HP OpenVMS Systems Documentation

Content starts here

HP TCP/IP Services for OpenVMS

Previous Contents Index

Chapter 9
9 Configuring and Managing the DHCP Client
     9.1     Key Concepts
         9.1.1         Designating the Primary Interface
         9.1.2         Requesting a Lease
         9.1.3         Requesting Parameters
         9.1.4         Understanding How the DHCP Client Operates
     9.2     DHCP Client Components
         9.2.1         Executable Files
         9.2.2         Configuration Files
                Client Configuration File
                The Interface File
                The Host Name File
                The DHCPTAGS. File
         9.2.3         Command Files
         9.2.4         System Logicals
         9.2.5         Log Files
     9.3     DHCP Client Startup and Shutdown
     9.4     Configuring the DHCP Client
         9.4.1         Putting Interfaces under DHCP Control
                Using Autoconfigure for a New TCP/IP Installation
                Using TCPIP$CONFIG to Configure an Existing Installation
         9.4.2         Configuring the Software
         9.4.3         Configuring a Cluster Environment
         9.4.4         Signaling the DHCP Client
     9.5     TCP/IP Management Commands
         9.5.1         Temporarily Configuring Interfaces
         9.5.2         Permanently Configuring Interfaces
     9.6     Using the SHOWDHC Utility
Chapter 10
10 Configuring and Managing BOOTP
     10.1     Key Concepts
     10.2     BOOTP Planning and Preconfiguration Tasks
         10.2.1         Network Configuration Decisions
         10.2.2         BOOTP Service Decisions
         10.2.3         BOOTP Security
     10.3     Configuring the BOOTP Service
     10.4     Managing the BOOTP Service
         10.4.1         Enabling and Disabling BOOTP
         10.4.2         BOOTP Management Commands
         10.4.3         BOOTP Logical Names
         10.4.4         BOOTP Startup and Shutdown
     10.5     Creating a BOOTP Database
         10.5.1         Populating the BOOTP Database
         10.5.2         Converting UNIX Records
         10.5.3         Creating Individual Entries
         10.5.4         Modifying and Deleting Entries
     10.6     Solving BOOTP Problems
Chapter 11
11 Configuring and Managing TFTP
     11.1     Key Concepts
     11.2     Setting up the TFTP Service
         11.2.1         Transferring Data to the TFTP Host
         11.2.2         TFTP Management Commands
         11.2.3         TFTP Logical Names
         11.2.4         TFTP Startup and Shutdown
         11.2.5         Enabling and Disabling TFTP
     11.3     TFTP Security
     11.4     Solving TFTP Problems
Chapter 12
12 Configuring and Managing the Portmapper
     12.1     Configuring Services to Use the Portmapper
     12.2     Portmapper Startup and Shutdown
     12.3     Displaying Portmapper Information
Chapter 13
13 Configuring and Managing NTP
     13.1     Key Concepts
         13.1.1         Time Distributed Through a Hierarchy of Servers
         13.1.2         How Hosts Negotiate Synchronization
         13.1.3         How the OpenVMS System Maintains the System Clock
         13.1.4         How NTP Makes Adjustments to System Time
         13.1.5         Configuring the Local Host
     13.2     Manycast Mode
         13.2.1         Manycast Options
     13.3     NTP Service Startup and Shutdown
     13.4     Configuring Your NTP Host
         13.4.1         Creating the Configuration File
         13.4.2         Configuration Statements and Options
                NTP Monitoring Options
                Access Control Options
                        The Kiss-of-Death Packet
                        Access Control Statements and Flags
                Sample NTP Configuration File
         13.4.3         Using NTP with Another Time Service
     13.5     Configuring NTP as Backup Time Server
     13.6     NTP Event Logging
         13.6.1         Sample NTP Log Files
     13.7     NTP Authentication Support
         13.7.1         Symmetric Key Cryptography
         13.7.2         Public Key Cryptography
                Autokey Protocol
                Certificate Trails
                Secure Groups
                Identity Schemes
         13.7.3         Naming and Addressing
         13.7.4         Operation
         13.7.5         Key Management
         13.7.6         Authentication Statements and Commands
         13.7.7         Error Code
         13.7.8         Leapseconds Table
         13.7.9         Configuring Autokey
                Client/Server Setup Procedure
                        Using The Default TC Identity Scheme (Method 1)
                        Using The Default TC Identity Scheme (Method 2)
                        Using The PC Identity Scheme
                        Using The IFF Scheme
                        Using The Alternate IFF Scheme
                        Using the GQ scheme
                        Using the MV scheme
                        Broadcast and Multicast Autokey
                        Monitoring Authentication Status
                Updating the Client and Server Parameters
     13.8     NTP Utilities
         13.8.1         Setting the Date and Time with NTPDATE
         13.8.2         Tracing a Time Source with NTPTRACE
         13.8.3         Making Run-Time Requests with NTPDC
                NTPDC Interactive Commands
                NTPDC Control Message Commands
                NTPDC Request Commands
         13.8.4         Querying the NTP Server with NTPQ
                NTPQ Control Message Commands
     13.9     Generating Public and Private Keys with ntp_keygen
         13.9.1         Synopsis
         13.9.2         Running ntp_keygen
         13.9.3         Random Seed File
         13.9.4         Trusted Hosts and Groups
         13.9.5         Identity Schemes
         13.9.6         Cryptographic Data Files
         13.9.7         Generating Symmetric Keys
                Authentication Key Format
     13.10     Solving NTP Problems
         13.10.1         NTP Debugging Techniques
                Initial Startup
                Verifying Correct Operation
                Special Problems
                Debugging Checklist

Previous Next Contents Index