Chapter 9 |
9
|
Configuring and Managing the DHCP Client
|
9.1
|
Key Concepts
|
9.1.1
|
Designating the Primary Interface
|
9.1.2
|
Requesting a Lease
|
9.1.3
|
Requesting Parameters
|
9.1.4
|
Understanding How the DHCP Client Operates
|
9.2
|
DHCP Client Components
|
9.2.1
|
Executable Files
|
9.2.2
|
Configuration Files
|
9.2.2.1
|
Client Configuration File
|
9.2.2.2
|
The Interface File
|
9.2.2.3
|
The Host Name File
|
9.2.2.4
|
The DHCPTAGS. File
|
9.2.3
|
Command Files
|
9.2.4
|
System Logicals
|
9.2.5
|
Log Files
|
9.3
|
DHCP Client Startup and Shutdown
|
9.4
|
Configuring the DHCP Client
|
9.4.1
|
Putting Interfaces under DHCP Control
|
9.4.1.1
|
Using Autoconfigure for a New TCP/IP Installation
|
9.4.1.2
|
Using TCPIP$CONFIG to Configure an Existing Installation
|
9.4.2
|
Configuring the Software
|
9.4.3
|
Configuring a Cluster Environment
|
9.4.4
|
Signaling the DHCP Client
|
9.5
|
TCP/IP Management Commands
|
9.5.1
|
Temporarily Configuring Interfaces
|
9.5.2
|
Permanently Configuring Interfaces
|
9.6
|
Using the SHOWDHC Utility
|
Chapter 10 |
10
|
Configuring and Managing BOOTP
|
10.1
|
Key Concepts
|
10.2
|
BOOTP Planning and Preconfiguration Tasks
|
10.2.1
|
Network Configuration Decisions
|
10.2.2
|
BOOTP Service Decisions
|
10.2.3
|
BOOTP Security
|
10.3
|
Configuring the BOOTP Service
|
10.4
|
Managing the BOOTP Service
|
10.4.1
|
Enabling and Disabling BOOTP
|
10.4.2
|
BOOTP Management Commands
|
10.4.3
|
BOOTP Logical Names
|
10.4.4
|
BOOTP Startup and Shutdown
|
10.5
|
Creating a BOOTP Database
|
10.5.1
|
Populating the BOOTP Database
|
10.5.2
|
Converting UNIX Records
|
10.5.3
|
Creating Individual Entries
|
10.5.4
|
Modifying and Deleting Entries
|
10.6
|
Solving BOOTP Problems
|
Chapter 11 |
11
|
Configuring and Managing TFTP
|
11.1
|
Key Concepts
|
11.2
|
Setting up the TFTP Service
|
11.2.1
|
Transferring Data to the TFTP Host
|
11.2.2
|
TFTP Management Commands
|
11.2.3
|
TFTP Logical Names
|
11.2.4
|
TFTP Startup and Shutdown
|
11.2.5
|
Enabling and Disabling TFTP
|
11.3
|
TFTP Security
|
11.4
|
Solving TFTP Problems
|
Chapter 12 |
12
|
Configuring and Managing the Portmapper
|
12.1
|
Configuring Services to Use the Portmapper
|
12.2
|
Portmapper Startup and Shutdown
|
12.3
|
Displaying Portmapper Information
|
Chapter 13 |
13
|
Configuring and Managing NTP
|
13.1
|
Key Concepts
|
13.1.1
|
Time Distributed Through a Hierarchy of Servers
|
13.1.2
|
How Hosts Negotiate Synchronization
|
13.1.3
|
How the OpenVMS System Maintains the System Clock
|
13.1.4
|
How NTP Makes Adjustments to System Time
|
13.1.5
|
Configuring the Local Host
|
13.2
|
Manycast Mode
|
13.2.1
|
Manycast Options
|
13.3
|
NTP Service Startup and Shutdown
|
13.4
|
Configuring Your NTP Host
|
13.4.1
|
Creating the Configuration File
|
13.4.2
|
Configuration Statements and Options
|
13.4.2.1
|
NTP Monitoring Options
|
13.4.2.2
|
Access Control Options
|
13.4.2.2.1
|
The Kiss-of-Death Packet
|
13.4.2.2.2
|
Access Control Statements and Flags
|
13.4.2.3
|
Sample NTP Configuration File
|
13.4.3
|
Using NTP with Another Time Service
|
13.5
|
Configuring NTP as Backup Time Server
|
13.6
|
NTP Event Logging
|
13.6.1
|
Sample NTP Log Files
|
13.7
|
NTP Authentication Support
|
13.7.1
|
Symmetric Key Cryptography
|
13.7.2
|
Public Key Cryptography
|
13.7.2.1
|
Autokey Protocol
|
13.7.2.2
|
Certificate Trails
|
13.7.2.3
|
Secure Groups
|
13.7.2.4
|
Identity Schemes
|
13.7.3
|
Naming and Addressing
|
13.7.4
|
Operation
|
13.7.5
|
Key Management
|
13.7.6
|
Authentication Statements and Commands
|
13.7.7
|
Error Code
|
13.7.8
|
Leapseconds Table
|
13.7.9
|
Configuring Autokey
|
13.7.9.1
|
Client/Server Setup Procedure
|
13.7.9.1.1
|
Using The Default TC Identity Scheme (Method 1)
|
13.7.9.1.2
|
Using The Default TC Identity Scheme (Method 2)
|
13.7.9.1.3
|
Using The PC Identity Scheme
|
13.7.9.1.4
|
Using The IFF Scheme
|
13.7.9.1.5
|
Using The Alternate IFF Scheme
|
13.7.9.1.6
|
Using the GQ scheme
|
13.7.9.1.7
|
Using the MV scheme
|
13.7.9.1.8
|
Broadcast and Multicast Autokey
|
13.7.9.1.9
|
Monitoring Authentication Status
|
13.7.9.2
|
Updating the Client and Server Parameters
|
13.8
|
NTP Utilities
|
13.8.1
|
Setting the Date and Time with NTPDATE
|
13.8.2
|
Tracing a Time Source with NTPTRACE
|
13.8.3
|
Making Run-Time Requests with NTPDC
|
13.8.3.1
|
NTPDC Interactive Commands
|
13.8.3.2
|
NTPDC Control Message Commands
|
13.8.3.3
|
NTPDC Request Commands
|
13.8.4
|
Querying the NTP Server with NTPQ
|
13.8.4.1
|
NTPQ Control Message Commands
|
13.9
|
Generating Public and Private Keys with ntp_keygen
|
13.9.1
|
Synopsis
|
13.9.2
|
Running ntp_keygen
|
13.9.3
|
Random Seed File
|
13.9.4
|
Trusted Hosts and Groups
|
13.9.5
|
Identity Schemes
|
13.9.6
|
Cryptographic Data Files
|
13.9.7
|
Generating Symmetric Keys
|
13.9.7.1
|
Authentication Key Format
|
13.10
|
Solving NTP Problems
|
13.10.1
|
NTP Debugging Techniques
|
13.10.1.1
|
Initial Startup
|
13.10.1.2
|
Verifying Correct Operation
|
13.10.1.3
|
Special Problems
|
13.10.1.4
|
Debugging Checklist
|