diff options
Diffstat (limited to 'docs/htmldocs/Samba3-ByExample/RefSection.html')
-rw-r--r-- | docs/htmldocs/Samba3-ByExample/RefSection.html | 48 |
1 files changed, 24 insertions, 24 deletions
diff --git a/docs/htmldocs/Samba3-ByExample/RefSection.html b/docs/htmldocs/Samba3-ByExample/RefSection.html index e4fc2136dc..2c5b9ece45 100644 --- a/docs/htmldocs/Samba3-ByExample/RefSection.html +++ b/docs/htmldocs/Samba3-ByExample/RefSection.html @@ -1,52 +1,52 @@ -<html><head><meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>Part III. Reference Section</title><link rel="stylesheet" href="../samba.css" type="text/css"><meta name="generator" content="DocBook XSL Stylesheets V1.74.0"><link rel="home" href="index.html" title="Samba-3 by Example"><link rel="up" href="index.html" title="Samba-3 by Example"><link rel="prev" href="nw4migration.html" title="Chapter 10. Migrating NetWare Server to Samba-3"><link rel="next" href="kerberos.html" title="Chapter 11. Active Directory, Kerberos, and Security"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">Part III. Reference Section</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="nw4migration.html">Prev</a> </td><th width="60%" align="center"> </th><td width="20%" align="right"> <a accesskey="n" href="kerberos.html">Next</a></td></tr></table><hr></div><div class="part" lang="en"><div class="titlepage"><div><div><h1 class="title"><a name="RefSection"></a>Part III. Reference Section</h1></div></div></div><div class="partintro" lang="en"><div><div><div><h1 class="title"><a name="id2610399"></a>Reference Section</h1></div></div></div><p> +<html><head><meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>Part III. Reference Section</title><link rel="stylesheet" href="../samba.css" type="text/css"><meta name="generator" content="DocBook XSL Stylesheets V1.74.0"><link rel="home" href="index.html" title="Samba-3 by Example"><link rel="up" href="index.html" title="Samba-3 by Example"><link rel="prev" href="nw4migration.html" title="Chapter 10. Migrating NetWare Server to Samba-3"><link rel="next" href="kerberos.html" title="Chapter 11. Active Directory, Kerberos, and Security"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">Part III. Reference Section</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="nw4migration.html">Prev</a> </td><th width="60%" align="center"> </th><td width="20%" align="right"> <a accesskey="n" href="kerberos.html">Next</a></td></tr></table><hr></div><div class="part" lang="en"><div class="titlepage"><div><div><h1 class="title"><a name="RefSection"></a>Part III. Reference Section</h1></div></div></div><div class="partintro" lang="en"><div><div><div><h1 class="title"><a name="id2610490"></a>Reference Section</h1></div></div></div><p> This section <span class="emphasis"><em>Samba-3 by Example</em></span> provides important reference material that may help you to solve network performance issues, to answer some of the critiques published regarding Samba, or just to gain a more broad understanding of how Samba can play in a Windows networking world. -</p><div class="toc"><p><b>Table of Contents</b></p><dl><dt><span class="chapter"><a href="kerberos.html">11. Active Directory, Kerberos, and Security</a></span></dt><dd><dl><dt><span class="sect1"><a href="kerberos.html#id2610496">Introduction</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id2611138">Assignment Tasks</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#id2611154">Dissection and Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id2611545">Technical Issues</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#ch10expl">Implementation</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id2613169">Share Access Controls</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2613518">Share Definition Controls</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2614131">Share Point Directory and File Permissions</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2614530">Managing Windows 200x ACLs</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2615257">Key Points Learned</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#id2615391">Questions and Answers</a></span></dt></dl></dd><dt><span class="chapter"><a href="DomApps.html">12. Integrating Additional Services</a></span></dt><dd><dl><dt><span class="sect1"><a href="DomApps.html#id2616020">Introduction</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#id2616051">Assignment Tasks</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id2616160">Dissection and Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#id2616193">Technical Issues</a></span></dt><dt><span class="sect2"><a href="DomApps.html#id2616349">Political Issues</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id2616373">Implementation</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#ch10-one">Removal of Pre-Existing Conflicting RPMs</a></span></dt><dt><span class="sect2"><a href="DomApps.html#id2618225">Key Points Learned</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id2618286">Questions and Answers</a></span></dt></dl></dd><dt><span class="chapter"><a href="HA.html">13. Performance, Reliability, and Availability</a></span></dt><dd><dl><dt><span class="sect1"><a href="HA.html#id2618805">Introduction</a></span></dt><dt><span class="sect1"><a href="HA.html#id2618892">Dissection and Discussion</a></span></dt><dt><span class="sect1"><a href="HA.html#id2619366">Guidelines for Reliable Samba Operation</a></span></dt><dd><dl><dt><span class="sect2"><a href="HA.html#id2619393">Name Resolution</a></span></dt><dt><span class="sect2"><a href="HA.html#id2619868">Samba Configuration</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620205">Use and Location of BDCs</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620281">Use One Consistent Version of MS Windows Client</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620303">For Scalability, Use SAN-Based Storage on Samba Servers</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620352">Distribute Network Load with MSDFS</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620407">Replicate Data to Conserve Peak-Demand Wide-Area Bandwidth</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620452">Hardware Problems</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620600">Large Directories</a></span></dt></dl></dd><dt><span class="sect1"><a href="HA.html#id2620704">Key Points Learned</a></span></dt></dl></dd><dt><span class="chapter"><a href="ch14.html">14. Samba Support</a></span></dt><dd><dl><dt><span class="sect1"><a href="ch14.html#id2620874">Free Support</a></span></dt><dt><span class="sect1"><a href="ch14.html#id2621092">Commercial Support</a></span></dt></dl></dd><dt><span class="chapter"><a href="appendix.html">15. A Collection of Useful Tidbits</a></span></dt><dd><dl><dt><span class="sect1"><a href="appendix.html#domjoin">Joining a Domain: Windows 200x/XP Professional</a></span></dt><dt><span class="sect1"><a href="appendix.html#id2621811">Samba System File Location</a></span></dt><dt><span class="sect1"><a href="appendix.html#id2622232">Starting Samba</a></span></dt><dt><span class="sect1"><a href="appendix.html#id2622592">DNS Configuration Files</a></span></dt><dd><dl><dt><span class="sect2"><a href="appendix.html#id2622604">The Forward Zone File for the Loopback Adaptor</a></span></dt><dt><span class="sect2"><a href="appendix.html#id2622652">The Reverse Zone File for the Loopback Adaptor</a></span></dt><dt><span class="sect2"><a href="appendix.html#id2622792">DNS Root Server Hint File</a></span></dt></dl></dd><dt><span class="sect1"><a href="appendix.html#altldapcfg">Alternative LDAP Database Initialization</a></span></dt><dd><dl><dt><span class="sect2"><a href="appendix.html#id2622851">Initialization of the LDAP Database</a></span></dt></dl></dd><dt><span class="sect1"><a href="appendix.html#id2623411">The LDAP Account Manager</a></span></dt><dt><span class="sect1"><a href="appendix.html#id2624406">IDEALX Management Console</a></span></dt><dt><span class="sect1"><a href="appendix.html#ch12-SUIDSGID">Effect of Setting File and Directory SUID/SGID Permissions Explained</a></span></dt><dt><span class="sect1"><a href="appendix.html#ch12dblck">Shared Data Integrity</a></span></dt><dd><dl><dt><span class="sect2"><a href="appendix.html#id2624881">Microsoft Access</a></span></dt><dt><span class="sect2"><a href="appendix.html#id2625028">Act! Database Sharing</a></span></dt><dt><span class="sect2"><a href="appendix.html#id2625113">Opportunistic Locking Controls</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="primer.html">16. Networking Primer</a></span></dt><dd><dl><dt><span class="sect1"><a href="primer.html#id2625280">Requirements and Notes</a></span></dt><dt><span class="sect1"><a href="primer.html#id2625441">Introduction</a></span></dt><dd><dl><dt><span class="sect2"><a href="primer.html#id2625502">Assignment Tasks</a></span></dt></dl></dd><dt><span class="sect1"><a href="primer.html#id2625618">Exercises</a></span></dt><dd><dl><dt><span class="sect2"><a href="primer.html#id2625744">Single-Machine Broadcast Activity</a></span></dt><dt><span class="sect2"><a href="primer.html#secondmachine">Second Machine Startup Broadcast Interaction</a></span></dt><dt><span class="sect2"><a href="primer.html#id2626892">Simple Windows Client Connection Characteristics</a></span></dt><dt><span class="sect2"><a href="primer.html#id2627394">Windows 200x/XP Client Interaction with Samba-3</a></span></dt><dt><span class="sect2"><a href="primer.html#id2627962">Conclusions to Exercises</a></span></dt></dl></dd><dt><span class="sect1"><a href="primer.html#chap01conc">Dissection and Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="primer.html#id2628077">Technical Issues</a></span></dt></dl></dd><dt><span class="sect1"><a href="primer.html#chap01qa">Questions and Answers</a></span></dt></dl></dd><dt><span class="appendix"><a href="apa.html">A. +</p><div class="toc"><p><b>Table of Contents</b></p><dl><dt><span class="chapter"><a href="kerberos.html">11. Active Directory, Kerberos, and Security</a></span></dt><dd><dl><dt><span class="sect1"><a href="kerberos.html#id2610586">Introduction</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id2611237">Assignment Tasks</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#id2611253">Dissection and Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id2611650">Technical Issues</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#ch10expl">Implementation</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id2613280">Share Access Controls</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2613629">Share Definition Controls</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2614242">Share Point Directory and File Permissions</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2614655">Managing Windows 200x ACLs</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2615382">Key Points Learned</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#id2615516">Questions and Answers</a></span></dt></dl></dd><dt><span class="chapter"><a href="DomApps.html">12. Integrating Additional Services</a></span></dt><dd><dl><dt><span class="sect1"><a href="DomApps.html#id2616145">Introduction</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#id2616176">Assignment Tasks</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id2616287">Dissection and Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#id2616320">Technical Issues</a></span></dt><dt><span class="sect2"><a href="DomApps.html#id2616476">Political Issues</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id2616493">Implementation</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#ch10-one">Removal of Pre-Existing Conflicting RPMs</a></span></dt><dt><span class="sect2"><a href="DomApps.html#id2618345">Key Points Learned</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id2618406">Questions and Answers</a></span></dt></dl></dd><dt><span class="chapter"><a href="HA.html">13. Performance, Reliability, and Availability</a></span></dt><dd><dl><dt><span class="sect1"><a href="HA.html#id2618932">Introduction</a></span></dt><dt><span class="sect1"><a href="HA.html#id2619030">Dissection and Discussion</a></span></dt><dt><span class="sect1"><a href="HA.html#id2619503">Guidelines for Reliable Samba Operation</a></span></dt><dd><dl><dt><span class="sect2"><a href="HA.html#id2619530">Name Resolution</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620006">Samba Configuration</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620334">Use and Location of BDCs</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620409">Use One Consistent Version of MS Windows Client</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620431">For Scalability, Use SAN-Based Storage on Samba Servers</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620480">Distribute Network Load with MSDFS</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620535">Replicate Data to Conserve Peak-Demand Wide-Area Bandwidth</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620581">Hardware Problems</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620728">Large Directories</a></span></dt></dl></dd><dt><span class="sect1"><a href="HA.html#id2620832">Key Points Learned</a></span></dt></dl></dd><dt><span class="chapter"><a href="ch14.html">14. Samba Support</a></span></dt><dd><dl><dt><span class="sect1"><a href="ch14.html#id2621002">Free Support</a></span></dt><dt><span class="sect1"><a href="ch14.html#id2621220">Commercial Support</a></span></dt></dl></dd><dt><span class="chapter"><a href="appendix.html">15. A Collection of Useful Tidbits</a></span></dt><dd><dl><dt><span class="sect1"><a href="appendix.html#domjoin">Joining a Domain: Windows 200x/XP Professional</a></span></dt><dt><span class="sect1"><a href="appendix.html#id2621928">Samba System File Location</a></span></dt><dt><span class="sect1"><a href="appendix.html#id2622349">Starting Samba</a></span></dt><dt><span class="sect1"><a href="appendix.html#id2622689">DNS Configuration Files</a></span></dt><dd><dl><dt><span class="sect2"><a href="appendix.html#id2622700">The Forward Zone File for the Loopback Adaptor</a></span></dt><dt><span class="sect2"><a href="appendix.html#id2622749">The Reverse Zone File for the Loopback Adaptor</a></span></dt><dt><span class="sect2"><a href="appendix.html#id2622889">DNS Root Server Hint File</a></span></dt></dl></dd><dt><span class="sect1"><a href="appendix.html#altldapcfg">Alternative LDAP Database Initialization</a></span></dt><dd><dl><dt><span class="sect2"><a href="appendix.html#id2622948">Initialization of the LDAP Database</a></span></dt></dl></dd><dt><span class="sect1"><a href="appendix.html#id2623534">The LDAP Account Manager</a></span></dt><dt><span class="sect1"><a href="appendix.html#id2624531">IDEALX Management Console</a></span></dt><dt><span class="sect1"><a href="appendix.html#ch12-SUIDSGID">Effect of Setting File and Directory SUID/SGID Permissions Explained</a></span></dt><dt><span class="sect1"><a href="appendix.html#ch12dblck">Shared Data Integrity</a></span></dt><dd><dl><dt><span class="sect2"><a href="appendix.html#id2625006">Microsoft Access</a></span></dt><dt><span class="sect2"><a href="appendix.html#id2625153">Act! Database Sharing</a></span></dt><dt><span class="sect2"><a href="appendix.html#id2625237">Opportunistic Locking Controls</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="primer.html">16. Networking Primer</a></span></dt><dd><dl><dt><span class="sect1"><a href="primer.html#id2625404">Requirements and Notes</a></span></dt><dt><span class="sect1"><a href="primer.html#id2625565">Introduction</a></span></dt><dd><dl><dt><span class="sect2"><a href="primer.html#id2625625">Assignment Tasks</a></span></dt></dl></dd><dt><span class="sect1"><a href="primer.html#id2625742">Exercises</a></span></dt><dd><dl><dt><span class="sect2"><a href="primer.html#id2625868">Single-Machine Broadcast Activity</a></span></dt><dt><span class="sect2"><a href="primer.html#secondmachine">Second Machine Startup Broadcast Interaction</a></span></dt><dt><span class="sect2"><a href="primer.html#id2627015">Simple Windows Client Connection Characteristics</a></span></dt><dt><span class="sect2"><a href="primer.html#id2627518">Windows 200x/XP Client Interaction with Samba-3</a></span></dt><dt><span class="sect2"><a href="primer.html#id2628086">Conclusions to Exercises</a></span></dt></dl></dd><dt><span class="sect1"><a href="primer.html#chap01conc">Dissection and Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="primer.html#id2628200">Technical Issues</a></span></dt></dl></dd><dt><span class="sect1"><a href="primer.html#chap01qa">Questions and Answers</a></span></dt></dl></dd><dt><span class="appendix"><a href="apa.html">A. GNU General Public License version 3 - </a></span></dt><dd><dl><dt><span class="bridgehead"><a href="apa.html#id2628743">A. + </a></span></dt><dd><dl><dt><span class="bridgehead"><a href="apa.html#id2628866">A. Preamble - </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2628888">A. + </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629012">A. TERMS AND CONDITIONS - </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2628892">A. + </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629015">A. 0. Definitions. - </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2628984">A. + </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629108">A. 1. Source Code. - </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629082">A. + </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629206">A. 2. Basic Permissions. - </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629122">A. + </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629246">A. 3. Protecting Users’ Legal Rights From Anti-Circumvention Law. - </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629154">A. + </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629281">A. 4. Conveying Verbatim Copies. - </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629181">A. + </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629308">A. 5. Conveying Modified Source Versions. - </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629277">A. + </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629404">A. 6. Conveying Non-Source Forms. - </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629466">A. + </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629594">A. 7. Additional Terms. - </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629602">A. + </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629729">A. 8. Termination. - </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629646">A. + </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629773">A. 9. Acceptance Not Required for Having Copies. - </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629675">A. + </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629792">A. 10. Automatic Licensing of Downstream Recipients. - </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629727">A. + </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629844">A. 11. Patents. - </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629872">A. + </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629990">A. 12. No Surrender of Others’ Freedom. - </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629894">A. + </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2630012">A. 13. Use with the ???TITLE??? Affero General Public License. - </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629923">A. + </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2630041">A. 14. Revised Versions of this License. - </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629986">A. + </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2630103">A. 15. Disclaimer of Warranty. - </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2630012">A. + </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2630129">A. 16. Limitation of Liability. - </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2630032">A. + </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2630150">A. 17. Interpretation of Sections 15 and 16. - </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2630049">A. + </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2630166">A. END OF TERMS AND CONDITIONS - </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2630052">A. + </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2630170">A. How to Apply These Terms to Your New Programs </a></span></dt></dl></dd></dl></div></div></div><div class="navfooter"><hr><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="nw4migration.html">Prev</a> </td><td width="20%" align="center"> </td><td width="40%" align="right"> <a accesskey="n" href="kerberos.html">Next</a></td></tr><tr><td width="40%" align="left" valign="top">Chapter 10. Migrating NetWare Server to Samba-3 </td><td width="20%" align="center"><a accesskey="h" href="index.html">Home</a></td><td width="40%" align="right" valign="top"> Chapter 11. Active Directory, Kerberos, and Security</td></tr></table></div></body></html> |