file when you initially set up your LAN. The Network Configuration
Application is described in the Network Administration: Connections
manual.
Youalso can place the host name and IP address in the /etc/hosts file by
using a text editor such as vi. The host name and IP address for each client
processor must be unique.
See the Network Administration: Services manual for information about
setting up NIS and the BIND Configuration Application.
10.9 Considering Security Issues
C2 security may beinstalled on the server and the clients. However, DMS
uses the bootp protocol, which is not a secure protocol. Therefore, your
dataless environments may not be secure.
Preparing DMS Servers and Clients 10–9