Поиск по:itpm.msu.su -
Поискать по всем серверам
На этой странице приведены все страницы сервера itpm.msu.su ,которые мы индексируем. Показаны документы 861 - 880 из 982.
Упорядочить по:
URL
|
дате изменения
861. Getting Acquainted with NIS
Next: NIS versus NIS+ Up: The Network Information System Previous: The Network Information System . NIS keeps database information is in so-called maps containing key-value pairs. Maps are stored on a central host running the NIS server, from which clients may retrieve the information through various RPC calls. ... For instance, you may search the hosts file for a host name as well as for an IP-address. ... Maps will be created only on the master server's host. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node131.html -- 7.6 Кб -- 18.04.1999
Похожие документы
Похожие документы
862. NIS versus NIS+
Next: The Client Side of Up: The Network Information System Previous: Getting Acquainted with NIS . ... NIS+ is structured in an entirely different way. Instead of a flat name space with disjoint NIS domains, it uses a hierarchical name space similar to that of DNS. Instead of maps, so called tables are used that are made up of rows and columns, where each row represents an object in the NIS+ database, while the columns cover those properties of the objects that NIS+ knows and cares about. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node132.html -- 2.8 Кб -- 18.04.1999
Похожие документы
Похожие документы
863. The Client Side of NIS
... For instance, to obtain passwd information, you generally use the getpwnam(3) and getpwuid(3) functions which return the account information associated with the given user name or numerical user id, respectively. ... The function may either ``append'' the NIS map to or ``replace'' the original file with it. ... To avoid these pitfalls, NYS uses a general configuration scheme that determines whether a particular set of client functions uses the original files, NIS, or NIS+, and in which order. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node133.html -- 3.3 Кб -- 18.04.1999
Похожие документы
Похожие документы
864. Running a NIS Server
Next: Setting up a NIS Up: The Network Information System Previous: The Client Side of . ... In this section, we will cover the configuration of a NIS server. ... Note that if you are just going to experiment with the server, make sure you don't set it up for a NIS domain name that is already in use on your network. ... After installing the server program (ypserv) in /usr/sbin, you should create the directory that is going to hold the map files your server is to distribute. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node134.html -- 5.3 Кб -- 18.04.1999
Похожие документы
Похожие документы
865. Setting up a NIS Client with NYS
Next: Choosing the Right Maps Up: The Network Information System Previous: Running a NIS Server . ... Your first step should be to tell NYS which server to use for NIS service, setting it in the /etc/yp.conf configuration file. ... The first statement tells all NIS clients that they belong to the winery NIS domain. ... The server statement names the NIS server to use. ... In the form shown above, the server command tells NYS to use the named server whatever the current NIS domain may be. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node135.html -- 4.5 Кб -- 18.04.1999
Похожие документы
Похожие документы
866. Choosing the Right Maps
... Having made sure you can reach the NIS server, you have to decide which configuration files to replace or augment with NIS maps. ... Other maps, like services.byname, aren't such a dramatic gain, but save you some editing work if you install any network applications that use a service name that's not in the standard services file. ... This is controlled through the /etc/nsswitch.conf file, which stands for Name Service Switch but of course isn't limited to the name service. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node136.html -- 5.3 Кб -- 18.04.1999
Похожие документы
Похожие документы
867. Using the passwd and group Maps
Next: Using NIS with Shadow Up: The Network Information System Previous: Choosing the Right Maps . ... To this end, you usually keep only a small local /etc/passwd file, to which the site-wide information from the NIS maps is appended. ... If any of the numeric ids in /etc/passwd or /etc/group deviate from those in the maps, you have to adjust file ownerships for all files that belong to that user. ... Usually, she will invoke passwd, which reads the new password and updates the local passwd file. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node137.html -- 6.3 Кб -- 18.04.1999
Похожие документы
Похожие документы
868. Using NIS with Shadow Support
Next: Using the Traditional NIS Up: The Network Information System Previous: Using the passwd and . There is no NIS support yet for sites that use the shadow login suite. ... On the other hand, publishing the information from /etc/shadow via NIS kind of defeats the purpose of the shadow suite. Although the NYS password lookup functions don't use a shadow.byname map or anything likewise, NYS supports using a local /etc/shadow file transparently. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node138.html -- 3.2 Кб -- 18.04.1999
Похожие документы
Похожие документы
869. Choosing IP Addresses
... No provisions were taken to choose a particular IP-address on either end of the link. Instead, we picked vlager's address as the local IP-address, and let c3po provide its own. Sometimes, however, it is useful to have control over what address is used on one or the other end of the link. pppd supports several variations of this. ... In addition, you have to use the noipdefault option, which makes pppd wait for the peer to provide the IP-address instead of using the local host's address. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node115.html -- 4.1 Кб -- 18.04.1999
Похожие документы
Похожие документы
870. Routing Through a PPP Link
... After setting up the network interface, pppd will usually set up a host route to its peer only. ... We have already seen above that pppd can be asked to set the default route using the defaultroute option. ... This is not a big problem if all hosts at the subsidiary have their default route pointing at sub-etha, and all Brewery hosts route to vlager by default. ... After creating the network route on vlager, the routing daemon would broadcast the new route to all hosts on the attached subnets. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node116.html -- 5.7 Кб -- 18.04.1999
Похожие документы
Похожие документы
871. Link Control Options
... Above, we already encountered LCP, the Link Control Protocol, which is used to negotiate link characteristics, and to test the link. The two most important options that may be negotiated by LCP are the maximum receive unit, and the Asynchronous Control Character Map. ... The Asynchronous Control Character Map, colloquially called the async map, is used on asynchronous links such as telephone lines to identify control characters that must be escaped (replaced by a specific two-character sequence). ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node117.html -- 5.9 Кб -- 18.04.1999
Похожие документы
Похожие документы
872. General Security Considerations
Next: Authentication with PPP Up: The Point-to-Point Protocol Previous: Link Control Options . A misconfigured PPP daemon can be a devastating security breach. ... In this section, we will discuss a few measures that should make your PPP configuration safe. ... To protect against any attacks a user may launch by manipulating these options, it is suggested you set a couple of default values in the global /etc/ppp/options file, like those shown in the sample file in section- . ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node118.html -- 3.1 Кб -- 18.04.1999
Похожие документы
Похожие документы
873. Authentication with PPP
. Next: CHAP versus PAP Up: The Point-to-Point Protocol Previous: General Security Considerations . CHAP versus PAP . The CHAP Secrets File . The PAP Secrets File . Andrew Anderson . Thu Mar 7 23:22:06 EST 1996
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node119.html -- 2.0 Кб -- 18.04.1999
Похожие документы
Похожие документы
874. IP over Serial Lines
Next: The Transmission Control Protocol Up: TCP/IP Networks Previous: The Internet Protocol . On serial lines, a ``de facto'' standard known as SLIP or Serial Line IP is frequently used. ... A different serial protocol is PPP , or Point-to-Point Protocol . ... Its main advantage over SLIP is, however, that it isn't limited to transporting IP-datagrams, but that it was designed to allow for any type of datagrams to be transmitted. Andrew Anderson . Thu Mar 7 23:22:06 EST 1996 ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node12.html -- 2.4 Кб -- 18.04.1999
Похожие документы
Похожие документы
875. CHAP versus PAP
Next: The CHAP Secrets File Up: Authentication with PPP Previous: Authentication with PPP . ... Below I will loosely talk of `client' and `server' when I want to distinguish between the authenticating system and the authenticator. ... CHAP does not have these deficiencies. ... The interpretation of the client and server fields is different for CHAP and PAP, and also depends on whether we authenticate ourselves with the peer, or whether we require the server to authenticate itself with us. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node120.html -- 5.9 Кб -- 18.04.1999
Похожие документы
Похожие документы
876. The CHAP Secrets File
Next: The PAP Secrets File Up: Authentication with PPP Previous: CHAP versus PAP . When it has to authenticate itself with some server using CHAP, pppd searches the pap-secrets file for an entry with the client field equal to the local hostname, and the server field equal to the remote hostname sent in the CHAP Challenge. ... The third line of the sample chap-secrets file allows any host to establish a PPP link with vlager because a client or server field of * matches any hostname. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node121.html -- 6.0 Кб -- 18.04.1999
Похожие документы
Похожие документы
877. The PAP Secrets File
Next: Configuring a PPP Server Up: Authentication with PPP Previous: The CHAP Secrets File . The PAP secrets file is very similar to that used by CHAP. ... A sample PAP secrets file might look like this: # /etc/ppp/pap-secrets # # user server secret addrs vlager-pap c3po cresspahl vlager.vbrew.com c3po vlager DonaldGNUth c3po.lucas.com The first line is used to authenticate ourselves when talking to c3po. The second line describes how a user named c3po has to authenticate itself with us. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node122.html -- 4.2 Кб -- 18.04.1999
Похожие документы
Похожие документы
878. Configuring a PPP Server
... Running pppd as a server is just a matter of adding the appropriate options to the command line. Ideally, you would create a special account, say ppp, and give it a script or program as login shell that invokes pppd with these options. ... You would also have to set the password for the above account using the passwd command. ... Beside these options, you might want to force some sort of authentication, for example by specifying auth on pppd's command line, or in the global options file. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node123.html -- 4.0 Кб -- 18.04.1999
Похожие документы
Похожие документы
879. Various Network Applications
Next: The inetd Super-Server Up: The Network Administrators' Guide Previous: Configuring a PPP Server . ... This chapter covers the configuration of a few simple network applications, including the inetd server, and the programs from the rlogin family. The Remote Procedure Call interface that services like the Network File System (NFS) and the Network Information System (NIS) are based upon will be dealt with briefly, too. ... Of course, we can't cover all network applications in this book. ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node124.html -- 2.9 Кб -- 18.04.1999
Похожие документы
Похожие документы
880. The inetd Super-Server
... The super-server commonly used is inetd, the Internet Daemon. ... service . ... Figure: A sample /etc/ inetd .conf file # # inetd services ftp stream tcp nowait root /usr/sbin/ftpd in.ftpd -l telnet stream tcp nowait root /usr/sbin/telnetd in.telnetd -b/etc/issue #finger stream tcp nowait bin /usr/sbin/fingerd in.fingerd #tftp dgram udp wait nobody /usr/sbin/tftpd in.tftpd #tftp dgram udp wait nobody /usr/sbin/tftpd in.tftpd /boot/diskless login stream tcp ...
[
Сохраненная копия
]
Ссылки http://itpm.msu.su/LDP/nag/node125.html -- 8.7 Кб -- 18.04.1999
Похожие документы
Похожие документы