𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

UNIX Administration: A Comprehensive Sourcebook for Effective Systems & Network Management

✍ Scribed by Bozidar Levi


Publisher
CRC-Press
Year
2002
Tongue
English
Leaves
730
Series
Internet and Communications
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


To configure and maintain an operating system is serious business. With UNIX and its wide variety of "flavors," it can be especially difficult and frustrating, and networking with UNIX adds still more challenges.UNIX Administration: A Comprehensive Sourcebook for Effective Systems & Network Management is a one-stop handbook for the administration and maintenance of UNIX systems and networks. With an outstanding balance of concepts and practical matters, it covers the entire range of administrative tasks, from the most basic to the advanced, from system startup and shutdown to network security and kernel reconfiguration. While focusing on the primary UNIX platforms, the author discusses all of the most common UNIX "flavors," including Solaris, Linux, HP-UX, AIX and SGI IRIX. Three chapters of case studies offer a practical look at UNIX implementation issues: UNIX installation, disk space upgrade, and several emergency situations that every administrator must expect to face at some point.Diverse yet detailed, filled with examples and specific procedures, this is the one book that both the novice and the seasoned professional need to learn UNIX administration and effectively perform their daily system and network-related duties.

✦ Table of Contents


UNIX Administration......Page 2
INTERNET and COMMUNICATIONS......Page 3
Preface......Page 6
About the Author......Page 9
Contents......Page 10
UNIX Operating System......Page 24
User’s View of UNIX......Page 26
The History of UNIX......Page 27
System V or ATT UNIX......Page 28
UNIX System and Network Administration......Page 32
System Administrator’s Job......Page 34
Computing Policies......Page 37
Legal Acts......Page 40
Code of Ethics......Page 41
Organizations......Page 42
Standardization......Page 44
In This Book......Page 46
Introduction......Page 48
File Ownership......Page 49
Access Classes......Page 53
Setting a File Protection......Page 54
Default File Mode......Page 55
Additional Access Modes......Page 56
Access Control Lists ( ACLs)......Page 60
File Types......Page 63
Special Device File......Page 64
Link......Page 65
Socket......Page 66
Devices and Special Device Files......Page 67
Special File Creation......Page 69
Process Parameters......Page 71
Process Attributes......Page 72
Process States......Page 73
Process Creation......Page 74
Monitoring Process Activities......Page 76
Destroying Processes......Page 80
Job Control......Page 82
Becoming a Superuser......Page 83
The su Command......Page 84
The man Command......Page 85
The whatis Database......Page 89
The uname Command......Page 90
The dmesg Command......Page 91
Hardware Information......Page 92
The HP- UX ioscan Command......Page 93
The Solaris prtconf Command......Page 95
Personal Documentation......Page 96
Shell Script Programming......Page 97
UNIX Shell Scripts......Page 98
Shell Script Execution......Page 99
Shell Variables......Page 100
Double Command- Line Scanning......Page 101
Few Tips......Page 104
Introductory Notes......Page 105
System Startup......Page 106
The Bootstrap Program......Page 107
The Kernel Execution......Page 108
Terminal Line Initialization......Page 109
System States......Page 110
The Outlook of a Startup Procedure......Page 111
Initialization Scripts......Page 113
BSD Initialization Sequence......Page 114
System V Initialization......Page 116
The Configuration File / etc/ inittab......Page 117
System V rc Initialization Scripts......Page 119
BSD- Like Initialization......Page 124
The BSD shutdown Command......Page 126
The System V shutdown Command......Page 127
An Example......Page 128
Introduction to the UNIX Filesystem......Page 129
BSD Filesystem Directory Organization......Page 130
System V Filesystem Directory Organization......Page 133
Mounting and Dismounting Filesystems......Page 134
Mounting a Filesystem......Page 135
The mount Command......Page 137
Dismounting a Filesystem......Page 139
Removable Media Management......Page 140
BSD Filesystem Configuration File......Page 141
System V Filesystem Configuration File......Page 143
AIX Filesystem Configuration File......Page 145
The Filesystem Status File......Page 148
Filesystem Types......Page 149
Swap Space β€” Paging and Swapping......Page 151
Loopback Virtual Filesystem......Page 153
Display Filesystem Statistics: The df Command......Page 154
Report on Disk Usage: The du Command......Page 156
Checking Filesystems: The fsck Command......Page 159
Introduction......Page 163
Physical Filesystem Layout......Page 164
Disk Partitions......Page 165
Filesystem Structures......Page 167
Filesystem Creation......Page 168
The newfs Command......Page 169
Index Node ( inode)......Page 170
Filesystem Performance Issues......Page 172
File Storage vs. File Transfer......Page 174
Logical Filesystem Layout......Page 175
Logical Volume Manager β€” AIX Flavor......Page 176
Logical Volume Manager β€” HP-UX Flavor......Page 178
Logical Volume Manager β€” Solaris Flavor......Page 180
Redundant Array of Inexpensive Disks ( RAID)......Page 183
The Volume Snapshot......Page 184
The Filesystem Snapshot......Page 185
Virtual UNIX Filesystem......Page 187
Disk Space Upgrade......Page 188
Users and Groups......Page 189
User Database β€” File /etc/ passwd......Page 190
Creating User Home Directories......Page 192
UNIX Login Initialization......Page 193
User Login Initialization Files......Page 194
Systemwide Login Initialization Files......Page 196
Shell Initialization Files......Page 198
Utilities to Create User Accounts......Page 201
Restricted User Accounts......Page 205
Assigning User Passwords......Page 206
Standard UNIX Users and Groups......Page 207
Removing User Accounts......Page 208
Managing Disk Usage by Users......Page 209
Accounting......Page 210
System V Accounting......Page 212
AIX-Flavored Accounting......Page 216
UNIX Lines of Defense......Page 217
Passwords......Page 218
Encryption......Page 219
Password Encryption......Page 220
Choosing a Password......Page 221
Setting Password Restrictions......Page 222
Usual Approach......Page 223
Other Approaches......Page 224
Secure Console and Terminals......Page 226
Secure Terminals β€” Other Approaches......Page 227
Important Files for System Security......Page 229
Monitoring System Activities......Page 230
The su Log File......Page 231
Tracking User Activities......Page 232
The Concept of System Logging......Page 233
The syslogd Daemon......Page 234
The Configuration File /etc/syslog.conf......Page 236
Linux Logging Enhancements......Page 240
Testing System Logging......Page 241
The last Command......Page 244
Limiting the Growth of Log Files......Page 245
UNIX Printing Subsystem......Page 247
The lpr, lpq, and lprm Commands......Page 249
Managing the BSD Printing Subsystem......Page 250
System V Printing Subsystem......Page 251
The lp, lpstat, and cancel Commands......Page 252
Managing the System V Printing Subsystem......Page 254
The / etc/ printcap File......Page 256
Setting the BSD Default Printer......Page 259
Filters......Page 260
The Printer Database Directory Hierarchy on System V......Page 263
AIX Printing Facilities......Page 266
Adding a Local BSD Printer......Page 269
Adding a Local Linux Printer......Page 270
Adding a Local System V Printer......Page 271
Adding a Remote BSD Printer......Page 272
Adding a Remote Linux Printer......Page 273
Adding a Remote System V Printer......Page 274
Solaris and BSD Cross- Printing......Page 276
Third- Party Printer Spooling Systems......Page 279
BSD Terminal Subsystem......Page 280
BSD Terminal Line Initialization......Page 281
The BSD termcap Database......Page 285
System V Terminal Line Initialization......Page 288
The System V terminfo Database......Page 291
Configuration Data Summary......Page 295
The tset Command......Page 296
The tput Command......Page 297
The stty Command......Page 298
Pseudo Terminals......Page 300
Terminal Servers......Page 302
Introduction......Page 303
Media......Page 304
The tar Command......Page 306
The cpio Command......Page 308
The dd Command......Page 309
The mt Command......Page 310
Magnetic Tape Devices and Special Device Files......Page 311
Planning a Backup Schedule......Page 312
The SVR3 and SVR4 backup Commands......Page 314
The fbackup Command......Page 316
The dump/ufsdump Command......Page 317
A Few Examples......Page 320
The SVR3 restore Command......Page 324
The restore/ufsrestore Command......Page 325
Interactive Restore......Page 326
The frecover Command......Page 328
Restoring Multiple Filesystems Archived on a Single Tape......Page 329
Tape Control......Page 330
The NTP Daemon......Page 333
The NTP Configuration File......Page 334
Periodic Program Execution......Page 339
The UNIX cron Daemon......Page 340
The crontab Files......Page 342
The crontab Command......Page 344
Linux Approach......Page 345
Programs Scheduled for a Specific Time......Page 347
The UNIX at Utility......Page 348
Batch Processing......Page 350
The UNIX batch Utility......Page 351
UNIX and Networking......Page 352
Local Area Network ( LAN)......Page 353
CSMA/ CD Networks......Page 354
Token Passing Networks......Page 355
Wide Area Network ( WAN)......Page 356
A TCP/ IP Overview......Page 357
ISO OSI Reference Model......Page 358
TCP/ IP Protocol Architecture......Page 361
Network Access Layer......Page 363
Internet Protocol ( IP)......Page 364
Internet Control Message Protocol ( ICMP)......Page 365
Transmission Control Protocol ( TCP)......Page 366
Application Layer......Page 368
IP Address Classes......Page 370
Internet Routing......Page 373
The route Command......Page 375
Dynamic Routing......Page 376
The gated Daemon......Page 377
Protocols, Ports, and Sockets......Page 378
UNIX Database Files......Page 380
Address Resolution ( ARP)......Page 381
The arp Command......Page 382
Remote Procedure Call ( RPC)......Page 383
The portmapper Daemon......Page 385
The /etc/rpc File......Page 386
Configuring the Network Interface......Page 387
The ifconfig Command......Page 388
The netstat Command......Page 389
The inetd Configuration......Page 392
Further Improvements and Development......Page 394
Extended Super Server xinetd......Page 396
Host Names and Addresses......Page 399
Domain Name Service ( DNS)......Page 400
Domains and Subdomains......Page 402
The Local Host Table β€” /etc/hosts......Page 403
Maintaining the /etc /hosts File......Page 405
UNIX Name Service β€” BIND......Page 407
Resolvers......Page 409
Configuring a Resolver......Page 410
Other Resolver Parameters......Page 412
The named Daemon......Page 413
Configuring......Page 414
The Configuration File / etc/ named. boot......Page 415
Standard Resource Records......Page 416
The Resource Record Files......Page 417
BIND Version 8. X. X......Page 422
Subdomains and Parenting......Page 425
The nslookup Interactive Mode......Page 428
A Few Examples of nslookup Usage......Page 430
Purpose and Concepts......Page 433
NIS Paradigm......Page 435
yp Processes......Page 436
Set the Master Server......Page 437
Set the Slave Server......Page 439
To Create an NIS Client......Page 440
NIS Domain Name......Page 441
Databases/ NIS Maps......Page 442
NIS Management......Page 444
yp Commands......Page 445
The make Utility and NIS......Page 446
Troubleshooting......Page 449
Security Issues......Page 451
Too Large an NIS Group......Page 452
Change of the NIS Domain Name......Page 453
The /etc/nsswitch.conf File......Page 454
Once upon a Time......Page 456
NFS Overview......Page 458
NFS Daemons......Page 459
Exporting a Filesystem......Page 460
The exportfs and share Commands......Page 461
The Export Configuration File......Page 463
The Export Status File......Page 464
The mount Command and the Filesystem Configuration File......Page 465
Automounter......Page 466
The Automount Maps......Page 468
An Example......Page 469
NFS β€” Security Issues......Page 472
UNIX r Commands......Page 473
Table of Contents......Page 0
The rlogin Command......Page 474
The remsh (rsh) Command......Page 475
Securing the UNIX r Commands......Page 476
The /etc/hosts.equiv File......Page 477
Using UNIX r-Commands β€” An Example......Page 478
Secure Shell ( SSH)......Page 479
RSA Authentication......Page 480
The ssh Client......Page 481
The sshd Daemon......Page 482
SSH Configuration......Page 483
SSH Installation and User Access Setup......Page 485
Root Access......Page 486
Individual User Access......Page 487
SSH β€” Version 2......Page 488
E- mail Fundamentals......Page 491
Simple Mail Transport Protocol ( SMTP)......Page 494
The MTA Program sendmail......Page 496
The sendmail Command......Page 497
Global Mail Aliases......Page 499
Mail Delivery Programs β€” Mailers......Page 500
The sendmail Configuration File......Page 501
Configuration......Page 502
The sendmail.cf File......Page 503
The Define Macro Command......Page 505
The Define Class Command......Page 506
Rulesets and Rewrite Rules......Page 510
The Ruleset Sequence......Page 512
The Ruleset 0......Page 514
Creating the sendmail.cf File......Page 516
The Parsing of E- mail Addresses......Page 518
Pattern Matching......Page 519
Address Transformation......Page 520
Testing Rewrite Rules......Page 522
The sendmail -bt Command......Page 523
Checking the Mail Queue......Page 524
Starting mail......Page 525
Mail Subcommands......Page 526
Variables......Page 527
Post Office Protocol ( POP)......Page 528
Internet Message Access Protocol ( IMAP)......Page 530
Comparing POP vs. IMAP......Page 531
Common UNIX Network Applications......Page 533
Telnet Commands......Page 534
FTP......Page 535
FTP Commands......Page 536
FTP Auto- Login......Page 538
Anonymous FTP......Page 539
Finger......Page 540
The ping Command......Page 542
The traceroute Command......Page 544
The Design of X11......Page 546
Window Managers......Page 550
The X Display Managers......Page 552
xdm/dtlogin Concepts......Page 553
xdm Configuration Files......Page 556
The xdm-config File......Page 558
The Xservers File......Page 560
The Xresources File......Page 561
The Xsession File......Page 562
CDE Configuration Files......Page 563
Vendor- Specific X Flavors β€” a Configuration Example......Page 570
XDMCP Queries......Page 572
The Xaccess File......Page 573
Other Access Control Mechanisms......Page 576
Components of the xdm-Based User X Environment......Page 579
Components of the CDE User X Environment......Page 581
Motif Window Manager (mwm)......Page 586
CDE Window Manager ( dtwm)......Page 588
The Shell Environment......Page 590
Other Startup Methods......Page 595
A Permanent X11 Installation......Page 597
A Few X- Related Commands......Page 598
Introduction to Kernel Reconfiguration......Page 600
Kernel Configuration Database......Page 601
Basic Configuration Entries......Page 602
The BSD-Like Kernel Configuration Procedure......Page 606
The config Command......Page 608
HP- UX 10. x Kernel Configuration......Page 609
Solaris 2. x Kernel Configuration......Page 611
Linux Kernel Configuration......Page 618
Introduction to Modems......Page 624
UNIX and Modems......Page 625
Terminal Lines and Modem Control......Page 626
The cu Command......Page 628
Third- Party Communication Software......Page 629
C-Kermit......Page 630
How Does UUCP Work?......Page 636
UUCP Versions......Page 637
UUCP Chat-Transfer Session......Page 638
The Major UUCP Commands......Page 639
The uux Command......Page 640
The UUCP Daemons......Page 641
The uuxqt Daemon......Page 642
The uucpd Daemon......Page 643
The UUCP Spool Directories and Files......Page 644
Serial Line- Related Issues......Page 645
UUCP Configuration Files......Page 646
The UUCP Systems Data......Page 647
The UUCP Devices Data......Page 648
Other Configuration Data......Page 649
UUCP Access and Security Consideration......Page 650
Additional Security in BNU UUCP......Page 651
Additional Security in Version 2 UUCP......Page 653
Introduction to Intranet......Page 654
Intranet vs. Internet......Page 655
Intranet Design Approach......Page 657
Intranet Front- End Services......Page 658
Firewalls......Page 659
Firewall Techniques......Page 661
Firewall Types......Page 662
Firewall Implementation......Page 663
Computer Viruses and Other Malicious Codes......Page 665
The Viruswall Implementation......Page 667
Proxy Servers......Page 669
SOCKS Proxies......Page 672
Web Services......Page 673
Other External Services......Page 678
Inside the Intranet......Page 679
Network Infrastructure and Desktops......Page 680
Internal Services......Page 681
Dynamic Host Configuration Protocol ( DHCP)......Page 682
Virtual Private Network ( VPN)......Page 684
UNIX and Not- UNIX Platform Integration......Page 687
UNIX Installation Procedures......Page 690
HP- UX Installation......Page 691
Solaris Installation......Page 693
Linux Installation......Page 697
Supplemental Installations......Page 699
Installation of Veritas Filesystem 3. X......Page 700
Two Pseudo- Installation Scripts......Page 701
Installation of Optional HP- UX Software......Page 703
HP- UX Patch Installation......Page 705
New Disk on the Solaris Platform......Page 708
New Disk on the SunOS Platform......Page 710
New Disk on the HP-UX Platform......Page 711
LVM on the HP- UX Platform......Page 715
LVM on the Solaris Platform......Page 717
Lost Root Password......Page 719
HP- UX and Lost Root Password......Page 720
Solaris Procedure to Create an Alternate Boot Partition......Page 721
Solaris Recovery of the Failed Mirrored Boot Disk......Page 723
HP- UX Support Disk Usage......Page 726
HP- UX Procedure to Synchronize a Mirrored Logical Volume......Page 727
HP- UX Support Tape and Recovery of Root Disk......Page 728


πŸ“œ SIMILAR VOLUMES


UNIX Administration: A Comprehensive Sou
✍ Bozidar Levi πŸ“‚ Library πŸ“… 2002 πŸ› CRC Press 🌐 English

Written for a wide audience of both academic and professional users, this is a complete reference that gives equal weight to UNIX network concepts and their practical implementation. The book covers the two main UNIX platforms as well as the various UNIX flavors, including HP-UX, AIX, SunOS, and LIN

UNIX fault management : a guide for syst
✍ Brad Stone; Julie Symons πŸ“‚ Library πŸ“… 2000 πŸ› Prentice Hall PTR 🌐 English

If you're responsible for maintaining the integrity and availability of a mission-critical UNIX system, this is the first book that brings together all the information you need most. UNIX Fault Management Administrator's Handbook describes exactly how to implement appropriate, cost-effective system

UNIX Fault Management: A Guide for Syste
✍ Brad Stone, Julie Symons, B. Stone πŸ“‚ Library πŸ“… 1999 πŸ› Prentice Hall PTR 🌐 English

Designed to help you maximize system integrity and availability on any Unix system-including clusters, monitor systems, disks, networks applications, and databases, with tips for recovery and prevention. Provides quick reference diagnostics and recovery section for systems operators.

Networking for Systems Administrators
✍ Michael W Lucas πŸ“‚ Library πŸ“… 2015 πŸ› Tilted Windmill Press 🌐 English

<b> Stop waiting for the network team!Β </b><div><br><div></div><div>If basic TCP/IP was hard, network administrators couldn't do it. Servers give sysadmins a incredible visibility into the network--once they know how to unlock it.Β </div><div></div><div></div><div></div><div></div><div