summaryrefslogtreecommitdiff
path: root/docs/htmldocs/Samba3-ByExample/RefSection.html
diff options
context:
space:
mode:
Diffstat (limited to 'docs/htmldocs/Samba3-ByExample/RefSection.html')
-rw-r--r--docs/htmldocs/Samba3-ByExample/RefSection.html46
1 files changed, 23 insertions, 23 deletions
diff --git a/docs/htmldocs/Samba3-ByExample/RefSection.html b/docs/htmldocs/Samba3-ByExample/RefSection.html
index b4ac64f50c..03f4b0bfa2 100644
--- a/docs/htmldocs/Samba3-ByExample/RefSection.html
+++ b/docs/htmldocs/Samba3-ByExample/RefSection.html
@@ -3,50 +3,50 @@ This section <span class="emphasis"><em>Samba-3 by Example</em></span> provides
that may help you to solve network performance issues, to answer some of the critiques
published regarding Samba, or just to gain a more broad understanding of how Samba can
play in a Windows networking world.
-</p><div class="toc"><p><b>Table of Contents</b></p><dl><dt><span class="chapter"><a href="kerberos.html">11. Active Directory, Kerberos, and Security</a></span></dt><dd><dl><dt><span class="sect1"><a href="kerberos.html#id2610613">Introduction</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id2611264">Assignment Tasks</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#id2611280">Dissection and Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id2611677">Technical Issues</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#ch10expl">Implementation</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id2613307">Share Access Controls</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2613656">Share Definition Controls</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2614269">Share Point Directory and File Permissions</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2614682">Managing Windows 200x ACLs</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2615408">Key Points Learned</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#id2615543">Questions and Answers</a></span></dt></dl></dd><dt><span class="chapter"><a href="DomApps.html">12. Integrating Additional Services</a></span></dt><dd><dl><dt><span class="sect1"><a href="DomApps.html#id2616172">Introduction</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#id2616202">Assignment Tasks</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id2616313">Dissection and Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#id2616346">Technical Issues</a></span></dt><dt><span class="sect2"><a href="DomApps.html#id2616502">Political Issues</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id2616520">Implementation</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#ch10-one">Removal of Pre-Existing Conflicting RPMs</a></span></dt><dt><span class="sect2"><a href="DomApps.html#id2618372">Key Points Learned</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id2618432">Questions and Answers</a></span></dt></dl></dd><dt><span class="chapter"><a href="HA.html">13. Performance, Reliability, and Availability</a></span></dt><dd><dl><dt><span class="sect1"><a href="HA.html#id2618959">Introduction</a></span></dt><dt><span class="sect1"><a href="HA.html#id2619057">Dissection and Discussion</a></span></dt><dt><span class="sect1"><a href="HA.html#id2619530">Guidelines for Reliable Samba Operation</a></span></dt><dd><dl><dt><span class="sect2"><a href="HA.html#id2619557">Name Resolution</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620033">Samba Configuration</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620360">Use and Location of BDCs</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620435">Use One Consistent Version of MS Windows Client</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620457">For Scalability, Use SAN-Based Storage on Samba Servers</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620507">Distribute Network Load with MSDFS</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620562">Replicate Data to Conserve Peak-Demand Wide-Area Bandwidth</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620607">Hardware Problems</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620755">Large Directories</a></span></dt></dl></dd><dt><span class="sect1"><a href="HA.html#id2620859">Key Points Learned</a></span></dt></dl></dd><dt><span class="chapter"><a href="ch14.html">14. Samba Support</a></span></dt><dd><dl><dt><span class="sect1"><a href="ch14.html#id2621028">Free Support</a></span></dt><dt><span class="sect1"><a href="ch14.html#id2621247">Commercial Support</a></span></dt></dl></dd><dt><span class="chapter"><a href="appendix.html">15. A Collection of Useful Tidbits</a></span></dt><dd><dl><dt><span class="sect1"><a href="appendix.html#domjoin">Joining a Domain: Windows 200x/XP Professional</a></span></dt><dt><span class="sect1"><a href="appendix.html#id2621955">Samba System File Location</a></span></dt><dt><span class="sect1"><a href="appendix.html#id2622376">Starting Samba</a></span></dt><dt><span class="sect1"><a href="appendix.html#id2622715">DNS Configuration Files</a></span></dt><dd><dl><dt><span class="sect2"><a href="appendix.html#id2622727">The Forward Zone File for the Loopback Adaptor</a></span></dt><dt><span class="sect2"><a href="appendix.html#id2622776">The Reverse Zone File for the Loopback Adaptor</a></span></dt><dt><span class="sect2"><a href="appendix.html#id2622916">DNS Root Server Hint File</a></span></dt></dl></dd><dt><span class="sect1"><a href="appendix.html#altldapcfg">Alternative LDAP Database Initialization</a></span></dt><dd><dl><dt><span class="sect2"><a href="appendix.html#id2622975">Initialization of the LDAP Database</a></span></dt></dl></dd><dt><span class="sect1"><a href="appendix.html#id2623561">The LDAP Account Manager</a></span></dt><dt><span class="sect1"><a href="appendix.html#id2624558">IDEALX Management Console</a></span></dt><dt><span class="sect1"><a href="appendix.html#ch12-SUIDSGID">Effect of Setting File and Directory SUID/SGID Permissions Explained</a></span></dt><dt><span class="sect1"><a href="appendix.html#ch12dblck">Shared Data Integrity</a></span></dt><dd><dl><dt><span class="sect2"><a href="appendix.html#id2625032">Microsoft Access</a></span></dt><dt><span class="sect2"><a href="appendix.html#id2625180">Act! Database Sharing</a></span></dt><dt><span class="sect2"><a href="appendix.html#id2625264">Opportunistic Locking Controls</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="primer.html">16. Networking Primer</a></span></dt><dd><dl><dt><span class="sect1"><a href="primer.html#id2625430">Requirements and Notes</a></span></dt><dt><span class="sect1"><a href="primer.html#id2625592">Introduction</a></span></dt><dd><dl><dt><span class="sect2"><a href="primer.html#id2625652">Assignment Tasks</a></span></dt></dl></dd><dt><span class="sect1"><a href="primer.html#id2625769">Exercises</a></span></dt><dd><dl><dt><span class="sect2"><a href="primer.html#id2625894">Single-Machine Broadcast Activity</a></span></dt><dt><span class="sect2"><a href="primer.html#secondmachine">Second Machine Startup Broadcast Interaction</a></span></dt><dt><span class="sect2"><a href="primer.html#id2627042">Simple Windows Client Connection Characteristics</a></span></dt><dt><span class="sect2"><a href="primer.html#id2627544">Windows 200x/XP Client Interaction with Samba-3</a></span></dt><dt><span class="sect2"><a href="primer.html#id2628113">Conclusions to Exercises</a></span></dt></dl></dd><dt><span class="sect1"><a href="primer.html#chap01conc">Dissection and Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="primer.html#id2628227">Technical Issues</a></span></dt></dl></dd><dt><span class="sect1"><a href="primer.html#chap01qa">Questions and Answers</a></span></dt></dl></dd><dt><span class="appendix"><a href="apa.html">A.
+</p><div class="toc"><p><b>Table of Contents</b></p><dl><dt><span class="chapter"><a href="kerberos.html">11. Active Directory, Kerberos, and Security</a></span></dt><dd><dl><dt><span class="sect1"><a href="kerberos.html#id2610613">Introduction</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id2611264">Assignment Tasks</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#id2611280">Dissection and Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id2611677">Technical Issues</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#ch10expl">Implementation</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id2613307">Share Access Controls</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2613656">Share Definition Controls</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2614269">Share Point Directory and File Permissions</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2614672">Managing Windows 200x ACLs</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2615399">Key Points Learned</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#id2615533">Questions and Answers</a></span></dt></dl></dd><dt><span class="chapter"><a href="DomApps.html">12. Integrating Additional Services</a></span></dt><dd><dl><dt><span class="sect1"><a href="DomApps.html#id2616162">Introduction</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#id2616193">Assignment Tasks</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id2616294">Dissection and Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#id2616327">Technical Issues</a></span></dt><dt><span class="sect2"><a href="DomApps.html#id2616483">Political Issues</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id2616500">Implementation</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#ch10-one">Removal of Pre-Existing Conflicting RPMs</a></span></dt><dt><span class="sect2"><a href="DomApps.html#id2618352">Key Points Learned</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id2618413">Questions and Answers</a></span></dt></dl></dd><dt><span class="chapter"><a href="HA.html">13. Performance, Reliability, and Availability</a></span></dt><dd><dl><dt><span class="sect1"><a href="HA.html#id2618932">Introduction</a></span></dt><dt><span class="sect1"><a href="HA.html#id2619019">Dissection and Discussion</a></span></dt><dt><span class="sect1"><a href="HA.html#id2619492">Guidelines for Reliable Samba Operation</a></span></dt><dd><dl><dt><span class="sect2"><a href="HA.html#id2619520">Name Resolution</a></span></dt><dt><span class="sect2"><a href="HA.html#id2619995">Samba Configuration</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620323">Use and Location of BDCs</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620398">Use One Consistent Version of MS Windows Client</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620420">For Scalability, Use SAN-Based Storage on Samba Servers</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620470">Distribute Network Load with MSDFS</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620524">Replicate Data to Conserve Peak-Demand Wide-Area Bandwidth</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620570">Hardware Problems</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620728">Large Directories</a></span></dt></dl></dd><dt><span class="sect1"><a href="HA.html#id2620832">Key Points Learned</a></span></dt></dl></dd><dt><span class="chapter"><a href="ch14.html">14. Samba Support</a></span></dt><dd><dl><dt><span class="sect1"><a href="ch14.html#id2621002">Free Support</a></span></dt><dt><span class="sect1"><a href="ch14.html#id2621220">Commercial Support</a></span></dt></dl></dd><dt><span class="chapter"><a href="appendix.html">15. A Collection of Useful Tidbits</a></span></dt><dd><dl><dt><span class="sect1"><a href="appendix.html#domjoin">Joining a Domain: Windows 200x/XP Professional</a></span></dt><dt><span class="sect1"><a href="appendix.html#id2621928">Samba System File Location</a></span></dt><dt><span class="sect1"><a href="appendix.html#id2622349">Starting Samba</a></span></dt><dt><span class="sect1"><a href="appendix.html#id2622695">DNS Configuration Files</a></span></dt><dd><dl><dt><span class="sect2"><a href="appendix.html#id2622707">The Forward Zone File for the Loopback Adaptor</a></span></dt><dt><span class="sect2"><a href="appendix.html#id2622755">The Reverse Zone File for the Loopback Adaptor</a></span></dt><dt><span class="sect2"><a href="appendix.html#id2622895">DNS Root Server Hint File</a></span></dt></dl></dd><dt><span class="sect1"><a href="appendix.html#altldapcfg">Alternative LDAP Database Initialization</a></span></dt><dd><dl><dt><span class="sect2"><a href="appendix.html#id2622954">Initialization of the LDAP Database</a></span></dt></dl></dd><dt><span class="sect1"><a href="appendix.html#id2623532">The LDAP Account Manager</a></span></dt><dt><span class="sect1"><a href="appendix.html#id2624529">IDEALX Management Console</a></span></dt><dt><span class="sect1"><a href="appendix.html#ch12-SUIDSGID">Effect of Setting File and Directory SUID/SGID Permissions Explained</a></span></dt><dt><span class="sect1"><a href="appendix.html#ch12dblck">Shared Data Integrity</a></span></dt><dd><dl><dt><span class="sect2"><a href="appendix.html#id2625009">Microsoft Access</a></span></dt><dt><span class="sect2"><a href="appendix.html#id2625156">Act! Database Sharing</a></span></dt><dt><span class="sect2"><a href="appendix.html#id2625241">Opportunistic Locking Controls</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="primer.html">16. Networking Primer</a></span></dt><dd><dl><dt><span class="sect1"><a href="primer.html#id2625407">Requirements and Notes</a></span></dt><dt><span class="sect1"><a href="primer.html#id2625568">Introduction</a></span></dt><dd><dl><dt><span class="sect2"><a href="primer.html#id2625629">Assignment Tasks</a></span></dt></dl></dd><dt><span class="sect1"><a href="primer.html#id2625745">Exercises</a></span></dt><dd><dl><dt><span class="sect2"><a href="primer.html#id2625871">Single-Machine Broadcast Activity</a></span></dt><dt><span class="sect2"><a href="primer.html#secondmachine">Second Machine Startup Broadcast Interaction</a></span></dt><dt><span class="sect2"><a href="primer.html#id2627019">Simple Windows Client Connection Characteristics</a></span></dt><dt><span class="sect2"><a href="primer.html#id2627521">Windows 200x/XP Client Interaction with Samba-3</a></span></dt><dt><span class="sect2"><a href="primer.html#id2628089">Conclusions to Exercises</a></span></dt></dl></dd><dt><span class="sect1"><a href="primer.html#chap01conc">Dissection and Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="primer.html#id2628204">Technical Issues</a></span></dt></dl></dd><dt><span class="sect1"><a href="primer.html#chap01qa">Questions and Answers</a></span></dt></dl></dd><dt><span class="appendix"><a href="apa.html">A.
GNU General Public License version 3
- </a></span></dt><dd><dl><dt><span class="bridgehead"><a href="apa.html#id2628893">A.
+ </a></span></dt><dd><dl><dt><span class="bridgehead"><a href="apa.html#id2628870">A.
Preamble
- </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629038">A.
+ </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629015">A.
TERMS AND CONDITIONS
- </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629042">A.
+ </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629019">A.
0. Definitions.
- </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629134">A.
+ </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629111">A.
1. Source Code.
- </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629233">A.
+ </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629210">A.
2. Basic Permissions.
- </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629272">A.
+ </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629249">A.
3. Protecting Users&#8217; Legal Rights From Anti-Circumvention Law.
- </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629308">A.
+ </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629290">A.
4. Conveying Verbatim Copies.
- </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629335">A.
+ </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629317">A.
5. Conveying Modified Source Versions.
- </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629431">A.
+ </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629412">A.
6. Conveying Non-Source Forms.
- </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629620">A.
+ </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629602">A.
7. Additional Terms.
- </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629756">A.
+ </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629738">A.
8. Termination.
- </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629800">A.
+ </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629781">A.
9. Acceptance Not Required for Having Copies.
- </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629819">A.
+ </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629801">A.
10. Automatic Licensing of Downstream Recipients.
- </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629871">A.
+ </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629853">A.
11. Patents.
- </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2630017">A.
+ </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629988">A.
12. No Surrender of Others&#8217; Freedom.
- </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2630039">A.
+ </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2630010">A.
13. Use with the ???TITLE??? Affero General Public License.
- </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2630067">A.
+ </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2630039">A.
14. Revised Versions of this License.
- </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2630130">A.
+ </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2630101">A.
15. Disclaimer of Warranty.
- </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2630156">A.
+ </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2630128">A.
16. Limitation of Liability.
- </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2630176">A.
+ </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2630148">A.
17. Interpretation of Sections 15 and 16.
- </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2630193">A.
+ </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2630164">A.
END OF TERMS AND CONDITIONS
- </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2630197">A.
+ </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2630168">A.
How to Apply These Terms to Your New Programs
</a></span></dt></dl></dd></dl></div></div></div><div class="navfooter"><hr><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="nw4migration.html">Prev</a> </td><td width="20%" align="center"> </td><td width="40%" align="right"> <a accesskey="n" href="kerberos.html">Next</a></td></tr><tr><td width="40%" align="left" valign="top">Chapter 10. Migrating NetWare Server to Samba-3 </td><td width="20%" align="center"><a accesskey="h" href="index.html">Home</a></td><td width="40%" align="right" valign="top"> Chapter 11. Active Directory, Kerberos, and Security</td></tr></table></div></body></html>