Contents
Preface . . . . . . . . . . . . .
Audience . . . . . . . . . . . .
Applicability . . . . . . . . . . .
Purpose . . . . . . . . . . . . .
Document Organization . . . . . . .
Related Documents . . . . . . . . .
Typographic and Keying Conventions . . .
Chapter 1. Overview of the NFS/DFS Secure Gateway. . . . . . . . . .
Chapter 2. Configuring Gateway Server Machines . . . . . . . . . . . .
Configuring a Gateway Server Without Enabling Remote Authentication . . . .
Configuring a Gateway Server and Enabling Remote Authentication . . . . . . . .
Configuring the BOS Server Process . . Configuring the Gateway Server Process
Chapter 3. Configuring NFS Clients to Access DFS . . . . . . . . . . .
Configuring a Client Without Enabling Remote Authentication . . . . . . . .
Configuring a Client and Enabling Remote Authentication . . . . . . . . . .
Chapter 4. Accessing DFS from an NFS Client . . . . . . . . . . . . .
Unauthenticated Access to DFS . . . . .
v | Authenticated Access to DFS | 18 |
v | Authenticating to DCE from an NFS |
|
v | Client | 19 |
v | Authenticating to DCE from a Gateway |
|
v | Server Machine | 21 |
viDetermining Whether a Specific User Is
viAuthenticated to DCE . . . . . . . 22 Displaying Information About All Users Who Are Authenticated to DCE . . . . 22
1
Chapter 5. Configuration File and
Command Reference . . . . . . . . 25
5DfsgwLog . . . . . . . . . . . . 26
| dfsgw | 27 |
6 | dfsgw add | 30 |
| dfsgw apropos | 33 |
7 | dfsgw delete | 35 |
7 | dfsgw help | 37 |
9dfsgw list . . . . . . . . . . . . 39 dfsgw query . . . . . . . . . . . 42
dfsgwd . . . . . . . . . . . . . 44
13 | Index | 47 |
| ||
14 | Notices | 49 |
| ||
14 | Trademarks | 51 |
| Readers’ Comments — We’d Like to Hear |
|
17 | from You | 53 |
17 |
|
|
© Copyright IBM Corp. 1989, 1999 | iii |