02-Solaris 8 - Student Guide - SA288 (SCSA pt2).pdf

(5131 KB) Pobierz
76016900 UNPDF
Solaris™ 8 Operating Environment
System Administration II
SA-288
Student Guide
®
Sun Microsystems, Inc.
MS BRM01-209
500 Eldorado Boulevard
Broomfield, Colorado 80021
U.S.A.
Revision A.1, September 2000
76016900.002.png
Copyright 2000 Sun Microsystems, Inc., 901 San Antonio Road, Palo Alto, California 94303, U.S.A. All rights reserved.
This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompi-
lation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and
its licensors, if any.
Third-party software, including font technology, is copyrighted and licensed from Sun suppliers.
Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. UNIX is a registered trademark
in the U.S. and other countries, exclusively licensed through X/Open Company, Ltd.
Sun, Sun Microsystems, the Sun Logo, AnswerBook, Java, JavaStation, JDK, JumpStart, Solaris, Solaris Management Console, Solaris Web-
Start, Solstice AdminSuite, Solstice DiskSuite, StorEdge Volume Manager, Sun-4, SunInstall, and Sun Ray are trademarks or registered
trademarks of Sun Microsystems, Inc. in the U.S. and other countries.
All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and
other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc.
The OPEN LOOK and Sun Graphical User Interface was developed by Sun Microsystems, Inc. for its users and licensees. Sun acknowledges
the pioneering efforts of Xerox in researching and developing the concept of visual or graphical user interfaces for the computer industry.
Sun holds a non-exclusive license from Xerox to the Xerox Graphical User Interface, which license also covers Sun’s licensees who imple-
ment OPEN LOOK GUIs and otherwise comply with Sun’s written license agreements.
U.S. Government approval required when exporting the product.
RESTRICTED RIGHTS: Use, duplication, or disclosure by the U.S. Government is subject to restrictions of FAR 52.227-14(g) (2)(6/87) and
FAR 52.227-19(6/87), or DFAR 252.227-7015 (b)(6/95) and DFAR 227.7202-3(a).
DOCUMENTATION IS PROVIDED “AS IS” AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS, AND WARRAN-
TIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-IN-
FRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.
Please
Recycle
76016900.003.png
Contents
About This Course .................................................................................... xiii
Course Goal ...................................................................................... xiii
Course Overview .............................................................................. xiv
Course Map......................................................................................... xv
Module-by-Module Overview ........................................................ xvi
Course Objectives.............................................................................. xix
Skills Gained by Module................................................................... xx
Guidelines for Module Pacing ....................................................... xxii
Topics Not Covered ....................................................................... xxiii
How Prepared Are You?................................................................. xxv
Introductions .................................................................................. xxvi
How to Use the Course Materials............................................... xxvii
Course Icons and Typographical Conventions ....................... xxviii
Icons ....................................................................................... xxviii
Typographical Conventions ..................................................xxix
Introducing the Client-Server Relationship .........................................1-1
Objectives ...........................................................................................1-1
Additional Resources .......................................................................1-1
The Client-Server Model for Network Workstations .................. 1-3
Servers ........................................................................................1-3
Clients .........................................................................................1-4
Check Your Progress ........................................................................ 1-6
Introducing the Solaris Network Environment ...................................2-1
Objectives ...........................................................................................2-1
Additional Resources .......................................................................2-1
Overview ............................................................................................ 2-2
The Function of the Layers .............................................................. 2-3
Peer-to-Peer Communication .......................................................... 2-6
Encapsulation and De-encapsulation.....................................2-6
Common Protocols and Applications in the Solaris
Operating Environment ................................................................ 2-7
TCP/IP Protocol Descriptions......................................................... 2-8
iii
Copyright 2000 Sun Microsystems, Inc. All Rights Reserved. Enterprise Services September 2000, Revision A.1
76016900.004.png
Network Interface Layer Protocols ........................................2-8
Internet Layer Protocols...........................................................2-8
Transport Layer Protocols .......................................................2-9
Application Layer Protocols ....................................................2-9
Network Files and Commands ..................................................... 2-11
Displaying the MAC Address ....................................................... 2-12
The ifconfig -a Command .................................................2-12
The banner Command...........................................................2-12
Configuring Interfaces at Boot Time ............................................ 2-13
The /etc/rcS.d/S30network.sh File................................2-13
The /etc/hostname. xxn File ...............................................2-13
The /etc/hosts File ..............................................................2-14
Important Files and Utilities.......................................................... 2-15
The /etc/nodename File........................................................2-15
Determining the Current Network Configuration.............2-15
Network Troubleshooting Utilities ......................................2-16
Network Services ............................................................................ 2-18
The Internet Service Daemon ( inetd ) .................................2-18
Port Numbers ..........................................................................2-18
Remote Procedure Call (RPC) ....................................................... 2-19
Checking for Registered Services .........................................2-19
Stopping a Network Service..................................................2-20
Starting a Network Service ....................................................2-20
Check Your Progress ...................................................................... 2-21
Solaris Operating Environment s yslog ................................................3-1
Objectives ...........................................................................................3-1
Additional Resources .......................................................................3-1
The syslog Facility........................................................................... 3-2
Controlling the Behavior of syslogd .....................................3-4
Configuring the / etc/syslog.conf File...................................... 3-5
Selector Field..............................................................................3-5
Action Field................................................................................3-8
The /etc/syslog.conf File ........................................................... 3-9
Starting and Stopping s yslogd ............................................3-10
syslogd and the m4 Macro Processor .......................................... 3-11
Detailed Operation .................................................................3-12
Modifying i netd to Use syslog .................................................. 3-15
inetd Manual Page Excerpt..................................................3-15
The inetd Startup File ...........................................................3-16
Example of syslog Logged Entry ........................................3-17
The logger Utility .......................................................................... 3-18
Command Format...................................................................3-18
Command Options .................................................................3-18
Examples ..................................................................................3-19
Exercise: Using syslog and Auditing Utilities .......................... 3-20
iv
Solaris™ 8 Operating Environment System Administration II
Copyright 2000 Sun Microsystems, Inc. All Rights Reserved. Enterprise Services September 2000, Revision A.1
76016900.005.png
Preparation...............................................................................3-20
Task Summary.........................................................................3-20
Tasks .........................................................................................3-20
Exercise Summary...................................................................3-23
Check Your Progress ...................................................................... 3-24
Introducing Disk Management ...............................................................4-1
Objectives ...........................................................................................4-1
Additional Resources .......................................................................4-2
Physical Disks .................................................................................... 4-3
Typical Physical Disk Drivers .................................................4-3
Access Paths...............................................................................4-3
Virtual Disk Access Paths ................................................................ 4-5
Virtual Volume Management.......................................................... 4-6
Solstice DiskSuite ......................................................................4-6
Sun StorEdge Volume Manager..............................................4-7
Concatenated Volumes ............................................................4-8
Adding a Disk.................................................................................... 4-9
Reconfiguration Boot................................................................4-9
The devfsadmd Daemon ..........................................................4-9
Installing the Solstice DiskSuite Software ................................... 4-11
Solaris Product Registry................................................................. 4-18
Starting the DiskSuite Tool ............................................................ 4-20
Creating the State-Database Replicas........................................... 4-23
Concatenating File Systems ........................................................... 4-28
Exercise: Managing Disks .............................................................. 4-37
Preparation...............................................................................4-37
Task Summary.........................................................................4-37
Tasks .........................................................................................4-38
Exercise Summary...................................................................4-44
Check Your Progress ...................................................................... 4-45
Further Study...........................................................................4-45
Solaris Pseudo File Systems and Swap Space ......................................5-1
Objectives ...........................................................................................5-1
Additional Resources .......................................................................5-1
Solaris Pseudo File Systems............................................................. 5-2
The /proc File System...................................................................... 5-3
The tmpfs File System...................................................................... 5-4
The fdfs File System........................................................................ 5-5
The swapfs File System ................................................................... 5-6
Virtual and Physical Addresses ..............................................5-6
Anonymous Memory Pages ....................................................5-7
Reserving Swap Space..............................................................5-8
Criteria for Swap Space............................................................5-8
Swap Space ........................................................................................ 5-9
Using the swap Command.......................................................5-9
v
Copyright 2000 Sun Microsystems, Inc. All Rights Reserved. Enterprise Services September 2000, Revision A.1
76016900.001.png
Zgłoś jeśli naruszono regulamin