1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923
|
\BOOKMARK [0][-]{section*.1}{About the Cover Artwork}{}
\BOOKMARK [0][-]{chapter*.2}{Attribution}{}
\BOOKMARK [0][-]{id2408614}{Contents}{}
\BOOKMARK [0][-]{chapter*.3}{List of Examples}{}
\BOOKMARK [0][-]{chapter*.4}{List of Figures}{}
\BOOKMARK [0][-]{chapter*.5}{List of Tables}{}
\BOOKMARK [0][-]{chapter*.6}{Foreword}{}
\BOOKMARK [0][-]{chapter*.7}{Preface}{}
\BOOKMARK [0][-]{section*.9}{Introduction}{}
\BOOKMARK [-1][-]{part.1}{Part I General Installation}{}
\BOOKMARK [0][-]{section*.14}{Preparing Samba for Configuration}{part.1}
\BOOKMARK [0][-]{chapter.1}{Chapter 1 How to Install and Test SAMBA}{part.1}
\BOOKMARK [1][-]{section.1.1}{1.1 Obtaining and Installing Samba}{chapter.1}
\BOOKMARK [1][-]{section.1.2}{1.2 Configuring Samba \(smb.conf\)}{chapter.1}
\BOOKMARK [2][-]{subsection.1.2.1}{1.2.1 Configuration File Syntax}{section.1.2}
\BOOKMARK [2][-]{subsection.1.2.2}{1.2.2 TDB Database File Information}{section.1.2}
\BOOKMARK [2][-]{subsection.1.2.3}{1.2.3 Starting Samba}{section.1.2}
\BOOKMARK [2][-]{subsection.1.2.4}{1.2.4 Example Configuration}{section.1.2}
\BOOKMARK [3][-]{subsubsection.1.2.4.1}{1.2.4.1 Test Your Config File with testparm}{subsection.1.2.4}
\BOOKMARK [2][-]{subsection.1.2.5}{1.2.5 SWAT}{section.1.2}
\BOOKMARK [1][-]{section.1.3}{1.3 List Shares Available on the Server}{chapter.1}
\BOOKMARK [1][-]{section.1.4}{1.4 Connect with a UNIX Client}{chapter.1}
\BOOKMARK [1][-]{section.1.5}{1.5 Connect from a Remote SMB Client}{chapter.1}
\BOOKMARK [2][-]{subsection.1.5.1}{1.5.1 What If Things Don't Work?}{section.1.5}
\BOOKMARK [2][-]{subsection.1.5.2}{1.5.2 Still Stuck?}{section.1.5}
\BOOKMARK [1][-]{section.1.6}{1.6 Common Errors}{chapter.1}
\BOOKMARK [2][-]{subsection.1.6.1}{1.6.1 Large Number of smbd Processes}{section.1.6}
\BOOKMARK [2][-]{subsection.1.6.2}{1.6.2 Error Message: open\137oplock\137ipc}{section.1.6}
\BOOKMARK [2][-]{subsection.1.6.3}{1.6.3 ``The network name cannot be found''}{section.1.6}
\BOOKMARK [0][-]{chapter.2}{Chapter 2 Fast Start: Cure for Impatience}{part.1}
\BOOKMARK [1][-]{section.2.1}{2.1 Features and Benefits}{chapter.2}
\BOOKMARK [1][-]{section.2.2}{2.2 Description of Example Sites}{chapter.2}
\BOOKMARK [1][-]{section.2.3}{2.3 Worked Examples}{chapter.2}
\BOOKMARK [2][-]{subsection.2.3.1}{2.3.1 Standalone Server}{section.2.3}
\BOOKMARK [3][-]{subsubsection.2.3.1.1}{2.3.1.1 Anonymous Read-Only Document Server}{subsection.2.3.1}
\BOOKMARK [3][-]{subsubsection.2.3.1.2}{2.3.1.2 Anonymous Read-Write Document Server}{subsection.2.3.1}
\BOOKMARK [3][-]{subsubsection.2.3.1.3}{2.3.1.3 Anonymous Print Server}{subsection.2.3.1}
\BOOKMARK [3][-]{subsubsection.2.3.1.4}{2.3.1.4 Secure Read-Write File and Print Server}{subsection.2.3.1}
\BOOKMARK [2][-]{subsection.2.3.2}{2.3.2 Domain Member Server}{section.2.3}
\BOOKMARK [3][-]{subsubsection.2.3.2.1}{2.3.2.1 Example Configuration}{subsection.2.3.2}
\BOOKMARK [2][-]{subsection.2.3.3}{2.3.3 Domain Controller}{section.2.3}
\BOOKMARK [3][-]{subsubsection.2.3.3.1}{2.3.3.1 Example: Engineering Office}{subsection.2.3.3}
\BOOKMARK [3][-]{subsubsection.2.3.3.2}{2.3.3.2 A Big Organization}{subsection.2.3.3}
\BOOKMARK [-1][-]{part.2}{Part II Server Configuration Basics}{}
\BOOKMARK [0][-]{section*.18}{First Steps in Server Configuration}{part.2}
\BOOKMARK [0][-]{chapter.3}{Chapter 3 Server Types and Security Modes}{part.2}
\BOOKMARK [1][-]{section.3.1}{3.1 Features and Benefits}{chapter.3}
\BOOKMARK [1][-]{section.3.2}{3.2 Server Types}{chapter.3}
\BOOKMARK [1][-]{section.3.3}{3.3 Samba Security Modes}{chapter.3}
\BOOKMARK [2][-]{subsection.3.3.1}{3.3.1 User Level Security}{section.3.3}
\BOOKMARK [3][-]{subsubsection.3.3.1.1}{3.3.1.1 Example Configuration}{subsection.3.3.1}
\BOOKMARK [2][-]{subsection.3.3.2}{3.3.2 Share-Level Security}{section.3.3}
\BOOKMARK [3][-]{subsubsection.3.3.2.1}{3.3.2.1 Example Configuration}{subsection.3.3.2}
\BOOKMARK [2][-]{subsection.3.3.3}{3.3.3 Domain Security Mode \(User-Level Security\)}{section.3.3}
\BOOKMARK [3][-]{subsubsection.3.3.3.1}{3.3.3.1 Example Configuration}{subsection.3.3.3}
\BOOKMARK [2][-]{subsection.3.3.4}{3.3.4 ADS Security Mode \(User-Level Security\)}{section.3.3}
\BOOKMARK [3][-]{subsubsection.3.3.4.1}{3.3.4.1 Example Configuration}{subsection.3.3.4}
\BOOKMARK [2][-]{subsection.3.3.5}{3.3.5 Server Security \(User Level Security\)}{section.3.3}
\BOOKMARK [3][-]{subsubsection.3.3.5.1}{3.3.5.1 Example Configuration}{subsection.3.3.5}
\BOOKMARK [1][-]{section.3.4}{3.4 Password Checking}{chapter.3}
\BOOKMARK [1][-]{section.3.5}{3.5 Common Errors}{chapter.3}
\BOOKMARK [2][-]{subsection.3.5.1}{3.5.1 What Makes Samba a Server?}{section.3.5}
\BOOKMARK [2][-]{subsection.3.5.2}{3.5.2 What Makes Samba a Domain Controller?}{section.3.5}
\BOOKMARK [2][-]{subsection.3.5.3}{3.5.3 What Makes Samba a Domain Member?}{section.3.5}
\BOOKMARK [2][-]{subsection.3.5.4}{3.5.4 Constantly Losing Connections to Password Server}{section.3.5}
\BOOKMARK [2][-]{subsection.3.5.5}{3.5.5 Stand-alone Server is converted to Domain Controller --- Now User accounts don't work}{section.3.5}
\BOOKMARK [0][-]{chapter.4}{Chapter 4 Domain Control}{part.2}
\BOOKMARK [1][-]{section.4.1}{4.1 Features and Benefits}{chapter.4}
\BOOKMARK [1][-]{section.4.2}{4.2 Single Sign-On and Domain Security}{chapter.4}
\BOOKMARK [1][-]{section.4.3}{4.3 Basics of Domain Control}{chapter.4}
\BOOKMARK [2][-]{subsection.4.3.1}{4.3.1 Domain Controller Types}{section.4.3}
\BOOKMARK [2][-]{subsection.4.3.2}{4.3.2 Preparing for Domain Control}{section.4.3}
\BOOKMARK [1][-]{section.4.4}{4.4 Domain Control: Example Configuration}{chapter.4}
\BOOKMARK [1][-]{section.4.5}{4.5 Samba ADS Domain Control}{chapter.4}
\BOOKMARK [1][-]{section.4.6}{4.6 Domain and Network Logon Configuration}{chapter.4}
\BOOKMARK [2][-]{subsection.4.6.1}{4.6.1 Domain Network Logon Service}{section.4.6}
\BOOKMARK [3][-]{subsubsection.4.6.1.1}{4.6.1.1 Example Configuration}{subsection.4.6.1}
\BOOKMARK [3][-]{subsubsection.4.6.1.2}{4.6.1.2 The Special Case of MS Windows XP Home Edition}{subsection.4.6.1}
\BOOKMARK [3][-]{subsubsection.4.6.1.3}{4.6.1.3 The Special Case of Windows 9x/Me}{subsection.4.6.1}
\BOOKMARK [2][-]{subsection.4.6.2}{4.6.2 Security Mode and Master Browsers}{section.4.6}
\BOOKMARK [1][-]{section.4.7}{4.7 Common Errors}{chapter.4}
\BOOKMARK [2][-]{subsection.4.7.1}{4.7.1 ``\044'' Cannot Be Included in Machine Name}{section.4.7}
\BOOKMARK [2][-]{subsection.4.7.2}{4.7.2 Joining Domain Fails Because of Existing Machine Account}{section.4.7}
\BOOKMARK [2][-]{subsection.4.7.3}{4.7.3 The System Cannot Log You On \(C000019B\)}{section.4.7}
\BOOKMARK [2][-]{subsection.4.7.4}{4.7.4 The Machine Trust Account Is Not Accessible}{section.4.7}
\BOOKMARK [2][-]{subsection.4.7.5}{4.7.5 Account Disabled}{section.4.7}
\BOOKMARK [2][-]{subsection.4.7.6}{4.7.6 Domain Controller Unavailable}{section.4.7}
\BOOKMARK [2][-]{subsection.4.7.7}{4.7.7 Cannot Log onto Domain Member Workstation After Joining Domain}{section.4.7}
\BOOKMARK [0][-]{chapter.5}{Chapter 5 Backup Domain Control}{part.2}
\BOOKMARK [1][-]{section.5.1}{5.1 Features and Benefits}{chapter.5}
\BOOKMARK [1][-]{section.5.2}{5.2 Essential Background Information}{chapter.5}
\BOOKMARK [2][-]{subsection.5.2.1}{5.2.1 MS Windows NT4-style Domain Control}{section.5.2}
\BOOKMARK [3][-]{subsubsection.5.2.1.1}{5.2.1.1 Example PDC Configuration}{subsection.5.2.1}
\BOOKMARK [2][-]{subsection.5.2.2}{5.2.2 LDAP Configuration Notes}{section.5.2}
\BOOKMARK [2][-]{subsection.5.2.3}{5.2.3 Active Directory Domain Control}{section.5.2}
\BOOKMARK [2][-]{subsection.5.2.4}{5.2.4 What Qualifies a Domain Controller on the Network?}{section.5.2}
\BOOKMARK [2][-]{subsection.5.2.5}{5.2.5 How Does a Workstation find its Domain Controller?}{section.5.2}
\BOOKMARK [3][-]{subsubsection.5.2.5.1}{5.2.5.1 NetBIOS Over TCP/IP Enabled}{subsection.5.2.5}
\BOOKMARK [3][-]{subsubsection.5.2.5.2}{5.2.5.2 NetBIOS Over TCP/IP Disabled}{subsection.5.2.5}
\BOOKMARK [1][-]{section.5.3}{5.3 Backup Domain Controller Configuration}{chapter.5}
\BOOKMARK [2][-]{subsection.5.3.1}{5.3.1 Example Configuration}{section.5.3}
\BOOKMARK [1][-]{section.5.4}{5.4 Common Errors}{chapter.5}
\BOOKMARK [2][-]{subsection.5.4.1}{5.4.1 Machine Accounts Keep Expiring}{section.5.4}
\BOOKMARK [2][-]{subsection.5.4.2}{5.4.2 Can Samba Be a Backup Domain Controller to an NT4 PDC?}{section.5.4}
\BOOKMARK [2][-]{subsection.5.4.3}{5.4.3 How Do I Replicate the smbpasswd File?}{section.5.4}
\BOOKMARK [2][-]{subsection.5.4.4}{5.4.4 Can I Do This All with LDAP?}{section.5.4}
\BOOKMARK [0][-]{chapter.6}{Chapter 6 Domain Membership}{part.2}
\BOOKMARK [1][-]{section.6.1}{6.1 Features and Benefits}{chapter.6}
\BOOKMARK [1][-]{section.6.2}{6.2 MS Windows Workstation/Server Machine Trust Accounts}{chapter.6}
\BOOKMARK [2][-]{subsection.6.2.1}{6.2.1 Manual Creation of Machine Trust Accounts}{section.6.2}
\BOOKMARK [2][-]{subsection.6.2.2}{6.2.2 Managing Domain Machine Accounts using NT4 Server Manager}{section.6.2}
\BOOKMARK [2][-]{subsection.6.2.3}{6.2.3 On-the-Fly Creation of Machine Trust Accounts}{section.6.2}
\BOOKMARK [2][-]{subsection.6.2.4}{6.2.4 Making an MS Windows Workstation or Server a Domain Member}{section.6.2}
\BOOKMARK [3][-]{subsubsection.6.2.4.1}{6.2.4.1 Windows 200x/XP Professional Client}{subsection.6.2.4}
\BOOKMARK [3][-]{subsubsection.6.2.4.2}{6.2.4.2 Windows NT4 Client}{subsection.6.2.4}
\BOOKMARK [3][-]{subsubsection.6.2.4.3}{6.2.4.3 Samba Client}{subsection.6.2.4}
\BOOKMARK [1][-]{section.6.3}{6.3 Domain Member Server}{chapter.6}
\BOOKMARK [2][-]{subsection.6.3.1}{6.3.1 Joining an NT4-type Domain with Samba-3}{section.6.3}
\BOOKMARK [2][-]{subsection.6.3.2}{6.3.2 Why Is This Better Than security = server?}{section.6.3}
\BOOKMARK [1][-]{section.6.4}{6.4 Samba ADS Domain Membership}{chapter.6}
\BOOKMARK [2][-]{subsection.6.4.1}{6.4.1 Configure smb.conf}{section.6.4}
\BOOKMARK [2][-]{subsection.6.4.2}{6.4.2 Configure /etc/krb5.conf}{section.6.4}
\BOOKMARK [2][-]{subsection.6.4.3}{6.4.3 Create the Computer Account}{section.6.4}
\BOOKMARK [3][-]{subsubsection.6.4.3.1}{6.4.3.1 Possible Errors}{subsection.6.4.3}
\BOOKMARK [2][-]{subsection.6.4.4}{6.4.4 Testing Server Setup}{section.6.4}
\BOOKMARK [2][-]{subsection.6.4.5}{6.4.5 Testing with smbclient}{section.6.4}
\BOOKMARK [2][-]{subsection.6.4.6}{6.4.6 Notes}{section.6.4}
\BOOKMARK [1][-]{section.6.5}{6.5 Sharing User ID Mappings between Samba Domain Members}{chapter.6}
\BOOKMARK [1][-]{section.6.6}{6.6 Common Errors}{chapter.6}
\BOOKMARK [2][-]{subsection.6.6.1}{6.6.1 Cannot Add Machine Back to Domain}{section.6.6}
\BOOKMARK [2][-]{subsection.6.6.2}{6.6.2 Adding Machine to Domain Fails}{section.6.6}
\BOOKMARK [2][-]{subsection.6.6.3}{6.6.3 I Can't Join a Windows 2003 PDC}{section.6.6}
\BOOKMARK [0][-]{chapter.7}{Chapter 7 Standalone Servers}{part.2}
\BOOKMARK [1][-]{section.7.1}{7.1 Features and Benefits}{chapter.7}
\BOOKMARK [1][-]{section.7.2}{7.2 Background}{chapter.7}
\BOOKMARK [1][-]{section.7.3}{7.3 Example Configuration}{chapter.7}
\BOOKMARK [2][-]{subsection.7.3.1}{7.3.1 Reference Documentation Server}{section.7.3}
\BOOKMARK [2][-]{subsection.7.3.2}{7.3.2 Central Print Serving}{section.7.3}
\BOOKMARK [1][-]{section.7.4}{7.4 Common Errors}{chapter.7}
\BOOKMARK [0][-]{chapter.8}{Chapter 8 MS Windows Network Configuration Guide}{part.2}
\BOOKMARK [1][-]{section.8.1}{8.1 Features and Benefits}{chapter.8}
\BOOKMARK [1][-]{section.8.2}{8.2 Technical Details}{chapter.8}
\BOOKMARK [2][-]{subsection.8.2.1}{8.2.1 TCP/IP Configuration}{section.8.2}
\BOOKMARK [3][-]{subsubsection.8.2.1.1}{8.2.1.1 MS Windows XP Professional}{subsection.8.2.1}
\BOOKMARK [3][-]{subsubsection.8.2.1.2}{8.2.1.2 MS Windows 2000}{subsection.8.2.1}
\BOOKMARK [3][-]{subsubsection.8.2.1.3}{8.2.1.3 MS Windows Me}{subsection.8.2.1}
\BOOKMARK [2][-]{subsection.8.2.2}{8.2.2 Joining a Domain: Windows 2000/XP Professional}{section.8.2}
\BOOKMARK [2][-]{subsection.8.2.3}{8.2.3 Domain Logon Configuration: Windows 9x/Me}{section.8.2}
\BOOKMARK [1][-]{section.8.3}{8.3 Common Errors}{chapter.8}
\BOOKMARK [-1][-]{part.3}{Part III Advanced Configuration}{}
\BOOKMARK [0][-]{section*.20}{Valuable Nuts and Bolts Information}{part.3}
\BOOKMARK [0][-]{chapter.9}{Chapter 9 Important and Critical Change Notes for the Samba 3.x Series}{part.3}
\BOOKMARK [1][-]{section.9.1}{9.1 Important Samba-3.2.x Change Notes}{chapter.9}
\BOOKMARK [1][-]{section.9.2}{9.2 Important Samba-3.0.x Change Notes}{chapter.9}
\BOOKMARK [2][-]{subsection.9.2.1}{9.2.1 User and Group Changes}{section.9.2}
\BOOKMARK [2][-]{subsection.9.2.2}{9.2.2 Essential Group Mappings}{section.9.2}
\BOOKMARK [2][-]{subsection.9.2.3}{9.2.3 Passdb Changes}{section.9.2}
\BOOKMARK [2][-]{subsection.9.2.4}{9.2.4 Group Mapping Changes in Samba-3.0.23}{section.9.2}
\BOOKMARK [2][-]{subsection.9.2.5}{9.2.5 LDAP Changes in Samba-3.0.23}{section.9.2}
\BOOKMARK [0][-]{chapter.10}{Chapter 10 Network Browsing}{part.3}
\BOOKMARK [1][-]{section.10.1}{10.1 Features and Benefits}{chapter.10}
\BOOKMARK [1][-]{section.10.2}{10.2 What Is Browsing?}{chapter.10}
\BOOKMARK [1][-]{section.10.3}{10.3 Discussion}{chapter.10}
\BOOKMARK [2][-]{subsection.10.3.1}{10.3.1 NetBIOS over TCP/IP}{section.10.3}
\BOOKMARK [2][-]{subsection.10.3.2}{10.3.2 TCP/IP without NetBIOS}{section.10.3}
\BOOKMARK [2][-]{subsection.10.3.3}{10.3.3 DNS and Active Directory}{section.10.3}
\BOOKMARK [1][-]{section.10.4}{10.4 How Browsing Functions}{chapter.10}
\BOOKMARK [2][-]{subsection.10.4.1}{10.4.1 Configuring Workgroup Browsing}{section.10.4}
\BOOKMARK [2][-]{subsection.10.4.2}{10.4.2 Domain Browsing Configuration}{section.10.4}
\BOOKMARK [2][-]{subsection.10.4.3}{10.4.3 Forcing Samba to Be the Master}{section.10.4}
\BOOKMARK [2][-]{subsection.10.4.4}{10.4.4 Making Samba the Domain Master}{section.10.4}
\BOOKMARK [2][-]{subsection.10.4.5}{10.4.5 Note about Broadcast Addresses}{section.10.4}
\BOOKMARK [2][-]{subsection.10.4.6}{10.4.6 Multiple Interfaces}{section.10.4}
\BOOKMARK [2][-]{subsection.10.4.7}{10.4.7 Use of the Remote Announce Parameter}{section.10.4}
\BOOKMARK [2][-]{subsection.10.4.8}{10.4.8 Use of the Remote Browse Sync Parameter}{section.10.4}
\BOOKMARK [1][-]{section.10.5}{10.5 WINS: The Windows Internetworking Name Server}{chapter.10}
\BOOKMARK [2][-]{subsection.10.5.1}{10.5.1 WINS Server Configuration}{section.10.5}
\BOOKMARK [2][-]{subsection.10.5.2}{10.5.2 WINS Replication}{section.10.5}
\BOOKMARK [2][-]{subsection.10.5.3}{10.5.3 Static WINS Entries}{section.10.5}
\BOOKMARK [1][-]{section.10.6}{10.6 Helpful Hints}{chapter.10}
\BOOKMARK [2][-]{subsection.10.6.1}{10.6.1 Windows Networking Protocols}{section.10.6}
\BOOKMARK [2][-]{subsection.10.6.2}{10.6.2 Name Resolution Order}{section.10.6}
\BOOKMARK [1][-]{section.10.7}{10.7 Technical Overview of Browsing}{chapter.10}
\BOOKMARK [2][-]{subsection.10.7.1}{10.7.1 Browsing Support in Samba}{section.10.7}
\BOOKMARK [2][-]{subsection.10.7.2}{10.7.2 Problem Resolution}{section.10.7}
\BOOKMARK [2][-]{subsection.10.7.3}{10.7.3 Cross-Subnet Browsing}{section.10.7}
\BOOKMARK [3][-]{subsubsection.10.7.3.1}{10.7.3.1 Behavior of Cross-Subnet Browsing}{subsection.10.7.3}
\BOOKMARK [1][-]{section.10.8}{10.8 Common Errors}{chapter.10}
\BOOKMARK [2][-]{subsection.10.8.1}{10.8.1 Flushing the Samba NetBIOS Name Cache}{section.10.8}
\BOOKMARK [2][-]{subsection.10.8.2}{10.8.2 Server Resources Cannot Be Listed}{section.10.8}
\BOOKMARK [2][-]{subsection.10.8.3}{10.8.3 I Get an "Unable to browse the network" Error}{section.10.8}
\BOOKMARK [2][-]{subsection.10.8.4}{10.8.4 Browsing of Shares and Directories is Very Slow}{section.10.8}
\BOOKMARK [2][-]{subsection.10.8.5}{10.8.5 Invalid Cached Share References Affects Network Browsing}{section.10.8}
\BOOKMARK [0][-]{chapter.11}{Chapter 11 Account Information Databases}{part.3}
\BOOKMARK [1][-]{section.11.1}{11.1 Features and Benefits}{chapter.11}
\BOOKMARK [2][-]{subsection.11.1.1}{11.1.1 Backward Compatibility Account Storage Systems}{section.11.1}
\BOOKMARK [2][-]{subsection.11.1.2}{11.1.2 New Account Storage Systems}{section.11.1}
\BOOKMARK [1][-]{section.11.2}{11.2 Technical Information}{chapter.11}
\BOOKMARK [2][-]{subsection.11.2.1}{11.2.1 Important Notes About Security}{section.11.2}
\BOOKMARK [3][-]{subsubsection.11.2.1.1}{11.2.1.1 Advantages of Encrypted Passwords}{subsection.11.2.1}
\BOOKMARK [3][-]{subsubsection.11.2.1.2}{11.2.1.2 Advantages of Non-Encrypted Passwords}{subsection.11.2.1}
\BOOKMARK [2][-]{subsection.11.2.2}{11.2.2 Mapping User Identifiers between MS Windows and UNIX}{section.11.2}
\BOOKMARK [2][-]{subsection.11.2.3}{11.2.3 Mapping Common UIDs/GIDs on Distributed Machines}{section.11.2}
\BOOKMARK [2][-]{subsection.11.2.4}{11.2.4 Comments Regarding LDAP}{section.11.2}
\BOOKMARK [3][-]{subsubsection.11.2.4.1}{11.2.4.1 Caution Regarding LDAP and Samba}{subsection.11.2.4}
\BOOKMARK [2][-]{subsection.11.2.5}{11.2.5 LDAP Directories and Windows Computer Accounts}{section.11.2}
\BOOKMARK [1][-]{section.11.3}{11.3 Account Management Tools}{chapter.11}
\BOOKMARK [2][-]{subsection.11.3.1}{11.3.1 The smbpasswd Tool}{section.11.3}
\BOOKMARK [2][-]{subsection.11.3.2}{11.3.2 The pdbedit Tool}{section.11.3}
\BOOKMARK [3][-]{subsubsection.11.3.2.1}{11.3.2.1 User Account Management}{subsection.11.3.2}
\BOOKMARK [3][-]{subsubsection.11.3.2.2}{11.3.2.2 Account Import/Export}{subsection.11.3.2}
\BOOKMARK [1][-]{section.11.4}{11.4 Password Backends}{chapter.11}
\BOOKMARK [2][-]{subsection.11.4.1}{11.4.1 Plaintext}{section.11.4}
\BOOKMARK [2][-]{subsection.11.4.2}{11.4.2 smbpasswd: Encrypted Password Database}{section.11.4}
\BOOKMARK [2][-]{subsection.11.4.3}{11.4.3 tdbsam}{section.11.4}
\BOOKMARK [2][-]{subsection.11.4.4}{11.4.4 ldapsam}{section.11.4}
\BOOKMARK [3][-]{subsubsection.11.4.4.1}{11.4.4.1 Supported LDAP Servers}{subsection.11.4.4}
\BOOKMARK [3][-]{subsubsection.11.4.4.2}{11.4.4.2 Schema and Relationship to the RFC 2307 posixAccount}{subsection.11.4.4}
\BOOKMARK [3][-]{subsubsection.11.4.4.3}{11.4.4.3 OpenLDAP Configuration}{subsection.11.4.4}
\BOOKMARK [3][-]{subsubsection.11.4.4.4}{11.4.4.4 Initialize the LDAP Database}{subsection.11.4.4}
\BOOKMARK [3][-]{subsubsection.11.4.4.5}{11.4.4.5 Configuring Samba}{subsection.11.4.4}
\BOOKMARK [3][-]{subsubsection.11.4.4.6}{11.4.4.6 Accounts and Groups Management}{subsection.11.4.4}
\BOOKMARK [3][-]{subsubsection.11.4.4.7}{11.4.4.7 Security and sambaSamAccount}{subsection.11.4.4}
\BOOKMARK [3][-]{subsubsection.11.4.4.8}{11.4.4.8 LDAP Special Attributes for sambaSamAccounts}{subsection.11.4.4}
\BOOKMARK [3][-]{subsubsection.11.4.4.9}{11.4.4.9 Example LDIF Entries for a sambaSamAccount}{subsection.11.4.4}
\BOOKMARK [3][-]{subsubsection.11.4.4.10}{11.4.4.10 Password Synchronization}{subsection.11.4.4}
\BOOKMARK [3][-]{subsubsection.11.4.4.11}{11.4.4.11 Using OpenLDAP Overlay for Password Syncronization}{subsection.11.4.4}
\BOOKMARK [1][-]{section.11.5}{11.5 Common Errors}{chapter.11}
\BOOKMARK [2][-]{subsection.11.5.1}{11.5.1 Users Cannot Logon}{section.11.5}
\BOOKMARK [2][-]{subsection.11.5.2}{11.5.2 Configuration of auth methods}{section.11.5}
\BOOKMARK [0][-]{chapter.12}{Chapter 12 Group Mapping: MS Windows and UNIX}{part.3}
\BOOKMARK [1][-]{section.12.1}{12.1 Features and Benefits}{chapter.12}
\BOOKMARK [1][-]{section.12.2}{12.2 Discussion}{chapter.12}
\BOOKMARK [2][-]{subsection.12.2.1}{12.2.1 Warning: User Private Group Problems}{section.12.2}
\BOOKMARK [2][-]{subsection.12.2.2}{12.2.2 Nested Groups: Adding Windows Domain Groups to Windows Local Groups}{section.12.2}
\BOOKMARK [2][-]{subsection.12.2.3}{12.2.3 Important Administrative Information}{section.12.2}
\BOOKMARK [3][-]{subsubsection.12.2.3.1}{12.2.3.1 Applicable Only to Versions Earlier than 3.0.11}{subsection.12.2.3}
\BOOKMARK [2][-]{subsection.12.2.4}{12.2.4 Default Users, Groups, and Relative Identifiers}{section.12.2}
\BOOKMARK [2][-]{subsection.12.2.5}{12.2.5 Example Configuration}{section.12.2}
\BOOKMARK [1][-]{section.12.3}{12.3 Configuration Scripts}{chapter.12}
\BOOKMARK [2][-]{subsection.12.3.1}{12.3.1 Sample smb.conf Add Group Script}{section.12.3}
\BOOKMARK [2][-]{subsection.12.3.2}{12.3.2 Script to Configure Group Mapping}{section.12.3}
\BOOKMARK [1][-]{section.12.4}{12.4 Common Errors}{chapter.12}
\BOOKMARK [2][-]{subsection.12.4.1}{12.4.1 Adding Groups Fails}{section.12.4}
\BOOKMARK [2][-]{subsection.12.4.2}{12.4.2 Adding Domain Users to the Workstation Power Users Group}{section.12.4}
\BOOKMARK [0][-]{chapter.13}{Chapter 13 Remote and Local Management: The Net Command}{part.3}
\BOOKMARK [1][-]{section.13.1}{13.1 Overview}{chapter.13}
\BOOKMARK [1][-]{section.13.2}{13.2 Administrative Tasks and Methods}{chapter.13}
\BOOKMARK [1][-]{section.13.3}{13.3 UNIX and Windows Group Management}{chapter.13}
\BOOKMARK [2][-]{subsection.13.3.1}{13.3.1 Adding, Renaming, or Deletion of Group Accounts}{section.13.3}
\BOOKMARK [3][-]{subsubsection.13.3.1.1}{13.3.1.1 Adding or Creating a New Group}{subsection.13.3.1}
\BOOKMARK [3][-]{subsubsection.13.3.1.2}{13.3.1.2 Mapping Windows Groups to UNIX Groups}{subsection.13.3.1}
\BOOKMARK [3][-]{subsubsection.13.3.1.3}{13.3.1.3 Deleting a Group Account}{subsection.13.3.1}
\BOOKMARK [3][-]{subsubsection.13.3.1.4}{13.3.1.4 Rename Group Accounts}{subsection.13.3.1}
\BOOKMARK [2][-]{subsection.13.3.2}{13.3.2 Manipulating Group Memberships}{section.13.3}
\BOOKMARK [2][-]{subsection.13.3.3}{13.3.3 Nested Group Support}{section.13.3}
\BOOKMARK [3][-]{subsubsection.13.3.3.1}{13.3.3.1 Managing Nest Groups on Workstations from the Samba Server}{subsection.13.3.3}
\BOOKMARK [1][-]{section.13.4}{13.4 UNIX and Windows User Management}{chapter.13}
\BOOKMARK [2][-]{subsection.13.4.1}{13.4.1 Adding User Accounts}{section.13.4}
\BOOKMARK [2][-]{subsection.13.4.2}{13.4.2 Deletion of User Accounts}{section.13.4}
\BOOKMARK [2][-]{subsection.13.4.3}{13.4.3 Managing User Accounts}{section.13.4}
\BOOKMARK [2][-]{subsection.13.4.4}{13.4.4 User Mapping}{section.13.4}
\BOOKMARK [1][-]{section.13.5}{13.5 Administering User Rights and Privileges}{chapter.13}
\BOOKMARK [1][-]{section.13.6}{13.6 Managing Trust Relationships}{chapter.13}
\BOOKMARK [2][-]{subsection.13.6.1}{13.6.1 Machine Trust Accounts}{section.13.6}
\BOOKMARK [2][-]{subsection.13.6.2}{13.6.2 Interdomain Trusts}{section.13.6}
\BOOKMARK [1][-]{section.13.7}{13.7 Managing Security Identifiers \(SIDS\)}{chapter.13}
\BOOKMARK [1][-]{section.13.8}{13.8 Share Management}{chapter.13}
\BOOKMARK [2][-]{subsection.13.8.1}{13.8.1 Creating, Editing, and Removing Shares}{section.13.8}
\BOOKMARK [2][-]{subsection.13.8.2}{13.8.2 Creating and Changing Share ACLs}{section.13.8}
\BOOKMARK [2][-]{subsection.13.8.3}{13.8.3 Share, Directory, and File Migration}{section.13.8}
\BOOKMARK [3][-]{subsubsection.13.8.3.1}{13.8.3.1 Share Migration}{subsection.13.8.3}
\BOOKMARK [3][-]{subsubsection.13.8.3.2}{13.8.3.2 File and Directory Migration}{subsection.13.8.3}
\BOOKMARK [3][-]{subsubsection.13.8.3.3}{13.8.3.3 Share-ACL Migration}{subsection.13.8.3}
\BOOKMARK [3][-]{subsubsection.13.8.3.4}{13.8.3.4 Simultaneous Share and File Migration}{subsection.13.8.3}
\BOOKMARK [2][-]{subsection.13.8.4}{13.8.4 Printer Migration}{section.13.8}
\BOOKMARK [1][-]{section.13.9}{13.9 Controlling Open Files}{chapter.13}
\BOOKMARK [1][-]{section.13.10}{13.10 Session and Connection Management}{chapter.13}
\BOOKMARK [1][-]{section.13.11}{13.11 Printers and ADS}{chapter.13}
\BOOKMARK [1][-]{section.13.12}{13.12 Manipulating the Samba Cache}{chapter.13}
\BOOKMARK [1][-]{section.13.13}{13.13 Managing IDMAP UID/SID Mappings}{chapter.13}
\BOOKMARK [2][-]{subsection.13.13.1}{13.13.1 Creating an IDMAP Database Dump File}{section.13.13}
\BOOKMARK [2][-]{subsection.13.13.2}{13.13.2 Restoring the IDMAP Database Dump File}{section.13.13}
\BOOKMARK [1][-]{section.13.14}{13.14 Other Miscellaneous Operations}{chapter.13}
\BOOKMARK [0][-]{chapter.14}{Chapter 14 Identity Mapping \(IDMAP\)}{part.3}
\BOOKMARK [1][-]{section.14.1}{14.1 Samba Server Deployment Types and IDMAP}{chapter.14}
\BOOKMARK [2][-]{subsection.14.1.1}{14.1.1 Standalone Samba Server}{section.14.1}
\BOOKMARK [2][-]{subsection.14.1.2}{14.1.2 Domain Member Server or Domain Member Client}{section.14.1}
\BOOKMARK [2][-]{subsection.14.1.3}{14.1.3 Primary Domain Controller}{section.14.1}
\BOOKMARK [2][-]{subsection.14.1.4}{14.1.4 Backup Domain Controller}{section.14.1}
\BOOKMARK [1][-]{section.14.2}{14.2 Examples of IDMAP Backend Usage}{chapter.14}
\BOOKMARK [2][-]{subsection.14.2.1}{14.2.1 Default Winbind TDB}{section.14.2}
\BOOKMARK [3][-]{subsubsection.14.2.1.1}{14.2.1.1 NT4-Style Domains \(Includes Samba Domains\)}{subsection.14.2.1}
\BOOKMARK [3][-]{subsubsection.14.2.1.2}{14.2.1.2 ADS Domains}{subsection.14.2.1}
\BOOKMARK [2][-]{subsection.14.2.2}{14.2.2 IDMAP\137RID with Winbind}{section.14.2}
\BOOKMARK [2][-]{subsection.14.2.3}{14.2.3 IDMAP Storage in LDAP Using Winbind}{section.14.2}
\BOOKMARK [2][-]{subsection.14.2.4}{14.2.4 IDMAP and NSS Using LDAP from ADS with RFC2307bis Schema Extension}{section.14.2}
\BOOKMARK [3][-]{subsubsection.14.2.4.1}{14.2.4.1 IDMAP, Active Directory, and MS Services for UNIX 3.5}{subsection.14.2.4}
\BOOKMARK [3][-]{subsubsection.14.2.4.2}{14.2.4.2 IDMAP, Active Directory and AD4UNIX}{subsection.14.2.4}
\BOOKMARK [0][-]{chapter.15}{Chapter 15 User Rights and Privileges}{part.3}
\BOOKMARK [1][-]{section.15.1}{15.1 Rights Management Capabilities}{chapter.15}
\BOOKMARK [2][-]{subsection.15.1.1}{15.1.1 Using the ``net rpc rights'' Utility}{section.15.1}
\BOOKMARK [2][-]{subsection.15.1.2}{15.1.2 Description of Privileges}{section.15.1}
\BOOKMARK [2][-]{subsection.15.1.3}{15.1.3 Privileges Suppored by Windows 2000 Domain Controllers}{section.15.1}
\BOOKMARK [1][-]{section.15.2}{15.2 The Administrator Domain SID}{chapter.15}
\BOOKMARK [1][-]{section.15.3}{15.3 Common Errors}{chapter.15}
\BOOKMARK [2][-]{subsection.15.3.1}{15.3.1 What Rights and Privileges Will Permit Windows Client Administration?}{section.15.3}
\BOOKMARK [0][-]{chapter.16}{Chapter 16 File, Directory, and Share Access Controls}{part.3}
\BOOKMARK [1][-]{section.16.1}{16.1 Features and Benefits}{chapter.16}
\BOOKMARK [1][-]{section.16.2}{16.2 File System Access Controls}{chapter.16}
\BOOKMARK [2][-]{subsection.16.2.1}{16.2.1 MS Windows NTFS Comparison with UNIX File Systems}{section.16.2}
\BOOKMARK [2][-]{subsection.16.2.2}{16.2.2 Managing Directories}{section.16.2}
\BOOKMARK [2][-]{subsection.16.2.3}{16.2.3 File and Directory Access Control}{section.16.2}
\BOOKMARK [3][-]{subsubsection.16.2.3.1}{16.2.3.1 Protecting Directories and Files from Deletion}{subsection.16.2.3}
\BOOKMARK [1][-]{section.16.3}{16.3 Share Definition Access Controls}{chapter.16}
\BOOKMARK [2][-]{subsection.16.3.1}{16.3.1 User- and Group-Based Controls}{section.16.3}
\BOOKMARK [2][-]{subsection.16.3.2}{16.3.2 File and Directory Permissions-Based Controls}{section.16.3}
\BOOKMARK [2][-]{subsection.16.3.3}{16.3.3 Miscellaneous Controls}{section.16.3}
\BOOKMARK [1][-]{section.16.4}{16.4 Access Controls on Shares}{chapter.16}
\BOOKMARK [2][-]{subsection.16.4.1}{16.4.1 Share Permissions Management}{section.16.4}
\BOOKMARK [3][-]{subsubsection.16.4.1.1}{16.4.1.1 Windows NT4 Workstation/Server}{subsection.16.4.1}
\BOOKMARK [3][-]{subsubsection.16.4.1.2}{16.4.1.2 Windows 200x/XP}{subsection.16.4.1}
\BOOKMARK [1][-]{section.16.5}{16.5 MS Windows Access Control Lists and UNIX Interoperability}{chapter.16}
\BOOKMARK [2][-]{subsection.16.5.1}{16.5.1 Managing UNIX Permissions Using NT Security Dialogs}{section.16.5}
\BOOKMARK [2][-]{subsection.16.5.2}{16.5.2 Viewing File Security on a Samba Share}{section.16.5}
\BOOKMARK [2][-]{subsection.16.5.3}{16.5.3 Viewing File Ownership}{section.16.5}
\BOOKMARK [2][-]{subsection.16.5.4}{16.5.4 Viewing File or Directory Permissions}{section.16.5}
\BOOKMARK [3][-]{subsubsection.16.5.4.1}{16.5.4.1 File Permissions}{subsection.16.5.4}
\BOOKMARK [3][-]{subsubsection.16.5.4.2}{16.5.4.2 Directory Permissions}{subsection.16.5.4}
\BOOKMARK [2][-]{subsection.16.5.5}{16.5.5 Modifying File or Directory Permissions}{section.16.5}
\BOOKMARK [2][-]{subsection.16.5.6}{16.5.6 Interaction with the Standard Samba ``create mask'' Parameters}{section.16.5}
\BOOKMARK [2][-]{subsection.16.5.7}{16.5.7 Interaction with the Standard Samba File Attribute Mapping}{section.16.5}
\BOOKMARK [2][-]{subsection.16.5.8}{16.5.8 Windows NT/200X ACLs and POSIX ACLs Limitations}{section.16.5}
\BOOKMARK [3][-]{subsubsection.16.5.8.1}{16.5.8.1 UNIX POSIX ACL Overview}{subsection.16.5.8}
\BOOKMARK [3][-]{subsubsection.16.5.8.2}{16.5.8.2 Mapping of Windows File ACLs to UNIX POSIX ACLs}{subsection.16.5.8}
\BOOKMARK [3][-]{subsubsection.16.5.8.3}{16.5.8.3 Mapping of Windows Directory ACLs to UNIX POSIX ACLs}{subsection.16.5.8}
\BOOKMARK [1][-]{section.16.6}{16.6 Common Errors}{chapter.16}
\BOOKMARK [2][-]{subsection.16.6.1}{16.6.1 Users Cannot Write to a Public Share}{section.16.6}
\BOOKMARK [2][-]{subsection.16.6.2}{16.6.2 File Operations Done as root with force user Set}{section.16.6}
\BOOKMARK [2][-]{subsection.16.6.3}{16.6.3 MS Word with Samba Changes Owner of File}{section.16.6}
\BOOKMARK [0][-]{chapter.17}{Chapter 17 File and Record Locking}{part.3}
\BOOKMARK [1][-]{section.17.1}{17.1 Features and Benefits}{chapter.17}
\BOOKMARK [1][-]{section.17.2}{17.2 Discussion}{chapter.17}
\BOOKMARK [2][-]{subsection.17.2.1}{17.2.1 Opportunistic Locking Overview}{section.17.2}
\BOOKMARK [3][-]{subsubsection.17.2.1.1}{17.2.1.1 Exclusively Accessed Shares}{subsection.17.2.1}
\BOOKMARK [3][-]{subsubsection.17.2.1.2}{17.2.1.2 Multiple-Accessed Shares or Files}{subsection.17.2.1}
\BOOKMARK [3][-]{subsubsection.17.2.1.3}{17.2.1.3 UNIX or NFS Client-Accessed Files}{subsection.17.2.1}
\BOOKMARK [3][-]{subsubsection.17.2.1.4}{17.2.1.4 Slow and/or Unreliable Networks}{subsection.17.2.1}
\BOOKMARK [3][-]{subsubsection.17.2.1.5}{17.2.1.5 Multiuser Databases}{subsection.17.2.1}
\BOOKMARK [3][-]{subsubsection.17.2.1.6}{17.2.1.6 PDM Data Shares}{subsection.17.2.1}
\BOOKMARK [3][-]{subsubsection.17.2.1.7}{17.2.1.7 Beware of Force User}{subsection.17.2.1}
\BOOKMARK [3][-]{subsubsection.17.2.1.8}{17.2.1.8 Advanced Samba Oplocks Parameters}{subsection.17.2.1}
\BOOKMARK [3][-]{subsubsection.17.2.1.9}{17.2.1.9 Mission-Critical, High-Availability}{subsection.17.2.1}
\BOOKMARK [1][-]{section.17.3}{17.3 Samba Oplocks Control}{chapter.17}
\BOOKMARK [2][-]{subsection.17.3.1}{17.3.1 Example Configuration}{section.17.3}
\BOOKMARK [3][-]{subsubsection.17.3.1.1}{17.3.1.1 Disabling Oplocks}{subsection.17.3.1}
\BOOKMARK [3][-]{subsubsection.17.3.1.2}{17.3.1.2 Disabling Kernel Oplocks}{subsection.17.3.1}
\BOOKMARK [1][-]{section.17.4}{17.4 MS Windows Oplocks and Caching Controls}{chapter.17}
\BOOKMARK [2][-]{subsection.17.4.1}{17.4.1 Workstation Service Entries}{section.17.4}
\BOOKMARK [2][-]{subsection.17.4.2}{17.4.2 Server Service Entries}{section.17.4}
\BOOKMARK [1][-]{section.17.5}{17.5 Persistent Data Corruption}{chapter.17}
\BOOKMARK [1][-]{section.17.6}{17.6 Common Errors}{chapter.17}
\BOOKMARK [2][-]{subsection.17.6.1}{17.6.1 locking.tdb Error Messages}{section.17.6}
\BOOKMARK [2][-]{subsection.17.6.2}{17.6.2 Problems Saving Files in MS Office on Windows XP}{section.17.6}
\BOOKMARK [2][-]{subsection.17.6.3}{17.6.3 Long Delays Deleting Files over Network with XP SP1}{section.17.6}
\BOOKMARK [1][-]{section.17.7}{17.7 Additional Reading}{chapter.17}
\BOOKMARK [0][-]{chapter.18}{Chapter 18 Securing Samba}{part.3}
\BOOKMARK [1][-]{section.18.1}{18.1 Introduction}{chapter.18}
\BOOKMARK [1][-]{section.18.2}{18.2 Features and Benefits}{chapter.18}
\BOOKMARK [1][-]{section.18.3}{18.3 Technical Discussion of Protective Measures and Issues}{chapter.18}
\BOOKMARK [2][-]{subsection.18.3.1}{18.3.1 Using Host-Based Protection}{section.18.3}
\BOOKMARK [2][-]{subsection.18.3.2}{18.3.2 User-Based Protection}{section.18.3}
\BOOKMARK [2][-]{subsection.18.3.3}{18.3.3 Using Interface Protection}{section.18.3}
\BOOKMARK [2][-]{subsection.18.3.4}{18.3.4 Using a Firewall}{section.18.3}
\BOOKMARK [2][-]{subsection.18.3.5}{18.3.5 Using IPC\044 Share-Based Denials}{section.18.3}
\BOOKMARK [2][-]{subsection.18.3.6}{18.3.6 NTLMv2 Security}{section.18.3}
\BOOKMARK [1][-]{section.18.4}{18.4 Upgrading Samba}{chapter.18}
\BOOKMARK [1][-]{section.18.5}{18.5 Common Errors}{chapter.18}
\BOOKMARK [2][-]{subsection.18.5.1}{18.5.1 Smbclient Works on Localhost, but the Network Is Dead}{section.18.5}
\BOOKMARK [2][-]{subsection.18.5.2}{18.5.2 Why Can Users Access Other Users' Home Directories?}{section.18.5}
\BOOKMARK [0][-]{chapter.19}{Chapter 19 Interdomain Trust Relationships}{part.3}
\BOOKMARK [1][-]{section.19.1}{19.1 Features and Benefits}{chapter.19}
\BOOKMARK [1][-]{section.19.2}{19.2 Trust Relationship Background}{chapter.19}
\BOOKMARK [1][-]{section.19.3}{19.3 Native MS Windows NT4 Trusts Configuration}{chapter.19}
\BOOKMARK [2][-]{subsection.19.3.1}{19.3.1 Creating an NT4 Domain Trust}{section.19.3}
\BOOKMARK [2][-]{subsection.19.3.2}{19.3.2 Completing an NT4 Domain Trust}{section.19.3}
\BOOKMARK [2][-]{subsection.19.3.3}{19.3.3 Interdomain Trust Facilities}{section.19.3}
\BOOKMARK [1][-]{section.19.4}{19.4 Configuring Samba NT-Style Domain Trusts}{chapter.19}
\BOOKMARK [2][-]{subsection.19.4.1}{19.4.1 Samba as the Trusted Domain}{section.19.4}
\BOOKMARK [2][-]{subsection.19.4.2}{19.4.2 Samba as the Trusting Domain}{section.19.4}
\BOOKMARK [1][-]{section.19.5}{19.5 NT4-Style Domain Trusts with Windows 2000}{chapter.19}
\BOOKMARK [1][-]{section.19.6}{19.6 Common Errors}{chapter.19}
\BOOKMARK [2][-]{subsection.19.6.1}{19.6.1 Browsing of Trusted Domain Fails}{section.19.6}
\BOOKMARK [2][-]{subsection.19.6.2}{19.6.2 Problems with LDAP ldapsam and Older Versions of smbldap-tools}{section.19.6}
\BOOKMARK [0][-]{chapter.20}{Chapter 20 Hosting a Microsoft Distributed File System Tree}{part.3}
\BOOKMARK [1][-]{section.20.1}{20.1 Features and Benefits}{chapter.20}
\BOOKMARK [1][-]{section.20.2}{20.2 Common Errors}{chapter.20}
\BOOKMARK [2][-]{subsection.20.2.1}{20.2.1 MSDFS UNIX Path Is Case-Critical}{section.20.2}
\BOOKMARK [0][-]{chapter.21}{Chapter 21 Classical Printing Support}{part.3}
\BOOKMARK [1][-]{section.21.1}{21.1 Features and Benefits}{chapter.21}
\BOOKMARK [1][-]{section.21.2}{21.2 Technical Introduction}{chapter.21}
\BOOKMARK [2][-]{subsection.21.2.1}{21.2.1 Client to Samba Print Job Processing}{section.21.2}
\BOOKMARK [2][-]{subsection.21.2.2}{21.2.2 Printing-Related Configuration Parameters}{section.21.2}
\BOOKMARK [1][-]{section.21.3}{21.3 Simple Print Configuration}{chapter.21}
\BOOKMARK [2][-]{subsection.21.3.1}{21.3.1 Verifying Configuration with testparm}{section.21.3}
\BOOKMARK [2][-]{subsection.21.3.2}{21.3.2 Rapid Configuration Validation}{section.21.3}
\BOOKMARK [1][-]{section.21.4}{21.4 Extended Printing Configuration}{chapter.21}
\BOOKMARK [2][-]{subsection.21.4.1}{21.4.1 Detailed Explanation Settings}{section.21.4}
\BOOKMARK [3][-]{subsubsection.21.4.1.1}{21.4.1.1 The [global] Section}{subsection.21.4.1}
\BOOKMARK [3][-]{subsubsection.21.4.1.2}{21.4.1.2 The [printers] Section}{subsection.21.4.1}
\BOOKMARK [3][-]{subsubsection.21.4.1.3}{21.4.1.3 Any [my\137printer\137name] Section}{subsection.21.4.1}
\BOOKMARK [3][-]{subsubsection.21.4.1.4}{21.4.1.4 Print Commands}{subsection.21.4.1}
\BOOKMARK [3][-]{subsubsection.21.4.1.5}{21.4.1.5 Default UNIX System Printing Commands}{subsection.21.4.1}
\BOOKMARK [3][-]{subsubsection.21.4.1.6}{21.4.1.6 Custom Print Commands}{subsection.21.4.1}
\BOOKMARK [1][-]{section.21.5}{21.5 Printing Developments Since Samba-2.2}{chapter.21}
\BOOKMARK [2][-]{subsection.21.5.1}{21.5.1 Point'n'Print Client Drivers on Samba Servers}{section.21.5}
\BOOKMARK [2][-]{subsection.21.5.2}{21.5.2 The Obsoleted [printer\044] Section}{section.21.5}
\BOOKMARK [2][-]{subsection.21.5.3}{21.5.3 Creating the [print\044] Share}{section.21.5}
\BOOKMARK [2][-]{subsection.21.5.4}{21.5.4 [print\044] Stanza Parameters}{section.21.5}
\BOOKMARK [2][-]{subsection.21.5.5}{21.5.5 The [print\044] Share Directory}{section.21.5}
\BOOKMARK [1][-]{section.21.6}{21.6 Installing Drivers into [print\044]}{chapter.21}
\BOOKMARK [2][-]{subsection.21.6.1}{21.6.1 Add Printer Wizard Driver Installation}{section.21.6}
\BOOKMARK [2][-]{subsection.21.6.2}{21.6.2 Installing Print Drivers Using rpcclient}{section.21.6}
\BOOKMARK [3][-]{subsubsection.21.6.2.1}{21.6.2.1 Identifying Driver Files}{subsection.21.6.2}
\BOOKMARK [3][-]{subsubsection.21.6.2.2}{21.6.2.2 Obtaining Driver Files from Windows Client [print\044] Shares}{subsection.21.6.2}
\BOOKMARK [3][-]{subsubsection.21.6.2.3}{21.6.2.3 Installing Driver Files into [print\044]}{subsection.21.6.2}
\BOOKMARK [3][-]{subsubsection.21.6.2.4}{21.6.2.4 smbclient to Confirm Driver Installation}{subsection.21.6.2}
\BOOKMARK [3][-]{subsubsection.21.6.2.5}{21.6.2.5 Running rpcclient with adddriver}{subsection.21.6.2}
\BOOKMARK [3][-]{subsubsection.21.6.2.6}{21.6.2.6 Checking adddriver Completion}{subsection.21.6.2}
\BOOKMARK [3][-]{subsubsection.21.6.2.7}{21.6.2.7 Check Samba for Driver Recognition}{subsection.21.6.2}
\BOOKMARK [3][-]{subsubsection.21.6.2.8}{21.6.2.8 Specific Driver Name Flexibility}{subsection.21.6.2}
\BOOKMARK [3][-]{subsubsection.21.6.2.9}{21.6.2.9 Running rpcclient with setdriver}{subsection.21.6.2}
\BOOKMARK [1][-]{section.21.7}{21.7 Client Driver Installation Procedure}{chapter.21}
\BOOKMARK [2][-]{subsection.21.7.1}{21.7.1 First Client Driver Installation}{section.21.7}
\BOOKMARK [2][-]{subsection.21.7.2}{21.7.2 Setting Device Modes on New Printers}{section.21.7}
\BOOKMARK [2][-]{subsection.21.7.3}{21.7.3 Additional Client Driver Installation}{section.21.7}
\BOOKMARK [2][-]{subsection.21.7.4}{21.7.4 Always Make First Client Connection as root or ``printer admin''}{section.21.7}
\BOOKMARK [1][-]{section.21.8}{21.8 Other Gotchas}{chapter.21}
\BOOKMARK [2][-]{subsection.21.8.1}{21.8.1 Setting Default Print Options for Client Drivers}{section.21.8}
\BOOKMARK [2][-]{subsection.21.8.2}{21.8.2 Supporting Large Numbers of Printers}{section.21.8}
\BOOKMARK [2][-]{subsection.21.8.3}{21.8.3 Adding New Printers with the Windows NT APW}{section.21.8}
\BOOKMARK [2][-]{subsection.21.8.4}{21.8.4 Error Message: ``Cannot connect under a different Name''}{section.21.8}
\BOOKMARK [2][-]{subsection.21.8.5}{21.8.5 Take Care When Assembling Driver Files}{section.21.8}
\BOOKMARK [2][-]{subsection.21.8.6}{21.8.6 Samba and Printer Ports}{section.21.8}
\BOOKMARK [2][-]{subsection.21.8.7}{21.8.7 Avoiding Common Client Driver Misconfiguration}{section.21.8}
\BOOKMARK [1][-]{section.21.9}{21.9 The Imprints Toolset}{chapter.21}
\BOOKMARK [2][-]{subsection.21.9.1}{21.9.1 What Is Imprints?}{section.21.9}
\BOOKMARK [2][-]{subsection.21.9.2}{21.9.2 Creating Printer Driver Packages}{section.21.9}
\BOOKMARK [2][-]{subsection.21.9.3}{21.9.3 The Imprints Server}{section.21.9}
\BOOKMARK [2][-]{subsection.21.9.4}{21.9.4 The Installation Client}{section.21.9}
\BOOKMARK [1][-]{section.21.10}{21.10 Adding Network Printers without User Interaction}{chapter.21}
\BOOKMARK [1][-]{section.21.11}{21.11 The addprinter Command}{chapter.21}
\BOOKMARK [1][-]{section.21.12}{21.12 Migration of Classical Printing to Samba}{chapter.21}
\BOOKMARK [1][-]{section.21.13}{21.13 Publishing Printer Information in Active Directory or LDAP}{chapter.21}
\BOOKMARK [1][-]{section.21.14}{21.14 Common Errors}{chapter.21}
\BOOKMARK [2][-]{subsection.21.14.1}{21.14.1 I Give My Root Password but I Do Not Get Access}{section.21.14}
\BOOKMARK [2][-]{subsection.21.14.2}{21.14.2 My Print Jobs Get Spooled into the Spooling Directory, but Then Get Lost}{section.21.14}
\BOOKMARK [0][-]{chapter.22}{Chapter 22 CUPS Printing Support}{part.3}
\BOOKMARK [1][-]{section.22.1}{22.1 Introduction}{chapter.22}
\BOOKMARK [2][-]{subsection.22.1.1}{22.1.1 Features and Benefits}{section.22.1}
\BOOKMARK [2][-]{subsection.22.1.2}{22.1.2 Overview}{section.22.1}
\BOOKMARK [1][-]{section.22.2}{22.2 Basic CUPS Support Configuration}{chapter.22}
\BOOKMARK [2][-]{subsection.22.2.1}{22.2.1 Linking smbd with libcups.so}{section.22.2}
\BOOKMARK [2][-]{subsection.22.2.2}{22.2.2 Simple smb.conf Settings for CUPS}{section.22.2}
\BOOKMARK [2][-]{subsection.22.2.3}{22.2.3 More Complex CUPS smb.conf Settings}{section.22.2}
\BOOKMARK [1][-]{section.22.3}{22.3 Advanced Configuration}{chapter.22}
\BOOKMARK [2][-]{subsection.22.3.1}{22.3.1 Central Spooling vs. ``Peer-to-Peer'' Printing}{section.22.3}
\BOOKMARK [2][-]{subsection.22.3.2}{22.3.2 Raw Print Serving: Vendor Drivers on Windows Clients}{section.22.3}
\BOOKMARK [2][-]{subsection.22.3.3}{22.3.3 Installation of Windows Client Drivers}{section.22.3}
\BOOKMARK [2][-]{subsection.22.3.4}{22.3.4 Explicitly Enable ``raw'' Printing for application/octet-stream}{section.22.3}
\BOOKMARK [2][-]{subsection.22.3.5}{22.3.5 Driver Upload Methods}{section.22.3}
\BOOKMARK [1][-]{section.22.4}{22.4 Advanced Intelligent Printing with PostScript Driver Download}{chapter.22}
\BOOKMARK [2][-]{subsection.22.4.1}{22.4.1 GDI on Windows, PostScript on UNIX}{section.22.4}
\BOOKMARK [2][-]{subsection.22.4.2}{22.4.2 Windows Drivers, GDI, and EMF}{section.22.4}
\BOOKMARK [2][-]{subsection.22.4.3}{22.4.3 UNIX Printfile Conversion and GUI Basics}{section.22.4}
\BOOKMARK [2][-]{subsection.22.4.4}{22.4.4 PostScript and Ghostscript}{section.22.4}
\BOOKMARK [2][-]{subsection.22.4.5}{22.4.5 Ghostscript: The Software RIP for Non-PostScript Printers}{section.22.4}
\BOOKMARK [2][-]{subsection.22.4.6}{22.4.6 PostScript Printer Description \(PPD\) Specification}{section.22.4}
\BOOKMARK [2][-]{subsection.22.4.7}{22.4.7 Using Windows-Formatted Vendor PPDs}{section.22.4}
\BOOKMARK [2][-]{subsection.22.4.8}{22.4.8 CUPS Also Uses PPDs for Non-PostScript Printers}{section.22.4}
\BOOKMARK [1][-]{section.22.5}{22.5 The CUPS Filtering Architecture}{chapter.22}
\BOOKMARK [2][-]{subsection.22.5.1}{22.5.1 MIME Types and CUPS Filters}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.2}{22.5.2 MIME Type Conversion Rules}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.3}{22.5.3 Filtering Overview}{section.22.5}
\BOOKMARK [3][-]{subsubsection.22.5.3.1}{22.5.3.1 Filter Requirements}{subsection.22.5.3}
\BOOKMARK [2][-]{subsection.22.5.4}{22.5.4 Prefilters}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.5}{22.5.5 pstops}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.6}{22.5.6 pstoraster}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.7}{22.5.7 imagetops and imagetoraster}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.8}{22.5.8 rasterto [printers specific]}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.9}{22.5.9 CUPS Backends}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.10}{22.5.10 The Role of cupsomatic/foomatic}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.11}{22.5.11 The Complete Picture}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.12}{22.5.12 mime.convs}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.13}{22.5.13 ``Raw'' Printing}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.14}{22.5.14 application/octet-stream Printing}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.15}{22.5.15 PostScript Printer Descriptions for Non-PostScript Printers}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.16}{22.5.16 cupsomatic/foomatic-rip Versus Native CUPS Printing}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.17}{22.5.17 Examples for Filtering Chains}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.18}{22.5.18 Sources of CUPS Drivers/PPDs}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.19}{22.5.19 Printing with Interface Scripts}{section.22.5}
\BOOKMARK [1][-]{section.22.6}{22.6 Network Printing \(Purely Windows\)}{chapter.22}
\BOOKMARK [2][-]{subsection.22.6.1}{22.6.1 From Windows Clients to an NT Print Server}{section.22.6}
\BOOKMARK [2][-]{subsection.22.6.2}{22.6.2 Driver Execution on the Client}{section.22.6}
\BOOKMARK [2][-]{subsection.22.6.3}{22.6.3 Driver Execution on the Server}{section.22.6}
\BOOKMARK [1][-]{section.22.7}{22.7 Network Printing \(Windows Clients and UNIX/Samba Print Servers\)}{chapter.22}
\BOOKMARK [2][-]{subsection.22.7.1}{22.7.1 From Windows Clients to a CUPS/Samba Print Server}{section.22.7}
\BOOKMARK [2][-]{subsection.22.7.2}{22.7.2 Samba Receiving Job-Files and Passing Them to CUPS}{section.22.7}
\BOOKMARK [1][-]{section.22.8}{22.8 Network PostScript RIP}{chapter.22}
\BOOKMARK [2][-]{subsection.22.8.1}{22.8.1 PPDs for Non-PS Printers on UNIX}{section.22.8}
\BOOKMARK [2][-]{subsection.22.8.2}{22.8.2 PPDs for Non-PS Printers on Windows}{section.22.8}
\BOOKMARK [1][-]{section.22.9}{22.9 Windows Terminal Servers \(WTS\) as CUPS Clients}{chapter.22}
\BOOKMARK [2][-]{subsection.22.9.1}{22.9.1 Printer Drivers Running in ``Kernel Mode'' Cause Many Problems}{section.22.9}
\BOOKMARK [2][-]{subsection.22.9.2}{22.9.2 Workarounds Impose Heavy Limitations}{section.22.9}
\BOOKMARK [2][-]{subsection.22.9.3}{22.9.3 CUPS: A ``Magical Stone''?}{section.22.9}
\BOOKMARK [2][-]{subsection.22.9.4}{22.9.4 PostScript Drivers with No Major Problems, Even in Kernel Mode}{section.22.9}
\BOOKMARK [1][-]{section.22.10}{22.10 Configuring CUPS for Driver Download}{chapter.22}
\BOOKMARK [2][-]{subsection.22.10.1}{22.10.1 cupsaddsmb: The Unknown Utility}{section.22.10}
\BOOKMARK [2][-]{subsection.22.10.2}{22.10.2 Prepare Your smb.conf for cupsaddsmb}{section.22.10}
\BOOKMARK [2][-]{subsection.22.10.3}{22.10.3 CUPS ``PostScript Driver for Windows NT/200x/XP''}{section.22.10}
\BOOKMARK [2][-]{subsection.22.10.4}{22.10.4 Recognizing Different Driver Files}{section.22.10}
\BOOKMARK [2][-]{subsection.22.10.5}{22.10.5 Acquiring the Adobe Driver Files}{section.22.10}
\BOOKMARK [2][-]{subsection.22.10.6}{22.10.6 ESP Print Pro PostScript Driver for Windows NT/200x/XP}{section.22.10}
\BOOKMARK [2][-]{subsection.22.10.7}{22.10.7 Caveats to Be Considered}{section.22.10}
\BOOKMARK [2][-]{subsection.22.10.8}{22.10.8 Windows CUPS PostScript Driver Versus Adobe Driver}{section.22.10}
\BOOKMARK [2][-]{subsection.22.10.9}{22.10.9 Run cupsaddsmb \(Quiet Mode\)}{section.22.10}
\BOOKMARK [2][-]{subsection.22.10.10}{22.10.10 Run cupsaddsmb with Verbose Output}{section.22.10}
\BOOKMARK [2][-]{subsection.22.10.11}{22.10.11 Understanding cupsaddsmb}{section.22.10}
\BOOKMARK [2][-]{subsection.22.10.12}{22.10.12 How to Recognize If cupsaddsmb Completed Successfully}{section.22.10}
\BOOKMARK [2][-]{subsection.22.10.13}{22.10.13 cupsaddsmb with a Samba PDC}{section.22.10}
\BOOKMARK [2][-]{subsection.22.10.14}{22.10.14 cupsaddsmb Flowchart}{section.22.10}
\BOOKMARK [2][-]{subsection.22.10.15}{22.10.15 Installing the PostScript Driver on a Client}{section.22.10}
\BOOKMARK [2][-]{subsection.22.10.16}{22.10.16 Avoiding Critical PostScript Driver Settings on the Client}{section.22.10}
\BOOKMARK [1][-]{section.22.11}{22.11 Installing PostScript Driver Files Manually Using rpcclient}{chapter.22}
\BOOKMARK [2][-]{subsection.22.11.1}{22.11.1 A Check of the rpcclient man Page}{section.22.11}
\BOOKMARK [2][-]{subsection.22.11.2}{22.11.2 Understanding the rpcclient man Page}{section.22.11}
\BOOKMARK [2][-]{subsection.22.11.3}{22.11.3 Producing an Example by Querying a Windows Box}{section.22.11}
\BOOKMARK [2][-]{subsection.22.11.4}{22.11.4 Requirements for adddriver and setdriver to Succeed}{section.22.11}
\BOOKMARK [2][-]{subsection.22.11.5}{22.11.5 Manual Driver Installation in 15 Steps}{section.22.11}
\BOOKMARK [2][-]{subsection.22.11.6}{22.11.6 Troubleshooting Revisited}{section.22.11}
\BOOKMARK [1][-]{section.22.12}{22.12 The Printing *.tdb Files}{chapter.22}
\BOOKMARK [2][-]{subsection.22.12.1}{22.12.1 Trivial Database Files}{section.22.12}
\BOOKMARK [2][-]{subsection.22.12.2}{22.12.2 Binary Format}{section.22.12}
\BOOKMARK [2][-]{subsection.22.12.3}{22.12.3 Losing *.tdb Files}{section.22.12}
\BOOKMARK [2][-]{subsection.22.12.4}{22.12.4 Using tdbbackup}{section.22.12}
\BOOKMARK [1][-]{section.22.13}{22.13 CUPS Print Drivers from Linuxprinting.org}{chapter.22}
\BOOKMARK [2][-]{subsection.22.13.1}{22.13.1 foomatic-rip and Foomatic Explained}{section.22.13}
\BOOKMARK [3][-]{subsubsection.22.13.1.1}{22.13.1.1 690 ``Perfect'' Printers}{subsection.22.13.1}
\BOOKMARK [3][-]{subsubsection.22.13.1.2}{22.13.1.2 How the Printing HOWTO Started It All}{subsection.22.13.1}
\BOOKMARK [3][-]{subsubsection.22.13.1.3}{22.13.1.3 Foomatic's Strange Name}{subsection.22.13.1}
\BOOKMARK [3][-]{subsubsection.22.13.1.4}{22.13.1.4 cupsomatic, pdqomatic, lpdomatic, directomatic}{subsection.22.13.1}
\BOOKMARK [3][-]{subsubsection.22.13.1.5}{22.13.1.5 The Grand Unification Achieved}{subsection.22.13.1}
\BOOKMARK [3][-]{subsubsection.22.13.1.6}{22.13.1.6 Driver Development Outside}{subsection.22.13.1}
\BOOKMARK [3][-]{subsubsection.22.13.1.7}{22.13.1.7 Forums, Downloads, Tutorials, Howtos \(Also for Mac OS X and Commercial UNIX\)}{subsection.22.13.1}
\BOOKMARK [3][-]{subsubsection.22.13.1.8}{22.13.1.8 Foomatic Database-Generated PPDs}{subsection.22.13.1}
\BOOKMARK [2][-]{subsection.22.13.2}{22.13.2 foomatic-rip and Foomatic PPD Download and Installation}{section.22.13}
\BOOKMARK [1][-]{section.22.14}{22.14 Page Accounting with CUPS}{chapter.22}
\BOOKMARK [2][-]{subsection.22.14.1}{22.14.1 Setting Up Quotas}{section.22.14}
\BOOKMARK [2][-]{subsection.22.14.2}{22.14.2 Correct and Incorrect Accounting}{section.22.14}
\BOOKMARK [2][-]{subsection.22.14.3}{22.14.3 Adobe and CUPS PostScript Drivers for Windows Clients}{section.22.14}
\BOOKMARK [2][-]{subsection.22.14.4}{22.14.4 The page\137log File Syntax}{section.22.14}
\BOOKMARK [2][-]{subsection.22.14.5}{22.14.5 Possible Shortcomings}{section.22.14}
\BOOKMARK [2][-]{subsection.22.14.6}{22.14.6 Future Developments}{section.22.14}
\BOOKMARK [2][-]{subsection.22.14.7}{22.14.7 Other Accounting Tools}{section.22.14}
\BOOKMARK [1][-]{section.22.15}{22.15 Additional Material}{chapter.22}
\BOOKMARK [1][-]{section.22.16}{22.16 Autodeletion or Preservation of CUPS Spool Files}{chapter.22}
\BOOKMARK [2][-]{subsection.22.16.1}{22.16.1 CUPS Configuration Settings Explained}{section.22.16}
\BOOKMARK [2][-]{subsection.22.16.2}{22.16.2 Preconditions}{section.22.16}
\BOOKMARK [2][-]{subsection.22.16.3}{22.16.3 Manual Configuration}{section.22.16}
\BOOKMARK [1][-]{section.22.17}{22.17 Printing from CUPS to Windows-Attached Printers}{chapter.22}
\BOOKMARK [1][-]{section.22.18}{22.18 More CUPS Filtering Chains}{chapter.22}
\BOOKMARK [1][-]{section.22.19}{22.19 Common Errors}{chapter.22}
\BOOKMARK [2][-]{subsection.22.19.1}{22.19.1 Windows 9x/Me Client Can't Install Driver}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.2}{22.19.2 ``cupsaddsmb'' Keeps Asking for Root Password in Never-ending Loop}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.3}{22.19.3 ``cupsaddsmb'' or ``rpcclient addriver'' Emit Error}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.4}{22.19.4 ``cupsaddsmb'' Errors}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.5}{22.19.5 Client Can't Connect to Samba Printer}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.6}{22.19.6 New Account Reconnection from Windows 200x/XP Troubles}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.7}{22.19.7 Avoid Being Connected to the Samba Server as the Wrong User}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.8}{22.19.8 Upgrading to CUPS Drivers from Adobe Drivers}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.9}{22.19.9 Can't Use ``cupsaddsmb'' on Samba Server, Which Is a PDC}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.10}{22.19.10 Deleted Windows 200x Printer Driver Is Still Shown}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.11}{22.19.11 Windows 200x/XP Local Security Policies}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.12}{22.19.12 Administrator Cannot Install Printers for All Local Users}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.13}{22.19.13 Print Change, Notify Functions on NT Clients}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.14}{22.19.14 Windows XP SP1}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.15}{22.19.15 Print Options for All Users Can't Be Set on Windows 200x/XP}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.16}{22.19.16 Most Common Blunders in Driver Settings on Windows Clients}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.17}{22.19.17 cupsaddsmb Does Not Work with Newly Installed Printer}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.18}{22.19.18 Permissions on /var/spool/samba/ Get Reset After Each Reboot}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.19}{22.19.19 Print Queue Called ``lp'' Mishandles Print Jobs}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.20}{22.19.20 Location of Adobe PostScript Driver Files for ``cupsaddsmb''}{section.22.19}
\BOOKMARK [1][-]{section.22.20}{22.20 Overview of the CUPS Printing Processes}{chapter.22}
\BOOKMARK [0][-]{chapter.23}{Chapter 23 Stackable VFS modules}{part.3}
\BOOKMARK [1][-]{section.23.1}{23.1 Features and Benefits}{chapter.23}
\BOOKMARK [1][-]{section.23.2}{23.2 Discussion}{chapter.23}
\BOOKMARK [1][-]{section.23.3}{23.3 Included Modules}{chapter.23}
\BOOKMARK [2][-]{subsection.23.3.1}{23.3.1 audit}{section.23.3}
\BOOKMARK [2][-]{subsection.23.3.2}{23.3.2 default\137quota}{section.23.3}
\BOOKMARK [2][-]{subsection.23.3.3}{23.3.3 extd\137audit}{section.23.3}
\BOOKMARK [3][-]{subsubsection.23.3.3.1}{23.3.3.1 Configuration of Auditing}{subsection.23.3.3}
\BOOKMARK [2][-]{subsection.23.3.4}{23.3.4 fake\137perms}{section.23.3}
\BOOKMARK [2][-]{subsection.23.3.5}{23.3.5 recycle}{section.23.3}
\BOOKMARK [2][-]{subsection.23.3.6}{23.3.6 netatalk}{section.23.3}
\BOOKMARK [2][-]{subsection.23.3.7}{23.3.7 shadow\137copy}{section.23.3}
\BOOKMARK [3][-]{subsubsection.23.3.7.1}{23.3.7.1 Shadow Copy Setup}{subsection.23.3.7}
\BOOKMARK [1][-]{section.23.4}{23.4 VFS Modules Available Elsewhere}{chapter.23}
\BOOKMARK [2][-]{subsection.23.4.1}{23.4.1 DatabaseFS}{section.23.4}
\BOOKMARK [2][-]{subsection.23.4.2}{23.4.2 vscan}{section.23.4}
\BOOKMARK [2][-]{subsection.23.4.3}{23.4.3 vscan-clamav}{section.23.4}
\BOOKMARK [0][-]{chapter.24}{Chapter 24 Winbind: Use of Domain Accounts}{part.3}
\BOOKMARK [1][-]{section.24.1}{24.1 Features and Benefits}{chapter.24}
\BOOKMARK [1][-]{section.24.2}{24.2 Introduction}{chapter.24}
\BOOKMARK [1][-]{section.24.3}{24.3 What Winbind Provides}{chapter.24}
\BOOKMARK [2][-]{subsection.24.3.1}{24.3.1 Target Uses}{section.24.3}
\BOOKMARK [2][-]{subsection.24.3.2}{24.3.2 Handling of Foreign SIDs}{section.24.3}
\BOOKMARK [1][-]{section.24.4}{24.4 How Winbind Works}{chapter.24}
\BOOKMARK [2][-]{subsection.24.4.1}{24.4.1 Microsoft Remote Procedure Calls}{section.24.4}
\BOOKMARK [2][-]{subsection.24.4.2}{24.4.2 Microsoft Active Directory Services}{section.24.4}
\BOOKMARK [2][-]{subsection.24.4.3}{24.4.3 Name Service Switch}{section.24.4}
\BOOKMARK [2][-]{subsection.24.4.4}{24.4.4 Pluggable Authentication Modules}{section.24.4}
\BOOKMARK [2][-]{subsection.24.4.5}{24.4.5 User and Group ID Allocation}{section.24.4}
\BOOKMARK [2][-]{subsection.24.4.6}{24.4.6 Result Caching}{section.24.4}
\BOOKMARK [1][-]{section.24.5}{24.5 Installation and Configuration}{chapter.24}
\BOOKMARK [2][-]{subsection.24.5.1}{24.5.1 Introduction}{section.24.5}
\BOOKMARK [2][-]{subsection.24.5.2}{24.5.2 Requirements}{section.24.5}
\BOOKMARK [2][-]{subsection.24.5.3}{24.5.3 Testing Things Out}{section.24.5}
\BOOKMARK [3][-]{subsubsection.24.5.3.1}{24.5.3.1 Configure nsswitch.conf and the Winbind Libraries on Linux and Solaris}{subsection.24.5.3}
\BOOKMARK [3][-]{subsubsection.24.5.3.2}{24.5.3.2 NSS Winbind on AIX}{subsection.24.5.3}
\BOOKMARK [3][-]{subsubsection.24.5.3.3}{24.5.3.3 Configure smb.conf}{subsection.24.5.3}
\BOOKMARK [3][-]{subsubsection.24.5.3.4}{24.5.3.4 Join the Samba Server to the PDC Domain}{subsection.24.5.3}
\BOOKMARK [3][-]{subsubsection.24.5.3.5}{24.5.3.5 Starting and Testing the winbindd Daemon}{subsection.24.5.3}
\BOOKMARK [3][-]{subsubsection.24.5.3.6}{24.5.3.6 Fix the init.d Startup Scripts}{subsection.24.5.3}
\BOOKMARK [3][-]{subsubsection.24.5.3.7}{24.5.3.7 Configure Winbind and PAM}{subsection.24.5.3}
\BOOKMARK [1][-]{section.24.6}{24.6 Conclusion}{chapter.24}
\BOOKMARK [1][-]{section.24.7}{24.7 Common Errors}{chapter.24}
\BOOKMARK [2][-]{subsection.24.7.1}{24.7.1 NSCD Problem Warning}{section.24.7}
\BOOKMARK [2][-]{subsection.24.7.2}{24.7.2 Winbind Is Not Resolving Users and Groups}{section.24.7}
\BOOKMARK [0][-]{chapter.25}{Chapter 25 Advanced Network Management}{part.3}
\BOOKMARK [1][-]{section.25.1}{25.1 Features and Benefits}{chapter.25}
\BOOKMARK [1][-]{section.25.2}{25.2 Remote Server Administration}{chapter.25}
\BOOKMARK [1][-]{section.25.3}{25.3 Remote Desktop Management}{chapter.25}
\BOOKMARK [2][-]{subsection.25.3.1}{25.3.1 Remote Management from NoMachine.Com}{section.25.3}
\BOOKMARK [2][-]{subsection.25.3.2}{25.3.2 Remote Management with ThinLinc}{section.25.3}
\BOOKMARK [1][-]{section.25.4}{25.4 Network Logon Script Magic}{chapter.25}
\BOOKMARK [2][-]{subsection.25.4.1}{25.4.1 Adding Printers without User Intervention}{section.25.4}
\BOOKMARK [2][-]{subsection.25.4.2}{25.4.2 Limiting Logon Connections}{section.25.4}
\BOOKMARK [0][-]{chapter.26}{Chapter 26 System and Account Policies}{part.3}
\BOOKMARK [1][-]{section.26.1}{26.1 Features and Benefits}{chapter.26}
\BOOKMARK [1][-]{section.26.2}{26.2 Creating and Managing System Policies}{chapter.26}
\BOOKMARK [2][-]{subsection.26.2.1}{26.2.1 Windows 9x/ME Policies}{section.26.2}
\BOOKMARK [2][-]{subsection.26.2.2}{26.2.2 Windows NT4-Style Policy Files}{section.26.2}
\BOOKMARK [3][-]{subsubsection.26.2.2.1}{26.2.2.1 Registry Spoiling}{subsection.26.2.2}
\BOOKMARK [2][-]{subsection.26.2.3}{26.2.3 MS Windows 200x/XP Professional Policies}{section.26.2}
\BOOKMARK [3][-]{subsubsection.26.2.3.1}{26.2.3.1 Administration of Windows 200x/XP Policies}{subsection.26.2.3}
\BOOKMARK [3][-]{subsubsection.26.2.3.2}{26.2.3.2 Custom System Policy Templates}{subsection.26.2.3}
\BOOKMARK [1][-]{section.26.3}{26.3 Managing Account/User Policies}{chapter.26}
\BOOKMARK [1][-]{section.26.4}{26.4 Management Tools}{chapter.26}
\BOOKMARK [2][-]{subsection.26.4.1}{26.4.1 Samba Editreg Toolset}{section.26.4}
\BOOKMARK [2][-]{subsection.26.4.2}{26.4.2 Windows NT4/200x}{section.26.4}
\BOOKMARK [2][-]{subsection.26.4.3}{26.4.3 Samba PDC}{section.26.4}
\BOOKMARK [1][-]{section.26.5}{26.5 System Startup and Logon Processing Overview}{chapter.26}
\BOOKMARK [1][-]{section.26.6}{26.6 Common Errors}{chapter.26}
\BOOKMARK [2][-]{subsection.26.6.1}{26.6.1 Policy Does Not Work}{section.26.6}
\BOOKMARK [0][-]{chapter.27}{Chapter 27 Desktop Profile Management}{part.3}
\BOOKMARK [1][-]{section.27.1}{27.1 Features and Benefits}{chapter.27}
\BOOKMARK [1][-]{section.27.2}{27.2 Roaming Profiles}{chapter.27}
\BOOKMARK [2][-]{subsection.27.2.1}{27.2.1 Samba Configuration for Profile Handling}{section.27.2}
\BOOKMARK [3][-]{subsubsection.27.2.1.1}{27.2.1.1 NT4/200x User Profiles}{subsection.27.2.1}
\BOOKMARK [3][-]{subsubsection.27.2.1.2}{27.2.1.2 Windows 9x/Me User Profiles}{subsection.27.2.1}
\BOOKMARK [3][-]{subsubsection.27.2.1.3}{27.2.1.3 Mixed Windows Windows 9x/Me and NT4/200x User Profiles}{subsection.27.2.1}
\BOOKMARK [3][-]{subsubsection.27.2.1.4}{27.2.1.4 Disabling Roaming Profile Support}{subsection.27.2.1}
\BOOKMARK [2][-]{subsection.27.2.2}{27.2.2 Windows Client Profile Configuration Information}{section.27.2}
\BOOKMARK [3][-]{subsubsection.27.2.2.1}{27.2.2.1 Windows 9x/Me Profile Setup}{subsection.27.2.2}
\BOOKMARK [3][-]{subsubsection.27.2.2.2}{27.2.2.2 Windows NT4 Workstation}{subsection.27.2.2}
\BOOKMARK [3][-]{subsubsection.27.2.2.3}{27.2.2.3 Windows 2000/XP Professional}{subsection.27.2.2}
\BOOKMARK [2][-]{subsection.27.2.3}{27.2.3 User Profile Hive Cleanup Service}{section.27.2}
\BOOKMARK [2][-]{subsection.27.2.4}{27.2.4 Sharing Profiles between Windows 9x/Me and NT4/200x/XP Workstations}{section.27.2}
\BOOKMARK [2][-]{subsection.27.2.5}{27.2.5 Profile Migration from Windows NT4/200x Server to Samba}{section.27.2}
\BOOKMARK [3][-]{subsubsection.27.2.5.1}{27.2.5.1 Windows NT4 Profile Management Tools}{subsection.27.2.5}
\BOOKMARK [3][-]{subsubsection.27.2.5.2}{27.2.5.2 Side Bar Notes}{subsection.27.2.5}
\BOOKMARK [3][-]{subsubsection.27.2.5.3}{27.2.5.3 moveuser.exe}{subsection.27.2.5}
\BOOKMARK [3][-]{subsubsection.27.2.5.4}{27.2.5.4 Get SID}{subsection.27.2.5}
\BOOKMARK [1][-]{section.27.3}{27.3 Mandatory Profiles}{chapter.27}
\BOOKMARK [1][-]{section.27.4}{27.4 Creating and Managing Group Profiles}{chapter.27}
\BOOKMARK [1][-]{section.27.5}{27.5 Default Profile for Windows Users}{chapter.27}
\BOOKMARK [2][-]{subsection.27.5.1}{27.5.1 MS Windows 9x/Me}{section.27.5}
\BOOKMARK [3][-]{subsubsection.27.5.1.1}{27.5.1.1 User Profile Handling with Windows 9x/Me}{subsection.27.5.1}
\BOOKMARK [2][-]{subsection.27.5.2}{27.5.2 MS Windows NT4 Workstation}{section.27.5}
\BOOKMARK [2][-]{subsection.27.5.3}{27.5.3 MS Windows 200x/XP}{section.27.5}
\BOOKMARK [1][-]{section.27.6}{27.6 Common Errors}{chapter.27}
\BOOKMARK [2][-]{subsection.27.6.1}{27.6.1 Configuring Roaming Profiles for a Few Users or Groups}{section.27.6}
\BOOKMARK [2][-]{subsection.27.6.2}{27.6.2 Cannot Use Roaming Profiles}{section.27.6}
\BOOKMARK [2][-]{subsection.27.6.3}{27.6.3 Changing the Default Profile}{section.27.6}
\BOOKMARK [2][-]{subsection.27.6.4}{27.6.4 Debugging Roaming Profiles and NT4-style Domain Policies}{section.27.6}
\BOOKMARK [0][-]{chapter.28}{Chapter 28 PAM-Based Distributed Authentication}{part.3}
\BOOKMARK [1][-]{section.28.1}{28.1 Features and Benefits}{chapter.28}
\BOOKMARK [1][-]{section.28.2}{28.2 Technical Discussion}{chapter.28}
\BOOKMARK [2][-]{subsection.28.2.1}{28.2.1 PAM Configuration Syntax}{section.28.2}
\BOOKMARK [3][-]{subsubsection.28.2.1.1}{28.2.1.1 Anatomy of /etc/pam.d Entries}{subsection.28.2.1}
\BOOKMARK [2][-]{subsection.28.2.2}{28.2.2 Example System Configurations}{section.28.2}
\BOOKMARK [3][-]{subsubsection.28.2.2.1}{28.2.2.1 PAM: Original Login Config}{subsection.28.2.2}
\BOOKMARK [3][-]{subsubsection.28.2.2.2}{28.2.2.2 PAM: Login Using pam\137smbpass}{subsection.28.2.2}
\BOOKMARK [2][-]{subsection.28.2.3}{28.2.3 smb.conf PAM Configuration}{section.28.2}
\BOOKMARK [2][-]{subsection.28.2.4}{28.2.4 Remote CIFS Authentication Using winbindd.so}{section.28.2}
\BOOKMARK [2][-]{subsection.28.2.5}{28.2.5 Password Synchronization Using pam\137smbpass.so}{section.28.2}
\BOOKMARK [3][-]{subsubsection.28.2.5.1}{28.2.5.1 Password Synchronization Configuration}{subsection.28.2.5}
\BOOKMARK [3][-]{subsubsection.28.2.5.2}{28.2.5.2 Password Migration Configuration}{subsection.28.2.5}
\BOOKMARK [3][-]{subsubsection.28.2.5.3}{28.2.5.3 Mature Password Configuration}{subsection.28.2.5}
\BOOKMARK [3][-]{subsubsection.28.2.5.4}{28.2.5.4 Kerberos Password Integration Configuration}{subsection.28.2.5}
\BOOKMARK [1][-]{section.28.3}{28.3 Common Errors}{chapter.28}
\BOOKMARK [2][-]{subsection.28.3.1}{28.3.1 pam\137winbind Problem}{section.28.3}
\BOOKMARK [2][-]{subsection.28.3.2}{28.3.2 Winbind Is Not Resolving Users and Groups}{section.28.3}
\BOOKMARK [0][-]{chapter.29}{Chapter 29 Integrating MS Windows Networks with Samba}{part.3}
\BOOKMARK [1][-]{section.29.1}{29.1 Features and Benefits}{chapter.29}
\BOOKMARK [1][-]{section.29.2}{29.2 Background Information}{chapter.29}
\BOOKMARK [1][-]{section.29.3}{29.3 Name Resolution in a Pure UNIX/Linux World}{chapter.29}
\BOOKMARK [2][-]{subsection.29.3.1}{29.3.1 /etc/hosts}{section.29.3}
\BOOKMARK [2][-]{subsection.29.3.2}{29.3.2 /etc/resolv.conf}{section.29.3}
\BOOKMARK [2][-]{subsection.29.3.3}{29.3.3 /etc/host.conf}{section.29.3}
\BOOKMARK [2][-]{subsection.29.3.4}{29.3.4 /etc/nsswitch.conf}{section.29.3}
\BOOKMARK [1][-]{section.29.4}{29.4 Name Resolution as Used within MS Windows Networking}{chapter.29}
\BOOKMARK [2][-]{subsection.29.4.1}{29.4.1 The NetBIOS Name Cache}{section.29.4}
\BOOKMARK [2][-]{subsection.29.4.2}{29.4.2 The LMHOSTS File}{section.29.4}
\BOOKMARK [2][-]{subsection.29.4.3}{29.4.3 HOSTS File}{section.29.4}
\BOOKMARK [2][-]{subsection.29.4.4}{29.4.4 DNS Lookup}{section.29.4}
\BOOKMARK [2][-]{subsection.29.4.5}{29.4.5 WINS Lookup}{section.29.4}
\BOOKMARK [1][-]{section.29.5}{29.5 Common Errors}{chapter.29}
\BOOKMARK [2][-]{subsection.29.5.1}{29.5.1 Pinging Works Only One Way}{section.29.5}
\BOOKMARK [2][-]{subsection.29.5.2}{29.5.2 Very Slow Network Connections}{section.29.5}
\BOOKMARK [2][-]{subsection.29.5.3}{29.5.3 Samba Server Name-Change Problem}{section.29.5}
\BOOKMARK [0][-]{chapter.30}{Chapter 30 Unicode/Charsets}{part.3}
\BOOKMARK [1][-]{section.30.1}{30.1 Features and Benefits}{chapter.30}
\BOOKMARK [1][-]{section.30.2}{30.2 What Are Charsets and Unicode?}{chapter.30}
\BOOKMARK [1][-]{section.30.3}{30.3 Samba and Charsets}{chapter.30}
\BOOKMARK [1][-]{section.30.4}{30.4 Conversion from Old Names}{chapter.30}
\BOOKMARK [1][-]{section.30.5}{30.5 Japanese Charsets}{chapter.30}
\BOOKMARK [2][-]{subsection.30.5.1}{30.5.1 Basic Parameter Setting}{section.30.5}
\BOOKMARK [2][-]{subsection.30.5.2}{30.5.2 Individual Implementations}{section.30.5}
\BOOKMARK [2][-]{subsection.30.5.3}{30.5.3 Migration from Samba-2.2 Series}{section.30.5}
\BOOKMARK [1][-]{section.30.6}{30.6 Common Errors}{chapter.30}
\BOOKMARK [2][-]{subsection.30.6.1}{30.6.1 CP850.so Can't Be Found}{section.30.6}
\BOOKMARK [0][-]{chapter.31}{Chapter 31 Backup Techniques}{part.3}
\BOOKMARK [1][-]{section.31.1}{31.1 Features and Benefits}{chapter.31}
\BOOKMARK [1][-]{section.31.2}{31.2 Discussion of Backup Solutions}{chapter.31}
\BOOKMARK [2][-]{subsection.31.2.1}{31.2.1 BackupPC}{section.31.2}
\BOOKMARK [2][-]{subsection.31.2.2}{31.2.2 Rsync}{section.31.2}
\BOOKMARK [2][-]{subsection.31.2.3}{31.2.3 Amanda}{section.31.2}
\BOOKMARK [2][-]{subsection.31.2.4}{31.2.4 BOBS: Browseable Online Backup System}{section.31.2}
\BOOKMARK [0][-]{chapter.32}{Chapter 32 High Availability}{part.3}
\BOOKMARK [1][-]{section.32.1}{32.1 Features and Benefits}{chapter.32}
\BOOKMARK [1][-]{section.32.2}{32.2 Technical Discussion}{chapter.32}
\BOOKMARK [2][-]{subsection.32.2.1}{32.2.1 The Ultimate Goal}{section.32.2}
\BOOKMARK [2][-]{subsection.32.2.2}{32.2.2 Why Is This So Hard?}{section.32.2}
\BOOKMARK [3][-]{subsubsection.32.2.2.1}{32.2.2.1 The Front-End Challenge}{subsection.32.2.2}
\BOOKMARK [3][-]{subsubsection.32.2.2.2}{32.2.2.2 Demultiplexing SMB Requests}{subsection.32.2.2}
\BOOKMARK [3][-]{subsubsection.32.2.2.3}{32.2.2.3 The Distributed File System Challenge}{subsection.32.2.2}
\BOOKMARK [3][-]{subsubsection.32.2.2.4}{32.2.2.4 Restrictive Constraints on Distributed File Systems}{subsection.32.2.2}
\BOOKMARK [3][-]{subsubsection.32.2.2.5}{32.2.2.5 Server Pool Communications}{subsection.32.2.2}
\BOOKMARK [3][-]{subsubsection.32.2.2.6}{32.2.2.6 Server Pool Communications Demands}{subsection.32.2.2}
\BOOKMARK [3][-]{subsubsection.32.2.2.7}{32.2.2.7 Required Modifications to Samba}{subsection.32.2.2}
\BOOKMARK [2][-]{subsection.32.2.3}{32.2.3 A Simple Solution}{section.32.2}
\BOOKMARK [2][-]{subsection.32.2.4}{32.2.4 High-Availability Server Products}{section.32.2}
\BOOKMARK [2][-]{subsection.32.2.5}{32.2.5 MS-DFS: The Poor Man's Cluster}{section.32.2}
\BOOKMARK [2][-]{subsection.32.2.6}{32.2.6 Conclusions}{section.32.2}
\BOOKMARK [0][-]{chapter.33}{Chapter 33 Handling Large Directories}{part.3}
\BOOKMARK [0][-]{chapter.34}{Chapter 34 Advanced Configuration Techniques}{part.3}
\BOOKMARK [1][-]{section.34.1}{34.1 Implementation}{chapter.34}
\BOOKMARK [2][-]{subsection.34.1.1}{34.1.1 Multiple Server Hosting}{section.34.1}
\BOOKMARK [2][-]{subsection.34.1.2}{34.1.2 Multiple Virtual Server Personalities}{section.34.1}
\BOOKMARK [2][-]{subsection.34.1.3}{34.1.3 Multiple Virtual Server Hosting}{section.34.1}
\BOOKMARK [-1][-]{part.4}{Part IV Migration and Updating}{}
\BOOKMARK [0][-]{chapter.35}{Chapter 35 Updating and Upgrading Samba}{part.4}
\BOOKMARK [1][-]{section.35.1}{35.1 Key Update Requirements}{chapter.35}
\BOOKMARK [2][-]{subsection.35.1.1}{35.1.1 Upgrading from Samba-3.0.x to Samba-3.2.0}{section.35.1}
\BOOKMARK [2][-]{subsection.35.1.2}{35.1.2 Upgrading from Samba-2.x to Samba-3.0.25}{section.35.1}
\BOOKMARK [2][-]{subsection.35.1.3}{35.1.3 Quick Migration Guide}{section.35.1}
\BOOKMARK [1][-]{section.35.2}{35.2 New Featuers in Samba-3.x Series}{chapter.35}
\BOOKMARK [2][-]{subsection.35.2.1}{35.2.1 New Features in Samba-3.2.x Series}{section.35.2}
\BOOKMARK [2][-]{subsection.35.2.2}{35.2.2 New Features in Samba-3.0.x}{section.35.2}
\BOOKMARK [3][-]{subsubsection.35.2.2.1}{35.2.2.1 Configuration Parameter Changes}{subsection.35.2.2}
\BOOKMARK [3][-]{subsubsection.35.2.2.2}{35.2.2.2 Removed Parameters}{subsection.35.2.2}
\BOOKMARK [3][-]{subsubsection.35.2.2.3}{35.2.2.3 New Parameters}{subsection.35.2.2}
\BOOKMARK [3][-]{subsubsection.35.2.2.4}{35.2.2.4 Modified Parameters \(Changes in Behavior\)}{subsection.35.2.2}
\BOOKMARK [2][-]{subsection.35.2.3}{35.2.3 New Functionality}{section.35.2}
\BOOKMARK [3][-]{subsubsection.35.2.3.1}{35.2.3.1 TDB Data Files}{subsection.35.2.3}
\BOOKMARK [3][-]{subsubsection.35.2.3.2}{35.2.3.2 Changes in Behavior}{subsection.35.2.3}
\BOOKMARK [3][-]{subsubsection.35.2.3.3}{35.2.3.3 Passdb Backends and Authentication}{subsection.35.2.3}
\BOOKMARK [3][-]{subsubsection.35.2.3.4}{35.2.3.4 LDAP}{subsection.35.2.3}
\BOOKMARK [0][-]{chapter.36}{Chapter 36 Migration from NT4 PDC to Samba-3 PDC}{part.4}
\BOOKMARK [1][-]{section.36.1}{36.1 Planning and Getting Started}{chapter.36}
\BOOKMARK [2][-]{subsection.36.1.1}{36.1.1 Objectives}{section.36.1}
\BOOKMARK [3][-]{subsubsection.36.1.1.1}{36.1.1.1 Domain Layout}{subsection.36.1.1}
\BOOKMARK [3][-]{subsubsection.36.1.1.2}{36.1.1.2 Server Share and Directory Layout}{subsection.36.1.1}
\BOOKMARK [3][-]{subsubsection.36.1.1.3}{36.1.1.3 Logon Scripts}{subsection.36.1.1}
\BOOKMARK [3][-]{subsubsection.36.1.1.4}{36.1.1.4 Profile Migration/Creation}{subsection.36.1.1}
\BOOKMARK [3][-]{subsubsection.36.1.1.5}{36.1.1.5 User and Group Accounts}{subsection.36.1.1}
\BOOKMARK [2][-]{subsection.36.1.2}{36.1.2 Steps in Migration Process}{section.36.1}
\BOOKMARK [1][-]{section.36.2}{36.2 Migration Options}{chapter.36}
\BOOKMARK [2][-]{subsection.36.2.1}{36.2.1 Planning for Success}{section.36.2}
\BOOKMARK [2][-]{subsection.36.2.2}{36.2.2 Samba-3 Implementation Choices}{section.36.2}
\BOOKMARK [0][-]{chapter.37}{Chapter 37 SWAT: The Samba Web Administration Tool}{part.4}
\BOOKMARK [1][-]{section.37.1}{37.1 Features and Benefits}{chapter.37}
\BOOKMARK [1][-]{section.37.2}{37.2 Guidelines and Technical Tips}{chapter.37}
\BOOKMARK [2][-]{subsection.37.2.1}{37.2.1 Validate SWAT Installation}{section.37.2}
\BOOKMARK [3][-]{subsubsection.37.2.1.1}{37.2.1.1 Locating the SWAT File}{subsection.37.2.1}
\BOOKMARK [3][-]{subsubsection.37.2.1.2}{37.2.1.2 Locating the SWAT Support Files}{subsection.37.2.1}
\BOOKMARK [2][-]{subsection.37.2.2}{37.2.2 Enabling SWAT for Use}{section.37.2}
\BOOKMARK [2][-]{subsection.37.2.3}{37.2.3 Securing SWAT through SSL}{section.37.2}
\BOOKMARK [2][-]{subsection.37.2.4}{37.2.4 Enabling SWAT Internationalization Support}{section.37.2}
\BOOKMARK [1][-]{section.37.3}{37.3 Overview and Quick Tour}{chapter.37}
\BOOKMARK [2][-]{subsection.37.3.1}{37.3.1 The SWAT Home Page}{section.37.3}
\BOOKMARK [2][-]{subsection.37.3.2}{37.3.2 Global Settings}{section.37.3}
\BOOKMARK [2][-]{subsection.37.3.3}{37.3.3 Share Settings}{section.37.3}
\BOOKMARK [2][-]{subsection.37.3.4}{37.3.4 Printers Settings}{section.37.3}
\BOOKMARK [2][-]{subsection.37.3.5}{37.3.5 The SWAT Wizard}{section.37.3}
\BOOKMARK [2][-]{subsection.37.3.6}{37.3.6 The Status Page}{section.37.3}
\BOOKMARK [2][-]{subsection.37.3.7}{37.3.7 The View Page}{section.37.3}
\BOOKMARK [2][-]{subsection.37.3.8}{37.3.8 The Password Change Page}{section.37.3}
\BOOKMARK [-1][-]{part.5}{Part V Troubleshooting}{}
\BOOKMARK [0][-]{chapter.38}{Chapter 38 The Samba Checklist}{part.5}
\BOOKMARK [1][-]{section.38.1}{38.1 Introduction}{chapter.38}
\BOOKMARK [1][-]{section.38.2}{38.2 Assumptions}{chapter.38}
\BOOKMARK [1][-]{section.38.3}{38.3 The Tests}{chapter.38}
\BOOKMARK [0][-]{chapter.39}{Chapter 39 Analyzing and Solving Samba Problems}{part.5}
\BOOKMARK [1][-]{section.39.1}{39.1 Diagnostics Tools}{chapter.39}
\BOOKMARK [2][-]{subsection.39.1.1}{39.1.1 Debugging with Samba Itself}{section.39.1}
\BOOKMARK [2][-]{subsection.39.1.2}{39.1.2 Tcpdump}{section.39.1}
\BOOKMARK [2][-]{subsection.39.1.3}{39.1.3 Ethereal}{section.39.1}
\BOOKMARK [2][-]{subsection.39.1.4}{39.1.4 The Windows Network Monitor}{section.39.1}
\BOOKMARK [3][-]{subsubsection.39.1.4.1}{39.1.4.1 Installing Network Monitor on an NT Workstation}{subsection.39.1.4}
\BOOKMARK [3][-]{subsubsection.39.1.4.2}{39.1.4.2 Installing Network Monitor on Windows 9x/Me}{subsection.39.1.4}
\BOOKMARK [1][-]{section.39.2}{39.2 Useful URLs}{chapter.39}
\BOOKMARK [1][-]{section.39.3}{39.3 Getting Mailing List Help}{chapter.39}
\BOOKMARK [1][-]{section.39.4}{39.4 How to Get Off the Mailing Lists}{chapter.39}
\BOOKMARK [0][-]{chapter.40}{Chapter 40 Reporting Bugs}{part.5}
\BOOKMARK [1][-]{section.40.1}{40.1 Introduction}{chapter.40}
\BOOKMARK [1][-]{section.40.2}{40.2 General Information}{chapter.40}
\BOOKMARK [1][-]{section.40.3}{40.3 Debug Levels}{chapter.40}
\BOOKMARK [2][-]{subsection.40.3.1}{40.3.1 Debugging-Specific Operations}{section.40.3}
\BOOKMARK [1][-]{section.40.4}{40.4 Internal Errors}{chapter.40}
\BOOKMARK [1][-]{section.40.5}{40.5 Attaching to a Running Process}{chapter.40}
\BOOKMARK [1][-]{section.40.6}{40.6 Patches}{chapter.40}
\BOOKMARK [0][-]{chapter.41}{Chapter 41 Managing TDB Files}{part.5}
\BOOKMARK [1][-]{section.41.1}{41.1 Features and Benefits}{chapter.41}
\BOOKMARK [1][-]{section.41.2}{41.2 Managing TDB Files}{chapter.41}
\BOOKMARK [-1][-]{part.6}{Part VI Reference Section}{}
\BOOKMARK [0][-]{chapter.42}{Chapter 42 How to Compile Samba}{part.6}
\BOOKMARK [1][-]{section.42.1}{42.1 Access Samba Source Code via Subversion}{chapter.42}
\BOOKMARK [2][-]{subsection.42.1.1}{42.1.1 Introduction}{section.42.1}
\BOOKMARK [2][-]{subsection.42.1.2}{42.1.2 Subversion Access to samba.org}{section.42.1}
\BOOKMARK [3][-]{subsubsection.42.1.2.1}{42.1.2.1 Access via ViewCVS}{subsection.42.1.2}
\BOOKMARK [3][-]{subsubsection.42.1.2.2}{42.1.2.2 Access via Subversion}{subsection.42.1.2}
\BOOKMARK [1][-]{section.42.2}{42.2 Accessing the Samba Sources via rsync and ftp}{chapter.42}
\BOOKMARK [1][-]{section.42.3}{42.3 Verifying Samba's PGP Signature}{chapter.42}
\BOOKMARK [1][-]{section.42.4}{42.4 Building the Binaries}{chapter.42}
\BOOKMARK [2][-]{subsection.42.4.1}{42.4.1 Compiling Samba with Active Directory Support}{section.42.4}
\BOOKMARK [3][-]{subsubsection.42.4.1.1}{42.4.1.1 Installing the Required Packages for Debian}{subsection.42.4.1}
\BOOKMARK [3][-]{subsubsection.42.4.1.2}{42.4.1.2 Installing the Required Packages for Red Hat Linux}{subsection.42.4.1}
\BOOKMARK [3][-]{subsubsection.42.4.1.3}{42.4.1.3 SuSE Linux Package Requirements}{subsection.42.4.1}
\BOOKMARK [1][-]{section.42.5}{42.5 Starting the smbd nmbd and winbindd}{chapter.42}
\BOOKMARK [2][-]{subsection.42.5.1}{42.5.1 Starting from inetd.conf}{section.42.5}
\BOOKMARK [2][-]{subsection.42.5.2}{42.5.2 Alternative: Starting smbd as a Daemon}{section.42.5}
\BOOKMARK [3][-]{subsubsection.42.5.2.1}{42.5.2.1 Starting Samba for Red Hat Linux}{subsection.42.5.2}
\BOOKMARK [3][-]{subsubsection.42.5.2.2}{42.5.2.2 Starting Samba for Novell SUSE Linux}{subsection.42.5.2}
\BOOKMARK [0][-]{chapter.43}{Chapter 43 Portability}{part.6}
\BOOKMARK [1][-]{section.43.1}{43.1 HPUX}{chapter.43}
\BOOKMARK [1][-]{section.43.2}{43.2 SCO UNIX}{chapter.43}
\BOOKMARK [1][-]{section.43.3}{43.3 DNIX}{chapter.43}
\BOOKMARK [1][-]{section.43.4}{43.4 Red Hat Linux}{chapter.43}
\BOOKMARK [1][-]{section.43.5}{43.5 AIX: Sequential Read Ahead}{chapter.43}
\BOOKMARK [1][-]{section.43.6}{43.6 Solaris}{chapter.43}
\BOOKMARK [2][-]{subsection.43.6.1}{43.6.1 Locking Improvements}{section.43.6}
\BOOKMARK [2][-]{subsection.43.6.2}{43.6.2 Winbind on Solaris 9}{section.43.6}
\BOOKMARK [0][-]{chapter.44}{Chapter 44 Samba and Other CIFS Clients}{part.6}
\BOOKMARK [1][-]{section.44.1}{44.1 Macintosh Clients}{chapter.44}
\BOOKMARK [1][-]{section.44.2}{44.2 OS2 Client}{chapter.44}
\BOOKMARK [2][-]{subsection.44.2.1}{44.2.1 Configuring OS/2 Warp Connect or OS/2 Warp 4}{section.44.2}
\BOOKMARK [2][-]{subsection.44.2.2}{44.2.2 Configuring Other Versions of OS/2}{section.44.2}
\BOOKMARK [2][-]{subsection.44.2.3}{44.2.3 Printer Driver Download for OS/2 Clients}{section.44.2}
\BOOKMARK [1][-]{section.44.3}{44.3 Windows for Workgroups}{chapter.44}
\BOOKMARK [2][-]{subsection.44.3.1}{44.3.1 Latest TCP/IP Stack from Microsoft}{section.44.3}
\BOOKMARK [2][-]{subsection.44.3.2}{44.3.2 Delete .pwl Files After Password Change}{section.44.3}
\BOOKMARK [2][-]{subsection.44.3.3}{44.3.3 Configuring Windows for Workgroups Password Handling}{section.44.3}
\BOOKMARK [2][-]{subsection.44.3.4}{44.3.4 Password Case Sensitivity}{section.44.3}
\BOOKMARK [2][-]{subsection.44.3.5}{44.3.5 Use TCP/IP as Default Protocol}{section.44.3}
\BOOKMARK [2][-]{subsection.44.3.6}{44.3.6 Speed Improvement}{section.44.3}
\BOOKMARK [1][-]{section.44.4}{44.4 Windows 95/98}{chapter.44}
\BOOKMARK [2][-]{subsection.44.4.1}{44.4.1 Speed Improvement}{section.44.4}
\BOOKMARK [1][-]{section.44.5}{44.5 Windows 2000 Service Pack 2}{chapter.44}
\BOOKMARK [1][-]{section.44.6}{44.6 Windows NT 3.1}{chapter.44}
\BOOKMARK [0][-]{chapter.45}{Chapter 45 Samba Performance Tuning}{part.6}
\BOOKMARK [1][-]{section.45.1}{45.1 Comparisons}{chapter.45}
\BOOKMARK [1][-]{section.45.2}{45.2 Socket Options}{chapter.45}
\BOOKMARK [1][-]{section.45.3}{45.3 Read Size}{chapter.45}
\BOOKMARK [1][-]{section.45.4}{45.4 Max Xmit}{chapter.45}
\BOOKMARK [1][-]{section.45.5}{45.5 Log Level}{chapter.45}
\BOOKMARK [1][-]{section.45.6}{45.6 Read Raw}{chapter.45}
\BOOKMARK [1][-]{section.45.7}{45.7 Write Raw}{chapter.45}
\BOOKMARK [1][-]{section.45.8}{45.8 Slow Logins}{chapter.45}
\BOOKMARK [1][-]{section.45.9}{45.9 Client Tuning}{chapter.45}
\BOOKMARK [1][-]{section.45.10}{45.10 Samba Performance Problem Due to Changing Linux Kernel}{chapter.45}
\BOOKMARK [1][-]{section.45.11}{45.11 Corrupt tdb Files}{chapter.45}
\BOOKMARK [1][-]{section.45.12}{45.12 Samba Performance is Very Slow}{chapter.45}
\BOOKMARK [0][-]{chapter.46}{Chapter 46 LDAP and Transport Layer Security}{part.6}
\BOOKMARK [1][-]{section.46.1}{46.1 Introduction}{chapter.46}
\BOOKMARK [1][-]{section.46.2}{46.2 Configuring}{chapter.46}
\BOOKMARK [2][-]{subsection.46.2.1}{46.2.1 Generating the Certificate Authority}{section.46.2}
\BOOKMARK [2][-]{subsection.46.2.2}{46.2.2 Generating the Server Certificate}{section.46.2}
\BOOKMARK [2][-]{subsection.46.2.3}{46.2.3 Installing the Certificates}{section.46.2}
\BOOKMARK [1][-]{section.46.3}{46.3 Testing}{chapter.46}
\BOOKMARK [1][-]{section.46.4}{46.4 Troubleshooting}{chapter.46}
\BOOKMARK [0][-]{chapter.47}{Chapter 47 Samba Support}{part.6}
\BOOKMARK [1][-]{section.47.1}{47.1 Free Support}{chapter.47}
\BOOKMARK [1][-]{section.47.2}{47.2 Commercial Support}{chapter.47}
\BOOKMARK [0][-]{chapter.48}{Chapter 48 DNS and DHCP Configuration Guide}{part.6}
\BOOKMARK [1][-]{section.48.1}{48.1 Features and Benefits}{chapter.48}
\BOOKMARK [1][-]{section.48.2}{48.2 Example Configuration}{chapter.48}
\BOOKMARK [2][-]{subsection.48.2.1}{48.2.1 Dynamic DNS}{section.48.2}
\BOOKMARK [2][-]{subsection.48.2.2}{48.2.2 DHCP Server}{section.48.2}
\BOOKMARK [0][-]{appendix.A}{Chapter A GNU General Public License version 3}{part.6}
\BOOKMARK [0][-]{section*.58}{Glossary}{part.6}
\BOOKMARK [0][-]{appendix*.59}{SUBJECT INDEX}{part.6}
|