|
|
The Network Registrar nrcmd command is a command-line based configuration tool. It allows you to set all Network Registrar configurable options as well as start and stop the servers.
This chapter contains an alphabetic listing of all the commands and their properties.
The admin command allows you to configure administrators for the cluster. You can choose any string for the name. Network Registrar uses the password to authenticate the name. If you create an administrator without a password, Network Registrar cannot authenticate the name, and thus will deny that user access to the cluster.
Because the password is sensitive information, Network Registrar prints its value as '********'.
The syntax is:
admin name create [prop=value]For example, to create the administrator bob with the password xyz, type:
nrcmd> admin bob create password=xyz
To delete the administrator bob, type:
nrcmd> admin bob delete
You can use the set, get and show commands to assign and retrieve values from the admin properties.
The syntax is:
admin name set prop=value [prop=value]If you want to enter a password without having Network Registrar display the password on your screen, create an administrator and do not supply a password. Then use the enterPassword command to enter a password and prevent Network Registrar from echoing it on the screen. Network Registrar prompts you to verify the password before it accepts it.
Table 2-1 lists and describes the admin properties.
| Properties | Description |
|---|---|
The administrator's password |
Using the client command you can assign properties to a specific client entry, based on the client's MAC address or the literal string "default" which matches any client that does not have a specific client configuration. The properties you can assign include such things as a class of client, a policy, an action, and the inclusion or exclusion of scope selection tags. The DHCP server looks up these properties to determine how it should process the host's request for an IP address.
You can configure common client properties such as selection criteria, in one client-class configuration, and have multiple client configurations use it.
The DHCP server reads the client configuration information each time it receives a request for an IP address, so you do not have to reload the server after modifying these client configurations. If you modify the default client configuration however, you must reload the server in order for the change to take effect.
The way that you specify the client is by using the MAC address in the format of hardware-type,hardware-length,hardware address or the word "default." Note that the commas are required.
A sample Ethernet MAC address might be 1,6,00:a0:24:2e:9c:20.
The syntax is:
client name create [prop=value]For example, to create a client that is a member of the external client-class, type:
nrcmd> client 1,6,02:02:02:02:02:02 create client-class-name=external
To delete client 1,6,02:02:02:02:02:02:, type:
nrcmd> client 1,6,02:02:02:02:02:02 delete
To list all the client-classes, type:
nrcmd> client list
The property list contains the name and values in the following format:
prop=value{,value}
Note that for the host-name and domain-name strings to have any effect, you must have enabled dynamic DNS update in the scope from which the IP address was allocated.
You use the set and get commands to set and display their values.
The syntax is:
client macaddress set prop=valTable 2-2 lists the client command properties.
| Property | Description |
|---|---|
The action to take for this client. You can specify either "exclude" or "one-shot". For more information about these actions, see the "Action Strings" section. | |
(Client-only) Specifies whether to limit the authentication time to the duration you have specified. For more information about how to specify the time, see "Authenticate-Until" section. | |
(Client-only) The client-class to which the client belongs. Note that the client-class-name property may only appear in the client entry. It is an error to specify a client-class name property in a client-class object. If the client is not a member of a client-class, then the DHCP server uses the default client-class properties. | |
The domain name to use when performing DNS updates. Places the client's A record in this DNS domain. | |
The host name. Use this string to replace any host-name DHCP option sent by the DHCP client. For more information about host names, see the "Host Name Strings" section. | |
The policy to add to Network Registrar's DHCP policy search list for this client. | |
The scope selection tags to build the scope inclusion list. | |
The scope selection tags to build the scope exclusion list. | |
The name of the client-class to use if this client is no longer authenticated. | |
A user-defined string that can be set and queried. This property has no effect on the operation of the DHCP server. |
The action string is made up of one or more comma-delimited tokens. Valid tokens are the following:
You can use the one-shot action to allocate provisional addresses. Provisional addresses are useful in cases where you want an unknown client to have an address for only a short period of time.
To use the one-shot action in this way, configure the one-shot argument as the action for the default client (or in the client-class specified by the default client). This configuration will cause the server to give a lease to an unknown client, but when the lease expires, the server will not respond to that client for the duration of the grace period. After the grace period expires, the server will not respond to that client until the now available lease is reallocated to another client. This final period may be short or long, depending on the number of leases in the scope, and the number of clients using them. Newly available leases go on the end of a queue, and are allocated from the beginning of a queue, so that it might be quite some time before this lease is reallocated to another client.
It is possible to allow the client a relatively short lease time, such as one day, and then specify a long grace period, such as two weeks. In this manner, you can offer an incentive to the client to register with some authority and become a known client, while preventing the lease from being reallocated to another client.
After the lease expires, the client is unable to get another address for the extent of the two-week grace period. Note that you can configure the lease and grace period differently for each scope, so that the non-provisional leases can have different lease and grace periods.
After the lease is reallocated to another client, all record of the first client's use is lost, and the first client could get another lease as an "unknown" client and have another opportunity to register.
Using provisional addresses would be less restrictive if you use multiple DHCP servers, since each one operates its one-shot capabilities independently. Thus, with the above approach and two DHCP servers, an unregistered client could get two days of provisional address use every two weeks.
When the authentication for a client entry is no longer authenticated, the DHCP server uses the value of the unauthenticated-client-class property for the name of the client-class entry to use in answering this DHCP request. If the unauthenticated-client-class property is not set or if there is no client-class entry in the unauthenticated-client-class property, the DHCP server ignores the DHCP request; that is, the server will not provide the client an IP address.
The following are valid authentication values.
The value you specify in the host-name property can be one of two general forms.
The first form is a string that does not start with a @. This form of host-name value is used to override the DHCP client-request host name. When you enter a valid name, you cause the DHCP server to ignore any host name specified by this client, and instead use this client-entry property. The actual value of the host-name option in the client's DHCP packet is ignored.
The second form is a string that starts with the special token "@". Network Registrar uses this form of host-name value to signal the following special handling.
The client-class command allows you to apply a set of properties to a group or class of clients.
The syntax is for the client-class command is as follows:
client-class name create [prop=value]For example, to create the client-class internal, type:
nrcmd> client-class internal create
To delete the client-class internal, type:
nrcmd> client-class internal delete
To list the all the client-classes, type:
nrcmd> client-class list
The client-class command allows you to configure and display common properties for DHCP client configurations using the set, get and show commands.
Unlike most client configurations, the DHCP server reads the client-class configurations at server start-up time, and thus you must reload the server for changes to take affect.
The syntax is as follows:
client-class name set prop=val [prop=value]For descriptions of the properties, see the "Client Command Properties" section.
The server processes client and client-class property values in the following way:
The custom-option command allows you to create, list, or delete a custom DHCP option.
You can also use the custom-option command to redefine any predefined DHCP options. The newly defined option's definition will override the original option. If you delete this option, its definition returns to its original value.
The syntax is for the custom-option command is as follows:
custom-option name create optnum opttypeTable 2-3 lists the custom-option command properties.
| Property | Description |
|---|---|
Specifies the option number. Read-only | |
Specifies the option type. It can be BOOL, BYTE, WORD, INT, UINT, STRING, IPADDR, BYTE_ARRAY, WORD_ARRAY, INT_ARRAY, UINT_ARRAY, or IPADDR_ARRAY. For more information about types, see "Option Types" section. | |
Optional, default null-string. You can use this property for a description. |
Table 2-4 lists the option types supported by the nrcmd command.
| Option Type | <opttype> | Definition |
|---|---|---|
boolean | TRUE or FALSE | |
byte | 8-bit unsigned integer | |
word | 16-bit unsigned integer | |
signed integer | 32-bit signed integer | |
unsigned integer | 32-bit unsigned integer | |
string | ASCII text string | |
IP address | IP address in the form of a.b.c.d | |
byte array | Binary string of the form xx[:xx] in which x is 0-9a-f | |
word array | Array of 16-bit unsigned integers | |
signed array | Array of 32-bit signed integers | |
unsigned array | Array of 32-bit unsigned integers | |
IP address array | Array of IP addresses |
For example, to create a custom option called red, mapped to number 100, of type IPADDR, type:
nrcmd> custom-option red create 100 IPADDR
To create a custom option called blue, mapped to number 101, that is an array of bytes, type:
nrcmd> custom-option blue create 101 BYTE_ARRAY
To give custom-option blue a description, type:
nrcmd> custom-option blue set desc="This is another option called blue."
To create a custom-option that overlays pre-defined option 2 (time-offset), type:
nrcmd> custom-option green create 2 INT desc="Option green overlays time-offset."
To list the custom-options you have created, type:
nrcmd> custom-option list
To cause option 2 to revert to its original definition, type:
nrcmd> custom-option green delete
To redefine time-offset option to change the format of its user-printable name, type:
nrcmd> custom-option TimeOffset create 2 INT
To display the option's new definition, type:
nrcmd> custom-option TimeOffset show
The syntax for the dhcp command is as follows:
dhcp disable featureTable 2-5 lists and describes the DHCP features.
| Feature | Description |
|---|---|
Controls whether the DHCP server uses the source address of the packet, if it is non-zero, in lieu of the giaddr field. Note that the DHCP server uses this feature only for DHCP packets, not BOOTP packets. The default is enabled. For more information about this feature, see the "Cisco DHCP Proxy" section. | |
Controls whether or not the DHCP server uses the client and client-class configuration objects to affect request processing. Default disabled. | |
Controls whether or not the DHCP server extends leases that are less than half expired. Default disabled, which means that the DHCP server will always extend leases (except in the first 30 seconds) to accommodate protocol retries. For more information about this feature, see the "Defer Lease Extensions" section. | |
Causes the DHCP server to find all the interface cards on the host and process DHCP requests that it receives from any of them. It will, however, only offer addresses to requests from subnets in which you have defined a valid scope with available addresses. If you do not enable this feature, the DHCP server uses only its list of configured interfaces. Default enabled. | |
Causes the server to drop a packet (if possible) when it encounters a script failure. Default enabled. | |
Controls whether the DHCP server sends unicast rather than broadcast responses when a client indicates that it can accept a unicast. This feature may not be available on all platforms. | |
ignore-icmp-errors | If you enable this feature and you have configured the DHCP server to send ICMP ECHO requests before offering addresses, the server will make unavailable any address for which it receives an ECHO reply within its configured timeout period. If you disable this feature, the DHCP server will also treat ICMP DEST_UNREACHABLE and TTL_EXPIRED error messages which it receives after sending ICMP ECHO requests as grounds for making an address unavailable. |
Causes the DHCP server to recognize only packets generated from the nrcmd command's import leases command and ignore all others. You can use this property if you want to update your DHCP server and prevent clients from receiving addresses during this period. Default disabled. For more about import mode, see "Import Mode" section. | |
Causes the DHCP server to use the client's MAC address as the only client identifier. The standard behavior, as specified in RFC 2132, is to use the client ID option (if it is present) as the unique client identifier. If you specify the mac-address-only argument, the DHCP server ignores the client's ID and uses its MAC address instead. You can use this argument to have a single, consistent way of identifying all clients that use your DHCP server. Default disabled. | |
Causes the DHCP server to release any other leases the client may have had on this server. Since the default behavior for the Network Registrar DHCP server is to store all the leases a client obtains, this command ensures that only one lease is stored. A client might obtain a number of leases if a user with a laptop traveled throughout the building and requested leases at different locations on the network. | |
If the server is replying to a BOOTP request, and is offering a lease from a scope that is configured for DNS updates, the DHCP server checks this property before beginning the update. You can use this feature to prevent DNS updates for BOOTP clients, while allowing updates for DHCP clients. | |
Controls whether the DHCP server attempts to read client-entry data through LDAP, that is, using the configuration supplied by the ldap command. For more information about the ldap command, see the "LDAP Features" section. |
The cisco-dhcp-proxy feature provides support for certain Cisco devices that implement a DHCP proxy function. The cisco-dhcp-proxy feature causes the DHCP server to use a non-zero IP source address as the giaddr (gateway address) of a DHCP packet when no giaddr is specified in the packet. This feature causes no change in the processing for DHCP clients that are not local or for any BOOTP clients. For locally connected DHCP clients (where the giaddr must be zero), the source address is normally zero (per the DHCP RFC), and so the subnet on which they belong is determined using the interface address on which the packet arrived---which is the correct behavior.
Because it might be possible that some locally connected clients might be affected by the cisco-dhcp-proxy feature, you can disable it. Such a client would have to send packets to the DHCP server using a non-zero source address (which they should not do), and this would cause them to be unable to get an IP address. If a client is having difficulty receiving an IP address, you can determine whether it is caused by the cisco-dhcp-proxy feature by checking the logs. Look for the phrase "with source IP address x.y.z.a" in the message that begins: "Server received a packet-type packet from... via: {Interface | Garrett} e.f.g.h" and that contains the client's MAC address or Client ID and hostname (if any). If you see such a message for a locally connected client, then you should consider disabling cisco-dhcp-proxy feature.
You might want to use the defer-lease extensions feature to reduce the number of writes to the Network Registrar database. These writes can occur because the Network Registrar DHCP server commits fresh information to the database any time it changes the duration of a client's lease. Since the DHCP server renews leases for the full lease interval every time the client contacts the server, these database writes may have a performance impact if the server is on a busy network.
Some database writes can be eliminated if the data being written is redundant, that is, the same as the old data. Instead of granting the full lease duration, the server can re-grant the lease with a new duration equal to the remaining time on the old lease. Since the absolute expiration time does not change, no database write is needed.
There are three cases of lease extensions to consider:
As a complication, the server also keeps track of the time at which it last heard from the client. Known as "last-transaction-time", this information is sometimes used by sites as a debugging aid (for example, "How long has it been since we've heard from Beth's PC?"). Maintaining this time robustly requires a write to the database on every client interaction. For more information about this property, see the "last-transaction-time-granularity" section.
Because the last-transaction-time is not integral to the protocol, it does not have to be updated synchronously. And since it is used primarily as a debugging aid, it does not have to be entirely accurate. Furthermore, since the in-memory copy is always accurate, you can use the export leases-server command to display the current information even if the data is not up-to-date in the database. For more information about the export command, see the "Export Leases" section.
You can put the DHCP server into import mode by enabling the import-mode feature and then restarting the server. You take the server out of import mode by disabling the feature and restarting the server. You can use import mode to exclude all DHCP lease requests except for the specially tagged ones that come from the nrcmd command during lease import. For more information about the import command, see the "Import Leases" section.
For example, to enable the client-class facility for this DHCP server, type:
nrcmd> dhcp enable client-class
To disable import mode, type:
nrcmd> dhcp disable import-mode
To display whether discover-interface is enabled or disabled, type:
nrcmd> dhcp get discover-interfaces
You can use the set, get, unset, and show commands to assign and retrieve values from the DHCP's name-value properties.
The syntax is:
dhcp get propTable 2-6 lists and describes the DHCP properties.
| Property | Description |
|---|---|
Controls the number of milliseconds the DHCP server will wait for a response before retrying a dynamic DNS request. | |
Is the default value of the extension trace level for every request object. You can override this value by setting the extension-trace-level in a user-written extension. Setting the level to zero causes very little tracing. Setting the level to three causes considerable tracing. For more information about DHCP extension creation, see the "Extension Properties" section. | |
Specifies the number of seconds Network Registrar guarantees that the last transaction time is accurate. The default is 30 seconds. Do not set it lower than 30 seconds. For optimal performance set it to a value that is greater than half your lease interval. For more about this property, see the "Defer Lease Extensions" section. | |
Controls whether the DHCP server logs additional detail about the events listed in the log-settings. This can be helpful when you are analyzing a problem, but leaving it enabled for a long period can cause the log files to fill up. For more information about the different log settings, see the "Log Settings" section. | |
Controls the size of buffers DHCP allocates for responding to DHCP clients. At least 100 buffers of each type should be allocated, and perhaps as many as several thousand would be reasonable in some installations. | |
Controls the size of buffers DHCP allocates for receiving packets from DHCP clients. At least 100 buffers of each type should be allocated, and perhaps as many as several thousand would be reasonable in some installations. | |
Controls the size of buffers DHCP allocates for communication with DNS servers. You can reduce the DHCP server's memory requirement by reducing the number of DNS packets, at the risk of missing updates. | |
Controls the number of times the DHCP server can try to add a host into DNS even if it detects that the host's name is already present in DNS. This field controls the number of times the DHCP server will attempt to modify a host's name in order to resolve a conflict. | |
Controls the number of times the DHCP server attempts to send dynamic DNS updates to a DNS server. | |
Sets the Time To Live (TTL) ceiling, in seconds, for DNS records added through dynamic DNS. When the DHCP server adds a DNS record, it sets the TTL to less than one-third of the lease time, or this ceiling value. Note that the DNS record's effective TTL may be determined by the DNS zone's minimum TTL. | |
max-ping-packets | The number of buffers the server will allocate for sending and receiving ICMP ping messages. For more information, see the scope's ping-client's feature, see the "Scope Features" section. |
The list of scope selection tags associated with this scope. In this context the term tags refers to a named entity that is used to control matching client and client-class entries with candidate scopes. |
For example, to set the scope selection tag internal, type:
nrcmd> dhcp set scope-selection-tags=internal
To display whether hardware-unicast has been set, type:
nrcmd> dhcp get hardware-unicast
To make the one-lease-per-client have no value, type:
nrcmd> dhcp unset one-lease-per-client
You can set the following flags:
For example, to suppress warning messages for unconfigured or missing options, type:
nrcmd> dhcp set log-settings=default,incoming-packets
To turn on client and client-class debugging for the DHCP server, type:
nrcmd> dhcp set log-settings=client-detail nrcmd> dhcp reload
To turn off debugging for the DHCP server, type:
nrcmd> dhcp set log-settings=default nrcmd> dhcp reload
As an additional aid to troubleshooting your configuration you can use the example extension, dextrace, distributed on the Network Registrar CD. It looks for a particular MAC address in every input packet. When it finds that MAC address, it enables packet sniffing for just that input and any corresponding output packet. You can configure this extension using the CLI, and the configuration commands are in the example source file for dexextension.c. This extension places only a very small load on the server, and is suitable for long-term use when trying to diagnose some DHCP problem in which a troublesome MAC address is known, but it is not possible (or perhaps not convenient) to manually stimulate that DHCP client directly in order to find the problem.
You can use the attachExtension, detachExtension, and listExtensions commands to configure the extensions points in the server you have defined. You can name each extension point and associate one extension with it. For more information about extensions, see the "Extension" section.
The syntax is:
dhcp attachExtension extension-point extension-nameFor example, after you have defined an extension, you can add the test extension at the extension point post-packet-decode by typing:
nrcmd> dhcp attachExtension post-packet-decode test
To remove the extension test from the extension point post-packet-decode, type:
nrcmd> dhcp detachExtension post-packet-decode
To list all the extensions points and any extensions associated with them, type:
nrcmd> dhcp listExtensions
The dhcp-interface command allows you to add, remove, and list the IP addresses of your server's hardware card (such as Ethernet or Token Ring), also called the Interface card. Interfaces are named with the IP address and net mask for the physical device.
You can list the interfaces to provide either an explicit list of interfaces that the DHCP server should listen on, or an explicit list of interfaces that the DHCP server should not listen on.
The dhcp-interface command provides more functionality than is provided through the GUI. This command provides functionality in the following form:
The syntax is:
dhcp-interface ipaddr/maskbits create [prop=value]Table 2-7 lists and describes the DHCP interface properties.
| Property | Description |
|---|---|
The IP address of the interface. | |
Indicates that the server should ignore this interface, which might be the case if you had several interfaces. You can use this property to temporarily disable a specific interface in a list of interfaces. | |
The subnet number. |
For example, to create two different interface configurations, type:
nrcmd> dhcp-interface 192.168.1.12/24 create nrcmd> dhcp-interface 10.1.2.3/24 create
To cause Network Registrar not to look at one interface, type the following. Note that you must have created the interface specification before you can set it to be ignored.
nrcmd> dhcp-interface 10.1.2.3/24 set ignore=true
To delete the interface specification 10.1.2.3/24, type:
nrcmd> dhcp-interface 10.1.2.3/24 delete
To list all the specified interfaces, type:
nrcmd> dhcp-interface list
The syntax is:
dns disable featureTable 2-8 lists and describes DNS features.
| Feature | Description |
|---|---|
Required, default disabled. Configures the server to hide information about the subzone hierarchy for all zones delegated from this server. This feature collapses a portion of the domain namespace into one virtual zone. | |
Required, default enabled. Controls the incremental transfer behavior for zones for which you have not configured a specific behavior. For more information about incremental transfer, see the "Incremental Transfer" section. | |
Required, default disabled. Controls whether you want Network Registrar to notice and log when a DNS server listed in a parent-zone's delegation of subzones does not know that it is authoritative for the zone. | |
Required, default disabled. Controls whether you want the DNS server, when composing a response to a query, to fetch missing glue records. Glue records are DNS A records that specify the address of a domain's authoritative name server. Normal DNS responses include NS records and their A records related to the name being queried. | |
Required, default disabled. Controls whether you want to disable forwarding client queries to other name servers when your DNS server is not authoritative for data being queried. If you disable recursive queries, you make your name server a noncaching server. | |
Required, default enabled. Controls NOTIFY sending notification for zones for which you have not configured a specific behavior. For more information about NOTIFY, see the "NOTIFY" section. | |
Required, default enabled. Controls whether you want round-robin cycling of equivalent records in responses to queries. Equivalent records are records of the same name and type. Since clients often only look at the first record of a set, enabling this feature can help balance loads and keep clients from forever trying to talk to an out-of-service host. | |
Required, default disabled. Controls whether you want this server to be a slave server, which is a server that relies entirely on forwarders for data that is not in its cache. This command has no effect unless you also specify the corresponding forwarders. Note that you can override slave-mode for specific domains with the DNS exception method. For more information about the exception method, see "Exception Method" section. | |
Required, default disabled, as implemented in BIND 4.9.7. Specifies whether you want the address records in responses to queries to be reordered based on the subnet of the client. Since clients often only look at the first record of a set, enabling this feature can help localize network traffic onto a subnet. This feature only applies on answers to queries from clients located on the same subnet as the DNS server. | |
Required, default disabled. Enables relaxation of the RFC 2136 restriction on the zone name record in dynamic updates. This feature allows updates to specify a zone name, which is any name within an authoritative zone, rather than the exact name of the zone. |
The incremental transfer feature (ixfr-enable) allows you to control how your DNS server handles incremental transfer. If you enable incremental transfer, you need to set or accept the default value of the ixfr-expire-interval property.
Table 2-9 lists the property for which you will need to set or accept the defaults if you enable incremental transfer.
| Property | Description |
|---|---|
Required, default 604800 seconds (7 days). Indicates the longest interval to allow a secondary zone to be maintained solely with incremental transfers. After this period, the server requests a full zone transfer. Validation: 0 <= x <= 2147483647 |
For example, to enable incremental transfer for all your zones, type:
nrcmd> dns enable ixfr-enable
To disable incremental transfer for the single secondary zone example.com, type:
nrcmd> zone example.com disable ixfr
To disable incremental transfer for the single remote-dns server (or subnet) 128.103.1.1, type:
nrcmd> remote-dns create 128.103.1.1 set ixfr=false
For more information about setting incremental transfer on specific zones or remote DNS servers, see the "Zone" section or the "Remote-Dns" section.
Since a master server for a zone does not know specifically which slaves transfer from it, Network Registrar notifies all registered name servers for the zone (name servers listed in the NS Resource Records) when the zone changes. The sole exception to this policy is that Network Registrar does not notify the server named in the SOA mname field (the primary master). For more information about NOTIFY, see RFC 1996.
If you enable NOTIFY, you need to set or accept the defaults for the properties listed in Table 2-10.
| Property | Description |
|---|---|
Required, default 100. The maximum number of changes you want to accumulate during the notify-wait period. If this number is exceeded, Network Registrar sends notification before the notify-wait period has passed. | |
Required, default 2 seconds. The minimum interval required before sending notification of consecutive changes on the same zone to a particular server. Validation: 0 <= x <= 2147483647 | |
Required, default 5 seconds. For secondary zones, the minimum amount of time between the completion of processing of one notification (serial number testing and/or zone transfer), and the start of processing of another notification. Validation: 0 <= x <= 2147483647 | |
Required, default 1 second. The interval to stagger notification of multiple servers of a particular change. Validation: 0 <= x <= 2147483647 | |
Required, default 5 seconds. The period of time to delay, after an initial zone change, before sending change notification to other name servers. This property allows you to accumulate multiple changes, and thus limit the number of times the serial number advances. Validation: 0 <= x <= 2147483647 |
For example, to disable NOTIFY for all zones, type:
nrcmd> dns disable notify
You can use IXFR and NOTIFY together, but you do not have to. You might want to disable NOTIFY for a quickly changing zone for which immediate updates on all secondaries does not warrant the constant NOTIFY traffic. Such a zone might benefit from having a short refresh time and a disabled NOTIFY.
nrcmd> zone example.com set refresh=30m nrcmd> zone example.com disable notify
For more information about setting zone properties, see the "Zone" section.
You can use the set, get, and unset commands to assign and retrieve values from the DNS server's name-value properties.
The syntax is:
dns get propTable 2-11 lists and defines the DNS properties.
| Property | Description |
|---|---|
Required, default 53. Specifies the UDP and TCP port number on which the DNS server listens for queries. Validation: [1, 65535] | |
Required, default 7 days. Indicates the maximum amount of time that you want Network Registrar to retain cached information. Validation: 0 <= x <= 2147483647 | |
Required, default 200 KB. Indicates the size of the in-memory record cache, in kilobytes. Validation: 0 <= x <= 2147483647 | |
Required, default 10 minutes. Indicates how long information learned from other name servers about non-existent names or data should be cached. Validation: 0 <= x <= 2147483647 | |
Required. Specifies the UDP and TCP port to which the DNS server sends queries to other servers. Validation: [1, 65535] |
The DNS methods commands allow you to add, list or remove specific servers for dealing with root-hint servers, exception servers, forwarding servers, and flushing the cache.
The syntax is:
dns addRootHint name addr [addr]For example, to add the root name server a.root-servers.net, type:
nrcmd> DNS addRootHint a.root-servers.net 198.41.0.4
To remove the root name server a.root-servers.net, type:
nrcmd> DNS removeRootHint a.root-servers.net
To list the root name servers, type:
nrcmd> DNS listRootHints
The syntax is:
dns addException name addr [addr]For example, the sample company, QuickExample, has four subsidiaries: red, blue, yellow, and green. Each of them has its own domain under the .com domain. But when users at red.com. want to use resources at blue.com, their DNS server knows that it is not authoritative for blue.com., and thus attempts to locate blue.com. by asking the root name servers.
To use exception handling, the administrator at red.com. lists all the domains that users might want to access, and at least one corresponding name server. In this case, the administrator would list the three other domains for the QuickExample company.
To add the exception server blue.com., type:
nrcmd> DNS addException blue.com. 192.168.1.4
To remove the name server blue.com., type:
nrcmd> DNS removeException blue.com.
To list the name servers, type:
nrcmd> DNS listExceptions
The syntax is:
dns addForwarder addr [addr]For example, to add the forwarder server 192.168.1.4, type:
nrcmd> DNS addForwarder 192.168.1.4
To remove the name server 192.168.1.4, type:
nrcmd> DNS removeForwarder 192.168.1.4
To list the forwarder servers, type:
nrcmd> DNS listForwarders
You can use the dns flushCache command to stop the disk cache file from growing, but the actual behavior depends on whether your DNS server is running or stopped.
To completely clear a cache that has grown too large, stop the server, type the command, and restart the server.
The syntax is:
dns flushCacheYou can use the dns rebuildRR-Indexes command if you need to rebuild your resource records indexes. You might need to rebuild your resource records indexes, if you observe resource or host list data that appears inconsistent or if data appears to be missing.
Rebuilding your resource records should correct any inconsistencies.
The syntax is:
dns rebuildRR-IndexesThe exit command allows you to exit the current nrcmd command session. Network Registrar writes all your unsaved changes to the database. If Network Registrar is unable to save your changes, it displays the same error code as if you had used the save command.
The syntax is:
exitFor example, to quit Network Registrar's command line interface when you are in interactive mode, type exit:
nrcmd> exit
The export command allows you to write the state of all the leases or the contents of a DNS zone on a specific cluster to a file.
The syntax is:
export leases [-server|-client] filenameThe export command, with the argument leases -server, writes the state of all the current and expired leases to the DHCP server's log directory using the output file you specify.
The export command, with the argument leases -client, writes the state of all the current leases to the output file. For a description of the file format, refer to the "Import and Export File Formats" section.
For best results you should run the export command when the DHCP server is stopped. Although you can run the export command while the DHCP server is running without any negative effect on the server, if you do you might get some inconsistencies.
The syntax is:
export leases [-server|-client] filenameThe filename is the name of output file or "-" for standard out for client-side exports. Note that you cannot use the dash with the -server option. In addition, the server-side export does not permit filenames with any non-alphanumeric character, such as "." for example.
For example, to export the client leases to the output file leaseOut, type:
nrcmd> export leases -client leaseOut
The export leases -client command writes out the lease time as a string, which is the day, month, date, time, year format, such as Apr 13 16:35:48 1998.
To export the all the currently held and expired leases to the output file leaseOut, type:
nrcmd> export leases -server leaseOut
The export leases -server command writes out the lease times as integers, which are the number of seconds since midnight Jan 1, 1970. For example, 903968580.
The export command, with the argument zone, writes the specified DNS zone into a file in the BIND format.
The syntax is:
export zone zone-name arguments output-fileFor example, to write the contents of the Example domain, type:
nrcmd> export zone example.com static hosts.local
The export command with the argument zonenames exports the names of the zones in the server. You can specify forward, reverse, or both to cause the command to export the forward zones, reverse zones, or all the zones, respectively.
The syntax is:
export zonenames {forward|reverse|both} output-fileThe export command with the argument hostfile creates a hostfile, in UNIX hostfile format, from all the zones in the server. It ignores reverse zones. It creates hostfile records from A records, CNAME records, and HINFO records. The hostfile record consists of the IP Address, the FQDN, aliases created from the A records and CNAME records, and comments created from HINFO records.
The syntax is:
export hostfile output-fileTo extend the DHCP server with an extension, do the following:
Step 1 Write the extension in either Tcl, C or C++, and install it in the server extensions directory.
Solaris:
For Tcl this is /opt/AICnwreg2/extensions/DHCP/tcl.
For C or C++ this is /opt/AICnwreg2/extensions/DHCP/dex
Windows NT:
For Tcl this is \aic\registrar\extensions\dhcp\tcl
For C or C++ this is\aic\registrar\extensions\dhcp\dex
It is best to place these extensions in the appropriate directory for TCL or C/C++ extensions. Then, when configuring the file name, just type the file name itself (with no / or \).
If you want to place extensions in subdirectories, you must enter the file name with a path separator. These are different depending on the operating system on which your DHCP server is running.
When entering a file name that contains a \ character on NT, you must enter it with a \\ (since \ is an escape character for the CLI). For example, to enter the file name "debug\myextension.tcl", enter debug\\myextension.tc.l.
Step 2 Configure the DHCP server to recognize this extension, using the extension command.
Step 3 Attach the configured extension to one or more DHCP extension points using the dhcp attachExtension command. For more information about the command, see the "DHCP Extension Commands" section. For more information about choosing extensions points and writing extensions, see "Using Extension Points."
Step 4 Reload the server.
The syntax is:
extension name create lang file entry [prop=value]For example, to configure a Tcl extension, type:
nrcmd> extension mytclext create Tcl mytclfile.tcl mytclentry
The contents of mytclfile.tcl might be:
proc mytclentry{request response environ}{
$environ log LOG_INFO "helloworld"
{
You can use the set, get, and unset commands to assign and retrieve values from the extension's properties.
The syntax is:
extension name get propTable 2-12 lists and describes the extension properties.
| Property | Description |
|---|---|
Required (set by create), default <none>.The name of the entry point for the module. This function is called from any extension point to which this module is bound. The arguments for this function are server-implementation specific. | |
Required (set by create), default <none>.This file name is relative to the directory extensions in the installation. It cannot be a absolute pathname, nor can it contain any sequence of two dots (..). | |
Optional, default <none>.The arguments that should be passed to the init-entry point function. For more information about how the DHCP server parses this information, see "The Init-Entry Entry Point" section. | |
Optional, default <none>.The name of the init-entry point. If you set it, Network Registrar calls this function when the server loads the module and when the server shuts down. For more information about this entry point, see "The Init-Entry Entry Point" section. | |
Required (set by create), default <none>. The language in which the extension or module is implemented. Tcl indicates that the module is a Tcl extension (tcl7.5). Dex indicates that the module is a shared object with C calling interfaces. | |
Required (set by create), default <none>. The name of the extension or module. Network Registrar uses this name to assign extensions or modules to extension points. Changing this property renames the extension. |
The nrcmd command uses the same locking mechanism as Network Registrar. When you execute a command, the command attempts to get an exclusive lock for the cluster to which it is connected. If it is unable to get an exclusive lock, it displays a warning. You can only issue the following commands: client, lease, zone add, help, and force-lock.
If you use the force-lock command to unlock a cluster, the command writes the warning to the log file on the client machine not on the cluster.
To force an exclusive lock, type:
nrcmd> force-lock
You can use the help command to display the nrcmd command's online help.
You can select the sections of the man page output by specifying the section names after the help cmd command. The section names are:
The syntax is:
helpFor example, to print the list of commands, type:
-> help 100 Ok
To print the contents of the help man page, type:
-> help help 100 Ok
To print the contents of the help command's synopsis, type:
-> help help synopsis
100 Ok
SYNOPSIS
help
help <cmd> [<section> ...]
Before you can import leases, you need to perform several configuration steps:
Step 1 Configure scopes in the DHCP server for the leases that you plan to import. For more information, see the "Scope" section.
Step 2 If the host names for the leases are to be dynamically entered into DNS as part of the import, configure zones in the DNS server to allow dynamic updates. For more information, see the "Zone" section.
Step 3 Set the DHCP server to import mode so that it will not respond to other lease requests during the lease importing. For more information, see the "DHCP" section.
After you have imported the leases, take the DHCP server out of import mode so that it can respond to other lease requests.
The syntax is:
import leases fileFor example, to import the file LeaseIn to the DHCP server, type:
nrcmd> import leases LeaseIn
If the lease time in the import file is greater than the lease time the client would have received if it were to acquire a lease, the client is given the lesser lease time. In other words, suppose it is 2 p.m. and your scope is configured for a one hour lease. According to the file you are importing, the lease time will not expire until 5 p.m. After you import the file, the lease will expire at 3 p.m., not 5 p.m.
If your import file specifies a zone name, the zone name will not be used when DNS is updated. If it specifies a host name, the host name will be used when DNS is updated, unless overridden by a host-name specification in a client or client-class entry.
The only way to indicate to the DHCP server that the client's host name should be placed in a zone other than the default associated with the scope, is to specify that zone in a client or client-class entry.
The syntax is:
import named.boot fileFor example, to import the file /etc/named.boot to the DNS server, type:
nrcmd> import named.boot /etc/named.boot
You should use UNIX style paths even when running the import command on Windows NT. The previous example on Windows NT might look like this:
nrcmd> import named.boot c:/etc/named.boot
There is one known incompatibility between the way BIND loads named.boot configurations and the way the nrcmd command loads named.boot configurations.
When a zone file contains an $INCLUDE directive, BIND searches for the include file relative to the directory specified by the directory directive in the named.boot file, whereas the nrcmd command searches for the include file relative to the directory containing the zone file being processed.
You can avoid this problem completely if your BIND configuration uses absolute paths whenever specifying an include file in a zone file. If your zone files contain relative paths when specifying include files and the directory containing the zone file is not the same as the directory specified by the directory directive in the named.boot file, your configuration will not load properly. You will need to convert the relative paths in your zone files to absolute paths to import your BIND configuration into Network Registrar. An example of a configuration and how it might be fixed follows.
/etc/named.boot
/usr/local/domain/primary/db.example
/usr/local/domain/primary/db.include
/usr/local/domain/secondary
/etc/named.boot:
# BIND searches for zone files and include files relative to
# /usr/local/domain
directory /usr/local/domain
# BIND finds zone file in /usr/local/domain/primary primary
example.com primary/db.example
# end of /etc/named.boot
/usr/local/domain/primary/db.example
# BIND searches for include file relative to /usr/local/domain
$INCLUDE primary/db.include
# end of /usr/local/domain/primary/db.example
To make the configuration loadable, change the relative path in the file db.example to an absolute path.
$INCLUDE primary/db.include
$INCLUDE /usr/local/domain/primary/db.include
Table 2-13 lists and describes the boot file directives that are supported by the BIND 4.9.6 distribution and the corresponding nrcmd command syntax that is generated. Directives that Network Registrar does not support are marked with the word "unsupported" and the directives that require no action from Network Registrar are marked with the word "none".
| BIND | Nrcmd |
|---|---|
directory new-directory | None---Supported within the named.boot file parser. |
include file | None---supported within the named.boot file parser. |
primary domain-name-of-zone file | zone create domain-name-of-zone primary file=file |
secondary domain-name-of-zone ip-addr-list [backup-file] | zone create domain-name-of-zone secondary ip-addr [,ip-addr...] |
forwarders ip-addr-list | dns addForwarder ip-addr [ip-addr...] |
slave | dns enable slave-mode |
tcplist ip-addr-or-network-list | zone domain-name-of-zone enable restrict-xfer zone domain-name-of-zone set restricted-set=ip-addr [,ip-addr...] |
xfernets ip-addr-or-network-list | zone domain-name-of-zone enable restrict-xfer zone domain-name-of-zone set restricted-set=ip-addr [,ip-addr...] |
max-fetch number | dns set xfer-client-concurrent-limit=number |
domain local-domain-name | unsupported |
cache domain-name file | unsupported |
sortlist network-list | unsupported |
stub domain ip-addr-list [backup-file] | unsupported |
bogusns ip-addr-list | unsupported |
check-names primary/secondary/response fail/warn/ignore | unsupported |
options forward-only | dns enable slave-mode |
options no-recursion | dns enable no-recurse |
options no-fetch-glue | dns enable no-fetch-glue |
options fake-iquery | None---Network Registrar only supports fake iquery |
options query-log | unsupported |
limit transfers-in number | dns set xfer-client-concurrent-limit=number |
limit transfers-per-ns number | unsupported |
limit datasize number | unsupported |
limit files number | unsupported |
The ldap command allows you to associate remote LDAP servers with Network Registrar, and then set their attributes.
The syntax is:
ldap name create hostname [prop=value]For example, to create an LDAP server object myserver with a host name of myserver.mycompany.com, type:
nrcmd> ldap myserver create myserver.mycompany.com
To delete an ldap server object myserver, type:
nrcmd> ldap myserver delete
To list the ldap server objects, type:
nrcmd> ldap list
Use the enable, disable, or get commands to enable, disable, or determine whether the feature has been set.
The syntax is:
ldap name disable featureTable 2-14 lists and describes the LDAP features. Note that after you enable a feature you can set its properties.
| Feature | Description |
|---|---|
Optional, default false. Enables you to refine queries to the LDAP server. | |
Optional, default false. Enables you to specify the types of updates to the LDAP server. | |
Optional, default false. Enables you to limit the number of outstanding queries to the LDAP server. If you enable this feature you can set the maxprequest property. |
You can use the set, get, and unset commands to assign and retrieve values from the LDAP server's properties.
The syntax is:
ldap name get propTable 2-15 lists and describes the LDAP properties.
| Property | Description |
|---|---|
The number of connections that the server should make to a particular LDAP server. This is primarily a performance-tuning parameter. In some cases, more than one connection can improve overall throughput. | |
If the dn (distinguished name) of the LDAP object to update can be constructed from one of the lease attributes, the specified dn-attribute is formatted using the dn-format string to construct the object filter that specifies the LDAP server to be modified. | |
Formats the dn-attribute. A %s is required and is replaced with the value of the dn-attribute. | |
The host name of the server to connect to. Network Registrar needs the host name for LDAP servers. | |
The limit on the number of LDAP referrals Network Registrar will follow when querying. A value of zero means "don't follow referrals." | |
Limits any single LDAP connection to this number of outstanding queries. You may choose to limit the number of outstanding queries to improve performance. The DHCP server uses this configuration information when preparing client-entry queries. | |
The password of a user with access to the parts of the directory that DHCP will use. (LDAP servers can be configured to allow anonymous access, so this is optional). | |
The port to connect to. (There is a default.) | |
A positive integer. LDAP servers can be used in preference order: 1 is the highest preference value. | |
The name of the LDAP attribute that may indicate that an LDAP response is a referral. The referral may or may not contain the dn to query for. If the dn is present (the current server assumes this), it is used as the search path along with a wildcard search scope in the query that follows the referral. If not, the search path is built by formatting the data in the referral attribute with the referral filter, and the existing search scope is used. | |
If the referral attribute does not contain a dn, the referral-attribute's data is formatted with this filter expression to build a search path, and the existing search scope for the LDAP server is used. | |
The filter to be applied in the query. A %s is required and is replaced by the value of the dn attribute. | |
The name of an object in the directory to use as a query's starting-point. The path and the scope together control the portion of the directory that are searched. | |
The scope can be SUBTREE (all children of the search path will be searched), ONELEVEL (only one the immediate children of the base object will be searched), or BASE (only the base object will be searched). | |
The number of seconds the DHCP server should wait for a response to an individual query. After a query times out, the server may re-try another LDAP server connection, or drop it. | |
The interval (in milliseconds) at which each LDAP client connection polls for results, if it has outstanding queries or updates. | |
If the LDAP object's dn cannot be determined directly, the DHCP server must issue a query to retrieve the dn. In that case, the DHCP server uses these parameters to extract the data from a lease attribute (specified by the search-attribute, and format it using the search-filter expression). | |
Formats the update-search-attribute. A %s is required and is replaced with the value of the dn-attribute. | |
The search filter (built using either the dn attribute or the search attribute) is used along with the path and scope to specify the LDAP object that should be updated. | |
The search scope is used to specify the LDAP object that should be updated. | |
The distinguished name of an object with access to the parts of the directory that DHCP will use. (Because you can configure LDAP servers to allow anonymous access, this property is optional.) |
Use the setEntry, getEntry, and unsetEntry commands to set, query, and clear elements of the various dictionary properties in the LDAP server configuration. These dictionary properties provide a convenient mapping from strings keys to string values.
The syntax is:
ldap name setEntry prop key=valueTable 2-16 lists and describes the LDAP dictionary properties.
| Properties | Description |
|---|---|
Controls whether additional LDAP attributes are retrieved along with client-entry attributes. If any of these are present in a query's results, their values are made available to scripts through the request's environment dictionary. The LDAP value is keyed by the value in the LDAP query env-dictionary. | |
Controls the mapping between the names of LDAP attributes and client-entry attributes. The server will attempt to retrieve all of the LDAP attributes specified in the dictionary. When a query succeeds, the values for any LDAP attributes that it returns are set in the corresponding client-entry attributes. | |
The dictionary that maps LDAP attributes to DHCP lease attributes. When an LDAP object is modified, each LDAP attribute that is present in this dictionary is set to the value of its corresponding DHCP lease attribute. |
For example, to configure a query-dictionary to search for the surname (sn) and use its data to specify the client's DHCP host name, type:
nrcmd> ldap dirserver setEntry query-dictionary sn=host-name
To configure a query-dictionary to search for the first name (givenname)to use for the specific client-class name, type:
nrcmd> ldap myserver setEntry query-dictionary givenname=client-class-name
To configure a query-dictionary to search for the localityname to use for the domain name, type:
nrcmd> ldap myserver setEntry query-dictionary localityname=domain-name
The lease command allows you to view and manipulate the current DHCP leases in the cluster.
The syntax is:
lease listTable 2-17 lists and describes the lease command actions.
| Action | Description |
|---|---|
Removes the deactivate flag from the lease, but does not change the status of a lease marked as unavailable. | |
Prevents the lease from being given out or renewed, but doesn't change the state of the lease. | |
Makes a currently held lease available, even a lease marked as unavailable. Because using the force-available action may compromise the integrity of your IP address allocations, make sure that before you use the command the client holding the lease has stopped using the lease. | |
Displays the most recent MAC address associated with this lease. If no MAC address was ever associated with this lease (or if the lease has become unavailable), then Network Registrar displays the error message, "302 Not Found." | |
Displays the lease attributes for a specific address. | |
Lists all leases that are associated with the specified MAC address. |
For example, to activate lease 192.168.1.9, type:
nrcmd> lease 192.168.1.9 activate
You can use get to display the values from the lease properties. These properties are read-only.
The syntax is:
lease name get propTable 2-18 lists and describes the lease command properties.
| Properties | Description |
|---|---|
The IP address of this lease. | |
The DHCP server attempted (possibly successfully) to enter this name into the DNS server for this client. It is related to the client-host-name, but may not be identical due to name collisions in the DNS server database. | |
The domain name specified (if any) into which to put the client's DNS name. | |
A variety of flags relating to the client. For more information about these flags, see "Client Flags". | |
The DNS name that the client requested the DHCP server place into the DNS server. | |
The client-id specified by the client, or one synthesized by the DHCP server for this client (if client-id-created-from-mac-address is set in the client-flags). | |
The time at which the client most recently contacted the DHCP server. | |
The MAC address which the client presented to the DHCP server. | |
The time at which the lease will expire. | |
Flags for the lease are either "reserved" or "deactivated". The lease is reserved for some MAC address or the lease is deactivated, which means that it should not be used. Any clients that are using deactivated leases will be NAK'ed on their next renewal. | |
The time at which the state last changed to its current value. You can use this property to determine when the lease was made unavailable. | |
The current state of the lease. |
You can use the following client flags:
The following flags are for internal use only: client-valid, client-fqdn-present, client-updates-name, clear-host-name, host-name-has-changed, and domain-name-has-changed.
The lease-notification command allows you to receive notification when the number of available addresses in a scope is exceeded. You can specify the notification limit either as the number of free addresses or the percentage of free addresses. You can also specify who will receive e-mail notification.
The syntax is:
lease-notification available=number|percentage% [config=config file] [errors-to=recipient mail-host=name] [recipients=recipient[,recipient] [mail-host= name [errors-to= receipient]]][scopes=scope name|address range[,scope name|address range,...]]Although you can use the lease-notification command interactively, its primary use is as an automated command. For more information, see the "Running Lease-notification Automatically on Solaris" section and the "Running Lease-notification Automatically on NT" section.
For example, to specify scope 1 with an available value of 10% and e-mail recipients billy, bob, and jane, type:
nrcmd> lease-notification available=10% scopes=scope1 recipients=billy,bob,jane mail-host=mailhost
To specify the range of scopes 192.32.1.0-192.32.1.255, the config file .nrNotification, the recipients admin, an available value of 13 leases, and the NT mail host as mailhost, type:
nrcmd> lease-notification scopes=192.32.1.0-192.32.1.255 config=/home/bob/.nrNotification recipients=admin@comco.com available=13 mail-host=mailhost
Table 2-19 lists and describes the lease-notification command properties.
| Property | Description |
|---|---|
Specify either a number or percentage of available addresses. If the number or percentage of available addresses is equal to or less than the specified value for the scopes being checked, Network Registrar generates a report listing information about the scopes that reach or exceed the available value. | |
Specify a configuration file. If you do not specify a configuration file, Network Registrar searches for the default .nrconfig file. For more information about the search order, see the "Specifying the Config File" section. | |
If you specify a mail-host you may also specify the e-mail address of the sender of the e-mail in order to provide a return path for bounced e-mail. The default value is postmaster. | |
On NT, you must specify a mail-host. On Solaris the mail host is generally already configured for the sendmail program. You can verify that your Solaris system is properly configured by issuing the command date | mail your-email-address and observing whether or not the date is e-mailed to you. | |
If you specify the e-mail addresses of one or more recipients, Network Registrar sends an e-mail report to those addresses. Otherwise, Network Registrar directs the report to standard output. | |
Specify the scopes either by their names or as a range or ranges of addresses. Network Registrar checks any scope containing any address that falls within the range of address. If you do not list any scopes or addresses, Network Registrar checks all scopes managed by the specified cluster. |
Each line of the file must either begin with the character '#' (comment), a section header enclosed in square brackets, or a parameter=value pair or its continuation. Network Registrar strips leading white space from each line and ignores blank lines.
You can specify clusters in several ways:
# Cluster information for lease notification [lease-notification] # Clustername Username Password clusters=host1 admin passwd1,host2 admin,host3,host3 admin2 passwd2
Note that you should separate the three-cluster arguments with spaces. For long lines you can use continuation lines, that is, you do not need to use continuation escape indicators.
You can optionally specify a user name and password for the cluster. If you do not provide a user name or password for a particular cluster, Network Registrar uses the last user name or password listed. If you do not provide user names or passwords, Network Registrar uses the information from the command line -N and -P arguments, and then the NT Registry or environment variables AIC_NAME and AIC_PASSWORD.
If Network Registrar cannot find a user name or password or the supplied user name and password are incorrect, the lease-notification command issues a warning for that cluster.
You can run the lease-notification command periodically by means of the cron(1) command by supplying crontab(1) with the command to run. For example, to run the lease-notification command at 00:15 and 12:15 (15 minutes after midnight and noon) Monday through Friday, specify the following command to crontab:
15 0,12 * * 1-5 . ./.profile /opt/nwreg2/bin/nrcmd lease-notification available=10%
config=/home/jsmith/.nrconfig addresses=192.32.1.0-192.32.128.0 recipients=jsmith,jdoe@american.com 1>/dev/null 2>&1
You can perform crontab editing by running the Solaris crontab -e command. Set your EDITOR environment variable before running the command, unless you want to use ed(1). See the crontab(1) man page for additional details.
Note that you must supply the nrcmd command's full path name on the crontab command line. You can determine the full path name in your environment with the Solaris which nrcmd command.
Also note that when you run the nrcmd lease-notification command by means of crontab, the user environment variables AIC_CLUSTER, AIC_NAME, and AIC_PASSWORD are ignored. Since the command being run could be viewed by others, for security reasons you should not provide the password through the -P option on the command line.
The cluster name, user, and password information for the cluster you want the nrcmd command to run from should be supplied in a .profile or other file in your home directory. The file must be read explicitly in the crontab entry with . ./.profile specification. Note that the first "." is the shell command that causes the file to be read. If you want the nrcmd command to run the notification command on a different cluster than the one on which it is being run, you also need to supply a config file with a fully specified path name.
You can prevent others from examining or changing the contents of the .profile and the configuration file you create by changing its permissions with the Solaris chmod go-rw config_file command.
You can use the Scheduled Tasks service available in Windows NT Explorer under My Computer to schedule the nrcmd lease-notification command. If you do not find a Scheduled Tasks folder under My Computer, you will need to add this optional component from Microsoft Internet Explorer 4.0 or later, or use some third-party task scheduler. You can also use the at command to schedule the nrcmd lease-notification command, but the at command can only schedule a command to run once a day or less.
The license command allows you to specify the license key for a cluster, or to view the license key or the license's expiration date.
Your license key is located on the back of the Cisco Network Registrar 2.5 CD case. You need to enter your license the first time you configure any cluster.
The syntax is:
license set prop=valueTable 2-20 lists and describes the license command properties.
| Properties | Description |
|---|---|
The expiration date of the license. Note that the date is read-only. | |
The license key |
For example, to set the license, you must run the nrcmd command in interactive mode, then exit and rerun the nrcmd command. To set the license to key 1234 abcd 5678 efgh, type:
nrcmd -C cluster1 -N admin -P aicuser nrcmd> license set key=1234-abcd-5678-efgh 100 Ok nrcmd> exit
The listaddr command provides the address utilization reporting functionality of the listaddr.bat command available in earlier versions of Network Registrar. Because the output from this command was designed for analysis tools such as spreadsheets, the formatting is not ideal for end-users.
The output for the listaddr command is a series of eight-column, comma-separated rows. There is one row for each known address. Thus, the total output can be quite verbose. A column may be empty if the usage of that column does not apply to the address. Table 2-21 lists and describes the meanings of the columns.
| Column | Description |
|---|---|
1 | IP address in unsigned hexadecimal format. |
2 | IP address in the canonical dotted format. |
3 | Type of the address. These types are defined as follows: |
STATIC---assigned to a host through DNS. | |
DYNAMIC---assigned to a host through a DHCP lease. | |
UNALLOCATED---the address is in the range of a DHCP scope, but is not in use. | |
RESERVED---the address is reserved for a host through DHCP. | |
4 | DNS name of host, for assigned addresses only. |
5 | State of the address. This field is blank for any address other than those assigned through DHCP leases. The values for such addresses are: Available, Unavailable, Leased, Expired, Deactivated. |
6 | Native host name, for addresses assigned through a DHCP lease. This is usually the Windows or UNIX name for the host. |
7 | MAC address, for addresses assigned through a DHCP lease. |
8 | Expiration time, for DHCP dynamic addresses. |
The syntax is:
listaddrFor example, to run listaddr, type:
nrcmd> listaddr
The policy command allows you to configure DHCP policy configurations. A policy is a collection of DHCP option values that can be associated with a range of addresses in a scope, or with a specific client or client-class configuration.
The syntax is:
policy name create [prop=value]For example, to create the policy CompanyB, type:
nrcmd> policy CompanyB create
You can enable, disable, or determine whether the feature has been set. You use the enable, disable, or get commands.
The syntax is:
policy name enable featureTable 2-22 lists and describes the policy features.
| Feature | Description |
|---|---|
Optional, default true Clients may request a specific lease time. The server will not honor those requested lease times if this attribute is false. The server will not honor a client's lease time if the time is longer than the server's normal lease time. | |
Optional, default false. Specifies that leases for this scope should be permanently granted to requesting clients. | |
Optional, default false. Controls whether the server uses the value of its lease time (server-lease-time) to determine the length of the lease. The DHCP server offers clients lease times that reflect the configured lease-time option from the appropriate policy. |
You can use the set and get commands to assign and retrieve values from the policy's properties.
The syntax is:
policy name get propTable 2-23 lists and describes the policy properties.
| Property | Description |
|---|---|
Optional, default <none> A list of the names of options that should be returned in any replies to BOOTP clients. The options themselves do not have to have been configured in the same policy as the reply-options list; the server will search the hierarchy of policies for each option named in the list. For more information about this property, see the "Policy Reply Options" section. | |
Optional, default <none> A list of the names of options that should be returned in any replies to DHCP clients. The options themselves do not have to have been configured in the same policy as the reply-options list; the server will search the hierarchy of policies for each option named in the list. For more information about this property, see the "Policy Reply Options" section. | |
Optional, default 5 minutes. The length of time between the expiration of a lease and the time it is made available for re-assignment. | |
Optional, default 2 minutes. If the server offers a lease to a client, but the offer is not accepted, the server will wait the specified number of minutes before making the lease available again. | |
Optional, default <none>. The name of a boot file to be used in a client's boot process. The server returns this file name in the 'file' field of its replies. The packet-file-name cannot be longer than 128 characters. | |
Optional, default <none>. The host name of a server to use in a client's boot process. The server returns this file name in the 'sname' field of its replies. The packet-server-name field cannot be longer than 64 characters. | |
Optional, default <none>. The IP address of the next server in a client's boot process. For example, this might be the address of a TFTP server used by BOOTP clients. The server returns this address in the siaddr field of its reply. | |
Optional, default <none> The time that the server believes the lease is valid. It may be useful to have the server consider leases leased for a longer period than the client in order to get more frequent client communication along with the stability of long lease times. |
For example, to set the grace period to three days for policy 168.1-net, type:
nrcmd> policy 168.1-net set grace-period=3d
When the server is getting ready to return option data to a client, it examines up to three policies: the client's policy, the client's client-class's policy, and the client's lease's scope's policy, in that order. The server looks through those policies for option data for which that the client has asked. Then the server looks through the policies for a reply-options list. It looks for bootp- or dhcp-reply-options depending on the client. The server uses the first list it finds. For each option in the list, the server looks through all of the policies, in order, and returns the data from the first policy that has a matching option. There is no requirement that the data that the server returns must come from the same policy that the reply-options list came from. If the server finds a reply-options list, it looks for each option in the list individually, and searches all of the related policies if necessary.
There is also no requirement that the options mentioned in a reply-options list be present in the policy that contains the list. The nrcmd command allows you to type in a string, and that string can name any option. The Network Registrar GUI, however, presents a special dialog box for adding a reply-options property to a policy that restricts you to the options already configured in the policy. This is a GUI-only restriction; the server does not impose this restriction.
You can set individual option values with the setOption command, unset option values with the unsetOption command, and view option values with the getOption and listOptions commands. When you set an option value the DHCP server replaces any existing value or creates a new one, as needed, for the given option name.
The syntax is:
policy name listOptionsTable 2-24 lists and describes the policy options.
| Property | Description |
|---|---|
Lists the options in the named policy. | |
Sets the option name and value to the specified policy. The format is optname value. For example, dhcp-lease-time 3600. | |
Gets the value of the named option. | |
Removes the named option from the specified policy. |
For example, to specify the lease time in a scope, type:
nrcmd> policy 168.1-net setOption dhcp-lease-time 608400
To list the options in a policy, type:
nrcmd> policy 168.1-net listOptions
You can use the setLeaseTime command to set the values of lease times and the getLeaseTime command to display the value of a lease time.
The syntax is:
policy name setLeaseTime valueThe lease time is the value of the dhcp-lease-time option. You should specify the time in seconds.
A policy contains two lease times: the lease time and the server lease time.
The remote-dns command allows you to control the behavior of the DNS server when it is communicating with other DNS servers. You can use it to either control incremental transfer or to send multiple records per TCP packet.
The syntax is:
remote-dns create addr[/maskbits] [prop=value]Table 2-25 lists and describes the remote-dns properties.
| Property | Description |
|---|---|
The address of the server or network to which this information applies. | |
The number of bits in the addr attribute that are significant. |
For example, to create the remote server description 128.103.1.1 with the net mask of 255.255.255.255, type:
nrcmd> remote-dns create 128.103.1.1/16
Note that each net mask octet is composed of 8 bits. In the example above the first two octets are significant, thus the netmask is 16. If just the first three octets were significant, the net mask would be 24, etc.
You can enable, disable, or determine whether the feature has been set. You use the enable, disable, or get commands.
remote-dns name disable feature remote-dns name enable feature remote-dns name get feature
Table 2-26 lists and describes the remote DNS server description features.
| Feature | Description |
|---|---|
Optional, default false. Indicates whether or not a foreign server supports incremental transfer and should be queried for incremental (IXFR) before full (AXFR) when asking for zone transfers. Although unwittingly setting this to true is generally harmless, doing so may result in additional transactions to accomplish a zone transfer. | |
Optional, default false. Indicates whether or not a remote server can be sent zone transfers (AXFR) with multiple records in one TCP packet. Older DNS servers will crash when receiving such transfers, despite being allowed by the protocol. |
For example, when you enable or disable incremental transfer, Network Registrar looks for the most specific match, that is, it matches the machine with the longest mask. You can use this feature to specify a group of servers with a single command.
To enable all DNS servers on this network to perform incremental transfer, type:
nrcmd> remote-dns create 128.103.1.0/16 ixfr=true
To disable all DNS servers 128.103.1.1/32 from performing incremental transfers, type:
nrcmd> remote-dns create 128.103.1.1/32 ixfr=false
Note that a netmask of 32 is equivalent to no netmask.
The report command allows you to produce a summary of dynamic and static IP address utilization for one or more clusters.
The syntax is:
report [config=config file][column-separator=character string] [dhcp-only][file=output file][mask-bits=value]Table 2-27 lists and describes the report properties.
| Property | Description |
|---|---|
Specifies the character string you want used between the columns in the report. The default is a single space. If you specify whitespace, you must escape it with a backslash (\) and if it is entered on the command line, use quotes. For example, =,\ or =",\" | |
A file that allows you to specify multiple clusters. | |
Specifies a summary of just the DHCP information. | |
Specifies the file name to which the report command writes the output. If you do not specify a file name, the report command writes to standard out. Note that, since it can take a long time to collect DNS data, you should not run the report command interactively when requesting DNS summaries. | |
Specifies the number of high-order bits set in the network mask that define a logical subnet for which the report command produces a summary. The default value is 16. If the value of the mask-bits is less than the default or less than the largest mask of any scope's mask in the report, the report command uses the default value. |
For example, to create a report of static DNS addresses and dynamic DHCP addresses, type:
nrcmd> report
To create a report of only DHCP scopes, type:
nrcmd> report dhcp-only
You can specify clusters in several ways:
# Cluster information for summary reports [report] # Clustername Username Password clusters=host1 admin passwd1,host2 admin,host3,host3 admin2 passwd2
Note that you should separate the three cluster arguments with spaces. For long lines you can use continuation lines, that is, you do not need to use continuation escape indicators.
You can optionally specify a user name and password for the cluster. If you do not provide a user name or password for a particular cluster, Network Registrar uses the last user name or password listed. If you do not provide user names or passwords, Network Registrar uses the information from the command line -N and -P arguments, and then the NT Registry or environment variables AIC_NAME and AIC_PASSWORD.
If Network Registrar cannot find a user name or password or the supplied user name and password are incorrect, the report command prompts you for the information.
The report command displays a row of information for each subnet specified by scope or deduced from DNS static address assignments outside of scopes.
The report command displays subtotal rows when more than one scope shares a common subnet, and for addresses that share a common subnet as specified by their address and mask. Note that the report commands assumes that there is no overlap between static addresses and scope ranges.
For each scope or subnet, the report command displays the following information:
For each scope-specified subnet, the report command also displays the following values:
Addresses have both a current state and a pending state after their lease expires.The categories leased and unavailable represent current states. The categories dynamically leased, reserved, and deactivated may represent current or pending states. The category free represents the current state available minus addresses flagged reserved or deactivated. Note that, the leased category overlaps other categories and is not incorporated in the scope total.
For each subtotal row, the report command provides summaries of any scope values in the subnet, and additionally, displays the following values:
The rows and columns in Table 2-28 represent potential states and flags that an address within a DHCP scope can possess. The cells within the table indicate the category into which Network Registrar places addresses with a given state and flag. When multiple flags are set, deactivated takes priority over reserved, and reserved takes priority over any remaining flags for reporting purposes.
| Flags | None | Reserved | Deactivated | Reserved and Deactivated |
|---|---|---|---|---|
State |
| reserved | deactivated | reserved and deactivated |
available | free | reserved | deactivated | deactivated |
offered | dynamically leased leased | dynamically leased leased | deactivated leased | deactivated leased |
leased | dynamically leased leased | dynamically leased leased | deactivated leased | deactivated leased |
expired | dynamically leased leased | dynamically leased leased | deactivated leased | deactivated leased |
unavailable | unavailable | unavailable | unavailable | unavailable |
The save command allows you to validate and save your changes to the database.
The syntax is:
saveThe nrcmd command performs validation when you create objects or modify their properties. It checks that you have supplied the required properties and that their values are valid. It also checks the validity of property values when you set them.
When you issue the save command, Network Registrar performs three levels of validation:
All nrcmd commands return a status code as the first line of output. The status codes are affected by SMTP and other line-oriented protocols. The first word on the line is a three-digit status code, and the remaining output is the descriptive text. The first digit of the status code determines the class of the status.
Table 2-29 lists and describes the save command error codes.
| Error Code | Description |
|---|---|
Indicates a successful save. | |
Indicates an error in processing the command. | |
Indicates an error in communicating with the cluster database server. | |
Indicates an internal error in the command. |
For more information about error codes, see "Error Codes."
The scope command allows you to create and edit DHCP scopes.
The syntax is:
scope name create addr mask [prop=value]For example, to create a scope, type:
nrcmd> scope testScope create 192.168.1.0 255.255.255.0
Note that you need to specify the scope mask in the base of 10 (such as 255.255.255.0), not in hexadecimal.
To delete a scope, type:
nrcmd> scope testScope delete
To list scopes, type:
nrcmd> scope list
The scope command allows you to enable, disable, or determine whether the feature has been set. You use the enable, disable, or get commands. Note that the get command displays the value of the feature.
The syntax is:
scope name disable featureTable 2-30 lists and describes the scope features.
| Feature | Description |
|---|---|
Optional, default disabled. Controls whether the server accepts BOOTP requests. If you want clients to always receive the same addresses, you need to reserve IP addresses for all your BOOTP clients. For information about how to reserve address, see the "Scope Reservations" section. | |
Optional, default enabled. Controls whether the DHCP server will accept DHCP requests for this scope. You would only disable DHCP for a scope to cause the scope to be used for BOOTP exclusively, or to temporarily deactivate a scope. | |
Optional, default disabled. Controls whether the server will accept dynamic BOOTP requests for this scope. Dynamic BOOTP requests are BOOTP requests that do not match a reservation, but can be satisfied from the available lease pool. To use this feature, you must also enable BOOTP. | |
Optional, default disabled. Controls whether the DHCP server should attempt to update a DNS server with the name and address information from leases that are granted to requesting clients. | |
Optional, default disabled. Controls whether the server should attempt to ping an address. | |
Optional, default <none>. Controls whether to allow existing clients to re-acquire their leases, but not to offer any leases to new clients. Note that a renew-only scope will not change the client associated with any of its leases, other than to allow a client currently using an available IP address to continue to use it. | |
Optional, default disabled. Controls whether the DHCP server automatically creates DNS host names for DHCP clients who do not provide names. The server can synthesize unique names for clients based on the synthetic-name-stem property. | |
Optional, default disabled. Controls whether the DHCP server is updated before the lease is granted. |
For example, to enable dynamic DNS update, type:
nrcmd> scope testScope enable dynamic-dns
To disable dynamic BOOTP, type:
nrcmd> scope testScope disable dynamic-bootp
You can use the set and get commands to assign and retrieve values from the scope's properties.
The syntax is:
scope name get prop=valueTable 2-31 lists and describes the scope properties.
| Property | Description |
|---|---|
Optional, default <none>. The address of the subnet for which this scope contains addresses. (Read-only) | |
Optional, default <none>. A scope that does not extend leases to clients. It treats all of the addresses in its ranges as if they were individually deactivated. | |
Optional, default <none>. The address of the reverse DNS server for the zone into which the server should add PTR records. | |
Optional, default <none>. The name of the inverse (in.addr.arpa) zone that is updated with PTR and TXT records. | |
Optional, default <none>. The IP address of the primary DNS server on which the forward zone resides. | |
Optional, default <none>. The name of the DNS zone to which a DHCP client's host name should be added (A record). | |
Optional, default <none>. The mask associated with the scope's network address. (Read-only) | |
Optional, default <none>. The number of milliseconds the DHCP server should wait for ping responses. If you make this value too large, you will slow down the lease offering processes. If you make this value too small, you will reduce the effectiveness of pinging addresses before offering them. | |
Optional, default <none>. The name of the policy associated with this scope. | |
Optional, default <none>. The IP address of the primary scope for this (secondary) scope. | |
Optional, default <none>. The subnet mask of this scope's primary scope (if this is a secondary scope). | |
Optional, default <none>. The primary scope for this (secondary) scope. Use the distinguished name none to indicate no primary scope. You need to specify a primary scope if you have multiple logical subnets on the same physical network segment, and if you allow DHCP to offer addresses from any of the subnets. | |
Optional, default <none>. The list of selection criteria associated with a scope. The scope compares a client's selection criteria to this list in order to determine whether the client can obtain a lease from the scope. | |
Optional, default <none>. The prefix of the default host name to use if clients do not supply host names. | |
Optional, default enabled. If the server is replying to a BOOTP request, and is offering a lease from a scope that is configured to perform DNS updates, it will check this property before beginning the DNS update. This property allows you to prevent DNS updates for BOOTP clients, while allowing updates for DHCP clients. |
For example, to set the name of the reverse zone, type:
nrcmd> scope testScope set dns-reverse-zone-name=10.in-addr.arpa.
To get the DNS zone name, type:
nrcmd> scope testScope get dns-zone-name
The scope method commands allow you to add, remove, show, and list ranges and reservations.
You can specify the start and end values as host numbers or IP addresses. Note that the start and end values must fall within the network addresses as defined by the scope's addr and the network mask attributes.
The syntax is:
scope name addRange start endTable 2-32 lists and describes the scope range methods.
| Method | Description |
|---|---|
Adds a range of addresses to the named scope. | |
Lists the leases in the named scope. | |
Lists the available addresses in the named scope. | |
Removes the range of available addresses in the named scope. |
For example, to add a range, type:
nrcmd> scope testScope addRange 192.168.1.10 192.168.1.20
To delete a range, type:
nrcmd> scope testScope removeRange 192.168.1.10 192.168.1.15
The scope command, with the name argument allows you to add, delete, or list the reservations on the named scope.
The syntax is:
scope name addReservation ipaddr macaddrTable 2-33 lists and describes the scope reservation methods.
| Method | Description |
|---|---|
Adds the reservation to the named scope. | |
Lists the reservations in the named scope. | |
Deletes a reservation from the named scope. |
For example, to add a reservation, type:
nrcmd> scope testScope AddReservation 192.168.1.10 1,6,00:a0:24:2e:9c:20
To remove a reservation, type the following, specifying either the client's MAC or IP address:
nrcmd> scope testScope removeReservation 192.168.1.10
The scope-selection-tag command allows you to define tags that are added to the scope selection tag list. After you have defined scope selection tags you can associate them with scopes, clients, and client-classes.
The syntax is:
scope-selection-tag name createFor example, to create the scope selection tag internal, type:
nrcmd> scope-selection-tag internal create
To delete the scope selection tag internal, type:
nrcmd> scope-selection-tag internal delete
To list the scope selection tags, type:
nrcmd> scope-selection-tag list
Network Registrar limits you to a total of 30 scope selection tags. When the DHCP server configures itself, it checks the number of scope selection tags defined for any network. A network in this context is the aggregation of all of the scopes that are related to a particular subnet. This includes all of the scopes that belong together (because they share a common network number and subnet mask) and all of the scopes that are related to one of these through the use of the primary scope reference. Thus, within all of the scopes that make up a network, there can be no more than 30 scope selection tags.
When the DHCP server reads a client entry (from the local database or from LDAP), the server checks its scope selection inclusion and exclusion criteria against the scope selection tags defined for the scopes on this network. If the client entry references tags that are not present in any scope in the network, then how the server handles the tags depends on whether the reference is to included or excluded tags. If the reference is for excluded tags, then the tag will have no effect. If the reference is for included tags, then the server determines that there is no acceptable scope on that network for this client.
The server command allows you to affect the behavior of the server. After you have used the server command or any other time you have changed the server's configuration, you need to reload the server. You can use the server command or the Network Registrar GUI to reload the server.
The syntax is:
server [DNS | DHCP] cmdTable 2-34 lists and describes the arguments to the server commands.
| Argument | Description |
|---|---|
Causes the specified server to be stopped and then immediately restarted. When the server restarts it re-reads all of its configuration information and its previously saved state information and then begins operating. | |
Starts the specified server, either DNS or DHCP. | |
Stops the specified server, either DNS or DHCP. | |
Gets the specified server's current health. | |
Gets the specified server's current statistics. | |
Sets the debugging level and the location of the debug messages. You can specify either MLOG or WINDOW as locations. The default location is MLOG. | |
Turns off debugging output. |
For example, to stop the DNS server, type:
nrcmd> server DNS stop
To start the DHCP server, type:
nrcmd> server DHCP start
To display the health of the DHCP server, type:
nrcmd> server DHCP getHealth
The server features allow you to enable or disable a feature. You use the enable or disable commands to affect the following feature.
The syntax is:
server [DNS | DHCP] enable featureTable 2-35 lists and describes the server argument.
| Argument | Description |
|---|---|
Controls whether the server is started by the AIC server agent when you reboot. You might want to disable this feature for clusters that want to provide a single protocol service. By default, both the DNS and DHCP servers are enabled. |
For example, to disable the DNS server from automatically restarting on reboot, type:
nrcmd> server DNS disable start-on-reboot
Table 2-36 lists and describes the server properties.
| Property | Description |
|---|---|
The version string for the server. This property is useful when describing version information to Technical Support. |
The session command allows you to set session control parameters on your nrcmd command session. You can control the visibility level that determines which properties are displayed, and the default output format.
The syntax is:
session set prop=valueTable 2-37 lists and describes the session command arguments.
| Property | Description |
|---|---|
An enumerated string that can have the following values: | |
script---show objects in script-suitable format, that is, one attribute per line. | |
user---show objects in a user-readable format, that is, one object per line. | |
The name of the current cluster. This is a read-only property. | |
The name of the current user. This is a read-only property. | |
Controls which properties are displayed. The default visibility is 5. |
For example, to set the output so that it is suitable for script processing, type:
nrcmd> session set default-format=script
The zone command allows you to create and edit DNS zones.
The syntax is:
zone name create primary file=BINDfileFor example, to create a zone, type:
nrcmd> zone QuickExample.com create primary file=host.local
To create both an SOA record with values (ns.test.org. andy.test.org.) and an NS record with value ns.test.org, type:
nrcmd> zone test.org create primary ns andy
Both of these records will have the name of the zone ("test.org." or "@"). Since the name ns.test.org. is within the test.org. zone, you will have to provide an A record for ns.test.org:
nrcmd> zone test.org. addRR ns A 24.10.2.2
You can enable, disable, or determine the feature that has been set with the enable, disable, or show commands.
The syntax is:
zone name disable featureTable 2-38 lists and describes the zone features.
| Feature | Description |
|---|---|
Required, default enabled. (Primary server only) Enables or disables RFC 2136 dynamic updates to the zone. The most typical source of these updates is a DHCP server. | |
Required, default disabled. Restricts zone transfers to a specific set of hosts. If you restrict zone transfers, you need to use the restricted-set property to list the servers that are allowed to perform zone transfers. | |
Optional, default <none>. Applies to secondary zones only. Enables requesting incremental transfer for this zone. When set, (to either to true or false) it overrides the global ixfr-enable value for this zone. | |
Optional, default <none>. Enables the notification of other authoritative servers when this zone changes. When set, (to either true or false) it overrides the global notify value for this zone. |
Using the server global value (not setting this value per-zone) gives you an easy way of globally turning IXFR on or off, or setting a general policy for your zones and specific exceptions to the server global value.
You can use the set and get commands to assign and retrieve values from the zone's properties. These properties depend on the type of zone that you are creating.
The syntax is:
zone name set prop=value [prop=value ...]Table 2-39 lists and describes the zone properties.
| Property | Description |
|---|---|
(Secondary-only). The list of servers from which Network Registrar will transfer data for this zone. | |
The set of IP addresses from which dynamic updates will be accepted, when you have enabled the dynamic feature. The nrcmd command treats addresses with zeroes in the least significant octets as network numbers, with implicit masks in octet multiples. | |
Optional, default: 604800. The expire interval, in seconds, of the zone. The length of time a secondary can continue to serve zone data without confirmation that it is still current. Validation: refresh < x < 2147483647 | |
Optional, default: 86400.The mimimum TTL value to expose in resource records for this zone. Records with lower TTL values will be published with this value. Validation: 0 <= x <= 2147483647 | |
An optional list of additional servers to notify when this zone changes. All servers listed in NS records for the zone with the exception of the server described by the ns property of the zone (the mname field of the SOA record) will receive notifications. Servers listed in the notify-set will also be notified. | |
Required, default: <none>.The fully-qualified domain name of the primary for this zone. This host is the original or primary source of data for this zone. | |
Required, default: <none>. A domain name which specifies the mailbox of the person responsible for this zone. The first label is a user or mail alias, the rest of the labels are a mail destination. A mailbox of hostmaster@test.com would be represented as hostmaster.test.com. | |
Optional, default: 10800. The refresh interval, in seconds, of the zone. Used by secondaries as the period of polling for zone changes. Validation: 1 <= x <= 2147483647 | |
The set of IP addresses that may request zone transfers when you have enabled the restrict-xfer feature. | |
Optional, default: 3600. The retry interval, in seconds, of the zone. Used by secondaries as the period of retrying when polling for changes, or attempting zone transfer after encountering errors. Validation: < (expire - refresh) | |
Optional, default: 1. The current serial number of the zone. Maintained automatically by the DNS server. Validation: 0 <= x <= 4294967295 |
You use the following commands to add, remove, and list the hosts for the zone.
The syntax is:
zone name addHost name addr [alias]Table 2-40 lists and describes the host properties.
| Property | Description |
|---|---|
name | The host's domain name. |
addr | The list of addresses assigned to the host. |
aliases | An optional list of alias domain names for this host. |
For example, to add a host to the QuickExample zone, type:
nrcmd> zone QuickExample.com addHost bethpc 192.168.1.10
You use the following commands to add, remove, and list the resource records in the zone or to delete a zone's unused or obsolete resource records.
The syntax is:
zone name addRR name [ttl] [class] type dataTable 2-41 lists and describes the resource record properties.
| Property | Description |
|---|---|
The resource record's domain name (owner name). | |
The type of resource record, such as PTR or A. | |
The class of resource record, which is always IN (for Internet) in DNS. | |
The resource record time to live (in seconds). The length of time the record the client may cache the resource record. |
For example, to add a name server resource record, type:
nrcmd> zone QuickExample.com addRR green ns green.QuickExample.com
Note that you can specify the name as either the relative name (if the server is within the same domain), as an absolute name (by supplying the fully qualified domain name), or the same name as the zone name (by using the @ symbol).
To delete a zone's unused or obsolete resource records, type:
nrcmd> zone QuickExample.com cleanRR
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Thu Jul 13 11:40:48 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.