Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: A
- absolute pathnames, symbolic links and: Absolute and relative pathnames
- absolute values, server response time threshold: Measuring performance
- accelerated make phenomenon: File attribute caching
- AccessMode field, NFS log record: NFS server logging
- accounting domain: Masters, slaves, and clients
- accounts, password hashes: Installing the NIS master server
- ACLs (Access Control Lists): Access control lists
-
- access denial: ACLs that deny access
- NFS and: ACLs and NFS
- Address Resolution Protocol (see ARP)
- addresses
-
- broadcast addresses: Broadcast addresses
- Ethernet: Ethernet addresses
- host: IP host addresses
- IP: IP host addresses
- IP to MAC mapping: IP to MAC address mappings
- IPv6: IP Version 6
-
- unspecified: IP Version 6 unspecified address
- MAC: Ethernet addresses
- unicast: Broadcast addresses
- admhostadd command: Setting up a diskless client
- administration
-
- centralized managment: Centralized versus distributed management
- diskless clients: Diskless Clients
- distributed management: Centralized versus distributed management
- NFS diagnostic tools: NFS administration tools
- NIS, advanced: Advanced NIS server administration
- administrative files
-
- appending to: Enabling NIS on client hosts
- deleting: Enabling NIS on client hosts
- inspecting: Installing the NIS master server
- referencing: Enabling NIS on client hosts
- replaced files, local copies: Enabling NIS on client hosts
- AdminSuite: Diskless Clients
-
- dataless configuration: Dataless clients
- diskless client and: Setting up a diskless client
- forms: Setting up a diskless client
- advisory locking, file locking: Mandatory versus advisory locking
- AES (Advanced Encryption Standard): NFS security futures
- aliases, domains: Domain aliases
- aliases map, domains: Managing multiple domains
- allocating servers, domains: Number of NIS servers per domain
- ampersand (&), automounter maps: Key substitutions
- anonymous users, mapping: Unknown user mapping
- appending administrative files: Enabling NIS on client hosts
- architecture
-
- networks, dataless clients: Dataless clients
- platform: Setting up a diskless client
- processor: Setting up a diskless client
- ARP: IP host addresses
-
- Reverse ARP requests
- Broadcast addresses
- duplicate replies: Duplicate ARP replies
- request and reply mismatches: Duplicate ARP replies
- UDP packets and: Duplicate ARP replies
- arrays, data representation and: External data representation
- ASCII code
-
- files, converting to DBM: Map naming
- source files, NIS maps: Installing NIS slave servers
- asymmetric key encryption: Asymmetric key encryption
- async threads: NFS async thread tuning
-
- buffer cache: Client I/O system
- decreasing, performance and: NFS async thread tuning
- dirty page clustering: Client I/O system
- ATM (Asynchronous Transfer Mode) networks: ATM and FDDI networks
- attribute timeouts: Mount options
- attributes
-
- caching: Attribute caching
- files, caching and: File attribute caching
- AUTH_DES security flavor: Old terms: AUTH_DES, secure RPC, and, secure NFS
- AUTH_DH security flavor, Diffie-Hellman authentication: AUTH_DH: Diffie-Hellman authentication
- Authenticated field, NFS log record: NFS server logging
- authentication: How secure are NIS and NFS?
-
- Kerberos V5: Kerberos V5
- AUTH_SYS security flavor: How secure are NIS and NFS?
- autofs automounter: Inside the automounter
- automountd daemon: Command-line options
- automounter: System Administration Using the Network File System
-
- Mounting filesystems
- advanced operations: Advanced map tricks
- autofs: Inside the automounter
- hierarchical mounts: Hierarchical mounts
- maps
-
- ampersand (&): Key substitutions
- direct: Automounter maps
- executable: Executable indirect maps
- indirect: Automounter maps
- master: Automounter maps
- NIS and: Mixing NIS and files in the same map
- NIS-managed, updating: Updating NIS-managed automount maps
- null map: The null map
- substitutions: Key and variable substitutions
- naming schemes and: Naming schemes
- NIS integration: Integration with NIS
- overview: The Automounter
- pinging, remote servers: Replicated servers
- reasons to use: The Automounter
- remote filesystems, cron and: Avoiding automounted filesystems
- replication servers: Replicated servers
- servers, replicated: Replicated servers
- side effects, long search paths: Long search paths
- symbolic links and: Indirect maps
- timouts: Tuning timeout values
- user-level automounters: User-level automounters
- variables, built-in: Builtin variables
- auto_tools indirect map, user-level automounter and: User-level automounters
Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z