Hot Topics |
Hot topics are quick bite-sized learning events on items relating to service and support.
Current hot topics:
If you have an idea or need for a Hot Topic presentation let us know by clicking the Notes tab and leaving a note.
During the Active Directory: An Introduction hot topic presentation, a Quantum-qualified DXi instructor provided an overview of Active Directory, showed how Active Directory interacts with DXi systems and how to set it up, and provided troubleshooting tips.
Download the presentation. If you want to print the presentation, consider choosing the "Print handouts" option, which allows you to print a few slides per page with lines for notes.
The following reference provides instructions for using the "net ads" and "net rpc" commands for troubleshooting samba issues:
http://www.samba.org/samba/docs/man/Samba-HOWTO-Collection/NetCommand.html
Samba: is a free software re-implementation of the SMB/CIFS networking protocol. Samba provides file and print services for various Microsoft Windows clients and can integrate with a Windows Server domain, either as a Primary Domain Controller (PDC) or as a domain member. It can also be part of an Active Directory domain.
Active Directory: is a directory service created by Microsoft. Active Directory (AD) uses a number of standardized protocols to provide a variety of network services, including:
Features include:
ADstores all information and settings for a deployment in a central database. Active Directory allows administrators to assign policies, deploy and update software. Active Directory networks can vary from a small installation with a few computers, users and printers to tens of thousands of users, many different network domains and large server farms spanning many geographical locations.
LDAP: The Lightweight Directory Access Protocol is an application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network. Directory services may provide any organized set of records, often with a hierarchical structure, such as a corporate electronic mail directory. Similarly, a telephone directory is a list of subscribers with an address and a phone number.
Workgroup: Aworkgroup is a collection of computers on a local area network (LAN) that share common resources and responsibilities. Workgroups provide easy sharing of files, printers and other network resources. Being a peer-to-peer (P2P) network design, each workgroup computer may both share and access resources if configured to do so.
Kerberos: a computer network authentication protocol which works on the basis of "tickets" to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. Its designers aimed primarily at a client–server model, and it provides mutual authentication — both the user and the server verify each other's identity. Kerberos protocol messages are protected against eavesdropping and replay attacks. Kerberos builds on symmetric key cryptography and requires a trusted third party, and optionally may use public-key cryptography by utilizing asymmetric key cryptography during certain phases of authentication. Kerberos uses port 88 by default.
klist: displays the entries in the local credentials cache and key table. After the user has modified the credentials cache with kinit or modified the keytab with ktab, the only way to verify the changes is to view the contents of the credentials cache and/or keytab using klist. klist does not change the Kerberos database.
kinit: kinit is used to obtain and cache Kerberos ticket-granting tickets. This tool is similar in functionality to the kinit tools commonly found in other Kerberos implementations, such as SEAM and MIT Reference implementations. The user must be registered as a principal with the Key Distribution Center (KDC) prior to running kinit.
CIFS: The Common Internet File System (CIFS), also known as Server Message Block (SMB), is a network protocol whose most common use is sharing files on a Local Area Network (LAN). The protocol allows a client to manipulate files just as if they were on the local computer. Operations such as read, write, create, delete, and rename are all supported – the only difference being that the files are not on the local computer and are actually on a remote server. The CIFS protocol is most commonly used with Microsoft operating systems.
Domains and Sites: Many people think that a domain is a geographical concept and that machines in a domain are always local. This is not true. There is another AD concept for this instead: the site. It is fairly common to see domains spanning different sites.
Domain Controllers and Authentication
A domain controller is involvied with authentication operations (logging in, joining a domain). Authentication is always carried through a domain controller. Either a domain controller is directly specified, or the machine trying to authenticate will look for a suitable domain controller. This is done by querying specific DNS records called SRV records.
When setting up which DNS server the DXi is using, it is important to point to a DNS server that knows about these SRV records. The easiest is to use a domain controller as DNS server if possible because typically at least some domain controllers will be set up as DNS servers.
Troubleshooting which DCs we are talking to
During the Active Directory: Behind the Scenes presentation, a Quantum-qualified DXi instructor shows you how to use the individual commands and the steps for working with Active Directory, all from the DXi CLI. It gives you a good idea what is happening behind the scenes.
Download the presentation. If you want to print the presentation, consider choosing the "Print handouts" option, which allows you to print a few slides per page with lines for notes.
During the SANtricity: An Introduction hot topic presentation, a Quantum-qualified DXi instructor provided an overview of SANtricity. You will learn how SANtricity can help you with your day-to-day job and how to connect to SANtricity using either VNC or Xming You will also learn how to use several SMcli commands, manage storage arrays, and use the SANtricity tools such as MEL and recovery guru.
Download the presentation. If you want to print the presentation, consider choosing the "Print handouts" option, which allows you to print a few slides per page with lines for notes.
Download a copy of the Accessing SANtricity job aid for future reference.
Download a copy of the LSI SMcli: Basic Commands job aid for future reference.
Notes |