Novell's Guide to Troubleshooting eDirectory |
By Peter Kuo, Jim Henderson |
| |
Publisher | : Que |
Pub Date | : July 08, 2004 |
ISBN | : 0-7897-3146-0 |
Pages | : 936 |
| | |
| Copyright |
| | About the Authors |
| | Acknowledgements |
| | We Want to Hear from You |
| | Reader Services |
| | Introduction |
| | | Who This Book Is For |
| | | How This Book Is Organized |
| | | Special Features in This Book |
| | Part I. eDirectory Fundamentals |
| | | Chapter 1. The Four Basics of eDirectory Troubleshooting |
| | | Don't Panic |
| | | Understanding the Error Codes and eDirectory Processes |
| | | Troubleshoot and Resolve the Problem |
| | | Proactively Manage eDirectory to Prevent Problems |
| | | Summary |
| | | Chapter 2. eDirectory Basics |
| | | A Brief History of NDS/eDirectory and Its Versioning |
| | | The eDirectory Database Structure |
| | | Partition and Replica Types |
| | | Bindery Services |
| | | Time Synchronization |
| | | DHost |
| | | SAP and SLP |
| | | The LDAP Server for NDS |
| | | Object Attribute Names Versus Schema Attribute Names |
| | | Summary |
| | | Chapter 3. The Directory Information Base |
| | | The NDS 6 DIB |
| | | NDS 7 DIB |
| | | NDS 8 and eDirectory DIB |
| | | Locating the DIB |
| | | Backing Up the DIB |
| | | Summary |
| | | Chapter 4. Don't Panic |
| | | Dealing with People |
| | | Dealing with Stress |
| | | Summary |
| | Part II. Understanding the Error Codes and eDirectory Processes |
| | | Chapter 5. eDirectory/NDS Error Codes Explained |
| | | Types and Causes of DS Errors |
| | | Operating System- Related DS Error Codes |
| | | DS Client API Library Error Codes |
| | | DS Server-Based Client Library Error Codes |
| | | DSA Error Codes |
| | | Summary |
| | | Chapter 6. Understanding Common eDirectory Processes |
| | | NDS Name Resolution and Tree-Walking |
| | | Obituaries |
| | | Background Processes |
| | | Manual Object-Related Processes |
| | | Manual Partition and Replication Processes |
| | | Summary |
| | Part III. Troubleshooting and Resolving Problems |
| | | Chapter 7. Diagnostic and Repair Tools |
| | | Server Tools |
| | | Workstation Tools |
| | | Information Tools |
| | | Summary |
| | | Chapter 8. eDirectory Data Recovery Tools |
| | | SMS Backup and Restore |
| | | Server Recovery Using Server-Specific Information Data |
| | | Creating SSI Files |
| | | eDirectory Backup eMTool |
| | | Third-Party Data Recovery Utilities |
| | | Summary |
| | | Chapter 9. Diagnosis and Recovery Techniques |
| | | Look Before You Leap |
| | | Troubleshooting Tools |
| | | Combining Diagnostic Tools |
| | | Combining Recovery Tools |
| | | Using Diagnostic Tools with Recovery Tools |
| | | Bridging Gaps Between Tools |
| | | Diagnosing Performance Issues |
| | | Summary |
| | | Chapter 10. Programming for eDirectory |
| | | Using awk |
| | | Using C or C++ |
| | | Other Programming and Scripting Languages |
| | | Obtaining the NDK |
| | | Summary |
| | | Chapter 11. Examples from the Real World |
| | | Bindery Services “related Issues |
| | | Security Issues |
| | | Schema Problems |
| | | Data Inconsistencies |
| | | Synthetic Time |
| | | Server and Data Recovery |
| | | Summary |
| | Part IV. Managing eDirectory to Prevent Problems |
| | | Chapter 12. eDirectory Management Tools |
| | | NetWare Administrator |
| | | ConsoleOne |
| | | iManager and NDS iMonitor |
| | | The UImport Utility |
| | | The NList Utility |
| | | The LDAP ICE Utility |
| | | Third-Party Tools |
| | | Summary |
| | | Chapter 13. eDirectory Health Checks |
| | | Why, When, and How Often Should You Do Health Checks? |
| | | Health Check Prerequisites |
| | | Recommended Health Check Procedures |
| | | Health Monitoring Using SNMP |
| | | Summary |
| | | Chapter 14. eDirectory Management Techniques |
| | | Strategies for Managing eDirectory |
| | | Designing for Fault Tolerance |
| | | Single-Object Management |
| | | Multiple-Object Management |
| | | Administration Tips and Tricks |
| | | Summary |
| | | Chapter 15. Effectively Setting Up eDirectory Security |
| | | Physical Security |
| | | Console Security |
| | | Security Policies |
| | | Principles of Good Security |
| | | Keeping Hackers Out |
| | | Hidden Objects |
| | | Setting Up eDirectory Security Access for a Help Desk |
| | | Setting Up a Proxy User for LDAP |
| | | Summary |
| | | Chapter 16. Tuning eDirectory |
| | | Reducing Replication Latency |
| | | Cache Memory Considerations for NDS 7 |
| | | Cache Memory Considerations for NDS Version 8 |
| | | Cache Memory Considerations for eDirectory |
| | | eDirectory Indexes and Predicate Stats |
| | | Changing Database Block Size |
| | | Unix-Specific Tuning Considerations |
| | | Summary |
| | Part V. Appendixes |
| | | Appendix A. eDirectory Error Codes |
| | | Appendix B. DS Verbs |
| | | Appendix C. eDirectory Classes, Objects, and Attributes |
| | | Class Definitions |
| | | Base Attributes |
| | | Appendix D. eDirectory Resources |
| | | Novell Resources |
| | | Third-Party Tools |
| | | Third-Party NDS/eDirectory Resources |
| | | Books |
| | | Humor |
| | Index |