Oracle9i Net Services Reference Guide
Release 1 (9.0.1)

Part Number A90155-01
Go To Documentation Library
Home
Go To Product List
Book List
Go To Table Of Contents
Contents
Go To Index
Index

Master Index

Feedback

Go to previous page Go to next page

6
Profile Parameters (sqlnet.ora)

This chapter provides a complete listing of the sqlnet.ora file configuration parameters.

This chapter contains these topics:

Overview of Profile Configuration File

The sqlnet.ora file enables you to:

By default, sqlnet.ora is located in the $ORACLE_HOME/network/admin directory on UNIX, and the ORACLE_HOME\network\admin directory on Windows operating systems. sqlnet.ora can also be stored in the following locations:

Profile Parameters

This section lists and describes the sqlnet.ora file parameters.


BEQUEATH_DETACH

Purpose

Use the BEQUEATH_DETACH parameter to turn signal handling on or off for UNIX systems.

Default

no--Leaves signal handling on

Values

yes--Turns off signal handling

no--Leaves signal handling on

Example

BEQUEATH_DETACH=yes


DAEMON.TRACE_DIRECTORY

Purpose

Use the DAEMON.TRACE_DIRECTORY parameter to specify the destination directory of the Oracle Enterprise Manager daemon trace file.

Default

The $ORACLE_HOME/network/trace directory on UNIX, and the ORACLE_HOME\network\trace directory on Windows operating systems

Example

The following parameter setting sets the trace directory to /oracle/traces.

DAEMON.TRACE_DIRECTORY=/oracle/traces


DAEMON.TRACE_LEVEL

Purpose

Use the parameter DAEMON.TRACE_LEVEL to turn tracing on or off. If set to on, sets a specific level of tracing for the Oracle Enterprise Manager daemon.

Default

off

Values

off--No trace output

user--User trace information

admin--Administration trace information

support--Oracle Support Services trace information

Example

DAEMON.TRACE_LEVEL=user


DAEMON.TRACE_MASK

Purpose

Use the parameter DAEMON.TRACE_MASK to specify that only the Oracle Enterprise Manager daemon trace entries are logged into the trace file.

Default

The $ORACLE_HOME/network/trace directory on UNIX, and the ORACLE_HOME\network\trace directory on Windows operating systems

Example

DAEMON.TRACE_MASK=(106)


DISABLE_OOB

Purpose

If turned off, the parameter DISABLE_OOB enables Oracle Net to send and receive "break" messages using urgent data provided by the underlying protocol.

If turned on, disables the ability to send and receive "break" messages using urgent data provided by the underlying protocol. Once enabled, this feature applies to all protocols used by this client.

See Also:

Operating system documentation to determine if the protocols you are using support urgent data requests. TCP/IP is an example of a protocol that supports this feature. 

Default

off

Example

DISABLE_OOB=on


LOG_DIRECTORY_CLIENT

Purpose

Use the parameter LOG_DIRECTORY_CLIENT to specify the destination directory for the client log file.

Default

Current directory from which the executable is started

Example

LOG_DIRECTORY_CLIENT=/oracle/network/log


LOG_DIRECTORY_SERVER

Purpose

Use the parameter LOG_DIRECTORY_SERVER to specify the destination directory for the database server log file.

Default

Current directory from which the executable is started

Example

LOG_DIRECTORY_SERVER=/oracle/network/log


LOG_FILE_CLIENT

Purpose

Use the parameter LOG_FILE_CLIENT to specify the name of the log file for the client.

Default

sqlnet.log

Example

LOG_FILE_CLIENT=client


LOG_FILE_SERVER

Purpose

Use the parameter LOG_FILE_SERVER to specify the name of the log file for the database server.

Default

sqlnet.log

Example

LOG_FILE_SERVER=svr.log


NAMES.CONNECT_TIMEOUT

Purpose

Use the parameter NAMES.CONNECT_TIMEOUT to limit the amount of time in seconds the client waits for the connection to an Oracle Names server to complete.

Default

3 seconds

Minimum Value

1 second

Maximum Value

600 seconds

Example

NAMES.CONNECT_TIMEOUT=8


NAMES.DCE.PREFIX

Purpose

Use the parameter NAMES.DCE.PREFIX to specify the Distributed Computing Environment (DCE) cell name (prefix) to use for name lookups.

Default

/.:/subsys/oracle/names

Example

 NAMES.DCE.PREFIX=/.:/subsys/oracle/names


NAMES.DEFAULT_DOMAIN

Purpose

Use the parameter NAMES.DEFAULT_DOMAIN to set the domain from which the client most often looks up names resolution requests. When this parameter is set, the default domain name is automatically appended to any unqualified net service name or service name.

For example, if the default domain is set to us.acme.com, the connect string CONNECT scott/tiger@sales gets searched as sales.us.acme.com. If the connect string includes the domain extension, such as CONNECT scott/tiger@sales.acme.com, the domain is not appended.

Default

None

Example

NAMES.DEFAULT_DOMAIN=acme.com


NAMES.DIRECTORY_PATH

Purpose

Use the parameter NAMES.DIRECTORY_PATH to specify the order of the naming methods used for client name resolution lookups.

Default

NAMES.DIRECTORY_PATH=(tnsnames, onames, hostname)

Values

Naming Method Value  Description 

tnsnames 

Local Naming

Net service names are resolved using the tnsnames.ora file which resides on the client. 

ldap 

Directory Naming

Net service names and database service names are resolved through a directory server. 

onames 

Oracle Names

Net service names and database service names are resolved centrally through an Oracle Names server. 

hostname 

Host Naming

Net service names are resolved using the host naming method. Certain criteria must be met to use host naming.

See Also: Oracle9i Net Services Administrator's Guide  

cds 

Cell Directory Services

This naming method is available with Oracle Advanced Security.

See Also: Oracle Advanced Security Administrator's Guide 

nis 

Network Information Service (NIS) 

Example

NAMES.DIRECTORY_PATH=(tnsnames, onames)


NAMES.INITIAL_RETRY_TIMEOUT

Purpose

Use the parameter NAMES.INITIAL_RETRY_TIMEOUT to determine how long a client waits for a response from an Oracle Names server before reiterating the request to the next Oracle Names server in the preferred servers list.

Default:

15

Minimum Value

1

Maximum Value

600

Example

NAMES.INITIAL_RETRY_TIMEOUT=20


NAMES.MAX_OPEN_CONNECTIONS

Purpose

Use the parameter NAMES.MAX_OPEN_CONNECTIONS to determine how many connections an Oracle Names client can have open at one time.

Default

10

Minimum Value

3

Maximum Value

64

Example

NAMES.MAX_OPEN_CONNECTIONS=3


NAMES.MESSAGE_POOL_START_SIZE

Purpose

Use the parameter NAMES.MESSAGE_POOL_START_SIZE to determine the initial number of messages allocated in the client's message pool for message requests.

Default

10

Minimum Value

3

Maximum Value

256

Example

NAMES.MESSAGE_POOL_START_SIZE=10


NAMES.NIS.META_MAP

Purpose

Use the parameter NAMES.NIS.META_MAP to specify the map file to be used to map Network Information Service (NIS) attributes to an NIS mapname

Default

sqlnet.maps

Example

NAMES.NIS.META_MAP=sqlnet.maps


NAMES.PREFERRED_SERVERS

Purpose

Use the parameter NAMES.PREFERRED_SERVERS to indicate the name, protocol addresses, and order of Oracle Names servers that are used for a client's name requests.

Default

None

Example

NAMES.PREFERRED_SERVERS= 
 (ADDRESS_LIST=
  (ADDRESS=(PROTOCOL=icp)(KEY=n23))
  (ADDRESS=(PROTOCOL=tcp)(HOST=nineva)(PORT=1575))
  (ADDRESS=(PROTOCOL=tcp)(HOST=cicada)(PORT=1575)))


NAMES.REQUEST_RETRIES

Purpose

Use the parameter NAMES.REQUEST_RETRIES to specify the number of times the client should try each Oracle Names server in the list of preferred Oracle Names servers before allowing the operation to fail.

Default

1

Minimum Value

1

Maximum Value

5

Example

NAMES.REQUEST_RETRIES=5


NAMESCTL.INTERNAL_ENCRYPT_PASSWORD

Purpose

If set to true, the parameter NAMESCTL.INTERNAL_ENCRYPT_PASSWORD encrypts the password when it is sent to the Oracle Names server.

If set to false, this parameter does not encrypt the password. A false setting enables unencrypted passwords to be set in the names.ora file with the NAMES.PASSWORD parameter.

Default

true

Values

true | false

Example

NAMESCTL.INTERNAL_ENCRYPT_PASSWORD=true


NAMESCTL.INTERNAL_USE

Purpose

If set to true, the parameter NAMESCTL.INTERNAL_USE enables a set of internal undocumented commands. All internal commands are preceded by an underscore to distinguish them as internal.

Default

false

Values

true | false

Example

NAMESCTL.INTERNAL_USE=true


NAMESCTL.NO_INITIAL_SERVER

Purpose

If set to true, the parameter NAMESCTL.NO_INITIAL_SERVER suppresses any error messages when the client is unable to connect to a default Oracle Names server.

Default

false

Values

true | false

Example

NAMESCTL.NO_INITIAL_SERVER=true


NAMESCTL.NOCONFIRM

Purpose

Use the parameter NAMESCTL.NOCONFIRM to indicate whether sensitive commands, such as STOP, RELOAD, and RESTART, should be prompted with a confirmation when running the Oracle Names Control utility.

Default

off

Values

on | off

Example

NAMESCTL.NOCONFIRM=on


NAMESCTL.SERVER_PASSWORD

Purpose

Use the parameter NAMESCTL.SERVER_PASSWORD to indicate the value that matches the configured password set in the names.ora file with the NAMES.PASSWORD parameter. This eliminates the need to enter the password with the SET PASSWORD command each time you use the Oracle Names Control utility to use secure commands, such as STOP, RESTART, and RELOAD.

Example

NAMESCTL.SERVER_PASSWORD=secret


NAMESCTL.TRACE_LEVEL

Purpose

Use the parameter NAMESCTL.TRACE_LEVEL to set a specific level of tracing for the he Oracle Names Control utility.

Default

off

Values

off--No trace output

user--User trace information

admin--Administration trace information

support--Oracle Support Services trace information

Example

NAMESCTL.TRACE_LEVEL=admin


NAMESCTL.TRACE_FILE

Purpose

Use the parameter NAMESCTL.TRACE_FILE to specify the file in which the Oracle Names Control utility trace output is placed.

Default

namesctl_pid.trc

Example

NAMESCTL.TRACE_FILE=nmsctl


NAMESCTL.TRACE_DIRECTORY

Purpose

Use the parameter NAMESCTL.TRACE_DIRECTORY to specify the directory where trace output from the Oracle Names Control utility is placed.

Default

The $ORACLE_HOME/network/trace directory on UNIX, and the ORACLE_HOME\network\trace directory on Windows NT

Example

NAMESCTL.TRACE_DIRECTORY=/oracle/trace


NAMESCTL.TRACE_UNIQUE

Purpose

Use the parameter NAMESCTL.TRACE_UNIQUE to indicate whether or not a process identifier is appended to the name of each trace file generated. If this parameter is enabled, several trace files can co-exist.

Default

on

Values

on | off

Example

NAMESCTL.TRACE_UNIQUE=on


SQLNET.AUTHENTICATION_KERBEROS5_SERVICE

Purpose

Use the parameter SQLNET.AUTHENTICATION_KERBEROS5_SERVICE to define the name of the service used to obtain a Kerberos service ticket.

See Also:

Oracle Advanced Security Administrator's Guide 

Default

None

Example

SQLNET.AUTHENTICATION_KERBEROS5_SERVICE=oracle


SQLNET.AUTHENTICATION_GSSAPI_SERVICE

Purpose

Use the parameter SQLNET.AUTHENTICATION_GSSAPI_SERVICE to define the CyberSAFE service principal.

See Also:

Oracle Advanced Security Administrator's Guide 


SQLNET.AUTHENTICATION_SERVICES

Purpose

Use the parameter SQLNET.AUTHENTICATION_SERVICES to enable one or more authentication services. If authentication has been installed, it is recommended that this parameter be set to either none or to one of the authentication methods.

Default

None

Values

Authentication Methods Available with Oracle Net Services:

none--No authentication methods. A valid user name and password can be used to access the database.

all--All authentication methods

nts--Windows NT native authentication

Authentication Methods Available with Oracle Advanced Security:

kerberos5--Kerberos authentication

cybersafe--Cybersafe authentication

radius--RADIUS authentication

dcegssapi--DCE GSSAPI authentication

See Also:

Oracle Advanced Security Administrator's Guide 

Example

SQLNET.AUTHENTICATION_SERVICES=(kerberos5, cybersafe)


SQLNET.CLIENT_REGISTRATION

Purpose

Use the parameter SQLNET.CLIENT_REGISTRATION to set a unique identifier for this client computer. This identifier is passed to the listener with any connection request and is included in the Audit Trail. The identifier can be any alphanumeric string up to 128 characters long.

Default

None

Example

SQLNET.CLIENT_REGISTRATION=1432


SQLNET.CRYPTO_CHECKSUM_CLIENT

Purpose

Use the parameter SQLNET.CRYPTO_CHECKSUM_CLIENT to specify the checksum behavior for the client.

See Also:

Oracle Advanced Security Administrator's Guide 

Default

rejected

Values

accepted--Enables the security service if required or requested by the other side

rejected--Disables the security service, even if the required by the other side

requested--Enables the security service if the other side allows it

required--Enables the security service and disallows the connection if the other side is not enabled for the security service

Example

SQLNET.CRYPTO_CHECKSUM_CLIENT=accepted


SQLNET.CRYPTO_CHECKSUM_SERVER

Purpose

Use the parameter SQLNET.CRYPTO_CHECKSUM_SERVER to specify the checksum behavior for the database server.

See Also:

Oracle Advanced Security Administrator's Guide 

Default

rejected

Values

accepted--Enables the security service if required or requested by the other side

rejected--Disables the security service, even if the required by the other side

requested--Enables the security service if the other side allows it

required--Enables the security service and disallows the connection if the other side is not enabled for the security service

Example

SQLNET.CRYPTO_CHECKSUM_SERVER=accepted


SQLNET_CRYPTO_CHECKSUM_TYPE_CLIENT

Purpose

Use the parameter SQLNET_CRYPTO_CHECKSUM_TYPE_CLIENT to specify a list of crypto-checksum algorithms for the client to use.

See Also:

Oracle Advanced Security Administrator's Guide 

Default

md5

Values

md5--RSA Data Security's MD5 algorithm

sha1--Secure Hash algorithm

Example

sqlnet.crypto_checksum_types_client=(md5)


SQLNET_CRYPTO_CHECKSUM_TYPE_SERVER

Purpose

Use the parameter SQLNET_CRYPTO_CHECKSUM_TYPE_SERVER to specify a list of crypto-checksum algorithms for the database server to use.

See Also:

Oracle Advanced Security Administrator's Guide 

Default

md5

Values

md5--RSA Data Security's MD5 algorithm

sha1--Secure Hash algorithm

Example

SQLNET.CRYPTO_CHECKSUM_TYPES_SERVER=(md5)


SQLNET.CRYPTO_SEED

Purpose

Use the parameter SQLNET.CRYPTO_SEED to specify the characters used when generating cryptographic keys. The more random the characters are, the stronger the keys are. The string should be 10-70 random characters. This is required for when encryption or checksumming are turned on. Encryption is turned on if the SQLNET.ENCRYPTION_CLIENT parameter is specified for the client and the SQLNET.ENCRYPTION_SERVER parameter is specified for the database server; checksumming is turned on if the SQLNET.CRYPTO_CHECKSUM_CLIENT parameter is specified for the client and the SQLNET.CRYPTO_CHECKSUM_SERVER parameter is specified for the database server.

See Also:

Oracle Advanced Security Administrator's Guide 

Default

qwertyuiopasdfghjkl;zxcvbnm,.s1

Example

SQLNET.CRYPTO_SEED="qwertyuiopasdfghjkl;zxcvbnm,.s1"


SQLNET.ENCRYPTION_CLIENT

Purpose

Use the parameter SQLNET.ENCRYPTION_CLIENT to turn encryption on for the client.

See Also:

Oracle Advanced Security Administrator's Guide 

Default

rejected

Values

accepted--Enables the security service if required or requested by the other side

rejected--Disables the security service, even if the required by the other side

requested--Enables the security service if the other side allows it

required--Enables the security service and disallows the connection if the other side is not enabled for the security service

Example

SQLNET.ENCRYPTION_CLIENT=accepted


SQLNET.ENCRYPTION_SERVER

Purpose

Use the parameter SQLNET.ENCRYPTION_SERVER to turn encryption on for the client.

See Also:

Oracle Advanced Security Administrator's Guide 

Default

rejected

Values

accepted--Enables the security service if required or requested by the other side

rejected--Disables the security service, even if the required by the other side

requested--Enables the security service if the other side allows it

required--Enables the security service and disallows the connection if the other side is not enabled for the security service

Example

SQLNET.ENCRYPTION_SERVER=accepted


SQLNET.ENCRYPTION_TYPES_CLIENT

Purpose

Use the parameter SQLNET.ENCRYPTION_TYPES_CLIENT to specify a list of encryption algorithms for the client to use.

See Also:

Oracle Advanced Security Administrator's Guide 

Default

All algorithms are used if none are specified.

Values

One or more of the following:

rc4_256--256 bit key size

3des168--Triple DES with a three-key (168 bit) option

rc4_128--128 bit key size

3des112--Triple DES with a two-key (112 bit) option

rc4_56--56 bit key size

des--Standard 56 bit key size

rc4_40--40 bit key size

des40--40 bit key size

Example

SQLNET.ENCRYPTION_TYPES_CLIENT=(rc4_56)


SQLNET.ENCRYPTION_TYPES_SERVER

Purpose

Use the parameter SQLNET.ENCRYPTION_TYPES_SERVER to specify a list of encryption algorithms for the database server to use.

See Also:

Oracle Advanced Security Administrator's Guide 

Default

All algorithms are used if none are specified.

Values

One or more of the following:

rc4_256--256 bit key size

3des168--Triple DES with a three-key (168 bit) option

rc4_128--128 bit key size

3des112--Triple DES with a two-key (112 bit) option

rc4_56--56 bit key size

des--Standard 56 bit key size

rc4_40--40 bit key size

des40--40 bit key size

Example

SQLNET.ENCRYPTION_TYPES_SERVER=(rc4_56, des, ...)


SQLNET.EXPIRE_TIME

Purpose

Use the parameter SQLNET.EXPIRE_TIME to determine the time interval in which to send a probe to verify that the session is active. Enabling this parameter allows for dead connection detection. Connections which do not respond to this probe signal are disconnected.

See Also:

Oracle Advanced Security Administrator's Guide 

Default

None

Minimum Value

0 minutes

Recommended Value

10 minutes

Example

SQLNET.EXPIRE_TIME=10


SQLNET.KERBEROS5_CC_NAME

Purpose

Use the parameter SQLNET.KERBEROS5_CC_NAME to specify the complete path name to the Kerberos credentials cache file.

See Also:

Oracle Advanced Security Administrator's Guide 

Default

/usr/tmp/krbcache on UNIX and c:\tmp\krbcache on Windows

Example

SQLNET.KERBEROS5_CC_NAME=/usr/tmp/krbcache


SQLNET.KERBEROS5_CLOCKSKEW

Purpose

Use the parameter SQLNET.KERBEROS5_CLOCKSKEW to specify how many seconds can pass before a Kerberos credential is considered out of date.

See Also:

Oracle Advanced Security Administrator's Guide 

Default

300

Example

SQLNET.KERBEROS5_CLOCKSKEW=1200


SQLNET.KERBEROS5_CONF

Purpose

Use the parameter SQLNET.KERBEROS5_CONF to specify the complete path name to the Kerberos configuration file, which contains the realm for the default Key Distribution Center (KDC) and maps realms to KDC hosts. The KDC maintains a list of user principals and is contacted through the kinit program for the user's initial ticket.

See Also:

Oracle Advanced Security Administrator's Guide 

Default

/krb5/krb.conf on UNIX and c:\krb5\krb.conf on Windows

Example

SQLNET.KERBEROS5_CONF=/krb5/krb.conf


SQLNET.KERBEROS5_KEYTAB

Purpose

Use the parameter SQLNET.KERBEROS5_KEYTAB to specify the complete path name to the Kerberos principal/secret key mapping file, which is used to extract keys and decrypt incoming authentication information.

See Also:

Oracle Advanced Security Administrator's Guide 

Default

/etc/v5srvtab on UNIX, and c:\krb5\v5srvtab on Windows

Example

SQLNET.KERBEROS5_KEYTAB=/etc/v5srvtab


SQLNET.KERBEROS5_REALMS

Purpose

Use the protocol SQLNET.KERBEROS5_REALMS to specify the complete path name to the Kerberos realm translation file, which provides a mapping from a host name or domain name to a realm.

See Also:

Oracle Advanced Security Administrator's Guide 

Default

/krb5/krb.realms on UNIX and c:\krb5\krb.realms on Windows

Example

SQLNET.KERBEROS5_REALMS=/krb5/krb.realms


SQLNET.RADIUS_ALTERNATE

Purpose

Use the protocol SQLNET.RADIUS_ALTERNATE to specify an alternate RADIUS server to use in case the primary server is unavailable. The value can be either the IP address or host name of the server.

See Also:

Oracle Advanced Security Administrator's Guide 

Default

None

Example

SQLNET.RADIUS_ALTERNATE=radius2


SQLNET.RADIUS_ALTERNATE_PORT

Purpose

Use the parameter SQLNET.RADIUS_ALTERNATE_PORT to specify the listening port of the alternate RADIUS server.

See Also:

Oracle Advanced Security Administrator's Guide 

Default

1645

Example

SQLNET.RADIUS_ALTERNATE_PORT=1667


SQLNET.RADIUS_ALTERNATE_RETRIES

Purpose

Use the parameter SQLNET.RADIUS_ALTERNATE_RETRIES to specify the number of times the database server should resend messages to the alternate RADIUS server.

See Also:

Oracle Advanced Security Administrator's Guide 

Default

3

Example

SQLNET.RADIUS_ALTERNATE_RETRIES=4


SQLNET.RADIUS_AUTHENTICATION

Purpose

Use the parameter SQLNET.RADIUS_AUTHENTICATION to specify the location of the primary RADIUS server, either by its host name or IP address.

See Also:

Oracle Advanced Security Administrator's Guide 

Default

Local host

Example

SQLNET.RADIUS_AUTHENETICATION=officeacct


SQLNET.RADIUS_AUTHENTICATION_INTERFACE

Purpose

Use the parameter SQLNET.RADIUS_AUTHENTICATION_INTERFACE to specify the class containing the user interface used to interact with the user.

See Also:

Oracle Advanced Security Administrator's Guide 

Default

DefaultRadiusInterface

Example

SQLNET.RADIUS_AUTHENTICATION_INTERFACE=DefaultRadiusInterface


SQLNET.RADIUS_AUTHENTICATION_PORT

Purpose

Use the parameter SQLNET.RADIUS_AUTHENTICATION_PORT to specify the listening port of the primary RADIUS server.

See Also:

Oracle Advanced Security Administrator's Guide 

Default

1645

Example

SQLNET.RADIUS_AUTHENTICATION_PORT= 1667


SQLNET.RADIUS_AUTHENTICATION_RETRIES

Purpose

Use the parameter SQLNET.RADIUS_AUTHENTICATION_RETRIES to specify the number of times the database server should resend messages to the primary RADIUS server.

See Also:

Oracle Advanced Security Administrator's Guide 

Default

3

Example

SQLNET.RADIUS_AUTHENTICATION_RETRIES=4


SQLNET.RADIUS_AUTHENTICATION_TIMEOUT

Purpose

Use the parameter SQLNET.RADIUS_AUTHENTICATION_TIMEOUT to specify the number of seconds the database server should wait for a response from the primary RADIUS server.

See Also:

Oracle Advanced Security Administrator's Guide 

Default

5 seconds

Example

SQLNET.RADIUS_AUTHENTICATION_TIMEOUT=10


SQLNET.RADIUS_CHALLENGE_RESPONSE

Purpose

Use the parameter SQLNET.RADIUS_CHALLENGE_RESPONSE to turn challenge response on or off.

Default

off

Values

on | off

Example

SQLNET.RADIUS_CHALLENGE_RESPONSE=on


SQLNET.RADIUS_SECRET

Purpose:

Use the parameter SQLNET.RADIUS_SECRET to specify the location of the RADIUS secret key.

See Also:

Oracle Advanced Security Administrator's Guide 

Default

The $ORACLE_HOME/network/security/radius.key file on UNIX, and the ORACLE_HOME\network\security\radius.key file on Windows NT

Example

SQLNET.RADIUS_SECRET=oracle/bin/admin/radiuskey


SQLNET.RADIUS_SEND_ACCOUNTING

Purpose

Use the parameter SQLNET.RADIUS_SEND_ACCOUNTING to turn accounting on and off. If enabled, packets are sent to the active RADIUS server at listening port plus one. The default port is 1646.

See Also:

Oracle Advanced Security Administrator's Guide 

Default

off

Values

on | off

Example

SQLNET.RADIUS_SEND_ACCOUNTING=on


SSL_CIPHER_SUITES

Purpose

Use the parameter SSL_CIPHER_SUITES to control what combination of encryption and data integrity is used by the Secure Sockets Layer (SSL).

Default

None

Values

See Also:

Oracle Advanced Security Administrator's Guide for further information about cipher suite values 

Example

SSL_CIPHER_SUITE=(ssl_rsa_with_rc4_138_md5)


SSL_CLIENT_AUTHENTICATION

Purpose

Use the parameter SSL_CLIENT_AUTHENTICATION to specify whether or not a client--in addition to the database server--is authenticated using SSL.

See Also:

Oracle Advanced Security Administrator's Guide 

Default

true

Values

true | false

Example

SSL_CLIENT_AUTHENTICATION=true


SSL_SERVER_DN_MATCH

Purpose

Use the parameter SSL_SERVER_DN_MATCH to enforce that the database server's distinguished name (DN) matches its service name. If you enforce the match verifications, then SSL ensures that the certificate is from the server. If you select to not enforce the match verification, then SSL performs the check but allows the connection, regardless if there is a match. Not enforcing the match allows the server to potentially fake its identify.

See Also:

Oracle Advanced Security Administrator's Guide 

Default

no

Values

yes | on | true--Specify to enforce a match. If the DN matches the service name, then the connection succeeds. If the DN does not match the service name, then the connection fails.

no | off | false--Specify to not enforce a match. If does not match the service name, then the connection is successful, but an error is logged to the sqlnet.log file.

Usage Notes

Additionally configure the tnsnames.ora parameter SSL_SERVER_CERT_DN to enable server DN matching.

See Also:

Chapter 7, "Configuring Secure Sockets Layer Authentication," in the Oracle Advanced Security Administrator's Guide 

Example

SSL_SERVER_DN_MATCH=yes


SSL_VERSION

Purpose

Use the parameter SSL_VERSION to force the version of the SSL connection.

Clients and database servers must use a compatible version.

See Also:

Oracle Advanced Security Administrator's Guide 

Default

undetermined

Values

undetermined | 2.0 | 3.0

Example

SSL_VERSION=2.0


TCP.EXCLUDED_NODES

Purpose

Use the parameter TCP.EXCLUDED_NODES to specify which clients are denied access to the database.

Syntax

TCP.EXCLUDED_NODES=(hostname | ip_address, hostname | ip_address, ...)

Example

TCP.EXCLUDED_NODES=(finance.us.acme.com, mktg.us.acme.com, 144.25.5.25)


TCP.INVITED_NODES

Purpose

Use the parameter TCP.INVITED_NODES to specify which clients are allowed access to the database. This list takes precedence over the TCP.EXCLUDED_NODES parameter if both lists are present.

Syntax

TCP.INVITED_NODES=(hostname | ip_address, hostname | ip_address, ...)

Example

TCP.INVITED_NODES=(sales.us.acme.com, hr.us.acme.com, 144.185.5.73)


TCP.VALIDNODE_CHECKING

Purpose

Use the parameter TCP.VALIDNODE_CHECKING to check for the TCP.INVITED_NODES and TCP.EXCLUDED_NODES to determine which clients to allow or deny access.

Default

no

Values

yes | no

Example

TCP.VALIDNODE_CHECKING=yes


TCP.NODELAY

Purpose

Use the parameter TCP.NODELAY to preempt delays in buffer flushing within the TCP/IP protocol stack.

Default

no

Values

yes | no

Example

TCP.NODELAY=yes


TNSPING.TRACE_DIRECTORY

Purpose

Use the parameter TNSPING.TRACE_DIRECTORY to specify the destination directory for the TNSPING utility trace file.

Default

The $ORACLE_HOME/network/trace directory on UNIX, and the ORACLE_HOME\network\trace directory on Windows operating systems

Example

TNSPING.TRACE_DIRECTORY=/oracle/traces


TNSPING.TRACE_LEVEL

Purpose

Use the parameter TNSPING.TRACE_LEVEL to turn tracing on or off. If set to on, sets a specific level of tracing for the TNSPING utility.

Default

off

Values

off--No trace output

user--User trace information

admin--Administration trace information

support--Oracle Support Services trace information

Example

TNSPING.TRACE_LEVEL=admin


TRACE_DIRECTORY_CLIENT

Purpose

Use the parameter TRACE_DIRECTORY_CLIENT to specify the destination directory for the client trace file.

Default

The $ORACLE_HOME/network/trace directory on UNIX, and the ORACLE_HOME\network\trace directory on Windows operating systems

Example

TRACE_DIRECTORY_CLIENT=/oracle/traces


TRACE_DIRECTORY_SERVER

Purpose

Use the parameter TRACE_DIRECTORY_SERVER to specify the destination directory for the database server trace file.

Default

The $ORACLE_HOME/network/trace directory on UNIX, and the ORACLE_HOME\network\trace directory on Windows NT

Example

TRACE_DIRECTORY_SERVER=/oracle/traces


TRACE_FILE_CLIENT

Purpose

Use the parameter TRACE_FILE_CLIENT to specify the name of the client trace file.

Default

sqlnet.trc

Example

TRACE_FILE_CLIENT=clientsqlnet.trc


TRACE_FILE_SERVER

Purpose

Use the parameter TRACE_FILE_SERVER to specify the name of the database server trace file

Default

svr_pid.trc

Example

TRACE_FILE_SERVER=svrsqlnet.trc


TRACE_FILELEN_CLIENT

Purpose

Use the parameter TRACE_FILELEN_CLIENT to specify the size of the client trace files in kilobytes (KB). When the size is met, the trace information is written to the next file. The number of files is specified with the TRACE_FILENO_CLIENT parameter.

Example

TRACE_FILELEN_CLIENT=100


TRACE_FILELEN_SERVER

Purpose

Use the parameter TRACE_FILELEN_SERVER to specify the size of the database server trace files in kilobytes (KB). When the size is met, the trace information is written to the next file. The number of files is specified with the TRACE_FILENO_SERVER parameter.

Example

TRACE_FILELEN_SERVER=100


TRACE_FILENO_CLIENT

Purpose

Use the parameter TRACE_FILENO_CLIENT to specify the number of trace files for client tracing. When this parameter is set along with the TRACE_FILELEN_CLIENT parameter, trace files are used in a cyclical fashion. The first file is filled first, then the second file, and so on. When the last file has been filled, the first file is re-used, and so on.

The trace file names are distinguished from one another by their sequence number. For example, if the default trace file of svr_pid.trc is used, and this parameter is set to 3, the trace files would be named svr1_pid.trc, svr2_pid.trc and svr3_pid.trc.

In addition, trace events in the trace files are preceded by the sequence number of the file.

Default

None

Example

TRACE_FILENO_SERVER=3


TRACE_FILENO_SERVER

Purpose

Use the parameter TRACE_FILENO_SERVER to specify the number of trace files for database server tracing. When this parameter is set along with the TRACE_FILELEN_SERVER parameter, trace files are used in a cyclical fashion. The first file is filled first, then the second file, and so on. When the last file has been filled, the first file is re-used, and so on.

The trace file names are distinguished from one another by their sequence number. For example, if the default trace file of svr_pid.trc is used, and this parameter is set to 3, the trace files would be named svr1_pid.trc, svr2_pid.trc and svr3_pid.trc.

In addition, trace events in the trace files are preceded by the sequence number of the file.

Default

None

Example

TRACE_FILENO_SERVER=3


TRACE_LEVEL_CLIENT

Purpose

Use the parameter TRACE_LEVEL_CLIENT to turn tracing on or off on the client at a specified level.

Default

off

Values

off--No trace output

user--User trace information

admin--Administration trace information

support--Oracle Support Services trace information

Example

TRACE_LEVEL_CLIENT=user


TRACE_LEVEL_SERVER

Purpose

Use the parameter TRACE_LEVEL_SERVER to turn tracing on or off on the database server at a specified level.

Default

off

Values

off--No trace output

user--User trace information

admin--Administration trace information

support--Oracle Support Services trace information

Example

TRACE_LEVEL_SERVER=admin


TRACE_TIMESTAMP_CLIENT

Purpose

Use the parameter TRACE_TIMESTAMP_CLIENT to add a time stamp in the form of dd-month-yyyy hh:mm:ss to every trace event in the client trace file, which has a default name of sqlnet.trc.

Default

off

Values

on or true | off or false

Example

TRACE_TIMESTAMP_SERVER=true

TRACE_TIMESTAMP_SERVER

Purpose

Use the parameter TRACE_TIMESTAMP_SERVER to add a time stamp in form of dd-month-yy hh:mm:ss to every trace event in the database server trace file, which has a default name of svr_pid.trc.

Default

off

Values

on or true | off or false

Example

TRACE_TIMESTAMP_SERVER=true


TRACE_UNIQUE_CLIENT

Purpose

Use the parameter TRACE_UNIQUE_CLIENT to determine whether or not a unique trace file is created for each client trace file. If the value is set to on, a process identifier is appended to the name of each trace file, enabling several files named sqlnetpid.trc to coexist. If the value is set to off, when a new trace file is created for a client, it overwrites the existing file.

Default

on

Example

TRACE_UNIQUE_CLIENT=on


USE_CMAN

Purpose

If set to true, the parameter USE_CMAN routes the client to a protocol address for an Oracle Connection Manager.

The following example shows two address lists. While the first address list routes the client to an Oracle Connection Manager, the second address list routes the client directly to a listener.

sales=
 (DESCRIPTION= 
   (LOAD_BALANCE=on) 
   (FAILOVER=on)
   (ADDRESS_LIST= 
     (SOURCE_ROUTE=yes) 
     (ADDRESS=(PROTOCOL=tcp)(HOST=host1)(PORT=1630)) 
     (ADDRESS=(PROTOCOL=tcp)(HOST=host2)(PORT=1521)))
   (ADDRESS_LIST= 
     (ADDRESS=(PROTOCOL=tcp)(HOST=host3)(PORT=1521)))
   (CONNECT_DATA=(SERVICE_NAME=sales.us.acme.com)))

Without USE_CMAN=true, the client picks one of the address lists at random and fails over to the other address list if the chosen ADDRESS_LIST fails. With USE_CMAN=true, the client always uses the first address list.

If no Oracle Connection Manager addresses are available, connections are routed through any available listener address.


Note:

If you are using Oracle Connection Manager with Oracle Names, this option must be set on clients and Oracle Names servers. 


Default

false

Values

true | false

Example

USE_CMAN=true


USE_DEDICATED_SERVER

Purpose

If set to on, the parameter USE_DEDICATED_SERVER automatically appends (SERVER=dedicated) to a connect descriptor's connect data. This way connections from this client use a dedicated server process, even if shared server is configured.

This parameter adds (SERVER=dedicated) to the CONNECT_DATA section of the connect descriptor the client uses. It overrides any current value SERVER parameter.

Default

off

Values

on--Spawns dedicated server processes

off--Hands off request to existing server processes

Example

USE_DEDICATED_SERVER=on


VI_RECEIVE_BUFFERS

Purpose

Use the VI_RECEIVE_BUFFERS command to specify the number of buffers that have been posted on the receive queue for a VI protocol address.

See Also:

Oracle9i Net Services Administrator's Guide  

Values

Any number between 1 and 100 or one of the following values:

small--Maps to 5 buffers

medium--Maps to 15 buffers (Default)

large--Maps to 30 buffers

Example

The following example shows the number of receive buffers being set to 10. This means that each connection will allocate 10 buffers for receiving data.

RECEIVE_BUFFERS=10


VI_SEND_BUFFERS

Purpose

Use the VI_SEND_BUFFERS command to specify the number of buffers that been posted on the send queue for a VI protocol address.

See Also:

Oracle9i Net Services Administrator's Guide  

Values

Any number between 1 and 100 or one of the following values:

small--Maps to 5 buffers

medium--Maps to 15 buffers (default)

large--Maps to 30 buffers

Example

The following example shows the number of send buffers being set to 5. This means that each connection will allocate five buffers for sending data.

SEND_BUFFERS=5


WALLET_LOCATION

Purpose

Use the parameter WALLET_LOCATION to specify the location of wallets. Wallets are certificates, keys, and trustpoints processed by SSL.

See Also:

Oracle Advanced Security Administrator's Guide 

Syntax

Oracle wallets on file system:

WALLET_LOCATION=
  (SOURCE=
    (METHOD=file)
    (METHOD_DATA=
       (DIRECTORY=directory)))

Microsoft certificate store:

WALLET_LOCATION=
  (SOURCE=
     (METHOD=mcs))

Oracle wallets in the Windows NT registry:

WALLET_LOCATION=
   (SOURCE=
      (METHOD=reg)
      (METHOD_DATA=
         (KEY=registry_key)))

Entrust wallets:

WALLET_LOCATION=
   (SOURCE=
      (METHOD=entr)
      (METHOD_DATA=
         (PROFILE=file.epf)
         (INIFILE=file.ini)))

Sub-Parameters

SOURCE--Type of storage for wallets and storage location

METHOD--Type of storage

METHOD_DATA--Storage location

DIRECTORY--Location of Oracle wallets on file system

KEY--Wallet type and location in the Windows NT registry

PROFILE--Entrust profile file (.epf)

INIFILE--Entrust initialization file (.ini)

Default

None

Usage Notes

Examples

Oracle wallets on file system:

WALLET_LOCATION=  
  (SOURCE=
      (METHOD=file)
      (METHOD_DATA=  
         (DIRECTORY=/etc/oracle/wallets/databases)))

Microsoft certificate store:

WALLET_LOCATION=
   (SOURCE=
     (METHOD=mcs))
   

Oracle Wallets in the Windows NT registry:

WALLET_LOCATION=
   (SOURCE=
     (METHOD=REG)
     (METHOD_DATA=
        (KEY=SALESAPP)))

Entrust Wallets:

WALLET_LOCATION=
   (SOURCE=
     (METHOD=entr)
     (METHOD_DATA=
       (PROFILE=/etc/oracle/wallets/test.epf)
       (INIFILE=/etc/oracle/wallets/test.ini)))


Go to previous page Go to next page
Oracle
Copyright © 1996-2001, Oracle Corporation.

All Rights Reserved.
Go To Documentation Library
Home
Go To Product List
Book List
Go To Table Of Contents
Contents
Go To Index
Index

Master Index

Feedback