summaryrefslogtreecommitdiff
path: root/docs/htmldocs/Samba3-ByExample/RefSection.html
blob: 4dafa82cbebde5ef7c4c4214490e97175bcf72a1 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
<html><head><meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>Part III. Reference Section</title><link rel="stylesheet" href="../samba.css" type="text/css"><meta name="generator" content="DocBook XSL Stylesheets V1.73.2"><link rel="start" href="index.html" title="Samba-3 by Example"><link rel="up" href="index.html" title="Samba-3 by Example"><link rel="prev" href="nw4migration.html" title="Chapter 10. Migrating NetWare Server to Samba-3"><link rel="next" href="kerberos.html" title="Chapter 11. Active Directory, Kerberos, and Security"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">Part III. Reference Section</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="nw4migration.html">Prev</a> </td><th width="60%" align="center"> </th><td width="20%" align="right"> <a accesskey="n" href="kerberos.html">Next</a></td></tr></table><hr></div><div class="part" lang="en"><div class="titlepage"><div><div><h1 class="title"><a name="RefSection"></a>Part III. Reference Section</h1></div></div></div><div class="partintro" lang="en"><div><div><div><h1 class="title"><a name="id394649"></a>Reference Section</h1></div></div></div><p>
This section <span class="emphasis"><em>Samba-3 by Example</em></span> provides important reference material
that may help you to solve network performance issues, to answer some of the critiques
published regarding Samba, or just to gain a more broad understanding of how Samba can
play in a Windows networking world.
</p><div class="toc"><p><b>Table of Contents</b></p><dl><dt><span class="chapter"><a href="kerberos.html">11. Active Directory, Kerberos, and Security</a></span></dt><dd><dl><dt><span class="sect1"><a href="kerberos.html#id394729">Introduction</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id395316">Assignment Tasks</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#id395330">Dissection and Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id395699">Technical Issues</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#ch10expl">Implementation</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id397184">Share Access Controls</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id397519">Share Definition Controls</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id398076">Share Point Directory and File Permissions</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id398445">Managing Windows 200x ACLs</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id399129">Key Points Learned</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#id399251">Questions and Answers</a></span></dt></dl></dd><dt><span class="chapter"><a href="DomApps.html">12. Integrating Additional Services</a></span></dt><dd><dl><dt><span class="sect1"><a href="DomApps.html#id399839">Introduction</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#id399862">Assignment Tasks</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id399948">Dissection and Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#id399977">Technical Issues</a></span></dt><dt><span class="sect2"><a href="DomApps.html#id400123">Political Issues</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id400137">Implementation</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#ch10-one">Removal of Pre-Existing Conflicting RPMs</a></span></dt><dt><span class="sect2"><a href="DomApps.html#id401888">Key Points Learned</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id401943">Questions and Answers</a></span></dt></dl></dd><dt><span class="chapter"><a href="HA.html">13. Performance, Reliability, and Availability</a></span></dt><dd><dl><dt><span class="sect1"><a href="HA.html#id402421">Introduction</a></span></dt><dt><span class="sect1"><a href="HA.html#id402498">Dissection and Discussion</a></span></dt><dt><span class="sect1"><a href="HA.html#id402949">Guidelines for Reliable Samba Operation</a></span></dt><dd><dl><dt><span class="sect2"><a href="HA.html#id402973">Name Resolution</a></span></dt><dt><span class="sect2"><a href="HA.html#id403415">Samba Configuration</a></span></dt><dt><span class="sect2"><a href="HA.html#id403710">Use and Location of BDCs</a></span></dt><dt><span class="sect2"><a href="HA.html#id403778">Use One Consistent Version of MS Windows Client</a></span></dt><dt><span class="sect2"><a href="HA.html#id403795">For Scalability, Use SAN-Based Storage on Samba Servers</a></span></dt><dt><span class="sect2"><a href="HA.html#id403840">Distribute Network Load with MSDFS</a></span></dt><dt><span class="sect2"><a href="HA.html#id403891">Replicate Data to Conserve Peak-Demand Wide-Area Bandwidth</a></span></dt><dt><span class="sect2"><a href="HA.html#id403932">Hardware Problems</a></span></dt><dt><span class="sect2"><a href="HA.html#id404070">Large Directories</a></span></dt></dl></dd><dt><span class="sect1"><a href="HA.html#id404151">Key Points Learned</a></span></dt></dl></dd><dt><span class="chapter"><a href="ch14.html">14. Samba Support</a></span></dt><dd><dl><dt><span class="sect1"><a href="ch14.html#id404300">Free Support</a></span></dt><dt><span class="sect1"><a href="ch14.html#id404499">Commercial Support</a></span></dt></dl></dd><dt><span class="chapter"><a href="appendix.html">15. A Collection of Useful Tidbits</a></span></dt><dd><dl><dt><span class="sect1"><a href="appendix.html#domjoin">Joining a Domain: Windows 200x/XP Professional</a></span></dt><dt><span class="sect1"><a href="appendix.html#id405157">Samba System File Location</a></span></dt><dt><span class="sect1"><a href="appendix.html#id405549">Starting Samba</a></span></dt><dt><span class="sect1"><a href="appendix.html#id405844">DNS Configuration Files</a></span></dt><dd><dl><dt><span class="sect2"><a href="appendix.html#id405854">The Forward Zone File for the Loopback Adaptor</a></span></dt><dt><span class="sect2"><a href="appendix.html#id405898">The Reverse Zone File for the Loopback Adaptor</a></span></dt><dt><span class="sect2"><a href="appendix.html#id405998">DNS Root Server Hint File</a></span></dt></dl></dd><dt><span class="sect1"><a href="appendix.html#altldapcfg">Alternative LDAP Database Initialization</a></span></dt><dd><dl><dt><span class="sect2"><a href="appendix.html#id406053">Initialization of the LDAP Database</a></span></dt></dl></dd><dt><span class="sect1"><a href="appendix.html#id406519">The LDAP Account Manager</a></span></dt><dt><span class="sect1"><a href="appendix.html#id407438">IDEALX Management Console</a></span></dt><dt><span class="sect1"><a href="appendix.html#ch12-SUIDSGID">Effect of Setting File and Directory SUID/SGID Permissions Explained</a></span></dt><dt><span class="sect1"><a href="appendix.html#ch12dblck">Shared Data Integrity</a></span></dt><dd><dl><dt><span class="sect2"><a href="appendix.html#id407872">Microsoft Access</a></span></dt><dt><span class="sect2"><a href="appendix.html#id408011">Act! Database Sharing</a></span></dt><dt><span class="sect2"><a href="appendix.html#id408086">Opportunistic Locking Controls</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="primer.html">16. Networking Primer</a></span></dt><dd><dl><dt><span class="sect1"><a href="primer.html#id408228">Requirements and Notes</a></span></dt><dt><span class="sect1"><a href="primer.html#id408364">Introduction</a></span></dt><dd><dl><dt><span class="sect2"><a href="primer.html#id408414">Assignment Tasks</a></span></dt></dl></dd><dt><span class="sect1"><a href="primer.html#id408521">Exercises</a></span></dt><dd><dl><dt><span class="sect2"><a href="primer.html#id408634">Single-Machine Broadcast Activity</a></span></dt><dt><span class="sect2"><a href="primer.html#secondmachine">Second Machine Startup Broadcast Interaction</a></span></dt><dt><span class="sect2"><a href="primer.html#id409728">Simple Windows Client Connection Characteristics</a></span></dt><dt><span class="sect2"><a href="primer.html#id410194">Windows 200x/XP Client Interaction with Samba-3</a></span></dt><dt><span class="sect2"><a href="primer.html#id410719">Conclusions to Exercises</a></span></dt></dl></dd><dt><span class="sect1"><a href="primer.html#chap01conc">Dissection and Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="primer.html#id410820">Technical Issues</a></span></dt></dl></dd><dt><span class="sect1"><a href="primer.html#chap01qa">Questions and Answers</a></span></dt></dl></dd><dt><span class="appendix"><a href="apa.html">A. 
    <acronym class="acronym">GNU</acronym> General Public License version 3
  </a></span></dt><dd><dl><dt><span class="bridgehead"><a href="apa.html#id411425">A. 
    Preamble
  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id411534">A. 
    TERMS AND CONDITIONS
  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id411537">A. 
    0. Definitions.
  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id411601">A. 
    1. Source Code.
  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id411663">A. 
    2. Basic Permissions.
  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id411691">A. 
    3. Protecting Users&#8217; Legal Rights From Anti-Circumvention Law.
  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id411717">A. 
    4. Conveying Verbatim Copies.
  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id411737">A. 
    5. Conveying Modified Source Versions.
  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id411809">A. 
    6. Conveying Non-Source Forms.
  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id411941">A. 
     7. Additional Terms.
   </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id412046">A. 
     8. Termination.
   </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id412078">A. 
     9. Acceptance Not Required for Having Copies.
   </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id412092">A. 
     10. Automatic Licensing of Downstream Recipients.
   </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id412126">A. 
    11. Patents.
  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id412210">A. 
    12. No Surrender of Others&#8217; Freedom.
  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id412225">A. 
    13. Use with the ???TITLE??? Affero General Public License.
  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id412249">A. 
    14. Revised Versions of this License.
  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id412296">A. 
    15. Disclaimer of Warranty.
  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id412314">A. 
    16. Limitation of Liability.
  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id412328">A. 
    17. Interpretation of Sections 15 and 16.
  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id412341">A. 
    END OF TERMS AND CONDITIONS
  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id412344">A. 
    How to Apply These Terms to Your New Programs
  </a></span></dt></dl></dd></dl></div></div></div><div class="navfooter"><hr><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="nw4migration.html">Prev</a> </td><td width="20%" align="center"> </td><td width="40%" align="right"> <a accesskey="n" href="kerberos.html">Next</a></td></tr><tr><td width="40%" align="left" valign="top">Chapter 10. Migrating NetWare Server to Samba-3 </td><td width="20%" align="center"><a accesskey="h" href="index.html">Home</a></td><td width="40%" align="right" valign="top"> Chapter 11. Active Directory, Kerberos, and Security</td></tr></table></div></body></html>