Book description
The most recent maintenance release of IBM AIX 5L Version 5.3 includes a significant set of new features added to the NFSv4 implementation. In 2004, the first IBM Redbooks publication devoted to the topic of NFSv4 implementation in AIX 5L was published: "Securing NFS in AIX: An Introduction to NFS V4 in AIX 5L," SG24-7204.
This book provides additional up-to-date information to help IBM clients understand and take advantage of the new NFSv4 functions provided by AIX 5L Version 5.3 with the 5300-03 Recommended Maintenance Package.
The NFSv4 implementation in AIX 5L has now expanded to provide core features that make it capable of providing a much broader range of distributed file system services than any prior version of NFS. The scope of this book includes methods for implementing NFSv4 in the enterprise and extensive coverage of methods for how it can potentially be used as a migration target for existing AFS-based and DCE/DFS-based enterprise file systems.
Please note that the additional material referenced in the text is not available from IBM.
Table of contents
- Notices
- Preface
- Part 1: Introduction
-
Part 2: NFSv4 on AIX 5L V5.3
-
Chapter 3: NFSv4 implementation
- Implementation of the NFSv4 protocol in AIX 5L V5.3
- NFSv4 features supported in the initial AIX 5L V5.3 release
- Features introduced in AIX 5L V5.3 RML03 (1/5)
- Features introduced in AIX 5L V5.3 RML03 (2/5)
- Features introduced in AIX 5L V5.3 RML03 (3/5)
- Features introduced in AIX 5L V5.3 RML03 (4/5)
- Features introduced in AIX 5L V5.3 RML03 (5/5)
- List of NFSv4 features supported in AIX 5L V5.3
- Chapter 4: Using NFSv4 with JFS2 or GPFS
- Chapter 5: Using NFSv4 features
-
Chapter 3: NFSv4 implementation
-
Part 3: Preparing to use NFSv4
-
Chapter 6: Building an NFSv4 environment
- Environment used for demonstration scenarios
- Infrastructure setup flow
- Network Time Protocol (NTP) configuration
- IBM Tivoli Directory Server V5.2
- IBM Network Authentication Services (Kerberos V5) server installation (1/2)
- IBM Network Authentication Services (Kerberos V5) server installation (2/2)
- IBM Tivoli Directory Server client configuration
- IBM Network Authentication Services client install and configuration (1/2)
- IBM Network Authentication Services client install and configuration (2/2)
- Installing GPFS
- Configuring GPFS (1/2)
- Configuring GPFS (2/2)
- Chapter 7: Migration considerations
- Chapter 8: Migration scenarios
-
Chapter 6: Building an NFSv4 environment
-
Part 4: Migrating to NFSv4
- Chapter 9: NFSv3 to NFSv4 migration
- Chapter 10: Planning a migration from DFS
- Chapter 11: Illustrated DFS migration
-
Chapter 12: Planning a migration from AFS
- A broad overview of AFS
- Security differences between AFS and NFSv4
- Migrating AFS users to NFSv4
- Migrating AFS groups to NFSv4
- Comparing an AFS “cell” and an NFS “domain”
- File system semantics
- Building a namespace
- Migrating AFS data to NFSv4 servers
- Access control lists (1/2)
- Access control lists (2/2)
- Chapter 13: Illustrated AFS migration
-
Part 5: Appendixes
- Appendix A: Test environment
- Appendix B: Case study: IBM Global Storage Architecture
- Appendix C: Configuring Network Time Service
- Appendix D: AIX 5L V5.3 NFS quick reference
-
Appendix E: Scripts and configuration files
- Sample LDAP LDIF file for the KDC realm
- Script to add users to the KDC
- DFS to AIXC ACL migration example
- DFS to NFSv4 migration example (1/2)
- DFS to NFSv4 migration example (2/2)
- AFS to Kerberos/LDAP user migration
- AFS to Kerberos/LDAP group migration
- AFS to NFSv4 ACL migration (1/2)
- AFS to NFSv4 ACL migration (2/2)
- Migrate DCE groups to LDAP
- Migrate DCE groups to LDAP
- Copy ACL
- Appendix F: Installing an AIX 5L maintenance level
- Appendix G: Sample migration planning worksheet
- Appendix H: Additional material
- Related publications
- Index (1/2)
- Index (2/2)
- Back cover
Product information
- Title: Implementing NFSv4 in the Enterprise: Planning and Migration Strategies
- Author(s):
- Release date: December 2005
- Publisher(s): IBM Redbooks
- ISBN: 9780738494234
You might also like
article
Relational Power Is the New Currency of Hybrid Work
The growing use of text-based messaging platforms such as Slack and Huddle means that many manager-employee …
book
What Is Portainer?
Portainer works with both Docker and Kubernetes to make the deployment and management of containerized applications …
article
Have ChatGPT Ask You Questions
ChatGPT Shortcuts shows future prompt engineers how to harness the full potential of the state-of-the-art AI …
book
Cloud-Native Development and Migration to Jakarta EE
A pragmatic guide for modernizing your Java EE App with Jakarta EE for cloud-native, serverless excellence …