Index: A
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: A
- absolute pathnames, symbolic links and: 6.4.2. Absolute and relative pathnames
- absolute values, server response time threshold: 16.2. Measuring performance
- accelerated make phenomenon: 7.4.1. File attribute caching
- AccessMode field, NFS log record: 14.6. NFS server logging
- accounting domain: 3.1. Masters, slaves, and clients
- accounts, password hashes: 3.2.2. Installing the NIS master server
- ACLs (Access Control Lists): 12.4.8. Access control lists
- access denial: 12.4.8.1. ACLs that deny access
- NFS and: 12.4.8.2. ACLs and NFS
- Address Resolution Protocol (see ARP)
- 13.1. Broadcast addresses
- addresses
- broadcast addresses: 13.1. Broadcast addresses
- Ethernet: 1.2.2. Ethernet addresses
- 13.1. Broadcast addresses
- host: 1.3.2. IP host addresses
- IP: 1.3.2. IP host addresses
- IP to MAC mapping: 13.2.3. IP to MAC address mappings
- IPv6: 1.3.6. IP Version 6
- unspecified: 1.3.6.3. IP Version 6 unspecified address
- MAC: 1.2.2. Ethernet addresses
- unicast: 13.1. Broadcast addresses
- admhostadd command: 8.2. Setting up a diskless client
- administration
- centralized managment: 5.4. Centralized versus distributed management
- diskless clients: 8. Diskless Clients
- distributed management: 5.4. Centralized versus distributed management
- NFS diagnostic tools: 14.1. NFS administration tools
- NIS, advanced: 4.3. Advanced NIS server administration
- administrative files
- appending to: 3.2.4. Enabling NIS on client hosts
- deleting: 3.2.4. Enabling NIS on client hosts
- inspecting: 3.2.2. Installing the NIS master server
- referencing: 3.2.4. Enabling NIS on client hosts
- replaced files, local copies: 3.2.4. Enabling NIS on client hosts
- AdminSuite: 8. Diskless Clients
- dataless configuration: 8.7.1. Dataless clients
- diskless client and: 8.2. Setting up a diskless client
- forms: 8.2. Setting up a diskless client
- advisory locking, file locking: 11.1.3. Mandatory versus advisory locking
- AES (Advanced Encryption Standard): 12.5.7. NFS security futures
- aliases, domains: 5.1.4. Domain aliases
- aliases map, domains: 4.4. Managing multiple domains
- allocating servers, domains: 4.1.3. Number of NIS servers per domain
- ampersand (&), automounter maps: 9.4.1. Key substitutions
- anonymous users, mapping: 12.4.3. Unknown user mapping
- appending administrative files: 3.2.4. Enabling NIS on client hosts
- architecture
- networks, dataless clients: 8.7.1. Dataless clients
- platform: 8.2. Setting up a diskless client
- processor: 8.2. Setting up a diskless client
- ARP: 1.3.2. IP host addresses
- 8.3.1. Reverse ARP requests
- 13.1. Broadcast addresses
- duplicate replies: 15.1. Duplicate ARP replies
- request and reply mismatches: 15.1. Duplicate ARP replies
- UDP packets and: 15.1. Duplicate ARP replies
- arrays, data representation and: 1.5.2. External data representation
- ASCII code
- files, converting to DBM: 3.3.6. Map naming
- source files, NIS maps: 3.2.3. Installing NIS slave servers
- asymmetric key encryption: 12.5.2.2. Asymmetric key encryption
- async threads: 18.5. NFS async thread tuning
- buffer cache: 7.3.2. Client I/O system
- decreasing, performance and: 18.5. NFS async thread tuning
- dirty page clustering: 7.3.2. Client I/O system
- ATM (Asynchronous Transfer Mode) networks: 17.3.2. ATM and FDDI networks
- attribute timeouts: 6.3.3. Mount options
- attributes
- caching: 18.6. Attribute caching
- files, caching and: 7.4.1. File attribute caching
- AUTH_DES security flavor: 12.5.4.1. Old terms: AUTH_DES, secure RPC, and, secure NFS
- AUTH_DH security flavor, Diffie-Hellman authentication: 12.5.4. AUTH_DH: Diffie-Hellman authentication
- Authenticated field, NFS log record: 14.6. NFS server logging
- authentication: 12.2. How secure are NIS and NFS?
- Kerberos V5: 12.5.5.1. Kerberos V5
- AUTH_SYS security flavor: 12.2. How secure are NIS and NFS?
- autofs automounter: 9.1.2. Inside the automounter
- automountd daemon: 9.2.2. Command-line options
- automounter: 6. System Administration Using the Network File System
- 6.3. Mounting filesystems
- advanced operations: 9.5. Advanced map tricks
- autofs: 9.1.2. Inside the automounter
- 9.1.2.2. The autofs automounter
- hierarchical mounts: 9.5.2. Hierarchical mounts
- maps
- ampersand (&): 9.4.1. Key substitutions
- direct: 9.1. Automounter maps
- 9.1.3. Direct maps
- 9.3.2. Updating NIS-managed automount maps
- 9.5.3. Conversion of direct maps
- executable: 9.5.5. Executable indirect maps
- indirect: 9.1. Automounter maps
- 9.1.1. Indirect maps
- 9.5.4. Multiple indirection
- master: 9.1. Automounter maps
- 9.2. Invocation and the master map
- NIS and: 9.3.1. Mixing NIS and files in the same map
- NIS-managed, updating: 9.3.2. Updating NIS-managed automount maps
- null map: 9.2.3. The null map
- substitutions: 9.4. Key and variable substitutions
- naming schemes and: 6.6. Naming schemes
- NIS integration: 9.3. Integration with NIS
- overview: 9. The Automounter
- pinging, remote servers: 9.5.1. Replicated servers
- reasons to use: 9. The Automounter
- remote filesystems, cron and: 9.6.2. Avoiding automounted filesystems
- replication servers: 9.5.1. Replicated servers
- servers, replicated: 9.5.1. Replicated servers
- side effects, long search paths: 9.6.1. Long search paths
- symbolic links and: 9.1.1. Indirect maps
- timouts: 9.2.4. Tuning timeout values
- user-level automounters: 9.1.2.1. User-level automounters
- variables, built-in: 9.4.2.1. Builtin variables
- auto_tools indirect map, user-level automounter and: 9.1.2.1. User-level automounters
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2002
O'Reilly & Associates, Inc.
All Rights Reserved.