guide
Communications
and Networks
86 A2 31JX 02