IBM AS/400e Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung IBM AS/400e an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von IBM AS/400e, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung IBM AS/400e die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung IBM AS/400e. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung IBM AS/400e sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts IBM AS/400e
- Den Namen des Produzenten und das Produktionsjahr des Geräts IBM AS/400e
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts IBM AS/400e
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von IBM AS/400e zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von IBM AS/400e und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service IBM finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von IBM AS/400e zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts IBM AS/400e, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von IBM AS/400e widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    AS / 400e O S / 400 N e tw o r k F il e S y st e m S u p p o rt Ve r s i o n 4 SC41-5714-01 IBM[...]

  • Seite 2

    [...]

  • Seite 3

    AS / 400e O S / 400 N e tw o r k F il e S y st e m S u p p o rt Ve r s i o n 4 SC41-5714-01 IBM[...]

  • Seite 4

    Note Before using this information and the product it supports, be sure to read the information in “Notices” on page 99. Second Edition (May 1999) This edition replaces SC41-5714-00. © Copyright International Business Machines Corporation 1997, 1999. All rights reserved. Note to U.S. Government Users — Documentation related to restricted rig[...]

  • Seite 5

    Contents Figures ........................... v i i T ables ........................... i x About OS/400 Network File System Support (SC41-5714) ....... x i Who should read this book .................... x i AS/400 Operations Navigator ................... x i Installing Operations Navigator .................. x i i Prerequisite and related informati[...]

  • Seite 6

    Chapter 5. Client Mounting of File Systems ............. 3 9 What Is Mounting? ....................... 3 9 Why Should I Mount File Systems? ................. 4 1 What File Systems Can I Mount? .................. 4 2 Where Can I Mount File Systems? ................. 4 2 Mount Points ........................ 4 5 How Do I Mount File Systems? .........[...]

  • Seite 7

    Network Data Encryption .................... 8 2 User Authorities ........................ 8 3 User Identifications (UIDs) ................... 8 3 Group Identifications (GIDs) ................... 8 3 Mapping User Identifications .................. 8 4 Proper UID Mapping ..................... 8 6 Securely Exporting File Systems ..................[...]

  • Seite 8

    vi OS/400 Network File System Support V4R4[...]

  • Seite 9

    Figures 1. AS/400 Operations Navigator Display .............. x i i 2. The local client and its view of the remote server before exporting data . . 1 3. The local client and its view of the remote server after exporting data . . 2 4. The local client mounts data from a remote server ......... 2 5. Remote file systems function on the client .......[...]

  • Seite 10

    54. Using the End NFS Server (ENDNFSSVR) display ......... 7 1 55. Starting or stopping NFS server daemons. ............ 7 3 56. NFS Properties dialog box. .................. 7 3 57. Using the Release File System Locks (RLSIFSLCK) display ...... 7 6 58. Client outside the trusted community causing a security breaches .... 8 2 viii OS/400 Network Fi[...]

  • Seite 11

    T ables 1. CL Commands Used in Network File System Applications ....... 9 1 © Copyright IBM Corp. 1997, 1999 ix[...]

  • Seite 12

    x OS/400 Network File System Support V4R4[...]

  • Seite 13

    About OS/400 Network File System Support (SC41-5714) The purpose of this book is to explain what the Network File System is, what it does, and how it works on AS/400. The book shows real-world examples of how you can use NFS to create a secure, useful integrated file system network. The intended audiences for this book are: v System administrators[...]

  • Seite 14

    This new interface has been designed to make you more productive and is the only user interface to new , advanced features of OS/400. Therefore, IBM recommends that you use AS/400 Operations Navigator , which has online help to guide you. While this interface is being developed, you may still need to use a traditional emulator such as PC5250 to do [...]

  • Seite 15

    http://www.as400.ibm.com/infocenter http://publib.boulder.ibm.com/pubs/html/as400/infocenter.htm The AS/400 Information Center contains important topics such as logical partitioning, clustering, Java, TCP/IP , W eb serving, and secured networks. It also contains Internet links to Web sites such as the AS/400 Online Library and the AS/400 T echnical[...]

  • Seite 16

    xiv OS/400 Network File System Support V4R4[...]

  • Seite 17

    Summary of Changes This manual includes changes made since V ersion 4 Release 1 of the OS/400 licensed program on the AS/400 system. This edition includes information that has been added to the system to support V ersion 4 Release 4. Changes made to this book include the following items: v Updated graphic files. v Updated examples. v Updated NFS t[...]

  • Seite 18

    xvi OS/400 Network File System Support V4R4[...]

  • Seite 19

    Chapter 1. What is the Network File System? Introduction OS/400 Network File System Support introduces a system function for AS/400 that aids users and administrators who work with network applications and file systems. Y ou can use the Network File System (NFS**) to construct a distributed network system where all users can access the data they n[...]

  • Seite 20

    After the server exports information, the proper client (the client with the proper authorities) can be aware of the existence of file systems on the server . Furthermore, the client can mount the exported file systems or directories or objects from the server . The mount command makes a certain file system, directory , or object accessible on t[...]

  • Seite 21

    OS/400 Network File System Support is the replacement for the TCP/IP File Server Support/400 (FSS/400) system application. Users who are accustomed to working with FSS/400 will notice many similarities between FSS/400 and NFS. It is important to note, however , that FSS/400 and NFS are not compatible with each other . The FSS/400 system application[...]

  • Seite 22

    users that all data exists and is processed on their local workstations. An efficient NFS network also gives the right people access to the right amount of data at the right times. Files and directories can be made available to clients by exporting from the server and mounting on clients through a pervasive NFS client/server relationship. An NFS cl[...]

  • Seite 23

    Each group of users works on sets of clients that need different file systems from the TULAB server . Each group of users has different permissions and authorities and will pose a challenge to establishing a safe, secure NFS namespace. Chris Admin will encounter common problems that administrators of NFS namespaces face every day . Chris Admin wil[...]

  • Seite 24

    6 OS/400 Network File System Support V4R4[...]

  • Seite 25

    Chapter 2. The Network File System Client/Server Model T o understand how the Network File System works on AS/400, you must first understand the communication relationship between a server and various clients. The client/server model involves a local host (the client ) that makes a procedure call that is usually processed on a different, remote ne[...]

  • Seite 26

    A daemon is a process that performs continuous or system-wide functions, such as network control. NFS uses many different types of daemons to complete user requests. A cache is a type of high-speed buffer storage that contains frequently accessed instructions and data. Caches are used to reduce the access time for this information. Caching is the a[...]

  • Seite 27

    Representation (XDR) and then sent to the server using a socket. The simple User Datagram Packet (UDP) protocol actually communicates between client and server . Some aspects of NFS use the T ransmission Control Protocol (TCP) as the base communication protocol. The operation of NFS can be seen as a logical client-to-server communications system th[...]

  • Seite 28

    NFS is similar to other RPC-based services in its use of server-side daemons to process incoming requests. NFS may also use multiple copies of some daemons to improve overall performance and eff iciency . RPC Binder Daemon (RPCD) This daemon is analogous to the port mapper daemon, which many implementations of NFS use in UNIX. Clients determine the[...]

  • Seite 29

    Network Status Monitor Daemon (NSMD) The Network Status Monitor (NSM) is a stateful NFS service that provides applications with information about the status of network hosts. The Network Lock Manager (NLM) daemon heavily uses the NSM to track hosts that have established locks as well as hosts that maintain such locks. There is a single NSM server p[...]

  • Seite 30

    v Mount and Unmount commands . Users can mount and unmount a file system in the client namespace with these commands. These are general tools, used not only in NFS, but also to dynamically mount and unmount other local file systems. For more information about the ADDMFS (Add Mounted File System) and RMVMFS (Remove Mounted File System) commands, s[...]

  • Seite 31

    Client-side caching in NFS reduces the number of RPC requests sent to the server . The NFS client can cache data, which can be read out of local memory instead of from a remote disk. The caching scheme available for use depends on the file system being accessed. Some caching schemes are prohibited because they cannot guarantee the integrity and co[...]

  • Seite 32

    Data Cache The data cache is very similar to the directory and file attribute cache in that it stores frequently used information locally on the client. The data cache, however , stores data that is frequently or likely to be used instead of file or directory attributes. The data cache provides data in cases where the client would have to access [...]

  • Seite 33

    Chapter 3. NFS and the User-Defined File System (UDFS) A user-defined file system (UDFS) is a type of file system that you directly manage through the end user interface. This contrasts with a system-defined file system (SDFS), which AS/400 system code creates. QDLS, QSYS.LIB, and QOPT are all examples of SDFSs. The UDFS introduces a concept [...]

  • Seite 34

    CRTUDFS Display When you use the CRTUDFS command, you can specify many parameters and options: v The required UDFS parameter determines the name of the new UDFS. This entry must be of the form /DEV/QASPXX/name.udfs , where the XX is one of the valid Auxiliary Storage Pool (ASP) numbers on the system, and name is the name of the user-defined file [...]

  • Seite 35

    This command creates a case sensitive user-defined file system (UDFS) named kate.udfs in the user Auxiliary Storage Pool (ASP), qasp02 . Display a User-Defined File System The Display User-Defined File System (DSPUDFS) command presents the attributes of an existing UDFS, whether mounted or unmounted. DSPUDFS Display When you use the DSPUDFS com[...]

  • Seite 36

    Example Display UDFS in user ASP on TULAB2 DSPUDFS UDFS('/DEV/QASP02/kate.udfs') This command displays the attributes of a user-defined file system (UDFS) named kate.udfs in the user Auxiliary Storage Pool (ASP), qasp02 . Delete a User-Defined File System The Delete User-Defined File System command (DL TUDFS) deletes an existing, unmo[...]

  • Seite 37

    DL TUDFS Display When you use the DL TUDFS command, you only have to specify one parameter: v The UDFS parameter determines the name of the unmounted UDFS to delete. This entry must be of the form /DEV/QASPXX/name.udfs , where the XX is one of the valid Auxiliary Storage Pool (ASP) numbers on the system, and name is the name of the UDFS. All other [...]

  • Seite 38

    2. Export the path to the UDFS mount point (the directory you mounted over in Step 1) The previous steps will ensure that the remote view of the namespace is the same as the local view . Afterwards, the exported UDFS file system can be mounted (T ype *NFS) by remote NFS clients. However , you must have previously mounted it on the local namespace.[...]

  • Seite 39

    Saving and Restoring a User-Defined File System The user has the ability to save and restore all UDFS objects, as well as their associated authorities. The Save command (SA V) allows a user to save objects in a UDFS while the Restore command (RST) allows a user to restore UDFS objects. Both commands will function whether the UDFS is mounted or unm[...]

  • Seite 40

    This window displays the properties of a user-defined file system. For more information about the DSPUDFS command, see “Display a User-Defined File System” on page 17. User-Defined File System Functions in the Network File System T o export the contents of a UDFS, you must first mount it on the local namespace. Once the Block Special File [...]

  • Seite 41

    directories. For this reason, exporting /DEV or objects within it can cause administrative diff iculties. The next sections describe how you can work around one such scenario. Using User-Defined File Systems with Auxiliary Storage Pools This scenario involves an eager user , a non-communicative system administrator , and a solution to an ASP probl[...]

  • Seite 42

    EXPORTFS OPTIONS('-I -O ROOT=TUclient52X') DIR('/DEV') 2. Now the client can mount the exported directory and place it over a convenient directory on the client, like /tmp . MOUNT TYPE(*NFS) MFS('TULAB2:/DEV') MNTOVRDIR('/tmp') 3. If the client uses the WRKLNK command on the mounted file system, then the cli[...]

  • Seite 43

    Chapter 4. Server Exporting of File Systems A key feature of the Network File System is its ability to make various local file systems, directories, and objects available to remote clients through the export command. Exporting is the first major step in setting up a “transparent” relationship between client and server . Before exporting from [...]

  • Seite 44

    The mount daemon checks the export table each time a client makes a request to mount an exported file system. Users with the proper authority can update the /etc/exports file to export file systems at will by adding, deleting, or changing entries. Then the user can use the export command to update the export table. Most system administrators con[...]

  • Seite 45

    Chris Admin can export a directory containing only the database files with statistics of the bridge construction safety records. This operation can be performed without fear of unknown users accessing the sensitive data. Chris Admin can use the export command to allow only selected client systems to have access to the files. This way , both group[...]

  • Seite 46

    After exporting, a remote client can view the exported file systems PROJ2 and PROJ3 . Not all the file systems on the server are visible to remote clients. Only the exported file systems are available for mounting by clients with proper authorities as specified on the export command or in the /etc/exports file. Remote clients can not see anyth[...]

  • Seite 47

    On any given server file system, when you start exporting, all the objects beneath the export point will also be exported. This includes directories, files, and objects. For example, if you export /classes from TULAB2, then everything below /classes is also exported, including /classes/class1 , /classes/class2 and their associated sub-directories[...]

  • Seite 48

    For example, the file system /home/sweet/home has been exported, and /home/sweet is a parent directory of /home/sweet/home . Y ou cannot now export /home/sweet unless it exists on a different local file system. 4. Y ou can only export local file systems. Any file systems or proper subsets of file systems that exist on remote systems cannot be [...]

  • Seite 49

    Y ou can export to specific groups of clients by using the /etc/netgroup file. This file contains an alias for a group of clients to whom file systems will be exported. No other systems outside of the netgroup will be able to access the file systems. For more information about the /etc/netgroup file, see “/etc/netgroup File” on page 96. U[...]

  • Seite 50

    v The directory entry is the name of the directory that you want to export. The pathname you specify will be listed in the DIR parameter on the CHGNFSEXP command. This entry specifies the path name of the existing directory to be exported (made available to NFS clients) or unexported (made unavailable to NFS clients). This directory can not be a s[...]

  • Seite 51

    CHGNFSEXP OPTIONS('-I -O RO,ANON=199,ACCESS=Prof:1.234.5.6') DIR('/engdata/mech') HOSTOPT((TULAB1 850 850)) This command exports the directory tree under the path name /engdata/mech as read-only . This command allows only two clients to mount this directory tree. It takes advantage of the positional parameters, which do not requ[...]

  • Seite 52

    3. Choose NFS –> Properties to bring up the dialog box that is shown below . Figure 25. The Operations Navigator interface. Figure 26. The NFS Export dialog box. 34 OS/400 Network File System Support V4R4 | |[...]

  • Seite 53

    4. Customize the export on a per-client basis under the Access tab. 5. Set the public access rights as desired. 6. Click on the Add Host/Netgroup button. This will allow you to add other clients with specific privileges. The figure below shows a display of the dialog box. 7. Click OK to add your selected clients. This will bring you back to the N[...]

  • Seite 54

    In the Exports dialog, clicking the Export button will immediately export the folder on the AS/400 server . Y ou also have the option of updating the /ETC/EXPORTS file with this new or changed export. Finding out what is exported Often, you need to know the items that are currently exported on an AS/400 system. There are three ways to do this: 1. [...]

  • Seite 55

    5. Select Exports . From here, you can easily add new exports or remove entries from the list. The figure below shows the dialog box for NFS Exports. Retrieve Network File System Export Entries (QZNFRTVE) API A second method of finding currently exported items on an AS/400 is using the Retrieve Network File System Export Entries (QZNFRTVE) API. T[...]

  • Seite 56

    Exporting Considerations Mounted File System Loops Users and administrators can encounter diff iculty with the inability of NFS to export an already-mounted Network File System. NFS will not allow the export of a mounted file system because of the possibility of mounted file system loops. This problem would occur if NFS allowed the mount and then[...]

  • Seite 57

    Chapter 5. Client Mounting of File Systems The mount command places the remote file system over a local directory on an NFS client. After exporting, mounting a file system is the second major step in setting up a “transparent” relationship between client and server . Mounting allows clients to actually make use of the various file systems th[...]

  • Seite 58

    Given the proper authority , an NFS client can mount any file system, or part of a file system, that has been exported from an NFS server . Mounting is the local client action of selecting an exported directory from a remote server and making it accessible to the integrated file system namespace of the local client. In many UNIX implementations [...]

  • Seite 59

    There is a “downstream” principle for mounting that is similar to the “downstream” rule for exporting. Whenever you mount a remote file system over a local directory , all of the objects “downstream” of the mount point are “covered up”. This renders them inaccessible to the local namespace. If you mount at a high level of a local d[...]

  • Seite 60

    Sometimes the namespace of a client can become too complicated or overwhelmed with information. The unmount command is an easy way to slowly disengage from the server one file system at a time. T o unmount all file systems, specify the *ALL value for the TYPE parameter on the UNMOUNT or RMVMFS (Remove Mounted File System) commands. For detailed i[...]

  • Seite 61

    For example, TULAB2 exports /classes/class1 , which contains the directory /classes/class1/proj1 . A remote client has a local directory /user , which contains the directory /user/work , which contains the directory /user/work/time . The client mounts /classes/class1/ over /user/work , which causes the mounted file system to completely cover up ev[...]

  • Seite 62

    The new local directory tree on the client will display /user/work and the various contents and sub-directories, as shown here. Note: NFS clients will always see the most recent view of a file system. If the client dynamically mounts or unmounts a file system, the change will be reflected on the namespace of the client after the next refresh. It[...]

  • Seite 63

    Mount Points Mount points mark the area of the local client and remote server namespaces where users have mounted exported file systems. Mount points show where the file system has been mounted from on the server and show where it is mounted to on the client. For example, the system exports the /home/consults directory from TULAB1 and mounts it o[...]

  • Seite 64

    2. If you are mounting a user-defined file system or a Network File System, then you require *R (read) authority to the file system being mounted. 3. If you are mounting a NetWare file system, then you require *X (execute) authority to the file system being mounted. 4. Y ou must have *W (write) authority to the directory being mounted over . F[...]

  • Seite 65

    v The path name code page specifies what code page should be assumed for path names on the remote system. This is a code page to be assumed for path names on the remote system. Any AS/400 code page is supported on this parameter . Graphical User Interface When accessing AS/400 through AS/400 Client Access, you can dynamically mount user-defined ?[...]

  • Seite 66

    ADDMFS TYPE(*NFS) MFS('TULAB2:/QSYS.LIB/WORK.LIB') MNTOVRDIR('/HOME') OPTIONS('ro, nosuid, rsize=256, retrans=10') CODEPAGE(*JOBCCSID) This command mounts the /qsys.lib/work.lib file system from the remote system TULAB2 onto the local client directory /HOME . This command also specifies: v Mount as read-only v Disall[...]

  • Seite 67

    2. a remote file system accessed via a Network File System server (*NFS) 3. a local or remote NetWare file system (*NETW ARE). If any of the objects in the file system are in use, the command will return an error message to the user . Note that if any part of the file system has itself been mounted over , then this file system cannot be unmoun[...]

  • Seite 68

    Examples Example 1: Unmounting a Directory . RMVMFS TYPE (*NFS) MNTOVRDIR('/tools') This command unmounts a Network File System that is accessible on directory /tools . Example 2: Unmounting a User-Defined File System . RMVMFS TYPE(*UDFS) MFS('/DEV/QASP02/A.udfs') This command unmounts the user-defined file system /DEV/QASP02[...]

  • Seite 69

    When you use the DSPMFSINF command, you only have to specify one parameter: v The required OBJ parameter  1  on the DSPMFSINF command specifies the path name of an object that is within the mounted file system whose statistics are to be displayed. Any object in the mounted file system can be specified. For example, it can be a directory ([...]

  • Seite 70

    This first display shows basic information about a mounted file system. Y ou can see from this display advanced types of information are not supported for user-defined file systems. Display Mounted FS Information Objec t............: /home/students/ann File system typ e.......: User-defined file system Block siz e..........: 4096 Total block s.[...]

  • Seite 71

    Examples Example 1: Displaying Statistics of a Mounted File System . DSPMFSINF OBJ('/home/students/ann') This command displays the statistics for the mounted file system that contains /home/students/ann . Example 2: Displaying ’/QSYS.LIB’ File System Statistics . DSPMFSINF OBJ('/QSYS.LIB/MYLIB.LIB/MYFILE.FILE') This command[...]

  • Seite 72

    54 OS/400 Network File System Support V4R4[...]

  • Seite 73

    Chapter 6. Using the Network File System with AS/400 File Systems There are several exceptions to using AS/400 file systems with NFS on various clients. This is because you are able to export several dif ferent file systems on an AS/400 NFS server . Each file system has its own set of requirements and deviations through NFS from its normal funct[...]

  • Seite 74

    Network File System Dif ferences Case-Sensitivity When a remote UNIX client mounts an object that the server exports from the “root” (/) file system, it will always function as case-insensitive. Read/Write Options No matter what options the client specifies on the MOUNT command, some server file systems from “root” (/) exist as only read[...]

  • Seite 75

    Read/Write Options No matter what options the client specifies on the MOUNT command, some server file systems from QOpenSys exist as read-only or read-write. However the client mounts a file system determines how the file system is treated and how it functions on the client. Library File System (QSYS.LIB) Network File System Dif ferences Export[...]

  • Seite 76

    Note: See the System API Reference, SC41-4801 book for more details on the open() API and the O_TEXTDATA and O_CODEPAGE options. QPWFSERVER Authorization List The QPWFSERVER is an authorization list (object type *AUTL) that provides additional access requirements for all objects in the QSYS.LIB file system being accessed through remote clients. Th[...]

  • Seite 77

    from 92, which leaves a default of 80 bytes per record for source physical files. For any record length specified, the real amount of bytes per record is the number specified minus 12 bytes for source physical files. Byte-Range Locks QSYS.LIB does not support byte-range locking. The fcntl() API will fail with error condition ENOSYS if used by c[...]

  • Seite 78

    Document Library Services File System (QDLS) Network File System Dif ferences Mounting and QDLS Users can mount the QDLS file system on a client, but users cannot mount over the QDLS file system. File Creation Users cannot create regular files in the top-level /QDLS directory . Users can only create files in the sub-directories of /QDLS . Path [...]

  • Seite 79

    using the ADDDIRE (Add Directory Entry) command. All anonymous client requests that are mapped to QNFSANON will fail at the server if you do not enroll the QNFSANON user profile in FMS. For more information regarding the QDLS file system, see v Integrated File System Introduction, SC41-471 1 v Managing Of ficeVision/400, SH21-0699 v Of fice Servi[...]

  • Seite 80

    Case-Sensitivity QOPT is case-insensitive. It converts lowercase English alphabetic characters to uppercase when used in object names. Therefore, the path name /QOPT/volume/dir/file represents the same path as /QOPT/VOLUME/DIR/FILE .. Security and Authorization The QOPT file system of fers volume-level security , as opposed to file or directory-l[...]

  • Seite 81

    Network File System Dif ferences Case-Sensitivity When remote UNIX clients mount objects that the server exports from a UDFS, the case-sensitivity is variable, depending on how the user created the UDFS. A UDFS that is mounted on a UNIX client can cause the case-sensitivity to change in the middle of a directory tree. System and User Auxiliary Stor[...]

  • Seite 82

    64 OS/400 Network File System Support V4R4[...]

  • Seite 83

    Chapter 7. NFS Startup, Shutdown, and Recovery NFS startup performs separately and independently on each machine. The startup of an NFS component on one system does not trigger the startup of an NFS component on another system. For example, if you start the Network Lock Manager on a client, the NLM on the server will not automatically start up. For[...]

  • Seite 84

    a. Select option 2 (Change) from the CFGTCP menu to add a name for an address. b. Select option 1 from the CFGTCP menu to add an entire new address with names. 6. V erify that the names LOOPBACK and LOCALHOST are associated with the IP address 127.0.0.1 in the host table. 7. V erify that the long and short names of each NFS server you need access t[...]

  • Seite 85

    waits for requests (the standard is #2049). All server daemons will use this same port. The NFS server daemons then wait on the port for RPC requests from NFS clients to access local files. 4. The user starts the mount daemon (QNFSMNTD). This daemon registers to the local RPC binder daemon. It then waits on the assigned port for RPC requests from [...]

  • Seite 86

    If you attempt to start a daemon or daemons that are already running, they will not cause the command to fail, and it will continue to start other daemons you have requested to start. The command will issue diagnostic message CPDA1BA if the daemon is already running. For best results, end NFS daemons before attempting the STRNFSSVR command. Display[...]

  • Seite 87

    STRNFSSVR Display When you use the STRNFSSVR command, you can specify many parameters: v The required SERVER parameter on the STRNFSSVR command specifies the Network File System daemon jobs to be started by this command. The specified daemon should not already be running. v The NBSVR parameter on the STRNFSSVR command specifies the number of NFS[...]

  • Seite 88

    This command starts the NFS mount daemon, and waits up to the default of 30 seconds for it to start. The mount daemon should not be already running, and other daemons have been started in the appropriate order . Proper Shutdown Scenario Shutting down an NFS server properly allows for all jobs to finish and all requests to be completed. In general,[...]

  • Seite 89

    v The mount (MNT) daemon v The server (SVR) daemon v The block I/O (BIO) daemon v The Remote Procedure Call (RPC) binder daemon If you are choosing to end just one daemon, be sure you understand the appropriate order for ending NFS daemons and the possible consequences of ending deamons in an order other than that specified above. If you attempt t[...]

  • Seite 90

    v The required SERVER parameter on the ENDNFWSVR command specifies the Network File System daemon jobs to end. v The ENDJOBTIMO parameter on the ENDNFSSVR command specifies the number of seconds to wait for each daemon to successfully end. If a daemon has not ended within the timeout value, the command will fail. Examples Example 1: End All Daemo[...]

  • Seite 91

    Y ou can also display the status of each individual daemon by choosing Properties . This brings up the following dialog box: In the example, Chris Admin has decided to start 4 of the Server type daemons to give better throughput. Y ou can start up to 20 of these daemons from the General Figure 55. Starting or stopping NFS server daemons. Figure 56.[...]

  • Seite 92

    tab of the previous dialog box. Notice that the Network lock manager daemon is stopped. This could indicate that it encountered a problem by trying to start up. Alternately , it could mean that the administrator chose to end it specifically because of no need for byte range locking. Both NFS and RPC share the same Remote Procedure Call Binder daem[...]

  • Seite 93

    If a client with a granted lock request should happen to fail, a specific set of operations will occur at startup time to recover the locks: 1. When the user restarts the NSM daemon on a system, the daemon will send a change of state RPC to other NSM daemons in the network. This message is transmitted only to the other NSM daemons that the failed [...]

  • Seite 94

    RLSIFSLCK Display When you use the RLSIFSLCK command, you can specify many parameters: v The RMTLOCNAME parameter on the RLSIFSLCK command specifies the host name or internet address of a remote system whose NFS-related locks on local files are to be released. v The OBJ parameter on the RLSIFSLCK command specifies the path name of an object on w[...]

  • Seite 95

    Chapter 8. Integrated File System APIs and the Network File System Error Conditions There are two error conditions that commonly appear when working with the Network File System through integrated file system APIs (application program interface) that require special consideration. These error conditions are the EST ALE and EACCES error conditions.[...]

  • Seite 96

    UDP does not guarantee the delivery or order of data returned to clients. A client may receive any one of the following return codes for a successful operation: 1. Return code=0 (RC=0). The operation is completed successfully . 2. EEXIST . The operation is completed successfully . This error condition was returned to the client because the return c[...]

  • Seite 97

    Once a file or directory is open, subsequent requests to perform operations on a file or directory can fail. This is because attributes are checked at the server on each request. When permissions on the object are more restrictive at the server , your operations on an open file descriptor will fail when NFS receives updates. When the server unli[...]

  • Seite 98

    80 OS/400 Network File System Support V4R4[...]

  • Seite 99

    Chapter 9. Network File System Security Considerations Y ou can use the Network File System to create a seamless, transparent namespace where all users have access to the right information at any given time. However , NFS also has special security considerations. These considerations deal mainly with user , group, and supplemental user identificat[...]

  • Seite 100

    Network Data Encryption A client existing outside the trusted community can become aware of the community’s existence. Furthermore, a malignant client can introduce a “sniff” program that can read and change data as it transfers in the client/server relationship. It accomplishes this by intercepting the data flow and altering the data on con[...]

  • Seite 101

    User Authorities As users log on to NFS clients and servers, the user authority of each user dictates what they can and cannot do. User authorities are assigned to users by administrators, and usually take the form of user identifications (UIDs) for particular users, group identifications (GIDs) for groups of users, and supplemental GIDs, which l[...]

  • Seite 102

    forbidden to their profiles. It is important to become aware of which users from which groups have access to your data. GIDs can help a user from a powerful group gain unauthorized access to sensitive data. The various IDs a user has and the attached authorities can create NFS security hazards. This is particularly crucial when dealing with the CH[...]

  • Seite 103

    appropriate to both the user and the system in question. Just because users need *SECOFR authority on one system does not mean that they need that same authority on all machines. UID Mapping Examples In the TULAB, an engineering graduate student named Bill has a UID of 136 on TULAB1 and a UID of 142 on AS/400 TULAB2. If Bill wants to mount or other[...]

  • Seite 104

    There are other ways to tap into a system of users and the objects owned by them. The administrator of a client can deliberately impersonate a remote server UID. For example, the administrator of a client can log on and access the UID of a user , Mary on TULAB2, who accesses the client. If the UID of Mary is 123, then the client administrator can a[...]

  • Seite 105

    However , instead of changing the UID and user profile for each user on each system, administrators can use the QSYCHGID API (application programming interface). This new API can be called from AS/400 command lines, C programs, COBOL programs, and through other interfaces as well. This function can change the UIDs and GIDs of both system-provided [...]

  • Seite 106

    1. Administrators should never export the “root” (/) Directory . Remember that whenever you export a file system, you also export all of the directories and objects “downstream” of the path. Should the “root” (/) directory become exported, all the other directories and objects downstream of “root” (/) will become exported as well. [...]

  • Seite 107

    v Change the file permissions for “the world” while still mapped to QNFSANON Exporting to ″ The World ″ Instead of making exported data accessible to everyone, an administrator can employ the technique of specifying selective clients. Administrators can use the ACCESS option of the CHGNFSEXP command to use this technique. This option will [...]

  • Seite 108

    90 OS/400 Network File System Support V4R4[...]

  • Seite 109

    Appendix A. Summary of Common Commands T able 1. CL Commands Used in Network File System Applications Command Description ADDMFS Add Mounted File System. Places exported, remote server file systems over local client directories. CHGNFSEXP Change Network File System Export. Adds or removes directory trees to the export table of file systems that a[...]

  • Seite 110

    92 OS/400 Network File System Support V4R4[...]

  • Seite 111

    Appendix B. Understanding the /etc Files A directory named /etc exists within the integrated file system namespace. This directory contains important system files that users should never write to or change unless they are experienced NFS administrators. NFS uses these files to perform specific system functions. The following files are located [...]

  • Seite 112

    In the EDTF utility , you find all the appropriate line commands by pressing the F1 (Help) Function Key . Editing stream files by using a PC based editor The second method to edit the netgroup file is by using a PC-based editor . If you want to use a PC-based editor , you need access to the /etc directory on the AS/400. Use one of the following [...]

  • Seite 113

    10. No tabs or line feeds can be used in the path name 1 1. All characters following the pound sign ’#’ are considered comments until the end of the line. The only exception to this rule is the HOST OPT parameter , which uses the ’#’ character as a starting point for each HOSTOPT entry . Formatting the HOSTOPT (Host Options) Parameter In /e[...]

  • Seite 114

    3. Options are case-insensitive. 4. Options that are not specified will be processed as the defaults described in “Formatting the HOSTOPT (Host Options) Parameter” on page 95. Examples of Formatting /etc/exports with HOST OPT Parameter Example 1: Exporting to a host and specifying all options. /home/joe access=sammy #HOSTOPT HostName=sammy, [...]

  • Seite 115

    host-name The name of any host from the /etc/hosts file. AS/400 does not support the /etc/hosts file as a separate integrated file system file. The /etc/hosts is built in to AS/400 TCP/IP support. user-name The name of any user from the /etc/passwd file. AS/400 does not support the /etc/passwd file concept. domain-name The name of any domain.[...]

  • Seite 116

    98 OS/400 Network File System Support V4R4[...]

  • Seite 117

    Notices This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or [...]

  • Seite 118

    Software Interoperability Coordinator 3605 Highway 52 N Rochester , MN 55901-7829 U.S.A. Such information may be available, subject to appropriate terms and conditions, including in some cases, payment of a fee. The licensed program described in this information and all licensed material available for it are provided by IBM under terms of the IBM C[...]

  • Seite 119

    Programming Interface Information This publication is intended to help you to use OS/400 Network File System Support to construct a distributed network. This publication documents General-Use Programming Interface and Associated Guidance Information provided by OS/400 Network File System Support. General-Use programming interfaces allow the custome[...]

  • Seite 120

    102 OS/400 Network File System Support V4R4[...]

  • Seite 121

    Bibliography This bibliography lists publications that contain background information or more details for information that OS/400 Network File System Support discusses. The list below gives the full title and order number of each book. OS/400 Network File System Support may use a shortened version of the title when referring to these books. If you [...]

  • Seite 122

    104 OS/400 Network File System Support V4R4[...]

  • Seite 123

    Index Special Characters /etc/exports file 95 description 94 formatting entries 94 HOSTOPT parameter 95 HOSTOPT parameter format rules 95 purpose 94 /etc files 93, 94, 95 /etc/exports file 94 description 94 formatting entries 94, 95 purpose 94 /etc/netgroup file 96, 97 description 96 format rules 97 purpose 96 /etc/pmap file 97 description 97 [...]

  • Seite 124

    caches 14, 14 (continued) definition 14 directory and file attribute cache description 13 functions 13 introduction 12 case-sensitivity 16, 17 /etc/netgroup file 97 CASE parameter 16 create a UDFS 15 create a udfs case-insensitive 16 case-sensitive 17 CRTUDFS command 15, 16 CRTUDFS display 16 pattern-matching 59 QSYS.LIB file system 59 root (/)[...]

  • Seite 125

    DSPMFSINF command description 50 display 50 examples 53 OBJ parameter 51 purpose 50 DSPUDFS command UDFS parameter 17 E encryption definition of types 82 introduction 82 ENDNFSSVR command 72 display 71 ENDJOBTIMO parameter 71 purpose 70 restrictions 71 SERVER parameter 71 error conditions additional error numbers 77 Error Conditions EACCES error c[...]

  • Seite 126

    file systems 61, 15, 55, 56, 57, 58, 59, 60, 61mdit (continued) root (/) file system case-sensitivity 56 Network File System differences 55 read/write options 56 user-defined file system (UDFS) auxiliary storage pools (ASPs) 63 case-sensitivity 63 Network File System differences 62 what you can export 27 what you can mount 45 where you can moun[...]

  • Seite 127

    Network File System 74, 9, 10, 1 1, 12, 13, 14, 65, 66mdit (continued) byte-range locks (continued) statelessness 74 why should I lock a file? 74 caches definition 8 client 8, 1 1, 77 block I/O daemon (BIOD) 12 caches 12 contents 1 1 daemons 12 data cache 14 directory and file attribute cache 13 client/server communication 7 client/server model [...]

  • Seite 128

    P protocols 9, 77 NFS 4, 8 single-threaded 9 NFS protocol 77 RPC 4, 8 stateless 4 TCP 4, 8, 70 UDP 4, 8, 70 considerations 77 XDR 8 Q QDLS file system 60 Network File System differences 60 anonymous users 60 file creation 60 mounting 60 path name length 60 QOpenSys file system 56 Network File System Differences 56 Network File System differences[...]

  • Seite 129

    startup (continued) NFS server STRNFSSVR command 67 NFS server scenario 66 state 4 statefulness definition 4 statelessness definition 4 ST A TFS command description 50 display 50 examples 53 OBJ parameter 51 purpose 50 STRNFSSVR command display 68 examples 69 NBRBIO parameter 69 NBSVR parameter 69 purpose 67 restrictions 68 SERVER parameter 69 ST[...]

  • Seite 130

    user-defined file system (UDFS) 15, 16, 17, 18, 19, 20, 23, 63 (continued) display 15 example 20 process 19 Network File System differences 62 auxiliary storage pools (ASPs) 63 case-sensitivity 63 Network File System functions 22 auxiliary storage pools (ASPs) 23 restoring 21 saving 21 unmount a UDFS 20 display 20 11 2 OS/400 Network File System [...]

  • Seite 131

    Readers’ Comments — We’d Like to Hear from Y ou AS/400e OS/400 Network File System Support V ersion 4 Publication No. SC41-5714-01 Overall, how satisfied are you with the information in this book? V ery Satisfied Satisfied Neutral Dissatisfied V ery Dissatisfied Overall satisfaction hhhhh How satisfied are you that the information in th[...]

  • Seite 132

    Readers’ Comments — We’d Like to Hear from Y ou SC41-5714-01 SC41-5714-01 IBMR Cut or Fold Along Line Cut or Fold Along Line Fold and T ape Please do not staple Fold and T ape Fold and T ape Please do not staple Fold and T ape NO POST AGE NECESSARY IF MAILED IN THE UNITED ST A TES BUSINESS REPL Y MAIL FIRST -CLASS MAIL PERMIT NO. 40 ARMONK, N[...]

  • Seite 133

    [...]

  • Seite 134

    IBMR Printed in the United States of America on recycled paper containing 10% recovered post-consumer fiber . SC41-5714-01[...]

  • Seite 135

    Spine information: IBM AS / 400e O S / 400 N e tw o rk F il e S yst e m S u p po rt V4R4 V ersi o n 4[...]