Novells Guide to Troubleshooting eDirectory

     
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

eDirectory

       cache memory

               statistics monitoring   2nd   3rd  

       cache memory adjustments

               background cleaner process   2nd  

               limit calculations   2nd   3rd   4th   5th   6th  

               performance considerations   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st  

               setting configurations (DSTrace utility)   2nd  

               setting configurations (NDS iMonitor)  

               setting configurations (NDSDB.INI file)   2nd   3rd   4th   5th   6th  

       database block sizes

               performance tuning   2nd  

       evolution from NetWare Directory Services (NDS)  

       indexes

               attribute determination   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

               Auto Added  

               management of (ConsoleOne)   2nd   3rd   4th  

               management of (iManager)   2nd   3rd   4th  

               matching rules   2nd   3rd  

               operational  

               performance considerations   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th  

               pre-defined   2nd  

               query performance   2nd   3rd  

               status of  

               system  

               usage guidelines   2nd   3rd   4th  

               User Defined  

       LDAP extensions

               querying support for   2nd   3rd   4th  

       LDAP Server for NDS

               authentication support   2nd  

               entries, manipulating  

               schema definitions, manipulating  

       memory distribution

               entry versus block caches  

       resources

               Web sites   2nd  

       schema mapping to LDAP server   2nd   3rd   4th  

       Unix systems

               cache subsystems   2nd  

               file system selection   2nd  

               performance tuning   2nd   3rd   4th   5th   6th   7th   8th   9th  

               thread usage   2nd   3rd  

       version numbers

               confusion   2nd   3rd   4th  

               confusion over  

               table listing   2nd   3rd  

       versus LDAP Server for NDS

               terminology differences   2nd   3rd   4th  

eDirectory Backup eMTool

       benefits   2nd  

       drawbacks   2nd  

       hot continuous backups   2nd   3rd  

       iManager requirements  

       restore process   2nd   3rd  

       restore verification process

               transitive vectors   2nd  

       roll-forward logs   2nd   3rd  

               configuring   2nd   3rd   4th  

               maintenance of   2nd   3rd   4th  

       servers

               backup process   2nd   3rd   4th   5th  

               restoration process   2nd   3rd   4th   5th   6th  

               restore verification process failures   2nd   3rd   4th   5th  

eDirectory Management Toolbox (eMBox)  

       batch mode  

       client execution   2nd   3rd   4th  

       interactive mode   2nd   3rd  

       internal batch files  

       list command   2nd  

       logins  

       RBS collection object requirements   2nd  

effective classes   2nd  

Effective eDirectory Design & Proactive Analysis  

eMBox

       (eDirectory Management Tool Box)  

       graphical mode  

       local databases

               repairing  

       troubleshooting functions  

       versus NDS iManager

               troubleshooting usage  

eMTool

       database backups   2nd  

enabling

       bindery services

               on NetWare servers  

               on Unix platforms  

               on Windows platforms  

       Bindery Services

               verification of   2nd  

entry caches

       memory distribution with block caches  

ENTRY.NDS file (NDS 6 DIB)   2nd   3rd   4th   5th  

       sibling objects  

error codes

       client API library   2nd   3rd   4th   5th   6th   7th  

       interpretation of

               troubleshooting guidelines   2nd  

       Novell Web site documentation  

       server operating system   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th  

       server-based specific client API library   2nd   3rd   4th  

       sources

                clients   2nd   3rd   4th   5th   6th   7th   8th   9th  

               directory services agent (DSA)   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th   29th   30th   31st   32nd   33rd   34th   35th   36th   37th   38th   39th   40th  

               servers   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st  

       table listing   2nd  

errors  

       -698

               incremental replication   2nd  

Ethereal

       protocol analyzer functions   2nd  

event chaining  

Event Services (LDAP Server for NDS)

       supported events   2nd   3rd  

event signing  

event system (DHost)  

events

       Auditcon utility

               audit uses  

               Auditcon utility   2nd   3rd  

               range of coverage  

       chaining  

       NNA

               listing of covered events  

       NNA auditing service  

       nonreplicated

               logging (NNA)  

       replicated

               logging (NNA)  

       signing  

excessive file system rights

       security risks   2nd   3rd   4th   5th   6th  

extended schema (objects)  

extensions

       schemas  

extensions (LDAP)   2nd   3rd   4th   5th   6th  

       ICE-specific   2nd  

       persistent search  

       querying support in eDirectory   2nd   3rd   4th  

external attacks

       preventing   2nd   3rd   4th  

External Reference partition  

       ID number   2nd  

external referenced objects

       deleting (Flat Cleaner process)  

external references

       object placeholders  

external references check

       health checks   2nd   3rd   4th  

 

Категории