• Home
  • History
  • Annotate
  • Line#
  • Navigate
  • Raw
  • Download
  • only in /asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/docs/htmldocs/Samba3-ByExample/
1<html><head><meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>Part�III.�Reference Section</title><link rel="stylesheet" href="../samba.css" type="text/css"><meta name="generator" content="DocBook XSL Stylesheets V1.74.0"><link rel="home" href="index.html" title="Samba-3 by Example"><link rel="up" href="index.html" title="Samba-3 by Example"><link rel="prev" href="nw4migration.html" title="Chapter�10.�Migrating NetWare Server to Samba-3"><link rel="next" href="kerberos.html" title="Chapter�11.�Active Directory, Kerberos, and Security"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">Part�III.�Reference Section</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="nw4migration.html">Prev</a>�</td><th width="60%" align="center">�</th><td width="20%" align="right">�<a accesskey="n" href="kerberos.html">Next</a></td></tr></table><hr></div><div class="part" lang="en"><div class="titlepage"><div><div><h1 class="title"><a name="RefSection"></a>Part�III.�Reference Section</h1></div></div></div><div class="partintro" lang="en"><div><div><div><h1 class="title"><a name="id2610399"></a>Reference Section</h1></div></div></div><p>
2This section <span class="emphasis"><em>Samba-3 by Example</em></span> provides important reference material
3that may help you to solve network performance issues, to answer some of the critiques
4published regarding Samba, or just to gain a more broad understanding of how Samba can
5play in a Windows networking world.
6</p><div class="toc"><p><b>Table of Contents</b></p><dl><dt><span class="chapter"><a href="kerberos.html">11. Active Directory, Kerberos, and Security</a></span></dt><dd><dl><dt><span class="sect1"><a href="kerberos.html#id2610496">Introduction</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id2611138">Assignment Tasks</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#id2611154">Dissection and Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id2611545">Technical Issues</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#ch10expl">Implementation</a></span></dt><dd><dl><dt><span class="sect2"><a href="kerberos.html#id2613169">Share Access Controls</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2613518">Share Definition Controls</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2614131">Share Point Directory and File Permissions</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2614530">Managing Windows 200x ACLs</a></span></dt><dt><span class="sect2"><a href="kerberos.html#id2615257">Key Points Learned</a></span></dt></dl></dd><dt><span class="sect1"><a href="kerberos.html#id2615391">Questions and Answers</a></span></dt></dl></dd><dt><span class="chapter"><a href="DomApps.html">12. Integrating Additional Services</a></span></dt><dd><dl><dt><span class="sect1"><a href="DomApps.html#id2616020">Introduction</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#id2616051">Assignment Tasks</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id2616160">Dissection and Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#id2616193">Technical Issues</a></span></dt><dt><span class="sect2"><a href="DomApps.html#id2616349">Political Issues</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id2616373">Implementation</a></span></dt><dd><dl><dt><span class="sect2"><a href="DomApps.html#ch10-one">Removal of Pre-Existing Conflicting RPMs</a></span></dt><dt><span class="sect2"><a href="DomApps.html#id2618225">Key Points Learned</a></span></dt></dl></dd><dt><span class="sect1"><a href="DomApps.html#id2618286">Questions and Answers</a></span></dt></dl></dd><dt><span class="chapter"><a href="HA.html">13. Performance, Reliability, and Availability</a></span></dt><dd><dl><dt><span class="sect1"><a href="HA.html#id2618805">Introduction</a></span></dt><dt><span class="sect1"><a href="HA.html#id2618892">Dissection and Discussion</a></span></dt><dt><span class="sect1"><a href="HA.html#id2619366">Guidelines for Reliable Samba Operation</a></span></dt><dd><dl><dt><span class="sect2"><a href="HA.html#id2619393">Name Resolution</a></span></dt><dt><span class="sect2"><a href="HA.html#id2619868">Samba Configuration</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620205">Use and Location of BDCs</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620281">Use One Consistent Version of MS Windows Client</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620303">For Scalability, Use SAN-Based Storage on Samba Servers</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620352">Distribute Network Load with MSDFS</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620407">Replicate Data to Conserve Peak-Demand Wide-Area Bandwidth</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620452">Hardware Problems</a></span></dt><dt><span class="sect2"><a href="HA.html#id2620600">Large Directories</a></span></dt></dl></dd><dt><span class="sect1"><a href="HA.html#id2620704">Key Points Learned</a></span></dt></dl></dd><dt><span class="chapter"><a href="ch14.html">14. Samba Support</a></span></dt><dd><dl><dt><span class="sect1"><a href="ch14.html#id2620874">Free Support</a></span></dt><dt><span class="sect1"><a href="ch14.html#id2621092">Commercial Support</a></span></dt></dl></dd><dt><span class="chapter"><a href="appendix.html">15. A Collection of Useful Tidbits</a></span></dt><dd><dl><dt><span class="sect1"><a href="appendix.html#domjoin">Joining a Domain: Windows 200x/XP Professional</a></span></dt><dt><span class="sect1"><a href="appendix.html#id2621811">Samba System File Location</a></span></dt><dt><span class="sect1"><a href="appendix.html#id2622232">Starting Samba</a></span></dt><dt><span class="sect1"><a href="appendix.html#id2622592">DNS Configuration Files</a></span></dt><dd><dl><dt><span class="sect2"><a href="appendix.html#id2622604">The Forward Zone File for the Loopback Adaptor</a></span></dt><dt><span class="sect2"><a href="appendix.html#id2622652">The Reverse Zone File for the Loopback Adaptor</a></span></dt><dt><span class="sect2"><a href="appendix.html#id2622792">DNS Root Server Hint File</a></span></dt></dl></dd><dt><span class="sect1"><a href="appendix.html#altldapcfg">Alternative LDAP Database Initialization</a></span></dt><dd><dl><dt><span class="sect2"><a href="appendix.html#id2622851">Initialization of the LDAP Database</a></span></dt></dl></dd><dt><span class="sect1"><a href="appendix.html#id2623411">The LDAP Account Manager</a></span></dt><dt><span class="sect1"><a href="appendix.html#id2624406">IDEALX Management Console</a></span></dt><dt><span class="sect1"><a href="appendix.html#ch12-SUIDSGID">Effect of Setting File and Directory SUID/SGID Permissions Explained</a></span></dt><dt><span class="sect1"><a href="appendix.html#ch12dblck">Shared Data Integrity</a></span></dt><dd><dl><dt><span class="sect2"><a href="appendix.html#id2624881">Microsoft Access</a></span></dt><dt><span class="sect2"><a href="appendix.html#id2625028">Act! Database Sharing</a></span></dt><dt><span class="sect2"><a href="appendix.html#id2625113">Opportunistic Locking Controls</a></span></dt></dl></dd></dl></dd><dt><span class="chapter"><a href="primer.html">16. Networking Primer</a></span></dt><dd><dl><dt><span class="sect1"><a href="primer.html#id2625280">Requirements and Notes</a></span></dt><dt><span class="sect1"><a href="primer.html#id2625441">Introduction</a></span></dt><dd><dl><dt><span class="sect2"><a href="primer.html#id2625502">Assignment Tasks</a></span></dt></dl></dd><dt><span class="sect1"><a href="primer.html#id2625618">Exercises</a></span></dt><dd><dl><dt><span class="sect2"><a href="primer.html#id2625744">Single-Machine Broadcast Activity</a></span></dt><dt><span class="sect2"><a href="primer.html#secondmachine">Second Machine Startup Broadcast Interaction</a></span></dt><dt><span class="sect2"><a href="primer.html#id2626892">Simple Windows Client Connection Characteristics</a></span></dt><dt><span class="sect2"><a href="primer.html#id2627394">Windows 200x/XP Client Interaction with Samba-3</a></span></dt><dt><span class="sect2"><a href="primer.html#id2627962">Conclusions to Exercises</a></span></dt></dl></dd><dt><span class="sect1"><a href="primer.html#chap01conc">Dissection and Discussion</a></span></dt><dd><dl><dt><span class="sect2"><a href="primer.html#id2628077">Technical Issues</a></span></dt></dl></dd><dt><span class="sect1"><a href="primer.html#chap01qa">Questions and Answers</a></span></dt></dl></dd><dt><span class="appendix"><a href="apa.html">A. 
7    GNU General Public License version 3
8  </a></span></dt><dd><dl><dt><span class="bridgehead"><a href="apa.html#id2628743">A. 
9    Preamble
10  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2628888">A. 
11    TERMS AND CONDITIONS
12  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2628892">A. 
13    0. Definitions.
14  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2628984">A. 
15    1. Source Code.
16  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629082">A. 
17    2. Basic Permissions.
18  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629122">A. 
19    3. Protecting Users&#8217; Legal Rights From Anti-Circumvention Law.
20  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629154">A. 
21    4. Conveying Verbatim Copies.
22  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629181">A. 
23    5. Conveying Modified Source Versions.
24  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629277">A. 
25    6. Conveying Non-Source Forms.
26  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629466">A. 
27     7. Additional Terms.
28   </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629602">A. 
29     8. Termination.
30   </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629646">A. 
31     9. Acceptance Not Required for Having Copies.
32   </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629675">A. 
33     10. Automatic Licensing of Downstream Recipients.
34   </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629727">A. 
35    11. Patents.
36  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629872">A. 
37    12. No Surrender of Others&#8217; Freedom.
38  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629894">A. 
39    13. Use with the ???TITLE??? Affero General Public License.
40  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629923">A. 
41    14. Revised Versions of this License.
42  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2629986">A. 
43    15. Disclaimer of Warranty.
44  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2630012">A. 
45    16. Limitation of Liability.
46  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2630032">A. 
47    17. Interpretation of Sections 15 and 16.
48  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2630049">A. 
49    END OF TERMS AND CONDITIONS
50  </a></span></dt><dt><span class="bridgehead"><a href="apa.html#id2630052">A. 
51    How to Apply These Terms to Your New Programs
52  </a></span></dt></dl></dd></dl></div></div></div><div class="navfooter"><hr><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="nw4migration.html">Prev</a>�</td><td width="20%" align="center">�</td><td width="40%" align="right">�<a accesskey="n" href="kerberos.html">Next</a></td></tr><tr><td width="40%" align="left" valign="top">Chapter�10.�Migrating NetWare Server to Samba-3�</td><td width="20%" align="center"><a accesskey="h" href="index.html">Home</a></td><td width="40%" align="right" valign="top">�Chapter�11.�Active Directory, Kerberos, and Security</td></tr></table></div></body></html>
53