Cover image for IBM eServer Certification Study Guide : Cluster 1600 Managed by PSSP.
IBM eServer Certification Study Guide : Cluster 1600 Managed by PSSP.
Title:
IBM eServer Certification Study Guide : Cluster 1600 Managed by PSSP.
Author:
Redbooks, IBM.
Personal Author:
Physical Description:
1 online resource (592 pages)
Contents:
Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Chapter 1. Introduction -- 1.1 Book organization -- 1.2 The test scenario -- Part 1 System planning -- Chapter 2. Validate hardware and software configuration -- 2.1 Key concepts you should study -- 2.2 Hardware -- 2.2.1 Overview of the available frames -- 2.2.2 Tall frames -- 2.2.3 Short frames -- 2.2.4 SP Switch frames -- 2.2.5 Power supplies -- 2.2.6 Hardware control and supervision -- 2.3 Cluster 1600 nodes -- 2.3.1 Internal nodes -- 2.3.2 External nodes -- 2.3.3 POWER4™ technology -- 2.4 Dependent nodes -- 2.4.1 SP Switch Router -- 2.4.2 SP Switch Router attachment -- 2.5 Control workstation -- 2.5.1 Supported control workstations -- 2.5.2 Control workstation minimum hardware requirements -- 2.5.3 High Availability Control Workstation -- 2.6 Hardware Management Console (HMC) -- 2.7 Cluster 1600 feature codes -- 2.8 Boot/install server requirements -- 2.9 SP Switch and SP Switch2 communication network -- 2.9.1 Adapter placements for SP Switch and SP Switch2 adapters -- 2.9.2 SP Switch hardware components -- 2.9.3 SP Switch networking fundamentals -- 2.9.4 SP Switch network products -- 2.10 Peripheral devices -- 2.11 Network connectivity adapters -- 2.12 Space requirements -- 2.13 Software requirements -- 2.14 System partitioning with the SP Switch -- 2.15 Cluster 1600 configuration rules -- 2.15.1 Short frame configurations -- 2.15.2 Tall frame configurations -- 2.16 Numbering rules -- 2.16.1 The frame numbering rule -- 2.16.2 The slot numbering rule -- 2.16.3 The node numbering rule -- 2.16.4 The switch port numbering rule -- 2.17 Sample questions -- 2.18 Exercises -- Chapter 3. Cluster 1600 networking -- 3.1 Key concepts you should study -- 3.2 Name, address, and network integration planning.

3.2.1 Configure SP Ethernet admin LAN adapter -- 3.2.2 Set routes -- 3.2.3 Host name resolution -- 3.2.4 DNS -- 3.3 Networks -- 3.3.1 The SP Ethernet admin LAN -- 3.3.2 Frame and node cabling -- 3.3.3 SP LAN topologies -- 3.3.4 Additional LANs -- 3.3.5 Switch network -- 3.3.6 Subnetting considerations -- 3.4 Routing considerations -- 3.5 Using NIS in a Cluster 1600 configuration -- 3.6 Using AFS® in a Cluster 1600 configuration -- 3.7 Related documentation -- 3.8 Sample questions -- 3.9 Exercises -- Chapter 4. I/O devices and file systems -- 4.1 Key concepts you should study -- 4.2 I/O devices -- 4.2.1 External disk storage -- 4.2.2 Internal I/O adapters -- 4.3 Multiple rootvg support -- 4.3.1 The Volume_Group class -- 4.3.2 Volume group management commands -- 4.3.3 How to declare a new rootvg -- 4.3.4 Booting from external disks -- 4.4 Global file systems -- 4.4.1 Network File System (NFS) -- 4.4.2 The DFS and AFS file systems -- 4.5 Related documentation -- 4.6 Sample questions -- 4.7 Exercises -- Chapter 5. Cluster 1600 installation and administration -- 5.1 Key concepts -- 5.2 Hardware attachment -- 5.2.1 Cluster 1600 overview -- 5.2.2 Cluster 1600 scaling limits and rules -- 5.2.3 External node attachment -- 5.3 Cluster 1600 installation requirements -- 5.3.1 System specific requirements -- 5.3.2 Software requirements -- 5.4 Installation and configuration -- 5.5 PSSP support -- 5.5.1 SDR classes -- 5.5.2 Hardmon -- 5.6 User interfaces -- 5.6.1 Perspectives -- 5.6.2 Hardware Management Console -- 5.7 Attachment scenarios -- 5.8 Related documentation -- 5.9 Sample questions -- 5.10 Exercises -- Chapter 6. Cluster 1600 security -- 6.1 Key concepts -- 6.2 Security-related concepts -- 6.2.1 Secure remote execution commands -- 6.2.2 Using the secure remote command process -- 6.3 Defining Kerberos -- 6.4 Kerberos -- 6.4.1 Kerberos daemons.

6.4.2 Kerberos authentication process -- 6.5 Kerberos paths, directories, and files -- 6.6 Authentication services procedures -- 6.7 Kerberos passwords and master key -- 6.8 Kerberos principals -- 6.8.1 Add a Kerberos principal -- 6.8.2 Change the attributes of the Kerberos principal -- 6.8.3 Delete Kerberos principals -- 6.9 Server key -- 6.9.1 Change a server key -- 6.10 Using additional Kerberos servers -- 6.10.1 Set up and initialize a secondary Kerberos server -- 6.10.2 Managing the Kerberos secondary server database -- 6.11 SP services that utilize Kerberos -- 6.11.1 Hardware control subsystem -- 6.11.2 Remote execution commands -- 6.12 Sysctl is a PSSP Kerberos-based security system -- 6.12.1 Sysctl components and process -- 6.12.2 Terms and files related to the sysctl process -- 6.13 Related documentation -- 6.14 Sample questions -- 6.15 Exercises -- Chapter 7. User and data management -- 7.1 Key concepts -- 7.2 Administering users on a Cluster 1600 system -- 7.3 SP User data management -- 7.3.1 SP User Management (SPUM) -- 7.3.2 Set up SPUM -- 7.3.3 Add, change, delete, and list SP users -- 7.3.4 Change SP user passwords -- 7.3.5 Login control -- 7.3.6 Access control -- 7.4 Configuring NIS -- 7.5 File collections -- 7.5.1 Terms and features of file collections -- 7.5.2 File collection types -- 7.5.3 Predefined file collections -- 7.5.4 File collection structure -- 7.5.5 File collection update process -- 7.5.6 Supman user ID and supfilesrv daemon -- 7.5.7 Commands to include or exclude files from a file collection -- 7.5.8 Work and manage file collections -- 7.5.9 Modifying the file collection hierarchy -- 7.5.10 Steps in building a file collection -- 7.5.11 Installing a file collection -- 7.5.12 Removing a file collection -- 7.5.13 Diagnosing file collection problems -- 7.6 SP user file and directory management -- 7.6.1 AIX Automounter.

7.7 Related documentation -- 7.8 Sample questions -- 7.9 Exercises -- Part 2 Installation and configuration -- Chapter 8. Configuring the control workstation -- 8.1 Key concepts -- 8.2 Summary of CWS configuration -- 8.3 Key commands and files -- 8.3.1 setup_authent -- 8.3.2 chauthts -- 8.3.3 k4init -- 8.3.4 install_cw -- 8.3.5 .profile, /etc/profile, or /etc/environment -- 8.3.6 /etc/inittab -- 8.3.7 /etc/inetd.conf -- 8.3.8 /etc/rc.net -- 8.3.9 /etc/services -- 8.4 Environment requirements -- 8.4.1 Connectivity -- 8.4.2 Disk space and file system organization -- 8.5 LPP filesets -- 8.5.1 PSSP prerequisites -- 8.6 PSSP filesets installation on the CWS -- 8.6.1 Copy of the PSSP images -- 8.6.2 Move prerequisite files for PSSP 3.5 -- 8.6.3 Copy the minimum AIX image (mksysb) -- 8.6.4 Install PSSP prerequisites -- 8.6.5 Install the runtime files -- 8.6.6 Install the RSCT files -- 8.6.7 Install the HMC-controlled server files -- 8.6.8 Installation of PSSP filesets on the CWS -- 8.7 Setting the authentication services on the CWS -- 8.7.1 Authentication setting on the CWS for remote commands -- 8.7.2 Setting the authentication method for PSSP trusted services -- 8.8 Configuring and verifying the CWS -- 8.9 Sample questions -- 8.10 Exercises -- Chapter 9. Frame and node installation -- 9.1 Key concepts -- 9.2 Installation steps and associated key commands -- 9.2.1 Enter site environment information -- 9.2.2 Enter Hardware Management Console (HMC) information (HMC-controlled servers only) -- 9.2.3 Enter frame information -- 9.2.4 Check the level of supervisor microcode -- 9.2.5 Check the previous installation steps -- 9.2.6 Define the nodes' Ethernet information -- 9.2.7 Discover or configure the Ethernet hardware address -- 9.2.8 Configure additional adapters for nodes -- 9.2.9 Assign initial host names to nodes.

9.2.10 PSSP security installation and configuration -- 9.2.11 Start RSCT subsystems -- 9.2.12 Set up nodes to be installed -- 9.2.13 spchvgobj -- 9.2.14 Verify all node information -- 9.2.15 Change the default network tunable values -- 9.2.16 Perform additional node customization -- 9.2.17 spbootins -- 9.2.18 Setting the switch -- 9.2.19 Configuring the CWS as boot/install server -- 9.2.20 Verify that the System Management tools were correctly installed -- 9.2.21 Network boot the boot/install server and nodes -- 9.2.22 Verify node installation -- 9.2.23 Enable s1_tty on the SP-attached server (SAMI protocol only) -- 9.2.24 Update authorization files in restricted mode for boot/install servers (optional) -- 9.2.25 Run verification tests on all nodes -- 9.2.26 Check the system -- 9.2.27 Start the switch -- 9.2.28 Verify that the switch was installed correctly -- 9.3 Key files -- 9.3.1 /etc/bootptab.info -- 9.3.2 /tftpboot -- 9.3.3 /usr/sys/inst.images -- 9.3.4 /spdata/sys1/install/images -- 9.3.5 /spdata/sys1/install//lppsource -- 9.3.6 /spdata/sys1/install/pssplpp/PSSP-x.x -- 9.3.7 /spdata/sys1/install/pssp -- 9.3.8 image.data -- 9.4 Related documentation -- 9.5 Sample questions -- 9.6 Exercises -- Chapter 10. Verification commands and methods -- 10.1 Key concepts -- 10.2 Introduction to Cluster 1600 system checking -- 10.3 Key commands -- 10.3.1 Verify installation of software -- 10.3.2 Verify system partitions -- 10.3.3 Verifying the authentication services -- 10.3.4 Checking subsystems -- 10.3.5 Monitoring hardware status -- 10.3.6 Monitoring node LEDs: spmon -L, spled -- 10.3.7 Extracting SDR contents -- 10.3.8 Checking IP connectivity: ping/telnet/rlogin -- 10.3.9 SMIT access to verification commands -- 10.4 Graphical user interface -- 10.5 Key daemons -- 10.5.1 Sdrd -- 10.5.2 Hardmon -- 10.5.3 Worm.

10.5.4 Topology Services, Group Services, and Event Management.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: