1.\" 2.\" Copyright (c) 1994 Jason R. Thorpe 3.\" All rights reserved. 4.\" 5.\" Redistribution and use in source and binary forms, with or without 6.\" modification, are permitted provided that the following conditions 7.\" are met: 8.\" 1. Redistributions of source code must retain the above copyright 9.\" notice, this list of conditions and the following disclaimer. 10.\" 2. Redistributions in binary form must reproduce the above copyright 11.\" notice, this list of conditions and the following disclaimer in the 12.\" documentation and/or other materials provided with the distribution. 13.\" 3. All advertising materials mentioning features or use of this software 14.\" must display the following acknowledgement: 15.\" This product includes software developed by Jason Thorpe. 16.\" 4. Neither the name of the author nor the names of its contributors 17.\" may be used to endorse or promote products derived from this software 18.\" without specific prior written permission. 19.\" 20.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND 21.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE 24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" 32.Dd September 3, 2015 33.Dt YPSET 8 34.Os 35.Sh NAME 36.Nm ypset 37.Nd tell 38.Xr ypbind 8 39which NIS server process to use 40.Sh SYNOPSIS 41.Nm 42.Op Fl h Ar host 43.Op Fl d Ar domain 44.Ar server 45.Sh DESCRIPTION 46The 47.Nm 48utility tells the 49.Xr ypbind 8 50process on the current machine which NIS server process to communicate with. 51If 52.Ar server 53is down or is not running a NIS server process, it is not discovered until 54a NIS client process attempts to access a NIS map, at which time 55.Xr ypbind 8 56tests the binding and takes appropriate action. 57.Pp 58The 59.Nm 60utility 61is most useful for binding a NIS client that is not on the same broadcast 62network as the closest NIS server, but can also be used for debugging 63a local network's NIS configuration, testing specific NIS client 64programs, or binding to a specific server when there are many servers on 65the local network supplying NIS maps. 66.Pp 67The options are as follows: 68.Bl -tag -width indent 69.It Fl d Ar domain 70Use the NIS domain 71.Ar domain 72instead of the default domain as returned by 73.Xr domainname 1 . 74.It Fl h Ar host 75Set the NIS binding on 76.Ar host 77instead of the local machine. 78.El 79.Sh SEE ALSO 80.Xr domainname 1 , 81.Xr ypcat 1 , 82.Xr ypmatch 1 , 83.Xr yp 8 , 84.Xr ypbind 8 85.Sh AUTHORS 86.An Theo De Raadt 87