| [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] packets (SLP) structure of 2nd parent-child relationships user -created partitions 2nd paritions disk space administration guidelines 2nd 3rd 4th PARTITIO .NDS file (NDS 6 DIB) 2nd 3rd partition size check health checks 2nd 3rd 4th partitions background processes Change Replica Type operation 2nd 3rd 4th Create Replica operation 2nd Delete Replica operation 2nd Merge Partition operation 2nd Move Partition operation 2nd 3rd 4th 5th 6th 7th 8th 9th 10th Rename Partition operation 2nd Split Partition operation 2nd 3rd Bindery ID number 2nd External Reference ID number 2nd health checks DS server backups 2nd 3rd replica additions replica removal replica type changes 2nd TTS settings 2nd 3rd joining 2nd limitations administrative account protections managemtn of (ConsoleOne) multithreaded synchronization replicas 2nd data recovery scenarios 2nd 3rd 4th Schema ID number server replicas DSMaster 2nd splitting subtrees moving 2nd 3rd synchronization retrieving (NDS iMonitor) synchronization status viewing (NDS iManager) System ID number 2nd information contained 2nd system-created tree-walking example 2nd user-created parent-child relationships 2nd replica types 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th Password Policy Manager (PPM) for NDS passwords administration utilities evolution of 2nd 3rd 4th 5th 6th administrative accounts frequency of changes administrative security lengths lost recovering (third-party data recovery tools) 2nd Password Policy Manager (PPM) for NDS strong characteristics Supervisor User (Bindery Services) 2nd people skills network administrators 2nd 3rd performance Bindery Services system bottlenecks troubleshooting (NDS iMonitor) performance tuning cache memory background cleaner process 2nd limit calculations 2nd 3rd 4th 5th 6th setting configurations (DSTrace utility) 2nd setting configurations (NDS iMonitor) setting configurations (NDSDB.INI file) 2nd 3rd 4th 5th 6th statistics monitoring 2nd 3rd cache memory adjustments to directory services (DS) version 7 2nd 3rd cache memory adjustments to directory services (DS) version 8 2nd 3rd cache memory adjustments to eDirectory 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st databases block sizes 2nd indexes 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th attribute determination 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th Auto Added FLAIM (Flexible Adaptive Information Manager) management of (ConsoleOne) 2nd 3rd 4th management of (iManager) 2nd 3rd 4th matching rules 2nd 3rd operational query performance 2nd 3rd status of system usage guidelines 2nd 3rd 4th User Defined memory distribution entry versus block caches (eDirectory) replication latency reducing 2nd Unix systems 2nd 3rd 4th 5th 6th 7th 8th 9th cache subsystems 2nd file system selection 2nd thread usage 2nd 3rd periods objects trailing period rule 2nd use in naming Perl modules Comprehensive Perl Archive Network (CPAN) Perl 5 for NetWare scripting language tools PHP for NetWare physical security firewalls Kanguru Encryptor server encryption device wireless networks WEP encryption pipes awk language 2nd 3rd 4th 5th planning stage management strategies 2nd platform agents NNA auditing service component 2nd 3rd platforms NDS version numbers determining (DSREPAIR.NLM) 2nd determining (MODULE command) policies (security) administrative account protection 2nd 3rd 4th 5th accountability 2nd auditing (Auditcon utility) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th auditing (NNA auditing service) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th container intruder detection inherited rights, blocking 2nd logical portions of trees login script protection 2nd 3rd 4th 5th 6th 7th network address restrictions 2nd partition limitations password change frequency schema protection 2nd security equivalencies evaluations 2nd 3rd workstation limitations administrative container structure 2nd elements of 2nd explicit tree rights password lengths principles of 2nd 3rd pre-defined indexes 2nd Predicate Stats object configuring 2nd 3rd 4th 5th 6th 7th usage guidelines 2nd Presence matching rule (indexes) preventive network management troubleshooting guidelines 2nd primary obituaries 2nd 3rd 4th 5th 6th 7th Primary time servers client combinations 2nd time information polling process 2nd privileges tree access ConsoleOne 2nd problems categories communication replica synchronization time synchronization cause determination troubleshooting process 2nd debriefing sessions troubleshooting process 2nd documentation of solutions troubleshooting process 2nd dollar cost formulation of solutions troubleshooting process 2nd 3rd identifying troubleshooting process 2nd 3rd 4th implementation of solutions troubleshooting process 2nd manifestation of ranking of solutions troubleshooting process 2nd 3rd recurrence of avoiding 2nd size of verification of solutions troubleshooting process 2nd procedures administration guidelines following 2nd 3rd 4th processes object- related A DSA Add Entry Request (Listing 6.4) A DSA Add Entry Request with Failure (Listing 6.5) object creation 2nd 3rd object deletion 2nd 3rd 4th object moves 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th object renaming 2nd 3rd 4th processing obituaries object deletion 2nd 3rd 4th programming NDS considerations directory content data maintenance directory context data maintenance local buffer management 2nd 3rd naming conventions Unicode table initialization 2nd NDS tools ActiveX Controls for Novell Services 2nd 3rd 4th 5th 6th 7th Delphi Libraries for Novell Services JavaBeans JNDI APIs Visual Basic Libraries for Novell Services 2nd programming languages awk text file manipulations Programming PERL promiscuous mode (NIC operations) Protocol Analysis Institute Web site protocol analyzers Ethereal features summary 2nd Network Associates Sniffer Novell LANalyzer for Windows Web site resources Protocom SecureConsole Protocom.com Web site proxy users LDAP services anonymous bind settings 2nd 3rd 4th 5th configuring 2nd 3rd 4th 5th Purgeable stage (obituaries) 2nd |