Book description
A modern computer system that's not part of a network is even more of an anomaly today than it was when we published the first edition of this book in 1991. But however widespread networks have become, managing a network and getting it to perform well can still be a problem.Managing NFS and NIS, in a new edition based on Solaris 8, is a guide to two tools that are absolutely essential to distributed computing environments: the Network Filesystem (NFS) and the Network Information System (formerly called the "yellow pages" or YP).The Network Filesystem, developed by Sun Microsystems, is fundamental to most Unix networks. It lets systems ranging from PCs and Unix workstations to large mainframes access each other's files transparently, and is the standard method for sharing files between different computer systems.As popular as NFS is, it's a "black box" for most users and administrators. Updated for NFS Version 3, Managing NFS and NIS offers detailed access to what's inside, including:
- How to plan, set up, and debug an NFS network
- Using the NFS automounter
- Diskless workstations
- PC/NFS
- A new transport protocol for NFS (TCP/IP)
- New security options (IPSec and Kerberos V5)
- Diagnostic tools and utilities
- NFS client and server tuning
Publisher resources
Table of contents
- Preface
- 1. Networking Fundamentals
- 2. Introduction to Directory Services
-
3. Network Information Service Operation
- 3.1. Masters, slaves, and clients
- 3.2. Basics of NIS management
- 3.3. Files managed under NIS
- 3.4. Trace of a key match
- 4. System Management Using NIS
- 5. Living with Multiple Directory Servers
- 6. System Administration Using the Network File System
- 7. Network File System Design and Operation
- 8. Diskless Clients
- 9. The Automounter
- 10. PC/NFS Clients
- 11. File Locking
-
12. Network Security
- 12.1. User-oriented network security
- 12.2. How secure are NIS and NFS?
- 12.3. Password and NIS security
- 12.4. NFS security
-
12.5. Stronger security for NFS
- 12.5.1. Security services
- 12.5.2. Brief introduction to cryptography
- 12.5.3. NFS and IPSec
-
12.5.4. AUTH_DH: Diffie-Hellman authentication
- 12.5.4.1. Old terms: AUTH_DES, secure RPC, and, secure NFS
- 12.5.4.2. Diffie-Hellman key exchange
- 12.5.4.3. How RPC/DH works
- 12.5.4.4. RPC/DH state and NFS statelessness
- 12.5.4.5. Enabling NFS/dh
- 12.5.4.6. Public and private keys
- 12.5.4.7. Creating keys
- 12.5.4.8. Establishing a session key
- 12.5.4.9. NFS/dh checklist
- 12.5.4.10. How secure is RPC/DH?
- 12.5.5. RPCSEC_GSS: Generic security services for RPC
- 12.5.6. Planning a transition from NFS/sys to stronger NFS security
- 12.5.7. NFS security futures
- 12.6. Viruses
-
13. Network Diagnostic and Administrative Tools
- 13.1. Broadcast addresses
- 13.2. MAC and IP layer tools
- 13.3. Remote procedure call tools
- 13.4. NIS tools
- 13.5. Network analyzers
-
14. NFS Diagnostic Tools
- 14.1. NFS administration tools
- 14.2. NFS statistics
- 14.3. snoop
- 14.4. Publicly available diagnostics
- 14.5. Version 2 and Version 3 differences
-
14.6. NFS server logging
- 14.6.1. NFS server logging mechanics
- 14.6.2. Enabling NFS server logging
- 14.6.3. NFS server logging configuration
- 14.6.4. The nfslogd daemon
- 14.6.5. Filehandle to path mapping
- 14.6.6. NFS log cycling
- 14.6.7. Manipulating NFS log files
- 14.6.8. Other configuration parameters
- 14.6.9. Disabling NFS server logging
- 14.7. Time synchronization
- 15. Debugging Network Problems
-
16. Server-Side Performance Tuning
- 16.1. Characterization of NFS behavior
- 16.2. Measuring performance
- 16.3. Benchmarking
- 16.4. Identifying NFS performance bottlenecks
- 16.5. Server tuning
- 17. Network Performance Analysis
- 18. Client-Side Performance Tuning
- A. IP Packet Routing
- B. NFS Problem Diagnosis
- C. Tunable Parameters
- About the Authors
- Colophon
- Copyright
Product information
- Title: Managing NFS and NIS, 2nd Edition
- Author(s):
- Release date: July 2001
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781565925106
You might also like
book
NFS Illustrated
The Network File System (NFS) protocol that enables remote access to files is now a key …
book
Special Edition Using Linux®, Sixth Edition
Linux is a significant force in the server room and the desktop, delivering reliability, ease of …
book
Red Hat® Linux® 7 Unleashed
Red Hat Linux 7 Unleashed shows you how to install, configure, and manage version 7, the …
book
Perl for System Administration
Some people plan to become administrators. The rest of us are thrust into it: we are …