HP TCP/IP Services for OpenVMS
Management


Previous Contents Index

Chapter 9
9 Configuring and Managing the DHCP Client
     9.1     Key Concepts
         9.1.1         Designating the Primary Interface
         9.1.2         Requesting a Lease
         9.1.3         Requesting Parameters
         9.1.4         Understanding How the DHCP Client Operates
     9.2     DHCP Client Components
         9.2.1         Executable Files
         9.2.2         Configuration Files
             9.2.2.1             Client Configuration File
             9.2.2.2             The Interface File
             9.2.2.3             The Host Name File
             9.2.2.4             The DHCPTAGS. File
         9.2.3         Command Files
         9.2.4         System Logicals
         9.2.5         Log Files
     9.3     DHCP Client Startup and Shutdown
     9.4     Configuring the DHCP Client
         9.4.1         Putting Interfaces under DHCP Control
             9.4.1.1             Using Autoconfigure for a New TCP/IP Installation
             9.4.1.2             Using TCPIP$CONFIG to Configure an Existing Installation
         9.4.2         Configuring the Software
         9.4.3         Configuring a Cluster Environment
         9.4.4         Signaling the DHCP Client
     9.5     TCP/IP Management Commands
         9.5.1         Temporarily Configuring Interfaces
         9.5.2         Permanently Configuring Interfaces
     9.6     Using the SHOWDHC Utility
Chapter 10
10 Configuring and Managing BOOTP
     10.1     Key Concepts
     10.2     BOOTP Planning and Preconfiguration Tasks
         10.2.1         Network Configuration Decisions
         10.2.2         BOOTP Service Decisions
         10.2.3         BOOTP Security
     10.3     Configuring the BOOTP Service
     10.4     Managing the BOOTP Service
         10.4.1         Enabling and Disabling BOOTP
         10.4.2         BOOTP Management Commands
         10.4.3         BOOTP Logical Names
         10.4.4         BOOTP Startup and Shutdown
     10.5     Creating a BOOTP Database
         10.5.1         Populating the BOOTP Database
         10.5.2         Converting UNIX Records
         10.5.3         Creating Individual Entries
         10.5.4         Modifying and Deleting Entries
     10.6     Solving BOOTP Problems
Chapter 11
11 Configuring and Managing TFTP
     11.1     Key Concepts
     11.2     Setting up the TFTP Service
         11.2.1         Transferring Data to the TFTP Host
         11.2.2         TFTP Management Commands
         11.2.3         TFTP Logical Names
         11.2.4         TFTP Startup and Shutdown
         11.2.5         Enabling and Disabling TFTP
     11.3     TFTP Security
     11.4     Solving TFTP Problems
Chapter 12
12 Configuring and Managing the Portmapper
     12.1     Configuring Services to Use the Portmapper
     12.2     Portmapper Startup and Shutdown
     12.3     Displaying Portmapper Information
Chapter 13
13 Configuring and Managing NTP
     13.1     Key Concepts
         13.1.1         Time Distributed Through a Hierarchy of Servers
         13.1.2         How Hosts Negotiate Synchronization
         13.1.3         How the OpenVMS System Maintains the System Clock
         13.1.4         How NTP Makes Adjustments to System Time
         13.1.5         Configuring the Local Host
     13.2     Manycast Mode
         13.2.1         Manycast Options
     13.3     NTP Service Startup and Shutdown
     13.4     Configuring Your NTP Host
         13.4.1         Creating the Configuration File
         13.4.2         Configuration Statements and Options
             13.4.2.1             NTP Monitoring Options
             13.4.2.2             Access Control Options
                 13.4.2.2.1                 The Kiss-of-Death Packet
                 13.4.2.2.2                 Access Control Statements and Flags
             13.4.2.3             Sample NTP Configuration File
         13.4.3         Using NTP with Another Time Service
     13.5     Configuring NTP as Backup Time Server
     13.6     NTP Event Logging
         13.6.1         Sample NTP Log Files
     13.7     NTP Authentication Support
         13.7.1         Symmetric Key Cryptography
         13.7.2         Public Key Cryptography
             13.7.2.1             Autokey Protocol
             13.7.2.2             Certificate Trails
             13.7.2.3             Secure Groups
             13.7.2.4             Identity Schemes
         13.7.3         Naming and Addressing
         13.7.4         Operation
         13.7.5         Key Management
         13.7.6         Authentication Statements and Commands
         13.7.7         Error Code
         13.7.8         Leapseconds Table
         13.7.9         Configuring Autokey
             13.7.9.1             Client/Server Setup Procedure
                 13.7.9.1.1                 Using The Default TC Identity Scheme (Method 1)
                 13.7.9.1.2                 Using The Default TC Identity Scheme (Method 2)
                 13.7.9.1.3                 Using The PC Identity Scheme
                 13.7.9.1.4                 Using The IFF Scheme
                 13.7.9.1.5                 Using The Alternate IFF Scheme
                 13.7.9.1.6                 Using the GQ scheme
                 13.7.9.1.7                 Using the MV scheme
                 13.7.9.1.8                 Broadcast and Multicast Autokey
                 13.7.9.1.9                 Monitoring Authentication Status
             13.7.9.2             Updating the Client and Server Parameters
     13.8     NTP Utilities
         13.8.1         Setting the Date and Time with NTPDATE
         13.8.2         Tracing a Time Source with NTPTRACE
         13.8.3         Making Run-Time Requests with NTPDC
             13.8.3.1             NTPDC Interactive Commands
             13.8.3.2             NTPDC Control Message Commands
             13.8.3.3             NTPDC Request Commands
         13.8.4         Querying the NTP Server with NTPQ
             13.8.4.1             NTPQ Control Message Commands
     13.9     Generating Public and Private Keys with ntp_keygen
         13.9.1         Synopsis
         13.9.2         Running ntp_keygen
         13.9.3         Random Seed File
         13.9.4         Trusted Hosts and Groups
         13.9.5         Identity Schemes
         13.9.6         Cryptographic Data Files
         13.9.7         Generating Symmetric Keys
             13.9.7.1             Authentication Key Format
     13.10     Solving NTP Problems
         13.10.1         NTP Debugging Techniques
             13.10.1.1             Initial Startup
             13.10.1.2             Verifying Correct Operation
             13.10.1.3             Special Problems
             13.10.1.4             Debugging Checklist


Previous Next Contents Index