Novells Guide to Troubleshooting eDirectory

     
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

C language

       NLM development  

       programming for disaster recovery   2nd   3rd   4th   5th   6th  

       source code example

               telephone attributes, modifying   2nd   3rd   4th  

C++ language

       NLM development

               disadvantages  

               Metrowerks CodeWarrior  

cache memory

       directory services (DS) version 7

               performance considerations   2nd   3rd  

       directory services (DS) version 8

               performance considerations   2nd   3rd  

       eDirectory

               background cleaner process   2nd  

               configuring (DSTrace utility)   2nd  

               configuring (NDS iMonitor)  

               configuring (NDSDB.INI file)   2nd   3rd   4th   5th   6th  

               limit calculations   2nd   3rd   4th   5th   6th  

               performance considerations   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st  

               statistics monitoring   2nd   3rd  

       entry versus block caches

               performance considerations  

       limit calculations

               Dynamic Adjust mode   2nd   3rd   4th   5th   6th  

               Hard Limit mode   2nd   3rd   4th   5th   6th  

       low dirty   2nd   3rd  

       maximum dirty   2nd   3rd  

       Unix systems

               performance tuning   2nd  

cache statistics check

       health checks   2nd  

chaining resolution model (LDAP)   2nd   3rd   4th   5th   6th  

Change Replica Type operation

       background processes   2nd   3rd  

               -637 error  

class flags   2nd   3rd  

classes

       (objects)  

       attributes   2nd  

               mandatory   2nd  

               naming   2nd   3rd  

               operational   2nd  

               optional   2nd  

               syntaxes   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

       auxiliary

               usage rules   2nd   3rd  

       containment  

       definitions

               table listing   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th   31st   32nd   33rd   34th   35th   36th   37th   38th   39th  

       effective   2nd  

       mandatory attributes  

        names  

       naming rules/restrictions   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

       non-effective   2nd   3rd  

       optional attributes  

       schema changes from NDS 8   2nd  

       superclasses  

client agents

       servers

               role in tree-walking  

clients

       API library

               DS errors   2nd   3rd   4th   5th  

       Bindery Service

               connection issues   2nd  

               Native File Access Pack (NFAP)  

       error codes listing   2nd  

               API library   2nd   3rd   4th   5th   6th   7th  

       server-based API library

               DS errors   2nd   3rd  

       tree-walking

               uses   2nd  

command-line switches

       DSRepair utility   2nd   3rd   4th   5th   6th   7th  

communication

       problem category  

communication- related DS errors   2nd   3rd  

components

       iManager requirements   2nd  

Comprehensive Perl Archive Network (CPAN)

       Perl modules  

concurrent logins

       maximum limit

               security risks   2nd   3rd   4th  

configuring

       auditing options (Auditcon utility)  

       disk space options (Auditcon utility)  

       reporting options (Auditcon utility)   2nd  

        user restriction options (Auditcon utility)  

connection tables

       management of (DHost)  

Connectotel.com Web site  

console security

       kernel debugger

               breaking into  

       offline attack prevention   2nd   3rd   4th   5th   6th   7th  

               screen locks   2nd   3rd  

               SecureConsole  

               SSLock for NDS   2nd  

       remote access measures

               NetWare Loadable Modules (NLMs)  

ConsoleOne

       DS trees

               privileges   2nd  

       file system rights

               troubleshooting   2nd   3rd   4th  

       functional overview   2nd   3rd   4th  

       indexes

               managing   2nd   3rd   4th  

       main screen   2nd  

       memory leakage  

       partitions

               management of  

       performance strategies   2nd  

       platform support  

       replicas

               synchronization checks   2nd  

       Schema Manager

               schema protection features   2nd  

       schema names

               NDS versus LDAP terminology   2nd   3rd   4th  

       single-objects

               managing   2nd   3rd   4th   5th  

       snap-ins

               loading  

containers

       administrative security   2nd  

       auditing (Auditcon utility)   2nd  

       intruder detection

               administrative account protection  

       NDS 8

               FLAIM databases   2nd  

containment (classes)  

contexts

       bindery services

               setting up   2nd  

       objects

               naming rules/restrictions  

controls (LDAP)   2nd   3rd   4th   5th   6th   7th   8th   9th  

cracking tools  

crashed SYS volumes

       data recovery scenarios   2nd   3rd   4th   5th  

Create Replica operation

       background processes   2nd  

creating

       UImport data files

               awk language   2nd   3rd   4th  

creation timestamp

       Janitor process  

Critical Value Reset (CVR) channel  

CRON.NLM automation utility   2nd   3rd   4th   5th  

CVR (Critical Value Reset) channel  

 

Категории