Chapter 14 |
14
|
Configuring and Managing SNMP
|
14.1
|
Key Concepts
|
14.1.1
|
Understanding How SNMP Operates
|
14.1.2
|
Ensuring Access to Mounted Data
|
14.2
|
Managing the SNMP Service
|
14.3
|
Verifying the SNMP Installation
|
14.3.1
|
SNMP Executable and Command Files
|
14.4
|
Configuring SNMP
|
14.4.1
|
Initial SNMP Configuration
|
14.4.2
|
Displaying the Current SNMP Configuration
|
14.4.3
|
SNMP Options
|
14.4.3.1
|
Using Logical Names to Configure SNMP
|
14.4.3.2
|
Dynamic Options
|
14.4.3.3
|
Modifying the Configuration File
|
14.4.3.4
|
SNMP Configuration Options
|
14.5
|
SNMP Log Files
|
14.6
|
Solving SNMP Problems
|
14.6.1
|
Multiple SNMP Processes Displayed for SHOW SYSTEM Command
|
14.6.2
|
Problems Starting and Stopping SNMP Processes
|
14.6.3
|
Restarting MIB Subagent Processes
|
14.6.4
|
Obtaining Trace Log Messages
|
14.6.5
|
Processing Set Requests and Traps
|
14.6.5.1
|
Enabling Set Request Processing and Authentication Traps
|
14.6.5.2
|
Displaying Configuration Information
|
14.6.5.2.1
|
Specifying Location and Contact Information
|
14.6.5.2.2
|
Verifying Community Information
|
14.6.5.3
|
Enabling SNMP Version 1 Traps
|
14.6.6
|
Solving Management Client Response Problems
|
14.6.6.1
|
Solving Timeout Problems with SNMP Subagents
|
14.6.7
|
Disabling SNMP OPCOM Messages
|
Part 4 |
Part 4
|
Configuring Network Applications
|
Chapter 15 |
15
|
Configuring and Managing TELNET
|
15.1
|
Managing TELNET
|
15.1.1
|
TELNET Startup and Shutdown
|
15.1.2
|
Managing TELNET with Logical Names
|
15.1.3
|
Setting Up User Accounts
|
15.1.4
|
Creating and Deleting Sessions
|
15.1.5
|
Displaying Login Messages
|
15.1.6
|
TELNET Client (TN3270)
|
15.1.7
|
Configuring and Managing the Kerberos TELNET Server
|
15.1.7.1
|
Configuring the Kerberos TELNET Server
|
15.1.7.2
|
Connecting to the Kerberos TELNET Server
|
15.1.8
|
Kerberos Principal Names
|
15.2
|
Solving TELNET Problems
|
15.2.1
|
TELNET Characteristics That Affect Performance
|
15.2.2
|
Requests That Cannot Be Satisfied
|
Chapter 16 |
16
|
Configuring and Managing FTP
|
16.1
|
Managing FTP
|
16.1.1
|
Enabling and Disabling FTP
|
16.1.2
|
FTP Startup and Shutdown
|
16.1.3
|
Configuring Anonymous FTP
|
16.1.3.1
|
Concealed File Systems
|
16.1.3.2
|
Setting Up Anonymous FTP
|
16.1.4
|
Managing FTP with Logical Names
|
16.1.4.1
|
FTP Log Files
|
16.2
|
Solving FTP Problems
|
16.2.1
|
Illegal Command Error
|
16.2.2
|
Performance
|
16.2.2.1
|
Buffer Sizes
|
16.2.2.2
|
File Allocation and Extension Sizes
|
16.2.2.3
|
Inactivity Timer
|
Chapter 17 |
17
|
Remote (R) Commands
|
17.1
|
Key Concepts
|
17.2
|
Managing the R Command Servers
|
17.2.1
|
R Command Server Startup and Shutdown
|
17.2.2
|
Managing RLOGIN with Logical Names
|
17.3
|
Security Considerations
|
17.3.1
|
Registering Remote Users
|
17.3.2
|
Case-Sensitivity Flag
|
17.4
|
Creating a Welcome Message
|
17.5
|
Remote Magnetic Tape and Remote CD-ROM (RMT/RCD)
|
17.5.1
|
Preparing Drives for Remote Mounts
|
17.5.2
|
Client Utilities
|
17.5.3
|
Client Examples
|
Chapter 18 |
18
|
Configuring and Managing SMTP
|
18.1
|
Key Concepts
|
18.1.1
|
How SMTP Clients and Servers Communicate
|
18.1.2
|
Understanding the SMTP Control File
|
18.1.3
|
Understanding OpenVMS Sender Headers
|
18.1.4
|
Understanding SMTP Addresses
|
18.1.5
|
How SMTP Routes Mail
|
18.1.5.1
|
Using MX Records
|
18.1.5.2
|
Using SMTP Zones and Alternate Gateways
|
18.2
|
Configuring SMTP
|
18.2.1
|
Mail Utility Files
|
18.2.2
|
Creating a Postmaster Account
|
18.3
|
Creating a Local Alias File
|
18.4
|
Managing SMTP
|
18.4.1
|
Displaying Mail Queues
|
18.4.2
|
Changing the Number of Mail Queues
|
18.4.3
|
Displaying SMTP Routing Information
|
18.4.4
|
SMTP Logging
|
18.4.5
|
Starting and Stopping SMTP
|
18.5
|
Modifying the SMTP Configuration
|
18.5.1
|
Defining SMTP Logical Names
|
18.5.2
|
SMTP Logical Names
|
18.6
|
Configuring SMTP Antispam
|
18.6.1
|
Enabling and Managing SMTP Antispam
|
18.6.1.1
|
SMTP Antispam Field Names
|
18.6.2
|
Preventing Spam Route-Through
|
18.6.2.1
|
Specifying the Good-Clients List
|
18.6.2.2
|
Processing DNS Entries in the Good-Clients List
|
18.6.2.3
|
Mail Relay to MX Gateways
|
18.6.2.4
|
Specifying the Relay-Zones List
|
18.6.2.5
|
Examples of Specifying Good-Clients and Relay-Zones
|
18.6.3
|
Blocking Mail from Specified Clients
|
18.6.3.1
|
Resolving Conflicts between Bad-Clients and Good-Clients
|
18.6.4
|
Real-Time Black Hole Lists (RBL)
|
18.6.5
|
Translating Client IP Addresses
|
18.6.6
|
Blocking Mail from Specified Senders
|
18.6.7
|
Specifying Handling of Spam Events
|
18.6.7.1
|
Reporting Spam Events
|
18.6.7.2
|
Configuring Spam Security
|
18.6.7.3
|
Specifying the Spam Rejection Text
|
18.7
|
Managing SMTP Send-From-File (SFF)
|
18.7.1
|
SFF Security Measures
|
18.7.2
|
Invoking SFF from an Application
|
18.7.3
|
Invoking SFF from DCL
|
18.8
|
Disabling SMTP Outbound Alias
|
18.9
|
Solving SMTP Problems
|
18.9.1
|
Verifying SMTP Control Files
|
18.9.2
|
Slow Antispam Checking
|