Network Data Encryption ....................82
User Authorities ........................83
User Identifications (UIDs) ...................83
Group Identifications (GIDs)...................83
Mapping User Identifications ..................84
Proper UID Mapping .....................86
Securely Exporting File Systems ..................87
Export Options .......................88
Appendix A. Summary of Common Commands ........... 91
Appendix B. Understanding the /etc Files..............93
Editing files within the /etc directory .................93
Editing stream files by using the Edit File (EDTF) command .......93
Editing stream files by using a PC based editor ...........94
Editing stream files by using a UNIX editor via NFS ..........94
/etc/exports File ........................94
Formatting Entries in the /etc/exports File..............94
Examples of Formatting /etc/exports with HOSTOPT Parameter .....96
/etc/netgroup File........................96
/etc/rpcbtab File ........................97
/etc/statd File .........................97
Notices ...........................99
Programming Interface Information .................101
Trademarks..........................101
Bibliography .........................103
Index ............................105
Readers’ Comments — We’d Like to Hear fromYou..........113
Contents v