IBM eserver certification study guide Cluster 1600 managed by PSSP
This IBM Redbooks publication is designed as a study guide for professionals wishing to prepare for the certification exam to achieve IBM Certified Specialist - Cluster 1600 managed by PSSP. The Cluster 1600 managed by PSSP certification validates the skills required to install and configure PSSP sy...
Autor Corporativo: | |
---|---|
Otros Autores: | |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
[S.l.] :
IBM, International Technical Support Organization
c2003.
|
Edición: | 1st ed |
Colección: | IBM redbooks.
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627155706719 |
Tabla de Contenidos:
- Front cover
- Contents
- Notices
- Trademarks
- Preface
- The team that wrote this redbook
- Become a published author
- Comments welcome
- Chapter 1. Introduction
- 1.1 Book organization
- 1.2 The test scenario
- Part 1 System planning
- Chapter 2. Validate hardware and software configuration
- 2.1 Key concepts you should study
- 2.2 Hardware
- 2.2.1 Overview of the available frames
- 2.2.2 Tall frames
- 2.2.3 Short frames
- 2.2.4 SP Switch frames
- 2.2.5 Power supplies
- 2.2.6 Hardware control and supervision
- 2.3 Cluster 1600 nodes
- 2.3.1 Internal nodes
- 2.3.2 External nodes
- 2.3.3 POWER4™ technology
- 2.4 Dependent nodes
- 2.4.1 SP Switch Router
- 2.4.2 SP Switch Router attachment
- 2.5 Control workstation
- 2.5.1 Supported control workstations
- 2.5.2 Control workstation minimum hardware requirements
- 2.5.3 High Availability Control Workstation
- 2.6 Hardware Management Console (HMC)
- 2.7 Cluster 1600 feature codes
- 2.8 Boot/install server requirements
- 2.9 SP Switch and SP Switch2 communication network
- 2.9.1 Adapter placements for SP Switch and SP Switch2 adapters
- 2.9.2 SP Switch hardware components
- 2.9.3 SP Switch networking fundamentals
- 2.9.4 SP Switch network products
- 2.10 Peripheral devices
- 2.11 Network connectivity adapters
- 2.12 Space requirements
- 2.13 Software requirements
- 2.14 System partitioning with the SP Switch
- 2.15 Cluster 1600 configuration rules
- 2.15.1 Short frame configurations
- 2.15.2 Tall frame configurations
- 2.16 Numbering rules
- 2.16.1 The frame numbering rule
- 2.16.2 The slot numbering rule
- 2.16.3 The node numbering rule
- 2.16.4 The switch port numbering rule
- 2.17 Sample questions
- 2.18 Exercises
- Chapter 3. Cluster 1600 networking
- 3.1 Key concepts you should study
- 3.2 Name, address, and network integration planning.
- 3.2.1 Configure SP Ethernet admin LAN adapter
- 3.2.2 Set routes
- 3.2.3 Host name resolution
- 3.2.4 DNS
- 3.3 Networks
- 3.3.1 The SP Ethernet admin LAN
- 3.3.2 Frame and node cabling
- 3.3.3 SP LAN topologies
- 3.3.4 Additional LANs
- 3.3.5 Switch network
- 3.3.6 Subnetting considerations
- 3.4 Routing considerations
- 3.5 Using NIS in a Cluster 1600 configuration
- 3.6 Using AFS® in a Cluster 1600 configuration
- 3.7 Related documentation
- 3.8 Sample questions
- 3.9 Exercises
- Chapter 4. I/O devices and file systems
- 4.1 Key concepts you should study
- 4.2 I/O devices
- 4.2.1 External disk storage
- 4.2.2 Internal I/O adapters
- 4.3 Multiple rootvg support
- 4.3.1 The Volume_Group class
- 4.3.2 Volume group management commands
- 4.3.3 How to declare a new rootvg
- 4.3.4 Booting from external disks
- 4.4 Global file systems
- 4.4.1 Network File System (NFS)
- 4.4.2 The DFS and AFS file systems
- 4.5 Related documentation
- 4.6 Sample questions
- 4.7 Exercises
- Chapter 5. Cluster 1600 installation and administration
- 5.1 Key concepts
- 5.2 Hardware attachment
- 5.2.1 Cluster 1600 overview
- 5.2.2 Cluster 1600 scaling limits and rules
- 5.2.3 External node attachment
- 5.3 Cluster 1600 installation requirements
- 5.3.1 System specific requirements
- 5.3.2 Software requirements
- 5.4 Installation and configuration
- 5.5 PSSP support
- 5.5.1 SDR classes
- 5.5.2 Hardmon
- 5.6 User interfaces
- 5.6.1 Perspectives
- 5.6.2 Hardware Management Console
- 5.7 Attachment scenarios
- 5.8 Related documentation
- 5.9 Sample questions
- 5.10 Exercises
- Chapter 6. Cluster 1600 security
- 6.1 Key concepts
- 6.2 Security-related concepts
- 6.2.1 Secure remote execution commands
- 6.2.2 Using the secure remote command process
- 6.3 Defining Kerberos
- 6.4 Kerberos
- 6.4.1 Kerberos daemons.
- 6.4.2 Kerberos authentication process
- 6.5 Kerberos paths, directories, and files
- 6.6 Authentication services procedures
- 6.7 Kerberos passwords and master key
- 6.8 Kerberos principals
- 6.8.1 Add a Kerberos principal
- 6.8.2 Change the attributes of the Kerberos principal
- 6.8.3 Delete Kerberos principals
- 6.9 Server key
- 6.9.1 Change a server key
- 6.10 Using additional Kerberos servers
- 6.10.1 Set up and initialize a secondary Kerberos server
- 6.10.2 Managing the Kerberos secondary server database
- 6.11 SP services that utilize Kerberos
- 6.11.1 Hardware control subsystem
- 6.11.2 Remote execution commands
- 6.12 Sysctl is a PSSP Kerberos-based security system
- 6.12.1 Sysctl components and process
- 6.12.2 Terms and files related to the sysctl process
- 6.13 Related documentation
- 6.14 Sample questions
- 6.15 Exercises
- Chapter 7. User and data management
- 7.1 Key concepts
- 7.2 Administering users on a Cluster 1600 system
- 7.3 SP User data management
- 7.3.1 SP User Management (SPUM)
- 7.3.2 Set up SPUM
- 7.3.3 Add, change, delete, and list SP users
- 7.3.4 Change SP user passwords
- 7.3.5 Login control
- 7.3.6 Access control
- 7.4 Configuring NIS
- 7.5 File collections
- 7.5.1 Terms and features of file collections
- 7.5.2 File collection types
- 7.5.3 Predefined file collections
- 7.5.4 File collection structure
- 7.5.5 File collection update process
- 7.5.6 Supman user ID and supfilesrv daemon
- 7.5.7 Commands to include or exclude files from a file collection
- 7.5.8 Work and manage file collections
- 7.5.9 Modifying the file collection hierarchy
- 7.5.10 Steps in building a file collection
- 7.5.11 Installing a file collection
- 7.5.12 Removing a file collection
- 7.5.13 Diagnosing file collection problems
- 7.6 SP user file and directory management
- 7.6.1 AIX Automounter.
- 7.7 Related documentation
- 7.8 Sample questions
- 7.9 Exercises
- Part 2 Installation and configuration
- Chapter 8. Configuring the control workstation
- 8.1 Key concepts
- 8.2 Summary of CWS configuration
- 8.3 Key commands and files
- 8.3.1 setup_authent
- 8.3.2 chauthts
- 8.3.3 k4init
- 8.3.4 install_cw
- 8.3.5 .profile, /etc/profile, or /etc/environment
- 8.3.6 /etc/inittab
- 8.3.7 /etc/inetd.conf
- 8.3.8 /etc/rc.net
- 8.3.9 /etc/services
- 8.4 Environment requirements
- 8.4.1 Connectivity
- 8.4.2 Disk space and file system organization
- 8.5 LPP filesets
- 8.5.1 PSSP prerequisites
- 8.6 PSSP filesets installation on the CWS
- 8.6.1 Copy of the PSSP images
- 8.6.2 Move prerequisite files for PSSP 3.5
- 8.6.3 Copy the minimum AIX image (mksysb)
- 8.6.4 Install PSSP prerequisites
- 8.6.5 Install the runtime files
- 8.6.6 Install the RSCT files
- 8.6.7 Install the HMC-controlled server files
- 8.6.8 Installation of PSSP filesets on the CWS
- 8.7 Setting the authentication services on the CWS
- 8.7.1 Authentication setting on the CWS for remote commands
- 8.7.2 Setting the authentication method for PSSP trusted services
- 8.8 Configuring and verifying the CWS
- 8.9 Sample questions
- 8.10 Exercises
- Chapter 9. Frame and node installation
- 9.1 Key concepts
- 9.2 Installation steps and associated key commands
- 9.2.1 Enter site environment information
- 9.2.2 Enter Hardware Management Console (HMC) information (HMC-controlled servers only)
- 9.2.3 Enter frame information
- 9.2.4 Check the level of supervisor microcode
- 9.2.5 Check the previous installation steps
- 9.2.6 Define the nodes' Ethernet information
- 9.2.7 Discover or configure the Ethernet hardware address
- 9.2.8 Configure additional adapters for nodes
- 9.2.9 Assign initial host names to nodes.
- 9.2.10 PSSP security installation and configuration
- 9.2.11 Start RSCT subsystems
- 9.2.12 Set up nodes to be installed
- 9.2.13 spchvgobj
- 9.2.14 Verify all node information
- 9.2.15 Change the default network tunable values
- 9.2.16 Perform additional node customization
- 9.2.17 spbootins
- 9.2.18 Setting the switch
- 9.2.19 Configuring the CWS as boot/install server
- 9.2.20 Verify that the System Management tools were correctly installed
- 9.2.21 Network boot the boot/install server and nodes
- 9.2.22 Verify node installation
- 9.2.23 Enable s1_tty on the SP-attached server (SAMI protocol only)
- 9.2.24 Update authorization files in restricted mode for boot/install servers (optional)
- 9.2.25 Run verification tests on all nodes
- 9.2.26 Check the system
- 9.2.27 Start the switch
- 9.2.28 Verify that the switch was installed correctly
- 9.3 Key files
- 9.3.1 /etc/bootptab.info
- 9.3.2 /tftpboot
- 9.3.3 /usr/sys/inst.images
- 9.3.4 /spdata/sys1/install/images
- 9.3.5 /spdata/sys1/install/<
- name>
- /lppsource
- 9.3.6 /spdata/sys1/install/pssplpp/PSSP-x.x
- 9.3.7 /spdata/sys1/install/pssp
- 9.3.8 image.data
- 9.4 Related documentation
- 9.5 Sample questions
- 9.6 Exercises
- Chapter 10. Verification commands and methods
- 10.1 Key concepts
- 10.2 Introduction to Cluster 1600 system checking
- 10.3 Key commands
- 10.3.1 Verify installation of software
- 10.3.2 Verify system partitions
- 10.3.3 Verifying the authentication services
- 10.3.4 Checking subsystems
- 10.3.5 Monitoring hardware status
- 10.3.6 Monitoring node LEDs: spmon -L, spled
- 10.3.7 Extracting SDR contents
- 10.3.8 Checking IP connectivity: ping/telnet/rlogin
- 10.3.9 SMIT access to verification commands
- 10.4 Graphical user interface
- 10.5 Key daemons
- 10.5.1 Sdrd
- 10.5.2 Hardmon
- 10.5.3 Worm.
- 10.5.4 Topology Services, Group Services, and Event Management.