SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
Configure SAProuter without SNC
Starting SAProuter
To start SAProuter: from the UNIX prompt, enter saprouter -r.
This command starts SAProuter and loads the file saprouttab (router permission table), which
defines access control. If this file does not exist, you need to create it.
A route permission table must be used as of version 25 of the SAProuter.
You can start SAProuter automatically when you start the system. In UNIX, for example, change
your file /etc/rc accordingly.
The main SAProuter commands are:
saprouter: Display a complete list of the SAProuter parameters (all options and
examples of a route permission table) on your screen
saprouter -r: Start SAProuter
saprouter -s: Stop SAProuter
Testing Basic SAProuter Functions
Before you work with SAProuter, you should check for any network problems.
You will need the programs saprouter and niping, and three open windows (shells) on one or
more computers.
Start SAProuter in window 1 (on host1) by entering the command: saprouter -r.
This command starts SAProuter without parameters.
Refer also to the online help for a complete list of SAProuter commands. To get online
help, type saprouter.
In window 2 (host2), start the test program niping to emulate a test server by entering the
command: niping -s
In window 3 (host3), start the test program niping to emulate a client by entering the
command: niping -c -H host2
This command tests the connection without the SAProuter, that is directly between host
2 and host 3.
In window 3, restart the test program niping by entering the command: niping -c -H
/H/host1/H/host2
This command tests the connection with SAProuter. A host name is interpreted as a
route (via one or more SAProuters to the server), if the host name is preceded with /H/.
In steps 3 and 4 several data packets are sent to the server and then returned by the
server.
Self-Test for the Local Host
To carry out a self-test for the local host:
Stop all active niping servers and clients
Enter the command niping -t
A list is displayed with function names, parameters and return codes.
The following message appears if the self-test is successful: "*** SELFTEST O.K. ***"
Define Passwords & Authorizations in SAProuter
You set passwords and access permissions for your system in user-defined files known as route
permission tables. You use a standard text editor to create a route permission table.
You can allow access to and from specified application servers in your LAN via your SAProuter.
You can also password protect the routes you define. To do this, you must create and configure
a separate route permission table for each SAProuter in your network.
A route permission table contains the host names and port numbers of the preceding and
subsequent point of the route, and any passwords required to make the connection.
Entries in a route permission table look like this:
< P/D> <source-host> <dest-host> <dest-serv> <password>
Here, <source-host> and <dest-host> could be SAProuters.
P(ermit) allows SAProuter to build the connection. P(ermit) entries can include a password.
SAProuter checks that this password matches the password sent by the client.
D(eny) prevents the connection from being built.
You can also include comment lines, which must begin with ‘#'.
If a client of <source-host> wants to connect with <dest-host> <dest-serv> via a SAProuter, the
SAProuter checks its route permission before making the connection. If the password and route
that SAProuter receives are identical to the entries in the route permission table, SAProuter will
make the connection. If the passwords are not identical, SAProuter will not make the
connection.
If no route permission table was assigned explicitly to the SAProuter, ./saprouttab is used. If this
file is not available, connections are made without a check, that is, all connections are allowed.
You can include wildcards ("*") in hosts, ports and passwords.
You can include subnetworks in host routes.
Examples:
Address Description
156.56.*.* all host addresses beginning with 156.56
133.27.17.* all host addresses beginning with 133.27.17
156.56.1011xxxx all host addresses from 156.56.176.* to 156.56.191.*.
(This is a binary interpretation of the third byte of the address. ‘x' is a binary wildcard.)
You can display a sample route permission table on your screen. To do this, call the SAProuter
online help: saprouter.
If there are several suitable entries, the first one is selected. This is important for the sequence
of the permit/deny rules.
Additional SAProuter Options
Getting SAProuter information from remote computers
You can display a list of all currently active clients in an active SAProuter.
To get a list of the clients for an active SAProuter:
Enter the command: saprouter -l -H host -P password.
If required, you can define a password in the route permission table. If no host name is
specified, the program will connect via localhost to the SAProuter on the same host. If the query
does not come from the same host, the SAProuter checks whether its route permission table
allows the combination: <other_host> localhost <router_service>. This entry can also include a
password. The password is checked against the information password sent by the calling
program. The host name can also contain a route.
Logging connections
connection from (client name / address)
connection to (partner name / address)
partner service
start time
end time
connection requests rejected by the route permission table
Changing the name of the route permission table
When you start your SAProuter, you can enter a route permission table differing from the default
setting "saprouttab" using the option -R: saprouter -r -R aclfile (aclfile is the name of the file
contained in the route permission table). This is helpful when you need multiple route
permission profiles.
Changing the timeout default value for connection setup
When you start your SAProuter, you can change the default timeout setting of five seconds for
the connection setup using the option -W: saprouter -r -W timeout (timeout is the new timeout in
milliseconds). Use this option if you have problems with dynamically established connections via
ISDN or network providers.

Contenu connexe

Similaire à SAP_ROUTER.pdf

Command.pptx presentation
Command.pptx presentationCommand.pptx presentation
Command.pptx presentationAkshay193557
 
IBM MQ Channel Authentication
IBM MQ Channel AuthenticationIBM MQ Channel Authentication
IBM MQ Channel AuthenticationIBM Systems UKI
 
Samba server configuration
Samba server configurationSamba server configuration
Samba server configurationRohit Phulsunge
 
Palo Alto Networks authentication
Palo Alto Networks authenticationPalo Alto Networks authentication
Palo Alto Networks authenticationAlberto Rivai
 
WebSphere MQ CHLAUTH - including V8 changes
WebSphere MQ CHLAUTH - including V8 changesWebSphere MQ CHLAUTH - including V8 changes
WebSphere MQ CHLAUTH - including V8 changesMorag Hughson
 
Apache Cassandra, part 3 – machinery, work with Cassandra
Apache Cassandra, part 3 – machinery, work with CassandraApache Cassandra, part 3 – machinery, work with Cassandra
Apache Cassandra, part 3 – machinery, work with CassandraAndrey Lomakin
 
Mongodb connection string
Mongodb connection stringMongodb connection string
Mongodb connection stringPravin Dwiwedi
 
Deploy Rails Application by Capistrano
Deploy Rails Application by CapistranoDeploy Rails Application by Capistrano
Deploy Rails Application by CapistranoTasawr Interactive
 
Map serverinstallation1.5.1
Map serverinstallation1.5.1Map serverinstallation1.5.1
Map serverinstallation1.5.1Neelima Kapoor
 
Arp Dan Ipconfig Syntax
Arp Dan Ipconfig  SyntaxArp Dan Ipconfig  Syntax
Arp Dan Ipconfig Syntaxguestcc37e8c
 
Spray - Build RESTfull services in scala
Spray - Build RESTfull services in scalaSpray - Build RESTfull services in scala
Spray - Build RESTfull services in scalaSandeep Purohit
 
General configurations on apache directives included in the httpd.conf file
General configurations on apache directives included in the httpd.conf fileGeneral configurations on apache directives included in the httpd.conf file
General configurations on apache directives included in the httpd.conf fileCognizant
 
Components of computer systems often have dependencies--other co.pdf
Components of computer systems often have dependencies--other co.pdfComponents of computer systems often have dependencies--other co.pdf
Components of computer systems often have dependencies--other co.pdfalamodeindia1
 

Similaire à SAP_ROUTER.pdf (20)

Meeting 9 samba
Meeting 9   sambaMeeting 9   samba
Meeting 9 samba
 
Command.pptx presentation
Command.pptx presentationCommand.pptx presentation
Command.pptx presentation
 
IBM MQ Channel Authentication
IBM MQ Channel AuthenticationIBM MQ Channel Authentication
IBM MQ Channel Authentication
 
Samba server configuration
Samba server configurationSamba server configuration
Samba server configuration
 
Proxy
ProxyProxy
Proxy
 
Backtrack Manual Part3
Backtrack Manual Part3Backtrack Manual Part3
Backtrack Manual Part3
 
Palo Alto Networks authentication
Palo Alto Networks authenticationPalo Alto Networks authentication
Palo Alto Networks authentication
 
WebSphere MQ CHLAUTH - including V8 changes
WebSphere MQ CHLAUTH - including V8 changesWebSphere MQ CHLAUTH - including V8 changes
WebSphere MQ CHLAUTH - including V8 changes
 
Apache Cassandra, part 3 – machinery, work with Cassandra
Apache Cassandra, part 3 – machinery, work with CassandraApache Cassandra, part 3 – machinery, work with Cassandra
Apache Cassandra, part 3 – machinery, work with Cassandra
 
Mongodb connection string
Mongodb connection stringMongodb connection string
Mongodb connection string
 
Ch09
Ch09Ch09
Ch09
 
Apache HTTP Server
Apache HTTP ServerApache HTTP Server
Apache HTTP Server
 
Http
HttpHttp
Http
 
Deploy Rails Application by Capistrano
Deploy Rails Application by CapistranoDeploy Rails Application by Capistrano
Deploy Rails Application by Capistrano
 
Spray
SpraySpray
Spray
 
Map serverinstallation1.5.1
Map serverinstallation1.5.1Map serverinstallation1.5.1
Map serverinstallation1.5.1
 
Arp Dan Ipconfig Syntax
Arp Dan Ipconfig  SyntaxArp Dan Ipconfig  Syntax
Arp Dan Ipconfig Syntax
 
Spray - Build RESTfull services in scala
Spray - Build RESTfull services in scalaSpray - Build RESTfull services in scala
Spray - Build RESTfull services in scala
 
General configurations on apache directives included in the httpd.conf file
General configurations on apache directives included in the httpd.conf fileGeneral configurations on apache directives included in the httpd.conf file
General configurations on apache directives included in the httpd.conf file
 
Components of computer systems often have dependencies--other co.pdf
Components of computer systems often have dependencies--other co.pdfComponents of computer systems often have dependencies--other co.pdf
Components of computer systems often have dependencies--other co.pdf
 

Dernier

Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLionel Briand
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxAndreas Kunz
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 

Dernier (20)

Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and Repair
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Advantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessAdvantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your Business
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 

SAP_ROUTER.pdf

  • 1. Configure SAProuter without SNC Starting SAProuter To start SAProuter: from the UNIX prompt, enter saprouter -r. This command starts SAProuter and loads the file saprouttab (router permission table), which defines access control. If this file does not exist, you need to create it. A route permission table must be used as of version 25 of the SAProuter. You can start SAProuter automatically when you start the system. In UNIX, for example, change your file /etc/rc accordingly. The main SAProuter commands are: saprouter: Display a complete list of the SAProuter parameters (all options and examples of a route permission table) on your screen saprouter -r: Start SAProuter saprouter -s: Stop SAProuter Testing Basic SAProuter Functions Before you work with SAProuter, you should check for any network problems. You will need the programs saprouter and niping, and three open windows (shells) on one or more computers. Start SAProuter in window 1 (on host1) by entering the command: saprouter -r. This command starts SAProuter without parameters. Refer also to the online help for a complete list of SAProuter commands. To get online help, type saprouter. In window 2 (host2), start the test program niping to emulate a test server by entering the command: niping -s In window 3 (host3), start the test program niping to emulate a client by entering the command: niping -c -H host2 This command tests the connection without the SAProuter, that is directly between host 2 and host 3.
  • 2. In window 3, restart the test program niping by entering the command: niping -c -H /H/host1/H/host2 This command tests the connection with SAProuter. A host name is interpreted as a route (via one or more SAProuters to the server), if the host name is preceded with /H/. In steps 3 and 4 several data packets are sent to the server and then returned by the server. Self-Test for the Local Host To carry out a self-test for the local host: Stop all active niping servers and clients Enter the command niping -t A list is displayed with function names, parameters and return codes. The following message appears if the self-test is successful: "*** SELFTEST O.K. ***" Define Passwords & Authorizations in SAProuter You set passwords and access permissions for your system in user-defined files known as route permission tables. You use a standard text editor to create a route permission table. You can allow access to and from specified application servers in your LAN via your SAProuter. You can also password protect the routes you define. To do this, you must create and configure a separate route permission table for each SAProuter in your network. A route permission table contains the host names and port numbers of the preceding and subsequent point of the route, and any passwords required to make the connection. Entries in a route permission table look like this: < P/D> <source-host> <dest-host> <dest-serv> <password> Here, <source-host> and <dest-host> could be SAProuters. P(ermit) allows SAProuter to build the connection. P(ermit) entries can include a password. SAProuter checks that this password matches the password sent by the client. D(eny) prevents the connection from being built. You can also include comment lines, which must begin with ‘#'.
  • 3. If a client of <source-host> wants to connect with <dest-host> <dest-serv> via a SAProuter, the SAProuter checks its route permission before making the connection. If the password and route that SAProuter receives are identical to the entries in the route permission table, SAProuter will make the connection. If the passwords are not identical, SAProuter will not make the connection. If no route permission table was assigned explicitly to the SAProuter, ./saprouttab is used. If this file is not available, connections are made without a check, that is, all connections are allowed. You can include wildcards ("*") in hosts, ports and passwords. You can include subnetworks in host routes. Examples: Address Description 156.56.*.* all host addresses beginning with 156.56 133.27.17.* all host addresses beginning with 133.27.17 156.56.1011xxxx all host addresses from 156.56.176.* to 156.56.191.*. (This is a binary interpretation of the third byte of the address. ‘x' is a binary wildcard.) You can display a sample route permission table on your screen. To do this, call the SAProuter online help: saprouter. If there are several suitable entries, the first one is selected. This is important for the sequence of the permit/deny rules. Additional SAProuter Options Getting SAProuter information from remote computers You can display a list of all currently active clients in an active SAProuter. To get a list of the clients for an active SAProuter: Enter the command: saprouter -l -H host -P password. If required, you can define a password in the route permission table. If no host name is specified, the program will connect via localhost to the SAProuter on the same host. If the query does not come from the same host, the SAProuter checks whether its route permission table allows the combination: <other_host> localhost <router_service>. This entry can also include a password. The password is checked against the information password sent by the calling program. The host name can also contain a route. Logging connections connection from (client name / address) connection to (partner name / address) partner service
  • 4. start time end time connection requests rejected by the route permission table Changing the name of the route permission table When you start your SAProuter, you can enter a route permission table differing from the default setting "saprouttab" using the option -R: saprouter -r -R aclfile (aclfile is the name of the file contained in the route permission table). This is helpful when you need multiple route permission profiles. Changing the timeout default value for connection setup When you start your SAProuter, you can change the default timeout setting of five seconds for the connection setup using the option -W: saprouter -r -W timeout (timeout is the new timeout in milliseconds). Use this option if you have problems with dynamically established connections via ISDN or network providers.