Supervising the Network
Index
I-3
24
Disk space, checking for, 7-10
Diskette, client, making from CD-ROM,
15
DISPLAY login script command, using, 5-
24
Distribution list, explained, 2-22
DOS
installing on the network, 3-31
DOS in login scripts
allowing <Ctrl><Break>, 5-25
COMMAND.COM, specifying location
of, 5-22
directory, mapping search drive to, 5-43
DOS BREAK command, using, 5-25
DOS COPY command, verifying copies,
5-26
DOS VERIFY command, using, 5-26
environment variables, setting, 5-49
prompt, setting, 5-50
type, specifying, 5-60
version, specifying, 5-60
DOS SET login script command. See SET
login script command
DOS workstation. See also Workstation
accessing UnixWare side of server from,
3-17
environment variables for, setting in
login scripts, 5-49
environment variables, setting in login
scripts, 5-60
installing DOS workstation software, 19
non-IBM_PC, using PCCOMPATIBLE
in login scripts, 5-28, 5-47
running DOS from the network, 3-31
DRIVE login script command, using, 5-26
Drive mapping
creating, in login scripts, 5-38
deleting, in login scripts, 5-39
Directory Map object, explained, 2-22
to fake root, in login scripts, 5-39
in login scripts, examples, 5-43
to physical volume, in login scripts, 5-39
recommended order in login scripts, 5-
40
using with Directory Map object,
example, 5-42
with Directory Map object, 3-39
Drive, default, specifying in login scripts,
5-26
DS Repair utility
explained, 4-76
options, 4-77
DSMERGE utility
explained, 4-84
E
Effective rights
viewing, 3-61
viewing a trustee’s, with FILER, 3-62
viewing a trustee’s, with NetWare
Administrator, 3-61
Environment
variables (DOS and OS/2), setting in
login scripts, 5-49, 5-60
Environment variables
setting with LOGIN, 5-3
Error log
server, viewing, 7-30
Error log files
managing, 7-31
types of, 7-31
ERROR_LEVEL identifier variable,
explained, 5-61
ETC directory, explained, 3-22
EXEC menu command, explained, 6-16
Executable file
executing after stopping login script, 5-
27
executing from within login script, 5-19
EXIT login script command
using, 5-27
using on non-IBM computers, 5-28
Extended names file, 7-4
External entity, explained, 2-23
F
Fake root
mapping, in login scripts, 5-39
mapping, in login scripts, examples, 5-
44
FDISPLAY login script command, using,
5-29
File
access control modes, 3-9
copying, with FILER, 3-28
copying, with NetWare Administrator,
3-26
NetWare, where stored, 3-22
File Access Control
utilities for, 3-16, 3-17
File access control
modes, 3-9
using both NetWare and UnixWare, 3-
17
using neither NetWare nor UnixWare, 3-
10
using NetWare, 3-11
using UNIX, 3-13
File access control modes
None,NetWare,UNIX,Both, 3-10
File information
name space, viewing, 3-64
size, viewing, 3-64
viewing, with FILER, 3-65
viewing, with NDIR, 3-66
viewing, with NetWare Administrator,
3-64
File rights, explained, 2-4
File server. See NetWare server
File system rights. See Rights, file system
File systems
comparing UnixWare and NetWare, 7-5
configuring UnixWare to accommodate
NetWare, 7-6
management tools, 7-3
managing, 7-3
types, 7-3
File, and security. See also Rights, file
system
adding a trustee with FILER, 3-47
adding a trustee with NetWare
Administrator, 3-46
changing the owner of, with FILER, 3-
59
changing the owner of, with NetWare
Administrator, 3-58
deleting a trustee with FILER, 3-49
deleting a trustee with NetWare
Administrator, 3-49
FILE_SERVER identifier variable,
explained, 5-60
Files
access to, 3-9