Index

absolute pathnames, reading tapes
Reading Media from Other Systems

access control violations
File Permission Violations

access permissions
setting
umask

accounting
process
Process (System) Accounting
system
Process (System) Accounting

Add_disk(1M)
Configuring SCSI Disks With Add_disk(1M)

adding
a group
Adding a Group Using Shell Commands
new users
Adding Users Using Shell Commands

Adding a new hard disk
Configuring SCSI Disks With Add_disk(1M)

adding stations (with BIND)
Adding a New Station

adding swap space
Swap Space

aliases (mail), creating
Creating the Aliases File

aliases database
building
Building the Aliases Database
format of
The Aliases Database
modifying
Modifying the Aliases Database
rebuilding
Building the Aliases Database
/usr/bsd/newaliases
testing
Testing the Aliases Database
troubleshooting
Potential Problems
updating
Updating the aliases Database File

aliases file
/etc/aliases

altering system configuration
Altering the System Configuration

anonymous ftp accounts
Anonymous ftp

anonymous ftp setup
Setting Up Anonymous ftp

archiving audit data
Archiving Audit Data

arp command
Network Management Tools

ASSERT error messages (UUCP)
ASSERT Error Messages

at command
Automating Tasks with at(1), batch(1), and cron(1M)

audit
a file
Access to Particularly Interesting Files or Resources
How to Audit a File
a label
How to Audit a Label Under Trusted IRIX/B
a user
Activity by Particularly Interesting Users
How to Audit a Specific User
customizing
Customizing Auditing
data archiving
Archiving Audit Data
data removing
Removing Audit Data
event types
Auditable Events
guidelines
Proper and Improper Management
improper use
Proper and Improper Management
particularly interesting objects
Access to Particularly Interesting Files or Resources
particularly interesting subjects
Activity by Particularly Interesting Users
sample record
Understanding the Audit Data
sat_select(1)
What Should I Audit?
system data files modification
Modifications of System Data Files
system programs modification
Modifications of Attributes of System Programs
the audit trail
Manipulation of the Audit Trail

audit data
interpreting
Understanding the Audit Data
understanding
Understanding the Audit Data

audit trail
Administering the System Audit Trail

auditing, cofiguration utilities
Customizing Auditing

auditing, customizing
Customizing Auditing

auditing, default environment
Default Auditing

auditing, description
Administering the System Audit Trail

auditing, enabling
Enabling Auditing

auditing, list of items to audit
Auditable Events

auditing, reading output
Understanding the Audit Data

auditing, recovery
Saving and Retrieving Your Auditing Environment

auditing, satconfig utility
Using satconfig

auditing, saved files
Placing the Audit Files

auditing, saving
Saving and Retrieving Your Auditing Environment

auto command
Booting a Default File

autoboot
Summary of Command Monitor Commands

automating tasks
Automating Tasks with at(1), batch(1), and cron(1M)

Backup
Backing Up and Restoring Files
Saving a File System with Backup

backups
Backing Up and Restoring Files
across a network
Backing Up Files Across a Network
automatic
Automatic Backups
available programs
Backing Up and Restoring Files
backing up by date
Saving Files by Modification Date
byte swapping
Reading Media from Other Systems
compressed with bru
Saving Files Using Data Compression
dd conversion options
Reading Media from Other Systems
errors
Errors Creating the Backup
estimate space with bru
Estimating Space Required for Backup
file systems
Backing Up File Systems
how often
When to Back Up Data
if unreadable
Troubleshooting Unreadable Backup Tapes
incremental
Incremental Backups
incremental with bru
Incremental Backups with bru
incremental with cpio
Incremental Backups with tar and cpio
incremental with dump
Incremental Backups with dump
incremental with tar
Incremental Backups with tar and cpio
listing contents of bru
Listing Files on an Archive
making
Backup Procedure
storing
Storing Backups
strategies for
Backup Strategies
verifying
Inspecting an Archive for Consistency
Checking an Archive

backups. System Manager
Saving a File System with the System Manager

bad blocks
The Bad-Block Handling Feature

bad tracks
The Bad-Block Handling Feature

batch command
Automating Tasks with at(1), batch(1), and cron(1M)

batch processing
Automating Tasks with at(1), batch(1), and cron(1M)

/bin/csh
Available Login Shells

/bin/rsh
Available Login Shells

/bin/sh
Available Login Shells

BIND
adding domains
Adding Another Domain
adding new stations
Adding a New Station
and caching-only servers
Caching-Only Server
and forwarders
Forwarders
and network planning
Berkeley Internet Name Domain (BIND)
and nslookup
The nslookup Command
and the /etc/hosts file
/etc/hosts
Alternatives to the Local Hosts Database
boot file
BIND's Boot File
caching-only servers
Caching-Only Server
caching-only server setup
Configuring a Caching-Only Server
client-server configurations
BIND Servers and Clients
database files
The BIND Database Files
database management
Managing the BIND Environment
Managing the BIND Environment
debugging
Debugging named
deleting stations
Deleting a Station
/etc/config/named.options file
The /etc/config/named.options File
forwarding servers
Slave and Forwarding Servers
forwarding server setup
Configuring the Forwarding Server
localhost.rev file
BIND's localhost.rev File
management scripts
The /usr/sbin/named.reload Script
master servers
Master Servers
named.rev file
BIND's named.rev File
organization of
Organization of BIND
primary master server
Primary Master
primary server setup
Configuring the Primary Server
Configuring the Client
root.cache file
BIND's root.cache File
secondary master server
Secondary Master
secondary server setup
Configuring the Secondary Server
server configurations
The named Server Daemon
setup example
Setting Up a BIND Configuration
slave mode
Slave Mode
slave servers
Slave and Forwarding Servers
SYSLOG messages
SYSLOG Messages

BIND database and MX records
Questions, Problems, and Troubleshooting

BIND host lookup routines
The Domain Name Server

block devices
Identifying Devices to IRIX

blocks
fixing them
What Makes a Block Unreliable?
unreadable
The Bad-Block Handling Feature
unreliable
When Is a Block Bad?

boot
Summary of Command Monitor Commands

boot command
Booting a Specific Program

boot file, BIND
BIND's Boot File

booting
across the network
Booting across the Network
command
Booting a Specific Program
default file
Booting a Default File
from a resource list
Booting from a Resource List
from various media
Booting from a Resource List
fx
Booting a Specific Program
prom monitor
Booting a Program from the Command Monitor
specific program
Booting a Specific Program
through gateways
Booting across the Network with bootp
with bootp
Booting across the Network with bootp

bootp server
Booting across the Network with bootp

Bourne shell
Available Login Shells
startup files
Bourne and Korn Shell Files

bridge, definition of
Repeaters, Bridges, Routers, and Gateways

broadcast message (/etc/wall)
Shutting Down the System Carefully

bru
Backing Up and Restoring Files
capabilities
bru
making backups
Saving a File System with bru
Backing Up Files with bru
restoring data
Restoring a File System with bru
restoring files
Restoring Individual Files with bru

C-shell
Available Login Shells
startup files
C Shell Files

cables
null modem
Defining the Serial Interface
Cabling the Serial Ports

cabling
serial interface
Defining the Serial Interface
serial ports
Cabling the Serial Ports

caching-only server, BIND
Configuring a Caching-Only Server

caching-only servers
Caching-Only Server
Clients

CD ROM filesystems
Floppy and CD File Systems

changing
default shell
Changing a User's Default Shell
groups temporarily
Temporarily Changing Groups
passwords
Changing a User's Password
system configuration
Altering the System Configuration
user information
Changing User Information

changing passwords
Using Password Aging Manually
Using Password Aging Manually

character devices
Identifying Devices to IRIX

checking system configuration
Checking the System Configuration

chkconfig
Checking the System Configuration

chkconfig command
Network Initialization Process

cleaning temporary directories
Cleaning Out Temporary Directories

client setup, BIND
Configuring the Client

colors, selecting
Creating a Custom Shell Window

colorview command
Creating a Custom Shell Window

Command Monitor, entering
How to Enter the Command (PROM) Monitor

communication
user
News
Electronic Mail
Write to a User
Message of the Day
Communicating with Users
Write to All Users

Compact Disk Filesystems
Floppy and CD File Systems

compact disk support
Floppy and CD File Systems

configmail script
/usr/etc/configmail

configuring
ASCII terminal
Configuring the Terminal Software
network routers
Setting Up a Router

configuring network controllers
Controller Interface Names

connecting
a modem
Attaching a Modem
ASCII terminal
Attaching an ASCII Terminal
peripheral devices
Serial Ports

connecting to the Ethernet
Attaching Your Station to an Ethernet Network

console
Summary of Command Monitor Commands

controller boards, and network troubleshooting
Hardware Problems

controller interface names
Controller Interface Names

controllers (network), configuring
Controller Interface Names

conventions
reference manuals
The IRIX Reference Pages
typographical
Style Conventions

cpio
Backing Up and Restoring Files
capabilities
cpio
making backups
Saving Files by Modification Date
restoring files
Restoring Individual Files with tar and cpio

cron command
Automating Tasks with at(1), batch(1), and cron(1M)

cu command (UUCP)
UUCP User Programs

customizing auditing
Customizing Auditing

database files, BIND
The BIND Database Files

database management, BIND
Managing the BIND Environment

date and time
changing
Changing the Date and Time

dbedit(1m)
Modifications of System Data Files

DBM database
/usr/bsd/newaliases
Building the Aliases Database

dd
Backing Up and Restoring Files
capabilities
dd
conversion options
Reading Media from Other Systems
copying a file system
Saving a File System with dd

debuging a file system
Kinds of File Systems

default backup device
changing
Changing Device Nodes Manually

default permissions
setting
umask

default printer
changing
Maintaining the lp System

default shell
changing
Changing a User's Default Shell

deleting a user
Deleting a User from the System

deleting staions (with BIND)
Deleting a Station

denial of service
PROM Passwords

/dev/tape
Backup Procedure

device files
IRIX Device Files
Defining the Serial Interface

device names
Syntax of Command Monitor File Names
Identifying Devices to IRIX

devices
block
Identifying Devices to IRIX
character
Identifying Devices to IRIX
raw
Identifying Devices to IRIX

Devices database (UUCP)
Supporting Databases
The Devices File

df command
The df(1) Command

dfsck
dfsck

dial & button box
Dial & Button Box and Spaceball Serial Cabling

dial and button box
Terminals and Modems
Terminals and Modems

Dialcodes database (UUCP)
Supporting Databases
The Dialcodes File

Dialers database (UUCP)
The Dialers File
Supporting Databases
Supporting Databases

disable
Summary of Command Monitor Commands

disable printer
cancel: Stop a Print Request

disk
bad blocks
When Is a Block Bad?
label
Formatting Disks Using fx

disk free space display command
The df(1) Command

disk quotas
Imposing Disk Quotas
site policy
Disk Use and Quotas

disk striping
Logical Volumes and Disk Striping

disk usage display command
The du(1) Command
The diskusg(1) Command

disk use
Checking Free Space and Free Inodes
Identifying Large Space Users

disks
formatting
Booting a Specific Program

disks, copying hard disks
Copying Hard Disks From the Command Monitor

diskusg command
The diskusg(1) Command

documentation conventions
Style Conventions

domain name macros and classes (sendmail.cf file
(D)omain Name Macro and Class

domain space, definition of
Organization of BIND

domains
definition of
Organization of BIND
top level
Organization of BIND

domains (BIND), adding
Adding Another Domain

du command
The du(1) Command

dump
Backing Up and Restoring Files
capabilities
dump and restore
/etc/dumpdates
Saving a File System with dump
incremental backups
Incremental Backups with dump
making backups
Saving a File System with dump

editing the /etc/hosts file
Modifying the hosts database

electronic mail
Electronic Mail

electronic mail and network planning
Electronic Mail

entering the Command Monitor
How to Enter the Command (PROM) Monitor

entering the PROM Monitor
How to Enter the Command (PROM) Monitor

environment variables
Environment Variables
examining
Environment Variables
setting
Environment Variables

error messages
IRIX Kernel Error Messages
lp
lp Error Messages
notice
NOTICE Messages
panic
PANIC Messages
warning
WARNING Messages

/etc directory, network files in
Files and Directories

/etc/chkconfi file
Checking the Network Software Configuration

/etc/config/ifconfig.options file
Changing Network Parameters

/etc/config/named.options file
The /etc/config/named.options File

/etc/config/netif.options file
Modifying the Interface Name
Modifying the Network Interface Configuration

/etc/dumpdates
Saving a File System with dump

/etc/ethers file
Files and Directories

/etc/fstab file
Network Initialization Process

/etc/ftpusers file
The /etc/ftpusers File

/etc/group
layout of
Adding Users Using Shell Commands

/etc/hosts file
Network Initialization Process
Files and Directories
alternatives to
Alternatives to the Local Hosts Database
and network planning
Internet Addresses and the Hosts Database
editing
Modifying the hosts database
host names in
/etc/hosts
router entries
Configuring a Router with Two Interfaces

/etc/hosts.equiv file
Files and Directories
The /etc/hosts.equiv File
requirements for
The /etc/hosts.equiv File

/etc/init.d/mail script
/etc/init.d/mail

/etc/init.d/network initialization script
Network Initialization Process

/etc/init.d/network script
Configuring a Router with Two Interfaces
Creating a Local Network Script
Network Management Tools

/etc/init.d/network.local script
Creating a Local Network Script

/etc/issue
Creating a Remote Login Message

/etc/motd
Message of the Day

/etc/motd (message of the day)
Shutting Down the System Carefully

/etc/networks file
Files and Directories

/etc/password
layout of
Adding Users Using Shell Commands

/etc/protocols file
Files and Directories

/etc/rpc file
Files and Directories

/etc/services file
Files and Directories

/etc/sys_id
Changing the Name of a System

/etc/sys_id file
Network Initialization Process
Files and Directories
/etc/hosts

/etc/wall (broadcast message)
Shutting Down the System Carefully

Ethernet
booting
Booting across the Network
gateway
Booting across the Network with bootp

Ethernet connections to an IRIS
Attaching Your Station to an Ethernet Network

ethernet, testing
Checking Your Ethernet Connection

extent file system
Kinds of File Systems
description of
Extent File System (EFS)

file audit
How to Audit a File

file system
copying with dd
Saving a File System with dd
debugging
Kinds of File Systems
description
Extent File System (EFS)
exporting
Kinds of File Systems
extent file system (EFS)
Kinds of File Systems
free space
Checking Free Space and Free Inodes
maintaining
Maintaining File Systems
making
Making New File Systems
parameters
Basic File System Parameters
types
Kinds of File Systems

files
open
The Open File Table

find program
Using find to Locate Files

finding files
Using find to Locate Files

firewalls
Firewalls

fix-hayes program (UUCP)
UUCP Daemons

fix-telebit program (UUCP)
UUCP Daemons

Floppy Disk Filesystems
Floppy and CD File Systems

floppy disk support
Floppy and CD File Systems

font selection
Creating a Custom Shell Window

.forward mail file
The .forward File

forwarders and BIND
Forwarders

forwarding server, BIND
Configuring the Forwarding Server

forwarding, controlling on routers
Turning Forwarding Off

free space
checking
Checking Free Space and Free Inodes

ftp and network security
Anonymous and Restricted FTP Access

ftp setup (anonymous)
Setting Up Anonymous ftp

fx
Formatting Disks Using fx

gated daemon
Daemons

gateway
Booting across the Network with bootp

gateway, definition of
Repeaters, Bridges, Routers, and Gateways

genperm command (UUCP)
UUCP Administrative Programs

Geometry Hotline
Product Support

gethostbyname routine
Internet Addresses and the Hosts Database
The /etc/hosts.equiv File

getting help
Getting Help in the Command Monitor

group file
layout of
Adding Users Using Shell Commands

group ID number
Group IDs
/etc/group
Group IDs

groups
determining membership
Temporarily Changing Groups
temporarily changing
Temporarily Changing Groups

growfs
Changing File System Size
Logical Volumes and Disk Striping

hard disk
bad blocks
When Is a Block Bad?
formatting
Configuring Disks With MAKEDEV(1M)
multiple
Swap Space
performance
Hard Disks under IRIX
supported types
Hard Disks under IRIX

hard disks, adding
Configuring SCSI Disks With Add_disk(1M)

hardware inventory
hinv Command

hardware options (network)
Networking Hardware Options

hardware requirements (network)
Networking Hardware

hardware upgrades
cautions
Hardware Affects Software

help
bad blocks
What Makes a Block Unreliable?
during boot up
Summary of Command Monitor Commands
product
Product Support
reference
The IRIX Reference Pages
support
Product Support

hinv command
hinv Command

host name
Changing the Name of a System

hostname
changing
Changing the Name of a System

hosts database
modifying
Modifying the hosts database
router entries in
Configuring a Router with Two Interfaces

hosts database alternatives
Alternatives to the Local Hosts Database

hosts database planning
Internet Addresses and the Hosts Database

I-node
table
Tables in Memory

iconlogin (pandora)
Checking the System Configuration

id command
Temporarily Changing Groups

if/etc/issue
Remote Login Message

ifconfig command
Network Management Tools

ifconfig-hy.options file
Network Initialization Process

ifconfig.options file
Changing Network Parameters

inactive files
Tracking Disk Use

inetd daemon
Daemons
Network Initialization Process

infocmp command
Configuring the Terminal Software

init command
Reinitializing the Processor from the Command Monitor
The Command Monitor Environment

initializing the network
Network Initialization Process

insider security violation
Use and Abuse by Insiders

InSight servers
Setting Up an InSight File Server

InSight, using NFS
Setting Up an InSight File Server

Internet addresses
and BIND
Internet Addresses
and NIS
Internet Addresses
and subnetworks
Planning to Subnet Local Networks
classes of
Planning to Subnet Local Networks
obtaining
Obtaining an Internet Address
planning
Internet Addresses

Internet Control Message Protocol (ICMP)
Testing Your Network Connectivity

interpreting network statistics
Interpreting Network Statistics

inventory
hardware
hinv Command
software
versions Command

ipfiltered daemon
Network Initialization Process

IRIS Networker
Network Management Tools

iskusg utility
Identifying Large Space Users

kerberos
Security Applications

kernel parameters and networking
Kernel Configuration

kernel tuning
Tuning System Performance
IRIX Kernel Tunable Parameters

keyboard
variables
Setting the Keyboard Variable

label
disk
Formatting Disks Using fx

label audit
How to Audit a Label Under Trusted IRIX/B

line disciplines, POSIX
Description of posix_tty_default

local station (UUCP), configuring
Configuring the Local Station

local stations (UUCP)
identifying
Determining the Remote and Local Stations

localhost entry in /etc/hosts file
/etc/hosts
/etc/hosts

localhost.rev file
BIND's localhost.rev File

locking logins
Using Password Aging Manually

logging remote access
Turning On Remote Access Logging

logical volumes
Logical Volumes and Disk Striping
Changing File System Size

login
options
System Login Options

login icons
Checking the System Configuration

login shells
Available Login Shells

logins
Logins and Passwords
locking
Using Password Aging Manually

loopback address
Modifying the hosts database

lp
commands
User Command Summary
maintenance
Maintaining the lp System

lp error messages
lp Error Messages

lp spooler
Removing Printers

lp troubleshooting
Troubleshooting Your Printing System

lpmove
lpmove: Move a Request to Another Printer

lpsched
lpsched : Start the lp Scheduler

lvinit
The lvinit(1M) Command

lvtab
The /etc/lvtab File

mail
Electronic Mail

mail domains
Mail Domains

mail forwarders
Mail Forwarders

mail queue
Listing the Queue

mail relays
Mail Relays

mail system components
The Mail System

mailq command
/usr/bin/mailq

maintaining file systems
Maintaining File Systems

MAKEDEV
tape options
MAKEDEV Commands For Tape Drives

man command
The IRIX Reference Pages

man pages
The IRIX Reference Pages

mapping bad blocks
What Makes a Block Unreliable?

mapping bad tracks
What Makes a Block Unreliable?

Maxuuscheds file (UUCP)
Other UUCP Files

Maxuuxqts file (UUCP)
Other UUCP Files

media
storing
Storing Backups

mediad
Floppy and CD File Systems

mediad(1M)
Floppy and CD File Systems

memory
tables
How the File System Works

mesg command
Write to a User

message of the day (/etc/motd)
Shutting Down the System Carefully
Creating a Message of the Day

message of the day file
Message of the Day

mkfs command
Making New File Systems

mklv
The mklv(1M) Command

modem connections
Networking Hardware

modems
cables
Cabling the Serial Ports
connecting
Attaching a Modem

modification of system data files
Modifications of System Data Files

modifications of system programs
Modifications of Attributes of System Programs

modifying the hosts database
Modifying the hosts database

mouted daemon
Daemons

mpadmin(1M)
Changing Processors on Multi-Processor Systems

mqueue directory
/var/spool/mqueue

mtune directory
IRIX Kernel Tunable Parameters

multgrps command
Temporarily Changing Groups

multiprocessor systems
Changing Processors on Multi-Processor Systems

MX records
Questions, Problems, and Troubleshooting
MX Record Support

named daemon
Checking the System Configuration
Daemons
The /usr/sbin/named.reload Script

named server, definition of
The BIND Name Server

named.boot file
BIND's Boot File
The /usr/sbin/named.reload Script

named.host file
BIND's named.hosts File

named.hosts file
BIND's named.hosts File

named.rev file
BIND's named.rev File

naming stations
Naming Your Station

ncheck command
Checking for Set-UIDs in the Root File System

netif.options file
Modifying the Interface Name
Modifying the Network Interface Configuration
Network Initialization Process

netmask option
Setting the Netmask

netmask, setting
Subnetting a Network

netstat command
Network Management Tools
The netstat Tool

NetVisualyzer
Network Management Tools

network planning
traffic
Performance Planning

network troubleshooting
media
Hardware Problems
servers
Network Servers

network address masks
Subnetting a Network

network applications planning
Using Common Network Applications

network backups
Backing Up Files Across a Network

network booting
Booting across the Network

network configurations, sendmail
sendmail Network Configurations

network connections, testing
Testing Your Network Connectivity

network controllers, choosing
Performance Planning

network daemons
Checking the Network Software Configuration

network daemons, common
Daemons

network daemons, general
Daemons

network daemons, option files
Daemon Option Files

network equipment, planning
Repeaters, Bridges, Routers, and Gateways

Network File System (NFS)
NFS Under SLIP

network hardware options
Networking Hardware Options

network hardware requirements
Networking Hardware

Network Information Center (NIC)
Organization of BIND
Obtaining an Internet Address
Registering Your BIND Domain Name

network initialization
Network Initialization Process

network interfaces
modifying
Modifying the Network Interface Configuration
modifying addresses of
Modifying the Interface Address
modifying names of
Modifying the Interface Name

network management tools
Network Management Tools

network master script
Network Startup and Shutdown

network parameters
changing
Changing Network Parameters

network performance factors
Factors Affecting Network Performance

network planning
BIND
Berkeley Internet Name Domain (BIND)
device number
Performance Planning
electronic mail
Electronic Mail
/etc/host file
Internet Addresses and the Hosts Database
firewalls
Firewalls
Internet addresses
Internet Addresses
media selection
Performance Planning
network applications
Using Common Network Applications
NFS
Network File System (NFS)
NIS
Network Information Service (NIS)
security
Planning for Network Security
security applications
Security Applications
size considerations
Planning the Physical Network
SLIP
Serial Line Internet Protocol (SLIP)
subnetworks
Planning to Subnet Local Networks
the .rhosts file
The .rhosts File
UUCP
UNIX-to-UNIX Copy Program (UUCP)

network printing
Printing Over the Network

network script
Network Startup and Shutdown

network scripts, creating
Creating a Local Network Script

network security
and ftp
Anonymous and Restricted FTP Access
/etc/hosts.equiv file
The /etc/hosts.equiv File

network shutdown
Network Shutdown Process
Network Startup and Shutdown

Network SLIP connections (NSLIP)
Connecting Networks with SLIP

network software checkout
Checking the Network Software Configuration

network software options
Optional Networking Products

network software, IRIS standard distribution
Networking Software

network statistics, interpreting
Interpreting Network Statistics

network troubleshooting
configurations
Network Configuration
hardware
Hardware Problems
packet size
Packet Size

network, testing
Checking Your Ethernet Connection

networking files and directories
Files and Directories

networking, preparing an IRIS for
Configuring an IRIS for a Network

newaliases program
/usr/bsd/newaliases

news system
News

NFS
and network planning
Network File System (NFS)

NIS
and network planning
Network Information Service (NIS)
and the /etc/hosts file
/etc/hosts
Alternatives to the Local Hosts Database

Non-Domain Addressing
Non-Domain Addressing

notice messages
NOTICE Messages

nslookup command
The nslookup Command

operating policy
general
Operating Policies

operating system tuning
IRIX Kernel Tunable Parameters

operating system, tuning
Tuning System Performance

operating the system
general
System Accounting
Operating the System

outside connections
Connections with Machines Outside the Local Network

outsider security violation
Use and Abuse by Outsiders

pandora
Checking the System Configuration

pandora(iconlogin)
Checking the System Configuration

panic messages
PANIC Messages

parameters
kernel
Kernel Configuration

parameters, kernel
Tuning System Performance

password
changing
Using Password Aging Manually

password file
layout of
Adding Users Using Shell Commands

passwords
Logins and Passwords
Logins and Passwords
aging
Logins and Passwords
changing
Using Password Aging Manually
Changing a User's Password
dialup
Second (Dialup) Passwords
forcing
Forcing a Password
forgotten
Changing a User's Password

passwords, PROM
Setting a PROM Password
PROM Passwords

passwords, system
PROM Passwords
Setting a PROM Password

PC TCP/IP connections to an IRIX network
PC Connectivity

performance factors (network)
Factors Affecting Network Performance

performance tuning
Tuning System Performance
IRIX Kernel Tunable Parameters

permissions
default
Privacy

Permissions database (UUCP)
Supporting Databases
The Permissions File
Supporting Databases

ping command
Testing Your Network Connectivity
Network Management Tools
The ping Tool

planning
for network traffic
Performance Planning
Internet addresses
Internet Addresses
network controllers
Performance Planning
network devices
Performance Planning
network equipment
Repeaters, Bridges, Routers, and Gateways
network performance
Performance Planning
network size
Planning the Physical Network

Point to Point Protocol
Point to Point Protocol (PPP)

Point to Point Protocol (PPP)
SLIP and PPP

Poll database (UUCP)
The Poll File

portmap daemon
Daemons

POSIX line disciplines
Description of posix_tty_default

potential security violations
Potential Security Violations

PPP
Point to Point Protocol (PPP)

PPP (Point to Point Protocol)
SLIP and PPP

preparing for networking
Configuring an IRIS for a Network

primary master server, BIND
Primary Master

primary server, BIND
Configuring the Primary Server

print requests
allow
accept : Allow Print Requests
cancel
Checking Remote Printer Status
rejecting
reject: Prevent Print Requests

printenv command
Displaying the Current Environment Variables

printer
commands
User Command Summary
disable
cancel: Stop a Print Request
status
Checking Remote Printer Status

printer administration
Administering Printers

printer use
Administering Printers

printers
adding
Adding a Printer
enabling
enable: Allow Printer to Process Requests
removing
Removing Printers

printing
canceling
lp: Make an Output Request
over the network
Printing Over the Network

process accounting
Process (System) Accounting

processor, controlling
Changing Processors on Multi-Processor Systems

product support
Product Support

PROM monitor
booting
Booting a Program from the Command Monitor
changing variables
Changing Environment Variables
command line editor
Syntax of Command Monitor Commands
command syntax
Syntax of Command Monitor File Names
device names
Syntax of Command Monitor File Names
enabling a console
Enabling a Console in the Command Monitor
environment variables
Reinitializing the Processor from the Command Monitor
keyboard variables
Setting the Keyboard Variable
reinitializing
Reinitializing the Processor from the Command Monitor

PROM monitor prompt
Shutting Down from Multiuser Mode

PROM Monitor, entering
How to Enter the Command (PROM) Monitor

PROM passwords
Setting a PROM Password
PROM Passwords

prtvtoc
Formatting Disks Using fx

pset(1M)
Changing Processors on Multi-Processor Systems

queue, mail
Listing the Queue

quotas
on disk usage
Imposing Disk Quotas

RAM
non-volatile
The Command Monitor Environment

rarpd daemon
Daemons
Network Initialization Process

raw devices
Identifying Devices to IRIX

rebooting networked stations
Rebooting the Station

remote access logging
Turning On Remote Access Logging

remote login message
Creating a Remote Login Message
Remote Login Message

remote stations (UUCP)
identifying
Determining the Remote and Local Stations

remote stations (UUCP), configuring
Configuring the Remote Station

removing
audit data
Removing Audit Data

removing printers
Removing Printers

removing stations (with BIND)
Deleting a Station

repeater, definition of
Repeaters, Bridges, Routers, and Gateways

reporting trouble
Reporting Trouble

reset button
Booting a Program from the Command Monitor

resolv.conf file
The named Server Daemon

resolver routines, purpose of
The BIND Name Server

Restore
Backing Up and Restoring Files
Backing Up and Restoring Files
capabilities
dump and restore
interactive mode
Restoring Individual Files with restore
restoring data
Restoring a File System with Restore
restoring file systems
Restoring a File System with restore
restoring individual files
Restoring Individual Files with restore

restoring data
bru
Restoring a File System with bru
by file system
Restoring File Systems
files with bru
Restoring Individual Files with bru
files with cpio
Restoring Individual Files with tar and cpio
files with tar
Restoring Individual Files with tar and cpio
Restore
Restoring a File System with Restore
Restoring a File System with restore

restoring files
restore
Restoring Individual Files with restore

restricted ftp accounts
Restricted ftp Accounts

restricted shell
Available Login Shells

.rhosts file
The .rhosts File

root directories
Administrative Directories and Files

root privilege violation
Unexpected Use of Root Privilege

root.cache file
BIND's root.cache File

route command
Network Management Tools

routed daemon
Daemons

router
configuring
Setting Up a Router
controlling forwarding on
Turning Forwarding Off
dual interfaces on
Configuring a Router with Two Interfaces
multiple interfaces on
Configuring a Router with More Than Two Interfaces

router, definition of
Repeaters, Bridges, Routers, and Gateways

rpcinfo command
Network Management Tools

rtnetd daemon
Daemons

rtquery command
Network Management Tools

rup command
Testing Your Network Connectivity
Network Management Tools

rwhod daemon
Daemons
Network Initialization Process
Checking the System Configuration

sash
Booting the Standalone Shell

SAT
customizing
Customizing Auditing
event types
Auditable Events
sample record
Understanding the Audit Data
sat_select(1)
What Should I Audit?
System Audit Trail
Administering the System Audit Trail
understanding data
Understanding the Audit Data

sat_interpret utility
Understanding the Audit Data

sat_interpret(1)
Understanding the Audit Data

sat_reduce(1) utility
Understanding the Audit Data

sat_select utility
Using sat_select

sat_select(1)
What Should I Audit?

sat_summarize utility
Understanding the Audit Data

sat_summarize(1)
Understanding the Audit Data

satconfig utility
Using satconfig

scheduler
starting
lpsched : Start the lp Scheduler
stopping
lpsched : Start the lp Scheduler

SCSI disk, adding
Configuring SCSI Disks With Add_disk(1M)

secondary master server, BIND
Secondary Master

secondary server, BIND
Configuring the Secondary Server

security
and network planning
Planning for Network Security
applications for
Security Applications
network
Network Security
process accounting
Process (System) Accounting
system
System Security
xhost command
Transparent Network Access

security guidelines
Security Guidelines

security violation
access control
File Permission Violations
insider
Use and Abuse by Insiders
outside connections
Connections with Machines Outside the Local Network
outsider
Use and Abuse by Outsiders
potential
Potential Security Violations
root privilege
Unexpected Use of Root Privilege
unauthorized entry
Attempts at Unauthorized Entry
unusual system usage
System Usage at Unusual Hours or From Unusual Locations

security, trojan horse attack
Security Guidelines

selecting network media
Performance Planning

sending files
lp: Make an Output Request

sendmail
and multi-token class matching
Multi-Token Class Match
command-line flags
sendmail Command-line Flags
configuring
Configuring sendmail
design features
System Organization
files and directories
sendmail Related Files and Directories
functions of
System Organization
general description
An Overview of sendmail
network configurations
sendmail Network Configurations
planning list
A sendmail Planning Checklist
software components
How sendmail Works

sendmail command
configuration file flag
Using a Different Configuration File
daemon mode
Daemon Mode
debugging flags
Debugging Flags
delivery mode
Delivery Mode
queue mode
Queue Mode
test mode
Test Mode
verify mode
Verify Mode

sendmail commands
sendmail Commands

sendmail daemon
/var/spool/mqueue
/etc/init.d/mail
The sendmail Daemon
Starting the sendmail Daemon

sendmail managemen
Managing sendmail

sendmail script
/etc/init.d/mail

sendmail scripts
/etc/init.d/mail

sendmail.cf file
configurable elements
User Configurable Macros and Classes
customizing examples
Customizing the sendmail.cf File
customizing for complex relay networks
A Complex (Forwarder) Hierarchical (Relay) Network with Domains
customizing for relay networks
Hierarchical (Relay) Network with a Single Domain
customizing for simple networks
Simple Isolated Network
customizing for standalone stations
Stand-alone Station
forwarder name macros and class
(F)orwarder Station Name Macro and Class
general description
/etc/sendmail.cf
killed stations class
(K)illed Stations Class
pathalias database macro
(P)athalias Database Macro
relay name macro
(R)elay Station Name Macro
top-level domain macro
(T)op-Level Domain Macro

sendmail.cf.auto file
/etc/sendmail.cf

sendmail.fc file
/etc/sendmail.fc

sendmail.hf file
/etc/sendmail.hf

sendmail.st file
/etc/sendmail.st

serial interface
Defining the Serial Interface

serial line discipline, POSIX
Description of posix_tty_default

Serial Line Interface Protocol (SLIP)
and bidirectional links
Configuring a Bidirectional SLIP Link
Configuring a Bidirectional SLIP Link
and data compression
SLIP and PPP
and file transfers
File Transfer Under SLIP
File Transfer Under SLIP
and NFS
NFS Under SLIP
cable specifications
Cable Specifications
Cable Specifications
configuration procedure
Overview of Configuration
connecting stations
Connecting Two Systems with SLIP
connection media
SLIP Configuration Information
SLIP Configuration Information
connection procedure
Overview of Configuration
connection requirements
Overview of Configuration
debugging
Debugging a SLIP Link
modem configuration
Configuring the Modem
Configuring the Modem
modem settings for
Modem Specifications
modems for
Modem Specifications
modems settings for
Modem Specifications
purpose of
SLIP and PPP
NFS Under SLIP
software requirements
Overview of Configuration
station connection
Connecting Two Systems with SLIP

Serial Line Internet Protocol (SLIP)
and network planning
Serial Line Internet Protocol (SLIP)

serial line networks
Networking Hardware

serial ports
Serial Ports

Set-GID
Checking for Set-UIDs in the Root File System

Set-UID
Checking for Set-UIDs in the Root File System

setenv command
Changing Environment Variables

setting environment variables
Environment Variables

setting network masks
Setting the Netmask

setup
kernel
Kernel Configuration

shell environment
examining
Environment Variables

shell variables
Environment Variables
setting
Environment Variables

shell window colors
Creating a Custom Shell Window

shell window font selection
Creating a Custom Shell Window

shutdown command
Turning Off from Single-user Mode

shutting down the network
Network Shutdown Process
Network Startup and Shutdown

shutting down the system
Shutting Down from Multiuser Mode

Signal Quality Error
Hardware Problems

single-user mode
Going to Single-user Mode From Multiuser Mode

site policies
System and Site Policies
User Services
accounts
Accounts and Passwords
disk quotas
Disk Use and Quotas
disk use
Disk Use and Quotas
malicious activities
Malicious Activities
passwords
Accounts and Passwords
privacy
Privacy
root access
Root Access
user ID numbers
Accounts and Passwords

slave mode, BIND
Slave Mode

snmpd daemon
Network Initialization Process
Daemons

software inventory
versions Command

software upgrades
cautions
Leaving Users Stranded

spaceball
Dial & Button Box and Spaceball Serial Cabling
Terminals and Modems

special login shells
Special Login Shells

SPECTRUM
Network Management Tools

spooler
lp
Removing Printers

spray command
Network Management Tools

standalone mode
Network Initialization Process

standalone shell
Booting the Standalone Shell

standard distribution network software
Networking Software

starting the network
Network Startup and Shutdown

station naming
Naming Your Station

stop printing
lp: Make an Output Request

stopping the system
/etc/inittab and Power Off

striping
disk
Logical Volumes and Disk Striping
Logical Volumes and Disk Striping
disks
The /etc/lvtab File

subnetworks
and network masks
Subnetting a Network
and troubleshooting
Network Configuration
Internet addresses for
Planning to Subnet Local Networks
planning
Planning to Subnet Local Networks

Summary
of chapter 13
Summary

super user
groups
Temporarily Changing Groups

swap space
Swap Space
adding
Swap Space

syntax
PROM monitor
Syntax of Command Monitor File Names

sysadm
chgloginid
Changing a User's Password
chgpasswd
Changing a User's Password
chgshell
Changing a User's Password
deluser
Deleting a User from the System
powerdown
Shutting Down from Multiuser Mode
powerdown
Shutting Down from Multiuser Mode

Sysfiles database (UUCP)
The Sysfiles File

system access
Using Password Aging Manually
Using Password Aging Manually
Using Password Aging Manually

system accounting
Process (System) Accounting

System Audit Trail (SAT)
Administering the System Audit Trail

system configuration
altering
Altering the System Configuration
checking
Checking the System Configuration

system data files
modification
Modifications of System Data Files

system files
Important System Directories

system log hardcopy
Maintaining a System Log Book

system name
changing
Changing the Name of a System

system operations
general
System Accounting
Operating the System

system passwords
PROM Passwords
PROM Passwords
Setting a PROM Password
Setting a PROM Password

system security
System Security

system shutdown
/etc/inittab and Power Off
multi-usermode
Shutting Down from Multiuser Mode

system tuning
IRIX Kernel Tunable Parameters

Systems database (UUCP)
Supporting Databases
The Systems File

tables in memory
How the File System Works

tape
adding a drive
Adding a Tape Drive
Using Floppy Disks Under IRIX
capacities
Tape Capacities
supported types
Tape Capacities
using MAKEDEV
MAKEDEV Commands For Tape Drives

tape device, default
Backup Procedure

tapes
reusing
Reusing Tapes
storing
Storing Backups
testing
Testing for Bad Media

tapes, absolute pathnames
Reading Media from Other Systems

tar
Backing Up and Restoring Files
capabilities
tar
comparison key characters
Comparing Archived Files
making backups
Saving Files by Modification Date
restoring files
Restoring Individual Files with tar and cpio

TCP/IP and UUCP
Setting up UUCP on a TCP/IP Connection

TCP/IP connectivity to personal computers
PC Connectivity

temporary directories
cleaning
Cleaning Out Temporary Directories

testing connectivity
Testing Your Network Connectivity

time server daemon (timed)
Checking the System Configuration

timed daemon
Changing the Date and Time
Daemons
Checking the System Configuration
Network Initialization Process

timeslave daemon
Checking the System Configuration
Daemons
Network Initialization Process

traceroute command
Network Management Tools

transmitters, and network troubleshooting
Hardware Problems

trojan horse attack
Security Guidelines

trouble
reporting
Reporting Trouble

troubleshooting
hardware
Troubleshooting Your Printing System
network printers
Troubleshooting Network Printers
out of memory
Swap Space
software
Software Troubleshooting Checklist
the print system
Troubleshooting Your Printing System

troubleshooting network hardware
Hardware Problems

ttcp command
The ttcp Tool
Network Management Tools

tty file
Configuring the Terminal Software

tunable parameters and networking
Kernel Configuration

tuning the kernel
Tuning System Performance

tuning the operating system
IRIX Kernel Tunable Parameters

typographical conventions
Style Conventions

umask
umask

unauthorized entry
Attempts at Unauthorized Entry

understanding the audit data
Understanding the Audit Data

UNIX-to-UNIX Copy Program
administrative commands
UUCP Administrative Programs
administrative files for
UUCP Administrative Files
and direct links
Networking Hardware
and modem setup
Networking Hardware
and telephone lines
Networking Hardware
configuring local stations
Configuring the Local Station
configuring remote stations
Configuring the Remote Station
daemons
UUCP Daemons
error messages for
UUCP Error Messages
identifying local stations
Determining the Remote and Local Stations
physical connections for
Making the Physical Connection
programs
UUCP Daemons
setting up
UUCP Administrative Files
supporting databases
Supporting Databases
testing connections for
Testing the UUCP Connection
user commands
UUCP User Programs

UNIX-to-UNIX Copy Program (UUCP)
and network planning
UNIX-to-UNIX Copy Program (UUCP)
definition of
UUCP

unknown file (UUCP)
Other UUCP Files

unsetenv command
Removing Environment Variables

unusual system usage
System Usage at Unusual Hours or From Unusual Locations

upgrading hardware
cautions
Hardware Affects Software

upgrading software
cautions
Leaving Users Stranded

user accounts
administering
User Services
changing passwords
Changing a User's Password
closing
Closing a User Account
deleting
Deleting a User from the System
forcing a password
Forcing a Password
login shells
Available Login Shells
user environment
The User's Environment

user audit
How to Audit a Specific User

user environment
description
The User's Environment
environment variables
Environment Variables
login shells
Available Login Shells
special shells
Special Login Shells

user ID number
User IDs
/etc/passwd
User IDs
site policy
Accounts and Passwords

user requests
anticipate
Anticipating User Requests

user services
User Services

user trouble log
maintaining
Keep a Log

users
disk quotas
Imposing Disk Quotas

/usr/bin/mailq command
/usr/bin/mailq

/usr/bin/rup command
Network Management Tools

/usr/bsd/newaliases program
/usr/bsd/newaliases

/usr/etc/ directory, network files in
Files and Directories

/usr/etc/arp command
Network Management Tools

/usr/etc/configmail script
/usr/etc/configmail

/usr/etc/gated.conf file
Files and Directories

/usr/etc/ifconfig command
Network Management Tools

/usr/etc/inetd.conf file
Files and Directories

/usr/etc/ipfilterd.conf file
Files and Directories

/usr/etc/mrouted.conf file
Files and Directories

/usr/etc/named.d/named.boot file
BIND's Boot File

/usr/etc/named.reload script
The /usr/sbin/named.reload Script

/usr/etc/named.restart script
The /usr/sbin/named.restart Script

/usr/etc/netstat command
Network Management Tools

/usr/etc/ping command
Network Management Tools

/usr/etc/resolv.conf
BIND and /etc/resolv.conf and /etc/hosts

/usr/etc/resolv.conf file
Files and Directories

/usr/etc/route command
Network Management Tools

/usr/etc/rpcinfo command
Network Management Tools

/usr/etc/rtquery command
Network Management Tools

/usr/etc/snmpd.auth file
Files and Directories

/usr/etc/spray command
Network Management Tools

/usr/etc/traceroute command
Network Management Tools

/usr/etc/ttcp command
Network Management Tools

/usr/lib/aliases database
The Aliases Database

/usr/lib/aliases file
/etc/aliases

/usr/lib/sendmail program
sendmail

/usr/lib/sendmail.cf file
/etc/sendmail.cf

/usr/lib/sendmail.cf.auto file
/etc/sendmail.cf

/usr/lib/sendmail.fc file
/etc/sendmail.fc

/usr/lib/sendmail.hf file
/etc/sendmail.hf

/usr/lib/sendmail.st file
/etc/sendmail.st

/usr/mail directory
/var/mail

/usr/news
News

/usr/spool/mqueue directory
/var/spool/mqueue

/usr/sysgen/master.d/bsd
Kernel Configuration

uucheck command (UUCP)
UUCP Administrative Programs

uucico daemon (UUCP)
UUCP Daemons
UUCP Daemons

uucleanup command (UUCP)
UUCP Administrative Programs

UUCP and TCP/IP
Setting up UUCP on a TCP/IP Connection

uucp command (UUCP)
UUCP User Programs

UUCP mail
UUCP Mail

UUCP see UNIX-to-UNIX Copy program
UUCP

uugetty program (UUCP)
UUCP Daemons

uulog command (UUCP)
UUCP Administrative Programs

uupick command (UUCP)
UUCP User Programs

uustat command (UUCP)
UUCP User Programs

uuto command (UUCP)
UUCP User Programs

Uutry command (UUCP)
UUCP Administrative Programs

uux command (UUCP)
UUCP User Programs

uuxqt daemon (UUCP)
UUCP Daemons

variables
bootfile
Booting a Default File
environment
Changing Environment Variables
keyboard
Setting the Keyboard Variable
path
Booting a Specific Program
removing
Removing Environment Variables

versions command
versions Command

violations
of access control security
File Permission Violations
of root privilege security
Unexpected Use of Root Privilege
of security by insiders
Use and Abuse by Insiders
of security by outsiders
Use and Abuse by Outsiders
of security by unauthorized entry
Attempts at Unauthorized Entry
of security by unusual system usage
System Usage at Unusual Hours or From Unusual Locations
possible
Potential Security Violations
through outside connections
Connections with Machines Outside the Local Network

visual login
Checking the System Configuration

w command
Shutting Down the System Carefully

wall command
Write to All Users

warning messages
WARNING Messages

who command
Shutting Down the System Carefully

whodo command
Shutting Down the System Carefully

workstation
serial support
Serial Ports

write command
Write to a User

write to all users
Write to All Users

X server access
changing
Transparent Network Access
checking
Transparent Network Access
controlling
Transparent Network Access
default
Transparent Network Access

xhost command
Transparent Network Access

zones, definition of
Organization of BIND