系统登录
用户名:
密 码:
当前位置:首页 > 新闻内容新闻内容
北京语之林翻译有限公司翻译招聘!
发布单位:      发布时间:2007-03-20      新闻发布人:赵志波     

我司对翻译人员的要求是:
1. 相关专业硕士以上学位
2. 英文6级以上
3. 具备翻译经验
4. 认真负责

对翻译稿件的大致要求是:
1. 行业专业术语准确、到位
2. 语言不能有重大错误
3. 没有漏译
4. 有专人校对统稿(专业方面)
5. 对翻译内容严格保守
6. 恪守与我司达成的时间要求
7. 就进度等相关事宜与我司保持密切联系

简历发送:buaasoftshixi@126.com

邮件主题:姓名+学号+专业+应聘公司+应聘职位

翻译目录如下:

Fundamentals of

Novell®   eDirectoryTM
COURSE  3017
Novell Training Services
AUTHORIZED  COURSEWARE
www.novell.com
Part # 100-004853-001
Version 1

Proprietary Statement

Copyright © 2004 Novell, Inc. All rights reserved.
No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express prior consent of the publisher. This manual, and any portion thereof, may not be copied without the express written permission of Novell, Inc. Novell, Inc.
1800 South Novell Place
Provo, UT 84606-2399
Disclaimer
Novell, Inc. makes no representations or warranties with respect to the contents or use of this manual, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose.
Further, Novell, Inc. reserves the right to revise this publication and to make changes in its content at any time, without obligation to notify any person or entity of such revisions or changes.
Further, Novell, Inc. makes no representations or warranties with respect to any NetWare software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose.
Further, Novell, Inc. reserves the right to make changes to any and all parts of NetWare software at any time, without obligation to notify any person or entity of such changes.
This Novell Training Manual is published solely to instruct students in the use of Novell networking software. Although third-party application software packages are used in Novell training courses, this is for demonstration purposes only and shall not constitute an endorsement of any of these software applications.
Further, Novell, Inc. does not represent itself as having any particular expertise in these application software packages and any use by students of the same shall be done at the students’ own risk.
Software Piracy
Throughout the world, unauthorized duplication of software is subject to both criminal and civil penalties.
If you know of illegal copying of software, contact your local
Software Antipiracy Hotline.
For the Hotline number for your area, access Novell’s World Wide Web page at http://www.novell.com and look for the piracy page under “Programs.”
Or, contact Novell’s anti-piracy headquarters in the U.S. at 800- PIRATES (747-2837) or 801-861-7101.
Trademarks
Novell, Inc. has attempted to supply trademark information about company names, products, and services mentioned in this manual. The following list of trademarks was derived from various sources.
Novell, Inc. Trademarks
Novell, the Novell logo, NetWare, BorderManager, ConsoleOne, DirXML, GroupWise, iChain, ManageWise, NDPS, NDS, NetMail, Novell Directory Services, Novell iFolder, Novell SecretStore, Ximian, Ximian Evolution and ZENworks are registered trademarks; CDE, Certified Directory Engineer and CNE are registered service marks; eDirectory, Evolution, exteNd, exteNd Composer, exteNd Directory, exteNd Workbench, Mono, NIMS, NLM, NMAS, Novell Certificate Server, Novell Client, Novell Cluster Services, Novell Distributed Print Services, Novell Internet Messaging System, Novell Storage Services, Nsure, Nsure Resources, Nterprise, Nterprise Branch Office, Red Carpet and Red Carpet Enterprise are trademarks; and Certified Novell Administrator, CNA, Certified Novell Engineer, Certified Novell Instructor, CNI, Master CNE, Master CNI, MCNE, MCNI, Novell Education Academic Partner, NEAP, Ngage, Novell Online Training Provider, NOTP and Novell Technical Services are service marks of Novell, Inc. in the United States and other countries. SUSE is a registered trademark of SUSE LINUX AG, a Novell company. For more information on Novell trademarks, please visit http://www.novell.com/company/legal/trademarks/tmlist.html.
Other Trademarks
Adaptec is a registered trademark of Adaptec, Inc. AMD is a trademark of Advanced Micro Devices. AppleShare and AppleTalk are registered trademarks of Apple Computer, Inc. ARCserv is a registered trademark of Cheyenne Software, Inc. Btrieve is a registered trademark of Pervasive Software, Inc. EtherTalk is a registered trademark of Apple Computer, Inc. Java is a trademark or registered trademark of Sun Microsystems, Inc. in the United States and other countries. Linux is a registered trademark of Linus Torvalds. LocalTalk is a registered trademark of Apple Computer, Inc. Lotus Notes is a registered trademark of Lotus Development Corporation. Macintosh is a registered trademark of Apple Computer, Inc. Netscape Communicator is a trademark of Netscape Communications Corporation. Netscape Navigator is a registered trademark of Netscape Communications Corporation. Pentium is a registered trademark of Intel Corporation. Solaris is a registered trademark of Sun Microsystems, Inc. The Norton AntiVirus is a trademark of Symantec Corporation. TokenTalk is a registered trademark of Apple Computer, Inc. Tru64 is a trademark of Digital Equipment Corp. UnitedLinux is a registered trademark of UnitedLinux. UNIX is a registered trademark of the Open Group. WebSphere is a trademark of International Business Machines Corporation. Windows and Windows NT are registered trademarks of Microsoft Corporation.
All other third-party trademarks are the property of their respective owners.

Contents

Contents
Introduction
Audience  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Intro-2
Prerequisite Knowledge . . . . . . . . . . . . . . . . . . . . . . . . . . . .Intro-3
Exam Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Intro-3
Relationship to Other Courses in the Curriculum . . . . . . . .Intro-3
Agenda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Intro-4
Additional Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Intro-5
Scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Intro-5
SECTION 1      Purpose and Function of a Directory
Objectives  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  1-1
Objective 1      Describe the Purpose of a Directory . . . . . . . . . . . . . . . . . . . . . 1-2
What Is a Directory?   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    1-2
 
Objective 2      Identify Common Directory Service Uses. . . . . . . . . . . . . . . . . 1-3
 
Objective 3      Identify Key Components of a Basic Directory  . . . . . . . . . . . . 1-4
The Components of the X.500 Directory . . . . . . . . . . . . . . . . .    1-5
 
Objective 4      Identify the Role and Benefits of eDirectory. . . . . . . . . . . . . . . 1-9
The Role of eDirectory   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    1-9
The History of eDirectory  . . . . . . . . . . . . . . . . . . . . . . . . . . .    1-10 eDirectory 8.7.3 Features . . . . . . . . . . . . . . . . . . . . . . . . . . . .    1-11 eDirectory Platform Support  . . . . . . . . . . . . . . . . . . . . . . . . .    1-11
The eDirectory Database  . . . . . . . . . . . . . . . . . . . . . . . . . . . .    1-12
eDirectory Application Support . . . . . . . . . . . . . . . . . . . . . . .    1-14
 
Version 1             Copying all or part of this manual, or distributing such copies, is strictly prohibited.        TOC-1
To report suspected copying, please call 1-800-PIRATES.

Fundamentals of Novell eDirectory

Summary  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  1-17
SECTION 2      Fundamental eDirectory Concepts
Objectives  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  2-1
Objective 1      Identify and Describe eDirectory Components . . . . . . . . . . . . . 2-1
Tree   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    2-2
Schema . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    2-2
Objects  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    2-2
Properties  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    2-3
Values   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    2-4
Object Example  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    2-4
Objective 2      Identify and Describe eDirectory Object Classes . . . . . . . . . . . 2-6
Tree Object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    2-7
Container Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    2-8
Leaf Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    2-13
Exercise 2-1 Identify Container and Leaf Objects . . . . . . . . . .  2-19
Objective 3      Describe eDirectory Object Context and
Naming Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-22
What Context Is  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    2-22
Object Naming Conventions  . . . . . . . . . . . . . . . . . . . . . . . . .    2-24
Exercise 2-2 Implement eDirectory Naming  . . . . . . . . . . . . . .  2-32
Objective 4      Identify the Components of a Solid eDirectory Foundation . . 2-34
The eDirectory Foundation Model . . . . . . . . . . . . . . . . . . . . .    2-34
eDirectory Network Configuration Recommendations  . . . . .    2-36
Configure Network Parameters on a SUSE Linux Server . . .    2-36
Exercise 2-3 Configure Network Parameters . . . . . . . . . . . . . .  2-43
Summary  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  2-49
Exercise Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  2-52
Identify Container and Leaf Objects  . . . . . . . . . . . . . . . . . . .    2-52
Implement eDirectory Naming   . . . . . . . . . . . . . . . . . . . . . . .    2-53
TOC-2                 Copying all or part of this manual, or distributing such copies, is strictly prohibited.     Version 1
To report suspected copying, please call 1-800-PIRATES.

Contents

SECTION 3      Configure the Service Location Protocol
Objectives  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  3-1
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  3-1
Objective 1      Describe SLP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
Locating Network Services  . . . . . . . . . . . . . . . . . . . . . . . . . . .    3-2
Exercise 3-1 Understanding SLP Concepts  . . . . . . . . . . . . . . . .  3-9
SLP Configuration Options  . . . . . . . . . . . . . . . . . . . . . . . . . .    3-11
Objective 2      Design an SLP Configuration  . . . . . . . . . . . . . . . . . . . . . . . . . 3-14
Small Network Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    3-15
Medium-Sized Network Design   . . . . . . . . . . . . . . . . . . . . . .    3-16
Large Network Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    3-17
Objective 3      Configure SLP on Linux  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-19
Enable Multicasts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    3-19
Configure the slpuasa Daemon   . . . . . . . . . . . . . . . . . . . . . . .    3-20
Configure OpenSLP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    3-23
Exercise 3-2 Install and Configure OpenSLP . . . . . . . . . . . . . .  3-31
Summary  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  3-36
Exercise Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  3-38
Exercise 3-1: Understanding SLP Concepts  . . . . . . . . . . . . .    3-38
SECTION 4      Time Synchronization
Objectives  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  4-1
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  4-1
Objective 1      Identify the Relationship Between
Time Synchronization and eDirectory . . . . . . . . . . . . . . . . . . . . 4-2
Version 1             Copying all or part of this manual, or distributing such copies, is strictly prohibited.        TOC-3
To report suspected copying, please call 1-800-PIRATES.
Fundamentals of Novell eDirectory
Objective 2      Identify Network Time Protocol Basics  . . . . . . . . . . . . . . . . . . 4-3
What NTP Is   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    4-3
Stratum . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    4-4 ntpdate  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    4-5 xntpd   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    4-6 ntptrace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    4-9
Objective 3      Configure NTP on Your Network . . . . . . . . . . . . . . . . . . . . . . . 4-9
Use a Public NTP TIme Server  . . . . . . . . . . . . . . . . . . . . . . .    4-10
Use a Reference Clock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    4-11
Use a Server’s Local Clock  . . . . . . . . . . . . . . . . . . . . . . . . . .    4-12
Use an NTP Time Source in Your Network   . . . . . . . . . . . . .    4-12
Exercise 4-1 Configure Your Server to Use
DA1 as Its Time Source . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  4-15
Summary  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  4-17
SECTION 5      Install eDirectory 8.7.3
Objectives  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  5-1
Objective 1      Identify Pre-Installation Requirements for eDirectory 8.7.3  . . 5-1
Meet Hardware Requirements  . . . . . . . . . . . . . . . . . . . . . . . . .    5-2
Meet System Requirements  . . . . . . . . . . . . . . . . . . . . . . . . . . .    5-3
Enable Multicast Routing   . . . . . . . . . . . . . . . . . . . . . . . . . . . .    5-4
Synchronize Time   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    5-5
Objective 2      Install eDirectory 8.7.3 on a Linux Server  . . . . . . . . . . . . . . . . 5-6
Install eDirectory 8.7.3 on Linux . . . . . . . . . . . . . . . . . . . . . . .    5-6
Configure eDirectory  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    5-8
Start and Stop eDirectory on Linux  . . . . . . . . . . . . . . . . . . . .    5-12
Exercise 5-1 Install eDirectory 8.7.3 on Linux. . . . . . . . . . . . .  5-13
Summary  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  5-19
TOC-4                 Copying all or part of this manual, or distributing such copies, is strictly prohibited.     Version 1
To report suspected copying, please call 1-800-PIRATES.

Contents

SECTION 6      eDirectory Administration
Objectives  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  6-1
Objective 1      Use iManager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1
What iManager Is . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    6-2
How iManager Works  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    6-3
How to Access iManager . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    6-4
How to Navigate iManager  . . . . . . . . . . . . . . . . . . . . . . . . . . .    6-4
Objective 2      Describe the Admin Object . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-8
Objective 3      Create Objects  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-9
Create an Organizational Unit Object  . . . . . . . . . . . . . . . . . . .    6-9
Create User Objects  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    6-12
Create a Group Object  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    6-16
Create an Organizational Role Object  . . . . . . . . . . . . . . . . . .    6-18
Objective 4      Modify User Objects  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-18
Modify an Object  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    6-19
Objective 5      Move Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-22
objective 6      Delete User Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-23
Exercise 6-1 Install iManager . . . . . . . . . . . . . . . . . . . . . . . . . .  6-25
Exercise 6-2 eDirectory Administration . . . . . . . . . . . . . . . . . .  6-28
Summary  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  6-35
Version 1             Copying all or part of this manual, or distributing such copies, is strictly prohibited.        TOC-5
To report suspected copying, please call 1-800-PIRATES.

Fundamentals of Novell eDirectory

SECTION 7      eDirectory Rights
Objectives  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  7-1
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  7-1
Objective 1      Describe Objects, Properties, Rights, and Trustees. . . . . . . . . . 7-2
Object (Entry) Rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    7-2
Property (Attribute) Rights   . . . . . . . . . . . . . . . . . . . . . . . . . . .    7-4
Trustees  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    7-6
Grant Property Rights   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    7-8
Exercise 7-1 Identify eDirectory Rights . . . . . . . . . . . . . . . . . .  7-10
Exercise 7-2 Grant eDirectory Object Rights . . . . . . . . . . . . . .  7-12
Objective 2      Describe eDirectory Inheritance  . . . . . . . . . . . . . . . . . . . . . . . 7-15
Grant Rights to Multiple Users  . . . . . . . . . . . . . . . . . . . . . . .    7-16
Describe Default Users and Rights  . . . . . . . . . . . . . . . . . . . .    7-20
Describe Security Equivalence   . . . . . . . . . . . . . . . . . . . . . . .    7-20
Exercise 7-3 Working with Inheritance  . . . . . . . . . . . . . . . . . .  7-22
Objective 3      Block Inherited Rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-23
Make an Explicit Trustee Assignment Lower in the Tree  . . .    7-23
Block Rights with an Inherited Rights Filter (IRF)  . . . . . . . .    7-25
Objective 4      Determine Effective Rights . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-27
Exercise 7-4 Determine Effective Rights . . . . . . . . . . . . . . . . .  7-28
Exercise 7-5 Determine Effective Rights in iManager . . . . . . .  7-30
Exercise 7-6 Block Inherited Rights . . . . . . . . . . . . . . . . . . . . .  7-33
Summary  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  7-36
Exercise Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  7-39
Exercise 7-1: Identify eDirectory Rights  . . . . . . . . . . . . . . . .    7-39
Exercise 7-2: Grant eDirectory Object Rights . . . . . . . . . . . .    7-40
Exercise 7-3: Working with Inheritance  . . . . . . . . . . . . . . . .    7-41
Exercise 7-4: Determine Effective Rights  . . . . . . . . . . . . . . .    7-42
TOC-6                 Copying all or part of this manual, or distributing such copies, is strictly prohibited.     Version 1
To report suspected copying, please call 1-800-PIRATES.
contents
SECTION 8      Partitions and Replicas
Objectives  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  8-1
Objective 1      Define eDirectory Replication and Synchronization. . . . . . . . . 8-1
Partitioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    8-2
Replication  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    8-4
Why You Should Partition and Replicate Your Tree   . . . . . . .    8-8
Replica Ring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    8-9
Synchronizing eDirectory Changes  . . . . . . . . . . . . . . . . . . . .    8-10
Understanding Partition and Replication Rules . . . . . . . . . . .    8-12
Exercise 8-1 Describe eDirectory Partitions and Replicas . . . .  8-16
Objective 2      Identify Partition and Replica Placement Design . . . . . . . . . . 8-20
Consider Synchronization Factors Affecting Partitions and
Replicas  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    8-20
Determine Partition Boundaries . . . . . . . . . . . . . . . . . . . . . . .    8-21
Determine Replica Placement  . . . . . . . . . . . . . . . . . . . . . . . .    8-25
Use a Replica Table  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    8-31
Objective 3      Identify Partition and Replica Administrative Procedures . . . 8-35
Create a Partition  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    8-35
Merge a Partition  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    8-36
Replicate a Partition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    8-36
Move a Partition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    8-37
Delete a Replica  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    8-38
Exercise 8-2 Create and Manage Partitions with iManager . . .  8-39
Exercise 8-3 Review Partition and Replica Design Guidelines  8-49
Summary  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  8-50
Exercise Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    8-51
Exercise 8-1: Describe eDirectory Partitions and Replicas  . .    8-51
Exercise 8-2: Create and Manage Partitions with iManager  .    8-54
Exercise 8-3: Review Partition and Replica
Design Guidelines  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    8-58
Version 1             Copying all or part of this manual, or distributing such copies, is strictly prohibited.        TOC-7
To report suspected copying, please call 1-800-PIRATES.

fundamentals of Novell eDirectory

SECTION 9      eDirectory Tree Design
Objectives  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  9-1
Objective 1      Describe the Fundamentals of eDirectory Design. . . . . . . . . . . 9-1
Design Guidelines  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    9-2
Logical eDirectory Tree Structure  . . . . . . . . . . . . . . . . . . . . . .    9-3
Pyramid Design  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    9-4
Service-Oriented Tree Design  . . . . . . . . . . . . . . . . . . . . . . . . .    9-5
Design Factors  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    9-6
Objective 2      Design the Upper Layers of an eDirectory Tree . . . . . . . . . . . 9-11
Use a Single Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    9-11
Keep the eDirectory Tree Name Short, Descriptive,
and Unique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    9-12
Create a Single Organization Container Object . . . . . . . . . . .    9-13
Create First-Level Organizational Units that
Represent the Physical Network Infrastructure  . . . . . . . . . . .    9-14
Exercise 9-1 Design the Upper Layers of the
EduTrain eDirectory Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  9-23
Objective 3      Design the Lower Layers of an eDirectory Tree . . . . . . . . . . . 9-28
Focus on Key Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    9-28
Create Containers that Reflect Common Employee
Access Needs  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    9-29
Evaluate the Impact of Network Administration on
Your Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    9-29
Avoid Large Container Sizes . . . . . . . . . . . . . . . . . . . . . . . . .    9-33
Exercise 9-2 Design the Lower Layers of the
EduTrain eDirectory Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  9-36
Objective 4      Evaluate Your eDirectory Design . . . . . . . . . . . . . . . . . . . . . . 9-39
Tree Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    9-39
Partitions and Replicas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    9-41
Object Placement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    9-42
User and Administrator Environment Needs . . . . . . . . . . . . .    9-44
Exercise 9-3 Evaluate Your Tree Design . . . . . . . . . . . . . . . . .  9-44
TOC-8                 Copying all or part of this manual, or distributing such copies, is strictly prohibited.     Version 1
To report suspected copying, please call 1-800-PIRATES.

Contents

Summary  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  9-50
Exercise Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  9-52
Exercise 9-1: Design the Upper Layers of the
EduTrain eDirectory Tree  . . . . . . . . . . . . . . . . . . . . . . . . . . .    9-52
Exercise 9-2: Design the Lower Layers of the
EduTrain eDirectory Tree  . . . . . . . . . . . . . . . . . . . . . . . . . . .    9-54
Exercise 9-3: Evaluate Your Tree Design  . . . . . . . . . . . . . . .    9-56
SECTION 10      Maintain eDirectory
Objectives  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  10-1
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  10-1
Objective 1      Use iMonitor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-2
How iMonitor Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    10-3
How to Access iMonitor   . . . . . . . . . . . . . . . . . . . . . . . . . . . .    10-7
How to Navigate in iMonitor . . . . . . . . . . . . . . . . . . . . . . . . .    10-8
Exercise 10-1 Check Schema Synchronization
with iMonitor  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  10-25
Objective 2      Repair the eDirectory Tree. . . . . . . . . . . . . . . . . . . . . . . . . . . 10-26
Repair the Tree with iManager   . . . . . . . . . . . . . . . . . . . . . .    10-26
Exercise 10-2 Perform a Basic Repair with iManager . . . . . .  10-35
Repair the Tree from the Server Console   . . . . . . . . . . . . . .    10-37
Exercise 10-3 Complete a Local Database Repair
with ndsrepair . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  10-42
Repair the eDirectory Tree with eMBox  . . . . . . . . . . . . . . .    10-43
Exercise 10-4 Use the DSRepair eMTool to
Repair a Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  10-45
Objective 3      Perform an eDirectory Health Check. . . . . . . . . . . . . . . . . . . 10-46
Plan Your Health Check Strategy  . . . . . . . . . . . . . . . . . . . .    10-47
Identify Health Check Prerequisites   . . . . . . . . . . . . . . . . . .    10-48
Perform Health Checks  . . . . . . . . . . . . . . . . . . . . . . . . . . . .    10-50
Exercise 10-5 Run an eDirectory Repair with iMonitor . . . . .  10-59
Version 1             Copying all or part of this manual, or distributing such copies, is strictly prohibited.        TOC-9
To report suspected copying, please call 1-800-PIRATES.
Fundamentals of Novell eDirectory
Summary  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  10-62
SECTION 11      Backup and Restore eDirectory
Objectives  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  11-1
Objective 1      Identify eDirectory Disaster Recovery Issues . . . . . . . . . . . . . 11-1
eDirectory Disaster Recovery Issues  . . . . . . . . . . . . . . . . . . .    11-2
Causes of Server Crashes . . . . . . . . . . . . . . . . . . . . . . . . . . . .    11-2
The Importance of Server Documentation . . . . . . . . . . . . . . .    11-3
Objective 2      Configure eDirectory Backup in iManager . . . . . . . . . . . . . . . 11-3
eDirectory Backup Wizard Features  . . . . . . . . . . . . . . . . . . .    11-5
How the Restore Wizard Works   . . . . . . . . . . . . . . . . . . . . . .    11-6
How Roll-Forward Logs Work  . . . . . . . . . . . . . . . . . . . . . . .    11-7
Create an eDirectory Backup . . . . . . . . . . . . . . . . . . . . . . . .    11-15
Exercise 11-1 Create an eDirectory Backup
with iManager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  11-19
 
Objective 3      Configure an eDirectory Backup with eMBox . . . . . . . . . . . 11-21
Configure Backup Settings with the Backup eMTool  . . . . .    11-22
Execute a Backup Operation Using the Backup eMTool   . .    11-25
Exercise 11-2 Creating a Backup with eMBox. . . . . . . . . . . .  11-27
 
Objective 4      Create an eDirectory Backup with ndsbackup  . . . . . . . . . . . 11-28
Exercise 11-3 Create an eDirectory Backup
Using ndsbackup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  11-30
 
Objective 5      Restore eDirectory from a Backup  . . . . . . . . . . . . . . . . . . . . 11-31
Perform a Restore Using iManager  . . . . . . . . . . . . . . . . . . .    11-31
Perform a Restore Using the Restore eMTool . . . . . . . . . . .    11-36
Perform a Restore Using ndsbackup  . . . . . . . . . . . . . . . . . .    11-37
Exercise 11-4 Restore eDirectory Objects . . . . . . . . . . . . . . .  11-38
Backup and Restore Tips  . . . . . . . . . . . . . . . . . . . . . . . . . . .    11-39
Summary  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  11-41
 
TOC-10               Copying all or part of this manual, or distributing such copies, is strictly prohibited.     Version 1
To report suspected copying, please call 1-800-PIRATES.Introduction
 

上一条 下一条
 
Copyright © Beihang University.All Rights Reserved 版权所有:北航软件学院
地址:北京市海淀区学院路37号 邮编:100191 电话:82338510 电子邮箱:baoming@buaa.edu.cn
网站访问统计:759968 人次