Compaq TCP/IP Services for OpenVMS
Management


Previous Contents Index

15.1.3.1 FTP Log Files

By default, the FTP server creates several log files you can use to monitor the service and user transactions. These log files are:

The number of log files (one per FTP session) might become large. To limit the number of versions, enter:


$ SET FILE file /VERSION=n

15.1.3.2 FTP Startup and Shutdown

The FTP service can be shut down and started independently from TCP/IP Services. This is useful when you change parameters or logical names that require the service to be restarted.

The following files are provided:

To preserve site-specific parameter settings and commands, create the following files. These files are not overwritten when you reinstall TCP/IP Services:

15.2 Solving FTP Problems

You can improve FTP performance for users who transfer large files from systems that are not running TCP/IP Services to a host running the TCP/IP Services software.

15.2.1 Performance

Large file transfers can affect file transfer performance. A file transfer consists of the following events:

  1. FTP calls RMS to create the file.
  2. RMS creates the file with the system's default for number of blocks to be allocated (FTP_FILE_ALQ value).
  3. If the file being copied is larger than the space originally allocated, RMS extends the space by adding blocks of memory space.
  4. The number of extension blocks is determined by the system's RMS default extension quantity (FTP_FILE_DEQ value). For more information about RMS, refer to the OpenVMS Record Management Services Reference Manual.

Performance is affected by the RMS overhead taken up by the file extension process. One way to improve performance is to reset the appropriate parameters. To do this, redefine the FTP logical names that:

These logical names are described in the following sections.

15.2.1.1 Buffer Sizes

Changing the window size of the send and receive buffers can improve network performance. To set or modify the window size, define or redefine the logical name TCPIP$FTP_WNDSIZ.

For noisy lines, such as modems, you should set the value of the TCPIP$FTP_WNDSIZ parameter to a lower number.

15.2.1.2 File Allocation and Extension Sizes

FTP logical names preallocate disk blocks. FTP tells RMS to truncate unused blocks so that disk space is not wasted. This can affect RMS performance.

To reduce the RMS overhead, use the following logical names:

Define these logicals in the TCPIP$SYSTARTUP.COM procedure, or in the SYS$MANAGER:STARTUP_VMS.COM file before the command that starts TCP/IP Services. Because disk quotas may control the system, these logical names are defined by default as zero (system RMS defaults) or are undefined. For file transfers between hosts that both use VMS Plus mode, these logical names have no effect.

15.2.1.3 Inactivity Timer

The larger the inactivity timer value, the longer FTP maintains sessions without timing out. Excessive inactive sessions might slow down performance, degrade security, or prevent other users from establishing sessions.

To increase the inactivity timer, change the value of the TCPIP$FTPD_IDLETIMEOUT logical name. The default is 15 minutes. For example:


$ DEFINE TCPIP$FTPD_IDLETIMEOUT 01:00:00 


Chapter 16
Remote (R) Commands

The TCP/IP Services software includes client and server implementations of the Berkeley Remote (R) command applications: RCP, RLOGIN, RSH, REXEC, and RMT/RCD. These applications provide end users with the following capabilities:
RCP Allows files to be copied between remote hosts.
RLOGIN Provides interactive access to remote hosts.
RSH Passes a command to a remote host for execution.
REXEC Authenticates and executes RCP and other commands.
RMT/RCD Provides remote access to magnetic tape and CD-ROM drives.

This chapter reviews key concepts and describes:

For information about using these applications, see the DIGITAL TCP/IP Services for OpenVMS User's Guide.

16.1 Key Concepts

In addition to password authentication, the R commands use a system based on trusted hosts and users. Trusted users on trusted hosts are allowed to access the local system without providing a password. Trusted hosts are also called "equivalent hosts" because the software assumes that users given access to a remote host should be given equivalent access to the local host. The system assumes that user accounts with the same name on both hosts are "owned" by the same user. For example, the user logged in as molly on a trusted system is granted the same access as a user logged in as molly on the local system.

This authentication system requires databases that define the trusted hosts and the trusted users. On UNIX systems, these databases are:

On OpenVMS hosts, the proxy database TCPIP$PROXY.DAT defines trusted hosts and users for the entire system.

16.2 Managing the R Command Servers

The following sections describe the command procedures and logical names used in managing the R command servers.

16.2.1 R Command Server Startup and Shutdown

Each R command server can be shut down and started independently. This is useful when you change parameters or logical names that require the service to be restarted.

The following files allow you to start up each R command server independently:

The following files allow you to shut down the each R command server independently:

To preserve site-specific parameter settings and commands to be executed when the R server starts up, create one of the following files, as appropriate. These files are not overwritten when you reinstall TCP/IP Services:

To preserve site-specific parameter settings and commands to be executed when the R server shuts down, create one of the following files, as appropriate. These files are not overwritten when you reinstall TCP/IP Services:

16.2.2 Managing RLOGIN with Logical Names

Table 16-1 lists the logical names you can use for managing the RLOGIN service.

Table 16-1 RLOGIN Logical Names
Logical Name Description
TCPIP$RLOGIN_VTA Enables RLOGIN virtual terminals. For more information, see Section 16.3.
TCPIP$RLOGIN_MESSAGE Specifies the welcome message displayed by the RLOGIN server. For more information, see Section 16.4.

16.3 Security Considerations

Because R commands can bypass normal password verification, it is important to configure these applications carefully to avoid compromising system security. In a complex networking environment, improperly configured R commands can open access to your host to virtually anyone on the network.

A properly configured environment grants remote access to preauthorized clients. You can limit access by adding an entry to the proxy database (TCPIP$PROXY.DAT) for each user authorized to access your host. This entry, called a communication proxy, provides the user name and name of the remote host. To add a communication proxy, enter:


TCPIP> ADD PROXY user /HOST=host /REMOTE_USER=user

For each host, be sure to define the host name and any aliases.

Users with communication proxies cannot use virtual terminals. Therefore, if the logical name TCPIP$RLOGIN_VTA is set, users logging in by proxies will observe that the terminal device they are assigned is displayed as TNAnnn rather than VTAnnn. For more information, see Section 16.2.2.

16.3.1 Registering Remote Users

For users on UNIX hosts, the following information must be listed in at least one of the following databases:
Database File Type of Information
/etc/hosts.equiv Host name and user name
.rhosts
(in the user's home directory)
Host name and user name

For users on OpenVMS clients running TCP/IP Services, check that the appropriate proxy information is in the remote system's proxy database.

You can also restrict remote printing to specific users by entering:


TCPIP> SET SERVICE service /FLAGS=APPLICATION_PROXY 

With this flag set, the R commands use the communication entries in the proxy database for authentication.

To reject access from a remote host, use the SET SERVICE service /REJECT command. For example:


TCPIP> SET SERVICE RLOGIN /REJECT=HOSTS=(loon,ibis,tern) 

16.3.2 Case-Sensitivity Flag

The proxy database is case sensitive for remote user names. The case you use for communications entries affects the way users access your host, so use case in a consistent fashion. In the proxy database, if the user name is in:

If the flag CASE_INSENSITIVE is set, the server matches an incoming user name with an all-lowercase or an all-uppercase remote user name in the proxy database.

The case-sensitivity flag for RLOGIN, RSH, and RCP defaults to CASE_INSENSITIVE. With this setting, the server accepts both all-uppercase and all-lowercase user names.

Ensure that RSH is enabled, because no RCP service exists. Instead, RCP uses the RSH server process. (RCP uses RSH or REXEC to do its work. RSH must be configured properly for RCP to work.)

16.4 Creating a Welcome Message

To modify the welcome message displayed by the RLOGIN server, define the TCPIP$RLOGIN_MESSAGE logical name and specify the text. For example, the following command defines a welcome message for RLOGIN clients when they log in to the server:


$ DEFINE /SYSTEM TCPIP$RLOGIN_MESSAGE "OpenVMS RLOGIN Server Version 5.1" 

16.5 Remote Magnetic Tape and Remote CD-ROM (RMT/RCD)

The Remote Magnetic Tape/Remote CD-ROM (RMT/RCD) server provides remote system access to local OpenVMS magnetic tape and CD-ROM drives. The tape or CD-ROM drives appear to the RMT client users as if they were mounted locally. The RMT server fully implements the UNIX commands rdump and rrestore and the OpenVMS commands MOUNT, BACKUP, COPY, and EXCHANGE.

This section assumes that you are familiar with device mounting and server access conditions relevant to the R command services.

16.5.1 Preparing Drives for Remote Mounts

Perform the following tasks to make sure the remote client can access the tape or CD-ROM drive:

  1. Enable the RSH, REXEC, and RMT services.
  2. Load a magnetic tape or CD-ROM into the device.
    With a tape device, the client mounts and allocates the tape; you do not need to perform this task.
    With a CD-ROM device, you need to make the device accessible by entering a MOUNT /SYSTEM command.
  3. Make sure the remote shell command (RSH) works from the UNIX root account.
  4. Make sure the rsh command works from the user's account on the remote UNIX host.
  5. For the OpenVMS account ROOT, suppress SYS$LOGIN and LOGIN.COM output by entering the following commands:


    $ RMT_VERIFY = 'F$VERIFY(0) 
    ...
    $ IF (F$MODE() .NES. "OTHER") THEN $RMT_VERIFY = F$VERIFY(RMT_VERIFY) 
    

16.5.2 Client Utilities

On the remote host, a user can use rdump to dump files to OpenVMS tapes, or rrestore to restore files from OpenVMS tapes. The functionality of rdump and rrestore depends entirely on the type of UNIX system you use and not on the RMT service. For example, not all UNIX systems let you restore files selectively using rrestore .

When you enter these remote dump and restore commands, you must specify either a valid OpenVMS magnetic-tape device name, or a file name.

See the sections on dump, rdump, restore , and rrestore in your client system's documentation for details. Be careful about the order in which you specify options on the command line.

Here is an example of an rdump command:


> /etc/rdump 0f lilac:mua0:/nomount/density=1600 /usr 
 

In the example, the remote user requests to remotely dump the /usr file system onto device mua0: on system lilac and specifies the /nomount qualifier and a tape density of 1600 bits per inch.

You can specify the qualifiers described in Table 16-2 with magnetic-tape device names.

Table 16-2 RMT Magtape Qualifiers
Qualifier Description
/[NO]ASSIST Specifies whether to use operator assistance to mount the volume. The default is /NOASSIST.
/BLOCKSIZE= n Specifies the block size for magnetic tape volumes. The default is 65534 bytes.
/CD Indicates that the remote device is a CD-ROM device.
/COMMENT= "string" Specifies additional information included with the operator request when the mount operation requires operator assistance (/ASSIST). The comment appears in the OPCOM message for the operator.
/DENSITY= n Specifies the density (in bits per inch) at which to write a foreign or unlabeled magnetic tape. The default is the current density.
/[NO]MOUNT Specifis whether to use the OpenVMS MOUNT service to mount the tape. /NOMOUNT gains access to the tape directly without mounting it. Use this for UNIX utilities that expect the tape drive to hold its position (not rewind) if the utility closes it. The default is /MOUNT.
/[NO]REWIND Specifies whether to rewind the drive when it is closed. The default is /REWIND.
/[NO]STREAM Specifies whether to read the tape in record mode (/NOSTREAM) or byte-stream mode (/STREAM). The default is /STREAM.
/[NO]UNLOAD Specifies whether to unload the drive when it is closed. The default is /UNLOAD.
/[NO]WRITE Specifies whether you can write to the magnetic tape. The default is /WRITE.

16.5.3 Client Examples

The following steps perform rdump and rrestore functions from a UNIX client system. These commands dump two UNIX directories to the tape with separate rdump commands. These commands then restore files selectively from the tape to the UNIX client system:

  1. Put the directories on the tape by entering two rdump commands. Specify the /nomount/norewind/nounload qualifiers to prevent OpenVMS from rewinding the tape. Although the UNIX system reports that the tape was rewound, it was not actually rewound. The commands are:


    UNIX> /etc/rdump 0f vax:device/nomount/norewind/nounload dir1 
    UNIX> /etc/rdump 0f vax:device/nomount/norewind/nounload dir2 
    

  2. Restore the files selectively from the tape using rrestore . Be sure the tape is loaded and rewound. Use either the interactive or noninteractive command syntax.

The rrestore command might display messages such as "You have not read any volumes yet" and then ask you to specify the next volume. Although these messages might appear, rrestore should work properly.

In the following example, rrestore extracts the file specified by file_name from dump file number 2 on the tape:


UNIX> /etc/rrestore fsx vax:device/nomount/nounload/norewind 2 file-name

In the following example, rrestore invokes the interactive utility to let the user specify particular files that were put on the tape in dump file 2. The add command then adds the files to the extraction list and the extract command restores them:


UNIX> /etc/rrestore fis vax:device/nomount/nounload/norewind 2 
restore> add file_name
restore> extract 


Previous Next Contents Index