1.\" $NetBSD: ypset.8,v 1.9 2008/04/30 13:11:03 martin Exp $ 2.\" 3.\" Copyright (c) 1996 The NetBSD Foundation, Inc. 4.\" All rights reserved. 5.\" 6.\" This code is derived from software contributed to The NetBSD Foundation 7.\" by Jason R. Thorpe. 8.\" 9.\" Redistribution and use in source and binary forms, with or without 10.\" modification, are permitted provided that the following conditions 11.\" are met: 12.\" 1. Redistributions of source code must retain the above copyright 13.\" notice, this list of conditions and the following disclaimer. 14.\" 2. Redistributions in binary form must reproduce the above copyright 15.\" notice, this list of conditions and the following disclaimer in the 16.\" documentation and/or other materials provided with the distribution. 17.\" 18.\" THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 19.\" ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 20.\" TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 21.\" PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 22.\" BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 23.\" CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 24.\" SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 25.\" INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 26.\" CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 27.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 28.\" POSSIBILITY OF SUCH DAMAGE. 29.\" 30.Dd February 26, 2005 31.Dt YPSET 8 32.Os 33.Sh NAME 34.Nm ypset 35.Nd tell 36.Xr ypbind 8 37which NIS server process to use 38.Sh SYNOPSIS 39.Nm 40.Op Fl h Ar host 41.Op Fl d Ar domain 42.Ar server 43.Sh DESCRIPTION 44.Nm 45tells the 46.Xr ypbind 8 47process on the current machine which 48.Tn NIS 49server process to communicate with. 50If 51.Ar server 52is down or is not running a 53.Tn NIS 54server process, it is not discovered until 55a 56.Tn NIS 57client process attempts to access a 58.Tn NIS 59map, at which time 60.Xr ypbind 8 61tests the binding and takes appropriate action. 62.Pp 63.Nm 64is most useful for binding a 65.Tn NIS 66client that is not on the same broadcast 67network as the closest 68.Tn NIS 69server, but can also be used for debugging 70a local network's 71.Tn NIS 72configuration, testing specific 73.Tn NIS 74client 75programs, or binding to a specific server when there are many servers on 76the local network supplying 77.Tn NIS 78maps. 79.Pp 80The options are as follows: 81.Bl -tag -width indent 82.It Fl h Ar host 83Set the 84.Tn NIS 85binding on 86.Ar host 87instead of the local machine. 88.It Fl d Ar domain 89Use the 90.Tn NIS 91domain 92.Ar domain 93instead of the default domain as returned by 94.Xr domainname 1 . 95.El 96.Sh SEE ALSO 97.Xr domainname 1 , 98.Xr ypcat 1 , 99.Xr ypmatch 1 , 100.Xr ypwhich 1 , 101.Xr nis 8 , 102.Xr ypbind 8 , 103.Xr yppoll 8 104.Sh AUTHORS 105.An Theo de Raadt 106