| Oracle9i Net Services Reference Guide Release 2 (9.2) Part Number A96581-02 |
|
|
View PDF |
This chapter provides a complete listing of the sqlnet.ora file configuration parameters.
This chapter contains these topics:
The sqlnet.ora file enables you to:
By default, sqlnet.ora is located in the $ORACLE_HOME/network/admin directory on UNIX operating systems and the ORACLE_HOME\network\admin directory on Windows operating systems. sqlnet.ora can also be stored in the directory specified by the TNS_ADMIN environment variable.
This section lists and describes the sqlnet.ora file parameters.
Use the parameter BEQUEATH_DETACH to turn signal handling on or off for UNIX systems.
no
BEQUEATH_DETACH=yes
If turned off, the parameter DISABLE_OOB enables Oracle Net to send and receive "break" messages using urgent data provided by the underlying protocol.
If turned on, disables the ability to send and receive "break" messages using urgent data provided by the underlying protocol. Once enabled, this feature applies to all protocols used by this client.
| See Also:
Operating system-specific documentation to determine if the protocols you are using support urgent data requests. TCP/IP is an example of a protocol that supports this feature. |
off
DISABLE_OOB=on
Use the parameter LOG_DIRECTORY_CLIENT to specify the destination directory for the client log file.
Current directory from which the executable is started
LOG_DIRECTORY_CLIENT=/oracle/network/log
Use the parameter LOG_DIRECTORY_SERVER to specify the destination directory for the database server log file.
Current directory from which the executable is started
LOG_DIRECTORY_SERVER=/oracle/network/log
Use the parameter LOG_FILE_CLIENT to specify the name of the log file for the client.
sqlnet.log
LOG_FILE_CLIENT=client
Use the parameter LOG_FILE_SERVER to specify the name of the log file for the database server.
sqlnet.log
LOG_FILE_SERVER=svr.log
Use the parameter NAMES.CONNECT_TIMEOUT to specify the amount of time, in seconds, for the client to wait for a connection to an Oracle Names server to complete.
3
1
600
NAMES.CONNECT_TIMEOUT=8
Use the parameter NAMES.DCE.PREFIX to specify the Distributed Computing Environment (DCE) cell name (prefix) to use for name lookups.
/.:/subsys/oracle/names
NAMES.DCE.PREFIX=/.:/subsys/oracle/names
Use the parameter NAMES.DEFAULT_DOMAIN to set the domain from which the client most often looks up names resolution requests. When this parameter is set, the default domain name is automatically appended to any unqualified net service name or service name.
For example, if the default domain is set to us.acme.com, the connect string CONNECT scott/tiger@sales gets searched as sales.us.acme.com. If the connect string includes the domain extension, such as CONNECT scott/tiger@sales.acme.com, the domain is not appended.
None
NAMES.DEFAULT_DOMAIN=acme.com
Use the parameter NAMES.DIRECTORY_PATH to specify the order of the naming methods used for client name resolution lookups.
NAMES.DIRECTORY_PATH=(tnsnames, onames, hostname)
| Naming Method Value | Description |
|---|---|
|
local naming naming method |
Set to resolve a net service name through the |
|
directory naming naming method |
Set to resolve a database service name, net service name, or net service alias through a directory server. |
|
Oracle Names method |
Set to resolve database objects through a Oracle Names server. |
|
host naming method |
Set to resolve a host name alias through an existing names resolution service or a centrally-maintained set of |
|
Cell Directory Services (CDS) external naming method |
Set to resolve an Oracle database name in a Distributed Computing Environment (DCE) environment. |
|
Network Information Service (NIS) external naming method |
NAMES.DIRECTORY_PATH=(tnsnames, onames)
Use the parameter NAMES.INITIAL_RETRY_TIMEOUT to determine how long a client waits for a response from an Oracle Names server before reiterating the request to the next Oracle Names server in the preferred servers list.
15
1
600
NAMES.INITIAL_RETRY_TIMEOUT=20
Use the parameter NAMES.MAX_OPEN_CONNECTIONS to determine how many connections an Oracle Names client can have open at one time.
10
3
64
NAMES.MAX_OPEN_CONNECTIONS=3
Use the parameter NAMES.MESSAGE_POOL_START_SIZE to determine the initial number of messages allocated in the client message pool for message requests.
10
3
256
NAMES.MESSAGE_POOL_START_SIZE=10
Use the parameter NAMES.NIS.META_MAP to specify the map file to be used to map Network Information Service (NIS) attributes to an NIS mapname
sqlnet.maps
NAMES.NIS.META_MAP=sqlnet.maps
Use the parameter NAMES.PREFERRED_SERVERS to indicate the name, protocol addresses, and order of Oracle Names servers that are used for client name requests.
None
NAMES.PREFERRED_SERVERS= (ADDRESS_LIST= (ADDRESS=(PROTOCOL=icp)(KEY=n23)) (ADDRESS=(PROTOCOL=tcp)(HOST=nineva)(PORT=1575)) (ADDRESS=(PROTOCOL=tcp)(HOST=cicada)(PORT=1575)))
Use the parameter NAMES.REQUEST_RETRIES to specify the number of times the client should try each Oracle Names server in the list of preferred Oracle Names servers before allowing the operation to fail.
1
1
5
NAMES.REQUEST_RETRIES=5
If the parameter NAMESCTL.ECHO is set to true, then the Oracle Names Control utility echoes commands with prompts in the output. You can use this information to better interpret the output. You can use this information to better interpret the output, especially when the Oracle Names Control utility is run with a command script. The commands from the script appear before their output.
false
true | false
NAMESCTL.ECHO=true
When the QUERY . ns.smd command is entered in the Oracle Names Control utility, the output that follows displays. Notice that QUERY . ns.smd command is echoed on the second line.
NAMESCTL> QUERY . ns.smd NAMESCTL> QUERY . ns.smd Total response time: 0.11 seconds Response status: normal, successful completion Authoritative answer: yes Number of answers: 3 TTL: 1 day Answers: data type is "ns.smd" Syntax is DOMAIN: sales data type is "ns.smd" Syntax is DOMAIN: dev data type is "ns.smd" Syntax is DOMAIN: rootserv1.acme.com
If the parameter NAMESCTL.INTERNAL_ENCRYPT_PASSWORD is set to true, then the Oracle Names Control utility encrypts the password when it is sends to the Oracle Names server.
If set to false, the Oracle Names Control utility does not encrypt the password. A false setting enables unencrypted passwords to be set in the names.ora file with the NAMES.PASSWORD parameter.
true
true | false
NAMESCTL.INTERNAL_ENCRYPT_PASSWORD=true
If the parameter NAMESCTL.INTERNAL_USE is set to true, then the Oracle Names Control utility enables a set of internal undocumented commands. All internal commands are preceded by an underscore to distinguish them as internal.
false
true | false
NAMESCTL.INTERNAL_USE=true
If the parameter NAMESCTL.NO_INITIAL_SERVER is set to true, then the Oracle Names Control utility suppresses any error messages when the client is unable to connect to a default Oracle Names server.
false
true | false
NAMESCTL.NO_INITIAL_SERVER=true
Use the parameter NAMESCTL.NOCONFIRM to indicate whether sensitive commands, such as STOP, RELOAD, and RESTART, should be prompted with a confirmation when running the Oracle Names Control utility.
off
on | off
NAMESCTL.NOCONFIRM=on
Use the parameter NAMESCTL.SERVER_PASSWORD to indicate the value that matches the configured password set in the names.ora file with the NAMES.PASSWORD parameter. This eliminates the need to enter the password with the SET PASSWORD command each time you use the Oracle Names Control utility to use secure commands, such as STOP, RESTART, and RELOAD.
NAMESCTL.SERVER_PASSWORD=secret
Use the parameter NAMESCTL.TRACE_DIRECTORY to specify the directory where trace output from the Oracle Names Control utility is placed.
The $ORACLE_HOME/network/trace directory on UNIX operating systems and the ORACLE_HOME\network\trace directory on Windows NT
NAMESCTL.TRACE_DIRECTORY=/oracle/trace
Use the parameter NAMESCTL.TRACE_FILE to specify the file in which the Oracle Names Control utility trace output is placed.
namesctl.trc
NAMESCTL.TRACE_FILE=nmsctl
Use the parameter NAMESCTL.TRACE_LEVEL to turn Oracle Names Control utility tracing on, at a specific level, or off.
off
off for no trace outputuser for user trace informationadmin for administration trace informationsupport for Oracle Support Services trace informationNAMESCTL.TRACE_LEVEL=admin
When parameter NAMESCTL.TRACE_LEVEL is set to a specific tracing level, you can use the parameter NAMES.TRACE_TIMESTAMP to add a time stamp in the form of dd-mon-yyyy hh:mi:ss:mil to every trace event in the trace file for the Oracle Names Control utility.
true
yes or true | no or false
NAMESCTL.TRACE_TIMESTAMP=false
Use the parameter NAMESCTL.TRACE_UNIQUE to specify whether or not a unique trace file is created for each Oracle Names Control utility trace session. When the value is set to on, a process identifier is appended to the name of each trace file, enabling several files named namesctlpid.trc to coexist. When the value is set to off, data from a new trace session overwrites the existing file.
Use the parameter NAMESCTL.TRACE_UNIQUE to specify whether or not a unique trace file is created for each Oracle Names Control utility trace session. When the value is set to on, a process identifier is appended to the name of each trace file, enabling several files to coexist. For example, trace files named namesctlpid.trc are created if default trace file name namesctl.trc is used. When the value is set to off, data from a new trace session overwrites the existing file.
on
on | off
NAMESCTL.TRACE_UNIQUE=on
Use the parameter SQLNET.AUTHENTICATION_KERBEROS5_SERVICE to define the name of the service used to obtain a Kerberos service ticket.
None
SQLNET.AUTHENTICATION_KERBEROS5_SERVICE=oracle
Use the parameter SQLNET.AUTHENTICATION_GSSAPI_SERVICE to define the CyberSAFE service principal.
Use the parameter SQLNET.AUTHENTICATION_SERVICES to enable one or more authentication services. If authentication has been installed, it is recommended that this parameter be set to either none or to one of the authentication methods.
None
none for no authentication methods. A valid username and password can be used to access the database.all for all authentication methodsnts for Windows NT native authenticationkerberos5 for Kerberos authenticationcybersafe for Cybersafe authenticationradius for RADIUS authenticationdcegssapi for DCE GSSAPI authentication
SQLNET.AUTHENTICATION_SERVICES=(kerberos5, cybersafe)
Use the parameter SQLNET.CLIENT_REGISTRATION to set a unique identifier for this client computer. This identifier is passed to the listener with any connection request and is included in the Audit Trail. The identifier can be any alphanumeric string up to 128 characters long.
None
SQLNET.CLIENT_REGISTRATION=1432
Use the parameter SQLNET.CRYPTO_CHECKSUM_CLIENT to specify the checksum behavior for the client.
rejected
accepted to enable the security service if required or requested by the other siderejected to disable the security service, even if the required by the other siderequested to enable the security service if the other side allows itrequired to enable the security service and disallow the connection if the other side is not enabled for the security serviceSQLNET.CRYPTO_CHECKSUM_CLIENT=accepted
Use the parameter SQLNET.CRYPTO_CHECKSUM_SERVER to specify the checksum behavior for the database server.
rejected
accepted to enable the security service if required or requested by the other siderejected to disable the security service, even if the required by the other siderequested to enable the security service if the other side allows itrequired to enable the security service and disallow the connection if the other side is not enabled for the security serviceSQLNET.CRYPTO_CHECKSUM_SERVER=accepted
Use the parameter SQLNET.CRYPTO_CHECKSUM_TYPE_CLIENT to specify a list of crypto-checksum algorithms for the client to use.
md5
SQLNET.CRYPTO_CHECKSUM_TYPE_CLIENT=(MD5)
Use the parameter SQLNET.CRYPTO_CHECKSUM_TYPE_SERVER to specify a list of crypto-checksum algorithms for the database server to use.
md5
SQLNET.CRYPTO_CHECKSUM_TYPE_SERVER=(md5)
Use the parameter SQLNET.CRYPTO_SEED to specify the characters used when generating cryptographic keys. The more random the characters are, the stronger the keys are. The string should be 10-70 random characters. This is required for when encryption or checksumming are turned on. Encryption is turned on if the SQLNET.ENCRYPTION_CLIENT parameter is specified for the client and the SQLNET.ENCRYPTION_SERVER parameter is specified for the database server; checksumming is turned on if the SQLNET.CRYPTO_CHECKSUM_CLIENT parameter is specified for the client and the SQLNET.CRYPTO_CHECKSUM_SERVER parameter is specified for the database server.
qwertyuiopasdfghjkl;zxcvbnm,.s1
SQLNET.CRYPTO_SEED="qwertyuiopasdfghjkl;zxcvbnm,.s1"
Use the parameter SQLNET.ENCRYPTION_CLIENT to turn encryption on for the client.
rejected
accepted to enable the security service if required or requested by the other siderejected to disable the security service, even if the required by the other siderequested to enable the security service if the other side allows itrequired to enable the security service and disallow the connection if the other side is not enabled for the security serviceSQLNET.ENCRYPTION_CLIENT=accepted
Use the parameter SQLNET.ENCRYPTION_SERVER to turn encryption on for the database server.
rejected
accepted to enable the security service if required or requested by the other siderejected to disable the security service, even if the required by the other siderequested to enable the security service if the other side allows itrequired to enable the security service and disallow the connection if the other side is not enabled for the security service
SQLNET.ENCRYPTION_SERVER=accepted
Use the parameter SQLNET.ENCRYPTION_TYPES_CLIENT to specify a list of encryption algorithms for the client to use.
All algorithms are used if none are specified.
One or more of the following:
3des112 for triple DES with a two-key (112 bit) option3des168 for triple DES with a three-key (168 bit) optiondes for standard 56 bit key sizedes40 for 40 bit key sizerc4_40 for 40 bit key sizerc4_56 for 56 bit key sizerc4_128 for 128 bit key sizerc4_256 for 256 bit key sizeSQLNET.ENCRYPTION_TYPES_CLIENT=(rc4_56)
Use the parameter SQLNET.ENCRYPTION_TYPES_SERVER to specify a list of encryption algorithms for the database server to use.
All algorithms are used if none are specified.
One or more of the following:
3des112 for triple DES with a two-key (112 bit) option3des168 for triple DES with a three-key (168 bit) optiondes for standard 56 bit key sizedes40 for 40 bit key sizerc4_40 for 40 bit key sizerc4_56 for 56 bit key sizerc4_128 for 128 bit key sizerc4_256 for 256 bit key sizeSQLNET.ENCRYPTION_TYPES_SERVER=(rc4_56, des, ...)
Use parameter SQLNET.EXPIRE_TIME to specify a the time interval, in minutes, to send a probe to verify that client/server connections are active. Setting a value greater than 0 ensures that connections are not left open indefinitely, due to an abnormal client termination. If the probe finds a terminated connection, or a connection that is no longer in use, it returns an error, causing the server process to exit. This parameter is primarily intended for the database server, which typically handles multiple connections at any one time.
Limitations on using this terminated connection detection feature are:
0
0
10
SQLNET.EXPIRE_TIME=10
Use the SQLNET.INBOUND_CONNECT_TIMEOUT parameter to specify the time, in seconds, for a client to connect with the database server and provide the necessary authentication information.
If the client fails to establish a connection and complete authentication in the time specified, then the database server terminates the connection. In addition, the database server logs the IP address of the client and an ORA-12170: TNS:Connect timeout occurred error message to the sqlnet.log file. The client receives either an ORA-12547: TNS:lost contact or an ORA-12637: Packet receive failed error message.
Without this parameter, a client connection to the database server can stay open indefinitely without authentication. Connections without authentication can introduce possible denial-of-service attacks, whereby malicious clients attempt to flood database servers with connect requests that consume resources.
To protect both the database server and the listener, Oracle Corporation recommends setting this parameter in combination with the INBOUND_CONNECT_TIMEOUT_listener_name parameter in the listener.ora file. When specifying values for these parameters, consider the following recommendations:
INBOUND_CONNECT_TIMEOUT_listener_name parameter to a lower value than the SQLNET.INBOUND_CONNECT_TIMEOUT parameter.For example, you can set INBOUND_CONNECT_TIMEOUT_listener_name to 2 seconds and INBOUND_CONNECT_TIMEOUT parameter to 3 seconds. If clients are unable to complete connections within the specified time due to system or network delays that are normal for the particular environment, then increment the time as needed.
| See Also:
Oracle9i Net Services Administrator's Guide for information about configuring these parameters |
None
SQLNET.INBOUND_CONNECT_TIMEOUT=3
Use the parameter SQLNET.KERBEROS5_CC_NAME to specify the complete path name to the Kerberos credentials cache file.
/usr/tmp/krbcache on UNIX operating systems and c:\tmp\krbcache on Windows operating systems
SQLNET.KERBEROS5_CC_NAME=/usr/tmp/krbcache
Use the parameter SQLNET.KERBEROS5_CLOCKSKEW to specify how many seconds can pass before a Kerberos credential is considered out of date.
300
SQLNET.KERBEROS5_CLOCKSKEW=1200
Use the parameter SQLNET.KERBEROS5_CONF to specify the complete path name to the Kerberos configuration file, which contains the realm for the default Key Distribution Center (KDC) and maps realms to KDC hosts. The KDC maintains a list of user principals and is contacted through the kinit program for the user's initial ticket.
/krb5/krb.conf on UNIX operating systems and c:\krb5\krb.conf on Windows operating systems
SQLNET.KERBEROS5_CONF=/krb5/krb.conf
Use the parameter SQLNET.KERBEROS5_KEYTAB to specify the complete path name to the Kerberos principal/secret key mapping file, which is used to extract keys and decrypt incoming authentication information.
/etc/v5srvtab on UNIX operating systems and c:\krb5\v5srvtab on Windows operating systems
SQLNET.KERBEROS5_KEYTAB=/etc/v5srvtab
Use the parameter SQLNET.KERBEROS5_REALMS to specify the complete path name to the Kerberos realm translation file, which provides a mapping from a host name or domain name to a realm.
/krb5/krb.realms on UNIX operating systems and c:\krb5\krb.realms on Windows operating systems
SQLNET.KERBEROS5_REALMS=/krb5/krb.realms
Use the parameter SQLNET.RADIUS_ALTERNATE to specify an alternate RADIUS server to use in case the primary server is unavailable. The value can be either the IP address or host name of the server.
None
SQLNET.RADIUS_ALTERNATE=radius2
Use the parameter SQLNET.RADIUS_ALTERNATE_PORT to specify the listening port of the alternate RADIUS server.
1645
SQLNET.RADIUS_ALTERNATE_PORT=1667
Use the parameter SQLNET.RADIUS_ALTERNATE_RETRIES to specify the number of times the database server should resend messages to the alternate RADIUS server.
3
SQLNET.RADIUS_ALTERNATE_RETRIES=4
Use the parameter SQLNET.RADIUS_AUTHENTICATION to specify the location of the primary RADIUS server, either by its host name or IP address.
Local host
SQLNET.RADIUS_AUTHENETICATION=officeacct
Use the parameter SQLNET.RADIUS_AUTHENTICATION_INTERFACE to specify the class containing the user interface used to interact with the user.
DefaultRadiusInterface
SQLNET.RADIUS_AUTHENTICATION_INTERFACE=DefaultRadiusInterface
Use the parameter SQLNET.RADIUS_AUTHENTICATION_PORT to specify the listening port of the primary RADIUS server.
1645
SQLNET.RADIUS_AUTHENTICATION_PORT= 1667
Use the parameter SQLNET.RADIUS_AUTHENTICATION_RETRIES to specify the number of times the database server should resend messages to the primary RADIUS server.
3
SQLNET.RADIUS_AUTHENTICATION_RETRIES=4
Use the parameter SQLNET.RADIUS_AUTHENTICATION_TIMEOUT to specify the time, in seconds, that the database server should wait for a response from the primary RADIUS server.
5
SQLNET.RADIUS_AUTHENTICATION_TIMEOUT=10
Use the parameter SQLNET.RADIUS_CHALLENGE_RESPONSE to turn challenge response on or off.
off
on | off
SQLNET.RADIUS_CHALLENGE_RESPONSE=on
Use the parameter SQLNET.RADIUS_SECRET to specify the location of the RADIUS secret key.
The $ORACLE_HOME/network/security/radius.key file on UNIX operating systems and the ORACLE_HOME\network\security\radius.key file on Windows NT
SQLNET.RADIUS_SECRET=oracle/bin/admin/radiuskey
Use the parameter SQLNET.RADIUS_SEND_ACCOUNTING to turn accounting on and off. If enabled, packets are sent to the active RADIUS server at listening port plus one. The default port is 1646.
off
on | off
SQLNET.RADIUS_SEND_ACCOUNTING=on
Use the parameter SSL_CIPHER_SUITES to control what combination of encryption and data integrity is used by the Secure Sockets Layer (SSL).
None
| See Also:
Oracle Advanced Security Administrator's Guide for further information about cipher suite values |
SSL_CIPHER_SUITE=(ssl_rsa_with_rc4_138_md5)
Use the parameter SSL_CLIENT_AUTHENTICATION to specify whether or not a client--in addition to the database server--is authenticated using SSL.
true
true | false
SSL_CLIENT_AUTHENTICATION=true
Use the parameter SSL_SERVER_DN_MATCH to enforce that the distinguished name (DN) for the database server matches its service name. If you enforce the match verifications, then SSL ensures that the certificate is from the server. If you select to not enforce the match verification, then SSL performs the check but allows the connection, regardless if there is a match. Not enforcing the match allows the server to potentially fake its identify.
no
yes | on | true to specify to enforce a match. If the DN matches the service name, then the connection succeeds. If the DN does not match the service name, then the connection fails.no | off | false to specify to not enforce a match. If does not match the service name, then the connection is successful, but an error is logged to the sqlnet.log file.In addition to the sqlnet.ora file, configure the tnsnames.ora parameter SSL_SERVER_CERT_DN to enable server DN matching.
SSL_SERVER_DN_MATCH=yes
Use the parameter SSL_VERSION to force the version of the SSL connection.
Clients and database servers must use a compatible version.
undetermined
undetermined | 2.0 | 3.0
SSL_VERSION=2.0
Use the parameter TCP.EXCLUDED_NODES to specify which clients are denied access to the database.
TCP.EXCLUDED_NODES=(hostname |ip_address, hostname |ip_address, ...)
TCP.EXCLUDED_NODES=(finance.us.acme.com, mktg.us.acme.com, 144.25.5.25)
Use the parameter TCP.INVITED_NODES to specify which clients are allowed access to the database. This list takes precedence over the TCP.EXCLUDED_NODES parameter if both lists are present.
TCP.INVITED_NODES=(hostname |ip_address, hostname |ip_address, ...)
TCP.INVITED_NODES=(sales.us.acme.com, hr.us.acme.com, 144.185.5.73)
Use the parameter TCP.VALIDNODE_CHECKING to check for the TCP.INVITED_NODES and TCP.EXCLUDED_NODES to determine which clients to allow or deny access.
no
yes | no
TCP.VALIDNODE_CHECKING=yes
Use the parameter TCP.NODELAY to preempt delays in buffer flushing within the TCP/IP protocol stack.
no
yes | no
TCP.NODELAY=yes
Use the parameter TNSPING.TRACE_DIRECTORY to specify the destination directory for the TNSPING utility trace file, tnsping.trc.
The $ORACLE_HOME/network/trace directory on UNIX operating systems and the ORACLE_HOME\network\trace directory on Windows operating systems
TNSPING.TRACE_DIRECTORY=/oracle/traces
Use the parameter TNSPING.TRACE_LEVEL to turn TNSPING utility tracing on, at a specific level, or off.
off
off for no trace outputuser for user trace informationadmin for administration trace informationsupport for Oracle Support Services trace informationTNSPING.TRACE_LEVEL=admin
Use the parameter TRACE_DIRECTORY_CLIENT to specify the destination directory for the client trace file.
The $ORACLE_HOME/network/trace directory on UNIX operating systems and the ORACLE_HOME\network\trace directory on Windows operating systems
TRACE_DIRECTORY_CLIENT=/oracle/traces
Use the parameter TRACE_DIRECTORY_SERVER to specify the destination directory for the database server trace file.
The $ORACLE_HOME/network/trace directory on UNIX operating systems and the ORACLE_HOME\network\trace directory on Windows NT
TRACE_DIRECTORY_SERVER=/oracle/traces
Use the parameter TRACE_FILE_CLIENT to specify the name of the client trace file.
sqlnet.trc
TRACE_FILE_CLIENT=clientsqlnet.trc
Use the parameter TRACE_FILE_SERVER to specify the name of the database server trace file
svr_pid.trc
TRACE_FILE_SERVER=svrsqlnet.trc
Use the parameter TRACE_FILELEN_CLIENT to specify the size of the client trace files in kilobytes (KB). When the size is met, the trace information is written to the next file. The number of files is specified with the TRACE_FILENO_CLIENT parameter.
TRACE_FILELEN_CLIENT=100
Use the parameter TRACE_FILELEN_SERVER to specify the size of the database server trace files in kilobytes (KB). When the size is met, the trace information is written to the next file. The number of files is specified with the TRACE_FILENO_SERVER parameter.
TRACE_FILELEN_SERVER=100
Use the parameter TRACE_FILENO_CLIENT to specify the number of trace files for client tracing. When this parameter is set along with the TRACE_FILELEN_CLIENT parameter, trace files are used in a cyclical fashion. The first file is filled first, then the second file, and so on. When the last file has been filled, the first file is re-used, and so on.
The trace file names are distinguished from one another by their sequence number. For example, if the default trace file of sqlnet.trc is used, and this parameter is set to 3, the trace files would be named sqlnet1.trc, sqlnet2.trc and sqlnet3.trc.
In addition, trace events in the trace files are preceded by the sequence number of the file.
None
TRACE_FILENO_CLIENT=3
Use the parameter TRACE_FILENO_SERVER to specify the number of trace files for database server tracing. When this parameter is set along with the TRACE_FILELEN_SERVER parameter, trace files are used in a cyclical fashion. The first file is filled first, then the second file, and so on. When the last file has been filled, the first file is re-used, and so on.
The trace file names are distinguished from one another by their sequence number. For example, if the default trace file of svr_pid.trc is used, and this parameter is set to 3, the trace files would be named svr1_pid.trc, svr2_pid.trc and svr3_pid.trc.
In addition, trace events in the trace files are preceded by the sequence number of the file.
None
TRACE_FILENO_SERVER=3
Use the parameter TRACE_LEVEL_CLIENT to turn client tracing on, at a specific level, or off.
off
off for no trace outputuser for user trace informationadmin for administration trace informationsupport for Oracle Support Services trace informationTRACE_LEVEL_CLIENT=user
Use the parameter TRACE_LEVEL_SERVER to turn server tracing on, at a specific level, or off.
off
off for no trace outputuser for user trace informationadmin for administration trace informationsupport for Oracle Support Services trace informationTRACE_LEVEL_SERVER=admin
Use the parameter TRACE_TIMESTAMP_CLIENT to add a time stamp in the form of dd-mon-yyyy hh:mi:ss:mil to every trace event in the client trace file, which has a default name of sqlnet.trc.
on
on or true | off or false
TRACE_TIMESTAMP_SERVER=true
Use the parameter TRACE_TIMESTAMP_SERVER to add a time stamp in form of dd-mon-yyyy hh:mi:ss:mil to every trace event in the database server trace file, which has a default name of svr_pid.trc.
off
on or true | off or false
TRACE_TIMESTAMP_SERVER=true
Use the parameter TRACE_UNIQUE_CLIENT to specify whether or not a unique trace file is created for each client trace session. When the value is set to on, a process identifier is appended to the name of each trace file, enabling several files to coexist. For example, trace files named sqlnetpid.trc are created if default trace file name sqlnet.trc is used. When the value is set to off, data from a new client trace session overwrites the existing file.
on
on or off
TRACE_UNIQUE_CLIENT=on
If set to true, the parameter USE_CMAN routes the client to a protocol address for an Oracle Connection Manager.
The following example shows two address lists. While the first address list routes the client to an Oracle Connection Manager, the second address list routes the client directly to a listener.
sales= (DESCRIPTION= (LOAD_BALANCE=on) (FAILOVER=on) (ADDRESS_LIST= (SOURCE_ROUTE=yes) (ADDRESS=(PROTOCOL=tcp)(HOST=host1)(PORT=1630)) (ADDRESS=(PROTOCOL=tcp)(HOST=host2)(PORT=1521))) (ADDRESS_LIST= (ADDRESS=(PROTOCOL=tcp)(HOST=host3)(PORT=1521))) (CONNECT_DATA=(SERVICE_NAME=sales.us.acme.com)))
Without USE_CMAN=true, the client picks one of the address lists at random and fails over to the other address list if the chosen ADDRESS_LIST fails. With USE_CMAN=true, the client always uses the first address list.
If no Oracle Connection Manager addresses are available, connections are routed through any available listener address.
|
Note: If you are using Oracle Connection Manager with Oracle Names, this option must be set on clients and Oracle Names servers. |
false
true | false
USE_CMAN=true
If set to on, the parameter USE_DEDICATED_SERVER automatically appends (SERVER=dedicated) to the connect data for a connect descriptor. This way connections from this client use a dedicated server process, even if shared server is configured.
This parameter adds (SERVER=dedicated) to the CONNECT_DATA section of the connect descriptor used by the client. It overrides the current value of the SERVER parameter in the tnsnames.ora file.
| See Also:
Oracle9i Net Services Administrator's Guide for complete configuration information |
off
USE_DEDICATED_SERVER=on
Use the parameter WALLET_LOCATION to specify the location of wallets. Wallets are certificates, keys, and trustpoints processed by SSL.
Oracle wallets on file system:
WALLET_LOCATION= (SOURCE= (METHOD=file) (METHOD_DATA= (DIRECTORY=directory)))
Microsoft certificate store:
WALLET_LOCATION= (SOURCE= (METHOD=mcs))
Oracle wallets in the Windows NT registry:
WALLET_LOCATION=
(SOURCE=
(METHOD=reg)
(METHOD_DATA=
(KEY=registry_key)))
Entrust wallets:
WALLET_LOCATION= (SOURCE= (METHOD=entr) (METHOD_DATA= (PROFILE=file.epf) (INIFILE=file.ini)))
WALLET_LOCATION supports the following subparameters:
SOURCE: Specify the type of storage for wallets and storage location.
METHOD: Specify the type of storage.
METHOD_DATA: Specify the storage location.
DIRECTORY: Specify the location of Oracle wallets on file system.
KEY: Specify the wallet type and location in the Windows NT registry.
PROFILE: Specify the Entrust profile file (.epf).
INIFILE: Specify the Entrust initialization file (.ini).
None
METHOD_DATA parameter because MCS does not use wallets. Instead, Oracle PKI (public key infrastructure) applications obtain certificates, trustpoints and private keys directly from the user's profile.key (KEY) is SALESAPP, the storage location of the encrypted wallet is HKEY_CURRENT_USER\SOFTWARE\ORACLE\WALLETS\SALESAPP\EWALLET.P12. The storage location of the decrypted wallet is HKEY_CURRENT_USER\SOFTWARE\ORACLE\WALLETS\SALESAPP\CWALLET.SSO.Oracle wallets on file system:
WALLET_LOCATION= (SOURCE= (METHOD=file) (METHOD_DATA= (DIRECTORY=/etc/oracle/wallets/databases)))
Microsoft certificate store:
WALLET_LOCATION= (SOURCE= (METHOD=mcs))
Oracle Wallets in the Windows NT registry:
WALLET_LOCATION= (SOURCE= (METHOD=REG) (METHOD_DATA= (KEY=SALESAPP)))
Entrust Wallets:
WALLET_LOCATION= (SOURCE= (METHOD=entr) (METHOD_DATA= (PROFILE=/etc/oracle/wallets/test.epf) (INIFILE=/etc/oracle/wallets/test.ini)))