Index: S
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: S
- Samba, PC/NFS and: 10.2.1. NFS versus SMB (CIFS)
 
- SATAN, diagnostics and: 14.4.5. SATAN
 
- saturation, network collisions: 17.1.2. Collisions and network saturation
 
- SCCS
 
  
  - map files: 4.2.5. Source code control for map files
 
  
  - maps, disadvantages: 4.2.5. Source code control for map files
 
 
- schema, X.500 and: 2.2.4. X.500
 
- SEAM (Sun Enterprise Authentication Mechanism): 12.5.5.2. SEAM: Kerberos V5 for Solaris
 
- search paths, automounter and: 9.6.1. Long search paths
 
- SEAS (Solaris Easy Access Server): 8.2. Setting up a diskless client
 
- secret key, symmetric key encryption: 12.5.2.1. Symmetric key encryption
 
- secure NFS: 12.5.4.1. Old terms: AUTH_DES, secure RPC, and, secure NFS
 
- secure RPC: 12.5.4.1. Old terms: AUTH_DES, secure RPC, and, secure NFS
 
- securenets file: 12.3.2.1. The secure nets file
 
- security
 
  
  - ACLs: 12.4.8. Access control lists
 
  
  - anonymous users, mapping: 12.4.3. Unknown user mapping
 
  
  - asymmetric key encryption: 12.5.2.2. Asymmetric key encryption
 
  
  - AUTH_DH: 12.5.4. AUTH_DH: Diffie-Hellman authentication
 
  
  - authentication: 12.2. How secure are NIS and NFS?
 
  
  - AUTH_SYS security flavor: 12.2. How secure are NIS and NFS?
 
  
  - cryptography: 12.5.2. Brief introduction to cryptography 
 
  
  - DCE/DFS: 12.2. How secure are NIS and NFS?
 
  
  - filesystem access: 12.4.4. Access to filesystems
 
  
  - firewalls: 12.4.7. Using NFS through firewalls
 
  
  - future of: 7.6.2. Security
 
  
  - IPsec: 12.5.3. NFS and IPSec
 
  
  - Kerberos V5: 12.5.5. RPCSEC_GSS: Generic security services for RPC
 
  
  - LDAP and: 12.2. How secure are NIS and NFS?
 
  
  - login restrictions: 12.1. User-oriented network security
 
  
  - MACs: 12.5.2.4. One-way hash functions and MACs
 
  
  - maps, private: 12.3.2. Making NIS more secure
 
  
  - netgroups: 12.1.3. Using netgroups
 
  
  - NFS: 12.4. NFS security
 
    
    - future of: 12.5.7. NFS security futures
 
    
    - increasing: 12.5. Stronger security for NFS
 
    
    - increasing, transition: 12.5.6. Planning a transition from NFS/sys to stronger NFS security
 
    
    - levels: 12.2. How secure are NIS and NFS?
 
    
    - RPC: 12.4.1. RPC security
 
    
    - superuser mapping: 12.4.2. Superuser mapping
 
    
    - version 4 and: 7.6.1. NFS Version 4
 
  
 
  
  - NIS
 
    
    - increasing: 12.3.2. Making NIS more secure
 
    
    - passwords: 12.3. Password and NIS security
 
  
 
  
  - NIS+ and: 2.2.3. NIS+
 
  
  - NIS levels: 12.2. How secure are NIS and NFS?
 
  
  - one-way hash functions: 12.5.2.4. One-way hash functions and MACs
 
  
  - performance and: 12.5.5.4. Security and performance
 
  
  - port monitoring: 12.4.6. Port monitoring
 
  
  - private keys: 12.5.4.6. Public and private keys
 
  
  - public key exchange: 12.5.2.3. Public key exchange
 
  
  - public keys: 12.5.4.6. Public and private keys
 
  
  - read-only access: 12.4.5. Read-only access
 
  
  - RPC: 12.4.1. RPC security
 
  
  - RPC/DH: 12.5.4.3. How RPC/DH works
 
  
  - RPCSEC_GSS: 12.5.5. RPCSEC_GSS: Generic security services for RPC
 
  
  - SATAN: 14.4.5. SATAN
 
  
  - SEAM: 12.5.5.2. SEAM: Kerberos V5 for Solaris
 
  
  - securenets file: 12.3.2.1. The secure nets file
 
  
  - services: 12.5.1. Security services
 
  
  - session keys: 12.5.4.8. Establishing a session key
 
  
  - setuid executables and: 12.4.2. Superuser mapping
 
  
  - SMB (CIFS): 12.2. How secure are NIS and NFS?
 
  
  - symmetric key encryption: 12.5.2.1. Symmetric key encryption
 
  
  - trusted hosts: 12.1.1. Trusted hosts and trusted users
 
  
  - trusted users: 12.1.1. Trusted hosts and trusted users
 
  
  - UIDs: 12.3.3. Unknown password entries
 
  
  - user-oriented: 12.1. User-oriented network security
 
  
  - viruses: 12.6. Viruses
 
 
- server only NIS: 3.1. Masters, slaves, and clients
 
- server response time, 
  
  threshold value: 16.2. Measuring performance
 
- server-side caching: 7.4.3. Server-side caching
 
- server-side configuration, PC/NFS: 10.3.1. Server-side PC/NFS configuration
 
- server-side fields (RPC), statistics: 14.2. NFS statistics
 
- server-side performance tuning: 16. Server-Side Performance Tuning
 
  
  - benchmarking: 16.3. Benchmarking
 
 
- server threads: 7.2.1. NFS RPC procedures
 
  - 7.3.3. NFS kernel code
 
  
  - NFS: 7.3.1. nfsd and NFS server threads
 
 
- server-to-client relationships, trusted hosts and users: 12.1.1. Trusted hosts and trusted users
 
- server-to-server relationships, trusted hosts and users: 12.1.1. Trusted hosts and trusted users
 
- servers
 
  
  - allocating, domains: 4.1.3. Number of NIS servers per domain
 
  
  - as clients: 3.3.11. NIS server as an NIS client
 
  
  - compensation, slow: 18.1. Slow server compensation
 
  
  - configuration
 
    
    - diskless clients: 8. Diskless Clients
 
    
    - RPCs and: 1.5.3. Internet and RPC server configuration
 
  
 
  
  - CPU loading, bottlenecks and: 16.4.1. Problem areas
 
  
  - disk bandwidth: 16.4.1. Problem areas
 
  
  - DNS: 5.2.3. Run DNS on NIS clients and servers
 
  
  - load, buffer size and: 18.3. Adjusting for network reliability problems
 
  
  - locating, binding the domain: 3.3.10. The ypbind daemon
 
  
  - log files: 14.6.1. NFS server logging mechanics
 
  
  - logging
 
    
    - configuration: 14.6.3. NFS server logging configuration
 
    
    - configuration files: 14.6.3. NFS server logging configuration
 
    
    - disabling: 14.6.9. Disabling NFS server logging
 
    
    - enabling: 14.6.2. Enabling NFS server logging
 
  
 
  
  - master server
 
    
    - creating: 3.2.2. Installing the NIS master server
 
    
    - hosts, changing: 4.3.2. Changing NIS master servers
 
    
    - number of: 3.2.2. Installing the NIS master server
 
    
    - unavailable: 3.2.2. Installing the NIS master server
 
    
    - ypxfr tool: 4.2.2. Regular map transfers
 
  
 
  
  - memory usage, bottlenecks: 16.4.1. Problem areas
 
  
  - multihomed: 16.5.7. Multihomed servers
 
  
  - network interface, bottlenecks: 16.4.1. Problem areas
 
  
     - NFS, troubleshooting:  B.1. NFS server problems
 
  
  - NIS
 
    
    - selecting: 3.2.1. Choosing NIS servers
 
    
    - testing: 3.2.2. Installing the NIS master server
 
  
 
  
  - NLM crash: 11.2.2.1. Server crash
 
  
  - performance tuning: 16.5. Server tuning
 
    
    - buffers: 16.5.3. Memory usage
 
    
    - CPU loading: 16.5.1. CPU loading
 
    
    - cross-mounting filesystem: 16.5.6. Cross-mounting filesystems
 
    
    - kernel configuration: 16.5.5. Kernel configuration
 
    
    - memory usage: 16.5.3. Memory usage
 
    
    - multhomed: 16.5.7. Multihomed servers
 
    
    - nfsd threads: 16.5.2. NFS server threads
 
    
    - throughput: 16.5.4. Disk and filesystem throughput
 
  
 
  
  - renegade, debugging case study: 15.2. Renegade NIS server
 
  
  - replication, automounter: 9.5.1. Replicated servers
 
  
  - response time
 
    
    - disk-intensive activity and: 16.2. Measuring performance
 
    
    - users and: 16.2. Measuring performance
 
  
 
  
  - root privileges: 12.3.1. Managing the root password with NIS
 
  
  - RPC
 
    
    - configuration: 1.5.3. Internet and RPC server configuration
 
    
    - initialization: 1.5.3. Internet and RPC server configuration
 
  
 
  
  - slave server
 
    
    - adding: 3.2. Basics of NIS management
 
    
    - adding later: 3.2.3.1. Adding slave servers later
 
    
    - initializing: 3.2.3. Installing NIS slave servers
 
    
    - installing: 3.2.3. Installing NIS slave servers
 
    
    - listing: 3.2.3. Installing NIS slave servers
 
    
    - removing: 4.3.1. Removing an NIS slave server
 
  
 
  
  - slow
 
    
    - testing: 18.1.1. Identifying NFS retransmissions
 
    
    - timeo parameter and: 18.1.2. Timeout period calculation
 
  
 
  
  - terminal servers: 16.5.1. CPU loading
 
  
  - usage guage: 4.1.3. Number of NIS servers per domain
 
 
- Service field, NFS log record: 14.6. NFS server logging
 
- session keys: 12.5.4.8. Establishing a session key
 
- session layer (7-layer model): 1.5. The session and presentation layers
 
- setuid
 
  
  - executables, security and: 12.4.2. Superuser mapping
 
  
  - root privileges, remote files and: 12.4.2. Superuser mapping
 
 
- setup
 
  
  - diskless clients: 8.2. Setting up a diskless client
 
  
  - NFS: 6.1. Setting up NFS
 
 
- share command: 6.2. Exporting filesystems
 
  
  - enabling logging: 14.6.1. NFS server logging mechanics
 
  
  - exporting filesystems and: 6.2.2. Exporting options
 
 
- share utility, /etc/dfs/sharetab and: 14.1. NFS administration tools
 
- showmount command: 13.3.1.1. Identifying RPC services
 
  - 14.1. NFS administration tools
 
 
- slave servers: 3.1. Masters, slaves, and clients
 
  
  - adding: 3.2. Basics of NIS management
 
  
  - adding later: 3.2.3.1. Adding slave servers later
 
  
  - initializing: 3.2.3. Installing NIS slave servers
 
  
  - installing: 3.2.3. Installing NIS slave servers
 
  
  - listing: 3.2.3. Installing NIS slave servers
 
  
  - removing: 4.3.1. Removing an NIS slave server
 
 
- slow servers, testing for: 18.1.1. Identifying NFS retransmissions
 
- SMB (Server Message Block): 10.2.1. NFS versus SMB (CIFS)
 
  
  - (CIFS) security flavor: 12.2. How secure are NIS and NFS?
 
 
- snoop: 13.5.1. snoop 
 
  - 14.3. snoop
 
  
  - filters: 14.3.1. Useful filters
 
  
  - NFS Server Logging utility: 14.6. NFS server logging
 
 
- socket RPC: 1.5.3.1. Socket RPC and Transport Independent RPC
 
- soft mounts, filesystems: 6.3.5. Hard and soft mounts
 
- Solaris
 
  
  - diskless clients (see diskless clients)
 
  
  - mount command: 6.3.3. Mount options
 
  
  - NFS, export and: 6.2. Exporting filesystems
 
 
- Solaris Easy Access Server (SEAS): 8.2. Setting up a diskless client
 
- solstice command: 8.2. Setting up a diskless client
 
- source code control system (see SCCS)
 
- source code, map files: 4.2.5. Source code control for map files
 
- source files
 
  
  - domain, pushing to new: 4.4. Managing multiple domains
 
  
  - maps: 4.2.1. Map distribution
 
    
    - alternate source files: 4.2.6. Using alternate map source files
 
  
 
  
  - NIS maps, ASCII code: 3.2.3. Installing NIS slave servers
 
 
- source netgroup: 3.3.2. Netgroups
 
- spray utility: 13.2.5. Gauging Ethernet interface capacity
 
- stale filehandler error: 7.2.5. Pathnames and filehandles
 
- stale filehandles
 
  
  - performance and: 18.8. Stale filehandles
 
 
- Standard Performance Evaluation Corporation: 16.2. Measuring performance
 
- stat( ), symbolic links and: 6.4.1. Resolving symbolic links in NFS
 
- statd daemon, NFS startup: 6.1. Setting up NFS
 
- state information: 1.4.1. TCP and UDP
 
  
  - recreating: 7.5.3. Recreating state information
 
 
- stateful protocols: 1.4.1. TCP and UDP
 
   - static routing:  A.1. Routers and their routing tables
 
     -  A.2. Static routing
 
 
- station addresses: 1.3.2. IP host addresses
 
- statistics
 
  
  - filters: 14.3.1. Useful filters
 
  
  - NFS diagnostics: 14.2. NFS statistics
 
  
  - snoop and: 14.3. snoop
 
 
- status daemon: 7.5.1. Lock and status daemons
 
- stepping-stone mount points: 18.7. Mount point constructions
 
- sticky-bit access, swap files: 8.4. Managing client swap space
 
- strings, data representation and: 1.5.2. External data representation
 
- subnetwork masks: 13.2.2. Subnetwork masks
 
- substitutions, automounter maps: 9.4. Key and variable substitutions
 
- Sun Microsystems: 0. Preface
 
- superusers
 
  
  - domain, default: 3.3.8. NIS domains
 
  
  - keys, adding: 12.5.4.7. Creating keys
 
  
  - mapping, NFS: 12.4.2. Superuser mapping
 
  
  - restrictions: 12.4.2. Superuser mapping
 
 
- swap files
 
  
  - sticky-bit access: 8.4. Managing client swap space
 
  
  - temporary: 8.4. Managing client swap space
 
  
  - VM system and: 8.1. NFS support for diskless clients
 
 
- swap filesystem, AdminSuite: 8.2. Setting up a diskless client
 
- swap space, diskless clients: 8.4. Managing client swap space
 
- swapping files, ND and: 8.1. NFS support for diskless clients
 
- switched Ethernets: 17.3.1. Switched networks
 
- switches, networks: 17.2. Network partitioning hardware
 
- symbolic links: 6.4. Symbolic links
 
  
  - absolute pathnames: 6.4.2. Absolute and relative pathnames
 
  
  - automounter and: 9.1.1. Indirect maps
 
  
  - boot blocks: 8.3.2. Getting a boot block
 
  
  - /export subdirectories: 8.2. Setting up a diskless client
 
  
  - exporting filesystems and: 6.4.3. Mount points, exports, and links
 
  
  - mount points construction and: 18.7. Mount point constructions
 
  
  - mounting filesystems and: 6.4.3. Mount points, exports, and links
 
  
  - mounts: 6.4. Symbolic links
 
  
  - relative pathnames: 6.4.2. Absolute and relative pathnames
 
  
  - resolving, NFS: 6.4.1. Resolving symbolic links in NFS
 
 
- symmetric key encryption: 12.5.2.1. Symmetric key encryption
 
- synchronizing time: 14.7. Time synchronization
 
- synchronous serial line, TCP/IP: 1.1. Networking overview
 
- system administration
 
  
  - NFS: 6. System Administration Using the Network File System
 
  
  - NIS: 4. System Management Using NIS
 
 
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 2002
O'Reilly & Associates, Inc.
All Rights Reserved.