Contents

Preface . . . . . . . . . . . . .

Audience . . . . . . . . . . . .

Applicability . . . . . . . . . . .

Purpose . . . . . . . . . . . . .

Document Organization . . . . . . .

Related Documents . . . . . . . . .

Typographic and Keying Conventions . . .

Chapter 1. Overview of the NFS/DFS Secure Gateway. . . . . . . . . .

Chapter 2. Configuring Gateway Server Machines . . . . . . . . . . . .

Configuring a Gateway Server Without Enabling Remote Authentication . . . .

Configuring a Gateway Server and Enabling Remote Authentication . . . . . . . .

Configuring the BOS Server Process . . Configuring the Gateway Server Process

Chapter 3. Configuring NFS Clients to Access DFS . . . . . . . . . . .

Configuring a Client Without Enabling Remote Authentication . . . . . . . .

Configuring a Client and Enabling Remote Authentication . . . . . . . . . .

Chapter 4. Accessing DFS from an NFS Client . . . . . . . . . . . . .

Unauthenticated Access to DFS . . . . .

v

Authenticated Access to DFS

18

v

Authenticating to DCE from an NFS

 

v

Client

19

v

Authenticating to DCE from a Gateway

 

v

Server Machine

21

viDetermining Whether a Specific User Is

viAuthenticated to DCE . . . . . . . 22 Displaying Information About All Users Who Are Authenticated to DCE . . . . 22

1

Chapter 5. Configuration File and

Command Reference . . . . . . . . 25

5DfsgwLog . . . . . . . . . . . . 26

 

dfsgw

27

6

dfsgw add

30

 

dfsgw apropos

33

7

dfsgw delete

35

7

dfsgw help

37

9dfsgw list . . . . . . . . . . . . 39 dfsgw query . . . . . . . . . . . 42

dfsgwd . . . . . . . . . . . . . 44

13

Index

47

 

14

Notices

49

 

14

Trademarks

51

 

Readers’ Comments — We’d Like to Hear

 

17

from You

53

17

 

 

© Copyright IBM Corp. 1989, 1999

iii

Page 5
Image 5
IBM NFS/DFS Secure Gateway manual Contents