UNIX System Administration Handbook - Evi Nemeth [4]
Connecting and expanding Ethernets
FDDI: the disappointing and expensive LAN
ATM: the promised (but sorely defeated) LAN
Frame relay: the sacrificial WAN
ISDN: the indigenous WAN
DSL: the people’s WAN
Where is the network going?
Network testing and debugging
Building wiring
UTP cabling options
Connections to offices
Wiring standards
Network design issues
Network architecture vs. building architecture
Existing networks
Expansion
Congestion
Maintenance and documentation
Management issues
Recommended vendors
Cables and connectors
Test equipment
Routers/switches
Recommended reading
CHAPTER 16 THE DOMAIN NAME SYSTEM
DNS for the impatient: adding a new machine
The history of DNS
Who needs DNS?
What’s new in DNS
The DNS namespace
Masters of their domains
Selecting a domain name
Domain bloat
Registering a second-level domain name
Creating your own subdomains
The BIND software
Versions of BIND
Finding out what version you have
Components of BIND
named: the BIND name server
Authoritative and caching-only servers
Recursive and nonrecursive servers
The resolver library
Shell interfaces to DNS
How DNS works
Delegation
Caching and efficiency
The extended DNS protocol
BIND client issues
Resolver configuration
Resolver testing
Impact on the rest of the system
BIND server configuration
Hardware requirements
named startup
Configuration files
The include statement
The options statement
The acl statement
The server statement
The logging statement
The zone statement
The key statement
The trusted-keys statement
The controls statement
The view statement
BIND configuration examples
A home Linux box
A university department
A web hosting company
The DNS database
Resource records
The SOA record
NS records
A records
PTR records
MX records
CNAME records
The CNAME hack
LOC records
SRV records
TXT records
IPv6 resource records
A6 records
DNAME records
Commands in zone files
The localhost zone
Glue records: links between zones
Updating zone files
Zone transfers
Dynamic updates
Security issues
Access control lists revisited
Confining named
Secure server-to-server communication with TSIG and TKEY
DNSSEC
Microsoft bad, UNIX good
Testing and debugging
Logging
Debug levels
Debugging with ndc
Debugging with nslookup, dig, and host
Lame delegations
Loose ends
The hints file
Localhost configuration
Host management tools
DNS for systems not on the Internet
Vendor specifics
Specifics for Solaris
Specifics for HP-UX
Specifics for Red Hat Linux
Specifics for FreeBSD
Recommended reading
Mailing lists and newsgroups
Books and other documentation
On-line resources
The RFCs
CHAPTER 17 THE NETWORK FILE SYSTEM
General information about NFS
NFS protocol versions
Choice of transport
WebNFS
File locking
Disk quotas
Global UIDs and GIDs
Root access and the nobody account
Cookies and stateless mounting
Naming conventions for shared filesystems
Security and NFS
Server-side NFS
The share command and dfstab file (Solaris)
The exportfs command and the exports file (HP-UX, Red Hat, FreeBSD)
nfsd: serve files
Client-side NFS
biod and nfsiod: provide client-side caching
Mounting remote filesystems
Secure port restrictions
nfsstat: dump NFS statistics
Dedicated NFS file servers
Automatic mounting
automount: the original automounter
Indirect maps
Direct maps
Master maps
Executable maps
Replicated filesystems using automount
Automatic automounts
Specifics for Red Hat Linux
amd: a more sophisticated automounter
amd maps
Starting amd
Stopping amd
Recommended reading
CHAPTER 18 SHARING SYSTEM FILES
What to share
Copying files around
rdist: push files
rsync: push files more securely
expect: pull files
NIS: the