Solved

Secondary DNS and NIS on aix 4.2

Posted on 1997-05-08
3
467 Views
Last Modified: 2013-12-23

Hello,

I am trying to configure a secondary DNS and NIS on my platform with
aix 4.2 and having some difficulties.

0
Comment
Question by:jluc
3 Comments
 

Expert Comment

by:jbirtley
ID: 1582065
Can you be more specific about the difficulties you are having?  What error messages have you got for instance?
0
 
LVL 1

Expert Comment

by:sherwood
ID: 1582066
Questions:
      1.  Do you know your NIS domain name?
      2.  Is there a NIS master server on the same subnet
as the machine you want to set up secondary service on?
      3.  Are you comfortable with compiling code? (It
may be easier to set up DNS using a standard PD version of
named.)
      4.  Do you have root access to this machine.

0
 
LVL 2

Accepted Solution

by:
df020797 earned 100 total points
ID: 1582067
To setup a secondary nameserver:

Make sure that in the primary nameserver the secondary nameserver is listed with a NS record. In the named.boot file of the secondary nameserver make sure all entries supposed to be a secondary entry its formatted like this:
SECONDARY <TAB> domain-to-secondaire <TAB> IP-to-prim-of-thedomain <TAB> filename-to-save-info-in

Secondary NIS:
Setup a ypserv on it and then:
cd /var/yp
mkdir ypdomainname
ypwhich -m | awk '{print $1}' > /tmp/Mapfile
for map in `cat /tmp/Mapfile`; do
ypfxr -c $map
done

On the master, cd /var/yp/ypdomainname
ypcat -k ypservers > TMP
echo nameofnewslave >> TMP
makedbm TMP ypservers
yppush ypservers
rm TMP

Tahts shopud do the trick.
Dont forget to check so you yp clients has both ypservers listed in their /etc/hosts.


0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now