Suffield Academy Network Documentation

Suffield Academy Network Documentation

Suffield Academy Network Documentation Jason Healy, Director of Networks and Systems Last Updated Mar 18, 2008 (Revision 1083) This document reflects the ongoing work at Suffield Academy to maintain com- plete and up-to-date documentation describing the setup and maintenance of the campus network, servers, and software. This documentation primarily serves as a written record of the knowledge and experience of the Network Administrator. It came about to help solve the "hit by a bus" scenario, where the transfer of knowledge from the Network Admin- istrator to other staff members is necessary. Therefore, the documentation is primarily written about the application of technology at Suffield Academy. That said, much of the information is generic enough in nature that we felt it would be beneficial to put it online to share with the general community. We hope that others may find useful information in this documentation, and we welcome comments and suggestions. As of this writing, the document is a work in progress. As we add new sections, we shall make them available online at the following address: http://web.suffieldacademy.org/ils/netadmin/docs/ That page will always have the most recent version of the documentation, along with a date of publication to distinguish different versions. 2 Contents I HOWTOs5 1 Building NetRestore Images9 1.1 Introduction..............................9 1.1.1 Prerequisites.........................9 1.2 Preparing the Operating System.................. 10 1.2.1 Initial Setup......................... 10 1.2.2 Boot Images......................... 10 1.2.3 Software Updates....................... 11 1.2.4 System Preferences...................... 11 1.2.5 Certificate Trust....................... 12 1.3 Installing Applications........................ 12 1.3.1 Common Applications.................... 12 1.3.2 Network Workstation Software............... 14 1.3.3 Printers............................ 15 1.3.4 Faculty Applications..................... 15 1.4 Final Preparations.......................... 16 1.4.1 Customize the Dock..................... 16 1.4.2 Hard Drive Cleanup..................... 16 1.4.3 Reset Safari.......................... 16 1.4.4 User Profile Customization................. 16 3 1.4.5 Deleting All Users...................... 18 1.4.6 Networked Users....................... 18 1.4.7 Local Admin Group..................... 19 1.4.8 Printer Group Changes................... 19 1.5 Building the Image.......................... 19 1.6 NetRestore Configuration...................... 20 1.6.1 Updating an Existing Image................. 20 1.6.2 Adding a New Image..................... 20 1.7 Resources............................... 21 2 Installing Windows XP 23 2.1 Introduction.............................. 23 2.2 Installation.............................. 23 2.2.1 Before You Start....................... 23 2.2.2 BIOS Settings........................ 24 2.2.3 Booting............................ 24 2.2.4 Partitioning.......................... 25 2.2.5 Initializing the Disk..................... 27 2.2.6 Waiting for Installation................... 29 2.2.7 Regional and Language Options.............. 31 2.2.8 Personalize Your Software.................. 32 2.2.9 Product Activation Key................... 33 2.2.10 Computer Name and Administrator Password....... 33 2.2.11 Date and Time Settings................... 34 2.2.12 Networking Settings..................... 34 2.2.13 Workgroup or Computer Domain.............. 35 2.2.14 Finishing Initialization.................... 36 2.2.15 Network Identification Wizard............... 36 4 2.2.16 Logging In.......................... 38 2.3 Setting Up the OS.......................... 39 2.3.1 Eject the Installation CD.................. 39 2.3.2 Display Settings....................... 39 2.3.3 Control Panel Settings.................... 41 2.3.4 Install Pending Updates................... 46 2.4 Installing Standard Applications.................. 47 2.4.1 Connecting to the Fileserver................. 47 2.4.2 First Class.......................... 49 2.4.3 Mozilla Firefox........................ 50 2.4.4 Mozilla Sunbird........................ 52 2.4.5 Microsoft Office 2003..................... 53 2.4.6 FileMaker 6.......................... 53 2.4.7 Acrobat Reader 7....................... 53 2.4.8 Ultr@VNC Server...................... 53 2.4.9 Sophos Anti-Virus...................... 55 2.4.10 Printing............................ 55 2.4.11 Macromedia Studio 8 (optional).............. 55 3 Installing ODIN 57 3.1 Introduction.............................. 57 3.2 Prerequisites............................. 57 3.3 Installation.............................. 58 3.3.1 Logging In to the Server................... 58 3.3.2 Installing Odin........................ 60 4 Installing ODIN 69 4.1 Introduction.............................. 69 5 4.2 Mac OS X............................... 69 4.3 Windows XP............................. 70 4.3.1 Configuring the Client.................... 70 4.3.2 Using the VPN........................ 74 II Software 77 5 Netboot Services 81 5.1 Introduction.............................. 81 5.2 Configuring Netboot Services.................... 82 5.2.1 Initial Setup......................... 82 5.2.2 AFP Settings......................... 82 5.2.3 NFS Settings......................... 82 5.2.4 NetBoot Settings....................... 83 5.2.5 Network Settings....................... 83 5.3 Building a Rescue Image....................... 84 5.3.1 Selecting a Machine..................... 84 5.3.2 Base Installation....................... 84 5.3.3 System Configuration.................... 86 5.3.4 System Preferences...................... 89 5.3.5 Software Installation..................... 91 5.3.6 Performance Tweaks..................... 93 5.3.7 Building the Image...................... 94 5.3.8 Installing the Image..................... 94 5.3.9 Testing the Image...................... 94 6 OS 9 Remote Shutdown 97 6.1 Introduction.............................. 97 6 6.2 Requirements............................. 97 6.3 Configuring the Target........................ 98 6.3.1 Installation of Scripts.................... 98 6.3.2 Receive AppleEvents..................... 99 6.4 Configuring the Source........................ 100 6.5 Configuring NUT as a Trigger.................... 100 6.5.1 Setting Up NUT....................... 100 6.5.2 Sample Configuration Files................. 101 6.5.3 Creating a Remote Shutdown Script............ 102 6.5.4 Calling the Remote Shutdown Script............ 103 7 FirstClass Scripts 105 7.1 Introduction.............................. 105 7.2 Preflight Scripts........................... 105 7.2.1 The Preflight Scripts..................... 106 7.3 Postflight Scripts........................... 107 7.3.1 The Postflight Scripts.................... 107 7.4 FirstClass Network Store Backup.................. 108 7.4.1 Background.......................... 108 7.4.2 Requirements......................... 108 7.4.3 Design............................. 108 7.4.4 Usage............................. 109 7.4.5 Recovering from Zombie Processes............. 111 7.4.6 Restoration.......................... 112 7.5 Internet Services Log Rotate.................... 113 7.5.1 Background.......................... 113 7.5.2 Requirements......................... 113 7.5.3 Design............................. 113 7 7.5.4 Usage............................. 114 7.5.5 Viewing Old Logs...................... 114 8 DNS 115 8.1 Introduction.............................. 115 8.1.1 Suffield’s Topology...................... 116 8.2 Master (Adonis) Configuration................... 116 8.2.1 Adonis Notes......................... 117 8.2.2 Updating the Zones..................... 117 8.3 Slave Server Configuration...................... 118 8.3.1 Master Configuration.................... 118 8.3.2 Slave Configuration..................... 119 8.4 DNS with Mac OS X Server..................... 120 8.4.1 Custom Changes....................... 121 8.4.2 Configuration Files...................... 121 8.5 Suffield DNS Config Template.................... 121 8.5.1 Differences.......................... 121 8.5.2 Using the Configuration................... 122 8.6 Disaster Recovery........................... 124 9 DHCP 125 9.1 Introduction.............................. 125 9.2 Mac OS X Server Setup....................... 125 9.2.1 Getting dhcpd from DarwinPorts.............. 126 9.3 Suffield DNS Config Template.................... 126 9.3.1 Differences.......................... 127 9.3.2 Using the Configuration................... 127 9.4 Using DHCP............................. 129 8 9.4.1 Normal Operation Indicators................ 129 9.4.2 Finding a Client's Address................. 130 9.4.3 Starting the Daemon..................... 130 9.4.4 Stoping the Daemon..................... 130 9.4.5 Loading Configuration Changes............... 130 9.4.6 Adding Fixed Hosts..................... 131 9.4.7 Adding Registered Hosts................... 132 9.4.8 Failover............................ 132 10 Printing 135 10.1 Introduction.............................. 135 10.2 Printing Overview.......................... 136 10.2.1 Printer Hardware....................... 136 10.2.2 Client Machines....................... 136 10.2.3 Older Clients......................... 137 10.3 DNS Service Discovery (Bonjour).................. 137 10.3.1 Publishing a Service Zone.................. 138 10.3.2 Publishing Service Records................. 138 10.3.3 Final Notes.......................... 140 10.4 CUPS Configuration......................... 140 10.5 DHCP Configuration........................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    377 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us