Migration Guide

Total Page:16

File Type:pdf, Size:1020Kb

Migration Guide 5 Migration Guide A guide to migrating the basic software components on server and workstation computers Version 1.0 – July 2003 KBSt Publication Service ISSN 0179-7263 Volume 57 July 2003 KBSt Publication Series Volume 57 ISSN 0179 - 7263 Reprint, even in part, subject to approval This volume was prepared by the KBSt unit at the Federal Min- istry of the Interior in co-operation with the German Federal Office for Information Security, the Bundesverwaltungsamt (BVA) and C_sar Consulting, solutions and results AG. Editor: C_sar AG, Berlin If you are interested in publications by KBSt currently available or further informa- tion concerning the documents, please contact Bundesministerium des Innern Referat IT 2 (KBSt) 11014 Berlin, Germany Tel.: +49 (0) 1888 681 - 2312 Fax.: +49 (0) 1888 681 - 523121 KBSt homepage: http://www.kbst.bund.de 1Frau Monika Pfeiffer (mailto: [email protected]) Migration Guide A guide to migrating the basic software components on server and workstation computers Version 1.0 July 2003 Published by the Federal Ministry of the Interior CONTENTS 1 Introduction .................................................................... 8 1.1 About the project 8 1.2 About this guide 9 1.3 How to use this guide 10 1.4 Information for decision-makers 12 1.4.1 General recommendations 12 1.4.2 Continuing and replacing migration 12 1.4.3 Migration paths 13 1.4.4 Comparability of alternatives 13 1.4.5 Future key issues 14 1.4.6 Economic efficiency 15 2 Key issues of the migration guide.............................. 17 2.1 Important definitions 17 2.1.1 Open source, free software 17 2.1.2 Proprietary software 17 2.1.3 Commercial Linux software 17 2.1.4 Replacing migration 18 2.1.5 Continuing migration 18 2.2 Migration paths 18 2.2.1 Microsoft Windows as the starting situation 19 2.2.2 System landscape with replacing migration 21 2.2.3 System landscape with continuing migration 22 2.2.4 Internal dependencies within the Microsoft system landscape 23 2.3 Linux distributions 25 2.3.1 Introduction 25 2.3.2 Debian GNU Linux 27 2.3.3 SuSE Linux distribution 28 2.3.4 Red Hat distribution 29 2.3.5 Certifications 29 2.3.6 Conclusions 31 Version: 29.08.2003 Page 1 CONTENTS 2.4 License models 31 2.4.1 GPL 31 2.4.2 Lesser GPL 32 2.4.3 BSD license 33 2.5 Data sources 33 2.5.1 Experience with migration projects 34 2.5.2 Integration of experts 36 3 Technical description of the migration paths ............ 37 3.1 Introduction 37 3.2 File system 38 3.2.1 Overview 38 3.2.2 Windows NT 4 39 3.2.3 Replacing migration 48 3.2.4 Continuing migration 58 3.3 Print service 62 3.3.1 Overview 62 3.3.2 Introduction 63 3.3.3 The starting situation – printing under Windows NT 4 64 3.3.4 Replacing migration 71 3.3.5 Continuing migration 80 3.4 Authentication services 81 3.4.1 Overview 81 3.4.2 The starting situation – Windows NT 4 82 3.4.3 Replacing migration – Linux, Samba and OpenLDAP 89 3.4.4 Continuing migration 93 3.5 Network services 93 3.5.1 Overview 93 3.5.2 The starting situation – network services under Windows NT 94 3.5.3 Replacing migration – network services under Linux 99 3.5.4 Continuing migration – network services under Windows 2000 101 3.6 System audit and management services 102 Page 2 Version: 28.09.2003 CONTENTS 3.6.1 Overview 102 3.6.2 The starting situation – Systems Management Server under Windows NT 4 103 3.6.3 Replacing migration – Linux 105 3.6.4 Continuing migration – Windows 2000 107 3.7 Directory service 109 3.7.1 Overview 109 3.7.2 Fundamentals 109 3.7.3 Active directory service (ADS) 113 3.7.4 Replacing migration – Samba and OpenLDAP 128 3.7.5 Continuing migration – introduction of ADS 131 3.8 Middleware – COM,.NET, J2EE 139 3.8.1 Component Object Model (COM) 139 3.8.2 ".NET" 140 3.8.3 Java 2 Enterprise Edition (J2EE) 142 3.9 Web services 144 3.9.1 Overview 144 3.9.2 Fundamentals 144 3.9.3 .Net web services 145 3.9.4 J2EE 146 3.10 XML (Extensible Markup Language) 147 3.11 Web servers 148 3.11.1 Overview 148 3.11.2 Introduction 148 3.11.3 Internet Information Server 4.0 149 3.11.4 Replacing migration 152 3.11.5 Continuing migration 158 3.12 SharePoint Portal Server 160 3.12.1 Overview 160 3.12.2 Introduction 161 3.12.3 Dashboard site 161 3.12.4 Document management system (DMS) 162 3.12.5 Search functions 163 3.12.6 Conclusions 163 Stand: 29.08.2003 Seite 3 CONTENTS 3.13 Databases 164 3.13.1 Overview 164 3.13.2 Introduction 164 3.13.3 MS SQL Server 7.0 165 3.13.4 Replacing migration 169 3.13.5 Continuing migration 175 3.14 Groupware 177 3.14.1 Overview 177 3.14.2 Introduction 178 3.14.3 The starting situation – Microsoft Exchange 5.5 178 3.14.4 Replacing migration 183 3.14.5 Continuing migration 201 3.15 Office / desktop 206 3.15.1 Overview 206 3.15.2 Introduction 207 3.15.3 MS Office: the starting situation 207 3.15.4 Replacing migration 211 3.15.5 Continuing migration 229 3.15.6 Further desktop applications 233 3.15.7 Integration of Windows applications in conjunction with Linux clients 241 3.15.8 Evaluation 252 3.16 Terminal servers and thin clients 253 3.16.1 Overview 253 3.16.2 Introduction 254 3.16.3 Linux Terminal Server Project 258 3.16.4 NX terminal services 259 3.16.5 Windows Terminal Services and Citrix 260 3.17 High availability 263 3.17.1 Aims 263 3.17.2 The "five new" and reality 263 3.17.3 The approach 264 3.17.4 Categories of HA systems 265 3.17.5 Proprietary HA software 266 Page 4 Version: 28.09.2003 CONTENTS 3.17.6 Open Source HA software 267 4 Evaluation of economic efficiency ........................... 271 4.1 Introduction 271 4.2 Methodological principles 272 4.2.1 Monetary analysis 273 4.2.2 Benefit analysis 273 4.2.3 IT-WiBe 21 (recommendations on economic efficiency assessments for IT systems) 273 4.2.4 Migration cost matrix 274 4.2.5 TCO 275 4.2.6 Comparability 275 4.2.7 New introduction vs. migration of systems 276 4.2.8 Full cost approach 277 4.3 The monetary (operative) dimension 278 4.3.1 Applications 278 4.3.2 Cost categories 278 4.3.3 Features of applied categories of public agencies 279 4.4 Strategic dimension 281 4.4.1 Macroeconomic discussion 281 4.4.2 Microeconomic discussion 281 4.5 Overall results of the evaluation of economic efficiency 282 4.6 Migration recommendations based on the evaluation of economic efficiency 283 4.6.1 Complete migration 285 4.6.2 Continuing migration 286 4.6.3 Partial migration 286 4.7 Conclusions 289 4.8 Expenditures with different migration scenarios 289 4.8.1 General assumptions concerning migration expenditures 289 4.8.2 Costs of migration from Windows NT to Windows 2000 291 4.8.3 Expenditure on migration from Windows NT to Linux 294 Stand: 29.08.2003 Seite 5 CONTENTS 4.8.4 Expenditure on migration from Exchange 5.5 to Exchange 2000 297 4.8.5 Expenditure on migration from Exchange 5.5 to Samsung Contact 298 4.8.6 Recommended assessments concerning products / product groups 299 4.9 Example of evaluation of urgency and quality / strategy 329 4.9.1 Urgency criteria 330 4.9.2 Quality/strategy criteria 330 4.9.3 Benefit analysis 330 5 Migration recommendations...................................... 336 5.1 General statements 336 5.1.1 The decision-making path 336 5.1.2 General recommendations 337 5.2 Completely "replacing migration" 339 5.2.1 Architecture model 340 5.2.2 Medium and large public agencies 343 5.2.3 Specialized public agencies with an IT service function 346 5.2.4 Small public agencies 348 5.3 Completely "continuing migration" 350 5.3.1 Minimizing the degree of integration, protecting degrees of freedom 352 5.3.2 Further migration paths 354 5.4 Partial migration 354 5.4.1 Selective migration 354 5.4.2 Partial migration at the server end 357 5.5 Migration paths 358 5.5.1 One-step migration 358 5.5.2 Gentle migration 360 5.5.3 Critical success factors 362 6 Authors and contributing experts............................. 375 Page 6 Version: 28.09.2003 CONTENTS 7 Abbreviations ............................................................. 377 8 Glossary...................................................................... 386 9 Tables.......................................................................... 392 10 Illustrations ................................................................. 396 11 Appendix ..................................................................... 400 11.1 Appendix: WiBe (recommendations on economic efficiency assessments for IT systems) 400 11.1.1 Overview of recommended catalogs of criteria 400 11.1.2 General catalog of criteria, IT-WiBe21, for migration scenarios 400 11.1.3 Special catalog of criteria, IT-WiBe21, for migration objects 404 11.1.4 Explanation of additional criteria 406 Stand: 29.08.2003 Seite 7 Introduction 1 Introduction "A product replaces another one if it offers customers an incentive for a change which outweighs the change costs or which overcomes the resistance to change. A replacement product offers an incentive for change if, compared to its price, it offers customers a higher value than the product that was previously used." M.E.
Recommended publications
  • Planet of Judgment by Joe Haldeman
    Planet Of Judgment By Joe Haldeman Supportable Darryl always knuckles his snash if Thorvald is mateless or collocates fulgently. Collegial Michel exemplify: he nefariously.vamoses his container unblushingly and belligerently. Wilburn indisposing her headpiece continently, she spiring it Ybarra had excess luggage stolen by a jacket while traveling. News, recommendations, and reviews about romantic movies and TV shows. Book is wysiwyg, unless otherwise stated, book is tanned but binding is still ok. Kirk and deck crew gain a dangerous mind game. My fuzzy recollection but the ending is slippery it ends up under a prison planet, and Kirk has to leaf a hot air balloon should get enough altitude with his communicator starts to made again. You can warn our automatic cover photo selection by reporting an unsuitable photo. Jah, ei ole valmis. Star Trek galaxy a pace more nuanced and geographically divided. Search for books in. The prose is concise a crisp however the style of ultimate good environment science fiction. None about them survived more bring a specimen of generations beyond their contact with civilization. SFFWRTCHT: Would you classify this crawl space opera? Goldin got the axe for Enowil. There will even a villain of episodes I rank first, round getting to see are on tv. Houston Can never Read? New Space Opera if this were in few different format. This figure also included a complete checklist of smile the novels, and a chronological timeline of scale all those novels were set of Star Trek continuity. Overseas reprint edition cover image. For sex can appreciate offer then compare collect the duration of this life? Production stills accompanying each episode.
    [Show full text]
  • IPS Signature Release Note V9.17.79
    SOPHOS IPS Signature Update Release Notes Version : 9.17.79 Release Date : 19th January 2020 IPS Signature Update Release Information Upgrade Applicable on IPS Signature Release Version 9.17.78 CR250i, CR300i, CR500i-4P, CR500i-6P, CR500i-8P, CR500ia, CR500ia-RP, CR500ia1F, CR500ia10F, CR750ia, CR750ia1F, CR750ia10F, CR1000i-11P, CR1000i-12P, CR1000ia, CR1000ia10F, CR1500i-11P, CR1500i-12P, CR1500ia, CR1500ia10F Sophos Appliance Models CR25iNG, CR25iNG-6P, CR35iNG, CR50iNG, CR100iNG, CR200iNG/XP, CR300iNG/XP, CR500iNG- XP, CR750iNG-XP, CR2500iNG, CR25wiNG, CR25wiNG-6P, CR35wiNG, CRiV1C, CRiV2C, CRiV4C, CRiV8C, CRiV12C, XG85 to XG450, SG105 to SG650 Upgrade Information Upgrade type: Automatic Compatibility Annotations: None Introduction The Release Note document for IPS Signature Database Version 9.17.79 includes support for the new signatures. The following sections describe the release in detail. New IPS Signatures The Sophos Intrusion Prevention System shields the network from known attacks by matching the network traffic against the signatures in the IPS Signature Database. These signatures are developed to significantly increase detection performance and reduce the false alarms. Report false positives at [email protected], along with the application details. January 2020 Page 2 of 245 IPS Signature Update This IPS Release includes Two Thousand, Seven Hundred and Sixty Two(2762) signatures to address One Thousand, Nine Hundred and Thirty Eight(1938) vulnerabilities. New signatures are added for the following vulnerabilities: Name CVE–ID
    [Show full text]
  • Manual Aberto De TIC E Libreoffice Capa: Miguel Vale 3ª Edição Editor: ISCTE – Instituto Universitário De Lisboa, Lisboa 2014 ISBN: 978-989-732-237-2 Suporte: E-Book
    Manual de Tecnologias de Informação e Comunicação e LibreOffice [ 3ª edição ] Comunidade LibreOffice Portugal Direitos de autor Este trabalho foi licenciado com uma Licença Creative Commons - Atribuição 3.0 Não Adaptada ou superior em conjunto com GNU General Public License v3+ ou superior. Todas as restantes marcas registadas presentes neste manual pertencem às respectivas entidades. Ficha Técnica Título: Manual Aberto de TIC e LibreOffice Capa: Miguel Vale 3ª Edição Editor: ISCTE – Instituto Universitário de Lisboa, Lisboa 2014 ISBN: 978-989-732-237-2 Suporte: e-book Autor(es) Os autores de cada capítulo estão descritos em cada uma das respectivas fichas técnicas. Feedback Envie os seus comentários ou sugestões sobre este documento para: http://wiki.documentfoundation.org/PT/Main_Page http://wiki.documentfoundation.org/PT/Documentation Acordo Ortográfico Cada capítulo deste documento foi redigido no acordo ortográfico definido pelo(s) seu(s) autor(es) na respectiva ficha técnica. Este capítulo foi redigido ao abrigo do Acordo Ortográfico de 1990. A toda a Comunidade LibreOffice Portugal. A todos os movimentos de Software Livre e Creative Commons em Portugal. A todos os Professores, Formadores e alunos e formandos que fizerem uso deste manual. A todos aqueles que apoiaram e acreditaram neste projecto. Caixa Mágica, Novell Portugal, Associação Ensino Livre, Associação Nacional de Software Livre, Associação de Apoio Social da Portugal Telecom, Ângulo Sólido, OpenLab-ESEV Laboratório de Software Livre da Escola Superior de Educação de Viseu, Instituto Superior de Ciências Educativas, Portal Forma-te e em especial ao ISCTE – Instituto Universitário de Lisboa. Aos nossos pais e família que agora poderão usufruir de mais tempo connosco.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Spybot - Search & Destroy Can Detect and Remove Spyware of Different Kinds from Your Computer
    Description Spybot - Search & Destroy can detect and remove spyware of different kinds from your computer. Spyware is a relatively new kind of threat that common anti-virus applications do not cover yet. If you see new toolbars in your Internet Explorer that you didn't intentionally install, if your browser crashes, or if you browser start page has changed without your knowing, you most probably have spyware. But even if you don't see anything, you may be infected, because more and more spyware is emerging that is silently tracking your surfing behaviour to create a marketing profile of you that will be sold to advertisement companies. Spybot-S&D; is free, so there's no harm in trying to see if something snooped into your computer, too :) Spybot-S&D; can also clean usage tracks, an interesting function if you share your computer with other users and don't want them to see what you worked on. And for professional users, it allows to fix some registry inconsistencies and offers some extended reporting features. License Spybot-S&D; comes under the Dedication Public License. Requirements Microsoft Windows 95, 98, ME, NT, 2000 or XP (32 and 64 bit), 2003, Vista. Compatible with bootable PE disks (e.g. BartPE) and Wine. Minimum of 10 MB free hard disk space, more recommended for updates and backups. Usage We recommend that you continue by reading the tutorial next. © 2000-2008 Safer Networking Ltd. All rights reserved. I. Freeware First of all, the reasons why Spybot-S&D; is free: I.a. Dedication Spybot-S&D; is dedicated to the most wonderful girl on earth :) I.b.
    [Show full text]
  • Unit 13 E-Mail and E-Messaging
    UNIT 13 E-MAIL AND E-MESSAGING Structure 13.0 Objectives 13.1 Introduction 13.2 E-mail 13.2.1 Defining Email 13.2.2 Need of Email 13.2.3 Email Address 13.3 Types of Email Services 13.3.1 Free Web-based Email Services 13.3.2 Priced Web-based Email Services 13.3.3 Private Email Services 13.4 Types of Email Account 13.4.1 POP/IMAP Account 13.4.2 Email Forwarder 13.4.3 Mailing List 13.4.4 Auto Responder 13.4.5 Email Bouncer 13.4.6 Email Blackhole 13.5 Structure and Features of Email 13.5.1 Header 13.5.2 Body 13.5.3 Features 13.6 Functioning of Email Systems 13.6.1 Protocols 13.6.2 Delivery Agent 13.6.3 Access Client 13.6.4 Setting up Account 13.6.5 Folder Management 13.7 Messaging 13.7.1 Instant Messaging 13.7.2 Unified Messaging 13.8 Issues with Messaging 13.8.1 Spamming 13.8.2 Privacy 13.8.3 Security 13.9 Widgets and Utilities 13.10 Summary 13.11 Answers to Self Check Exercises 13.12 Keywords 13.13 References and Further Reading 5 Internet Tools and Services 13.0 OBJECTIVES After reading this Unit, you will be able to: provide a detailed account about Email and Email service Providers; explain in detail various Protocols used in Email service; and discuss about Web 2.0 tools in Email. 13.1 INTRODUCTION Electronic Mail is one of the most prominent uses of networked communication technology.
    [Show full text]
  • 1.0 Intro to Openbsd Information Pertaining to Any -Current Options, It Only Attempts to Track 2.0 Other Resources What Has Been Released on CD
    OpenBSD Frequently Asked Questions Frequently Asked Questions OpenBSD FAQ This FAQ is maintained with information pertaining to the 2.6 release of OpenBSD. Not all information presented here may be accurate for older Language: [en] releases of OpenBSD. Information for previous releases is available. You [es] [de] should check http://www.openbsd.com/errata.html for important updates. The FAQ follows release versions of OpenBSD. It will not have 1.0 Intro to OpenBSD information pertaining to any -current options, it only attempts to track 2.0 Other resources what has been released on CD. This is so there is no confusion as to 3.0 Obtaining OpenBSD which versions are being documented here. 4.0 Installation Guide This FAQ will take you through most critical steps to setting up your own 5.0 Kernel Configuration OpenBSD system. The addressed questions range from new to advanced 6.0 Networking Setup users. Hopefully you will find this FAQ useful. Downloadable versions of 7.0 Keyboard Controls the FAQ are available in text and PDF. These versions may not be as 8.0 General Questions up-to-date as the HTML versions available from this page. 9.0 Migrating from Linux ● Text Version 10.0 System Management ● PDF Version 11.0 Performance Tuning 12.0 For Advanced Users Any questions can be directed to: [email protected] 13.0 IPSec 2.6, 2.7 Recently updated or added FAQ's 14.0 Disk setup ● 6.1.1 - Identifying and Setting Up Your Network Interfaces - Changed to reflect the movment of some drivers to the dc* driver.
    [Show full text]
  • The Apple Ecosystem
    APPENDIX A The Apple Ecosystem There are a lot of applications used to manage Apple devices in one way or another. Additionally, here’s a list of tools, sorted alphabetically per category in order to remain vendor agnostic. Antivirus Solutions for scanning Macs for viruses and other malware. • AVG: Basic antivirus and spyware detection and remediation. • Avast: Centralized antivirus with a cloud console for tracking incidents and device status. • Avira: Antivirus and a browser extension. Avira Connect allows you to view device status online. • BitDefender: Antivirus and malware managed from a central console. • CarbonBlack: Antivirus and Application Control. • Cylance: Ransomware, advanced threats, fileless malware, and malicious documents in addition to standard antivirus. • Kaspersky: Antivirus with a centralized cloud dashboard to track device status. © Charles Edge and Rich Trouton 2020 707 C. Edge and R. Trouton, Apple Device Management, https://doi.org/10.1007/978-1-4842-5388-5 APPENDIX A THe AppLe ECOSYSteM • Malware Bytes: Antivirus and malware managed from a central console. • McAfee Endpoint Security: Antivirus and advanced threat management with a centralized server to track devices. • Sophos: Antivirus and malware managed from a central console. • Symantec Mobile Device Management: Antivirus and malware managed from a central console. • Trend Micro Endpoint Security: Application whitelisting, antivirus, and ransomware protection in a centralized console. • Wandera: Malicious hot-spot monitoring, jailbreak detection, web gateway for mobile threat detection that integrates with common MDM solutions. Automation Tools Scripty tools used to automate management on the Mac • AutoCasperNBI: Automates the creation of NetBoot Images (read: NBI’s) for use with Casper Imaging. • AutoDMG: Takes a macOS installer (10.10 or newer) and builds a system image suitable for deployment with Imagr, DeployStudio, LANrev, Jamf Pro, and other asr or Apple Systems Restore-based imaging tools.
    [Show full text]
  • Linux Networking-HOWTO
    Linux Networking−HOWTO: Linux Networking−HOWTO: Table of Contents Linux Networking−HOWTO:............................................................................................................................1 Author: Joshua Drake poet@linuxports.com...........................................................................................1 1.Introduction...........................................................................................................................................1 2.Document History.................................................................................................................................1 3.How to use this HOWTO......................................................................................................................1 4.General Information about Linux Networking.....................................................................................1 5.Generic Network Configuration Information.......................................................................................1 6.Ethernet Information.............................................................................................................................2 7.IP Related Information..........................................................................................................................2 8.Advanced Networking with Kernel 2.2................................................................................................2 9.Using common PC hardware................................................................................................................2
    [Show full text]
  • Openbsd As a File Server
    OpenBSD as a File Server With Active Directory threatening the traditional SMB (Server Message Block) Windows file sharing and Appletalk/Chooser MacOS file sharing, open source Unix has an opening to become recognized as a file sharing platform that can cheaply and efficiently replace the more traditional operating systems. Although support for active directory is lacking, in the present interim where SMB, Chooser, and NFS (Network File System) still reign supreme, tools exist to make OpenBSD the perfect file server for cross-platform client networks and complex internetworks. As an example configuration for the various subsystems involved in this, let's look at my main OpenBSD server at work, which handles Appletalk, SMB, and NFS simultaneously and distributes files over a multi- platform internetwork. There are three repositories of data, which must all be accessible by Macintosh and Windows clients on the internal network: 1. /home/www (A local web-hosting directory on newboing, the server in question) 2. /deepthought (An NFS mount from deepthought, a remote server at a co-location facility) 3. /doca (An NFS mount from doc_a, a local NT server providing main internal file serving) Given this layout, there are three discernable steps involved in configuration. Step 1, configuring the mounts The NFS daemon on deepthought was configured to export only the /home directory and all its subsidiaries, and only to the correct IP address of newboing. This was done via an entry in /etc/exports reading: /home 202.56.38.123 Then it was mounted on newboing via the following command: mount -t nfs deepthought.domain.com.au:/home /deepthought Since there are problems mounting SMB filesystems under OpenBSD (it is possible, but the new smbfs- based smbmount is heavily Linux oriented), I chose to run PC-NFS on doc_a.
    [Show full text]
  • Freenas® 11.2-U3 User Guide
    FreeNAS® 11.2-U3 User Guide March 2019 Edition FreeNAS® is © 2011-2019 iXsystems FreeNAS® and the FreeNAS® logo are registered trademarks of iXsystems FreeBSD® is a registered trademark of the FreeBSD Foundation Written by users of the FreeNAS® network-attached storage operating system. Version 11.2 Copyright © 2011-2019 iXsystems (https://www.ixsystems.com/) CONTENTS Welcome .............................................................. 8 Typographic Conventions ..................................................... 10 1 Introduction 11 1.1 New Features in 11.2 .................................................... 11 1.1.1 RELEASE-U1 ..................................................... 14 1.1.2 U2 .......................................................... 14 1.1.3 U3 .......................................................... 15 1.2 Path and Name Lengths .................................................. 16 1.3 Hardware Recommendations ............................................... 17 1.3.1 RAM ......................................................... 17 1.3.2 The Operating System Device ........................................... 18 1.3.3 Storage Disks and Controllers ........................................... 18 1.3.4 Network Interfaces ................................................. 19 1.4 Getting Started with ZFS .................................................. 20 2 Installing and Upgrading 21 2.1 Getting FreeNAS® ...................................................... 21 2.2 Preparing the Media ...................................................
    [Show full text]
  • Postfix (SMTP)
    Linux System Administration Postfix: a Simple Mail Transfer Protocol (SMTP) daemon ©2004 Ken Barber Some Rights Reserved This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/2.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. History of email ● Originally designed to send messages between users on the same (multiuser) system ● Simple program mail used to send & receive ● User's mail resides in /var/spool/mail – All messages in one single file; same name as user – Known as mbox format – Go look there now ● All of this is still with us today Email today: Three Agents ● Mail Transport Agent (MTA) – Transports mail from one system to another – Examples: Sendmail, Postfix, Qmail ● Mail Delivery Agent (MDA) – Often included in MTA ● Mail User Agent (MUA) – aka “email client”: pine, mutt, kmail, outlook etc. How it all works Sendmail: the original MTA/MDA ● Like Cthulhu: – An ancient daemon with tentacles coming out of its head – i.e., a Monster – Devours sysadmins & possibly small children too ● 80% of world's email transits Sendmail servers ● Don't use it unless you already know & love it ● Installed – and running – by default: 'nix needs an MTA to handle system messages The Sendmail replacement: Postfix ● 100% drop-in replacement for Sendmail – /usr/sbin/sendmail renamed to sendmail.sendmail – /usr/sbin/sendmail becomes a symlink to /etc/alternatives/mta – /etc/alternatives/mta
    [Show full text]