IBM z/OS V1R13 Communications Server TCP/IP Implementation: Volume 2 Standard Applications

Book description

For more than 40 years, IBM® mainframes have supported an extraordinary portion of the world's computing work, providing centralized corporate databases and mission-critical enterprise-wide applications. The IBM System z®, the latest generation of the IBM distinguished family of mainframe systems, has come a long way from its IBM System/360 heritage. Likewise, its IBM z/OS® operating system is far superior to its predecessors, providing, among many other capabilities, world-class, state-of-the-art, support for the TCP/IP Internet protocol suite.

TCP/IP is a large and evolving collection of communication protocols managed by the Internet Engineering Task Force (IETF), an open, volunteer, organization. Because of its openness, the TCP/IP protocol suite has become the foundation for the set of technologies that form the basis of the Internet. The convergence of IBM mainframe capabilities with Internet technology, connectivity, and standards (particularly TCP/IP) is dramatically changing the face of information technology and driving requirements for ever more secure, scalable, and highly available mainframe TCP/IP implementations.

The IBM z/OS Communications Server TCP/IP Implementation series provides understandable, step-by-step guidance about how to enable the most commonly used and important functions of z/OS Communications Server TCP/IP.

This IBM Redbooks® publication provides useful implementation scenarios and configuration recommendations for many of the TCP/IP standard applications that z/OS Communications Server supports.

For more specific information about z/OS Communications Server standard applications, high availability, and security, see the other volumes in the series:

  • IBM z/OS V1R13 Communications Server TCP/IP Implementation: Volume 1 Base Functions, Connectivity, and Routing, SG24-7996

  • IBM z/OS V1R13 Communications Server TCP/IP Implementation: Volume 3 High Availability, Scalability, and Performance, SG24-7998

  • IBM z/OS V1R13 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking, SG24-7999


  • For comprehensive descriptions of the individual parameters for setting up and using the functions that we describe in this book, along with step-by-step checklists and supporting examples, see the following publications:

  • z/OS Communications Server: IP Configuration Guide, SC31-8775

  • z/OS Communications Server: IP Configuration Reference, SC31-8776

  • z/OS Communications Server: IP User's Guide and Commands, SC31-8780


  • This book does not duplicate the information in those publications. Instead, it complements them with practical implementation scenarios that can be useful in your environment. To determine at what level a specific function was introduced, see z/OS Communications Server: New Function Summary, GC31-8771. For complete details, we encourage you to review the documents that are listed in the additional resources section at the end of each chapter.

    Table of contents

    1. Notices
      1. Trademarks
    2. Preface
      1. The team who wrote this book
      2. Now you can become a published author, too!
      3. Comments welcome
      4. Stay connected to IBM Redbooks
    3. Chapter 1: The syslog daemon
      1. Conceptual overview of syslogd
        1. What is syslogd
        2. How syslogd works
        3. How can syslogd be deployed
      2. Log messages to different files and to a single file
        1. Description of logging to multiple files and to a single file
        2. Configuration of multiple files and a single file
        3. Verification of multiple files and a single file
      3. Starting two syslogd instances
        1. Description of two syslogd instances
        2. Configuring two syslogd instances
        3. Verification for running two syslogd instances
      4. The syslogd functions
        1. The syslogd operator commands
        2. Description of syslogd automatic archival
        3. The syslogd browser and search facility (1/2)
        4. The syslogd browser and search facility (2/2)
      5. Problem determination for syslogd logging
      6. Additional information sources for syslogd
    4. Chapter 2: TN3270E Telnet server
      1. Conceptual overview of the TN3270E server
        1. What is the TN3270E server
        2. How does the TN3270E server work
        3. Possible uses for the TN3270E server
      2. TN3270E server in a single image
        1. Description of our TN3270E server scenario
        2. Configuration of the TN3270E server
        3. Activation of the TN3270E server
        4. Verification of the TN3270E server
        5. Administration and management of the TN3270E server (1/3)
        6. Administration and management of the TN3270E server (2/3)
        7. Administration and management of the TN3270E server (3/3)
      3. Multiple TN3270E servers in a multiple image environment
        1. Multiple TN3270E servers within the sysplex
        2. Configuration of multiple TN3270E servers within the sysplex (1/2)
        3. Configuration of multiple TN3270E servers within the sysplex (2/2)
        4. Activation and verification of multiple TN3270E servers in the sysplex (1/2)
        5. Activation and verification of multiple TN3270E servers in the sysplex (2/2)
      4. Multiple TN3270E servers using LU name server and LU name requester
        1. Description of TN3270E servers using LU name server and requester (1/2)
        2. Description of TN3270E servers using LU name server and requester (2/2)
        3. Configuration of TN3270E servers within sysplex using LU name server and requester (1/2)
        4. Configuration of TN3270E servers within sysplex using LU name server and requester (2/2)
        5. Activation and verification of LU name server and requester within sysplex (1/3)
        6. Activation and verification of LU name server and requester within sysplex (2/3)
        7. Activation and verification of LU name server and requester within sysplex (3/3)
        8. Scenario: LU name server automated takeover when active name server fails
      5. TN3270E server in a single image using SHAREACB
        1. Overview of SHAREACB utilization
        2. Configuration of the TN3270E server with SHAREACB option
        3. Activation of the TN3270E server
        4. Verification of the TN3270E server with SHAREACB defined
      6. TN3270 support of TSO logon reconnect
      7. Problem determination for the TN3270E servers
        1. Review the definition statements within the profile
        2. Use TCP/IP and Telnet commands
        3. Use the MSG07 statement in the TN3270 profile
        4. Use SMF records to capture TN3270 connection activity
        5. Use trace data
        6. Tips for multiple TN3270E servers in a Parallel Sysplex environment
        7. Tips for LU name server and LU name requester diagnosis
      8. Additional information sources for the TN3270E server
    5. Chapter 3: File Transfer Protocol
      1. Conceptual overview of FTP
        1. What is FTP
        2. How does FTP work
        3. How can FTP be used
      2. Basic FTP without security
        1. Description of basic FTP without security
        2. Planning for the basic FTP environment without security (1/3)
        3. Planning for the basic FTP environment without security (2/3)
        4. Planning for the basic FTP environment without security (3/3)
        5. Configuration of basic FTP without security
        6. Activation and verification for basic FTP without security (1/2)
        7. Activation and verification for basic FTP without security (2/2)
      3. Multiple FTP servers in a sysplex
        1. Description of multiple FTP servers in a sysplex
        2. Configuration for multiple FTP servers in the sysplex
        3. Activation and verification of FTP servers within sysplex (1/2)
        4. Activation and verification of FTP servers within sysplex (2/2)
      4. FTP client using batch
        1. Description of FTP client using batch
        2. Configuration of FTP client using batch
        3. Activation and verification of FTP client batch job
      5. FTP client application program interface
        1. FTP client API for REXX
        2. FTP client API for Java
      6. FTP access to UNIX named pipes
        1. What are UNIX named pipes
        2. Description of FTP access to UNIX named pipes
        3. FTP configuration options
        4. Use the z/OS FTP client to create a named pipe in the z/OS FTP server
        5. Supported z/OS FTP subcommands
        6. Storing into a named pipe
      7. FTP large data set access
        1. The extended address volume
        2. FTP support for large format data set
        3. Example of EAS-eligible data set allocation for FTP transfer
      8. Miscellaneous configuration settings of FTP
        1. A single generic FTP server in a multiple stack z/OS image
        2. FTP network management interface with SMF
      9. Problem determination for FTP
      10. Additional information sources for FTP
    6. Chapter 4: Simple Network Management Protocol
      1. Conceptual overview of SNMP
        1. What is SNMP
        2. How does SNMP work
        3. How can SNMP be applied
      2. z/OS SNMP agent
        1. Description of the z/OS SNMP agent
        2. Configuration of the z/OS SNMP agent (1/2)
        3. Configuration of the z/OS SNMP agent (2/2)
        4. Activation and verification of the z/OS SNMP agents
      3. z/OS SNMP subagents
        1. Description of SNMP subagents
        2. Configuration of SNMP subagents
        3. Activation and Verification of SNMP subagents
      4. z/OS SNMP client command
        1. Description of the SNMP client commands
        2. Configuration tasks for the SNMP client commands
        3. Using the osnmp/snmp z/OS UNIX command (1/2)
        4. Using the osnmp/snmp z/OS UNIX command (2/2)
      5. Problem determination for the SNMP facilities
      6. Additional information sources for SNMP
    7. Chapter 5: IP printing
      1. Conceptual overview of IP printing
        1. What is IP printing
        2. How does IP Printing work
        3. How can IP Printing be applied
      2. LPR/LPD
        1. Description of LPR/LPD
        2. Configuration tasks for LPR/LPD
        3. Activation and verification of LPR/LPD
      3. Infoprint Server
        1. Description of the Infoprint Server
        2. Configuration of Infoprint Server (1/2)
        3. Configuration of Infoprint Server (2/2)
      4. Problem determination for LPR/LPD (1/2)
      5. Problem determination for LPR/LPD (2/2)
      6. Additional information sources for IP printing
    8. Chapter 6: INETD
      1. Conceptual overview of INETD
        1. What is INETD
        2. How does INETD work
        3. How can INETD be applied
      2. A single INETD setup
        1. Description of the INETD setup
        2. Configuration tasks for INETD setup
        3. Activation and verification of INETD
      3. Problem determination for INETD
      4. Additional information sources for INETD
    9. Chapter 7: z/OS mail servers
      1. Conceptual overview of z/OS mail applications
        1. z/OS mail services
        2. How z/OS mail services work
        3. How z/OS mail services are applied
      2. z/OS CSSMTP, a mail forwarding SMTP client
        1. Advantages of using z/OS CSSMTP client
        2. Configuration tasks for the z/OS CSSMTP client
        3. Verification of the z/OS CSSMTP client
      3. z/OS SMTP as a mail server
        1. Description of z/OS SMTP server
        2. Configuration tasks for the z/OS SMTP server (1/2)
        3. Configuration tasks for the z/OS SMTP server (2/2)
        4. Verification of the z/OS SMTP server
      4. Using sendmail and popper as mail servers
        1. Description of sendmail and popper
        2. Configuration tasks for sendmail and popper
        3. Verification of sendmail and popper setup
      5. Using sendmail as a client
        1. Description of the sendmail client
        2. Configuration tasks for the sendmail client
        3. Verification of the sendmail client
      6. Problem determination for the mail facilities
        1. Problem determination tasks for the z/OS SMTP server
        2. Problem determination for sendmail and popper
        3. Problem determination for the sendmail client
      7. Additional information sources for mail servers
    10. Chapter 8: z/OS UNIX Telnet server
      1. Conceptual overview of otelnetd
        1. What is otelnetd
        2. How does otelnetd work
        3. How can otelnetd be applied
      2. z/OS UNIX Telnet server implementation
        1. Description of the otelnetd server
        2. Configuration tasks for otelnetd
        3. Activation and verification of otelnetd
      3. Problem determination for otelnetd
      4. Additional information sources for otelnetd
    11. Chapter 9: Remote execution
      1. Conceptual overview of remote execution
        1. What is remote execution
        2. How does remote execution work
        3. How can remote execution be applied
      2. TSO remote execution server
        1. Description of TSO remote execution server
        2. Configuration tasks for TSO remote execution server
        3. Activation and verification of TSO remote execution server
      3. z/OS UNIX remote execution server
        1. Description of z/OS UNIX remote execution server
        2. Configuration tasks for z/OS UNIX remote execution server
        3. Activation and verification of z/OS UNIX remote execution server
      4. REXEC TSO client command using user ID/password
        1. Description of REXEC TSO with user ID and password
        2. Configuration of REXEC TSO with user ID and password
        3. Verification of REXEC TSO with user ID and password
      5. REXEC TSO client command using the NETRC data set
        1. Description of REXEC TSO client using NETRC
        2. Configuration of REXEC TSO client using NETRC
        3. Verification of REXEC TSO client using NETRC
      6. REXEC UNIX client command
        1. Description of the REXEC UNIX client command
        2. Configuration of the REXEC UNIX client command
        3. Verification of the REXEC UNIX client command
      7. Problem determination for z/OS remote execution facilities
        1. Problem determination for TSO remote execution
        2. Problem determination for REXEC TSO with user ID and password
        3. Problem determination of REXEC TSO using NETRC
        4. Problem determination for the REXEC UNIX client command
        5. Recovery for server job table full condition
        6. Diagnostic messages for debugging
      8. Additional information sources for remote execution and remote shell
    12. Chapter 10: Domain Name System
      1. Conceptual overview of the DNS name server
        1. What is Domain Name System
        2. How does Domain Name System work
        3. How can Domain Name System be applied
        4. Considerations about z/OS DNS BIND 9 implementation
      2. Authoritative DNS server
        1. Description of an authoritative DNS server
      3. Caching-only DNS server
        1. Description of a caching-only DNS server
        2. Configuration of a caching-only DNS server (1/2)
        3. Configuration of a caching-only DNS server (2/2)
        4. Activation and verification of a caching-only DNS server
      4. Automated domain name registration
        1. Description of ADNR
        2. Configuration of ADNR
        3. Activation and verification of ADNR
      5. Problem determination for DNS service
        1. Problem determination for a caching-only DNS server
        2. Problem determination for ADNR
      6. Additional information sources for DNS
    13. Appendix A: Environment variables
      1. Description of the environment variable information
      2. Native MVS API environment
      3. z/OS UNIX API environment
      4. z/OS UNIX System Services environment variables
      5. Language Environment variables
      6. Application-specific environment variables (1/2)
      7. Application-specific environment variables (2/2)
      8. Setting environment variables
    14. Appendix B: Sample files provided with TCP/IP
      1. Sample files by component (1/2)
      2. Sample files by component (2/2)
    15. Appendix C: Configuration files: TN3270E stand-alone scenario
      1. SC31 TN3270B Server PROC for TN3270 stand-alone scenario
      2. SC31 TN3270B Server profile for TN3270 stand-alone scenario
      3. SC31 TCPIPB stack PROC for TN3270 stand-alone scenario
      4. SC31 TCPIPB stack PROFILE for TN3270 stand-alone scenario
      5. SC31 OMPROUTE PROC for TN3270 stand-alone scenario
      6. SC31 OMPROUTE STDENV file for TN3270 stand-alone task scenario
      7. SC31 OMPROUTE CONFIG for TN3270 stand-alone scenario
    16. Appendix D: Multiple TN3270E Telnet servers and sysplex distribution using the LUNS and LUNR scenario
      1. SC30 files for LUNS and LUNR scenario
        1. SC30 TN3270A Server PROC for LUNS and LUNR scenario
        2. SC30 TN3270A Server PROFILE for LUNS and LUNR scenario
        3. SC30 TNLUNS30 backup LUNS PROC for LUNS and LUNR scenario
        4. SC30 TNLUNS30 PROFILE for LUNS and LUNR scenario
        5. SC30 TCPIPA stack PROC for LUNS and LUNR scenario
        6. SC30 TCPIPA stack PROFILE for LUNS and LUNR scenario
        7. SC30 OMPROUTE PROC for LUNS and LUNR scenario
        8. SC30 OMPROUTE STDENV file for LUNS and LUNR scenario
        9. SC30 OMPROUTE CONFIG for LUNS and LUNR scenario
      2. SC31 files for LUNS and LUNR scenario
        1. SC31 TN3270B Server PROC for LUNS and LUNR scenario
        2. SC31 TN3270B Server PROFILE for LUNS and LUNR scenario
        3. SC31 TNLUNS31 primary LUNS PROC for LUNS and LUNR scenario
        4. SC31 TNLUNS31 PROFILE for LUNS and LUNR scenario
        5. SC31 TCPIPB stack PROC for LUNS and LUNR scenario
        6. SC31 TCPIPB stack PROFILE for LUNS and LUNR scenario
        7. SC31 OMPROUTE PROC for LUNS and LUNR scenario
        8. SC31 OMPROUTE STDENV file for LUNS and LUNR scenario
        9. SC31 OMPROUTE CONFIG for LUNS and LUNR scenario
    17. Appendix E: FTP and translation tables
      1. Conceptual overview of FTP translation
        1. What is translation
        2. How does translation work
        3. How can FTP translation be applied
      2. Using the RFC2389 and RFC2640 FTP features
        1. RFC 2389: Feature negotiation
        2. RFC2640: FTP Internationalization
        3. Requirements to implement these RFCs
      3. Selecting translation tables
        1. Using the QUOTE SITE subcommand
        2. Using the TRACE option at the server
        3. Using the DEBUG option at the client
        4. Using the TRANSLATE sub command
        5. Setting a DBCS transfer mode
        6. Enabling Unicode transfer mode
    18. Appendix F: Our implementation environment
      1. The environment used for all four books
      2. Our focus for this book
    19. Related publications
      1. IBM Redbooks publications
      2. Other publications
      3. Online resources
      4. How to get IBM Redbooks publications
      5. Help from IBM
    20. Index (1/3)
    21. Index (2/3)
    22. Index (3/3)
    23. Back cover

    Product information

    • Title: IBM z/OS V1R13 Communications Server TCP/IP Implementation: Volume 2 Standard Applications
    • Author(s): Mike Ebbers, Rama Ayyar, Octavio L. Ferreira, Yohko Ojima, Gilson Cesar de Oliveira, Mike Riches, Maulide Xavier
    • Release date: December 2011
    • Publisher(s): IBM Redbooks
    • ISBN: None