Network Utility User's Guide
Part 1. Getting Started
Chapter 1. Setting Up the Hardware
Installing the Network Utility
Verifying the Hardware Setup
Chapter 2. Bringing Up a User Console
Access Methods
Which Access Method Should I Use?
ASCII Terminal Setup and Usage
Telnet Setup and Usage
Getting to the Command Prompt
Chapter 3. Performing the Initial Configuration
Configuration Basics
Choosing Your Configuration Method
Getting Started from Config-only Mode
Procedure A: Command-Line Procedure for Initial Configuration
Procedure B: Configuration Program Initial Configuration
What to Do Next
Chapter 4. Quick Reference to the User Interface
Navigating
Entering Commands
Key User Tasks
Part 2. Learning About Network Utility
Chapter 5. A Guided Tour through the Command-Line Interface
Prompts and Processes
Configuring (using talk 6, the Config process)
Operating (Using talk 5, the Console Process)
Event Logging (Using talk 2, the Monitor Process)
Saving the Configuration and Rebooting
Firmware
Chapter 6. Configuration Concepts and Methods
Configuration Basics
Configuration Files on Disk
Configuration Methods
Dynamic Reconfiguration
Combining Configuration Methods
Migrating a Configuration to a New MAS Release
Chapter 7. Handling Configuration Files
Managing Configuration Files on Disk
Loading New Configuration Files
Transferring Configuration Files from Network Utility
Chapter 8. Management Concepts and Methods
Console Commands
Monitoring Event Messages
Simple Network Management Protocol (SNMP) Support
SNA Alert Support
Network Management Products
Chapter 9. General Management Tasks
Monitoring Events
Monitoring Memory Utilization
Monitoring CPU Utilization
Chapter 10. Software Maintenance
Software Versions and Packaging
Getting Web Access to the Software
Downloading and Unpacking Files
Loading New Operational Code
Upgrading Firmware
How to Call for Service and Support
Part 3. Configuration and Management Specifics
Chapter 11. Overview
Major Network Utility Functions
Chapter Layout and Conventions
Chapter 12. TN3270E Server
Overview
General TN3270E Server Configuration
Example Configurations
Managing the TN3270E Server
TN3270 Server Enhancements
Chapter 13. TN3270E Server Example Configuration Details
TN3270 via LAN Subarea, via DLUR, and using Network Dispatcher
Dynamic Definition of Dependent LUs
Host Initiated Dynamic LU Definition
TN3270E Host On-Demand (HOD) Client Cache
TN3270E Subarea SNA over DLSw
Chapter 14. Channel Gateway
Overview
Example Configurations
Managing the Gateway Function
Chapter 15. Channel Gateway Example Configuration Details
Chapter 16. Data Link Switching
Overview
Example Configurations
Managing DLSw
Chapter 17. DLSw Example Configuration Details
Chapter 18. Sample Host Definitions
Overview
Definitions at the Channel Subsystem Level
Defining the Network Utility in the Operating System
VTAM Definitions
Host IP Definitions
Chapter 19. Virtual Private Networks
VPN Introduction and Benefits
The IETF's IP Security Framework
VPN Customer Scenarios
Policy Based Networking
Tunneling Protocols
VPN Event Logging Support (ELS)
Chapter 20. Virtual Private Networks Examples
IPSec Router to Router VPN Using Pre-Shared Keys
Router to Router VPN Using Digital Certificates
Voluntary PPTP Tunnel with IBM Router Termination
IBM Network Utility Initiated Voluntary PPTP Tunnel
IBM Network Utility Initiated Voluntary L2TP Tunnel
L2TP Tunnel Terminated at an IBM Network Utility LNS
Part 4. Appendixes
Appendix A. Notices
Notice to Users of Online Versions of This Book
Electronic Emission Notices
Trademarks
Appendix B. Safety Information
Index
[ Top of Page | Previous Page | Next Page | Table of Contents ]