Chapter 1 - Introduction
|
|
Introduction
Conventions
|
Chapter 2 - Networking Basics
|
|
Host Names
The Network Interface
Ethernet Addresses
IFCONFIG
Is Another Host Responding?
SNOOP
Client - Server Model
INETD
Software Ports (Sockets)
Exercises
|
Chapter 3 - Network File System (NFS)
|
|
The Benefits of NFS
NFS - The Big Picture
NFS Server Daemons
Configuring an NFS Server
Sharing Resources
SHARE
The "root" Option
Using Netgroups in the Access List
UNSHARE
SHAREALL and UNSHAREALL
Configuring an NFS Client
MOUNT
Enabling NFS Logging
MOUNTALL and UMOUNTALL
DFSHARES and DFMOUNTS
Summary of NFS-Related Files
Possible NFS Problems
Exercises
|
Chapter 4 - The Automounter
|
|
The Benefits of Using the Automounter
How the Automounter Works
Automount Maps
The Master Map
Indirect Maps
Special Indirect Maps
The Direct Map
AUTOMOUNT
Configuring the Direct Map
The "nobrowse" Option
Redundant Servers For Read-Only Data
Closing Comments
Exercises
|
Chapter 5 - System Logging
|
|
Syslog Overview
/etc/syslog.conf
Syslog Facilities
Syslog Severity Levels
Syslog Actions
Configuring a Log Host
The /var/adm/messages File
LOGGER
Logging TCP Connections with INETD
Configuring TCP Logging via INETD
Exercises
|
Chapter 6 - Naming Services Overview
|
|
Types of Naming Services
DNS
NIS
NIS+
FNS
LDAP
The Name Service Switch File
|
Chapter 7 - Configuring NIS
|
|
NIS Daemons
Setting up a NIS Master Server
Setting up a NIS Client
Setting up a NIS Slave Server
Adding a New Slave Server to the ypservers Map
Viewing NIS Map Information
YPCAT
YPMATCH
YPWHICH
Updating (Rebuilding) a NIS Map
/var/yp/Makefile
Makefile - Macros
Makefile - Targets and Dependencies
Makefile - Timestamp Dependencies
The /usr/lib/netsvc/yp Directory
Exercises
|
Chapter 8 - Managing Swap Space
|
|
Virtual Memory
How Much Swap Space?
Types of Swap Areas
SWAP
MKFILE
Configuring Swap During Booting
Summary
Exercises
|
Chapter 9 - Memory-Based Filesystems
|
|
Types of Memory-Based Filesystems
The TMPFS Filesystem
The PROCFS Filesystem
The FDFS Filesystem
|
Chapter 10 - Administering Core Dumps and Crash Files
|
|
Core Dumps
COREADM
System Crash Dump Files
Crash Dumps - The Big Picture
DUMPADM
SAVECORE
Exercises
|
Chapter 11 - Role-Based Access Control
|
|
What is RBAC?
Roles, Profiles, and Authorizations
Authorizations
Profiles
Roles
/etc/security/exec_attr
/etc/security/prof_attr
/etc/security/auth_attr
/etc/user_atttr
Assuming a Role using "su"
ROLES, PROFILES, AUTHS
ROLEADD
ROLEMOD
ROLEDEL
USERADD
USERMOD
The Profile Shells
RBAC Database Files - Summary
Exercises
|
Chapter 12 - Jumpstart
|
|
Jumpstart Servers
Setting Up an Install Server
Setting Up a Configuration Server
The rules File
Rule Keywords
Profiles
Setting Up a Boot Server
Configuring a Jumpstart Client
ADD_INSTALL_CLIENT
What Happens When a Client is Jumpstarted
The sysidcfg File
Exercises
|
Chapter 13 - Installing a Solaris Server
|
|
Installing the Operating System
Using SUNINSTALL to Install Solaris
Using Web Start to Install Solaris
|
Exercise Solutions
|
|
|