Title and Copyright Information
 
About This Manual
Audience
New and Changed Features
Organization
Related Documents
Reader's Comments
Conventions
 
1    Introduction to Sharing Software
1.1    What is Software Sharing?
1.2    Benefits of Sharing Software
1.3    Software Sharing Environment
 
2    RIS Servers and Clients
2.1    What is RIS?
2.2    Starting up RIS
2.3    RIS Area and Product Environments
2.4    RIS Client Characteristics
2.5    Registering Clients
 
3    Preparing the RIS Server
3.1    Reviewing RIS Server/Client Version Compatibility
3.2    Planning Disk Space for RIS
3.3    Installing the Operating System on the RIS Server
3.4    Setting Up a Local Area Network
3.5    Loading and Registering the Server Extensions License
3.6    Preparing RIS for C2 Security
 
4    Setting Up a RIS Area on the Server
4.1    Installing Software into a New RIS Area
4.2    Installing Software into an Existing RIS Area
4.3    Including Hardware Product Kits into a RIS Area
4.4    Using a RIS Area Mounted on NFS
4.5    Modifying the /etc/exports File
 
5    Booting a RIS Client
5.1    Remote Boot Files and Daemons
5.1.1    Internet Daemon and its Configuration File
5.1.2    The bootp Daemon (bootpd or joind)
5.1.3    The /etc/bootptab File
5.1.4    The tftpd Daemon
5.2    Remote Boot Flow
 
6    Managing RIS Clients and Environments
6.1    Preregistration Tasks
6.1.1    Obtaining Information About Each Client
6.1.2    Registering Client Host Names and IP Addresses with Servers
6.2    Adding a RIS Client with the ris Utility
6.3    Adding a RIS Client from the Command Line
6.4    Adding a Client to a RIS Area with a Hardware Product Kit
6.5    Modifying RIS Clients
6.6    Removing RIS Clients
6.7    Listing Registered RIS Clients
6.8    Listing Products in RIS Server Areas
6.9    Deleting Products from RIS Server Areas
6.10    Determining Profile Set Registration for RIS Clients
6.11    Removing a RIS Client from Profile Set Registration
6.12    Deleting Profile Sets from the RIS Server
 
7    Troubleshooting RIS
7.1    RIS Lock Files
7.2    Client Password Expiration
7.3    Root File System Mounting
7.4    RIS Client Registration
7.4.1    No Prompt for Client Hardware Address
7.4.2    Duplicate Client Hardware Addresses
7.4.3    Cloned Client Registration
7.4.4    Client Registered on Multiple RIS Servers
7.4.5    Client Not in RIS Database
7.5    RIS Server Response
7.5.1    Servers Using the bootp Daemon
7.5.2    Servers Using the joind Daemon
7.5.3    Loading an Incorrect Kernel File
 
8    Using RIS for Installation Cloning
8.1    Benefits of Installation Cloning
8.2    Using CDFs and User-Supplied Files
8.2.1    CDFs
8.2.2    User-Supplied Files
8.3    RIS Administrator Tasks
8.4    Copying Files to the RIS Server
8.5    Profile Sets
 
9    Dataless Management Services
9.1    What is the Dataless Management Services Environment?
9.2    Benefits of Dataless Management Services
9.3    Relationship Between DMS Servers and Clients
9.3.1    DMS Server
9.3.2    Environment Portion of DMS Area
9.3.3    Client Portion of DMS Area
9.3.4    Characteristics of DMS Clients
 
10    Preparing DMS Servers and Clients
10.1    Requirements for DMS Servers
10.2    Requirements for DMS Clients
10.3    Allocating Disk Partitions on the DMS Server
10.4    Setting Up a Local Area Network (LAN)
10.5    Setting Up a Network File System
10.6    Planning Disk Space for DMS
10.6.1    Disk Space Required for DMS Environments
10.6.2    Estimating Disk Space for Clients
10.6.3    Types of Kernel Builds
10.7    Installing the Operating System on the DMS Server
10.8    DMS Client Registration
10.8.1    Obtaining Information About Each DMS Client
10.8.2    Registering Clients' Host Names and IP Addresses with DMS Servers
10.9    Security Considerations
 
11    Creating DMS Environments on the DMS Server
11.1    Compatibility Between the DMS Server and the DMS Client
11.2    Installing Software in a New DMS Environment
11.3    Adding Software to an Existing DMS Environment
11.4    Installing a Hardware Update Release into a DMS Environment
11.5    Configuring DMS Environments
11.5.1    Customizing .proto.. Files
11.5.2    Configuring the DMS Environment
11.6    Setting Up a Worldwide DMS Server
11.6.1    DMS Server Setup
11.6.2    Worldwide Client Setup
11.6.3    Building an Asian Kernel for DMS Clients
 
12    Managing DMS Clients and Environments
12.1    DMS Client Database File
12.2    Adding a DMS Client
12.3    Booting a DMS Client
12.4    Deleting a Software Environment
12.5    Modifying Client Information
12.6    Removing a Client
12.7    Listing DMS Clients
12.8    Showing Software Environments
12.9    Maintaining the DMS Environment
12.9.1    Controlling Root File System Growth
12.9.2    Listing Installed Software Subsets
12.9.3    Removing Subsets
 
13    DMS Troubleshooting
13.1    Server Areas to Check for Client Booting Problems
 
A    RIS Worksheet
 
B    DMS Worksheets
 
C    Using the utilupdate Utility
 
Glossary
 
Examples
5-1    Sample /etc/bootptab File
7-1    Sample daemon.log File
 
Figures
2-1    RIS Server and Client
2-2    Sample RIS Area Overview
3-1    System Compatibility
8-1    Summary of Administrator Tasks
9-1    File Sharing Between the DMS Server and Client
9-2    Environment Portion of DMS Area
9-3    DMS Client Area
9-4    Client Views of the DMS Area
 
Tables
5-1    Remote Boot Files and Daemons
10-1    Estimated Version 4.0F Subset Sizes for DMS
11-1    List of .proto.. Files in /etc
 
Index