List of Figures

List of Figures

Chapter 1: Introduction to Solaris 9

Figure 1-1: The StarOffice productivity suite
Figure 1-2: The Solaris Management Console

Chapter 2: System Concepts

Figure 2-1: Components of a UNIX system

Chapter 6: Managing Users

Figure 6-1: Solaris authentication sequence
Figure 6-2: The Solaris admintool
Figure 6-3: Modifying user details with admintool
Figure 6-4: Adding user details with admintool
Figure 6-5: Adding group details with admintool

Chapter 7: Security

Figure 7-1: Typical SSH client session
Figure 7-2: Authenticating a Secure Shell (SSH) connection
Figure 7-3: Security Administrator's Integrated Network Tool
Figure 7-4: The Data Management page
Figure 7-5: The Target Selection page
Figure 7-6: The Data Analysis page
Figure 7-7: Identifying vulnerabilities

Chapter 8: Processes

Figure 8-1: CDE's graphical process finder

Chapter 11: Booting and Initialization

Figure 11-1: Browsing installed packages on a Solaris system.
Figure 11-2: Browsing all installed system packages on a Solaris system.
Figure 11-3: Browsing all installed application packages on a Solaris system.
Figure 11-4: The admintool GUI for adding packages.
Figure 11-5: The admintool interface for selecting the package installation source.
Figure 11-6: Adding packages from a CD-ROM using the admintool interface.
Figure 11-7: Checking available disk space using the Space Meter.
Figure 11-8: Package installation phase during admintool installation.
Figure 11-9: The admintool interface for selecting the package installation source.
Figure 11-10: Adding packages from the spooling directory using the admintool interface.
Figure 11-11: Removing packages using the admintool interface.

Chapter 13: Disk Partitions and Format

Figure 13-1: Typical file system layout for a SPARC architecture system
Figure 13-2: Typical file system layout for an Intel architecture system

Chapter 14: Backups

Figure 14-1: The relationship between time to restore and user satisfaction is inverse.
Figure 14-2: Single server and single backup device configuration.
Figure 14-3: Single server and multiple backup device configuration.
Figure 14-4: Centralized backup server with multiple storage devices.
Figure 14-5: Distributed storage and management of backup services.

Chapter 15: Basic Command Syntax

Figure 15-1: Retrieving patches from SunSolve.

Chapter 16: Editor

Figure 16-1: Editing the /etc/passwd file.
Figure 16-2: Using an ex command.
Figure 16-3: Performing text substitutions.

Chapter 17: Remote Access

Figure 17-1: Telnet access event sequence.
Figure 17-2: PPP configuration with high availability.

Chapter 19: The Solaris 9 Network Environment

Figure 19-1: The FTP model.

Chapter 21: Disk Management

Figure 21-1: Striped disk configuration.
Figure 21-2: Mirrored disk configuration.
Figure 21-3: Striped and mirrored disk configuration.

Chapter 23: Network File System (NFS)

Figure 23-1: The NFS server carolina exports its mail directory to NFS clients georgia, fairfax, and virginia, using the same mount point as the exported file system.
Figure 23-2: The NFS server carolina exports its mail directory to NFS clients georgia, fairfax, and virginia using their own mount points.

Chapter 27: Network Information Service (NIS/NIS+)

Figure 27-1: DNS configuration for a fictional college with two divisions: graduate and undergraduate, both of which have their own name server.
Figure 27-2: NIS+ domains for Panther College.
Figure 27-3: NIS+ domains with a master and a slave server each.
Figure 27-4: Hierarchy of control for a specific domain client (FDR.Undergrad.Panther.Edu.).

Chapter 28: Role-Based Access Control

Figure 28-1: Hierarchy of rights associated with the different roles.
Figure 28-2: Profiles and authorizations are associated with roles that are granted to individual users.
Figure 28-3: Integrating roles, profiles, and authorizations.

Chapter 29: Solaris Management Console

Figure 29-1: The SMC login screen.
Figure 29-2: The SMC main screen.
Figure 29-3: SMC Applications view.
Figure 29-4: SMC documentation applications.
Figure 29-5: SMC Infrastructure applications.
Figure 29-6: SMC Jobs applications.
Figure 29-7: SMC Security applications.
Figure 29-8: SMC Software applications.
Figure 29-9: SMC User & Group applications.
Figure 29-10: SMC application configuration.
Figure 29-11: The SMC Console menu.
Figure 29-12: The SMC Add Application screen.
Figure 29-13: The SMC Remove Application screen.
Figure 29-14: The SMC Modify Application screen.
Figure 29-15: The SMC Add Server screen.

Chapter 31: Lightweight Directory Access Protocol (LDAP)

Figure 31-1: Example Directory Information Tree (DIT).
Figure 31-2: Authentication for the Administration Server.
Figure 31-3: Main console window.
Figure 31-4: Main Directory Server window.
Figure 31-5: Directory Server Configuration window.
Figure 31-6: Settings Configuration window.
Figure 31-7: Performance configuration window.
Figure 31-8: Encryption Configuration window.
Figure 31-9: SNMP Configuration window.
Figure 31-10: Manager Configuration window.
Figure 31-11: Administration Server Configuration window.
Figure 31-12: Searching the directory.
Figure 31-13: Adding a directory entry.
Figure 31-14: Selecting a directory subtree.
Figure 31-15: Creating a new user.
Figure 31-16: Finding an existing user.
Figure 31-17: Creating a group.
Figure 31-18: Adding group members.
Figure 31-19: Searching users and groups.
Figure 31-20: Creating an organizational unit.

Chapter 32: OSI/IP Network Models

Figure 32-1: Ring network topology.
Figure 32-2: Star network topology.
Figure 32-3: Interconnecting networks.
Figure 32-4: Supporting high-level services.
Figure 32-5: The Open System Interconnect (OSI) networking model.

Chapter 33: Ethernet

Figure 33-1: Process flow for CSMA/CD.

Chapter 34: Internet Layer

Figure 34-1: Structure of IP datagrams.

Chapter 35: Routing

Figure 35-1: Class C network configuration (203.17.64.0).
Figure 35-2: Connecting two Class C networks (203.17.64.0 and 203.17.65.0).
Figure 35-3: A packet has both a message and a header.
Figure 35-4: Basic firewall configuration blocking incoming and outgoing ports.
Figure 35-5: Starting the SunScreen administrative interface.
Figure 35-6: SunScreen Information interface.
Figure 35-7: Rule definition.
Figure 35-8: Policy Rules interface.

Chapter 37: Transport Layer

Figure 37-1: Mail exchange transaction between mail.companyA.com and mail.companyB.com.
Figure 37-2: The POP-based Eudora client for Microsoft Windows, which receives mail from a : entralized and secure Solaris mail server.
Figure 37-3: Webmin GUI interface for configuring sendmail.

Chapter 38: DHCP

Figure 38-1: How DHCP leases IP addresses.
Figure 38-2: DHCP client for Microsoft Windows.
Figure 38-3: DHCP client for Microsoft Windows

Chapter 39: Network Time Protocol

Figure 39-1: Inserting database records using timestamps requires accurate timekeeping.
Figure 39-2: Inserting database records from multiple servers using timestamps requires even more accurate timekeeping.


Part I: Solaris 9 Operating Environment, Exam I