User Guide for Resource Manager Essentials Software Release 3.4 Ciscoworks2000

Total Page:16

File Type:pdf, Size:1020Kb

User Guide for Resource Manager Essentials Software Release 3.4 Ciscoworks2000 User Guide for Resource Manager Essentials Software Release 3.4 CiscoWorks2000 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100 Customer Order Number: DOC-7813951= Text Part Number: 78-13951-01 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. CCVP, the Cisco logo, and Welcome to the Human Network are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn is a service mark of Cisco Systems, Inc.; and Access Registrar, Aironet, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, LightStream, Linksys, MeetingPlace, MGX, Networkers, Networking Academy, Network Registrar, PIX, ProConnect, ScriptShare, SMARTnet, StackWise, The Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0711R) User Guide for Resource Manager Essentials Copyright © 2002, Cisco Systems, Inc. All rights reserved. CONTENTS Preface xi Audience xi Conventions xi Related Documentation xii Obtaining Documentation xiii World Wide Web xiii Ordering Documentation xiv Documentation Feedback xiv Obtaining Technical Assistance xv Cisco.com xv Technical Assistance Center xv Cisco TAC Web Site xvi Cisco TAC Escalation Center xvii PART 1 About Resource Manager Essentials CHAPTER 1 Overview 1-1 Features 1-2 Functional Architecture 1-7 CiscoWorks2000 Server 1-8 Essentials Database and Functions 1-9 Web Clients 1-9 Cisco.com 1-10 Getting Started 1-10 User Guide for Resource Manager Essentials 78-13951-01 iii Contents RME Functions 1-11 User Tasks 1-11 Administrative Tasks 1-12 Essentials Task Usage Workflow 1-12 General System Configuration 1-13 Supported Devices 1-14 Adding Functionality and Incremental Device Support 1-14 Time Zone Implementation 1-15 CHAPTER 2 Resource Manager Essentials Applications 2-1 Device Views 2-2 Types of Views 2-2 Setting Device Credentials 2-4 System Configuration 2-5 Availability 2-6 Benefits of Availability 2-6 Availability Functional Flow 2-7 Availability Workflow 2-8 Change Audit 2-10 Change Audit Functional Flow 2-11 Configuration Management 2-14 Benefits of Configuration Management 2-14 Configuration Management Functional Flow 2-15 Configuration Archive 2-18 NetConfig, Config Editor, and Network Show Commands 2-20 NetConfig Option 2-23 Benefits of Netconfig 2-24 Network Show Commands Option 2-27 Benefits of Network Show Commands 2-27 User Guide for Resource Manager Essentials iv 78-13951-01 Contents Config Editor Option 2-31 Benefits of Config Editor 2-31 Contract Connection 2-34 Contract Connection Workflow 2-35 Case Management 2-36 Inventory 2-37 Benefits of Inventory Management 2-37 Inventory Management Functional Flow 2-38 Job Approval 2-46 Job Approval Process 2-47 Software Management 2-49 Benefits of Software Management 2-49 Software Management Functional Flow 2-49 Syslog Analysis 2-55 Syslog Analysis Functional Flow 2-55 Syslog Analysis on Windows 2-57 Syslog Analysis Workflow 2-57 Syslog Vs Change Audit 2-58 CHAPTER 3 VPN Security Management Solution 3-1 Configuration Management Reports 3-2 Inventory Reports 3-2 VPN Syslog Analysis Reports 3-3 CHAPTER 4 Network Address Translation Support 4-1 Introducing NAT Support 4-2 Managing devices outside the NAT 4-3 User Guide for Resource Manager Essentials 78-13951-01 v Contents PART 2 Managing Your Network—Scenarios CHAPTER 5 Monitoring Your Devices 5-1 What You Need—Prerequisites 5-2 How To Do It—Procedures 5-2 Determine Current Network Availability 5-2 View the Latest Syslog Messages 5-3 View a Custom Report 5-4 Where You Should End Up—Verification 5-4 CHAPTER 6 Upgrading Your Device Software 6-1 What You Need—Prerequisites 6-2 How To Do It—Procedures 6-2 Perform the CCO Upgrade Analysis 6-3 Retrieve Software Images from CCO 6-4 Schedule the Software Image Upgrade 6-5 Track the Upgrade 6-7 Where You Should End Up—Verification 6-8 CHAPTER 7 Performing Maintenance on Your Essentials Server 7-1 What You Need—Prerequisites 7-2 How To Do It—Procedures 7-2 Remove Records From the Change Audit Log 7-3 Remove Images From the Software Library 7-5 Remove Old Data From the Job Control Report 7-6 Add Unmanaged Devices to Inventory 7-6 Remove Configurations From the Archive 7-7 User Guide for Resource Manager Essentials vi 78-13951-01 Contents Where You Should End Up—Verification 7-8 Verify Change Audit Log Records Are Removed 7-8 Verify Software Images Are Removed from the Library 7-8 Verify Old Data Is Removed from the Job Control Report 7-9 Verify Unmanaged Devices Are Added to Inventory 7-9 Verify Configurations Are Removed from the Archive 7-9 CHAPTER 8 Making a Device Configuration Change Using a Template 8-1 What You Need—Prerequisites 8-2 How To Do It—Procedures 8-2 Where You Should End Up—Verification 8-4 CHAPTER 9 Configuring Multiple Devices 9-1 What You Need—Prerequisites 9-2 How To Do It—Procedures 9-2 Create a Template 9-2 Define a NetConfig Job 9-3 Where You Should End Up—Verification 9-5 CHAPTER 10 Importing Device Data to Inventory 10-1 What You Need—Prerequisites 10-2 How To Do It—Procedures 10-3 Where You Should End Up—Verification 10-4 CHAPTER 11 Managing PIX Devices through Proxy Server (Auto Update Server) 11-1 Importing Information from Proxy Server 11-2 What You Need—Prerequisites 11-4 How To Do It—Procedures 11-4 User Guide for Resource Manager Essentials 78-13951-01 vii Contents Importing Proxy Server 11-4 Distributing Images 11-5 Where You Should End Up—Verification 11-5 CHAPTER 12 Checking Device Configuration Changes and Who Made Them 12-1 What You Need—Prerequisites 12-2 How To Do It—Procedures 12-2 Where You Should End Up—Verification 12-3 CHAPTER 13 Creating a Syslog Custom Report 13-1 What You Need—Prerequisites 13-2 How To Do It—Procedures 13-2 Where You Should End Up—Verification 13-3 CHAPTER 14 Maintaining Your Inventory Information 14-1 What You Need—Prerequisites 14-2 How To Do It—Procedures 14-2 Check the Contract Status on Network Devices 14-2 Update Device Serial Numbers 14-3 Where You Should End Up—Verification 14-4 Verify the Contract Status on Network Devices 14-4 Verify Device Serial Numbers Are Updated 14-4 User Guide for Resource Manager Essentials viii 78-13951-01 Contents PART 3 Appendixes APPENDIX A Troubleshooting Essentials A-1 Change Audit FAQs A-2 Configuration Management A-2 Configuration Management FAQs A-2 Troubleshooting Configuration Management A-4 Contract Connection A-6 Contract Connection FAQs A-6 Inventory A-7 Inventory FAQs A-7 Troubleshooting Inventory A-9 Software Management A-13 Software Management FAQs A-13 Troubleshooting Software Management A-21 Syslog Analysis A-25 Syslog Analysis FAQs A-25 Troubleshooting Syslog Analysis A-27 CiscoWorks2000 Server A-34 CiscoWorks 2000 Server FAQs A-34 APPENDIX B File Import Format B-1 Comma-Separated Values (CSV) File B-2 Data Integration File (DIF) B-4 APPENDIX C Essentials Command Reference C-1 I NDEX User Guide for Resource Manager Essentials 78-13951-01 ix Contents User Guide for Resource Manager Essentials x 78-13951-01 Preface This manual describes Resource Manager Essentials, gives an overview of the applications that make up Resource Manager Essentials, provides conceptual information about network management, and describes common tasks you can accomplish with Resource Manager Essentials.
Recommended publications
  • Desktop Migration and Administration Guide
    Red Hat Enterprise Linux 7 Desktop Migration and Administration Guide GNOME 3 desktop migration planning, deployment, configuration, and administration in RHEL 7 Last Updated: 2021-05-05 Red Hat Enterprise Linux 7 Desktop Migration and Administration Guide GNOME 3 desktop migration planning, deployment, configuration, and administration in RHEL 7 Marie Doleželová Red Hat Customer Content Services [email protected] Petr Kovář Red Hat Customer Content Services [email protected] Jana Heves Red Hat Customer Content Services Legal Notice Copyright © 2018 Red Hat, Inc. This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported License. If you distribute this document, or a modified version of it, you must provide attribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be removed. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
    [Show full text]
  • Version 7.8-Systemd
    Linux From Scratch Version 7.8-systemd Created by Gerard Beekmans Edited by Douglas R. Reno Linux From Scratch: Version 7.8-systemd by Created by Gerard Beekmans and Edited by Douglas R. Reno Copyright © 1999-2015 Gerard Beekmans Copyright © 1999-2015, Gerard Beekmans All rights reserved. This book is licensed under a Creative Commons License. Computer instructions may be extracted from the book under the MIT License. Linux® is a registered trademark of Linus Torvalds. Linux From Scratch - Version 7.8-systemd Table of Contents Preface .......................................................................................................................................................................... vii i. Foreword ............................................................................................................................................................. vii ii. Audience ............................................................................................................................................................ vii iii. LFS Target Architectures ................................................................................................................................ viii iv. LFS and Standards ............................................................................................................................................ ix v. Rationale for Packages in the Book .................................................................................................................... x vi. Prerequisites
    [Show full text]
  • Version 20160304-Systemd
    Linux From Scratch Version 20160304-systemd Created by Gerard Beekmans Edited by Douglas R. Reno Linux From Scratch: Version 20160304-systemd by Created by Gerard Beekmans and Edited by Douglas R. Reno Copyright © 1999-2016 Gerard Beekmans Copyright © 1999-2016, Gerard Beekmans All rights reserved. This book is licensed under a Creative Commons License. Computer instructions may be extracted from the book under the MIT License. Linux® is a registered trademark of Linus Torvalds. Linux From Scratch - Version 20160304-systemd Table of Contents Preface .......................................................................................................................................................................... vii i. Foreword ............................................................................................................................................................. vii ii. Audience ............................................................................................................................................................ vii iii. LFS Target Architectures ................................................................................................................................ viii iv. LFS and Standards ............................................................................................................................................ ix v. Rationale for Packages in the Book ...................................................................................................................
    [Show full text]
  • SUSE Linux Enterprise Server 15 SP2 Security and Hardening Guide Security and Hardening Guide SUSE Linux Enterprise Server 15 SP2
    SUSE Linux Enterprise Server 15 SP2 Security and Hardening Guide Security and Hardening Guide SUSE Linux Enterprise Server 15 SP2 Introduces basic concepts of system security, covering both local and network security aspects. Shows how to use the product inherent security software like AppArmor, SELinux, or the auditing system that reliably collects information about any security-relevant events. Supports the administrator with security-related choices and decisions in installing and setting up a secure SUSE Linux Enterprise Server and additional processes to further secure and harden that installation. Publication Date: September 24, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see https://www.suse.com/company/legal/ . All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its aliates. Asterisks (*) denote third-party trademarks. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its
    [Show full text]
  • AIX 4.3 Quick Beginnings
    Bull AIX 4.3 Quick Beginnings AIX ORDER REFERENCE 86 A2 75HX 04 Bull AIX 4.3 Quick Beginnings AIX Software September 1999 BULL ELECTRONICS ANGERS CEDOC 34 Rue du Nid de Pie – BP 428 49004 ANGERS CEDEX 01 FRANCE ORDER REFERENCE 86 A2 75HX 04 The following copyright notice protects this book under the Copyright laws of the United States of America and other countries which prohibit such actions as, but not limited to, copying, distributing, modifying, and making derivative works. Copyright Bull S.A. 1992, 1999 Printed in France Suggestions and criticisms concerning the form, content, and presentation of this book are invited. A form is provided at the end of this book for this purpose. To order additional copies of this book or other Bull Technical Publications, you are invited to use the Ordering Form also provided at the end of this book. Trademarks and Acknowledgements We acknowledge the right of proprietors of trademarks mentioned in this book. AIXR is a registered trademark of International Business Machines Corporation, and is being used under licence. UNIX is a registered trademark in the United States of America and other countries licensed exclusively through the Open Group. Year 2000 The product documented in this manual is Year 2000 Ready. The information in this document is subject to change without notice. Groupe Bull will not be liable for errors contained herein, or for incidental or consequential damages in connection with the use of this material. About This Book: AIX 4.3 Quick Beginnings This book contains information for first–time users who have little or no experience with the AIX operating system.
    [Show full text]
  • CS 460 Operating Systems
    CS 460 Operating Systems Linux Boot Process Arch Linux CS460 02/03/20 Pacific University 1 Resources https://wiki.archlinux.org/index.php/Arch_boot_process https://doc.opensuse.org/documentation/leap/reference/html/ book.opensuse.reference/cha.boot.html https://doc.opensuse.org/documentation/leap/reference/html/ book.opensuse.reference/cha.systemd.html http://www.thegeekstuff.com/2011/02/linux-boot-process (a bit dated) https://www.freedesktop.org/wiki/Software/systemd/ https://wiki.archlinux.org/index.php/systemd https://opensource.com/article/18/1/analyzing-linux-boot-process https://0xax.gitbooks.io/linux-insides/content/ https://0xax.github.io CS460 02/03/20 Pacific University 2 Process - Linux ● POST ● BIOS/UEFI – disk partitions – file hierarchy standard ● Boot Loader ● Kernel ● initramfs ● init process / SystemD ● Display Manager / Getty CS460 02/03/20 Pacific University 3 POST ● Power On Self Test – firmware on motherboard does check of the hardware ● Common failures CS460 02/03/20 Pacific University 4 BIOS/UEFI ● Main job: launch the boot loader ● BIOS – basic input/output system ● UEFI – Unified Extensible Firmware Interface – can handle larger boot disks – 32bit or 64 bit mode (larger address space) – Secure boot – can have network capabilities – shell CS460 02/03/20 Pacific University 5 Devices Physical device vs partition vs file system Same information can be obtained with: df -h CS460 02/03/20 Pacific University 8 Boot loader ● Load the OS Kernel into memory and go – provide parameters to the kernel – initial RAM disk:
    [Show full text]
  • Using SAS® on Unix with Multiple Active Directories As Authentication Providers Jan Bigalke, Allianz Managed Operations & Services SE, Business Unit ASIC
    SAS Global Forum 2011 Systems Architecture and Administration Paper 369-2011 Using SAS® on Unix with multiple active directories as authentication providers Jan Bigalke, Allianz Managed Operations & Services SE, Business Unit ASIC ABSTRACT Using SAS on Unix / Linux servers with active directories as authentication providers is now a common approach. This paper explains the basics of Unix authentication against active directories. Limitations of using standard PAM modules for authenticating users stored in multiple domains are explained. Various solutions are required to address challenges for the different access methods used by clients to connect to SAS, e.g. web access and client applications like Enterprise Guide®. INTRODUCTION More and more the Microsoft active directory is becoming a common solution as authentication system for UNIX and Linux based systems. Active Directory is used to simplify the authentication process for business users reducing the number of authentication systems required. Since the distribution of Windows Server 2003 R2 Microsoft ships schema additions to the active directory for UNIX authentication. These schema enhancements provide attributes that map closely enough to RFC 23071 to be generally usable for UNIX authentication. The standard implementations to connect UNIX systems to the active directory are nss_ldap and pam_ldap. This paper discusses a scenario using SAS on a UNIX system with an active directory as authentication provider. The SAS users in the discussed enterprise organization are based in different active directories. The requirement for the discussed solution is that a user only has a single identity. Workarounds to solve this task are not discussed. Some of these could be additional accounts for users in a central domain, local user accounts in SAS (@saspw), etc.
    [Show full text]
  • Desktop Migration and Administration Guide
    Red Hat Enterprise Linux 7 Desktop Migration and Administration Guide A guide to the GNOME 3 Desktop migration planning and administration on Red Hat Enterprise Linux 7. Petr Kovář Jana Heves Red Hat Enterprise Linux 7 Desktop Migration and Administration Guide A guide to the GNOME 3 Desktop migration planning and administration on Red Hat Enterprise Linux 7. Petr Kovář Red Hat Customer Content Services [email protected] Jana Heves Red Hat Customer Content Services [email protected] Legal Notice Copyright © 2015 Red Hat, Inc. This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported License. If you distribute this document, or a modified version of it, you must provide attribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be removed. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
    [Show full text]
  • Univention Corporate Server
    Univention Corporate Server Extended domain services documentation 2 Table of Contents 1. Integration of Ubuntu clients into a UCS domain ...................................................................... 4 1.1. Integration into the LDAP directory and the SSL certificate authority .................................. 4 1.2. Configuration of the System Security Services Daemon (SSSD) ......................................... 5 1.3. Configuring user logins .............................................................................................. 7 1.4. Kerberos integration .................................................................................................. 8 1.5. Limitations of the Ubuntu domain integration ................................................................ 9 1.6. Additional references ................................................................................................. 9 2. Integration of Linux/Unix systems into a UCS domain ............................................................. 10 2.1. Managing the systems in the Univention Management Console ........................................ 10 2.2. Configuration of the name resolution .......................................................................... 10 2.3. Configuration of the time server ................................................................................. 10 2.4. Access to user and group information of the UCS domain ............................................... 10 2.5. Integrating into Kerberos .........................................................................................
    [Show full text]
  • Hosting BSD L Cloud Computing L Open BSD, Netbsd and Freebsd As File Sharing Servers - Part2
    Editor in Chief: Olga Kartseva Dear Readers! [email protected] Contributing: BSD is already becoming international magazine. People Jan Stedehouder, Rob Somerville, Marko Milenovic, Petr all over the world have an access to our magazine and Topiarz, Paul McMath, Eric Vintimilla, Matthias Pfeifer, Theodore Tereshchenko, Mikel King, Machtelt Garrels, Jesse Smith download it. We are happy that our work is so appreciated and BSD magazine popularity is growing!. Special thanks to: Marko Milenovic, Worth Bishop and Mike Bybee Art Director: First of all I wanted to thank you for you letters of Agnieszka Marchocka support, they mean really a lot to us and help constantly DTP: to improve! All our authors worked hard to make their Ireneusz Pogroszewski articles interesting and useful. I really hope you will like this issue as much as the previous. Senior Consultant/Publisher: Paweł Marciniak [email protected] This month topic is “BSD as a desktop”. Why this National Sales Manager: Ewa Łozowicka topic? [email protected] We thought that some of you still might have doubts Marketing Director: Ewa Łozowicka on choosing OS, so this issue surely will help you to [email protected] learn more about BSD as a desktop and help to make a decision. Executive Ad Consultant: Karolina Lesińska [email protected] But those of you who already use BSD should not Advertising Sales: close the magazine after reading my previous statement, Olga Kartseva because you could loose a lot. =) [email protected] Publisher : Software Press Sp. z o.o. SK Please feel free to contact us, we are open to critics, ul.
    [Show full text]
  • AIX Version 4 Desktop Handbook
    AIX Version 4 Desktop Handbook Document Number GG24-4451-00 December 1994 International Technical Support Organization Austin Center Take Note! Before using this information and the product it supports, be sure to read the general information under “Special Notices” on page xv. First Edition (December 1994) This edition applies to the AIXwindows Desktop which is part of AIX Version 4.1.1. Order publications through your IBM representative or the IBM branch office serving your locality. Publications are not stocked at the address given below. An ITSO Technical Bulletin Evaluation Form for reader′s feedback appears facing Chapter 1. If the form has been removed, comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. 632B Building 821 Internal Zip 2834 11400 Burnet Road Austin, Texas 78758-3493 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. Copyright International Business Machines Corporation 1994. All rights reserved. Note to U.S. Government Users — Documentation related to restricted rights — Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp. Abstract This document provides an overview for using and customizing the AIXwindows Desktop delivered with AIX Version 4.1.1. The information provided is intended to help desktop users and system administrators better understand how-to-use and customize the AIXwindows Desktop and its facilities. Each of the major components of the desktop are covered with an overview and detailed how to use information.
    [Show full text]
  • PC-BSD® 10.1 Users Handbook Page 1 of 320 PC-BSD® 10.1 Users Handbook Page 2 of 320 Table of Contents 1 Introduction
    PC-BSD® 10.1 Users Handbook Page 1 of 320 PC-BSD® 10.1 Users Handbook Page 2 of 320 Table of Contents 1 Introduction ........................................................................................................................................... 10 1.1 Goals and Features ........................................................................................................................ 11 1.2 What's New in 10.1 ....................................................................................................................... 12 1.3 PC-BSD® for Linux Users ............................................................................................................ 13 1.3.1 Filesystems ............................................................................................................................ 13 1.3.2 Device Names ........................................................................................................................ 14 1.3.3 Feature Names ....................................................................................................................... 14 1.3.4 Commands ............................................................................................................................. 15 1.3.5 Additional Resources ............................................................................................................. 16 2 Pre-Installation Tasks ............................................................................................................................ 16
    [Show full text]