Managing NFS and NIS, 2nd Edition - Mike Eisler [1]
6.5.4. Replicas and the automounter
6.6. Naming schemes
6.6.1. Solving the /usr/local puzzle
7. Network File System Design and Operation
7.1. Virtual filesystems and virtual nodes
7.2. NFS protocol and implementation
7.2.1. NFS RPC procedures
7.2.2. Statelessness and crash recovery
7.2.3. Request retransmission
7.2.4. Preserving Unix filesystem semantics
7.2.5. Pathnames and filehandles
7.2.6. NFS Version 3
7.2.7. NFS over TCP
7.3. NFS components
7.3.1. nfsd and NFS server threads
7.3.2. Client I/O system
7.3.3. NFS kernel code
7.4. Caching
7.4.1. File attribute caching
7.4.2. Client data caching
7.4.3. Server-side caching
7.5. File locking
7.5.1. Lock and status daemons
7.5.2. Client lock recovery
7.5.3. Recreating state information
7.6. NFS futures
7.6.1. NFS Version 4
7.6.2. Security
8. Diskless Clients
8.1. NFS support for diskless clients
8.2. Setting up a diskless client
8.3. Diskless client boot process
8.3.1. Reverse ARP requests
8.3.2. Getting a boot block
8.3.3. Booting a kernel
8.3.4. Managing boot parameters
8.4. Managing client swap space
8.5. Changing a client's name
8.6. Troubleshooting
8.6.1. Missing and inconsistent client information
8.6.2. Checking boot parameters
8.6.3. Debugging rarpd and bootparamd
8.6.4. Missing /usr
8.7. Configuration options
8.7.1. Dataless clients
8.7.2. Swapping on a local disk
8.8. Brief introduction to JumpStart administration
8.9. Client/server ratios
9. The Automounter
9.1. Automounter maps
9.1.1. Indirect maps
9.1.2. Inside the automounter
9.1.3. Direct maps
9.2. Invocation and the master map
9.2.1. The master map
9.2.2. Command-line options
9.2.3. The null map
9.2.4. Tuning timeout values
9.3. Integration with NIS
9.3.1. Mixing NIS and files in the same map
9.3.2. Updating NIS-managed automount maps
9.4. Key and variable substitutions
9.4.1. Key substitutions
9.4.2. Variable substitutions
9.5. Advanced map tricks
9.5.1. Replicated servers
9.5.2. Hierarchical mounts
9.5.3. Conversion of direct maps
9.5.4. Multiple indirection
9.5.5. Executable indirect maps
9.6. Side effects
9.6.1. Long search paths
9.6.2. Avoiding automounted filesystems
10. PC/NFS Clients
10.1. PC/NFS today
10.2. Limitations of PC/NFS
10.2.1. NFS versus SMB (CIFS)
10.2.2. Why PC/NFS?
10.3. Configuring PC/NFS
10.3.1. Server-side PC/NFS configuration
10.4. Common PC/NFS usage issues
10.4.1. Mounting filesystems
10.4.2. Checking file permissions
10.4.3. Unix to Windows/NT text file conversion
10.5. Printer services
11. File Locking
11.1. What is file locking?
11.1.1. Exclusive and shared locks
11.1.2. Record locks
11.1.3. Mandatory versus advisory locking
11.1.4. Windows/NT locking scheme
11.2. NFS and file locking
11.2.1. The NLM protocol
11.2.2. NLM recovery
11.2.3. Mandatory locking and NFS
11.2.4. NFS and Windows lock semantics
11.3. Troubleshooting locking problems
11.3.1. Diagnosing NFS lock hangs
11.3.2. Examining lock state on NFS/NLM servers
11.3.3. Clearing lock state
12. Network Security
12.1. User-oriented network security
12.1.1. Trusted hosts and trusted users
12.1.2. Enabling transparent access
12.1.3. Using netgroups
12.2. How secure are NIS and NFS?
12.3. Password and NIS security
12.3.1. Managing the root password with NIS
12.3.2. Making NIS more secure
12.3.3. Unknown password entries
12.4. NFS security
12.4.1. RPC security
12.4.2. Superuser mapping
12.4.3. Unknown user mapping
12.4.4. Access to filesystems
12.4.5. Read-only access
12.4.6. Port monitoring
12.4.7. Using NFS through firewalls
12.4.8. Access control lists