About This Manual Part 1: Management Information 1 Overview to Network Administration 2 Basic Network Connections 3 Dynamic Host Configuration Protocol 4 Point-to-Point Connections 5 Local Area Transport Connections 6 BIND Service 7 Network Information Service 8 Network File System 9 UNIX-to-UNIX Copy Program 10 Network Time Protocol 11 Mail System 12 Simple Network Management Protocol Agent Part2: Problem Solving Information 13 Solving Network and Network Services Problems 14 Using the Problem Solving Tools 15 Testing BIND Servers 16 Reporting Network Problems B Monitoring the Network Interfaces C Writing automount Maps D NIS ypservers Update Scripts E NFS Error Messages F uucp Messages H Host Resources MIB Implementation
Table of Contents
Audience
New and Changed Features
Organization
Related Documents
Reader's Comments
Conventions
2.1 The Network Environment
2.2 Preparing for the Configuration
2.2.1 Information for Interfaces and Daemons
2.2.1.1 Network Interfaces
2.2.1.2 Token Ring Interface
2.2.1.3 rwhod daemon
2.2.1.4 Routed
2.2.1.5 Gateways File
2.2.1.6 Gated
2.2.1.7 IP Router
2.2.2 Information for Network Files
2.2.2.1 Static Routes file (/etc/routes)
2.2.2.2 Host file (/etc/hosts)
2.2.2.3 hosts.equiv file
2.2.2.4 Networks file (/etc/networks)
2.3 Configuring the Network Components
2.3.1 Configuring Network Interfaces
2.3.2 Configuring the Rwho Daemon
2.3.3 Configuring the Route Daemon
2.3.4 Configuring the gated Daemon
2.3.5 Configuring the System as an IP Router
2.3.6 Configuring the Static Routes File
2.3.7 Configuring the hosts File
2.3.8 Configuring the hosts.equiv File
2.3.9 Configuring the networks File
2.4 Enabling Access Filtering on an Interface
2.5 Monitoring the Local Host's Status
2.6 Displaying and Modifying the FDDI Parameters
2.7 Managing Token Ring Source Routing
2.8 Displaying and Modifying the Token Ring IP MTU Size
3.1 The DHCP Environment
3.1.1 DHCP Parameter Assignment
3.1.2 DHCP and Security
3.2 DHCP Planning
3.2.1 Verifying that the DHCP Software is Installed
3.2.2 Preparing for the Configuration
3.2.2.1 Information for Server Parameters
3.2.2.1.1 IP Ranges
3.2.2.1.2 Host name list
3.2.2.2 Information for Basic DHCP Parameters
3.3 Configuring a DHCP Server
3.3.1 Configuring Server Parameters
3.3.2 Configuring IP Ranges
3.3.3 Configuring Hostname Lists
3.3.4 Configuring a Subnet
3.3.5 Configuring a DHCP Client Node
3.3.6 Setting Group Parameters
3.4 Starting the DHCP Server
3.5 Starting the DHCP Client
3.6 Monitoring DHCP Client Configuration
3.7 Mapping Client IP Addresses Permanently
3.8 Restricting Access to the DHCP Server
3.9 Configuring a BOOTP Client
3.10 Disabling DHCP Address Assignment
3.11 Solving DHCP Problems
4.1 Serial Line Internet Protocol (SLIP)
4.1.1 The SLIP Environment
4.1.2 SLIP Planning
4.1.2.1 Verifying the Correct Hardware
4.1.2.2 Preparing for the Configuration
4.1.3 Configuring SLIP
4.1.3.1 Configuring a Dial-In System
4.1.3.2 Configuring a Dial-Out System
4.1.4 Terminating a SLIP Dial-Out Connection
4.2 Point-to-Point Protocol (PPP)
4.2.1 PPP Environment
4.2.1.1 PPP Options
4.2.1.2 Authentication
4.2.2 PPP Planning
4.2.2.1 Verifying the Correct Hardware
4.2.2.2 Verifying PPP Support in the Kernel
4.2.2.3 Preparing for Configuration
4.2.3 Establishing a PPP Connection
4.2.3.1 Establishing a Dial-Out Connection Manually
4.2.3.2 Establishing a Dial-Out Connection Automatically
4.2.3.3 Configuring Dial-In Connections
4.2.4 Terminating PPP Connections
4.3 Guidelines for Using Modems
4.3.1 Using the Correct Modem Cables
4.3.2 Configuring a System for Dial-In Access
4.3.3 Configuring Your System for Dial-Out Access
5.1 The LAT Environment
5.1.1 Types of LAT Connections
5.1.2 Controlling Access in a LAT Network
5.1.3 Specifying Passwords for Remote Services
5.1.4 Load Balancing
5.2 LAT Planning
5.2.1 Verifying that the LAT Subset is Installed
5.2.2 Verifying DLB Support in the Kernel
5.2.3 Preparing for the Configuration
5.3 Configuring LAT
5.4 Starting and Stopping LAT
5.5 Creating a LAT Startup File
5.6 Customizing the inittab File
5.7 Running LAT Over Specific Network Adapters
5.8 Setting Up Printers
5.8.1 Setting Up the Printer on a Terminal Server
5.8.2 Testing the Port Configuration
5.8.3 Setting Up a Service Node for the Printer
5.8.4 Setting Up the Print Spooler on the Service Node
5.8.5 Testing the Printer
5.9 Setting Up Host-Initiated Connections
5.9.1 Setting Up the System for Host-Initiated Connections
5.9.2 The Program Interface
5.10 Setting Up Outgoing Connections
5.10.1 Setting Up the System for Outgoing Connections
5.10.2 The Program Interface
5.11 Setting Up the LAT/Telnet Gateway
5.12 Creating Your Own Dedicated or Optional Service
5.13 Providing a Dedicated tty Device on a Terminal
5.13.1 Setting Up a Dedicated tty Device
5.13.2 Removing a Dedicated tty Device
6.1 The BIND Environment
6.2 BIND Planning
6.2.1 Server
6.2.2 Client
6.3 Configuring BIND
6.3.1 Configuring a BIND Server
6.3.2 Configuring a BIND Client
6.4 Modifying the svc.conf File with svcsetup
6.5 Updating BIND Data Files on the Primary Server
6.6 Obtaining Host Name and IP Address Information
6.6.1 The nslookup Command
6.6.2 The NIC whois Service
7.1 The NIS Environment
7.2 NIS Planning
7.2.1 Verifying That the Additional Networking Services Subset is Installed
7.2.2 Preparing for the Configuration
7.2.2.1 Master Server
7.2.2.2 Slave Server
7.2.2.3 Client
7.3 Configuring NIS
7.3.1 Configuring a NIS Master Server
7.3.2 Configuring a Slave Server
7.3.3 Configuring an NIS Client
7.3.4 Modifying the svc.conf File with svcsetup
7.3.5 Modifying or Removing an NIS Configuration
7.4 Managing an NIS Server
7.4.1 Adding an NIS Slave Server to a Domain
7.4.2 Removing an NIS Slave Server from the Domain
7.4.3 Adding a New User to an NIS Domain
7.4.4 Updating an NIS Map
7.4.5 Adding an NIS Map to a Domain
7.4.6 Removing an NIS Map from a Domain
7.4.7 Modifying the /var/yp/Makefile File
7.4.7.1 Adding an Entry
7.4.7.2 Deleting an Entry
7.4.7.3 Makefile Editing Guidelines
7.4.8 Restricting Access to NIS Data
7.5 Managing an NIS Client
7.5.1 Changing an NIS Password
7.5.2 Obtaining NIS Map Information
8.1 The NFS Environment
8.1.1 Distributing the hosts Database
8.1.2 Automount and NFS
8.1.2.1 NIS and automount Maps
8.1.2.2 Local automount Maps
8.2 NFS Planning
8.2.1 Server
8.2.2 Client
8.3 Configuring NFS
8.3.1 Configuring an NFS Server
8.3.2 Configuring an NFS Client
8.4 Managing an NFS Server
8.4.1 Exporting a File System or Directory
8.4.1.1 Exporting a File System with the NFS Configuration Application
8.4.1.2 Exporting a File System Manually
8.4.1.3 Export Guidelines
8.4.2 Halting Export of a Directory or File System
8.4.3 Enabling Client Superuser Access to Files
8.4.4 Sending Mail to Superuser (root) Across NFS
8.4.5 Enabling Port Monitoring
8.4.6 Monitoring the NFS Load
8.5 Managing an NFS Client
8.5.1 Mounting a Remote File System or Directory
8.5.1.1 Mounting a Remote File System using NFS Configuration Application
8.5.1.2 Mounting a Remote File System Manually
8.5.1.3 Mounting a Remote File System Automatically
8.5.1.4 Mount Command Options
8.5.1.5 Using automount to Mount a Remote File System
8.5.1.6 Specifying automount Arguments
8.5.2 Unmounting a Remote File System or Directory
9.1 The UUCP Environment
9.2 UUCP Planning
9.2.1 Verifying the Correct Hardware
9.2.2 Preparing for the Configuration
9.2.2.1 Information for Connections
9.2.2.2 Information for Outgoing Systems
9.2.2.3 Information for Incoming Systems
9.3 Configuring UUCP
9.3.1 Configuring Connections
9.3.2 Configuring Outgoing Systems
9.3.3 Configuring Incoming Systems
9.3.4 Configuring the Poll File
9.4 Monitoring the File Transfer Queue
9.4.1 Getting Queue Status Manually
9.4.2 Getting Queue Status Automatically
9.4.3 Guidelines for Checking Queue Status
9.5 Cleaning Up the Spooling Directories
9.5.1 Cleaning Up Directories Manually
9.5.2 Cleaning Up Directories Automatically
9.5.3 Guidelines for Removing Files
9.6 Viewing Log Files
9.7 Cleaning Up sulog and cron/log Files
9.8 Limiting the Number of Remote Executions
9.9 Scheduling Work in the Spooling Directory
9.9.1 Starting uusched Manually
9.9.2 Starting uusched Automatically
9.10 Calling File Transfer Programs (uudemon.hour)
9.11 Polling Remote Systems (uudemon.poll)
10.1 The NTP Environment
10.1.1 Selecting Internet Servers
10.2 NTP Planning
10.2.1 Server Information
10.2.2 Client Information
10.3 Configuring NTP
10.4 Monitoring Hosts Running the xntpd Daemon
10.5 Monitoring Hosts Running the ntpd Daemon
10.6 Querying Servers Running NTP
11.1 The Mail Environment
11.1.1 Directing Outgoing Mail to Servers
11.1.2 Handling Incoming Mail to the Domain
11.1.3 Delivering Mail to Clients
11.1.4 Distributing the aliases File
11.1.5 Distributing the passwd File
11.1.6 Handling DECnet Mail
11.2 Mail System Planning
11.2.1 Verifying that Required Protocols are Installed
11.2.2 Verifying that Required Services are Configured
11.2.3 Preparing for the Configuration
11.2.3.1 General System Information
11.2.3.2 Protocol Information
11.3 Configuring Mail
11.3.1 Configuring a Standalone Mail System
11.3.2 Configuring a Mail Client
11.3.3 Configuring a Mail Server
11.4 Mail Utilities
11.5 Monitoring the Mail Queue
11.6 Archiving the Mail Queue
11.7 Administering and Distributing Alias Information
11.8 Display Mail Statistics
11.9 Adding a New Mail Host
12.1 The SNMP Environment
13.1 Using the Diagnostic Map
13.2 Getting Started
13.3 Solving Network Problems
13.4 Solving BIND Server Problems
13.5 Solving BIND Client Problems
13.6 Solving NIS Server Problems
13.7 Solving NIS Client Problems
13.8 Solving NFS Server Problems
13.9 Solving NFS Client Problems
13.10 Solving UUCP Problems
13.11 Solving NTP Problems
13.12 Solving SLIP Problems
13.13 Solving PPP Problems
13.14 Solving LAT Problems
13.15 Solving sendmail Problems
14.1 Testing Reachability of Network Hosts on the Internet Network
14.2 Displaying and Modifying the Internet to Ethernet Translation Tables
14.3 Displaying a Datagrams's Route to a Network Host
14.4 Displaying Headers of Packets on the Network
14.5 Testing a UUCP Remote Connection
14.6 Monitoring a File Transfer
14.7 Viewing the Error Log File
14.8 Viewing the syslogd Daemon Message Files
15.1 Glossary
15.2 Starting the BIND Server Testing
15.3 Determining the Server Type
15.4 Finding the Target Domain Information
15.5 Testing the Forwarders
15.6 Testing Secondary Authoritative Servers
15.7 Testing Primary Authoritative Servers
15.8 Tracing Information from the Root Name Server
15.9 Resolving Target Data
15.10 Finding the First Nonexistent Domain
16.1 Gathering Information
16.1.1 General Information
16.1.2 Hardware Architecture
16.1.3 Software Architecture
B.1 Monitoring the Ethernet Interface
B.2 Monitoring the FDDI Interface
B.2.1 FDDI Counters
B.2.2 FDDI Status
B.2.3 FDDI Characteristics
B.3 Monitoring the Token Ring Interface
B.3.1 Token Ring Counters
B.3.2 Token Ring and Host Information
C.1 Substitution and Pattern Matching
C.2 Environment Variables
C.3 Mounting File Systems
C.3.1 Multiple Mounts
C.3.2 Shared Mounts
C.3.3 Replicated File Systems
D.1 Add Slave Server Script
D.2 Remove Slave Server Script
E.1 Server Error Messages
E.2 Client Error Messages
E.2.1 Remote Mount Error Messages
E.2.2 automount Error Messages
E.2.3 Console Error Messages
F.1 Status and Log File Messages
F.2 tip Error Messages
H.1 Digital UNIX Implementation Summary
H.2 The System Group
H.3 The Storage Group
H.4 The Device Tables
H.5 The File System Table
H.6 The Running Software Tables
Examples
3-1 Sample DHCP Log File Message
5-1 Sample /etc/latstartup.conf File
6-1 Sample /etc/hosts File
C-1 Multiple Mounts in a Direct Map
C-2 Multiple Mounts and Shared Mounts in a Direct Map
C-3 Multiple Mounts, Shared Mounts, and Replicated File Systems in a Direct Map
C-4 Simple Indirect Map
C-5 Multiple Mounts in an Indirect Map
C-6 Multiple Mounts and Shared Mounts in an Indirect Map
C-7 Multiple Mounts, Shared Mounts, and Replicated File Systems in an Indirect Map