| | Copyright |
| | Introduction |
| | | Objectives |
| | | Chapter Format |
| | | Conventions Used |
| | | Code Examples |
| | | Public Domain Tools |
| | | Acknowledgments |
|
| | Chapter 1. The System Administrator's Role |
| | | The Importance of a System Administrator |
| | | Who Is the System Administrator? |
|
| | Chapter 2. Booting and Halting the System |
| | | Objectives |
| | | Switching On |
| | | The Boot Process |
| | | Solaris Processes |
| | | Switching Off |
| | | The OpenBoot PROM |
|
| | Chapter 3. User Administration |
| | | Objectives |
| | | What Are Users? |
| | | What Are Groups? |
| | | UIDs and GIDs |
| | | Password File |
| | | Shadow File |
| | | Group File |
| | | Primary and Secondary Groups |
| | | The Implementation |
| | | Using RBAC |
| | | Creating a Custom Script |
| | | Checking the Files |
| | | Conclusion |
|
| | Chapter 4. Permissions and All That |
| | | Objectives |
| | | Why Do We Need Permissions? |
| | | How Permissions Are Represented |
| | | Setting Permissions |
| | | Access Control Lists |
| | | The Implementation |
| | | Octal Permissions Lookup Table |
|
| | Chapter 5. Shells |
| | | Objectives |
| | | What Is a Shell? |
| | | What Shells? C Shells? |
| | | Shell Variables |
| | | Assigning Shells to Users |
| | | Running Commands |
| | | Wildcards |
| | | Hiding Things from the Shell |
| | | Command Substitution |
| | | Shortcuts |
| | | What Else Does the Shell Do? |
| | | Shell Start-Up Files |
| | | The Implementation |
| | | Example Shell Scripts |
|
| | Chapter 6. The Filesystem and Its Contents |
| | | Objectives |
| | | What Is a Filesystem? |
| | | Why Do We Use Filesystems? |
| | | Preparing the Disk to Receive Filesystems |
| | | What Type of Filesystem Should We Use? |
| | | Creating and Removing Filesystems |
| | | Files and Directories |
| | | Log Files |
| | | The Implementation |
|
| | Chapter 7. Swap Space |
| | | Objectives |
| | | Swapping and Paging |
| | | The Scheduler |
| | | How Big Should It Be? |
| | | Swap Locations |
| | | Monitoring Swap Space |
|
| | Chapter 8. Administering Packages |
| | | Objectives |
| | | What Is a Package? |
| | | Using Packages |
| | | What Packages Have I Got Loaded? |
| | | Adding, Removing, and Checking Packages |
| | | Dissecting a Package |
| | | Advanced Concepts |
| | | Creating Your Own Packages |
|
| | Chapter 9. Patching the System |
| | | Objectives |
| | | What Are Patches? |
| | | Files and Their Locations |
| | | Determining What's Installed |
| | | Adding Patches |
| | | Obsolete Patches |
| | | Removing Patches |
| | | Checking the System |
|
| | Chapter 10. Administering Quotas |
| | | Objectives |
| | | What Are Quotas? |
| | | Enabling Quotas |
| | | Configuring the User's Quotas |
| | | Checking the Limits |
| | | Setting Default User Quotas |
| | | Disabling User Quotas |
| | | Automatically Checking the Limits |
| | | Should We Use Them? |
|
| | Chapter 11. Connecting to the Local Area Network |
| | | Objectives |
| | | Description |
| | | IP Addressing Schemes |
| | | Choosing an IP Address |
| | | Our Values |
| | | Naming Systems |
| | | Host Names |
| | | Loopback Interface |
| | | Initial Network Testing |
| | | Configuring the Interface |
| | | Routing |
| | | Connecting the Second Subnet |
| | | Adding the Gateway |
| | | RoutingA Second Look |
| | | Address Resolution |
| | | IPV6The Next Generation |
| | | Traceroute |
| | | Conclusion |
|
| | Chapter 12. Naming Services and NIS |
| | | Objectives |
| | | Naming Services |
| | | Name Service Switch File |
| | | How NIS Works |
| | | NIS Domain Names |
| | | NIS Maps |
| | | Machine Types and Daemons |
| | | Our Machines |
| | | Build the Master Server |
| | | Build the Clients |
| | | Build the Slave Servers |
| | | The Server Map |
| | | Map Propagation |
| | | Customizing NIS |
| | | NIS Passwords |
| | | Disabling NIS |
|
| | Chapter 13. Connecting to the Internet |
| | | Objectives |
| | | The Design |
| | | Allocating an IP Address |
| | | Configuring the Interface |
| | | Adding a Default Route |
| | | Enabling Host Name Resolving |
| | | Checking the Connection |
| | | Configuring the Remaining Systems |
| | | Multiple Default Routes |
|
| | Chapter 14. Connecting Serial Devices |
| | | Objectives |
| | | Serial Communication |
| | | Synchronous versus Asynchronous |
| | | Speed |
| | | Serial Devices |
| | | Serial Ports |
| | | Service Access Facility |
| | | Remove Existing Port Monitors |
| | | Adding a Terminal |
| | | Ttyadm |
| | | Line Settings |
| | | Consoles and Serial Ports |
| | | Adding a Modem |
| | | Conclusion |
|
| | Chapter 15. Dialing in with PPP |
| | | Objectives |
| | | Point-to-Point Protocol |
| | | Why Use PPP? |
| | | The Components |
| | | The System |
| | | Building the Connection |
| | | The Serial Port |
| | | UUCP |
| | | PPP |
| | | Host Name Resolving |
| | | Name Service Caching |
| | | Routing |
| | | The Completed Network |
| | | Custom Scripts |
| | | Conclusion |
|
| | Chapter 16. Configuring DNS |
| | | Objectives |
| | | What Is the Domain Name System? |
| | | Why Do We Need It? |
| | | DNS Hierarchy |
| | | Servers and Resolving |
| | | Zones |
| | | Is It DNS, BIND, or Named? |
| | | Our Configuration |
| | | Zone Files |
| | | Master Server |
| | | resolv.conf File |
| | | Starting Named |
| | | Slave Server |
| | | Testing the Servers |
| | | Enabling Resolving |
| | | Configuring the Clients |
| | | Conclusion |
|
| | Chapter 17. Adding SCSI Devices |
| | | Objectives |
| | | Introduction |
| | | What Is SCSI? |
| | | Solaris Devices |
| | | Adding the Disk |
| | | Configuring LUNs |
| | | Adding the Tape Drive |
| | | SCSI Options |
|
| | Chapter 18. NFS, DFS, and Autofs |
| | | Objectives |
| | | Network Filesystem |
| | | Distributed Filesystem |
| | | Autofs |
| | | The Build Order |
| | | Remote Procedure Call |
| | | Configuring the Server |
| | | Setting Up the Clients |
| | | Server Share Options |
| | | Access Lists |
| | | Client Mount Options |
| | | Authentication |
| | | The Autofs |
| | | Our Configuration |
| | | Metacharacters |
| | | Client Failover |
| | | Testing |
| | | Naming Services and Autofs |
| | | Conclusion |
|
| | Chapter 19. Time, Date, and NTP |
| | | Objectives |
| | | Introduction |
| | | System Time |
| | | Host Names |
| | | Rdate |
| | | Network Time Protocol |
| | | How NTP Works |
| | | Our Configuration |
| | | Which Is Best? |
|
| | Chapter 20. Setting Up The Mail System |
| | | Objectives |
| | | What Is Mail? |
| | | Mail Protocols |
| | | DNS and Mail |
| | | Sendmail |
| | | M4 |
| | | Sendmail and M4 |
| | | Our Configuration |
| | | Aliases |
| | | Conclusion |
|
| | Chapter 21. Kernels and All About Them |
| | | Objectives |
| | | What Is the Kernel? |
| | | How Does It All Fit Together? |
| | | Troubleshooting |
| | | Kernel Modules |
| | | The /Etc/system File |
| | | Kernel Messages |
|
| | Chapter 22. Backing Up and Restoring the System |
| | | Objectives |
| | | Why Do We Need a Backup Strategy? |
| | | What Is a Backup Strategy? |
| | | How Do We Back Up the System? |
| | | Remote Backups |
| | | Backup Consistency |
| | | The Implementation |
|
| | Appendix A. Settings Used Throughout the Book |
| | | Overview |
|
| | Appendix B. Security Checklist |
| | | Objectives |
| | | Description |
| | | User Security |
| | | File Security |
| | | Network Security |
| | | General Security |
|