losing DMS customization during
remove, 11–6
route for network
for DMS clients, 10–8
running bootpd and joind
restrictions, 8–6n
S
security in DMS, 10–9
security in RIS, 3–5
server
architecture of DMS, 9–2
compatibilitywith theclient, 11–1
defined, 1–1
description of, 1–2
DMSmanagement tasks, 12–1
function in DMS, 9–2
function in RIS, 2–1
hardware compatibility for DMS,
10–1, 11–1
hardware compatibility for RIS,
3–2
managementtasks , 12–15
managementtasks for RIS, 6–1
operating system installation for
DMS, 10–7
operating system installation for
RIS, 3–3
planning disk space for DMS, 10–4
planning disk space for RIS, 3–3
preparing DMS server, 10–1
RIS setup preparation, 3–1
software version compatibility for
DMS, 10–1, 11–1
software version compatibility for
RIS, 3–2
setld utility
listing subsets with, 12–14
removingsubsets with, 12–15
sharing software
benefits, 1–1
overview, 1–1
showing
product list, 12–13
RIS product list, 6–11
software sharing via servers, 1–2
software subsets
choosing for DMS, 11–4, 11–7
choosing for RIS, 4–4
defined for RIS, 2–3
descriptions of, 3–3, 10–7
for RIS, 2–3
installing in existing DMS
environment, 11–6
installing in existing RIS area, 4–5
installing in new RIS area, 4–1
listing installed, 12–14
removing, 12–15
required for DMS, 10–7
required for DMS environments,
10–4
required for DMS server, 10–1
sizes of, 10–7
version compatibility for DMS,
10–1
space requirements
mandatory subsets, 10–5
startup messages
RIS, 2–3
startup process
RIS, 2–3
subnet mask
for DMS clients, 10–8
swap space
for DMS client, 10–8
SysMan Menu
using to install software for DMS,
10–7
system disk space, 10–4
system name
limitations on, 10–8
T
TFTP, 5–1, 5–4
TFTP protocol
requirement for, 3–3
Index–8