HP TCP/IP Services for OpenVMS
Management


Previous Contents Index

Chapter 14
14 Configuring and Managing SNMP
     14.1     Key Concepts
         14.1.1         Understanding How SNMP Operates
         14.1.2         Ensuring Access to Mounted Data
     14.2     Managing the SNMP Service
     14.3     Verifying the SNMP Installation
         14.3.1         SNMP Executable and Command Files
     14.4     Configuring SNMP
         14.4.1         Initial SNMP Configuration
         14.4.2         Displaying the Current SNMP Configuration
         14.4.3         SNMP Options
             14.4.3.1             Using Logical Names to Configure SNMP
             14.4.3.2             Dynamic Options
             14.4.3.3             Modifying the Configuration File
             14.4.3.4             SNMP Configuration Options
     14.5     SNMP Log Files
     14.6     Solving SNMP Problems
         14.6.1         Multiple SNMP Processes Displayed for SHOW SYSTEM Command
         14.6.2         Problems Starting and Stopping SNMP Processes
         14.6.3         Restarting MIB Subagent Processes
         14.6.4         Obtaining Trace Log Messages
         14.6.5         Processing Set Requests and Traps
             14.6.5.1             Enabling Set Request Processing and Authentication Traps
             14.6.5.2             Displaying Configuration Information
                 14.6.5.2.1                 Specifying Location and Contact Information
                 14.6.5.2.2                 Verifying Community Information
             14.6.5.3             Enabling SNMP Version 1 Traps
         14.6.6         Solving Management Client Response Problems
             14.6.6.1             Solving Timeout Problems with SNMP Subagents
         14.6.7         Disabling SNMP OPCOM Messages
Part 4
Part 4 Configuring Network Applications
Chapter 15
15 Configuring and Managing TELNET
     15.1     Managing TELNET
         15.1.1         TELNET Startup and Shutdown
         15.1.2         Managing TELNET with Logical Names
         15.1.3         Setting Up User Accounts
         15.1.4         Creating and Deleting Sessions
         15.1.5         Displaying Login Messages
         15.1.6         TELNET Client (TN3270)
         15.1.7         Configuring and Managing the Kerberos TELNET Server
             15.1.7.1             Configuring the Kerberos TELNET Server
             15.1.7.2             Connecting to the Kerberos TELNET Server
         15.1.8         Kerberos Principal Names
     15.2     Solving TELNET Problems
         15.2.1         TELNET Characteristics That Affect Performance
         15.2.2         Requests That Cannot Be Satisfied
Chapter 16
16 Configuring and Managing FTP
     16.1     Managing FTP
         16.1.1         Enabling and Disabling FTP
         16.1.2         FTP Startup and Shutdown
         16.1.3         Configuring Anonymous FTP
             16.1.3.1             Concealed File Systems
             16.1.3.2             Setting Up Anonymous FTP
         16.1.4         Managing FTP with Logical Names
             16.1.4.1             FTP Log Files
     16.2     Solving FTP Problems
         16.2.1         Illegal Command Error
         16.2.2         Performance
             16.2.2.1             Buffer Sizes
             16.2.2.2             File Allocation and Extension Sizes
             16.2.2.3             Inactivity Timer
Chapter 17
17 Remote (R) Commands
     17.1     Key Concepts
     17.2     Managing the R Command Servers
         17.2.1         R Command Server Startup and Shutdown
         17.2.2         Managing RLOGIN with Logical Names
     17.3     Security Considerations
         17.3.1         Registering Remote Users
         17.3.2         Case-Sensitivity Flag
     17.4     Creating a Welcome Message
     17.5     Remote Magnetic Tape and Remote CD-ROM (RMT/RCD)
         17.5.1         Preparing Drives for Remote Mounts
         17.5.2         Client Utilities
         17.5.3         Client Examples
Chapter 18
18 Configuring and Managing SMTP
     18.1     Key Concepts
         18.1.1         How SMTP Clients and Servers Communicate
         18.1.2         Understanding the SMTP Control File
         18.1.3         Understanding OpenVMS Sender Headers
         18.1.4         Understanding SMTP Addresses
         18.1.5         How SMTP Routes Mail
             18.1.5.1             Using MX Records
             18.1.5.2             Using SMTP Zones and Alternate Gateways
     18.2     Configuring SMTP
         18.2.1         Mail Utility Files
         18.2.2         Creating a Postmaster Account
     18.3     Creating a Local Alias File
     18.4     Managing SMTP
         18.4.1         Displaying Mail Queues
         18.4.2         Changing the Number of Mail Queues
         18.4.3         Displaying SMTP Routing Information
         18.4.4         SMTP Logging
         18.4.5         Starting and Stopping SMTP
     18.5     Modifying the SMTP Configuration
         18.5.1         Defining SMTP Logical Names
         18.5.2         SMTP Logical Names
     18.6     Configuring SMTP Antispam
         18.6.1         Enabling and Managing SMTP Antispam
             18.6.1.1             SMTP Antispam Field Names
         18.6.2         Preventing Spam Route-Through
             18.6.2.1             Specifying the Good-Clients List
             18.6.2.2             Processing DNS Entries in the Good-Clients List
             18.6.2.3             Mail Relay to MX Gateways
             18.6.2.4             Specifying the Relay-Zones List
             18.6.2.5             Examples of Specifying Good-Clients and Relay-Zones
         18.6.3         Blocking Mail from Specified Clients
             18.6.3.1             Resolving Conflicts between Bad-Clients and Good-Clients
         18.6.4         Real-Time Black Hole Lists (RBL)
         18.6.5         Translating Client IP Addresses
         18.6.6         Blocking Mail from Specified Senders
         18.6.7         Specifying Handling of Spam Events
             18.6.7.1             Reporting Spam Events
             18.6.7.2             Configuring Spam Security
             18.6.7.3             Specifying the Spam Rejection Text
     18.7     Managing SMTP Send-From-File (SFF)
         18.7.1         SFF Security Measures
         18.7.2         Invoking SFF from an Application
         18.7.3         Invoking SFF from DCL
     18.8     Disabling SMTP Outbound Alias
     18.9     Solving SMTP Problems
         18.9.1         Verifying SMTP Control Files
         18.9.2         Slow Antispam Checking


Previous Next Contents Index