Online Book Reader

Home Category

Managing NFS and NIS, 2nd Edition - Mike Eisler [2]

By Root 313 0

12.5. Stronger security for NFS

12.5.1. Security services

12.5.2. Brief introduction to cryptography

12.5.3. NFS and IPSec

12.5.4. AUTH_DH: Diffie-Hellman authentication

12.5.5. RPCSEC_GSS: Generic security services for RPC

12.5.6. Planning a transition from NFS/sys to stronger NFS security

12.5.7. NFS security futures

12.6. Viruses

13. Network Diagnostic and Administrative Tools

13.1. Broadcast addresses

13.2. MAC and IP layer tools

13.2.1. ifconfig: interface configuration

13.2.2. Subnetwork masks

13.2.3. IP to MAC address mappings

13.2.4. Using ping to check network connectivity

13.2.5. Gauging Ethernet interface capacity

13.3. Remote procedure call tools

13.3.1. RPC mechanics

13.3.2. RPC registration

13.3.3. Debugging RPC problems

13.4. NIS tools

13.4.1. Key lookup

13.4.2. Displaying and analyzing client bindings

13.4.3. Other NIS map information

13.4.4. Setting initial client bindings

13.4.5. Modifying client bindings

13.5. Network analyzers

13.5.1. snoop

13.5.2. ethereal / tethereal

13.5.3. Capture filters

13.5.4. Read filters

14. NFS Diagnostic Tools

14.1. NFS administration tools

14.2. NFS statistics

14.2.1. I/O statistics

14.3. snoop

14.3.1. Useful filters

14.4. Publicly available diagnostics

14.4.1. ethereal / tethereal

14.4.2. Useful filters

14.4.3. NFSWATCH

14.4.4. nfsbug

14.4.5. SATAN

14.5. Version 2 and Version 3 differences

14.6. NFS server logging

14.6.1. NFS server logging mechanics

14.6.2. Enabling NFS server logging

14.6.3. NFS server logging configuration

14.6.4. The nfslogd daemon

14.6.5. Filehandle to path mapping

14.6.6. NFS log cycling

14.6.7. Manipulating NFS log files

14.6.8. Other configuration parameters

14.6.9. Disabling NFS server logging

14.7. Time synchronization

15. Debugging Network Problems

15.1. Duplicate ARP replies

15.2. Renegade NIS server

15.3. Boot parameter confusion

15.4. Incorrect directory content caching

15.5. Incorrect mount point permissions

15.6. Asynchronous NFS error messages

16. Server-Side Performance Tuning

16.1. Characterization of NFS behavior

16.2. Measuring performance

16.3. Benchmarking

16.4. Identifying NFS performance bottlenecks

16.4.1. Problem areas

16.4.2. Throughput

16.4.3. Locating bottlenecks

16.5. Server tuning

16.5.1. CPU loading

16.5.2. NFS server threads

16.5.3. Memory usage

16.5.4. Disk and filesystem throughput

16.5.5. Kernel configuration

16.5.6. Cross-mounting filesystems

16.5.7. Multihomed servers

17. Network Performance Analysis

17.1. Network congestion and network interfaces

17.1.1. Local network interface

17.1.2. Collisions and network saturation

17.2. Network partitioning hardware

17.3. Network infrastructure

17.3.1. Switched networks

17.3.2. ATM and FDDI networks

17.4. Impact of partitioning

17.4.1. NIS in a partitioned network

17.4.2. Effects on diskless nodes

17.5. Protocol filtering

18. Client-Side Performance Tuning

18.1. Slow server compensation

18.1.1. Identifying NFS retransmissions

18.1.2. Timeout period calculation

18.1.3. Retransmission rate thresholds

18.1.4. NFS over TCP is your friend

18.2. Soft mount issues

18.3. Adjusting for network reliability problems

18.4. NFS over wide-area networks

18.5. NFS async thread tuning

18.6. Attribute caching

18.7. Mount point constructions

18.8. Stale filehandles

A. IP Packet Routing

A.1. Routers and their routing tables

A.2. Static routing

B. NFS Problem Diagnosis

B.1. NFS server problems

B.2. NFS client problems

B.3. NFS errno values

C. Tunable Parameters

Managing NFS and NIS, 2nd Edition

Mike Eisler

Ricardo Labiaga

Hal Stern

Editor

Mike Loukides

Copyright

Return Main Page Previous Page Next Page

®Online Book Reader