Book Home

Networking CD BookshelfSearch this book

Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: A

absolute pathnames, symbolic links and: 6.4.2. Absolute and relative pathnames
absolute values, server response time threshold: 16.2. Measuring performance
accelerated make phenomenon: 7.4.1. File attribute caching
AccessMode field, NFS log record: 14.6. NFS server logging
accounting domain: 3.1. Masters, slaves, and clients
accounts, password hashes: 3.2.2. Installing the NIS master server
ACLs (Access Control Lists): 12.4.8. Access control lists
access denial: 12.4.8.1. ACLs that deny access
NFS and: 12.4.8.2. ACLs and NFS
Address Resolution Protocol (see ARP)
13.1. Broadcast addresses
addresses
broadcast addresses: 13.1. Broadcast addresses
Ethernet: 1.2.2. Ethernet addresses
13.1. Broadcast addresses
host: 1.3.2. IP host addresses
IP: 1.3.2. IP host addresses
IP to MAC mapping: 13.2.3. IP to MAC address mappings
IPv6: 1.3.6. IP Version 6
unspecified: 1.3.6.3. IP Version 6 unspecified address
MAC: 1.2.2. Ethernet addresses
unicast: 13.1. Broadcast addresses
admhostadd command: 8.2. Setting up a diskless client
administration
centralized managment: 5.4. Centralized versus distributed management
diskless clients: 8. Diskless Clients
distributed management: 5.4. Centralized versus distributed management
NFS diagnostic tools: 14.1. NFS administration tools
NIS, advanced: 4.3. Advanced NIS server administration
administrative files
appending to: 3.2.4. Enabling NIS on client hosts
deleting: 3.2.4. Enabling NIS on client hosts
inspecting: 3.2.2. Installing the NIS master server
referencing: 3.2.4. Enabling NIS on client hosts
replaced files, local copies: 3.2.4. Enabling NIS on client hosts
AdminSuite: 8. Diskless Clients
dataless configuration: 8.7.1. Dataless clients
diskless client and: 8.2. Setting up a diskless client
forms: 8.2. Setting up a diskless client
advisory locking, file locking: 11.1.3. Mandatory versus advisory locking
AES (Advanced Encryption Standard): 12.5.7. NFS security futures
aliases, domains: 5.1.4. Domain aliases
aliases map, domains: 4.4. Managing multiple domains
allocating servers, domains: 4.1.3. Number of NIS servers per domain
ampersand (&), automounter maps: 9.4.1. Key substitutions
anonymous users, mapping: 12.4.3. Unknown user mapping
appending administrative files: 3.2.4. Enabling NIS on client hosts
architecture
networks, dataless clients: 8.7.1. Dataless clients
platform: 8.2. Setting up a diskless client
processor: 8.2. Setting up a diskless client
ARP: 1.3.2. IP host addresses
8.3.1. Reverse ARP requests
13.1. Broadcast addresses
duplicate replies: 15.1. Duplicate ARP replies
request and reply mismatches: 15.1. Duplicate ARP replies
UDP packets and: 15.1. Duplicate ARP replies
arrays, data representation and: 1.5.2. External data representation
ASCII code
files, converting to DBM: 3.3.6. Map naming
source files, NIS maps: 3.2.3. Installing NIS slave servers
asymmetric key encryption: 12.5.2.2. Asymmetric key encryption
async threads: 18.5. NFS async thread tuning
buffer cache: 7.3.2. Client I/O system
decreasing, performance and: 18.5. NFS async thread tuning
dirty page clustering: 7.3.2. Client I/O system
ATM (Asynchronous Transfer Mode) networks: 17.3.2. ATM and FDDI networks
attribute timeouts: 6.3.3. Mount options
attributes
caching: 18.6. Attribute caching
files, caching and: 7.4.1. File attribute caching
AUTH_DES security flavor: 12.5.4.1. Old terms: AUTH_DES, secure RPC, and, secure NFS
AUTH_DH security flavor, Diffie-Hellman authentication: 12.5.4. AUTH_DH: Diffie-Hellman authentication
Authenticated field, NFS log record: 14.6. NFS server logging
authentication: 12.2. How secure are NIS and NFS?
Kerberos V5: 12.5.5.1. Kerberos V5
AUTH_SYS security flavor: 12.2. How secure are NIS and NFS?
autofs automounter: 9.1.2. Inside the automounter
automountd daemon: 9.2.2. Command-line options
automounter: 6. System Administration Using the Network File System
6.3. Mounting filesystems
advanced operations: 9.5. Advanced map tricks
autofs: 9.1.2. Inside the automounter
9.1.2.2. The autofs automounter
hierarchical mounts: 9.5.2. Hierarchical mounts
maps
ampersand (&): 9.4.1. Key substitutions
direct: 9.1. Automounter maps
9.1.3. Direct maps
9.3.2. Updating NIS-managed automount maps
9.5.3. Conversion of direct maps
executable: 9.5.5. Executable indirect maps
indirect: 9.1. Automounter maps
9.1.1. Indirect maps
9.5.4. Multiple indirection
master: 9.1. Automounter maps
9.2. Invocation and the master map
NIS and: 9.3.1. Mixing NIS and files in the same map
NIS-managed, updating: 9.3.2. Updating NIS-managed automount maps
null map: 9.2.3. The null map
substitutions: 9.4. Key and variable substitutions
naming schemes and: 6.6. Naming schemes
NIS integration: 9.3. Integration with NIS
overview: 9. The Automounter
pinging, remote servers: 9.5.1. Replicated servers
reasons to use: 9. The Automounter
remote filesystems, cron and: 9.6.2. Avoiding automounted filesystems
replication servers: 9.5.1. Replicated servers
servers, replicated: 9.5.1. Replicated servers
side effects, long search paths: 9.6.1. Long search paths
symbolic links and: 9.1.1. Indirect maps
timouts: 9.2.4. Tuning timeout values
user-level automounters: 9.1.2.1. User-level automounters
variables, built-in: 9.4.2.1. Builtin variables
auto_tools indirect map, user-level automounter and: 9.1.2.1. User-level automounters


Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z


Library Navigation Links

Copyright © 2002 O'Reilly & Associates, Inc. All Rights Reserved.