With both NFS and NIS setup, from any computer in a network you may "access" any other computer on that network so long as you have authentication. Furthermore, you may still access the filesystem to which the network is accessing along with the files associated with the computer you are logged into.
$ vi
with a tailing image implies
to created/edit the file to mirror the image>
$ vi /etc/exports
$ exports -a
$ vi /etc/hosts.allow
/etc/init.d/nfs start
$ chkconfig nfs on
/etc/init.d/portmap start
$ mount 10.0.0.1:/home /home
$ mount 10.0.0.1:/import /import
$ vi /etc/fstab
$ mount -a
$ chkconfig nfs on
$ showmount -e 10.0.0.1
to view that the server exports are
correct
$ df
and create a file in the mounted directory to ensure
the mounts are working correctly
$ df
again
/etc/fstab
to be "soft,timeo=5" and remount the 2 NFS
partitions
$ ifdown eth1
- and run $ df
and $ ls -l /import
$ ifup eth1
- and run the commands
$ df
and $ ls -l /import
again.
/etc/fstab
file.$ vi /etc/auto.master
$ echo "* -soft,timeo=5 10.0.0.1:/home/&" > /etc/auto.home
$ echo "* -soft,timeo=5 10.0.0.1:/import/&" > /etc/auto.import
$ chkconfig automount on
$ yum install ypserv
$ ypdomainname linux.is.better
$ /etc/init.d/ypserv start
$ /usr/lib/yp/ypinit -m
$ echo "domain linux.is.better server 10.0.0.1" > /etc/yp.conf
$ /etc/init.d/ypbind start
$ ps auxw | grep yp
$ ypwhich
$ ypcat ypservers
$ ypcat passwd
$ ypcat group
$ chkconfig ypserv on
$ chkconfig ypbind on
$ chkconfig yppasswdd on
$ chkconfig nis on
$ yum install ypserv
$ ypdomainname linux.is.better
$ echo "domain linux.is.better server 10.0.0.1" > /etc/yp.conf
/etc/init.d/ypbind start
/etc/nsswitch.conf
$ ypwhich
$ ypcat passwd
$ echo "NISDOMAIN=linux.is.better" >> /etc/sysconfig/network
$ chkconfig ypbind on
$ chkconfig nis on
$ useradd user1
$ passwd user1
$ cd /var/yp
$ make
ssh user1@linux.is.better
/home
and /import
directories on the Router Vm from the Host VM. You
have essentially set up a miniturized system of what UCR uses to network its
computers in the Engineering Department.
Sun licenses this technology to virtually all other Unix vendors. As the name "Yellow Pages" was a registered trademark in the United Kingdom of British Telecom PLC for their (paper) commercial telephone directory, Sun changed the name of their system to NIS, though all the commands and functions still start with "yp".
NIS/YP is used for maintenance and distribution of a central directory of user and group information, hostnames, e-mail aliases and other text-based tables of information in a computer network. For example, in a common UNIX environment, the list of users for identification is placed in /etc/passwd, and secret authentication hashes in /etc/shadow. NIS adds another "global" user list which is used for identifying users on any client of the NIS domain." (source: www.wikipedia.org)
A directory is a set of objects with similar attributes organized in a logical and hierarchical manner. The most common example is the telephone directory, which consists of a series of names (either of persons or organizations) organized alphabetically, with each name having an address and phone number attached. Due to this basic design (among other factors) LDAP is often used by other services for authentication, despite the security problems this causes.
An LDAP directory tree often reflects various political, geographic, and/or organizational boundaries, depending on the model chosen. LDAP deployments today tend to use Domain name system (DNS) names for structuring the topmost levels of the hierarchy. Deeper inside the directory might appear entries representing people, organizational units, printers, documents, groups of people or anything else that represents a given tree entry (or multiple entries)." (source: www.wikipedia.org)
The "hard, intr" retries indefinitely if the operation fails.
NIS: NIS is used for maintenance and distribution of a central directory
and group information, hostnames, e-mail aliases and other text-based tables of
information in a computer network. This can be configured to serve password
data to authenticate users.