File: Samba3-HOWTO.out

package info (click to toggle)
samba 2%3A3.2.5-4lenny15
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 124,704 kB
  • ctags: 69,181
  • sloc: ansic: 564,153; xml: 219,271; sh: 11,039; perl: 4,458; makefile: 4,301; python: 1,975; cpp: 1,224; exp: 1,147; yacc: 881; awk: 557; csh: 58; sed: 45
file content (923 lines) | stat: -rw-r--r-- 79,554 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
\BOOKMARK [0][-]{section*.1}{About the Cover Artwork}{}
\BOOKMARK [0][-]{chapter*.2}{Attribution}{}
\BOOKMARK [0][-]{id2408614}{Contents}{}
\BOOKMARK [0][-]{chapter*.3}{List of Examples}{}
\BOOKMARK [0][-]{chapter*.4}{List of Figures}{}
\BOOKMARK [0][-]{chapter*.5}{List of Tables}{}
\BOOKMARK [0][-]{chapter*.6}{Foreword}{}
\BOOKMARK [0][-]{chapter*.7}{Preface}{}
\BOOKMARK [0][-]{section*.9}{Introduction}{}
\BOOKMARK [-1][-]{part.1}{Part I General Installation}{}
\BOOKMARK [0][-]{section*.14}{Preparing Samba for Configuration}{part.1}
\BOOKMARK [0][-]{chapter.1}{Chapter 1 How to Install and Test SAMBA}{part.1}
\BOOKMARK [1][-]{section.1.1}{1.1 Obtaining and Installing Samba}{chapter.1}
\BOOKMARK [1][-]{section.1.2}{1.2 Configuring Samba \(smb.conf\)}{chapter.1}
\BOOKMARK [2][-]{subsection.1.2.1}{1.2.1 Configuration File Syntax}{section.1.2}
\BOOKMARK [2][-]{subsection.1.2.2}{1.2.2 TDB Database File Information}{section.1.2}
\BOOKMARK [2][-]{subsection.1.2.3}{1.2.3 Starting Samba}{section.1.2}
\BOOKMARK [2][-]{subsection.1.2.4}{1.2.4 Example Configuration}{section.1.2}
\BOOKMARK [3][-]{subsubsection.1.2.4.1}{1.2.4.1 Test Your Config File with testparm}{subsection.1.2.4}
\BOOKMARK [2][-]{subsection.1.2.5}{1.2.5 SWAT}{section.1.2}
\BOOKMARK [1][-]{section.1.3}{1.3 List Shares Available on the Server}{chapter.1}
\BOOKMARK [1][-]{section.1.4}{1.4 Connect with a UNIX Client}{chapter.1}
\BOOKMARK [1][-]{section.1.5}{1.5 Connect from a Remote SMB Client}{chapter.1}
\BOOKMARK [2][-]{subsection.1.5.1}{1.5.1 What If Things Don't Work?}{section.1.5}
\BOOKMARK [2][-]{subsection.1.5.2}{1.5.2 Still Stuck?}{section.1.5}
\BOOKMARK [1][-]{section.1.6}{1.6 Common Errors}{chapter.1}
\BOOKMARK [2][-]{subsection.1.6.1}{1.6.1 Large Number of smbd Processes}{section.1.6}
\BOOKMARK [2][-]{subsection.1.6.2}{1.6.2 Error Message: open\137oplock\137ipc}{section.1.6}
\BOOKMARK [2][-]{subsection.1.6.3}{1.6.3 ``The network name cannot be found''}{section.1.6}
\BOOKMARK [0][-]{chapter.2}{Chapter 2 Fast Start: Cure for Impatience}{part.1}
\BOOKMARK [1][-]{section.2.1}{2.1 Features and Benefits}{chapter.2}
\BOOKMARK [1][-]{section.2.2}{2.2 Description of Example Sites}{chapter.2}
\BOOKMARK [1][-]{section.2.3}{2.3 Worked Examples}{chapter.2}
\BOOKMARK [2][-]{subsection.2.3.1}{2.3.1 Standalone Server}{section.2.3}
\BOOKMARK [3][-]{subsubsection.2.3.1.1}{2.3.1.1 Anonymous Read-Only Document Server}{subsection.2.3.1}
\BOOKMARK [3][-]{subsubsection.2.3.1.2}{2.3.1.2 Anonymous Read-Write Document Server}{subsection.2.3.1}
\BOOKMARK [3][-]{subsubsection.2.3.1.3}{2.3.1.3 Anonymous Print Server}{subsection.2.3.1}
\BOOKMARK [3][-]{subsubsection.2.3.1.4}{2.3.1.4 Secure Read-Write File and Print Server}{subsection.2.3.1}
\BOOKMARK [2][-]{subsection.2.3.2}{2.3.2 Domain Member Server}{section.2.3}
\BOOKMARK [3][-]{subsubsection.2.3.2.1}{2.3.2.1 Example Configuration}{subsection.2.3.2}
\BOOKMARK [2][-]{subsection.2.3.3}{2.3.3 Domain Controller}{section.2.3}
\BOOKMARK [3][-]{subsubsection.2.3.3.1}{2.3.3.1 Example: Engineering Office}{subsection.2.3.3}
\BOOKMARK [3][-]{subsubsection.2.3.3.2}{2.3.3.2 A Big Organization}{subsection.2.3.3}
\BOOKMARK [-1][-]{part.2}{Part II Server Configuration Basics}{}
\BOOKMARK [0][-]{section*.18}{First Steps in Server Configuration}{part.2}
\BOOKMARK [0][-]{chapter.3}{Chapter 3 Server Types and Security Modes}{part.2}
\BOOKMARK [1][-]{section.3.1}{3.1 Features and Benefits}{chapter.3}
\BOOKMARK [1][-]{section.3.2}{3.2 Server Types}{chapter.3}
\BOOKMARK [1][-]{section.3.3}{3.3 Samba Security Modes}{chapter.3}
\BOOKMARK [2][-]{subsection.3.3.1}{3.3.1 User Level Security}{section.3.3}
\BOOKMARK [3][-]{subsubsection.3.3.1.1}{3.3.1.1 Example Configuration}{subsection.3.3.1}
\BOOKMARK [2][-]{subsection.3.3.2}{3.3.2 Share-Level Security}{section.3.3}
\BOOKMARK [3][-]{subsubsection.3.3.2.1}{3.3.2.1 Example Configuration}{subsection.3.3.2}
\BOOKMARK [2][-]{subsection.3.3.3}{3.3.3 Domain Security Mode \(User-Level Security\)}{section.3.3}
\BOOKMARK [3][-]{subsubsection.3.3.3.1}{3.3.3.1 Example Configuration}{subsection.3.3.3}
\BOOKMARK [2][-]{subsection.3.3.4}{3.3.4 ADS Security Mode \(User-Level Security\)}{section.3.3}
\BOOKMARK [3][-]{subsubsection.3.3.4.1}{3.3.4.1 Example Configuration}{subsection.3.3.4}
\BOOKMARK [2][-]{subsection.3.3.5}{3.3.5 Server Security \(User Level Security\)}{section.3.3}
\BOOKMARK [3][-]{subsubsection.3.3.5.1}{3.3.5.1 Example Configuration}{subsection.3.3.5}
\BOOKMARK [1][-]{section.3.4}{3.4 Password Checking}{chapter.3}
\BOOKMARK [1][-]{section.3.5}{3.5 Common Errors}{chapter.3}
\BOOKMARK [2][-]{subsection.3.5.1}{3.5.1 What Makes Samba a Server?}{section.3.5}
\BOOKMARK [2][-]{subsection.3.5.2}{3.5.2 What Makes Samba a Domain Controller?}{section.3.5}
\BOOKMARK [2][-]{subsection.3.5.3}{3.5.3 What Makes Samba a Domain Member?}{section.3.5}
\BOOKMARK [2][-]{subsection.3.5.4}{3.5.4 Constantly Losing Connections to Password Server}{section.3.5}
\BOOKMARK [2][-]{subsection.3.5.5}{3.5.5 Stand-alone Server is converted to Domain Controller --- Now User accounts don't work}{section.3.5}
\BOOKMARK [0][-]{chapter.4}{Chapter 4 Domain Control}{part.2}
\BOOKMARK [1][-]{section.4.1}{4.1 Features and Benefits}{chapter.4}
\BOOKMARK [1][-]{section.4.2}{4.2 Single Sign-On and Domain Security}{chapter.4}
\BOOKMARK [1][-]{section.4.3}{4.3 Basics of Domain Control}{chapter.4}
\BOOKMARK [2][-]{subsection.4.3.1}{4.3.1 Domain Controller Types}{section.4.3}
\BOOKMARK [2][-]{subsection.4.3.2}{4.3.2 Preparing for Domain Control}{section.4.3}
\BOOKMARK [1][-]{section.4.4}{4.4 Domain Control: Example Configuration}{chapter.4}
\BOOKMARK [1][-]{section.4.5}{4.5 Samba ADS Domain Control}{chapter.4}
\BOOKMARK [1][-]{section.4.6}{4.6 Domain and Network Logon Configuration}{chapter.4}
\BOOKMARK [2][-]{subsection.4.6.1}{4.6.1 Domain Network Logon Service}{section.4.6}
\BOOKMARK [3][-]{subsubsection.4.6.1.1}{4.6.1.1 Example Configuration}{subsection.4.6.1}
\BOOKMARK [3][-]{subsubsection.4.6.1.2}{4.6.1.2 The Special Case of MS Windows XP Home Edition}{subsection.4.6.1}
\BOOKMARK [3][-]{subsubsection.4.6.1.3}{4.6.1.3 The Special Case of Windows 9x/Me}{subsection.4.6.1}
\BOOKMARK [2][-]{subsection.4.6.2}{4.6.2 Security Mode and Master Browsers}{section.4.6}
\BOOKMARK [1][-]{section.4.7}{4.7 Common Errors}{chapter.4}
\BOOKMARK [2][-]{subsection.4.7.1}{4.7.1 ``\044'' Cannot Be Included in Machine Name}{section.4.7}
\BOOKMARK [2][-]{subsection.4.7.2}{4.7.2 Joining Domain Fails Because of Existing Machine Account}{section.4.7}
\BOOKMARK [2][-]{subsection.4.7.3}{4.7.3 The System Cannot Log You On \(C000019B\)}{section.4.7}
\BOOKMARK [2][-]{subsection.4.7.4}{4.7.4 The Machine Trust Account Is Not Accessible}{section.4.7}
\BOOKMARK [2][-]{subsection.4.7.5}{4.7.5 Account Disabled}{section.4.7}
\BOOKMARK [2][-]{subsection.4.7.6}{4.7.6 Domain Controller Unavailable}{section.4.7}
\BOOKMARK [2][-]{subsection.4.7.7}{4.7.7 Cannot Log onto Domain Member Workstation After Joining Domain}{section.4.7}
\BOOKMARK [0][-]{chapter.5}{Chapter 5 Backup Domain Control}{part.2}
\BOOKMARK [1][-]{section.5.1}{5.1 Features and Benefits}{chapter.5}
\BOOKMARK [1][-]{section.5.2}{5.2 Essential Background Information}{chapter.5}
\BOOKMARK [2][-]{subsection.5.2.1}{5.2.1 MS Windows NT4-style Domain Control}{section.5.2}
\BOOKMARK [3][-]{subsubsection.5.2.1.1}{5.2.1.1 Example PDC Configuration}{subsection.5.2.1}
\BOOKMARK [2][-]{subsection.5.2.2}{5.2.2 LDAP Configuration Notes}{section.5.2}
\BOOKMARK [2][-]{subsection.5.2.3}{5.2.3 Active Directory Domain Control}{section.5.2}
\BOOKMARK [2][-]{subsection.5.2.4}{5.2.4 What Qualifies a Domain Controller on the Network?}{section.5.2}
\BOOKMARK [2][-]{subsection.5.2.5}{5.2.5 How Does a Workstation find its Domain Controller?}{section.5.2}
\BOOKMARK [3][-]{subsubsection.5.2.5.1}{5.2.5.1 NetBIOS Over TCP/IP Enabled}{subsection.5.2.5}
\BOOKMARK [3][-]{subsubsection.5.2.5.2}{5.2.5.2 NetBIOS Over TCP/IP Disabled}{subsection.5.2.5}
\BOOKMARK [1][-]{section.5.3}{5.3 Backup Domain Controller Configuration}{chapter.5}
\BOOKMARK [2][-]{subsection.5.3.1}{5.3.1 Example Configuration}{section.5.3}
\BOOKMARK [1][-]{section.5.4}{5.4 Common Errors}{chapter.5}
\BOOKMARK [2][-]{subsection.5.4.1}{5.4.1 Machine Accounts Keep Expiring}{section.5.4}
\BOOKMARK [2][-]{subsection.5.4.2}{5.4.2 Can Samba Be a Backup Domain Controller to an NT4 PDC?}{section.5.4}
\BOOKMARK [2][-]{subsection.5.4.3}{5.4.3 How Do I Replicate the smbpasswd File?}{section.5.4}
\BOOKMARK [2][-]{subsection.5.4.4}{5.4.4 Can I Do This All with LDAP?}{section.5.4}
\BOOKMARK [0][-]{chapter.6}{Chapter 6 Domain Membership}{part.2}
\BOOKMARK [1][-]{section.6.1}{6.1 Features and Benefits}{chapter.6}
\BOOKMARK [1][-]{section.6.2}{6.2 MS Windows Workstation/Server Machine Trust Accounts}{chapter.6}
\BOOKMARK [2][-]{subsection.6.2.1}{6.2.1 Manual Creation of Machine Trust Accounts}{section.6.2}
\BOOKMARK [2][-]{subsection.6.2.2}{6.2.2 Managing Domain Machine Accounts using NT4 Server Manager}{section.6.2}
\BOOKMARK [2][-]{subsection.6.2.3}{6.2.3 On-the-Fly Creation of Machine Trust Accounts}{section.6.2}
\BOOKMARK [2][-]{subsection.6.2.4}{6.2.4 Making an MS Windows Workstation or Server a Domain Member}{section.6.2}
\BOOKMARK [3][-]{subsubsection.6.2.4.1}{6.2.4.1 Windows 200x/XP Professional Client}{subsection.6.2.4}
\BOOKMARK [3][-]{subsubsection.6.2.4.2}{6.2.4.2 Windows NT4 Client}{subsection.6.2.4}
\BOOKMARK [3][-]{subsubsection.6.2.4.3}{6.2.4.3 Samba Client}{subsection.6.2.4}
\BOOKMARK [1][-]{section.6.3}{6.3 Domain Member Server}{chapter.6}
\BOOKMARK [2][-]{subsection.6.3.1}{6.3.1 Joining an NT4-type Domain with Samba-3}{section.6.3}
\BOOKMARK [2][-]{subsection.6.3.2}{6.3.2 Why Is This Better Than security = server?}{section.6.3}
\BOOKMARK [1][-]{section.6.4}{6.4 Samba ADS Domain Membership}{chapter.6}
\BOOKMARK [2][-]{subsection.6.4.1}{6.4.1 Configure smb.conf}{section.6.4}
\BOOKMARK [2][-]{subsection.6.4.2}{6.4.2 Configure /etc/krb5.conf}{section.6.4}
\BOOKMARK [2][-]{subsection.6.4.3}{6.4.3 Create the Computer Account}{section.6.4}
\BOOKMARK [3][-]{subsubsection.6.4.3.1}{6.4.3.1 Possible Errors}{subsection.6.4.3}
\BOOKMARK [2][-]{subsection.6.4.4}{6.4.4 Testing Server Setup}{section.6.4}
\BOOKMARK [2][-]{subsection.6.4.5}{6.4.5 Testing with smbclient}{section.6.4}
\BOOKMARK [2][-]{subsection.6.4.6}{6.4.6 Notes}{section.6.4}
\BOOKMARK [1][-]{section.6.5}{6.5 Sharing User ID Mappings between Samba Domain Members}{chapter.6}
\BOOKMARK [1][-]{section.6.6}{6.6 Common Errors}{chapter.6}
\BOOKMARK [2][-]{subsection.6.6.1}{6.6.1 Cannot Add Machine Back to Domain}{section.6.6}
\BOOKMARK [2][-]{subsection.6.6.2}{6.6.2 Adding Machine to Domain Fails}{section.6.6}
\BOOKMARK [2][-]{subsection.6.6.3}{6.6.3 I Can't Join a Windows 2003 PDC}{section.6.6}
\BOOKMARK [0][-]{chapter.7}{Chapter 7 Standalone Servers}{part.2}
\BOOKMARK [1][-]{section.7.1}{7.1 Features and Benefits}{chapter.7}
\BOOKMARK [1][-]{section.7.2}{7.2 Background}{chapter.7}
\BOOKMARK [1][-]{section.7.3}{7.3 Example Configuration}{chapter.7}
\BOOKMARK [2][-]{subsection.7.3.1}{7.3.1 Reference Documentation Server}{section.7.3}
\BOOKMARK [2][-]{subsection.7.3.2}{7.3.2 Central Print Serving}{section.7.3}
\BOOKMARK [1][-]{section.7.4}{7.4 Common Errors}{chapter.7}
\BOOKMARK [0][-]{chapter.8}{Chapter 8 MS Windows Network Configuration Guide}{part.2}
\BOOKMARK [1][-]{section.8.1}{8.1 Features and Benefits}{chapter.8}
\BOOKMARK [1][-]{section.8.2}{8.2 Technical Details}{chapter.8}
\BOOKMARK [2][-]{subsection.8.2.1}{8.2.1 TCP/IP Configuration}{section.8.2}
\BOOKMARK [3][-]{subsubsection.8.2.1.1}{8.2.1.1 MS Windows XP Professional}{subsection.8.2.1}
\BOOKMARK [3][-]{subsubsection.8.2.1.2}{8.2.1.2 MS Windows 2000}{subsection.8.2.1}
\BOOKMARK [3][-]{subsubsection.8.2.1.3}{8.2.1.3 MS Windows Me}{subsection.8.2.1}
\BOOKMARK [2][-]{subsection.8.2.2}{8.2.2 Joining a Domain: Windows 2000/XP Professional}{section.8.2}
\BOOKMARK [2][-]{subsection.8.2.3}{8.2.3 Domain Logon Configuration: Windows 9x/Me}{section.8.2}
\BOOKMARK [1][-]{section.8.3}{8.3 Common Errors}{chapter.8}
\BOOKMARK [-1][-]{part.3}{Part III Advanced Configuration}{}
\BOOKMARK [0][-]{section*.20}{Valuable Nuts and Bolts Information}{part.3}
\BOOKMARK [0][-]{chapter.9}{Chapter 9 Important and Critical Change Notes for the Samba 3.x Series}{part.3}
\BOOKMARK [1][-]{section.9.1}{9.1 Important Samba-3.2.x Change Notes}{chapter.9}
\BOOKMARK [1][-]{section.9.2}{9.2 Important Samba-3.0.x Change Notes}{chapter.9}
\BOOKMARK [2][-]{subsection.9.2.1}{9.2.1 User and Group Changes}{section.9.2}
\BOOKMARK [2][-]{subsection.9.2.2}{9.2.2 Essential Group Mappings}{section.9.2}
\BOOKMARK [2][-]{subsection.9.2.3}{9.2.3 Passdb Changes}{section.9.2}
\BOOKMARK [2][-]{subsection.9.2.4}{9.2.4 Group Mapping Changes in Samba-3.0.23}{section.9.2}
\BOOKMARK [2][-]{subsection.9.2.5}{9.2.5 LDAP Changes in Samba-3.0.23}{section.9.2}
\BOOKMARK [0][-]{chapter.10}{Chapter 10 Network Browsing}{part.3}
\BOOKMARK [1][-]{section.10.1}{10.1 Features and Benefits}{chapter.10}
\BOOKMARK [1][-]{section.10.2}{10.2 What Is Browsing?}{chapter.10}
\BOOKMARK [1][-]{section.10.3}{10.3 Discussion}{chapter.10}
\BOOKMARK [2][-]{subsection.10.3.1}{10.3.1 NetBIOS over TCP/IP}{section.10.3}
\BOOKMARK [2][-]{subsection.10.3.2}{10.3.2 TCP/IP without NetBIOS}{section.10.3}
\BOOKMARK [2][-]{subsection.10.3.3}{10.3.3 DNS and Active Directory}{section.10.3}
\BOOKMARK [1][-]{section.10.4}{10.4 How Browsing Functions}{chapter.10}
\BOOKMARK [2][-]{subsection.10.4.1}{10.4.1 Configuring Workgroup Browsing}{section.10.4}
\BOOKMARK [2][-]{subsection.10.4.2}{10.4.2 Domain Browsing Configuration}{section.10.4}
\BOOKMARK [2][-]{subsection.10.4.3}{10.4.3 Forcing Samba to Be the Master}{section.10.4}
\BOOKMARK [2][-]{subsection.10.4.4}{10.4.4 Making Samba the Domain Master}{section.10.4}
\BOOKMARK [2][-]{subsection.10.4.5}{10.4.5 Note about Broadcast Addresses}{section.10.4}
\BOOKMARK [2][-]{subsection.10.4.6}{10.4.6 Multiple Interfaces}{section.10.4}
\BOOKMARK [2][-]{subsection.10.4.7}{10.4.7 Use of the Remote Announce Parameter}{section.10.4}
\BOOKMARK [2][-]{subsection.10.4.8}{10.4.8 Use of the Remote Browse Sync Parameter}{section.10.4}
\BOOKMARK [1][-]{section.10.5}{10.5 WINS: The Windows Internetworking Name Server}{chapter.10}
\BOOKMARK [2][-]{subsection.10.5.1}{10.5.1 WINS Server Configuration}{section.10.5}
\BOOKMARK [2][-]{subsection.10.5.2}{10.5.2 WINS Replication}{section.10.5}
\BOOKMARK [2][-]{subsection.10.5.3}{10.5.3 Static WINS Entries}{section.10.5}
\BOOKMARK [1][-]{section.10.6}{10.6 Helpful Hints}{chapter.10}
\BOOKMARK [2][-]{subsection.10.6.1}{10.6.1 Windows Networking Protocols}{section.10.6}
\BOOKMARK [2][-]{subsection.10.6.2}{10.6.2 Name Resolution Order}{section.10.6}
\BOOKMARK [1][-]{section.10.7}{10.7 Technical Overview of Browsing}{chapter.10}
\BOOKMARK [2][-]{subsection.10.7.1}{10.7.1 Browsing Support in Samba}{section.10.7}
\BOOKMARK [2][-]{subsection.10.7.2}{10.7.2 Problem Resolution}{section.10.7}
\BOOKMARK [2][-]{subsection.10.7.3}{10.7.3 Cross-Subnet Browsing}{section.10.7}
\BOOKMARK [3][-]{subsubsection.10.7.3.1}{10.7.3.1 Behavior of Cross-Subnet Browsing}{subsection.10.7.3}
\BOOKMARK [1][-]{section.10.8}{10.8 Common Errors}{chapter.10}
\BOOKMARK [2][-]{subsection.10.8.1}{10.8.1 Flushing the Samba NetBIOS Name Cache}{section.10.8}
\BOOKMARK [2][-]{subsection.10.8.2}{10.8.2 Server Resources Cannot Be Listed}{section.10.8}
\BOOKMARK [2][-]{subsection.10.8.3}{10.8.3 I Get an "Unable to browse the network" Error}{section.10.8}
\BOOKMARK [2][-]{subsection.10.8.4}{10.8.4 Browsing of Shares and Directories is Very Slow}{section.10.8}
\BOOKMARK [2][-]{subsection.10.8.5}{10.8.5 Invalid Cached Share References Affects Network Browsing}{section.10.8}
\BOOKMARK [0][-]{chapter.11}{Chapter 11 Account Information Databases}{part.3}
\BOOKMARK [1][-]{section.11.1}{11.1 Features and Benefits}{chapter.11}
\BOOKMARK [2][-]{subsection.11.1.1}{11.1.1 Backward Compatibility Account Storage Systems}{section.11.1}
\BOOKMARK [2][-]{subsection.11.1.2}{11.1.2 New Account Storage Systems}{section.11.1}
\BOOKMARK [1][-]{section.11.2}{11.2 Technical Information}{chapter.11}
\BOOKMARK [2][-]{subsection.11.2.1}{11.2.1 Important Notes About Security}{section.11.2}
\BOOKMARK [3][-]{subsubsection.11.2.1.1}{11.2.1.1 Advantages of Encrypted Passwords}{subsection.11.2.1}
\BOOKMARK [3][-]{subsubsection.11.2.1.2}{11.2.1.2 Advantages of Non-Encrypted Passwords}{subsection.11.2.1}
\BOOKMARK [2][-]{subsection.11.2.2}{11.2.2 Mapping User Identifiers between MS Windows and UNIX}{section.11.2}
\BOOKMARK [2][-]{subsection.11.2.3}{11.2.3 Mapping Common UIDs/GIDs on Distributed Machines}{section.11.2}
\BOOKMARK [2][-]{subsection.11.2.4}{11.2.4 Comments Regarding LDAP}{section.11.2}
\BOOKMARK [3][-]{subsubsection.11.2.4.1}{11.2.4.1 Caution Regarding LDAP and Samba}{subsection.11.2.4}
\BOOKMARK [2][-]{subsection.11.2.5}{11.2.5 LDAP Directories and Windows Computer Accounts}{section.11.2}
\BOOKMARK [1][-]{section.11.3}{11.3 Account Management Tools}{chapter.11}
\BOOKMARK [2][-]{subsection.11.3.1}{11.3.1 The smbpasswd Tool}{section.11.3}
\BOOKMARK [2][-]{subsection.11.3.2}{11.3.2 The pdbedit Tool}{section.11.3}
\BOOKMARK [3][-]{subsubsection.11.3.2.1}{11.3.2.1 User Account Management}{subsection.11.3.2}
\BOOKMARK [3][-]{subsubsection.11.3.2.2}{11.3.2.2 Account Import/Export}{subsection.11.3.2}
\BOOKMARK [1][-]{section.11.4}{11.4 Password Backends}{chapter.11}
\BOOKMARK [2][-]{subsection.11.4.1}{11.4.1 Plaintext}{section.11.4}
\BOOKMARK [2][-]{subsection.11.4.2}{11.4.2 smbpasswd: Encrypted Password Database}{section.11.4}
\BOOKMARK [2][-]{subsection.11.4.3}{11.4.3 tdbsam}{section.11.4}
\BOOKMARK [2][-]{subsection.11.4.4}{11.4.4 ldapsam}{section.11.4}
\BOOKMARK [3][-]{subsubsection.11.4.4.1}{11.4.4.1 Supported LDAP Servers}{subsection.11.4.4}
\BOOKMARK [3][-]{subsubsection.11.4.4.2}{11.4.4.2 Schema and Relationship to the RFC 2307 posixAccount}{subsection.11.4.4}
\BOOKMARK [3][-]{subsubsection.11.4.4.3}{11.4.4.3 OpenLDAP Configuration}{subsection.11.4.4}
\BOOKMARK [3][-]{subsubsection.11.4.4.4}{11.4.4.4 Initialize the LDAP Database}{subsection.11.4.4}
\BOOKMARK [3][-]{subsubsection.11.4.4.5}{11.4.4.5 Configuring Samba}{subsection.11.4.4}
\BOOKMARK [3][-]{subsubsection.11.4.4.6}{11.4.4.6 Accounts and Groups Management}{subsection.11.4.4}
\BOOKMARK [3][-]{subsubsection.11.4.4.7}{11.4.4.7 Security and sambaSamAccount}{subsection.11.4.4}
\BOOKMARK [3][-]{subsubsection.11.4.4.8}{11.4.4.8 LDAP Special Attributes for sambaSamAccounts}{subsection.11.4.4}
\BOOKMARK [3][-]{subsubsection.11.4.4.9}{11.4.4.9 Example LDIF Entries for a sambaSamAccount}{subsection.11.4.4}
\BOOKMARK [3][-]{subsubsection.11.4.4.10}{11.4.4.10 Password Synchronization}{subsection.11.4.4}
\BOOKMARK [3][-]{subsubsection.11.4.4.11}{11.4.4.11 Using OpenLDAP Overlay for Password Syncronization}{subsection.11.4.4}
\BOOKMARK [1][-]{section.11.5}{11.5 Common Errors}{chapter.11}
\BOOKMARK [2][-]{subsection.11.5.1}{11.5.1 Users Cannot Logon}{section.11.5}
\BOOKMARK [2][-]{subsection.11.5.2}{11.5.2 Configuration of auth methods}{section.11.5}
\BOOKMARK [0][-]{chapter.12}{Chapter 12 Group Mapping: MS Windows and UNIX}{part.3}
\BOOKMARK [1][-]{section.12.1}{12.1 Features and Benefits}{chapter.12}
\BOOKMARK [1][-]{section.12.2}{12.2 Discussion}{chapter.12}
\BOOKMARK [2][-]{subsection.12.2.1}{12.2.1 Warning: User Private Group Problems}{section.12.2}
\BOOKMARK [2][-]{subsection.12.2.2}{12.2.2 Nested Groups: Adding Windows Domain Groups to Windows Local Groups}{section.12.2}
\BOOKMARK [2][-]{subsection.12.2.3}{12.2.3 Important Administrative Information}{section.12.2}
\BOOKMARK [3][-]{subsubsection.12.2.3.1}{12.2.3.1 Applicable Only to Versions Earlier than 3.0.11}{subsection.12.2.3}
\BOOKMARK [2][-]{subsection.12.2.4}{12.2.4 Default Users, Groups, and Relative Identifiers}{section.12.2}
\BOOKMARK [2][-]{subsection.12.2.5}{12.2.5 Example Configuration}{section.12.2}
\BOOKMARK [1][-]{section.12.3}{12.3 Configuration Scripts}{chapter.12}
\BOOKMARK [2][-]{subsection.12.3.1}{12.3.1 Sample smb.conf Add Group Script}{section.12.3}
\BOOKMARK [2][-]{subsection.12.3.2}{12.3.2 Script to Configure Group Mapping}{section.12.3}
\BOOKMARK [1][-]{section.12.4}{12.4 Common Errors}{chapter.12}
\BOOKMARK [2][-]{subsection.12.4.1}{12.4.1 Adding Groups Fails}{section.12.4}
\BOOKMARK [2][-]{subsection.12.4.2}{12.4.2 Adding Domain Users to the Workstation Power Users Group}{section.12.4}
\BOOKMARK [0][-]{chapter.13}{Chapter 13 Remote and Local Management: The Net Command}{part.3}
\BOOKMARK [1][-]{section.13.1}{13.1 Overview}{chapter.13}
\BOOKMARK [1][-]{section.13.2}{13.2 Administrative Tasks and Methods}{chapter.13}
\BOOKMARK [1][-]{section.13.3}{13.3 UNIX and Windows Group Management}{chapter.13}
\BOOKMARK [2][-]{subsection.13.3.1}{13.3.1 Adding, Renaming, or Deletion of Group Accounts}{section.13.3}
\BOOKMARK [3][-]{subsubsection.13.3.1.1}{13.3.1.1 Adding or Creating a New Group}{subsection.13.3.1}
\BOOKMARK [3][-]{subsubsection.13.3.1.2}{13.3.1.2 Mapping Windows Groups to UNIX Groups}{subsection.13.3.1}
\BOOKMARK [3][-]{subsubsection.13.3.1.3}{13.3.1.3 Deleting a Group Account}{subsection.13.3.1}
\BOOKMARK [3][-]{subsubsection.13.3.1.4}{13.3.1.4 Rename Group Accounts}{subsection.13.3.1}
\BOOKMARK [2][-]{subsection.13.3.2}{13.3.2 Manipulating Group Memberships}{section.13.3}
\BOOKMARK [2][-]{subsection.13.3.3}{13.3.3 Nested Group Support}{section.13.3}
\BOOKMARK [3][-]{subsubsection.13.3.3.1}{13.3.3.1 Managing Nest Groups on Workstations from the Samba Server}{subsection.13.3.3}
\BOOKMARK [1][-]{section.13.4}{13.4 UNIX and Windows User Management}{chapter.13}
\BOOKMARK [2][-]{subsection.13.4.1}{13.4.1 Adding User Accounts}{section.13.4}
\BOOKMARK [2][-]{subsection.13.4.2}{13.4.2 Deletion of User Accounts}{section.13.4}
\BOOKMARK [2][-]{subsection.13.4.3}{13.4.3 Managing User Accounts}{section.13.4}
\BOOKMARK [2][-]{subsection.13.4.4}{13.4.4 User Mapping}{section.13.4}
\BOOKMARK [1][-]{section.13.5}{13.5 Administering User Rights and Privileges}{chapter.13}
\BOOKMARK [1][-]{section.13.6}{13.6 Managing Trust Relationships}{chapter.13}
\BOOKMARK [2][-]{subsection.13.6.1}{13.6.1 Machine Trust Accounts}{section.13.6}
\BOOKMARK [2][-]{subsection.13.6.2}{13.6.2 Interdomain Trusts}{section.13.6}
\BOOKMARK [1][-]{section.13.7}{13.7 Managing Security Identifiers \(SIDS\)}{chapter.13}
\BOOKMARK [1][-]{section.13.8}{13.8 Share Management}{chapter.13}
\BOOKMARK [2][-]{subsection.13.8.1}{13.8.1 Creating, Editing, and Removing Shares}{section.13.8}
\BOOKMARK [2][-]{subsection.13.8.2}{13.8.2 Creating and Changing Share ACLs}{section.13.8}
\BOOKMARK [2][-]{subsection.13.8.3}{13.8.3 Share, Directory, and File Migration}{section.13.8}
\BOOKMARK [3][-]{subsubsection.13.8.3.1}{13.8.3.1 Share Migration}{subsection.13.8.3}
\BOOKMARK [3][-]{subsubsection.13.8.3.2}{13.8.3.2 File and Directory Migration}{subsection.13.8.3}
\BOOKMARK [3][-]{subsubsection.13.8.3.3}{13.8.3.3 Share-ACL Migration}{subsection.13.8.3}
\BOOKMARK [3][-]{subsubsection.13.8.3.4}{13.8.3.4 Simultaneous Share and File Migration}{subsection.13.8.3}
\BOOKMARK [2][-]{subsection.13.8.4}{13.8.4 Printer Migration}{section.13.8}
\BOOKMARK [1][-]{section.13.9}{13.9 Controlling Open Files}{chapter.13}
\BOOKMARK [1][-]{section.13.10}{13.10 Session and Connection Management}{chapter.13}
\BOOKMARK [1][-]{section.13.11}{13.11 Printers and ADS}{chapter.13}
\BOOKMARK [1][-]{section.13.12}{13.12 Manipulating the Samba Cache}{chapter.13}
\BOOKMARK [1][-]{section.13.13}{13.13 Managing IDMAP UID/SID Mappings}{chapter.13}
\BOOKMARK [2][-]{subsection.13.13.1}{13.13.1 Creating an IDMAP Database Dump File}{section.13.13}
\BOOKMARK [2][-]{subsection.13.13.2}{13.13.2 Restoring the IDMAP Database Dump File}{section.13.13}
\BOOKMARK [1][-]{section.13.14}{13.14 Other Miscellaneous Operations}{chapter.13}
\BOOKMARK [0][-]{chapter.14}{Chapter 14 Identity Mapping \(IDMAP\)}{part.3}
\BOOKMARK [1][-]{section.14.1}{14.1 Samba Server Deployment Types and IDMAP}{chapter.14}
\BOOKMARK [2][-]{subsection.14.1.1}{14.1.1 Standalone Samba Server}{section.14.1}
\BOOKMARK [2][-]{subsection.14.1.2}{14.1.2 Domain Member Server or Domain Member Client}{section.14.1}
\BOOKMARK [2][-]{subsection.14.1.3}{14.1.3 Primary Domain Controller}{section.14.1}
\BOOKMARK [2][-]{subsection.14.1.4}{14.1.4 Backup Domain Controller}{section.14.1}
\BOOKMARK [1][-]{section.14.2}{14.2 Examples of IDMAP Backend Usage}{chapter.14}
\BOOKMARK [2][-]{subsection.14.2.1}{14.2.1 Default Winbind TDB}{section.14.2}
\BOOKMARK [3][-]{subsubsection.14.2.1.1}{14.2.1.1 NT4-Style Domains \(Includes Samba Domains\)}{subsection.14.2.1}
\BOOKMARK [3][-]{subsubsection.14.2.1.2}{14.2.1.2 ADS Domains}{subsection.14.2.1}
\BOOKMARK [2][-]{subsection.14.2.2}{14.2.2 IDMAP\137RID with Winbind}{section.14.2}
\BOOKMARK [2][-]{subsection.14.2.3}{14.2.3 IDMAP Storage in LDAP Using Winbind}{section.14.2}
\BOOKMARK [2][-]{subsection.14.2.4}{14.2.4 IDMAP and NSS Using LDAP from ADS with RFC2307bis Schema Extension}{section.14.2}
\BOOKMARK [3][-]{subsubsection.14.2.4.1}{14.2.4.1 IDMAP, Active Directory, and MS Services for UNIX 3.5}{subsection.14.2.4}
\BOOKMARK [3][-]{subsubsection.14.2.4.2}{14.2.4.2 IDMAP, Active Directory and AD4UNIX}{subsection.14.2.4}
\BOOKMARK [0][-]{chapter.15}{Chapter 15 User Rights and Privileges}{part.3}
\BOOKMARK [1][-]{section.15.1}{15.1 Rights Management Capabilities}{chapter.15}
\BOOKMARK [2][-]{subsection.15.1.1}{15.1.1 Using the ``net rpc rights'' Utility}{section.15.1}
\BOOKMARK [2][-]{subsection.15.1.2}{15.1.2 Description of Privileges}{section.15.1}
\BOOKMARK [2][-]{subsection.15.1.3}{15.1.3 Privileges Suppored by Windows 2000 Domain Controllers}{section.15.1}
\BOOKMARK [1][-]{section.15.2}{15.2 The Administrator Domain SID}{chapter.15}
\BOOKMARK [1][-]{section.15.3}{15.3 Common Errors}{chapter.15}
\BOOKMARK [2][-]{subsection.15.3.1}{15.3.1 What Rights and Privileges Will Permit Windows Client Administration?}{section.15.3}
\BOOKMARK [0][-]{chapter.16}{Chapter 16 File, Directory, and Share Access Controls}{part.3}
\BOOKMARK [1][-]{section.16.1}{16.1 Features and Benefits}{chapter.16}
\BOOKMARK [1][-]{section.16.2}{16.2 File System Access Controls}{chapter.16}
\BOOKMARK [2][-]{subsection.16.2.1}{16.2.1 MS Windows NTFS Comparison with UNIX File Systems}{section.16.2}
\BOOKMARK [2][-]{subsection.16.2.2}{16.2.2 Managing Directories}{section.16.2}
\BOOKMARK [2][-]{subsection.16.2.3}{16.2.3 File and Directory Access Control}{section.16.2}
\BOOKMARK [3][-]{subsubsection.16.2.3.1}{16.2.3.1 Protecting Directories and Files from Deletion}{subsection.16.2.3}
\BOOKMARK [1][-]{section.16.3}{16.3 Share Definition Access Controls}{chapter.16}
\BOOKMARK [2][-]{subsection.16.3.1}{16.3.1 User- and Group-Based Controls}{section.16.3}
\BOOKMARK [2][-]{subsection.16.3.2}{16.3.2 File and Directory Permissions-Based Controls}{section.16.3}
\BOOKMARK [2][-]{subsection.16.3.3}{16.3.3 Miscellaneous Controls}{section.16.3}
\BOOKMARK [1][-]{section.16.4}{16.4 Access Controls on Shares}{chapter.16}
\BOOKMARK [2][-]{subsection.16.4.1}{16.4.1 Share Permissions Management}{section.16.4}
\BOOKMARK [3][-]{subsubsection.16.4.1.1}{16.4.1.1 Windows NT4 Workstation/Server}{subsection.16.4.1}
\BOOKMARK [3][-]{subsubsection.16.4.1.2}{16.4.1.2 Windows 200x/XP}{subsection.16.4.1}
\BOOKMARK [1][-]{section.16.5}{16.5 MS Windows Access Control Lists and UNIX Interoperability}{chapter.16}
\BOOKMARK [2][-]{subsection.16.5.1}{16.5.1 Managing UNIX Permissions Using NT Security Dialogs}{section.16.5}
\BOOKMARK [2][-]{subsection.16.5.2}{16.5.2 Viewing File Security on a Samba Share}{section.16.5}
\BOOKMARK [2][-]{subsection.16.5.3}{16.5.3 Viewing File Ownership}{section.16.5}
\BOOKMARK [2][-]{subsection.16.5.4}{16.5.4 Viewing File or Directory Permissions}{section.16.5}
\BOOKMARK [3][-]{subsubsection.16.5.4.1}{16.5.4.1 File Permissions}{subsection.16.5.4}
\BOOKMARK [3][-]{subsubsection.16.5.4.2}{16.5.4.2 Directory Permissions}{subsection.16.5.4}
\BOOKMARK [2][-]{subsection.16.5.5}{16.5.5 Modifying File or Directory Permissions}{section.16.5}
\BOOKMARK [2][-]{subsection.16.5.6}{16.5.6 Interaction with the Standard Samba ``create mask'' Parameters}{section.16.5}
\BOOKMARK [2][-]{subsection.16.5.7}{16.5.7 Interaction with the Standard Samba File Attribute Mapping}{section.16.5}
\BOOKMARK [2][-]{subsection.16.5.8}{16.5.8 Windows NT/200X ACLs and POSIX ACLs Limitations}{section.16.5}
\BOOKMARK [3][-]{subsubsection.16.5.8.1}{16.5.8.1 UNIX POSIX ACL Overview}{subsection.16.5.8}
\BOOKMARK [3][-]{subsubsection.16.5.8.2}{16.5.8.2 Mapping of Windows File ACLs to UNIX POSIX ACLs}{subsection.16.5.8}
\BOOKMARK [3][-]{subsubsection.16.5.8.3}{16.5.8.3 Mapping of Windows Directory ACLs to UNIX POSIX ACLs}{subsection.16.5.8}
\BOOKMARK [1][-]{section.16.6}{16.6 Common Errors}{chapter.16}
\BOOKMARK [2][-]{subsection.16.6.1}{16.6.1 Users Cannot Write to a Public Share}{section.16.6}
\BOOKMARK [2][-]{subsection.16.6.2}{16.6.2 File Operations Done as root with force user Set}{section.16.6}
\BOOKMARK [2][-]{subsection.16.6.3}{16.6.3 MS Word with Samba Changes Owner of File}{section.16.6}
\BOOKMARK [0][-]{chapter.17}{Chapter 17 File and Record Locking}{part.3}
\BOOKMARK [1][-]{section.17.1}{17.1 Features and Benefits}{chapter.17}
\BOOKMARK [1][-]{section.17.2}{17.2 Discussion}{chapter.17}
\BOOKMARK [2][-]{subsection.17.2.1}{17.2.1 Opportunistic Locking Overview}{section.17.2}
\BOOKMARK [3][-]{subsubsection.17.2.1.1}{17.2.1.1 Exclusively Accessed Shares}{subsection.17.2.1}
\BOOKMARK [3][-]{subsubsection.17.2.1.2}{17.2.1.2 Multiple-Accessed Shares or Files}{subsection.17.2.1}
\BOOKMARK [3][-]{subsubsection.17.2.1.3}{17.2.1.3 UNIX or NFS Client-Accessed Files}{subsection.17.2.1}
\BOOKMARK [3][-]{subsubsection.17.2.1.4}{17.2.1.4 Slow and/or Unreliable Networks}{subsection.17.2.1}
\BOOKMARK [3][-]{subsubsection.17.2.1.5}{17.2.1.5 Multiuser Databases}{subsection.17.2.1}
\BOOKMARK [3][-]{subsubsection.17.2.1.6}{17.2.1.6 PDM Data Shares}{subsection.17.2.1}
\BOOKMARK [3][-]{subsubsection.17.2.1.7}{17.2.1.7 Beware of Force User}{subsection.17.2.1}
\BOOKMARK [3][-]{subsubsection.17.2.1.8}{17.2.1.8 Advanced Samba Oplocks Parameters}{subsection.17.2.1}
\BOOKMARK [3][-]{subsubsection.17.2.1.9}{17.2.1.9 Mission-Critical, High-Availability}{subsection.17.2.1}
\BOOKMARK [1][-]{section.17.3}{17.3 Samba Oplocks Control}{chapter.17}
\BOOKMARK [2][-]{subsection.17.3.1}{17.3.1 Example Configuration}{section.17.3}
\BOOKMARK [3][-]{subsubsection.17.3.1.1}{17.3.1.1 Disabling Oplocks}{subsection.17.3.1}
\BOOKMARK [3][-]{subsubsection.17.3.1.2}{17.3.1.2 Disabling Kernel Oplocks}{subsection.17.3.1}
\BOOKMARK [1][-]{section.17.4}{17.4 MS Windows Oplocks and Caching Controls}{chapter.17}
\BOOKMARK [2][-]{subsection.17.4.1}{17.4.1 Workstation Service Entries}{section.17.4}
\BOOKMARK [2][-]{subsection.17.4.2}{17.4.2 Server Service Entries}{section.17.4}
\BOOKMARK [1][-]{section.17.5}{17.5 Persistent Data Corruption}{chapter.17}
\BOOKMARK [1][-]{section.17.6}{17.6 Common Errors}{chapter.17}
\BOOKMARK [2][-]{subsection.17.6.1}{17.6.1 locking.tdb Error Messages}{section.17.6}
\BOOKMARK [2][-]{subsection.17.6.2}{17.6.2 Problems Saving Files in MS Office on Windows XP}{section.17.6}
\BOOKMARK [2][-]{subsection.17.6.3}{17.6.3 Long Delays Deleting Files over Network with XP SP1}{section.17.6}
\BOOKMARK [1][-]{section.17.7}{17.7 Additional Reading}{chapter.17}
\BOOKMARK [0][-]{chapter.18}{Chapter 18 Securing Samba}{part.3}
\BOOKMARK [1][-]{section.18.1}{18.1 Introduction}{chapter.18}
\BOOKMARK [1][-]{section.18.2}{18.2 Features and Benefits}{chapter.18}
\BOOKMARK [1][-]{section.18.3}{18.3 Technical Discussion of Protective Measures and Issues}{chapter.18}
\BOOKMARK [2][-]{subsection.18.3.1}{18.3.1 Using Host-Based Protection}{section.18.3}
\BOOKMARK [2][-]{subsection.18.3.2}{18.3.2 User-Based Protection}{section.18.3}
\BOOKMARK [2][-]{subsection.18.3.3}{18.3.3 Using Interface Protection}{section.18.3}
\BOOKMARK [2][-]{subsection.18.3.4}{18.3.4 Using a Firewall}{section.18.3}
\BOOKMARK [2][-]{subsection.18.3.5}{18.3.5 Using IPC\044 Share-Based Denials}{section.18.3}
\BOOKMARK [2][-]{subsection.18.3.6}{18.3.6 NTLMv2 Security}{section.18.3}
\BOOKMARK [1][-]{section.18.4}{18.4 Upgrading Samba}{chapter.18}
\BOOKMARK [1][-]{section.18.5}{18.5 Common Errors}{chapter.18}
\BOOKMARK [2][-]{subsection.18.5.1}{18.5.1 Smbclient Works on Localhost, but the Network Is Dead}{section.18.5}
\BOOKMARK [2][-]{subsection.18.5.2}{18.5.2 Why Can Users Access Other Users' Home Directories?}{section.18.5}
\BOOKMARK [0][-]{chapter.19}{Chapter 19 Interdomain Trust Relationships}{part.3}
\BOOKMARK [1][-]{section.19.1}{19.1 Features and Benefits}{chapter.19}
\BOOKMARK [1][-]{section.19.2}{19.2 Trust Relationship Background}{chapter.19}
\BOOKMARK [1][-]{section.19.3}{19.3 Native MS Windows NT4 Trusts Configuration}{chapter.19}
\BOOKMARK [2][-]{subsection.19.3.1}{19.3.1 Creating an NT4 Domain Trust}{section.19.3}
\BOOKMARK [2][-]{subsection.19.3.2}{19.3.2 Completing an NT4 Domain Trust}{section.19.3}
\BOOKMARK [2][-]{subsection.19.3.3}{19.3.3 Interdomain Trust Facilities}{section.19.3}
\BOOKMARK [1][-]{section.19.4}{19.4 Configuring Samba NT-Style Domain Trusts}{chapter.19}
\BOOKMARK [2][-]{subsection.19.4.1}{19.4.1 Samba as the Trusted Domain}{section.19.4}
\BOOKMARK [2][-]{subsection.19.4.2}{19.4.2 Samba as the Trusting Domain}{section.19.4}
\BOOKMARK [1][-]{section.19.5}{19.5 NT4-Style Domain Trusts with Windows 2000}{chapter.19}
\BOOKMARK [1][-]{section.19.6}{19.6 Common Errors}{chapter.19}
\BOOKMARK [2][-]{subsection.19.6.1}{19.6.1 Browsing of Trusted Domain Fails}{section.19.6}
\BOOKMARK [2][-]{subsection.19.6.2}{19.6.2 Problems with LDAP ldapsam and Older Versions of smbldap-tools}{section.19.6}
\BOOKMARK [0][-]{chapter.20}{Chapter 20 Hosting a Microsoft Distributed File System Tree}{part.3}
\BOOKMARK [1][-]{section.20.1}{20.1 Features and Benefits}{chapter.20}
\BOOKMARK [1][-]{section.20.2}{20.2 Common Errors}{chapter.20}
\BOOKMARK [2][-]{subsection.20.2.1}{20.2.1 MSDFS UNIX Path Is Case-Critical}{section.20.2}
\BOOKMARK [0][-]{chapter.21}{Chapter 21 Classical Printing Support}{part.3}
\BOOKMARK [1][-]{section.21.1}{21.1 Features and Benefits}{chapter.21}
\BOOKMARK [1][-]{section.21.2}{21.2 Technical Introduction}{chapter.21}
\BOOKMARK [2][-]{subsection.21.2.1}{21.2.1 Client to Samba Print Job Processing}{section.21.2}
\BOOKMARK [2][-]{subsection.21.2.2}{21.2.2 Printing-Related Configuration Parameters}{section.21.2}
\BOOKMARK [1][-]{section.21.3}{21.3 Simple Print Configuration}{chapter.21}
\BOOKMARK [2][-]{subsection.21.3.1}{21.3.1 Verifying Configuration with testparm}{section.21.3}
\BOOKMARK [2][-]{subsection.21.3.2}{21.3.2 Rapid Configuration Validation}{section.21.3}
\BOOKMARK [1][-]{section.21.4}{21.4 Extended Printing Configuration}{chapter.21}
\BOOKMARK [2][-]{subsection.21.4.1}{21.4.1 Detailed Explanation Settings}{section.21.4}
\BOOKMARK [3][-]{subsubsection.21.4.1.1}{21.4.1.1 The [global] Section}{subsection.21.4.1}
\BOOKMARK [3][-]{subsubsection.21.4.1.2}{21.4.1.2 The [printers] Section}{subsection.21.4.1}
\BOOKMARK [3][-]{subsubsection.21.4.1.3}{21.4.1.3 Any [my\137printer\137name] Section}{subsection.21.4.1}
\BOOKMARK [3][-]{subsubsection.21.4.1.4}{21.4.1.4 Print Commands}{subsection.21.4.1}
\BOOKMARK [3][-]{subsubsection.21.4.1.5}{21.4.1.5 Default UNIX System Printing Commands}{subsection.21.4.1}
\BOOKMARK [3][-]{subsubsection.21.4.1.6}{21.4.1.6 Custom Print Commands}{subsection.21.4.1}
\BOOKMARK [1][-]{section.21.5}{21.5 Printing Developments Since Samba-2.2}{chapter.21}
\BOOKMARK [2][-]{subsection.21.5.1}{21.5.1 Point'n'Print Client Drivers on Samba Servers}{section.21.5}
\BOOKMARK [2][-]{subsection.21.5.2}{21.5.2 The Obsoleted [printer\044] Section}{section.21.5}
\BOOKMARK [2][-]{subsection.21.5.3}{21.5.3 Creating the [print\044] Share}{section.21.5}
\BOOKMARK [2][-]{subsection.21.5.4}{21.5.4 [print\044] Stanza Parameters}{section.21.5}
\BOOKMARK [2][-]{subsection.21.5.5}{21.5.5 The [print\044] Share Directory}{section.21.5}
\BOOKMARK [1][-]{section.21.6}{21.6 Installing Drivers into [print\044]}{chapter.21}
\BOOKMARK [2][-]{subsection.21.6.1}{21.6.1 Add Printer Wizard Driver Installation}{section.21.6}
\BOOKMARK [2][-]{subsection.21.6.2}{21.6.2 Installing Print Drivers Using rpcclient}{section.21.6}
\BOOKMARK [3][-]{subsubsection.21.6.2.1}{21.6.2.1 Identifying Driver Files}{subsection.21.6.2}
\BOOKMARK [3][-]{subsubsection.21.6.2.2}{21.6.2.2 Obtaining Driver Files from Windows Client [print\044] Shares}{subsection.21.6.2}
\BOOKMARK [3][-]{subsubsection.21.6.2.3}{21.6.2.3 Installing Driver Files into [print\044]}{subsection.21.6.2}
\BOOKMARK [3][-]{subsubsection.21.6.2.4}{21.6.2.4 smbclient to Confirm Driver Installation}{subsection.21.6.2}
\BOOKMARK [3][-]{subsubsection.21.6.2.5}{21.6.2.5 Running rpcclient with adddriver}{subsection.21.6.2}
\BOOKMARK [3][-]{subsubsection.21.6.2.6}{21.6.2.6 Checking adddriver Completion}{subsection.21.6.2}
\BOOKMARK [3][-]{subsubsection.21.6.2.7}{21.6.2.7 Check Samba for Driver Recognition}{subsection.21.6.2}
\BOOKMARK [3][-]{subsubsection.21.6.2.8}{21.6.2.8 Specific Driver Name Flexibility}{subsection.21.6.2}
\BOOKMARK [3][-]{subsubsection.21.6.2.9}{21.6.2.9 Running rpcclient with setdriver}{subsection.21.6.2}
\BOOKMARK [1][-]{section.21.7}{21.7 Client Driver Installation Procedure}{chapter.21}
\BOOKMARK [2][-]{subsection.21.7.1}{21.7.1 First Client Driver Installation}{section.21.7}
\BOOKMARK [2][-]{subsection.21.7.2}{21.7.2 Setting Device Modes on New Printers}{section.21.7}
\BOOKMARK [2][-]{subsection.21.7.3}{21.7.3 Additional Client Driver Installation}{section.21.7}
\BOOKMARK [2][-]{subsection.21.7.4}{21.7.4 Always Make First Client Connection as root or ``printer admin''}{section.21.7}
\BOOKMARK [1][-]{section.21.8}{21.8 Other Gotchas}{chapter.21}
\BOOKMARK [2][-]{subsection.21.8.1}{21.8.1 Setting Default Print Options for Client Drivers}{section.21.8}
\BOOKMARK [2][-]{subsection.21.8.2}{21.8.2 Supporting Large Numbers of Printers}{section.21.8}
\BOOKMARK [2][-]{subsection.21.8.3}{21.8.3 Adding New Printers with the Windows NT APW}{section.21.8}
\BOOKMARK [2][-]{subsection.21.8.4}{21.8.4 Error Message: ``Cannot connect under a different Name''}{section.21.8}
\BOOKMARK [2][-]{subsection.21.8.5}{21.8.5 Take Care When Assembling Driver Files}{section.21.8}
\BOOKMARK [2][-]{subsection.21.8.6}{21.8.6 Samba and Printer Ports}{section.21.8}
\BOOKMARK [2][-]{subsection.21.8.7}{21.8.7 Avoiding Common Client Driver Misconfiguration}{section.21.8}
\BOOKMARK [1][-]{section.21.9}{21.9 The Imprints Toolset}{chapter.21}
\BOOKMARK [2][-]{subsection.21.9.1}{21.9.1 What Is Imprints?}{section.21.9}
\BOOKMARK [2][-]{subsection.21.9.2}{21.9.2 Creating Printer Driver Packages}{section.21.9}
\BOOKMARK [2][-]{subsection.21.9.3}{21.9.3 The Imprints Server}{section.21.9}
\BOOKMARK [2][-]{subsection.21.9.4}{21.9.4 The Installation Client}{section.21.9}
\BOOKMARK [1][-]{section.21.10}{21.10 Adding Network Printers without User Interaction}{chapter.21}
\BOOKMARK [1][-]{section.21.11}{21.11 The addprinter Command}{chapter.21}
\BOOKMARK [1][-]{section.21.12}{21.12 Migration of Classical Printing to Samba}{chapter.21}
\BOOKMARK [1][-]{section.21.13}{21.13 Publishing Printer Information in Active Directory or LDAP}{chapter.21}
\BOOKMARK [1][-]{section.21.14}{21.14 Common Errors}{chapter.21}
\BOOKMARK [2][-]{subsection.21.14.1}{21.14.1 I Give My Root Password but I Do Not Get Access}{section.21.14}
\BOOKMARK [2][-]{subsection.21.14.2}{21.14.2 My Print Jobs Get Spooled into the Spooling Directory, but Then Get Lost}{section.21.14}
\BOOKMARK [0][-]{chapter.22}{Chapter 22 CUPS Printing Support}{part.3}
\BOOKMARK [1][-]{section.22.1}{22.1 Introduction}{chapter.22}
\BOOKMARK [2][-]{subsection.22.1.1}{22.1.1 Features and Benefits}{section.22.1}
\BOOKMARK [2][-]{subsection.22.1.2}{22.1.2 Overview}{section.22.1}
\BOOKMARK [1][-]{section.22.2}{22.2 Basic CUPS Support Configuration}{chapter.22}
\BOOKMARK [2][-]{subsection.22.2.1}{22.2.1 Linking smbd with libcups.so}{section.22.2}
\BOOKMARK [2][-]{subsection.22.2.2}{22.2.2 Simple smb.conf Settings for CUPS}{section.22.2}
\BOOKMARK [2][-]{subsection.22.2.3}{22.2.3 More Complex CUPS smb.conf Settings}{section.22.2}
\BOOKMARK [1][-]{section.22.3}{22.3 Advanced Configuration}{chapter.22}
\BOOKMARK [2][-]{subsection.22.3.1}{22.3.1 Central Spooling vs. ``Peer-to-Peer'' Printing}{section.22.3}
\BOOKMARK [2][-]{subsection.22.3.2}{22.3.2 Raw Print Serving: Vendor Drivers on Windows Clients}{section.22.3}
\BOOKMARK [2][-]{subsection.22.3.3}{22.3.3 Installation of Windows Client Drivers}{section.22.3}
\BOOKMARK [2][-]{subsection.22.3.4}{22.3.4 Explicitly Enable ``raw'' Printing for application/octet-stream}{section.22.3}
\BOOKMARK [2][-]{subsection.22.3.5}{22.3.5 Driver Upload Methods}{section.22.3}
\BOOKMARK [1][-]{section.22.4}{22.4 Advanced Intelligent Printing with PostScript Driver Download}{chapter.22}
\BOOKMARK [2][-]{subsection.22.4.1}{22.4.1 GDI on Windows, PostScript on UNIX}{section.22.4}
\BOOKMARK [2][-]{subsection.22.4.2}{22.4.2 Windows Drivers, GDI, and EMF}{section.22.4}
\BOOKMARK [2][-]{subsection.22.4.3}{22.4.3 UNIX Printfile Conversion and GUI Basics}{section.22.4}
\BOOKMARK [2][-]{subsection.22.4.4}{22.4.4 PostScript and Ghostscript}{section.22.4}
\BOOKMARK [2][-]{subsection.22.4.5}{22.4.5 Ghostscript: The Software RIP for Non-PostScript Printers}{section.22.4}
\BOOKMARK [2][-]{subsection.22.4.6}{22.4.6 PostScript Printer Description \(PPD\) Specification}{section.22.4}
\BOOKMARK [2][-]{subsection.22.4.7}{22.4.7 Using Windows-Formatted Vendor PPDs}{section.22.4}
\BOOKMARK [2][-]{subsection.22.4.8}{22.4.8 CUPS Also Uses PPDs for Non-PostScript Printers}{section.22.4}
\BOOKMARK [1][-]{section.22.5}{22.5 The CUPS Filtering Architecture}{chapter.22}
\BOOKMARK [2][-]{subsection.22.5.1}{22.5.1 MIME Types and CUPS Filters}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.2}{22.5.2 MIME Type Conversion Rules}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.3}{22.5.3 Filtering Overview}{section.22.5}
\BOOKMARK [3][-]{subsubsection.22.5.3.1}{22.5.3.1 Filter Requirements}{subsection.22.5.3}
\BOOKMARK [2][-]{subsection.22.5.4}{22.5.4 Prefilters}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.5}{22.5.5 pstops}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.6}{22.5.6 pstoraster}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.7}{22.5.7 imagetops and imagetoraster}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.8}{22.5.8 rasterto [printers specific]}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.9}{22.5.9 CUPS Backends}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.10}{22.5.10 The Role of cupsomatic/foomatic}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.11}{22.5.11 The Complete Picture}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.12}{22.5.12 mime.convs}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.13}{22.5.13 ``Raw'' Printing}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.14}{22.5.14 application/octet-stream Printing}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.15}{22.5.15 PostScript Printer Descriptions for Non-PostScript Printers}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.16}{22.5.16 cupsomatic/foomatic-rip Versus Native CUPS Printing}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.17}{22.5.17 Examples for Filtering Chains}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.18}{22.5.18 Sources of CUPS Drivers/PPDs}{section.22.5}
\BOOKMARK [2][-]{subsection.22.5.19}{22.5.19 Printing with Interface Scripts}{section.22.5}
\BOOKMARK [1][-]{section.22.6}{22.6 Network Printing \(Purely Windows\)}{chapter.22}
\BOOKMARK [2][-]{subsection.22.6.1}{22.6.1 From Windows Clients to an NT Print Server}{section.22.6}
\BOOKMARK [2][-]{subsection.22.6.2}{22.6.2 Driver Execution on the Client}{section.22.6}
\BOOKMARK [2][-]{subsection.22.6.3}{22.6.3 Driver Execution on the Server}{section.22.6}
\BOOKMARK [1][-]{section.22.7}{22.7 Network Printing \(Windows Clients and UNIX/Samba Print Servers\)}{chapter.22}
\BOOKMARK [2][-]{subsection.22.7.1}{22.7.1 From Windows Clients to a CUPS/Samba Print Server}{section.22.7}
\BOOKMARK [2][-]{subsection.22.7.2}{22.7.2 Samba Receiving Job-Files and Passing Them to CUPS}{section.22.7}
\BOOKMARK [1][-]{section.22.8}{22.8 Network PostScript RIP}{chapter.22}
\BOOKMARK [2][-]{subsection.22.8.1}{22.8.1 PPDs for Non-PS Printers on UNIX}{section.22.8}
\BOOKMARK [2][-]{subsection.22.8.2}{22.8.2 PPDs for Non-PS Printers on Windows}{section.22.8}
\BOOKMARK [1][-]{section.22.9}{22.9 Windows Terminal Servers \(WTS\) as CUPS Clients}{chapter.22}
\BOOKMARK [2][-]{subsection.22.9.1}{22.9.1 Printer Drivers Running in ``Kernel Mode'' Cause Many Problems}{section.22.9}
\BOOKMARK [2][-]{subsection.22.9.2}{22.9.2 Workarounds Impose Heavy Limitations}{section.22.9}
\BOOKMARK [2][-]{subsection.22.9.3}{22.9.3 CUPS: A ``Magical Stone''?}{section.22.9}
\BOOKMARK [2][-]{subsection.22.9.4}{22.9.4 PostScript Drivers with No Major Problems, Even in Kernel Mode}{section.22.9}
\BOOKMARK [1][-]{section.22.10}{22.10 Configuring CUPS for Driver Download}{chapter.22}
\BOOKMARK [2][-]{subsection.22.10.1}{22.10.1 cupsaddsmb: The Unknown Utility}{section.22.10}
\BOOKMARK [2][-]{subsection.22.10.2}{22.10.2 Prepare Your smb.conf for cupsaddsmb}{section.22.10}
\BOOKMARK [2][-]{subsection.22.10.3}{22.10.3 CUPS ``PostScript Driver for Windows NT/200x/XP''}{section.22.10}
\BOOKMARK [2][-]{subsection.22.10.4}{22.10.4 Recognizing Different Driver Files}{section.22.10}
\BOOKMARK [2][-]{subsection.22.10.5}{22.10.5 Acquiring the Adobe Driver Files}{section.22.10}
\BOOKMARK [2][-]{subsection.22.10.6}{22.10.6 ESP Print Pro PostScript Driver for Windows NT/200x/XP}{section.22.10}
\BOOKMARK [2][-]{subsection.22.10.7}{22.10.7 Caveats to Be Considered}{section.22.10}
\BOOKMARK [2][-]{subsection.22.10.8}{22.10.8 Windows CUPS PostScript Driver Versus Adobe Driver}{section.22.10}
\BOOKMARK [2][-]{subsection.22.10.9}{22.10.9 Run cupsaddsmb \(Quiet Mode\)}{section.22.10}
\BOOKMARK [2][-]{subsection.22.10.10}{22.10.10 Run cupsaddsmb with Verbose Output}{section.22.10}
\BOOKMARK [2][-]{subsection.22.10.11}{22.10.11 Understanding cupsaddsmb}{section.22.10}
\BOOKMARK [2][-]{subsection.22.10.12}{22.10.12 How to Recognize If cupsaddsmb Completed Successfully}{section.22.10}
\BOOKMARK [2][-]{subsection.22.10.13}{22.10.13 cupsaddsmb with a Samba PDC}{section.22.10}
\BOOKMARK [2][-]{subsection.22.10.14}{22.10.14 cupsaddsmb Flowchart}{section.22.10}
\BOOKMARK [2][-]{subsection.22.10.15}{22.10.15 Installing the PostScript Driver on a Client}{section.22.10}
\BOOKMARK [2][-]{subsection.22.10.16}{22.10.16 Avoiding Critical PostScript Driver Settings on the Client}{section.22.10}
\BOOKMARK [1][-]{section.22.11}{22.11 Installing PostScript Driver Files Manually Using rpcclient}{chapter.22}
\BOOKMARK [2][-]{subsection.22.11.1}{22.11.1 A Check of the rpcclient man Page}{section.22.11}
\BOOKMARK [2][-]{subsection.22.11.2}{22.11.2 Understanding the rpcclient man Page}{section.22.11}
\BOOKMARK [2][-]{subsection.22.11.3}{22.11.3 Producing an Example by Querying a Windows Box}{section.22.11}
\BOOKMARK [2][-]{subsection.22.11.4}{22.11.4 Requirements for adddriver and setdriver to Succeed}{section.22.11}
\BOOKMARK [2][-]{subsection.22.11.5}{22.11.5 Manual Driver Installation in 15 Steps}{section.22.11}
\BOOKMARK [2][-]{subsection.22.11.6}{22.11.6 Troubleshooting Revisited}{section.22.11}
\BOOKMARK [1][-]{section.22.12}{22.12 The Printing *.tdb Files}{chapter.22}
\BOOKMARK [2][-]{subsection.22.12.1}{22.12.1 Trivial Database Files}{section.22.12}
\BOOKMARK [2][-]{subsection.22.12.2}{22.12.2 Binary Format}{section.22.12}
\BOOKMARK [2][-]{subsection.22.12.3}{22.12.3 Losing *.tdb Files}{section.22.12}
\BOOKMARK [2][-]{subsection.22.12.4}{22.12.4 Using tdbbackup}{section.22.12}
\BOOKMARK [1][-]{section.22.13}{22.13 CUPS Print Drivers from Linuxprinting.org}{chapter.22}
\BOOKMARK [2][-]{subsection.22.13.1}{22.13.1 foomatic-rip and Foomatic Explained}{section.22.13}
\BOOKMARK [3][-]{subsubsection.22.13.1.1}{22.13.1.1 690 ``Perfect'' Printers}{subsection.22.13.1}
\BOOKMARK [3][-]{subsubsection.22.13.1.2}{22.13.1.2 How the Printing HOWTO Started It All}{subsection.22.13.1}
\BOOKMARK [3][-]{subsubsection.22.13.1.3}{22.13.1.3 Foomatic's Strange Name}{subsection.22.13.1}
\BOOKMARK [3][-]{subsubsection.22.13.1.4}{22.13.1.4 cupsomatic, pdqomatic, lpdomatic, directomatic}{subsection.22.13.1}
\BOOKMARK [3][-]{subsubsection.22.13.1.5}{22.13.1.5 The Grand Unification Achieved}{subsection.22.13.1}
\BOOKMARK [3][-]{subsubsection.22.13.1.6}{22.13.1.6 Driver Development Outside}{subsection.22.13.1}
\BOOKMARK [3][-]{subsubsection.22.13.1.7}{22.13.1.7 Forums, Downloads, Tutorials, Howtos \(Also for Mac OS X and Commercial UNIX\)}{subsection.22.13.1}
\BOOKMARK [3][-]{subsubsection.22.13.1.8}{22.13.1.8 Foomatic Database-Generated PPDs}{subsection.22.13.1}
\BOOKMARK [2][-]{subsection.22.13.2}{22.13.2 foomatic-rip and Foomatic PPD Download and Installation}{section.22.13}
\BOOKMARK [1][-]{section.22.14}{22.14 Page Accounting with CUPS}{chapter.22}
\BOOKMARK [2][-]{subsection.22.14.1}{22.14.1 Setting Up Quotas}{section.22.14}
\BOOKMARK [2][-]{subsection.22.14.2}{22.14.2 Correct and Incorrect Accounting}{section.22.14}
\BOOKMARK [2][-]{subsection.22.14.3}{22.14.3 Adobe and CUPS PostScript Drivers for Windows Clients}{section.22.14}
\BOOKMARK [2][-]{subsection.22.14.4}{22.14.4 The page\137log File Syntax}{section.22.14}
\BOOKMARK [2][-]{subsection.22.14.5}{22.14.5 Possible Shortcomings}{section.22.14}
\BOOKMARK [2][-]{subsection.22.14.6}{22.14.6 Future Developments}{section.22.14}
\BOOKMARK [2][-]{subsection.22.14.7}{22.14.7 Other Accounting Tools}{section.22.14}
\BOOKMARK [1][-]{section.22.15}{22.15 Additional Material}{chapter.22}
\BOOKMARK [1][-]{section.22.16}{22.16 Autodeletion or Preservation of CUPS Spool Files}{chapter.22}
\BOOKMARK [2][-]{subsection.22.16.1}{22.16.1 CUPS Configuration Settings Explained}{section.22.16}
\BOOKMARK [2][-]{subsection.22.16.2}{22.16.2 Preconditions}{section.22.16}
\BOOKMARK [2][-]{subsection.22.16.3}{22.16.3 Manual Configuration}{section.22.16}
\BOOKMARK [1][-]{section.22.17}{22.17 Printing from CUPS to Windows-Attached Printers}{chapter.22}
\BOOKMARK [1][-]{section.22.18}{22.18 More CUPS Filtering Chains}{chapter.22}
\BOOKMARK [1][-]{section.22.19}{22.19 Common Errors}{chapter.22}
\BOOKMARK [2][-]{subsection.22.19.1}{22.19.1 Windows 9x/Me Client Can't Install Driver}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.2}{22.19.2 ``cupsaddsmb'' Keeps Asking for Root Password in Never-ending Loop}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.3}{22.19.3 ``cupsaddsmb'' or ``rpcclient addriver'' Emit Error}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.4}{22.19.4 ``cupsaddsmb'' Errors}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.5}{22.19.5 Client Can't Connect to Samba Printer}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.6}{22.19.6 New Account Reconnection from Windows 200x/XP Troubles}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.7}{22.19.7 Avoid Being Connected to the Samba Server as the Wrong User}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.8}{22.19.8 Upgrading to CUPS Drivers from Adobe Drivers}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.9}{22.19.9 Can't Use ``cupsaddsmb'' on Samba Server, Which Is a PDC}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.10}{22.19.10 Deleted Windows 200x Printer Driver Is Still Shown}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.11}{22.19.11 Windows 200x/XP Local Security Policies}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.12}{22.19.12 Administrator Cannot Install Printers for All Local Users}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.13}{22.19.13 Print Change, Notify Functions on NT Clients}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.14}{22.19.14 Windows XP SP1}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.15}{22.19.15 Print Options for All Users Can't Be Set on Windows 200x/XP}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.16}{22.19.16 Most Common Blunders in Driver Settings on Windows Clients}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.17}{22.19.17 cupsaddsmb Does Not Work with Newly Installed Printer}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.18}{22.19.18 Permissions on /var/spool/samba/ Get Reset After Each Reboot}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.19}{22.19.19 Print Queue Called ``lp'' Mishandles Print Jobs}{section.22.19}
\BOOKMARK [2][-]{subsection.22.19.20}{22.19.20 Location of Adobe PostScript Driver Files for ``cupsaddsmb''}{section.22.19}
\BOOKMARK [1][-]{section.22.20}{22.20 Overview of the CUPS Printing Processes}{chapter.22}
\BOOKMARK [0][-]{chapter.23}{Chapter 23 Stackable VFS modules}{part.3}
\BOOKMARK [1][-]{section.23.1}{23.1 Features and Benefits}{chapter.23}
\BOOKMARK [1][-]{section.23.2}{23.2 Discussion}{chapter.23}
\BOOKMARK [1][-]{section.23.3}{23.3 Included Modules}{chapter.23}
\BOOKMARK [2][-]{subsection.23.3.1}{23.3.1 audit}{section.23.3}
\BOOKMARK [2][-]{subsection.23.3.2}{23.3.2 default\137quota}{section.23.3}
\BOOKMARK [2][-]{subsection.23.3.3}{23.3.3 extd\137audit}{section.23.3}
\BOOKMARK [3][-]{subsubsection.23.3.3.1}{23.3.3.1 Configuration of Auditing}{subsection.23.3.3}
\BOOKMARK [2][-]{subsection.23.3.4}{23.3.4 fake\137perms}{section.23.3}
\BOOKMARK [2][-]{subsection.23.3.5}{23.3.5 recycle}{section.23.3}
\BOOKMARK [2][-]{subsection.23.3.6}{23.3.6 netatalk}{section.23.3}
\BOOKMARK [2][-]{subsection.23.3.7}{23.3.7 shadow\137copy}{section.23.3}
\BOOKMARK [3][-]{subsubsection.23.3.7.1}{23.3.7.1 Shadow Copy Setup}{subsection.23.3.7}
\BOOKMARK [1][-]{section.23.4}{23.4 VFS Modules Available Elsewhere}{chapter.23}
\BOOKMARK [2][-]{subsection.23.4.1}{23.4.1 DatabaseFS}{section.23.4}
\BOOKMARK [2][-]{subsection.23.4.2}{23.4.2 vscan}{section.23.4}
\BOOKMARK [2][-]{subsection.23.4.3}{23.4.3 vscan-clamav}{section.23.4}
\BOOKMARK [0][-]{chapter.24}{Chapter 24 Winbind: Use of Domain Accounts}{part.3}
\BOOKMARK [1][-]{section.24.1}{24.1 Features and Benefits}{chapter.24}
\BOOKMARK [1][-]{section.24.2}{24.2 Introduction}{chapter.24}
\BOOKMARK [1][-]{section.24.3}{24.3 What Winbind Provides}{chapter.24}
\BOOKMARK [2][-]{subsection.24.3.1}{24.3.1 Target Uses}{section.24.3}
\BOOKMARK [2][-]{subsection.24.3.2}{24.3.2 Handling of Foreign SIDs}{section.24.3}
\BOOKMARK [1][-]{section.24.4}{24.4 How Winbind Works}{chapter.24}
\BOOKMARK [2][-]{subsection.24.4.1}{24.4.1 Microsoft Remote Procedure Calls}{section.24.4}
\BOOKMARK [2][-]{subsection.24.4.2}{24.4.2 Microsoft Active Directory Services}{section.24.4}
\BOOKMARK [2][-]{subsection.24.4.3}{24.4.3 Name Service Switch}{section.24.4}
\BOOKMARK [2][-]{subsection.24.4.4}{24.4.4 Pluggable Authentication Modules}{section.24.4}
\BOOKMARK [2][-]{subsection.24.4.5}{24.4.5 User and Group ID Allocation}{section.24.4}
\BOOKMARK [2][-]{subsection.24.4.6}{24.4.6 Result Caching}{section.24.4}
\BOOKMARK [1][-]{section.24.5}{24.5 Installation and Configuration}{chapter.24}
\BOOKMARK [2][-]{subsection.24.5.1}{24.5.1 Introduction}{section.24.5}
\BOOKMARK [2][-]{subsection.24.5.2}{24.5.2 Requirements}{section.24.5}
\BOOKMARK [2][-]{subsection.24.5.3}{24.5.3 Testing Things Out}{section.24.5}
\BOOKMARK [3][-]{subsubsection.24.5.3.1}{24.5.3.1 Configure nsswitch.conf and the Winbind Libraries on Linux and Solaris}{subsection.24.5.3}
\BOOKMARK [3][-]{subsubsection.24.5.3.2}{24.5.3.2 NSS Winbind on AIX}{subsection.24.5.3}
\BOOKMARK [3][-]{subsubsection.24.5.3.3}{24.5.3.3 Configure smb.conf}{subsection.24.5.3}
\BOOKMARK [3][-]{subsubsection.24.5.3.4}{24.5.3.4 Join the Samba Server to the PDC Domain}{subsection.24.5.3}
\BOOKMARK [3][-]{subsubsection.24.5.3.5}{24.5.3.5 Starting and Testing the winbindd Daemon}{subsection.24.5.3}
\BOOKMARK [3][-]{subsubsection.24.5.3.6}{24.5.3.6 Fix the init.d Startup Scripts}{subsection.24.5.3}
\BOOKMARK [3][-]{subsubsection.24.5.3.7}{24.5.3.7 Configure Winbind and PAM}{subsection.24.5.3}
\BOOKMARK [1][-]{section.24.6}{24.6 Conclusion}{chapter.24}
\BOOKMARK [1][-]{section.24.7}{24.7 Common Errors}{chapter.24}
\BOOKMARK [2][-]{subsection.24.7.1}{24.7.1 NSCD Problem Warning}{section.24.7}
\BOOKMARK [2][-]{subsection.24.7.2}{24.7.2 Winbind Is Not Resolving Users and Groups}{section.24.7}
\BOOKMARK [0][-]{chapter.25}{Chapter 25 Advanced Network Management}{part.3}
\BOOKMARK [1][-]{section.25.1}{25.1 Features and Benefits}{chapter.25}
\BOOKMARK [1][-]{section.25.2}{25.2 Remote Server Administration}{chapter.25}
\BOOKMARK [1][-]{section.25.3}{25.3 Remote Desktop Management}{chapter.25}
\BOOKMARK [2][-]{subsection.25.3.1}{25.3.1 Remote Management from NoMachine.Com}{section.25.3}
\BOOKMARK [2][-]{subsection.25.3.2}{25.3.2 Remote Management with ThinLinc}{section.25.3}
\BOOKMARK [1][-]{section.25.4}{25.4 Network Logon Script Magic}{chapter.25}
\BOOKMARK [2][-]{subsection.25.4.1}{25.4.1 Adding Printers without User Intervention}{section.25.4}
\BOOKMARK [2][-]{subsection.25.4.2}{25.4.2 Limiting Logon Connections}{section.25.4}
\BOOKMARK [0][-]{chapter.26}{Chapter 26 System and Account Policies}{part.3}
\BOOKMARK [1][-]{section.26.1}{26.1 Features and Benefits}{chapter.26}
\BOOKMARK [1][-]{section.26.2}{26.2 Creating and Managing System Policies}{chapter.26}
\BOOKMARK [2][-]{subsection.26.2.1}{26.2.1 Windows 9x/ME Policies}{section.26.2}
\BOOKMARK [2][-]{subsection.26.2.2}{26.2.2 Windows NT4-Style Policy Files}{section.26.2}
\BOOKMARK [3][-]{subsubsection.26.2.2.1}{26.2.2.1 Registry Spoiling}{subsection.26.2.2}
\BOOKMARK [2][-]{subsection.26.2.3}{26.2.3 MS Windows 200x/XP Professional Policies}{section.26.2}
\BOOKMARK [3][-]{subsubsection.26.2.3.1}{26.2.3.1 Administration of Windows 200x/XP Policies}{subsection.26.2.3}
\BOOKMARK [3][-]{subsubsection.26.2.3.2}{26.2.3.2 Custom System Policy Templates}{subsection.26.2.3}
\BOOKMARK [1][-]{section.26.3}{26.3 Managing Account/User Policies}{chapter.26}
\BOOKMARK [1][-]{section.26.4}{26.4 Management Tools}{chapter.26}
\BOOKMARK [2][-]{subsection.26.4.1}{26.4.1 Samba Editreg Toolset}{section.26.4}
\BOOKMARK [2][-]{subsection.26.4.2}{26.4.2 Windows NT4/200x}{section.26.4}
\BOOKMARK [2][-]{subsection.26.4.3}{26.4.3 Samba PDC}{section.26.4}
\BOOKMARK [1][-]{section.26.5}{26.5 System Startup and Logon Processing Overview}{chapter.26}
\BOOKMARK [1][-]{section.26.6}{26.6 Common Errors}{chapter.26}
\BOOKMARK [2][-]{subsection.26.6.1}{26.6.1 Policy Does Not Work}{section.26.6}
\BOOKMARK [0][-]{chapter.27}{Chapter 27 Desktop Profile Management}{part.3}
\BOOKMARK [1][-]{section.27.1}{27.1 Features and Benefits}{chapter.27}
\BOOKMARK [1][-]{section.27.2}{27.2 Roaming Profiles}{chapter.27}
\BOOKMARK [2][-]{subsection.27.2.1}{27.2.1 Samba Configuration for Profile Handling}{section.27.2}
\BOOKMARK [3][-]{subsubsection.27.2.1.1}{27.2.1.1 NT4/200x User Profiles}{subsection.27.2.1}
\BOOKMARK [3][-]{subsubsection.27.2.1.2}{27.2.1.2 Windows 9x/Me User Profiles}{subsection.27.2.1}
\BOOKMARK [3][-]{subsubsection.27.2.1.3}{27.2.1.3 Mixed Windows Windows 9x/Me and NT4/200x User Profiles}{subsection.27.2.1}
\BOOKMARK [3][-]{subsubsection.27.2.1.4}{27.2.1.4 Disabling Roaming Profile Support}{subsection.27.2.1}
\BOOKMARK [2][-]{subsection.27.2.2}{27.2.2 Windows Client Profile Configuration Information}{section.27.2}
\BOOKMARK [3][-]{subsubsection.27.2.2.1}{27.2.2.1 Windows 9x/Me Profile Setup}{subsection.27.2.2}
\BOOKMARK [3][-]{subsubsection.27.2.2.2}{27.2.2.2 Windows NT4 Workstation}{subsection.27.2.2}
\BOOKMARK [3][-]{subsubsection.27.2.2.3}{27.2.2.3 Windows 2000/XP Professional}{subsection.27.2.2}
\BOOKMARK [2][-]{subsection.27.2.3}{27.2.3 User Profile Hive Cleanup Service}{section.27.2}
\BOOKMARK [2][-]{subsection.27.2.4}{27.2.4 Sharing Profiles between Windows 9x/Me and NT4/200x/XP Workstations}{section.27.2}
\BOOKMARK [2][-]{subsection.27.2.5}{27.2.5 Profile Migration from Windows NT4/200x Server to Samba}{section.27.2}
\BOOKMARK [3][-]{subsubsection.27.2.5.1}{27.2.5.1 Windows NT4 Profile Management Tools}{subsection.27.2.5}
\BOOKMARK [3][-]{subsubsection.27.2.5.2}{27.2.5.2 Side Bar Notes}{subsection.27.2.5}
\BOOKMARK [3][-]{subsubsection.27.2.5.3}{27.2.5.3 moveuser.exe}{subsection.27.2.5}
\BOOKMARK [3][-]{subsubsection.27.2.5.4}{27.2.5.4 Get SID}{subsection.27.2.5}
\BOOKMARK [1][-]{section.27.3}{27.3 Mandatory Profiles}{chapter.27}
\BOOKMARK [1][-]{section.27.4}{27.4 Creating and Managing Group Profiles}{chapter.27}
\BOOKMARK [1][-]{section.27.5}{27.5 Default Profile for Windows Users}{chapter.27}
\BOOKMARK [2][-]{subsection.27.5.1}{27.5.1 MS Windows 9x/Me}{section.27.5}
\BOOKMARK [3][-]{subsubsection.27.5.1.1}{27.5.1.1 User Profile Handling with Windows 9x/Me}{subsection.27.5.1}
\BOOKMARK [2][-]{subsection.27.5.2}{27.5.2 MS Windows NT4 Workstation}{section.27.5}
\BOOKMARK [2][-]{subsection.27.5.3}{27.5.3 MS Windows 200x/XP}{section.27.5}
\BOOKMARK [1][-]{section.27.6}{27.6 Common Errors}{chapter.27}
\BOOKMARK [2][-]{subsection.27.6.1}{27.6.1 Configuring Roaming Profiles for a Few Users or Groups}{section.27.6}
\BOOKMARK [2][-]{subsection.27.6.2}{27.6.2 Cannot Use Roaming Profiles}{section.27.6}
\BOOKMARK [2][-]{subsection.27.6.3}{27.6.3 Changing the Default Profile}{section.27.6}
\BOOKMARK [2][-]{subsection.27.6.4}{27.6.4 Debugging Roaming Profiles and NT4-style Domain Policies}{section.27.6}
\BOOKMARK [0][-]{chapter.28}{Chapter 28 PAM-Based Distributed Authentication}{part.3}
\BOOKMARK [1][-]{section.28.1}{28.1 Features and Benefits}{chapter.28}
\BOOKMARK [1][-]{section.28.2}{28.2 Technical Discussion}{chapter.28}
\BOOKMARK [2][-]{subsection.28.2.1}{28.2.1 PAM Configuration Syntax}{section.28.2}
\BOOKMARK [3][-]{subsubsection.28.2.1.1}{28.2.1.1 Anatomy of /etc/pam.d Entries}{subsection.28.2.1}
\BOOKMARK [2][-]{subsection.28.2.2}{28.2.2 Example System Configurations}{section.28.2}
\BOOKMARK [3][-]{subsubsection.28.2.2.1}{28.2.2.1 PAM: Original Login Config}{subsection.28.2.2}
\BOOKMARK [3][-]{subsubsection.28.2.2.2}{28.2.2.2 PAM: Login Using pam\137smbpass}{subsection.28.2.2}
\BOOKMARK [2][-]{subsection.28.2.3}{28.2.3 smb.conf PAM Configuration}{section.28.2}
\BOOKMARK [2][-]{subsection.28.2.4}{28.2.4 Remote CIFS Authentication Using winbindd.so}{section.28.2}
\BOOKMARK [2][-]{subsection.28.2.5}{28.2.5 Password Synchronization Using pam\137smbpass.so}{section.28.2}
\BOOKMARK [3][-]{subsubsection.28.2.5.1}{28.2.5.1 Password Synchronization Configuration}{subsection.28.2.5}
\BOOKMARK [3][-]{subsubsection.28.2.5.2}{28.2.5.2 Password Migration Configuration}{subsection.28.2.5}
\BOOKMARK [3][-]{subsubsection.28.2.5.3}{28.2.5.3 Mature Password Configuration}{subsection.28.2.5}
\BOOKMARK [3][-]{subsubsection.28.2.5.4}{28.2.5.4 Kerberos Password Integration Configuration}{subsection.28.2.5}
\BOOKMARK [1][-]{section.28.3}{28.3 Common Errors}{chapter.28}
\BOOKMARK [2][-]{subsection.28.3.1}{28.3.1 pam\137winbind Problem}{section.28.3}
\BOOKMARK [2][-]{subsection.28.3.2}{28.3.2 Winbind Is Not Resolving Users and Groups}{section.28.3}
\BOOKMARK [0][-]{chapter.29}{Chapter 29 Integrating MS Windows Networks with Samba}{part.3}
\BOOKMARK [1][-]{section.29.1}{29.1 Features and Benefits}{chapter.29}
\BOOKMARK [1][-]{section.29.2}{29.2 Background Information}{chapter.29}
\BOOKMARK [1][-]{section.29.3}{29.3 Name Resolution in a Pure UNIX/Linux World}{chapter.29}
\BOOKMARK [2][-]{subsection.29.3.1}{29.3.1 /etc/hosts}{section.29.3}
\BOOKMARK [2][-]{subsection.29.3.2}{29.3.2 /etc/resolv.conf}{section.29.3}
\BOOKMARK [2][-]{subsection.29.3.3}{29.3.3 /etc/host.conf}{section.29.3}
\BOOKMARK [2][-]{subsection.29.3.4}{29.3.4 /etc/nsswitch.conf}{section.29.3}
\BOOKMARK [1][-]{section.29.4}{29.4 Name Resolution as Used within MS Windows Networking}{chapter.29}
\BOOKMARK [2][-]{subsection.29.4.1}{29.4.1 The NetBIOS Name Cache}{section.29.4}
\BOOKMARK [2][-]{subsection.29.4.2}{29.4.2 The LMHOSTS File}{section.29.4}
\BOOKMARK [2][-]{subsection.29.4.3}{29.4.3 HOSTS File}{section.29.4}
\BOOKMARK [2][-]{subsection.29.4.4}{29.4.4 DNS Lookup}{section.29.4}
\BOOKMARK [2][-]{subsection.29.4.5}{29.4.5 WINS Lookup}{section.29.4}
\BOOKMARK [1][-]{section.29.5}{29.5 Common Errors}{chapter.29}
\BOOKMARK [2][-]{subsection.29.5.1}{29.5.1 Pinging Works Only One Way}{section.29.5}
\BOOKMARK [2][-]{subsection.29.5.2}{29.5.2 Very Slow Network Connections}{section.29.5}
\BOOKMARK [2][-]{subsection.29.5.3}{29.5.3 Samba Server Name-Change Problem}{section.29.5}
\BOOKMARK [0][-]{chapter.30}{Chapter 30 Unicode/Charsets}{part.3}
\BOOKMARK [1][-]{section.30.1}{30.1 Features and Benefits}{chapter.30}
\BOOKMARK [1][-]{section.30.2}{30.2 What Are Charsets and Unicode?}{chapter.30}
\BOOKMARK [1][-]{section.30.3}{30.3 Samba and Charsets}{chapter.30}
\BOOKMARK [1][-]{section.30.4}{30.4 Conversion from Old Names}{chapter.30}
\BOOKMARK [1][-]{section.30.5}{30.5 Japanese Charsets}{chapter.30}
\BOOKMARK [2][-]{subsection.30.5.1}{30.5.1 Basic Parameter Setting}{section.30.5}
\BOOKMARK [2][-]{subsection.30.5.2}{30.5.2 Individual Implementations}{section.30.5}
\BOOKMARK [2][-]{subsection.30.5.3}{30.5.3 Migration from Samba-2.2 Series}{section.30.5}
\BOOKMARK [1][-]{section.30.6}{30.6 Common Errors}{chapter.30}
\BOOKMARK [2][-]{subsection.30.6.1}{30.6.1 CP850.so Can't Be Found}{section.30.6}
\BOOKMARK [0][-]{chapter.31}{Chapter 31 Backup Techniques}{part.3}
\BOOKMARK [1][-]{section.31.1}{31.1 Features and Benefits}{chapter.31}
\BOOKMARK [1][-]{section.31.2}{31.2 Discussion of Backup Solutions}{chapter.31}
\BOOKMARK [2][-]{subsection.31.2.1}{31.2.1 BackupPC}{section.31.2}
\BOOKMARK [2][-]{subsection.31.2.2}{31.2.2 Rsync}{section.31.2}
\BOOKMARK [2][-]{subsection.31.2.3}{31.2.3 Amanda}{section.31.2}
\BOOKMARK [2][-]{subsection.31.2.4}{31.2.4 BOBS: Browseable Online Backup System}{section.31.2}
\BOOKMARK [0][-]{chapter.32}{Chapter 32 High Availability}{part.3}
\BOOKMARK [1][-]{section.32.1}{32.1 Features and Benefits}{chapter.32}
\BOOKMARK [1][-]{section.32.2}{32.2 Technical Discussion}{chapter.32}
\BOOKMARK [2][-]{subsection.32.2.1}{32.2.1 The Ultimate Goal}{section.32.2}
\BOOKMARK [2][-]{subsection.32.2.2}{32.2.2 Why Is This So Hard?}{section.32.2}
\BOOKMARK [3][-]{subsubsection.32.2.2.1}{32.2.2.1 The Front-End Challenge}{subsection.32.2.2}
\BOOKMARK [3][-]{subsubsection.32.2.2.2}{32.2.2.2 Demultiplexing SMB Requests}{subsection.32.2.2}
\BOOKMARK [3][-]{subsubsection.32.2.2.3}{32.2.2.3 The Distributed File System Challenge}{subsection.32.2.2}
\BOOKMARK [3][-]{subsubsection.32.2.2.4}{32.2.2.4 Restrictive Constraints on Distributed File Systems}{subsection.32.2.2}
\BOOKMARK [3][-]{subsubsection.32.2.2.5}{32.2.2.5 Server Pool Communications}{subsection.32.2.2}
\BOOKMARK [3][-]{subsubsection.32.2.2.6}{32.2.2.6 Server Pool Communications Demands}{subsection.32.2.2}
\BOOKMARK [3][-]{subsubsection.32.2.2.7}{32.2.2.7 Required Modifications to Samba}{subsection.32.2.2}
\BOOKMARK [2][-]{subsection.32.2.3}{32.2.3 A Simple Solution}{section.32.2}
\BOOKMARK [2][-]{subsection.32.2.4}{32.2.4 High-Availability Server Products}{section.32.2}
\BOOKMARK [2][-]{subsection.32.2.5}{32.2.5 MS-DFS: The Poor Man's Cluster}{section.32.2}
\BOOKMARK [2][-]{subsection.32.2.6}{32.2.6 Conclusions}{section.32.2}
\BOOKMARK [0][-]{chapter.33}{Chapter 33 Handling Large Directories}{part.3}
\BOOKMARK [0][-]{chapter.34}{Chapter 34 Advanced Configuration Techniques}{part.3}
\BOOKMARK [1][-]{section.34.1}{34.1 Implementation}{chapter.34}
\BOOKMARK [2][-]{subsection.34.1.1}{34.1.1 Multiple Server Hosting}{section.34.1}
\BOOKMARK [2][-]{subsection.34.1.2}{34.1.2 Multiple Virtual Server Personalities}{section.34.1}
\BOOKMARK [2][-]{subsection.34.1.3}{34.1.3 Multiple Virtual Server Hosting}{section.34.1}
\BOOKMARK [-1][-]{part.4}{Part IV Migration and Updating}{}
\BOOKMARK [0][-]{chapter.35}{Chapter 35 Updating and Upgrading Samba}{part.4}
\BOOKMARK [1][-]{section.35.1}{35.1 Key Update Requirements}{chapter.35}
\BOOKMARK [2][-]{subsection.35.1.1}{35.1.1 Upgrading from Samba-3.0.x to Samba-3.2.0}{section.35.1}
\BOOKMARK [2][-]{subsection.35.1.2}{35.1.2 Upgrading from Samba-2.x to Samba-3.0.25}{section.35.1}
\BOOKMARK [2][-]{subsection.35.1.3}{35.1.3 Quick Migration Guide}{section.35.1}
\BOOKMARK [1][-]{section.35.2}{35.2 New Featuers in Samba-3.x Series}{chapter.35}
\BOOKMARK [2][-]{subsection.35.2.1}{35.2.1 New Features in Samba-3.2.x Series}{section.35.2}
\BOOKMARK [2][-]{subsection.35.2.2}{35.2.2 New Features in Samba-3.0.x}{section.35.2}
\BOOKMARK [3][-]{subsubsection.35.2.2.1}{35.2.2.1 Configuration Parameter Changes}{subsection.35.2.2}
\BOOKMARK [3][-]{subsubsection.35.2.2.2}{35.2.2.2 Removed Parameters}{subsection.35.2.2}
\BOOKMARK [3][-]{subsubsection.35.2.2.3}{35.2.2.3 New Parameters}{subsection.35.2.2}
\BOOKMARK [3][-]{subsubsection.35.2.2.4}{35.2.2.4 Modified Parameters \(Changes in Behavior\)}{subsection.35.2.2}
\BOOKMARK [2][-]{subsection.35.2.3}{35.2.3 New Functionality}{section.35.2}
\BOOKMARK [3][-]{subsubsection.35.2.3.1}{35.2.3.1 TDB Data Files}{subsection.35.2.3}
\BOOKMARK [3][-]{subsubsection.35.2.3.2}{35.2.3.2 Changes in Behavior}{subsection.35.2.3}
\BOOKMARK [3][-]{subsubsection.35.2.3.3}{35.2.3.3 Passdb Backends and Authentication}{subsection.35.2.3}
\BOOKMARK [3][-]{subsubsection.35.2.3.4}{35.2.3.4 LDAP}{subsection.35.2.3}
\BOOKMARK [0][-]{chapter.36}{Chapter 36 Migration from NT4 PDC to Samba-3 PDC}{part.4}
\BOOKMARK [1][-]{section.36.1}{36.1 Planning and Getting Started}{chapter.36}
\BOOKMARK [2][-]{subsection.36.1.1}{36.1.1 Objectives}{section.36.1}
\BOOKMARK [3][-]{subsubsection.36.1.1.1}{36.1.1.1 Domain Layout}{subsection.36.1.1}
\BOOKMARK [3][-]{subsubsection.36.1.1.2}{36.1.1.2 Server Share and Directory Layout}{subsection.36.1.1}
\BOOKMARK [3][-]{subsubsection.36.1.1.3}{36.1.1.3 Logon Scripts}{subsection.36.1.1}
\BOOKMARK [3][-]{subsubsection.36.1.1.4}{36.1.1.4 Profile Migration/Creation}{subsection.36.1.1}
\BOOKMARK [3][-]{subsubsection.36.1.1.5}{36.1.1.5 User and Group Accounts}{subsection.36.1.1}
\BOOKMARK [2][-]{subsection.36.1.2}{36.1.2 Steps in Migration Process}{section.36.1}
\BOOKMARK [1][-]{section.36.2}{36.2 Migration Options}{chapter.36}
\BOOKMARK [2][-]{subsection.36.2.1}{36.2.1 Planning for Success}{section.36.2}
\BOOKMARK [2][-]{subsection.36.2.2}{36.2.2 Samba-3 Implementation Choices}{section.36.2}
\BOOKMARK [0][-]{chapter.37}{Chapter 37 SWAT: The Samba Web Administration Tool}{part.4}
\BOOKMARK [1][-]{section.37.1}{37.1 Features and Benefits}{chapter.37}
\BOOKMARK [1][-]{section.37.2}{37.2 Guidelines and Technical Tips}{chapter.37}
\BOOKMARK [2][-]{subsection.37.2.1}{37.2.1 Validate SWAT Installation}{section.37.2}
\BOOKMARK [3][-]{subsubsection.37.2.1.1}{37.2.1.1 Locating the SWAT File}{subsection.37.2.1}
\BOOKMARK [3][-]{subsubsection.37.2.1.2}{37.2.1.2 Locating the SWAT Support Files}{subsection.37.2.1}
\BOOKMARK [2][-]{subsection.37.2.2}{37.2.2 Enabling SWAT for Use}{section.37.2}
\BOOKMARK [2][-]{subsection.37.2.3}{37.2.3 Securing SWAT through SSL}{section.37.2}
\BOOKMARK [2][-]{subsection.37.2.4}{37.2.4 Enabling SWAT Internationalization Support}{section.37.2}
\BOOKMARK [1][-]{section.37.3}{37.3 Overview and Quick Tour}{chapter.37}
\BOOKMARK [2][-]{subsection.37.3.1}{37.3.1 The SWAT Home Page}{section.37.3}
\BOOKMARK [2][-]{subsection.37.3.2}{37.3.2 Global Settings}{section.37.3}
\BOOKMARK [2][-]{subsection.37.3.3}{37.3.3 Share Settings}{section.37.3}
\BOOKMARK [2][-]{subsection.37.3.4}{37.3.4 Printers Settings}{section.37.3}
\BOOKMARK [2][-]{subsection.37.3.5}{37.3.5 The SWAT Wizard}{section.37.3}
\BOOKMARK [2][-]{subsection.37.3.6}{37.3.6 The Status Page}{section.37.3}
\BOOKMARK [2][-]{subsection.37.3.7}{37.3.7 The View Page}{section.37.3}
\BOOKMARK [2][-]{subsection.37.3.8}{37.3.8 The Password Change Page}{section.37.3}
\BOOKMARK [-1][-]{part.5}{Part V Troubleshooting}{}
\BOOKMARK [0][-]{chapter.38}{Chapter 38 The Samba Checklist}{part.5}
\BOOKMARK [1][-]{section.38.1}{38.1 Introduction}{chapter.38}
\BOOKMARK [1][-]{section.38.2}{38.2 Assumptions}{chapter.38}
\BOOKMARK [1][-]{section.38.3}{38.3 The Tests}{chapter.38}
\BOOKMARK [0][-]{chapter.39}{Chapter 39 Analyzing and Solving Samba Problems}{part.5}
\BOOKMARK [1][-]{section.39.1}{39.1 Diagnostics Tools}{chapter.39}
\BOOKMARK [2][-]{subsection.39.1.1}{39.1.1 Debugging with Samba Itself}{section.39.1}
\BOOKMARK [2][-]{subsection.39.1.2}{39.1.2 Tcpdump}{section.39.1}
\BOOKMARK [2][-]{subsection.39.1.3}{39.1.3 Ethereal}{section.39.1}
\BOOKMARK [2][-]{subsection.39.1.4}{39.1.4 The Windows Network Monitor}{section.39.1}
\BOOKMARK [3][-]{subsubsection.39.1.4.1}{39.1.4.1 Installing Network Monitor on an NT Workstation}{subsection.39.1.4}
\BOOKMARK [3][-]{subsubsection.39.1.4.2}{39.1.4.2 Installing Network Monitor on Windows 9x/Me}{subsection.39.1.4}
\BOOKMARK [1][-]{section.39.2}{39.2 Useful URLs}{chapter.39}
\BOOKMARK [1][-]{section.39.3}{39.3 Getting Mailing List Help}{chapter.39}
\BOOKMARK [1][-]{section.39.4}{39.4 How to Get Off the Mailing Lists}{chapter.39}
\BOOKMARK [0][-]{chapter.40}{Chapter 40 Reporting Bugs}{part.5}
\BOOKMARK [1][-]{section.40.1}{40.1 Introduction}{chapter.40}
\BOOKMARK [1][-]{section.40.2}{40.2 General Information}{chapter.40}
\BOOKMARK [1][-]{section.40.3}{40.3 Debug Levels}{chapter.40}
\BOOKMARK [2][-]{subsection.40.3.1}{40.3.1 Debugging-Specific Operations}{section.40.3}
\BOOKMARK [1][-]{section.40.4}{40.4 Internal Errors}{chapter.40}
\BOOKMARK [1][-]{section.40.5}{40.5 Attaching to a Running Process}{chapter.40}
\BOOKMARK [1][-]{section.40.6}{40.6 Patches}{chapter.40}
\BOOKMARK [0][-]{chapter.41}{Chapter 41 Managing TDB Files}{part.5}
\BOOKMARK [1][-]{section.41.1}{41.1 Features and Benefits}{chapter.41}
\BOOKMARK [1][-]{section.41.2}{41.2 Managing TDB Files}{chapter.41}
\BOOKMARK [-1][-]{part.6}{Part VI Reference Section}{}
\BOOKMARK [0][-]{chapter.42}{Chapter 42 How to Compile Samba}{part.6}
\BOOKMARK [1][-]{section.42.1}{42.1 Access Samba Source Code via Subversion}{chapter.42}
\BOOKMARK [2][-]{subsection.42.1.1}{42.1.1 Introduction}{section.42.1}
\BOOKMARK [2][-]{subsection.42.1.2}{42.1.2 Subversion Access to samba.org}{section.42.1}
\BOOKMARK [3][-]{subsubsection.42.1.2.1}{42.1.2.1 Access via ViewCVS}{subsection.42.1.2}
\BOOKMARK [3][-]{subsubsection.42.1.2.2}{42.1.2.2 Access via Subversion}{subsection.42.1.2}
\BOOKMARK [1][-]{section.42.2}{42.2 Accessing the Samba Sources via rsync and ftp}{chapter.42}
\BOOKMARK [1][-]{section.42.3}{42.3 Verifying Samba's PGP Signature}{chapter.42}
\BOOKMARK [1][-]{section.42.4}{42.4 Building the Binaries}{chapter.42}
\BOOKMARK [2][-]{subsection.42.4.1}{42.4.1 Compiling Samba with Active Directory Support}{section.42.4}
\BOOKMARK [3][-]{subsubsection.42.4.1.1}{42.4.1.1 Installing the Required Packages for Debian}{subsection.42.4.1}
\BOOKMARK [3][-]{subsubsection.42.4.1.2}{42.4.1.2 Installing the Required Packages for Red Hat Linux}{subsection.42.4.1}
\BOOKMARK [3][-]{subsubsection.42.4.1.3}{42.4.1.3 SuSE Linux Package Requirements}{subsection.42.4.1}
\BOOKMARK [1][-]{section.42.5}{42.5 Starting the smbd nmbd and winbindd}{chapter.42}
\BOOKMARK [2][-]{subsection.42.5.1}{42.5.1 Starting from inetd.conf}{section.42.5}
\BOOKMARK [2][-]{subsection.42.5.2}{42.5.2 Alternative: Starting smbd as a Daemon}{section.42.5}
\BOOKMARK [3][-]{subsubsection.42.5.2.1}{42.5.2.1 Starting Samba for Red Hat Linux}{subsection.42.5.2}
\BOOKMARK [3][-]{subsubsection.42.5.2.2}{42.5.2.2 Starting Samba for Novell SUSE Linux}{subsection.42.5.2}
\BOOKMARK [0][-]{chapter.43}{Chapter 43 Portability}{part.6}
\BOOKMARK [1][-]{section.43.1}{43.1 HPUX}{chapter.43}
\BOOKMARK [1][-]{section.43.2}{43.2 SCO UNIX}{chapter.43}
\BOOKMARK [1][-]{section.43.3}{43.3 DNIX}{chapter.43}
\BOOKMARK [1][-]{section.43.4}{43.4 Red Hat Linux}{chapter.43}
\BOOKMARK [1][-]{section.43.5}{43.5 AIX: Sequential Read Ahead}{chapter.43}
\BOOKMARK [1][-]{section.43.6}{43.6 Solaris}{chapter.43}
\BOOKMARK [2][-]{subsection.43.6.1}{43.6.1 Locking Improvements}{section.43.6}
\BOOKMARK [2][-]{subsection.43.6.2}{43.6.2 Winbind on Solaris 9}{section.43.6}
\BOOKMARK [0][-]{chapter.44}{Chapter 44 Samba and Other CIFS Clients}{part.6}
\BOOKMARK [1][-]{section.44.1}{44.1 Macintosh Clients}{chapter.44}
\BOOKMARK [1][-]{section.44.2}{44.2 OS2 Client}{chapter.44}
\BOOKMARK [2][-]{subsection.44.2.1}{44.2.1 Configuring OS/2 Warp Connect or OS/2 Warp 4}{section.44.2}
\BOOKMARK [2][-]{subsection.44.2.2}{44.2.2 Configuring Other Versions of OS/2}{section.44.2}
\BOOKMARK [2][-]{subsection.44.2.3}{44.2.3 Printer Driver Download for OS/2 Clients}{section.44.2}
\BOOKMARK [1][-]{section.44.3}{44.3 Windows for Workgroups}{chapter.44}
\BOOKMARK [2][-]{subsection.44.3.1}{44.3.1 Latest TCP/IP Stack from Microsoft}{section.44.3}
\BOOKMARK [2][-]{subsection.44.3.2}{44.3.2 Delete .pwl Files After Password Change}{section.44.3}
\BOOKMARK [2][-]{subsection.44.3.3}{44.3.3 Configuring Windows for Workgroups Password Handling}{section.44.3}
\BOOKMARK [2][-]{subsection.44.3.4}{44.3.4 Password Case Sensitivity}{section.44.3}
\BOOKMARK [2][-]{subsection.44.3.5}{44.3.5 Use TCP/IP as Default Protocol}{section.44.3}
\BOOKMARK [2][-]{subsection.44.3.6}{44.3.6 Speed Improvement}{section.44.3}
\BOOKMARK [1][-]{section.44.4}{44.4 Windows 95/98}{chapter.44}
\BOOKMARK [2][-]{subsection.44.4.1}{44.4.1 Speed Improvement}{section.44.4}
\BOOKMARK [1][-]{section.44.5}{44.5 Windows 2000 Service Pack 2}{chapter.44}
\BOOKMARK [1][-]{section.44.6}{44.6 Windows NT 3.1}{chapter.44}
\BOOKMARK [0][-]{chapter.45}{Chapter 45 Samba Performance Tuning}{part.6}
\BOOKMARK [1][-]{section.45.1}{45.1 Comparisons}{chapter.45}
\BOOKMARK [1][-]{section.45.2}{45.2 Socket Options}{chapter.45}
\BOOKMARK [1][-]{section.45.3}{45.3 Read Size}{chapter.45}
\BOOKMARK [1][-]{section.45.4}{45.4 Max Xmit}{chapter.45}
\BOOKMARK [1][-]{section.45.5}{45.5 Log Level}{chapter.45}
\BOOKMARK [1][-]{section.45.6}{45.6 Read Raw}{chapter.45}
\BOOKMARK [1][-]{section.45.7}{45.7 Write Raw}{chapter.45}
\BOOKMARK [1][-]{section.45.8}{45.8 Slow Logins}{chapter.45}
\BOOKMARK [1][-]{section.45.9}{45.9 Client Tuning}{chapter.45}
\BOOKMARK [1][-]{section.45.10}{45.10 Samba Performance Problem Due to Changing Linux Kernel}{chapter.45}
\BOOKMARK [1][-]{section.45.11}{45.11 Corrupt tdb Files}{chapter.45}
\BOOKMARK [1][-]{section.45.12}{45.12 Samba Performance is Very Slow}{chapter.45}
\BOOKMARK [0][-]{chapter.46}{Chapter 46 LDAP and Transport Layer Security}{part.6}
\BOOKMARK [1][-]{section.46.1}{46.1 Introduction}{chapter.46}
\BOOKMARK [1][-]{section.46.2}{46.2 Configuring}{chapter.46}
\BOOKMARK [2][-]{subsection.46.2.1}{46.2.1 Generating the Certificate Authority}{section.46.2}
\BOOKMARK [2][-]{subsection.46.2.2}{46.2.2 Generating the Server Certificate}{section.46.2}
\BOOKMARK [2][-]{subsection.46.2.3}{46.2.3 Installing the Certificates}{section.46.2}
\BOOKMARK [1][-]{section.46.3}{46.3 Testing}{chapter.46}
\BOOKMARK [1][-]{section.46.4}{46.4 Troubleshooting}{chapter.46}
\BOOKMARK [0][-]{chapter.47}{Chapter 47 Samba Support}{part.6}
\BOOKMARK [1][-]{section.47.1}{47.1 Free Support}{chapter.47}
\BOOKMARK [1][-]{section.47.2}{47.2 Commercial Support}{chapter.47}
\BOOKMARK [0][-]{chapter.48}{Chapter 48 DNS and DHCP Configuration Guide}{part.6}
\BOOKMARK [1][-]{section.48.1}{48.1 Features and Benefits}{chapter.48}
\BOOKMARK [1][-]{section.48.2}{48.2 Example Configuration}{chapter.48}
\BOOKMARK [2][-]{subsection.48.2.1}{48.2.1 Dynamic DNS}{section.48.2}
\BOOKMARK [2][-]{subsection.48.2.2}{48.2.2 DHCP Server}{section.48.2}
\BOOKMARK [0][-]{appendix.A}{Chapter A GNU General Public License version 3}{part.6}
\BOOKMARK [0][-]{section*.58}{Glossary}{part.6}
\BOOKMARK [0][-]{appendix*.59}{SUBJECT INDEX}{part.6}