Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: S
- Samba, PC/NFS and: NFS versus SMB (CIFS)
- SATAN, diagnostics and: SATAN
- saturation, network collisions: Collisions and network saturation
- SCCS
-
- map files: Source code control for map files
- maps, disadvantages: Source code control for map files
- schema, X.500 and:
- SEAM (Sun Enterprise Authentication Mechanism): SEAM: Kerberos V5 for Solaris
- search paths, automounter and: Long search paths
- SEAS (Solaris Easy Access Server): Setting up a diskless client
- secret key, symmetric key encryption: Symmetric key encryption
- secure NFS: Old terms: AUTH_DES, secure RPC, and, secure NFS
- secure RPC: Old terms: AUTH_DES, secure RPC, and, secure NFS
- securenets file: The secure nets file
- security
-
- ACLs: Access control lists
- anonymous users, mapping: Unknown user mapping
- asymmetric key encryption: Asymmetric key encryption
- AUTH_DH: AUTH_DH: Diffie-Hellman authentication
- authentication: How secure are NIS and NFS?
- AUTH_SYS security flavor: How secure are NIS and NFS?
- cryptography: Brief introduction to cryptography
- DCE/DFS: How secure are NIS and NFS?
- filesystem access: Access to filesystems
- firewalls: Using NFS through firewalls
- future of: Security
- IPsec: NFS and IPSec
- Kerberos V5: RPCSEC_GSS: Generic security services for RPC
- LDAP and: How secure are NIS and NFS?
- login restrictions: User-oriented network security
- MACs: One-way hash functions and MACs
- maps, private: Making NIS more secure
- netgroups: Using netgroups
- NFS: NFS security
-
- future of: NFS security futures
- increasing: Stronger security for NFS
- increasing, transition: Planning a transition from NFS/sys to stronger NFS security
- levels: How secure are NIS and NFS?
- RPC: RPC security
- superuser mapping: Superuser mapping
- version 4 and: NFS Version 4
- NIS
-
- increasing: Making NIS more secure
- passwords: Password and NIS security
- NIS+ and: NIS+
- NIS levels: How secure are NIS and NFS?
- one-way hash functions: One-way hash functions and MACs
- performance and: Security and performance
- port monitoring: Port monitoring
- private keys: Public and private keys
- public key exchange: Public key exchange
- public keys: Public and private keys
- read-only access: Read-only access
- RPC: RPC security
- RPC/DH: How RPC/DH works
- RPCSEC_GSS: RPCSEC_GSS: Generic security services for RPC
- SATAN: SATAN
- SEAM: SEAM: Kerberos V5 for Solaris
- securenets file: The secure nets file
- services: Security services
- session keys: Establishing a session key
- setuid executables and: Superuser mapping
- SMB (CIFS): How secure are NIS and NFS?
- symmetric key encryption: Symmetric key encryption
- trusted hosts: Trusted hosts and trusted users
- trusted users: Trusted hosts and trusted users
- UIDs: Unknown password entries
- user-oriented: User-oriented network security
- viruses: Viruses
- server only NIS: Masters, slaves, and clients
- server response time, threshold value: Measuring performance
- server-side caching: Server-side caching
- server-side configuration, PC/NFS: Server-side PC/NFS configuration
- server-side fields (RPC), statistics: NFS statistics
- server-side performance tuning: Server-Side Performance Tuning
-
- benchmarking: Benchmarking
- server threads: NFS RPC procedures
- server-to-client relationships, trusted hosts and users: Trusted hosts and trusted users
- server-to-server relationships, trusted hosts and users: Trusted hosts and trusted users
- servers
-
- allocating, domains: Number of NIS servers per domain
- as clients: NIS server as an NIS client
- compensation, slow: Slow server compensation
- configuration
-
- diskless clients: Diskless Clients
- RPCs and: Internet and RPC server configuration
- CPU loading, bottlenecks and: Problem areas
- disk bandwidth: Problem areas
- DNS: Run DNS on NIS clients and servers
- load, buffer size and: Adjusting for network reliability problems
- locating, binding the domain: The ypbind daemon
- log files: NFS server logging mechanics
- logging
-
- configuration: NFS server logging configuration
- configuration files: NFS server logging configuration
- disabling: Disabling NFS server logging
- enabling: Enabling NFS server logging
- master server
-
- creating: Installing the NIS master server
- hosts, changing: Changing NIS master servers
- number of: Installing the NIS master server
- unavailable: Installing the NIS master server
- ypxfr tool: Regular map transfers
- memory usage, bottlenecks: Problem areas
- multihomed: Multihomed servers
- network interface, bottlenecks: Problem areas
- NFS, troubleshooting: NFS server problems
- NIS
-
- selecting: Choosing NIS servers
- testing: Installing the NIS master server
- NLM crash: Server crash
- performance tuning: Server tuning
-
- buffers: Memory usage
- CPU loading: CPU loading
- cross-mounting filesystem: Cross-mounting filesystems
- kernel configuration: Kernel configuration
- memory usage: Memory usage
- multhomed: Multihomed servers
- nfsd threads: NFS server threads
- throughput: Disk and filesystem throughput
- renegade, debugging case study: Renegade NIS server
- replication, automounter: Replicated servers
- response time
-
- disk-intensive activity and: Measuring performance
- users and: Measuring performance
- root privileges: Managing the root password with NIS
- RPC
-
- configuration: Internet and RPC server configuration
- initialization: Internet and RPC server configuration
- slave server
-
- adding: Basics of NIS management
- adding later: Adding slave servers later
- initializing: Installing NIS slave servers
- installing: Installing NIS slave servers
- listing: Installing NIS slave servers
- removing: Removing an NIS slave server
- slow
-
- testing: Identifying NFS retransmissions
- timeo parameter and: Timeout period calculation
- terminal servers: CPU loading
- usage guage: Number of NIS servers per domain
- Service field, NFS log record: NFS server logging
- session keys: Establishing a session key
- session layer (7-layer model): The session and presentation layers
- setuid
-
- executables, security and: Superuser mapping
- root privileges, remote files and: Superuser mapping
- setup
-
- diskless clients: Setting up a diskless client
- NFS: Setting up NFS
- share command: Exporting filesystems
-
- enabling logging: NFS server logging mechanics
- exporting filesystems and: Exporting options
- share utility, /etc/dfs/sharetab and: NFS administration tools
- showmount command: Identifying RPC services
- slave servers: Masters, slaves, and clients
-
- adding: Basics of NIS management
- adding later: Adding slave servers later
- initializing: Installing NIS slave servers
- installing: Installing NIS slave servers
- listing: Installing NIS slave servers
- removing: Removing an NIS slave server
- slow servers, testing for: Identifying NFS retransmissions
- SMB (Server Message Block): NFS versus SMB (CIFS)
-
- (CIFS) security flavor: How secure are NIS and NFS?
- snoop: snoop
-
- snoop
- filters: Useful filters
- NFS Server Logging utility: NFS server logging
- socket RPC: Socket RPC and Transport Independent RPC
- soft mounts, filesystems: Hard and soft mounts
- Solaris
-
- diskless clients (see diskless clients)
- mount command: Mount options
- NFS, export and: Exporting filesystems
- Solaris Easy Access Server (SEAS): Setting up a diskless client
- solstice command: Setting up a diskless client
- source code control system (see SCCS)
- source code, map files: Source code control for map files
- source files
-
- domain, pushing to new: Managing multiple domains
- maps: Map distribution
-
- alternate source files: Using alternate map source files
- NIS maps, ASCII code: Installing NIS slave servers
- source netgroup: Netgroups
- spray utility: Gauging Ethernet interface capacity
- stale filehandler error: Pathnames and filehandles
- stale filehandles
-
- performance and: Stale filehandles
- Standard Performance Evaluation Corporation: Measuring performance
- stat( ), symbolic links and: Resolving symbolic links in NFS
- statd daemon, NFS startup: Setting up NFS
- state information: TCP and UDP
-
- recreating: Recreating state information
- stateful protocols: TCP and UDP
- static routing: Routers and their routing tables
- station addresses: IP host addresses
- statistics
-
- filters: Useful filters
- NFS diagnostics: NFS statistics
- snoop and: snoop
- status daemon: Lock and status daemons
- stepping-stone mount points: Mount point constructions
- sticky-bit access, swap files: Managing client swap space
- strings, data representation and: External data representation
- subnetwork masks: Subnetwork masks
- substitutions, automounter maps: Key and variable substitutions
- Oracle: Preface
- superusers
-
- domain, default: NIS domains
- keys, adding: Creating keys
- mapping, NFS: Superuser mapping
- restrictions: Superuser mapping
- swap files
-
- sticky-bit access: Managing client swap space
- temporary: Managing client swap space
- VM system and: NFS support for diskless clients
- swap filesystem, AdminSuite: Setting up a diskless client
- swap space, diskless clients: Managing client swap space
- swapping files, ND and: NFS support for diskless clients
- switched Ethernets: Switched networks
- switches, networks: Network partitioning hardware
- symbolic links: Symbolic links
-
- absolute pathnames: Absolute and relative pathnames
- automounter and: Indirect maps
- boot blocks: Getting a boot block
- /export subdirectories: Setting up a diskless client
- exporting filesystems and: Mount points, exports, and links
- mount points construction and: Mount point constructions
- mounting filesystems and: Mount points, exports, and links
- mounts: Symbolic links
- relative pathnames: Absolute and relative pathnames
- resolving, NFS: Resolving symbolic links in NFS
- symmetric key encryption: Symmetric key encryption
- synchronizing time: Time synchronization
- synchronous serial line, TCP/IP: Networking overview
- system administration
Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z