1 Network Information System (NIS). 2 Module – Network Information System (NIS) ♦ Overview This module focuses on configuring and managing Network Information.

Slides:



Advertisements
Similar presentations
1 Dynamic DNS. 2 Module - Dynamic DNS ♦ Overview The domain names and IP addresses of hosts and the devices may change for many reasons. This module focuses.
Advertisements

Linux Boot Loaders. ♦ Overview A boot loader is a small program that exists in the system and loads the operating system into the system’s memory at system.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
NIS Consistent configuration across the network. Why NIS? Primary reason is to provide same user configuration across the network Users go any machine.
NIS – Network Information System WeeSan Lee
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Chapter Apache Installation in Linux- Mandrake. Acknowledgment The following information has been obtained directly from
Systems Architecture, Fourth Edition1 Internet and Distributed Application Services Chapter 13.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 5 Introduction to DNS in Windows Server 2008.
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 7 Configuring File Services in Windows Server 2008.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Linux+ Guide to Linux Certification, Third Edition
DHCP. DHCP (Dynamic Host Configuration Protocol) is a network service that enables clients to obtain network settings (IP Address, Subnet Mask, Default.
Course 6425A Module 9: Implementing an Active Directory Domain Services Maintenance Plan Presentation: 55 minutes Lab: 75 minutes This module helps students.
1 SAMBA. 2 Module - SAMBA ♦ Overview The presence of diverse machines in the network environment is natural. So their interoperability is critical. This.
Managing Software using RPM. ♦ Overview In Linux, Red Hat Package Manager referred as RPM is a tool used for managing software packages and its main function.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Lecture – Single Login NIS and Winbind. NIS Network Information Service (NIS) is the traditional directory service on UNIX platforms Still widely used.
Module 4: Add Client Computers and Devices to the Network.
Connecting to Network. ♦ Overview ► A network connection is required to communicate with other computers when they are in a network. Network interface.
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 4 Manage Software for SUSE Linux Enterprise Server.
1 Network File Sharing. 2 Module - Network File Sharing ♦ Overview This module focuses on configuring Network File System (NFS) for servers and clients.
Module 5: Planning a DNS Strategy. Overview Planning DNS Servers Planning a Namespace Planning Zones Planning Zone Replication and Delegation Integrating.
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
1 Linux Basics for Networking. 2 Module - Linux Basics for Networking ♦ Overview This module focuses on the basics of networking using Redhat Enterprise.
Setting up NIS and HTTP. Network Information Service Reading: 1. Linux NIS HOWTO: howto/HOWTOhttp://
ITI-481: Unix Administration Meeting 5. Today’s Agenda Network Information Service (NIS) The Cron Program Syslogd and Logging.
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
1 Apache. 2 Module - Apache ♦ Overview This module focuses on configuring and customizing Apache web server. Apache is a commonly used Hypertext Transfer.
Domain Name System CH 25 Aseel Alturki
Samba Advanced System Administration Course James Lwali University computing Centre Ltd, University of Dar es salaam,
Module 7 Active Directory and Account Management.
Centralized logins with NIS Eric Stolten Tim Meade Mark Sidnam.
Module 7: Managing the User Environment by Using Group Policy.
1 Electronic Messaging Module - Electronic Messaging ♦ Overview Electronic messaging helps you exchange messages with other computer users anywhere in.
New SA Training Topic 6: Service Management Our organization takes advantage of many service type to provide functionality to users and ease management.
1 Chapter Overview Preparing to Upgrade Performing a Version Upgrade from Microsoft SQL Server 7.0 Performing an Online Database Upgrade from SQL Server.
1 Chapter Overview Performing Configuration Tasks Setting Up Additional Features Performing Maintenance Tasks.
A Brief Documentation.  Provides basic information about connection, server, and client.
CIS 192B – Lesson 3 Network Information Services.
1 Internet Network Services. 2 Module - Internet Network Services ♦ Overview This module focuses on configuring and customizing the servers on the network.
1 Linux Networking and Security Chapter 5. 2 Configuring File Sharing Services Configure an FTP server for anonymous or regular users Set up NFS file.
Kickstart Installation
Linux Kernel Management. Module 9 – Kernel Administration ♦ Overview The innermost layer of Linux operating system is the kernel, which is a thin layer.
Module 1: Implementing Active Directory ® Domain Services.
Creating and Managing File Systems. Module 5 – Creating and Managing File Systems ♦ Overview This module deals with the structure of the file system,
Linux Security. Module 13 – Linux Security ♦ Overview Linux is more prone today to security loopholes and attacks, both inside and outside the network.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
3 Copyright © 2004, Oracle. All rights reserved. Controlling Access to the Oracle Listener.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
By Rashid Khan Lesson 6-Building a Directory Service.
DNS DNS overview DNS operation DNS zones. DNS Overview Name to IP address lookup service based on Domain Names Some DNS servers hold name and address.
Linux Services Configuration
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
Module 10: Windows Firewall and Caching Fundamentals.
Linux Operations and Administration
Linux Operations and Administration
Introduction to Active Directory
Web Server Administration Chapter 4 Name Resolution.
Linux Operations and Administration Chapter Twelve Configuring a Mail Server.
1 Security of NIS (YP) Gary Lam
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
19 Copyright © 2008, Oracle. All rights reserved. Security.
Chapter 17: Sharing System Files Stephen Workman.
VMware ESX and ESXi Module 3.
IMPLEMENTING NAME RESOLUTION USING DNS
NIS Concepts and Configuration
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts.
Presentation transcript:

1 Network Information System (NIS)

2 Module – Network Information System (NIS) ♦ Overview This module focuses on configuring and managing Network Information System (NIS). This is a service to distribute information to be shared by all machines in the Network. It also helps to centrally administer the sharing of information by different users. ♦ Lessons covered in this module ► Introduction to NIS ► Configuring NIS ► Managing NIS

3 Network Information System (NIS) Lesson 1 - Introduction to NIS ♦ Introduction DNS is used in internet, which is a large public Network. Similarly smaller private Linux networks have their own systems for sharing of information across the Network. Network Information System is one such Linux service. ♦ Topics covered in this lesson ► Essentials of NIS ► NIS Name Server Hierarchy ► NIS Domains and Maps ► NIS Topologies

4 Network Information System (NIS) Topic 1 – Essentials of NIS ♦ Essential elements for an NIS are NIS installation packages, NIS servers, NIS domains, NIS maps, NIS daemons and NIS clients. For a complete NIS setup at least one NIS server and one or more NIS clients should be configured. ♦ If the network already has NIS servers, NIS client programs should be installed and configured. If network does not have NIS servers, a master server, one or more slave servers and also some NIS clients should be configured.

5 Network Information System (NIS) Topic 2 – NIS Name Server Hierarchy ♦ NIS Name servers have a hierarchy. NIS servers are divided into master and slave servers. A master server has the authoritative copies of the NIS maps, while a slave server maintains copies of the maps, received from the master. ♦ Whenever the maps on the master server change, the slaves receive updated copies. The difference is : Slave servers receive only copies of the DBM databases, not the ASCII source files. ♦ If the master server becomes unavailable for some reason, slave servers can function as backup servers.

6 Network Information System (NIS) Topic 3 - NIS Domains and Maps ♦ NIS domain is a unique name that refers to a group of systems using the NIS maps. NIS domains organize groups of systems which need the same information in a logical unit. There are no physical restrictions on the structure of a domain. ♦ NIS server has a centrally administered database of information shared across the NIS network. NIS clients use NIS to query servers for information stored in the databases. These databases are known as NIS maps. These are stored in DBM format.

7 Network Information System (NIS) Topic 4 - NIS Topologies ♦ NIS is configured in the following combinations known as topologies ► Single-domain/single-server ► Single-domain/multiple-server ► Multiple domains/single server ► Multiple domains/ multiple-server ♦ In a Multiple domains/multiple server NIS configuration. Each domain has a slave server. Some of the clients in each domain prefer to contact the slave servers rather than the master server. Any client communicates with the server for its domain that responds the fastest.

8 Network Information System (NIS) Lesson 2 – Configuring NIS ♦ Introduction Configuring NIS involves configuring at least one NIS server and one or more NIS clients. Complete NIS installation needs three NIS packages and two NIS daemons. ♦ Topics covered in this lesson ► NIS Daemons ► Configuring NIS Servers ► Configuring NIS Clients

9 Network Information System (NIS) Topic 1 - NIS Daemons ♦ NIS password daemon handles password changes and updating other NIS information that depends on user passwords. It runs only on the master server. It is started executing its initialization script with the start argument. server1~]# service yppassword start ♦ NIS transfer daemon speeds up the transfer process by enabling slave servers to copy the NIS maps from the Master server. The transfer daemon runs only on the Master server. To start the transfer daemon, execute the command: server1~]# /sbin/service ypxfrd start

10 Network Information System (NIS) Topic 2 - Configuring NIS Servers ♦ Configuring NIS server involves the following steps ► NIS domain name setting ► Configuration file editing ► Starting the server and NIS daemons ► NIS map initialization ► Startup modification to start the daemons at system reboot ♦ NIS packages are ypbind, ypserv and yp-tools. The key configuration files are /var/yp/securenets and /etc/ypserv.conf.

11 Network Information System (NIS) Topic 3 - Configuring NIS Clients ♦ The procedure for setting up NIS clients involves setting the NIS domain name, configuring and starting the NIS client daemon, testing it and configuring the client's startup files to use NIS. ♦ Install the RPMs : portmap, ypbind, yp-tools. By default authconfig and authconfig-gtk packages will be installed. ♦ Restart sshd service to register authentication changes. ♦ Use system-config-authentication to configure your host to use NIS and test by running ypwhich.

12 Network Information System (NIS) Lesson 3 - Managing NIS ♦ Introduction After installation and configuration the NIS service has to be managed for efficient function. For this the server and the clients should be tested for their access authentication and obtaining of NIS maps. ♦ Topics covered in this lesson ► Testing NIS ► Prorating and Fetching NIS Maps ► Restricting Access to NIS Clients and Servers

13 Network Information System (NIS) Topic 1 - Testing NIS ♦ Check log files in /var/log ♦ Check the registration of NIS services and the ports used ♦ Check for ypbind on clients ♦ Check for ypserv and rpc.yppasswdd on servers ♦ Run ypwhich and getent passwd.

14 Network Information System (NIS) Topic 2 - Prorating and Fetching NIS Maps ♦ NIS commands to fetch the required NIS Maps from the NIS servers connected to the network. ► ypcat --- Print the entries in an NIS Map ► ypmatch --- Print the value of entries in an NIS map ► yppasswd --- Change user passwords on the NIS server ► yppoll --- Show the server and version number of an NIS map ► ypwhich --- Show the name of the NIS master server ♦ ypwhich with the -x option displays the list of available maps. For a specific piece of information, use the ypmatch command.

15 Network Information System (NIS) Topic 3 - Restricting Access to NIS Clients and Servers ♦ Sometimes it may be necessary to prevent access for some users managed by the NIS server to the NIS client. Then you should modify your NIS client to allow all local users and selected NIS users to log in, while prohibiting all other NIS users from logging in. ♦ These restrictions can be incorporated by editing the account section lines in the /etc/pam.d/system-auth file on NIS client. ♦ If there are problems check /var/log/messages and /var/log/secure. Check also if portmap and ypserv services are running.

16 Network Information System (NIS) Lab Exercises ♦ Restricting access to the NIS service for specified users.

17 Network Information System (NIS) Conclusion ♦ Summary ► NIS is a service to distribute and centrally administer information to be shared by all machines in the Network. NIS master server stores the authoritative NIS maps and slave servers maintain copies of the maps, received from the master. ► Test NIS by checking the configuration files and logging on as different users. It should allow only permitted users. Using client commands you can check and fetch NIS maps. Server and client files should both be configured to allow NIS access to authorized users ♦ Question and Answer Session