Home Page Icon
Home Page
Table of Contents for
Objectives
Close
Objectives
by Dominic Butler, David Rhodes
Solaris™ Operating Environment Boot Camp
Copyright
Introduction
The System Administrator's Role
The Importance of a System Administrator
Who Is the System Administrator?
Booting and Halting the System
Objectives
Switching On
The Boot Process
Solaris Processes
Switching Off
The OpenBoot PROM
User Administration
Objectives
What Are Users?
What Are Groups?
UIDs and GIDs
Password File
Shadow File
Group File
Primary and Secondary Groups
The Implementation
Using RBAC
Creating a Custom Script
Checking the Files
Conclusion
Permissions and All That
Objectives
Why Do We Need Permissions?
How Permissions Are Represented
Setting Permissions
Access Control Lists
The Implementation
Octal Permissions Lookup Table
Shells
Objectives
What Is a Shell?
What Shells? C Shells?
Shell Variables
Assigning Shells to Users
Running Commands
Wildcards
Hiding Things from the Shell
Command Substitution
Shortcuts
What Else Does the Shell Do?
Shell Start-Up Files
The Implementation
Example Shell Scripts
The Filesystem and Its Contents
Objectives
What Is a Filesystem?
Why Do We Use Filesystems?
Preparing the Disk to Receive Filesystems
What Type of Filesystem Should We Use?
Creating and Removing Filesystems
Files and Directories
Log Files
The Implementation
Swap Space
Objectives
Swapping and Paging
The Scheduler
How Big Should It Be?
Swap Locations
Monitoring Swap Space
Administering Packages
Objectives
What Is a Package?
Using Packages
What Packages Have I Got Loaded?
Adding, Removing, and Checking Packages
Dissecting a Package
Advanced Concepts
Creating Your Own Packages
Patching the System
Objectives
What Are Patches?
Files and Their Locations
Determining What's Installed
Adding Patches
Obsolete Patches
Removing Patches
Checking the System
Administering Quotas
Objectives
What Are Quotas?
Enabling Quotas
Configuring the User's Quotas
Checking the Limits
Setting Default User Quotas
Disabling User Quotas
Automatically Checking the Limits
Should We Use Them?
Connecting to the Local Area Network
Objectives
Description
IP Addressing Schemes
Choosing an IP Address
Our Values
Naming Systems
Host Names
Loopback Interface
Initial Network Testing
Configuring the Interface
Routing
Connecting the Second Subnet
Adding the Gateway
Routing—A Second Look
Address Resolution
IPV6—The Next Generation
Traceroute
Conclusion
Naming Services and NIS
Objectives
Naming Services
Name Service Switch File
How NIS Works
NIS Domain Names
NIS Maps
Machine Types and Daemons
Our Machines
Build the Master Server
Build the Clients
Build the Slave Servers
The Server Map
Map Propagation
Customizing NIS
NIS Passwords
Disabling NIS
Connecting to the Internet
Objectives
The Design
Allocating an IP Address
Configuring the Interface
Adding a Default Route
Enabling Host Name Resolving
Checking the Connection
Configuring the Remaining Systems
Multiple Default Routes
Connecting Serial Devices
Objectives
Serial Communication
Synchronous versus Asynchronous
Speed
Serial Devices
Serial Ports
Service Access Facility
Remove Existing Port Monitors
Adding a Terminal
Ttyadm
Line Settings
Consoles and Serial Ports
Adding a Modem
Conclusion
Dialing in with PPP
Objectives
Point-to-Point Protocol
Why Use PPP?
The Components
The System
Building the Connection
The Serial Port
UUCP
PPP
Host Name Resolving
Name Service Caching
Routing
The Completed Network
Custom Scripts
Conclusion
Configuring DNS
Objectives
What Is the Domain Name System?
Why Do We Need It?
DNS Hierarchy
Servers and Resolving
Zones
Is It DNS, BIND, or Named?
Our Configuration
Zone Files
Master Server
resolv.conf File
Starting Named
Slave Server
Testing the Servers
Enabling Resolving
Configuring the Clients
Conclusion
Adding SCSI Devices
Objectives
Introduction
What Is SCSI?
Solaris Devices
Adding the Disk
Configuring LUNs
Adding the Tape Drive
SCSI Options
NFS, DFS, and Autofs
Objectives
Network Filesystem
Distributed Filesystem
Autofs
The Build Order
Remote Procedure Call
Configuring the Server
Setting Up the Clients
Server Share Options
Access Lists
Client Mount Options
Authentication
The Autofs
Our Configuration
Metacharacters
Client Failover
Testing
Naming Services and Autofs
Conclusion
Time, Date, and NTP
Objectives
Introduction
System Time
Host Names
Rdate
Network Time Protocol
How NTP Works
Our Configuration
Which Is Best?
Setting Up The Mail System
Objectives
What Is Mail?
Mail Protocols
DNS and Mail
Sendmail
M4
Sendmail and M4
Our Configuration
Aliases
Conclusion
Kernels and All About Them
Objectives
What Is the Kernel?
How Does It All Fit Together?
Troubleshooting
Kernel Modules
The /Etc/system File
Kernel Messages
Backing Up and Restoring the System
Objectives
Why Do We Need a Backup Strategy?
What Is a Backup Strategy?
How Do We Back Up the System?
Remote Backups
Backup Consistency
The Implementation
Settings Used Throughout the Book
Overview
Security Checklist
Objectives
Description
User Security
File Security
Network Security
General Security
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Security Checklist
Next
Next Chapter
Description
Objectives
This appendix provides a quick checklist of recommended security practices.
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset