Flylib.com
HP-UX CSE(c) Official Study Guide and Desk Reference
HP-UX CSE(c) Official Study Guide and Desk Reference
ISBN: N/A
EAN: N/A
Year: 2006
Pages: 434
BUY ON AMAZON
HP-UX CSE Official Study Guide and Desk Reference
Table of Contents
Copyright
Hewlett-Packard Professional Books
PREFACE
HP-UX CSE: ADVANCED ADMINISTRATION
HP-UX CSE: HIGH AVAILABILITY WITH HP-UX SERVICEGUARD
HP-UX CSE: NETWORKING AND SECURITY
Acknowledgments
Part ONE: Managing HP-UX Servers
Chapter ONE. An Introduction to Your Hardware
1.1 Key Server Technologies
1.2 Processor Architecture
1.3 Virtual Memory
1.4 The IO Subsystem
1.5 The Big Picture
1.6 Before We Begin...
REFERENCES
Chapter TWO. Partitioned Servers: Node Partitions
2.1 A Basic Hardware Guide to nPars
2.2 The Genesis Partition
2.3 Cell Behavior During the Initial Boot of a Partition
2.4 Partition Manager
2.5 Other Boot-Related Tasks
Chapter Review
Test Your Knowledge
Answer to Test Your Knowledge Questions
Chapter Review Questions
Answers to Chapter Review Questions
Chapter THREE. Partitioned Servers: Virtual Partitions
3.1 An Introduction to Virtual Partitions
3.2 Obtaining the Virtual Partitions Software
3.3 Setting Up an Ignite-UX Server to Support Virtual Partitions
3.4 Planning Your Virtual Partitions
3.5 Creating the vPar Database
3.6 Booting a Newly Created vPar from an Ignite-UX Server
3.7 Managing Hardware within a Virtual Partition
3.8 Rebooting vpmon
3.9 Interfacing with the Virtual Partition Monitor: vpmon
3.10 Changing Partition Attributes
3.11 Resetting a Virtual Partition
3.12 Removing a Virtual Partition
3.13 Turning Off Virtual Partition Functionality
Chapter Review
Test Your Knowledge
Answers to Test Your Knowledge
Chapter Review Questions
Answers to Chapter Review Questions
Chapter FOUR. Advanced Peripherals Configuration
4.1 Reorganizing Your IO Tree
4.2 Disk Device Files in a Switched Fabric, Fibre Channel SAN
4.3 Online Addition and Replacement: OLAR
Test Your Knowledge
Answers to Test Your Knowledge
Chapter Review Questions
Answers to Chapter Review Questions
Chapter FIVE. Disks and Volumes: RAID Levels and RAID Parity Data
5.1 RAID Levels
5.2 RAID Parity Data
Chapter Review
Test Your Knowledge
Answers to Test Your Knowledge
Chapter Review Questions
Answers to Chapter Review Questions
Chapter SIX. Disks and Volumes: LVM
6.1 LVM Striping (RAID 0)
6.2 LVM Mirroring (RAID 1)
6.3 Alternate PV Links
6.4 Exporting and Importing Volume Groups
6.5 Forward Compatibility with Newer, Larger Capacity Disk Drives
Chapter Review
Test Your Knowledge
Answers to Test Your Knowledge
Chapter Review Questions
Answers to Chapter Review Questions
Chapter SEVEN. Disks and Volumes: Veritas Volume Manager
7.1 Introducing Veritas Volume Manager
7.2 VxVM Striping (RAID 0)
7.3 VxVM Mirroring (RAID 1)
7.4 VxVM Striping and Mirroring (RAID 01 and 10)
7.5 Faster Mirror Resynchronization after a System Crash
7.6 VxVM RAID 5
7.7 Recovering from a Failed Disk
7.8 Using Spare Disks
7.9 VxVM Snapshots
7.10 VxVM Rootability
7.11 Other VxVM Tasks
Chapter Review
Test Your Knowledge
Answers to Test Your Knowledge
Chapter Review Questions
Answers to Chapter Review Questions
Chapter EIGHT. Filesystems: HFS, VxFS, and the VFS Layer
8.1 Basic Filesystem Characteristics
8.2 HFS Internal Structure
8.3 Tuning an HFS Filesystem
8.4 HFS Access Control Lists
8.5 VxFS Internal Structures
8.6 Online JFS Features
8.7 Tuning a VxFS Filesystem
8.8 VxFS Snapshots
8.9 Navigating through Filesystems via the VFS Layer
Chapter Review
Test Your Knowledge
Answers to Test Your Knowledge
Chapter Review Questions
Answers to Chapter Review Questions
REFERENCES
Chapter NINE. Swap and Dump Space
9.1 Swap Space, Paging, and Virtual Memory Management
9.2 How Much Swap Space Do I Need?
9.3 Configuring Additional Swap Devices
Chapter Review on Swap Space
9.4 When Dump Space Is Used
9.5 Including Page Classes in the Crashdump Configuration
9.6 Configuring Additional Dump Space
9.7 The savecrash Process
9.8 Dump and Swap Space in the Same Volume
Chapter Review on Dump Space
Test Your Knowledge
Answers to Test Your Knowledge
Chapter Review Questions
Answers to Chapter Review Questions
REFERENCES
Chapter TEN. Monitoring System Resources
10.1 Dynamic Kernel Configuration and Monitoring
10.2 Monitoring General System Activity and Events
10.3 Was It a PANIC, a TOC, or an HPMC?
Chapter Review
Test Your Knowledge
Answers to Test Your Knowledge
Chapter Review Questions
Answers to Chapter Review Questions
Chapter ELEVEN. Processes, Threads, and Bottlenecks
11.1 Defining Processes and Threads
11.2 Process Life Cycle
11.3 Context Switches and Timeslices
11.4 ProcessThread Priorities and Run Queues
11.5 Multiprocessor Environments and Processor Affinity
11.6 Memory Requirements for ProcessesThreads
11.7 Memory Limitations for 32-bit Operating Systems, magic Numbers, and Memory Windows
11.8 Performance Optimized Page Sizes (POPS)
Chapter Review on a Process Life Cycle
11.9 Common Bottlenecks for Processes and Threads
Chapter Review on Common Bottlenecks
11.10 Prioritizing Workloads with PRM and WLM
Chapter Review on PRM
Chapter Review on WLM
Test Your Knowledge
Answers to Test Your Knowledge
Chapter Review Questions
Answers to Chapter Review Questions
REFERENCES
Part TWO: Install, Update, and Recovery
Chapter TWELVE. HP-UX Patches
12.1 What Is a Patch?
12.2 When Should I Patch My Server(s)?
12.3 Understanding the Risks Involved When Applying Patches
12.4 Obtaining Patches
12.5 Patch Naming Convention
12.6 Patch Ratings
12.7 The Patch shar File
12.8 Patch Attributes
12.9 Setting Up a Patch Depot
12.10 Installing Patches
12.11 Removing Patches and Committing Patches
12.12 Managing a Patch Depot
Chapter Review
Test Your Knowledge
Answers to Test Your Knowledge
Chapter Review Questions
Answers to Chapter Review Questions
Chapter THIRTEEN. Installing Software with Software Distributor and Ignite-UX
13.1 Using swinstall to Push Software across the Network
13.2 Installing a Complete Operating System Using Ignite-UX
13.3 Setting Up a Golden Image
13.4 Making a Recovery Archive
Chapter Review
Test Your Knowledge
Answers to Test Your Knowledge
Chapter Review Questions
Answers to Chapter Review Questions
Chapter FOURTEEN. Emergency Recovery Using the HP-UX Installation Media
14.1 Recovering a Corrupt Boot Header Including a Missing ISL
14.2 Recovering from Having No Bootable Kernel
14.3 Recovering from a Missing Critical Boot File: standrootconf
Chapter Review
Test Your Knowledge
Answers to Test Your Knowledge
Chapter Review Questions
Answers to Chapter Review Questions
Part THREE: Networking
Chapter FIFTEEN. Basic IP Configuration
15.1 Basic Networking Kernel Parameters
15.2 Data-Link Level Testing
15.3 Changing Your MAC Address
15.4 Link Speed and Auto-Negotiation
15.5 What s in an IP Address?
15.6 Subnetting
15.7 Static Routes
15.8 The netconf File
15.9 Dynamic IP Allocation: RARP and DHCP
15.10 Performing a Basic Network Trace
15.11 Modifying Network Parameters with ndd
15.12 IP Multiplexing
15.13 The 128-Bit IP Address: IPv6
15.14 Automatic Port Aggregation (APA)
Chapter Review
Test Your Knowledge
Answers to Test Your Knowledge
Chapter Review Questions
Answers to Chapter Review Questions
REFERENCES
Chapter SIXTEEN. Dynamic Routing
16.1 The gated.conf Configuration File
16.2 Router Discovery Protocol (RDP)
16.3 Routing Information Protocol (RIP)
16.4 Open Shortest Path First (OSPF)
Chapter Review
Test Your Knowledge
Answers to Test Your Knowledge
Chapter Review Questions
Answers to Chapter Review Questions
REFERENCES
Chapter SEVENTEEN. Domain Name System (DNS)
17.1 Configuring a Master Name Server
17.2 Configuring Additional Backup Slave and Caching-Only Name Servers
17.3 Delegating Authority to a Subdomain Including DNS Forwarders
17.4 Configuring DNS to Accept Automatic Updates from a DHCP Server
17.5 Dynamic DNS Server Updates and TSIG Authentication
Chapter Review
Test Your Knowledge
Answers to Test Your Knowledge
Chapter Review Questions
Answers to Chapter Review Questions
REFERENCES
Chapter EIGHTEEN. Network Time Protocol
18.1 What Time Is It?
18.2 Choosing a Time Source
18.3 Stratum Levels and Timeservers
18.4 The Role of the NTP Software
18.5 Analyzing Different Time Sources
18.6 Setting Up the NTP Daemons
18.7 NTP Server Relationships
18.8 An Unlikely Server: A Local Clock Impersonator
18.9 An NTP Polling Client
18.10 An NTP Broadcast Client
18.11 Other Points Relating to NTP
Chapter Review
Test Your Knowledge
Answers to Test Your Knowledge
Chapter Review Questions
Answers to Chapter Review Questions
Chapter NINETEEN. An Introduction to sendmail
19.1 Basic Checks to Ensure That sendmail Is Installed and Working
19.2 Using sendmail without Using DNS
19.3 Mail Aliases
19.4 Masquerading or Site Hiding and Possible DNS Implications
19.5 A Simple Mail Cluster Configuration
19.6 Building Your Own sendmail.cf File
19.7 Monitoring the Mail Queue
Chapter Review
Test Your Knowledge
Answers to Test Your Knowledge
Chapter Review Questions
Answers to Chapter Review Questions
REFERENCES
Chapter TWENTY. Common Internet Filesystem (CIFS9000)
20.1 CIFS, SMB, and SAMBA
20.2 CIFS Client or Server: You Need the Software
20.3 CIFS Server Configuration
20.4 CIFS Client Configuration
20.5 NTLM: Using a Windows Server to Perform Authentication and Pluggable Authentication Modules (PAM)
Chapter Review
Test Your Knowledge
Answers to Test Your Knowledge
Chapter Review Questions
Answers to Chapter Review Questions
Chapter TWENTY ONE. An Introduction to LDAP
21.1 Introducing the Lightweight Directory Access Protocol (LDAP)
21.2 LDAP-UX Integration Products
21.3 Step-by-Step Guide to LDAP-UX Client Services
21.4 Next Steps
Chapter Review
Test Your Knowledge
Answers to Test Your Knowledge
Chapter Review Questions
Answers to Chapter Review Questions
Chapter TWENTY TWO. Web Servers to Manage HP-UX
22.1 HP ObAM-Apache Web Server
22.2 The Apache Web Server
Chapter Review
Test Your Knowledge
Answers to Test Your Knowledge
Chapter Review Questions
Answers to Chapter Review Questions
Chapter TWENTY THREE. Other Network Technologies
23.1 WAN Solutions: Frame Relay and ATM
23.2 An Introduction to Fibre Channel, DWDM, and Extended Fabrics
23.3 Virtual LAN (VLAN)
23.4 Virtual Private Network (VPN)
Chapter Review
Test Your Knowledge
Answers to Test Your Knowledge
Chapter Review Questions
Answers to Chapter Review Questions
REFERENCES
Part FOUR: High-Availability Clustering
Chapter TWENTY FOUR. Understanding
24.1 Why We Are Interested in High Availability?
24.2 How Much Availability? The Elusive
24.3 A High Availability Cluster
24.4 Serviceguard and High Availability Clusters
Chapter Review
Test Your Knowledge
Answers to Test Your Knowledge
Chapter Review Questions
Answers to Chapter Review Questions
REFERENCES
Chapter TWENTY FIVE. Setting Up a Serviceguard Cluster
25.1 The Cookbook for Setting Up a Serviceguard Package-less Cluster
25.2 The Basics of a Failure
25.3 The Basics of a Cluster
25.4 The Split-Brain Syndrome
25.5 Hardware and Software Considerations for Setting Up a Cluster
25.6 Testing Critical Hardware before Setting Up a Cluster
25.7 Setting Up a Serviceguard Package-less Cluster
25.8 Constant Monitoring
Chapter Review
Test Your Knowledge
Answers to Test Your Knowledge
Chapter Review Questions
Answers to Chapter Review Questions
Chapter TWENTY SIX. Configuring Packages in a Serviceguard Cluster
26.1 The Cookbook for Setting Up Packages in a Serviceguard Cluster
26.2 Setting Up and Testing a Serviceguard Package-less Cluster
26.3 Understanding How a Serviceguard Package Works
26.4 Establishing Whether You Can Utilize a Serviceguard Toolkit
26.5 Understanding the Workings of Any In-house Applications
26.6 Creating Package Monitoring Scripts, If Necessary
26.7 Distributing the Application Monitoring Scripts to All Relevant Nodes in the Cluster
26.8 Creating and Updating an ASCII Application Configuration File (cmmakepkg p)
26.9 Creating and Updating an ASCII Package Control Script (cmmakepkg s)
26.10 Manually Distributing to All Relevant Nodes the ASCII Package Control Script
26.11 Checking the ASCII Package Control File (cmcheckconf)
26.12 Distributing the Updated Binary Cluster Configuration File (cmapplyconf)
26.13 Ensuring That Any Data Files and Programs That Are to Be Shared Are Loaded onto Shared Disk Drives
26.14 Starting the Package
26.15 Ensuring That Package Switching Is Enabled
26.16 Testing Package Failover Functionality
Chapter Review
Test Your Knowledge
Answers to Test Your Knowledge
Chapter Review Questions
Answers to Chapter Review Questions
Chapter TWENTY SEVEN. Managing a Serviceguard Cluster
27.1 Typical Cluster Management Tasks
27.2 Adding a Node to the Cluster
27.3 Adding a Node to a Package
27.4 Adding a New Package to the Cluster Utilizing a Serviceguard Toolkit
27.5 Modifying an Existing Package to Use EMS Resources
27.6 Deleting a Package from the Cluster
27.7 Deleting a Node from the Cluster
27.8 Discussing the Process of Rolling Upgrades within a Cluster
27.9 If It Breaks, Fix It
27.10 Installing and Using the Serviceguard Manager GUI
Chapter Review
Test Your Knowledge
Answers to Test Your Knowledge
Chapter Review Questions
Answers to Chapter Review Questions
Chapter TWENTY EIGHT. Additional Cluster Solutions
28.1 Extended Serviceguard Cluster
28.2 Metrocluster
28.3 Continentalclusters
28.4 Additional Cluster Solutions
28.5 Other Cluster Considerations
Chapter Review
Test Your Knowledge
Answers to Test Your Knowledge
Chapter Review Questions
Answers to Chapter Review Questions
Part FIVE: HP-UX Security Administration
Chapter TWENTY NINE. Dealing with Immediate Security Threats
29.1 A Review of User-Level Security Settings
29.2 HP-UX Trusted Systems
29.3 The etcdefaultsecurity Configuration File
29.4 Common Security Administration Tasks
Test Your Knowledge
Answers to Test Your Knowledge
Chapter Review Questions
Answers to Chapter Review Questions
Answers to
REFERENCES
Chapter THIRTY. A New Breed of Security Tools
30.1 The Basics of Cryptography, Including Symmetric and Asymmetric Key Cryptography
30.2 Secure Shell (SSH)
30.3 Host Intrusion Detection System (HIDS)
30.4 IPSec, Diffie-Hellman, and Modular Arithmetic
30.5 IPFilter and Bastille
30.6 Other Security-Related Terms
Test Your Knowledge
Answers to Test Your Knowledge
Chapter Review Questions
Answers to Chapter Review Questions
REFERENCES
Appendix A. Getting to Know Your Hardware: A Bit of Background
A.1 Processor Architecture
A.2 Common processor families
A.3 Memory Hierarchy
A.4 Main Memory
A.5 A Quick Word on Virtual Memory
A.6 Concurrency: Getting Someone Else to Help You
A.7 IO Bus Architecture and IO Devices
A.8 Disk Drives: Storage or Speed
A.9 Getting to Know Your Hardware
A.10 Conclusions
PROBLEMS
ANSWERS
REFERENCES
Appendix B. Source Code
B.1 infocache32
B.2 infocache64.c
B.3 dump_ioconfig.c
B.4 numCPU.c
B.5 setCPU.c
B.6 clockwatch.c
Appendix C. Patching Usage Models White Paper
Appendix D. Auto-Negotiation White Paper
Appendix E. Building a Bastion Host White Paper
Index
index_M
HP-UX CSE(c) Official Study Guide and Desk Reference
ISBN: N/A
EAN: N/A
Year: 2006
Pages: 434
BUY ON AMAZON
Java I/O
Character Data
Meta-Information: Manifest Files and Signatures
Object Serialization
Reading and Writing Files
Buffered Readers and Writers
The CISSP and CAP Prep Guide: Platinum Edition
Information Security and Risk Management
Telecommunications and Network Security
Physical (Environmental) Security
Continuous Monitoring Process
Appendix F Security Control Catalog
Building Web Applications with UML (2nd Edition)
Summary
Technical Risk
Defining the Architecture
Discussion
Use Case View
Programming Microsoft ASP.NET 3.5
ASP.NET Core Server Controls
Paging Through Data Sources
Web Forms User Controls
Working with Web Services
Design-Time Support for Custom Controls
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Social Actors
Credibility and the World Wide Web
Captology Looking Forward
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Events in the Excel Object Model
Working with the Workbook Object
Working with Templates
Binding-Related Extensions to Host Items and Host Controls
Editing Manifests
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies