Using HP-UX Internet Services (February 2007)

Enabling Standard UNIX Authentication on rexecd and remshd Services........................25
Enabling DCE Integrated Logging Authentication.........................................................26
Using remshd in a Secure Internet Services Environment...............................................26
Creating the distfile................................................................................................................26
Variable Definitions..........................................................................................................27
File Distribution Commands.............................................................................................28
Command to List Changed Files........................................................................................30
Starting rdist..........................................................................................................................31
Example Output on the Master Host..................................................................................32
Troubleshooting rdist.............................................................................................................33
6 Executing Commands with remsh...............................................................................................35
Enabling remsh......................................................................................................................35
Using remsh..........................................................................................................................35
The remsh Command Examples........................................................................................35
7 Listing Hosts with ruptime..........................................................................................................37
Using ruptime.......................................................................................................................37
ruptime Examples..................................................................................................................37
8 Listing Users with rwho..............................................................................................................39
Using rwho...........................................................................................................................39
rwho Examples......................................................................................................................39
9 Secure Internet Services.............................................................................................................41
Using the Secure Internet Services...........................................................................................41
Index..........................................................................................................................................43
4 Table of Contents