Where allowed to run: All environments (*ALL) Threadsafe: No |
Parameters Examples Error messages |
The Create NWS Configuration (CRTNWSCFG) command creates a network server configuration and an associated validation list. The network server configuration defines connection security or remote system attributes.
Restrictions:
Top |
Keyword | Description | Choices | Notes |
---|---|---|---|
NWSCFG | Network server configuration | Communications name | Required, Positional 1 |
TYPE | Configuration type | *CNNSEC, *RMTSYS, *SRVPRC | Required, Positional 2 |
IPSECRULE | IP security rules | Single values: *NONE Other values (up to 16 repetitions): Character value, *GEN, *REGEN |
Optional |
INZSP | Initialize service processor | *MANUAL, *AUTO, *NONE | Optional |
ENBUNICAST | Enable unicast | *NO, *YES | Optional |
SPNAME | Service processor name | Character value, *SPINTNETA | Optional |
SPINTNETA | SP internet address | Character value | Optional |
SPCERTID | SP certificate identifier | Single values: *NONE Other values: Element list |
Optional |
Element 1: Component | *COMMONNAME, *EMAIL, *ORGUNIT | ||
Element 2: Compare value | Character value | ||
EID | Enclosure identifier | Single values: *AUTO Other values: Element list |
Optional |
Element 1: Serial number | Character value | ||
Element 2: Manufacturer type and model | Character value | ||
SPNWSCFG | SP configuration name | Communications name | Optional |
RMTSYSID | Remote system identifier | Single values: *SPNWSCFG Other values: Element list |
Optional |
Element 1: Serial number | Character value | ||
Element 2: Manufacturer type and model | Character value | ||
DELIVERY | Delivery method | Character value, *DYNAMIC, *MANUAL | Optional |
CHAPAUT | CHAP authentication | Single values: *NONE Other values: Element list |
Optional |
Element 1: CHAP name | Character value, *NWSCFG | ||
Element 2: CHAP secret | Character value, *GEN | ||
BOOTDEVID | Boot device ID | Single values: *SINGLE Other values: Element list |
Optional |
Element 1: Bus | 0-255 | ||
Element 2: Device | 0-31 | ||
Element 3: Function | 0-7 | ||
DYNBOOTOPT | Dynamic boot options | Element list | Optional |
Element 1: Vendor ID | Character value, *DFT | ||
Element 2: Alternate client ID | Character value, *ADPT | ||
RMTIFC | Remote interfaces | Values (up to 4 repetitions): Element list | Optional |
Element 1: SCSI interface | Element list | ||
Element 1: Adapter address | Hexadecimal value, *NONE | ||
Element 2: Internet address | Character value | ||
Element 3: Subnet mask | Character value | ||
Element 4: Gateway address | Character value | ||
Element 5: iSCSI qualified name | Character value, *GEN | ||
Element 2: LAN interface | Element list | ||
Element 1: Adapter address | Hexadecimal value, *NONE | ||
Element 2: Internet address | Character value | ||
Element 3: Subnet mask | Character value | ||
Element 4: Gateway address | Character value | ||
TEXT | Text 'description' | Character value, *BLANK | Optional |
AUT | Authority | Name, *CHANGE, *ALL, *USE, *EXCLUDE, *LIBCRTAUT | Optional |
Top |
Specifies the name of the network server configuration.
This is a required parameter.
Top |
Specifies the type of network server configuration to be created.
This is a required parameter.
Top |
Specifies the configuration IP Security (IPSec) rules used between the hosting and remote system.
This parameter is only valid when TYPE(*CNNSEC) is specified.
Single values
Other values (up to 16 repetitions)
Valid characters are upper case A through Z, lower case a through z, numbers 0 through 9, and the following special characters:
Top |
Specifies how the remote system's service processor is secured.
This parameter is only valid when TYPE(*SRVPRC) is specified.
To use this option, it is required that the remote system's service processor is pre-configured with a user name, password and certificate. Certificate management will be required. This method is appropriate when connecting to the service processor via public networks to protect the password.
Parameters are automatically configured on the remote system's service processor.
*AUTO provides security without requiring pre-configuration of the remote system's service processor. The remote system's service processor will have certificates automatically regenerated when the certificates are near expiration. This option is appropriate if the interconnecting network is physically secure or is protected by a firewall.
Note: An administrator will need to regenerate the certificate using the Initialize NWS Configuration (INZNWSCFG) command when the service processor certificate has expired, or if a new certificate and password are desired at any time before the certificate expires.
Provides no security.
Use this only if the interconnecting network is physically secure.
Note: Some service processors do not support secure connections. Use *NONE for these service processors. Additional information can be found at Integrated xSeries solutions at http://www.ibm.com/servers/eserver/iseries/integratedxseries.
Top |
Specifies whether unicast packet distribution is to be used. Unicast is a transmission method where packets are sent directly to the specified Service processor name (SPNAME) or SP internet address (SPINTNETA) parameter.
The system identification for the Enclosure identifier (EID) parameter is automatically retrieved if *AUTO is specified and the system hardware supports it.
This parameter is only valid when TYPE(*SRVPRC) is specified.
Top |
Specifies the remote system's service processor host name.
This parameter is only valid when TYPE(*SRVPRC) is specified.
Note: This parameter is required when ENBUNICAST(*YES) is specified.
The remote system is identified by the value specified for the SP internet address (SPINTNETA) parameter.
Top |
Specifies the remote system's service processor internet address.
This parameter is only valid when TYPE(*SRVPRC) is specified.
Notes:
The value is entered in the decimal form nnn.nnn.nnn.nnn , where nnn is a decimal number ranging from 0 through 255.
Top |
The SP certificate identifier specifies one of three possible fields that identifies the service processor's certificate.
This parameter is specified to provide additional validation that the certificate is from the service processor. The contents of the selected field must exactly match the value of the field that was entered when the certificate was generated or requested from a certificate authority.
This parameter is only valid when TYPE(*SRVPRC) is specified.
This parameter is required when INZSP(*MANUAL) is specified and cannot have the value *NONE.
Single values
Element 1: Component
Element 2: Compare value
Top |
Specifies the identifying serial number, type and model of the enclosure containing the service processor.
When specified, they are used to locate the system on the network.
Look for these values on the label of the system.
This parameter is only valid when TYPE(*SRVPRC) is specified.
Single values
Element 1: Serial number
Element 2: Manufacturer type and model
The value is entered in the form ttttmmm where tttt is the machine type and mmm is the machine model number.
Top |
Specifies the name of the service processor network server configuration to be used to manage the remote server.
This parameter is only valid when TYPE(*RMTSYS) is specified.
Top |
Specifies the identifying serial number, type and model of the remote system. When specified, they are used to locate the remote system on the network.
Look for these values on the label of the system.
Note: The machine type and model may be omitted if the system's serial number is unique on the network.
This parameter is only valid when TYPE(*RMTSYS) is specified.
Single values
Element 1: Serial number
Element 2: Manufacturer type and model
The value is entered in the form ttttmmm where tttt is the machine type and mmm is the machine model number.
Top |
Specifies how the parameters necessary to configure the remote system are delivered.
This parameter is only valid when TYPE(*RMTSYS) is specified.
Top |
Specifies the Challenge Handshake Authentication Protocol (CHAP) for the host system iSCSI target to authenticate the remote system initiator node.
This parameter is only valid when TYPE(*RMTSYS) is specified.
Single values
Element 1: CHAP name
Valid characters are upper case A through Z, lower case a through z, numbers 0 through 9, and the following special characters:
Element 2: CHAP secret
Valid characters are upper case A through Z, lower case a through z, numbers 0 through 9, and the following special characters:
Top |
Specifies the PCI Function Address (Bus/Device/Function) of the iSCSI adapter in the remote system that will be used to boot from.
Note: Remote systems with more than one iSCSI adapter installed in the server are required to specify which adapter will be used to boot from.
This parameter is only valid when TYPE(*RMTSYS) is specified.
Single values
Element 1: Bus
Element 2: Device
Element 3: Function
Top |
Specifies the internal Dynamic Host Configuration Protocol (DHCP) Server configuration.
Note: This is an advanced configuration function.
This parameter is used to configure the internal DHCP Server that is part of the iSCSI Target Host Bus Adapter firmware. It is used to provide IP address and diskless boot parameters for the remote iSCSI Initiator.
This parameter is only valid when TYPE(*RMTSYS) is specified.
This parameter is only valid when DELIVERY(*DYNAMIC) is specified.
Element 1: Vendor ID
The client and server are pre-configured to a default vendor ID. Network administrators can configure clients to define their own identifying values to convey hardware, operating system or other identifying information. DHCP option 60 described in the IETF RFC 2132 is used for this function.
Element 2: Alternate client ID
Used by clients to specify their unique identifier to the server. Each client's identifier must be unique among all other client identifiers used on the effective DHCP network to which the client is attached (that is, the client's local subnet and any remote subnets reachable using DHCP relay). Vendors and system administrators are responsible for choosing client identifiers that meet this requirement for uniqueness. DHCP option 61 described in the IETF RFC 2132 is used for this function.
Top |
Specifies the remote system's interfaces. This information is used to identify and configure the remote system's interfaces. Each adapter has two functions to support a SCSI and a LAN interface.
This parameter is only valid when TYPE(*RMTSYS) is specified.
Note: A minimum of one SCSI interface and one LAN interface is required though they may reside on different adapters in the remote system.
You can specify up to 4 repetitions for this parameter.
Specifies the remote system's SCSI interfaces.
The value is entered in the decimal form nnn.nnn.nnn.nnn , where nnn is a decimal number ranging from 0 through 255.
The value is entered in the decimal form nnn.nnn.nnn.nnn , where nnn is a decimal number ranging from 0 through 255.
The value is entered in the decimal form nnn.nnn.nnn.nnn , where nnn is a decimal number ranging from 0 through 255.
The following characters are allowed in iSCSI qualified names:
Specifies the remote system's LAN interfaces.
The value is entered in the decimal form nnn.nnn.nnn.nnn , where nnn is a decimal number ranging from 0 through 255.
The value is entered in the decimal form nnn.nnn.nnn.nnn , where nnn is a decimal number ranging from 0 through 255.
The value is entered in the decimal form nnn.nnn.nnn.nnn , where nnn is a decimal number ranging from 0 through 255.
Top |
Specifies text that briefly describes the network server configuration.
Top |
Specifies the authority you are giving to users who do not have specific authority for the object, who are not on an authorization list, and whose group profile or supplemental group profiles do not have specific authority for the object.
Top |
Example 1: Security Connection Network Server Configuration
CRTNWSCFG NWSCFG(MYSEC) TYPE(*CNNSEC) IPSECRULE(*NONE) TEXT('Connection security')
This command creates a Connection Security Configuration with no security rules.
Example 2: Service Processor Network Server Configuration
CRTNWSCFG NWSCFG(CAT4SP) TYPE(*SRVPRC) INZSP(*MANUAL) ENBUNICAST(*YES) SPINTNETA('1.5.10.75') SPCERTID(*ORGUNIT 'ACME Corp') EID(RTYM14A 3305R8U) TEXT('CAT4SP Service processor')
This command creates a service processor configuration. The service processor is contacted using IP Address 1.5.10.75. The remote system is identified by the serial number RTYMl4A. The service processor is manually secured using a certificate configured with the 'ACME Corp' organizational unit.
Example 3: Remote System Network Server Configuration
CRTNWSCFG NWSCFG(CAT4SVR) TYPE(*RMTSYS) SPNWSCFG(CAT4SP) RMTSYSID(*SPNWSCFG) DELIVERY(*DYNAMIC) RMTIFC(((111111111111 '1.5.10.10' '255.255.255.0' '1.5.10.129' *GEN) (1FFFFFFFFFFF '1.5.10.20' '255.255.255.0' '1.5.10.129'))) TEXT('CAT4SVR Service processor')
This command creates a remote system configuration which uses the dynamic delivery method to configure the remote system. The system is identified using the CAT4SP service processor configuration specified by the SPNWSCFG parameter. The iSCSI remote interface for SCSI is configured using an IP address of 1.5.10.10 and a LAN address of 1.5.10.20. The iSCSI qualified name is automatically generated.
Top |
*ESCAPE Messages
Top |