Cross-platform file sharing under Network File System (NFS) is so reliable that in most organizations, it works pretty much unattended. Ditto for the directory services that Network Information System (NIS) provides. Managing NFS and NIS is for people who want to know more about how NFS and NIS do their vital work, and how to make them operate in unusual circumstances. Focused on the Solaris and Linux implementations of NFS and NIS, this book is ideal for the Unix system administrator who's familiar with TCP/IP networking and everyday system administration. The second edition of this book eliminates much of the programming material that appeared in its predecessor and replaces it with information on NFS 3, its support of IPsec and Kerberos security, and its operation under Solaris 8.This is a blue O'Reilly book, packed to the gunwales with information of interest to people in a hurry to optimize their systems and resolve difficulties. It's easy to locate the passage you need via the index or through the table of contents, and most entries provide a great mix of how-to material (in the form of input-and-output listings) and explanatory text (expert commentary, often with notes on applicable variations). If there's a command, option, or configuration parameter associated with NIS or NFS, you'll find documentation of it here.
Author(s): Mike Eisler, Ricardo Labiaga, Hal Stern
Edition: 2
Publisher: O’Reilly Media
Year: 2001
Language: English
Pages: 409
Cover......Page 1
Table of Contents......Page 2
Preface......Page 5
Versions......Page 6
Organization......Page 7
Conventions used in this book......Page 8
Comments and questions......Page 9
Acknowledgments for the second edition......Page 10
1.1 Networking overview......Page 13
1.2 Physical and data link layers......Page 15
1.3 Network layer......Page 16
1.4 Transport layer......Page 22
1.5 The session and presentation layers......Page 23
2.1 Purpose of directory services......Page 28
2.2 Brief survey of common directory services......Page 29
2.4 Which directory service to use......Page 33
3.1 Masters, slaves, and clients......Page 35
3.2 Basics of NIS management......Page 38
3.3 Files managed under NIS......Page 45
3.4 Trace of a key match......Page 56
4.1 NIS network design......Page 60
4.2 Managing map files......Page 62
4.3 Advanced NIS server administration......Page 69
4.4 Managing multiple domains......Page 71
5.1 Domain name servers......Page 74
5.2 Implementation......Page 76
5.3 Fully qualified and unqualified hostnames......Page 78
5.4 Centralized versus distributed management......Page 80
5.6 What next?......Page 81
6. System Administration Using the Network File System......Page 82
6.1 Setting up NFS......Page 83
6.2 Exporting filesystems......Page 84
6.3 Mounting filesystems......Page 89
6.4 Symbolic links......Page 100
6.5 Replication......Page 103
6.6 Naming schemes......Page 107
7.1 Virtual filesystems and virtual nodes......Page 112
7.2 NFS protocol and implementation......Page 113
7.3 NFS components......Page 121
7.4 Caching......Page 126
7.5 File locking......Page 131
7.6 NFS futures......Page 133
8.1 NFS support for diskless clients......Page 136
8.2 Setting up a diskless client......Page 137
8.3 Diskless client boot process......Page 140
8.4 Managing client swap space......Page 144
8.5 Changing a client's name......Page 146
8.6 Troubleshooting......Page 147
8.7 Configuration options......Page 151
8.8 Brief introduction to JumpStart administration......Page 154
8.9 Client/server ratios......Page 155
9. The Automounter......Page 157
9.1 Automounter maps......Page 158
9.2 Invocation and the master map......Page 166
9.3 Integration with NIS......Page 171
9.4 Key and variable substitutions......Page 173
9.5 Advanced map tricks......Page 177
9.6 Side effects......Page 186
10.1 PC/NFS today......Page 188
10.2 Limitations of PC/NFS......Page 189
10.3 Configuring PC/NFS......Page 192
10.4 Common PC/NFS usage issues......Page 193
10.5 Printer services......Page 195
11.1 What is file locking?......Page 196
11.2 NFS and file locking......Page 198
11.3 Troubleshooting locking problems......Page 200
12.1 User-oriented network security......Page 204
12.2 How secure are NIS and NFS?......Page 210
12.3 Password and NIS security......Page 211
12.4 NFS security......Page 214
12.5 Stronger security for NFS......Page 227
12.6 Viruses......Page 249
13. Network Diagnostic and Administrative Tools......Page 251
13.1 Broadcast addresses......Page 252
13.2 MAC and IP layer tools......Page 254
13.3 Remote procedure call tools......Page 272
13.4 NIS tools......Page 280
13.5 Network analyzers......Page 287
14.1 NFS administration tools......Page 299
14.2 NFS statistics......Page 302
14.3 snoop......Page 311
14.4 Publicly available diagnostics......Page 315
14.5 Version 2 and Version 3 differences......Page 321
14.6 NFS server logging......Page 322
14.7 Time synchronization......Page 335
15.1 Duplicate ARP replies......Page 339
15.2 Renegade NIS server......Page 341
15.3 Boot parameter confusion......Page 342
15.4 Incorrect directory content caching......Page 343
15.5 Incorrect mount point permissions......Page 347
15.6 Asynchronous NFS error messages......Page 349
16.1 Characterization of NFS behavior......Page 353
16.2 Measuring performance......Page 355
16.3 Benchmarking......Page 356
16.4 Identifying NFS performance bottlenecks......Page 357
16.5 Server tuning......Page 361
17.1 Network congestion and network interfaces......Page 371
17.2 Network partitioning hardware......Page 373
17.3 Network infrastructure......Page 375
17.4 Impact of partitioning......Page 376
17.5 Protocol filtering......Page 378
18.1 Slow server compensation......Page 380
18.2 Soft mount issues......Page 385
18.3 Adjusting for network reliability problems......Page 386
18.4 NFS over wide-area networks......Page 388
18.5 NFS async thread tuning......Page 389
18.6 Attribute caching......Page 391
18.7 Mount point constructions......Page 392
18.8 Stale filehandles......Page 394
A.1 Routers and their routing tables......Page 396
A.2 Static routing......Page 400
B.1 NFS server problems......Page 401
B.2 NFS client problems......Page 402
B.3 NFS errno values......Page 403
C. Tunable Parameters......Page 405
Colophon......Page 409