HP-UX Remote Access Services Administrator's Guide

Table of Contents
About This Document...................................................................................................................13
New and Changed Information in This Edition........................................................................13
Intended Audience................................................................................................................13
HP-UX Release Name and Release Identifier...........................................................................13
Publishing History.................................................................................................................14
Document Organization.........................................................................................................14
Related Information...............................................................................................................14
Typographical Conventions....................................................................................................15
HP Welcomes Your Comments...............................................................................................16
1 Remote Access Services Overview..............................................................................................17
R-Commands........................................................................................................................17
The rlogin Command........................................................................................................18
Non-Secure Environment Authentication.....................................................................18
Secure Environment Authentication.............................................................................19
Kerberos-Specific Options............................................................................................19
The rlogind Program........................................................................................................19
Starting rlogind...........................................................................................................19
The remsh and rexec Commands.......................................................................................20
Authentication in a Non-Secure Environment...............................................................21
Authentication in a Secure Environment.......................................................................21
Kerberos-Specific Options............................................................................................22
The rexec Command....................................................................................................22
The rcp Command............................................................................................................22
The rcp Command Options and Arguments..................................................................23
The rdist Command..........................................................................................................24
The rdist Command Options........................................................................................25
The ruptime Command.....................................................................................................26
Sorting Order Options.................................................................................................26
The rwho Command.........................................................................................................27
The rwhod Program.........................................................................................................27
The telnet Program................................................................................................................28
Kerberos-Specific Options.................................................................................................29
The telnetd Program ........................................................................................................29
Starting telnetd...........................................................................................................30
Kerberos-Specific Option.............................................................................................30
FTP Overview........................................................................................................................31
2 Configuring FTP........................................................................................................................33
Table of Contents 3