Deleted Added
full compact
5.t (1639) 5.t (215334)
1.\" Copyright (c) 1980, 1986, 1988, 1993 The Regents of the University of California.
2.\" All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 16 unchanged lines hidden (view full) ---

25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" @(#)5.t 8.1 (Berkeley) 7/27/93
1.\" Copyright (c) 1980, 1986, 1988, 1993 The Regents of the University of California.
2.\" All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 16 unchanged lines hidden (view full) ---

25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" @(#)5.t 8.1 (Berkeley) 7/27/93
33.\" $FreeBSD: head/share/doc/smm/01.setup/5.t 215334 2010-11-15 05:25:51Z dougb $
33.\"
34.ds lq ``
35.ds rq ''
36.ds LH "Installing/Operating \*(4B
37.ds RH Network setup
38.ds CF \*(Dy
39.Sh 1 "Network setup"
40.PP

--- 65 unchanged lines hidden (view full) ---

106.PP
107The OSI equivalent to ARP is ESIS (End System to Intermediate System Routing
108Protocol); running this protocol is mandatory, however one can manually add
109translations for machines that do not participate by use of the
110.Xr route (8)
111command.
112Additional information is provided in the manual page describing
113.Xr ESIS (4).
34.\"
35.ds lq ``
36.ds rq ''
37.ds LH "Installing/Operating \*(4B
38.ds RH Network setup
39.ds CF \*(Dy
40.Sh 1 "Network setup"
41.PP

--- 65 unchanged lines hidden (view full) ---

107.PP
108The OSI equivalent to ARP is ESIS (End System to Intermediate System Routing
109Protocol); running this protocol is mandatory, however one can manually add
110translations for machines that do not participate by use of the
111.Xr route (8)
112command.
113Additional information is provided in the manual page describing
114.Xr ESIS (4).
114.PP
115To use the pseudo terminals just configured, device
116entries must be created in the
117.Pn /dev
118directory. To create 32
119pseudo terminals (plenty, unless you have a heavy network load)
120execute the following commands.
121.DS
122\fB#\fP \fIcd /dev\fP
123\fB#\fP \fIMAKEDEV pty0 pty1\fP
124.DE
125More pseudo terminals may be made by specifying
126.Pn pty2 ,
127.Pn pty3 ,
128etc. The kernel normally includes support for 32 pseudo terminals
129unless the configuration file specifies a different number.
130Each pseudo terminal really consists of two files in
131.Pn /dev :
132a master and a slave. The master pseudo terminal file is named
133.Pn /dev/ptyp? ,
134while the slave side is
135.Pn /dev/ttyp? .
136Pseudo terminals are also used by several programs not related to the network.
137In addition to creating the pseudo terminals,
138be sure to install them in the
139.Pn /etc/ttys
140file (with a `none' in the second column so no
141.Xr getty
142is started).
143.Sh 2 "Local subnets"
144.PP
145In \*(4B the Internet support
146includes the notion of ``subnets''. This is a mechanism
147by which multiple local networks may appears as a single Internet
148network to off-site hosts. Subnetworks are useful because
149they allow a site to hide their local topology, requiring only a single
150route in external gateways;

--- 436 unchanged lines hidden ---
115.Sh 2 "Local subnets"
116.PP
117In \*(4B the Internet support
118includes the notion of ``subnets''. This is a mechanism
119by which multiple local networks may appears as a single Internet
120network to off-site hosts. Subnetworks are useful because
121they allow a site to hide their local topology, requiring only a single
122route in external gateways;

--- 436 unchanged lines hidden ---