DHCP Option Numbers

Total Page:16

File Type:pdf, Size:1020Kb

DHCP Option Numbers 569 Appedix A DHCP Option Numbers DHCP uses what are referred to as options to extend the functionality. You can learn more about what the options can do for you in Chapter 6. They’re identified numerically, and each number corresponds to the services that they provide. 0: Pad 1: Subnet Mask 3: Router 4: Time Server 5: Name Server 6: Domain Name Server 7: Log Server 8: Quotes Server 9: LPR Server 10: Impress Server 11: Resource Location Server 12: Host Name 13: Boot File Size 14: Merit Dump File 15: Domain Name 16: Swap Server 17: Root Path 18: Extensions Path 19: IP Forwarding 20: WAN Source Routing 569 570 APPENDIX A: DHCP Option Numbers 21: Policy Filter 22: Maximum Datagram Reassembly Size 23: Default IP Time-to-Live 24: Path MTU Aging Timeout 25: Path MTU Plateau Table 26: Interface MTU Size 27: All Subnets are Local 28: Broadcast Address 29: Perform Mask Discovery 30: Mask Supplier 31: Perform Router Discovery 32: Router Solicitation Address 33: Static Routing Table 34: Trailer Encapsulation 35: ARP Cache Timeout 36: Ethernet Encapsulation 37: Default TCP TTL 38: TCP Keep-Alive Interval 39: TCP Keep-Alive Garbage 40: Network Information Service Domain 41: Network Information Servers 42: NTP Servers 43: Vendor-Specific Information 44: NetBIOS Over TCP/IP Name Server 45: NetBIOS Over TCP/IP Datagram Distribution Server 46: NetBIOS Over TCP/IP Node Type 47: NetBIOS Over TCP/IP Scope 48: X Window System Font Server 49: X Window System Display Manager 50: Requested IP Address 51: IP Address Lease Time APPENDIX A: DHCP Option Numbers 571 52: Option Overload 53: DHCP Message Type 54: Server Identifier 55: Parameter Request List 56: Error Message 57: Maximum DHCP Message Size 58: Renew Time Value 59: Rebinding Time Value 60: Class-Identifier 61: Client-Identifier 62: NetWare Over IP Domain Name 63: NetWare Over IP Information 64: Network Information Service Domain 65: Network Information Service Servers 66: TFTP Server Name 67: Bootfile Name 68: Mobile IP Home Agent 69: Simple Mail Transport Protocol Server 70: Post Office Protocol Server 71: Network News Transport Protocol Server 72: Default World Wide Web Server 73: Default Finger Server 74: Default Internet Relay Chat Server 77: User Class Information 78: SLP Directory Agent 79: SLP Service Scope 80: Rapid Commit 81: Fully Qualified Domain Name 82: Relay Agent Information 83: Internet Storage Name Service 85: NDS Servers 572 APPENDIX A: DHCP Option Numbers 86: NDS Tree Name 87: NDS Context 88: BCMCS Controller Domain Name List 89: BCMCS Controller IPv4 Address List 90: Authentication 91: Client Last Transaction Time 92: Associated IP 93: Client System Architecture Type 94: Client Network Interface Identifier 95: LDAP, Lightweight Directory Access Protocol 97: Client Machine Identifier 98: Open Group User Authentication 100: IEEE 1003.1 TZ String 101 : Reference to the TZ Database 112 : NetInfo Parent Server Address 113 : NetInfo Parent Server Tag 114: URL 116: Autoconfigure 117: Name Service Search 118: Subnet Selection 119: DNS Domain Search List 120: SIP Servers DHCP Option 121: Classless Static Route Option 123: GeoConfiguration 124: Vendor-Identifying Vendor Class 125: Vendor-Identifying Vendor Specific 128: TFPT Server IP Address 129: Call Server IP Address 130: Discrimination String 131: Remote Statistics Server IP Address 132: 802.1P VLAN ID APPENDIX A: DHCP Option Numbers 573 133: 802.1Q L2 Priority 134: Diffserv Code Point 135: HTTP Proxy for Phone-Specific Applications 136: PANA Authentication Agent 139: IPv4 MoS 140: IPv4 Fully Qualified Domain Name MoS 150: TFTP Server Address 176: IP Telephone 220: Subnet Allocation 221: Virtual Subnet Selection 252: Proxy Autodiscovery 254: Private Use 255: End 575 Appendix B Taking It to the Next Level We hope that by the time you finish this book you’re a first-class Mac OS X Server administrator. But it would be naïve of us to think that you won’t need to know anything else. If you want to take your skills with Mac OS X Server to the next level, you’ll be able to find a lot of resources that you can look to for assistance. Perhaps the most important resource is Apple. Apple has posted the documentation for Snow Leopard Server at http://www.apple.com/server/macosx/resources/documentation.html. Books The Apress enterprise Mac bookshelf begins with this book, but it also includes the following books: Enterprise Mac Administrators Guide Foundations of Mac OS X Snow Leopard Security iPhone for Work: Increasing Productivity for Busy Professionals Courses Apple courses are a more costly option than reading books, but many prefer instructor- led training to the self-paced style of learning of books. The official Apple courseware is designed for, and specific to, Mac OS X Server and Mac OS X–based technologies. You can find out more about Apple training options at http://training.apple.com. These courses are developed in partnership with Peachpit Press. For those who do not have the resources to attend the courses, there are the Apple Authorized training guides: Apple Training Series: Mac OS X Support Essentials v10.6: A Guide to Supporting and Troubleshooting Mac OS X v10.6 Snow Leopard Apple Training Series: Mac OS X Server Essentials v10.6: A Guide to Using and Supporting Mac OS X Server v10.6 575 576 APPENDIX B: Taking It to the Next Level Apple Training Series: Mac OS X Directory Services v10.6: A Guide to Configuring Directory Services on Mac OS X and Mac OS X Server v10.6 Apple Training Series: Mac OS X Security and Mobility v10.6 Apple Training Series: Mac OS X Deployment v10.6: A Guide to Deploying and Maintaining Mac OS X and Mac OS X Software Mailing Lists Mailing lists are another way of finding answers to technical questions that you encounter in your journey to becoming part of the Mac OS X Server elite. These include the following: MacEnterprise, found at http://macenterprise.org Apple lists, found at http://lists.apple.com Web Sites Finally, a number of web sites are dedicated to Mac OS X Server and Mac-centric networking issues. These include the following: http://afp548.com http://macenterprise.org http://krypted.com http://bynkii.com http://318.com/techjournal 577 Index ■ access.log file Numerics Address Book service, 274 250 message, connectivity of mail services, finding iCal log files, 300 334–335 account attributes, Workgroup Manager, 354 message, connectivity of mail services, 140 334 Account creation options, Workgroup Manager, 139 Account Creation tab, Mobility managed ■ A preferences, 137–139 A record, DNS, 189 Account Expiry tab, Mobility managed AAAA record, DNS, 189 preferences, 140 ABSPlugin.vcf file, 260 Account Information screen, connecting to Accept Incoming Broadcasts option, Address Book server, 267–268 QuickTime Streaming, 459 Account Name field, iChat, 313 access control Account window, System Preferences, 143 firewall controlling access to server, accounting port, specifying UDP port for 162–171 RADIUS, 224 Guest Access, AFP settings, 60 accounts limiting access to VPN and RADIUS, Add an Account screen, 290, 291 225 creating account, Server Mobile Access service, 348, 349 Preferences, 117, 118 QuickTime Streaming Server, 464 creating administrator account, 20– securing Open Directory, 109, 113 22 service access controls, Server creating mail accounts, 330 Preferences, 120 creating users and groups, Server wikis, 386, 387 Preferences, 116 access control entity. See ACE directory administrator account, 33 access control lists. See ACL disabling inactive accounts, 112 Access icon, Server Admin, 271 logging into iCal via web portal, 295 access logs, configuring site-specific Manage Account Access screen, options, 374 adding iCal delegates, 294, 295 access settings, AFP (Apple Filing Protocol), tiered administration of, 113 59–61 Accounts System Preference Pane, trusted Access tab binding, 143 AFP (Apple Filing Protocol) settings, Accounts window 59–61, 475 connecting to Address Book server, Server Admin: Server window, 53–55 266, 267 Settings pane creating iCal accounts, 289, 290, 292 QuickTime Streaming, 457, 458, 460 delegation, 293, 294 Server Admin: SMB window, 481 Push Notification services, 292 SMB settings, 87 577 578 Index Refresh calendars drop-down list, Address field, Server Preferences, 118 292 address groups, defining firewall controlling server settings, 292, 293 access to server, 163–165 Delegation tab, creating iCal addresses, loopback, 74 accounts, 293, 294 Administration capabilities field, Workgroup Server Settings tab, creating iCal Manager, 124, 125 accounts, 292, 293 administration resources, Mac OS X Server, ACE (access control entity), 66 575, 576 Full Control ACE, 501 Administration tab, managing printing with predefined ACE options, 501 CUPS, 529, 530 Read/Write options, 501 administrator account, creating, 20–22 setting, 501 Administrator Email setting, configuring site- ACLs (access control lists), 53, 501– specific options, 372 503 administrator, Mailman, 331 adding ACL entry, 68 administrators creating Open Directory replica, 108 creating limited administrator user, custom ACL sheet, 502 125, 126 Effective Permissions Inspector, 70, tiered administration, 113 502, 503 Advanced tab file permissions, 500 Settings pane Propagate Permissions option, 70 FTP (File Transfer Protocol), 96 Share Point permissions and ACLs, 65– Server Admin: SMB window, 481 71 SMB (Server Message Block), 89 Active Directory, 101, 480 Workgroup Manager, creating users, Add an Account screen, creating iCal 125, 126 accounts, 290, 291 AFP (Apple Filing Protocol), 55–84, Add
Recommended publications
  • Kirjoituspohja VTT Science
    IENCE C • •S T S E C Small world for dynamic wireless cyber-physical N O H I N systems S O I V Dissertation L • O S 142 G T Y H • R Industries and consumer markets are today increasingly using G I E L VTT SCIEN CE S H E G services exposed from wireless sensor and actuator networks, A I R H C cyber-physical machine-to-machine systems. The motivation for H the research arises from problems detected in the remote 1 4 2 interaction with embedded devices over dynamic wireless networks in such systems. The selected approach is based on the application of the small- world paradigm to cyber-physical systems. It is here assumed that the concept of small world, "six degrees of separation", can be expanded to also cover communication with wireless embedded devices in cyber-physical systems context. The main contributions are the technical enablers referred to as dynamic communication spaces, dynamic M2M service spaces, configuration and remote use of services, communication overlay, access systems selection, integrated mobility, secure ad hoc networking, situated opportunistic communication, hierarchical networking for small-world networks, and short-cuts for network optimization. The enablers have been evaluated as separate technical methods and means by means of experiments and/or simulations. According to the evaluations, the enablers seem to work well as separate building blocks and that they can be combined to expand the concept of small world to also cover communication with embedded devices. Wireless short-cuts can improve the scalability and efficiency of dynamic wireless networking and weak links are essential in the neighbour discovery process.
    [Show full text]
  • OS X Server Essentials 10.10 Exam Preparation Guide
    OS X Server Essentials 10.10 Exam Preparation Guide OS X Server Essentials 10.10 Exam Preparation Guide Updated February 2015 !1 OS X Server Essentials 10.10 Exam Preparation Guide Contents About This Guide ..............................................................................................................3 Becoming an Apple Certified Support Professional ...........................................3 Exam Details .......................................................................................................................4 Recommended Exam Preparation .............................................................................4 Part One: Configuring and Monitoring OS X Server ...........................................6 Part Two: Configuring Accounts .................................................................................11 Part Three: Managing Devices with Configuration Profiles .............................16 Part Four: Sharing Files ...................................................................................................18 Part Five: Implementing Deployment Solutions ..................................................21 Part Six: Providing Network Services ........................................................................25 Part Seven: Using Collaborative Services ................................................................28 TM and © 2015 Apple Inc. All rights reserved. Other product and company names mentioned herein may be trademarks of their respective companies. Mention of third-party
    [Show full text]
  • Mac OS X Server Administrator's Guide
    034-9285.S4AdminPDF 6/27/02 2:07 PM Page 1 Mac OS X Server Administrator’s Guide K Apple Computer, Inc. © 2002 Apple Computer, Inc. All rights reserved. Under the copyright laws, this publication may not be copied, in whole or in part, without the written consent of Apple. The Apple logo is a trademark of Apple Computer, Inc., registered in the U.S. and other countries. Use of the “keyboard” Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may constitute trademark infringement and unfair competition in violation of federal and state laws. Apple, the Apple logo, AppleScript, AppleShare, AppleTalk, ColorSync, FireWire, Keychain, Mac, Macintosh, Power Macintosh, QuickTime, Sherlock, and WebObjects are trademarks of Apple Computer, Inc., registered in the U.S. and other countries. AirPort, Extensions Manager, Finder, iMac, and Power Mac are trademarks of Apple Computer, Inc. Adobe and PostScript are trademarks of Adobe Systems Incorporated. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Netscape Navigator is a trademark of Netscape Communications Corporation. RealAudio is a trademark of Progressive Networks, Inc. © 1995–2001 The Apache Group. All rights reserved. UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd. 062-9285/7-26-02 LL9285.Book Page 3 Tuesday, June 25, 2002 3:59 PM Contents Preface How to Use This Guide 39 What’s Included
    [Show full text]
  • Well Known TCP and UDP Ports Used by Apple Software Products
    Well known TCP and UDP ports used by Apple Languages English software products Symptoms Learn more about TCP and UDP ports used by Apple products, such as OS X, OS X Server, Apple Remote Desktop, and iCloud. Many of these are referred to as "well known" industry standard ports. Resolution About this table The Service or Protocol Name column lists services registered with the Internet Assigned Numbers Authority (http://www.iana.org/), except where noted as "unregistered use." The names of Apple products that use these services or protocols appear in the Used By/Additional Information column. The RFC column lists the number of the Request For Comment document that defines the particular service or protocol, which may be used for reference. RFC documents are maintained by RFC Editor (http://www.rfc- editor.org/). If multiple RFCs define a protocol, there may only be one listed here. This article is updated periodically and contains information that is available at time of publication. This document is intended as a quick reference and should not be regarded as comprehensive. Apple products listed in the table are the most commonly used examples, not a comprehensive list. For more information, review the Notes below the table. Tip: Some services may use two or more ports. It is recommend that once you've found an instance of a product in this list, search on the name (Command-F) and then repeat (Command-G) to locate all occurrences of the product. For example, VPN service may use up to four diferent ports: 500, 1701, 1723, and 4500.
    [Show full text]
  • A Review of HTTP Live Streaming
    A Review of HTTP Live Streaming Andrew Fecheyr-Lippens ([email protected]) Abstract TODO: write abstract January 2010 A Review of HTTP Live Streaming Andrew Fecheyr-Lippens Table of Contents 1. Introduction to streaming media 3 On-demand vs live streaming 3 2. Popular solutions 5 RTP/RTSP 5 Adobe Flash Media Streaming Server 5 3. Apple’s HTTP Live Streaming 7 HTTP Streaming Architecture 7 Server Components 9 Media Segment Files 10 Distribution Components 11 Client Component 11 Using HTTP Live Streaming 12 Session Types 12 Content Protection 13 Caching and Delivery Protocols 14 Stream Alternatives 14 Failover Protection 15 4. Critical Comparison 16 Ease of Setup 16 HTTP Live Streaming - Apple tools 17 HTTP Live Streaming - Open Source tools 17 RTP/RTSP - Darwin Streaming Server 18 Compatibility 19 Features 20 Ease of Distribution 21 Cost 22 5. Conclusion 23 6. Appendices 25 Appendix 1 - Index file generated by Apple tool 25 Appendix 2 - Configuration file for the O.S. toolchain 26 Appendix 3 - Index files generated by O.S. toolchain 27 Appendix 4 - Web server access log 28 Appendix 5 - Akamai HD for iPhone architecture 29 7. References 30 2 A Review of HTTP Live Streaming Andrew Fecheyr-Lippens 1.Introduction to streaming media In the early 1990s consumer-grade personal computers became powerful enough to display video and playback audio. These early forms of computer media were usually delivered over non-streaming channels, by playing it back from CD-ROMs or by downloading a digital file from a remote web server and saving it to a local hard drive on the end user's computer.
    [Show full text]
  • QUESTION 20-1/2 Examination of Access Technologies for Broadband Communications
    International Telecommunication Union QUESTION 20-1/2 Examination of access technologies for broadband communications ITU-D STUDY GROUP 2 3rd STUDY PERIOD (2002-2006) Report on broadband access technologies eport on broadband access technologies QUESTION 20-1/2 R International Telecommunication Union ITU-D THE STUDY GROUPS OF ITU-D The ITU-D Study Groups were set up in accordance with Resolutions 2 of the World Tele- communication Development Conference (WTDC) held in Buenos Aires, Argentina, in 1994. For the period 2002-2006, Study Group 1 is entrusted with the study of seven Questions in the field of telecommunication development strategies and policies. Study Group 2 is entrusted with the study of eleven Questions in the field of development and management of telecommunication services and networks. For this period, in order to respond as quickly as possible to the concerns of developing countries, instead of being approved during the WTDC, the output of each Question is published as and when it is ready. For further information: Please contact Ms Alessandra PILERI Telecommunication Development Bureau (BDT) ITU Place des Nations CH-1211 GENEVA 20 Switzerland Telephone: +41 22 730 6698 Fax: +41 22 730 5484 E-mail: [email protected] Free download: www.itu.int/ITU-D/study_groups/index.html Electronic Bookshop of ITU: www.itu.int/publications © ITU 2006 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. International Telecommunication Union QUESTION 20-1/2 Examination of access technologies for broadband communications ITU-D STUDY GROUP 2 3rd STUDY PERIOD (2002-2006) Report on broadband access technologies DISCLAIMER This report has been prepared by many volunteers from different Administrations and companies.
    [Show full text]
  • Dnsservicediscovery Mach-Based API
    DNSServiceDiscovery Mach-Based API February 1, 2004 REPRESENTATION, EITHER EXPRESS OR IMPLIED, WITH RESPECT TO THIS MANUAL, Apple Computer, Inc. ITS QUALITY, ACCURACY, © 2001, 2004 Apple Computer, Inc. MERCHANTABILITY, OR FITNESS FOR A PARTICULAR PURPOSE. AS A RESULT, THIS All rights reserved. MANUAL IS SOLD ªAS IS,º AND YOU, THE PURCHASER, ARE ASSUMING THE ENTIRE No part of this publication may be RISK AS TO ITS QUALITY AND ACCURACY. reproduced, stored in a retrieval system, or IN NO EVENT WILL APPLE BE LIABLE FOR DIRECT, INDIRECT, SPECIAL, INCIDENTAL, transmitted, in any form or by any means, OR CONSEQUENTIAL DAMAGES mechanical, electronic, photocopying, RESULTING FROM ANY DEFECT OR INACCURACY IN THIS MANUAL, even if recording, or otherwise, without prior advised of the possibility of such damages. written permission of Apple Computer, Inc., THE WARRANTY AND REMEDIES SET with the following exceptions: Any person FORTH ABOVE ARE EXCLUSIVE AND IN is hereby authorized to store documentation LIEU OF ALL OTHERS, ORAL OR WRITTEN, EXPRESS OR IMPLIED. No Apple dealer, agent, on a single computer for personal use only or employee is authorized to make any and to print copies of documentation for modification, extension, or addition to this warranty. personal use provided that the Some states do not allow the exclusion or documentation contains Apple’s copyright limitation of implied warranties or liability for notice. incidental or consequential damages, so the above limitation or exclusion may not apply to The Apple logo is a trademark of Apple you. This warranty gives you specific legal Computer, Inc. rights, and you may also have other rights which vary from state to state.
    [Show full text]
  • Mobile IP Administration Guide
    Mobile IP Administration Guide Sun Microsystems, Inc. 901 San Antonio Road Palo Alto, CA 94303-4900 U.S.A. Part Number 806-6542–10 January 2001 Copyright 2001 Sun Microsystems, Inc. 901 San Antonio Road, Palo Alto, California 94303-4900 U.S.A. All rights reserved. This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Third-party software, including font technology, is copyrighted and licensed from Sun suppliers. Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. UNIX is a registered trademark in the U.S. and other countries, exclusively licensed through X/Open Company, Ltd. Sun, Sun Microsystems, the Sun logo, docs.sun.com, AnswerBook, AnswerBook2, and Solaris are trademarks, registered trademarks, or service marks of Sun Microsystems, Inc. in the U.S. and other countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc. The OPEN LOOK and SunTM Graphical User Interface was developed by Sun Microsystems, Inc. for its users and licensees. Sun acknowledges the pioneering efforts of Xerox in researching and developing the concept of visual or graphical user interfaces for the computer industry. Sun holds a non-exclusive license from Xerox to the Xerox Graphical User Interface, which license also covers Sun’s licensees who implement OPEN LOOK GUIs and otherwise comply with Sun’s written license agreements.
    [Show full text]
  • A Brief Technical Introduction
    Mac OS X A Brief Technical Introduction Leon Towns-von Stauber, Occam's Razor LISA Hit the Ground Running, December 2005 http://www.occam.com/osx/ X Contents Opening Remarks..............................3 What is Mac OS X?.............................5 A New Kind of UNIX.........................12 A Diferent Kind of UNIX..................15 Resources........................................39 X Opening Remarks 3 This is a technical introduction to Mac OS X, mainly targeted to experienced UNIX users for whom OS X is at least relatively new This presentation covers primarily Mac OS X 10.4.3 (Darwin 8.3), aka Tiger X Legal Notices 4 This presentation Copyright © 2003-2005 Leon Towns-von Stauber. All rights reserved. Trademark notices Apple®, Mac®, Macintosh®, Mac OS®, Finder™, Quartz™, Cocoa®, Carbon®, AppleScript®, Bonjour™, Panther™, Tiger™, and other terms are trademarks of Apple Computer. See <http://www.apple.com/legal/ appletmlist.html>. NeXT®, NeXTstep®, OpenStep®, and NetInfo® are trademarks of NeXT Software. See <http://www.apple.com/legal/nexttmlist.html>. Other trademarks are the property of their respective owners. X What Is It? 5 Answers Ancestry Operating System Products The Structure of Mac OS X X What Is It? Answers 6 It's an elephant I mean, it's like the elephant in the Chinese/Indian parable of the blind men, perceived as diferent things depending on the approach X What Is It? Answers 7 Inheritor of the Mac OS legacy Evolved GUI, Carbon (from Mac Toolbox), AppleScript, QuickTime, etc. The latest version of NeXTstep Mach, Quartz (from Display PostScript), Cocoa (from OpenStep), NetInfo, apps (Mail, Terminal, TextEdit, Preview, Interface Builder, Project Builder, etc.), bundles, faxing from Print panel, NetBoot, etc.
    [Show full text]
  • Polycom UC Software 5.4.3 Administrator Guide
    ADMINISTRATOR GUIDE UC Software 5.4.3 | March 2016 | 3725-49104-010A Polycom® UC Software 5.4.3 Copyright© 2016, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into another language or format, or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of Polycom, Inc. 6001 America Center Drive San Jose, CA 95002 USA Trademarks Polycom®, the Polycom logo and the names and marks associated with Polycom products are trademarks and/or service marks of Polycom, Inc. and are registered and/or common law marks in the United States and various other countries. All other trademarks are property of their respective owners. No portion hereof may be reproduced or transmitted in any form or by any means, for any purpose other than the recipient's personal use, without the express written permission of Polycom. Disclaimer While Polycom uses reasonable efforts to include accurate and up-to-date information in this document, Polycom makes no warranties or representations as to its accuracy. Polycom assumes no liability or responsibility for any typographical or other errors or omissions in the content of this document. Limitation of Liability Polycom and/or its respective suppliers make no representations about the suitability of the information contained in this document for any purpose. Information is provided "as is" without warranty of any kind and is subject to change without notice. The entire risk arising out of its use remains with the recipient. In no event shall Polycom and/or its respective suppliers be liable for any direct, consequential, incidental, special, punitive or other damages whatsoever (including without limitation, damages for loss of business profits, business interruption, or loss of business information), even if Polycom has been advised of the possibility of such damages.
    [Show full text]
  • Page 1 of 65 Chapter 6
    Chapter 6 - Windows 2000 DNS Page 1 of 65 Windows 2000 Server Chapter 6 - Windows 2000 DNS Microsoft® Windows® 2000 DNS is compliant with the standard Domain Name System (DNS) as described in the Request for Comments (RFC) documents of the Internet Engineering Task Force (IETF). DNS is the de facto naming system for Internet Protocol (IP)–based networks and the naming service that is used to locate computers on the Internet. Because Windows 2000 DNS is RFC- compliant, it interoperates with most of the other DNS server implementations, such as those DNS servers that use the Berkeley Internet Name Domain (BIND) software. This chapter describes the new features and enhancements of Windows 2000 DNS and explains how to set up and configure some of the features. For more information about DNS-related RFC standards that are supported by Windows 2000, see "Introduction to DNS" in this book. In This Chapter Introduction to the Windows 2000 Implementation of DNS Naming Hosts and Domains Windows 2000 Resolver Setting Up DNS for Active Directory Active Directory Integration and Multimaster Replication Dynamic Update and Secure Dynamic Update Aging and Scavenging of Stale Records Integration with WINS Interoperability with Other DNS Servers Internet Access Considerations Troubleshooting Related Information in the Resource Kit l For more information about TCP/IP, see "Introduction to TCP/IP" in this book. l For more information about the Windows Internet Name Service, see "Windows Internet Name Service" in this book. l For information about Domain Name System concepts, see "Introduction to DNS" in this book. l For more information about Active Directory, see "Active Directory Logical Structure" in Microsoft® Windows® 2000 Server Resource Kit Distributed Systems Guide.
    [Show full text]
  • Cerify Automated Video Content Verification System User Manual
    xx Cerify Automated Video Content Verification System ZZZ User Manual *P077035208* 077-0352-08 Cerify Automated Video Content Verification System ZZZ User Manual www.tektronix.com 077-0352-08 Copyright © Tektronix. All rights reserved. Licensed software products are owned by Tektronix or its subsidiaries or suppliers, and are protected by national copyright laws and international treaty provisions. Tektronix products are covered by U.S. and foreign patents, issued and pending. Information in this publication supersedes that in all previously published material. Specifications and price change privileges reserved. TEKTRONIX and TEK are registered trademarks of Tektronix, Inc. Cerify is trademark of Tektronix, Inc. This document supports software version 7.5 and above. Cerify Technical Support To obtain technical support for your Cerify system, send an e-mail to the following address: [email protected]. Contacting Tektronix Tektronix, Inc. 14150 SW Karl Braun Drive P.O. Box 500 Beaverton, OR 97077 USA For product information, sales, service, and technical support: In North America, call 1-800-833-9200. Worldwide, visit www.tektronix.com to find contacts in your area. Warranty Tektronix warrants that the media on which this software product is furnished and the encoding of the programs on the media will be free from defects in materials and workmanship for a period of three (3) months from the date of shipment. If any such medium or encoding proves defective during the warranty period, Tektronix will provide a replacement in exchange for the defective medium. Except as to the media on which this software product is furnished, this software product is provided “as is” without warranty of any kind, either express or implied.
    [Show full text]