Saturday, December 12, 2009

Dell/EMC CX4-240

High performance storage with connectivity flexibility

The CX4-240 offers remarkable flexibility and investment protection and increased connectivity options and capacity over the CX4-120. It is ideal for heavy transaction processing such as high speed large block data transfers, backup-to-disk, audio/video streaming, replication and departmental applications.

* Supports up to 240 Hard Drives
* Stores up to 234TB of data
* Customized connectivity with up to 512 hosts in a SAN and 8 I/O slots
* All of these connectivity options are available on the same array:
8Gbit Fibre Channel (FC),
4Gbit FC,
10Gbit iSCSI, and
1Gbit iSCSI



UltraFlexTM modular I/O technology enables you to easily add more ports to your array, either Fibre Channel (FC) or iSCSI, as your needs change. You can also easily add future network technologies, such as FCoE once it is available, giving you remarkable flexibility and investment protection. The innovations built into the new Dell/EMC CX4 arrays extend beyond just flexible I/O to include virtual provisioning, support for enterprise flash drives (EFD), enhanced tiering options, features, such as drive spin down and variable speed fans, that enable greener storage by helping to reduce power consumption, and design improvements for performance and availability. In addition, management and reporting features on the CX4 have been enhanced to help you reduce time and effort required for managing your storage in virtualized server environments.
Virtual provisioning

Employ virtual provisioning to help reduce acquisition and operational costs while helping to improve capacity utilization. This can result in fewer drives and can help reduce hardware costs, management time, and power consumption.
Innovation
Cost effective scalability



Cost effective scalability


The CX4-240 array can scale from 5 to 240 drives, connect to as many as 512 highly available hosts in a SAN and store up to 234TB of data, and the extensive support matrix makes it easy to add storage in heterogeneous environments. The CX4 helps ease growing pains allowing you to easily add more capacity, whether it is 10K or 15K FC, 7.2K or 5.4K (energy efficient) SATA or flash drives, as your storage needs change. UltraFlex technology enables you to increase the ports on your array through up to 8 hot-pluggable I/O modules. In addition, the new enterprise flash drives (EFD) option adds a new level of performance for critical applications where 1 EFD can equal up to the performance of 30 Fibre Channel drives. Plus, if you outgrow your CX4-240, data-in-place upgrades are available to move up to an array with higher capacity and performance within the CX4 family.

Green storage

Innovations built into the new CX4 arrays help to reduce power consumption and cooling requirements.

* The new energy efficient 5,400 RPM SATA drives typically consume up to 32% less power1 than a standard 7,200 RPM SATA drive letting you select drives that use less power and help meet your access requirements.The addition of these and other drives creates new tiering options enabling you to use more efficient design in managing how and where your data is stored which offers the potential to reduce power and cooling needs.
* EFD drives, thanks to their higher performance characteristics, can often replace the need for large numbers of spinning drives.
* Drive spin down comes standard on the CX4, and enables you to easily set policies for your SATA drives in the array to power them down when not in use, helping to reduce power consumption and cooling requirements.
* Virtual provisioning is designed to reduce the total number of drives needed, and thus help reduce the power and cooling required for your storage solution.
* The CX4 includes adaptive fan technology where fans spin only at the speed that is needed to keep it cool, potentially further reducing power requirements.


Systems and data management



The same applications that provide advanced data protection, data path management, optimization, replication and migration that were available on previous CX series arrays are also supported on the CX4 arrays. These include SnapViewTM , MirrorViewTM , SAN CopyTM , Replication ManagerTM , PowerPathTM , Navisphere® Analyzer and Navisphere Quality of Service ManagerTM . The array is managed using the powerful and intuitive management interface, Navisphere Manager, which has formed the core of CX array management since its inception.
Seamless integration

With Dell/EMC storage arrays, you can easily deploy, expand, and re-deploy storage. Migrating data seamlessly between different classes of drives and RAID types can help in delivering the optimal combination of performance and availability for your unique needs. And with Virtual LUN technology, data migration takes place dynamically and effortlessly, helping avoid disruption in your environment. Dell/EMC storage arrays support the EMC data replication and migration applications, MirrorviewTM and SAN CopyTM . These optional tools let you remotely mirror data from one array to another to help meet disaster recovery goals or to simply move data across arrays.

iSCSI Support


iSCSI using traditional 1Gbit IP connections to connect the Dell/EMC CX4 storage array to server hosts is an ideal choice for a remote server environment or limited budgets. The greater bandwidth of 10Gbit iSCSI will be beneficial to customers who are building out new storage infrastructure or who want to consolidate numerous 1Gbit iSCSI hosts to a single 10Gbit connection. With CX4 arrays, you have the flexibility to choose either iSCSI or Fibre Channel connections and how many iSCSI and FC ports you may want now or later.
Solutions

Dell/EMC storage arrays are integrated into Dell’s Microsoft® Exchange® , Microsoft SQL Server® , and Oracle® solutions, which offer tested and validated reference architectures to help solve your messaging and database challenges.

Dell/EMC CX4-120 SAN Storage
















Scalable multi-protocol storage

The CX4-120 is an ideal product for customers who require increased capacity and modularity in a small, but scalable footprint with outstanding data protection and high availability in the mid-range storage market.

* Supports up to 120 Hard Drives
* Stores up to 120TB of data
* Customized connectivity with up to 256 hosts in a SAN and 6 I/O slots
* All of these connectivity options are available on the same array:
8Gbit Fibre Channel (FC),
4Gbit FC,
10Gbit iSCSI, and
1Gbit iSCSI


Innovation


UltraFlexTM modular I/O technology enables you to easily add more ports to your array, either Fibre Channel (FC) or iSCSI, as your needs change. You can also easily add future network technologies, such as FCoE once it is available, giving you remarkable flexibility and investment protection. The innovations built into the new Dell/EMC CX4 arrays extend beyond just flexible I/O to include virtual provisioning, support for enterprise flash drives (EFD), enhanced tiering options, features, such as drive spin down and variable speed fans, that enable greener storage by helping to reduce power consumption, and design improvements for performance and availability. In addition, management and reporting features on the CX4 have been enhanced to help you reduce time and effort required for managing your storage in virtualized server environments.

Virtual provisioning

Employ virtual provisioning to help reduce acquisition and operational costs while helping to improve capacity utilization. This can result in fewer drives and can help reduce hardware costs, management time, and power consumption.





Cost effective scalability

The CX4-120 array can scale from 5 to 120 drives, connect to as many as 256 highly available hosts in a SAN and store up to 120TB of data, and the extensive support matrix makes it easy to add storage in heterogeneous environments. The CX4 helps ease growing pains allowing you to easily add more capacity, whether it is 10K or 15K FC, 7.2K or 5.4K (energy efficient) SATA or flash drives, as your storage needs change. UltraFlex technology enables you to increase the ports on your array through up to 6 hot-pluggable I/O modules. In addition, the new enterprise flash drives (EFD) option adds a new level of performance for critical applications where 1 EFD can equal up to the performance of 30 Fibre Channel drives. Plus, if you outgrow your CX4-120, data-in-place upgrades are available to move up to an array with higher capacity and performance within the CX4 family.
Green storage

Innovations built into the new CX4 arrays help to reduce power consumption and cooling requirements.

* The new energy efficient 5,400 RPM SATA drives typically consume up to 32% less power1 than a standard 7,200 RPM SATA drive letting you select drives that use less power and help meet your access requirements.The addition of these and other drives creates new tiering options enabling you to use more efficient design in managing how and where your data is stored which offers the potential to reduce power and cooling needs.
* EFD drives, thanks to their higher performance characteristics, can often replace the need for large numbers of spinning drives.
* Drive spin down comes standard on the CX4, and enables you to easily set policies for your SATA drives in the array to power them down when not in use, helping to reduce power consumption and cooling requirements.
* Virtual provisioning is designed to reduce the total number of drives needed, and thus help reduce the power and cooling required for your storage solution.
* The CX4 includes adaptive fan technology where fans spin only at the speed that is needed to keep it cool, potentially further reducing power requirements.


Green storage

nnovations built into the new CX4 arrays help to reduce power consumption and cooling requirements.
  • The new energy efficient 5,400 RPM SATA drives typically consume up to 32% less power1 than a standard 7,200 RPM SATA drive letting you select drives that use less power and help meet your access requirements.The addition of these and other drives creates new tiering options enabling you to use more efficient design in managing how and where your data is stored which offers the potential to reduce power and cooling needs.
  • EFD drives, thanks to their higher performance characteristics, can often replace the need for large numbers of spinning drives.
  • Drive spin down comes standard on the CX4, and enables you to easily set policies for your SATA drives in the array to power them down when not in use, helping to reduce power consumption and cooling requirements.
  • Virtual provisioning is designed to reduce the total number of drives needed, and thus help reduce the power and cooling required for your storage solution.
  • The CX4 includes adaptive fan technology where fans spin only at the speed that is needed to keep it cool, potentially further reducing power requirements.

Systems and data management

The same applications that provide advanced data protection, data path management, optimization, replication and migration that were available on previous CX series arrays are also supported on the CX4 arrays. These include SnapViewTM , MirrorViewTM , SAN CopyTM , Replication ManagerTM , PowerPathTM , Navisphere® Analyzer and Navisphere Quality of Service ManagerTM . The array is managed using the powerful and intuitive management interface, Navisphere Manager, which has formed the core of CX array management since its inception.
Seamless integration

With Dell/EMC storage arrays, you can easily deploy, expand, and re-deploy storage. Migrating data seamlessly between different classes of drives and RAID types can help in delivering the optimal combination of performance and availability for your unique needs. And with Virtual LUN technology, data migration takes place dynamically and effortlessly, helping avoid disruption in your environment. Dell/EMC storage arrays support the EMC data replication and migration applications, MirrorviewTM and SAN CopyTM . These optional tools let you remotely mirror data from one array to another to help meet disaster recovery goals or to simply move data across arrays.

iSCSI Support

iSCSI using traditional 1Gbit IP connections to connect the Dell/EMC CX4 storage array to server hosts is an ideal choice for a remote server environment or limited budgets. The greater bandwidth of 10Gbit iSCSI will be beneficial to customers who are building out new storage infrastructure or who want to consolidate numerous 1Gbit iSCSI hosts to a single 10Gbit connection. With CX4 arrays, you have the flexibility to choose either iSCSI or Fibre Channel connections and how many iSCSI and FC ports you may want now or later.
Solutions

Dell/EMC storage arrays are integrated into Dell’s Microsoft® Exchange® , Microsoft SQL Server® , and Oracle® solutions, which offer tested and validated reference architectures to help solve your messaging and database challenges.

Managed Dedicated Host Codero Commits to Renewable Energy

With the recent purchase of 12,600 MWh in renewable energy credits (RECs), Codero now supplies 100% green power to its data centers in Phoenix, AZ and San Diego, CA and headquarters location in Overland Park, KS. Through this long-term commitment, Codero becomes the largest dedicated server and managed hosting provider in the industry to offer green hosting solutions across its entire operations. The new Green with Codero Initiative means any small- to medium-sized business can power their websites and online stores using green energy.
“Green hosting is an important step forward in our evolution as a company,” notes Phil Spencer, CEO of Codero. “Through innovative practices and opportunities like the Green-e program, our customers can make smarter energy choices for their online businesses – and that benefits all of us.”
Codero’s broad commitment to greening its operations was made possible through Ecoelectrons Renewable Energy, which specializes in helping corporations reduce their carbon footprint through the purchase of Green-e certified RECs. Green-e is the nation’s leading independent consumer protection program for the sale of renewable energy and greenhouse gas reductions in the retail market. In addition, Codero has joined USEPA’s Green Power Partnership as a Leadership Club member to support others within the industry and abroad to achieve more sustainable practices.
“EPA is pleased to welcome Codero to the Green Power Partnership. We applaud their commitment to using green power to reduce greenhouse gas emissions,” says Susan Wickwire, Chief of the Energy Supply and Industry Branch at USEPA.
Codero joins a growing list of companies and organizations taking action to reduce their greenhouse gas emissions. A member of Green-e Energy’s Marketplace program, the company now displays the Green-e logo on its website and other communication materials; this national symbol identifies Codero as an environmental leader in purchasing 100% certified renewable energy. As part of the company’s REC purchase, energy is sourced from the Pioneer Prairie Wind Farm, in Howard County, IA, and confirmed by the Center for Resource Solutions, the nation’s leading independent certification and verification program for renewable energy

New Service from Purity Networks Offers Affordable Email Protection

Purity Networks announced today the general availability of its new UserProtect service, offering the powerful email protection of Purity Networks’ other email services at an affordable, per user pricing.
The UserProtect service provides users with the full range of Purity Networks’ email protection services, including protection from spam, viruses, phishing and other malware, priced on a per user, unlimited volume basis. Prices start at just $10.95 per user per year with volume discounts available and monthly billing options are available to accounts with 10 users or more.
Account administrators will love the ease of use of the Purity Networks Account Manager. It gives administrators the ability to manage their users and their account settings from a powerful, feature-rich management console. The forthcoming new version of Purity Networks RESTful API will make integration with existing infrastructure effortless.
“With the release of UserProtect, we now offer our customers a choice of which pricing model best meets their needs,” said George A. Roberts IV, President and CEO of Purity Networks. “UserProtect offers per user, flat rate pricing and our ServerProtect and DomainProtect offer volume-based pricing.”
Purity Networks backs all of its services with a 30 day, 100% money-back satisfaction guarantee. A 99.9% uptime guarantee and a 24-hour support response guarantee are also provided to all customers at no additional charge.

About Purity Networks

Purity Networks is an internet security services and hardware company based out of the Chicago area. Founded by the creators of the HostingCon tradeshow, Purity Networks is focused on providing products and services that give people and companies the freedom to use the internet without worrying about spam, viruses and other malware

Reseller Program for Hosted Exchange 2010 Launched By InterMedia

Intermedia, today opened its industry-first hosted Exchange 2010 service to its existing and future partners. These managed service providers, value-added resellers and other technology providers can sell and support hosted Exchange 2010 under their own brand as members of Intermedia’s Private Label Partner Program.

Intermedia launched the first hosted Exchange 2010 service on November 9 and remains the only provider of hosted Exchange 2010. The service includes a 100 percent Data Protection Guarantee in addition to Intermedia’s longstanding 99.999 percent uptime service level agreement. Intermedia is able to credibly offer the Data Protection Guarantee, which is enforced by stiff financial penalties, because of the proprietary architecture the company developed to work with hosted Exchange 2010.

“With Intermedia, I can offer clients Exchange 2010 with a 100 percent Data Protection Guarantee, giving me an edge over competitors that offer only Exchange 2007,” says Etorre Dragone, president, Micro Technology Groupe. “I’m always looking for new solutions to help me expand my customer base – Exchange 2010 is definitely one that will help me close more deals with new prospects. Intermedia has proven to be a leader and a valued partner that focuses on offering us the latest in technology, security and reliability so that we can have best-of-breed offerings for our customers.”

According to an Osterman Research survey commissioned by Intermedia, nearly 50 percent of IT decision makers surveyed were on an Exchange 2003 or older platform. Of all IT decision makers surveyed, nearly 65 percent were likely to deploy Exchange 2010 within the next six months – supporting the notion that customers are eager for the new platform.

Intermedia private label partners generate recurring revenue from existing and new customers with high margin Exchange hosting services – all under their own brand – while Intermedia maintains, monitors and upgrades all hardware and software. Intermedia also offers an Affiliate Program for partners that prefer to promote Intermedia solutions and earn a commission for each sale they make. All partners can sell Intermedia’s full suite of hosted communications and collaboration software, including Office Communications Server 2007, SharePoint 3.0 WSS and both Exchange 2010 and Exchange 2007. Intermedia enables resellers to sell not only Microsoft products, but a full ecosystem of related offerings including full support for Blackberry Enterprise Server, fax lines and more.

Intermedia combines proprietary technology with Microsoft Exchange 2010 so customers and partners can have the most robust offering. Additional features of Intermedia’s hosted Exchange 2010 include:

* Choice of datacenter location per mailbox: Partners can choose, on a mailbox level basis, where their customers’ Exchange account data will be stored in order to minimize latency. Partners with customers that are spread throughout the U.S. will enjoy the ability to host some of their mailboxes on the East coast and some of them on the West coast.* New Outlook Web Application (OWA): Partners’ customers will enjoy the ability to access email, instant messaging, SMS text messaging and more – all in one place and through all major web browsers.* Improved ActiveSync: All the latest features of Exchange are available to any mobile device that has Windows Mobile 6.1 or later.

Intermedia has offered private label Exchange hosting since 2001 and has over 4,000 partners – from one-person firms to some of the world’s largest IT names.

ABOUT INTERMEDIA
Intermedia is the premier provider of communications services, including hosted Microsoft Exchange, to small- and mid-sized businesses. For an affordable monthly fee, customers get business email, telephony, smartphones, instant messaging, fax and other communications delivered as a service with 24×7 support. Intermedia also empowers thousands of smaller VARs and MSPs – as well as select Fortune 500 companies

Click To Client, LLC changes name to The Marketing Zen Group

An announcement from Click To Client, LLC officials state that the company will now be known as The Marketing Zen Group .
The Marketing Zen Group which provides full scale online marketing services to clients around the world has been formally launched. Formerly known as Click To Client, LLC, the company has recently expanded their service offerings and increased their internal team size.
“With our continued focus on providing comprehensive online marketing services, we felt we needed a name to accurately reflect that growth and commitment. One of the key things we hear from clients is that we make online marketing easy for them, and we truly believe there is a Zen to online marketing” stated Shama Kabani, President of The Marketing Zen Group.
The Marketing Zen Group’s primary services include serving as an outsourced marketing department, web design and development, search engine optimization, and social media marketing.. Their clients include K9Cuisine.com, Easy Sale, Inc, Arthur Murray Studios, and David Bach.
For more information, contact:
Marjorie R. Asturias
Media Relations and Accounts Supervisor
Email: marjorie@marketingzen.com
Phone: 1888- 460-6008

An announcement from Click To Client, LLC officials State

SoftLayer Technologies™, the innovative on-demand data center services provider, today announced the opening of three new data center pods in the company’s Dallas, Seattle, and Washington, D.C., data center facilities. The new pods add capacity for 20,000 additional servers, bringing SoftLayer’s total capacity to more than 45,000 physical machines.
The new pods are part of SoftLayer’s unique approach to data center design. Each of the company’s geographically diverse data centers consists of multiple pods built to identical specifications with the same best-in-class methodologies. This level of standardization across all its geographic locations enables SoftLayer to optimize key data center performance variables, including space, power, network, personnel, and internal infrastructure.
SoftLayer’s milestones in 2009 included:
* More than 5,700 active customers across 110+ countries* More than 23,000 deployed servers* Placement in Gartner’s Magic Quadrant for Web Hosting and Cloud Infrastructure Services* Introduction of CloudLayer™ line of cloud services, including CloudLayer Storage, CloudLayer CDN, CloudLayer Computing, and Bare Metal Cloud™* Industry’s first deployment of Intel® Nehalem microarchitecture* IPv6 support across all data centers* Multiple carrier additions across all data centers for a total of 290Gbps
“We continue gaining momentum every year. We broke more projections and records this year than last, and 2010 will bring even more of the same,” said Lance Crosby, CEO of SoftLayer. “These three new pods meet the customer demand increases that we expect in the very near future. And they are only preliminary measures in our growth strategy for 2010. We have some big plans which we can’t wait to share with everyone.”
About SoftLayer Technologies
Headquartered in Plano, Texas, SoftLayer provides best-in-class, on-demand IT services on a global basis from facilities in Dallas, Seattle, and Washington, DC. SoftLayer integrates and automates all IT elements to innovate industry-leading services—including cloud, dedicated, and virtual computing environments

The Planet Extends High-Performance SAN to Dedicated Hosting Customers

The Planet, a global leader in IT hosting, today announced the availability of the Dell PowerVault MD3000i, a high-performance storage area network (SAN) disk array. Ideal for multi-server environments such as virtual and private racks, the MD3000i offers a cost-effective and scalable storage solution.


The MD3000i uses iSCSI Ethernet technology to enable shared storage across multiple servers, eliminating the need to build out a costly fiber channel infrastructure. Up to 16 servers can share the MD3000i, which has 15 internal drive slots for a total storage capacity up to 15 terabytes (TB). In the event more capacity is required, companies can add up to two MD1000 storage arrays to the MD3000i for an additional 45TB.“One of the most critical business challenges customers face today is data storage, and all too often it’s also one of the most costly,” said Rob Walters, director of product management for The Planet. “The MD3000i lowers the barrier to entry for high-performance, consolidated storage, and also provides a clear path for expansion for companies that expect to see their storage requirements grow.”


About the Dell PowerVault MD3000iThe iSCSI SAN array provides a scalable and low-cost storage solution, which continually protects daily operations and enables an easy path for expansion:Cost-effective: The MD3000i, The Planet’s lowest-priced SAN, can be shared by as many as 16 servers, which eliminates the high cost of buying individual storage devices for each server.


Scalable: In addition to its 15 internal drive slots, customers can add up to two 15-drive MD1000 disk arrays to the MD3000i, for up to 45TB of storage.


Capable: With its large capacity and high availability, the MD3000i is ideal for businesses running performance-intensive applications, databases, and file or archive storage.


For more information, visit the Web site at http://www.theplanet.com/storage-area-network/.Through Dec. 31, the company is offering a promotion on the MD3000i and MD1000. Customers will receive either the SAN or DAS enclosure free with purchase of 15 1TB or 300GB hard drives, a savings up to $650 per month.

Latest Open-Xchange Makes Webmail and Social Network Integration Easy

Open-Xchange, a leading provider of open source groupware, today announced enhancements that simplify the aggregation of e-mail and contact information, giving users access to their data anywhere, anytime and with any device.

To improve ease-of use, the latest enhancements introduce a wizard that eases the setup for new and existing Open-Xchange users. The wizard configures the subscriptions of external mail accounts from Google, GMX, Web.de and many others, along with social and business networks like Facebook, LinkedIn, Xing and others, as well as the push synchronization of mobile phones.

“Open-Xchange creates a data hub that gives end users control over their data,” said Rafael Laguna, CEO of Open-Xchange. “Using open and standardized data formats provides users and organizations with the freedom and security to use social web services for the benefit of their business, without many of the lock-in dangers inherent in such social web services.”
Additional new features include:
• New team calendar view
• Usability improvements in the AJAX User Interface
• Enhanced OXtender for Microsoft Outlook
• New On-Line help and manuals

Open-Xchange is used by more than 15 million users worldwide as hosted and on-premise business-class e-mail and groupware. On-premise customers can update their installations immediately with the new version of Open-Xchange 6.14; Software as a Service customers will benefit from the new features as soon as their provider updates their accounts.

Anyone can try the latest Open-Xchange improvements for free at a special preview website, http://ox.io.

A detailed description of all new features of Open-Xchange can be seen athttp://software.open-xchange.com/OX6/doc/feature_overview_6_14_20091105.pdf.
About Open-Xchange
Open-Xchange is the innovator of scalable and integrated open source e-mail and collaboration solutions for enterprises, academic institutions, and government authorities. The company provides on-premise versions called Open-Xchange Server Edition and Open-Xchange Appliance Edition, along with Open-Xchange Hosting Edition, which enables web hosting companies to provide an easy-to-use and feature-rich application delivered as Software as a Service (SaaS). The Open-Xchange Hosting Edition is architected to integrate into a hosting provider’s existing infrastructure, such as authentication, provisioning, billing, and e-mail storage and does not require that these systems be replaced.

Friday, December 4, 2009

Intel® Turbo Memory with User Pinning

Enhancing system performance through memory innovation

Intel® Turbo Memory Intel® Turbo Memory with User Pinning brings mobile and desktop systems performance to new heights through the innovative extension of Flash Memory architectures into computing platforms. User pinning offers more options to the user to improve system applications launch time and responsiveness.


User pinning

The new user pinning capability feature, via the Intel® Turbo Memory Dashboard, allows the user to choose and control which applications or files are loaded into the Intel® Turbo Memory cache for performance acceleration. Custom pinning profiles can be created to pin applications or files that match the user's activity, such as PC gaming, office work, or home tasks


Performance

Intel® NAND Flash Memory, working with the Microsoft Windows Vista* ReadyBoost* and ReadyDrive* technologies, adds a new low-latency, non-volatile memory cache between the system memory and the hard drive. This enables fast access to critical data and applications.

  • Fast application load times, hibernation and resume
  • Fast overall application responsiveness
  • Fast boot time
  • Quick access to frequently used applications and/or files from user pinning
  • Enhanced data loss protection using RAID 1, 5 and 10

Platform compatibility

Intel® Turbo Memory cards are compatible with Intel® Centrino® and Intel® Centrino® 2 processor technology for notebook PCs and Intel® Core™2 processor family with Series 4 chip sets for business desktop PCs and digital home media.

Be sure to ask for Intel® Turbo Memory with User Pinning and Intel® Turbo Memory Dashboard when purchasing your next Intel-based PC.

Intel® X25-M and X18-M Mainstream SATA Solid-State Drives

High-performance storage for notebook and desktop PCs – now on 34nm NAND flash memory featuring the Intel® SSD Toolbox

High-performance storage for notebook and desktop PCs

Intel® Solid State Drives (Intel® SSDs) represent a revolutionary breakthrough that delivers a giant leap in storage performance. Intel Solid State Drives are designed to satisfy the most demanding gamers, media creators, and technology enthusiasts. These new drives bring a high level of performance and reliability to notebook and desktop PC storage, at a fraction of the cost of the previous generation of Intel® Solid State Drives (Intel® SSD) products.

Wait less. Do more.

Why wait for a traditional hard disk drive to spin up? Unlike traditional hard disk drives, Intel Solid State Drives have no moving parts, resulting in a quiet, cool, highly rugged storage solution that also offers faster system responsiveness. And for laptop PCs, the lower power needs of Intel SSDs translate to longer battery life and lighter notebooks. Higher performance with more durability means you can be truly mobile with confidence.

Better by design

Drawing from decades of memory engineering experience, and now on new, industry-leading compute-quality 34nm NAND flash memory manufacturing processes, Intel® Mainstream SATA Solid-State Drives are designed to deliver outstanding performance, featuring the latest-generation native SATA interface with an advanced architecture employing 10 parallel NAND flash channels equipped with multi-level cell NAND flash memory. With powerful Native Command Queuing to enable up to 32 concurrent operations, Intel Mainstream SATA SSDs deliver higher input/output per second and throughput performance than other SSDs on the market today – and drastically outperform traditional hard disk drives. These drives also feature low write amplification and a unique wear-leveling design for higher reliability, meaning Intel drives not only perform better – they last longer.

Featuring the Intel® SSD Toolbox with Intel® SSD Optimizer

The Intel® SSD Toolbox with Intel® SSD Optimizer provides a set of applications to easily manage the health and optimize the performance of your Intel SSD. The Intel SSD Toolbox includes a powerful set of management, information, and diagnostic tools, and is designed to work best with 34nm Intel SSDs. The Intel SSD Optimizer utilizes the new ATA Data Set Management Command (Trim Attribute) to help maintain your SSDs performance at "fresh-out-of-the-box" levels, and is specifically designed to run with Microsoft Windows 7*. The Intel SSD Optimizer also works with Microsoft Windows Vista* and XP* operating systems as well.

Two options. No worries.

Intel® Mainstream SATA Solid-State Drives are available in either 2.5in (Intel® X25-M Mainstream SATA Solid-State Drive) or 1.8in (Intel® X18-M Mainstream SATA Solid-State Drive) standard hard drive form factors. And all Intel Mainstream SSDs are tested and validated on the latest Intel-based mobile and desktop platforms for your peace of mind.

Intel® X25-E Extreme SATA Solid-State Drive

xtreme performance, reliability, and power savings for servers, storage and workstations Intel® X25-E Extreme SATA Solid-State Drive

The Intel® Extreme SATA Solid-State Drive (SSD) offers outstanding performance and reliability, delivering the highest IOPS per watt for servers, storage and high-end workstations.

Reduce your Total Cost of Ownership (TCO)

Enterprise applications place a premium on performance, reliability, power consumption and space. Unlike traditional hard disk drives, Intel Solid-State Drives have no moving parts, resulting in a quiet, cool storage solution that also offers significantly higher performance than traditional server drives. Imagine replacing up to 50 high-RPM hard disk drives with one Intel® X25-E Extreme SATA Solid-State Drive in your servers — handling the same server workload in less space, with no cooling requirements and lower power consumption. That space and power savings, for the same server workload, will translate to a tangible reduction in your TCO.

Better by design

Drawing from decades of memory engineering experience, the Intel X25-E Extreme SATA Solid-State Drive is designed to deliver outstanding performance and reliability, featuring the latest-generation native SATA interface with an advanced architecture employing 10 parallel NAND flash channels equipped with single-level cell NAND flash memory for even greater overall performance and reliability. With powerful Native Command Queuing to enable up to 32 concurrent operations, these Intel SSDs deliver higher Input/Output Operations per Second (IOPS) and throughput performance than other SSDs on the market today - and drastically outperform traditional hard disk drives. These Intel drives also feature low write amplification and a unique wear-leveling design for higher reliability, meaning Intel drives not only perform better - they last longer.

Validated and tested by Intel, on Intel

All Intel® X25-E Extreme SATA Solid-State Drives are tested and validated on the latest Intel-based server and workstation platforms, for your peace of mind.

Intel® Desktop Board DP55SB

Small is the new big with the Intel® Desktop Board DP55SB, delivering incredible performance in a microATX form factor. Enjoy great over-clocking hardware and software while boasting new features like Bluetooth* technology with support for ATI Crossfire* and NVIDIA SLI* technology for amazing graphics performance.








Features and benefits

Form factor MicroATX (9.60 inches by 9.60 inches [243.84 millimeters by 243.84 millimeters])
Processor View supported processors for the most current list of compatible processors. At product launch, this desktop board supports:
Memory
  • Four 240-pin DDR3 SDRAM Dual Inline Memory Module (DIMM) sockets
  • Support for DDR3 1600+Ï€1/1333/1066 MHz DIMMs
  • Support for up to 16 GBÏ€2 of system memory
Chipset
Audio Intel® High Definition Audio◊ subsystem in the following configuration:
  • 10-channel (7.1+ 2 independent multi-streaming) audio subsystem with five analog audio outputs and two optical S/PDIF digital audio for input and output using the Realtek * ALC889 audio codec
Video Nvidia SLI* and ATI CrossFire* technology support enables two graphics cards to work together for ultimate 3D gaming performance and visual quality
LAN support Intel® PRO 10/100/1000 Network Connection (82578DC)
Peripheral interfaces
  • Thirteen USB 2.0 ports (8 external ports, 1 onboard, 2 internal headers)
  • Six Serial ATA 3.0 Gb/s ports including 1 eSATA port
  • Two IEEE-1394a ports (1 external port, 1 internal header)
  • Consumer IR receiver and emitter (via internal headers)
  • Integrated Bluetooth* Technology Module
Expansion capabilities
  • One primary PCI Express* 2.0 x 16 bus add- in card connector
  • One PCI Express* 2.0 x8 bus add-in card connector, bifurcated from the primary PCI Express 2.0 x16
  • Two PCI Express* 2.0 x 1 connectors


Related products

Processors
Chipset

Intel® Desktop Board DP55KG



Intel® Desktop Board DP55KGenlarge image

Designed by enthusiasts for enthusiasts, the Intel® Desktop Board DP55KG delivers incredible performance. Enjoy great over-clocking hardware and software while boasting new features like Bluetooth* technology. Support for ATI Crossfire* and NVIDIA SLI* technology rounds off the platform with amazing graphics performance.

Features and benefits
Form factor ATX (12.00 inches by 9.60 inches [304.80 millimeters by 243.84 millimeters])
Processor

View supported processors for the most current list of compatible processors.

At product launch, this desktop board supports:

* Intel® Core™ i7-800 processor series in an LGA1156 socket
* Intel® Core™ i5-700 processor series in an LGA1156 socket

Memory

* Four 240-pin DDR3 SDRAM Dual Inline Memory Module (DIMM) sockets
* Support for DDR3 1600+1/1333/1066 MHz DIMMs
* Support for up to 16 GBΣ of system memory

Chipset

* Intel® P55 Express Chipset

Audio

Intel® High Definition Audio◊ subsystem in the following configuration:

* 10-channel (7.1+ 2 independent multi-streaming) audio subsystem with five analog audio outputs and two optical S/PDIF digital audio for input and output using the Realtek * ALC889 audio codec

Video Nvidia SLI* and ATI CrossFire* technology support enables two graphics cards to work together for ultimate 3D gaming performance and visual quality
LAN support Intel® PRO 10/100/1000 Network Connection (82578DC)
Peripheral interfaces

* Thirteen USB 2.0 ports (8 external ports, 1 onboard, 2 internal headers)
* Eight Serial ATA 3.0 Gb/s ports including 2 eSATA ports
* Two IEEE-1394a ports (1 external port, 1 internal header)
* Consumer IR receiver and emitter (via internal headers)
* Integrated Bluetooth Technology Module

Expansion capabilities

* One primary PCI Express* 2.0 x16 bus add-in card connector
* One PCI Express* 2.0 x8 bus add-in card connector, bifurcated from the primary PCI Express 2.0 x16
* One PCI Express* 2.0 x4 connector
* Two PCI Express* 2.0 x1 connectors
* Two PCI Conventional bus connectors



Related products
Processors

* Intel® Core™ i7 processors
* Intel® Core™ i5 processors

Chipset

* Intel® P55 Express Chipset

How to:Configure/Setup Your VPN(server side) on Windows Server 2003 R2

Hello everyone, in this short article we will learn how to configure VPN on server side. In this sample I will give quick tutorial (based on real experiment) how to configure/setup VPN server on Windows server 2003 R2 and also the business behind it how to make money from your VPN.

First before we start please read the requirements:

1. Computer with Microsoft windows server 2003 R2 operating system
2. 2 LAN card, 1 is OK
3. Static public IP

OK, if you meet all the requirements let’s start to configure it.

1. Start -> Run -> type “services.msc”

Select Routing and Remote Access from the services list, See it’s Properties switch start-up to Automatic then start this service.

ist-vpn-1

2. Start -> Settings -> Control Panel -> Administrative Tools -> Routing and Remote Access.

3. Right click on the computer then select the option Configure and Enable Remote and Routing Access.

4. Follow the Configuration Wizard

* Click Next
* From the configuration list select Custom Configuration and hit Next
* Select VPN Access and NAT and Basic Firewall Option, hit Next
* Click on Finish tab.

4. Configure NAT (Network Address Translation)

* Go to Routing and Remote Access panel
* Expand computer name (Local)
* Expand IP Routing
* Right Click on NAT/Basic Firewall
* Use New Interface to add the network translation.

ist-vpn-2

5. It’s Done, now your VPN server is ready, the last thing is add user to connect to your VPN by Start -> Run -> Type “lusrmgr.msc“

ist-vpn-3

Dude now it’s really done just configure on your client side and you’re connected! Now learn the business behind it, I know not much people are looking for VPN service but if they really need it they will buy it. There is some website out there sell VPN service with high price, said strongvpn.com smallvpn.com you can sell your own VPN and make money from it. Why? Because everything is money (evil laugh) if you know how to managed and optimize it.

How to get started on this business? to low the cost I recommended you to buy VPS or Dedicated Server then configure/setup your VPN, sell it to people! you make money and smile :P If you guys/gals need VPS/Dedicated Server fell free to contact me I sold it *lol stop promote yourself*

What is Web Hosting

If you want to take part in the internet as a business, information resource, directory, or as a hobbyist wanting to share data, information and knowledge with the many people and communities on the internet, you have to contain this in a central spot on the internet. You have to own a piece of space in cyberspace.

Web hosting empowers you and anyone with a computer and internet connection to own a piece of cyberspace. In your space, you can have news, bulletins, documents, data, files (your web site) and your own post office (mail server) to accept mail, all in the context of you or your business. This is your space and to get this space you either have to own a piece of the physical internet with a network connection to the internet backbone and computer(s) operating as server(s) offering access to your files and post office, for people on the internet to view your web site or send and receive email with you.

The cost of owning a direct connection to the backbone and a server dedicated to a web site and email is out of reach for the average business and especially general members of the internet. Even running a web site and mail server on your own computer when it is connected to the internet requires a lot of technical ability and knowledge. The internet itself has to be your business for either of these options to be viable.

In our modern society, for every person in business or with a career in most industries today, it is imperative to have a place in cyberspace, not just to be competitive but to survive. web hosting companies were born out of this great need to provide an environment for the masses to own a piece of cyberspace, to offer an environment where people could have their piece of cyberspace on the internet 24/7 without the great cost. web hosting companies developed a model where they could split up areas on the servers connected to the backbone and ?rent? this space, cutting the costs across many people sharing the server and backbone connection to the internet.

In a web-hosting environment, you are offered a web site to place your files, data, documents, and bulletins for people to access with their web browser and an email server for you to send and receive email messages. The web host will also provide you a means to get an address for people to get to your web site with a web browser and post email to you.

To obtain space in a web hosting environment you become a member and agree to terms and conditions of renting the space ? just as if you were to rent a house or commercial premises for your business. Once you agree and become a member, you are given an access code, a key, to your piece of cyberspace. This key, in the form of a login and password, allows you to connect to the web hosting server and up-load (transfer to) your web site so it can be accessed on the internet. Your login and password is also used to connect to a mail server to create and administer mailboxes to send and receive email for you, your staff, or family members.

Just like when you rent a house or commercial premises for your business, you have so many rooms, bathrooms, and floor space to use. In a web-hosting environment, your area is defined as disk space and network transfer.

Disk space is measured in Megabytes (MB) or Gigabytes (GB). Megabyte roughly means 1,024,000 characters and Gigabyte roughly means 1,024 Million characters. Imagine a character as one key on your key board. These amounts determine how many files, documents, or data you can have on your web site.

Network Transfer is also measured in Megabytes or gigabytes which determines how much data (how many of your files, documents or data) can be downloaded (transferred to) people accessing your web site. The more people, or the more data each person accesses on your web site the more data is transferred on the network.

The more disk space and network transfer you use the greater percentage of the web-hosting environment you are using ? therefore the higher the rent.

Just as no office building and home is the same, neither is every web-hosting environment. Some offices have stairs, others have lifts, some houses have ensuites, swimming pools, and gardens, ? and others do not. Web-hosting environments are much the same, some offer bare structures to do just the basics and others offer an array of features and facilities to help you do just about everything you could ever need or want. Some of the features and facilities likely to be offered are ranges of software to use, components, databases, and server side script processing.

The similarity of renting an office or home to renting space in a web-hosting environment is even more similar. With some buildings a gardener and/or a guard is available to look after the gardening or provide security. In a web-hosting environment, you have support people to help you do what you need to do on your web site to make it grow and there are server administrators to protect and secure your web-hosting space.

When you rent a building there are key parts needed to work or live in the space, like rooms, offices, kitchens, toilets, and bathrooms. In your web-hosting environment, you will find equally important components that are required to make the space workable. The core components in a web-hosting environment are:

Web Server

The web server is a relatively simple piece of software that accepts requests over HTTP (Hypertext Transfer Protocol) and delivers HTML pages and Image files.

FTP Server

FTP is the means of which a web master can transfer files to and from the server. To put your HTML and image files on a server you will generally use FTP to upload (transfer to) your files to the server running the web server.

Mail Server

The mail server consists of two parts POP (Post Office Protocol) and SMTP (Simple Mail Transfer Protocol). POP is where email is received into your mailbox and SMTP is what is used to send and receive email between mail servers.

Database Server

If you are using server side scripting on your web server (you use something like Microsoft Internet Information Server) then instead of providing ?static? data only on web pages you can provide data from a database allowing your users to search and view the data in different and dynamic way. Also, a Database server is used to gather data from visitors to your site; orders, feedback, discussions and the like.

Each one of the above components are software programs running on servers in the web-hosting environment. You can interact with each of these with special software programs you use on your computer. The main ones being:

Web Browser

When viewing the web you use a web browser like Internet Explorer. Many web hosting companies provide a ?Control Panel? to administer your web host account, which you use with your web browser. Most allow you to configure most aspects of your account using a simple web browser.

Web site/page editor

Today many web servers allow editing of WebPages over HTTP (hypertext transfer protocol) based on Microsoft FrontPage technology. These special editors allow you to essentially look at your web site as if you were using a web browser and edit the pages directly as you see them using WYSWIG (What you see if what you get) technology. Most web hosting environments support this, and if you are starting out, make sure it is available. One tip: make sure the web host providing this really does understand this technology ? it is the main area of which many hacks and security intrusions occur.

FTP Client

This is a very simple piece of software that allows you to view the server folders and files in your web host account as if they were files and folders on your own computer. You can then drag and drop files between you computer and your web host account.

Email Client

If you are on the internet you would already be using an email client to send and receive your email. The most common are Outlook Express, Eudora and Web based mail clients like Hotmail.

Database Administration Client

The most common databases used with web servers are Microsoft SQL Server (available only on Windows) and MySQL (commonly found on Linux and UNIX but also available on Windows). SQL Server comes with it's own administration client where you can view your databases, edit them, backup data and do all the administration functions you need. MySQL has an active online community where there is a range of administration clients available.

Choosing a web host is, again, similar to choosing a house to live in or commercial premises to do business. You need to define what it is you require: how much space you need and what features and facilities you need.

If you have been reading this article because this is new to you, then it is likely at this stage you only need minimal space and basic facilities. Once you have worked with the basic facilities you will learn more and become aware of greater facilities and features and then you can simple move from one web ?hosting environment to another ? paying more or paying less. Moving in cyberspace is much easier, faster, and more seamless than physically moving house or commercial premises.

Initially you may use the web-hosting environment offered by your ISP (internet Service provider), the company you use to connect to the internet. But remember these companies main business is connecting many thousands of people to the internet ? not managing web hosting environments. You will generally find they offer less than basic facilities and minimal space.

If you are just starting out with your first web site the first major choice you will be faced with is ?Unix? or ?Windows?. For a person just starting out on the internet, both are equally capable and will offer the facilities you need to have your place in cyberspace.

If you have a web designer or technical person to help you, you only need to consider how much space you really need. With this simple idea in mind, when you are just starting out, owning your piece of cyberspace will not cost anymore than $8 per month. Many web-hosting companies will offer what you need for as little as $3 per month (usually paid yearly).

If you are going alone and doing it all yourself you may want to consider an account with a web hosting company that offers and prides itself on it's support and customer service, 24/7 support access and the experience, knowledge and skill of it's server administrators. Remember, these are the gardeners and the guards who take care of your environment.

Web hosting is very simple and straightforward an once you obtain your space in cyberspace you will never want to let it go and you can easily move it where you want as a turtle carries it's shell on it's back. Always remember you are not stuck in the first web-hoisting environment you choose.

Web hosting isyour space in cyberspace and it is imperative to have a place in cyberspace in our modern society, just as it is to have an office to do business.

Web hosting service

web hosting service is a type of Internet hosting service that allows individuals and organizations to make their own website accessible via the World Wide Web. Web hosts are companies that provide space on a server they own or lease for use by their clients as well as providing Internet connectivity, typically in a data center. Web hosts can also provide data center space and connectivity to the Internet for servers they do not own to be located in their data center, called colocation.

Service scope

The scope of hosting services varies widely. The most basic is web page and small-scale file hosting, where files can be uploaded via File Transfer Protocol (FTP) or a Web interface. The files are usually delivered to the Web "as is" or with little processing. Many Internet service providers (ISPs) offer this service free to their subscribers. People can also obtain Web page hosting from other, alternative service providers. Personal web site hosting is typically free, advertisement-sponsored, or cheap. Business web site hosting often has a higher expense.

Single page hosting is generally sufficient only for personal web pages. A complex site calls for a more comprehensive package that provides database support and application development platforms (e.g. PHP, Java, Ruby on Rails, ColdFusion, and ASP.NET). These facilities allow the customers to write or install scripts for applications like forums and content management. For e-commerce, SSL is also highly recommended.

The host may also provide an interface or control panel for managing the Web server and installing scripts as well as other services like e-mail. Some hosts specialize in certain software or services (e.g. e-commerce). They are commonly used by larger companies to outsource network infrastructure to a hosting company.
[edit] Hosting reliability and uptime
Question book-new.svg
This section does not cite any references or sources.
Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. (March 2009)
Multiple racks of servers.

Hosting uptime refers to the percentage of time the host is accessible via the internet. Many providers state that they aim for at least 99.9% uptime (roughly equivalent to 45 minutes of downtime a month, or less), but there may be server restarts and planned (or unplanned) maintenance in any hosting environment, which may or may not be considered part of the official uptime promise.

Many providers tie uptime and accessibility into their own service level agreement (SLA). SLAs sometimes include refunds or reduced costs if performance goals are not met.
[edit] Types of hosting
A typical server "rack," commonly seen in colocation centres.

Internet hosting services can run Web servers; see Internet hosting services.

Hosting services limited to the Web:

Many large companies who are not internet service providers also need a computer permanently connected to the web so they can send email, files, etc. to other sites. They may also use the computer as a website host so they can provide details of their goods and services to anyone interested. Additionally these people may decide to place online orders.

* Free web hosting service: Free web hosting is offered by different companies with limited services, sometimes advertisement-supported web hosting, and is often limited when compared to paid hosting.
* Shared web hosting service: one's website is placed on the same server as many other sites, ranging from a few to hundreds or thousands. Typically, all domains may share a common pool of server resources, such as RAM and the CPU. The features available with this type of service can be quite extensive. A shared website may be hosted with a reseller.
* Reseller web hosting: allows clients to become web hosts themselves. Resellers could function, for individual domains, under any combination of these listed types of hosting, depending on who they are affiliated with as a provider. Resellers' accounts may vary tremendously in size: they may have their own virtual dedicated server to a collocated server. Many resellers provide a nearly identical service to their provider's shared hosting plan and provide the technical support themselves.
* Virtual Dedicated Server: also known as a Virtual Private Server (VPS for short) divides server resources into virtual servers, where resources can be allocated in a way that does not directly reflect the underlying hardware. VPS will often be allocated resources based on a one server to many VPSs relationship, however virtualisation may be done for a number of reasons, including the ability to move a VPS container between servers. The users may have root access to their own virtual space. This is also known as a virtual private server or VPS. Customers are sometimes responsible for patching and maintaining the server.
* Dedicated hosting service: the user gets his or her own Web server and gains full control over it (root access for Linux/administrator access for Windows); however, the user typically does not own the server. Another type of Dedicated hosting is Self-Managed or Unmanaged. This is usually the least expensive for Dedicated plans. The user has full administrative access to the box, which means the client is responsible for the security and maintenance of his own dedicated box.
* Managed hosting service: the user gets his or her own Web server but is not allowed full control over it (root access for Linux/administrator access for Windows); however, they are allowed to manage their data via FTP or other remote management tools. The user is disallowed full control so that the provider can guarantee quality of service by not allowing the user to modify the server or potentially create configuration problems. The user typically does not own the server. The server is leased to the client.
* Colocation web hosting service: similar to the dedicated web hosting service, but the user owns the colo server; the hosting company provides physical space that the server takes up and takes care of the server. This is the most powerful and expensive type of the web hosting service. In most cases, the colocation provider may provide little to no support directly for their client's machine, providing only the electrical, Internet access, and storage facilities for the server. In most cases for colo, the client would have his own administrator visit the data center on site to do any hardware upgrades or changes.
* Cloud hosting: is a new type of hosting platform that allows customers powerful, scalable and reliable hosting based on clustered load-balanced servers and utility billing. Removing single-point of failures and allowing customers to pay for only what they use versus what they could use.
* Clustered hosting: having multiple servers hosting the same content for better resource utilization. Clustered Servers are a perfect solution for high-availability dedicated hosting, or creating a scalable web hosting solution. A cluster may separate web serving from database hosting capability.
* Grid hosting: this form of distributed hosting is when a server cluster acts like a grid and is composed of multiple nodes.
* Home server: usually a single machine placed in a private residence can be used to host one or more web sites from a usually consumer-grade broadband connection. These can be purpose-built machines or more commonly old PCs. Some ISPs actively attempt to block home servers by disallowing incoming requests to TCP port 80 of the user's connection and by refusing to provide static IP addresses. A common way to attain a reliable DNS hostname is by creating an account with a dynamic DNS service. A dynamic DNS service will automatically change the IP address that a URL points to when the IP address changes.

Some specific types of hosting provided by web host service providers:

Obtaining hosting

Web hosting is often provided as part of a general Internet access plan; there are many free and paid providers offering these services.

A customer needs to evaluate the requirements of the application to choose what kind of hosting to use. Such considerations include database server software, scripting software, and operating system. Most hosting providers provide Linux-based web hosting which offers a wide range of different software. A typical configuration for a Linux server is the LAMP platform: Linux, Apache, MySQL, and PHP/Perl/Python. The webhosting client may want to have other services, such as email for their business domain, databases or multi-media services for streaming media. A customer may also choose Windows as the hosting platform. The customer still can choose from PHP, Perl, and Python but may also use ASP .Net or Classic ASP.

Web hosting packages often include a Web Content Management System, so the end-user doesn't have to worry about the more technical aspects. These Web Content Management systems are great for the average user, but for those who want more control over their website design, this feature may not be adequate. You can always use any content management system on your servers and modify them at your will. A few good examples include wordpress, Joomla, Drupal and mediawiki.

One may also search the Internet to find active webhosting message boards and forums that may provide feedback on what type of webhosting company may suit his/her needs.

Domain Name Server (DNS) Configuration and Administration

At my place of employment, we are using Linux as a DNS server. It performs exceptionally well. This section will address configuration of DNS tables for these services using the BIND 8.x package which comes standard with the Red Hat distribution.

Note: Note: Red Hat versions 5.1 and earlier used the BIND 4.x package, which used a slightly different format for its configuration file. BIND 8.x offers more functionality over that offered by BIND 4.x, and as 4.x is no longer being developed, you should probably consider upgrading your BIND package to the latest version. Simply install the BIND RPM package (see Section 10.1 for details on using the RPM utility), then convert your configuration file to the new format.

Fortunately, converting your existing BIND 4.x configuration file to be compliant with BIND 8.x is easy! In the documentation directory provided as part of BIND (for example, ``/usr/doc/bind-8.1.2/'' for BIND version 8.1.2), there exists a file called ``named-bootconf.pl'', which is an executable Perl program. Assuming you have Perl installed on your system, you can use this program to convert your configuration file. To do so, type the following commands (as root):

cd /usr/doc/bind-8.1.2
./named-bootconf.pl < /etc/named.boot > /etc/named.conf
mv /etc/named.boot /etc/named.boot-obsolete

You should now have an ``/etc/named.conf'' file which should work with BIND 8.x "out-of-the-box". Your existing DNS tables will work as-is with the new version of BIND, as the format of the tables remains the same.

Configuration of DNS services under Linux involves the following steps:

1.

To enable DNS services, the ``/etc/host.conf'' file should look like this:

# Lookup names via /etc/hosts first, then by DNS query
order hosts, bind
# We don't have machines with multiple addresses
multi on
# Check for IP address spoofing
nospoof on
# Warn us if someone attempts to spoof
alert on

The extra spoof detection adds a bit of a performance hit to DNS lookups (although negligible), so if you're not too worried about this you may wish to disable the "nospool" and "alert" entries.
2.

Configure the ``/etc/hosts'' file as needed. Typically there doesn't need to be much in here, but for improved performance you can add any hosts you access often (such as local servers) to avoid performing DNS lookups on them.
3.

The ``/etc/named.conf'' file should be configured to point to your DNS tables according to the example below.

Note: (Note: IP addresses shown are examples only and must be replaced with your own class addresses!):

options {
// DNS tables are located in the /var/named directory
directory "/var/named";

// Forward any unresolved requests to our ISP's name server
// (this is an example IP address only -- do not use!)
forwarders {
123.12.40.17;
};

/*
* If there is a firewall between you and nameservers you want
* to talk to, you might need to uncomment the query-source
* directive below. Previous versions of BIND always asked
* questions using port 53, but BIND 8.1 uses an unprivileged
* port by default.
*/
// query-source address * port 53;
};

// Enable caching and load root server info
zone "named.root" {
type hint;
file "";
};

// All our DNS information is stored in /var/named/mydomain_name.db
// (eg. if mydomain.name = foobar.com then use foobar_com.db)
zone "mydomain.name" {
type master;
file "mydomain_name.db";
allow-transfer { 123.12.41.40; };
};

// Reverse lookups for 123.12.41.*, .42.*, .43.*, .44.* class C's
// (these are example Class C's only -- do not use!)
zone "12.123.IN-ADDR.ARPA" {
type master;
file "123_12.rev";
allow-transfer { 123.12.41.40; };
};

// Reverse lookups for 126.27.18.*, .19.*, .20.* class C's
// (these are example Class C's only -- do not use!)
zone "27.126.IN-ADDR.ARPA" {
type master;
file "126_27.rev";
allow-transfer { 123.12.41.40; };
};

Tip: Tip: Make note of the allow-transfer options above, which restricts DNS zone transfers to a given IP address. In our example, we are allowing the host at 123.12.41.40 (probably a slave DNS server in our domain) to request zone transfers. If you omit this option, anyone on the Internet will be able to request such transfers. As the information provided is often used by spammers and IP spoofers, I strongly recommend you restrict zone transfers except to your slave DNS server(s), or use the loopback address, ``127.0.0.1'' instead.

4.

Now you can set up your DNS tables in the ``var/named/'' directory as configured in the ``/etc/named.conf'' file in step three. Configuring DNS database files for the first time is a major undertaking, and is beyond the scope of this document. There are several guides, online and in printed form that should be referred to. However, several examples are provided below.

Sample entries in the ``/var/named/mydomain_name.db'' forward lookup file:

; This is the Start of Authority (SOA) record. Contains contact
; & other information about the name server. The serial number
; must be changed whenever the file is updated (to inform secondary
; servers that zone information has changed).
@ IN SOA mydomain.name. postmaster.mydomain.name. (
19990811 ; Serial number
3600 ; 1 hour refresh
300 ; 5 minutes retry
172800 ; 2 days expiry
43200 ) ; 12 hours minimum

; List the name servers in use. Unresolved (entries in other zones)
; will go to our ISP's name server isp.domain.name.com
IN NS mydomain.name.
IN NS isp.domain.name.com.

; This is the mail-exchanger. You can list more than one (if
; applicable), with the integer field indicating priority (lowest
; being a higher priority)
IN MX mail.mydomain.name.

; Provides optional information on the machine type & operating system
; used for the server
IN HINFO Pentium/350 LINUX

; A list of machine names & addresses
spock.mydomain.name. IN A 123.12.41.40 ; OpenVMS Alpha
mail.mydomain.name. IN A 123.12.41.41 ; Linux (main server)
kirk.mydomain.name. IN A 123.12.41.42 ; Windows NT (blech!)

; Including any in our other class C's
twixel.mydomain.name. IN A 126.27.18.161 ; Linux test machine
foxone.mydomain.name. IN A 126.27.18.162 ; Linux devel. kernel

; Alias (canonical) names
gopher IN CNAME mail.mydomain.name.
ftp IN CNAME mail.mydomain.name.
www IN CNAME mail.mydomain.name.

Sample entries in the ``/var/named/123_12.rev'' reverse lookup file:

; This is the Start of Authority record. Same as in forward lookup table.
@ IN SOA mydomain.name. postmaster.mydomain.name. (
19990811 ; Serial number
3600 ; 1 hour refresh
300 ; 5 minutes retry
172800 ; 2 days expiry
43200 ) ; 12 hours minimum

; Name servers listed as in forward lookup table
IN NS mail.mydomain.name.
IN NS isp.domain.name.com.

; A list of machine names & addresses, in reverse. We are mapping
; more than one class C here, so we need to list the class B portion
; as well.
40.41 IN PTR spock.mydomain.name.
41.41 IN PTR mail.mydomain.name.
42.41 IN PTR kirk.mydomain.name.

; As you can see, we can map our other class C's as long as they are
; under the 123.12.* class B addresses
24.42 IN PTR tsingtao.mydomain.name.
250.42 IN PTR redstripe.mydomain.name.
24.43 IN PTR kirin.mydomain.name.
66.44 IN PTR sapporo.mydomain.name.

; No alias (canonical) names should be listed in the reverse lookup
; file (for obvious reasons).

Any other reverse lookup files needed to map addresses in a different class B (such as 126.27.*) can be created, and would look much the same as the example reverse lookup file above.
5.

Make sure the named daemon is running. This daemon is usually started from the ``/etc/rc.d/init.d/named'' file upon system boot. You can also start and stop the daemon manually; type ``named start'' and ``named stop'', respectively.
6.

Whenever changes are made to the DNS tables, the DNS server should be restarted by typing ``/etc/rc.d/init.d/named restart''. You may then wish to test your changes by using a tool such as "nslookup" to query the machine you have added or changed.

Server and Domain Isolation

Server and Domain Isolation

With the explosive growth and adoption of pervasive, highly-connected networks, administrators are faced with a potentially paradoxical situation: to provide greater accessibility while maintaining security. Even though more ubiquitous connectivity can yield numerous business benefits—like productivity gains and operational cost savings—it has the potential to introduce new risks to the organization’s networked infrastructure. This can include costly virus attacks, rogue users and devices, and unauthorized access to sensitive information.

A Server and Domain Isolation solution based on Microsoft Windows Internet Protocol security (IPsec) and the Active Directory directory service enables administrators to dynamically segment their Windows environment into more secure and isolated logical networks based on policy and without costly changes to their network infrastructure or applications. This creates an additional layer of policy-driven protection, and helps better protect against costly network attacks, helps prevent unauthorized access to trusted networked resources, achieve regulatory compliance, and reduce operational costs.

Server and Domain Isolation

Figure 1: Server and Domain Isolation
View full-size image
Overview Resources

* Introduction to Server and Domain Isolation
This document describes how using Server and Domain Isolation can provide additional security for network traffic and resources; decrease your exposure to network attacks based on viruses, worms, and malicious users; and adhere to requirements to secure and encrypt data traffic.
* Server and Domain Isolation Datasheet
Learn more about how Server and Domain Isolation can help you reduce the risk of network-based threats and safeguard sensitive data, all while maximizing your existing information technology (IT) investments.
* Server Isolation with Microsoft Windows Explained
This white paper provides a detailed overview of server isolation. It explains how server isolation protects isolated servers and the benefits of deploying server isolation. It also provides a brief overview of how to deploy server isolation .
* Domain Isolation with Microsoft Windows Explained
This white paper provides a detailed overview of domain isolation. It explains how domain isolation protects domain member computers and the benefits of deploying domain isolation. It also provides a brief overview of how to deploy domain isolation.
* TechNet Webcast: Protecting Critical Systems and Data with Server and Domain Isolation
This webcast details how Server and Domain Isolation can be leveraged by customers using Windows XP, Windows Server 2003, or Windows 2000. This webcast also explains the roadmap for future uses of IPsec, including its use as an enforcement method for Network Access Protection.

Demos and Solution Evaluation Resources

* Server and Domain Isolation Demo
Get hands-on experience with Server and Domain Isolation for Windows XP and Windows Server 2003, and learn how this cost-effective end-point authentication solution can help you reduce the risk of network-based threats and safeguard sensitive data.

Case Studies

* Major Japanese Municipal Principal Government Achieves Security Compliance at Nil Cost
Learn more about how the City of Sapporo, Japan, with 12,000 users working in almost 870 departments, implemented Server and Domain Isolation for cost-effective end-point authentication. The solution has improved information security and reduced the risk of unauthorized access to confidential data on the organization’s Intranet.
* Improving Security with Domain Isolation: Microsoft IT Implements IPsec
This article describes how Microsoft IT is using IPsec to deploy Domain Isolation on the Microsoft global enterprise network.

Deployment Resources

* Step-by-Step Guide to Deploying Policies for Windows Firewall with Advanced Security
This step-by-step guide illustrates how to deploy Active Directory Group Policy objects (GPOs) to configure Windows Firewall with Advanced Security in Windows Vista and Windows Server 2008. You get hands-on experience in a lab environment using Group Policy Management tools to create and edit GPOs that implement typical firewall settings. You also configure GPOs to implement common server and domain isolation scenarios.
* Server and Domain Isolation Using IPsec and Group Policy
This Microsoft Solutions guide describes how to deploy server isolation to ensure that a server accepts network connections only from trusted domain members or a specific group of domain members, and domain isolation to isolate domain members from untrusted connections.
* Simple Policy Update for Windows Server 2003 and Windows XP
This update for Windows Server 2003 and Windows XP helps simplify the creation and maintenance of IP filters in IPsec policy, reducing the number of filters that are required for a Server and Domain Isolation deployment. The Simple Policy update removes the requirement for explicit network infrastructure permit filters and introduces enhanced fallback to clear behavior.
* Simplifying IPsec Policy with the Simple Policy Update
This article describes how the Simple Policy Update for Windows Server 2003 and Windows XP helps simplify policy creation and maintenance for Server and Domain Isolation deployments.
* Domain Isolation Planning Guide for IT Managers
This white paper includes an overview of the deployment process, a step-by-step guide to the planning process, and links to resources that you can use to plan and design your deployment. It does not explain how to deploy domain isolation.
* A Guide to Domain Isolation for Security Architects
This white paper describes the implications of deploying domain isolation in an enterprise environment and explains how to assess the enterprise environment and plan domain isolation.
* Setting up IPsec Server and Domain Isolation in a Test Lab
This white paper demonstrates how to set up IPsec Server and Domain Isolation in a limited test environment. It provides procedures for setting up a basic deployment, which you can use as the basis for your own deployment.
* Interoperability Considerations for IPsec Server and Domain Isolation
This white paper describes interoperability between IPsec-protected hosts running Windows Server 2003, Windows XP with Service Pack 2 (SP2), and Windows 2000 Server with Service Pack 4 (SP4) in a Server or Domain Isolation scenario and hosts that cannot use IPsec, including computers running earlier versions of Windows or non-Microsoft operating systems.
* Managing Intra-Windows Compatibility for IPsec
This white paper includes information about managing IPsec compatibility among the IPsec-capable Windows operating systems.
* How to Isolate Servers using Internet Protocol Security
This TechNet Support webcast describes how to use IPsec to isolate and help protect Microsoft Windows servers in an Active Directory environment.

Domain Name Service DNS Setup & Configuration in Unix

1.0 Introduction

s . Domain name system is a hierarchical system where we have a top level domain serving sub domain and clients with names & ip address.

The system that runs the name services to resolve names into ipaddresses is called name server and the sofware is generally BIND (Berkley Internet Domain) .

Core process of DNS is a daemon called named . Depending on the role assigned the name servers can be a primary, secondry or caching only. Secondry server takes over when primary is down and is updated automatically . Caching server provide only the caching information to the clients

Each of domain or sub domain have information (in zone files or data files) about its clients and is called authorative for these clients . For other clients for which it doesn't have any information or it is not authorative , it passes query to its higher domain .

The client knows about their name servers through a file called resolve.conf which contains addresses of the name servers (Primary secondary and Caching) along with their domain name.

The main files in serve are named.conf which contains server parameters and reference to other data files containing client information.

2.0 Requirements :

1) BIND (Berkely Internet Domain) software . Source code can be downloaded and compiled for your platform from internet at www.isc.org However BIND may be available in precompiled version along with OS so check your OS if it is already there . The situation you may want to compile from source code is that you want to cutomize it differently by giving different configuration options at compiling time

2) Root cache file from internic at ftp://internic.com/pub/root

3) C Compiler to compile the bind source distribution .

3.0 Installation and configuration

Download the BIND software from from www.isc.org if you want to build it from source code.
Make a directory to store and compile dns disyribution source say /usr/dns/src
Unzip the distribution using gzip command

#gzip -d bind-9.2.5.tar.gz
unpack using tar
#tar xvf bind-9.2.5.tar
compilation require a c compiler if you don't have one you can download from gnu site (www.gnu.org).
#./configure
#make
#make install
make install will ultimately place named , configuration file named.conf and related commands in /etc and /usr/local/bin directory .






4.0 named.conf file
This is the main configuration file in BIND which defines the name servers and zones with the name and ip address of the hosts.

The named.conf has a number of options for starting the name server which can be configured as per requirement .A list of complete options can be seen using man named command.

By default you will find zone files for local host by the name localhost and 127.0.0.in-addr.arpa . For additional zones you need to create the the files and put a reference in named.conf .

Below is a basic functional named.conf file which is installed after the BIND 8..2.P5 is installed This can be used for starting name server , all you need to do is to put your hosts entries in the zone files referenced here .You will find explanation of terms used in this configuration file after this listing of named.conf.

// This is a configuration file for named (from BIND 8.1 or later).
// It would normally be installed as /etc/named.conf.

options { directory "/var/named";
check-names master warn; /* default. */
datasize 20M;
deallocate-on-exit yes;
listen-on {10.20.30.100;
};
forward first;
};
zone "localhost" IN {
type master;
file "/var/named/localhost.zone";
check-names fail;
allow-update { none; };
allow-transfer { any; };
};
zone "0.0.127.in-addr.arpa" IN {
type master;
file "/var/named/127.0.0.zone";
check-names fail;
allow-update { none; };
allow-transfer { any; };
};
zone "." IN {
type hint;
file "/var/named/root.hint";
};
logging {
channel xfer-log {
file "/var/tmp/bind-xfer.log" versions unlimited size 10m;
print-category yes;
print-severity yes;
print-time yes;
severity info;
};
category xfer-in { xfer-log; };
category xfer-out { xfer-log; };
category notify { xfer-log; }

category load { xfer-log; };
};
zone "30.20.10.in-addr.arpa" IN {
type master;
file "/var/named/100.30.20.10.zone";
check-names fail;
allow-update { none; };
allow-transfer { any; };
};
zone "mydomain.com" {
type master;
file "/var/named/mydomain.com.hosts";
};


Explanation of the terms used in named.conf above

4.1 options statement
The options lists working directory for the named - the name server daemon to read the configurations files and port to listen on (default is port 53) .

{ directory "/var/named";

This directive defines the working dir of the name server where main configuration file named.conf will be located

check-names master warn; /* default. */

The ``check-names'' directive tells BIND to check names in master zone and give a warning in system's log files if there is any discrepancy. Names are considered good if they match RFC 952's expectations (if they are host names), or if they consist only of printable ASCII characters (if they are not host names).

Other options are fail and ignore in that case bind will follow these directives

datasize 20M;

datasize The maximum amount of data memory the server may
use. The default is system dependent.

deallocate-on-exit yes;

deallocate the memory on exit otherwise it will be left to os to clear the memory.

listen-on {10.20.30.100};

Host address and port for listening ; if port is not mentioned it is default 53.

forward first

Forwarding
Forwarding is can be used for two main scenario
1. Creating a large site wide cache on different servers thereby using less network bandwidth.
2. For servers which do not have a direct access to the internet but have to lookup for the external names.
Forwarding occurs only for names for which the server is not authoritative, and it does not have the answer in its cache.
forward
This option specify where to query the name first - 'first' directive will cause query to send to forwarder first and check itself if it fails .'Only' - directive will query the forwarders only .
forwarders
Specifies the IP addresses to be used for forwarding. The default is no forwarding .

4.2 Zones statements

zone "localhost" IN {
type master;
file "/var/named/localhost.zone";
check-names fail;
allow-update { none; };
allow-transfer { any; };
};

Zone statement declares a zone name , its type - master , slave or stub , files containing the zone data .and options relating to zone - update , checking , transfer etc.

localhost and 0.0.127.in-addr.arpa are default for the localhost and points to file of this name

Zone types

There are three types of zone .

master : This is the master copy of the data in a zone.
slave - This is a replica of a master zone. The masters list specifies one or more IP addresses that the slave contacts to update its copy of the zone. If file is specified, then the replica will be written to the file. Use of file is recommended, since it often speeds server startup and
eliminates a needless waste of bandwidth.
stub - A stub zone is like a slave zone, except that it replicates only the NS records of a master zone instead of the entire zone.
hint - The initial set of root name servers is specified using a hint zone. When the server starts up, it
uses the root hints to find a root name server and get the most recent list of root name servers.

previous releases of BIND used the term primary for a master zone, secondary for a slave
zone, and cache for a hint zone.

Zone Directives

allow-update
Specifies which hosts are allowed to submit dynamic DNS updates to the server. The default is to deny updates from all hosts.
allow-transfer
Specifies which hosts are allowed to receive zone transfers from the server. allow-transfer may also be specified in the zone section, in which case it overrides the options allow-transfer statement. If not specified, the default is to allow transfers from all hosts.
zone "." refers to the root file for the domains - and contains references to the root servers at network solutions to resolve the names which are beyond the current domain . you can download the root cache file from ftp://internic.com/pub/root

4.3 Logging statement

logging {
channel xfer-log {
file "/var/tmp/bind-xfer.log" versions unlimited size 10m;
print-category yes;
print-severity yes;
print-time yes;
severity info;
};

The logging statement specifies logging channel/s which logs various categories of messages . In statement above a channel xfer-log - a user defined name , is defined. Each time name server is started it starts writing to the defined log file , size limits the maximum size of log file and once the limit is reached it stops writing the file. Each individual start or restart of named causes a new version of log file to be created. Version statement defines how many versions are allowed for the log file , unlimited option will allow any number of version,

Only one logging statement is used to define as many channels and categories as are wanted. If there are multiple logging statements in a configuration, the first definition determines the logging and warnings are issued for the other logging statements .

If there is no logging statement, the default logging configuration is used which is

logging {
category default { default syslog; default_debug;};
category panic { default syslog; default_stderr;};
category packet { default_debug;};
category eventlib { default_debug;};
};

The default debug file is named.run .

Channel Phrase

All log output goes to one or more "channels"; you can make as many of them as you want. Every channel definition must include a clause that says whether messages selected for the channel go to a file, to a particular syslog facility, or are discarded. It can optionally also limit the message severity level that will be accepted by the channel (default is "info"), and whether to include a named-generated time stamp, the category name and/or severity level (default is not to include any).

The word null as the destination option for the channel will cause all messages sent to it to be discarded; other options for the channel are meaningless.

The file clause defines size and versions of the file which will be saved each time the file is opened. if the file ever exceeds the size, then named will just not write anything more to it . The default behavior is to not limit the size of the file.


As per selection the log messages will either go to syslog() or a file and severity level determines which type of messages goes there . Default severity level is info. and it can be critical , error , debug and dynamic.

Note that only syslog messages can go to syslog .

Print-time , print-category - logs the time & category of the messages . The print- options can be used in any combination but will always be printed in the following order: time, category, severity.

category xfer-in { xfer-log; };
category xfer-out { xfer-log; };
category notify { xfer-log; }

These directives put diffrent categories of log messages in to xfer-log channel

Category option mentions the category of the log and file name for logging

logging {
channel xfer-log {
file "/var/tmp/bind-xfer.log" versions unlimited size 10m;
print-category yes;
print-severity yes;
print-time yes;
severity info;
};

this defines a channel called xfer-log with various options.

these categories directs various types of logs into the channel


5.0 ZONE files

Zone files are used to define the name and ip addresses of the hosts in a domain .Generally two zone files are defined for a particular zone - one file maps the the name to the ipaddress of the host machines and other is used for reverse lookup i.e. ipaddress to name .address .

Each master zone file should begin with an SOA (Start of Authority) record for
the zone. The SOA specifies a serial number, which should be changed
each time the master file is changed. it is 32 bit size field . Slave servers check the serial no. at refresh time and if the detect changed serial no in master zone transfer is carried out to keep its zone files updated.

If a master server cannot be contacted within the interval given by the expire time, all data from the zone is discarded by slave servers.
The minimum value is the time-to-live (``TTL'') used by records in the file with no explicit time-to-live value.

The details of all type of records used in a zone file are given below

Type of records
SOA marks the start of a zone of authority (domain of originating host, domain address of maintainer, a serial number and the following parameters in seconds: refresh, retry, expire and minimum TTL. (see RFC 883)).
NULL a null resource record (no format or data)
RP a Responsible Person for some domain name
PTR a domain name pointer (domain)
HINFO host information (cpu_type OS_type)
A a host address (dotted quad)
NS an authoritative name server (domain)
MX a mail exchanger (domain), preceded by a preference value (0..32767), with lower numeric values representing higher logical preferences.
CNAME the canonical name for an alias (domain)


Following are the three functional zone files representing local host and a master zone.

The explanation of the terms are at the end.

/var/named/localhost

localhost. 1D IN SOA localhost.mydomainr.com. hostmaster.mydomain.com. (
42 ; serial
3H ; refresh
15M ; retry
1W ; expiry
1D ) ; minimum
localhost. NS dns
localhost. A 127.0.0.1

/var/named/ 0.0.127.in-addr.arpa

0.0.127.in-addr.arpa IN SOA localhost. root.localhost. (
42 ; serial
3H ; refresh
15M ; retry
1W ; expiry
1D ) ; minimum

0.0.127.in-addr.arpa IN NS dns.mydomain.com
1.0.0.127.in-addr.arpa. PTR localhost

/var/named/mydomain.com

mydomain.com. IN SOA dns.mydomain.com hostmaster.dns. (
200010016 ;serial
10800
3600
3600
86400 )
mydomain.com. 1D IN NS dns.mydomain.com.
IN MX 20 mx1.domaingateway.net.
IN MX 10 mail-in.mydomain.com.

;mydomain hosts below
www IN CNAME mydomain.com.
localhost IN A 127.0.0.1
mail IN A xxx.xxx.xxx.xxx
ns1 IN A xxx.xxx.xxx.xxx
dns IN A xxx.xxx.xxx.xxx
news IN A xxx.xxx.xxx.xxx

root cache file

localhost. NS dns

this is declaration of the type of localhost it declares that local host is a name server with hostname dns

localhost. A 127.0.0.1

this declares the address of local host.

0.0.127.in-addr.arpa IN NS dns.mydomain.com
1.0.0.127.in-addr.arpa. PTR localhost

Similarly in reverse zone map file reverse address is declared as ns record of name dns and a pointer record ptr , points this rev address to the localhost.

Resource records normally end at the end of a line, but may be continued across lines between opening and closing parentheses. Comments are introduced by semicolons and continue to the end of the line.Note that there are other resource record types, not shown where. You should consult the BIND Operations Guide (BOG') for the complete list. Some resource record types may have been standardized in newer RFC's but not yet implemented in this version of BIND.

6.0 Client Configuration

Each client need a configuration file /etc/resolv.conf which informs it about the domain name server . This is a editable text file with following entries :

domainname yourdomainname.com
nameserver 10.20.30.40
nameserver 10.20.30.41

7.0 Signals

The following signals have the specified effect when sent to the server process named using the kill command.

SIGHUP
Causes server to read named.boot and reload the database. If the server is built with the FORCED_RELOAD compile-time option, then SIGHUP will
also cause the server to check the serial number on
all secondary zones. Normally the serial numbers
are only checked at the SOA-specified intervals.
SIGINT :
Dumps the current data base and cache to
/var/named/named_dump.db
SIGIOT :
Dumps statistics data into /var/named/named.stats .if the server is compiled with -DSTATS. Statistics data is appended to the file. Some systems use SIGABRT rather than SIGIOT for this.
SIGSYS :
Dumps the profiling data in /var/named if the
server is compiled with profiling (server forks, chdirs and exits).
SIGTERM:
Dumps the primary and secondary database files.
Used to save modified data on shutdown if the
server is compiled with dynamic updating enabled.
SIGUSR1:
Turns on debugging; each SIGUSR1 increments debug level. (SIGEMT on older systems without SIGUSR1)
SIGUSR2:
Turns off debugging completely. (SIGFPE on older
systems without SIGUSR2)
SIGWINCH
Toggles logging of all incoming queries via sys-
log(8) (requires server to have been built with the
QRYLOG option)


8.0 Next Steps

This article tried to cover a domain name server setup process . DNS subject is very vast and not everything can be covered in a article . If you wish to learn more about DNS there are some good books available for online buying from Amazon.com . You should have following two books in your bookself if you are going to setup and maintain the DNS servers under unix environment.