![]() |
![]() HP OpenVMS Systems Documentation |
![]() |
DECnet-Plus for OpenVMS
|
Previous | Contents | Index |
If a remote user's connection request does not contain access control information, the following conditions must be met for proxy to be approved:
You can control the use of proxy login at the local node. Use the Authorize utility to create and modify the permanent proxy database, NETPROXY.DAT (or NET$PROXY.DAT), at your node. Each proxy database entry can map a single remote user to multiple proxy user names on the local node (one default proxy user name and up to 15 additional proxy user names). The proxy database entry identifies the user by a six-character node synonym in the form of nodename::username or nodename::[group,member]. (For information on using the Authorize utility, refer to the OpenVMS System Management Utilities Reference Manual.)
For example, to create a proxy database file at a local node and add a default proxy entry mapping user martin on remote node boston to user allen at the local node, enter the following commands:
$ set default sys$system $ run authorize uaf> create/proxy uaf> add/proxy boston::martin allen/default uaf> exit |
You must include a proxy entry for each type of node name the remote user may use. For example, a user might specify the DECdns namespace name or the local namespace as part of the node name. Include a separate entry for each case. The following example sets up three proxy entries mapping user martin at a remote node to user allen at the local node:
|
Similarly, the system manager at a remote node can create and maintain a proxy database of network users having proxy access to specific accounts on that node.
Refer to the security guide for your system and the OpenVMS System
Management Utilities Reference Manual for more information on
establishing proxy accounts.
7.3.2.2 Enabling or Disabling Incoming Proxy
The session control entity attribute incoming proxy allows you to control proxy access to your node. The session control application attribute incoming proxy allows you to control proxy access to a particular application.
If proxy access is disabled, the system treats the request as if proxy access were not requested. To disable proxy access on a systemwide basis, set the session control attribute incoming proxy to false. The following example shows the command you need to disable proxy access for a system:
ncl> set session control incoming proxy false |
For proxy access to a particular application, you must enable proxy access to both the node and the application. For example, to enable proxy access for particular applications, set the session control attribute incoming proxy to true and set the session control application attribute incoming proxy to true for those applications to which you want to allow proxy access.
The following example shows the commands you need to enable proxy access for the application cml and to disable proxy access for the application fal:
ncl> set session control incoming proxy true ncl> set session control application cml incoming proxy true ncl> set session control application fal incoming proxy false |
NCL ignores any use of the by proxy=false clause. |
For examples of setting up session control application, refer
to Appendix F.
7.3.2.3 Removing Proxy Access
You should remove proxy access to the system when it is no longer needed. Invoke the Authorize utility and enter the following command to remove proxy access:
uaf> remove/proxy boston::martin |
For information on using the Authorize utility, refer to the
OpenVMS System Management Utilities Reference Manual.
7.3.3 Specifying Default Access Control Information for Applications
Another form of access control specific to network applications is default account information used by inbound connects from remote nodes that send no access control information. Because the remote node supplies no access control information, the local node uses the default information you specify for the application to make the connection.
You can use the following command to store default access control information about the application in the session control application entity. To execute this command you need NET$SECURITY rights.
ncl> set session control application fal user name jill |
You can use the NET$CONFIGURE.COM procedure to create DECnet accounts for the fal, mail, mirror, and cml network applications.
NET$CONFIGURE.COM sets incoming and outgoing proxy to false for the MAIL application. If you already have a previous version of DECnet running, the proxy may be set to true. If you want to change the setting to false, you must either run NET$CONFIGURE and select Option 1 to recreate the Session Control Application startup script, or edit SYS$MANAGER:NET$APPLICATION_STARTUP.NCL to change the settings of these attributes to false. |
You can also use NET$CONFIGURE.COM to configure your node and request nonprivileged DECnet accounts. The following example shows how to set up nonprivileged DECnet accounts yourself:
$ set default sys$system $ run authorize uaf> add netnonpriv/password=nonpriv/device=device-name: - (1) _ /directory=[netuser]/uic=[200,200] - _ /flags=(restricted,nodisuser)/nobatch/nointeractive/lgicmd=nl: uaf> exit $ grant/identifier net$decnetaccess netnonpriv (2) $ create/directory device-name:[netuser]/owner_uic=[200,200] |
For information on using the Authorize utility, refer to the
OpenVMS System Management Utilities Reference Manual.
7.3.5 Deleting a Default Nonprivileged DECnet Account
Default nonprivileged DECnet accounts provide unrestricted, open access to DIGITAL systems. The following command example shows how to enhance the security of a system or the network by deleting these accounts:
$ set default sys$system $ run authorize uaf> remove netnonpriv uaf> exit |
For point-to-point connections, especially over dialup lines, you can use routing initialization passwords to verify that the initiating node is authorized to form a connection with your node. Each end of a point-to-point circuit can establish a verifier to transmit to the other node, and specify a verifier expected from the other node. Before the link is established, each node verifies that it received the expected verifier from the other node.
Passwords are usually optional for point-to-point connections but are required for dynamic asynchronous connections. To provide for increased security when a remote node requests a dynamic asynchronous connection (which is normally maintained only for the duration of a telephone call), the node requesting the dynamic connection supplies a password, but the node receiving the login request is prevented from revealing a password to the requesting node.
The following command example shows how to set up a routing initialization password:
ncl> create routing type endnode ncl> enable routing ncl> create routing circuit hdlc-0 - _ncl> type hdlc (1) ncl> set routing circuit hdlc-0 - _ncl> transmit verifier hex-string (2) ncl> set routing circuit hdlc-0 - _ncl> explicit receive verification false (3) ncl> set routing circuit hdlc-0 - _ncl> receive verifier hex-string (4) ncl> enable routing circuit hdlc-0 ncl> create routing permitted neighbor - _ncl> neighbor-name id node-id (5) ncl> set routing permitted neighbor - _ncl> neighbor-name verifier hex-string (6) |
Appendix F provides an example of setting up a routing initialization password.
If a remote node has more than one id (a DECnet Phase V address and a Phase IV address), you must specify all of the ids in the permitted neighbor entity. For example:
|
This chapter explains common management tasks necessary to customize DECnet Phase V communications for your DECnet-Plus system:
This chapter assumes that you have configured your system and created a basic working DECnet-Plus configuration. This chapter provides the information you need to manually modify your network's configuration. You can manually modify the configuration in the following ways:
Use the DECnet-Plus for OpenVMS configuration procedure (NET$CONFIGURE) to make permanent changes automatically. For information on using the DECnet-Plus configuration procedure, see the DECnet-Plus for OpenVMS Installation and Basic Configuration and DECnet-Plus for OpenVMS Applications Installation and Advanced Configuration. For more information about the manual configuration methods, see Chapter 6.
Use the methods for manually modifying your configuration only when your customization needs exceed what is provided by the configuration procedures. Use the configuration procedure to modify your node's network configuration whenever possible. |
Note that you can also define logical names to modify network startup,
as explained in Chapter 6.
8.1 Managing a Node
Generally, your DECnet-Plus software starts at system boot time.
However, in some situations, you may need to start and stop DECnet-Plus
on your system, such as for testing. In some situations, you may need
to reconfigure DECnet-Plus, such as after changing the hardware
configuration or network management parameters. The following sections
describe the tools suitable for these tasks.
8.1.1 Reconfiguring DECnet-Plus
DECnet-Plus provides configuration procedures that enable you to reconfigure your node. The procedures create new startup scripts for DECnet-Plus entities, and sometimes save any original procedures that you might have customized. Whenever possible, use the configuration procedure to reconfigure, especially if you want to significantly modify your network. Significant changes might include:
These changes can affect the following or some combination of the following:
For information about using the configuration procedure, refer to your
installation and configuration guides. The procedures for configuring
DECnet-Plus create NCL scripts that create and enable certain entities
(as necessary and appropriate) and set appropriate network management
attributes. In general, you can permanently customize an entity by
including changes in the correct NCL script.
8.1.2 Starting Up DECnet-Plus
On OpenVMS systems, DECnet-Plus starts automatically. If you should need to restart DECnet-Plus for any reason (for example, after shutting down the network by executing SYS$STARTUP:NET$SHUTDOWN.COM), then you can restart the network using the following command:
@SYS$STARTUP:NET$STARTUP
The directory SYS$MANAGER contains the NCL scripts. Prior to
starting the network, you can modify components of the network by using
system logical names, as explained in Section 6.3.
8.1.3 Shutting Down DECnet-Plus
Use the SYS$MANAGER:NET$SHUTDOWN.COM shutdown procedure to disable and delete the various network entities on the local node.
The shutdown procedure stops all logical links and OSI components (Open
System Application Kernel (OSAK), Virtual Terminal (VT), and File
Transfer Access Module (FTAM)), as well as X.25 Access software
(formerly known as VAX P.S.I.), if they are running. CSMA-CD stops
unless the local area transport (LAT) is running. The procedure
disables and deletes most DECnet Phase V entities.
8.1.4 Enabling a Node
To manually enable the node entity on an OpenVMS system, issue the following command:
ncl> enable node 0 function address watcher |
This enables the address watcher, changing the system's state from OFF
to ON.
8.1.5 Renaming a Node
To rename a node in a DECdns or local namespace, use decnet_register to register the new name and then run the DECnet-Plus configuration procedure to specify the full node name. The full name includes the namespace name and the names of all its directories, starting from the root. Elements within a full name are separated by periods and are known as simple names.
Some reasons for changing node names include:
Use the following steps to change the node name of a DECnet Phase V system:
The DECnet-Plus configuration procedure verifies that the new node name
is properly registered, and attempts to update the addressing
information associated with the node object name. The configuration
procedure also updates the various entities that might be affected by
the name change, including the DNS clerk and the Session Control
modules.
8.1.6 Managing a Phase IV Node
From a DECnet-Plus for OpenVMS node, you can manage a remote Phase IV node by invoking the Network Control Program (NCP) Emulator and entering NCP commands. You must specify the remote Phase IV node using the tell or set executor node commands. For example:
$ run sys$system:ncp NCP> set executor node remnod"account password" NCP> zero exec counters |
For more information about using the NCP Emulator for network management of remote DECnet Phase IV nodes, see Section 2.3.
Previous | Next | Contents | Index |