HP TCP/IP Services for OpenVMS
Management
Previous
Contents
Index
Chapter 14
14
Configuring and Managing SNMP
14.1
Key Concepts
14.1.1
Understanding How SNMP Operates
14.1.2
Ensuring Access to Mounted Data
14.2
Managing the SNMP Service
14.3
Verifying the SNMP Installation
14.3.1
SNMP Executable and Command Files
14.4
Configuring SNMP
14.4.1
Initial SNMP Configuration
14.4.2
Displaying the Current SNMP Configuration
14.4.3
SNMP Options
14.4.3.1
Using Logical Names to Configure SNMP
14.4.3.2
Dynamic Options
14.4.3.3
Modifying the Configuration File
14.4.3.4
SNMP Configuration Options
14.5
SNMP Log Files
14.6
Solving SNMP Problems
14.6.1
Multiple SNMP Processes Displayed for SHOW SYSTEM Command
14.6.2
Problems Starting and Stopping SNMP Processes
14.6.3
Restarting MIB Subagent Processes
14.6.4
Obtaining Trace Log Messages
14.6.5
Processing Set Requests and Traps
14.6.5.1
Enabling Set Request Processing and Authentication Traps
14.6.5.2
Displaying Configuration Information
14.6.5.2.1
Specifying Location and Contact Information
14.6.5.2.2
Verifying Community Information
14.6.5.3
Enabling SNMP Version 1 Traps
14.6.6
Solving Management Client Response Problems
14.6.6.1
Solving Timeout Problems with SNMP Subagents
14.6.7
Disabling SNMP OPCOM Messages
Part 4
Part 4
Configuring Network Applications
Chapter 15
15
Configuring and Managing TELNET
15.1
Managing TELNET
15.1.1
TELNET Startup and Shutdown
15.1.2
Managing TELNET with Logical Names
15.1.3
Setting Up User Accounts
15.1.4
Creating and Deleting Sessions
15.1.5
Displaying Login Messages
15.1.6
TELNET Client (TN3270)
15.1.7
Configuring and Managing the Kerberos TELNET Server
15.1.7.1
Configuring the Kerberos TELNET Server
15.1.7.2
Connecting to the Kerberos TELNET Server
15.1.8
Kerberos Principal Names
15.2
Solving TELNET Problems
15.2.1
TELNET Characteristics That Affect Performance
15.2.2
Requests That Cannot Be Satisfied
Chapter 16
16
Configuring and Managing FTP
16.1
Managing FTP
16.1.1
Enabling and Disabling FTP
16.1.2
FTP Startup and Shutdown
16.1.3
Configuring Anonymous FTP
16.1.3.1
Concealed File Systems
16.1.3.2
Setting Up Anonymous FTP
16.1.4
Managing FTP with Logical Names
16.1.4.1
FTP Log Files
16.2
Solving FTP Problems
16.2.1
Illegal Command Error
16.2.2
Performance
16.2.2.1
Buffer Sizes
16.2.2.2
File Allocation and Extension Sizes
16.2.2.3
Inactivity Timer
Chapter 17
17
Remote (R) Commands
17.1
Key Concepts
17.2
Managing the R Command Servers
17.2.1
R Command Server Startup and Shutdown
17.2.2
Managing RLOGIN with Logical Names
17.3
Security Considerations
17.3.1
Registering Remote Users
17.3.2
Case-Sensitivity Flag
17.4
Creating a Welcome Message
17.5
Remote Magnetic Tape and Remote CD-ROM (RMT/RCD)
17.5.1
Preparing Drives for Remote Mounts
17.5.2
Client Utilities
17.5.3
Client Examples
Chapter 18
18
Configuring and Managing SMTP
18.1
Key Concepts
18.1.1
How SMTP Clients and Servers Communicate
18.1.2
Understanding the SMTP Control File
18.1.3
Understanding OpenVMS Sender Headers
18.1.4
Understanding SMTP Addresses
18.1.5
How SMTP Routes Mail
18.1.5.1
Using MX Records
18.1.5.2
Using SMTP Zones and Alternate Gateways
18.2
Configuring SMTP
18.2.1
Mail Utility Files
18.2.2
Creating a Postmaster Account
18.3
Creating a Local Alias File
18.4
Managing SMTP
18.4.1
Displaying Mail Queues
18.4.2
Changing the Number of Mail Queues
18.4.3
Displaying SMTP Routing Information
18.4.4
SMTP Logging
18.4.5
Starting and Stopping SMTP
18.5
Modifying the SMTP Configuration
18.5.1
Defining SMTP Logical Names
18.5.2
SMTP Logical Names
18.6
Configuring SMTP Antispam
18.6.1
Enabling and Managing SMTP Antispam
18.6.1.1
SMTP Antispam Field Names
18.6.2
Preventing Spam Route-Through
18.6.2.1
Specifying the Good-Clients List
18.6.2.2
Processing DNS Entries in the Good-Clients List
18.6.2.3
Mail Relay to MX Gateways
18.6.2.4
Specifying the Relay-Zones List
18.6.2.5
Examples of Specifying Good-Clients and Relay-Zones
18.6.3
Blocking Mail from Specified Clients
18.6.3.1
Resolving Conflicts between Bad-Clients and Good-Clients
18.6.4
Real-Time Black Hole Lists (RBL)
18.6.5
Translating Client IP Addresses
18.6.6
Blocking Mail from Specified Senders
18.6.7
Specifying Handling of Spam Events
18.6.7.1
Reporting Spam Events
18.6.7.2
Configuring Spam Security
18.6.7.3
Specifying the Spam Rejection Text
18.7
Managing SMTP Send-From-File (SFF)
18.7.1
SFF Security Measures
18.7.2
Invoking SFF from an Application
18.7.3
Invoking SFF from DCL
18.8
Disabling SMTP Outbound Alias
18.9
Solving SMTP Problems
18.9.1
Verifying SMTP Control Files
18.9.2
Slow Antispam Checking
Previous
Next
Contents
Index