Book Home

Networking CD BookshelfSearch this book

Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: S

Samba, PC/NFS and: 10.2.1. NFS versus SMB (CIFS)
SATAN, diagnostics and: 14.4.5. SATAN
saturation, network collisions: 17.1.2. Collisions and network saturation
SCCS
map files: 4.2.5. Source code control for map files
maps, disadvantages: 4.2.5. Source code control for map files
schema, X.500 and: 2.2.4. X.500
SEAM (Sun Enterprise Authentication Mechanism): 12.5.5.2. SEAM: Kerberos V5 for Solaris
search paths, automounter and: 9.6.1. Long search paths
SEAS (Solaris Easy Access Server): 8.2. Setting up a diskless client
secret key, symmetric key encryption: 12.5.2.1. Symmetric key encryption
secure NFS: 12.5.4.1. Old terms: AUTH_DES, secure RPC, and, secure NFS
secure RPC: 12.5.4.1. Old terms: AUTH_DES, secure RPC, and, secure NFS
securenets file: 12.3.2.1. The secure nets file
security
ACLs: 12.4.8. Access control lists
anonymous users, mapping: 12.4.3. Unknown user mapping
asymmetric key encryption: 12.5.2.2. Asymmetric key encryption
AUTH_DH: 12.5.4. AUTH_DH: Diffie-Hellman authentication
authentication: 12.2. How secure are NIS and NFS?
AUTH_SYS security flavor: 12.2. How secure are NIS and NFS?
cryptography: 12.5.2. Brief introduction to cryptography
DCE/DFS: 12.2. How secure are NIS and NFS?
filesystem access: 12.4.4. Access to filesystems
firewalls: 12.4.7. Using NFS through firewalls
future of: 7.6.2. Security
IPsec: 12.5.3. NFS and IPSec
Kerberos V5: 12.5.5. RPCSEC_GSS: Generic security services for RPC
LDAP and: 12.2. How secure are NIS and NFS?
login restrictions: 12.1. User-oriented network security
MACs: 12.5.2.4. One-way hash functions and MACs
maps, private: 12.3.2. Making NIS more secure
netgroups: 12.1.3. Using netgroups
NFS: 12.4. NFS security
future of: 12.5.7. NFS security futures
increasing: 12.5. Stronger security for NFS
increasing, transition: 12.5.6. Planning a transition from NFS/sys to stronger NFS security
levels: 12.2. How secure are NIS and NFS?
RPC: 12.4.1. RPC security
superuser mapping: 12.4.2. Superuser mapping
version 4 and: 7.6.1. NFS Version 4
NIS
increasing: 12.3.2. Making NIS more secure
passwords: 12.3. Password and NIS security
NIS+ and: 2.2.3. NIS+
NIS levels: 12.2. How secure are NIS and NFS?
one-way hash functions: 12.5.2.4. One-way hash functions and MACs
performance and: 12.5.5.4. Security and performance
port monitoring: 12.4.6. Port monitoring
private keys: 12.5.4.6. Public and private keys
public key exchange: 12.5.2.3. Public key exchange
public keys: 12.5.4.6. Public and private keys
read-only access: 12.4.5. Read-only access
RPC: 12.4.1. RPC security
RPC/DH: 12.5.4.3. How RPC/DH works
RPCSEC_GSS: 12.5.5. RPCSEC_GSS: Generic security services for RPC
SATAN: 14.4.5. SATAN
SEAM: 12.5.5.2. SEAM: Kerberos V5 for Solaris
securenets file: 12.3.2.1. The secure nets file
services: 12.5.1. Security services
session keys: 12.5.4.8. Establishing a session key
setuid executables and: 12.4.2. Superuser mapping
SMB (CIFS): 12.2. How secure are NIS and NFS?
symmetric key encryption: 12.5.2.1. Symmetric key encryption
trusted hosts: 12.1.1. Trusted hosts and trusted users
trusted users: 12.1.1. Trusted hosts and trusted users
UIDs: 12.3.3. Unknown password entries
user-oriented: 12.1. User-oriented network security
viruses: 12.6. Viruses
server only NIS: 3.1. Masters, slaves, and clients
server response time, threshold value: 16.2. Measuring performance
server-side caching: 7.4.3. Server-side caching
server-side configuration, PC/NFS: 10.3.1. Server-side PC/NFS configuration
server-side fields (RPC), statistics: 14.2. NFS statistics
server-side performance tuning: 16. Server-Side Performance Tuning
benchmarking: 16.3. Benchmarking
server threads: 7.2.1. NFS RPC procedures
7.3.3. NFS kernel code
NFS: 7.3.1. nfsd and NFS server threads
server-to-client relationships, trusted hosts and users: 12.1.1. Trusted hosts and trusted users
server-to-server relationships, trusted hosts and users: 12.1.1. Trusted hosts and trusted users
servers
allocating, domains: 4.1.3. Number of NIS servers per domain
as clients: 3.3.11. NIS server as an NIS client
compensation, slow: 18.1. Slow server compensation
configuration
diskless clients: 8. Diskless Clients
RPCs and: 1.5.3. Internet and RPC server configuration
CPU loading, bottlenecks and: 16.4.1. Problem areas
disk bandwidth: 16.4.1. Problem areas
DNS: 5.2.3. Run DNS on NIS clients and servers
load, buffer size and: 18.3. Adjusting for network reliability problems
locating, binding the domain: 3.3.10. The ypbind daemon
log files: 14.6.1. NFS server logging mechanics
logging
configuration: 14.6.3. NFS server logging configuration
configuration files: 14.6.3. NFS server logging configuration
disabling: 14.6.9. Disabling NFS server logging
enabling: 14.6.2. Enabling NFS server logging
master server
creating: 3.2.2. Installing the NIS master server
hosts, changing: 4.3.2. Changing NIS master servers
number of: 3.2.2. Installing the NIS master server
unavailable: 3.2.2. Installing the NIS master server
ypxfr tool: 4.2.2. Regular map transfers
memory usage, bottlenecks: 16.4.1. Problem areas
multihomed: 16.5.7. Multihomed servers
network interface, bottlenecks: 16.4.1. Problem areas
NFS, troubleshooting: B.1. NFS server problems
NIS
selecting: 3.2.1. Choosing NIS servers
testing: 3.2.2. Installing the NIS master server
NLM crash: 11.2.2.1. Server crash
performance tuning: 16.5. Server tuning
buffers: 16.5.3. Memory usage
CPU loading: 16.5.1. CPU loading
cross-mounting filesystem: 16.5.6. Cross-mounting filesystems
kernel configuration: 16.5.5. Kernel configuration
memory usage: 16.5.3. Memory usage
multhomed: 16.5.7. Multihomed servers
nfsd threads: 16.5.2. NFS server threads
throughput: 16.5.4. Disk and filesystem throughput
renegade, debugging case study: 15.2. Renegade NIS server
replication, automounter: 9.5.1. Replicated servers
response time
disk-intensive activity and: 16.2. Measuring performance
users and: 16.2. Measuring performance
root privileges: 12.3.1. Managing the root password with NIS
RPC
configuration: 1.5.3. Internet and RPC server configuration
initialization: 1.5.3. Internet and RPC server configuration
slave server
adding: 3.2. Basics of NIS management
adding later: 3.2.3.1. Adding slave servers later
initializing: 3.2.3. Installing NIS slave servers
installing: 3.2.3. Installing NIS slave servers
listing: 3.2.3. Installing NIS slave servers
removing: 4.3.1. Removing an NIS slave server
slow
testing: 18.1.1. Identifying NFS retransmissions
timeo parameter and: 18.1.2. Timeout period calculation
terminal servers: 16.5.1. CPU loading
usage guage: 4.1.3. Number of NIS servers per domain
Service field, NFS log record: 14.6. NFS server logging
session keys: 12.5.4.8. Establishing a session key
session layer (7-layer model): 1.5. The session and presentation layers
setuid
executables, security and: 12.4.2. Superuser mapping
root privileges, remote files and: 12.4.2. Superuser mapping
setup
diskless clients: 8.2. Setting up a diskless client
NFS: 6.1. Setting up NFS
share command: 6.2. Exporting filesystems
enabling logging: 14.6.1. NFS server logging mechanics
exporting filesystems and: 6.2.2. Exporting options
share utility, /etc/dfs/sharetab and: 14.1. NFS administration tools
showmount command: 13.3.1.1. Identifying RPC services
14.1. NFS administration tools
slave servers: 3.1. Masters, slaves, and clients
adding: 3.2. Basics of NIS management
adding later: 3.2.3.1. Adding slave servers later
initializing: 3.2.3. Installing NIS slave servers
installing: 3.2.3. Installing NIS slave servers
listing: 3.2.3. Installing NIS slave servers
removing: 4.3.1. Removing an NIS slave server
slow servers, testing for: 18.1.1. Identifying NFS retransmissions
SMB (Server Message Block): 10.2.1. NFS versus SMB (CIFS)
(CIFS) security flavor: 12.2. How secure are NIS and NFS?
snoop: 13.5.1. snoop
14.3. snoop
filters: 14.3.1. Useful filters
NFS Server Logging utility: 14.6. NFS server logging
socket RPC: 1.5.3.1. Socket RPC and Transport Independent RPC
soft mounts, filesystems: 6.3.5. Hard and soft mounts
Solaris
diskless clients (see diskless clients)
mount command: 6.3.3. Mount options
NFS, export and: 6.2. Exporting filesystems
Solaris Easy Access Server (SEAS): 8.2. Setting up a diskless client
solstice command: 8.2. Setting up a diskless client
source code control system (see SCCS)
source code, map files: 4.2.5. Source code control for map files
source files
domain, pushing to new: 4.4. Managing multiple domains
maps: 4.2.1. Map distribution
alternate source files: 4.2.6. Using alternate map source files
NIS maps, ASCII code: 3.2.3. Installing NIS slave servers
source netgroup: 3.3.2. Netgroups
spray utility: 13.2.5. Gauging Ethernet interface capacity
stale filehandler error: 7.2.5. Pathnames and filehandles
stale filehandles
performance and: 18.8. Stale filehandles
Standard Performance Evaluation Corporation: 16.2. Measuring performance
stat( ), symbolic links and: 6.4.1. Resolving symbolic links in NFS
statd daemon, NFS startup: 6.1. Setting up NFS
state information: 1.4.1. TCP and UDP
recreating: 7.5.3. Recreating state information
stateful protocols: 1.4.1. TCP and UDP
static routing: A.1. Routers and their routing tables
A.2. Static routing
station addresses: 1.3.2. IP host addresses
statistics
filters: 14.3.1. Useful filters
NFS diagnostics: 14.2. NFS statistics
snoop and: 14.3. snoop
status daemon: 7.5.1. Lock and status daemons
stepping-stone mount points: 18.7. Mount point constructions
sticky-bit access, swap files: 8.4. Managing client swap space
strings, data representation and: 1.5.2. External data representation
subnetwork masks: 13.2.2. Subnetwork masks
substitutions, automounter maps: 9.4. Key and variable substitutions
Sun Microsystems: 0. Preface
superusers
domain, default: 3.3.8. NIS domains
keys, adding: 12.5.4.7. Creating keys
mapping, NFS: 12.4.2. Superuser mapping
restrictions: 12.4.2. Superuser mapping
swap files
sticky-bit access: 8.4. Managing client swap space
temporary: 8.4. Managing client swap space
VM system and: 8.1. NFS support for diskless clients
swap filesystem, AdminSuite: 8.2. Setting up a diskless client
swap space, diskless clients: 8.4. Managing client swap space
swapping files, ND and: 8.1. NFS support for diskless clients
switched Ethernets: 17.3.1. Switched networks
switches, networks: 17.2. Network partitioning hardware
symbolic links: 6.4. Symbolic links
absolute pathnames: 6.4.2. Absolute and relative pathnames
automounter and: 9.1.1. Indirect maps
boot blocks: 8.3.2. Getting a boot block
/export subdirectories: 8.2. Setting up a diskless client
exporting filesystems and: 6.4.3. Mount points, exports, and links
mount points construction and: 18.7. Mount point constructions
mounting filesystems and: 6.4.3. Mount points, exports, and links
mounts: 6.4. Symbolic links
relative pathnames: 6.4.2. Absolute and relative pathnames
resolving, NFS: 6.4.1. Resolving symbolic links in NFS
symmetric key encryption: 12.5.2.1. Symmetric key encryption
synchronizing time: 14.7. Time synchronization
synchronous serial line, TCP/IP: 1.1. Networking overview
system administration
NFS: 6. System Administration Using the Network File System
NIS: 4. System Management Using NIS


Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z


Library Navigation Links

Copyright © 2002 O'Reilly & Associates, Inc. All Rights Reserved.