Sun Certified Solaris(tm) 9 System and Network Administrator All-in-One Exam Guide

NIS+ is a Solaris network information service whose primary focus is the management of users, hosts , networks, services, and protocols. NIS+ does not replace DNS, however. DNS is still required for host addressing and identification. However, NIS+ namespaces can be constructed to parallel the host designations assigned through DNS, to simplify operations, and to make the integration of both services more seamless. NIS+ gives networks more than just DNS: namespaces are used as centralized repositories of shared network information that can be used to more effectively manage large networks. However, many organizations choose not to use NIS+ because it has some overlap with DNS, and because of the extra administrative burden involved in installing and configuring NIS+ primary and slave servers. However, if you use the NIS+ scripts to install and configure namespaces, instead of using NIS+ commands direct, NIS+ can be much easier to configure.

NIS revolves around the idea of maps: a map is generally a database with two columns , of which one is a primary key that is used to retrieve an associated value. This associative nature makes the storage and retrieval of group , mail, passwords, and Ethernet information fast for small networks, but can rapidly become difficult to manage (not to mention slow) for large networks. NIS+, in contrast, uses tables, of which 16 are defined by the system. Tables store information like server addresses, time zones, and networks services. In this section, we review the most commonly used types of NIS maps and NIS+ tables.

First, however, we present a conceptual overview of how NIS+ could be used to better manage an organization s network data. Let s imagine that we re setting up a Solaris network for an imaginary college called Panther College, which has a DNS domain of panther.edu . Panther has two teaching divisions: an undergraduate school ( undergrad.panther.edu ) and a graduate school ( graduate.panther.edu ). panther.edu has a Class C network (192.12.1.0), as do each of the undergraduate (192.12.2.0) and graduate schools (192.12.3.0). Each of these networks can have up to 254 hosts each, which more than adequately covers the staff members in both teaching divisions. To support DNS, there may be a campus-wide DNS server ns.panther.edu at 192.12.10, while the undergrad.panther.edu network has its own DNS server at ns.undergrad.panther.edu (192.12.2.0), and ns.graduate.panther.edu (192.12.3.0). This is a fairly standard setup for a medium- sized network like a college campus, and is demonstrated in Figure 27-1.

Figure 27-1: DNS configuration for a fictional college with two divisions: graduate and undergraduate, both of which have their own name server.

The NIS+ domains for Panther College can exactly mirror the DNS configuration, as shown in Figure 27-2. However, some differences in naming are immediately apparent: while DNS uses lowercase names by convention, which do not terminate in a period, the NIS+ convention is to name write elements in a domain beginning with capital letters , and terminating with a period.

Figure 27-2: NIS+ domains for Panther College.

In addition, the second-level domain identified in DNS as panther.edu would be the root domain in a NIS+ network, and the third-level domains undergrad.panther.edu and graduate.panther.edu would be described as nonroot domains. Each of these domains would be associated with a server, in which case the existing DNS servers would double up as NIS+ servers. In fact, in normal NIS+ usage, each of the three domains at Panther College would require two servers: a master server and at least one replica or slave server. This ensures that if the master server is disrupted or experiences hardware failure, the replica server holds copies of network service information. The expanded NIS+ domains for Panther College, with a master and slave server each (called Master and Replica), are shown in Figure 27-3.

Figure 27-3: NIS+ domains with a master and a slave server each.

In addition to domains and servers, NIS+ also caters to clients . Each client is associated with a specific server and domain. For example, a client in the chemistry lab in the graduate school ( Curie.Graduate.Panther.Edu .) would be served by Master.Graduate.Panther.Edu. , and would be part of the Graduate.Panther.Edu. domain. Alternatively, a history professor in the undergraduate school with a computer named FDR.Undergrad.Panther.Edu would be served by Master.Undergrad.Panther.Edu. , and would be part of the Undergrad.Panther.Edu. domain. Figure 27-4 shows the hierarchy of control for the FDR.Undergrad.Panther.Edu. client. When each client is installed, a directory cache is created, which enables the client to locate other hosts and services via the appropriate server.

Figure 27-4: Hierarchy of control for a specific domain client (FDR.Undergrad.Panther.Edu.).

So far, we have mentioned only one of the many kinds of namespace components: the domain. However, there are many other components that exist in the namespace, including group objects, directory objects, and table objects. We will examine these important features of the namespace in the following sections. In addition, we ll review the specific configuration of NIS maps and NIS+ tables.

It is worth mentioning at this point that one of the main reasons that organizations choose to implement NIS+ is the improved security that accompanies the system. For example, NIS+ tables are not directly editable, unlike their normal Solaris counterparts in the /etc directory. Requests to change or even access information in the namespace can only take place once a user has been authenticated. In addition to authentication, each user must be authorized to access a particular resource. This doubly protects sensitive and organizational data in a networked environment. The main authentication exchange takes place when either a user presents their credentials or a host presents its credentials, in an unencrypted LOCAL form or a more secure DES-encrypted exchange. The former is used for testing, while the latter is always used for deployment. After authentication, authorization for the requested resource is checked.

Tip  

Access rights can always be examined by using the niscat command, which is discussed later in this chapter in the section "niscat".

NIS Maps

As we mentioned previously, NIS used a series of maps to encode data about the network structure. Many of these are in a form that can be accessed through an address key (having a byaddr suffix), or through a name (with a byname suffix). Whenever a client needs to find information about a particular host, service, group, network, or netgroup , it can be retrieved by consulting the appropriate map as defined in the namespace. The main system maps are

As we can see, there are many similarities in name and function between the NIS maps and the /etc system files they are intended to replace. However, both the /etc files and NIS maps perform poorly under heavy loads when the number of hosts defined in a specific namespace exceeds the hundreds. In this case, it is much more appropriate to bypass NIS and /etc , and move directly to an NIS+ installation where a single table (such as Ethers) replaces the dual lookup system used by NIS (such as ethers.byname and ethers.byaddr).

NIS+ Tables

Namespace information in NIS+ is stored in tables that are based around a centralized administration model, even though particular functions can be delegated to specific servers. NIS+ is similar to DNS because it arranges hosts and resources hierarchically into domains, it has built-in redundancy with master and slave servers, and it can store much more information about a network than just its hosts. However, since each host in a domain has many different characteristics and user details that must be recorded and stored centrally , updating these details can be time-consuming . In addition, issues like contention in the recording of user and host data often arise. However, NIS+ namespaces can be updated incrementally as changes occur, so that the entire database does not need to be updated immediately. Changes are entered into a master domain server and are then propagated through time to the rest of the domain. This process is governed by a time-to-live setting similar to that used for DNS. Commonly used tables include:

 
 
   

Категории