Solaris8_Certified_System_Administration_II.pdf

(262 KB) Pobierz
Sun Solaris 8 Certified Systems Administration II - Cramsession
Sun Solaris 8 Certified Systems Administration II - Cramsession
Page 1 of 22
Home | Cramsession | IT Resources | Discussions | SkillDrill | My Career | Employers
Hell
Site Search:
500,000 + IT Pros
Check It Out!
SEARCH Thousands of IT Jobs
You Are Here Home > Cramsession > Study Guides > Study Guide
Cramsession
Study Guides
Microsoft Core
Microsoft Electives
Microsoft MCSD
Microsoft MOUS
Microsoft Retired
Novell Core CNE
Novell Electives
Novell MCNE
Novell CDE
Novell CIP
CompTia
Linux/Unix
Cisco CCNA/CCDA
Cisco CCNP/CCDP
Cisco Security
Cisco CCIE
Cisco Specialist
Lotus
Oracle
Check Point
Compaq
Sun
Java 2
Solaris 2.6 1
Solaris 2.6 2
SCNA Solaris 7
SCNA Solaris 8
SCSA Solaris 7 1
SCSA Solaris 7 2
SCSA Solaris 8 I
Sun Solaris 8 Certified Systems Administration II -
C ramsession
Client-Server Relationship
List and define the types of servers used in the Solaris 8 Network E
z Application servers - Share software applications across the network with clie
z Boot servers - Provide startup configuration information to new clients booting
network. Used with Jumpstart.
z Installation servers - Provide client software images to new computers bootin
network. Also used with Jumpstart.
z Database servers - Provide a platform for running database applications and s
with clients.
z Mail servers - Store and forward servers that allow access to email to local clie
z License servers - Manage application and system licenses using a special lice
z Print servers - Share locally attached or network-attached printers with clients
z Name services server - Host one of the many naming services provided by So
NIS, NIS+).
z home Directory servers - Provide storage of 'exported' home directories in a c
List and define the types of clients used in the Solaris 8 network en
Clients use the services provided by servers. A single client can request multiple serv
servers, like shared files, printers and data from a database. A specialized example w
jumpstart client, which requests configuration and installation information from a jump
anticipation of a new operating system install.
Sun now has technology called SunRay™ that provides server based or thin-client co
that have only keyboards, mice, display and simple CPUs.
Solaris Network Environment
Define the function of each layer within the seven-layer OSI model
http://cramsession.brainbuzz.com/cramsession/sun/SCSAIISolaris8/guide.asp
9/25/2001
642619956.006.png 642619956.007.png 642619956.008.png 642619956.009.png 642619956.001.png 642619956.002.png 642619956.003.png 642619956.004.png
Sun Solaris 8 Certified Systems Administration II - Cramsession
Page 2 of 22
SCSA Solaris 8 II
Citrix
CIW
IBM
Chauncey
SCO
SANS
SAIR
CNX
Adobe
Nortel
Java
NAX
Discussion Boards
Certifications
Training Locators
Find a Tech Job
Study Tips
Bookstore
Links
Reviews
Study Break
y
y
z Application layer
Represents the user level. TELNET, FTP, SMTP, NFS.
z Presentation Layer
Different computers interpret information in different ways. The presentation lay
encoding and decoding required between platforms. Examples would include A
EBCDIC. XDR (external data representation) resides at this layer.
z Session layer
The session layer manages services like authentication, dialog management a
between connected clients. It also reestablishes interrupted connections.
z Transport Layer
Handles transport-specific functions like flow-control and quality between two c
stations.
z Network Layer
The network layer addresses, routes and delivers data traffic on a network. Ro
found at this layer.
z Data Link Layer
This layer addresses the physical medium directly. This is the first location whe
arranged into a recognizable format. Checksum error detection occurs here. M
used here.
z Physical Layer
Operating at the lowest level, this layer moves unstructured bit streams using e
Define the function of each layer in the five-layer TCP/IP model
Sun’s implementation of the TCP/IP protocol stack includes five layers:
Global Navigation
Post/Edit Resume
Skill Assessment
Top Tech Sites
Discounts/Freebies
Newsletters
Tell-A-Friend
Email This Page!
Newsletter Archive
Advertising
Site Map
Help/Info
1. Application Layer
User accessed application programs and network services.
2. Transport Layer
Connection-oriented TCP and connectionless UDP data transfer.
3. Internet Layer
Here data is fragmented, addressed and routed.
4. Network Interface Layer
Error detection and packet framing. 802.3, 802.4, 802.5.
5. Hardware Layer
Contains electrical signals that move raw bits through the ether.
List the features and functions of the Ethernet
Ethernet is an implementation of C arrier S ense M ultiple A ccess with C ollision D etectio
Hosts that share a subnet (usually a Bus) transmit data to other hosts at random inter
transmit at the same time, a collision occurs, and one host must rebroadcast after a ra
Ethernet is popular because it is easy to add hosts, and performs rather well on lightly
Performance does begin to degrade as more hosts are added.
Describe the characteristics of RARP and ARP
ARP and RARP (ReverseARP) are protocols to match a host's unique MAC address (
the network interface card) with an assigned ethernet address (IP). To obtain a destin
Ethernet address, a host must send a broadcast alerting other hosts on the network to
http://cramsession.brainbuzz.com/cramsession/sun/SCSAIISolaris8/guide.asp
9/25/2001
Sun Solaris 8 Certified Systems Administration II - Cramsession
Page 3 of 22
ARP maps a 32-bit IP to a 48-bit MAC (or Ethernet) address.
RARP maps a 48-bit MAC address to a 32-bit IP address.
Identify the commands which display information about the local n
interface
ifconfig – shows the status of configured interfaces. Includes information relating t
address, Netmask, Broadcast address, and MAC address.
#ifconfig -a
lo0: flags=849 mtu 8232
inet 127.0.0.1 netmask ff000000
le0: flags=863 mtu 1500
inet 10.1.15.10 netmask ffffff00 broadcast 10.1.15.255
banner - shows the MAC of a system from the OBP (Open Boot Prom).
Describe the relationship between the RPC service and the rpcbind
A network service must use an agreed-upon unique port number. To eliminate the pro
hosts and too many services to configure and maintain distinctive information for, Sun
service that does not require predefined port numbers to be established at boot time.
A process, rpcbind , interprets incoming requests and sends them to the appropriate
Using RPC, clients are given the actual port number at connection time by rpcbind (
known port 111). RPC services register themselves with rpcbind when they start, an
available port number at that time. RPC services are named rpc.<daemon> .
Recall how to list registered RPC services
The configured ports for RPC are listed in /etc/rpc .
To see which services are currently running, use the rpcinfo -p command.
Identify the steps necessary to start and stop network services via
line
rpcinfo can also start and stop network services. To reregister network services tha
stopped, send a hangup (HUP) signal to the inetd process.
# pkill -HUP inetd
and then verify the network service is available using rpcinfo -p
To stop a network service, use rpcinfo in the following manner:
# rpcinfo -d mountd 1
Solaris Syslog
Identify the functions of syslog
http://cramsession.brainbuzz.com/cramsession/sun/SCSAIISolaris8/guide.asp
9/25/2001
Sun Solaris 8 Certified Systems Administration II - Cramsession
Page 4 of 22
syslog is a system of routing messages generated by the system (kernel) or system
appropriate, manageable log files. Messages can be sent to the console or a system
list of users logged on, or forwarded to other hosts on a network.
Recall the syntax of the syslog configuration file
The syslog configuration file is located in /etc/syslog.conf . The syslogd daemo
each time it is started.
Two fields of the syslog are: selector and action. The selector field is divided into two
by a period: facility.level .
The following table contains the facility definitions:
user
kern
mail
daemon
auth
lpr
news
uucp
cron
local0 - 7
mark
*
The following table contains the severity levels (highest to lowest):
emerg
alert
crit
err
warning
notice
info
debug
none
Deduce syslogd behavior from its configuration file
The syslog configuration file appears like this:
The syslog configuration file appears like this:
#ident "@(#)syslog.conf 1.5 98/12/14 SMI" /* SunOS 5.0 */
#
# Copyright (c) 1991-1998 by Sun Microsystems, Inc.
# All rights reserved.
#
# syslog configuration file.
#
# This file is processed by m4 so be careful to quote (`') names
# that match m4 reserved words. Also, within ifdef's, arguments
# containing commas must be quoted.
#
*.err;kern.notice;auth.notice /dev/sysmsg
*.info;mail.none;*.err;kern.debug;daemon.notice /var/adm/messages
mail.err;mail.info;mail.alert;mail.emerg;mail.notice /var/log/maillog
*.alert;kern.err;daemon.err operator
*.alert root
*.emerg *
# if a non-loghost machine chooses to have authentication messages
# sent to the loghost machine, un-comment out the following line:
#auth.notice ifdef(`LOGHOST', /var/log/authlog, @loghost)
mail.debug ifdef(`LOGHOST', /var/log/maillog, @loghost)
local6.debug /var/log/tacacs.log
local7.emerg;local7.alert;local7.debug /var/log/local7.log
http://cramsession.brainbuzz.com/cramsession/sun/SCSAIISolaris8/guide.asp
9/25/2001
642619956.005.png
Sun Solaris 8 Certified Systems Administration II - Cramsession
Page 5 of 22
#
# non-loghost machines will use the following lines to cause "user"
# log messages to be logged locally.
#
ifdef(`LOGHOST', ,
user.err /dev/sysmsg
user.err /var/adm/messages
user.alert `root, operator'
user.emerg *
)
Note that the syslog conf file is processed via the M4 macro processor. The ifdef s
evaluated to determine where information is sent.
Configure syslog messages by increasing the logging severity lev
login and telnet daemons.
Changing the severity level of the login daemons requires changing the level associat
facility:
auth.info/var/adm/messages
to
auth.crit/var/adm/messages
Changing the severity level of the login daemons requires changing the level associat
daemon facility:
daemon.info/var/adm/messages
to
daemon.crit/var/adm/messages
Use the command line to update the system log
The logger command updates entries in the system log.
logger [ -I ] [ -f file ] [ -p priority ] [ -t tag ] [ message
# logger -p user.err "System Restart"
This is useful functionality when writing scripts.
Disk Management
List the utilities used to create, check, and mount file systems
newfs is a utility to create the ufs filesystem on a new partition (remember that it is a
to the more configurable makefs command).
fsck is the utility used to check a new file system. It detects and repairs inconsistenc
mount is the utility that is used to ‘attach’ a new file system to the existing hierarchy.
http://cramsession.brainbuzz.com/cramsession/sun/SCSAIISolaris8/guide.asp
9/25/2001
Zgłoś jeśli naruszono regulamin