A/UX Networking Essentials
Total Page:16
File Type:pdf, Size:1020Kb
A/UX Networking Essentials Release 3.0 limited Warranty on Media and Replacement If you discover physical defects in the manuals distributed with an Apple product or in the media on which a software product is distributed, Apple will replace the media or manuals at no charge to you, provided you return the item to be replaced with proof of purchase to Apple or an authorized Apple dealer during the 90-day period after you purchased the software. In addition, Apple will replace damaged software media and manuals for as long as the software product is included in Apple's Media Exchange Program. While not an upgrade or update method, this program offers additional protection for up to two years or more from the date of your original purchase. See your authorized Apple dealer for program coverage and details. In some countries the replacement period may be different; check with your authorized Apple dealer. All IMPLIED WARRANTIES ON THE MEDIA AND MANUMS, INCLUDING IMPLIED WARRANTIES OF MERCHANTABIIJTY AND FITNESS FOR A PARTICUIAR PURPOSE, ARE LIMITED IN DURATION TO NINETY (90) DAYS FROM THE DATE OF THE ORIGINAL RETAIL PURCHASE OF nns PRODUCT. Even though Apple has tested the software and reviewed the documentation, APPLE MAKES NO WARRANTY OR REPRESENTATION, EITHER EXPRESS, OR IMPLIED, WITH RESPECT TO SOFTWARE, ITS QUALITY, PERFORMANCE, MERCHANTABIIJTY, OR FITNESS FOR A PARTICUIAR PURPOSE. AS A RESULT, nns SOFTWARE IS SOID "AS IS," AND YOU, THE PURCHASER, ARE ASSUMING THE ENTIRE RISK AS TO ITS QUALITY AND PERFORMANCE. IN NO EVENT WILL APPLE BE IJABLE FOR DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES RESULTING FROM ANY DEFECT IN THE SOFTWARE OR ITS DOCUMENTATION, even if advised of the possibility of such damages. In particular, Apple shall have no liability for any programs or data stored in or used with Apple products, including the costs of recovering such programs or data. THEWARRANTY AND REMEDIES SET FORTII ABOVE ARE EXCLUSIVE AND IN LIEU OF All OTHERS, ORAL OR WRITTEN, EXPRESS, OR IMPLIED. No Apple dealer, agent, or employee is authorized to make any modification, extension, or addition to this warranty. Some states do not allow the exclusion or limitation of implied warranties or liability for incidental or consequential damages, so the above limitation or exclusion may not apply to you. This warranty gives you specific legal rights, and you may also have other rights which vary from state to state. 9 Apple Computer, Inc. © 1992, Massachusetts Institute of Technology and Apple Computer, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, mechanical, electronic, photocopying, recording, or otherwise, without prior written permission of Apple Computer, Inc. Printed in the United States of America. The Apple logo is a registered trademark of Apple Computer, Inc. Use of the "keyboard" logo (Option Shift-K) for commercial purposes without the prior written consent of Apple may constitute trademark infringement and unfair competition in violation of federal and state laws. Apple Computer, Inc. 20525 Mariani Ave. Cupertino, CA 95014-6299 408-996-1010 APDA, Apple, the Apple logo, AppleShare, AppleTalk, A/UX, EtherTalk, ImageWriter, LaserWriter, LocalTalk, Macintosh, and Style Writer are trademarks of Apple Computer, Inc., registered in the United States and other countries. Finder and Quadra are trademarks of Apple Computer, Inc. Adobe Illustrator and Postscript are trademarks of Adobe Systems Incorporated, registered in the United States. ITC Garamond and ITC Zapf Dingbats are registered trademarks of International Typeface Corporation. Linotronic is a registered trademark of Linotype Co. Microsoft is a registered trademark of Microsoft Corporation. NFS is a registered trademark of Sun Microsystems, Inc. QuarkXPress is a registered trademark of Quark, Inc. UNIX is a registered trademark of UNIX Laboratories. VAX is a trademark of Digital Equipment Corporation. X Window System and Xll are trademarks of the Massachusetts Institute of Technology. Simultaneously published in the United States and Canada. Mention of third-party products is for informational purposes only and constitutes neither an endorsement nor a recommendation. Apple assumes no responsibility with regard to the performance or use of these products. The learning path through A/UX documentation A/UX Essential Manuals set Xll User's Guide for A/UX MacXUser's Guide .• • Road Map A/UX : Read Me A/UX A/UX . toA/UX Installation : Essentials Networking •• Guide : Essentials .• . •• • •• •• •• ••. • ••• ••• Setting Up Accounts ·. .. and Peripherals ·..... for A/UX Apple guides for various peripheral devices Contents About This Guide I xv What you should already know I xv How to use this guide I xvi What's covered in this guide I xvi What's covered elsewhere I xviii Conventions used in this guide I xviii Keys and key combinations I xviii Terminology I xix The Courier font I xx Font styles I xx A/UX command syntax I xxi Manual page reference notation I xxii For more information I xxiii 1 Introduction to A/UX Networking I 1-1 A/UX network connections I 1-3 Network features of your A/UX system I 1-4 Choosing a network file-sharing option I 1-5 2 Connecting to an Existing Network I 2-1 Types of networks you can connect to I 2-3 Identifying your network I 2-4 Connecting to a TCP /IP network I 2-6 Before you connect to a network I 2-6 Setting up your computer to use the TCP/IP network I 2-9 Testing the network connection I 2-12 Switching AppleTalk networks I 2-13 Switching from LocalTalk to EtherTalk I 2-13 Switching from EtherTalk to LocalTalk I 2-16 What's available now I 2-18 3 Printing Over the Network I 3-1 Understanding network printing I 3-2 Printer connections I 3-2 Choosing a printer I 3-4 Printing from the Finder I 3-5 Printing with 1 pr I 3-6 Setting up access to a printer on a TCP /IP network I 3-6 Sending a file to a remote UNIX printer I 3-8 Finding out how many files are waiting in the printing queue I 3-9 Canceling a printing job I 3-10 Overview of available print facilities I 3-11 4 Sending and Receiving Mail I 4-1 Creating a mail alias I 4-3 Sending mail I 4-3 Sending mail to users on your local system I 4-4 Sending mail to one person I 4-5 Sending mail to more than one person I 4-6 Using an alias to send mail to more than one person I 4-6 Sending mail to users on other systems I 4-8 Sending mail to a user on the TCP /IP network I 4-8 Sending mail to more than one person on the TCP /IP network I 4-9 vi Contents Sending mail to a user through UUCP I 4-10 Sending mail to more than one person through UUCP I 4-11 Canceling a message I 4-11 Receiving and reading mail I 4-12 Reading mail I 4-12 Deleting a message I 4-13 Saving a message I 4-14 Exiting mail I 4-14 5 Using TCP /IP I 5-1 What TCP/IP adds to a network I 5-2 TCP /IP networking commands I 5-4 Finding out which computers can be accessed I 5-5 Working with network permissions I 5-7 Setting up the . rhos ts file I 5-8 Connecting to other computers I 5-10 Using rlogin to log in to a remote computer I 5-10 Using the remote system I 5-12 Ending the rlogin session I 5-14 Using telnet to log in to a remote computer I 5-14 Logging in I 5-15·. Learning the current status I 5-15 Logging out I 5-16 Using telnet commands I 5-16 Running commands on other computers I 5-17 Using remsh 5-17 Ending the remsh session I 5-19 Copying files between systems I 5-19 Using rep 5-19 Using rep to copy files I 5-19 Using rep to copy directories I 5-21 Shorthand notations I 5-21 Ending the rep session I 5-22 Using File Transfer Protocol I 5-22 Using ftp to copy files I 5-22 Using ftp to transfer files I 5-23 Using directories on the remote computer I 5-24 Logging out I 5-24 Contents vii 6 Sharing Files Over the AppleTalk Network I 6-1 About file sharing I 6-3 What you should know before you begin I 6-4 Starting file sharing I 6-4 Sharing a folder or disk I 6-6 Naming specific people to share folders and disks with I 6-7 Naming a user I 6-8 Naming a group of users I 6-11 Reviewing group membership I 6-12 Sharing a folder or disk with specific people I 6-13 Setting up your computer for remote accessing I 6-15 Changing your password I 6- l 7 Giving folder ownership to someone else I 6-18 Changing a user's password I 6-19 Monitoring file-sharing activity I 6-20 Disconnecting a user I 6-21 Reducing access to your shared files I 6-22 Making a shared folder or disk private again I 6-22 Denying access to a specific user I 6-22 Denying access to guest users I 6-23 Denying access to yourself I 6-24 Removing a user's membership in a group I 6-24 Removing a user or group altogether I 6-24 Turning off file sharing I 6-25 About accessing information on other computers I 6-26 What to do before you begin I 6-27 Connecting to a shared disk I 6-28 Connecting automatically I 6-32 Using aliases to connect quickly I 6-32 Connecting automatically when you start up I 6-33 Using and storing files on a shared disk I 6-35 Disconnecting from a shared disk I 6-35 Changing your password to access a shared disk I 6-36 Affecting access to folders I 6-37 Giving folder ownership to someone else I 6-37 Accessing your own computer remotely I 6-38 viii Contents 7 Sharing Files With NFS I 7-1 About NFS file sharing I 7-3 When to use NFS I 7-4 What you need to run NFS I 7-4 Preparing your system to run NFS I 7-5 Making your files available (Being a server) I 7-6 Using files on other systems (Being a client) I 7-7 Modifying the /etc/fstab file I 7-10 Verifying