Supervising the Network

I-4
Index
changing the owner, 3-58
copying, 3-24
copying or moving, with FILER, 3-28
moving or copying, with NetWare
Administrator, 3-26
number allowed, 3-19
purging, 3-19
setting up, 3-19
viewing information about, 3-64
word-processed, displaying during
login, 5-29
Filter. See Inherited Rights Filter
FIRE PHASERS login script command,
using, 5-30
FLAG utility
to assign rights, 3-38
Formula
accounting charge rates, 7-34
FSType, 7-3
FULL_NAME identifier variable,
explained, 5-59
G
GETP menu command, variables, 6-20
GETx menu command, using, 6-20
GID
file access control, 3-13
matching, 3-14
nwgroup, 3-14
values for hybrid user, 3-6
GOTO login script command, using, 5-31
GREETING_TIME identifier variable,
explained, 5-59
Group object
explained, 2-23
managing User objects as a Group, 2-33
specifying in login scripts, 5-59
H
Hard disks
adding to a NetWare server, 7-10
Hardware requirements, vi
host locking, enable, 3-19
HOUR identifier variable, explained, 5-59
HOUR24 identifier variable, explained, 5-
59
Hybrid parameters, 3-12, 3-16
Hybrid user, 3-3
explained, 3-5
setting up, 3-6
Hybrid variables, 3-16
I
IBM computer. See also Non-IBM
computer; Workstation
compatible with, specifying in login
scripts, 5-47
long name, specifying in login scripts, 5-
37, 5-60
short name, specifying in login scripts,
5-60
Identifier variables
%n, explained, 5-62
%n, shifting LOGIN parameters with
SHIFT, 5-52
conventions in login scripts, 5-10
displaying value during login, with
WRITE, 5-56
examples, 5-62
listed, 5-59
using, 5-61
using with IF…THEN, 5-32
IF…THEN login script command
using, 5-32
using with identifier variables, 5-32, 5-
61
Importing user information with
UIMPORT, 4-50
INCLUDE login script command, using,
5-35
Inherited Rights Filter (IRF)
viewing and modifying, with FILER, 3-
54
viewing and modifying, with NetWare
Administrator, 3-53
Inherited Rights Filter, explained, 2-3
Installation
checklist, v
Directory Services, v, 9
Installing
applications on the network, 3-31
DOS workstation software, 19
NETADMIN on a DOS workstation, 20
NetWare Administrator on a Windows
workstation, 17
network applications, guidelines for, 3-
36
Windows on the network, 3-33
Windows workstation software, 17
Intruder Detection property
changing, with NETADMIN, 2-78
changing, with NetWare Administrator,
2-75
IPX
addresses, 7-13
auto-discovery, how to use, 7-16
configuration, automatic, 7-16
explained, 7-12
overview of, 7-12
IRF, explained, 2-3
IRF. See Inherited Rights Filter
ITEM command options
BATCH, explained, 6-13
CHDIR, explained, 6-14
listed, 6-13
PAUSE, explained, 6-14
SHOW, explained, 6-14
L
LAST_NAME identifier variable,
explained, 5-59
LASTLOGINTIME login script
command, using, 5-37
Leaf objects
changing property values, with
NETADMIN, 2-77
changing property values, with NetWare
Administrator, 2-74
creating searchable, 2-29
creating, using NETADMIN, 2-31
creating,using NetWare Administrator,
2-30
deleting with NETADMIN, 2-68
deleting with NetWare Administrator, 2-
67
explained, 2-20
listed, 2-20
mandatory fields when creating, 2-30
naming rules, 2-27
Leaf objects, moving, 2-57
Leaf objects,moving, 2-60
LOAD menu command, explained, 6-17
Loading
network applications, guidelines for, 3-