Index: A
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: A
- absolute pathnames, symbolic links and: 6.4.2. Absolute and relative pathnames
 
- absolute values, server response time threshold: 16.2. Measuring performance
 
- accelerated make phenomenon: 7.4.1. File attribute caching
 
- AccessMode field, NFS log record: 14.6. NFS server logging
 
- accounting domain: 3.1. Masters, slaves, and clients
 
- accounts, password hashes: 3.2.2. Installing the NIS master server
 
- ACLs (Access Control Lists): 12.4.8. Access control lists
 
  
  - access denial: 12.4.8.1. ACLs that deny access
 
  
  - NFS and: 12.4.8.2. ACLs and NFS
 
 
- Address Resolution Protocol (see ARP)
 
  - 13.1. Broadcast addresses
 
 
- addresses
 
  
  - broadcast addresses: 13.1. Broadcast addresses
 
  
  - Ethernet: 1.2.2. Ethernet addresses
 
    - 13.1. Broadcast addresses
 
  
 
  
  - host: 1.3.2. IP host addresses
 
  
  - IP: 1.3.2. IP host addresses
 
  
  - IP to MAC mapping: 13.2.3. IP to MAC address mappings
 
  
  - IPv6: 1.3.6. IP Version 6
 
    
    - unspecified: 1.3.6.3. IP Version 6 unspecified address
 
  
 
  
  - MAC: 1.2.2. Ethernet addresses
 
  
  - unicast: 13.1. Broadcast addresses
 
 
- admhostadd command: 8.2. Setting up a diskless client
 
- administration
 
  
  - centralized managment: 5.4. Centralized versus distributed management
 
  
  - diskless clients: 8. Diskless Clients
 
  
  - distributed management: 5.4. Centralized versus distributed management
 
  
  - NFS diagnostic tools: 14.1. NFS administration tools
 
  
  - NIS, advanced: 4.3. Advanced NIS server administration
 
 
- administrative files
 
  
  - appending to: 3.2.4. Enabling NIS on client hosts
 
  
  - deleting: 3.2.4. Enabling NIS on client hosts
 
  
  - inspecting: 3.2.2. Installing the NIS master server
 
  
  - referencing: 3.2.4. Enabling NIS on client hosts
 
  
  - replaced files, local copies: 3.2.4. Enabling NIS on client hosts
 
 
- AdminSuite: 8. Diskless Clients
 
  
  - dataless configuration: 8.7.1. Dataless clients
 
  
  - diskless client and: 8.2. Setting up a diskless client
 
  
  - forms: 8.2. Setting up a diskless client
 
 
- advisory locking, file locking: 11.1.3. Mandatory versus advisory locking
 
- AES (Advanced Encryption Standard): 12.5.7. NFS security futures
 
- aliases, domains: 5.1.4. Domain aliases
 
- aliases map, domains: 4.4. Managing multiple domains
 
- allocating servers, domains: 4.1.3. Number of NIS servers per domain
 
- ampersand (&), automounter maps: 9.4.1. Key substitutions
 
- anonymous users, mapping: 12.4.3. Unknown user mapping
 
- appending administrative files: 3.2.4. Enabling NIS on client hosts
 
- architecture
 
  
  - networks, dataless clients: 8.7.1. Dataless clients
 
  
  - platform: 8.2. Setting up a diskless client
 
  
  - processor: 8.2. Setting up a diskless client
 
 
- ARP: 1.3.2. IP host addresses
 
  - 8.3.1. Reverse ARP requests
 
  - 13.1. Broadcast addresses
 
  
  - duplicate replies: 15.1. Duplicate ARP replies
 
  
  - request and reply mismatches: 15.1. Duplicate ARP replies
 
  
  - UDP packets and: 15.1. Duplicate ARP replies
 
 
- arrays, data representation and: 1.5.2. External data representation
 
- ASCII code
 
  
  - files, converting to DBM: 3.3.6. Map naming
 
  
  - source files, NIS maps: 3.2.3. Installing NIS slave servers
 
 
- asymmetric key encryption: 12.5.2.2. Asymmetric key encryption
 
- async threads: 18.5. NFS async thread tuning
 
  
  - buffer cache: 7.3.2. Client I/O system
 
  
  - decreasing, performance and: 18.5. NFS async thread tuning
 
  
  - dirty page clustering: 7.3.2. Client I/O system
 
 
- ATM (Asynchronous Transfer Mode) networks: 17.3.2. ATM and FDDI networks
 
- attribute timeouts: 6.3.3. Mount options
 
- attributes
 
  
  - caching: 18.6. Attribute caching
 
  
  - files, caching and: 7.4.1. File attribute caching
 
 
- AUTH_DES security flavor: 12.5.4.1. Old terms: AUTH_DES, secure RPC, and, secure NFS
 
- AUTH_DH security flavor, Diffie-Hellman authentication: 12.5.4. AUTH_DH: Diffie-Hellman authentication
 
- Authenticated field, NFS log record: 14.6. NFS server logging
 
- authentication: 12.2. How secure are NIS and NFS?
 
  
  - Kerberos V5: 12.5.5.1. Kerberos V5
 
 
- AUTH_SYS security flavor: 12.2. How secure are NIS and NFS?
 
- autofs automounter: 9.1.2. Inside the automounter
 
- automountd daemon: 9.2.2. Command-line options
 
- automounter: 6. System Administration Using the Network File System
 
  - 6.3. Mounting filesystems
 
  
  - advanced operations: 9.5. Advanced map tricks
 
  
  - autofs: 9.1.2. Inside the automounter
 
    - 9.1.2.2. The autofs automounter
 
  
 
  
  - hierarchical mounts: 9.5.2. Hierarchical mounts
 
  
  - maps
 
    
    - ampersand (&): 9.4.1. Key substitutions
 
    
    - direct: 9.1. Automounter maps
 
      - 9.1.3. Direct maps
 
      - 9.3.2. Updating NIS-managed automount maps
 
      - 9.5.3. Conversion of direct maps
 
    
 
    
    - executable: 9.5.5. Executable indirect maps
 
    
    - indirect: 9.1. Automounter maps
 
      - 9.1.1. Indirect maps
 
      - 9.5.4. Multiple indirection
 
    
 
    
    - master: 9.1. Automounter maps
 
      - 9.2. Invocation and the master map
 
    
 
    
    - NIS and: 9.3.1. Mixing NIS and files in the same map
 
    
    - NIS-managed, updating: 9.3.2. Updating NIS-managed automount maps
 
    
    - null map: 9.2.3. The null map
 
    
    - substitutions: 9.4. Key and variable substitutions
 
  
 
  
  - naming schemes and: 6.6. Naming schemes
 
  
  - NIS integration: 9.3. Integration with NIS
 
  
  - overview: 9. The Automounter
 
  
  - pinging, remote servers: 9.5.1. Replicated servers
 
  
  - reasons to use: 9. The Automounter
 
  
  - remote filesystems, cron and: 9.6.2. Avoiding automounted filesystems
 
  
  - replication servers: 9.5.1. Replicated servers
 
  
  - servers, replicated: 9.5.1. Replicated servers
 
  
  - side effects, long search paths: 9.6.1. Long search paths
 
  
  - symbolic links and: 9.1.1. Indirect maps
 
  
  - timouts: 9.2.4. Tuning timeout values
 
  
  - user-level automounters: 9.1.2.1. User-level automounters
 
  
  - variables, built-in: 9.4.2.1. Builtin variables
 
 
- auto_tools indirect map, user-level automounter and: 9.1.2.1. User-level automounters
 
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2002
O'Reilly & Associates, Inc.
All Rights Reserved.