Book description
Building on the cool ideal, this IBM® IBM Redbooks publication describes V5 enhancements to many of the TCP/IP applications. The two book predecessors, combined, have been downloaded over 97,000 times: for V3, Cool Title About the AS/400 and Internet, SG24-4815-01, and V4 TCP/IP for AS/400: More Cool Things Than Ever, SG24-5190-00. Both of these extremely popular books are “aggregators” — a place to bring together many different technologies all in one place to have a common theme; teach the basics. That is, teach what the functions can do, define scenarios, and then implement the scenarios in a how-to fashion. Many of the topics covered in those earlier books, such as HTTP, Digital Certificates, and even TCP/IP have grown to the point now that they require their own Redbooks™ . In this book, we cover Telnet, FTP, IPP, NTP, SMTP, and making VPN connections with the iSeries™ , to and from the Internet.
Please note that the additional material referenced in the text is not available from IBM.
Table of contents
- Notices
- Preface
-
Part 1: Defining the applications
- Chapter 1: File Transfer Protocol
-
Chapter 2: Telnet on the iSeries
- Virtual device descriptions
- QAUTOVRT system value
- Telnet naming conventions for virtual devices/controllers
- Telnet device initialization and termination exit points
- Mapping a Virtual device description to an IP address
- Other Telnet enhancements
- Extended administrative flexibility
- Security (1/2)
- Security (2/2)
- Telnet problem determination
- More information
- Chapter 3: Connecting your iSeries to the Internet
- Chapter 4: iSeries mail services
- Chapter 5: Time protocols and applications
-
Part 2: Scenarios
-
Chapter 6: Transferring files between systems
- Sharing files between iSeries servers using QFileSvr.400 (1/2)
- Sharing files between iSeries servers using QFileSvr.400 (2/2)
- Sharing files between systems using NFS (1/2)
- Sharing files between systems using NFS (2/2)
- Sharing files with Windows systems by using the NetServer (1/3)
- Sharing files with Windows systems by using the NetServer (2/3)
- Sharing files with Windows systems by using the NetServer (3/3)
- Transferring files using secure FTP (1/6)
- Transferring files using secure FTP (2/6)
- Transferring files using secure FTP (3/6)
- Transferring files using secure FTP (4/6)
- Transferring files using secure FTP (5/6)
-
Transferring files using secure FTP (6/6)
- Plan the configuration of the local Certificate Authority
- Plan the configuration of the server certificate
- Create the local Certificate Authority on NewYork.ABCCo.com
- Create the *SYSTEM certificate store and server certificate
- Configure the FTP server to listen for secure connections
- Export the Certificate Authority certificate to IFS
- Create a *SYSTEM certificate store on the Houston iSeries
- Import the CA certificate into the Houston.ABCCo.com certificate store
- Configure the FTP client to trust the Certificate Authority
- Test the configuration
- Configuring client authentication for the FTP server (1/4)
- Configuring client authentication for the FTP server (2/4)
- Configuring client authentication for the FTP server (3/4)
- Configuring client authentication for the FTP server (4/4)
-
Chapter 7: Securing Telnet sessions
- iSeries Telnet server support with client authentication (1/8)
- iSeries Telnet server support with client authentication (2/8)
- iSeries Telnet server support with client authentication (3/8)
- iSeries Telnet server support with client authentication (4/8)
- iSeries Telnet server support with client authentication (5/8)
- iSeries Telnet server support with client authentication (6/8)
- iSeries Telnet server support with client authentication (7/8)
- iSeries Telnet server support with client authentication (8/8)
-
Chapter 8: Connecting your iSeries to the Internet: Scenarios
- Connecting to Internet from behind a firewall: HTTP Server (1/4)
- Connecting to Internet from behind a firewall: HTTP Server (2/4)
- Connecting to Internet from behind a firewall: HTTP Server (3/4)
- Connecting to Internet from behind a firewall: HTTP Server (4/4)
- Connecting to the Internet from DMZ: Host to host VPN (1/6)
- Connecting to the Internet from DMZ: Host to host VPN (2/6)
- Connecting to the Internet from DMZ: Host to host VPN (3/6)
- Connecting to the Internet from DMZ: Host to host VPN (4/6)
- Connecting to the Internet from DMZ: Host to host VPN (5/6)
- Connecting to the Internet from DMZ: Host to host VPN (6/6)
- Connecting to the Internet from DMZ: Host to gateway VPN (1/7)
- Connecting to the Internet from DMZ: Host to gateway VPN (2/7)
- Connecting to the Internet from DMZ: Host to gateway VPN (3/7)
- Connecting to the Internet from DMZ: Host to gateway VPN (4/7)
- Connecting to the Internet from DMZ: Host to gateway VPN (5/7)
- Connecting to the Internet from DMZ: Host to gateway VPN (6/7)
- Connecting to the Internet from DMZ: Host to gateway VPN (7/7)
-
Chapter 9: Using iSeries mail services
- Creating a simple mail infrastructure (1/5)
- Creating a simple mail infrastructure (2/5)
- Creating a simple mail infrastructure (3/5)
- Creating a simple mail infrastructure (4/5)
- Creating a simple mail infrastructure (5/5)
- Extending the mail infrastructure to multiple domains (1/2)
- Extending the mail infrastructure to multiple domains (2/2)
- Using a mail relay to access the Internet (1/4)
- Using a mail relay to access the Internet (2/4)
- Using a mail relay to access the Internet (3/4)
- Using a mail relay to access the Internet (4/4)
- Monitoring QSYSOPR message queue and sending e-mail (1/2)
- Monitoring QSYSOPR message queue and sending e-mail (2/2)
- Chapter 10: Time synchronization scenario
- Chapter 11: Internet printing scenarios
- Appendix A: Additional material
- Related publications
- Index (1/2)
- Index (2/2)
- Back cover
-
Chapter 6: Transferring files between systems
Product information
- Title: V5 TCP/IP Applications on the IBM eServer iSeries Server
- Author(s):
- Release date: May 2004
- Publisher(s): IBM Redbooks
- ISBN: None
You might also like
book
AIX 5L Version 5.2 Security Supplement
This IBM Redbooks publication serves as a supplement to the IBM AIX 5L Version 5.2 product …
book
Implementing IBM System Networking 10Gb Ethernet Switches
In today’s infrastructure, it is common to build networks based on 10 Gb Ethernet technology. The …
book
Special Edition Using TCP/IP, Second Edition
Special Edition Using TCP/IP, 2E is the practical guide to applications of TCP/IP, including utilities for …
book
IBM i 7.1 Technical Overview with Technology Refresh Updates
This IBM® Redbooks® publication introduces a technical overview of the new features, functions, and enhancements available …