1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
|
<html><head><meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>PartIII.Reference Section</title><link rel="stylesheet" href="samba.css" type="text/css"><meta name="generator" content="DocBook XSL Stylesheets V1.70.1"><link rel="start" href="index.html" title="Samba-3 by Example"><link rel="up" href="index.html" title="Samba-3 by Example"><link rel="prev" href="nw4migration.html" title="Chapter10.Migrating NetWare Server to Samba-3"><link rel="next" href="kerberos.html" title="Chapter11.Active Directory, Kerberos, and Security"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">PartIII.Reference Section</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="nw4migration.html">Prev</a></td><th width="60%" align="center"></th><td width="20%" align="right"><a accesskey="n" href="kerberos.html">Next</a></td></tr></table><hr></div><div class="part" lang="en"><div class="titlepage"><div><div><h1 class="title"><a name="RefSection"></a>PartIII.Reference Section</h1></div></div></div><div class="partintro" lang="en"><div><div><div><h1 class="title"><a name="id2614969"></a>Reference Section</h1></div></div></div><p>
This section <span class="emphasis"><em>Samba-3 by Example</em></span> provides important reference material
that may help you to solve network performance issues, to answer some of the critiques
published regarding Samba, or just to gain a more broad understanding of how Samba can
play in a Windows networking world.
</p><div class="toc"><p><b>Table of Contents</b></p><dl><dt><span class="chapter"><a href="kerberos.html">11. Active Directory, Kerberos, and Security</a></span></dt><dd><dl><dt><span class="sect1"><a href="kerberos.html#id2615066">Introduction</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id2615720">Assignment Tasks</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#id2615736">Dissection and Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id2616138">Technical Issues</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#ch10expl">Implementation</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id2617763">Share Access Controls</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2618112">Share Definition Controls</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2618720">Share Point Directory and File Permissions</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2619124">Managing Windows 200x ACLs</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2619850">Key Points Learned</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#id2619985">Questions and Answers</a></span></dt></dl></dd><dt><span class="chapter"><a href="DomApps.html">12. Integrating Additional Services</a></span></dt><dd><dl><dt><span class="sect1"><a href="DomApps.html#id2620617">Introduction</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#id2620648">Assignment Tasks</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id2620749">Dissection and Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#id2620782">Technical Issues</a></span></dt><dt><span class="sect2"><a href="DomApps.html#id2620947">Political Issues</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id2620964">Implementation</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#ch10-one">Removal of Pre-Existing Conflicting RPMs</a></span></dt><dt><span class="sect2"><a href="DomApps.html#id2622829">Key Points Learned</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id2622889">Questions and Answers</a></span></dt></dl></dd><dt><span class="chapter"><a href="HA.html">13. Performance, Reliability, and Availability</a></span></dt><dd><dl><dt><span class="sect1"><a href="HA.html#id2623408">Introduction</a></span></dt><dt><span class="sect1"><a href="HA.html#id2623496">Dissection and Discussion</a></span></dt><dt><span class="sect1"><a href="HA.html#id2623967">Guidelines for Reliable Samba Operation</a></span></dt><dd><dl><dt><span class="sect2"><a href="HA.html#id2623994">Name Resolution</a></span></dt><dt><span class="sect2"><a href="HA.html#id2624471">Samba Configuration</a></span></dt><dt><span class="sect2"><a href="HA.html#id2624798">Use and Location of BDCs</a></span></dt><dt><span class="sect2"><a href="HA.html#id2624873">Use One Consistent Version of MS Windows Client</a></span></dt><dt><span class="sect2"><a href="HA.html#id2624895">For Scalability, Use SAN-Based Storage on Samba Servers</a></span></dt><dt><span class="sect2"><a href="HA.html#id2624944">Distribute Network Load with MSDFS</a></span></dt><dt><span class="sect2"><a href="HA.html#id2624999">Replicate Data to Conserve Peak-Demand Wide-Area Bandwidth</a></span></dt><dt><span class="sect2"><a href="HA.html#id2625045">Hardware Problems</a></span></dt><dt><span class="sect2"><a href="HA.html#id2625193">Large Directories</a></span></dt></dl></dd><dt><span class="sect1"><a href="HA.html#id2625291">Key Points Learned</a></span></dt></dl></dd><dt><span class="chapter"><a href="ch14.html">14. Samba Support</a></span></dt><dd><dl><dt><span class="sect1"><a href="ch14.html#id2625461">Free Support</a></span></dt><dt><span class="sect1"><a href="ch14.html#id2625679">Commercial Support</a></span></dt></dl></dd><dt><span class="chapter"><a href="appendix.html">15. A Collection of Useful Tidbits</a></span></dt><dd><dl><dt><span class="sect1"><a href="appendix.html#domjoin">Joining a Domain: Windows 200x/XP Professional</a></span></dt><dt><span class="sect1"><a href="appendix.html#id2626387">Samba System File Location</a></span></dt><dt><span class="sect1"><a href="appendix.html#id2626807">Starting Samba</a></span></dt><dt><span class="sect1"><a href="appendix.html#id2627156">DNS Configuration Files</a></span></dt><dd><dl><dt><span class="sect2"><a href="appendix.html#id2627168">The Forward Zone File for the Loopback Adaptor</a></span></dt><dt><span class="sect2"><a href="appendix.html#id2627216">The Reverse Zone File for the Loopback Adaptor</a></span></dt><dt><span class="sect2"><a href="appendix.html#id2627320">DNS Root Server Hint File</a></span></dt></dl></dd><dt><span class="sect1"><a href="appendix.html#altldapcfg">Alternative LDAP Database Initialization</a></span></dt><dd><dl><dt><span class="sect2"><a href="appendix.html#id2627379">Initialization of the LDAP Database</a></span></dt></dl></dd><dt><span class="sect1"><a href="appendix.html#id2627952">The LDAP Account Manager</a></span></dt><dt><span class="sect1"><a href="appendix.html#id2628940">IDEALX Management Console</a></span></dt><dt><span class="sect1"><a href="appendix.html#ch12-SUIDSGID">Effect of Setting File and Directory SUID/SGID Permissions Explained</a></span></dt><dt><span class="sect1"><a href="appendix.html#ch12dblck">Shared Data Integrity</a></span></dt><dd><dl><dt><span class="sect2"><a href="appendix.html#id2629415">Microsoft Access</a></span></dt><dt><span class="sect2"><a href="appendix.html#id2629562">Act! Database Sharing</a></span></dt><dt><span class="sect2"><a href="appendix.html#id2629647">Opportunistic Locking Controls</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="primer.html">16. Networking Primer</a></span></dt><dd><dl><dt><span class="sect1"><a href="primer.html#id2629813">Requirements and Notes</a></span></dt><dt><span class="sect1"><a href="primer.html#id2629975">Introduction</a></span></dt><dd><dl><dt><span class="sect2"><a href="primer.html#id2630035">Assignment Tasks</a></span></dt></dl></dd><dt><span class="sect1"><a href="primer.html#id2630152">Exercises</a></span></dt><dd><dl><dt><span class="sect2"><a href="primer.html#id2630287">Single-Machine Broadcast Activity</a></span></dt><dt><span class="sect2"><a href="primer.html#secondmachine">Second Machine Startup Broadcast Interaction</a></span></dt><dt><span class="sect2"><a href="primer.html#id2631433">Simple Windows Client Connection Characteristics</a></span></dt><dt><span class="sect2"><a href="primer.html#id2631930">Windows 200x/XP Client Interaction with Samba-3</a></span></dt><dt><span class="sect2"><a href="primer.html#id2632498">Conclusions to Exercises</a></span></dt></dl></dd><dt><span class="sect1"><a href="primer.html#chap01conc">Dissection and Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="primer.html#id2632612">Technical Issues</a></span></dt></dl></dd><dt><span class="sect1"><a href="primer.html#chap01qa">Questions and Answers</a></span></dt></dl></dd><dt><span class="appendix"><a href="gpl.html">A. GNU General Public License</a></span></dt><dd><dl><dt><span class="sect1"><a href="gpl.html#gpl-1">Preamble</a></span></dt><dt><span class="sect1"><a href="gpl.html#gpl-2">TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION</a></span></dt><dd><dl><dt><span class="sect2"><a href="gpl.html#gpl-2-0">Section 0</a></span></dt><dt><span class="sect2"><a href="gpl.html#gpl-2-1">Section 1</a></span></dt><dt><span class="sect2"><a href="gpl.html#gpl-2-2">Section 2</a></span></dt><dt><span class="sect2"><a href="gpl.html#gpl-2-3">Section 3
</a></span></dt><dt><span class="sect2"><a href="gpl.html#gpl-2-4">Section 4
</a></span></dt><dt><span class="sect2"><a href="gpl.html#gpl-2-5">Section 5
</a></span></dt><dt><span class="sect2"><a href="gpl.html#gpl-2-6">Section 6
</a></span></dt><dt><span class="sect2"><a href="gpl.html#gpl-2-7">Section 7
</a></span></dt><dt><span class="sect2"><a href="gpl.html#gpl-2-8">Section 8
</a></span></dt><dt><span class="sect2"><a href="gpl.html#gpl-2-9">Section 9
</a></span></dt><dt><span class="sect2"><a href="gpl.html#gpl-2-10">Section 10
</a></span></dt><dt><span class="sect2"><a href="gpl.html#gpl-2-11">NO WARRANTY Section 11
</a></span></dt><dt><span class="sect2"><a href="gpl.html#gpl-2-12">Section 12
</a></span></dt></dl></dd><dt><span class="sect1"><a href="gpl.html#gpl-3">How to Apply These Terms to Your New Programs
</a></span></dt></dl></dd></dl></div></div></div><div class="navfooter"><hr><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="nw4migration.html">Prev</a></td><td width="20%" align="center"></td><td width="40%" align="right"><a accesskey="n" href="kerberos.html">Next</a></td></tr><tr><td width="40%" align="left" valign="top">Chapter10.Migrating NetWare Server to Samba-3</td><td width="20%" align="center"><a accesskey="h" href="index.html">Home</a></td><td width="40%" align="right" valign="top">Chapter11.Active Directory, Kerberos, and Security</td></tr></table></div></body></html>
|