Cluster I/O Protocols (CIP) Configuration and Management Manual (H06.16+, J06.05+)

Configure the Eth1 Through Eth5 Interfaces (Does Not Apply to Storage CIP)..................................65
Configure CLIM-To-CLIM Failover (Applies to IP CIP Only, Not Storage CIP)....................................66
Check Network Applications (Does Not Apply to Storage CIP).....................................................68
3 CIP Configuration and Management...........................................................69
Using Linux Commands and Custom CIP Commands...................................................................69
Entering CIP Commands..........................................................................................................71
Errors...............................................................................................................................72
Configuring CIP......................................................................................................................72
On the NonStop Host System..............................................................................................72
On the CLIM.....................................................................................................................81
Policy Based Routing...............................................................................................................81
Troubleshooting Routing......................................................................................................85
Displaying the CIP Configuration..............................................................................................86
On the NonStop Host System..............................................................................................86
On the CLIM.....................................................................................................................86
Displaying Man Pages for CIP Commands.................................................................................93
Monitoring CIP.......................................................................................................................94
On the NonStop Host System..............................................................................................94
On the CLIM.....................................................................................................................94
Configuring Bonded Interface Failover (IP CIP)............................................................................94
Configuring CLIM-to-CLIM Failover (IP CIP).................................................................................95
Replicating the Configurations from One CLIM to Another CLIM....................................................99
Using the CLIMCMD /IN/ run-option...................................................................................99
Starting and Restarting CIP....................................................................................................100
Starting CIP on the NonStop Host System............................................................................100
Starting CIP on the CLIM...................................................................................................101
Starting the IP Applications (IP CIP Only).............................................................................101
Restarting CIP on the NonStop Host System.........................................................................102
Restarting CIP on the CLIM................................................................................................102
Controlling Interface States (IP CIP).........................................................................................102
Activating an Interface......................................................................................................102
Deactivating an Interface..................................................................................................103
Configuring IPSec (IP CIP)......................................................................................................104
Installing X.509 Certificates...............................................................................................104
Setting Up Links to the Certificate Revocation List (CRL) and to the Certificate Authority (CA).......105
Configuring Pre-Shared Keys.............................................................................................105
Configuring Security Policies..............................................................................................105
Configuring Security Associations.......................................................................................106
Configuring Remote Information.........................................................................................106
Controlling the Virtual Private Network (VPN)......................................................................107
Using IPSec.....................................................................................................................107
Configuring Transport of Authentication Events from CLIM..........................................................108
Checking the Status of the Collector $ZCLA ........................................................................108
Starting the Collector........................................................................................................108
Adding the Collector........................................................................................................108
Viewing the Events in the Collector $ZCLA..........................................................................108
Retrieving the Events from the $ZCLA by an Application........................................................109
Deleting the Collector.......................................................................................................109
Configuring CIP iptables/ip6tables (IP CIP)..............................................................................109
Configuring climiptables...................................................................................................109
Configuring iptables/ip6tables..........................................................................................110
Examples........................................................................................................................110
Configuring Stream Control Transmission Protocol (SCTP) (IP and Telco CIP).................................112
Round-Robin Filtering.............................................................................................................112
4 Contents