IBM i5/OS IP Networks: Dynamic

Book description

Over the course of many years, the developers in both the Endicott and Rochester labs have been working very hard adding
functions to each release of OS/400 and i5/OS to make the configuration and use of the IBM System i in a TCP/IP network easier and more powerful. If you need to design an IP network that is self-configuring, fault-tolerant, secure, and efficient in its operation, then this IBM Redbooks publication is for you.

We start low with the details of IP interface and route implementation on i5/OS. Through the study of these building blocks, we show how to create IP networks that are easier to configure, tolerant of faults, and can perform both inbound and
outbound load balancing.

i5/OS has always had many built-in Network Security features. These features have been enhanced to include an Intrusion Detection System (IDS). This allows you to be notified of attempts to hack into, disrupt, or deny service to the system.

Moving up to the application layer, we demonstrate the dynamic power of IP by having the DHCP server assigning IP addresses and automatically updating the i5/OS Dynamic DNS. Now clients and servers can be added dynamically to the IP network and assigned a name automatically.

Table of contents

  1. Notices
    1. Trademarks
  2. Preface
    1. The team that wrote this book
    2. Become a published author
    3. Comments welcome
  3. Part 1: Dynamic IP
  4. Chapter 1: An introduction to the protocols at hand (1/3)
  5. Chapter 1: An introduction to the protocols at hand (2/3)
  6. Chapter 1: An introduction to the protocols at hand (3/3)
  7. Chapter 2: Interfaces, routes, and Virtual IP
    1. 2.1: Interfaces
      1. Local area network (LAN) interfaces
      2. Wide area network (WAN) interface wizard for frame relay
      3. Virtual IP address
    2. 2.2: Routing
      1. Types of routes
      2. System i rules for route selection
    3. 2.3: Network administrator’s tricks of advanced IP networks
      1. Fault tolerance
      2. Load balancing
      3. Classless InterDomain Routing (CIDR)
      4. Transparent subnetting
      5. Virtual Ethernet within LPAR environment
      6. Connect to a TCP/IP application while in restricted state
  8. Chapter 3: IPv6: the next generation of the Internet
    1. 3.1: Benefits of IPv6
      1. Increased address space
      2. Autoconfiguration
      3. Mobility
      4. Security
      5. Scalability
      6. Quality-of-Service capabilities
    2. 3.2: IPv6 addressing
      1. IPv6 address format
      2. IPv6 address types
    3. 3.3: IPv6 support in the V5R4 release of i5/OS
      1. IPv6 in iSeries Navigator
      2. Sockets enhancements
      3. i5/OS DNS support for IPv6
      4. Troubleshooting and test tools
    4. 3.4: Configuring IPv6
      1. IPv6 Loopback Interface, ::1
      2. Manually configured IPv6 interface
      3. IPv6 stateless interfaces
    5. 3.5: Additional IPv6 information
  9. Chapter 4: Multilink Protocol
    1. 4.1: An introduction to Multilink Protocol (MP)
    2. 4.2: Multilink implementation on the System i
      1. BAP and BACP
      2. Bandwidth utilization monitoring
  10. Chapter 5: Point-to-Point Protocol (PPP)
    1. 5.1: A brief introduction to WAN connectivity on the System i
    2. 5.2: What you need to know to use the PPP scenarios
      1. Dial-on-demand with unnumbered PPP connection scenario
      2. What is new in V5R1 PPP
      3. What is new in V5R2 PPP
      4. What is new in V5R3 PPP
      5. What is new in V5R4 PPP
  11. Chapter 6: Dynamic Host Configuration Protocol (DHCP)
    1. 6.1: BOOTP: The predecessor to DHCP
    2. 6.2: Overview of DHCP
    3. 6.3: How DHCP works
      1. Acquiring configuration information
      2. Lease renewal
      3. DHCP server configuration changes
      4. BOOTP/DHCP Relay Agent
    4. 6.4: DHCP implementation on the System i
      1. DHCP software prerequisites
      2. DHCP installation
      3. DHCP server jobs
      4. DHCP configuration files
      5. DHCP server log file
      6. BOOTP/DHCP Relay Agent log file
      7. DHCP wide area network (WAN) client support
      8. DHCP support of a Dynamic DNS
      9. Configuring the DHCP server through iSeries Navigator
      10. Change DHCP Attributes Command (CHGDHCPA)
      11. Starting and stopping the DHCP server
      12. BOOTP to DHCP migration program
      13. DHCP Monitor
      14. DHCP server exit programs
      15. DHCP server backup and recovery considerations
  12. Chapter 7: Routing Information Protocol Version 2 (RIPv2)
    1. 7.1: Routing Information Protocol Version 1 (RIPv1)
      1. RIPv1 packet types
      2. RIPv1 packet format
      3. RIPv1 limitations
    2. 7.2: Routing Information Protocol version 2 (RIPv2)
      1. RIPv2 packet format
      2. RIPv2 limitations
  13. Chapter 8: Dynamic Domain Name System (Dynamic DNS)
    1. 8.1: i5/OS V5 Dynamic DNS
      1. New features
      2. i5/OS and System i requirements
    2. 8.2: Automatic (yet optional) migration and conversion
  14. Chapter 9: Remote Authentication Dial-In User Service (RADIUS)
    1. 9.1: RADIUS support and implementation on i5/OS
  15. Chapter 10: Quality of Service (QoS)
    1. 10.1: An introduction to QoS
      1. Differentiated Services
      2. Integrated Services
      3. Inbound admission policy
    2. 10.2: QoS implementation on the System i
      1. Differentiated Services (DiffServ)
      2. Integrated Services (IntServ)
      3. Connection request rate and URI request rate
      4. Connection rate policies
      5. Storing your configuration
  16. Chapter 11: Intrusion Detection System (IDS)
    1. 11.1: Intrusion types
      1. Attacks
      2. Scans
      3. Traffic regulation anomalies for TCP and UDP
    2. 11.2: Setup for IDS notification on i5/OS
    3. 11.3: IDS policy file
      1. Examples of IDS policy conditions and actions
    4. 11.4: Intrusion Monitor entries
    5. 11.5: Verifying IDS policy implementation
    6. 11.6: Tips and techniques
    7. 11.7: i5/OS intrusion detection and prevention - a summary
  17. Part 2: Scenarios
  18. Chapter 12: Defining adaptable TCP/IP interfaces and routes
    1. 12.1: Fault tolerance: virtual IP with RIPv2 (1/2)
    2. 12.1: Fault tolerance: virtual IP with RIPv2 (2/2)
    3. 12.2: Fault tolerance: proxy ARP for the virtual IP address (1/2)
    4. 12.2: Fault tolerance: proxy ARP for the virtual IP address (2/2)
    5. 12.3: DNS-based inbound load balancing (1/2)
    6. 12.3: DNS-based inbound load balancing (2/2)
    7. 12.4: Outbound load balancing with duplicate route round-robin (1/2)
    8. 12.4: Outbound load balancing with duplicate route round-robin (2/2)
    9. 12.5: Connect to a TCP/IP application while in restricted state
  19. Chapter 13: Virtual Ethernet within an LPAR environment
    1. 13.1: Virtual Ethernet and proxy ARP configuration (1/3)
    2. 13.1: Virtual Ethernet and proxy ARP configuration (2/3)
    3. 13.1: Virtual Ethernet and proxy ARP configuration (3/3)
    4. 13.2: Virtual Ethernet and NAT scenario (1/3)
    5. 13.2: Virtual Ethernet and NAT scenario (2/3)
    6. 13.2: Virtual Ethernet and NAT scenario (3/3)
    7. 13.3: Virtual Ethernet and routing scenario
  20. Chapter 14: Multilink in action
    1. 14.1: Multilink: dynamic bandwidth allocation (1/3)
    2. 14.1: Multilink: dynamic bandwidth allocation (2/3)
    3. 14.1: Multilink: dynamic bandwidth allocation (3/3)
    4. 14.2: Multilink: Fault tolerance (1/3)
    5. 14.2: Multilink: Fault tolerance (2/3)
    6. 14.2: Multilink: Fault tolerance (3/3)
  21. Chapter 15: DHCP: Dynamic allocation of IP addresses
    1. 15.1: DHCP: One physical network, one logical network, one DHCP server (1/5)
    2. 15.1: DHCP: One physical network, one logical network, one DHCP server (2/5)
    3. 15.1: DHCP: One physical network, one logical network, one DHCP server (3/5)
    4. 15.1: DHCP: One physical network, one logical network, one DHCP server (4/5)
    5. 15.1: DHCP: One physical network, one logical network, one DHCP server (5/5)
    6. 15.2: DHCP: One physical network, multiple logical networks, one DHCP server (1/3)
    7. 15.2: DHCP: One physical network, multiple logical networks, one DHCP server (2/3)
    8. 15.2: DHCP: One physical network, multiple logical networks, one DHCP server (3/3)
    9. 15.3: DHCP: One physical subnet, one logical subnet, multiple DHCP servers (1/3)
    10. 15.3: DHCP: One physical subnet, one logical subnet, multiple DHCP servers (2/3)
    11. 15.3: DHCP: One physical subnet, one logical subnet, multiple DHCP servers (3/3)
    12. 15.4: DHCP: multiple physical networks, logical networks, and DHCP servers (1/5)
    13. 15.4: DHCP: multiple physical networks, logical networks, and DHCP servers (2/5)
    14. 15.4: DHCP: multiple physical networks, logical networks, and DHCP servers (3/5)
    15. 15.4: DHCP: multiple physical networks, logical networks, and DHCP servers (4/5)
    16. 15.4: DHCP: multiple physical networks, logical networks, and DHCP servers (5/5)
    17. 15.5: DHCP: multiple physical, logical networks, and DHCP servers using Relay Agents (1/5)
    18. 15.5: DHCP: multiple physical, logical networks, and DHCP servers using Relay Agents (2/5)
    19. 15.5: DHCP: multiple physical, logical networks, and DHCP servers using Relay Agents (3/5)
    20. 15.5: DHCP: multiple physical, logical networks, and DHCP servers using Relay Agents (4/5)
    21. 15.5: DHCP: multiple physical, logical networks, and DHCP servers using Relay Agents (5/5)
  22. Chapter 16: Dynamic DNS scenarios
    1. 16.1: Single DDNS and DHCP server on the same server
      1. Scenario overview
      2. Planning worksheet: single DDNS and DHCP servers on one server
      3. Configuration: single DDNS and DHCP servers on one server
    2. 16.2: Single DDNS and DHCP servers without secured updates
      1. Scenario overview
      2. Planning: single DDNS and DHCP servers without secured updates
      3. Configuration: single DDNS and DHCP servers without secured updates (1/7)
      4. Configuration: single DDNS and DHCP servers without secured updates (2/7)
      5. Configuration: single DDNS and DHCP servers without secured updates (3/7)
      6. Configuration: single DDNS and DHCP servers without secured updates (4/7)
      7. Configuration: single DDNS and DHCP servers without secured updates (5/7)
      8. Configuration: single DDNS and DHCP servers without secured updates (6/7)
      9. Configuration: single DDNS and DHCP servers without secured updates (7/7)
    3. 16.3: Single DDNS and DHCP servers with secured updates
      1. Planning worksheet: single DDNS and DHCP servers with secured updates
      2. Configuration: single DDNS and DHCP servers with secured updates (1/2)
      3. Configuration: single DDNS and DHCP servers with secured updates (2/2)
    4. 16.4: Primary DDNS and DHCP servers on one server, secondary server as backup
      1. Scenario overview
      2. Planning worksheet: Secondary DDNS
      3. Configuration: Secondary DDNS (1/3)
      4. Configuration: Secondary DDNS (2/3)
      5. Configuration: Secondary DDNS (3/3)
    5. 16.5: Primary DDNS and DHCP servers, secondary DNS server Red Hat Linux 7.2
      1. Scenario overview
      2. Planning worksheet: secondary DDNS
      3. Configuration: secondary DDNS
    6. 16.6: Split DNS: Private and Public DNS with masquerade NAT
      1. Scenario overview
      2. Planning worksheet: split DNS with masquerade NAT
      3. Configuration: split DNS with masquerade NAT
  23. Chapter 17: Dynamic PPP scenarios
    1. 17.1: PPPoE branch office with secured connection
      1. Scenario overview
      2. Planning worksheet: PPPoE branch office with secured connection
      3. Configuring the PPPoE branch office with secured connection scenario (1/9)
      4. Configuring the PPPoE branch office with secured connection scenario (2/9)
      5. Configuring the PPPoE branch office with secured connection scenario (3/9)
      6. Configuring the PPPoE branch office with secured connection scenario (4/9)
      7. Configuring the PPPoE branch office with secured connection scenario (5/9)
      8. Configuring the PPPoE branch office with secured connection scenario (6/9)
      9. Configuring the PPPoE branch office with secured connection scenario (7/9)
      10. Configuring the PPPoE branch office with secured connection scenario (8/9)
      11. Configuring the PPPoE branch office with secured connection scenario (9/9)
    2. 17.2: Dynamic resource sharing scenario
      1. Scenario overview
      2. Configuring dynamic resource sharing
    3. 17.3: Dial-on-demand with unnumbered PPP connection
      1. Scenario overview
      2. Planning worksheet for dial-on-demand with unnumbered PPP connection
      3. Configuring dial-on-demand with unnumbered PPP connection (1/2)
      4. Configuring dial-on-demand with unnumbered PPP connection (2/2)
    4. 17.4: System i RADIUS NAS
      1. Scenario overview
      2. Planning worksheet for System i RADIUS NAS with RADIUS server
      3. Configuring the System i RADIUS NAS with RADIUS server (1/5)
      4. Configuring the System i RADIUS NAS with RADIUS server (2/5)
      5. Configuring the System i RADIUS NAS with RADIUS server (3/5)
      6. Configuring the System i RADIUS NAS with RADIUS server (4/5)
      7. Configuring the System i RADIUS NAS with RADIUS server (5/5)
    5. 17.5: Assigning an IP address to PPP client from DHCP server
      1. Scenario overview
      2. How-to
  24. Chapter 18: QoS scenarios
    1. 18.1: QoS: Inbound admissions policy: Connection rate (1/2)
    2. 18.1: QoS: Inbound admissions policy: Connection rate (2/2)
    3. 18.2: QoS: Inbound admissions policy: limiting connection rate based on HTTP URI (1/2)
    4. 18.2: QoS: Inbound admissions policy: limiting connection rate based on HTTP URI (2/2)
    5. 18.3: QoS: outbound bandwidth policies: differentiated services (1/2)
    6. 18.3: QoS: outbound bandwidth policies: differentiated services (2/2)
    7. 18.4: QoS: dedicated delivery: integrated services policy (1/2)
    8. 18.4: QoS: dedicated delivery: integrated services policy (2/2)
  25. Part 3: Advanced administration
  26. Chapter 19: Optimizing performance in a TCP/IP network
    1. 19.1: Network/Line Description settings
      1. Line Description configuration
      2. Maximum Frame Size and Maximum Transmission Unit (MTU)
    2. 19.2: TCP/IP send and receive buffers
    3. 19.3: Sockets programming tips and techniques
      1. IFS versus Sockets APIs
      2. Nagle algorithm and TCP_NODELAY
      3. Sending multiple data buffers efficiently
      4. Receiving data with MSG_WAITALL and SO_RCVLOWAT
      5. Waiting for incoming data - SO_RCVTIMEO
      6. Inheritance of socket options from listening socket
      7. Asynchronous I/O APIs on i5/OS
  27. Chapter 20: Considerations for starting and ending TCP/IP
    1. 20.1: Introduction
    2. 20.2: Starting TCP/IP: IPL attributes versus start-up program
    3. 20.3: Starting TCP/IP on systems with a 3494 Tape Library
    4. 20.4: Restricted state
    5. 20.5: Ending TCP/IP
    6. 20.6: Other considerations
      1. Network servers
      2. User-defined servers
    7. 20.7: Starting and ending TCP/IP references
  28. Chapter 21: Checking TCP/IP status programmatically
    1. 21.1: Considerations for checking TCP/IP status
    2. 21.2: CL programming example for checking TCP/IP status
      1. References
  29. Chapter 22: Using alias names and setting proxy ARP and preferred interface lists programmatically
    1. 22.1: Using interface alias names
    2. 22.2: Proxy ARP and the preferred interface list
    3. 22.3: Putting it all together
    4. 22.4: References
  30. Chapter 23: Using exit programs
    1. 23.1: Basic exit program information
    2. 23.2: Request Validation exits
      1. Capabilities of a Request Validation exit program
    3. 23.3: Server Logon exits
      1. Capabilities of a Server Logon exit program
    4. 23.4: REXEC Server Command Processing Selection exit
      1. REXEC Server Command Processing Selection exit program capabilities
    5. 23.5: Telnet exits
      1. Telnet Device Initialization exit point
      2. Telnet Device Termination exit point
    6. 23.6: DHCP exits
      1. DHCP Address Binding Notify exit
      2. DHCP Address Release Notify exit
      3. DHCP Request Packet Validation exit
  31. Chapter 24: Problem determination: where to start when things do not work
    1. 24.1: Preface: what you need to know before you start
    2. 24.2: Basic TCP/IP connectivity verification
    3. 24.3: Application specific problem scenarios
      1. DHCP problem scenarios
      2. PPP problem
    4. 24.4: Tools of the trade
      1. Commonly used commands and utilities
      2. Advanced tracing utilities (1/2)
      3. Advanced tracing utilities (2/2)
    5. 24.5: Security tips and comments
    6. 24.6: For more information
  32. Part 4: Appendixes
  33. Appendix A: Additional material
    1. Locating the Web material
    2. Using the Web material
      1. A Web application for testing features of the HTTP Server powered by Apache
      2. Support for an application that writes all interactive jobs and their corresponding IP addresses to a file
  34. Appendix B: IPv6 reference information
    1. Comparison: IPv4 to IPv6 (1/2)
    2. Comparison: IPv4 to IPv6 (2/2)
    3. Using IPv6 Communications Trace
      1. Preliminary steps
      2. Performing the trace
  35. Related publications
    1. IBM Redbooks
      1. Other resources
    2. Referenced Web sites
    3. How to get IBM Redbooks
      1. IBM Redbooks collections
  36. Index (1/3)
  37. Index (2/3)
  38. Index (3/3)
  39. Back cover

Product information

  • Title: IBM i5/OS IP Networks: Dynamic
  • Author(s): Kent Bruinsma, Jim Coon, Christopher Gloe, Brian Jongekryg, John Kasperski, Clair Wood, Yessong Johng
  • Release date: June 2007
  • Publisher(s): IBM Redbooks
  • ISBN: 9780738486499