2 Part V. Technical Background
5 -------------------------------------------------------------------------------
8 Part V. Technical Background
12 How Amanda really works ...
14 This section contains some papers which describe the technical concepts behind
15 Amanda. You find descriptions of the various APIs as well as a basic draft of
16 the internals of Amanda.
20 22._How_Amanda_uses_UDP_and_TCP_ports
25 User_TCP_port_range_(--with-tcpportrange)_summary
29 User_UDP_port_range_(--with-udpportrange)_summary
47 The_`selfcheck'_command
49 The_`estimate'_and_`estimate-parse'_commands
51 The_`backup'_and_`backup-parse'_commands
53 The_`index-from-output'_and_`index-from-image'_commands
57 The_`print-command'_command
67 server_and_amandad_on_client
73 taper(read)_and_taper(write)
122 26._Amanda_Security_API
132 protocol_packet_transmission_functions
188 28._Using_Kerberos_with_Amanda
191 Amanda_2.5.0_-_KERBEROS_v4_SUPPORT_NOTES
201 Amanda_2.5.0_-_KERBEROS_v5_SUPPORT_NOTES
210 Destination_Host_Permissions_file
214 -------------------------------------------------------------------------------
217 Chapter 21. Amanda WISHLIST Home Chapter 22. How Amanda uses UDP and TCP