[Contents] [Prev. Chapter] [Next Section] [Next Chapter] [Index] [Help]

2.1    SysMan Configuration Applications

Use the following procedure to access the SysMan configuration applications described in this section. In some cases, the X11 based graphical configuration applications have analogous SysMan Menu tasks, or have been replaced by a SysMan Menu option.

  1. Click on the SysMan Application subpanel on the CDE front panel.

  2. Click on the Configuration application group icon.

  3. Double click on the SysMan application icon for the application that you want to open.

Additionally, SysMan Setup lists these and other SysMan applications in a suggested order. Follow this order to prepare the system for general use.

The following applications are available from the Configuration group.You also can open these applications from the command line. Each command name is shown in parentheses with the application description.

ATM Configuration

(sysman atm)

Configures, modifies, and deconfigures ATM adapters and adds, modifies or deletes ATM Interfaces: classical IP, LAN Emulation, and IP Switching.

Dependencies: Before you can configure ATM, you must install an ATM adapter and the required ATM software subsets on your system.

For additional information, see ATM Configuration Help

DNS (BIND) Configuration

(bindconfig)
(sysman dns)

Lets you configure the system as a DNS(BIND) client or server:

  • DNS (BIND) Client: Queries a BIND server for host name and address information, interprets responses, and passes the information to requesting applications

  • DNS (BIND) Server: An authoritative source for information about one or more domains; maintains the master copy of the host's database for the domain or domains, or retains the required information

Dependencies: None. You do not need to configure anything prior to running DNS (BIND) Configuration.

You must be root or have the appropriate privileges to run DNS (BIND) Configuration.

For additional information, see the following:

Cloning Information
(sysman -clone)

Display information about the SysMan cloning feature. A system's setup can be saved for cloning other systems or a system's setup can be cloned from another systems information. Cloning is provided for common services like network connectivity, DNS (BIND), NFS, NIS, NTP, E-mail, and printers. Use sysman -clone -save <filename> to save a system's setup information. Use sysman -clone -apply <filename> to clone a system from another system's information. You can also list and validate cloning information before applying it by using sysman -clone -validate <filename>.

For additional information, see the following:

Disk Configuration

(diskconfig)

Manages the configuration of disk devices on the system:

  • Allows disk partitioning.

  • Allows the creation of file systems on any partition.

  • When both the default and the existing contents of a disk label are available, Disk Configuration allows you to toggle the display of both, the default and the existing disk label contents.

  • Allows for the definition of an alias for any disk.

  • Detects each disk connected to the system.

  • During installation setup, facilitates the partitioning of disk devices on the system:

    • Displays current partitioning information

    • Displays the default partitions for a disk

    • Repartitions disks

Dependencies: None. You do not need to configure anything prior to running Disk Configuration.

You must be root or have the appropriate privileges to run Disk Configuration.

To open Disk Configuration from the command line, enter diskconfig.

For additional information, see the following:

DHCP Configuration
(sysman joind)

Configures the Dynamic host configuration protocol DHCP server daemon (joind). DHCP enables the automatic assignment of IP addresses to clients on networks from a pool of addresses. The IP address assignment and configuration occurs automatically whenever client systems (workstations and portable computers) attach to a network.

Dependencies: None. You do not need to configure anything prior to running DHCP Configuration.

For more information, see Network Configuration Help.

Division of Privileges (DOP) Configuration
(sysman dopconfig)

Configures the privilege database by adding privileges, deleting privileges, and assigns users and groups to a privilege. A privilege allows a user or group to execute a command without knowing the root password.

Dependencies: None. You do not need to configure anything prior to running DOP Configuration.

For more information, see DOP Configuration Help.

LAT Setup
(sysman lat)

Configures Local Area Transport LAT for your system. This is a means by which a printer can be connected to a terminal server via the network, provided the server supports LAT protocol. Depending on the LAT server capabilities, the server can support one printer, through a LAT port name, or several printers, one per port, through a LAT service name. In Print Configuration, you can specify whether print requests sent to the LAT terminal server are directed to a specific printer (by specifying a LAT port name) or the next available printer (by specifying a LAT service name).

For additional information, see the latsetup(8) reference page.

Mail Configuration

(mailconfig)

Sets up the routing and delivery of mail for the system.

Dependencies: Before using Mail Configuration, be sure to configure the system using the following applications, which you can access from the SysMan Setup Configuration Checklist:

  • Network Configuration

  • BIND Configuration

  • NFS Configuration

  • Other network protocols that you use to send mail

  • NTP

    If you prefer to use a time-synchronization program such as timed instead of NTP, you can do so; however, timed is not available from the SysMan Configuration Checklist.

    For additional information on timed, see the timed(8) reference page.

  • NIS

    Configure NIS to ensure that all passwords, aliases, and user names are shared with each other in a networked environment.

You must be root or have the appropriate privileges to run Mail Configuration.

To open Mail Configuration from the command line, enter mailconfig.

For additional information, see the following:

Network Configuration

(sysman network)

Configures and manages network interfaces, especially TCP/IP on a Tru64 UNIX system.

Supports Ethernet, Token Ring, and FDDI interface cards. Use Network Configuration to do the following:

  • Configure routing daemons (routed or gated)

  • Set up machines as IP Routers

  • Configure the system status server daemon (rwhod)

  • Configure static routes

Use Network Configuration to manage the following network-related files:

Dependencies: None. You do not need to configure anything prior to running Network Configuration.

You must be root or have the appropriate privileges to run Network Configuration.

To open Network Configuration from the command line, enter netconfig.

For additional information, see the following:

NFS Configuration

(nfsconfig)

Manages NFS® configuration: Allows a system to be configured as an NFS server, an NFS client, or both:

  • NFS Server (file systems are available to remote machines)

  • NFS Client (mounts remote file systems)

Manages the /etc/exports file with data for exporting.

Manages the /etc/fstab file with data for NFS mounting.

Dependencies: Before using NFS Configuration, be sure to configure network interfaces using Network Configuration, which you can access from the SysMan Setup. You can configure your system as an NFS server, an NFS client, or both; however, if the network interfaces are down, the following daemons do not start:

  • automound

  • mountd

  • nfsd

  • pcnfsd

  • proplistd

You must be root or have the appropriate privileges to run NFS Configuration.

To open NFS Configuration from the command line, enter nfsconfig.

For additional information, see the following:

NIS Setup

(nissetup)

The nissetup (formerly ypsetup) script configures and runs NIS on the system. You can use nissetup to initially set up your NIS configuration, to change your current NIS configuration, or to remove your NIS configuration.

Dependencies: Before using NIS Setup, be sure to configure network interfaces using Network Configuration, which you can access from the SysMan Setup Configuration Checklist.

You must be root or have the appropriate privileges to run nissetup.

To open NIS Setup from the command line, enter nissetup.

For additional information, see the following:

NTP Setup

(sysman ntp)

Sets up the Network Time Protocol daemon (xntpd) to synchronize your system's clock to an accurate reference time standard.

For additional information, see Network Configuration Help.

PPP Configuration

Point-to-Point Protocol (PPP). PPP provides a means of turning an asynchronous serial port into a network connection. The typical use of PPP is to provide a network connection, through a pair of modems and a telephone connection, from one system to a second system, which has a permanent link to the Internet. When this network connection is established, the first system is then also connected to the Internet, which allows it to establish connections with any other Internet host. Users can then use a wide range of network-based applications on the first system.

Dependencies: None. You do not need to configure anything prior to configuring PPP.

You must be root or have the appropriate privileges to configure PPP.

For additional information on point-to-point connections, see the Network Administration guide.

For additional information, see the following:

Printer Configuration

(printconfig)

Adds, deletes, and modifies printer configurations for the system's local and remote printers.

Dependencies: None. You do not need to configure anything prior to running Printer Configuration.

You must be root or have the appropriate privileges to run Printer Configuration.

To open Printer Configuration from the command line, enter printconfig.

For additional information, see the following:

SLIP Configuration

Serial Line Internet Protocol (SLIP). SLIP is a protocol used to run Internet Protocol (IP) over serial lines between two hosts. You can connect the two hosts either directly or over telephone circuits using modems. TCP/IP commands (such as rlogin, ftp, and ping) can be run over the SLIP connection.

Dependencies: None. You do not need to configure anything prior to configuring SLIP.

You must be root or have the appropriate privileges to configure SLIP.

For additional information, see the Network Administration guide for information on point-to-point connections. For additional information, see the slip_manual_setup(7) reference page.

Security Setup
(sysman -secconfig)

Configures security for your system.

For more information, see the secconfig(8) reference page

System Setup

Use System Setup to configure your system using the Quick Setup application, the Custom Setup application, or both. Additionally, System Setup displays information about system cloning.

System Setup replaces the Checklist.

Quick Setup

Quick Setup lets you configure your system quickly and easily using various default parameters as well as several parameters that you provide. It assumes that the system will be a client machine for mail and other services. You can take advantage of the Quick Setup application to provide the bulk of your configuration requirements, then continue with the Custom Setup application to configure the few services that require custom configuration.

Custom Setup

Custom Setup lets you perform sophisticated system configuration that is beyond the scope of the Quick Setup utility. When Custom Setup is invoked, it examines your system and presents a list of configuration applications that are relevant for your system. You can open Custom Setup only from the System Setup by selecting Custom Setup.

System Cloning

Display information about the SysMan cloning feature. A system's setup can be saved for cloning other systems or a system's setup can be cloned from another systems information. Cloning is provided for common services like network connectivity, DNS (BIND), NFS, NIS, NTP, E-mail, and printers. Use sysman -clone -save <filename> to save a system's setup information. Use sysman -clone -apply <filename> to clone a system from another system's information. You can also list and validate cloning information before applying it by using sysman -clone -validate <filename>.

You must have root privileges to run System Setup.

For additional information, see the following: