Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Status
colourRed
titleTODO
To be completed → add "rsh" proxy settings

Anchor
TOC
TOC
Include Page
KBCOMMON:KB-CSSstyle
KBCOMMON:KB-CSSstyle

...

  • Perform some tests (examples)
    (info) Charon server name "charon", vms system name "pluto":

    charon# ssh system@pluto "show system /noproc"
    OpenVMS V7.3-2 on node PLUTO 27-SEP-2013 11:50:14.37 Uptime 0 19:20:07


Div
classpagebreak


How to setup ‘rsh’ trusts between Linux and Tru64

Introduction

RSH executes commands on a remote host. It can be used to issue a shutdown on the Charon Tru64 virtual machine.

Pre-requisites

The RSH method requires the 'rsh' package. It can be installed using the following command:

# yum install rsh

Notes

On the Tru64 system issuing the shutdown, create a proxy between the root user of the Charon server and the user.

Example ('ceres' is the Charon server name):

# echo "ceres root" >>~/.rhosts

If the Charon server name is not known to the TCPIP database, edit the /etc/hosts file and add the server ip address and its name.

Ensure manual commands can be passed to the Tru64 system from the Charon server.

Example ('pluto' is the Tru64 hostname):

# rsh pluto date

If the Tru64 system time is returned, you can go directly to the Settings chapter further. If a "poll: protocol failure in circuit setup" is returned, the firewall settings have to be set to open ports 113 and 1022.

Please always refer to your network administrator when changing the firewall rules, commands below are given as example only.

Example for Red Hat Enterprise Linux 6.x servers:

# iptables -I INPUT -p tcp --dport 113 --syn -j ACCEPT

# iptables -I INPUT -p tcp --dport 1022 --syn -j ACCEPT

# service iptables save

Example for Red Hat Enterprise Linux 7.x and CentOS 7.x servers:

# firewall-cmd --permanent --new-service=Charon

# firewall-cmd --permanent --service=Charon --add-port=113/tcp

# firewall-cmd --permanent --service=Charon --add-port=1022/tcp

# firewall-cmd --get-active-zones

public

interfaces: ens34 ens35

# firewall-cmd --zone=public --permanent --add-service=Charon

# firewall-cmd --reload

How to setup ‘rsh’ trusts between Linux and OpenVMS

Introduction

RSH executes commands on a remote host. It can be used to issue a shutdown on the Charon OpenVMS virtual machine.

Pre-requisites

The RSH method requires the 'rsh' package. It can be installed using the following command:

# yum install rsh

Notes

RSH and REXEC services must be available on the OpenVMS virtual machine. This depends on the OpenVMS version and a valid UCX license is required.

To enable these services, run @SYS$MANAGER:TCPIP$CONFIG, select the "Client components" and then enable and start "REXEC and RSH" services.

Create a proxy between the root user of the Charon server and the user on the OpenVMS system issuing the shutdown.

Example ('ceres' is the Charon server name):

$ tcpip add proxy system /remote="root" /host=ceres

If the Charon server name is not known to the TCPIP database, use the following command to add it.

Example:

$ tcpip set host ceres /address=1.2.3.4

Copy charon_shutdown.com script located in the /opt/charon/utils folder to SYS$MANAGER:CHARON_SHUTDOWN.COM on the OpenVMS system (using copy/paste for example). This is required as if the shutdown is executed directly from the 'rsh' command directly, 'rsh' will not timeout when the shutdown will be completed and the virtual machine will not be stopped cleanly, it will timeout depending on the service settings.

Ensure manual commands can be passed to the OpenVMS system from the Charon server.

Example ('vms084' is the OpenVMS hostname):

# rsh -l system vms084 "show time"

If the OpenVMS system time is returned, you can go directly to the Settings chapter further. If a "poll: protocol failure in circuit setup" is returned, the firewall settings have to be set to open ports 113 and 1022.

Please always refer to your network administrator when changing the firewall rules, commands below are given as example only.

Example for Red Hat Enterprise Linux 6.x servers:

# iptables -I INPUT -p tcp --dport 113 --syn -j ACCEPT
# iptables -I INPUT -p tcp --dport 1022 --syn -j ACCEPT
# service iptables save

Example for Red Hat Enterprise Linux 7.x and CentOS 7.x servers:

# firewall-cmd --permanent --new-service=Charon
# firewall-cmd --permanent --service=Charon --add-port=113/tcp
# firewall-cmd --permanent --service=Charon --add-port=1022/tcp
# firewall-cmd --get-active-zones
public
interfaces: ens34 ens35
# firewall-cmd --zone=public --permanent --add-service=Charon
# firewall-cmd --reload

Shutdown guests with Expect tool

...