You are previewing Apple Training Series Mac OS X Advanced System Administration v10.5.
O'Reilly logo
Apple Training Series Mac OS X Advanced System Administration v10.5

Book Description

This in-depth look at advanced topics in Mac network administration shows system administrators and other IT professionals how to use Mac OS X Server v10.5 within a multiplatform, heterogeneous environment. Following the learning objectives of the Apple Certified System Administrator course, this book is a perfect study aid for the Apple Certified System Administrator exam.

Table of Contents

  1. Copyright
  2. Acknowledgments
  3. Getting Started
    1. The Methodology
    2. Course Structure
    3. System Requirements
    4. Certification
    5. About the Apple Training Series
  4. 1. Implementation
    1. 1. Planning Systems
      1. Planning Before Purchasing
        1. Determining Utilization
        2. Determining Heat Dissipation and Load, Power, and Cooling
        3. Planning CPU, Memory, and Service Utilization
        4. Planning Network Utilization
        5. Determining Storage
      2. Documenting the Initial Requirements
      3. What You’ve Learned
      4. References
      5. Review Quiz
        1. Answers
    2. 2. Installing and Configuring Systems
      1. Installing Your System
        1. Installing Remotely from a Command Line
        2. Installing Remotely Using a Graphical Interface
      2. Configuring Your System
        1. Configuring Your System Offline
        2. Performing Third-Party and Additional Installations
        3. Verifying Installations
        4. Inspecting Packages Before Installation
        5. Using Managed Preferences
      3. Troubleshooting
        1. Initial Installation
        2. Subsequent Installations
        3. Managed Preferences
      4. What You’ve Learned
      5. Review Quiz
        1. Answers
    3. 3. Upgrading and Migrating Systems
      1. Upgrading Your System
        1. Planning an Upgrade
        2. Upgrading from Tiger, Panther, and Jaguar
      2. Exporting Settings and Data
        1. Cloning and Upgrading
        2. Using Workgroup Manager
        3. Using dsexport
        4. Backing Up Open Directory
      3. Importing Settings and Data
        1. Using Workgroup Manager
        2. Using dsimport
        3. Restoring Open Directory
        4. Migration Overview
      4. Troubleshooting
      5. What You’ve Learned
      6. Review Quiz
        1. Answers
    4. 4. Assessing Systems
      1. Determining Current Utilization
        1. Computing Network Bandwidth Utilization
        2. Determining Services and Hardware Utilization
        3. Determining Storage Utilization
      2. Evaluating the Upgrade History
      3. Evaluating Workflows
        1. Examining the Workflow
        2. Interviewing Users
        3. Observing the Workflow
        4. Documenting the Workflow
        5. Optimizing the Workflow
      4. What You’ve Learned
      5. Review Quiz
        1. Answers
  5. 2. Networking
    1. 5. Working with DNS and NTP
      1. Using DNS: The Big Picture
        1. About the Domain Name System
        2. About the DNS Query Path
        3. About DNS Server Configurations
      2. Configuring DNS Services
        1. Using BIND
        2. Editing and Importing BIND Files
        3. Creating Secure and Private DNS Servers
          1. Using Caching-Only Name Servers
          2. Restricting Zone Transfers
          3. Providing Authoritative-Only Services
          4. Configuring Forward Servers
        4. Configuring for Scale
      3. Using Network Time Protocol
        1. Understanding the NTP Service
      4. Troubleshooting
        1. Testing at the Server
        2. Checking the Logs and the Process
        3. Checking the Configuration File Syntax
        4. Testing the Client Service
        5. Checking NTP
      5. What You’ve Learned
      6. References
      7. Review Quiz
        1. Answers
    2. 6. Controlling Access to Resources
      1. Configuring Firewall Service
      2. Accessing the Firewall Setup
        1. Using Firewall Log Files
        2. Configuring Firewall Files
      3. Configuring RADIUS
        1. Using RADIUS
        2. Using RADIUS Configuration and Log Files
      4. Troubleshooting
      5. What You’ve Learned
      6. Review Quiz
        1. Answers
  6. 3. Administration
    1. 7. Securing Access to Resources
      1. About Authentication and Authorization
        1. About Mac OS X Accounts
        2. Enabling and Disabling the Root Account
      2. Protecting Hardware
        1. Disabling Hardware
        2. Using Hardware Passwords
      3. Authenticating Accounts
        1. Using sudo
        2. Setting Password Policies
        3. Using PAM
          1. PAM Management Groups
          2. PAM Rules
        4. Using SSH and Digital Key Pairs
          1. Generating a Key Pair
          2. Updating SSH Key Fingerprints
      4. Using Certificates for Authentication
        1. About Public Key Infrastructure
          1. Public and Private Keys
          2. Public Key Certificates
          3. Certificate Authorities (CAs)
          4. Identities
        2. Using Certificate Manager
          1. Requesting a Certificate from a Certificate Authority
          2. Creating Self-Signed Certificates
          3. Importing Certificates
          4. Modifying Certificates
        3. Configuring Certificates via the Command Line
        4. Configuring Services to Use Certificates
        5. Creating a Certificate Authority to Sign Certificates
          1. Creating a CA Using Certificate Assistant
          2. Creating a CA from the Command Line
          3. Storing the CA Private Key
          4. Signing a Newly Created CA
          5. Creating Folders and Files for SSL
          6. Distributing Server Certificates to Clients
      5. Authorizing Accounts
        1. Editing System Rights
        2. Setting File Permissions
          1. Setting POSIX Permissions
          2. Viewing POSIX Permissions
          3. Modifying POSIX Permissions
          4. Setting Flags
          5. Setting ACL Permissions
          6. Altering Initial File Permissions
        3. Setting Service Access Privileges
      6. Encrypting Files
        1. Using FileVault
          1. Setting a FileVault Master Keychain
          2. Centrally Managing FileVault
        2. Encrypting Disk Images
      7. Troubleshooting
      8. What You’ve Learned
      9. Review Quiz
        1. Answers
    2. 8. Monitoring Systems
      1. Using the System Log and ASL
        1. About Log Levels and Facilities
        2. About Log Formats
        3. Reading Log Files
        4. Creating a Monitoring Policy
      2. Using Tools and Utilities
        1. top, CPU Percentage, and Load Averages
        2. Other System Monitoring Utilities
        3. Instruments and DTrace
        4. Xserve Tools
        5. Other Monitoring Options
      3. Setting Notifications
        1. Custom-Scripted Notifications
      4. Creating Reports
      5. Troubleshooting
      6. What You’ve Learned
      7. Review Quiz
        1. Answers
    3. 9. Automating Systems
      1. Understanding Mac OS X Automation
      2. Comparing Automation Technologies
        1. Using bash
          1. Combining bash and User Attributes
          2. Getting Help
          3. Employing Flow Control
        2. Using Alternate Shells
        3. Using Mac OS X–Specific Commands
          1. defaults
          2. systemsetup
          3. networksetup
          4. Other Mac OS X–Specific Commands
        4. Using Python
        5. Using AppleScript
      3. Using launchd
        1. About launchd
        2. Exploring launchd Functions
        3. Using launchd plists
        4. Using launchd for Other System Efficiencies
      4. Using Other Automation Technologies
        1. cron
        2. SystemStarter
        3. periodic
        4. mach_init
        5. at
        6. rc
        7. init.d
      5. Examples
      6. Troubleshooting
      7. What You’ve Learned
      8. Review Quiz
        1. Answers
    4. 10. Ensuring Data Integrity
      1. Determining Backup Strategies
        1. About Information Lifecycle Management
        2. Choosing Backup Methods
          1. Using Traditional Backup to Tape
          2. Backing Up to Removable Media
          3. Backing Up “Into the Cloud”
          4. Backing Up LAN-Free
          5. Comparing Backup Methods
      2. Using Backup Tools
        1. Using Command-Line Utilities
          1. rsync
          2. ditto
          3. asr
          4. Other Command-Line Utilities
        2. Time Machine
          1. Time Machine Details
        3. Comparing Backup Tools
      3. Automating Data Backup
      4. About Common Data Stores
        1. iCal Service
        2. iChat Server
        3. Security and FileVault KeyChains
        4. QuickTime Streaming Server
        5. Firewall Service
        6. NAT Service
        7. Mail
        8. MySQL
        9. PHP
        10. Web Service
        11. Wiki and Blog Server
      5. Restoring Backed-Up Data
      6. Troubleshooting
      7. What You’ve Learned
      8. Review Quiz
        1. Answers
  7. 4. Optimizing and Troubleshooting
    1. 11. Ensuring Reliability
      1. Establishing Reliability Metrics
      2. Maintaining High Availability
        1. Planning Power Redundancy
          1. Step 1: Identify devices that require UPS backup
          2. Step 2: Calculate power consumption
          3. Step 3: Determine the required run time
          4. Step 4: Identify the required battery capacity
          5. Step 5: Research and select UPS vendors and models
          6. Step 6: Verify electrical ratings and wiring in your facility
          7. Step 7: Determine the UPS communication method
          8. Step 8: Test the UPS
        2. Implementing OS Power-Supply Controls
        3. Creating Disk Redundancy
        4. Creating Network Redundancy
      3. Monitoring High Availability
        1. Using diskspacemonitor
        2. Using IP Failover
        3. About the Failover Scheme
          1. Configuring Failovers
          2. Configuring Failover Services
      4. Troubleshooting
      5. What You’ve Learned
      6. Review Quiz
        1. Answers
    2. 12. Troubleshooting
      1. Following a Methodology
        1. Take Notes
        2. Use Your Resources
        3. Consider the Human Factor
        4. Follow an Order of Elimination
      2. Taking General Steps
      3. Assessing the Problem
        1. Tips for Gathering Information
        2. Using “The Four Cs”
          1. Examining Connections
          2. Examining Components
          3. Examining Configurations
          4. Examining Combinations of Problems
      4. Using Troubleshooting Tools and Resources
        1. Seeing What the User Sees
          1. Using Apple Remote Desktop to Troubleshoot
          2. Using Screen Sharing to Troubleshoot
        2. Determining the State of the System
          1. Using System Profiler
          2. Using Logs
          3. Performing Verbose Boot
        3. Using Command-Line Tools
          1. ps
          2. strings
          3. fs_usage
          4. Dtrace and Its Utilities
          5. otool
          6. lsof
          7. netstat
          8. tcpdump
          9. vm_stat
          10. iostat
        4. Finding Help
          1. Using man Pages
          2. Using Documentation
          3. Searching the Web
          4. Being Forewarned Is Forearmed
          5. Consulting Experts
      5. Trying Examples
        1. Finding Running Processes
        2. Using Strings
        3. Finding Listening Network Ports
        4. Using Debug Logs
          1. Setting the Verbose Command-Line Switch
          2. Using Configuration File Settings
          3. Presence of Debug File
          4. Using Environment Variables
      6. What You’ve Learned
      7. Review Quiz
        1. Answers
  8. Documenting Systems
    1. Gathering Data
      1. Capturing Graphical Information
      2. Collecting Other Mac OS X Information
      3. Reporting with Third-Party and Custom Software
        1. Using Apple Remote Desktop for Reporting
        2. Customizing Reports
        3. Trying Other Reporting Applications
    2. Creating Documentation
      1. Use a Template or Checklist
      2. Keep It Electronic
      3. Use Wikis
      4. Control Access and Provide Audit Trails
      5. Automate
      6. Stay Organized
    3. Summary