DOC HOME
SITE MAP
MAN PAGES
GNU INFO
SEARCH
PRINT BOOK
Administering network services
Networking facilities
SAF and the listen port monitor
The connection server
Identification and Authentication Facility
Network selection
Name-to-address mapping
User-level services
Procedural overview of BNU and REXEC administration
Step 1: set up network selection
Step 2: set up name-to-address mapping
Step 3: set up the listen port monitor
Step 4: set up the connection server
Step 5: set up the cr1 authentication scheme
Step 6: set up ID mapping
Step 7: set up BNU
Step 8: set up REXEC
The Service Access Facility
What the Service Access Facility does
The Service Access Controller
Activities of the SAC daemon
Configuration scripts for individual systems
Configuration scripts for individual port monitors
Configuration scripts for individual services
The SAC administrative file
The port monitor administrative file
Administering port monitors
The SAC administrative command: sacadm
Displaying information about port monitor status
All port monitors on a system
A particular port monitor
All port monitors of the same type
Adding a port monitor
Removing a port monitor
Making other changes to port monitors
Starting a port monitor
Enabling a port monitor
Disabling a port monitor
Killing a port monitor
Changing the SAC polling schedule
Configuration scripts for systems and port monitors
Replacing configuration scripts for individual systems
Replacing configuration scripts for individual port monitors
Notifying manual changes made to administrative files
Administering port services
The port monitor administrative command: pmadm
Displaying information about service status
Listing status information for all services
Adding a service
Enabling a service
Disabling a service
Removing a service
Authentication schemes and user IDs
Adding or removing an authentication scheme
Removing a user ID
Installing (or replacing) configuration scripts for specific services
Listing a service-specific configuration script
Installing a service-specific configuration script
Administering the ttymon port monitor
What ttymon does
ttymon and the Service Access Facility
The default configuration of ttymon
The ttyadm command
Listing which ttymon port monitors are configured
Listing which services are configured for a ttymon port monitor
Listing which TTY ports are accessible
Adding a ttymon port monitor
Removing a ttymon port monitor
Adding a service
Removing a service
Enabling a service
Disabling a service
Disabling all services monitored by a ttymon port monitor
ttymon express mode
Configuration files
The who command
Listing running port monitors
Listing all logged-in users
Identifying ttymon processes
Examining the system for ambiguously configured ports
Examining log files
Configuring terminal line settings
The ttydefs file
The autobaud option
The sttydefs command
Printing terminal line setting information
Adding records to the ttydefs file
Creating a hunt sequence
Removing records from the ttydefs file
Setting terminal options with the stty command
Modem access
Referencing the port
Checking modem settings
Configuring your system and modem to work together
Examples of ttyadm option settings
ttymon timeouts
Monitoring ports
Increasing the number of pseudo-terminal devices
Administering the listen port monitor
What listen does
Private addresses for services
Passing connections to standing servers
Socket-based services
RPC-based services and dynamic addressing
listen and the Service Access Facility
The nlsadmin command
Listing which listen port monitors are configured
Listing which services are configured for a listen port monitor
Adding a listen port monitor
Removing a listen port monitor
Adding a service
Removing a service
Enabling services
Disabling a service
Disabling all services monitored by a listen port monitor
Configuration files
Log files
Administering the connection server
Connection server components
Authentication scheme administration
Server Machine Administration
Client machine administration
Maintaining the /etc/iaf/serve.allow file
Maintaining the /etc/iaf/serve.alias file
The reportscheme service
The authentication scheme file
The log file
The debug file
cr1 Bilateral Authentication Scheme
cr1 components
An overview of cr1 administration
Client-side administration
Server-side administration
Registering cr1 with a port monitor
Registering cr1 with the connection server
Managing the daemon and the master key
Starting and stopping the daemon
Creating a master key
Setting up the key database
Administering ID mapping
Overview of ID mapping
Administering login maps
Administering an idata file
Setting up the idata file
Adding an entry to an idata file
Examples
Deleting an entry in an idata file
Deleting the idata and uidata files
Checking files and fixing file inconsistencies
Displaying information
Administering a uidata file
Setting up the uidata file
Enabling and disabling user-controlled mapping
Adding an entry to a uidata file
Deleting an entry from a uidata file
Checking files and fixing file inconsistencies
Displaying information
Administering attribute maps
Setting up an attribute map
Adding an entry to an attribute map
Examples
Deleting an entry from an attribute map
Deleting an attribute map
Checking files and fixing file inconsistencies
Displaying information
Administering network selection
Network selection overview
The /etc/netconfig file
The NETPATH environment variable
Administering name-to-address mapping
The tcpip.so library
The resolv.so library
The straddr.so library
Administering BNU
Overview of the BNU processes
Networking hardware
Networking programs
User programs
Administrative programs
Networking daemons
Networking support files
Database support files
Administrative support files
Temporary data files (TM. files)
Checkpoint files (P. files)
Lock files (LCK. files)
Work files (C. files)
Data files (D. files)
Execute files (X. files)
Log files
Command log
System history log
Error log
Transfer log
Report statistics of file transfer
Accounting log
Security log
File transfer (xfer) security log
Remote execution (rexe) security log
Performance log
Connection (conn) performance log
File transfer (xfer) performance log
Foreign log
Overview of BNU administration
BNU setup procedures
All types of connection
Connections using the CS dialer: clients
Required steps
Optional or conditional steps
Connections using the CS dialer: servers
Required steps
Optional or conditional steps
Connections not using the CS dialer: clients
Optional or conditional steps
Connections not using the CS dialer: servers
Optional or conditional steps
Adding uucp logins
Configuring UUCP over TCP/IP
BNU maintenance
Automated networking maintenance (cron)
uudemon.poll
uudemon.hour
uudemon.admin
uudemon.clean
Manual maintenance
Cleaning up log files
BNU troubleshooting
Utility for testing basic outgoing connectivity
Using the connection server in debug mode
Testing basic modem connectivity
Testing basic direct line connectivity
Testing outgoing cu and uucp functionality
How cu and uucp work
Summary
Debugging outgoing connections
Using Uutry to debug uucp
Testing incoming functionality
Testing incoming uucp connectivity
Testing remote login and ttymon
Making sure line speeds are set correctly
Stopping and restarting ttymon
Using expect/send strings to troubleshoot uucp
Using expect/send strings to test the connection to a new remote system
Speed, character size and parity settings
Data transfer and flow control
Hints and tricks
Dealing with device busy errors
Dealing with no answer
Going out over TCP/IP instead
Known problems and workarounds
You always get a device busy message
Don't define a direct line as a modem
Use 8 bit characters and no parity for autobaud connections
Use 8 bit characters for PPP
You can't assign a system to a specific direct line
Use the Break key to change line speeds
What to do when connections seem to hang
File transfers via uucp can take a long time
Administering REXEC
Overview of REXEC administration
Registering REXEC with a port monitor
Adding and removing services
Adding a service
Examples
Removing a service
Example
Listing the defined services
Linking services to REXEC
Administering Remote Procedure Calls (RPC)
Enabling a Secure RPC server
RPC and name-to-address mapping
The public key database file
Setting the Secure RPC domain name
Secure RPC overview
RPC domains
Administering Secure RPC
Establishing Secure RPC domains
Maintaining the master public key file
Adding RPC users
Changing a network password
Troubleshooting RPC