Professional Documents
Culture Documents
Exceed PDF
Exceed PDF
Users Guide
8370-2M
Contents
iv
Contents
vi
Contents
vii
viii
269
Chapter 1
Introducing Exceed
About Exceed
Exceed Applications
Exceed Tools
3
4
6
6
6
6
Accessibility
Microsoft Accessibility Options
7
8
8
8
9
10
About Exceed
Exceed lets you access applications on UNIX workstations from existing
Windows 2000, Windows NT, Windows 95/98/Me, and Windows 3.x-based
personal computers. It lets you run and display UNIX, Linux, VMS, or X
Windows applications (X clients) and integrates your desktop with X
Window Systems, IBM mainframes, and the Internet.
Exceed includes innovative features that accelerate performance, simplify
system administration, optimize personal computing, and delivers ease of
use. Users are shielded from the complexities of network computing by
working within the familiar Microsoft Windows environment. Exceed is an
integrated part of the Hummingbird Host Access Solutions product family
which provide organizations with a comprehensive Host Access and
Network Connectivity solution.
For an overview of the
applications available in
Exceed, see Exceed
Applications on page 4.
By using Exceed to run remote applications on your local PC, you can:
For system administrators, Exceed provides tools to set up, configure and
administer PCs remotely to ensure consistency among systems.
Transport software
Your PC
Applications
Displays X Window
applications on the
Exceed X server
Exceed Applications
The Exceed software package includes various applications and sub-folders,
each of which serve a distinct function. The folders are listed by function
throughout the manual. The applications are listed and briefly described
below.
Exceed Tools
The following tools are shipped with Exceed, and are located in the Tools
folder:
HWM This tool is Hummingbirds local Motif-like window manager. It is
a local X client that provides you with a graphical interface that you can use
to start and exit clients, and position and iconize the windows on your
display. For more information, see Starting HWM or MWM on page 85
or the Exceed Help.
Transport Monitor This tool lets you monitor the status of current
connections and the total number of open connections. It also indicates
whether your transport is operating successfully. For more information, see
the Exceed Help.
Xdis The X disassembler is a diagnostic tool that lets advanced Exceed
users and system administrators view Exceed trace files. It is a Java
component and requires the Java Virtual Machine. For more information,
see the Exceed Help.
MWM and KINPUT2 tools are shipped with Exceed XDK. For more
information, see the Exceed X Development Kit Users Guide.
Exceed 3D
This application lets you display OpenGL-based X applications, and lets you
create OpenGL X applications with Exceed XDK. OpenGL is a 3D graphics
software interface that lets you create interactive programs that produce still
or animated 3D color objects, including shading, lighting, and other effects.
Accessibility
Hummingbird products are accessible to all users. Wherever possible, our
software was developed using Microsoft Windows interface standards and
contains a comprehensive set of accessibility features.
Keyboard shortcuts All menus have an associated keyboard shortcut. To
access any menu, press Alt and the underlined letter in the menu name as it
appears on the interface. For example, to access the File menu in any
Hummingbird application, press Alt+F.
Once you have opened a menu, you can access a menu item by pressing the
underlined letter in the menu item name, or you can use the arrow keys to
navigate the menu list. For menu items with an associated keyboard
shortcut, the shortcut is listed on the menu to the right of the item.
Directional arrows Use the directional arrows on the keyboard to
navigate through menu items or to scroll vertically and horizontally. You
can also use the directional arrows to navigate through multiple options.
For example, if you have a series of radio buttons, you can use the arrow
keys to navigate the possible selections.
Tab key sequence To navigate through a dialog box, press the Tab key.
Selected items appear with a dotted border. You can also press Shift+Tab to
go back to a previous selection within the dialog box.
Spacebar Press the Spacebar to toggle check boxes on and off or to select
buttons in a dialog box.
Esc Press the Esc key to close a dialog box without implementing any new
settings.
Enter Press the Enter key to select the highlighted item or to close a dialog
box with the new settings. You can also press the Enter key to close all About
boxes.
ToolTips ToolTips appear for all functional icons. This feature lets users
use Screen Reviewers to make interface information available through
synthesized speech or through a refreshable Braille display.
On the Setup tab, select the Accessibility Options check box and click
Apply.
Click OK.
Documentation Resources
Your product documentation set consists of both print and online sources.
Manuals Hummingbird manuals contain conceptual information on
your product; procedural information on installing and using the product
and related applications; and some manuals contain programming
reference, interface reference, and troubleshooting information.
All manuals are available in print and online. The online versions require
Adobe Acrobat Reader 5.0 and are installed only if you do a Complete
installation. Your Hummingbird product comes with the following manuals:
Exceed User's Guide
HostExplorer (Host Access) Users Guide
HostExplorer Programmers Guide (in .pdf format only)
Hummingbird Basic Language Programmer's Guide
Online Help The online Help is a comprehensive, context-sensitive
collection of information regarding your Hummingbird product. It
contains conceptual and reference information, and detailed, step-by-step
procedures to assist you in completing your tasks.
Release Notes The release notes for each product contain descriptions of
the new features and details on release-time issues. They are available in
both print and HTML. The HTML version is automatically installed when
you install the software. Read the release notes before installing your
product.
Technical Support
You can contact the Hummingbird Technical Support department Monday
to Friday between 8:00 a.m. and 8:00 p.m. Eastern Time.
Hummingbird Ltd.
1 Sparks Avenue, North York, Ontario, Canada M2H 2W1
Canada and the USA
Technical Support:
International
1-800-486-0095
General Enquiry:
1-877-FLY-HUMM
Main:
+1-416-496-2200
Fax:
+1-416-496-2207
+1-416-496-2200
Hummingbird Ltd.
1 Sparks Avenue, North York, Ontario, Canada M2H 2W1
E-mail:
FTP:
Online Request Form:
Web Site:
support@hummingbird.com
ftp.hummingbird.com
www.hummingbird.com/support/nc/request.html
www.hummingbird.com/about/contact.html
In the Subscribe section, type your full name, e-mail address, and
language preference. Then click Subscribe.
Note: To discontinue your subscription, in the Unsubscribe
section, type your e-mail address then click Unsubscribe.
2
10
On the User Groups and Mailing Lists page, click a product link.
In the Online Subscriptions section, type the name you want to display
on the User Group and your e-mail address.
Click Subscribe. The browser opens a confirmation page to tell you your
subscription was successful. You can now post messages to the User
group. See posting instructions in Joining a User Group below.
Note: To discontinue your subscription, in the Online
Unsubscriptions section, type your e-mail address then click
Unsubscribe.
11
Chapter 2
Installing Exceed
Overview
Windows Installer Technology
Hummingbird Setup Wizard
Multi-Language Support
15
15
17
19
Preparing to Install
Installation Requirements
Choosing a Setup Type
Installation Directories
Installed Files
20
21
23
24
25
27
27
30
35
36
40
40
42
42
43
45
47
48
48
49
49
Registering
50
Overview
The Hummingbird Setup Wizard (beginning with version 7.0) supports
Windows Installer technology. Setup Wizard is based on three standard,
top-level user interfaces or modes: installation, administration, and
advertisement. Each defines a different installation path and user interface
flow.
The following sections in this chapter provide:
Windows Installer changes the registered file type of .msi files so that
double-clicking the file runs Msiexec.exe with the .msi file. Each .msi
package file contains a relational database that stores instructions and data
required to install (and uninstall) the program.
Note: Double-clicking an .msi file that requires language
translation produces an error message (Error 2803). Instead, run
Hummingbird Setup Wizard (setup.exe) and select the
appropriate setup language in the user interface.
The installer eliminates the need to run a setup engine on each target
computer. Since installations are run through this common engine, the
operating system can keep track of installation databases.
The key benefits of this technology are:
easy customization
16
Products
A product represents a single Hummingbird product such as Exceed, NFS
Maestro, or HostExplorer. Products consist of one or more features. Each
product is described to the Windows Installer service in the form of a single
package file (.msi) or installation database.
17
Products do not own any resources directly, but they do have globallyunique identifiers known as Product Codes. These enable the service to
identify applications that are clients of a given component. Windows
Installer service maintains a list of client products for each component.
Product Codes let the service determine if a given product is already
installed on a particular computer.
Features
Features are the individual pieces of an application that you can choose to
install. Typically, they represent the functional features of an application.
When you select Custom in the Setup Wizard program, the interface
provides you with a tree that is composed of features (and sub-features). An
example of a feature is X Server or Traceroute.
Components
A component is the smallest and most fundamental of the three logical
building blocks. A component is a collection of files, registry keys, and other
resources that are all installed or uninstalled together. When a given
component is selected for installation or removal, all of the resources in that
component are either installed or removed.
Components are invisible to the user; Hummingbird Setup Wizard manages
whatever components make up a given Hummingbird application.
Examples of components include single files, a group of related files, COM
objects, registration, registry keys, shortcuts, resources, libraries grouped
into a directory, or shared pieces of code.
18
Multi-Language Support
Hummingbird Setup Wizard can perform installation for the following
languages:
Language
Transform File
German
1031.mst
English1
1033.mst
Spanish
1034.mst
French
1036.mst
Italian
1040.mst
Portuguese
2070.mst
where path is the path to the .msi file, and filename.mst is the appropriate
transform file listed in the table above. For example, the following applies
an English transformation to Exceed:
msiexec /i Hummingbird Exceed.msi TRANSFORMS=1033.mst
19
Support Language(s)
Exceed
Exceed 3D
Exceed XDK
Exceed PowerSuite
Hummingbird Connectivity Security Pack
HostExplorer
HostExplorer Deployment Wizard
NFS Maestro Client
NFS Maestro Server
NFS Maestro Solo
NFS Maestro Gateway
Hummingbird Inetd
English only
Preparing to Install
System and shared files currently in use cannot be updated. Close all
applications before proceeding with the installation.
Note: Before installing on Windows NT/2000, it is recommended
that you log on with Administrator authority. You also require write
access to the Windows system directory and registry. If necessary,
consult your system administrator.
20
Installation Requirements
You can preserve user
profiles from version 6.2 of
Hummingbird products.
For more information, see
Preserving User Profiles
on page 48.
Exceed 3D
Operating
System
Disk
Space1
Other Requirements
Windows 95
Windows 98
Windows Me
78 MB
219 MB
6 MB
Windows NT2
(service pack 4
or later)
Windows 20002
21
Product
Operating
System
Exceed PowerSuite
Disk
Space1
96
Other Requirements
Winsock compliant TCP/IP
An assigned IP address
and the ability to
communicate with other
computers on the network
(Windows NT)
A HOSTS file if a domain
name server is not
available (Windows
95/98). See the operating
system documentation for
details.
1
2
Approximate free hard disk space required for a Complete installation of all
program features.
Administrator privileges are required to install some portions of the product.
Exceed (Tools)Xdis
Hummingbird Master Setup lets you install third party add-on(s) such as:
22
Function
Recommended for:
More information:
standard features
new users
see Typical on
page 30
advanced users
and system
administrators
see Custom on
page 33
no feature or
feature directory
changes
Custom
users with
restricted disk
space
Complete
everything is
installed in default
directories
see Complete on
page 34
Note: All setup types allow you to change the destination folder
(also known as the root home directory). However, this change
affects all feature directories.
Hummingbird Sconfig
Sconfig is an advanced system administration tool that lets administrators
customize the Setup Wizard program. For more information, see the
System AdministrationSconfig and Jconfig chapter in this manual.
23
Installation Directories
Hummingbird Setup Wizard installs program-specific and user-specific
files to the directories described below.
Installation
Description
Location/Type
Destination
folder
C:\Program Files\
Hummingbird\Connectivity\
Version\
However, you can specify a
different directory.
User
directory
Current user:
<Application Data>\Hummingbird\Connectivity\Version
All users:
<Common Application Data>\Hummingbird\Connectivity\Version
Setup Wizard supports the Uniform Naming Convention (UNC) so you can
begin path specifications with \\ in place of the disk drive to specify a
shared directory on a file server. For example:
\\machine_specification\share_name
24
Installed Files
User files for Hummingbird connectivity products fall into two categories:
per-machine
Per-machine files are those application or service files that, when changed,
affect all users of the computer. An example is the inetd.ini file. If you
change inetd.ini to stop the Telnet daemon from running, then regardless
of which user is logged onto the computer, the Inetd service rejects Telnet
connections.
Per-user files are all application or service files that, when changed, affect
only the user who is making the change (that is, the currently logged in
user). An example of a user-specific file is exceed.cfg. If you configure
exceed.cfg with Xconfig to use a certain Display, then other users of the
machine are not affected.
Note: Only the user who installs the product has access to those
user files in the current user directory.
Per-MachineFile Location
Windows
95/98/Me
C:\Windows\System\Hummingbird\Connectivity\<Version>\
Windows
NT 4.0
C:\Winnt\System32\Hummingbird\Connectivity\<Version>\
Windows
2000
25
Windows
95/98/Me
C:\Windows\Application Data
Windows
95/98/Me
(user profiles
enabled)
C:\Windows\Profiles\%USERNAME%\Application Data
Windows NT
4.0
C:\Winnt\Profiles\%USERNAME%\Application Data
Operating
System
Windows
95/98/Me
C:\Windows\Application Data
Windows
C:\Windows\Profiles\All Users\Application Data
95/98/Me (user
profiles
enabled)
Windows NT
4.0
26
Personal Installation
Autorun launches the Hummingbird Master Setup application when you
insert the CD into your drive. If Master Setup does not launch
automatically, run Msetup.exe from the root directory of the CD.
To configure Windows Installer and prepare Setup Wizard:
1
If you are prompted, select a setup language and click OK. English is the
default.
27
Setup Wizard reboots the computer. This is necessary only the first
time Windows Installer is configured and installed on your
Windows 95/98 or Windows NT operating system.
4
28
Read the licensing agreement. If you select the option that indicates the
terms are acceptable, then click Next.
The Destination Folder dialog box opens. Accept the default installation
folder for the product, or click Change to open a dialog box for
browsing to an alternate location. Click Next.
Note: Some product features are not affected by changes to the
destination folder.
The Setup Type dialog box opens. Select a setup type and click Next.
For Typical and Complete setup types, a dialog box opens and
indicates Setup Wizard is ready to begin installation. Click Install.
For Custom setup type, a Custom Setup dialog box opens. Customize
the installed program features and click Next.
A dialog box indicates Setup Wizard is ready to begin installation.
Click Install.
29
Setup Types
The following sections describe options that determine what product
(program) features are installed.
Typical
Complete setup type
includes all the features
listed in the table on
page 31.
30
Selecting this setup type means that standard features are installed to
default destination folders. In contrast to the Complete option, only the
essential features of the product are installed.
Typical setup type usually requires less disk space than the other types. The
following table lists features installed and those not installed with this setup
type:
Features (and Sub-Features)
Accessories
FTP1, 3
Hummingbird Neighborhood2, 3
[FTP for Windows Explorer2, 3,
HostExplorer Profile Type2 (3270,
5250, Telnet)2, PrintExplorer2]
LPQ1
LPR2, 3
WyseTerm1
31
Hummingbird Inetd
Finger Daemon
2, 3
Bootp Daemon2, 3
FTP Daemon2, 3
LP Daemon2, 3
Telnet Daemon2, 3
Time Daemon2, 3
Xstart Daemon2, 3
Online Documentation
System Administration
Hummingbird Update3
Sconfig1
SOCKS Information1
X Development Kit4
GCC Libraries
Motif 1.2 (GCC Libraries)
Motif 2.1 with CTL (GCC Libraries)
Local X Clients Source (Hellomotif, Ico,
Periodic, Xlogo)
X11R5 Local X Clients Runtime
1
2
3
4
32
Custom
This setup type lets you select the program features to install and where to
install them. This setup type is recommended for advanced users and
administrators. When you click Next in the Setup Type dialog box, the
following dialog box opens:
You can view more information about features and perform the following
customization:
33
Click Change to open the Change Current Destination Folder dialog box
and install the feature to a folder other than the default.
Note: For some product features (such as Hummingbird Inetd),
the Change button is disabled and you cannot specify an
installation folder.
Click Space to open a dialog box listing all local drives (logical
partitions) and mapped drives on the machine. It provides detailed
information about available disk space.
Complete
The Complete option
installs all features listed in
the table on page 31.
This setup type requires the most disk space and installs all product features
to the default destination folder:
C:\Program Files\Hummingbird\Connectivity\<Version>\
Click Change to open a browse dialog box and install the program to
another destination directory.
34
In the Welcome dialog box, click Next. The Program Maintenance dialog
box opens.
In the Program Maintenance dialog box, select Modify and click Next.
The Custom Setup dialog box opens. Expand the feature tree and change
the install state, as necessary. Click Next.
35
To repair a program:
1
In the Program Maintenance dialog box, select Repair and click Next.
The Ready to Repair the Program dialog box indicates Setup Wizard is
ready. Click Install to repair errors such as missing or corrupt files,
shortcuts, and registry entries.
To remove a program:
1
In the Program Maintenance dialog box, select Remove and click Next.
The Remove the Program dialog box indicates Setup Wizard is ready.
Click Remove to uninstall the program.
Administrative Installation
Autorun launches the Hummingbird Master Setup application when you
insert the CD into your drive. If Master Setup does not launch
automatically, run Msetup.exe from the root directory of the CD.
Administrative installations let you create a centralized image of the
product. This means that many users can install the product without the
original CD media. There are two types of administrative installations:
36
Exceed
Exceed 3D
Exceed XDK
Exceed PowerSuite
HostExplorer
37
Run Msetup from the product CD. In the Hummingbird Master Setup
application window, you can select options to install third party
add-ons, register online, or view release notes. Otherwise, to run Setup
Wizard, click Install Product, then click Administrative Installation.
Alternatively, from the product directory on the CD, run:
setup /a
38
Select a setup language and click OK. This language will apply to all
installations from the copied image or shared image.
Setup Wizard reboots the computer. This is necessary only the first
time Windows Installer is configured and installed on your
Windows 95, Windows 98, or Windows NT 4.0 operating system.
4
The Network Location dialog box opens. Accept the default installation
folder for the product or click Change to open a dialog box for browsing
to an alternate network location.
Click Next and the Network Location Type dialog box opens. Select a
network location type.
Click Next. The Ready to Install Network Image dialog box opens.
Personal Installations
Administrators, or users who do not have Administrator privileges
(Windows NT/2000), or Any User in Windows 95/98, are able to perform
personal installations for HostExplorer. FTP for Windows Explorer,
Hummingbird Inetd, and Hummingbird NFS Maestro Client Gateway
require Administrator privileges for personal installations in Windows
NT/2000. However, Any User in Windows 95/98 can install these products
or features.
This type of installation
applies to all Windows
platforms, but not
Windows NT 4.0 Server
Terminal Server Edition or
Windows 2000 Advanced
Server with Terminal
Services enabled.
you are installing the product for one user (the current user) on one PC
40
If you are prompted, select a language for the installation. English is the
default.
Note: For certain products, English is the only supported
language. For more information, see the table on page 20. Once
selected, the language applies to all subsequent users installing
Hummingbird products on the computer.
In the Setup Type dialog box, select either Typical, Custom, or Complete.
In the Customer Information dialog box under Install this application for,
select one of the following options:
41
If you are prompted, select a language for the installation. English is the
default.
Note: For certain products, English is the only supported
language. For more information, see the table on page 20. When
selected, the language applies to all subsequent users installing
Hummingbird products on the PC.
Advertised Product
Applies to all Windows
platforms, but not
Windows NT 4.0 Server
Terminal Server Edition or
Windows 2000 Advanced
Server with Terminal
Services enabled.
Windows NT 4.0 requires
Internet Explorer 4.01
(SP1) or greater, and
Windows Desktop Update
(shell32.dll version
4.72.3110.0 or later).
42
Silent Installation
A silent installation runs in the background. This scenario assumes:
43
Launch Setup Wizard from the command line using the following
syntax:
E:\setup /S /V/qn [/lnnnn]
Description
/S
/V/qn
/lnnnn
44
Typical
SilentTypical
SilentComplete
When a package is run through SMS, it prompts you to select one of these
options (scenarios). Use the following command line parameters to apply
modifications or create new package definition files:
Command Line
Parameter
Description
/i
/q
INSTALLLEVEL=150
TRANSFORMS=nnnn.mst
45
Shared Installation
This type of installation
applies to Windows
NT/2000 platforms, but not
Windows NT 4.0 Server
Terminal Server Edition or
Windows 2000 Advanced
Server with Terminal
Services enabled.
If you are prompted, select a language for the installation. English is the
default.
Note: For certain products, English is the only supported
language. For more information, see the table on page 20. Once
selected, the language applies to all subsequent users installing
Hummingbird products on the PC.
46
In the Network Location Type dialog box, select Shared Image. Click Next.
All of the required files are installed to the specified network location.
Workstation Installation
This scenario requires an existing shared image installation. The product is
installed to network workstations from the shared image located on a
network server. Certain features are set to run from this network location.
Note: This type of installation will not start on Windows NT 4.0
Terminal Server Edition.
For details about this part of the procedure, see Personal Installation
beginning at step 3 on page 28.
Note: In the Custom Setup dialog box, the install state of certain
features (and sub-features) are by default set to run from the
network. For workstation installations that are cross-platform (for
example, installing from a shared image on a Windows NT/2000
server to a 95/98 workstation), features that contain platformspecific components are set to run locally on the workstation, not
from the server.
Hummingbird Sconfig
Sconfig (Setup configuration) lets you customize the installation of software
on local and network machines. Use it to customize the folders installed by
Setup Wizard, determine what is installed (as well as limit functionality or
optimize disk space), and simplify user input. For more details, see the
System AdministrationSconfig and Jconfig chapter in this manual.
47
Setup Wizard reports that user files are saved for each product.
Multiple products:
If Setup Wizard does not detect any older product versions, you are
prompted to click one of the following buttons:
Yesto restore the version 6.2 profiles previously saved
48
If necessary, you can modify connection settings for updating the product.
Select WebUpdate Settings in the System Administration folder of the
Hummingbird Connectivity program group. Make the appropriate changes
in the WebUpdate dialog box as required.
Note: The WebUpdate application is not available if you
performed a personal installation without Administrator privileges.
Instead, an HTML file is created that links to a Web site for
Hummingbird updates.
49
Registering
Online registration is available by:
running Msetup from the product CD, then clicking Register Online
50
Chapter 3
Installing on a Terminal Server
Overview
53
53
53
55
58
Overview
This chapter explains how to install and uninstall a Hummingbird product
on Windows NT4 Terminal Server Edition, Windows 2000 Server, and
Advanced Server with Terminal Services enabled.
The following procedure assumes:
From the product directory on the CD, run the following commands
from a command prompt.
For Exceed:
setup /a /vTRANSFORMS=ExceedTSE.mst
53
54
The Network Location dialog box opens. Accept the default installation
folder for the product or click Change to browse to an alternate network
location. A folder with the default name Admin is created on the
terminal server. The Administrative Copy Image will be placed in the
Admin folder.
Note: Each user has private shortcuts, registry entries, and user
files. User files are copied from the Admin folder. Each user must
have at least read access to the Admin folder installation point.
Click Next. The Ready to Install Network Image dialog box opens.
From the command line, change the directory to C:/Admin and run
setup.exe
where C:\Admin is the name of the drive and folder where the
Administrative Copy Image is located.
Note: The Admin folder and its contents must remain available
during the lifetime of Exceed on the terminal server. Multiple
terminal servers can share the same Admin folder.
55
Click OK.
Read the Licensing Agreement. If you select the option that indicates
the terms are acceptable, then click Next.
Note: Failure to read or understand the License Agreement does
not affect the terms and conditions of the agreement.
Destination Folder is
synonymous with home
directory (the directory in
which the product is
installed).
56
The Destination Folder dialog box opens. Accept the default installation
folder for the product or click Change to browse to an alternate location.
Click Next.
Note: Some product features are not affected by changes to the
destination folder.
The Setup Type dialog box opens. Select a setup type and click Next.
For Typical and Complete setup types, a dialog box opens and
indicates Setup Wizard is ready to begin installation. Click Install.
For Custom setup type, a Custom Setup dialog box opens. Customize
the installed program features and click Next.
A dialog box indicates Setup Wizard is ready to begin installation.
Click Install.
Note: The Hummingbird product installed on each users profile
will use the setup type that the administrator chooses in the Setup
Type dialog box.
57
58
You are not planning to install Exceed, Exceed 3D, Exceed XDK, Exceed
PowerSuite, or HostExplorer again.
The Terminal Server personal installation has been uninstalled using
the Add/Remove Programs options. After this uninstallation, when a
user logs on, customized settings and user files are automatically
uninstalled from his/her user profile. Only after this process is complete
can you disable UsrSetup and remove the UsrSetup file.
Note: Disabling UsrSetup is an optional procedure.
If the above conditions have been met, you can disable UsrSetup.
To disable UsrSetup:
1
From the Terminal Server command line, run the following command:
%WINDIR%\System32\Hummingbird\Connectivity\UsrSetup /unregserver
59
Chapter 4
Connecting to Hosts and Running X
Clients
Connecting to Hosts
Using the Client Wizard
Creating a Startup File
Browsing for Hosts and Applications
Load optimization
Creating an Xstart Shortcut
Running the Xstart File
Creating a Wstart File
63
63
64
68
71
75
76
78
79
79
Window Modes
Configuring the Window Mode
80
81
84
85
85
87
87
88
89
91
92
Connecting to Hosts
You can connect to a host using a wizard or by creating startup files with
Xstart or Wstart.
In the Login panel, enter the login information you want to display each
time this connection is made. You can leave the Password box blank, but
not the User ID box.
63
In the Login panel, test the connection. To do this, select Show Host
Replies and click Run. When you are satisfied with the connection, click
Next.
In the Shortcut panel, you can create a shortcut to the application, and
its name and location. To do this, complete the following information:
Type the name of the shortcut and select the option immediately
below this box.
64
Create a shortcut.
The following sub-sections provide more details about the Xstart window.
Start Method
Select a method from the Star t Method drop-down list. The start method
that you use depends upon the transport that you are using and the host to
which you want to connect.
RLOGIN is an abbreviation
for remote login.
65
The following table summarizes the start methods supported by each type
of transport:
Start Methods
DECnet
REXEC
IPX/SPX
TCP/IP
RSH
RLOGIN
PCX$SERVER
dterm
hRPS
Program Type
Specify the kind of program you want to start in the Program Type dropdown list: either X Window (for X clients) or Terminal Emulator (for
character-based, host applications in a terminal emulator window).
Selecting Terminal Emulator, opens the Terminal Emulation Settings dialog box.
It lets you select options that control how character-based applications run
in a terminal emulator window. You can also display this dialog box by
clicking Program (if enabled) in the Xstar t window.
Login
For more information, see
Using Login Macros on
page 95 and User ID and
Password Macros on
page 95.
Login lets you specify information required to connect to a host, log on, and
execute a command to start an application. Options that do not apply to the
selected start method are dimmed.
User ID
Password The password on the host to which you want to connect. If you
are unsure whether you typed your password correctly, delete the entire
password and type it again.
66
Host The host to which you want to connect. By default, the most recent
host to which you connected appears at the top of the list in the Host dropdown list.
Host Type
Note: You can edit the Host Type default settings by editing the
stdappdb file, located in the directory where Exceed is installed.
You can type the @d, @a, @:, and @# command macros as shortcuts in the
Command box. The @d macro selects the proper IP address if the machine
has more than one address.
The following table lists typical commands you can type to start the xterm
client on a UNIX host with either a DECnet, IPX/SPX, or TCP/IP transport.
With this
transport
DECnet
IPX/SPX
TCP/IP
67
Description
Type a description of the startup file in this box. When you create a shortcut
for this file, the description appears below the icon. You can type up to 40
characters.
Note: If you do not specify a description, Xstart uses the file
name (without the extension).
To browse for hosts, you must first configure the Browse Hosts feature on
the Method sub-tab. To browse for applications, you must first configure the
Browse Apps feature on the Method sub-tab. These Xstart features are
available in the Other Settings dialog box.
Methods
The following file retrieval methods are common to Browse Hosts and
Browse Apps methods:
68
FileUses the hostsdb.txt file as a source for the host browse and
appdb.txt as a source for the application browse. You can create and
maintain these files. The hostsdb.txt file lists IP addresses and their
associated hosts. The appdb.txt file lists hosts or aliases and
application browse. You can only access a file this way, not edit it. The
source file contains the file structure listed above. To properly configure
the Browse Hosts or Browse Apps tabs using FTP, you must supply a
server name, user name, password, account (if applicable) and path in
the fields provided. In the File box, enter the name and location of the
source file on the FTP server.
source for the host browse and appdb as a source for the application
browse. Before browsing, you must configure NIS Services. The system
administrator on the UNIX side must create these maps.
NIS+ Uses NIS+ maps hosts as a source for the host browse and
appdb as a source for the application browse. Before browsing, you must
69
Options
The Browse Hosts, Options sub-tab contains the following options.:
Browse Type options specify which host types are shown in a host browse.
You can show hosts from a host browse, an application browse, or both of
these. The default is to show only hosts from a host browse.
The Remember browse
information area is
common to the Browse
Apps tab, Options sub-tab.
70
Browse Sor t Order options affect how applications (regardless of source) are
listed. You can sort the list by application and its hosts (the default), or by
host and its applications.
Remember Browse Information indicates whether Exceed remembers (caches)
Load optimization
This feature makes Xstart connections more efficient. Where the original
host is already accommodating many connections, the connection may be
diverted to another host.
71
Methods
To configure Xstart for load optimization, select a Method:
For more information about
rupdb.txt, see Host
List File on page 74.
FileXstart scans the rupdb.txt file for available hosts and tries to run
the application on the least busy host. You can create and maintain this
file, and save it in the User directory. This method is the easiest to run
and is convenient if the desired application resides on every host in
rupdb.txt (such as xterm). If the application runs on certain hosts only
(not necessarily the least busy ones), then this method could fail.
Alternatively, you can use rupdb.txt in conjunction with appdb.txt
(provided you have previously created appdb.txt). In this case, select
Use Apps File in the Options sub-tab. By comparing the two files, Xstart
figures out what subset of hosts in rupdb.txt have the desired
application and selects from those alone.
FTPUses a file on an FTP server as the source available hosts. You can
only access a file this way, not edit it. To properly configure Load
Optimization by FTP, enter the server name, user name, password, and
account (if applicable) in the fields provided. In the File field, enter the
name and location of the source file on the FTP server.
NIS+ Uses an NIS+ map rupdb as the source for available hosts.
limited to queries within your subnet, unless you type an address for
another subnet. If you selected Use Apps File in the Options sub-tab, then
Xstart broadcasts the rup RPC to the subset of hosts in appdb.txt that
run the desired application. If Use Apps File is not selected, then Xstart
broadcasts to all hosts on the subnet. Using this method, you do not
need a rupdb.txt file.
of hosts to check.
72
Options
The following load optimization options are available:
Use Apps file specifies that Xstart uses rupdb.txt in conjunction with
appdb.txt. In the Section name(s) box, type one or more section names
73
boethius
74
Lines beginning with # are comments and are ignored by the system.
If you do not specify a name in the Section name(s) box, the system
inserts the name [Default Section].
If you do not provide a name in the Section name(s) box on the Options
sub-tab (Load Optimization tab), then the system inserts the name
[Default Section] in the rupdb.txt file.
When you add the hosts, type only one host on each line. Host names
may be in short or full form, for example, irix or irix.domain.com.
For example:
[xclock]
onefish
twofish
[xterm]
redfish
bluefish
In this example, the hosts onefish and twofish support the xclock
application; the hosts called redfish and bluefish support the xterm
application. When you specify an application in the section, Xstart queries
only those hosts following each section. This prevents Xstart from
contacting a host that does not run the desired application.
Note: appdb.txt lists hosts that must be running rstatd.
Therefore, the list of hosts in appdb.txt is a subset of the hosts
listed in rupdb.txt, which is itself a subset of the hosts in
hostdb.txt.
75
In the Description drop-down list, select the location where you want to
install the Xstart icon. If you do not specify a location, the icon is
installed in the current program group (that is, the open folder in
Windows Explorer).
In the Files list, select the .xs file you want to install. To browse files in
another directory, click Directory. Use the Select All and Deselect All
buttons, if necessary.
If you want to use an icon other than the default Xstart icon, click
Change Icon. Choose an icon from the displayed icons or click Browse to
locate another graphic file.
When you are satisfied with the information in this dialog, click OK.
The icon installs with your specifications.
If you clicked either the Prompt: Login Info or Prompt: Account Info
option button, you are prompted to specify your login/account info.
Exceed starts. The system retries the connection for the length of time
specified in the Connect Timeout box on the Connection tab.
After you have connected, the command specified in the Command box
is sent to the host specified in the Host box. If the command starts a
client, the client session begins. The initial socket closes after the length
of time specified in the Close Timeout box.
If the Show Host Reply check box in the Connection tab is selected, host
or client messages are displayed in a window. You can copy text from
this window to Clipboard.
76
Description
home
settings.xs
This is the name of the Xstart startup file you want to run. You do
not have to type the .xs extension.
If the file name is preceded by a path, Xstart looks for the file in
that directory. If no path is provided, the location of the Exceed
user directory is assumed.
-m method
-a type
This specifies the program type and can be one of the following:
xwin (for an X Window client) or term (for an application that
does not require X and can be run using a VT terminal
emulator).
-h host
This is the host to which you want to connect. You can type
either the host name or its network address.
-u userid
-p password
-c command
-l
77
Parameter
Description
-l-
This option (minus sign, lowercase L, minus sign) tells Xstart not
to prompt the user for login information.
-t timeout
Wstart starts from the Xsession application. To open Wstart, complete the
following steps:
1
You can also start Wstart from a command line in the Windows Explorer
Run dialog box. The syntax is: home\wstart [settings.ws]
The Wstart parameters are as follows:
78
Parameter
Description
home
settings.ws
An optional Wstart startup file. If you do not specify the path, the
file is assumed to be in the Exceed user directory. If you do not
specify a file extension, the .ws extension is assumed.
When you log into the UNIX host via the CDE display manager using
XDMCP, a handshake implemented by the X protocol is employed. CDE
does not begin unless it detects a supported PC X server (that is, Exceed).
To start CDE:
1
Select a window mode in the Xconfig Window Mode Settings dialog box.
Note: If you select multiple window mode and you are using the
Windows (Native) window manager, verify that the Cascade
Window option is not selected.
Start Exceed.
From the Display Chooser, select a UNIX host. After you make a
selection from the chooser, the greeter opens.
The CDE Session manager starts and the interface is presented on your
PC.
79
KDE and GNOME run on a Linux host and are displayed on the remote PC
using standard X protocol.
Window Modes
A window mode determines the appearance of the X client windows on
your PC. The window mode in which you operate depends upon your own
preference. By default, the Exceed X server operates in multiple window
mode and the window manager is configured to default to native.
To open the Screen dialog
box, double-click Screen
Definition in the Xconfig
window.
80
Multiple window modeEach client you start creates its own new
window on your display. You can use either the Native (Microsoft
Windows) or any X window manager (local or remote) as your window
manager.
Common Options
The following options are common to both single and multiple window
modes.
Panning, Auto Load XRDB,
and Root Size options are
located on the Screen tab
of the Screen dialog box.
Panning Lets you pan to view parts of client windows that are off-screen.
By default, panning is enabled in multiple window mode; in single window
mode, it is disabled. You can specify the following:
SpeedSelect Slow, Medium, or Fast.
AmountSpecify the incremental percentage of the window size in
which panning occurs. You can enter any value between 1 and 100.
Note: In Multiple Window Mode, when you select Panning, do
not select the Fit Window to Display option.
Auto Load XRDB Automatically loads the local resource database named
in the File box each time the Exceed X server restarts or resets. Otherwise,
you have to manually load it by choosing the corresponding command on
the File menu in the Exceed X server. This file name is xrdb.txt by default.
Note: You can find a sample xrdb.txt file in the home\info
directory. To use this file without changing the contents of the
XRDB file box, copy the file to the directory where Exceed is
installed.
81
Root Size Lets you set the size (in pixels) of the server root window. You
can make the root window larger than your screen. The maximum root
window size is 4096 by 4096 pixels. A width or height of zero implies the
root size will be equal to the size of your screen. For certain applications to
run, you may need to make the root size larger than your screen.
The server reset options
and Close Warning on Exit
option are located on the
Common Settings tab of
the Screen dialog box.
Enable Server Reset, Exit On Server Reset Resets the Exceed X server
when the last client connection is closed. This option is enabled by default.
When you enable this option, you can also enable Exit On Server Reset. This
option lets you terminate the Exceed X server when the last client
connection is closed.
Close Warning on Exit Exceed displays a warning message whenever you
close a client window or choose a command that shuts down the server.
This message prompts you to confirm or cancel the action.
82
If you are using an X window manager and want to display the X window
manager menus, select the Root Mouse Actions To X option in the Advanced
Multiple Window Mode Settings dialog box. By selecting this option, you can
click the Windows desktop to access the X window manager menus. Normal
Windows desktop mouse actions do not work when this mode is enabled.
To change it immediately, toggle this option in Xconfig, or click a button on
the server toolbar.
Fit Window To Display Makes the window of any client fit your screen if
the window is larger than the physical screen.
Note: If you enable Panning, do not enable Fit Window to
Display.
Focus Policy Located on the Common Settings tab, this feature determines
how a window is given focus if you are not using an X window manager.
You can select one of the following from the drop-down list:
ClickClick the left mouse button on the window to give it focus.
PointerMove the mouse pointer into the window to give it focus.
83
A width or height of zero implies the root size will be equal to the size of the
client area of a maximized window when the Exceed X server menus appear
on the Control menu (that is with no menu bars or scroll bars). If you make
the root size larger than the client window, you can use the Panning feature
or scroll bars to view any hidden parts of the root.
The root size group box also lets you enable Full Screen. This option sizes the
Exceed X server window to the size of the entire screen. To open the server
menu when you select Full Screen, select Panning . To open the server menu
when you select Full Screen, press the ALT key and then the spacebar. The
ALT key you press depends on your ALT key mapping.
Show Scroll Bars Lets you display scroll bars in the Exceed window.
Scroll bars let you view hidden portions of the server root window when the
Root Size option makes it larger than the workspace.
Save Geometry on Exit Saves the server window geometry (that is, its
window position, size, and state) when you exit Exceed. When you restart
Exceed, the options are restored.
84
HWM and MWM are located in the Exceed Tools folder. To open one of
these window managers, double-click the appropriate icon.
85
Connect to the remote host using any startup method such as Xstart,
Xsession, or Telnet.
Provide your User ID, Password, and any other login information
required.
DEC (UNIX)
[path/]dxwm&
OpenLook
[path/]olwm&
AIX
[path/]aixwm&
DEC (VMS)
[path/]SPAWN/NOWAIT/INPUT=NL RUN
SYS$SYSTEM:DECW$WINMGR <CR>
Motif (VMS)
[path/]SPAWN/NOWAIT/INPUT=NL RUN
SYS$SYSTEM:DECW$MWM <CR>
86
The following sections describe copying and pasting procedures for the
following scenarios:
The X selection an X client uses, and how it is used, depends upon the
client. Most systems use the PRIMARY X selection, but other selections
such as SECONDARY, CLIPBOARD, and CUT_BUFFER0 to
CUT_BUFFER7 are also defined. Some clients can make use of more than
one X selection.
87
For information on
automatic copy and paste,
see page 92.
Start Xconfig.
Double-click X Selection.
In the X Selection dialog box, select the correct buffer type, then click
OK.
You can copy data to Clipboard, a file, or to the printer by using the
methods listed below. If you copy and paste using the Clipboard, you can
use csv and biff formats.
You can paste data from Clipboard or from a file, using the Paste to X
Selection from Clipboard and the Paste to X Selection from File commands on
the server Edit menu.
Copying
Copy Rectangle to Copies a selected rectangle of the active X client
window (multiple window mode) or the Exceed X server root window
(single window mode). After you choose Copy Rectangle to, the cursor
changes to a camera icon. To define an area to copy, click anywhere within
the window and drag the mouse to define a rectangle. When you release the
mouse button, the Exceed X server copies the selected rectangle to the
destination specified by the selected command.
Copy All to Copies all visible portions of the active X client window
(multiple window mode) or the server root window (single window mode).
Copy X Selection to
For information on
automatic copying and
pasting, see page 92.
You can paste data from Clipboard to another Windows application as long
as the destination application supports the data or format type.
Pasting
Paste to X Selection from Clipboard
selection.
88
When you paste data from Clipboard to the X selection, Exceed assumes
ownership for the X selection. You can then use the X client-specific
method to paste X selection data into one or more X client windows
(usually at the insertion point). If you are using the PRIMARY X selection,
you can usually paste data into an X client window by clicking the middle
mouse button.
Note: If you are using a two-button mouse, start Xconfig, select
Middle Button Emulation on the Mouse Input dialog box, then click
OK . This lets you emulate a middle mouse button by clicking
both the left and right mouse buttons simultaneously. For more
information, see Mouse Input Settings on page 110.
The servers also let you paste images from Clipboard into an X client. The
method of pasting an image to X is based on ICCCM (Inter-Client
Communication Conventions Manual). For a technical description of the
process, refer to seltest.doc, located in the Exceed installation directory.
Note: Many X clients support the copying and pasting of
graphics to other X clients, but only through ICCCM X selections.
89
Select Clear X Selection on the server Edit menu if you are running in
single window mode, or from the Edit menu on Seltest system menu if
you are running in multiple window mode. This causes the server to
give up ownership of the primary selection.
Click the left mouse button in the seltest window. Seltest will request
ownership of the primary selection and will associate the image it is
displaying in its window with the primary selection.
Select Copy X Selection on the server Edit menu if you are running in
single window mode, or on the Edit menu (the Seltest system menu) if
you are running in multiple window mode. This causes the server to ask
the primary selection owner (Seltest) for the primary selection image
data. The server copies the image to Clipboard.
Display the Clipboard Viewer to verify the image was transferred from
the Seltest client to Clipboard.
90
Run Exceed and ensure the X selection option on the server Options
menu is set to primary.
Select Paste To X Selection on the server Edit menu if you are running in
single window mode or on the Edit menu on Seltest system menu if you
are running in multiple window mode.
Click the right mouse button in the Seltest window. Seltest will request
the current primary selection information and display all of the
selection target types, if any, which are available in the xterm or Telnet
window.
If an image is available, it is displayed in the Seltest window. The
amount of time it takes to display the image in the Seltest window varies
depending on network load, image size, and color resolution, but
should not be longer than 30 seconds in most cases.
Place the data that you want to copy in the X selection buffer using the
X client selection procedure.
91
Automatic
You can set your system to automatically copy and paste X selections. This
saves time and is especially useful for high volume copying and pasting.
To set copying and pasting of X selections as automatic:
1
Open Xconfig.
To do this
92
Chapter 5
Advanced Connection Methods
95
95
96
97
98
99
101
102
102
103
104
Description
@u or @U
@p or @P
Open Xstart.
Command Macros
In the Xstart Command box (in the Login area), you can type the command
macros shown in the following table.
Note: These macros are automatically defined by Xstart; you do
not need to perform additional steps to define them.
95
Macro
Description
@d or @D
@a or @A
Inserts your network address. If you use the @a macro, type the
following command to start xterm:
xterm -display @a:0 &
Inserts the correct display transport identifier (that is, : for TCP/IP
and IPX/SPX, and : for DECnet). If you use the @: macro, type the
following command to start xterm:
@:
@#
96
Click OK.
Click Delete All. This empties the cache, so that the next time you run or
create an Xstart connection, the system prompts you for your password.
97
In the drop-down list, select one of the file retrieval methods. For more
information, see Browsing for Hosts and Applications on page 68.
When you are satisfied with the information on the Load optimization
tab, click OK.
98
The following sub-sections describe how to create and run an Xsession file.
99
The Xsession window is divided into two areas showing information for the
session: an Available Programs box and a Included Programs pane.
Available Programs This box lists the file names and descriptions of all
Xstart (.xs) and Wstart (.ws) files in the directory where Exceed is installed.
To view files from another directory, click Directory.
For information on creating
an Xstart or Wstart file, see
Creating a Startup File
on page 64.
If you have not already created a file that starts the X client or X application,
click New Program and select the appropriate Program Type (either X Client or
Windows App ). Then click OK. This opens Xstart, where you can create the
required startup file.
Session All programs that start when you run the current Xsession file are
listed in the Included Programs box. The programs start in the order in
which they are listed here. A button panel lets you manage files.
You can also remove file(s) from the Included Programs box. Click Remove
All to remove all of the files in the list. Use Up and Down to re-arrange the list
of files into the desired startup order. To use any of the buttons, select the
file(s) in the Available Programs or Included Programs boxes that you want to
change, then click the appropriate button. You can also add files by dragging
and dropping them into the Included Programs box.
100
Description In this box, type the description of the Xsession file. When
you install an icon for this file, the text you enter in this box appears below
the icon. You can type up to 40 characters. If you do not specify a
description, Xsession uses the file name (minus the extension).
Show On Session Startup Menu If this option is enabled, a command is
created on the Session Star tup menu and Exceed launches the associated X
session. To open the menu, select Session Star tup from the X server Tools
menu, or the Exceed toolbar, or the Launch Pad X Apps menu.
Run X Server If this is enabled, Exceed starts automatically when you run
the Xsession file.
Options If Run X Server is selected, then you can click Options and specify
server options for the session. Defaults are specified in the Xconfig
applications.
Interval This value (in seconds) specifies the time between the startup of
each program listed in the Included Programs box. The default value is 2
seconds.
In Xsession, select an .xs file and click Run on the menu bar.
101
To troubleshoot a
connection, see
"Chapter 10:
Troubleshooting" on
page 251 and "Chapter 4:
Connecting to Hosts and
Running X Clients" on
page 61.
This section describes the sequence of events when you run an Xsession
session. Learning this sequence helps you troubleshoot your connections
later on.
In Xsession, click Run on the File menu. In the Run dialog box, specify an
.ses file name (or multiple file names) and a directory, if necessary.
If Run X Server is selected and the X server was not previously started,
the X server starts. If the X server is already running and you have
selected the Prompt for Server Restart option, Xsession asks you if you
want to restart the server.
After the time interval specified in the Xsession file has elapsed, the first
program listed in the Included Programs box starts.
The next program starts. The files start in the order that they are listed.
102
On the Xsession menu bar, click Install, or on the File menu select Install.
In the Description drop-down list, select the name of the folder where
you want to install the Xstart icon. You can also type a new name to
create a new program group. If you do not specify a folder, the icon is
installed in the current folder (that is, the open folder in Windows
Explorer).
In the Files box, select the .xs file you want to install. To browse files in
another directory, click Directory. Use Select All and Deselect All, if
required.
If you want to use an icon other than the default Xstart icon, click
Change Icon. Select an icon from the displayed icons or click Browse to
locate another graphic. When you are satisfied with the information in
this dialog, click OK. The icon installs with your specifications.
103
Setting Up X Web
Complete the following general procedure to install and set up X Web.
To set up X Web:
104
If you have not already done so, install Exceed. Exceed fully supports
X11R6.6 (X Web).
Ensure the UNIX host can compile X11R6.3 or higher and you have
installed a web server.
For each application on the UNIX server, install Applicationname.html, Application-name.rx, and Application-name.pl on the web
server. These files are outlined above.
Chapter 6
XconfigConfiguring Exceed
About Xconfig
107
Keyboard Input
Keyboard
108
108
110
Communications
Setting the Sequence of Events
113
113
Security
114
119
119
121
122
123
123
124
126
127
128
Selecting Fonts
Managing the Font Database
Accessing the Font Server
Creating Font Aliases
Creating Several Aliases
Input Methods for Chinese, Japanese, and Korean
130
131
133
133
134
136
138
141
141
141
About Xconfig
Xconfig includes applications for configuring the Exceed X server input,
communication, video, protocol, security, window mode, performance, X
selection, font, troubleshooting, and transport settings. In most cases, the
default settings are sufficient. If the Exceed X server is running while you
make changes to the configuration, the changes may take effect immediately
or require a server reset, depending on the settings changed. If the change
requires a server reset, a confirmation message appears. A server reset
terminates all X clients.
The default configuration file used by the Exceed X server is exceed.cfg. It
is located within the system directory where Exceed is installed for the user.
For example, in Windows NT (for the current user):
c:\WINNT\Profiles\user name\Application Data\Hummingbird...
You can use Xconfig to make changes to exceed.cfg and create other
configuration files (using Save As on the File menu). To have the Exceed X
server use a configuration file other than exceed.cfg, you can either:
Specify /f and the full path to the configuration file on the Exceed X
server command line.
Certain settings, such as all security settings, are global to all configuration
files. If you make a change to a global setting it changes in all configuration
files.
107
Keyboard Input
Keyboard Input lets you control Exceed X server settings for your keyboard.
Keyboard files are provided, and contain keyboard layout and symbol
mappings. You can create an entire custom keyboard manually, but usually
it is better to start with one of the existing keyboard files, then customize it
to suit your needs. You can also configure the keyboard file for the primary
and alternate Exceed X server keyboards.
Use this application to:
Keyboard
To customize the keyboard:
1
Save a copy of the original keyboard file. This is a precaution in case you
change a setting and it does not work, or you do not like the new
settings.
Note: By default, keyboard files (*.kbf) are stored in the directory
where the Exceed user directory is installed.
108
Select the keyboard you want to use. For both types of keyboards
(Primary and Alternate), you can select which one to use by clicking on
its corresponding drop-down list.
Primary displays the name of the current primary keyboard file. The
keyboard file contains the appropriate keyboard layout and
alphabet for the language selected.
To locate a keyboard file not listed in the drop-down lists, click Browse.
For keyboards containing two Alt keys, you can select options to assign
the left and right Alt keys. To direct Alt key sequences toward Microsoft
Windows or X Windows clients, select an option from the Alt Key dropdown list:
To Windows
To X
For keyboards containing two Windows keys, you can select options to
assign the left and right keys. To direct Windows key sequences to X
Windows clients, select an option from the Windows Key drop-down
list:
To Windows
To X
109
10 To define how the Shift keys on the keyboard are interpreted by Exceed,
select an option from the Shift Key drop-down list:
The Map Both Left and Right setting causes the left and right Shift keys to
be treated and interpreted separately. When you select the Map Left as
Right setting, any time you press a Shift key on your keyboard, it is
treated as a right Shift. If you select the Map Right as Left setting, any
time you press a Shift key on your keyboard, it is treated as a left Shift.
window only.
wheel movement to a macro. This is the only option that lets you
scroll in multiple window mode. For instructions on how to map to
a macro, see the procedure below.
110
Click Interval indicates the time lapse between clicking the left and
when you click the left and right mouse buttons. If you stay within
the specified number of pixels, the system understands you are
indicating middle button emulation.
To map the mouse wheel to a macro:
Select Wheel movement invokes macro, then click Macro Mappings. The
Mouse Wheel Macro Bindings dialog box opens.
111
112
In the Name and Description boxes, type the function and brief
description. For example, type vi_scroll_up and Scroll Up.
After you have decided on the keys you want to map to the mouse
wheel, in the Event List panel click Star t Record.
Enter the key sequence on the keyboard. When you are finished, the
application stops recording automatically.
Select your new macro from the list, then click OK.
The new macro is associated with the wheel action you selected. Click
OK to return to the Mouse Input dialog box.
Communications
The Communication application lets you control how connections are
made.
113
XDM lets you manage X displays. It allows for centralized control over the X
environment and provides an added measure of security. XDM provides an
X-based login function and generates authorization information that can be
used by the Exceed X server to control which users on which hosts may be
given access to an Exceed X server display.
If you use an XDMCP startup mode, you do not need a separate startup
application to start X clients (that is, Xstart, Xsession, or Telnet). However,
you may use these applications to start additional X clients.
Security
You can set security to either restrict or allow access to specific components
of the Exceed X server. You can use the Security application to:
114
The Password button in the Security dialog box lets you change your
Xconfig password.
1
In the Security dialog box, click Password. The Xconfig Password dialog
box opens.
Type the current (old) password, type a new password, then confirm
the new password by retyping it.
Click OK.
115
Type its full path (if other than the directory where the Exceed user
directory is installed) and file name in the File box.
Modify the Host Access Control List file in a text editor by clicking Edit.
Enabled (no host access) Instructs Exceed to use an empty Host Access
Control List to regulate access. With an empty list, no hosts are allowed
access.
Disabled (any host access) Terminates the use of the Host Access Control
List and allows unrestricted access to all hosts on the network.
Allow Clients to Modify Host Access Control List This setting regulates
client modification of the Host Access Control List (xhosts.txt).
Enable User Access Control List Lets you enable security at the user level
(rather than at the host level) without using XDMCP. By default, this setting
is not selected. For optimal security when using this option, clear the Allow
Clients to Modify Host Access Control List check box and select an option in
the Host Access Control List area.
116
name the policies that Exceed X server supports. These lines are
characterized by a specific syntax: a collection of alphanumeric
characters designed to match a similar collection in the configuration
file of a firewall proxy.
propertyLines starting with this keyword are used to assign
permissions to untrusted clients regarding access to window properties.
For more details about
property access rules and
keyword syntax, see the
various comment lines in
the security.txt file
(click Edit in the X Web
area of the Security dialog
box).
Syntax
property
window
propertyselector
117
Keyword
Syntax
permissions
operation
action
In many cases, errors in the security policy file can cause applications to
terminate, or even crash. The alternative is to specify ignore as the action,
in which case, the operation is not carried out, but returns success.
Plug-in/Helper App Configuration Files The corresponding Edit buttons
open Notepad with the respective configuration file loaded. This is the only
place you can edit configuration files. If you edit them outside of Xconfig,
the system returns a warning or error message, and it ignores the
configuration files.
Print files
Note: If you do not specify a Extend password, then anyone can
access files on your PC.
118
In the Extend area of the Security dialog box, ensure Enable Extension is
selected, then click Password. The Extend Password dialog box opens.
Type the current (old) password, type a new password, then confirm
the new password by retyping it.
Click OK.
Note: Remember the password. It is required to change the
password again.
119
Allow Old X11 Bugs Tells the Exceed X server to permit a number of
protocol-related problems which were allowed or missed in X11 R3 and X11
R4 X servers. By default, this setting is turned on.
DECwindows Compatibility
120
To broadcast on the local network, this address must consist of the network
portion of your IP address with a host portion numeral set to 1 (binary).
For example, if your IP address is 192.9.200.6 (a Class C address), the
network portion of the address is 192.9.200. For more information
regarding broadcast address specification, consult your TCP/IP network
software documentation.
To switch to different transport type, click Choose, then select a transport
interface.
121
Configuring X Screens
The Screen Definition dialog box lets you select the window mode (and
related options), server visual, and monitors to use for each X screen. For
more information, see Window Modes on page 80. In addition, you can
add, enable or disable, and delete X screens. You can also provide
information about your monitor configuration.
122
Deleting a Screen
To delete a screen, select the tab for the screen, click Delete, then click Yes at
the prompt. Screens must be deleted in reverse numerical order. That is, if
you have four screens (0, 1, 2, and 3), you cannot delete Screen 2 before
deleting Screen 3. You cannot delete Screen 0.
Disabling a Screen
As an alternative to deleting a screen, you can disable it by clearing Enable
Screen on the Screen tab. If you disable a screen, all higher numbered
screens are disabled as well. You cannot disable Screen 0.
To add monitors, select the Monitor(s) To Use For Screen option and type
the number of monitors in the adjacent box.
To customize screen focus changes, click the Common Settings tab and
complete the information there.
To indicate a custom monitor size, click the Monitor Info tab and type the
monitor size in the boxes provided.
123
The Palette area lets you modify how the Exceed X server interacts with the
Windows color palette.
124
Since certain X displays might share the same configuration file, do not
make changes to your configuration while the Exceed X server is
running.
Since only one X display can own the desktop/root window and the
configuration file is shared, do not enable the following multiple
window mode Xconfig settings if you are using the multiple X display
feature: Root Mouse Actions to X and multiple screens. The Root Drawing
option should be None. You can still use the Root Mouse Actions to X
toolbar button, but ensure the setting is selected for only one X display
at a time.
Colormaps are not shared between X displays which may result in color
flashing in 256 color video mode when you change the focus between
windows which are on different X displays.
Multiple copies of the Exceed X server cannot share a single log file. To
solve this problem, the name of the log file in your configuration file is
used to construct the log file name for each copy of the Exceed X server.
This is done in the following manner: if the log file name in your
125
You can also set the Auto Copy X Selection and Auto Paste to X Selection
options in this dialog box. For details, see Automatic on page 92.
126
127
System Resource Usage This slide bar displays the amount of total system
resources allocated for use by the Exceed server. To reduce resources
available to the Exceed server, slide the bar towards Limited. This lets
resource-intensive X clients execute without exhausting system resources.
However, limiting server resource usage may reduce server performance.
Dynamic Adjust When this option is activated, the system uses the value
set in System Resource Usage as a starting point from which the Exceed X
server automatically adjusts the resource usage to compensate for the
system conditions. When system resources are low, the system temporarily
reduces resources to the Exceed X server to help alleviate further drain on
resources. Conversely, when system resources are high, the system
temporarily increases resources to the Exceed X server to help improve
system performance.
128
Exact Zero-Width Lines To force exact line drawing for zero-width lines,
select this option. By default, the Exceed server lets Microsoft Windows
directly draw zero-width lines. This method is generally much faster than
the exact pixel algorithm used by X to draw lines of other widths.
Note: Some video drivers ignore color information on some styles
of zero-width line drawing. You should select this option if lines
appear in an incorrect color, or do not appear at all.
Save Unders Lets you save parts of a window that become obscured by
menus/windows in the foreground to system memory. The option
eliminates the need to refresh the window when the menu rolls back up.
The system ignores this check box if the Maximum Backing Store box is set to
None.
Backing Store Refers to storing the information required to refresh the
screen from the client in server memory. Backing store options let you
specify the circumstances under which you want backing store to occur.
Either the client requests a specific backing store, or the client leaves the
type of backing store to the server.
You can specify a maximum and a default backing store value. Maximum
governs when the client requests a type of backing store, and the default
governs when the client leaves the backing store setting to the server. The
following backing store settings are available:
storage of screen information only occurs when the client draws the
screen in mapped mode.
129
Tune Starts the Xperf application. Xperf lets you override the current
drawing methods used by the server and run tests to determine the optimal
graphics configuration for your Exceed server. Before running Xperf,
terminate all X clients since Xperf automatically terminates and restarts the
server. If the server is already running, Xperf prompts you to confirm a
server reset.
Note: If you change video cards, drivers, your video configuration,
or the Accelerated Drawing Mode setting in the Performance
Settings dialog box, run Xperf to ensure optimal server
performance.
Selecting Fonts
The Font Settings dialog box lets you view and edit the font database
available to Exceed, import and export font aliases, compile BDF and PCF
font files to the an Exceed format, and select default text and cursor fonts.
When you install Exceed, you automatically install font databases that
support the International CDE.
Note: You do not have to modify the font database created during
installation unless you want to use these new features.
130
The font database includes support for scalable fonts and font servers. You
can also create multiple font sets and load the one(s) you want to use at
run-time. Exceed can automatically connect to a font server running on the
XDMCP host server.
The font database is stored in the lfp.xdb file in the directory where Exceed
is installed. Specific fonts in the font database are stored in font directories
and font servers. Exceed also supports pseudo fonts for Unicode.
Click Font Database. A dialog box opens, listing all font directories and
servers in the font database.
Use the buttons and options in the Font Database dialog box to make the
following changes:
132
In the Font Database dialog box, click Font List for Directory. This displays
the fonts contained in the selection.
Use the buttons in the Font List dialog box to make the following
changes:
View font lists for each database, create aliases, and scale fonts
After you have made changes, click Save As. The modified file is saved
in the directory where Exceed is installed with an .xdb extension.
Note: When you install fonts, you should install both 75 dpi and
100 dpi fonts for best font matching. Additionally, if the monitor
size is greater than 1024 x 768, in the Font Database dialog box,
place the 100 dpi font in a higher priority than the 75 dpi font.
133
In the Xconfig folder, double-click the Font icon, click Font Database,
then click Font List for Directory. The Font List dialog box opens.
Type the font name in the box. If the font name is on the Clipboard,
click Paste.
Click OK.
The font alias appears immediately below the logical font name in the
second column of the Font List dialog box.
134
Select an input alias file by selecting the appropriate file name and
directory from the boxes.
To limit the search to one font directory, select the desired font
directory in the Limit Import to Selected Font Directory box. Otherwise, all
font directories are used for searching.
Repeat steps 3 to 5 for the each alias file you want to import.
Click Close.
Type the name of the output alias file in the File Name box.
135
If you want to limit the search to one font directory, select the
appropriate font directory from the Limit Export to Selected Font
Directory box. Otherwise, all font directories are used in the search.
Click Close.
This dialog box lets you configure how to enter and pass Chinese, Japanese,
or Korean (CJK) text to an X client.
136
Select Use Input Server on the host to use an input method server X
client.
Select Protocol to use an Input Method Server built into the Exceed X
server.
Select Copy and Paste to use copy and paste commands to input CJK
text.
The Use Input Method Server on the host option lets you enter CJK text using
whatever mechanism the input method (IM) server X client supports. Select
this option if you are using an external IM server X client. This means the
Exceed X server will not support internal CJK input methods. This option
does not permit the use of the Microsoft Windows IME to enter CJK text.
The available IM Server X clients vary by host type. The following table
shows the IM Servers typically available on specific host types:
Host Type
IM Server
HP
xkim/xjim/xsim/stim
Solaris
htt
Digital
dxhangulim/dxhanyuim/dxhaziim/dxjim
137
Open the exceed.ini file in the directory where Exceed is installed and
add the following line under the [Options] heading:
BIG5EncodingName=BIG5-0
Note: Remove this line to input Traditional Chinese in an HP
environment (HP-BIG5).
Open the xlc_locale file on your PC and make the following changes:
a) under the heading fs1, modify as follows:
138
# charset HP-BIG5:GLGR
charset
BIG5-0:GLGR
# ct_encoding
HP-BIG5:GLGR:\x1b\x25\x2f\x30\x80\x8aHP-BIG5\x02
ct_encoding
BIG5-0:GLGR:\x1b\x25\x2f\x32\x80\89BIG5-0\x02
In Xconfig Font Settings, select Compile Fonts in the Font Settings dialog
box and compile the downloaded .bdf fonts to the .fon format.
139
Download the following fonts from a Digital UNIX host that supports
Traditional Chinese into the new font directory created in step 2:
adecw_hei_cns11643_16_16_75.pcf
adecw_screen_cns11643_16_18_75.pcf
adecw_screen_cns11643_24_24_75.pcf
jdecw_screen_decsuppl_8_18.pcf
jdecw_screen_decsuppl_12_24.pcf
In Xconfig Font Settings, select Compile Fonts in the Font Settings dialog
box and compile the downloaded .pcf fonts to the .fon format.
Add the new font directory to the font database and move it to the top
of the font database list using the Move Up button.
140
TCP/IP Transports
You can use Xstart on a VMS system running TCP/IP if your VMS system
supports REXEC or RSH. You must create a script on the host containing
the DISPLAY environment variable specification and the command to start
the X client. You can then use REXEC or RSH to connect to the host and
execute the script.
If your VMS system supports REXEC or RSH, and it is running Version 5.0
of the PCX$SERVER command processor, start an application by choosing
the REXEC or RSH start method and type the following in the command
box:
@sys$system:pcx$server 4,display-number, screennumber,tcpip,node-address, command <CR>
For example:
@sys$system:pcx$server 4,0,0,tcpip,
2.10 DECW$TERMINAL <CR>
DECnet Transports
To use Xstart on a VMS system running DECnet, choose the PCX$SERVER
(DECnet) startup method and, depending upon which version of the
PCX$SERVER command processor you are using, type one of the following
in the Command box:
141
You can specify that you want to use Version 3 of the PCX$SERVER
command processor by typing the following command:
3,transport,node-address,command
You can specify that you want to use Version 4 of the PCX$SERVER
command processor by typing a command as follows:
4,display-number,screen-number,transport,
node-address,command <CR>
You can also use command field macros when specifying this
information. For example:
4,@#,0,DECNET,@a,DECW$TERMINAL
142
Chapter 7
System AdministrationSconfig
and Jconfig
145
145
146
146
147
149
150
151
154
158
161
162
164
171
172
172
173
174
174
175
177
178
179
180
183
184
185
Sconfig is an advanced system administration tool that helps users make the
best use of their Hummingbird software in specific networked
environments. With Sconfig, you can customize the Setup Wizard to create
tailored installation packages of Hummingbird software for different users.
You can:
You can use Sconfig to package customized installations that cater to each
user by creating a Microsoft transform file (.mst). After creating a transform
file, you can then include those applications (and subsequent components)
that are useful for each user.
145
146
When opening Sconfig you must specify the transform and package files.
You can work with a new package file or with a preconfigured one.
Note: Sconfig is not installed in a Typical installation. It installs only
if you choose Custom or Complete.
To open Sconfig:
1
Specify the package file that you want to customize and click Next. You
can choose a package file in one of the following ways:
Specify the transform file that you want to create. You can specify a
transform file in one of the following ways:
Create a new one yourself. You can do this by clicking the Browse
button.
147
148
Destination
Current User
All Users
149
To customize directories:
1
In the Destination Folder box, type the directory where all non-volatile
files will be stored.
In the Current User box, type the directory where all volatile files will be
stored for the current user.
In the All Users box, type the directory where all volatile files will be
stored for all users.
150
Select or clear the check box of the sub-feature(s) you want to add or
remove for that Hummingbird feature.
Sconfig lets you add, modify or remove external program files that do not
come with your Hummingbird product. You can specify the destination
path of a file on a users computer and specify a feature to install with this
file. The Files dialog box provides you with the opportunity to accessorize
the installation database and optimize task efficiency amongst users while
using the Hummingbird product.
Files can be added to, modified within, and removed from an installation
database for different users in an enterprise.
152
To add a file:
1
In the Files dialog box, click Add. A standard Windows Open dialog box
opens.
Select a file in the dialog box and click OK. The Add/Modify File dialog
box opens.
From the drop-down list, select a destination path folder. This folder
can be a Windows Systems folder or a Hummingbird folder, depending
upon where you want to store the file.
From the Install With Feature drop-down list, select a feature or select
Always to include this file with every install and click OK. The Files box
appears listing the added file.
153
To modify a file:
1
In the Files dialog box, select a file and click Modify. The Add/Modify File
dialog box opens.
If you want to change the destination folder in which your file gets
stored, from the drop-down list, select a new destination path folder.
If you want to change the feature that the file gets installed with, from
the Install with drop-down list, select a new feature and click OK. The
Files dialog box appears listing the files in your installation database.
154
You can also set properties for Exceed and NFS Maestro Client. However,
these properties become available only when installing the appropriate
package files for each of these products. For more information on Exceed
and NFS Maestro Client properties, see Setting Exceed Properties on
page 162 and Setting NFS Properties on page 163. Hummingbird product
properties can be added to, modified within, and removed from an
installation database for different users in an enterprise.
155
To add a property:
1
In the Properties dialog box click Add. The Add Property dialog box
opens.
From the drop-down list, select a property. The bottom panel of the
dialog box provides the validation information for the property.
In the box, type a value for the new property and click OK. The
Proper ties box appears listing any new properties youve added to the
installation database.
156
To modify a property:
1
Click Modify. The Modify Property dialog box opens. The bottom panel
of the dialog box provides the validation information for the property.
In the box, type a new value for the property and click OK. The Property
box appears listing your properties in the installation database.
feature requirements
157
158
In the Registry dialog box, click Add. The Add/Modify Registry Entry
dialog box opens.
In the Value data box, type the registry data value and click OK. The
Registry dialog box appears listing your new keys.
159
In the Registry dialog box, click Modify. The Add/Modify Registry Entry
dialog box opens.
If you want to change the existing hive name of the registry key, from
the Root drop-down list, select the new hive name.
If you want to change the existing value type of the registry key, from
the Data Type drop-down list, select the new data value type.
If you want to change the existing name of the registry key, in the Key
box, type the new name for the registry key.
If you want to change the existing registry value name, in the Value
name box, type the new registry value name.
If you want to change the existing registry data for the key, in the Value
data box, type the new registry data and click OK. The Registry box
appears listing your registry keys in the installation database.
160
Setting Shortcuts
Click the Shortcuts option in the left panel of the Setup Customization
Wizard to view the Shortcuts dialog box. This option enables quick access to
commonly used Hummingbird components. While customizing your
transform file in Sconfig, create custom shortcuts for Hummingbird
product features for quick access on user machines.
In the Shortcut tree of the Shortcut dialog box, select and right-click the
folder to which you want to add a new shortcut. In the menu, click Add
Shortcut Here.
In the Shor tcut dialog box, into the Name text box, type the name of the
shortcut that you want add. To rename a shortcut, select the name of
the shortcut in the Name box and enter the new name. The name must
appear in the format:
short name|long name
where the short name must be less than 8 characters long and followed
by the character |, and the long name is the name of the shortcut as it
appears on the Windows desktop. For example,
ExceedF|Exceed Finger
161
If you want to include a description for the shortcut, into the Description
text box, type a description for the shortcut. This appears when you
move your mouse pointer over the shortcut icon.
From the Install with drop-down list, select a component for which you
want to provide a shortcut. The installer uses the installation state of
this component to determine whether to create or delete the shortcut.
The Default Path text box displays the destination path of the
component for which you want to create a shortcut.
If you want to provide any arguments for this shortcut, type them into
the Arguments text box.
In the Icon area, click Select to launch the Change Icon dialog box. In this
box, select an icon to associate with the shortcut and click OK.
162
When you modify or remove a property, the property gets added or deleted
from the property table in the Proper ties dialog box. You can modify or
remove properties in the same way as they are in the Proper ties option. See
Modifying a Custom Property in an Installation Database on page 156
and Removing a Custom Property from an Installation Database on
page 157.
163
164
165
In the Custom Fonts Settings dialog box, click Add. The Add/Modify
Custom Fonts Settings dialog box opens.
In the Font Directory box, type the name of the custom directory. In the
File Name box, click Browse and navigate to the font database file (.fdb).
This file is created by Xconfig and stored in
Application Data\Hummingbird\Connectivity\version\Exceed\
Select the status of the font directory. You can select the Load, Keep, or
Inactive states.
To make matches to this directory using its physical font name as well as
its logical font name, select the Match Physical Font Name box and click
OK. The Custom Fonts Settings dialog box appears listing the new
directory added to the installation database.
166
In the Custom Fonts Settings dialog box, select the font directory to
which you want to add a custom font file(s).
In the Custom Fonts Settings dialog box, click the Add Font Files button.
A standard Windows Open dialog box appears.
In the box, browse to the custom font files (.fon) located in your custom
font directory and stored on your local machine. Select and copy the
custom font files (.fon) you need into your custom font directory and
click OK. The Custom Fonts Settings dialog box appears listing new font
files added to the directory.
10 If you want to add new font files to the directory, repeat steps 8-11.
A new custom font directory along with (.fon) files is added to the
installation database.
If you are changing a font directory in the database, you need to know the
name of the directory and the name of the font database file corresponding
to the new font directory.
To modify a custom font directory:
1
In the Custom Fonts Settings dialog box, click Modify. The Add/Modify
Custom Fonts Settings dialog box opens.
From the Font Type drop-down list, select Directory to display directory
settings.
If you want to rename the directory, in the Font Directory box, type the
new directory name.
167
If you want to change the existing font database file, in the File Name
box, click Browse and point to the new file (.fdb). This custom .fdb file
is created by Xconfig and stored in
Application Data\Hummingbird\Connectivity\version\Exceed\
If you want to change the status of the font directory, in the Status area,
select the new status of the font directory. You can select the Load, Keep,
or Inactive states.
If you want to make matches to this directory using its physical font
name as well as its logical font name, select the Match Physical Font
Name box and click OK. The Custom Fonts Settings dialog box appears,
listing any directories or servers in the installation database.
In the Custom Font Settings dialog box, click Add. The Add/Modify
Custom Fonts Settings dialog box opens.
Select the status of the server directory. You can select the Load, Keep, or
Inactive states.
169
To make matches to this directory using its physical font name as well as
its logical font name, select the Match Physical Font Name box and click
OK. The Custom Fonts Settings dialog box appears listing the new font
server added to the installation database.
170
In the Custom Fonts Settings dialog box, click Add. The Add/Modify
Custom Fonts Settings dialog box opens.
From the Font Type drop-down list box, select a new server.
If you want to rename the server, in the Host Name box, type the new
server name.
If you want to connect to a new port, in the Por t box, type the new port
number.
If you want to change the status of the server, from the Status area, select
the new state of the server directory. You can select the Load, Keep, or
Inactive states.
If you want to make matches to this directory using its physical font
name as well as its logical font name, select the Match Physical Font
Name box and click OK. The Custom Fonts Settings dialog box appears,
listing any directories or servers in the installation database.
171
Click Next to create the transform file (.mst). This process is automatic
and does not display on screen. The Sconfig Wizard Configuration
Complete dialog box opens, stating that you have created your transform
file.
Sconfig saves your transform file in the same folder as the package file. This
makes it easier for users to find when they want to access the file from the
administrative installation point.
172
For example, the CmdLine for Hummingbird YourProduct would look like
this:
CmdLine=TRANSFORMS=c:\Hummingbird YourProduct.mst
The new CmdLine in the setup.ini file tells the setup program to
incorporate the new transform file in the program install. When you run
setup.exe, it uses both the original package file, and the transform file that
you created using Sconfig.
To use your new transform file (.mst), launch the Setup Wizard by using
the following command:
setup /vTRANSFORMS=c:\YourTransform.mst"
This way multiple transform files can exist in one source location, without
repeated modifications to the setup.ini file.
173
hosts running
Jconfig
Daemon
Jconfig Client
Jconfig
administration host
174
Message Service
Editor Service
175
INI File Service View and modify entries in an .ini file, such as win.ini.
You can add, modify, and delete sections or entries in the selected .ini file.
NFS Maestro Client Configuration Service Set configuration
parameters that are common to all of the NFS Maestro client programs.
This service is available only when NFS Maestro is installed.
Install Service
menu.
Java Property File Service View and modify the parameters stored in a
Java property file. You must select the desired Java property file.
Host Database Service Store host names along with their associated
passwords. This database is also used to assign hosts to groups for
configuration purposes. Use this database with the Jconfig scripting
function, to apply scripts to selected groups of hosts.
Jconfig Daemon Settings Service Change operating parameters for the
Jconfig Daemon to which you are connected. You can change the port on
which Jconfig monitors service requests, some logging parameters, and the
Jconfig Daemon password.
HostExplorer Settings Service Change the HostExplorer profile
parameters as you would using the Options/Edit Session Profile menu item
in HostExplorer. This service is available only when HostExplorer is
installed.
HostExplorer Print Services Configure profiles for printing from a host
computer to a specific LAN printer. This service is available only when
HostExplorer Print Services is installed.
176
Xstart Service Force the host or application cache to refresh. This feature
is available only in Exceed.
Gateway Service Configure NFS Gateway parameters as you would using
the NFS Maestro Gateway Access application. This service is available only
when NFS Maestro is installed.
Installing Jconfig
In order to use Jconfig, you must load it on the hosts in your network. The
following section lists what parts of the Jconfig software to install on each
tier and guides you through the installation process.
When prompted to select the components, select Jconfig along with any
other features you want to install. Continue with the rest of the
installation.
177
Using a web browser, connect to the web server by typing the URL of
the JconfigApplet.html file. The Jconfig applet currently uses Java
Plug-In technology. This allows the applet to run using Sun
Microsystems Java 2 Runtime Environment, Standard Edition (JRE)
instead of the web browsers default virtual machine. The plug-in
supports both Netscape Navigator TN (3.0 and later on Windows 95,
98, NT 4.0, and 2000) and Microsoft Internet Explorer (4.0 and later on
Windows 95, 98, NT 4.0, and 2000).
Note: If you want to run in a language other than English, modify
the language parameter in the JconfigApplet.html file to the
language variable you want. You can choose from the following
variables:
enEnglish
esSpanish
deGerman
ptPortuguese
itItalian
frFrench
178
In the Administrator Workstation box, type the name or IP address for the
administration host.
In the Password box, type the password for the administration host and
click OK.
Note: The passwords for initial connections to both the
administration host and the other remote hosts are the IP
addresses for the respective machines. We recommend changing
connection passwords. For more information on how to change
passwords for hosts, see Changing the Default Password on
page 180.
Select the type of connection you want to make and click Next. The
following list describes the types of connections you can make.
Script DrivenA Script Driven connection lets you use a script file
to configure multiple remote PCs simultaneously. Before using this
type of connection, you must have recorded (and compiled) a
script as well as configured your host database.
179
In the Workstation box, type the machine name (or IP address) of the
host to which you are connecting. You can also browse to a machine in
the host database.
In the Password box, type the password for the host to which you are
connecting and click Finish.
180
Logging Set where you want to log information from the Jconfig Daemon
to which you are connected. You can define the name of the log file and set
the log file to clear at startup.
Services
181
On the Workstation Database toolbar, click Add Entry. The Add Entry
dialog box opens.
If you want to change the port number, click Port and type a new port
number in the box.
Type the password for the new host in the Password and Confirmation
boxes. Click OK.
182
183
HomeThe directory in
which the software is
installed.
Create a Host Database file. You need to create a Host Database file
that contains the names and passwords of the PCs you want. To make it
easier to configure similar PCs, you can group them.
Record a Script. You need to record a script that will perform the
required configuration activities on the hosts. Perform the
configuration steps on the administration host while running the
Scripting Wizard.
Compile the Script. Use a Java compiler to perform this task. You must
compile the file in conjunction with a file that contains the required
classes. For example, if you have recorded a script with the file name
test.java, and you are using the Sun Microsystems JDK Java compiler,
type the following on the command line in the home directory:
The compiler generates a file called test.class. This is the file that is
used to perform the configuration of the remote hosts.
4
Run the Script. Go to the Connection Wizard and select the Script Driven
option. Proceed through the subsequent steps for that process.
To record a script:
184
On the Jconfig toolbar, click Script. The Jconfig Scripting Wizard opens.
In the Script Class box, type the class name of the script and click Next.
If you do not want the changes to apply to the remote host while you
record, clear the Apply Changes check box. Click Next. This option is
selected by default.
After running the Wizard, you can start one or more Jconfig services
and perform configuration activities. As configuration progresses, the
script tool records your actions.
185
Chapter 8
System AdministrationInetd and
Inetd Admin
Introducing Inetd
TCP and UDP Servers
189
189
190
190
190
Default Services
192
Managing Services
Configuration Parameters
201
204
209
209
211
Introducing Inetd
Inetd is a super-daemon that lets you enable and disable various daemon
services through a single application. It determines the network services to
which your PC responds when a client makes an incoming network request.
In Windows 95/98/Me environments, Inetd runs automatically when placed
in the Startup folder. In Windows NT/2000 environments, Inetd is installed
as a service.
Note: The Inetd daemon is installed in the Control Panel by Setup.
189
UDP Inetd monitors the UDP port for packets. When it detects packets, it
uses the port number to link the packet flow to an enabled daemon. The
connection is refused if no daemon is enabled, or if permission is denied to
the UDP user/password.
190
On the File menu, click Properties. The Properties dialog box opens.
If you have enabled FTPd and/or Telnetd, there are some further security
considerations. If you have local disk volumes other than NTFS volumes,
consider the following when determining whether to allow remote users to
have access to your local machine using FTP or Telnet:
FTPtransfers both text and binary (graphic) files between your PC
and a remote computer running a server implementation of FTP. It can
also perform file and directory management.
Telnetprovides a VT220/VT320/ANSI/ Wyse 50/Wyse 60 terminal
emulation window on a PC, UNIX, or VMS host.
191
If you have FAT or HPFS disk volumes, do not enable Telnet access over
the network.
Note: If there is a TelnetAccess group in the user administration
program, the NT user must be a member of the group to
successfully access the machine using Telnet. No check is
performed if the group does not exist; access is then allowed for
every NT user account.
Default Services
The following daemon services are provided with your software package:
192
Description
BOOTPd
Fingerd
FTPd
LPD
Description
Telnetd
Xstartd
Description
TFTPd
Timed
Tnamed
Description
Using UDP
Using Hummingbirds
TCP/IP
Using another
vendors TCP/IP
193
You must configure each of the client machines on the network for the
BOOTP setting of the IP address instead of User Entered.
All incoming BOOTP requests are written to the bootpd.log file in the
home directory.
Comparison to RARP An alternate protocol, Reverse Address Resolution
Protocol (RARP), also lets a client determine its IP address when the MAC
(Media Access Control) address is known. The difference between RARP
and BOOTP is that RARP is hardware, link-level protocol instead of an IP/
UDP protocol. This means that RARP can be implemented only on local
hosts on the same subnet.
Fingerd
Windows system
directory
Windows 95/98/Me:
Windows\System,
Windows NT/2000:
Winnt\System32.
194
When an FTP transfer is requested, the program checks for a user ID,
password, and access rights to read, create, delete and write on the various
server drives, before forwarding the request to FTPd. FTP requires the
services of the TCP protocol to move files. Do not select UDP in the Daemon
Configuration dialog box for this service.
Optional Parameters Use the following syntax to specify the password
files to be used to validate access:
- p password_file
Inetd Adminprovides
access to the password
database that controls
access to your PC from
external users through
passwords and user
names.
where password_file is the full path and file name of the password file you
are using. By default, the password file is called password.hcl in the system
directory:
%System%\Hummingbird\Connectivity\version\Inetd
Description
-rdrives
-wdrives
-rwdrives
LPD
LPD (Line Printer Daemon) lets other workstations send print files directly
to your PC printer, or to a network print queue on your PC. Print options
are not directly configurable under Inetd, but if you want to let users print
host files to your PC printer, you must define your default printer. See your
Windows documentation for information about setting up the default
printer.
Depending upon the remote host from which you want to print, you may
need to define an entry for the printer in the /etc/printcap file on the
remote host, or create a printer queue with the appropriate host
administration tools.
To configure the LPD program to use an existing printer, you must
configure the remote host to send print jobs to a queue. The printcap file
on the remote host links the local queue name (to which the local PC sends
print requests) to the remote queue name (where the files are actually
printed).
196
For example, a user sends a print job to the queue hpjohn, that is actually a
printer called hplaser connected to the remote machine john. The remote
host between these two PCs might have a printcap entry that links these
two queue names like this:
HPJOHN|printer:\
:in:ttl:rp=dos-hplaser:ih=JOHN
On the remote system the queue names for the PC are defined in the form
queueformat-printername, where queueformat is one of the following:
ends in FF, a form feed is appended to the job if one is not already
present.
text (ff)If xxx is TEXT, the output is rendered. This is usually used
for printing text files directly to PostScript printers. If xxx ends in FF, a
Telnetd
Telnetd is a Telnet server that lets Telnet clients make connections to your
PC. Users can connect using the Hummingbird Telnet client, a graphical
VT100/320 terminal emulator application, or any VT100 Telnet client.
197
- p password_file
where password_file is the full path and file name of the password file you
are using. Use the specified password file to validate access. . By default, the
password file is called password.hcl, located in the following directory:
%System%\Hummingbird\Connectivity\<version>\Inetd
Xstartd
Xstartd is the local X client starter daemon. When Xstartd is enabled, other
users can access X clients on your PC. They can connect to your PC and
start X clients by using their Xstart application and the REXEC or RSH
connection methods.
Note: RSH is available only for Windows 95/98/Me. You cannot
use the RSH protocol with Windows NT/2000.
198
When using the REXEC protocol, Xstartd verifies the user name and
password in Inetd Admin to ensure that access has been granted to the
remote user. When the RSH protocol is used, RSH looks for the rhosts file
in the %System%\Hummingbird\Connectivity\<version>\Inetd directory,
where version is the version number of your Hummingbird product. Only
the hosts and users listed in this file can log in using Xstartd.
REXEC When using the REXEC protocol, Xstartd verifies the user name
and password in Inetd Admin to ensure that access has been granted to the
remote user.
199
You can use the plus character (+) in the hostname or username fields to
represent any host and any user. For example, to let all users with the user
ID of John Smith on any host to RSH to your PC, specify the following:
+
JohnSmith
To include a comment in the file, begin the comment line with the number
or pound sign (#).
TFTPd
TFTPd lets you use your PC as a TFTP (Trivial File Transfer Protocol)
server. The TFTP server lets users transfer files to and from your PC. Any
TFTP client program can use the TFTP server, including the DOS TFTP
client.
Warning! TFTP does not require a user name and password, so
take great care when setting up this server.
Description
-r directory
-w directory
-o or O
TFTPd has an inactive timeout feature that you can use to ensure that
TFTPd closes a connection after a period of client inactivity.
200
Timed
Timed is a time server that other workstations can use to synchronize their
current dates and times. When a machine sends a time request to your PC,
Timed returns the current time. This is the time value since Jan 1, 1970
GMT. You can set up workstations with the hcltime or hctime32 program
to synchronize the date and time across the network.
Tnamed
Tnamed is a Trivial Name Server that accepts incoming Trivial Name
requests for host name resolution. It calls the local name resolution routine,
gethostbyname( ), then searches the main lookup paradigm specified on
the machine.
Managing Services
Enabling and Disabling Services
You can enable and disable daemon services in the Hummingbird Inetd
Configuration dialog box. Configuration information is stored in the file
inetd.ini.
201
To enable a service, select the service in the Inetd Service list and click Enable.
To disable a service, select the service in the Inetd Service list and click
Disable. To save changes, click Save.
Configuring Services
To configure a Network Service:
In the Hummingbird Inetd Configuration dialog box, select the service that
you want to configure and click Configure. The Daemon Configuration
dialog box opens.
Verify that the Daemon Name box contains the name of the selected
service and that the Program Filename box contains the file name for the
service.
In the Port box, type a port number between 0 and 65535 to uniquely
identify the service.
Select either the TCP or UDP protocol required for the server. If you
select TCP, type the maximum number of servers that can be used for
the service in the Maximum Servers box.
Click OK.
202
In the Daemon Name box, type the name of the service you want to add.
In the Port box, type a port number between 0 and 65535 to uniquely
identify the service.
Select the protocol required for the server: either TCP or UDP. If you
selected TCP, type the maximum number of servers that can be used for
the service in the Maximum Servers box.
Click OK.
To remove any or all of the services from the list of available Inetd services,
click Delete in the Hummingbird Inetd Configuration dialog box. To save the
changes, click Save.
Note: To reload all network services back into the Setup menu,
click Reload. To reload the original default settings, click Defaults.
203
Configuration Parameters
Destination Folder
Program files install into the home directory. During setup, you can specify
a different home directory, other than the default. For more information,
see the Installation chapter in this manual.
BOOTPD.LOG File
All BOOTP requests and responses are recorded in the bootpd.log file in
the default hclnfs directory. Requests are time and date stamped to provide
a chronological record of BOOTP events on the network. A sample segment
from a bootpd.log file is as follows:
info(6)version 3.2
info(6)reading c:\hcltcp\bootptab
info(6)read 38 entries (38 hosts) from c:\hcltcp\bootptab
info(6)recvd pkt from IP addr 0.0.0.0 AT Tue Aug 16 08:14:44 1995
info(6)request from Ethernet address 00:60:8C:E8:CE:55
info(6)found 185.75.64.10 (pete)
info(6)vendor magic field is 99.130.83.99
info(6)sending reply (with RFC1048 options)
info(6)setarp 185.75.64.10 - 00:60:8C:E8:CE:55
info(6)recvd pkt from IP addr 0.0.0.0 AT Tue Aug 16 08:16:32 1995
info(6)request from Ethernet address 00:60:8C:E8:CE:77
info(6)found 185.75.64.12 (bobg)
204
You can include more detail in the log by inserting the -d option in the
configuration for BOOTPdw. Up to four -d options (separated by spaces)
can be inserted for increasing levels of detail. Specify the -d option(s) in the
Optional Parameters box of the BOOTPd Daemon Configuration dialog box.
bs
da
df
206
dl
dn
ds
ef
gw
ha
The unique MAC address from the network adapter card located
inside your PCs and workstations. For PCs, this address is usually
printed on a label on the network adapter card. You can also
attach the PC to the network, configure it for BOOTP support,
reboot it, and then examine the bootpd.log file for the entry that
contains the MAC address.
hd
hn
ht
ip
lg
lp
mw
ns
nt
ra
rl
rp
sa
sm
sw
tc
td
to
ts
vm
yd
The Domain Name for the server providing NIS (Yellow Pages)
service.
ys
207
pete:
ht=ethernet:ha=00608ce8ce55:ip=185.75.64.10:sm=255.255.255.0\
:gw=185.75.64.254:ds=185.75.64.5:dn=xyz.com:ts=185.75.64.5
barbg:
ht=ethernet:ha=00608ce8ce77:ip=185.75.64.12:sm=255.255.255.0\
:gw=185.75.64.254:ds=185.75.64.5:dn=xyz.com:ts=185.75.64.5
roger:
ht=ethernet:ha=00608ce8ce99:ip=185.75.64.14:sm=255.255.255.0\
:gw=185.75.64.254:ds=185.75.64.5:dn=xyz.com:ts=185.75.64.5
208
Start Inetd Admin. The Open Password File dialog box opens.
Select the password file you want to open. The default password file is
password.hcl. Click Open. The Username/Password Administration dialog
box opens.
210
In the Username box, type the user name for the new user.
In the Password box, type a password for the new user. Retype the
password in the Confirm Password box.
Specify the access rights for the user and click OK.
Changing Passwords
If users forget their passwords, the system administrator can assign new
ones.
To assign a new password:
In the Password box, type a password for a new user. Retype the
password in the Confirm Password box.
Managing Access
Specifying Access Rights
For each user, you can specify access rights on your PC. If you give the user
access to the FTP service, you can also specify file access privileges for up to
10 directories.
To specify user access to your PC:
1
In the Services Permitted section, select the check boxes for services you
want the user to access:
You must assign read and write permission to Telnet users in directories
containing command.com or the command interpreter. Otherwise, the
system cannot change the directory when users try to execute a remote
command.
4
212
If you enabled access to FTP for a user, specify file access permissions in
the Directory Permissions section.
Directory Permissions
To specify directory permissions:
1
In the User Access Rights dialog box, click Add. The Add Directory dialog
box opens.
Directory
c:\hcl
c:\hcl\*
c:\hcl\a*
d:
c:*
c:\
WriteThe remote user can edit files on your PC. Generally, users
also need Create permission to write to files.
213
DeleteThe remote user can delete files and directories from your
PC.
Click OK.
Access to directoriesIf the user has access to the FTP service, you can
restrict access to directories on your PC and to the file access privileges
within those directories.
Note: If users attempt to access a service that is missing or
disabled in Inetd, the connection is terminated. For more
information, see Inetd Help.
214
In the Services Permitted section, clear the check box for the service you
want to disable. Click OK.
In the Username box, type ftp. The user name must be lower case.
215
In the Password box, type ftp. The password must be lower case. Retype
the password in the Confirm Password box.
216
Chapter 9
Hummingbird Directory Services
219
219
219
220
221
222
223
224
Binding to a Domain
About Directory Service Profiles
Creating a Profile
Opening a Properties Dialog Box
Binding to NIS
Binding to NIS+
Keylogin and the System Profile
Binding to LDAP
224
225
226
228
229
230
234
235
240
240
240
241
242
242
243
244
245
245
246
247
247
248
249
219
220
221
Centralized Information
Without a directory service, every host in a network needs to store and
maintain its own copy of the network information. A directory service, on
the other hand, centralizes network information in a single repository that
each client can query. In so doing, a directory service ensures the
consistency of the information and simplifies network administration.
NIS and NIS+ store their information in tabular form. Only NIS+ refers to
its objects as tables. NIS objects are known as maps because each maps a
particular value (a key) to a piece of network information. LDAP objects
are known as entries.
NIS/NIS+ Objects
Each column in an NIS+ table defines an attribute of the type of
information stored in the object. For example, a table containing password
information typically has a column for each of user name, user ID, primary
group ID, and the password itself.
NIS maps each consist of an information column, which stores the network
information, and a key column, which serves as an index to the information
column. The information column typically separates the various attributes
of the object using a colon (:).
Each row (or entry) in an NIS/NIS+ object represents one coherent piece
of network information, such as the complete password information for
one user.
LDAP Objects
LDAP entries correspond to the rows in an NIS map or NIS+ table.
However, LDAP entries are discrete objects that can be selected and
manipulated independently of one another. LDAP entries can also contain
other LDAP objects.
Object Contents
The type of information stored in a directory service generally reproduces
the content of UNIX /etc files. For example, NIS stores password
information (usually stored in /etc/passwd) in two maps, called
passwd.byname and passwd.byuid. NIS+ stores the same information in a
table called passwd. LDAP stores password information in entries that
belong to the posixAccount class.
223
Server Architecture
The repository for a directory service usually consists of one main server
the master serverand a group of supplementary servers. The master
server stores and manages the network information. The supplementary
servers store a copy of the master information. Supplementary servers in
NIS are known as slave servers. Supplementary servers in NIS+ are known
as replicas.
Whenever the network information changes on the master server, the
changes propagate across the network to the copies. Therefore, at any given
time there are several hosts capable of disclosing network information to
clients. This architecture lets the administrator evenly distribute the
network load across more than one server. From the point of view of clients
who access the service, the changes are automatic and transparent.
LDAP uses multiple servers that can independently update the network
information and synchronize it with each other.
Directory Services Explorer and Hummingbird Directory Services let you
target your queries to specific servers in a domain.
Binding to a Domain
Before you can query a directory service, you must first bind to a domain.
Each directory service domain is controlled by one or more servers that
store and release the domain information. When you bind to a domain, you
configure your system to send its queries to one of the servers that control
that domain.
Bind Information
The process of binding to a domain differs from service to service. In
general, you need to supply the domain name and names of the servers you
want to query. If the service (such as NIS+) uses an authentication protocol,
you also need to supply valid credentials.
224
Domain Servers
If you are using NIS as your directory service, you can use the ypwhich
command to determine the names of NIS servers for a given domain.
Directory Services Explorer and Hummingbird Directory Services can
automatically locate NIS+ servers that are part of your local NIS+ domain.
For the names of remote NIS+ servers, contact your NIS+ administrator.
For the names of LDAP servers, contact your LDAP administrator.
For more information on
Ping, see Ping Help.
If you know the name of the server, you can use the Ping accessory to
determine if it is accessible from your machine.
225
Creating a Profile
To create a profile using Directory Services Explorer:
226
From the Directory Service list, select the service you want to target in
the profileone of NISv2 (YP), NISv3 (NIS+), or LDAP.
Click Add. The Properties dialog box for the selected service opens. For
example, if you have selected LDAP, the LDAP Proper ties dialog box
opens.
In the Properties dialog box, specify the domain for the selected service
and assign a name to the profile.
After you have specified the domain, its name appears in the Profile box
of the Directory Services Explorer Settings dialog box.
5
In the Directory Services Explorer Settings dialog box, click OK. The
dialog box closes and the profile is stored locally. You can browse the
specified domain under the profile name you assigned to it.
To create your user profile, select User Settings. To create the system
profile, select System Settings.
Note: You must be the Administrator for the machine to create the
system profile. Any user, however, can view the system profile.
If the User Settings option is dimmed, the Administrator for your
machine has disabled user profiles. You must use the system
profile. If you want to bind to an NIS+ domain, you can still run
keylogin to retrieve your own DES credentials. For more
information, see Running Keylogin on page 243.
Click Proper ties. The Properties dialog box for the selected service
opens. For example, if you selected NIS+ in step 3, the NIS+ Proper ties
dialog box opens.
227
In the Properties dialog box, specify the domain information for the
selected service.
In the Hummingbird Directory Services Proper ties dialog box, click OK.
The dialog box closes. Any queries issued by a Hummingbird
Connectivity application (except Directory Services Explorer) target the
domain specified in the selected profile.
On the File menu, click Settings. The Directory Services Explorer Settings
dialog box opens.
From the Directory Service list, select the service you want to
configureNISv2 (YP), NISv3 (NIS+), or LDAP.
228
Click Proper ties. The appropriate Proper ties dialog box opens.
Binding to NIS
When you bind to an NIS domain, you can specify a primary and secondary
domain server. Any queries sent to NIS first target the primary server, then,
if the primary server is unavailable, the optional secondary server. Your
choice of primary and secondary servers can affect the distribution of
network load across the NIS master and slaves.
Using Hummingbird Directory Services, you can also specify the maps for
host resolution queries. Hummingbird Connectivity applications that run
host name/address lookups consult the maps that you specify.
229
Open the NIS Properties dialog box. Type the profile name for the
domain into the NIS Profile box (Directory Services Explorer only).
In the Domain box, type the name of the NIS domain. NIS domain
names typically consist of two labels separated by a period (for example,
abcd.com). The first label indicates the organization; the second label
can be an Internet domain name such as com, org, or edu.
In the Primary Server box, type the name of your primary NIS server.
If you want to specify a secondary server, type its name into the
Secondary Server box.
In the Host Name Resolution Map box, type the name of the host name
resolution map for the selected domain (Hummingbird Directory
Services only). In the standard NIS configuration, this map is called
hosts.byname.
In the Host IP Resolution Map box, type the name of the host IP
resolution map for the selected domain (Hummingbird Directory
Services only). In the standard NIS configuration, this map is called
hosts.byaddr.
Click OK. The NIS Properties dialog box closes. The NIS service is
configured for the specified profile.
Binding to NIS+
When you bind to NIS+, you can set a query order for NIS+ servers.
Alternatively, to balance service loads across the network, you can specify
random access to NIS+ servers. By default, your queries target the NIS+
master (if available), then any available replica servers.
Note: NIS+ requires client authentication. To access NIS+, you
must supply valid credentials. For more information on NIS+
credentials, see Hummingbird Directory Services Help.
230
231
232
Open the NIS+ Properties dialog box. Type the profile name for the
domain into the NIS+ Profile box (Directory Services Explorer only).
In the Domain box, type the name of the NIS+ domain. NIS+ domain
names consist of two labels separated by a period and always end with a
period (for example, abcd.com.). The first label indicates the
organization; the second label can be an Internet domain name such as
com, org, or edu.
If you are setting up the system profile, type the Secure RPC
password for your machine into the activated Secure RPC password
box. (The system profile is accessible in Hummingbird Directory
Services only.)
If you are setting up a profile as a user, type your user name for the
domain into the User Name box, then type your Secure RPC
password into the activated Secure RPC Password box. Usually, your
Secure RPC password is the same as your UNIX password.
If the NIS+ master server is in the same subnet as your machine, select
Automatically Obtain Server List. Otherwise, select Manually Enter a NIS+
Server, then type the host name or IP address of the server into the
Server Name or IP Address box.
Click OK. The NIS+ Domain Proper ties dialog box closes. The Domain
area of the NIS+ Properties dialog box displays the name of the master
server for the domain and the Secure RPC netname you are using to
bind to the domain.
In the Server Query Order area, set the server query order.
Click OK. The NIS+ Properties dialog box closes. The NIS+ service is
configured for the specified profile.
Open the NIS+ Properties dialog box. The Server Query Order area
displays the list of available servers. The list of servers from top to
bottom corresponds to the query order.
In the Server Query Order area, select a server from the list.
Click the Up or Down buttons at the right of the list until the selected
server is in the correct position.
Repeat steps 23 for all other servers in the list until you achieve the
desired query order.
Click OK. The NIS+ Properties box closes. Queries to NIS+ target the
first available server from the ordered list.
233
In the NIS+ Proper ties box, select the Use Random Server check box. The
Up and Down buttons become dimmed.
Click OK. The NIS+ Properties box closes. Queries to the specified NIS+
domain randomly target available NIS+ servers.
234
Binding to LDAP
When you bind to an LDAP domain, you can either bind as a registered
LDAP user (in which case you must have a user account in the domain) or
as an anonymous user. Anonymous users may not have access to all objects
in the domain.
Warning! If you bind as a registered LDAP user but do not use
SSL authentication, your LDAP credentials may be visible to any
third party on the network.
Other Options
Protocol Version You can choose to use either version 2 or version 3 of
LDAP. If you use SSL authentication, you must use version 3. Most LDAP
servers running version 3 also support version 2. If you are not using SSL
authentication and the server supports version 2 only, all LDAP queries
made by you use the version 2 protocol (even if you specify version 3).
Query Options You can also set the maximum time (in minutes) for
queries to the LDAP service and the maximum number of entries to return.
If the service does not return any query results within the specified time, the
query is aborted.
235
Installing a CA Certificate
To install a CA certificate at download time (Internet Explorer only):
1
In the File Download dialog box, select Open This File From Its Current
Location. Click OK. The Cer tificate dialog box opens.
236
On the Tools menu, click Internet Options. The Internet Options dialog box
opens.
Select the Content tab, then click Cer tificates. The Cer tificate Manager
dialog box opens.
If you have installed the certificate correctly, it appears in the Trusted Root
Cer tification Authorities page of the Certificate Manager dialog box.
237
Open the LDAP Properties dialog box. The Host Info page is selected by
default. Type the profile name for the domain into the LDAP Account
box (Directory Services Explorer only).
From the LDAP Version list, select the version of LDAP you want to use
(LDAPv2 or LDAPv3).
If you want to bind to the server using SSL authentication, select the
Use SSL Connection check box. Only LDAP version 3 supports SSL. To
use SSL, you must first install a CA certificate.
Click Add. The LDAP Server Proper ties dialog box opens.
In the Server Name box, type the name of an LDAP server for the
domain.
In the Port Number box, type the port number for the LDAP service.
Alternatively, click the Default button to enter the default number. The
default port number for LDAP is 389, unless you are using SSL
authentication, in which case the default is 636.
Click OK. The LDAP Server Properties dialog box closes and the name of
the server you have added appears in the Server Information area on the
Host Info page.
Repeat steps 36 for any other LDAP servers that support the same
domain. LDAP servers in the same domain have the same base DN.
On the Host Info page, type the search base for LDAP queries into the
Search Base box (for example, dc=abcxyz,dc=com).
Note: The settings you specify in the Search Options area apply
to all servers listed in the Server Information area.
238
Click OK. The LDAP Proper ties dialog box closes. The LDAP service is
configured for the specified profile.
Click the Host Info tab. The Server Information area displays the list of
servers you have added. The order of servers from top to bottom
corresponds to their query order.
Click the arrow buttons at the right of the list until the selected server is
in the correct position.
Repeat steps 23 for all other servers in the list until you achieve the
desired query order. Click OK. The LDAP Properties box closes. Directory
service queries target the first available server from the ordered list.
Click OK. The LDAP Proper ties box closes. Queries to LDAP include the
credentials you have specified.
In the Search Timeout box, type the maximum query time (in minutes).
Click OK. The LDAP Proper ties dialog box closes. Queries to LDAP use
the specified settings.
239
In the Directory Service Setting area, select the profile type you want to
use (User Settings or System Settings).
From the Directory Service list, select the service you want to use. To
specify no service, select HCLNFSD/PCNFSD. If you are using a directory
service to retrieve AUTH_UNIX credentials, the HCLNFSD/PCNFSD
option targets the authentication daemons (hclnfsd or pcnfsd).
Click OK. The Hummingbird Directory Services Proper ties dialog box
closes.
Modifying a Profile
Once you have created a user or system profile, you can modify its
properties at any time. You can also remove the bind information for a
particular service.
Note: You must be the Administrator for the machine to modify the
system profile or remove a service from it.
To modify a profile:
240
In the Directory Service Setting area, select the profile you want to
change (User Settings or System Settings).
From the Directory Service list, select the directory service whose
domain information you want to change.
Click Proper ties. The Properties dialog box for the selected service
opens.
In the Properties dialog box, modify the domain information for the
selected service as necessary. Click OK. The Proper ties dialog box closes.
In the Hummingbird Directory Services Proper ties dialog box, click OK.
The dialog box closes. The specified profile updates according to your
modifications.
Click Reset.
From the Directory Service list, select a service that has a domain
specified for it, or select HCLNFSD/PCNFSD. Click OK. The Hummingbird
Directory Services Properties dialog box closes. The specified service has
been removed from the profile.
In the Hummingbird Directory Services Proper ties dialog box, select the
Disable User Settings for All Users check box.
Click OK. The Hummingbird Directory Services Proper ties dialog box
closes. Users can no longer create or bind to domains using a user
profile.
241
In the Directory Services Setting area, select the profile you want to use
(User Settings or System Settings). If you want to target a directory
service, select it from the Directory Service list. (The domain for this
service must be specified in the selected profile.)
If you select the last option, you can also specify a query order. Select
the Check DNS First check box to send queries to DNS first.
3
242
In the Hummingbird Directory Services Proper ties dialog box, select the
Synchronize Windows Network Password check box.
Click OK.
Running Keylogin
You can run the keylogin function to bind to NIS+ using specific user
credentials. You only need to do so if you are using the system profile for
NIS+ and you want to perform a task that requires user credentials.
To run keylogin:
1
Open the NIS+ Properties dialog box. Click Keylogin. The NIS+ Login
dialog box opens.
Type your user name for the NIS+ domain into the User Name box.
Type your Secure RPC password into the Secure RPC Password box.
Click OK. The NIS+ Login dialog box closes. Hummingbird Directory
Services uses the specified name and password to generate your DES
credentials.
You can also run keylogin using the keylogin command line application.
For more information on keylogin, see Hummingbird Directory Services
Help.
243
244
Description
chkey
keylogin
niscat
nisls
nismatch
nispasswd
ypcat
ypmatch
yppasswd
ypwhich
ldappasswd
When you run a query, you can retrieve the contents of an entire object (for
example, an NIS map, NIS+ table, or LDAP directory) or just the particular
entry that matches a certain key value.
Note: If you want to save the results of your query to a file, you
must configure the file output settings of Directory Services
Explorer prior to running the query. For more information, see
Saving Query Results on page 247.
From the drop-down list box of Directory Services Explorer, select the
service you want to query. The left pane displays the profiles you have
created for that service.
Click the plus sign to the left of an object to display the objects it
contains.
Repeat step 2 until you find the object you want to query.
Click the object. The right pane displays the contents of the object.
Open the Select Entries dialog box using one of the following methods:
245
In the Column Restrictions area, type the desired key value or values into
the Value column.
For example, if you have selected the hosts.byname map and you want
to retrieve the IP address for the host called jane01, you would type
jane01 into the Value column. (The hosts.byname map uses host names
as its key.)
Note: Queries based on key values are case sensitive. The key
value you supply must be an exact match for the corresponding
value in the object. You cannot specify a key value using pattern
matching expressions.
246
appendadds successive query results to the end of the file; does not
overwrite existing results in the file
You must specify the name of the file and the output method before you can
save any queries.
To specify an output file:
1
In the File Output Settings area, select the Output to File check box.
In the Output Filename box, type the name of the output file. You must
supply an absolute path name for the file, including the drive letter (for
example, c:\temp\results.txt). You must have permission to write to
the specified path.
From the Output Method list, select the desired output methodeither
Append or Replace.
Click OK. The Directory Services Explorer Settings dialog box closes. The
specified file stores the results from any subsequent queries.
Note: You cannot save object properties to an output file.
Display the properties for the object using one of the following
methods:
Modifying a Profile
Once you have created a profile, you can modify its properties at any time.
You can also delete a profile.
To modify a profile in Directory Services Explorer:
248
On the File menu, click Settings. The Directory Services Explorer Settings
dialog box opens.
From the Directory Service list, select the service whose profile you want
to change. The Profile box lists the profiles you have created for the
selected service.
In the Profile box, select the profile you want to modify. Click Properties.
The Proper ties box for the selected service opens.
In the Properties dialog box, modify the domain information for the
selected service. Click OK. The Proper ties dialog box closes.
In the Directory Services Explorer Settings dialog box, click OK. The
dialog box closes. The specified profile updates according to your
modifications.
In the Profile box, select the profile you want to delete. Click Remove,
then OK. The Directory Services Explorer Settings dialog box closes.
From the Directory Services list, select the service that controls the
domain. The Profile box lists the profiles you have created for the
selected service.
In the Profile box, select the profile that specifies the domain. Click
Change Password. The Password Information dialog box opens.
In the New Password and Confirm New Password boxes, type your new
UNIX password.
249
Click OK. If you are updating your password in an NIS+ domain and
your UNIX password is not the same as your Secure RPC password, you
must enter your Secure RPC password in the Secure RPC Password box,
then click OK again.
The Password Information dialog box closes.
In the Change User Password dialog box, click Done. The dialog box
closes. Directory Services Explorer updates your UNIX password (and
Secure RPC password, if applicable) for the specified domain.
Note: The new information may take several minutes to propagate
across supplementary servers in the domain.
If you have selected a replica server as the first server in the NIS+
query order, the new password information must first pass up to
the master server before propagating across the other replica
servers.
250
Chapter 10
Troubleshooting
Installation Troubleshooting
253
Exceed Diagnostics
Troubleshooting Xstart
Logs and Trace Operations
256
256
258
Installation Troubleshooting
The following are common installation issues and questions along with
suggested solutions. For further assistance with troubleshooting issues,
contact Hummingbird Technical Support.
If a product is not currently being installed, you can ignore this error
message and run:
Setup /v"HCL_OVERRIDE_INSTANCE=1"
253
254
Meaning
/i Package|ProductCode
/f Package|ProductCode
/a Package
/x Package|ProductCode
Uninstalls a product.
/j
/L Logfile
/m filename
/p PatchPackage
/q
255
Option
Meaning
/?
/h
/y module
Calls the system API DllRegisterServer to selfregister modules. For more information about this
option, see the MSDN Library.
/z module
Exceed Diagnostics
To find out tips for using
Exceed, or to find out how
other users solve common
problems, join the Exceed
Users Group. See page 10
for details.
Troubleshooting Xstart
Progress Messages
To open the Other Settings
dialog box, click Other in
the Settings area of Xstart.
256
The Show progress option shows what is happening while you try to
connect and start an application.
These options should help you determine the problem. The following
sections detail common connection error messages.
Correct User Name and PasswordSystem Does Not Connect If the
host does not return an Invalid Name or Password message, there may be
something wrong with the communications link. Maybe the host is not
running or it does not support REXEC or RSH. There may also be a
problem with your transport setup or configuration.
Host Returns Invalid Name or Password Message If you receive an
Invalid Name or Password message but the system is connecting, there may
be something wrong with either the syntax or the parameters of the
command you typed in the Xstart Command box. You may need to type
PATH or DISPLAY specifications on the command line.
Xstart Connects But the Client Does Not Start The client may not be
getting enough time to start before the initial Xstart socket closes down. In
the Other Settings dialog box (in Xstart, click Other in the Settings area), set
the Close box in the Timeouts area to -1 (minus one), select the Show host
reply option, then click OK.
This setting keeps the first socket open even after the client socket is
established. It also shows all host-generated messages in a host reply
window that may give you details about what is happening. If the client
seems to start properly, try different values in the Close box until you find a
value that gives the client enough time to start and then closes down the
initial socket.
The Client is Not Authorized to Run on the Server To verify
authorization, in the Xconfig Troubleshooting dialog box select View. In the
Current Log Files dialog box, view the exceed.log file and check for errors.
To fix a problem with permissions, start Xconfig. In the Security dialog box,
edit the Host Access Control List file (select File, browse if necessary, then
click Edit). You may have to also edit the file (if it exists and if the option is
enabled) indicated in the Enable User Access Control List area.
257
The second area is known as tracing. Tracing records all protocol traffic,
between the Exceed X server and the host to a binary file. Options in
Xconfig troubleshooting can help with the trace. For example, you can turn
on tracing as soon as the Exceed X server starts, which means that the dialog
with the first X client is recorded. You can also set Slow Trace in the Xconfig
Troubleshooting dialog box which writes all information directly to the file
without buffering any of the data. This is helpful if you are tracing a
situation where the Exceed X server crashes because any buffered
information would be lost.
258
The trace stops when the Exceed X server terminates. If you turned tracing
on by clicking Trace on the Exceed X server File menu, you can terminate
tracing by selecting Trace again. If tracing was turned on in the
Troubleshooting dialog box, you should clear the Trace Initially On option as
soon as possible. Otherwise, whenever the Exceed X server is restarted,
tracing begins again.
After the system performs a trace, disassemble the trace file to read it as a
text file in Notepad. Xdis performs the disassembly process for you and lets
you filter the data content of the disassembly.
Transport Monitor
The Transport Monitor application (in the Exceed Tools folder) lets you
monitor network connections by displaying all current connection activity.
Use it to locate connections that are frozen. After you close a connection,
the Transport Monitor should reflect this change. If the Transport Monitor
continues to display a connection you have closed, then the connection is
frozen.
259
Appendix A
Connectivity Applications
Accessories
263
HostExplorer Accessories
264
System Administration
266
Accessories
To quickly locate the online help for an Accessory, open the application and
click help from within the application.
Directory Services Explorer This application lets you browse NIS, NIS+,
and LDAP directory services without leaving the familiar Windows
environment. Using Directory Services Explorer, you can bind your
machine to multiple domains simultaneously, browse object contents and
properties, run selective or global queries, and change your password in a
directory service domain.
Hummingbird Directory Services This application lets you configure
the NIS, NIS+, and LDAP settings for Hummingbird Connectivity
applications. All directory service queries made by Hummingbird
Connectivity applications target the domains specified and selected by you.
Hummingbird Directory Services also lets you synchronize your Windows
and UNIX passwords and select a target service for host name resolution.
Finger This application returns information about the users of a
particular computer. You can display information about a specific user, or
all users currently logged onto a particular computer.
Host Editor This application lets you edit and manage a list of IP
addresses and associated machine names. This information is contained in
the HOSTS file on your PC.
Hummingbird Basic This is a command language included with
Hummingbird products. Hummingbird Basic can be used to create scripts
for frequently performed tasks that you would like to automate. For details,
refer to the Hummingbird Basic Language Programmers Guide.
Launch Pad This application lets you launch applications and manage
application windows. It includes a graphical menu-building facility that lets
you customize your environment, and a Virtual Desktop that increases the
size of the Windows display workspace.
Network Time This application lets you synchronize the time on your PC
with the Network Time Server.
NSLookup This application finds and displays information about hosts
in a domain.
263
Ping This is a diagnostic tool that lets you quickly check the integrity of a
network communications path and your TCP/IP configuration. Ping sends
Internet Control Message Protocol (ICMP) echo requests to specified
machines and displays the response in graphical form.
Remote Tools This application is an integrated version of several UNIX
commandsRemote Shell, Remote Exec, Remote Copy (RSH) and Remote
Copy (REXEC). You can execute commands and copy files to or from other
machines on the network using the RSH and REXEC protocols.
Tar This application lets you easily transfer entire directories and their
contents to an Archive file, usually for backup purposes. You can create local
and remote Archive files and restore them to your PC at any time.
Traceroute This application shows the route that packets take to the host.
It lets you test, troubleshoot, and manage network connections and find the
route used to connect to a specific host.
Whois This application lets you query the central user name directory
service maintained by the InterNIC (Network Information Center)
Registration Service for an entry name. The InterNIC Registration Services
Host contains Internet information (Networks, ASNs, Domains, and POCs)
for non-military users. For military information, use the Whois server at
NIC.DDN.MIL or MILNET.
HostExplorer Accessories
For more information on all of these applications, see the HostExplorer
(Host Access) Users Guide.
HostExplorer TN3270 This application emulates an IBM mainframe
(including 3179G, 3472G, 3278, and 3279 models), runs 3270 applications,
and transfers files between a host machine and your PC using the
IND$FILE file transfer application.
HostExplorer TN5250 This application emulates IBM AS/400 systems
and runs 5250 applications.
264
265
System Administration
Hummingbird Inetd Inetd is a super-daemon that lets you enable and
disable various daemon services through a single application. It determines
the network services to which your PC responds when a client makes a
network request. In a Windows 95/98/2000 environment, Inetd runs
automatically when placed in the Startup folder. The Startup folder is the
usual location for Inetd. For more information, see System
AdministrationInetd and Inetd Admin.
Jconfig Jconfig is a remote configuration tool that system administrators
can use to configure the Hummingbird applications on any network host
running a Jconfig Daemon. Jconfig offers a variety of configuration options.
You can create application-specific profiles for users, install shortcuts on
user desktops, monitor and log user activities, and send messages to user
machines. As well, you can use Jconfig to configure remote PCs one at a
time or to create script files that, when played, customize the configuration
of multiple remote PCs. For more information, see System
AdministrationSconfig and Jconfig.
Sconfig Sconfig is a wizard that lets you customize the installation of
software on local and network machines. With Sconfig, you can configure
the install in the following ways:
266
SOCKS Information This link in the Star t menu launches an HTML file
that contains information on what SOCKS is, what it does, and how to use
it.
Update Hummingbird Use this application to install the latest patch to
your product. For more information, see your installation chapter.
Web Update Use this application to modify the connection settings for
updating the product. This application is not available if you performed a
personal installation without Administrator privileges. Instead, an HTML
file is created that links to a Web site for Hummingbird updates.
267
Index
Numerics
5250 File Transfer Wizard ........................... 265
A
about .mst files............................................. 145
about package files....................................... 145
accessibility features......................................... 7
directional arrow keys .............................. 7
Enter key................................................... 7
Esc key ...................................................... 7
in Microsoft Windows ............................. 8
Keyboard shortcuts .................................. 7
Spacebar ................................................... 7
Tab key sequence ..................................... 7
ToolTips ................................................... 8
accessing the font server .............................. 133
accessories.................................................... 263
Finger ................................................... 263
Host Editor........................................... 263
Hummingbird Basic............................. 263
Launch Pad........................................... 263
Network Time ...................................... 263
NSLookup ............................................ 263
Ping....................................................... 264
Remote Tools ....................................... 264
Tar ........................................................ 264
Traceroute ............................................ 264
Whois ................................................... 264
B
balancing system loads...................................97
base DN ........................................................238
binding to a domain
LDAP ....................................................235
NIS ........................................................229
NIS+......................................................230
overview ................................................224
using user vs. machine credentials .......231
BOOTPTAB configuration file
configuration information ...................205
entry format ..........................................205
broadcast address .........................................121
defining .................................................121
browser
specifying ..............................................183
270
browsing
for applications ...................................... 68
for hosts.................................................. 68
buttons, configuring the mouse .................. 110
C
CA certificate
definition.............................................. 236
installing ............................................... 236
caching a password........................................ 96
CDE
overview ................................................. 79
starting.................................................... 79
Certificate Authority (CA) .......................... 235
changing default password .......................... 180
Chinese environments................................. 138
Chinese, Japanese, & Korean Input.
See CJK Input
choosing setup types...................................... 23
CJK
input methods...................................... 136
input, Xconfig ...................................... 136
client
installing Jconfig on ............................. 177
Client Wizard
using ....................................................... 63
Client Wizard, overview .................................. 5
client-side installer......................................... 15
command line
Exceed X server parameters ................. 124
running an Xstart file ............................. 76
window manager startup ....................... 86
command line applications
Hummingbird Directory Services ....... 244
command macros in Xstart........................... 95
commands, window managers...................... 86
Common Desktop Environmen. See CDE
Communication application, Xconfig ........ 113
components, defined..................................... 18
configuration file ......................................... 107
configuration session
locking .................................................. 185
opening................................................. 179
Index
configuring
four screens .......................................... 122
host database ........................................ 181
Jconfig application settings .................. 180
Jconfig Daemon settings ...................... 181
Jconfig services ............................. 175177
log settings............................................ 183
multiple hosts using scripts.................. 184
remote hosts, introduction .................. 174
remote services for host ....................... 183
the mouse ............................................. 110
X screens............................................... 122
connecting
Broadway and LBX .............................. 103
to administration host.......................... 179
to hosts ................................................... 63
to remote host ...................................... 179
connections, setting sequence of events...... 113
Copy Image,
administrative installation .............. 37
copying and pasting
overview ................................................. 87
automatically.......................................... 92
between X clients.................................... 91
data ................................................... 8889
graphics .................................................. 89
storage buffer.......................................... 87
to input CJK text .................................. 138
creating ........................................................ 258
a password cache .................................... 96
a security file......................................... 117
font aliases ............................................ 133
multiple installations....................146, 173
startup file............................................... 64
startup file, Wstart.................................. 65
Wstart file ............................................... 78
Xstart shortcut........................................ 75
current user
user files.................................................. 25
custom installations
directories .............................................148
Exceed properties .................................148
features..................................................148
files ........................................................148
font directories and servers ..................149
font paths ..............................................149
NFS properties......................................148
properties..............................................148
registry ..................................................148
shortcuts ...............................................148
customizing
the keyboard .........................................108
D
daemon services ...........................................192
BOOTPd...............................................193
Fingerd..................................................194
FTPd .....................................................194
LPD .......................................................196
Telnetd..................................................197
TFTPd...................................................200
Timed....................................................201
Tnamed.................................................201
Xstartd ..................................................198
Daemon Settings service, Jconfig.................176
database, configuring host ...........................181
DECnet transports, using ............................141
DECwindows compatibility.........................120
default
configuration file ..................................107
default installation language ..........................19
default password
changing ...............................................180
defining a broadcast address........................121
deleting
a password cache ....................................97
a screen .................................................123
Xscreens ................................................122
destination folder, installation .......................24
diagnostics, Exceed ......................................256
271
272
dynamic-link library
for reading .msi file ................................ 15
E
editing
font database ........................................ 131
fonts...................................................... 132
Editor service, Jconfig.................................. 175
enabling
host access ............................................ 116
protocol extensions .............................. 120
Environmental Settings service, Jconfig...... 175
environments
Chinese................................................. 138
Exceed
available products .................................... 6
diagnostics............................................ 256
included applications ............................... 4
on a remote PC .................................... 103
Exceed 3D ........................................................ 6
Exceed configuration service, Jconfig ......... 176
Exceed properties, setting with Sconfig
adding, modifying,
or removing .....................148, 162, 163
Exceed X Development Kit ............................. 6
Exceed X Server
overview ................................................... 5
and Input Method server ..................... 137
configuring ........................................... 119
resetting .................................................. 82
Expos Online................................................ 50
Extend, modifying settings.......................... 118
F
feature tree ..................................................... 33
features
defined.................................................... 18
features, selecting with Sconfig ........... 148, 150
adding................................................... 151
modifying ............................................. 151
removing .............................................. 151
file sequence for Xsession............................ 102
File service, Jconfig ...................................... 175
Index
G
General tab................................................... 181
GNOME. See GNU Network Object
Model Environment
H
Help..................................................................9
opening .................................................183
host
configuring database ............................181
configuring multiple using scripts .......184
configuring remote services .................183
installing Jconfig on..............................177
opening a connection ...........................179
Host Editor...................................................263
host list file
syntax ......................................................74
host lookups
NIS maps ..............................................229
specifying a target service .....................242
host, Jconfig .................................................175
administration ......................................175
HostExplorer Applications ..........................264
5250 File Transfer Wizard ....................265
FTP .......................................................265
FTP for Windows Explorer ..................265
HostExplorer Telnet .............................265
HostExplorer TN3270 ..........................264
HostExplorer TN5250 ..........................264
Hummingbird Neighborhood .............266
Line Printer Query................................265
Line Printer Requester..........................265
Macro and Profile Converter ...............265
PrintExplorer ........................................265
WyseTerm ............................................265
HostExplorer settings service, Jconfig .........176
hosts
browsing for............................................68
load balancing.........................................97
optimizing loads .....................................97
restricting access ...................................116
Hummingbird accessibility..............................7
Hummingbird Basic ....................................263
273
I
improving system performance ...................128
Inetd
overview ................................................189
TCP and UDP servers...........................189
Inetd Admin
directory permissions ...........................213
granting anonymous FTP access..........215
maintaining system security .................190
removing access rights..........................214
specifying access rights .........................211
274
Inetd configuration
adding/deleting Services ...................... 202
configuring services.............................. 202
enabling/disabling services .................. 201
logging server activity........................... 203
reloading updated configuration ......... 203
restoring default services...................... 203
Inetd configuration parameters
BOOTPD.LOG File ............................. 204
BOOTPTAB Configuration File.......... 205
Destination Folder ............................... 204
information resources, Hummingbird .....8, 11
documentation......................................... 8
mailing lists ......................................10, 11
Technical Support.................................... 9
information, logging administrative ........... 183
.ini file service, Jconfig................................. 176
input method server .................................... 137
Install service, Jconfig .................................. 176
installation
advertised ............................................... 42
cross-platform from
shared image ...................................... 47
current user versus "All Users" .............. 26
default language ..................................... 19
destination folder ................................... 24
feature options (install state) ................. 33
from shared image ................................. 47
Master Setup .......................................... 22
personal, as Administrator..................... 41
personal, overview.................................. 40
personal, without
Administrator privileges.................... 40
requirements .......................................... 21
scenarios ........................................... 4047
setup type ............................................. 145
setup types.............................................. 23
shared ..................................................... 46
silent ....................................................... 43
third party add-ons ................................ 22
troubleshooting.................................... 253
user directory ......................................... 24
Index
installation files
dynamic-link library (.dll) ...............15, 17
package file (.msi) .................................. 17
package file (.msi) defined ..................... 15
transform (.mst)..................................... 15
transform (.mst) files ............................. 19
installation modes, overview ......................... 15
installing a shortcut
Xsession................................................ 102
Xstart ...................................................... 75
installing Jconfig .......................................... 177
client software ...................................... 177
Daemon................................................ 177
installing Jconfig on
administration host.............................. 177
client ..................................................... 177
remote hosts ......................................... 177
installing on Terminal Server
creating administrative
copy image ................................... 5355
personal installation ......................... 5558
interacting with Hummingbird users ........... 10
Jconfig services
configuring ...................................175177
Daemon Settings ..................................176
Editor ....................................................175
Environment Settings...........................175
Exceed configuration............................176
File.........................................................175
Font Database .......................................176
HostExplorer settings ...........................176
.ini file ...................................................176
Install ....................................................176
Java property.........................................176
Message.................................................175
NFS Maestro Client ..............................176
NFS Maestro Gateway ..........................177
Registry .................................................176
System Information..............................175
Xstart.....................................................177
joining Hummingbird
mailing lists.............................................10
User Group .............................................11
K
J
Java browser
Jconfig configuration for...................... 178
Java property service, Jconfig ...................... 176
Java Runtime Environment (JRE), Sun ........ 22
Jconfig .......................................................... 266
administration host.............................. 175
Client .................................................... 174
configuring Daemon settings............... 181
configuring Java browser for................ 178
configuring remote hosts ..................... 174
host ....................................................... 175
installing ............................................... 177
installing software ................................ 177
introduction ......................................... 174
locking configuration session .............. 185
opening Help........................................ 183
running from browser.......................... 178
K Desktop Environment................................79
KDE. See K Desktop Environment
keyboard
customizing ..........................................108
Keyboard Input application, Xconfig ..........108
Keyboard shortcuts ..........................................7
keylogin
failure ....................................................234
running .................................................243
using a user profile ...............................234
using the system profile ........................234
L
Launch Pad...................................................263
launching personal installation
as Administrator .....................................41
without Administrator privileges ...........40
275
LDAP
authentication.......................................235
bind options..........................................235
definition ..............................................222
entries....................................................223
objects ...................................................223
posixAccount class................................223
query order ...........................................239
server architecture ................................224
specifying an LDAP domain.................238
specifying user credentials ....................239
version 2 vs. version 3...........................235
Lightweight Directory
Access Protocol (LDAP) ...............222
Line Printer Query .......................................265
Line Printer Requester .................................265
Linux
desktop environments ............................79
GNOME .................................................79
KDE ........................................................79
load optmization ............................................71
loading
resource databases ..................................81
locale name
specifying ..............................................137
locking configuration session ......................185
log files..........................................................258
analysing ...............................................258
logging administrative information.............183
logging in to CDE ..........................................79
Logging tab...................................................181
login macros in Xstart....................................95
command................................................95
user ID and password .............................95
login, special for Xstart ..................................96
LPQ. See Line Printer Query.
LPR. See Line Printer Requester.
M
Macro and Profile Converter .......................265
276
Index
.mst files
about..................................................... 146
saving.................................................... 172
using Sconfig ........................................ 146
Windows Installer ................................ 146
mst files
applying ................................................ 172
multi-language support ................................. 19
options.................................................... 20
multiple hosts
configuring using scripts...................... 184
multiple window mode ................................. 81
multiple X displays ...................................... 124
multiple Xstart sessions per host................... 98
MWM. See Microsoft Windows manager
O
opening
configuration session............................179
Jconfig Help..........................................183
.msi files ................................................147
.mst files ................................................147
Sconfig ..................................................147
Wstart .....................................................78
Xstart.......................................................65
opening directory services applications.......221
optimizing load ..............................................71
overview
installation modes ..................................15
installing on Terminal Server .................53
setup types ..............................................23
Windows Installer...................................15
N
Network Information System (NIS) ........... 222
Network Time.............................................. 263
NFS Maestro Gateway service, Jconfig........ 177
NFS Maestro
Client Configuration, Jconfig....... 176
NFS properties, setting with Sconfig
adding, modifying,
or removing .............................148, 163
nfs register command .................................. 234
NIS
bind options ......................................... 229
definition.............................................. 222
objects................................................... 223
query order........................................... 229
server types ........................................... 224
specifying an NIS domain.................... 230
NIS+
bind options ......................................... 230
definition.............................................. 222
objects................................................... 223
query order........................................... 233
server types ........................................... 224
specifying an NIS+ domain ................. 232
NIS+ Login dialog box ................................ 234
NSLookup.................................................... 263
P
package file .....................................................15
about customizing ....................... 146, 147
parameters
Exceed X server.....................................124
Wstart .....................................................78
Xstart.......................................................77
passive mode, overview................................113
password
changing default ...................................180
password cache
creating ...................................................96
deleting ...................................................97
password, changing in Xconfig....................115
pasting data ....................................................88
patching Hummingbird products ...............267
PC, remote configuration of ........................174
Performance application, Xconfig...............128
personal installations, overview .....................40
Ping ..................................................... 225, 264
policy file
syntax ....................................................117
posting to Hummingbird User Group ..........11
Power Management application, Xconfig ...127
preserving user profiles ..................................48
PrintExplorer ...............................................265
277
product features
defined ....................................................18
feature tree, viewing................................33
products
defined ....................................................17
supported languages ...............................20
Program group
installing an Xsession shortcut .............102
installing an Xstart shortcut ...................75
program maintenance....................................35
modifying install state.............................35
removing.................................................36
repairing..................................................36
progress messages, analysing .......................256
properties, setting with Sconfig .......... 148, 155
adding ...................................................155
modifying..............................................156
removing...............................................157
Protocol application, Xconfig ......................119
protocol extensions, enabling ......................120
Q
query order
LDAP ....................................................239
NIS ........................................................229
NIS+......................................................233
random .................................................234
querying directory services ..........................245
R
recording scripts...........................................184
registering the product...................................50
registry keys, setting with Sconfig ....... 148, 158
adding ...................................................158
modifying..............................................159
removing...............................................160
Registry service, Jconfig ...............................176
release notes .....................................................9
remote
configuration information ...................174
278
remote host
configuring services.............................. 183
installing Jconfig on ............................. 177
opening connection ............................. 179
remote hosts
configuring multiple using scripts ....... 184
remote PC
using Exceed......................................... 103
Remote Tools............................................... 264
remote window managers, starting ............... 85
removing...................................................... 148
features ................................................. 151
files ....................................................... 154
font directories ..................................... 168
font files................................................ 168
font servers ........................................... 171
registry keys.......................................... 160
replica servers .............................................. 224
requirements for installation......................... 21
resource databases
loading.................................................... 81
resources, Hummingbird information .....8, 11
documentation......................................... 8
mailing lists ......................................10, 11
Technical Support.................................... 9
restricting configuration session ................. 185
restricting host access .................................. 116
root window
setting size ........................................82, 83
running
an Xsession file ..................................... 101
an Xstart file ........................................... 76
multiple Exceed X servers .................... 124
multiple files in an Xsession................. 101
multiple Xstart sessions per host ........... 98
Xstart files from command line ............. 76
S
saving
a password .............................................. 96
an .mst file ............................................ 172
saving query results...................................... 247
Index
279
Setup Wizard
administration mode ..............................46
advertisement mode ...............................43
overview of modes ..................................15
Shared Image, administrative
installation.......................................37
shared installation ..........................................46
shortcuts
installing, Xsession ...............................102
installing, Xstart......................................75
Keyboard...................................................7
setting with Sconfig ..................... 148, 161
silent installation ............................................43
single window mode ......................................80
slave servers ..................................................224
SMS, Microsoft System
Management Server ........................44
SOCKS Information ....................................267
software installation of Jconfig
client......................................................177
Daemon ................................................177
software installation on Jconfig
administration host ..............................177
client......................................................177
hosts ......................................................177
sorting query results.....................................246
specifying
a vendor string ......................................120
locale name ...........................................137
SSL. See Secure Socket Layer
standby function ..........................................127
starting
a host session ..........................................63
a window manager..................................85
an xterm..................................................67
CDE ........................................................79
remote window managers ......................85
startup commands, window managers..........86
startup file
creating for Xstart ...................................64
Wstart (settings.ws) ................................78
Xstart (settings.xs) ..................................77
280
T
tabs
General ................................................. 181
Logging................................................. 181
Services ................................................. 181
Tar................................................................ 264
TCP/IP transports, using............................. 141
Technical Support ........................................... 9
Telnet ........................................................... 265
Telnetd......................................................... 211
temporary storage buffer ............................... 87
terminal emulator, selecting.......................... 66
Terminal Server
installing the
Hummingbird product ..................... 53
uninstalling the
Hummingbird product ..................... 58
TN3270 ........................................................ 264
TN5250 ........................................................ 264
tools, system administration ....................... 266
Hummingbird Inetd ............................ 266
Jconfig .................................................. 266
Sconfig.................................................. 266
SOCKS Information ............................ 267
Update Hummingbird......................... 267
trace files ...................................................... 258
Traceroute.................................................... 264
Index
transform files
about..................................................... 146
applying ........................................146, 172
creating.................................146, 147, 173
transform files (.mst),
Setup Wizard .................................. 15
transform files, language ............................... 19
Transport Monitor
overview ................................................... 6
using ..................................................... 259
Transports application, Xconfig.................. 121
Troubleshooting
Finger ................................................... 263
NSLookup ............................................ 263
Ping....................................................... 264
Traceroute ............................................ 264
Whois ................................................... 264
troubleshooting
Exceed diagnostics ............................... 256
installation............................................ 253
log and trace ......................................... 258
log file, (Troubleshooting)................... 258
logs and trace operations ..................... 258
progress messages ........................ 256257
Transport Monitor............................... 259
Xstart .................................................... 256
troubleshooting connections
checking log status information .......... 183
tuning the system......................................... 130
U
uninstalling from Terminal Server................ 58
UNIX
/etc files................................................. 223
changing a password ............................ 249
synchronizing UNIX and
Windows passwords ........................ 242
Update Hummingbird ................................ 267
updating the product.............................49, 267
user directory, installation............................. 24
user files
for connectivity products....................... 25
per-machine and per-user ..................... 25
V
vendor string, specifying ..............................120
Video application, Xconfig ..........................123
viewing
font database.........................................131
log files ..................................................258
off-screen client windows.......................81
scroll bars................................................84
X window manager menus.....................83
viewing directory service objects..................247
VMS systems
DECnet transports................................141
TCP/IP transports ................................141
Xstart and Wstart .................................141
VMS, using Xstart ........................................141
W
WebUpdate ....................................................49
Whois ...........................................................264
window managers ..........................................82
HWM......................................................85
Microsoft Windows................................85
Native, X, Default types..........................85
overview..................................................84
Remote X ................................................85
starting HWM or MWM........................85
starting remote managers .......................85
startup commands..................................86
window modes
overview..................................................80
configuring generic.................................81
configuring multiple...............................82
configuring single ...................................83
multiple...................................................81
options ..............................................8184
single .......................................................80
281
Windows Installer
benefits....................................................16
installation and configuration ................21
overview ..................................................15
What is it? ...............................................15
Windows Installer Database file.
See .msi files
workstation installations................................37
Wstart
creating a startup file ..............................65
creating a Wstart file...............................78
parameters ..............................................78
running multiple sessions.......................99
start method............................................65
using on VMS systems..........................141
WyseTerm ....................................................265
X
X client
copying and pasting data........................91
X screens, modifying....................................122
X Selection application, Xconfig..................126
X selection type, setting................................126
X web............................................................103
X Windows systems, overview.........................4
xauth, creating..............................................117
282
Xconfig......................................................... 107
overview ...........................................5, 107
changing the password......................... 115
controlling host access ......................... 116
creating a security file........................... 117
setting security...................................... 114
Xconfig applications
CJK Input ............................................. 136
Communication................................... 113
Font ...................................................... 130
Keyboard Input .................................... 108
Mouse Input......................................... 110
Performance......................................... 128
Power Management ............................. 127
Protocol................................................ 119
Screen Definition ................................. 122
Security................................................. 114
Transports ............................................ 121
Video .................................................... 123
X Selection............................................ 126
Xdis .............................................................. 259
XDM mode, overview ................................. 114
XDMCP modes, overview........................... 113
Xperf ............................................................ 130
Xsession
overview .............................................5, 99
file sequence ......................................... 102
installing a shortcut.............................. 102
running multiple sessions ...................... 99
running the file..................................... 101
Xdis
overview ................................................... 6
Index
Xstart
overview ................................................... 5
about the Xstart window........................ 65
browsing for hosts.................................. 68
command macros .................................. 95
creating a startup file........................64, 65
deleting a password cache ...................... 97
installing a shortcut................................ 75
login macros........................................... 95
opening................................................... 65
optimizing system loads......................... 97
parameters.............................................. 77
program type.......................................... 66
prompt ................................................... 67
running a file .......................................... 76
running multiple sessions ...................... 99
running multiple sessions per host ........ 98
start method ........................................... 65
universal login ........................................ 96
using on VMS....................................... 141
using on VMS systems ......................... 141
Y
ypwhich command ......................................225
283
Notes
Notes
Notes
Notes
Notes