summaryrefslogtreecommitdiff
path: root/docs/Samba-Guide/SBE-2000UserNetwork.xml
diff options
context:
space:
mode:
Diffstat (limited to 'docs/Samba-Guide/SBE-2000UserNetwork.xml')
-rw-r--r--docs/Samba-Guide/SBE-2000UserNetwork.xml270
1 files changed, 134 insertions, 136 deletions
diff --git a/docs/Samba-Guide/SBE-2000UserNetwork.xml b/docs/Samba-Guide/SBE-2000UserNetwork.xml
index ced9c38625..6afd7016ea 100644
--- a/docs/Samba-Guide/SBE-2000UserNetwork.xml
+++ b/docs/Samba-Guide/SBE-2000UserNetwork.xml
@@ -3,37 +3,45 @@
<chapter id="2000users">
<title>A Distributed 2000 User Network</title>
- <para>There is something indeed mystical about things that are
- big. Large networks exhibit a certain magnetism and exude a sense of
- importance that obscures reality. You and I know that it is no more
- difficult to secure a large network than it is a small one. We all
- know that over and above a particular number of network clients, the
- rules no longer change; the only real dynamic is the size of the domain
- (much like a kingdom) over which the network ruler (oops, administrator)
- has control. The real dynamic then transforms from the technical to the
- political. Then again, that point is often reached well before the
- kingdom (or queendom) grows large.</para>
-
- <para>If you have systematically worked your way to this chapter, hopefully you
- have found some gems and techniques that are applicable in your
- world. The network designs you have worked with in this book with have their
- strong points as well as weak ones. That is to be expected given that
- they are based on real business environments, excepting that the facts
- have been moulded to serve the purposes of this book.</para>
-
- <para>This chapter is intent on wrapping up issues that are central to
- implementation and design of progressively larger networks. Are you ready
- for this chapter? Good, it is time to move on.</para>
-
- <para>In previous chapters, you made the assumption that your network
- administration staff need detailed instruction right down to the
- nuts-and-bolts of implementing the solution. That's is still the case,
- but they have graduated now. You decide to document only those issues,
- methods and techniques that are new or complex. Routine tasks such as
- implementing a DNS or a DHCP server are under control. Even the basics of
- Samba are largely under control. So in this section you focus on the
- specifics of implementing LDAP changes, Samba changes, and approach and
- design of the solution and its deployment.</para>
+ <para>
+ There is something indeed mystical about things that are
+ big. Large networks exhibit a certain magnetism and exude a sense of
+ importance that obscures reality. You and I know that it is no more
+ difficult to secure a large network than it is a small one. We all
+ know that over and above a particular number of network clients, the
+ rules no longer change; the only real dynamic is the size of the domain
+ (much like a kingdom) over which the network ruler (oops, administrator)
+ has control. The real dynamic then transforms from the technical to the
+ political. Then again, that point is often reached well before the
+ kingdom (or queendom) grows large.
+ </para>
+
+ <para>
+ If you have systematically worked your way to this chapter, hopefully you
+ have found some gems and techniques that are applicable in your
+ world. The network designs you have worked with in this book with have their
+ strong points as well as weak ones. That is to be expected given that
+ they are based on real business environments, excepting that the facts
+ have been moulded to serve the purposes of this book.
+ </para>
+
+ <para>
+ This chapter is intent on wrapping up issues that are central to
+ implementation and design of progressively larger networks. Are you ready
+ for this chapter? Good, it is time to move on.
+ </para>
+
+ <para>
+ In previous chapters, you made the assumption that your network
+ administration staff need detailed instruction right down to the
+ nuts-and-bolts of implementing the solution. That's is still the case,
+ but they have graduated now. You decide to document only those issues,
+ methods and techniques that are new or complex. Routine tasks such as
+ implementing a DNS or a DHCP server are under control. Even the basics of
+ Samba are largely under control. So in this section you focus on the
+ specifics of implementing LDAP changes, Samba changes, and approach and
+ design of the solution and its deployment.
+ </para>
<sect1>
<title>Introduction</title>
@@ -48,47 +56,54 @@
Samba server just to change the way your network should function.
</para>
- <para><indexterm>
- <primary>LDAP</primary>
- </indexterm>
+ <para>
+ <indexterm><primary>LDAP</primary></indexterm>
Network growth is common to all organizations. In this exercise,
your preoccupation is with the mechanics of implementing Samba and
LDAP so that network users on each network segment can work
- without impediment.</para>
+ without impediment.
+ </para>
<sect2>
- <title>Assignment Tasks</title>
+ <title>Assignment Tasks</title>
+
+ <para>
+ Starting with the configuration files for the server called
+ <constant>MASSIVE</constant> in Chapter 5, you now deal with the
+ issues that are particular to large distributed networks. Your task
+ is simple &smbmdash; identify the challenges, consider the
+ alternatives, and then design and implement a solution.
+ </para>
+
+ <para>
+ <indexterm><primary>VPN</primary></indexterm>
+ Remember, you have users based in London (UK), Los Angeles,
+ Washington DC, and three buildings in New York. A significant portion
+ of your workforce have notebook computers and roam all over the
+ world. Some dial into the office, others use VPN connections over the
+ Internet and others just move between buildings.
+ </para>
+
+ <para>
+ What do you say to an employee who normally uses a desktop
+ system but must spend six weeks on the road with a notebook computer?
+ She is concerned over email access and how to keep co-workers current
+ with changing documents.
+ </para>
<para>
- Starting with the configuration files for the server called
- <constant>MASSIVE</constant> in Chapter 5, you now deal with the
- issues that are particular to large distributed networks. Your task
- is simple &smbmdash; identify the challenges, consider the
- alternatives, and then design and implement a solution.</para>
-
- <para><indexterm>
- <primary>VPN</primary>
- </indexterm>
- Remember, you have users based in London (UK), Los Angeles,
- Washington DC, and three buildings in New York. A significant portion
- of your workforce have notebook computers and roam all over the
- world. Some dial into the office, others use VPN connections over the
- Internet and others just move between buildings.</para>
-
- <para>What do you say to an employee who normally uses a desktop
- system but must spend six weeks on the road with a notebook computer?
- She is concerned over email access and how to keep co-workers current
- with changing documents.</para>
-
- <para>To top it all off, you have one network support person and one
- Help desk person based in London, a single person dedicated to all
- network operations in Los Angeles, five staff for user administration
- and Help desk in New York, plus one <emphasis>floater</emphasis> for
- Washington DC.</para>
-
- <para>You have out-sourced all desktop deployment and management to
- DirectPointe,Inc. Your concern is server maintenance and third-level
- support. Build a plan and show what must be done.</para>
+ To top it all off, you have one network support person and one
+ Help desk person based in London, a single person dedicated to all
+ network operations in Los Angeles, five staff for user administration
+ and Help desk in New York, plus one <emphasis>floater</emphasis> for
+ Washington DC.
+ </para>
+
+ <para>
+ You have out-sourced all desktop deployment and management to
+ DirectPointe,Inc. Your concern is server maintenance and third-level
+ support. Build a plan and show what must be done.
+ </para>
</sect2>
</sect1>
@@ -96,29 +111,23 @@
<sect1>
<title>Dissection and Discussion</title>
- <para><indexterm>
- <primary>passdb backend</primary>
- </indexterm><indexterm>
- <primary>LDAP</primary>
- </indexterm>
+ <para>
+ <indexterm><primary>passdb backend</primary></indexterm>
+ <indexterm><primary>LDAP</primary></indexterm>
In the previous chapter, you implemented an LDAP server that provided the
<parameter>passdb backend</parameter> for the Samba servers. You
explored ways to accelerate Windows desktop profile handling and you
took control of network performance.
</para>
- <para><indexterm>
- <primary>ldapsam</primary>
- </indexterm><indexterm>
- <primary>tdbsam</primary>
- </indexterm><indexterm>
- <primary>smbpasswd</primary>
- </indexterm><indexterm>
- <primary>replicated</primary>
- </indexterm>
+ <para>
+ <indexterm><primary>ldapsam</primary></indexterm>
+ <indexterm><primary>tdbsam</primary></indexterm>
+ <indexterm><primary>smbpasswd</primary></indexterm>
+ <indexterm><primary>replicated</primary></indexterm>
The implementation of an LDAP-based passdb backend (known as
<emphasis>ldapsam</emphasis> in Samba parlance), or some form of database
- that can be distributed, is essential to permit the deployment of Samba
+ that can be distributed, is essential to permit the deployment of Samba
Primary and Backup Domain Controllers (PDC/BDCs). You see, the problem
is that the <emphasis>tdbsam</emphasis> style passdb backend does not
lend itself to being replicated. The older plain-text-based
@@ -126,87 +135,79 @@
using a tool such as <command>rsync</command>, but
<emphasis>smbpasswd</emphasis> suffers the drawback that it does not
support the range of account facilities demanded by modern network
- managers.</para>
+ managers.
+ </para>
- <para><indexterm>
- <primary>XML</primary>
- </indexterm><indexterm>
- <primary>SQL</primary>
- </indexterm>
+ <para>
+ <indexterm><primary>XML</primary></indexterm>
+ <indexterm><primary>SQL</primary></indexterm>
The new <emphasis>tdbsam</emphasis> facility supports functionality
- that is similar to an <emphasis>ldapsam</emphasis>, but the lack of
+ that is similar to an <emphasis>ldapsam</emphasis>, but the lack of
distributed infrastructure sorely limits the scope for its
deployment. This does raise the following questions: "Why can't I just use
an XML based backend, or for that matter, why not use an SQL based
backend?" "Is support for these tools broken?" No. Answers to these
- questions require a bit of background.</para>
+ questions require a bit of background.
+ </para>
- <para><indexterm>
- <primary>directory</primary>
- </indexterm><indexterm>
- <primary>database</primary>
- </indexterm><indexterm>
- <primary>transaction processing</primary>
- </indexterm><indexterm>
- <primary>LDAP</primary>
- </indexterm>
+ <para>
+ <indexterm><primary>directory</primary></indexterm>
+ <indexterm><primary>database</primary></indexterm>
+ <indexterm><primary>transaction processing</primary></indexterm>
+ <indexterm><primary>LDAP</primary></indexterm>
<emphasis>What is a directory?</emphasis> A directory is a
collection of information regarding objects that can be accessed to
rapidly find information that is relevant in a particular and
consistent manner. A directory differs from a database in that it is
generally more often searched (read) than updated. As a consequence, the
information is organized to facilitate read access rather than to
- support transaction processing.</para>
+ support transaction processing.
+ </para>
- <para><indexterm>
- <primary>Lightweight Directory Access Protocol </primary>
- <see>LDAP</see>
- </indexterm><indexterm>
- <primary>LDAP</primary>
- </indexterm><indexterm>
- <primary>master</primary>
- </indexterm><indexterm>
- <primary>slave</primary>
- </indexterm>
+ <para>
+ <indexterm><primary>Lightweight Directory Access Protocol</primary><see>LDAP</see></indexterm>
+ <indexterm><primary>LDAP</primary></indexterm>
+ <indexterm><primary>master</primary></indexterm>
+ <indexterm><primary>slave</primary></indexterm>
The Lightweight Directory Access Protocol (LDAP) differs
considerably from a traditional database. It has a simple search
facility that uniquely makes a highly preferred mechanism for managing
user identities. LDAP provides a scalable mechanism for distributing
the data repository and for keeping all copies (slaves) in sync with
- the master repository.</para>
+ the master repository.
+ </para>
- <para><indexterm>
- <primary>identity management</primary>
- </indexterm><indexterm>
- <primary>Active Directory</primary>
- </indexterm><indexterm>
- <primary>OpenLDAP</primary>
- </indexterm>
+ <para>
+ <indexterm><primary>identity management</primary></indexterm>
+ <indexterm><primary>Active Directory</primary></indexterm>
+ <indexterm><primary>OpenLDAP</primary></indexterm>
Samba is a flexible and powerful file and print sharing
technology. It can use many external authentication sources and can be
part of a total authentication and identity management
infrastructure. The two most important external sources for large sites
- are Microsoft Active Directory and LDAP. Sites that specifically wish to
+ are Microsoft Active Directory and LDAP. Sites that specifically wish to
avoid the proprietary implications of Microsoft Active Directory
- naturally gravitate toward OpenLDAP.</para>
+ naturally gravitate toward OpenLDAP.i
+ </para>
- <para><indexterm>
- <primary>network</primary>
- <secondary>routed</secondary>
- </indexterm>
- In Chapter 6, you had to deal with a locally routed
+ <para>
+ <indexterm><primary>network</primary><secondary>routed</secondary></indexterm>
+ In <link linkend="happy"/>, you had to deal with a locally routed
network. All deployment concerns focused around making users happy,
and that simply means taking control over all network practices and
usage so that no one user is disadvantaged by any other. The real
lesson is one of understanding that no matter how much network
- bandwidth you provide, bandwidth remains a precious resource.</para>
+ bandwidth you provide, bandwidth remains a precious resource.
+ </para>
- <para>In this chapter, you must now consider how the overall network must
+ <para>
+ In this chapter, you must now consider how the overall network must
function. In particular, you must be concerned with users who move
- between offices. You must take into account the way users need to
+ between offices. You must take into account the way users need to
access information globally. And you must make the network robust
enough so that it can sustain partial breakdown without causing loss of
- productivity.</para>
+ productivity.
+ </para>
<sect2>
<title>Technical Issues</title>
@@ -310,7 +311,7 @@
<primary>redirected folders</primary>
</indexterm>
One way to reduce the network bandwidth impact of user logon
- traffic is through folder redirection. In Chapter 6, you
+ traffic is through folder redirection. In <link linkend="happy"/>, you
implemented this in the new Windows XP Professional standard
desktop configuration. When desktop folders such as <guimenu>My
Documents</guimenu> are redirected to a network drive, they should
@@ -573,7 +574,7 @@
<primary>LDAP</primary>
<secondary>slave</secondary>
</indexterm>
- In Chapter 6, you implemented a single LDAP server for the
+ In <link linkend="happy"/>, you implemented a single LDAP server for the
entire network. This may work for smaller networks, but almost
certainly fails to meet the needs of large and complex networks. The
following section documents how one may implement a single
@@ -860,17 +861,14 @@ passdb backend = ldapsam:ldap://master.abmas.biz \
</para></note>
<para>It is assumed that the network you are working with follows in a
- pattern similar to what has been covered in Chapter 6. The following steps
+ pattern similar to what has been covered in <link linkend="happy"/>. The following steps
permit the operation of a Master/Slave OpenLDAP arrangement.</para>
<procedure>
+ <title>LDAP Master/Slave Configuration</title>
<step><para>
- <indexterm>
- <primary>SUSE Linux</primary>
- </indexterm><indexterm>
- <primary>Red Hat Linux</primary>
- </indexterm>
+ <indexterm><primary>SUSE Linux</primary></indexterm><indexterm><primary>Red Hat Linux</primary></indexterm>
Log onto the master LDAP server as <constant>root</constant>.
You are about to change the configuration of the LDAP server, so it
makes sense to temporarily halt it. Stop OpenLDAP from running on
@@ -1017,7 +1015,7 @@ added: "cn=PIOps,ou=Groups,dc=abmas,dc=biz" (00000013)
<primary>smbldap-useradd</primary>
</indexterm>
On the master ldap server you may now add an account to validate that replication
- is working. Assuming the configuration shown in Chapter 6, execute:
+ is working. Assuming the configuration shown in <link linkend="happy"/>, execute:
<screen>
&rootprompt; /var/lib/samba/sbin/smbldap-useradd -a fruitloop
</screen>