IBM eserver certification study guide Cluster 1600 managed by PSSP

This IBM Redbooks publication is designed as a study guide for professionals wishing to prepare for the certification exam to achieve IBM Certified Specialist - Cluster 1600 managed by PSSP. The Cluster 1600 managed by PSSP certification validates the skills required to install and configure PSSP sy...

Descripción completa

Detalles Bibliográficos
Autor Corporativo: International Business Machines Corporation. International Technical Support Organization (-)
Otros Autores: Quintero, Dino (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: [S.l.] : IBM, International Technical Support Organization c2003.
Edición:1st ed
Colección:IBM redbooks.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627155706719
Tabla de Contenidos:
  • Front cover
  • Contents
  • Notices
  • Trademarks
  • Preface
  • The team that wrote this redbook
  • Become a published author
  • Comments welcome
  • Chapter 1. Introduction
  • 1.1 Book organization
  • 1.2 The test scenario
  • Part 1 System planning
  • Chapter 2. Validate hardware and software configuration
  • 2.1 Key concepts you should study
  • 2.2 Hardware
  • 2.2.1 Overview of the available frames
  • 2.2.2 Tall frames
  • 2.2.3 Short frames
  • 2.2.4 SP Switch frames
  • 2.2.5 Power supplies
  • 2.2.6 Hardware control and supervision
  • 2.3 Cluster 1600 nodes
  • 2.3.1 Internal nodes
  • 2.3.2 External nodes
  • 2.3.3 POWER4™ technology
  • 2.4 Dependent nodes
  • 2.4.1 SP Switch Router
  • 2.4.2 SP Switch Router attachment
  • 2.5 Control workstation
  • 2.5.1 Supported control workstations
  • 2.5.2 Control workstation minimum hardware requirements
  • 2.5.3 High Availability Control Workstation
  • 2.6 Hardware Management Console (HMC)
  • 2.7 Cluster 1600 feature codes
  • 2.8 Boot/install server requirements
  • 2.9 SP Switch and SP Switch2 communication network
  • 2.9.1 Adapter placements for SP Switch and SP Switch2 adapters
  • 2.9.2 SP Switch hardware components
  • 2.9.3 SP Switch networking fundamentals
  • 2.9.4 SP Switch network products
  • 2.10 Peripheral devices
  • 2.11 Network connectivity adapters
  • 2.12 Space requirements
  • 2.13 Software requirements
  • 2.14 System partitioning with the SP Switch
  • 2.15 Cluster 1600 configuration rules
  • 2.15.1 Short frame configurations
  • 2.15.2 Tall frame configurations
  • 2.16 Numbering rules
  • 2.16.1 The frame numbering rule
  • 2.16.2 The slot numbering rule
  • 2.16.3 The node numbering rule
  • 2.16.4 The switch port numbering rule
  • 2.17 Sample questions
  • 2.18 Exercises
  • Chapter 3. Cluster 1600 networking
  • 3.1 Key concepts you should study
  • 3.2 Name, address, and network integration planning.
  • 3.2.1 Configure SP Ethernet admin LAN adapter
  • 3.2.2 Set routes
  • 3.2.3 Host name resolution
  • 3.2.4 DNS
  • 3.3 Networks
  • 3.3.1 The SP Ethernet admin LAN
  • 3.3.2 Frame and node cabling
  • 3.3.3 SP LAN topologies
  • 3.3.4 Additional LANs
  • 3.3.5 Switch network
  • 3.3.6 Subnetting considerations
  • 3.4 Routing considerations
  • 3.5 Using NIS in a Cluster 1600 configuration
  • 3.6 Using AFS® in a Cluster 1600 configuration
  • 3.7 Related documentation
  • 3.8 Sample questions
  • 3.9 Exercises
  • Chapter 4. I/O devices and file systems
  • 4.1 Key concepts you should study
  • 4.2 I/O devices
  • 4.2.1 External disk storage
  • 4.2.2 Internal I/O adapters
  • 4.3 Multiple rootvg support
  • 4.3.1 The Volume_Group class
  • 4.3.2 Volume group management commands
  • 4.3.3 How to declare a new rootvg
  • 4.3.4 Booting from external disks
  • 4.4 Global file systems
  • 4.4.1 Network File System (NFS)
  • 4.4.2 The DFS and AFS file systems
  • 4.5 Related documentation
  • 4.6 Sample questions
  • 4.7 Exercises
  • Chapter 5. Cluster 1600 installation and administration
  • 5.1 Key concepts
  • 5.2 Hardware attachment
  • 5.2.1 Cluster 1600 overview
  • 5.2.2 Cluster 1600 scaling limits and rules
  • 5.2.3 External node attachment
  • 5.3 Cluster 1600 installation requirements
  • 5.3.1 System specific requirements
  • 5.3.2 Software requirements
  • 5.4 Installation and configuration
  • 5.5 PSSP support
  • 5.5.1 SDR classes
  • 5.5.2 Hardmon
  • 5.6 User interfaces
  • 5.6.1 Perspectives
  • 5.6.2 Hardware Management Console
  • 5.7 Attachment scenarios
  • 5.8 Related documentation
  • 5.9 Sample questions
  • 5.10 Exercises
  • Chapter 6. Cluster 1600 security
  • 6.1 Key concepts
  • 6.2 Security-related concepts
  • 6.2.1 Secure remote execution commands
  • 6.2.2 Using the secure remote command process
  • 6.3 Defining Kerberos
  • 6.4 Kerberos
  • 6.4.1 Kerberos daemons.
  • 6.4.2 Kerberos authentication process
  • 6.5 Kerberos paths, directories, and files
  • 6.6 Authentication services procedures
  • 6.7 Kerberos passwords and master key
  • 6.8 Kerberos principals
  • 6.8.1 Add a Kerberos principal
  • 6.8.2 Change the attributes of the Kerberos principal
  • 6.8.3 Delete Kerberos principals
  • 6.9 Server key
  • 6.9.1 Change a server key
  • 6.10 Using additional Kerberos servers
  • 6.10.1 Set up and initialize a secondary Kerberos server
  • 6.10.2 Managing the Kerberos secondary server database
  • 6.11 SP services that utilize Kerberos
  • 6.11.1 Hardware control subsystem
  • 6.11.2 Remote execution commands
  • 6.12 Sysctl is a PSSP Kerberos-based security system
  • 6.12.1 Sysctl components and process
  • 6.12.2 Terms and files related to the sysctl process
  • 6.13 Related documentation
  • 6.14 Sample questions
  • 6.15 Exercises
  • Chapter 7. User and data management
  • 7.1 Key concepts
  • 7.2 Administering users on a Cluster 1600 system
  • 7.3 SP User data management
  • 7.3.1 SP User Management (SPUM)
  • 7.3.2 Set up SPUM
  • 7.3.3 Add, change, delete, and list SP users
  • 7.3.4 Change SP user passwords
  • 7.3.5 Login control
  • 7.3.6 Access control
  • 7.4 Configuring NIS
  • 7.5 File collections
  • 7.5.1 Terms and features of file collections
  • 7.5.2 File collection types
  • 7.5.3 Predefined file collections
  • 7.5.4 File collection structure
  • 7.5.5 File collection update process
  • 7.5.6 Supman user ID and supfilesrv daemon
  • 7.5.7 Commands to include or exclude files from a file collection
  • 7.5.8 Work and manage file collections
  • 7.5.9 Modifying the file collection hierarchy
  • 7.5.10 Steps in building a file collection
  • 7.5.11 Installing a file collection
  • 7.5.12 Removing a file collection
  • 7.5.13 Diagnosing file collection problems
  • 7.6 SP user file and directory management
  • 7.6.1 AIX Automounter.
  • 7.7 Related documentation
  • 7.8 Sample questions
  • 7.9 Exercises
  • Part 2 Installation and configuration
  • Chapter 8. Configuring the control workstation
  • 8.1 Key concepts
  • 8.2 Summary of CWS configuration
  • 8.3 Key commands and files
  • 8.3.1 setup_authent
  • 8.3.2 chauthts
  • 8.3.3 k4init
  • 8.3.4 install_cw
  • 8.3.5 .profile, /etc/profile, or /etc/environment
  • 8.3.6 /etc/inittab
  • 8.3.7 /etc/inetd.conf
  • 8.3.8 /etc/rc.net
  • 8.3.9 /etc/services
  • 8.4 Environment requirements
  • 8.4.1 Connectivity
  • 8.4.2 Disk space and file system organization
  • 8.5 LPP filesets
  • 8.5.1 PSSP prerequisites
  • 8.6 PSSP filesets installation on the CWS
  • 8.6.1 Copy of the PSSP images
  • 8.6.2 Move prerequisite files for PSSP 3.5
  • 8.6.3 Copy the minimum AIX image (mksysb)
  • 8.6.4 Install PSSP prerequisites
  • 8.6.5 Install the runtime files
  • 8.6.6 Install the RSCT files
  • 8.6.7 Install the HMC-controlled server files
  • 8.6.8 Installation of PSSP filesets on the CWS
  • 8.7 Setting the authentication services on the CWS
  • 8.7.1 Authentication setting on the CWS for remote commands
  • 8.7.2 Setting the authentication method for PSSP trusted services
  • 8.8 Configuring and verifying the CWS
  • 8.9 Sample questions
  • 8.10 Exercises
  • Chapter 9. Frame and node installation
  • 9.1 Key concepts
  • 9.2 Installation steps and associated key commands
  • 9.2.1 Enter site environment information
  • 9.2.2 Enter Hardware Management Console (HMC) information (HMC-controlled servers only)
  • 9.2.3 Enter frame information
  • 9.2.4 Check the level of supervisor microcode
  • 9.2.5 Check the previous installation steps
  • 9.2.6 Define the nodes' Ethernet information
  • 9.2.7 Discover or configure the Ethernet hardware address
  • 9.2.8 Configure additional adapters for nodes
  • 9.2.9 Assign initial host names to nodes.
  • 9.2.10 PSSP security installation and configuration
  • 9.2.11 Start RSCT subsystems
  • 9.2.12 Set up nodes to be installed
  • 9.2.13 spchvgobj
  • 9.2.14 Verify all node information
  • 9.2.15 Change the default network tunable values
  • 9.2.16 Perform additional node customization
  • 9.2.17 spbootins
  • 9.2.18 Setting the switch
  • 9.2.19 Configuring the CWS as boot/install server
  • 9.2.20 Verify that the System Management tools were correctly installed
  • 9.2.21 Network boot the boot/install server and nodes
  • 9.2.22 Verify node installation
  • 9.2.23 Enable s1_tty on the SP-attached server (SAMI protocol only)
  • 9.2.24 Update authorization files in restricted mode for boot/install servers (optional)
  • 9.2.25 Run verification tests on all nodes
  • 9.2.26 Check the system
  • 9.2.27 Start the switch
  • 9.2.28 Verify that the switch was installed correctly
  • 9.3 Key files
  • 9.3.1 /etc/bootptab.info
  • 9.3.2 /tftpboot
  • 9.3.3 /usr/sys/inst.images
  • 9.3.4 /spdata/sys1/install/images
  • 9.3.5 /spdata/sys1/install/&lt
  • name&gt
  • /lppsource
  • 9.3.6 /spdata/sys1/install/pssplpp/PSSP-x.x
  • 9.3.7 /spdata/sys1/install/pssp
  • 9.3.8 image.data
  • 9.4 Related documentation
  • 9.5 Sample questions
  • 9.6 Exercises
  • Chapter 10. Verification commands and methods
  • 10.1 Key concepts
  • 10.2 Introduction to Cluster 1600 system checking
  • 10.3 Key commands
  • 10.3.1 Verify installation of software
  • 10.3.2 Verify system partitions
  • 10.3.3 Verifying the authentication services
  • 10.3.4 Checking subsystems
  • 10.3.5 Monitoring hardware status
  • 10.3.6 Monitoring node LEDs: spmon -L, spled
  • 10.3.7 Extracting SDR contents
  • 10.3.8 Checking IP connectivity: ping/telnet/rlogin
  • 10.3.9 SMIT access to verification commands
  • 10.4 Graphical user interface
  • 10.5 Key daemons
  • 10.5.1 Sdrd
  • 10.5.2 Hardmon
  • 10.5.3 Worm.
  • 10.5.4 Topology Services, Group Services, and Event Management.