NeXTstep 3.3 NextAdmin |
![]() |
Network and System Administration Manual Updated 2000.01.28.0251 |
![]() |
![]() |
|
Well here you go folks the NEXTSTEP 3.3 Network and System Administration Manual online. The bulk of the conversion was done using LatinByrd III by Stefan Schneider Software. I by hand made the index.html page your viewing now. And so far I know I've spent about 13 hours working on it. It still isn't finished. I have determined page numbers by previewing the printed output from the origional rtf's so the actual page numbers may be inaccurate. Also I still have not finished adding the direct links to the sections from chapter 6 through the end. Perhaps someone else will get the urge to finish this and e-mail me the changes before I get to it. Anywa enjoy - maybe someday in the future I'll use this manual as a template to add further articles and links. If anyone gets some interest in doing this please e-mail me. One thing to note is that the chapters are single html files with images. The sizes are no more than 500Kb. Of last note. If anyone from NeXT makes their way here and Apple/NeXT wishes these pages removed they only have to contact me directly to make the request I will comply albeit reluctantly since few would care about this material and it took my time to make the conversion. |
||
![]() Contents |
![]() |
|
1 |
Chapter 1: Using This Manual to Plan Your Network |
|
1 | How to Use This Manual | |
2 | Planning Your Network | |
3 | Determining Equipment Needs | |
4 | ![]() |
|
4 | ![]() |
|
4 | ![]() |
|
5 | ![]() |
|
5 | ![]() |
|
6 | ![]() |
|
6 | ![]() |
|
6 | ![]() |
|
6 | ![]() |
|
6 | Determining Which Servers are Needed | |
7 | ![]() |
|
7 | ![]() |
|
8 | ![]() |
|
8 | ![]() |
|
8 | ![]() |
|
8 | ![]() |
|
9 | Network Connectivity | |
10 | Considering Security | |
10 | For More Information | |
11 | ![]() |
|
12 | ![]() |
|
12 |
Chapter 2: Setting Up a NetInfo Network |
|
14 | Making a Plan | |
15 | Setting Up the Master NetInfo Server | |
17 | ![]() |
|
18 | ![]() |
|
19 | ![]() |
|
20 | Setting Up Other Servers | |
21 | Adding Other Hosts | |
21 | Testing the Network | |
22 | Adding Users | |
25 | Maintenance Planning | |
26 | Troubleshooting | |
26 | ![]() |
|
26 | ![]() |
|
26 | ![]() |
|
27 | ![]() |
|
27 | Recovering from Catastrophic Failure | |
28 |
Chapter 3: NetInfo Networking |
|
28 | Enabling Automatic Host Addition | |
30 | ![]() |
|
30 | Adding New Hosts to the Network | |
31 | ![]() |
|
31 | ![]() |
|
31 | ![]() |
|
32 | ![]() |
|
34 | Adding a Modified Host | |
35 | ![]() |
|
35 | ![]() |
|
37 | ![]() |
|
39 | ![]() |
|
41 | Configuring Network Time Service | |
41 | ![]() |
|
41 | ![]() |
|
42 | ![]() |
|
44 | ![]() |
|
44 | Using the Network | |
44 | ![]() |
|
44 | ![]() |
|
44 | ![]() |
|
45 | ![]() |
|
45 | Examining the NetInfo Database | |
45 | ![]() |
|
45 | ![]() |
|
46 | ![]() |
|
46 | ![]() |
|
46 | ![]() |
|
47 | ![]() |
|
48 | ![]() |
|
51 | ![]() |
|
52 | ![]() |
|
54 | ![]() |
|
54 | ![]() |
|
58 | ![]() |
|
58 | ![]() |
|
59 | ![]() |
|
60 | ![]() |
|
61 | Troubleshooting | |
61 | ![]() |
|
61 | ![]() |
|
62 | ![]() |
|
63 | ![]() |
|
64 |
Chapter 4: Setting Up the Network File System |
|
64 | Exporting File Systems to the Network | |
64 | ![]() |
|
64 | ![]() |
|
64 | ![]() |
|
65 | ![]() |
|
65 | ![]() |
|
65 | Setting Up an NFS Server | |
68 | Importing Network File Systems | |
68 | ![]() |
|
68 | ![]() |
|
69 | ![]() |
|
69 | ![]() |
|
69 | ![]() |
|
69 | ![]() |
|
69 | ![]() |
|
69 | ![]() |
|
73 | Examining the NetInfo Database | |
73 | ![]() |
|
75 | ![]() |
|
78 | ![]() |
|
80 | Troubleshooting | |
81 |
Chapter 5: Managing User Accounts and User Groups |
|
81 | Managing User Accounts | |
81 | ![]() |
|
81 | ![]() |
|
81 | ![]() |
|
82 | ![]() |
|
82 | ![]() |
|
82 | ![]() |
|
82 | ![]() |
|
82 | ![]() |
|
83 | ![]() |
|
83 | ![]() |
|
84 | ![]() |
|
90 | ![]() |
|
92 | ![]() |
|
93 | ![]() |
|
93 | ![]() |
|
94 | ![]() |
|
94 | Managing User Groups | |
94 | ![]() |
|
94 | ![]() |
|
94 | ![]() |
|
95 | ![]() |
|
95 | ![]() |
|
95 | ![]() |
|
97 | ![]() |
|
98 | ![]() |
|
100 | ![]() |
|
103 | ![]() |
|
103 | ![]() |
|
105 | ![]() |
|
105 | Examining the NetInfo Database | |
106 | ![]() |
|
107 | Advanced User Management | |
108 | ![]() |
|
108 | ![]() |
|
110 | ![]() |
|
110 | ![]() |
|
110 | ![]() |
|
110 | ![]() |
|
111 | ![]() |
|
111 | ![]() |
|
113 | ![]() |
|
113 | ![]() |
|
115 | ![]() |
|
116 | ![]() |
|
116 | ![]() |
|
117 | ![]() |
|
118 | ![]() |
|
119 | Troubleshooting | |
121 |
Chapter 6: Managing Electronic Mail |
|
121 | Setting Up the Mail Server | |
121 | ![]() |
|
123 | ![]() |
|
124 | ![]() |
|
127 | ![]() |
|
130 | ![]() |
|
132 | ![]() |
|
132 | Examining the NetInfo Database | |
136 | Creating Mail Aliases | |
140 | Adding Pictures for Users | |
140 | Troubleshooting | |
142 |
Chapter 7: Attaching Peripherals |
|
142 | Adding a SCSI Disk | |
142 | ![]() |
|
143 | ![]() |
|
144 | ![]() |
|
147 | ![]() |
|
147 | Attaching a Printer | |
147 | ![]() |
|
147 | ![]() |
|
147 | ![]() |
|
148 | ![]() |
|
148 | Attaching Modems | |
148 | ![]() |
|
149 | ![]() |
|
149 | ![]() |
|
149 | ![]() |
|
150 | Installing a Graphics Tablet | |
150 | ![]() |
|
150 | Troubleshooting | |
150 | ![]() |
|
151 | ![]() |
|
152 | ![]() |
|
152 | ![]() |
|
153 |
Chapter 8: Managing System Backups |
|
153 | Backup Strategies | |
154 | What to Back Up | |
154 | Ways to Back Up | |
155 | ![]() |
|
155 | ![]() |
|
156 | ![]() |
|
157 | ![]() |
|
157 | ![]() |
|
158 | ![]() |
|
158 | ![]() |
|
159 | ![]() |
|
160 | ![]() |
|
160 | ![]() |
|
160 | ![]() |
|
161 | General Tips | |
161 | Troubleshooting | |
162 | ![]() |
|
162 | ![]() |
|
162 | ![]() |
|
162 | ![]() |
|
163 |
Chapter 9: System Startup and Shutdown |
|
163 | Starting Up an Intel-based Computer | |
165 | Starting Up a NeXT Computer | |
165 | Using the ROM Monitor | |
166 | ![]() |
|
166 | ![]() |
|
166 | ![]() |
|
166 | ![]() |
|
167 | ![]() |
|
167 | ![]() |
|
167 | ![]() |
|
167 | ![]() |
|
168 | ![]() |
|
169 | ![]() |
|
169 | ![]() |
|
169 | ![]() |
|
169 | ![]() |
|
170 | ![]() |
|
170 | ![]() |
|
170 | Using the NMI Mini-Monitor | |
170 | ![]() |
|
171 | ![]() |
|
171 | ![]() |
|
171 | ![]() |
|
171 | ![]() |
|
171 | ![]() |
|
171 | ![]() |
|
172 | ![]() |
|
172 | Running init and the rc Scripts | |
173 | ![]() |
|
174 | ![]() |
|
174 | ![]() |
|
174 | ![]() |
|
174 | ![]() |
|
174 | ![]() |
|
174 | ![]() |
|
174 | ![]() |
|
174 | Customizing Login and Logout | |
176 | Shutting Down the System | |
177 | ![]() |
|
177 | ![]() |
|
178 | ![]() |
|
178 | ![]() |
|
178 | ![]() |
|
179 | Troubleshooting | |
179 | ![]() |
|
179 | ![]() |
|
180 | ![]() |
|
180 | ![]() |
|
181 | ![]() |
|
182 |
Chapter 10: Configuring a Large Network |
|
182 | Background | |
183 | ![]() |
|
183 | ![]() |
|
186 | ![]() |
|
187 | ![]() |
|
188 | Planning | |
188 | Consideration for Subnets | |
188 | Previewing the Result | |
189 | Information Access | |
189 | From Two to Three Domain Levels | |
189 | ![]() |
|
190 | ![]() |
|
191 | ![]() |
|
191 | ![]() |
|
192 | ![]() |
|
192 | ![]() |
|
192 | ![]() |
|
193 | ![]() |
|
193 | ![]() |
|
193 | ![]() |
|
194 | ![]() |
|
194 | ![]() |
|
195 | Overview of Procedures | |
195 | ![]() |
|
195 | ![]() |
|
196 | ![]() |
|
196 | Building the Hierarchy | |
196 | ![]() |
|
196 | ![]() |
|
198 | ![]() |
|
199 | ![]() |
|
199 | ![]() |
|
201 | ![]() |
|
201 | ![]() |
|
201 | ![]() |
|
203 | ![]() |
|
204 | ![]() |
|
205 | ![]() |
|
205 | ![]() |
|
206 | ![]() |
|
207 | ![]() |
|
208 | ![]() |
|
209 | ![]() |
|
209 | Troubleshooting | |
209 | ![]() |
|
210 | ![]() |
|
210 | ![]() |
|
211 | ![]() |
|
212 |
Chapter 11: NEXTSTEP Computers in a Mixed Network |
|
212 | UNIX Networks | |
212 | ![]() |
|
212 | ![]() |
|
213 | ![]() |
|
213 | ![]() |
|
213 | ![]() |
|
214 | ![]() |
|
217 | ![]() |
|
217 | ![]() |
|
218 | ![]() |
|
218 | ![]() |
|
220 | ![]() |
|
221 | ![]() |
|
222 | ![]() |
|
222 | ![]() |
|
222 | ![]() |
|
222 | ![]() |
|
222 | ![]() |
|
225 | ![]() |
|
225 | ![]() |
|
226 | ![]() |
|
226 | ![]() |
|
227 | ![]() |
|
227 | ![]() |
|
228 | ![]() |
|
228 | ![]() |
|
229 | ![]() |
|
229 | ![]() |
|
230 | ![]() |
|
230 | ![]() |
|
231 | ![]() |
|
231 | ![]() |
|
231 | ![]() |
|
231 | Using DNS | |
232 | ![]() |
|
232 | ![]() |
|
233 | Novell NetWare | |
233 | ![]() |
|
233 | ![]() |
|
234 | ![]() |
|
235 | ![]() |
|
238 | ![]() |
|
240 | ![]() |
|
240 | ![]() |
|
240 | ![]() |
|
241 | ![]() |
|
241 | ![]() |
|
241 | ![]() |
|
241 | ![]() |
|
242 | ![]() |
|
242 | ![]() |
|
243 | ![]() |
|
244 | AppleTalk | |
244 | ![]() |
|
245 | ![]() |
|
247 | ![]() |
|
247 | ![]() |
|
247 | ![]() |
|
247 | ![]() |
|
247 | ![]() |
|
247 | ![]() |
|
250 | SNMP | |
250 | ![]() |
|
251 | ![]() |
|
254 | ![]() |
|
254 | Troubleshooting | |
256 |
Chapter 12: Using UUCP |
|
256 | Planning Your UUCP Configuration | |
256 | ![]() |
|
256 | ![]() |
|
257 | ![]() |
|
257 | ![]() |
|
257 | ![]() |
|
257 | Setting Up UUCP | |
257 | ![]() |
|
258 | ![]() |
|
258 | ![]() |
|
259 | ![]() |
|
260 | ![]() |
|
260 | ![]() |
|
260 | ![]() |
|
261 | ![]() |
|
261 | ![]() |
|
261 | ![]() |
|
262 | ![]() |
|
262 | Ongoing UUCP Management | |
263 | ![]() |
|
263 | ![]() |
|
263 | Troubleshooting | |
264 | ![]() |
|
264 | ![]() |
|
264 | ![]() |
|
264 | ![]() |
|
264 | ![]() |
|
265 | ![]() |
|
265 | ![]() |
|
265 | ![]() |
|
266 |
Chapter 13: NetBooting |
|
266 | Configuring a NetBoot Client | |
266 | ![]() |
|
267 | ![]() |
|
267 | ![]() |
|
269 | ![]() |
|
270 | ![]() |
|
272 | Booting the Client | |
272 | Troubleshooting | |
272 | ![]() |
|
273 | ![]() |
|
274 |
Chapter 14: Security |
|
274 | Implementing Security | |
274 | ![]() |
|
274 | ![]() |
|
274 | ![]() |
|
275 | ![]() |
|
275 | ![]() |
|
275 | ![]() |
|
275 | ![]() |
|
275 | ![]() |
|
276 | ![]() |
|
276 | ![]() |
|
276 | ![]() |
|
276 | ![]() |
|
277 | ![]() |
|
277 | ![]() |
|
278 | ![]() |
|
279 | ![]() |
|
279 | ![]() |
|
279 | ![]() |
|
280 | ![]() |
|
282 | ![]() |
|
283 | ![]() |
|
283 | ![]() |
|
284 | ![]() |
|
286 | ![]() |
|
287 | ![]() |
|
287 | ![]() |
|
287 | ![]() |
|
290 | ![]() |
|
291 | ![]() |
|
292 | Maintainging Security | |
293 |
Chapter 15: General Troubleshooting |
|
293 | Process Monitoring and Control | |
293 | ![]() |
|
294 | ![]() |
|
294 | ![]() |
|
294 | ![]() |
|
295 | ![]() |
|
295 | Displaying Host and Network Statistics | |
295 | ![]() |
|
296 | ![]() |
|
296 | ![]() |
|
297 | ![]() |
|
297 | Checking for Available Disk Space | |
297 | Fixing NetInfo Problems | |
299 | Lost root Password | |
300 |
Appendix A: The Manager Applications |
|
302 | Appendix B: Cable and Modem Configuration | |
308 | Appendix C: Internet Addressing | |
312 | Appendix D: The sendmail Program | |
338 | Appendix E: System Test Error Codes | |
341 | Appendix F: UUCP Overview | |
342 | Appendix G: Annotated uucico Debug Output | |
344 | Appendix H: Annotated uucico Debug Output | |
347 | Glossary | |
354 | The Terminal Application |
Disclaimer: All statements may be proceeded with IMHO since they are all simply observations and are stated in that context only. As such fitness for any particular use or outcome are solely the responsibility of the client and as such all warranties, liabilities, possible damages resulting from the use of the information provided by ChannelU.com are to be born by the client and not the provider.. Your on your own kid. ChannelU is a trademark of Turbo Software and it's content is under copyright© protections and may be reproduced only with written consent from Turbo Software. The origional material contained in the manuals converted from rtf to html is copyright© 1994 NeXT Software Inc. |