<div class="synopsis">
B<bosserver> [B<-noauth>] [B<-log>] [B<-enable_peer_stats>]
- [B<-enable_process_stats>] [B<-allow-dotted-principal>] [B<-help>]
+ [B<-enable_process_stats>] [B<-allow-dotted-principals>] [B<-help>]
=for html
</div>
other machines. To display or otherwise access the records, use the Rx
Monitoring API.
-=item B<-allow-dotted-principal>
+=item B<-allow-dotted-principals>
By default, the RXKAD security layer will disallow access by Kerberos
principals with a dot in the first component of their name. This is to avoid
S<<< [B<-busyat> <I<< redirect clients when queue > n >>>] >>>
[B<-nobusy>] S<<< [B<-rxpck> <I<number of rx extra packets>>] >>>
[B<-rxdbg>] [B<-rxdbge>] S<<< [B<-rxmaxmtu> <I<bytes>>] >>>
- [B<-allow-dotted-principal>] [B<-jumbo>] [B<-nojumbo>]
+ [B<-allow-dotted-principals>] [B<-jumbo>] [B<-nojumbo>]
S<<< [B<-rxbind> <I<address to bind the Rx socket to>>] >>>
S<<< [B<-vattachpar> <I<number of volume attach threads>>] >>>
S<<< [B<-m> <I<min percentage spare in partition>>] >>>
Writes a trace of the File Server's operations on Rx events (such as
retransmissions) to the file F</usr/afs/logs/rx_dbg>.
-=item B<-allow-dotted-principal>
+=item B<-allow-dotted-principals>
By default, the RXKAD security layer will disallow access by Kerberos
principals with a dot in the first component of their name. This is to avoid
[B<-rebuildDB>] S<<< [B<-groupdepth> <I<# of nested groups>>] >>>
S<<< [B<-default_access> <I<user access mask>> <I<group access mask>>] >>>
[B<-restricted>] [B<-enable_peer_stats>]
- [B<-enable_process_stats>] [B<-allow-dotted-principal>]
+ [B<-enable_process_stats>] [B<-allow-dotted-principals>]
S<<< [B<-auditlog> <I<file path>>] >>>
S<<< [B<-syslog>[=<I<FACILITY>>]] >>> S<<< [B<-rxmaxmtu> <I<bytes>>] >>>
[B<-help>]
other machines. To display or otherwise access the records, use the Rx
Monitoring API.
-=item B<-allow-dotted-principal>
+=item B<-allow-dotted-principals>
By default, the RXKAD security layer will disallow access by Kerberos
principals with a dot in the first component of their name. This is to
<div class="synopsis">
B<vlserver> S<<< [B<-p> <I<lwp processes>>] >>> [B<-nojumbo>] [B<-jumbo>] S<<< [B<-d> <I<debug level>>] >>>
- [B<-allow-dotted-principal>] [B<-enable_peer_stats>] [B<-enable_process_stats>]
+ [B<-allow-dotted-principals>] [B<-enable_peer_stats>] [B<-enable_process_stats>]
[B<-help>]
=for html
other machines. To display or otherwise access the records, use the Rx
Monitoring API.
-=item B<-allow-dotted-principal>
+=item B<-allow-dotted-principals>
By default, the RXKAD security layer will disallow access by Kerberos
principals with a dot in the first component of their name. This is to avoid
S<<< [B<-d> <I<debug level>>] >>>
[B<-nojumbo>] [B<-jumbo>]
[B<-enable_peer_stats>] [B<-enable_process_stats>]
- [B<-allow-dotted-principal>] [B<-help>]
+ [B<-allow-dotted-principals>] [B<-help>]
=for html
</div>
other machines. To display or otherwise access the records, use the Rx
Monitoring API.
-=item B<-allow-dotted-principal>
+=item B<-allow-dotted-principals>
By default, the RXKAD security layer will disallow access by Kerberos
principals with a dot in the first component of their name. This is to avoid