Online Book Reader

Home Category

UNIX System Administration Handbook - Evi Nemeth [4]

By Root 2642 0
twisted pair

Connecting and expanding Ethernets

FDDI: the disappointing and expensive LAN

ATM: the promised (but sorely defeated) LAN

Frame relay: the sacrificial WAN

ISDN: the indigenous WAN

DSL: the people’s WAN

Where is the network going?

Network testing and debugging

Building wiring

UTP cabling options

Connections to offices

Wiring standards

Network design issues

Network architecture vs. building architecture

Existing networks

Expansion

Congestion

Maintenance and documentation

Management issues

Recommended vendors

Cables and connectors

Test equipment

Routers/switches

Recommended reading

CHAPTER 16 THE DOMAIN NAME SYSTEM

DNS for the impatient: adding a new machine

The history of DNS

Who needs DNS?

What’s new in DNS

The DNS namespace

Masters of their domains

Selecting a domain name

Domain bloat

Registering a second-level domain name

Creating your own subdomains

The BIND software

Versions of BIND

Finding out what version you have

Components of BIND

named: the BIND name server

Authoritative and caching-only servers

Recursive and nonrecursive servers

The resolver library

Shell interfaces to DNS

How DNS works

Delegation

Caching and efficiency

The extended DNS protocol

BIND client issues

Resolver configuration

Resolver testing

Impact on the rest of the system

BIND server configuration

Hardware requirements

named startup

Configuration files

The include statement

The options statement

The acl statement

The server statement

The logging statement

The zone statement

The key statement

The trusted-keys statement

The controls statement

The view statement

BIND configuration examples

A home Linux box

A university department

A web hosting company

The DNS database

Resource records

The SOA record

NS records

A records

PTR records

MX records

CNAME records

The CNAME hack

LOC records

SRV records

TXT records

IPv6 resource records

A6 records

DNAME records

Commands in zone files

The localhost zone

Glue records: links between zones

Updating zone files

Zone transfers

Dynamic updates

Security issues

Access control lists revisited

Confining named

Secure server-to-server communication with TSIG and TKEY

DNSSEC

Microsoft bad, UNIX good

Testing and debugging

Logging

Debug levels

Debugging with ndc

Debugging with nslookup, dig, and host

Lame delegations

Loose ends

The hints file

Localhost configuration

Host management tools

DNS for systems not on the Internet

Vendor specifics

Specifics for Solaris

Specifics for HP-UX

Specifics for Red Hat Linux

Specifics for FreeBSD

Recommended reading

Mailing lists and newsgroups

Books and other documentation

On-line resources

The RFCs

CHAPTER 17 THE NETWORK FILE SYSTEM

General information about NFS

NFS protocol versions

Choice of transport

WebNFS

File locking

Disk quotas

Global UIDs and GIDs

Root access and the nobody account

Cookies and stateless mounting

Naming conventions for shared filesystems

Security and NFS

Server-side NFS

The share command and dfstab file (Solaris)

The exportfs command and the exports file (HP-UX, Red Hat, FreeBSD)

nfsd: serve files

Client-side NFS

biod and nfsiod: provide client-side caching

Mounting remote filesystems

Secure port restrictions

nfsstat: dump NFS statistics

Dedicated NFS file servers

Automatic mounting

automount: the original automounter

Indirect maps

Direct maps

Master maps

Executable maps

Replicated filesystems using automount

Automatic automounts

Specifics for Red Hat Linux

amd: a more sophisticated automounter

amd maps

Starting amd

Stopping amd

Recommended reading

CHAPTER 18 SHARING SYSTEM FILES

What to share

Copying files around

rdist: push files

rsync: push files more securely

expect: pull files

NIS: the

Return Main Page Previous Page Next Page

®Online Book Reader