Software Distributor Administration Guide (March 2009)

Table Of Contents
7.4 Remote Operations Tutorial........................................................................................158
7.4.1 Tutorial Set-Up....................................................................................................158
7.4.2 How to Perform a Single-Target Installation......................................................159
7.5 Remote Interactive swlist............................................................................................167
7.6 Remote Operations from the Command Line.............................................................167
7.6.1 Target Selections..................................................................................................168
7.6.1.1 Syntax..........................................................................................................168
7.6.1.2 Target Files..................................................................................................168
7.6.2 Examples.............................................................................................................168
7.6.2.1 swacl............................................................................................................168
7.6.2.2 swask...........................................................................................................169
7.6.2.3 swconfig......................................................................................................169
7.6.2.4 swcopy.........................................................................................................169
7.6.2.5 swinstall......................................................................................................169
7.6.2.6 swjob............................................................................................................169
7.6.2.7 swlist............................................................................................................169
7.6.2.8 swreg...........................................................................................................169
7.6.2.9 swremove....................................................................................................169
7.6.2.10 swverify.....................................................................................................170
8 Reliability and Performance ....................................................................................................171
8.1 Overview ....................................................................................................................171
8.2 Groups and Source Options........................................................................................172
8.3 Large Numbers of Targets...........................................................................................173
8.4 Timeout Options .........................................................................................................173
8.5 Retry RPC and Retry Interval......................................................................................173
8.6 Retry Command..........................................................................................................174
8.7 Database Checkpointing ............................................................................................175
8.8 Compression ...............................................................................................................175
8.8.1 INDEX and INFO Compression..........................................................................176
8.9 Staging ........................................................................................................................176
8.10 Recovery (Install Only) .............................................................................................178
8.11 Installation With Separate Configuration.................................................................179
8.12 Multiple Versions ......................................................................................................179
9 SD-UX Security ......................................................................................................................183
9.1 Overview.....................................................................................................................183
9.1.1 Default Security...................................................................................................183
9.1.2 Depots and Depot Registration...........................................................................184
9.1.3 Modifying Target Systems...................................................................................184
9.2 The swacl Command ..................................................................................................184
9.2.1 swacl Output.......................................................................................................186
9.3 Basic Security Tasks ....................................................................................................187
8 Table of Contents