O'Reilly logo

Solaris™ Operating Environment Boot Camp by Dominic Butler, David Rhodes

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Access Lists

Access lists allow us to group machines together when specifying share options. In fact, we've just shown the most common method of using them: a list of individual host names, similar to that shown below:

server# share -F nfs -o ro=helium:lithium /file/to/share
server#

An access list can be formatted in a number of other ways. These are shown in the table below. Any of the types in Table 18.5 can be used, so long as the list is colon-separated.

Table 18.5. Access List Types
TypeUsed ForExample
Host nameList of individual hostslithium
NetgroupName of an NIS netgroup mapsome_machines
NetworkNetwork name or IP address, identified by an “@”@192.168.22
DNSMachines in a specific domain, identified by a “.”.sun.com
(Deny access)Deny access ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required