| |
| |
Foreword | |
| |
| |
Foreword to the Second Edition | |
| |
| |
Foreword to the First Edition | |
| |
| |
Preface | |
| |
| |
Acknowledgments | |
| |
| |
Basic Administration | |
| |
| |
| |
Where to Start | |
| |
| |
Suggested background | |
| |
| |
The sordid history of UNIX | |
| |
| |
Example UNIX systems | |
| |
| |
Notation and typographical conventions | |
| |
| |
How to use your manuals | |
| |
| |
Essential tasks of the system administrator | |
| |
| |
How to find files on the Internet | |
| |
| |
System administration under duress | |
| |
| |
Recommended reading | |
| |
| |
| |
Booting and Shutting Down | |
| |
| |
Bootstrapping | |
| |
| |
Booting PCs | |
| |
| |
Booting in single-user mode | |
| |
| |
Startup scripts | |
| |
| |
Rebooting and shutting down | |
| |
| |
| |
Rootly Powers | |
| |
| |
Ownership of files and processes | |
| |
| |
The superuser | |
| |
| |
Choosing a root password | |
| |
| |
Becoming root | |
| |
| |
Other pseudo-users | |
| |
| |
| |
Controlling Processes | |
| |
| |
Components of a process | |
| |
| |
The life cycle of a process | |
| |
| |
Signals | |
| |
| |
kill: send signals | |
| |
| |
Process states | |
| |
| |
nice and renice: influence scheduling priority | |
| |
| |
ps: monitor processes | |
| |
| |
top: monitor processes even better | |
| |
| |
Runaway processes | |
| |
| |
| |
The Filesystem | |
| |
| |
Pathnames | |
| |
| |
Mounting and unmounting filesystems | |
| |
| |
The organization of the file tree | |
| |
| |
File types | |
| |
| |
File attributes | |
| |
| |
| |
Adding New Users | |
| |
| |
The /etc/passwd file | |
| |
| |
The FreeBSD /etc/master.passwd file | |
| |
| |
The FreeBSD /etc/login.conf file | |
| |
| |
The Solaris and Red Hat /etc/shadow file | |
| |
| |
The /etc/group file | |
| |
| |
Adding users | |
| |
| |
Removing users | |
| |
| |
Disabling logins | |
| |
| |
Vendor-supplied account management utilities | |
| |
| |
| |
Serial Devices | |
| |
| |
Serial standards | |
| |
| |
Alternative connectors | |
| |
| |
Hard and soft carrier | |
| |
| |
Hardware flow control | |
| |
| |
Cable length | |
| |
| |
Serial device files | |
| |
| |
Software configuration for serial devices | |
| |
| |
Configuration of hardwired terminals | |
| |
| |
Special characters and the terminal driver | |
| |
| |
stty: set terminal options | |
| |
| |
test: set options automatically | |
| |
| |
How to unwedge a terminal | |
| |
| |
Modems | |
| |
| |
Debugging a serial line | |
| |
| |
Other common I/O ports | |
| |
| |
| |
Adding a Disk | |
| |
| |
Disk interfaces | |
| |
| |
Disk geometry | |
| |
| |
An overview of the disk installation procedure | |
| |
| |
fsck: check and repair filesystems | |
| |
| |
Vendor specifics | |
| |
| |
| |
Periodic Processes | |
| |
| |
cron: schedule commands | |
| |
| |
The format of crontab files | |
| |
| |
Crontab management | |
| |
| |
Some common uses for cron | |
| |
| |
Vendor specifics | |
| |
| |
| |
Backups | |
| |
| |
Motherhood and apple pie | |
| |
| |
Backup devices and media | |
| |
| |
Setting up an incremental backup regime | |
| |
| |
Restoring from dumps | |
| |
| |
Dumping and restoring for upgrades | |
| |
| |
Using other archiving programs | |
| |
| |
Using multiple files on a single tape | |
| |
| |
Amanda | |
| |
| |
Commercial backup products | |
| |
| |
Recommended reading | |
| |
| |
| |
Syslog and Log Files | |
| |
| |
Logging policies | |
| |
| |
Finding log files | |
| |
| |
Files NOT to manage | |
| |
| |
Vendor specifics | |
| |
| |
Syslog: the system event logger | |
| |
| |
Condensing log files to useful information | |
| |
| |
| |
Drivers and the Kernel | |
| |
| |
Kernel types | |
| |
| |
Why configure the kernel? | |
| |
| |
Configuring a Solaris kernel | |
| |
| |
Building an HP-UX kernel | |
| |
| |
Configuring a Linux kernel | |
| |
| |
Building a FreeBSD kernel | |
| |
| |
Creating a BSD configuration file | |
| |
| |
Adding device drivers | |
| |
| |
Device files | |
| |
| |
Naming conventions for devices | |
| |
| |
Loadable kernel modules | |
| |
| |
Recommended reading | |
| |
| |
Networking | |
| |
| |
| |
TCP/IP Networking | |
| |
| |
TCP/IP and the Internet | |
| |
| |
Networking road map | |
| |
| |
Packets and encapsulation | |
| |
| |
IP addresses: the gory details | |
| |
| |
Routing | |
| |
| |
ARP: The address resolution protocol | |
| |
| |
DHCP: the Dynamic Host Configuration Protocol | |
| |
| |
PPP: the Point-to-Point Protocol | |
| |
| |
Security issues | |
| |
| |
Addition of machines to a network | |
| |
| |
Vendor-specific network configuration | |
| |
| |
Solaris network configuration | |
| |
| |
HP-UX network configuration | |
| |
| |
Network configuration for Red Hat | |
| |
| |
Network configuration for FreeBSD | |
| |
| |
Recommended reading | |
| |
| |
| |
Routing | |
| |
| |
Packet forwarding: a closer look | |
| |
| |
Routing daemons and routing protocols | |
| |
| |
Protocols on parade | |
| |
| |
routed: RIP yourself a new hole | |
| |
| |
gated: a better routing daemon | |
| |
| |
Vendor specifics | |
| |
| |
Routing strategy selection criteria | |
| |
| |
Cisco routers | |
| |
| |
Recommended reading | |
| |
| |
| |
Network Hardware | |
| |
| |
LAN, WAN, or MAN? | |
| |
| |
Ethernet: the common LAN | |
| |
| |
FDDI: the disappointing and expensive LAN | |
| |
| |
ATM: the promised (but sorely defeated) LAN | |
| |
| |
Frame relay: the sacrificial WAN | |
| |
| |
ISDN: the indigenous WAN | |
| |
| |
DSL: the people's WAN | |
| |
| |
Where is the network going? | |
| |
| |
Network testing and debugging | |
| |
| |
Building wiring | |
| |
| |
Network design issues | |
| |
| |
Management issues | |
| |
| |
Recommended vendors | |
| |
| |
Recommended reading | |
| |
| |
| |
The Domain Name System | |
| |
| |
DNS for the impatient: adding a new machine | |
| |
| |
The history of DNS | |
| |
| |
Who needs DNS? | |
| |
| |
What's new in DNS | |
| |
| |
The DNS namespace | |
| |
| |
The BIND software | |
| |
| |
How DNS works | |
| |
| |
BIND client issues | |
| |
| |
BIND server configuration | |
| |
| |
BIND configuration examples | |
| |
| |
The DNS database | |
| |
| |
Updating zone files | |
| |
| |
Security issues | |
| |
| |
Testing and debugging | |
| |
| |
Loose ends | |
| |
| |
Vendor specifics | |
| |
| |
Recommended reading | |
| |
| |
| |
The Network File System | |
| |
| |
General information about NFS | |
| |
| |
Server-side NFS | |
| |
| |
Client-side NFS | |
| |
| |
nfsstat: dump NFS statistics | |
| |
| |
Dedicated NFS file servers | |
| |
| |
Automatic mounting | |
| |
| |
automount: the original automounter | |
| |
| |
amd: a more sophisticated automounter | |
| |
| |
Recommended reading | |
| |
| |
| |
Sharing System Files | |
| |
| |
What to share | |
| |
| |
Copying files around | |
| |
| |
NIS: the Network Information Service | |
| |
| |
NIS+: son of NIS | |
| |
| |
LDAP: the Lightweight Directory Access Protocol | |
| |
| |
| |
Electronic Mail | |
| |
| |
Mail systems | |
| |
| |
The anatomy of a mail message | |
| |
| |
Mail philosophy | |
| |
| |
Mail aliases | |
| |
| |
sendmail: ringmaster of the electronic mail circus | |
| |
| |
sendmail configuration | |
| |
| |
Basic sendmail configuration primitives | |
| |
| |
Fancier sendmail configuration primitives | |
| |
| |
Configuration file examples | |
| |
| |
Spam-related features in sendmail | |
| |
| |
Security and sendmail | |
| |
| |
sendmail statistics, testing, and debugging | |
| |
| |
The Postfix mail system | |
| |
| |
Recommended reading | |
| |
| |
| |
Network Management and Debugging | |
| |
| |
Troubleshooting a network | |
| |
| |
ping: check to see if a host is alive | |
| |
| |
traceroute: trace IP packets | |
| |
| |
netstat: get tons o' network statistics | |
| |
| |
Packet sniffers | |
| |
| |
Network management protocols | |
| |
| |
SNMP: the Simple Network Management Protocol | |
| |
| |
SNMP agents | |
| |
| |
Network management applications | |
| |
| |
Recommended reading | |
| |
| |
| |
Security | |
| |
| |
Seven common-sense rules of security | |
| |
| |
How security is compromised | |
| |
| |
Security problems in the /etc/passwd file | |
| |
| |
Setuid programs | |
| |
| |
Important file permissions | |
| |
| |
Miscellaneous security issues | |
| |
| |
Security power tools | |
| |
| |
Cryptographic security tools | |
| |
| |
Firewalls | |
| |
| |
Sources of security information | |
| |
| |
What to do when your site has been attacked | |
| |
| |
Recommended reading | |
| |
| |
| |
Web Hosting and Internet Servers | |
| |
| |
Web hosting | |
| |
| |
Web hosting basics | |
| |
| |
HTTP server installation | |
| |
| |
Virtual interfaces | |
| |
| |
Caching and proxy servers | |
| |
| |
Anonymous FTP server setup | |
| |
| |
Usenet news | |
| |
| |
Bunch O'Stuff | |
| |
| |
| |
Printing | |
| |
| |
Mini-glossary of printing terms | |
| |
| |
Types of printers | |
| |
| |
BSD printing | |
| |
| |
System V printing | |
| |
| |
Adding a printer | |
| |
| |
LPRng | |
| |
| |
Debugging printing problems | |
| |
| |
Common printing software | |
| |
| |
Printer philosophy | |
| |
| |
| |
Maintenance and Environment | |
| |
| |
Maintenance basics | |
| |
| |
Maintenance contracts | |
| |
| |
Board-handling lore | |
| |
| |
Monitors | |
| |
| |
Memory modules | |
| |
| |
Preventive maintenance | |
| |
| |
Environment | |
| |
| |
Power | |
| |
| |
Racks | |
| |
| |
Tools | |
| |
| |
| |
Performance Analysis | |
| |
| |
What you can do to improve performance | |
| |
| |
Factors that affect performance | |
| |
| |
System performance checkup | |
| |
| |
Help! My system just got really slow! | |
| |
| |
Recommended reading | |
| |
| |
| |
Cooperating with Windows | |
| |
| |
File and print sharing | |
| |
| |
Secure terminal emulation with SSH | |
| |
| |
X Windows emulators | |
| |
| |
PC mail clients | |
| |
| |
PC backups | |
| |
| |
Dual booting | |
| |
| |
Running Windows applications under UNIX | |
| |
| |
PC hardware tips | |
| |
| |
| |
Policy and Politics | |
| |
| |
Policy and procedure | |
| |
| |
Legal issues | |
| |
| |
Sysadmin surveys | |
| |
| |
Scope of service | |
| |
| |
Trouble-reporting systems | |
| |
| |
Managing management | |
| |
| |
Hiring, firing, and training | |
| |
| |
War stories and ethics | |
| |
| |
Localization and upgrades | |
| |
| |
Local documentation | |
| |
| |
Procurement | |
| |
| |
Decommissioning hardware | |
| |
| |
Software patents | |
| |
| |
Organizations, conferences, and other resources | |
| |
| |
Standards | |
| |
| |
Sample documents | |
| |
| |
Recommended reading | |
| |
| |
| |
Daemons | |
| |
| |
init: the primordial process | |
| |
| |
cron: schedule commands | |
| |
| |
inetd: manage daemons | |
| |
| |
System daemons | |
| |
| |
Printing daemons | |
| |
| |
NFS daemons | |
| |
| |
NIS daemons | |
| |
| |
Internet daemons | |
| |
| |
Time synchronization daemons | |
| |
| |
Booting and configuration daemons | |
| |
| |
Colophon | |
| |
| |
Index | |