Novells Guide to Troubleshooting eDirectory

     
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

packets (SLP)

       structure of   2nd  

parent-child relationships

        user -created partitions   2nd  

paritions

       disk space

               administration guidelines   2nd   3rd   4th  

PARTITIO .NDS file (NDS 6 DIB)   2nd   3rd  

partition size check

       health checks   2nd   3rd   4th  

partitions

       background processes

               Change Replica Type operation   2nd   3rd   4th  

               Create Replica operation   2nd  

               Delete Replica operation   2nd  

               Merge Partition operation   2nd  

               Move Partition operation   2nd   3rd   4th   5th   6th   7th   8th   9th   10th  

               Rename Partition operation   2nd  

               Split Partition operation   2nd   3rd  

       Bindery  

               ID number   2nd  

       External Reference  

               ID number   2nd  

       health checks

               DS server backups   2nd   3rd  

               replica additions  

               replica removal  

               replica type changes   2nd  

               TTS settings   2nd   3rd  

       joining   2nd  

       limitations

               administrative account protections  

       managemtn of (ConsoleOne)  

       multithreaded synchronization  

       replicas   2nd  

               data recovery scenarios   2nd   3rd   4th  

       Schema  

               ID number  

       server replicas

               DSMaster   2nd  

       splitting  

       subtrees

               moving   2nd   3rd  

       synchronization

               retrieving (NDS iMonitor)  

       synchronization status

               viewing (NDS iManager)  

       System  

               ID number   2nd  

               information contained   2nd  

       system-created  

        tree-walking example   2nd  

       user-created  

               parent-child relationships   2nd  

               replica types   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th  

Password Policy Manager (PPM) for NDS  

passwords

       administration utilities

               evolution of   2nd   3rd   4th   5th   6th  

       administrative accounts

               frequency of changes  

       administrative security

               lengths  

       lost

               recovering (third-party data recovery tools)   2nd  

       Password Policy Manager (PPM) for NDS  

       strong

               characteristics  

       Supervisor User (Bindery Services)   2nd  

people skills

       network administrators   2nd   3rd  

performance

       Bindery Services  

       system bottlenecks

               troubleshooting (NDS iMonitor)  

performance tuning

       cache memory

               background cleaner process   2nd  

               limit calculations   2nd   3rd   4th   5th   6th  

               setting configurations (DSTrace utility)   2nd  

               setting configurations (NDS iMonitor)  

               setting configurations (NDSDB.INI file)   2nd   3rd   4th   5th   6th  

               statistics monitoring   2nd   3rd  

       cache memory adjustments to directory services (DS) version 7   2nd   3rd  

       cache memory adjustments to directory services (DS) version 8   2nd   3rd  

       cache memory adjustments to eDirectory   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st  

       databases

               block sizes   2nd  

       indexes   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th   14th   15th   16th   17th   18th   19th   20th   21st   22nd   23rd   24th   25th   26th   27th   28th  

               attribute determination   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th  

               Auto Added  

               FLAIM (Flexible Adaptive Information Manager)  

               management of (ConsoleOne)   2nd   3rd   4th  

               management of (iManager)   2nd   3rd   4th  

               matching rules   2nd   3rd  

               operational  

               query performance   2nd   3rd  

               status of  

               system  

               usage guidelines   2nd   3rd   4th  

               User Defined  

       memory distribution

               entry versus block caches (eDirectory)  

       replication latency

               reducing   2nd  

       Unix systems   2nd   3rd   4th   5th   6th   7th   8th   9th  

               cache subsystems   2nd  

               file system selection   2nd  

               thread usage   2nd   3rd  

periods

       objects

               trailing period rule   2nd  

               use in naming  

Perl

       modules

               Comprehensive Perl Archive Network (CPAN)  

Perl 5 for NetWare

       scripting language tools  

PHP for NetWare  

physical security  

       firewalls  

       Kanguru Encryptor

               server encryption device  

       wireless networks

               WEP encryption  

pipes

       awk language   2nd   3rd   4th   5th  

planning stage

       management strategies   2nd  

platform agents

       NNA auditing service component   2nd   3rd  

platforms

       NDS version numbers

               determining (DSREPAIR.NLM)   2nd  

               determining (MODULE command)  

policies (security)

       administrative account protection   2nd   3rd   4th   5th  

               accountability   2nd  

               auditing (Auditcon utility)   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

               auditing (NNA auditing service)   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th   12th   13th  

               container intruder detection  

               inherited rights, blocking   2nd  

               logical portions of trees  

               login script protection   2nd   3rd   4th   5th   6th   7th  

               network address restrictions   2nd  

               partition limitations  

               password change frequency  

               schema protection   2nd  

               security equivalencies evaluations   2nd   3rd  

               workstation limitations  

       administrative container structure   2nd  

       elements of   2nd  

       explicit tree rights  

       password lengths  

       principles of   2nd   3rd  

pre-defined indexes   2nd  

Predicate Stats object  

       configuring   2nd   3rd   4th   5th   6th   7th  

       usage guidelines   2nd  

Presence matching rule (indexes)  

preventive network management

       troubleshooting guidelines   2nd  

primary obituaries   2nd   3rd   4th   5th   6th   7th  

Primary time servers

       client combinations   2nd  

       time information

               polling process   2nd  

privileges

       tree access

               ConsoleOne   2nd  

problems

       categories

               communication  

               replica synchronization  

               time synchronization  

       cause determination

               troubleshooting process   2nd  

       debriefing sessions

               troubleshooting process   2nd  

       documentation of solutions

               troubleshooting process   2nd  

       dollar cost  

       formulation of solutions

               troubleshooting process   2nd   3rd  

       identifying

               troubleshooting process   2nd   3rd   4th  

       implementation of solutions

               troubleshooting process   2nd  

       manifestation of  

       ranking of solutions

               troubleshooting process   2nd   3rd  

        recurrence of

               avoiding   2nd  

       size of  

       verification of solutions

               troubleshooting process   2nd  

procedures

       administration guidelines

               following   2nd   3rd   4th  

processes  

       object- related  

               A DSA Add Entry Request (Listing 6.4)  

               A DSA Add Entry Request with Failure (Listing 6.5)  

               object creation   2nd   3rd  

               object deletion   2nd   3rd   4th  

               object moves   2nd   3rd   4th   5th   6th   7th   8th   9th   10th   11th  

               object renaming   2nd   3rd   4th  

processing

       obituaries

               object deletion   2nd   3rd   4th  

programming

       NDS considerations

               directory content data maintenance  

               directory context data maintenance  

               local buffer management   2nd   3rd  

               naming conventions  

               Unicode table initialization   2nd  

       NDS tools

               ActiveX Controls for Novell Services   2nd   3rd   4th   5th   6th   7th  

               Delphi Libraries for Novell Services  

               JavaBeans  

               JNDI APIs  

               Visual Basic Libraries for Novell Services   2nd  

programming languages

       awk  

       text file manipulations  

Programming PERL  

promiscuous mode (NIC operations)  

Protocol Analysis Institute Web site  

protocol analyzers  

       Ethereal

               features summary   2nd  

       Network Associates Sniffer  

       Novell LANalyzer for Windows  

       Web site resources  

Protocom SecureConsole  

Protocom.com Web site  

proxy users

       LDAP services

               anonymous bind settings   2nd   3rd   4th   5th  

               configuring   2nd   3rd   4th   5th  

Purgeable stage (obituaries)   2nd  

 

Категории