Edge / Barker / Schwiebert | Beginning Mac OS X Snow Leopard Server | E-Book | www2.sack.de
E-Book

E-Book, Englisch, 640 Seiten

Edge / Barker / Schwiebert Beginning Mac OS X Snow Leopard Server

From Solo Install to Enterprise Integration
1. ed
ISBN: 978-1-4302-2773-1
Verlag: Apress
Format: PDF
Kopierschutz: 1 - PDF Watermark

From Solo Install to Enterprise Integration

E-Book, Englisch, 640 Seiten

ISBN: 978-1-4302-2773-1
Verlag: Apress
Format: PDF
Kopierschutz: 1 - PDF Watermark



This book is intended for those who need to get things done with Mac OS X Server 10.6. As such, you can use this book two ways. Those new to Mac OS X Server can read straight through the entire book, and by the end should feel competent to administer any Mac server thrown their way. For those with some knowledge of Mac OS X Server, or perhaps a thorough knowledge of other Unix-based servers, the book is arranged by tasks so that you can either start reading at any point, skipping material you already know, or pick and choose the chapters you'll find most helpful to your own work or system needs. This task-oriented approach also makes the book useful as a general reference for all aspects of Mac OS X Server. Throughout the book, special emphasis is given to the new features of the latest release, Mac OS X Server 10.6, a.k.a. Server Snow Leopard. For instance, you'll find out how to integrate an iPhone with Mac OS X Server using the new Mobile Access features, or how to install an SSL certificate in the web service, Apache. Task-oriented approach to server administration makes it easy to find and accomplish what needs to get done Thorough subject coverage including workflows for Mac OS X Snow Leopard Server GUI-level features, command-line features, and alternatives Features introductory material for new administrators, emphasis on new features for upgrading to Snow Leopard Server, and more advanced material for experienced IT and enterprise administrators who want to get the most out of Mac OS X Snow Leopard Server

Charles Edge has been working with Apple products since he was a child. Professionally, Charles started with the Mac OS and Apple server offerings in 1999 after years working with various flavors of Unix. Charles began his consulting career working with Support Technologies and Andersen Consulting. In 2000, he found a new home at 318, Inc., a consulting firm in Santa Monica, California which is now the largest Mac consultancy in the country. At 318, Charles leads a team of over 40 engineers and has worked with network architecture, security and storage for various vertical and horizontal markets. Charles has spoken at a variety of conferences including DefCon, BlackHat, LinuxWorld, MacWorld and the WorldWide Developers Conference. Charles' first book, Mac Tiger Server Little Black Book, can be purchased through Paraglyph Press. Charles recently hung up his surfboard and moved to Minneapolis, Minnesota, with his wife, Lisa. Charles can be contacted at krypted@mac.com.

Edge / Barker / Schwiebert Beginning Mac OS X Snow Leopard Server jetzt bestellen!

Weitere Infos & Material


1;Title Page;1
2;Copyright Page;2
3;Contents at a Glance;4
4;Table of Contents;5
5;About the Authors;13
6;About the Technical Reviewers;14
7;Acknowledgments;15
8;Chapter 1 Welcome to OS X Server;17
8.1;What Is a Server Anyway?;18
8.2;What This Book Is;18
8.3;How This Book Is Organized;19
8.4;Before You Begin;22
8.4.1;Hardware;22
8.4.1.1;No Xserve? No Problem!;22
8.4.1.2;And No Problem with the Xserve Either;23
8.4.1.3;Other Hardware Options;23
8.5;Get Ready!;23
8.6;Summary;25
9;Chapter 2 Setting Up a Server in 30 Minutes or Less;26
9.1;Before You Begin;26
9.1.1;Network Considerations;27
9.2;Installing Mac OS X Server 10.6;28
9.3;Welcome to Mac OS X Server 10.6;32
9.3.1;Creating the Administrator Account;35
9.3.2;Configuring the Network Interface;37
9.3.2.1;Setting Up the Network Names;38
9.3.2.2;Wrapping Up the Server Setup;39
9.3.3;What to Do After Server Setup Completes;39
9.3.3.1;Sanity Checking DNS;40
9.3.3.2;Updating the Server;43
9.3.4;Building the Fileserver;44
9.3.4.1;Creating the Open Directory Master;46
9.3.4.2;Creating Users and Groups;50
9.3.4.3;Creating Share Points;52
9.4;Summary;58
10;Chapter 3 Getting Deeper into File Sharing;59
10.1;Installing the Server Administration Tools;59
10.2;Adding a Server to Server Admin;60
10.3;Server Admin Basics;63
10.4;Apple Filing Protocol (AFP);69
10.4.1;AFP’s Main Settings;70
10.4.1.1;Overview;70
10.4.1.2;Logs;70
10.4.1.3;Graphs;70
10.4.1.4;Connections;70
10.4.1.5;Settings;72
10.4.1.6;Share Points;77
10.4.1.7;Share Point Permissions and ACLs;79
10.4.1.8;Share Point Settings;85
10.4.1.9;AFP Protocol Settings;89
10.4.1.10;SMB Protocol Settings;90
10.4.1.11;NFS Protocol Settings;92
10.5;Server Message Block (SMB);98
10.5.1;SMB’s Main Settings;98
10.5.1.1;Overview;98
10.5.1.2;Logs;98
10.5.1.3;Graphs;99
10.5.1.4;Connections;99
10.5.1.5;Share Points;99
10.5.1.6;Settings;99
10.5.1.6.1;General Settings;99
10.5.1.6.2;Access Settings;101
10.5.1.6.3;Logging;102
10.5.1.6.4;Advanced;103
10.6;File Transfer Protocol (FTP);105
10.6.1;FTP’s Main Settings;105
10.6.1.1;Overview;106
10.6.1.2;Log;106
10.6.1.3;Graphs;106
10.6.1.4;Connections;106
10.6.1.5;Share Points;106
10.6.1.6;Settings;106
10.6.1.6.1;General;106
10.6.1.6.2;Messages;108
10.6.1.6.3;Logging;109
10.6.1.6.4;Advanced;110
10.7;Network File System (NFS);112
10.7.1;NFS’s Main Settings;112
10.7.1.1;Overview;112
10.7.1.2;Connections;112
10.7.1.3;Share Points;112
10.7.1.4;Settings;113
10.8;Summary;114
11;Chapter 4 Managing Directory Services;115
11.1;Understanding the Components of a Directory Service;115
11.1.1;LDAP;116
11.1.2;Kerberos;117
11.1.3;Password Server;118
11.2;Preparing to Set Up Open Directory;118
11.3;Understanding Open Directory Roles;119
11.3.1;Setting Up an Open Directory Master;119
11.3.2;Configuring an Open Directory Replica;121
11.3.2.1;Using slurpd;122
11.3.2.2;Creating an Open Directory Replica;122
11.4;Managing Open Directory;123
11.4.1;Securing Open Directory;123
11.4.1.1;Configuring Binding Policies;124
11.4.1.2;Setting Global Password Policies;124
11.4.1.3;Considering Tiered Administration;127
11.4.1.4;Setting Access Controls;127
11.4.2;Backing Up Open Directory;128
11.5;Managing Objects with Workgroup Manager;130
11.5.1;Using Server Preferences;130
11.5.2;Using Workgroup Manager;137
11.5.2.1;Creating a User;137
11.5.2.2;Creating a Group;142
11.5.2.3;Creating Computer Groups;144
11.5.3;Configuring Policies;146
11.5.3.1;Automating Client Connections with Automounts and Home Directories;148
11.5.4;Inspecting Records;154
11.6;Binding Clients;156
11.6.1;Implementing Trusted Binding from the Accounts System Preference Pane;157
11.6.2;Binding with Directory Utility;157
11.6.2.1;Choosing Untrusted Binding;157
11.6.2.2;Choosing Trusted Binding;159
11.6.3;Using the Kerberos Realm;161
11.6.4;Search Policies;161
11.7;Summary;162
12;Chapter 5 Controlling Network Traffic;163
12.1;Using Mac OS X Server as a Router;163
12.1.1;How Network Address Translation Works;164
12.1.2;Using the Gateway Setup Assistant;165
12.1.3;Manually Enabling NAT;170
12.1.4;Testing NAT from a Client;171
12.1.5;Setting Up Forwarding Ports;173
12.1.6;Setting the Advanced Options;175
12.2;Using the Firewall to Control Access to the Server;176
12.2.1;Setting Up the Firewall;177
12.2.2;Defining Address Groups;177
12.2.3;Defining Services;179
12.2.4;Creating Rules;181
12.2.5;Preventing Intrusions;183
12.2.6;Setting the Global Firewall Options;183
12.2.7;Configuring the Firewall from the Command Line;183
12.2.8;Testing the Firewall;184
12.3;Summary;185
13;Chapter 6 Centralizing Network Services;187
13.1;DHCP;187
13.1.1;Creating a Subnet;191
13.1.2;Reserving IP Addresses;198
13.1.3;DHCP Options;200
13.1.4;Enabling DHCP Relay;201
13.2;DNS;202
13.2.1;Zones and Records;203
13.2.2;Setting Up DNS;203
13.2.3;Adding a Zone;206
13.2.4;Creating Records;207
13.2.5;Setting Up Wide-Area Bonjour;208
13.2.6;Configuring Secondary Zones;211
13.2.7;Editing Configuration Files;212
13.2.8;Editing Zone Files;213
13.2.9;OpenDNS Web Content Filtering;214
13.3;Summary;215
14;Chapter 7 Configuring Network Services for Security;216
14.1;Virtual Private Networking;217
14.1.1;Setting Up a PPTP Server;219
14.1.2;L2TP Servers;221
14.1.3;VPN Clients;223
14.1.4;Configuring the VPN from the Command Line;232
14.1.5;S2SVPN;232
14.2;RADIUS;233
14.2.1;Setting Up the RADIUS Service;233
14.2.2;Setting Up the Apple AirPort;235
14.2.3;Connecting to Cisco;236
14.2.4;From the Command Line;237
14.3;Limiting Access to the VPN and RADIUS Services;238
15;Chapter 8 Managing Client Computers with NetBoot, NetInstall, and NetRestore;240
15.1;Developing an Imaging Strategy;242
15.2;Activating the NetBoot Service;243
15.3;Using System Image Utility;244
15.3.1;Creating a NetBoot Image;244
15.3.2;Creating a NetInstall Image;248
15.3.3;Creating a NetRestore Image;251
15.3.3.1;Preparing a Master System for Imaging;251
15.3.3.2;Configuring a NetRestore Image for Deployment;252
15.4;Configuring the NetBoot Service;255
15.5;Apple Software Restore and Multicast Imaging: a NetRestore Alternative;260
15.5.1;Creating an Image for asr;261
15.5.2;Configuring asr for Multicast Imaging;263
15.5.3;Imaging a Client over asr;266
15.5.4;Automations;267
15.6;NetBooting Client Systems;270
15.7;Summary;271
16;Chapter 9 Configuring Address Book Server;272
16.1;Address Book Services;273
16.2;Setting Up Address Book Server;273
16.2.1;Configuring with Server Preferences;273
16.2.2;Configuring with Server Admin;275
16.2.3;Connecting to the Address Book Server;279
16.2.4;Using the Client;282
16.2.5;Controlling Access;284
16.2.6;Backing Up Address Books;285
16.3;Leveraging the Command Line;286
16.4;Alternatives to Apple’s Address Book Server;288
16.5;Summary;289
17;Chapter 10 Working with iCal Server;290
17.1;Getting Ready to Install iCal Server;290
17.1.1;Configuring iCal Server;291
17.2;Managing the iCal Server;296
17.2.1;Backing Up Calendars;297
17.2.2;Clustering CalDAV;297
17.2.3;Integrating with a Wiki;298
17.2.4;Integrating with Mail;299
17.3;Enabling Calendars for Users;301
17.4;Configuring iCal Clients;302
17.5;Setting Up iCal Clients for Microsoft Windows;309
17.6;Using the Command Line for iCal Services;309
17.6.1;Configuring Services with serveradmin;309
17.6.2;Troubleshooting iCal Server;312
17.6.2.1;Getting the iCal Service to Start;312
17.6.2.2;Resolving Nil Errors;312
17.6.2.3;Getting Uncooperative Clients to Connect;312
17.6.2.4;Finding Errant Log Files;313
17.7;Summary;313
18;Chapter 11 iChat Server;315
18.1;Setting Up iChat Server;316
18.1.1;Setting Up iChat Server Using Server Preferences;316
18.1.2;Setting Up iChat Server Using Server Admin;317
18.1.3;Configuring Advanced Features;318
18.1.4;Setting Up Users;320
18.1.5;Connecting Remotely;321
18.1.6;Prepopulating Buddy Lists;322
18.1.7;Customizing the Welcome Message;322
18.2;Federating iChat;323
18.3;Configuring the Mac OS X Client;324
18.3.1;Setting Up Clients;324
18.3.2;Saving iChat Transcripts;325
18.4;Using the Command Line;326
18.4.1;Using serveradmin;327
18.4.2;Storing Jabber Configuration Files;327
18.5;Summary;328
19;Chapter 12 Setting Up Mail Services;329
19.1;Understanding Mac OS X Server’s Mail Components;329
19.1.1;Protocols;330
19.1.2;Dovecot;330
19.2;Preparing for a Mail Server;331
19.2.1;DNS;331
19.2.2;Firewalls;332
19.3;Enabling Mail Services;332
19.3.1;Server Preferences;332
19.3.2;Server Admin;333
19.3.3;Basic Message Hygiene;334
19.3.4;Choosing Security Protocols;336
19.3.5;Storage;336
19.3.6;Configuring SMTP;337
19.3.7;Securing Mail Services;338
19.4;Configuring a Mail Client;339
19.5;Webmail and Mail Rules;340
19.6;Creating Accounts;342
19.7;Setting Up Mailing Lists;343
19.8;Troubleshooting;344
19.8.1;Disabling Graylisting;344
19.8.2;Troubleshooting Connectivity;345
19.8.3;Identifying and Recovering from Blacklisting;347
19.9;Summary;348
20;Chapter 13 Setting Up Services for Mobile Devices;350
20.1;Installing Mobile Access and Push Notification;350
20.2;Setting Up Mobile Access;351
20.2.1;Design Considerations;352
20.2.2;Configuring Mobile Access;353
20.2.2.1;Configuring the Address Book Proxy;354
20.2.2.2;Configuring the iCal Proxy;355
20.2.2.3;Configuring the Mail Proxy;356
20.2.2.4;Configuring Web Proxy Entries;357
20.2.3;Starting the Service and Checking the Status;358
20.2.4;Controlling Access;359
20.2.5;Connecting Clients;361
20.3;Setting Up Push Notification for the iPhone;361
20.4;Using the Command Line to Manage Mobile Access and Push Notification;365
20.5;Summary;366
21;Chapter 14 Web Servers;368
21.1;Your Company Site;368
21.2;Setting Up Your First Site;370
21.2.1;The Easy Way to Set Up a Web Server;371
21.2.2;Configuring Web Services from Server Admin;374
21.3;Global Configuration Options;376
21.3.1;Managing Modules;377
21.3.2;MIME Types;378
21.3.3;Proxy Services;379
21.4;Creating a Site;382
21.4.1;Configuring Site-Specific Options;382
21.4.2;Securing Sites for Transactions;387
21.4.3;Password Protecting Sites;388
21.4.4;Providing Access to Directories Outside the Site;389
21.5;Wikis and Blogs;390
21.5.1;Using Wikis;392
21.5.2;Using Blogs;400
21.5.3;Accessing Content;404
21.6;Summary;406
22;Chapter 15 Managing MySQL;408
22.1;What Is MySQL?;408
22.2;Setting Up MySQL;409
22.3;Tuning MySQL;411
22.4;Managing MySQL Databases;413
22.4.1;Connecting to a Database Server;414
22.4.2;Setting Up a Database;415
22.4.3;Creating a Table;417
22.4.4;Working with Fields;418
22.4.5;Writing a Query;420
22.4.6;Inspecting Existing Elements;422
22.4.7;Database Maintenance;423
22.5;Backing Up MySQL;424
22.6;More on the Command Line;425
22.7;Summary;426
23;Chapter 16 Using Podcast Producer;427
23.1;Preparing for Podcast Producer;428
23.1.1;Preparing Directory Services;428
23.1.2;Preparing Mail Services;429
23.1.3;Preparing Web Services;429
23.1.4;Preparing Video Assets;429
23.2;Wizardly Podcasting;430
23.3;Exploring Server Admin;434
23.4;Setting Up Workflows;437
23.4.1;Podcast Composer;438
23.4.2;Setting a Poster Frame;443
23.4.3;Exporting Workflows;445
23.4.4;Controlling Access to Workflows;445
23.5;Using Workflows;446
23.5.1;Configuring Camera and Audio Settings;452
23.5.2;Binding Cameras;453
23.5.3;Running Workflows from the Web;456
23.6;Using Podcast Producer from the Command Line;457
23.6.1;Podcasting;457
23.6.2;Automations;460
23.6.3;Authentication Types;461
23.7;Summary;461
24;Chapter 17 Streaming QuickTime Video;463
24.1;Supported Protocols;464
24.2;Implementation Strategies;464
24.3;Bandwidth Considerations;464
24.4;Installing QuickTime Streaming Server;466
24.5;Configuring QuickTime Streaming Server;467
24.5.1;Playing the Sample Video;472
24.5.2;Setting Up Home Directory Use;473
24.5.3;Restricting Access;474
24.6;Creating Movies;475
24.6.1;Adding a Hint Track to Movies;475
24.6.2;Accessing Video Through a Browser;477
24.7;QuickTime Broadcaster;478
24.8;Streaming Playlists;479
24.9;Using the Command Line;481
24.10;Summary;482
25;Chapter 18 Sharing Files;483
25.1;Configuration;483
25.2;AFP;484
25.2.1;Configuring AFP;485
25.2.2;Connecting to AFP from Mac OS X;488
25.3;SMB;489
25.3.1;Configure SMB;489
25.3.2;The SMB Configuration File;492
25.3.3;SMB as a Domain Controller for Windows;492
25.3.4;WINS;493
25.3.5;Samba Clients;493
25.3.5.1;Connecting to SMB from Other Unix and Linux Clients;493
25.3.5.2;Connecting to SMB with Windows;494
25.3.5.3;Connecting to SMB from Mac OS X;494
25.4;FTP;494
25.4.1;Security Concerns with FTP;495
25.4.2;Welcome Messages;495
25.4.3;FTP Roots and Presenting Data to Users;496
25.4.4;Configuring FTP;498
25.4.5;Connecting to FTP Using Cyberduck;499
25.4.6;Connecting to FTP Using ftp;500
25.4.7;Configuring PASSV;501
25.5;NFS;501
25.6;Shares;501
25.6.1;Configuring Share Points;502
25.6.2;Share Point Options;503
25.6.3;Automounting;503
25.6.4;Spotlight;506
25.6.5;SMB Share Options;506
25.6.6;NFS Shares;508
25.6.7;Server-Side File Tracking;509
25.7;File Permissions;509
25.7.1;POSIX;510
25.7.2;ACLs;511
25.8;Summary;514
26;Chapter 19 Setting Up Printing Services;515
26.1;Installing a Printer;516
26.1.1;Basic Printer Management;516
26.1.2;USB or Bonjour Printing;518
26.1.3;Network Printing;519
26.1.3.1;IPP;519
26.1.3.2;LPD;520
26.1.3.3;JetDirect;521
26.2;Setting Up the Print Service;522
26.3;Sharing a Printer;526
26.3.1;Creating a Printer Pool;527
26.3.2;Configuring Print Quotas;530
26.4;Deploying Printers;532
26.4.1;Deploying Printers to Large Groups of Users;534
26.4.2;Deploying Printers to Windows Clients;536
26.5;Managing Printing with Common Unix Printing System;539
26.6;Summary;541
27;Chapter 20 Backing Up Your Data;543
27.1;Managing Information En Masse;543
27.1.1;Classifying Storage;544
27.1.2;Classifying Data;545
27.1.3;Understanding the Classification Methods;545
27.1.4;Building Service Level Agreements;546
27.1.5;Managing the Information Life Cycle;547
27.2;Getting Redundant Before You Back Up;547
27.3;Using Backup Applications;548
27.3.1;Backing Up with Time Machine;549
27.3.1.1;Setting Up Time Machine;549
27.3.1.2;Using Command Line Options for Time Machine;553
27.3.2;Backing Up with Retrospect;554
27.3.2.1;Installing Retrospect;554
27.3.2.2;Configuring a Backup with Retrospect;556
27.3.2.3;Grooming Scripts;561
27.3.2.4;Creating Utility Scripts;563
27.4;iSCSI;564
27.5;Using iSCSI with Time Machine;565
27.6;Summary;566
28;Chapter 21 Configuring Software Update Server;567
28.1;Configuring the Software Update Service;568
28.2;Managing Your Software Update Server;569
28.2.1;Configuring Updates for Clients;570
28.3;Using Software Update Services;572
28.3.1;Using Software Update;572
28.3.2;Using the Command Line;574
28.3.3;Working with the Repository;575
28.4;Using the Command Line;576
28.4.1;Running the serveradmin Command;576
28.4.2;Multiple Software Update Servers;577
28.5;Summary;578
29;Appedix A DHCP Option Numbers;579
30;Appendix B Taking It to the Next Level;584
30.1;Books;584
30.2;Courses;584
30.3;Mailing Lists;585
30.4;Web Sites;585
31;Index;586



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.