| Novell's Guide to Troubleshooting eDirectory |
| By Peter Kuo, Jim Henderson |
| | |
| Publisher | : Que |
| Pub Date | : July 08, 2004 |
| ISBN | : 0-7897-3146-0 |
| Pages | : 936 |
| | | |
| Copyright |
| | | About the Authors |
| | | Acknowledgements |
| | | We Want to Hear from You |
| | | Reader Services |
| | | Introduction |
| | | | Who This Book Is For |
| | | | How This Book Is Organized |
| | | | Special Features in This Book |
| | | Part I. eDirectory Fundamentals |
| | | | Chapter 1. The Four Basics of eDirectory Troubleshooting |
| | | | Don't Panic |
| | | | Understanding the Error Codes and eDirectory Processes |
| | | | Troubleshoot and Resolve the Problem |
| | | | Proactively Manage eDirectory to Prevent Problems |
| | | | Summary |
| | | | Chapter 2. eDirectory Basics |
| | | | A Brief History of NDS/eDirectory and Its Versioning |
| | | | The eDirectory Database Structure |
| | | | Partition and Replica Types |
| | | | Bindery Services |
| | | | Time Synchronization |
| | | | DHost |
| | | | SAP and SLP |
| | | | The LDAP Server for NDS |
| | | | Object Attribute Names Versus Schema Attribute Names |
| | | | Summary |
| | | | Chapter 3. The Directory Information Base |
| | | | The NDS 6 DIB |
| | | | NDS 7 DIB |
| | | | NDS 8 and eDirectory DIB |
| | | | Locating the DIB |
| | | | Backing Up the DIB |
| | | | Summary |
| | | | Chapter 4. Don't Panic |
| | | | Dealing with People |
| | | | Dealing with Stress |
| | | | Summary |
| | | Part II. Understanding the Error Codes and eDirectory Processes |
| | | | Chapter 5. eDirectory/NDS Error Codes Explained |
| | | | Types and Causes of DS Errors |
| | | | Operating System- Related DS Error Codes |
| | | | DS Client API Library Error Codes |
| | | | DS Server-Based Client Library Error Codes |
| | | | DSA Error Codes |
| | | | Summary |
| | | | Chapter 6. Understanding Common eDirectory Processes |
| | | | NDS Name Resolution and Tree-Walking |
| | | | Obituaries |
| | | | Background Processes |
| | | | Manual Object-Related Processes |
| | | | Manual Partition and Replication Processes |
| | | | Summary |
| | | Part III. Troubleshooting and Resolving Problems |
| | | | Chapter 7. Diagnostic and Repair Tools |
| | | | Server Tools |
| | | | Workstation Tools |
| | | | Information Tools |
| | | | Summary |
| | | | Chapter 8. eDirectory Data Recovery Tools |
| | | | SMS Backup and Restore |
| | | | Server Recovery Using Server-Specific Information Data |
| | | | Creating SSI Files |
| | | | eDirectory Backup eMTool |
| | | | Third-Party Data Recovery Utilities |
| | | | Summary |
| | | | Chapter 9. Diagnosis and Recovery Techniques |
| | | | Look Before You Leap |
| | | | Troubleshooting Tools |
| | | | Combining Diagnostic Tools |
| | | | Combining Recovery Tools |
| | | | Using Diagnostic Tools with Recovery Tools |
| | | | Bridging Gaps Between Tools |
| | | | Diagnosing Performance Issues |
| | | | Summary |
| | | | Chapter 10. Programming for eDirectory |
| | | | Using awk |
| | | | Using C or C++ |
| | | | Other Programming and Scripting Languages |
| | | | Obtaining the NDK |
| | | | Summary |
| | | | Chapter 11. Examples from the Real World |
| | | | Bindery Services “related Issues |
| | | | Security Issues |
| | | | Schema Problems |
| | | | Data Inconsistencies |
| | | | Synthetic Time |
| | | | Server and Data Recovery |
| | | | Summary |
| | | Part IV. Managing eDirectory to Prevent Problems |
| | | | Chapter 12. eDirectory Management Tools |
| | | | NetWare Administrator |
| | | | ConsoleOne |
| | | | iManager and NDS iMonitor |
| | | | The UImport Utility |
| | | | The NList Utility |
| | | | The LDAP ICE Utility |
| | | | Third-Party Tools |
| | | | Summary |
| | | | Chapter 13. eDirectory Health Checks |
| | | | Why, When, and How Often Should You Do Health Checks? |
| | | | Health Check Prerequisites |
| | | | Recommended Health Check Procedures |
| | | | Health Monitoring Using SNMP |
| | | | Summary |
| | | | Chapter 14. eDirectory Management Techniques |
| | | | Strategies for Managing eDirectory |
| | | | Designing for Fault Tolerance |
| | | | Single-Object Management |
| | | | Multiple-Object Management |
| | | | Administration Tips and Tricks |
| | | | Summary |
| | | | Chapter 15. Effectively Setting Up eDirectory Security |
| | | | Physical Security |
| | | | Console Security |
| | | | Security Policies |
| | | | Principles of Good Security |
| | | | Keeping Hackers Out |
| | | | Hidden Objects |
| | | | Setting Up eDirectory Security Access for a Help Desk |
| | | | Setting Up a Proxy User for LDAP |
| | | | Summary |
| | | | Chapter 16. Tuning eDirectory |
| | | | Reducing Replication Latency |
| | | | Cache Memory Considerations for NDS 7 |
| | | | Cache Memory Considerations for NDS Version 8 |
| | | | Cache Memory Considerations for eDirectory |
| | | | eDirectory Indexes and Predicate Stats |
| | | | Changing Database Block Size |
| | | | Unix-Specific Tuning Considerations |
| | | | Summary |
| | | Part V. Appendixes |
| | | | Appendix A. eDirectory Error Codes |
| | | | Appendix B. DS Verbs |
| | | | Appendix C. eDirectory Classes, Objects, and Attributes |
| | | | Class Definitions |
| | | | Base Attributes |
| | | | Appendix D. eDirectory Resources |
| | | | Novell Resources |
| | | | Third-Party Tools |
| | | | Third-Party NDS/eDirectory Resources |
| | | | Books |
| | | | Humor |
| | | Index |