You are previewing Solaris™ Operating Environment Boot Camp.
O'Reilly logo
Solaris™ Operating Environment Boot Camp

Book Description

Complete solutions for every Solaris OE sysadmin.

  • Step-by-step solutions for every key Solaris OE system administration task

  • From basic user administration to complex enterprise networking

  • Filesystems, kernels, shells, Internet/DNS, email, PPP, NIS, backup/restore, and much more

  • Extensive examples, sample output, and shell scripts

  • Includes coverage of Solaris 8 and 9 Operating Environments

  • You already have the man pages: what you need are the answers! With Solaris OE Boot Camp, the answers are right at your fingertips. Drawing on nearly 30 years of experience with Sun Microsystems hardware and software, David Rhodes and Dominic Butler walk you through every facet of Solaris OE system administration, from simple user management on standalone servers to building and managing a fully networked enterprise environment. Rhodes and Butler explain every task in detail-with sample commands, specific output, lists of impacted system files, and in some cases, complete shell scripts. Coverage includes:

  • User Administration

  • Permissions & Security

  • Networking

  • Filesystems, including NFS, DFS & Autofs

  • Serial & SCSI Connections

  • Internet & DNS

  • Disk Quotas

  • Shells

  • Email Configuration & Management

  • Backup/Restore

  • System Boot/Halt

  • PPP Remote Connections

  • Kernels & Patches

  • Naming Services & NIS

  • Package Administration

  • Time, Date, & NTP

  • And much more...

  • Whether you've been running the Solaris Operating Environment for a week or a decade, Solaris Operating Environment Boot Camp will help you do more, do it faster, and do it better!

    Table of Contents

    1. Copyright
    2. Introduction
    3. The System Administrator's Role
      1. The Importance of a System Administrator
      2. Who Is the System Administrator?
    4. Booting and Halting the System
      1. Objectives
      2. Switching On
      3. The Boot Process
      4. Solaris Processes
      5. Switching Off
      6. The OpenBoot PROM
    5. User Administration
      1. Objectives
      2. What Are Users?
      3. What Are Groups?
      4. UIDs and GIDs
      5. Password File
      6. Shadow File
      7. Group File
      8. Primary and Secondary Groups
      9. The Implementation
      10. Using RBAC
      11. Creating a Custom Script
      12. Checking the Files
      13. Conclusion
    6. Permissions and All That
      1. Objectives
      2. Why Do We Need Permissions?
      3. How Permissions Are Represented
      4. Setting Permissions
      5. Access Control Lists
      6. The Implementation
      7. Octal Permissions Lookup Table
    7. Shells
      1. Objectives
      2. What Is a Shell?
      3. What Shells? C Shells?
      4. Shell Variables
      5. Assigning Shells to Users
      6. Running Commands
      7. Wildcards
      8. Hiding Things from the Shell
      9. Command Substitution
      10. Shortcuts
      11. What Else Does the Shell Do?
      12. Shell Start-Up Files
      13. The Implementation
      14. Example Shell Scripts
    8. The Filesystem and Its Contents
      1. Objectives
      2. What Is a Filesystem?
      3. Why Do We Use Filesystems?
      4. Preparing the Disk to Receive Filesystems
      5. What Type of Filesystem Should We Use?
      6. Creating and Removing Filesystems
      7. Files and Directories
      8. Log Files
      9. The Implementation
    9. Swap Space
      1. Objectives
      2. Swapping and Paging
      3. The Scheduler
      4. How Big Should It Be?
      5. Swap Locations
      6. Monitoring Swap Space
    10. Administering Packages
      1. Objectives
      2. What Is a Package?
      3. Using Packages
      4. What Packages Have I Got Loaded?
      5. Adding, Removing, and Checking Packages
      6. Dissecting a Package
      7. Advanced Concepts
      8. Creating Your Own Packages
    11. Patching the System
      1. Objectives
      2. What Are Patches?
      3. Files and Their Locations
      4. Determining What's Installed
      5. Adding Patches
      6. Obsolete Patches
      7. Removing Patches
      8. Checking the System
    12. Administering Quotas
      1. Objectives
      2. What Are Quotas?
      3. Enabling Quotas
      4. Configuring the User's Quotas
      5. Checking the Limits
      6. Setting Default User Quotas
      7. Disabling User Quotas
      8. Automatically Checking the Limits
      9. Should We Use Them?
    13. Connecting to the Local Area Network
      1. Objectives
      2. Description
      3. IP Addressing Schemes
      4. Choosing an IP Address
      5. Our Values
      6. Naming Systems
      7. Host Names
      8. Loopback Interface
      9. Initial Network Testing
      10. Configuring the Interface
      11. Routing
      12. Connecting the Second Subnet
      13. Adding the Gateway
      14. Routing—A Second Look
      15. Address Resolution
      16. IPV6—The Next Generation
      17. Traceroute
      18. Conclusion
    14. Naming Services and NIS
      1. Objectives
      2. Naming Services
      3. Name Service Switch File
      4. How NIS Works
      5. NIS Domain Names
      6. NIS Maps
      7. Machine Types and Daemons
      8. Our Machines
      9. Build the Master Server
      10. Build the Clients
      11. Build the Slave Servers
      12. The Server Map
      13. Map Propagation
      14. Customizing NIS
      15. NIS Passwords
      16. Disabling NIS
    15. Connecting to the Internet
      1. Objectives
      2. The Design
      3. Allocating an IP Address
      4. Configuring the Interface
      5. Adding a Default Route
      6. Enabling Host Name Resolving
      7. Checking the Connection
      8. Configuring the Remaining Systems
      9. Multiple Default Routes
    16. Connecting Serial Devices
      1. Objectives
      2. Serial Communication
      3. Synchronous versus Asynchronous
      4. Speed
      5. Serial Devices
      6. Serial Ports
      7. Service Access Facility
      8. Remove Existing Port Monitors
      9. Adding a Terminal
      10. Ttyadm
      11. Line Settings
      12. Consoles and Serial Ports
      13. Adding a Modem
      14. Conclusion
    17. Dialing in with PPP
      1. Objectives
      2. Point-to-Point Protocol
      3. Why Use PPP?
      4. The Components
      5. The System
      6. Building the Connection
      7. The Serial Port
      8. UUCP
      9. PPP
      10. Host Name Resolving
      11. Name Service Caching
      12. Routing
      13. The Completed Network
      14. Custom Scripts
      15. Conclusion
    18. Configuring DNS
      1. Objectives
      2. What Is the Domain Name System?
      3. Why Do We Need It?
      4. DNS Hierarchy
      5. Servers and Resolving
      6. Zones
      7. Is It DNS, BIND, or Named?
      8. Our Configuration
      9. Zone Files
      10. Master Server
      11. resolv.conf File
      12. Starting Named
      13. Slave Server
      14. Testing the Servers
      15. Enabling Resolving
      16. Configuring the Clients
      17. Conclusion
    19. Adding SCSI Devices
      1. Objectives
      2. Introduction
      3. What Is SCSI?
      4. Solaris Devices
      5. Adding the Disk
      6. Configuring LUNs
      7. Adding the Tape Drive
      8. SCSI Options
    20. NFS, DFS, and Autofs
      1. Objectives
      2. Network Filesystem
      3. Distributed Filesystem
      4. Autofs
      5. The Build Order
      6. Remote Procedure Call
      7. Configuring the Server
      8. Setting Up the Clients
      9. Server Share Options
      10. Access Lists
      11. Client Mount Options
      12. Authentication
      13. The Autofs
      14. Our Configuration
      15. Metacharacters
      16. Client Failover
      17. Testing
      18. Naming Services and Autofs
      19. Conclusion
    21. Time, Date, and NTP
      1. Objectives
      2. Introduction
      3. System Time
      4. Host Names
      5. Rdate
      6. Network Time Protocol
      7. How NTP Works
      8. Our Configuration
      9. Which Is Best?
    22. Setting Up The Mail System
      1. Objectives
      2. What Is Mail?
      3. Mail Protocols
      4. DNS and Mail
      5. Sendmail
      6. M4
      7. Sendmail and M4
      8. Our Configuration
      9. Aliases
      10. Conclusion
    23. Kernels and All About Them
      1. Objectives
      2. What Is the Kernel?
      3. How Does It All Fit Together?
      4. Troubleshooting
      5. Kernel Modules
      6. The /Etc/system File
      7. Kernel Messages
    24. Backing Up and Restoring the System
      1. Objectives
      2. Why Do We Need a Backup Strategy?
      3. What Is a Backup Strategy?
      4. How Do We Back Up the System?
      5. Remote Backups
      6. Backup Consistency
      7. The Implementation
    25. Settings Used Throughout the Book
      1. Overview
    26. Security Checklist
      1. Objectives
      2. Description
      3. User Security
      4. File Security
      5. Network Security
      6. General Security