[Digital logo]
[HR]

DECnet-Plus for OpenVMS
Network Management


Previous | Contents

Although convenient, autoregistration of DECnet Phase V nodes presents a potential security risk because allowing autoregistration into a specific directory adds write access for the world (.*...) to the access control set (ACS) for that directory. Therefore, all users in the network can create child directories, objects, and soft links in that directory.


Note

Once a node has been registered into the directory, its registration can be modified only by the node itself or by an authorized namespace manager. The security risk applies to the directory but not to the node-name objects within the directory.

If you disallow autoregistration in a directory, the namespace is more secure because only authorized users can create entries in that directory. However, node names in that directory must be registered by an authorized namespace manager.

Allowing Autoregistration

To allow node autoregistration for a directory, select Option 11 at the decnet_register_decdns main menu. The following messages appear. Press the appropriate control key sequence for your platform to exit. Output is similar to the following example:

Allow DECnet-Plus node autoregistration in a directory.     
Press Ctrl-Z when done.     
     
* Directory name:      

For help answering the prompt, refer to the following:

Directory Name

Specify the full name for the directory whose access is to be modified. This should not include a node name; for example, .Japan.Osaka.

In this example, autoregistration is enabled. Press the appropriate control key sequence for your platform to exit. Output is similar to the following example:

* Directory name: .Japan.Osaka     
     
Modifying world write access to allow node autoregistration in this directory.     
     
* Directory name:      

Disallowing Autoregistration

To allow or disallow node autoregistration for a directory, select Option 12 at the decnet_register_decdns main menu. The following messages appear. Press the appropriate control key sequence for your platform to exit. Output is similar to the following example:

Allow or disallow DECnet-Plus node autoregistration in a directory.     
Press Ctrl-Z when done.     
     
* Directory name:      

5.3.13 Spawning to DCL

On OpenVMS systems, select Option 11 to create an interactive subprocess where you can enter NCL and other commands.

Enter the DCL logout command to terminate the subprocess and return to decnet_register.


Part III
DECnet-Plus Network Management Tasks


Chapter 6
Modifying Your Network

This chapter provides information about four methods you can use to modify your network configuration:

This chapter also explains how you can create network server processes and how to delete and disable entities on all DECnet Phase V systems.

6.1 Using the Configuration Procedure

The DECnet-Plus software provides a configuration procedure, NET$CONFIGURE.COM, that you use to set up a basic, working node. The procedure produces a set of files called NCL scripts. To modify your network, rerun your configuration procedure, make the appropriate changes, and reboot the system. This modifies the configuration scripts and makes the changes permanent.


Note

Digital recommends that you use the configuration procedure to modify your node.

To customize your system beyond what the configuration procedure provides, you must edit the NCL scripts produced by the configuration procedure (see Section 6.2.2).

6.2 Network Control Language

NCL is a command-based tool that lets you set up, modify, and display information about any DECnet-Plus entity. You may, at times, want to manage an attribute of an entity, such as a buffer size. To perform this task, you need to use NCL to make the change interactively or you need to edit the NCL scripts produced by the configuration procedure.

You should manage your DECnet-Plus system this way only if:

NCL supports an optional initialization file and an optional key definition file:

For more information, refer to the DECnet-Plus Network Control Language Reference guide.

6.2.1 Using Interactive NCL

Interactive NCL is useful only for temporary changes to a configuration. When you make changes to the running node using NCL interactively, the changes become effective immediately, but last only until the system is rebooted. For example, you might want to monitor a set of counters for a particular entity or you might want to temporarily disable a link.

The following steps briefly explain how to use interactive NCL:

  1. Run the NCL utility on your local system. Refer to the DECnet-Plus Network Control Language Reference for information about starting NCL.
    If you want to issue several commands to a remote node, you can set the default to the node with the following command:
    ncl> set ncl default entity node node-id     
    

    Where node-id is the name of the remote node. You can now enter NCL commands as if you were using them on a local node.
  2. Enter the appropriate NCL commands to accomplish your task. Refer to the DECnet-Plus Network Control Language Reference for an explanation of all the commands and the entities and attributes that support them.
  3. Update the NCL script if necessary. If you have made changes to the configuration of the system, and you want these changes to be permanent, use the configuration program (if possible) to update the system. If the configuration program cannot make the changes, modify the system's NCL script (see Section 6.2.2).

6.2.2 Editing NCL Scripts

An NCL script is an ASCII file of NCL commands that sets up the network management entities. These commands reflect the configuration you specified in the configuration procedure. You can edit the script files with a text editor to make permanent changes to your configuration. You can also edit the NCL script to add features that are not covered by the configuration procedure.

The following example shows a typical example (Routing module) of a script file produced by a configuration procedure.

create node 0 routing type endnode     
set node 0 routing phaseiv address = 19.5     
enable node 0 routing     
     
create node 0 routing circuit csmacd-0 type = csma-cd     
set node 0 routing circuit csmacd-0 data link entity = -     
  csma-cd station csmacd-0     
enable node 0 routing circuit csmacd-0     

The configuration procedure produces a script file for each module that it can configure. However, the configuration procedure creates more than one script file for some tasks. Therefore, manually making some changes to your configuration might require you to edit more than one NCL script. Script files have names that indicate what modules they implement.

Some common NCL scripts are:

The Installation and Configuration guides for your system provide full information about the configuration procedure and NCL scripts generated.

The following steps briefly explain how to edit NCL scripts:

  1. Log in to a suitably privileged account on the system. Usually, this is the system account or one with equivalent privileges.
  2. Edit the NCL scripts with any text editor. Enter the new commands in sections of their own, or in the appropriate sections that are already in the NCL script. Refer to the DECnet-Plus Network Control Language Reference for an explanation of all the commands and the entities and attributes that support them. If possible, test the changes before you make them by interactively entering the appropriate NCL commands.
  3. After you have completed updating your NCL scripts, disable the entity and, if possible, re-execute the script or reboot the system to have the new values take effect.
    To execute an NCL script, use the following format:
    ncl> do ncl_script_file     
    

    On an OpenVMS system, you can execute the following script:
    ncl> do sys$manager:net$nsp_transport_startup.ncl      
    

    If you cannot re-execute or reboot at that time, enter the NCL commands interactively so they take effect immediately (see Section 6.2.1). Then, when you reboot the system, the changes in the NCL script take effect.

You may also need to alter DECdns or DECdts modules and entities. Refer to DECnet-Plus DECdns Management, DECnet-Plus DECdts Management, and the installation and configuration guides for your system for this information.

6.2.3 Using User-Defined NCL Scripts

If you wish to have site-specific NCL commands in scripts, create files called NET$APPLICATION_LOCAL.NCL, NET$EVENT_LOCAL.NCL, and NET$MOP_CLIENT_LOCAL.NCL in the SYS$MANAGER directory. If these files exist, the network startup procedure executes these scripts immediately after the NET$APPLICATION_STARTUP.NCL, NET$EVENT_STARTUP.NCL, and NET$MOP_CLIENT_STARTUP.NCL scripts supplied by Digital are executed.

If you do not need to modify the Digital-supplied scripts, place your site-specific NCL commands in these user-defined NCL scripts. These user-defined scripts will not be overwritten or deleted by NET$CONFIGURE.COM because they are maintained by the user.

6.3 Defining Logical Names That Modify Network Startup

Prior to starting the network with NET$STARTUP.COM, you can modify components of the network by using the following system logical names:

If you want the operating system to define these logicals before starting the network, place these system logical definitions in the SYS$MANAGER:NET$LOGICALS.COM file. (If you do not have the SYS$MANAGER:NET$LOGICALS.COM file on your system, you can create one using SYS$MANAGER:NET$LOGICALS.TEMPLATE.)

6.4 Creating DECnet-Plus Network Server Processes

On the OpenVMS operating system, all DECnet Phase V applications run as processes. Unless a currently running process has declared itself to be a numbered network application or a named network application (with number 0), the network ancillary control program (NET$ACP) must invoke a process to receive the connect request.

When the logical link request comes in, a standard procedure called NET$SERVER.COM runs, which in turn causes NET$SERVER.EXE to be executed. This program works in concert with NET$ACP to invoke the proper program for the requested application. Then, when the logical link is disconnected, the application program (such as file access listener (FAL)) terminates, but the process is not deleted. Instead, control returns to the NET$SERVER.EXE program, which asks NET$ACP for another incoming logical link request to process. This cycle continues until NET$SERVER is deleted after a specified time limit. The default is 5 minutes. To use a different default time limit, define the system logical name NETSERVER$TIMEOUT in SYS$MANAGER:NET$LOGICALS.COM, using an equivalence string in the standard OpenVMS delta time format:

dddd hh:mm:ss.cc

For example, to set the time limit to 30 minutes, use the following command:

$ define/system netserver$timeout "0 0:30:0"     

The effect of NET$SERVER is to reuse network server processes for more than one logical link request, eliminating the overhead of process creation for an often-used node. The network ancillary control program (NET$ACP) reuses a NET$SERVER process only if the access control on the connect request matches that used to start the process originally.

When NET$ACP creates a process to receive the connect request, the process runs like a batch job. The sequence is as follows:

  1. The process is logged in according to information found in the user authorization file (UAF). The key to this file is the user name, which is part of the access control information. For information about access control information, see Section 7.3.
  2. DECnet-Plus automatically creates a log file in SYS$LOGIN:NET$SERVER.LOG. Unlike the log file for a batch job, this log file is neither printed nor deleted. The log file is helpful for debugging your own network tasks. If NET$SERVER.LOG cannot be created for any reason, the network job continues running but does not produce any log file.
  3. The login command procedure indicated in the UAF for the process is executed.
  4. The process runs a command file to start the image that implements the DECnet Phase V application. The rules for locating this command file differ depending on whether the application has the number 0.

Because NET$SERVER.LOG files are not required for network server processes, you can explicitly inhibit all log files in your default nonprivileged DECnet-Plus account by setting the default directory for the account to a nonexistent directory. The effect of this action is to suppress all log files, while allowing network jobs to run.

6.5 Deleting Network Entities

This section explains how to delete and disable network entities, and what you must do prior to recreating a previously deleted entity. In general, the procedures are the same for most entities.

To delete an entity, you must usually disable that entity first. Disabling an entity means you are putting the entity into the off state. You must also delete entities in order. That is, you must delete a child entity before you can delete the parent entity. After deleting the child entity, you can delete the parent. Then the entity is completely deleted. In some cases, the DECnet-Plus software automatically deletes entities. The DECnet-Plus Network Control Language Reference indicates which commands support the various entities.

The following example disables and deletes routing for end systems using csma-cd links. Remember that the procedure applies to disabling and deleting most DECnet Phase V entities.

ncl> disable routing circuit csmacd-0 reachable address reachable-address (1)     
ncl> delete routing circuit csmacd-0 reachable address reachable-address (2)     
     
ncl> disable routing circuit csmacd-0 (3)     
ncl> delete routing circuit csmacd-0 (4)     
     
ncl> disable routing (5)     
ncl> delete routing (6)     
  1. Disables the routing circuit reachable address child entity
  2. Deletes the routing circuit reachable address child entity
  3. Disables the routing circuit child entity
  4. Deletes the routing circuit child entity
  5. Disables the routing parent entity
  6. Deletes the routing parent entity


Chapter 7
Managing Network Security

DECnet-Plus regulates access to the network on various levels, including the following:

The following sections describe these levels of control for DECnet-Plus.

7.1 Required Rights Identifiers

To perform any kind of network activity, all network users must have TMPMBX and NETMBX privileges and certain rights identifiers enabled. You can define a user's rights and privileges with the OpenVMS Authorize utility (see Section 7.3.4). For more information about using this utility, refer to the OpenVMS System Management Utilities Reference Manual.

Identifiers are created in the rights database during installation. Table 7-1 lists the rights identifiers that you and network users need.

Table 7-1 Rights Identifiers
Rights Identifier Description
NET$DECLAREOBJECT Declares an application
NET$DECNETACCESS Gives $IPC users access to the network in the absence of the NETMBX privilege
NET$DIAGNOSE Permits use of network diagnostics
NET$EXAMINE Permits display of the attributes of an entity
NET$MANAGE Permits display, creation, or modification of an entity
NET$POSTEVENT Permits posting of events
NET$REGISTERDNSOBJECT Permits registration or deregistration of a DECdns object
NET$SECURITY Permits setting a user name for session control or session control application
NET$TRACEALL Permits tracing of entire messages on a local node
NET$TRACEALLREMOTE Permits tracing of entire messages on a remote node
NET$TRACEHEADERS Permits tracing of message headers on a local node
NET$TRACEHEADERSREMOTE Permits tracing of message headers on a remote node

7.2 Network Management Security

DECnet-Plus for OpenVMS uses OpenVMS rights identifiers to perform access checks on all manageable entities. This differs from the Phase IV software, which used OpenVMS privileges for access to the permanent database and for write access. Read access to the volatile database in Phase IV was unprotected.

In DECnet-Plus for OpenVMS, the rights identifier NET$EXAMINE grants a user read access to the network configuration data. The NET$MANAGE rights identifier grants read and write access to the network configuration data, and NET$SECURITY grants the ability to set default accounts. These new rights allow the network manager to restrict access to network parameters. Access is granted to an individual user by means of the Authorize utility on OpenVMS. The following command examples grant access.

Examples

UAF> grant/id net$examine Joe  ! Grant user Joe read access to local network     
data    
UAF> grant/id net$manage  Joe  ! Grant user Joe read/write access to local    
network data    
UAF> grant/id net$security Joe  ! Grant user Joe ability to set default    
accounts    

In lieu of NET$MANAGE rights, the BYPASS privilege will grant read and write access.

When issuing NCL commands to the local node (for example, ncl show all or ncl show node 0 all), the rights of the executing process determine whether access is granted.

When issuing NCL commands to the remote node (for example, ncl show node remote-node-name all or ncl set ncl default entity node remote-node-name), a connection is established to the Common Management Information Protocol (CMIP) Management Listener (CML) application on the remote node. Access checks performed on the remote node depend on the account the remote CML application is running in (on an OpenVMS node). When the connection comes into an OpenVMS machine, a process is created to run the CML application. Which account is used is determined in the following order:

  1. If explicit access control is specified, the specified account is used.
  2. If there is a default account for the application receiving the request, it is used.
  3. If a proxy account is specified, or there is a default proxy account for the remote user, it is used.
  4. If all the above fail, the session entity is checked for a default nonprivileged account to use.

If the account that runs the CML application does not have the NET$EXAMINE for read access, or NET$MANAGE identifier for read and write access, then the access is denied by the management agent.

The manager of the remote node must take explicit action to allow an individual user access to the network configuration information. For example:

The last option is one of the selections offered by NET$CONFIGURE when configuring the application database. If you select to have a default account for the CML application, NET$CONFIGURE will grant the NET$EXAMINE right to that account by default.

7.3 Access Control

Whenever a DECnet node attempts to connect to a remote DECnet-Plus node, it sends access control information to the session control entity on the remote node. Access control allows you to control connections between nodes. Access control information can come from a number of sources. The following list shows the hierarchy of access control from highest to lowest priority:

  1. The network user on the local node can explicitly supply access control information. If this is the case, the remote node uses the access control information. See Section 7.3.1 for information about explicit access control.
  2. If no explicit access control information has been provided, the local node checks to see if outgoing proxy access is enabled for a local node or an application. If the proxy is enabled, the local node initiates a connection and the session control entity on the remote node determines if the initiating user has proxy access. See Section 7.3.2 for information about proxy access control.
  3. When the remote node sees that no explicit access control has been specified and that no proxy matches , it checks its application database. If the database contains an application user name, it uses that name. See Section 7.3.3 for information about default application accounts.
  4. If there is no default application user name in its application database, the remote node checks its session control entity attributes for default nonprivileged DECnet user name information. If the information is there, the remote node uses the default nonprivileged DECnet user name.
    The default DECnet user name allows users to perform certain network operations, such as the exchange of electronic mail between users on different nodes, without having to supply a user name and password. The default DECnet user name is also used for file operations when access control information is not supplied. For example, it permits remote users to access local files on which the file protection has been set to allow world access. If you do not want remote users accessing your node, do not create a default DECnet user name. See Section 7.3.4 for information about default nonprivileged DECnet accounts.


Previous | Next | Contents | [Home] | [Comments] | [Ordering info] | [Help]

[HR]

  PROFILE_VMS_006.HTML
  OSSG Documentation
   2-DEC-1996 12:34:55.62

Copyright © Digital Equipment Corporation 1996. All Rights Reserved.

Legal