unisys ClearPath Enterprise Servers TCP/IP Implementation and Operations Guide ClearPath MCP 16.0 April 2014 3787 7693 222



Similar documents
IPv6 Fundamentals: A Straightforward Approach

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

IP Addressing A Simplified Tutorial

Introduction to IP v6

8.2 The Internet Protocol

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

IPv6 Trace Analysis using Wireshark Nalini Elkins, CEO Inside Products, Inc.

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Firewalls und IPv6 worauf Sie achten müssen!

ERserver. iseries. Networking TCP/IP setup

Interconnecting Cisco Network Devices 1 Course, Class Outline

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

Lecture Computer Networks

IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas

"Charting the Course...

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Transport and Network Layer

Telematics. 9th Tutorial - IP Model, IPv6, Routing

Chapter 9. IP Secure

Chapter 3 Configuring Basic IPv6 Connectivity

Packet Capture. Document Scope. SonicOS Enhanced Packet Capture

ProCurve Networking IPv6 The Next Generation of Networking

Windows 7 Resource Kit

IP address format: Dotted decimal notation:

Raritan Valley Community College Academic Course Outline. CISY Advanced Computer Networking

- IPv4 Addressing and Subnetting -

Interconnecting Cisco Networking Devices Part 2

Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1

Industry Automation White Paper Januar 2013 IPv6 in automation technology

Ethernet. Ethernet. Network Devices

: Interconnecting Cisco Networking Devices Part 2 v1.1

Chapter 12 Supporting Network Address Translation (NAT)

Review: Lecture 1 - Internet History

Internetworking and IP Address

About the Technical Reviewers

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date

Technical Support Information Belkin internal use only

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

How To Learn Cisco Cisco Ios And Cisco Vlan

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)

ITL BULLETIN FOR JANUARY 2011

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

2. IP Networks, IP Hosts and IP Ports

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

Chapter 3 LAN Configuration

CCT vs. CCENT Skill Set Comparison

IPv6 Fundamentals, Design, and Deployment

Packet Monitor in SonicOS 5.8

IPv6 in Axis Video Products

Technology Brief IPv6 White Paper.

Chapter 13 Internet Protocol (IP)

RARP: Reverse Address Resolution Protocol

Networking Technology Online Course Outline

How To Understand and Configure Your Network for IntraVUE

Address Resolution Protocol (ARP), Reverse ARP, Internet Protocol (IP)

SSVVP SIP School VVoIP Professional Certification

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

IPv6 Hardening Guide for Windows Servers

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.

unisys ClearPath Enterprise Servers Network Services Implementation Guide ClearPath MCP 15.0 April

Module 2: Assigning IP Addresses in a Multiple Subnet Network

Subnetting,Supernetting, VLSM & CIDR

Guideline for setting up a functional VPN

IPv6 Diagnostic and Troubleshooting

Networking 4 Voice and Video over IP (VVoIP)

Internet Protocol Version 6 (IPv6)

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

IP - The Internet Protocol

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

Internet Protocol: IP packet headers. vendredi 18 octobre 13

AS/400e. TCP/IP routing and workload balancing

Step-by-Step Guide for Setting Up IPv6 in a Test Lab

WHITE PAPER. Understanding IP Addressing: Everything You Ever Wanted To Know

Internet Addresses (You should read Chapter 4 in Forouzan)

IETF IPv6 Request for Comments (RFCs) Updated

Types of IPv4 addresses in Internet

Neighbour Discovery in IPv6

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

SSVP SIP School VoIP Professional Certification

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine

Joe Davies. Principal Writer Windows Server Information Experience. Presented at: Seattle Windows Networking User Group June 1, 2011

Internetworking and Internet-1. Global Addresses

Internet Protocols Fall Lectures 7-8 Andreas Terzis

CloudEngine Series Switches. IPv6 Technical White Paper. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

UIP1868P User Interface Guide

Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2.

IPv6 Associated Protocols

Tomás P. de Miguel DIT-UPM. dit UPM

> Technical Configuration Guide for Microsoft Network Load Balancing. Ethernet Switch and Ethernet Routing Switch Engineering

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

TCP/IP Basis. OSI Model

NETWORK LAYER/INTERNET PROTOCOLS

Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

We Are HERE! Subne\ng

Router Security Configuration Guide Supplement - Security for IPv6 Routers

Transcription:

unisys ClearPath Enterprise Servers TCP/IP Implementation and Operations Guide ClearPath MCP 16.0 April 2014 3787 7693 222

NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THIS DOCUMENT. Any product or related information described herein is only furnished pursuant and subject to the terms and conditions of a duly executed agreement to purchase or lease equipment or to license software. The only warranties made by Unisys, if any, with respect to the products described in this document are set forth in such agreement. Unisys cannot accept any financial or other responsibility that may be the result of your use of the information in this document or software material, including direct, special, or consequential damages. You should be very careful to ensure that the use of this information and/or software material complies with the laws, rules, and regulations of the jurisdictions with respect to which it is used. The information contained herein is subject to change without notice. Revisions may be issued to advise of such changes and/or additions. Notice to U.S. Government End Users: This is commercial computer software or hardware documentation developed at private expense. Use, reproduction, or disclosure by the Government is subject to the terms of Unisys standard commercial license for the products, and where applicable, the restricted/limited rights provisions of the contract data rights clauses. Unisys and ClearPath are registered trademarks of Unisys Corporation in the United States and other countries. All other brands and products referenced in this document are acknowledged to be the trademarks or registered trademarks of their respective holders.

Contents Section 1. Overview Documentation Updates... 1 1 What s New?... 1 2 Notation Conventions... 1 4 Terminology Conventions... 1 4 TCP/IP Architecture... 1 5 Internet Protocol Version 6 (IPv6)... 1 6 MCP Networking and IPv6... 1 6 Summary of IPv6 Features... 1 7 Migrating to IPv6... 1 10 Key Differences Between IPv4 and IPv6... 1 11 IPv6 Internet Standards (IETF RFCs)... 1 12 TCP/IP Distributed Systems Services... 1 13 Section 2. Overview of TCP/IP Routing TCP/IP Routing Commands... 2 2 IPv4 Addressing... 2 4 Understanding IPv4 Address Classes... 2 4 Classful Addressing Limitations... 2 6 Subnetting... 2 6 IPv6 Addressing... 2 9 IPv6 Address Representation... 2 9 IPv6 Address Type Identification... 2 10 Unicast Addresses... 2 11 Global Unicast Addresses... 2 12 IPv6 Address Prefix Representation... 2 12 IPv6 Alternative Representations of Addresses... 2 13 Variable-Length Subnet Masking (VLSM)... 2 14 Classless Interdomain Routing (CIDR)... 2 16 CIDR in IPv4 Networks... 2 16 CIDR in IPv6 Networks... 2 19 TCP/IP IPv4 Network... 2 20 TCP/IP IPv6 Network... 2 21 Routing Information Protocol Version 2 (RIPv2)... 2 22 IPv6 Neighbor Discovery... 2 23 Support for Multiple Routes to a Destination... 2 24 MCP Route States... 2 25 Alternate Routes... 2 26 Dead Gateway Detection (IPv4 Networks)... 2 27 Discovering Unreachable Neighbors (IPv6 Networks)... 2 27 3787 7693 222 iii

Contents Parallel Routes... 2 28 Special Topologies... 2 29 Multiple Assigned Default Routes... 2 34 Multiple Local IP Addresses... 2 37 Section 3. Configuring a TCP/IP Network Using the NAU Overview of the Implementation Process... 3 2 Applying NAU TCP/IP Profiles... 3 2 Using Default Attribute Values... 3 3 Traversing the NAU Screens... 3 3 Configuring a Sample TCP/IP Network... 3 4 What the Sample Network Contains... 3 4 Adding TCP/IP to an Existing Network... 3 6 Starting the NAU... 3 6 Configuring TCP/IP on an Application Host... 3 7 Defining the Network Interface as a TCP/IP Connection... 3 9 Identifying IP Addresses, Subnet Mask, and Router Discovery Attributes for ICPs... 3 12 Defining TCP/IP Network Parameters... 3 15 Specifying the Enterprise Server TCP/IP Internet Host Name and ICMP Report Display Parameters... 3 19 Updating LAN Lines and Connections to Include TCP/IP... 3 24 Optional Enhancements to the TCP/IP Configuration... 3 24 Defining Known Routes to TCP/IP Hosts Not Directly Connected to the LAN... 3 25 Defining Unknown (Default) Routes to TCP/IP Hosts Not Directly Connected to the LAN... 3 27 Defining the TCP/IP ARP Address List... 3 29 Mapping a TCP/IP Host Name to IP Addresses... 3 30 Configuring Dynamic Initiation of Specified Port Numbers... 3 32 Configuring Port Filtering Using the FILTERFRAMES Command... 3 35 Configuring TCP and UDP Port Event Monitoring... 3 36 Configuring Default Policies for Selecting Source and Destination IPv6 Addresses... 3 39 Configuring TCP/IP Timer Values... 3 40 Configuration Procedure... 3 40 Configuring TCP/IP Options... 3 41 Configuration Procedure... 3 41 Configuring TCP/IP Neighbor Address Parameters... 3 51 Configuration Procedure... 3 52 Editing the ICP LAN Line Connection and Specifying a Multicast Address List... 3 54 Auto-Configuring BNA-over-IP (BIP) Connections... 3 56 Adding an IPv6 BNA-over-IP (BIP) Neighbor... 3 57 Configuring FC3-IOP Networking... 3 59 Specifying VLANID Attribute Values... 3 59 iv 3787 7693 222

Contents Specifying the VLANID Attribute in TCPIP Commands... 3 62 Checking Network Consistency... 3 63 Consistency Errors and Solutions... 3 64 Generating Initialization Files... 3 65 Printing the Network Description Reports... 3 68 Ending an NAU Session... 3 75 Initializing the TCP/IP Network... 3 75 Section 4. Operating TCP/IP Software Initializing the TCP/IP Network... 4 2 U. S. Export Regulations Concerning IPv6 and IPsec... 4 2 Dual Mode Initialization... 4 2 IPv6 Initialization... 4 3 Modifying the Autoconfiguration Setting... 4 3 IP Security (IPsec) Initialization... 4 3 Initialization File Names... 4 4 SNMP Agent Initialization... 4 4 Initializing TCP/IP... 4 4 Terminating TCP/IP on the Enterprise Server Host... 4 5 Inquiring on the Status of TCP/IP Software... 4 5 Inquiring on the Status of IPsec... 4 6 TCPIP Status Command Examples... 4 8 Setting Timer Values... 4 13 Setting the Routing Information Timer Value... 4 13 Setting the LAN Resiliency Timer Value... 4 14 Configuring Multiple Routes and Default Routes... 4 15 Configuring Multiple Routes to a Remote Destination... 4 16 Configuring Default IP Routes... 4 19 Inquiring About Routing Problems... 4 21 Clearing the Routing Table... 4 21 Specifying Selection Criteria for Route Inquiries... 4 22 Inquiring on the Routing Information Protocol (RIP)... 4 24 Setting the Routing Information Protocol Authentication Type... 4 25 IPv6 Default Address Selection... 4 26 TCPIP Address Selection Policy... 4 27 Inquiring on the Route Used to Reach a Remote Node... 4 28 Modifying TCP/IP Components Online... 4 30 Identifying a Local TCP/IP Host to the Network... 4 30 Assigning IP Addresses to a Network Interface... 4 31 Assigning Multiple Local IP Addresses and Mask Pairs to a Network Interface... 4 34 Detecting a Duplicate IP Address on Your Network... 4 35 Reporting on Autoconfigured Interfaces... 4 35 Creating a Mapping Between a TCP/IP Host and One or More IP Addresses... 4 36 3787 7693 222 v

Contents Inquiring on One or More Host Names... 4 39 Reaching a Remote Host or Other Network Interface on the Same Logical Host... 4 40 Verifying That Packets Are Received by a Remote Host... 4 42 Filtering TCP/IP Traffic... 4 44 Filtering Frames Based on Port Numbers... 4 44 Enabling Dynamic Port Filtering... 4 44 Enabling Static Port Filtering... 4 46 Filtering Broadcast Traffic... 4 47 IPv6 Protocol Filtering... 4 48 Filtering RIP Frames... 4 48 Deleting TCP/IP Components Online... 4 49 Deleting an IP Route to a TCP/IP Host... 4 49 Deleting Default IP Routes... 4 51 Deleting a User-Specified Mapping (TCP/IP Host to IP Address)... 4 52 Deleting All Learned Mappings... 4 52 Deleting an Enterprise Server IP Address from the Network... 4 52 Deleting Local IP Address and Mask Pairs... 4 53 Enabling a Host to Use the Address Mask Protocol... 4 55 Using Router Discovery... 4 61 Enabling a Host to Use the Router Discovery Protocol... 4 61 Using Neighbor Discovery... 4 66 Specifying Neighbor Discovery Options... 4 67 Setting the IPADDRESSLIST Attribute... 4 70 Controlling TCP/IP End System Security... 4 72 Differentiating Rules for Inbound/Outbound Dialogs and for TCP/UDP Protocols... 4 73 Initialized Security Environment... 4 73 Determining the Current TCP/IP End System Security State... 4 74 Enabling or Disabling TCP/IP End System Security... 4 75 Loading a Rules File... 4 76 Changing to Another Rules File... 4 76 Reviewing Security Rule Violations... 4 77 Authorizing the Use of Well-Known TCPIP Ports... 4 77 Using TCP/IP Options... 4 78 Enabling and Disabling IP Security (IPsec)... 4 79 Enabling and Disabling SSH... 4 79 Enabling and Disabling SSL... 4 79 Configuring LAN Resiliency... 4 79 Inquiring on the LAN Resiliency Timer... 4 80 TCPIP LAN Resiliency Report... 4 81 Disabling Mapping of Learned Host Names and IP Addresses... 4 81 Enabling Use of RFC 1122 MTU... 4 82 Enabling the Windows Server to Force the MTU to Acknowledge Every Two MTUs... 4 83 Protecting TCP/IP Dialogs Against ICMP Attacks... 4 83 vi 3787 7693 222

Contents Setting Path MTU Verification Interval... 4 84 Enabling and Disabling Session Warnings... 4 85 Specifying Autoconfiguration for a Network Interface... 4 86 Obtaining an Autoconfigured IP Address Using the MAC Address... 4 86 Specifying ICMPv6 Error Report Values... 4 87 Specifying the Default Maximum Hop Limit for a Router... 4 87 Closing Sockets by Job Number... 4 88 Specifying and Inquiring on IP Multicast Frames... 4 88 Updating an Initialization File to Use Multicast Addresses... 4 88 Deriving Ethernet Multicast Addresses from Multicast IP Addresses... 4 89 Enabling Multicast Address Handling for IPv4 Addresses Only... 4 89 Preventing a Done Report From Being Sent... 4 89 Specifying the Unsolicited Report Options for Multicast Listener Discovery... 4 90 Specifying the Window Scale Factor... 4 90 Specifying the TCP Selective Acknowledgement Option... 4 91 Disabling and Enabling the Dynamic Initiation of Specified Port Numbers... 4 92 Disabling the Dynamic Initiation of an Application... 4 92 Enabling the Dynamic Initiation of an Application... 4 93 Inquiring on the Dynamic Initiation Status of an Application... 4 93 Monitoring TCP and UDP Port Events... 4 94 Implementing Time-Wait for TCP/IP on MCP Systems... 4 96 Section 5. Troubleshooting TCP/IP Installation and Configuration Problems Verifying That TCP/IP End System Security Is Operable... 5 2 Verifying that IP Security (IPsec) Is Operable... 5 4 Inquiring About the TCP/IP Environment... 5 4 Displaying Enterprise Server TCP/IP Reports... 5 4 Monitoring TCP/IP System Activity with TCPIP DEBUG... 5 5 Using the Trace Option of the TCPIP DEBUG Command... 5 6 Using the Dump Option of the TCPIP DEBUG Command... 5 8 Using the TCPIP DISPLAY, TCPIP DISPLAY INTERVAL, and TCPIP DISPLAY OPTIONS Commands... 5 9 Using the TCPIP DISPLAY TABLE Command... 5 12 Understanding the TCP/IP CONNECTION RESET Report Diagnostic Codes... 5 14 3787 7693 222 vii

Contents Section 6. Running OSI Applications over a TCP/IP Network Functional Overview... 6 1 Overview of the Implementation Process... 6 2 Initializing the OSI Software on the TCP/IP Host... 6 4 Identifying OSI Application Endpoints... 6 4 Associating OSI and TCP/IP Addresses... 6 6 Defining an NSAP Address Which Contains an Embedded IP Address... 6 6 Configuring OSI-TCP/IP Address Pairs... 6 7 Using the NAU to Configure OSI-TCP/IP Address Pairs... 6 7 Using the Operations Interface (OI) to Configure OSI-TCP/IP Address Pairs... 6 19 Checking the OSI-TCP/IP Pairings Using Network Inquiries... 6 22 Sample OSI Initialization Files... 6 23 Configuring a More Complex Network... 6 26 Operating OSI Applications... 6 32 Appendix A. TCP/IP Commands and Inquiries Appendix B. Initialization File for the Sample Network CNS Initialization File...B 1 TCP/IP Initialization File...B 3 Appendix C. Using the NAU in a Web Browser Preparing the Web Enabler for ClearPath MCP HTML Page...C 1 Using a Sample Page...C 2 Creating a Page with the Web Enabler Wizard...C 2 Running the NAU in Web Enabler for ClearPath MCP...C 3 Appendix D. TCP/IP Capabilities TCP/IP Capabilities - Network Services... D 2 TCP/IP Capabilities - Host Services... D 7 Appendix E. TCP/IP Port Numbers Index... 1 viii 3787 7693 222

Figures 2 1. Two-Level Addressing Hierarchy... 2 4 2 2. Classful IP Addresses... 2 5 2 3. Subnet Address... 2 7 2 4. Extended-Network-Prefix... 2 7 2 5. Subnet Masking... 2 7 2 6. Subnetted Topology... 2 8 2 7. Unicast Address with no Internal Structure... 2 11 2 8. Unicast Address with Subnet Prefix... 2 11 2 9. General Format for Global Unicast Address... 2 12 2 10. VLSM Topology... 2 15 2 11. CIDR Routing Advertisements... 2 18 2 12. IPv6 CIDR Routing Advertisements... 2 19 2 13. Mixed Classful and Classless IPv4 Topology... 2 20 2 14. IPv6 Classless Topology... 2 21 2 15. Alternate Route Topology... 2 26 2 16. Parallel Route Topology... 2 28 2 17. Parallel Routes Through the Same Subnet... 2 30 2 18. Parallel Routes Through Alternate Networks... 2 31 2 19. Weak-Model Multihoming Topology (IPv4 Only)... 2 33 2 20. Resilient Weak-Model Multihoming Topology (IPv4 Only)... 2 34 2 21. Multiple Default Routes Topology... 2 35 2 22. Multiple Parallel Default Route Topology... 2 36 2 23. Multiple Logical Networks Topology... 2 37 3 1. Sample TCP/IP Network... 3 5 3 2. WELCOME Screen... 3 6 3 3. APPLICATION HOST LIST Screen... 3 7 3 4. APPLICATION HOST MENU Screen... 3 8 3 5. APPLICATION HOST ATTRIBUTES Screen... 3 9 3 6. ICP ASSIGNMENTS Screen... 3 10 3 7. SHARED ADAPTERS ICP CONFIGURATION Screen... 3 10 3 8. SHARED ADAPTERS CONFIGURATION Screen... 3 11 3 9. TCP/IP CONFIGURATION MENU Screen... 3 12 3 10. TCP/IP IDENTITY ADDRESS LIST Screen... 3 13 3 11. TCP/IP NETWORK ADDRESS PARAMETERS Screen... 3 15 3 12. TCP/IP MULTIPLE IDENTITY ADDRESS LIST Screen... 3 18 3 13. TCP/IP APPLICATION HOST PARAMETERS Screen... 3 19 3 14. TCP/IP ICMP REPORT DISPLAY Screen... 3 22 3 15. TCP/IP CONFIGURATION MENU Screen... 3 25 3 16. TCP/IP ROUTE LIST Screen... 3 26 3 17. TCP/IP ROUTE LIST Screen... 3 27 3 18. TCP/IP DEFAULT ROUTE LIST Screen... 3 28 3787 7693 222 ix

Figures 3 19. TCP/IP ARP ADDRESS LIST Screen... 3 29 3 20. TCP/IP HOST MAPPING LIST Screen... 3 30 3 21. TCP/IP MAPPING IP ADDRESS LIST Screen... 3 31 3 22. TCP/IP DYNAMICINIT COMMANDS Screen... 3 33 3 23. TCP/IP DISABLE TCP PORT SPECIFICATION Screen... 3 33 3 24. TCP/IP DISABLE UDP PORT SPECIFICATION Screen... 3 34 3 25. TCP/IP FILTERFRAMES COMMANDS Screen... 3 35 3 26. TCP/IP FILTERFRAMES ENABLE TCP PORTS Screen... 3 36 3 27. TCP/IP MONITOREVENTS COMMANDS Screen... 3 37 3 28. TCP/IP MONITOREVENTS PORT SPECIFICATION Screen... 3 38 3 29. TCP/IP ADDRESS SELECTION POLICY Screen... 3 39 3 30. TCP/IP OPTION Screen... 3 42 3 31. TCP/IP OPTION (2/2) Screen... 3 46 3 32. TCP/IP CONFIGURATION MENU Screen... 3 52 3 33. TCP/IP NETWORK ADDRESS PARAMETERS Screen... 3 53 3 34. LAN DEVICE LIST Screen... 3 54 3 35. LAN TCP/IP DEVICE ATTRIBUTES Screen... 3 55 3 36. TCP/IP MULTICAST ADDRESS LIST Screen... 3 56 3 37. NEIGHBOR PAIRED IP ADDRESS LIST Screen... 3 58 3 38. ICP ASSIGNMENTS Screen... 3 59 3 39. DIRECT ATTACH ADAPTER CONFIGURATION Screen... 3 60 3 40. DIRECT ATTACH LINE CONFIGURATION Screen... 3 61 3 41. CONSISTENCY CHECK MENU Screen... 3 63 3 42. GENERATE MENU Screen... 3 65 3 43. Sample TCP/IP Information Summary Report for Enterprise Server... 3 72 3 44. PRINT GENERATED NETWORK DESCRIPTION MENU Screen... 3 73 3 45. PRINT SELECT INFORMATION Screen... 3 74 4 1. Specifying IPADDRESSLIST Values... 4 71 4 2. TCP/IP End System Security Phases... 4 75 6 1. Sample TCP/IP Network Running OSI Applications... 6 8 6 2. Hierarchy of NAU Screens to Enable TCP/IP Hosts to Run OSI Applications... 6 9 6 3. OSI MENU Screen... 6 11 6 4. SYSTEM LIST Screen... 6 12 6 5. OSI SYSTEM MENU Screen... 6 12 6 6. NSAPA ASSIGNMENT LIST Screen... 6 13 6 7. NSAPA/IP ADDRESS PAIRING Screen... 6 14 6 8. OSI DESTINATION NETWORK ADDRESS PAIRS Screen... 6 15 6 9. OSI DESTINATION NETWORK ADDRESS PAIRS Screen... 6 16 6 10. LOCAL IP ADDRESS ASSIGNMENT Screen... 6 17 6 11. Sample OSI Network Address Pairing Summary Report... 6 19 6 12. Initialization File for OSI in ES1... 6 24 6 13. Initialization File for the OSI Endpoints in ES1... 6 25 6 14. NSAPA/IP ADDRESS PAIRING Screen... 6 29 B 1. B 2. CNS Initialization File...B 2 TCP/IP Initialization File...B 4 x 3787 7693 222

Tables 1 1. Key Differences Between IPv4 and IPv6... 1 11 1 2. IPv6 RFCs... 1 12 2 1. IPv4 CIDR Supernet/Subnet Table... 2 16 3 1. TCP/IP ICMP REPORT DISPLAY Screen Field Summary... 3 23 3 2. TCP/IP Options (OPTION Screen 1/2)... 3 43 3 3. TCP/IP Options (OPTION Screen 2/2)... 3 47 3 4. NAU TCP/IP Consistency Checker Error Messages... 3 64 4 1. IPSEC Summary Response... 4 6 4 2. IPMASKCONFIG Attribute Values... 4 57 5 1. Trace Options... 5 6 5 2. Dump Options... 5 8 5 3. ICMP Message Options... 5 10 5 4. Message and Table Options... 5 12 5 5. Diagnostic Codes for TCP/IP CONNECTION RESET Report... 5 14 6 1. Correcting Consistency Errors Found When Enabling TCP/IP Hosts to Use OSI Applications... 6 17 6 2. OSI-TCP/IP Address Pair Inquiries... 6 23 A 1. TCP/IP Commands and Inquiries... A 1 D 1. Network Services Capabilities... D 2 D 2. Host Services Capabilities... D 7 E 1. TCP/IP Well Known Ports... E 1 E 2. TCP/IP Registered Ports... E 3 3787 7693 222 xi

Tables xii 3787 7693 222

Section 1 Overview This guide describes the required software and hardware components of a TCP/IP network and provides procedures for configuring, operating, and troubleshooting TCP/IP software on ClearPath MCP servers. This guide is intended for the network administrator who installs and configures TCP/IP and also for system operators. This guide assumes you are familiar with the following: System operations CNS concepts and operations Network Administrative Utility (NAU) operations Documentation Updates This document contains all the information that was available at the time of publication. Changes identified after release of this document are included in problem list entry (PLE) 18953129. To obtain a copy of the PLE, contact your Unisys representative or access the current PLE from the Unisys Product Support website: http://www.support.unisys.com/all/ple/18953129 Note: If you are not logged into the Product Support site, you will be asked to do so. 3787 7693 222 1 1

Overview What s New? The following table identifies new and revised information for this release. New or Revised Information Modified the examples for network interfaces. Removed "Domain Name Services (DNS)" and replaced it with "Domain Name System (DNS)". Removed the "IEA-IOP" interface and replaced it with "FC3-IOP". Removed the "CNP" interface and replaced it with "VNP" and "MAICP4". Modified the CIDR Network example for IPv6. Modified the value entered in the Total LAN/ATM LANE Lines field. Modified the TCP Window Scale Factor range. Removed "ClearPath Network Appliance (CNA)" and replaced it with VNP and "Network Services". Added a new RFC to the Secure Shell (SSH) feature. Added a new Mac Algorithm to the NW TCPIP STATUS SSH enabled/running command response. Added a new Versions Supported to the NW TCPIP STATUS SSL enabled/running command response. Added two new Ciphers Supported to the NW TCPIP STATUS SSL enabled/running command response. Added a new response to the NW TCPIP STATUS SSL command. Modified information regarding Telnet Station Names and Incoming Telnet Sessions. Modified information regarding port filtering and filtering RIP frames. Location Section 1, "Overview" Section 3, "Configuring a TCP/IP Network Using the NAU" Section 1, "Overview" Appendix D, "TCP/IP Capabilities" Section 1, "Overview" Section 3, "Configuring a TCP/IP Network Using the NAU" Section 4, "Operating TCP/IP Software" Appendix A, "TCP/IP Commands and Inquiries" Section 2, "Overview of TCP/IP Routing" Section 3, "Configuring a TCP/IP Network Using the NAU" Section 3, "Configuring a TCP/IP Network Using the NAU" Section 3, "Configuring a TCP/IP Network Using the NAU" Section 4, "Operating TCP/IP Software" Section 3, "Configuring a TCP/IP Network Using the NAU" Appendix D, "TCP/IP Capabilities" Section 4, "Operating TCP/IP Software" Section 4, "Operating TCP/IP Software" Section 4, "Operating TCP/IP Software" Section 4, "Operating TCP/IP Software" Section 4, "Operating TCP/IP Software" Section 4, "Operating TCP/IP Software" 1 2 3787 7693 222

Overview New or Revised Information Added a new subsection to Section 4, describing how to implement the Time-Wait feature on an MCP System. Modified the description for the IPDESTADDR <IP address> command. Added a new RFC to the Secure Sockets Layer (SSL) feature. Added port number 22/tcp to the Secure Shell (SSH) service port. Modified the 137/tcp and 138/tcp port numbers and port name/descriptions. Modified the description for port number 139/tcp. Added port number 445/tcp and port name/description. Modified the port name/description for port number 56288/tcp. Added port number 56298/tcp to the Locum RealTime Config (SSL based port). Location Section 4, "Operating TCP/IP Software" Section 5, "Troubleshooting TCP/IP Installation and Configuration Problems" Appendix D, "TCP/IP Capabilities" Appendix E, "TCP/IP Port Numbers" Appendix E, "TCP/IP Port Numbers" Appendix E, "TCP/IP Port Numbers" Appendix E, "TCP/IP Port Numbers" Appendix E, "TCP/IP Port Numbers" Appendix E, "TCP/IP Port Numbers" 3787 7693 222 1 3

Overview Notation Conventions The following conventions are used in this guide: In text, data that you enter at the keyboard appear in bold. In text, system responses appear indented. Optional data that you enter at the keyboard, or that might appear in a message, appears throughout this guide enclosed in square brackets; for example, [data]. For Operations Interface (OI) commands, this guide shows the full command name and often shows permitted command abbreviations in text or examples. For example, for the NW TCPIP [TCPIP]IDENTITY command, you can enter any of the following: NW TCPIP TCPIPIDENTITY NW TCPIP TCPIPID NW TCPIP ID Variables that you enter at the keyboard, and those that appear in messages or on NAU screens, appear throughout this guide enclosed in angle brackets; for example, <variable>. NAU screen names appear in uppercase letters. Terminology Conventions In this document, the term ClearPath MCP servers refers to ClearPath Libra Series, FS Series, CS Series, and LX7100 Enterprise Servers. Application host refers to a ClearPath MCP host. To simplify fully inclusive references, the term Windows is used throughout this guide to refer to supported versions of the Windows operating system. The term network interface means the interface that provides TCP/IP networking from an enterprise server to a local area network (LAN). Some examples of network interfaces include Network Services (Shared Adapters or MCP Adapters), and FC3- IOPs. The term EVLAN refers to an enhanced virtual LAN connection, a high performance network path for TCP/IP-based data transfers between the MCP and Windows servers of a ClearPath system. For more details on EVLAN, refer to the Network Services Implementation Guide. 1 4 3787 7693 222

Overview TCP/IP Architecture Enterprise servers connected to a TCP/IP network provide a wide range of connectivity and interoperability. Using TCP/IP, you can link Unisys ClearPath MCP enterprise server systems with each other or with other vendors' systems. TCP/IP products provide the following: Support for dual IP layers, IPv4 and IPv6, enabling applications to operate over IPv4 and IPv6 simultaneously Flexible topologies over LANs and WANs LAN resiliency Integrated network management with the SNMP Agent Support of classless network topologies and route aggregation Support of multiple logical interfaces (local IP addresses) for a single network interface Multihoming of an enterprise server Network access control Support of sockets Secure sockets layer (SSL) implementation, which supports the SSL and TLS protocols Support for the RFC 1006 protocol standard (enables OSI communication over a TCP/IP network) TCP/IP distributed systems services (DSS), which are available to support your processing needs across a TCP/IP network Support for TCP/IP end system security, which enables the system administrator to monitor and control data traffic to and from networked MCP systems The system administrator can set up a security firewall by defining a set of Deny and Allow rules in an active rules file to specify which network traffic to allow or deny respectively. The TCP/IP security firewall has been enhanced to recognize IPv6 addresses. Support for IP Security (IPsec) which secures network data at the IP layer. IPsec over IPv6 networks is supported; IPsec over IPv4 is not supported. IPsec uses policies to define the security protection that is to be applied. Support for Secure Shell (SSH) for ClearPath MCP which secures data at the application layer. Secure File Transfer Protocol (SFTP) and a remote command utility (SSHCLIENT) are supported; SSH terminals are not supported. 3787 7693 222 1 5

Overview Internet Protocol Version 6 (IPv6) IPv6 is supported by MCP networking. This section provides an overview of IPv6. IPv6 is the next generation of the Internet Protocol. It is intended to remedy the impending shortage of IP addresses caused by the rapid expansion of the Internet and the growth of devices that are "connected" such as cell phones, PDAs, and home appliances. IPv6 uses a 128-bit address field instead of the 32-bit addresses used by IPv4. As a result, IPv6 affects a large number of MCP products mainly those making use of IP addresses or facilitating the use of IP addresses for other products. The new IPv6 software architecture is based on the current MCP host-resident TCP/IP architecture implemented for IPv4. The IPv6 protocol stack coexists with the existing IPv4 host-resident TCP/IP protocol stack. This dual-stack IP architecture enables applications to operate over IPv4 and IPv6 simultaneously and provides the transition mechanism for migrating from IPv4 networks to IPv6 networks. This architecture also permits a ClearPath MCP host to participate in a mixed network topology of IPv4-only hosts, IPv6-only hosts, and hosts capable of supporting both IPv4 and IPv6. MCP Networking and IPv6 Many products, including Networking software and Network Administrative Utility (NAU), have been updated to support IPv6. Both these products require at least MCP 12.0 (53.1) irrespective of IPv4 or IPv6 functionality. Because IP Security (IPsec) is currently considered a mandatory component of IPv6, IPv6 is considered an encryption product and is restricted under U.S. federal export regulations. To use MCP IPv6 networking, you must order the IOE Encryption Option. The appropriate keys to enable IPv6 and IPsec are included as part of the Encryption Option package. MCP IPv4 networking remains available and orderable as in the past. 1 6 3787 7693 222

Overview Summary of IPv6 Features This guide describes IPv6 features that affect TCP/IP in areas such as address configuration and resolution, route discovery, and security. Expanded Addressing Capabilities IPv6 increases the IP address size from 32 bits to 128 bits to support more levels of addressing hierarchy, a much greater number of addressable nodes, and simpler autoconfiguration of addresses. The scalability of multicast routing is improved by adding a scope field to multicast addresses. A new type of address called anycast address is defined and used to send a packet to any one of a group of nodes. See Section 2, Overview of TCP/IP Routing," for a detailed description of IPv6 addressing conventions. Header Format Simplification Some IPv4 header fields have been dropped or moved to optional extension headers to reduce the common-case processing cost of packet handling and to limit the added bandwidth cost of the IPv6 header (beyond the long addresses). Fragmentation and reassembly are limited to the source and destination nodes. Improved Support for Extensions and Options Optional Internet-layer information is encoded in separate headers, called extension headers, which can be placed between the IPv6 header and the upper-layer header in the packet. An IPv6 packet can carry zero, one, or more extension headers. Changes in the way IP header options are encoded allow for more efficient forwarding, less stringent limits on the length of options, and greater flexibility for introducing new options in the future. These headers increase and enhance the current capability of IP. For example, IPv6 has the ability to support datagrams (packets) larger than 65535 bytes, referred to as Jumbograms. This is accomplished through the use of the Jumbo Payload Hop-by-Hop option. IPv6 also provides greater network security through the use of the Authentication Headers (AH) and Encapsulating Security Payload (ESP) headers. IP Security IPv6 uses IP Security (IPsec) to enable the TCP/IP network provider to secure network traffic and communicate with other endpoints. IPsec provides security services by enabling a host to select required security protocols, determine the algorithms used for the service, and put in place any cryptographic keys required to provide the requested service. IPsec supports encrypted and authenticated datagrams through the use of ESP headers for the encryption and AH for the authentication. 3787 7693 222 1 7

Overview IPsec and its policies are administered by Security Center. Status information can be retrieved using the following Operations Interface (OI) commands: NW TCPIP OPTION IPSEC Enables and disables IPsec. NW TCPIP STATUS IPSEC Displays detailed IPsec information. NW TCPIP DEBUG The dump type option of this command dumps all entries in all IPsec tables. The trace type option of this command traces within the IPsec module. For more information on the TCPIP OPTION and TCPIP STATUS commands, see Section 4, Operating TCP/IP Software. For more information on the TCPIP DEBUG command, see Section 5, Troubleshooting TCP/IP Installation and Configuration Problems. ICMPv6 Messages The IPv6 version of ICMP (ICMPv6) is supported and implemented by every IPv6 node. ICMPv6 messages are one of two types: error messages or informational messages. All ICMPv6 messages have three fields that are common to all messages (type, code, and checksum), and a variable-length field that varies based on the message type. ICMPv6 supports the following error and information types: Destination Unreachable Packet Too Big Time Exceeded Parameter Problem ICMPv6 supports the following new Multicast Listener Discovery (MLD) message types: Multicast Listener Query Multicast Listener Report Multicast Listener Done ICMPv6 supports the following new Neighbor Discovery message types: Router Solicitation Router Advertisement Neighbor Solicitation Neighbor Advertisement Redirect 1 8 3787 7693 222

Overview Automatic Stateless Address Configuration and Duplicate Address Detection To simplify host configuration, IPv6 supports automatic stateless address configuration. This enables hosts on a link to automatically configure themselves with IPv6 addresses for the link and with addresses derived from prefixes advertised by local routers. Even in the absence of a router, hosts on the same link can automatically configure themselves with link-local addresses and communicate without manual configuration. This feature allows an IPv6-enabled node to be added to a network and, without any configuration, be able to communicate with other destinations in the network. Before an address is permanently assigned to an interface, it is verified to ensure that it is not already in use by another interface on the link using duplicate address detection. For information on specifying automatic stateless address configuration and duplicate address detection, see Assigning IPv6 Addresses and Specifying Autoconfiguration for a Network Interface in Section 4, Operating TCP/IP Software. IPv6 Neighbor Discovery IPv6 discovers and records information about neighbor nodes on the local link. This enables nodes to determine which neighbors are reachable and to find routers that are able to forward packets for them. It is the primary means of discovering IPv6 routing information. Neighbor Discovery provides the following as part of the base protocol set: Router Discovery Address Resolution Neighbor Unreachability Detection Redirection These features are described in more detail in IPv6 Neighbor Discovery in Section 2, Overview of TCP/IP Routing and in Using Neighbor Discovery in Section 4, Operating TCP/IP Software. For information on using Neighbor Discovery, see Specifying Neighbor Discovery Options in Section 4, Operating TCP/IP Software. Multicast Listener Discovery V1 Multicast listener discovery allows IPv6 routers to discover nodes on its link that want to receive multicast packets and to discover which multicast addresses are of interest to its neighboring nodes. This information is used by IPv6 routers to deliver multicast information to the links on which there are listening nodes. To receive multicast input, an application must specify the multicast IP address for which it intends to receive multicast input, and the TCP/IP initialization file must be configured with the link-layer multicast address. To specify multicast listener discovery report intervals and retry limits, see Specifying the Unsolicited Report Options for Multicast Listener Discovery in Section 4, Operating TCP/IP Software. 3787 7693 222 1 9

Overview Migrating to IPv6 In most cases, migrating hosts and networks in an enterprise to IPv6 is expected to be a gradual process. Compatibility with the existing IPv4 applications and hosts needs to be maintained during this transition period. It is also expected that Most or all remote hosts that are IPv6-capable are dual-stack. Edge routers (if not the complete network) are dual-stack in most cases, at least in the initial transition period. ClearPath MCP applications will be modified or newly written to be IPv6-capable as needed. These applications must be capable of operating on both IPv4 and IPv6 networks. Given the preceding conditions IPv6-capable MCP applications communicate with remote IPv4 hosts using the IPv4 layer, with IPv6 hosts using the IPv6 layer, and with dual-stack hosts using either the IPv4 or IPv6 layer with preference given to IPv6 for active opens. All existing unchanged MCP applications communicate with remote IPv4 hosts using the IPv4 layer. Existing unchanged applications that are not IP address-aware communicate with IPv6 hosts using the IPv6 layer, and with dual-stack hosts using either the IPv4 or IPv6 layer with preference given to IPv6 for active opens. Existing unchanged applications that are IP address-aware communicate with dualstack hosts using the IPv4 layer. If the remote host is IPv6-only, a network-based translation device can be used to facilitate the conversion between IPv4 and IPv6, transparently to hosts; the protocol used is NAT-PT. All applications using the MCP Sockets API and those using the user datagram protocol (UDP) need to be modified for IPv6. Applications using the Logical I/O and Co-op APIs over TCP connections are affected if one of the following is true: The applications need to be capable of connecting to remote hosts using explicit IP addresses. The applications handle (store, parse, generate, or display) IP addresses. 1 10 3787 7693 222

Overview Key Differences Between IPv4 and IPv6 Table 1 1 describes the key differences between IPv4 and IPv6. Table 1 1. Key Differences Between IPv4 and IPv6 IPv4 Source and destination addresses are 32 bits (4 bytes) in length. IPsec support is optional. No identification of packet flow for quality of service (QoS) handling by routers is present within the IPv4 header. Fragmentation is done by both routers and the sending host. Header includes a checksum. Header includes options. Address Resolution Protocol (ARP) uses broadcast ARP Request frames to resolve an IPv4 address to a link-layer address. Internet Group Management Protocol (IGMP) is used to manage local subnet group memberships. ICMP Router Discovery is used to determine the IPv4 address of the best default gateway and is optional. Broadcast addresses are used to send traffic to all nodes on a subnet. Must be configured either manually or through DHCP. Uses host address (A) resource records in the Domain Name System (DNS) to map host names to IPv4 addresses. Uses pointer (PTR) resource records in the IN-ADDR.ARPA DNS domain to map IPv4 addresses to host names. Must support a 576-byte packet size (possibly fragmented). IPv6 Source and destination addresses are 128 bits (16 bytes) in length. IPsec support is required. Packet flow identification for QoS handling by routers is included in IPv6 header using the Flow Label field. Fragmentation is not done by routers, only by the sending host. Header does not include a checksum. All optional data is moved to IPv6 extension headers. ARP Request frames are replaced with Multicast Neighbor Solicitation messages. IGMP is replaced with Multicast Listener Discovery (MLD) messages. ICMP Router Discovery is replaced with ICMPv6 Router Solicitation and Router Advertisement messages and is required. There are no IPv6 broadcast addresses. Instead, a link-local scope-all-nodes multicast address is used. Does not require manual configuration or DHCP. Uses host address (AAAA) resource records in the Domain Name System (DNS) to map host names to IPv6 addresses. Uses pointer (PTR) resource records in the IP6.INT DNS domain to map IPv6 addresses to host names. Must support a 1280-byte packet size (without fragmentation). 3787 7693 222 1 11

Overview IPv6 Internet Standards (IETF RFCs) The following Request for Comments (RFC) identifies functions provided by IPv6 that are implemented for all supported levels of MCP Networking. Table 1 2. IPv6 RFCs RFC Number Title 2460 Internet Protocol Version 6 (IPv6) Specification 2461 Neighbor Discovery for IP Version 6 (IPv6) 2462 IPv6 Stateless Address Autoconfiguration 2464 Transmission of IPv6 Packets over Ethernet Networks 2710 Multicast Listener Discovery (MLD) for IPv6 2732 Format for Literal IPv6 Addresses in URL s 3484 Default Address Selection for Internet Protocol Version 6 (IPv6) 3493 Basic Socket Interface Extensions for IPv6 3596 DNS Extensions to Support IP Version 6 4038 Application Aspects of IPv6 Transition 4191 Default Router Preferences and More-Specific Routes 4213 Basic Transition Mechanisms for IPv6 Hosts and Routers 4291 IP Version 6 Addressing Architecture 4294 IPv6 Node Requirements 4301 Security Architecture for the Internet Protocol 4302 IP Authentication Header (AH) 4303 IP Encapsulating Security Payload (ESP) 4308 Cryptographic Suites for IPsec 4429 Optimistic Duplicate Address Detection (DAD) for IPv6 4443 Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification 4835 Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ESP) and Authentication Header (AH) 1 12 3787 7693 222

Overview TCP/IP Distributed Systems Services Unisys provides a variety of TCP/IP distributed systems services (DSS) for use on ClearPath MCP systems. TCP/IP DSS products include the following: FTP Services for ClearPath MCP This product provides file transfer capabilities with two client interfaces, one server interface, and an operator/administrator interface. The capability for securing the control and/or the data streams through the use of the SSL protocol (called FTPS) or the use of the SSH protocol (called SFTP) is available. Telnet Services This product provides station connection services from one remote host to another across a TCP/IP network. The capability for securing the Telnet session with SSL is available. TCP/IP Printing This product provides printing services between the Print System or the Remote Print System and remote hosts and network printers by means of a TCP/IP network. Domain Name System (DNS) This product provides addressing services on a TCP/IP network. Time Synchronization This product allows multiple computers in a network to perform transactions that are time sensitive. Different machines have the capability of operating on the same time reference. Remote SSH Command Utility This product allows commands to be executed at remote Unix systems via the SSH protocol. For more information on using TCP/IP DSS products, refer to the TCP/IP Distributed Systems Services Operations Guide. 3787 7693 222 1 13

Overview 1 14 3787 7693 222

Section 2 Overview of TCP/IP Routing This section describes TCP/IP routing on ClearPath MCP servers. Beginning with MCP release 12.0, TCP/IP initializes in dual mode and can support both the IPv4 and IPv6 protocols running simultaneously on a ClearPath server. This section describes the basic routing concepts shared by IPv4 and IPv6 and explains the new features supported by IPv6 to enhance TCP/IP routing capabilities. This section provides the following: An overview of TCP/IP IPv4 and IPv6 routing commands IPv4 addressing and subnetting concepts IPv6 addressing concepts Conceptual material explaining variable-length subnet masking (VLSM) and classless interdomain routing (CIDR) and how these routing technologies are implemented by IPv4 and IPv6 Examples that illustrate various IPv4 and IPv6 routing topologies including the use of multiple routes to a common destination, multiple local IP addresses for a network interface, and multiple logical networks Notes: The IP addresses shown in the sample topologies in this section are for reference only. Do not use these addresses. If a routing feature is supported on both IPv4 and IPv6 networks, the sample topologies that illustrate the feature assume dual-mode operation and show support for both IPv4 and IPv6 running simultaneously. Therefore, both IPv4 addresses and IPv6 addresses are shown in the topologies, but these addresses cannot be intermixed. That is, a node with an IPv4 address cannot communicate with another node that has an IPv6 address. 3787 7693 222 2 1

Overview of TCP/IP Routing TCP/IP Routing Commands The following commands support TCP/IP routing. See Section 4, Operating TCP/IP Software, for information on how to use these commands. NW TCPIP ROUTE command NW TCPIP [TCPIP]IDENTITY command NW TCPIP RIP command (IPv4 only) NW TCPIP RIP RIPAUTHENTICATION command (IPv4 only) NW TCPIP ROUTE Command The NW TCPIP ROUTE command configures networks reachable through known routers. It enables you to configure routes that are more flexible, support resilient network topologies, and support VLSM or CIDR addressing and routing. Specific routes to remote hosts, subnets, networks, and supernets can be manually configured using the ROUTE ADD form of this command by supplying a destination and a next-hop router through which the destination can be reached. For IPv4 networks, VLSM-addressed or CIDR-addressed routes can be configured by adding a destination with the optional mask or / (slash) notation followed by the networkprefix attribute. For IPv6 networks, the IPv6 address autoconfiguration feature defaults to disabled. You can use the NW TCPIP ROUTE command to configure an IPv6 address on an interface. This initializes the IPv6 networking stacks and appropriate data structures for that interface. IPv6 networks do not support the mask attribute and use the / notation followed by the network-prefix attribute. Destinations that are configured without the mask or / networkprefix attribute notation are treated as host-specific routes. The ROUTE ADD form of the command can also be used to configure default routes. A default route is a route that is taken in the absence of a specific route (dynamically learned or manually configured) to a destination. Default routes can be assigned to specific VLSM or CIDR address aggregations (subnet/network/supernet) using the optional mask attribute (supported by IPv4 only) or / network-prefix attribute (supported by IPv4 and IPv6), and are referred to as assigned default routes. Default routes that are configured without the mask or / route-prefix attribute are treated as system default routes. The ROUTE DELETE form of the ROUTE command enables you to manually delete specific static (manually configured) routes to remote hosts, subnets, networks, or supernets and default routes. Only inactive routes (those without open dialogs) can be deleted unless forced by using the optional "NOW" keyword. 2 2 3787 7693 222

Overview of TCP/IP Routing NW TCPIP [TCPIP]IDENTITY Command The NW TCPIP [TCPIP]IDENTITY (TCPIP ID) command enables an IPv4 network administrator to configure and delete multiple local IP addresses or address and mask pairs for each network interface. This extends MCP TCP/IP multihoming capabilities to support multiple logical networks. With IPv4 networks, you can also use this command to set the RIP Authentication type for each network interface. For IPv6, the network administrator can use the NW TCPIP ID command to enable autoconfiguration and duplicate address detection. If autoconfiguration is enabled, IPv6 hosts are automatically configured when connected to a routed IPv6 network. This means that you can use the TCPIP ID command without specifying an IPv6 address. If autoconfiguration is not enabled, IPv6 addresses must be assigned manually for communication to occur within an IPv6 network. Both a link-local address and any routed unicast addresses in which the interface will participate must be manually specified. If a link-local address is missing on an interface that is configured for IPv6, then a waiting entry is generated. For example: 2422/ 2750 75 :03 TCPIP/WARNING/TASK/ACCEPT/211/1/0 ACCEPT:No IPv6 link local address for interface on Network processor 211 Line 1 VLAN 0. *** ENTER: 'AX OK', OR DS You can also specify the number of consecutive Neighbor Solicitation messages sent while performing duplicate address detection on a tentative address. This ensures that an address is not already in use by another interface before it is permanently assigned to an interface. NW TCPIP RIP and NW TCPIP RIP RIPAUTHENTICATION Commands The NW TCPIP RIP and NW TCPIP RIP RIPAUTHENTICATION (TCPIP RIP RIPAA) commands are supported only by IPv4. The NW TCPIP RIP command provides current Routing Information Protocol (RIP) status and configuration information. The NW TCPIP RIP RIPAA command sets the type of RIPv2 authentication that is in effect for a specified network processor and line. Network administrators can also inquire on the current authentication types set on each device and line configured on the system. IPv6 uses dynamic route discovery to perform the same functions as RIP in IPv4. Dynamic route discovery gathers information learned from router advertisements in order to build a list of routers to which packets can be sent. If autoconfiguration is enabled, local addresses are parsed and built from the prefixes in the router advertisements. 3787 7693 222 2 3

Overview of TCP/IP Routing IPv4 Addressing An Internet Protocol (IP) address is assigned to every host that uses the TCP/IP IPv4 protocol. This address is 32 bits in length, consisting of four octets or bytes. In decimal form, it is commonly represented as four fields, separated by dots, where each field contains a value in the range of 0 to 255. For example: 192.68.254.17 Each IP address consists of two parts as shown in Figure 2 1. The first part of the address is the network-number, which identifies the network on the Internet on which the host resides. The second part of the address is the host-number, which indicates a specific host within that network. Since the leading portion of an IP address provides the network-number, it is often referred to as the network-prefix. All hosts on any given network share the same network-prefix but must have a unique host-number. bit # 0 31 Network-Number/ Network-Prefix Host-Number 001 Figure 2 1. Two-Level Addressing Hierarchy Understanding IPv4 Address Classes In order to support networks of different sizes, address space is divided into different address classes, Class A, B, and C recognized as classful addressing. Addresses within each class are self-identifying because the boundary between the network-prefix and the host-number is fixed depending on the class to which they belong. Given any classful IP address, its class can be determined from a self-encoding key at the beginning of the network-prefix as shown in Figure 2 2. 2 4 3787 7693 222

Overview of TCP/IP Routing Class A bit # 0 7 31 0 Network-Prefix Host-Number Class B bit # 0 15 31 1 0 Network-Prefix Host-Number Class C bit # 0 23 31 1 1 0 Network-Prefix Host-Number 002 Figure 2 2. Classful IP Addresses Class A (addresses that start with 1 126; 8-bit network prefix) Class A is reserved for 126 large public networks and very large corporate networks. All of these network numbers have already been assigned. Each Class A network can contain almost 17 million (2 24-2) hosts. Example: 10.4.5.1 (for host 4.5.1 on network number 10.0.0.0). Class B (addresses that start with 128 191; 16-bit network prefix) Class B can support 16,384 networks and is used by government agencies and very large corporations. Most of the 16,382 possible Class B addresses have already been assigned. Each Class B network can contain up to 65,534 (2 16-2) hosts. Example: 172.16.5.1 (host 5.1 on network number 172.16.0.0). Class C (addresses that start with 192 223; 24-bit network prefix) Class C is intended for most users around the world. There are several million possible Class C networks. Each Class C network can contain up to 254 (2 8-2) hosts. Example: 192.139.25.1 (host 1 on network number 192.139.25.0). Class D (addresses that start with 224-239) Hosts can use Class D addresses to multicast messages to a specific group of nodes. Class E (addresses that start with 240-255) Class E is reserved for future use. 3787 7693 222 2 5