HP TCP/IP Services for OpenVMS
Management
Previous
Contents
Index
Chapter 9
9
Configuring and Managing the DHCP Client
9.1
Key Concepts
9.1.1
Designating the Primary Interface
9.1.2
Requesting a Lease
9.1.3
Requesting Parameters
9.1.4
Understanding How the DHCP Client Operates
9.2
DHCP Client Components
9.2.1
Executable Files
9.2.2
Configuration Files
9.2.2.1
Client Configuration File
9.2.2.2
The Interface File
9.2.2.3
The Host Name File
9.2.2.4
The DHCPTAGS. File
9.2.3
Command Files
9.2.4
System Logicals
9.2.5
Log Files
9.3
DHCP Client Startup and Shutdown
9.4
Configuring the DHCP Client
9.4.1
Putting Interfaces under DHCP Control
9.4.1.1
Using Autoconfigure for a New TCP/IP Installation
9.4.1.2
Using TCPIP$CONFIG to Configure an Existing Installation
9.4.2
Configuring the Software
9.4.3
Configuring a Cluster Environment
9.4.4
Signaling the DHCP Client
9.5
TCP/IP Management Commands
9.5.1
Temporarily Configuring Interfaces
9.5.2
Permanently Configuring Interfaces
9.6
Using the SHOWDHC Utility
Chapter 10
10
Configuring and Managing BOOTP
10.1
Key Concepts
10.2
BOOTP Planning and Preconfiguration Tasks
10.2.1
Network Configuration Decisions
10.2.2
BOOTP Service Decisions
10.2.3
BOOTP Security
10.3
Configuring the BOOTP Service
10.4
Managing the BOOTP Service
10.4.1
Enabling and Disabling BOOTP
10.4.2
BOOTP Management Commands
10.4.3
BOOTP Logical Names
10.4.4
BOOTP Startup and Shutdown
10.5
Creating a BOOTP Database
10.5.1
Populating the BOOTP Database
10.5.2
Converting UNIX Records
10.5.3
Creating Individual Entries
10.5.4
Modifying and Deleting Entries
10.6
Solving BOOTP Problems
Chapter 11
11
Configuring and Managing TFTP
11.1
Key Concepts
11.2
Setting up the TFTP Service
11.2.1
Transferring Data to the TFTP Host
11.2.2
TFTP Management Commands
11.2.3
TFTP Logical Names
11.2.4
TFTP Startup and Shutdown
11.2.5
Enabling and Disabling TFTP
11.3
TFTP Security
11.4
Solving TFTP Problems
Chapter 12
12
Configuring and Managing the Portmapper
12.1
Configuring Services to Use the Portmapper
12.2
Portmapper Startup and Shutdown
12.3
Displaying Portmapper Information
Chapter 13
13
Configuring and Managing NTP
13.1
Key Concepts
13.1.1
Time Distributed Through a Hierarchy of Servers
13.1.2
How Hosts Negotiate Synchronization
13.1.3
How the OpenVMS System Maintains the System Clock
13.1.4
How NTP Makes Adjustments to System Time
13.1.5
Configuring the Local Host
13.2
Manycast Mode
13.2.1
Manycast Options
13.3
NTP Service Startup and Shutdown
13.4
Configuring Your NTP Host
13.4.1
Creating the Configuration File
13.4.2
Configuration Statements and Options
13.4.2.1
NTP Monitoring Options
13.4.2.2
Access Control Options
13.4.2.2.1
The Kiss-of-Death Packet
13.4.2.2.2
Access Control Statements and Flags
13.4.2.3
Sample NTP Configuration File
13.4.3
Using NTP with Another Time Service
13.5
Configuring NTP as Backup Time Server
13.6
NTP Event Logging
13.6.1
Sample NTP Log Files
13.7
NTP Authentication Support
13.7.1
Symmetric Key Cryptography
13.7.2
Public Key Cryptography
13.7.2.1
Autokey Protocol
13.7.2.2
Certificate Trails
13.7.2.3
Secure Groups
13.7.2.4
Identity Schemes
13.7.3
Naming and Addressing
13.7.4
Operation
13.7.5
Key Management
13.7.6
Authentication Statements and Commands
13.7.7
Error Code
13.7.8
Leapseconds Table
13.7.9
Configuring Autokey
13.7.9.1
Client/Server Setup Procedure
13.7.9.1.1
Using The Default TC Identity Scheme (Method 1)
13.7.9.1.2
Using The Default TC Identity Scheme (Method 2)
13.7.9.1.3
Using The PC Identity Scheme
13.7.9.1.4
Using The IFF Scheme
13.7.9.1.5
Using The Alternate IFF Scheme
13.7.9.1.6
Using the GQ scheme
13.7.9.1.7
Using the MV scheme
13.7.9.1.8
Broadcast and Multicast Autokey
13.7.9.1.9
Monitoring Authentication Status
13.7.9.2
Updating the Client and Server Parameters
13.8
NTP Utilities
13.8.1
Setting the Date and Time with NTPDATE
13.8.2
Tracing a Time Source with NTPTRACE
13.8.3
Making Run-Time Requests with NTPDC
13.8.3.1
NTPDC Interactive Commands
13.8.3.2
NTPDC Control Message Commands
13.8.3.3
NTPDC Request Commands
13.8.4
Querying the NTP Server with NTPQ
13.8.4.1
NTPQ Control Message Commands
13.9
Generating Public and Private Keys with ntp_keygen
13.9.1
Synopsis
13.9.2
Running ntp_keygen
13.9.3
Random Seed File
13.9.4
Trusted Hosts and Groups
13.9.5
Identity Schemes
13.9.6
Cryptographic Data Files
13.9.7
Generating Symmetric Keys
13.9.7.1
Authentication Key Format
13.10
Solving NTP Problems
13.10.1
NTP Debugging Techniques
13.10.1.1
Initial Startup
13.10.1.2
Verifying Correct Operation
13.10.1.3
Special Problems
13.10.1.4
Debugging Checklist
Previous
Next
Contents
Index