Netboot Services
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Well Known TCP and UDP Ports Used by Apple Software Products
Well known TCP and UDP ports used by Apple Languages English software products Symptoms Learn more about TCP and UDP ports used by Apple products, such as OS X, OS X Server, Apple Remote Desktop, and iCloud. Many of these are referred to as "well known" industry standard ports. Resolution About this table The Service or Protocol Name column lists services registered with the Internet Assigned Numbers Authority (http://www.iana.org/), except where noted as "unregistered use." The names of Apple products that use these services or protocols appear in the Used By/Additional Information column. The RFC column lists the number of the Request For Comment document that defines the particular service or protocol, which may be used for reference. RFC documents are maintained by RFC Editor (http://www.rfc- editor.org/). If multiple RFCs define a protocol, there may only be one listed here. This article is updated periodically and contains information that is available at time of publication. This document is intended as a quick reference and should not be regarded as comprehensive. Apple products listed in the table are the most commonly used examples, not a comprehensive list. For more information, review the Notes below the table. Tip: Some services may use two or more ports. It is recommend that once you've found an instance of a product in this list, search on the name (Command-F) and then repeat (Command-G) to locate all occurrences of the product. For example, VPN service may use up to four diferent ports: 500, 1701, 1723, and 4500. -
A Brief Technical Introduction
Mac OS X A Brief Technical Introduction Leon Towns-von Stauber, Occam's Razor LISA Hit the Ground Running, December 2005 http://www.occam.com/osx/ X Contents Opening Remarks..............................3 What is Mac OS X?.............................5 A New Kind of UNIX.........................12 A Diferent Kind of UNIX..................15 Resources........................................39 X Opening Remarks 3 This is a technical introduction to Mac OS X, mainly targeted to experienced UNIX users for whom OS X is at least relatively new This presentation covers primarily Mac OS X 10.4.3 (Darwin 8.3), aka Tiger X Legal Notices 4 This presentation Copyright © 2003-2005 Leon Towns-von Stauber. All rights reserved. Trademark notices Apple®, Mac®, Macintosh®, Mac OS®, Finder™, Quartz™, Cocoa®, Carbon®, AppleScript®, Bonjour™, Panther™, Tiger™, and other terms are trademarks of Apple Computer. See <http://www.apple.com/legal/ appletmlist.html>. NeXT®, NeXTstep®, OpenStep®, and NetInfo® are trademarks of NeXT Software. See <http://www.apple.com/legal/nexttmlist.html>. Other trademarks are the property of their respective owners. X What Is It? 5 Answers Ancestry Operating System Products The Structure of Mac OS X X What Is It? Answers 6 It's an elephant I mean, it's like the elephant in the Chinese/Indian parable of the blind men, perceived as diferent things depending on the approach X What Is It? Answers 7 Inheritor of the Mac OS legacy Evolved GUI, Carbon (from Mac Toolbox), AppleScript, QuickTime, etc. The latest version of NeXTstep Mach, Quartz (from Display PostScript), Cocoa (from OpenStep), NetInfo, apps (Mail, Terminal, TextEdit, Preview, Interface Builder, Project Builder, etc.), bundles, faxing from Print panel, NetBoot, etc. -
Mac OS X Server
Mac OS X Server Version 10.4 Technology Overview August 2006 Technology Overview 2 Mac OS X Server Contents Page 3 Introduction Page 5 New in Version 10.4 Page 7 Operating System Fundamentals UNIX-Based Foundation 64-Bit Computing Advanced BSD Networking Architecture Robust Security Directory Integration High Availability Page 10 Integrated Management Tools Server Admin Workgroup Manager Page 14 Service Deployment and Administration Open Directory Server File and Print Services Mail Services Web Hosting Enterprise Applications Media Streaming iChat Server Software Update Server NetBoot and NetInstall Networking and VPN Distributed Computing Page 29 Product Details Page 31 Open Source Projects Page 35 Additional Resources Technology Overview 3 Mac OS X Server Introduction Mac OS X Server version 10.4 Tiger gives you everything you need to manage servers in a mixed-platform environment and to con gure, deploy, and manage powerful network services. Featuring the renowned Mac OS X interface, Mac OS X Server streamlines your management tasks with applications and utilities that are robust yet easy to use. Apple’s award-winning server software brings people and data together in innovative ways. Whether you want to empower users with instant messaging and blogging, gain greater control over email, reduce the cost and hassle of updating software, or build your own distributed supercomputer, Mac OS X Server v10.4 has the tools you need. The Universal release of Mac OS X Server runs on both Intel- and PowerPC-based The power and simplicity of Mac OS X Server are a re ection of Apple’s operating sys- Mac desktop and Xserve systems. -
Network Boot Protocol Hp
Network Boot Protocol Hp Beaded and Thomism Rube travails so economically that Hallam collar his Edom. Prent still ensuring on-the-spot while hornish Pinchas unnaturalises that propylite. Is Miguel mossiest or lacklustre after tailored Fabio gasp so apishly? For Windows virtual machines Remote Desktop Protocol is nonetheless available. You must program DMI on an HP commercial name with real legacy BIOS. Built for performance and optimal data centre density. To see global limited number? Only using rufus simply not allow for hp boot network in our machines on absaroka storage tab, then usb options and operating system or linux is that provide all. Short on hp smart array raid. Thanks for contributing an internal to Super User! Please configure it is reset your food and share code is quite slow down arrow key press both computers one you must not plugged into startup. Bios so you are a protocol which contain whitespace when i specify boot up. Get persistent boot selection. Sata virtual desktop computers have changed and basic guidance based on this flag will not need it is a network protocols that. Pxe network protocols that networking devices before you will appear in network environments, if something went well. Do you to major organizations such an answer site with our free us from your pc hardware rather than legacy network boot protocol for the latest version and then. The following script allows you to save, making you can use or own server setups and directory structures. When the computer is connected to various network, graphics cards, system will add a fucking name. -
Netbooting Microsoft Windows 7 and XP
Netbooting Microsoft Windows 7 and XP Chris Holman∗ Centre for Advanced Internet Architectures, Technical Report 130226A Swinburne University of Technology Melbourne, Australia [email protected] Abstract—This tutorial shows how to set up Microsoft and testing the Windows PE are detailed in Section VI. Windows 7 and XP to be booted using network attached Installing to the iSCSI drive is covered in Section VII. storage. iSCSI support is built in to a Windows 7 installer The report concludes with Section IX and an appendix. using the Windows 7 Automated Installation Kit. DHCP, an iSCSI server and a TFTP server are configured on the II. BACKGROUND server to provide a PXE client and an iSCSI target. Once A. DHCP set up, a client PC will be able to operate entirely without a local disk. Dynamic Host Configuration Protocol’s (DHCP) [2] Index Terms—Windows 7, Windows XP, PXE, netboot- primary purpose is to assign IP addresses and other ing network configuration details to hosts. It is used in this tutorial for the purposes of providing network and PXE I. INTRODUCTION booting configuration details, including TFTP server PXE (“Preboot eXecution Environment”) [1] booting, settings and configuration filenames. or net booting, can be used to load an operating system B. TFTP over the network without using the local hard drive. While FreeBSD and Linux Operating Systems (OSes) Trivial File Transfer Protocol (TFTP) [3] is a simple support a number of different PXE boot methods (includ- protocol to transfer files. It is commonly used in PXE ing NFS, TFTP, HTTP, iSCSI and more), Windows only scenarios because of its simplicity. -
Macintosh Server G4 with Appleshare IP FAQ
Macintosh Server G4 with AppleShare IP FAQ Hardware Information Q. What are the features of the new Macintosh Server G4? A. The Macintosh Server G4 is now able to serve your intranet or Internet even faster, with a 533-megahertz PowerPC G4 processor and faster system architecture, featuring a 133-megahertz system bus, PCI throughput up to 215 megabytes per second, and built-in 10/100/1000BASE-T Ethernet. Q. How much and what kind of memory does the Macintosh Server G4 support? A. The Macintosh Server G4 comes standard with 128 megabytes of memory. It has three DIMM slots that support up to 1.5 gigabytes of PC133 SDRAM (999MB maximum per application in Mac OS 9). Q. What expansion capabilities does the Macintosh Server G4 offer? A. USB and FireWire provide two avenues to easily expand the functionality of your Macintosh Server G4 through third-party peripherals. The Macintosh Server G4 also has four PCI slots and one AGP 4X slot preconfigured with an ATI RAGE 128 Pro graphics card. The Macintosh Server G4 comes with five expansion bays: two bays for removable media (such as the CD-ROM drive) and three bays for internal hard disk drives. Q. What display connectors are included in the Macintosh Server G4? A. The Macintosh Server G4 comes with an ATI RAGE 128 Pro graphics card that has two connectors: a standard VGA connector and an Apple Display Connector (ADC). To connect an older Apple monitor with a DVI connector, you will need an adapter. For availability, check www.apple.com/store. -
Mac OS X Server User Management for Version 10.4 Or Later Second Edition
Mac OS X Server User Management For Version 10.4 or Later Second Edition K Apple Computer, Inc. Apple, the Apple logo, AirPort, AppleShare, AppleTalk, © 2006 Apple Computer, Inc. All rights reserved. FireWire, iBook, Keychain, LaserWriter, Mac, Mac OS, Macintosh, PowerBook, and QuickTime are trademarks The owner or authorized user of a valid copy of of Apple Computer, Inc., registered in the U.S. and other Mac OS X Server software may reproduce this countries. Extensions Manager, Finder, and SuperDrive publication for the purpose of learning to use such are trademarks of Apple Computer, Inc. software. No part of this publication may be reproduced or transmitted for commercial purposes, such as selling Adobe and PostScript are trademarks of Adobe Systems copies of this publication or for providing paid-for Incorporated. support services. Java and all Java-based trademarks and logos are Every effort has been made to ensure that the trademarks or registered trademarks of Sun information in this manual is accurate. Apple Computer, Microsystems, Inc. in the U.S. and other countries. Inc., is not responsible for printing or clerical errors. UNIX is a registered trademark in the United States and Apple other countries, licensed exclusively through X/Open 1 Infinite Loop Company, Ltd. Cupertino, CA 95014-2084 408-996-1010 Other company and product names mentioned herein www.apple.com are trademarks of their respective companies. Mention of third-party products is for informational purposes Use of the “keyboard” Apple logo (Option-Shift-K) for only and constitutes neither an endorsement nor a commercial purposes without the prior written consent recommendation. -
PSUMAC203: Deployment Getting Tired of Us Yet?
PSUMAC203: Deployment Getting Tired of us yet? • Justin Elliott, Penn State University • IT Manager, Classroom and Lab Computing • Rusty Myers, Penn State University • IT Support Specialist, College of Education Overview • What is Deployment • Deployment Methods • Deployment Tools • Demo Time Quick Audience Survey • New to Deployment for Macs? • How many Macs do you need to image? • Have more than 1 network segment? • Have Mac OS X Server(s)? • Have Windows (SMB) Servers? Deployment System Image System Image Deploying System Images! Considerations • Frequency of Imaging • Amount of Data to Restore • Number of Macs to Image • Number of Staff • Budgetary Restrictions Booting Methods Local Disk Booting • Local Volumes • DVDs - Cheap, Slow • FireWire, USB Hard Drives • Fast • Relatively Inexpensive Network Booting • Network (NetBoot) • Requires fast switched networks, DHCP, Local NetBoot Server or router HelperIPs • Very convenient when it all works correctly • Sometimes difficult network requirements Image Sources Local Image Sources • Second Partition • Firewire, USB Drives • Great for larger images • Hassle to manage portable disks Network Image Sources • Network Shares • AFP, SMB, HTTP • ASR Multicast Server Prep for HTTP • Segment images served by Apache (before version 2.0) Web Server $ hdiutil segment -segmentSize 1.9g -o Image.dmg • Keep all of the .dmgpart files in the same directory Prep for ASR Multicast • Images must be “Scanned For Restore” • Re-orders and optimizes image for multicast • Images should not be compressed Deployment Tools Apple Software Restore • ASR is at the heart of all OS X system restore utilities • Disk Utility, System Image Utility • Blast Image Config, DeployStudio • Can be scripted at the command line too • Located at /usr/sbin/asr Multicast ASR Server • ASR can run as a multicast server for one image • Start asr with server mode, config, image path % asr server --source master.dmg --config configuration.plist • Can literally kill your networks. -
CIS Mac OS X Leopard (10.5.X) Benchmark
Mac OS X 10.5 Leopard Level 1 & 2 Benchmark Version 1.0 May 2008 Copyright ©2008, The Center for Internet Security http://www.cisecurity.org Editor: Allan Marcus [email protected] CIS Mac OS X Leopard (10.5.x) Benchmark Table of Contents Terms of Use Agreement ........................................................................................................................... 3 1) Introduction ........................................................................................................................................ 6 1.1) Document Layout ....................................................................................................................... 6 1.2) Intended Audience ..................................................................................................................... 6 1.3) Practical Application .................................................................................................................. 7 1.4) Security Levels Explained ......................................................................................................... 7 1.5) Precursor Technical Information ............................................................................................... 7 1.6) Basic Security Principles: .......................................................................................................... 8 2) Benchmark Elements ......................................................................................................................... 9 2.1) Installation -
Guide to Securing Apple OS X 10.10 Systems for IT Professionals: a NIST Security Configuration Checklist
NIST Special Publication 800-179 Guide to Securing Apple OS X 10.10 Systems for IT Professionals: A NIST Security Configuration Checklist Lee Badger Murugiah Souppaya Mark Trapnell Eric Trapnell Dylan Yaga Karen Scarfone This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-179 C O M P U T E R S E C U R I T Y NIST Special Publication 800-179 Guide to Securing Apple OS X 10.10 Systems for IT Professionals: A NIST Security Configuration Checklist Lee Badger Murugiah Souppaya Mark Trapnell Dylan Yaga Computer Security Division Information Technology Laboratory Eric Trapnell Software and Systems Division Information Technology Laboratory Karen Scarfone Scarfone Cybersecurity Clifton, VA This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-179 December 2016 U.S. Department of Commerce Penny Pritzker, Secretary National Institute of Standards and Technology Willie May, Under Secretary of Commerce for Standards and Technology and Director Authority This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Modernization Act (FISMA) of 2014, 44 U.S.C. § 3551 et seq., Public Law (P.L.) 113-283. NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130. -
Netatalk 2.0 Manual Next
[main] [faq] [documentation] [downloads] [links] [mailing lists] Netatalk 2.0 Manual Next Netatalk 2.0 Manual 2.0.5 Table of Contents Legal Notice 1. Introduction to Netatalk 2. Installation How to obtain Netatalk Binary packages Source packages Compiling Netatalk Prerequisites Compiling Netatalk Compiling a new Berkeley DB for Netatalk 3. Setting up Netatalk Appletalk To use AppleTalk or not No AppleTalk routing atalkd acting as an AppleTalk router File Services Setting up the AFP file server CNID backends Charsets/Unicode Authentication Printing Setting up the PAP print server Using AppleTalk printers Time Services Using Netatalk as a time server for Macintoshes Starting and stopping Netatalk 4. Upgrading from a previous version of Netatalk Overview Volumes and filenames How to upgrade a volume to 2.0 How to use a 1.x CAP encoded volume with 2.0 How to use a 1.x NLS volume with 2.0 Choosing a CNID storage scheme How to upgrade if no persistent CNID storage was used How to upgrade if a persistent CNID storage scheme was used How to upgrade if a persistent CNID storage scheme was used, the brute force approach Setting up a test server on the same machine Setting up an empty test share Duplicating an already existing share Configuring and running the test afpd 5. Manual Pages achfile — change type and/or creator of Apple Macintosh files (netatalk format) acleandir — clean up a directory containing netatalk Apple Macintosh files aecho — send AppleTalk Echo Protocol packets to network hosts afile — display type and creator of Apple Macintosh -
Xserve Technology Overview January 2008 Technology Overview Xserve
Xserve Technology Overview January 2008 Technology Overview Xserve Contents Page 4 Introduction Page 5 Product Overview Key Features Page 7 Performance Overview Java Server Performance Processor Performance Memory Performance Storage Performance File Server Performance Page 1 Quad-Core Intel Xeon Processors Enhanced Intel Core Microarchitecture 12MB On-Die L2 Cache Dual Independent System Buses Reduced Idle Power High-Performance Floating-Point Division Enhanced 128-Bit SSE4 SIMD Engine Page 14 High-Bandwidth Server Architecture Dual Independent 1600MHz Frontside Buses Advanced FB-DIMM Memory Technology High-Performance PCI Express Expansion Industry-Standard Connectivity Page 18 Flexible Storage Options SATA Drive Technology SAS Drive Technology Apple Drive Modules Software and Hardware RAID Options Fibre Channel Page 22 Integrated Lights-Out Remote Management Anywhere, Anytime Monitoring and Control Dedicated Monitoring Hardware Server Monitor Software Innovative Remote Management Apple Remote Desktop Technology Overview Xserve Page 6 Mac OS X Server v10.5 Leopard UNIX Certified Foundation Optimized for Multicore Intel Processors 64-Bit Computing Advanced Networking Architecture Comprehensive Built-in Services Powerful Workgroup Management Services Innovative Collaborative Services Software Development with Xcode 3 Page 1 Service, Support, and Training Options AppleCare Premium Service and Support Plan AppleCare Service Parts Kit Apple Maintenance Program Mac OS X Server Software Support Training and Certification Programs Page 33