Native 6
Native 6
Novell
NetWare 6
www.novell.com
NOVELL NATIVE FILE ACCESS
PROTOCOLS INSTALLATION AND
ADMINISTRATION GUIDE
Novell Confidential
Legal Notices
Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express
or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to revise this publication and to
make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes.
Further, Novell, Inc. makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties
of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to make changes to any and all parts of Novell software,
at any time, without any obligation to notify any person or entity of such changes.
This product may require export authorization from the U.S. Department of Commerce prior to exporting from the U.S. or Canada.
Copyright 2001-2002 Novell, Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or
transmitted without the express written consent of the publisher.
U.S. Patent No. 5,157,663; 5,349,642; 5,455,932; 5,553,139; 5,553,143; 5,572,528; 5,594,863; 5,608,903; 5,633,931; 5,652,859; 5,671,414;
5,677,851; 5,692,129; 5,701,459; 5,717,912; 5,758,069; 5,758,344; 5,781,724; 5,781,724; 5,781,733; 5,784,560; 5,787,439; 5,818,936; 5,828,882;
5,832,274; 5,832,275; 5,832,483; 5,832,487; 5,850,565; 5,859,978; 5,870,561; 5,870,739; 5,873,079; 5,878,415; 5,878,434; 5,884,304; 5,893,116;
5,893,118; 5,903,650; 5,903,720; 5,905,860; 5,910,803; 5,913,025; 5,913,209; 5,915,253; 5,925,108; 5,933,503; 5,933,826; 5,946,002; 5,946,467;
5,950,198; 5,956,718; 5,956,745; 5,964,872; 5,974,474; 5,983,223; 5,983,234; 5,987,471; 5,991,771; 5,991,810; 6,002,398; 6,014,667; 6,015,132;
6,016,499; 6,029,247; 6,047,289; 6,052,724; 6,061,743; 6,065,017; 6,094,672; 6,098,090; 6,105,062; 6,105,132; 6,115,039; 6,119,122; 6,144,959;
6,151,688; 6,157,925; 6,167,393; 6,173,289; 6,192,365; 6,216,123; 6,219,652; 6,229,809. Patents Pending.
Novell, Inc.
1800 South Novell Place
Provo, UT 84606
U.S.A.
www.novell.com
Novell Native File Access Protocols Installation and Administration Guide
Online Documentation: To access the online documentation for this and other Novell products, and to get updates, see
www.novell.com/documentation.
Novell Confidential
Novell Trademarks
BorderManager is a registered trademark of Novell, Inc., in the United States and other countries.
ConsoleOne is a registered trademark of Novell, Inc., in the United States and other countries.
eDirectory is a trademark of Novell, Inc.
NetWare is a registered trademark of Novell, Inc., in the United States and other countries.
NetWare Loadable Module and NLM are trademarks of Novell, Inc.
NMAS is a trademark of Novell, Inc.
Novell is a registered trademark of Novell, Inc., in the United States and other countries.
Novell Client is a trademark of Novell, Inc.
Novell Cluster Services is a trademark of Novell, Inc.
Novell Directory Services and NDS are registered trademarks of Novell, Inc., in the United States and other countries.
Third-Party Trademarks
All third-party trademarks are the property of their respective owners.
Novell Confidential
Novell Confidential
Preface
This book contains information on installing, configuring, and managing Novell Native File
Access Protocols software specific to the Windows* and Macintosh* native protocolsCIFS and
AFP, respectively.
This book is divided into the following chapters:
Chapter 1, Overview, on page 7 describes the benefits of Novell Native File Access
Protocols software.
Chapter 2, Installing Novell Native File Access Protocols on a NetWare 6 Server, on page 9
describes how to install the software on a NetWare server.
Chapter 3, Working with Macintosh Computers, on page 17 describes how to set up and
manage Macintosh workstations and how to access files on the network.
Chapter 4, Working with Windows Computers, on page 23 describes Windows
authentication methods and passwords, how to set up and manage Windows workstations, and
how to access files on the network.
Chapter 5, Setting Up Novell Native File Access Protocols in a NetWare 6 Cluster, on
page 43 explains Novell Cluster ServicesTM and how to configure the Novell Native File
Access Pack software for Macintosh and Windows computers in a clustered environment.
Chapter 6, Working with UNIX Machines, on page 49 describes how to set up and manage
UNIX* workstations and how to access files on the network with Native File Access for
UNIX.
Documentation Conventions
In this documentation, a greater-than symbol (>) is used to separate actions within a step and items
in a cross-reference path.
Also, a trademark symbol (, TM, etc.) denotes a Novell trademark. An asterisk (*) denotes a thirdparty trademark.
Preface
Novell Confidential
Novell Confidential
Overview
Novell Native File Access Protocols lets Macintosh, Windows, and UNIX workstations access
and store files on NetWare servers without having to install any additional softwaresuch as the
Novell ClientTM. The software is installed only on the NetWare server and provides "out of the box"
network access. Just connect the network cable, start the computer, and you have access to servers
on your network. No client software installation. No client configuration. No problem.
Novell Native File Access Pack software enables the NetWare server to use the same protocol
(referred to as native) as the client workstation to copy, delete, move, save, and open files.
Windows workstations perform these tasks using the native Common Internet File System (CIFS)
protocol, Macintosh workstations use the native Apple* Filing Protocol (AFP), and UNIX
computers use the Network File System (NFS) protocol.
NetWare
Server
CIFS
AFP
NFS
IP
CIFS
AFP
NFS
Windows
MAC
UNIX
Enabling native protocols on a NetWare server means that users can access files on the network,
map network drives, and create shortcuts to NetWare servers using the native methods available
in their specific operating system. Windows users can use their familiar Network Neighborhood
(or My Network Places). Macintosh users can use Chooser or the Go menu to access network files
and even create aliases. Because the NetWare server is running native protocols, users can copy,
delete, move, save, and open network filesjust like they would if they were working locally.
Network Neighborhood
Chooser
Overview
Novell Confidential
By consolidating user management through Novell Directory Services (NDS), Native File
Access Protocols simplifies overall network administration. All users who need access to the
network are represented in NDS through User objects, which enables you to easily and effectively
assign trustee rights and access control and manage all User objects from a single location on the
network.
NOTE: Windows users can also be managed through a Windows Domain Controller and UNIX users can be
Getting Started
Novell Native File Access Pack is easy to install. To get started, continue with Chapter 2,
Installing Novell Native File Access Protocols on a NetWare 6 Server, on page 9.
Novell Confidential
NWCONFIG and then select Product Options > View/Configure/Remove Installed Products.
Novell Confidential
PUBLIC\WIN32\ directory.
3 From the Object menu, click Create > Login Policy > OK.
4 (Conditional) If the server running BorderManager does not have a local
LPO.
4b Click Trustees of This Object > Add Trustee.
4c Select the Server object of the server running BorderManager.
4d Deselect all Object rights.
4e Click Selected Properties > SAS: Policy Credentials.
4f From Property Rights, click Read/Write > OK.
10
Novell Confidential
Prerequisites on page 9.
3 Ensure your Administrator Workstation meets the prerequisites described in Administrator
11
Novell Confidential
2 Ensure your NetWare 6 server meets the prerequisites described in NetWare Server
Prerequisites on page 9.
3 Ensure your Administrator Workstation meets the prerequisites described in Administrator
8 At the Product Selection screen, check the Novell Native File Access Protocols check box.
9 Click Next.
If you choose to install the Native File Access for Macintosh (AFP*) component, the
software will be installed transparently during the NetWare installation process. No
further interaction is required for the Native File Access for Macintosh software
installation. You can skip to Step 8 on page 15.
For information on configuring Native File Access for Macintosh services and managing
Mac users, see Chapter 3, Working with Macintosh Computers, on page 17.
If you choose to install the Native File Access for Windows (CIFS) component, continue
with Step 2.
For information on configuring Native File Access for Windows services and managing
Windows users, see Chapter 4, Working with Windows Computers, on page 23.
12
For detailed information on installing and configuring the Native File Access for UNIX
component, see Chapter 6, Working with UNIX Machines, on page 49.
Novell Confidential
2 Click Next.
3 At the Server Properties screen, configure the following server settings and then click Next.
Server Name: Enter a unique name for the NetWare server running CIFS that will appear
in Network Neighborhood when users browse the network. The server name cannot be
longer than 15 characters and must be different from the actual NetWare server name.
The default Server Name is the NetWare server name with an added underscore (_) and
a W. For example, a NetWare server named SERVER1 defaults to SERVER1_W.
Server Comment (Optional): Enter a comment for the server. The text in the Server
Comment field displays when viewing details of the server from a Windows workstation.
Enable Unicode: Specify whether to enable Unicode character support. When checked,
this option enables Unicode characters that are used in double-byte languages.
To support Unicode, an additional file named UNINOMAP.TXT must be created and
saved in the SYS:\ETC directory. When the UNICODE parameter is set to On, the
UNINOMAP.TXT file is used to resolve Unicode-to-ASCII "no-map" problems.
To specify "no-map" cases in the UNINOMAP.TXT file, enter the first Unicode value to
watch for and then the second value representing the ASCII replacement code. For
example:
0178 98
20AC CC
click Next.
Domain: Select if your Windows users will authenticate using a Microsoft Networking
Domain.
13
Novell Confidential
14
Novell Confidential
Directory: Enter the path to the server volume or directory which will be the root of the
sharepoint. Beginning at the volume name, the full path must be specified and it must end
with a backslash (\). For example:
VOL1:GRAPHICS\
Share Name: Enter the name by which the sharepoint will be displayed to Windows
computers. For example, if you enter "Lots of Pics" as the share name associated with
VOL1\GRAPHICS, then Windows workstations browsing the network will see "Lots of
Pics" instead of "VOL1\GRAPHICS."
Connections: Enter the number of connections that will be allowed to access the
sharepoint. Or, check Unlimited to allow an unlimited number of connections.
Comment: Enter a description for the sharepoint that appears in Network Neighborhood.
7 At the Context Setup screen, specify the NDS contexts for your Windows (CIFS) users who
The CIFSCTXS.CFG context search file can be edited manually after installation. For more
information, see Specifying Contexts in the Context Search File on page 28.
8 Check the Summary screen and then click Finish.
RESTART SERVER
Any changes made in the AFP configuration files since the last time you started the service
are applied when the AFP protocols are reloaded.
15
Novell Confidential
2 At the server console, enter AFPSTOP to unload the Macintosh (AFP) protocols on the server.
Windows (CIFS) Protocols
1 At the server console, enter CIFSSTRT to load the Windows (CIFS) protocols on the server.
Any changes made in the CIFS configuration files since the last time you started the service
are applied when the CIFS protocols are reloaded.
2 At the server console, enter CIFSSTOP to unload the Windows (CIFS) protocols on the
server.
Whats Next?
After installing the Native File Access Pack software, you must create simple passwords for
Macintosh, Windows, and UNIX users before they can access files on the server using their native
protocols.
To set up and manage Macintosh users, see Chapter 3, Working with Macintosh Computers, on
page 17.
To set up and manage Windows users, see Chapter 4, Working with Windows Computers, on
page 23.
To set up and manage UNIX users, see Chapter 6, Working with UNIX Machines, on page 49.
16
Novell Confidential
concerned about someone capturing your password over the network, you should not use this option. Instead,
you should manage passwords using ConsoleOne on the Administrator Workstation.
17
Novell Confidential
Macintosh allows only 31 characters for the username. If the full NDS context and username are
longer than 31 characters, you must use a search list to provide access.
TIP: Macintosh users do not need to enter a context or have an entry in the context search file if their User
If User objects with the same name exist in different contexts, the first one in the context search
list will be used.
To edit the context search file, do the following:
1 Using any text editor, edit the CTXS.CFG file stored in the SYS:\ETC directory of the server
For example, if you had users with full NDS distinguished names such as Robert.sales.acme,
Maria.graphics.marketing.acme, Sophia.graphics.marketing, and Ivan.marketing.acme, then
you would enter the following contexts to the CTXS.CFG file:
sales.acme
graphics.marketing.acme
marketing.acme
3 Save the file in the SYS:\ETC directory.
The file is read the next time a Macintosh user logs in.
When Macintosh users log in, they enter only a username and the simple password. The system
finds the User object in the context specified in the CTXS.CFG file.
search file as described in Editing the Context Search File on page 17.
5 Unload and reload the AFPTCP.NLM program with the GUESToption to make the Guest
Renaming Volumes
Volumes can be renamed so that they appear in Chooser under a different name.
1 Using any text editor, create a file named AFPVOL.CFG.
2 On separate lines, enter the current name of the volume and, in quotes, the new name of the
18
Novell Confidential
3 Save the file in the SYS:\ETC directory of the server running Novell Native File Access
Protocols.
Once the volume has been renamed, it keeps the name even if you delete the file and restart
the server. To return to the previous name, repeat these steps and rename the volume to its
original name.
For example:
System volume "server1.sys".
4 Unload and reload the AFPTCP.NLM program.
Volumes will appear to Macintosh users with the new volume names.
Although you now have access to the files, mounting the volume to the desktop does not make
it available after rebooting.
5 (Optional) Create an alias to the desired volume or directory.
19
Novell Confidential
The Guest user has rights to access network resources as configured by the network administrator.
Using Chooser to access network files and folders is fairly consistent with the Macintosh
environment, but there are some differences between NetWare and Macintosh file sharing.
Macintosh users can view the sharing information about specific folders by clicking Get Info/
Sharing.
Inherited Rights and Explicit Rights
The Macintosh file system uses either inherited rights (which use enclosing folders privileges) or
explicit rights (which assign rights to a group or user). A folder in the Macintosh file system cannot
have both inherited and explicit rights.
NetWare uses both inherited and explicit rights to determine the actual rights that a user has.
NetWare allows a folder (or directory) to hold file rights for multiple groups and users. Because of
these differences, Macintosh users will find that access rights to folders and files might function
differently than expected.
20
Novell Confidential
NetWare uses inherited rights, so the Macintosh "Use Enclosing Folder's Privileges" option is
automatically turned off. When a Macintosh user views the Get Info/Sharing dialog box for a
NetWare folder, only the User/Group assignments are visible if there is an explicit assignment on
the folder. If the NetWare folder inherits User/Group rights from a parent group or container, those
rights are not displayed in the dialog box, nor will there be any indication that the folder is
inheriting rights from a group or container.
Owner, User/Group, and Everyone Rights
Because NetWare allows multiple groups and users to have rights to a single folder, users are not
able to delete rights assignments using the Apple Macintosh interface. Users can add assignments
to allow basic file sharing, but more complex rights administration must be done using the
NetWare utilities such as ConsoleOne.
When specifying Owners, Users, and Groups, there is no way to select from current groups. You
must enter the correct NetWare name and context (fully distinguished NDS name).
TIP: No context is required if the context is specified in the context search file.
Owner Rights
In the Apple File Sharing environment, an owner is a user who can change access rights. In the
NetWare environment, users can change access rights if they have been granted the Access Control
right for the folder. In NetWare, an owner means the one who created the file. A NetWare owner
has no rights by virtue of ownership. In the NetWare environment, the owner is the current user if
he has access control rights to the folder.
If the user does not have access control rights, the NetWare owner will be shown if the NetWare
owner is not the current user. If the current user does not have rights to change access and is also
the NetWare owner, a message to "Use NetWare Utility" is displayed in the Owner field.
In Apple File Sharing, there can be more than one owner. If you change the owner, access control
rights are added to the new owner, but are not remove from the current owner. In NetWare, there
are two ways to have access control rights: (1) have the Access Control right and (2) have the
Supervisor right. Adding a new owner only adds the Access Control right, not the Supervisor right.
If the current owner already has the Supervisor right through other NetWare utilities, that right will
remain. The Supervisor right also gives full file access rights. This means that if you are the current
user and have the Supervisor right, you also have read/write access and you cannot change those
rights.
Display only allows for one owner. If multiple users have file access rights, only the current user
is shown in the Owner field. This means you could change the owner (which in NetWare simply
means adding the Access Control right to the new user) and when you open the file sharing dialog
box again, you will be listed as the owner, even though you have just given ownership or the
Access Control right to someone else.
User / Group
Only one user/group can be displayed for a folder, although NetWare allows multiple users and
groups to be assigned file access rights. If both users and groups have access to a NetWare folder,
groups are displayed before users. The group with the most access rights is preferred over groups
with lesser access rights. Only users or groups with explicit rights (not inherited rights) are shown
in the User/Group field. Users and groups with inherited rights are not shown in the dialog box,
nor is there any indication that there are users and groups with inherited rights.
Adding a group or user does not remove the current group or user; it simply adds the rights to the
group or user specified. If the user enters the wrong user or group name, the user gets no feedback.
Working with Macintosh Computers
21
Novell Confidential
If multiple users or groups are assigned to the folder, it is possible that the user is unable to see the
user or group that was just assigned. It could be very difficult to know if the rights assignment
worked or not.
Rights set through this interface are inherited by the folder's subfolders. It is impossible to manage
all inherited rights from the Macintosh interface. (Although not recommended, you could set the
inherited rights filters from the NetWare utilities to turn off inherited rights.)
Everyone
Assignment of rights to Everyone acts like the Macintosh user expects, with the exception that
Everyone's rights are inherited. In NetWare, the object that represents the rights of any
authenticated user is used to set Everyone's rights. Everyone's rights can change from folder to
folder, but once they are set, they are inherited by subfolders.
22
Novell Confidential
In addition, most users must also have a simple password created for them before they can access
network resources using native protocols. The exception is when Native File Access for Windows
software has been configured to use the Domain authentication method.
This section describes the two Windows authentication methods and password requirements and
explains how to create simple passwords for Windows users.
NOTE: For information about selecting an authentication method during the installation, see Step 4 of
The method that Windows workstations (using their native Common Internet File System, or
CIFS, Protocol) use to authenticate to the CIFS-enabled NetWare server is determined by which
23
Novell Confidential
authentication method was selected during installation. The two Windows authentication methods
are Local and Domain.
If Local authentication is being used, each Windows user must have a simple password associated
with their NetWare/NDS User object in order to access network resources using native protocols.
However, if Domain authentication is being used, a simple password is not required. The reason
is that Domain authentication uses passthrough authentication to the Windows Domain Contoller.
As a result, when implementing Domain authentication, Novell Native File Access software does
not support the change password feature from the client; the password must be changed using the
Domain Controller User Manager tool.
In order to understand how the Novell Native File Access software incorporates the security of
NetWare with the native operating systems security (such as Microsoft Networking), it is useful
to first know the functionality and interrelation of the following four distinct passwords used in a
mixed networking environment.
Windows Local PasswordThe Windows operating system requires a username and
password to log in to the computer. This password, called the local password, is stored on the
computers local hard disk.
Windows Domain Controller PasswordWindows networking uses a domain controller,
which is a computer running Windows Server software that manages user access to the
Microsoft network. When Windows users log in to the network using a Domain Controller,
they are required to enter a username and password for authentication. This password, called
the domain controller password, is stored on the domain controller computer.
NetWare PasswordTo access the NetWare network, each user must have a user account
created specifically for him. This account is called a User object and is stored in the Novell
eDirectory data store. It consists of a NetWare username and a corresponding NetWare
password.
When the workstation is running Novell ClientTM software, users log in by entering their
NetWare username (including context) and password. NetWare usernames and passwords are
stored securely in the eDirectory structure on NetWare servers.
Simple PasswordThe simple password is also associated with a corresponding User object
and is required to provide network access from workstations which are not installed with
Novell Client software. As with the NetWare password, the simple password is stored
securely in eDirectory on the network.
IMPORTANT: Remember that if Local authentication has been implemented, Windows users must have a
simple password in order to access network resources using their native protocol (CIFS). However, if Domain
authentication has been implemented for your server, a simple password is not required.
The ConsoleOne management utility lets you create simple passwords for users one at a time by
completing the following steps.
1 At the Administrator Workstation, log in as a user with the Supervisor right.
Make sure that the Administrator Workstation meets the prerequisites described in
Administrator Workstation Prerequisites on page 10.
24
Novell Confidential
\PUBLIC\MGMT\CONSOLEONE\1.2\BIN directory).
3 Right-click the User object and then click Properties.
4 Click the Login Methods tab and select Simple Password.
5 Create a simple password for the selected user by filling in the following
fields:
NOTE: If the simple password is different from the NetWare password, users enter
the simple password when accessing the network with native protocols and they
enter the NetWare password when logging in with Novell Client software.
6 Click OK.
7 Repeat Step 3 through Step 6 in order to create a simple password for each
user that requires network access using Novell Native File Access
software.
8 (Optional) If you want users to be able to change their own simple
passwords after they log in the first time, check the Force Password
Change check box.
Using NetWare Remote Manager
You can also use NetWare Remote Manager (previously known as NetWare
Management Portal) to create simple passwords either for an individual user
or for multiple users at once.
Accessing NetWare Remote Manager
1 In the Address field of your Web browser, enter the IP address of the
password.
3 In the left frame, click Manage eDirectory > NFAP Security.
25
Novell Confidential
TIP: For more information about using NetWare Remote Manager, see the NetWare Remote Manager
which users on your network will receive simple passwords. There are two methods for
selecting users:
To select all User objects in that particular context, enter a full context in the NDS
Context field.
To select all User objects in the NDS tree, check the Traverse Context Tree for User
Objects check box.
NOTE: Searching the entire NDS tree might take several minutes.
2 (Optional) If you want an automatic message to be sent to the selected users notifying them
of their simple password, check the Send Password to User check box.
IMPORTANT: To use the Send Password to User feature, you must first use the Access Mail Notification
3 Specify a common simple password for all users by checking the User Supplied Password
The generated script file contains a list of users and will be processed by the utility to create
the simple passwords for those users. You can choose any name for the script file.
5 (Optional) You can verify the contents of a generated script file before actually processing the
script file. We recommend that you test the script file until it contains the appropriate list of
users.
5a Make sure the Process Script File check box is unchecked and then click Start.
IMPORTANT: No file will be generated and you will get an error in the browser if you do not fill in a
filename for the script file.
26
Novell Confidential
5b If the list is what you want, go to the next step and process the script file. If the list is not
correct, click the Back button on your browser, change the NDS context settings, and
click Start again. Repeat this process until the script file contains the appropriate
information.
6 When you are ready to process the script file, check the Process Script File check box and
The utility creates simple passwords for all of the users listed in the script file.
Creating a Simple Password for a Single User
1 In the NFAP Single-User Simple Password Set Utility section, enter the username (including
Now that you have created simple passwords for User objects in NetWare, those users can use
native protocols and familiar access methods (such as Network Neighborhood or My Network
Places) to access and manipulate files on the server. When prompted to authenticate, users enter
their NetWare username (without context) and their corresponding simple password.
Enabling Users to Change Their Simple Passwords with NetWare Remote Manager
You can use ConsoleOne to assign the necessary rights so that users can change simple passwords
with the NetWare Remote Manager tool.
1 At the Administrator Workstation, log in as a user with the Supervisor right.
Make sure that the Administrator Workstation meets the prerequisites described in
Administrator Workstation Prerequisites on page 10.
2 Run CONSOLEONE.EXE (located in the \PUBLIC\MGMT\CONSOLEONE\1.2\BIN
directory).
3 Right-click the User object and then click Trustees of This Object.
4 Select the User object and click Assigned Rights > Add Property.
5 Select the SAS:Login Configuration property from the list and click OK.
6 Click Add Property, select SAS:Login Configuration Key, and click OK.
7 Enable Compare, Read, and Write rights for both of the properties you just added to the User
object.
8 Click OK > OK.
27
Novell Confidential
passwords, their NetWare passwords will be affected differently, as described in the following
scenarios:
If both the NetWare password and the simple password are already the same when the user
changes the simple password, the NetWare password is synchronized and both passwords
remain the same.
If the NetWare password and the simple password are not the same when the user changes the
simple password, the NetWare password is not synchronized with the new simple password.
The two passwords remain different.
Whenever a user changes the NetWare password, the simple password is not synchronized
with the new NetWare password. The user must separately change the simple password for
the two passwords to match.
NOTE: Password synchronization is simpler for Macintosh users. Native File Access for Macintosh (AFP)
software keeps the simple password and the NetWare passwords synchronized. In other words, when a Mac
user changes either password using the native client software, password synchronization is automatic and
transparent.
You can add or remove contexts by editing the context search file.
1 Using any text editor, edit the CIFSCTXS.CFG file stored in the SYS:\ETC directory of the
For example if you had users with full NDS distinguished names such as Robert.sales.acme,
Maria.graphics.marketing.acme, Sophia.graphics.marketing, and Ivan.marketing.acme, then
you would enter the following contexts to the CIFSCTXS.CFG file:
sales.acme
graphics.marketing.acme
marketing.acme
3 Save the file in the SYS:\ETC directory.
4 At the server console, enter CIFSSTOP to unload the current context search file.
5 Enter CIFSSTRT to load the new context search file and apply the changes.
When Windows users log in, they enter only a username and the simple password. The system
finds the User object in the context specified in the CIFSCTXS.CFG file.
IMPORTANT: Remember that users must have a simple password before they can access the network.
Novell Confidential
www.novell.com/documentation/lg/consol12d/index.html).
Importing users from an NT domain is not supported in Local Mode. In Local Mode, the main
NetWare Remote Manager page is displayed rather than the NFAP Import Users page.
2 Run NetWare Remote Manager.
The NetWare Remote Manager is launched by entering the IP address of the server into the
URL field of an Internet browser.
See the NetWare Remote Manager Administration Guide in the NetWare 6 documentation
(http://www.novell.com/documentation/lg/nw6p).
3 In the left frame, click Manage eDirectory > NFAP Import Users.
4 Browse to the NDS Context that you will import the users into.
Any time you reach a valid context for importing users, a Start button will appear.
5 Click Start to import users.
The context that you select will be automatically written to the CIFSCTXS.TXT file, which
contains all the contexts of all users.
Status of the import is given on the interval that you select.
6 When the import is complete, click Done to clear the screen.
Make sure that the Administrator Workstation meets the prerequisites described in
Administrator Workstation Prerequisites on page 10.
Working with Windows Computers
29
Novell Confidential
The following parameter fields appear on the Config Page under the CIFS tab in ConsoleOne:
Server Name is the name of the server running Novell Native File Access Protocols. The
length can be a maximum of 15 characters. This name is displayed in Network Neighborhood.
This server name must be different from the NetWare Server name.
Comment is the comment associated with the server name discussed above. This comment is
displayed when viewing details.
WINS Address is the address of the WINS server to be used to locate the PDC, if the PDC and
the server running Novell Native File Access Protocols are on different subnets.
Unicode specifies whether Unicode character support is enabled. Unicode characters are used
in double-byte languages.
IMPORTANT: To support Unicode, an additional file named UNINOMAP.TXT must be created and saved
in the SYS:\ETC directory. When the -UNICODE value is set to On, the UNINOMAP.TXT file is used to
resolve Unicode-to-ASCII "no-map" problems.
To specify "no-map" cases in the UNINOMAP.TXT file, enter the first Unicode value to watch for and then
the second value representing the ASCII replacement code. For example:
0178 98
20AC CC
Save the values in the UNINOMAP.TXT file. If an unmappable character is encountered, the system uses
the ASCII substitution character specified in the file.
30
Novell Confidential
Primary Domain Controller Address is the PDC servers static IP address. This is needed if
the PDC is on a different subnet. This option should be used only when there is a valid reason
for overriding WINS or DNS.
IMPORTANT: The address of the PDC must be static; otherwise, if the PDC reboots and the address
changes, the server running Novell Native File Access Protocols will not be able to contact the PDC.
Use the Attach page to bind the CIFS protocol to the IP address specified.
IP Addresses show a list of the addresses that are bound to the CIFS protocol. You can enter
multiple addresses in the fields provided.
By default, CIFS is bound to all IP addresses on the server.
Shares Page Parameters
Use the Shares page to add volumes or directories on the server to be specified as shared points
and to be accessible via the Network Neighborhood.
NOTE: If no Shares are specified, then all mounted volumes are displayed.
Name is the name that the sharepoint is known by to the Windows computers.
Path is the path to the server volume or directory which becomes the root of the sharepoint.
This path must end with a backslash (\).
Comment is a description for the sharepoint that appears in Network Neighborhood or My
Network Places.
Maximum Number of Connections is the number of connections allowed to the sharepoint. A
zero (0) indicates an unlimited number of connections.
Using the CIFS.CFG File to Configure CIFS
1 Log in to the server running the Novell Native File Access Protocols.
2 Change to the SYS:\ETC\ directory.
3 Edit CIFS.CFG using a text editor.
Enter the desired parameters following the rules for syntax (see the Configuration File
Parameters section below for details).
4 Save the CIFS.CFG file to the same directory (SYS:\ETC).
5 Restart the server.
Configuration File Parameters
The following parameters can be set in the SYS:\ETC\CIFS.CFG file to customize the user
experience for your environment.
TIP: Any parameter can be excluded by placing a # at the beginning of the command line. If the parameter is
-SERVERNAME
The name of the server running Novell Native File Access Protocols. The length can be a
maximum of 15 characters. This name is displayed in Network Neighborhood. This server name
must be different from the NetWare Server name.
31
Novell Confidential
Value: Server_Name
Default: None
-COMMENT
The comment associated with the server name listed above. This comment is displayed when
viewing details.
Value: Comments
Default: None
-AUTHENT
The domain or workgroup that the server will belong to. Workgroup and Domain can be used
intergchangeably.
Value: Workgroup_Name
Default: Workgroup
-PDC
The PDC server name and static IP address. This is needed if the PDC is on a different subnet. This
option should be used only when there is a valid reason for overriding WINS or DNS.
NOTE: The address of the PDC must be static; otherwise, if the PDC reboots and the address changes, the
server running Novell Native File Access Protocols will not be able to contact the PDC.
32
Novell Confidential
-WINS
Address of WINS server to be used to locate the PDC, if the PDC and server
running Novell Native File Access Protocols are on different subnets.
Value: IP_Address
Default: None
-ATTACH
Bind the CIFS protocol to the IP address specified. For multiple addresses,
repeat the command as needed.
Value: IP_Address
Default: Bound to all addresses.
-SHARE
33
Novell Confidential
To specify "no-map" cases in the UNINOMAP.TXT file, enter the first Unicode value to watch for and then the
second value representing the ASCII replacement code. For example:
0178 98
20AC CC
Save the values in the UNINOMAP.TXT file. If an unmappable character is encountered, the system uses the
ASCII substitution character specified in the file.
You can enter the following commands at the server console to modify the configuration file.
CIFS SHARE ADD localpath sharename connectionlimit comment
adds a new sharepoint and also adds the command to the CIFS.CFG file.
CIFS SHARE REMOVE sharename removes the sharepoint and comments it out of the
CIFS.CFG file.
34
Novell Confidential
In Windows 2000 or Windows ME, click My Network Places > Computer Near Me. In
Windows 95/98, click Network Neighborhood.
3 Browse to the workgroup or domain specified during the Novell Native File Access software
installation.
4 Select the server running Novell Native File Access Protocols.
Although it is the same computer, the Novell Native File Access server name is not the same
as the NetWare server name. For more information, ask your network administrator.
TIP: You can enter the server name or the server IP address in Find Computer to quickly access the
There are several ways to access Map Network Drive. For example, you can use the Tools
menu in Windows Explorer or you can right-click Network Neighborhood.
3 Browse to or enter the following path:
\\server_running_Novell_Native_File_Access_software\sharepoin
t | volume | directory\
4 Select the server running Novell Native File Access Protocols.
Although it is the same computer, the Novell Native File Access server name is not the same
as the NetWare server name. For more information, contact your network administrator.
5 Complete the on-screen instructions for mapping the drive.
35
Novell Confidential
The NetWare password and the simple password will be synchronized only if the old simple
password matches the NetWare password. If they are different, the NetWare password will not
be changed and access to the network will be denied. To change and synchronize the NetWare
password, you must use the Administrator Workstation running Novell Client software.
From a Windows 95/98/ME Computer
1 Change the local password.
1a Click Start > Control Panel > Passwords.
1b Click Change Passwords > Change Windows Password.
1c Enter the username, old password, and new password as prompted.
2 Change the simple password.
2a Click Start > Run.
2b Enter
NET PASSWORD
server_running_Novell_Native_File_Access_software
For example:
NET PASSWORD NetWare1
WARNING: The Windows NET PASSWORD utility sends unencrypted text (called clear text) over
the network. If you are concerned about someone capturing your password over the network, you
should manage passwords using ConsoleOneTM from the Administrator Workstation. For more
information on why this issue exists, contact Microsoft Corporation.
2c Enter the same username, old password, and new password when prompted.
The NetWare password and the simple password will be synchronized only if the old
simple password matches the NetWare password. If they are different, the NetWare
password will not be changed and access to the network will be denied. To change and
synchronize the NetWare password, you must use the Administrator Workstation running
Novell Client software.
For more information on simple passwords, see Creating Simple Passwords for Windows Users
on page 23. For information on synchronization between simple passwords and NetWare (NDS)
passwords, see Understanding Synchronization of NetWare Passwords and Simple Passwords
on page 27.
For Computers Using Domain Authentication
If the computer is configured to use domain authentication, then the password checking is done by
the domain controller. The password can be changed using the Windows administration tools for
a domain controller. For more information, contact your network administrator.
36
Novell Confidential
37
Novell Confidential
38
Novell Confidential
39
Novell Confidential
40
Novell Confidential
41
Novell Confidential
42
Novell Confidential
Prerequisites
Before installing Novell Native File Access Protocols in a clustered environment, make sure that
you have met the following prerequisites:
Novell Cluster Services 1.6 installed on NetWare 6 servers
For information on configuring Novell Cluster Services, see the Novell Cluster Services
Overview and Installation Guide (http://www.novell.com/documentation/lg/ncs6p/
index.html).
NetWare 6 configured as described in NetWare Server Prerequisites on page 9
Administrator workstation configured as described in Administrator Workstation
Prerequisites on page 10
Novell Native File Access Protocols installed on each server in the cluster that you want users
to access.
Follow the instructions in Installing the Software on page 11.
"Create Shared Disk Partitions" in the Novell Cluster Services Overview and Installation
Guide (http://www.novell.com/documentation/lg/ncs6p/index.html).
43
Novell Confidential
When you create and cluster enable an NSS pool or volume by following the abovereferenced procedures, a screen appears that lets you choose the advertising protocols. Ensure
AFP is selected on this screen. This will cause an AFPBIND command to be added
automatically to the cluster-enabled pool volume load script, which ensures that your clusterenabled pools are highly available to Macintosh clients.
AFPBIND allows AFP virtual server names to be advertised via SLP.
3 (Optional) Rename cluster-enabled volumes so Macintosh users will see the same volume
If the network connection between a Mac computer and one of the servers in the cluster fails, the user must
reconnect using the same IP address for the cluster-enabled volume.
Volumes section of the Novell Cluster Services Overview and Installation documentation.
When you create and cluster-enable pools, ensure the CIFS check box that appears in
ConsoleOne during the pool creation process is checked, and enter the CIFS Server Name in
the field provided. This will make the pool accessible and highly available to CIFS clients.
The CIFS server name is the server name CIFS clients see when they browse the network. A
default server name is listed, but you can change the server name by editing the text in the
field.
When you cluster enable a pool and make the pool accessible to CIFS clients, the CIFS ADD
command along with the Fully Distinguished Name (FDN) of the virtual server (clusterenabled pool) is automatically added to the pool load script and the CIFS DEL command is
44
Novell Confidential
Properties.
3c Click the Scripts tab and add the CIFS ADD and CIFS DEL
45
Novell Confidential
UNLOAD SCRIPT
del secondary ipaddress 137.65.86.218
CLUSTER CVSBIND DEL CLUSTER1_SALESPOOL_SERVER 137.
65.86.218
NUDP DEL CLUSTER1_SALESPOOL_SERVER 137.65.86.218
CIFS DEL .CN=CLUSTER1_SALESPOOL_SERVER.OU=SALES.
O=NOVELL.T=CAJU.
nss /pooldeactivate=SALESPOOL /overridetype=question
3d Right-click the Virtual Server object in the left pane, then click Extensions of this Object.
3e Click the Add Extension button, select nfapCIFSConfigInfo, then click OK.
3f Enter the Extension name, then click OK.
The Extension name is the name you want to give the extension. You could name the
extension nfapCIFSConfigInfo.
3g Right-click the Virtual Server object in the left pane, then click Properties.
3h Click the CIFS tab, then enter the CIFS server name.
The CIFS server name is the server name CIFS clients see when they browse the network.
3i Click the CIFS tab again, select the Shares option, then enter the CIFS share points.
See Installing the Software on page 12 for more information on CIFS shares.
3j Click the CIFS tab again, select the Attach option, then add the IP address of the virtual
server.
3k Bring the virtual server resource offline and then online again to have the changes take
effect.
Although ACTIVE/ACTIVE mode is the recommended configuration, CIFS can also be run in
ACTIVE/PASSIVE mode. ACTIVE/PASSIVE mode signifies that CIFS software runs on only
one node at a time in the cluster. When a server fails, CIFS starts on another specified node in the
cluster, and the cluster volumes that were mounted on the failed server fail over to that other node.
This makes ACTIVE/PASSIVE mode slower because, in addition to cluster volumes failing over,
CIFS software has to load on other servers in the cluster before users can access files and
directories.
To configure CIFS for ACTIVE/PASSIVE mode with Novell Cluster Services, follow the
instruction above, except remove the CIFSSTRT.NCF command from the AUTOEXEC.NCF file
of each server in the cluster and add it to the beginning of the load script of each cluster-enabled
pool.
46
Novell Confidential
Whats Next
With the NetWare 6 cluster configured with Novell Native File Access Protocols, Macintosh and
Windows users can receive the benefits of a clustered environmentwithout needing additional
client software.
For an explanation of how Macintosh users access network files and for more information on
managing Macintosh workstations, see Chapter 3, Working with Macintosh Computers, on
page 17.
For an explanation of how Windows users access network files and for more information on
managing Windows workstations, see Chapter 4, Working with Windows Computers, on
page 23.
47
Novell Confidential
48
Novell Confidential
49
Novell Confidential
NetWare Server
SFO-ARGOS
UNIX Host
MADRID
2
This path
(/vol/memos)
is exported
for access
by the UNIX
host MADRID.
Before UNIX users can access the NetWare file system, it must be made available to the UNIX
workstations. This process is called exporting the file system. When exporting, you can define who
should access the information and how it is accessed by specifying the trusted systems and export
options. For example, you can restrict the access to specific UNIX workstations, export the
directory as Read-only, etc.
50
Novell Confidential
Guidelines
If the filename of the file created on the NFS Client in a traditional volume has more than 80
characters, the filename in long namespace gets truncated to 80 characters.
If the NetWare server code page is 932, then the file creation from Japanese EUC NFS clients
fails for certain characters
Accessing the NetWare File System from NFS Clients
After exporting the NetWare file system from a NetWare server, you must mount the exported file
system on the UNIX workstation for normal access. This process is called mounting the file
system. Mounting a NetWare file system from a UNIX workstation consists of the following:
Creating a mount point
A mount point is an empty directory you create. This directory becomes the access point for
the NetWare file system. If you choose an existing directory as a mount point, the contents of
the existing directory become unavailable until you unmount the remote file system.
Mounting the NetWare directory
Most UNIX systems use the MOUNT command to mount a remote file system.
After these steps are complete, UNIX users can access the NetWare file system by accessing the
local mount point. Different UNIX systems can use slightly different commands or user interfaces
to mount a remote file system.
Accessing the NFS Server from the Web
The Web-NFS component of the NFS software enables direct Web access to data on NFS servers.
It defines a new NFS URL that complements HTTP. The format is as follows:
NFS://Hostname or IP Address
Using this URL, browsers with Web-NFS support can access data from any server.
Web-NFS extends NFS to support operations over a WAN. With Web-NFS, clients can obtain file
handles more easily without going through the portmapper or the mount protocols. This makes it
firewall-friendly and enables NFS operations across WANs and the Internet. It also improves
performance over a WAN by reducing the number of turnarounds.
For each NFS server, only one of the exported paths can be enabled for Web-NFS access.
NFS Server Access Control
NetWare and UNIX use different methods for controlling access to files. Although both have
similar directory and file security, NetWare security is more elaborate. At a basic level, both
systems assign access controls to similar user types.
The access control mode is known as Independent Mode wherein there are no rights/permissions
mappings. NFS Client rights apply to NFS client access and NetWare rights apply to NetWare
client access.
For information about NFS Server configuration and management, see NFS Server on page 69.
51
Novell Confidential
object.
4 Click the Others Tab to view the IP Address of the NetWare server where NIS server is
installed.
NIS Information on eDirectory
NIS Domain
The NIS system organizes nodes into administrative segments called domains. The NIS domain
exists only in the local environment and usually covers a single network. An NIS domain is a
hierarchical structure; hence it is stored as a container in eDirectory. NIS does not impose any strict
rules on domain naming; however, each domain must have a unique name.
An administrative NIS domain could be a company or a division of a company. Many
administrators using DNS choose to relate their NIS domain name to their DNS domain name, but
this is not necessary.
NIS Maps
NIS stores all the common information pertaining to a domain as a set of NIS Maps. Users can
access the information in these NIS maps. In the eDirectory-enabled NIS, these maps are stored as
containers under the NIS domain container. A migration utility is available to create the NIS maps
under a specified domain. The NIS Server supports both standard and custom maps.
Standard NIS Maps: Standard maps are created from the standard NIS text files.
52
Novell Confidential
The following standard maps are supported. They are classified according to the type of records
they contain.
Ethers MapA source of information about the Ethernet addresses (48-bit) of hosts on the
Internet. The Ether objects (ieee802Device) store information about the Ethernet address and
hostname.
Bootparams MapA source of information for various boot parameters. The Boot objects store
information about the boot parameters of the various devices that are running. If the Bootparams
text filename is to be migrated from the ConsoleOne, it should be named bootp.
Hosts MapContains one entry for each IP address of each host. If a host has more than one IP
address, it will have one entry for each. The Hosts objects store the IP address and hostname as
distinguished values of CN, and aliases and nicknames are stored as other values of CN attributes.
Netgroup MapA source of information about Net Group parameters. It provides the abstraction
of net groups.
Networks MapContains a single object for each network. The Network objects store network
names as distinguished values of CN, and aliases and nicknames are stored as other values of CN
attributes.
Protocols MapContains one object for each protocol. The Protocols objects store protocol
names as distinguished values of CN, and aliases and nicknames are stored as other values of CN
attributes.
RPC MapContains one object for each Remote Procedure Call (RPC) program name. The RPC
objects store RPC program names as distinguished values of CN, and aliases and nicknames are
stored as other values of CN attributes.
Services MapContains an object for each service. The Services objects store service names,
ports, and protocols as distinguished values of CN, and aliases and nicknames are stored as other
values of CN attributes.
Passwd MapMaintains the details of the users such as UID, Username, home directory etc.
Group MapMaintains the details of the groups present such as GID, Group name, and Group
members.
Ypservers MapMaintains a list of NIS slave servers which can also serve the NIS domain.
Custom NIS Maps: You can use NIS to store any common configuration information that is
valuable to NIS clients. Maps you create in addition to the standard NIS maps are called custom
maps. For example, you can create an NIS map that provides an employee phone list.
You can create custom maps by creating a text file that contains the relevant configuration
information. After creating the text file, you convert it into an NIS map through migration.
To create a phone list map, you would begin by creating a text file containing each employee's
name and phone number. An NIS map text file must conform to the following rules:
Each data line begins a new entry key.
The backslash character (\) at the end of a line appends the next line to the current line.
The pound sign (#) at the beginning of a line tells the converter to ignore the line.
Blanks separate the key and the value. Therefore, you must use underscores to replace all
other blanks within the key, such as the space between an employee's first and last names.
Blanks are acceptable within the key values such as the phone list.
53
Novell Confidential
The master server is the true single owner of map data. It is responsible for all map maintenance
and distribution to slave servers. Once an NIS map is built on the master, the new map file is
distributed to all slave servers for that domain, through the client-server relationship. You must,
therefore, make all the modifications only on the master. The master maintains a list of slave
servers within its domain in the form of a map named Ypservers.
NIS Slave Server
You can set up read-only copies of the NIS database on secondary servers. The secondary servers
are referred to as slaves. When the server is set up as an NIS slave, it contacts the master NIS server
and requests a complete copy of the NIS maps on that server.
Once the slave server is set up, you dont need to manage the update process manually. The slave
servers periodically query the master and request an update when the slave detects a more recent
time stamp on the master.You can get an immediate update of the slave servers, through
ConsoleOne utility. A slave server can be added to the Ypservers map in the master.
We recommend that you set up at least one slave server for each NIS domain. The slave server can
then function as a standby if the master server goes down, although it might not be necessary in all
networks. Slave servers can also be used for load distribution in the network. A master NIS server
for one domain can also function as a slave NIS server for another domain.
NIS Client
NIS client enables users to query NIS map information from NIS servers.
For more information on setting up and managing NIS, see NIS Server on page 77.
54
Novell Confidential
By default, UNIX users /groups are looked for within the containers specified by the parameter
SEARCH_ROOT in the configuration file NFS.CFG. The search is recursive within the containers
specified by this parameter. In case the parameter does not contain any value, then the search is
done under the default bindery or servers context.
When a set of users/groups are migrated to eDirectory from a UNIX server, corresponding User/
Group objects are created /updated in eDirectory. During migration, if the UNIX user or group is
not present, a new eDirectory User or Group object is created with default NetWare rights. If the
User or Group object exists, the user or group's UNIX-related information is updated by default
during the migration.
User and Group Information
NetWare and UNIX both use the same User and Group objects to get the information they need.
When a user/group makes a request to access one of the services, it searches for the User object on
eDirectory by default. The services can also be configured to look for users and groups from a
remote NIS database.
Information about UNIX Users and Groups
Each user uses a username to log in to the system. The UID identifies file and directory ownership
information. The user's UID can be a number between 0 and 65,535, with the numbers 0 through
99 usually reserved. (0 is usually assigned to the Superuser.)
NFS group names also have identification numbers. The range of numbers is between 0 and
65,535, with the numbers 0 through 99 reserved. The GID identifies the user as a member of the
primary group identified by that GID.
User Home Directories
The home directory is the absolute pathname of the user's home directory on UNIX machines.
55
Novell Confidential
The shell information identifies the path of the shell program that runs when the UNIX user logs
in to the system. You can set the login account to run any program when a user logs in to the
system, but the program typically creates an operating system working environment.
Handling UNIX User Passwords
The current implementation does not migrate the existing UNIX password field in the password
map.
Before migrating the users and groups, remove the password field ("*", "x", or "!") from the
corresponding text file and then migrate. After doing this, you can set the UNIX password from
the UNIX machine. This is done by making the UNIX machine an NIS client to the NetWare
machine, logging in as that NIS user and running an NIS client utility named YPPASWD to set the
UNIX password.
For information about UNIX user management, see Migration of NIS Maps on page 63.
ConsoleOne-Based Administration
You can use ConsoleOne to perform the following Native File Access for UNIX tasks:
Configure the server's global parameters
Start and stop services
Configure and manage services
Configure error reporting
Monitor performance and adjust parameters affecting performance
Configure user and group UNIX information
For more information, see ConsoleOne-Based Configuration on page 58.
Novell Confidential
Services can be automatically restarted without user intervention in case of a node failure in
a cluster.
The services can be migrated and controlled between the various nodes in the cluster using
ConsoleOne.
Since the cluster volume is the same regardless of which server it is mounted on, no
configuration information is lost or out of date.
For information on configuring Native File Access for UNIX on Novell Cluster Services see
Setting Up Novell Native File Access for UNIX with Novell Cluster Services on page 89.
Administration Utilities
The following administration utilities are provided with Novell Native File Access for UNIX:
SCHINST
This utility is run automatically during the installation of Native File Access for UNIX. This utility
extends the schema necessary for storing the UNIX information of objects. If the directory services
are reinstalled or if the NISUserDef/NFAUUser object is deleted, run this utility manually. The
syntax is as follows:
schinst [ -f filename]
The -f filename is an optional parameter. It is the name of the file that contains the list of schema
files that need to be extended. If a filename is not specified, the default file, SYS:\ETC\UNIXSCH,
is used.
SCHINST takes the administrator's FDN and password as input for extending the schema.
SCHINST extends the UAM schema. It creates NFAUUser object and also adds the UNIX Profile
of the root user as UID=0, GID=1, Home Directory=/home to this object. It updates the parameter
NIS_ADMIN_OBJECT_CONTEXT in the configuration file NFS.CFG with the context where
the object is present.
NOTE: You also have to run nisinst after this.
All log messages generated by SCHINST are written to the SYS:\ETC\SCHINST.LOG file. All
information regarding schema extension can be found in SYS:\SYSTEM\DSMISC.LOG.
NISINST
This utility creates an eDirectory object with the name NISSERV_Servername by default or
whatever name was specified with the -s option. NIS Server uses this object to store the domains
served by the NIS Server. NIS Server validates every request against the list of domains specified
in this object. It serves the request only when the domain in the request is present in the above list.
The syntax is as follows:
nisinst [-s name] [-x context] [ -i ip address]
The parameter -s is optional. It specifies the name to be given to the nisserver object. The
parameter -x is also optional. It specifies the context where the object should be created in
eDirectory. The optional command line option -i is to specify the IP address to be attached to the
NISServ Object. This option is useful in a cluster environment and for servers with multiple NIC
cards.
Run the NISINST manually, if the nisserver object is deleted.
57
Novell Confidential
IMPORTANT: If directory services are removed, you need to comment the SEARCH ROOT parameter in
nfsstop
schinst
nisinst
nfsstart
Upgrade Utility
The upgrade utility (NFAUUPG.NLM) is automatically invoked to upgrade the default
configuration of NetWare NFS Services 2.x or 3.0 when you choose Native File Access for UNIX
while upgrading the operating system from NetWare 4.x or NetWare 5.x to NetWare 6 .
When invoked during installation, the upgrade utility retains the existing configuration into the
new configuration files, NFS.CFG, NIS.CFG, and NFSSERV.CFG located in SYS:\ETC. The
existing configuration files NFSTHOST, and NFSEXPRT are retained.
During installation, if N4S schema is detected, then the UAM schema will get extended
automatically to support features, such as, multiple domain support, RFC2307 compliance for
NIS, starting and stopping NIS services from ConsoleOne.
Configuration Methods
Novell Native File Access for UNIX can be configured using ConsoleOneTM and also by setting
the file-based configuration parameters of the various components.
ConsoleOne-Based Configuration
administer.
1 Start ConsoleOne from the server where Native File Access for UNIX is installed.
2 Click NFSAdmin and then the login toolbar icon.
3 Enter the tree name, context name, authorized username, and authorized password.
4 Click OK.
5 Enter the hostname or IP address and then click OK.
58
Novell Confidential
IMPORTANT: To log in successfully, make sure that your file server name and hostname are the same
and that you have logged in to the tree of the server you want to administer. You will not be able to
administer a NetWare NFS Services 3.0 on NetWare 5.1 from ConsoleOne on NetWare 6.
Figure 2
WARNING: After the Novell Native File Access for UNIX installation, two objects are created in the tree:
File-Based Configuration
The configuration (.CFG) files are used to configure the services. All of these files have the
following format:
PARAMETER_NAME = VALUE
volume.
59
Novell Confidential
Table 1
Default Value
Description
NDS_ACCESS
NIS_CLIENT_ACCESS
NIS_DOMAIN
NIS_SERVER
SEARCH_ROOT
Properties.
The following panel appears:
60
Novell Confidential
Figure 3
61
Novell Confidential
Figure 4
This panel contains the parameters that can be configured to set the directory access of
NetWare NFS Server.
2 Modify the following Directory Access parameters as necessary:
SNMP Alert LevelThe level of SNMP alerts reported to SNMP management stations.
Select an alert level from the drop-down list. You can also turn off SNMP reporting from this
list.
CriticalWarns you about urgent problems that require immediate action to prevent
widespread failure.
MajorWarns you about serious problems that require prompt action to prevent failure
of the object and possibly some related objects.
InformationalProvides descriptive information that can be used for such things as trend
analysis and planning.
Each level incorporates the information from the levels listed above it. For example, if you
select Minor, you also receive messages about major and critical alerts.
62
Novell Confidential
NOTE: Administering NetWare 5 NFS Services on NetWare 5 from ConsoleOne on NetWare 6 is not
supported.
For more information on UNIX user management, see UNIX User Management Using
eDirectory on page 54.
File-Based Migration
Migration, by default uses the makefile SYS:ETC/NIS/NISMAKE, which contains the location of
the text file for every map. The general syntax of the migration utility is:
makenis [-r resultfilename -[r]d domainname [-n context] [-f nismakefilename] {[mapname -[l|b]p
line or byte object in mapname]...}
NOTE: All options should be used only in the specified order.
In general, to create a domain and migrate data or to use the existing domain object, use the
following format:
makenis -d domainname
63
Novell Confidential
To remove the existing domain data and then migrate, use the following format:
makenis -rd domainname
To specify the context where you want to create your Domain object and data, enter it as the
contextname:
makenis -d domainname -x contextname
Edit the context parameter by prefixing each of the dots in the Relative Distinguished Names
with a backslash (\) to distinguish them from eDirectory names.
To specify an NIS makefile other than the default SYS:ETC/NIS/NISMAKE, use the
following format:
makenis -d domainname -f makefilepath
To specify the text files that you want to migrate, modify the NIS makefile. The NIS makefile
is in the following format:
map name
full path
To migrate a map from a particular offset in a specified map text file, use the following format:
makenis -d domainname mapname -lp lineoffset
Or
makenis -d domainname mapname, -bp byteoffset
Line offset is used to start migration from a particular line from the map text file. If the
migration fails while migrating large maps, instead of migrating it again from the beginning,
you can specify the byteoffset to start from the offset specified in the migration log file. For
more details on this offset, refer to the description of the configuration parameter
FILEMARK_LOG_FREQ in NIS.CFG.
Makenis adds users to the Members attribute, gives the user the rights equivalent to that of the
group, and updates its Group Membership attribute.
ConsoleOne-Based Migration
1 In the left panel of ConsoleOne, click The Network.
64
Novell Confidential
2 Select the servers tree where you want to manage the domains and maps.
3 Click the toolbar M icon.
Migration Panel
4 To migrate a domain, enter the NetWare Host Name/IP Address, Domain Name, and Domain
Context.
5 To set the NIS Server as master for this specified domain, check Set the Specified Host As
Master Server.
6 In the Master Server Info section, check Clear Existing Maps if you want to clear the maps
already present.
7 Click the radio button for the type of the migration you want to perform: Replace, Update, or
Merge.
8 To set the NIS Server as Slave Server, enter the Master Server Name/IP Address in the Slave
The available default maps are ethers, hosts, networks, protocols, RPC, services, passwd,
group, netgroup, and bootparams. By default, these files should be present in SYS:\ETC\NIS.
10 To migrate the domain for specific maps, click Advanced to go to the Map Information panel.
65
Novell Confidential
Figure 6
click OK.
11 To modify an existing map or add a new map, click Add to go to the Add Map panel.
Figure 7
11a Enter the Map Name and the Text File name.
11b If you want to enable secure access to the map, click Secure.
11c In the Comment Character box, enter the comment character present in the specified text
You can add and modify the information of a User or Group object that already exists in
eDirectory.
Modifying User Information
1 In the left panel of the ConsoleOne main menu, click the eDirectory tree where the object
resides.
66
Novell Confidential
If you do not find the tree, click Novell Directory Services and then select the tree and log in
to it.
2 Double-click the container named domainname_U, where the User objects reside.
The following panel appears, displaying the various tabs that should be specified to add and
modify the user information in eDirectory.
All the tabs except the UNIX Profile tabs are standard forms.
Figure 8
4 To modify the UNIX user profile, click UNIX Profile and specify the information in the
following fields:
User IDThe users UNIX UID.
Primary GroupThe group ID (GID) of the group this user belongs to. To enter the GID of
the user, click Browse and select the appropriate group.
Login ShellThe preferred login shell of the user.
Home DirectoryThe home directory the user wants to be placed in while logging in to the
system.
CommentsAny other comments that the user might want to specify.
Reset UNIX PasswordUse to reset the users UNIX password.
5 Click Apply > OK.
Modifying Group Information
1 In the left panel of the ConsoleOne main menu, click the eDirectory tree where the object
resides.
If you do not find the tree, click Novell Directory Services and then select the tree and log in
to it.
2 Double-click the container domainname_G, where the Group objects reside.
67
Novell Confidential
The following panel appears, showing the various forms which should be specified to add and
modify the group information in eDirectory.
All the forms except the UNIX Profile form are standard forms.
Figure 9
4 To modify the UNIX group profile, click the UNIX Profile tab and specify the information in
new user.
2 Select File > New, and then click User.
3 Enter the user information.
new group.
2 Select File > New, and then click Group.
3 Enter the group information.
To make this newly added user/group an NIS User and NIS Group record, add the attribute
nisUserGroupDomain to the object. This attribute holds a list of the domains to which that record
belongs.
IMPORTANT: When any update to a UNIX profile is done from ConsoleOne, execute NFSSTOP and
68
Novell Confidential
When the migration utility, makenis is executed, the log file MAKENIS.LOG is created by
default in SYS:\ETC\NIS. This file records messages that provide following information:
The containers added such as domainname container, domainname_U (for users),
domainname_G (for groups)
The maps added and attached to the container
Parsing statistics for each map. For example, the number of records read, migarated, conflict
and invalid records
Conflicting record details are logged
IMPORTANT: Even in a clustered environment, MAKENIS.LOG is created in SYS:\ETC\NIS or in the path
NFS Server
The NFS Server uses the following files:
NFSSERV.CFG which contains the configuration parameters
NFSEXPRT which contains the exported path information
NFSTHOST which contains the trusted hosts list for the exported path
For more information on NFS Server, see NFS Server on page 50.
File-Based Management for NFS Server
NFS Server Configuration Parameters
The following table lists the parameters that can be set in NFSSERV.CFG:
Parameter
Default Value
Range
Description
REQ_Q_FULL_ALERT
90
20 - 99
REQ_CACHE_FULL_ ALERT
90
20 - 99
OPEN_FILE_CACHE_
FULL_ALERT
90
20 - 99
OPEN_FILE_CACHE_ ENTRIES
512
32 - 1024
CACHE_AGING_ INTERVAL
60
0 - 2000
REQ_CACHE_ ENTRIES
256
64 - 512
69
Novell Confidential
Parameter
Default Value
Range
Description
CACHE_WRITE_ THROUGH
NO
YES / NO
TYPE_OF_ TRANSPORT
BOTH
TCP, UDP, or
BOTH
NFS_VERSION
0/2/3 (0 =
Both, 2 = only
V2, and 3 =
only V3)
NFS_UMASK
022
000 - 777
NFS_V2_THREADS
1 -150
NFS_V3_THREADS
1 - 150
MOUNT_V2_THREADS
1 - 150
MOUNT_V3_THREADS
1 - 150
NFS_V2_TCP_SEND_Q_
ENTRIES
30
1 - 150
NFS_V3_TCP_SEND_Q_
ENTRIES
30
1 -150
NFS_V2_RECV_Q_ENTRIES
20
1 - 150
NFS_V3_RECV_Q_ENTRIES
20
1 - 150
LOG_DIR
SYS:\ETC
LOG_FILE
NFSSERV
LOG_LEVEL
1 = Error
Messages,
2 = Warning
Messages,
4 = Information
Messages
IMPORTANT: When trying to administer NFS Server through ConsoleOne while NFS configuration files are
70
Novell Confidential
The Export Path information file, NFSEXPRT, contains the list of the paths that are exported from
the system. It also gives the specified properties for the exported path.
This file contains one exported path per line. The format of each line is as follows:
ExportedPath isReadonly anonymousAccess mode webccess
The NFSTHOST file contains the list of all the trusted hosts that can access the exported directory.
This is specified in conjunction with the NFSEXPRT file.
The format of every line is as follows:
Exported Path Host Name Access-Type Host/Hostgroup
71
Novell Confidential
To remove an exported path, delete the corresponding directory entries from the files NFSTHOST
and NFSEXPRT.
Getting the UNIX information from Remote NIS
For file system sharing by NFS server, the UNIX user and group information is obtained from
eDirectory by default. This can be modified so that UNIX information is obtained from a remote
NIS server. To set this, do the following:
1 Run NFSSTOP.
2 In the NFS.CFG file, set the parameters as follows:
NDS_ACCESS=0
NIS_CLIENT_ACCESS=1
3 Run NFSSTART.
4 Load NFSSERV.
Starting and Stopping NFS Server
This section describes how to manage the NFS Server from ConsoleOne.
NFS Server General Configuration Parameters
1 After logging in, click the server you want to administer from the list of servers under
The following panel, which shows the NFS Server basic parameters and their default values,
appears.
72
Novell Confidential
Figure 10
Request Q Alert LevelAfter what percentage of request queue utilization an SNMP alert
is sent. Default = 90. Range = 20 - 99.
Request Cache Alert LevelAfter what percentage of request cache utilization an SNMP
alert is sent. Default = 90. Range = 20 - 99.
Open File Cache Alert LevelAfter what percentage of open file cache utilization an
SNMP alert is sent. Default = 90. Range = 20 - 99.
Number of Open File CacheNumber of files the NFS server can have open
simultaneously. Default = 512. Range = 32 - 1024.
Open File Aging IntervalHow many seconds the NFS server keeps a file's information in
cache memory. When a file is held in cache, NetWare users cannot access it. Larger values
produce better performance, but they also make NetWare users wait longer to access files that
are being manipulated by NFS. Default = 60. Range = 0 - 2000. Open File Caching is disabled
at 0.
Number of Request Cache EntriesNumber of requests that can be held in cache memory.
Default = 256. Range = 64 - 512.
Enable Cache Write ThroughWhether cached data should be written to disk immediately
or not. By default, the data is not written immediately.
Transport ModeWhich transport mode NFS Server should support. The modes could be
UDP, TCP, or Both. Default = Both.
NFS Protocol VersionVersion of the NFS protocol to be loaded. The values are 0/2/3.
NFS File Creation MaskFile mode creation mask in Independent Mode for default UNIX
permissions of files and directories created from the NetWare side.
4 To specify the advanced parameters, click Advanced on the NFS Server Options panel.
The following panel, which shows the NFS Server advanced parameters and their default
values, appears.
Working with UNIX Machines
73
Novell Confidential
Figure 11
NFS V2 ThreadsNumber of NFS Server threads servicing the NFS 2 protocol. Default =
5. Range = 1 - 150.
NFS V3 ThreadsNumber of NFS Server threads servicing the NFS 3 protocol. Default =
5. Range = 1 - 150.
Mount V2 ThreadsNumber of NFS Server threads servicing the Mount V2 Requests.
Default = 1. Range = 1 - 150.
Mount V3 ThreadsNumber of NFS Server threads servicing the Mount V3 Requests.
Default = 1. Range = 1 - 150.
NFS V2 TCP Send Q EntriesSize of the TCP send queue for the NFS 2 protocol. Default
= 30. Range - 1 - 150.
NFS V3 TCP Send Q EntriesSize of the TCP send queue for the NFS 3 protocol. Default
= 30. Range = 1 - 150.
NFS V2 Q EntriesSize of the receive queue for the NFS 2 protocol. Default = 20. Range
= 1 - 150.
NFS V3 Receive Q EntriesSize of the receive queue for the NFS 3 protocol. Default = 20.
Range = 1 - 150.
Log File PathDirectory that NFS Server creates the log file in. Default directory is
SYS:\ETC.
Log File NameName of the NFS Server Log File. Default name is NFSSERV. A .LOG
extension is automatically added.
NFS Server Log LevelIndicates the types of messages to be logged.
6 Click OK.
74
Novell Confidential
Exporting a directory enables NFS client users to view NetWare volumes and directories as part
of the client file system.
You can export a NetWare path and manage it.
1 Make sure you have added the NFS name space, and then select Export New Path from the
2 To export a new directory, click the Browse icon in the upper-right corner of the panel.
3 Double-click the server name to see the volumes with NFS name space.
4 Select the volume or directory you want to export and click OK.
5 On the Export New Path panel, modify the following fields as necessary:
75
Novell Confidential
access to.
An asterisk (*) will give access to all the hosts.
You can also specify the type of access you want to give to the host.
7 Click the Trustee name on the Export New Path panel to set their access rights.
Hosts with Root AccessThe host whose users with root privileges have Admin rights to the
exported directory. Select this field to display a list of these hosts. If a host with access is not
specified as having root access, root users on that host have the rights of the NFS user Nobody.
Hosts with Read-Write AccessThe hosts with access whose users have read/write access
to the exported path. Select this field to display a list of these hosts.
8 To remove a host from the Trustee list, select the trustee and click Remove Trustee.
Modifying the Exported Path
1 In the left panel of the ConsoleOne main menu, click the server that you want to administer.
You can now see the properties of the exported path and modify them.
4 Make the changes as required and then click OK.
Removing an Exported Path
1 In the left panel of the ConsoleOne main menu, click the server that you want to administer.
76
Novell Confidential
For file system sharing by NFS server, the UNIX user and group information is obtained from
eDirectory by default. This can be modified so that UNIX information is obtained from a remote
NIS server. To set this, do the following:
1 Run NFSSTOP.
2 Set the parameters in the NFS.CFG file as follows by following Steps 1 to 5 in Configuring
NDS_ACCESS=0
NIS_CLIENT_ACCESS=1
3 Run NFSSTART.
4 Load NFSSERV.
Starting and Stopping NFS Server from ConsoleOne
1 Click NFSAdmin and log in to the server that you want to administer.
2 Click the S icon on the toolbar to start/stop the NFS Server. The background color of the S
If the NFSEXPRT file is modified outside ConsoleOne, then to view the current contents of the
file, do the following:
1 In the left panel of the ConsoleOne main menu, click the server that you want to administer.
When NFS Server service is running it logs messages into a log file named NFSSERV.LOG
created by default in SYS:\ETC. This file records messages that provide following information:
When and where the serivices are started and stopped
Clients where the exported volumes are mounted.
NIS Server
There is an NIS Server object in eDirectory called NISSERV_Servername. This object is created
during installation. Migration utility adds the domain details to this object when a domain is
migrated. NIS Server will service the list of domains present in this object.
Also, for every user moved, it updates the user's Group Membership attribute and gives rights
equivalent to that of the Group.
For information about NIS, see Network Information Service on page 52.
77
Novell Confidential
The configuration parameters required for NIS Services is available in the file NIS.CFG. The
following table lists the parameters in NIS.CFG.
Table 2
NIS Parameters
Parameter
Default Value
Description
NIS_SERVER_CONTEXT
NIS_SERVER_NAME
INTERDOMAIN_RESOLUTION
FILEMARK_LOG_FREQ
100
LOG_FILE_PATH
SYS:ETC\NIS
MAX_LOG_MSG
5000
78
NIS_LOG_LEVEL
MAP_REFRESH_DEFAULT
24:00:00
Novell Confidential
Parameter
Default Value
NIS_ADMIN_OBJECT_
CONTEXT
Description
following:
2a Create a text file called YPSERV in SYS:\ETC\NIS. For every slave server enter the
2b Enter the YPSERVERS map entry in SYS:\ETC\NIS\NISMAKE with its path in the
following format:
YPSERVERS SYS:\ETC\NIS\YPSERV
3 Migrate the domain. For migration information, see File-Based Migration on page 63.
4 Load NISSERV.NLM. Now the NetWare NIS Server is setup as Master NIS Server.
5 (Conditional) If the map data in NIS master is modified anytime, and the changes done needs
to be updated in the slave servers immediately then execute the following command:
yppush -d domainname [-v] mapname
NOTE: The changes done on the NIS master are automatically updated on the slave servers periodically.
server list.
2 In the NetWare server, make sure that the parameter NIS_CLIENT_ACCESS=1 in the file
SYS:\ETC\NFS.CFG.
3 Set the domain to the one that is being served by the UNIX NIS server, using the following
command:
ypset domainname hostname
To login or to set the password for a user from a UNIX NIS client, set the default domain in
the NetWare server using ypset.
4 Make sure NISSERV.NLM is loaded.
5 Run MKSLAVE, to setup the NetWare machine as slave, with the following parameters:
mkslave -d domainname -m master [-x contextname]
SYS:\ETC\NFS.CFG.
Working with UNIX Machines
79
Novell Confidential
3 Run NFSSTART.
4 Set the default domain by entering
ypset domainname hostname/IP_address
To configure the parameters required for nis services, right-click The Nisserv_servername > Click
Properties. A panel similar to the following appears:
Figure 14
Map Refresh Frequency The Frequency At Which All The Records Of The Map Should Be
Refreshed. Range = 1 To 2400 Hours (100 Days).
Log File PathThe Path In The Netware Server Where You Want To Write The Nis Log Files.
Maximum Log MessagesThe Maximum Number Of Log Messages That Can Be Logged. The
Information Is Specific To Each Log File. By Default The Last 5000 Messages Are Displayed. If
The Number Of Log Messages Is Set To N, The Last N Messages Are Retained.
Log File Error LevelThe Level Of Error Messages Written To The Audit.log File. Select An
Error Level From The Drop-down List.
Enable Interdomain ResolutionCheck This Box To Allow Interdomain Resolution. Dns Is
Then Contacted For Hostname Resolution For Nis Client Calls On Host Maps Only.
Viewing Domains Served By NIS Server
To View The Domains Served By The Nis Server Right-click Nisserv_servername > Click
Properties > Memberships Tab. A Panel Similar To The Following Appears.
80
Novell Confidential
Figure 15
You Can Add Or Delete Domains From This Panel. For More Details, See The Online Help.
Setting Up a NetWare Server As a NIS Master
1 Copy the NIS related text files required for the domain from the
following:
2a Create a text file called YPSERV in SYS:\ETC\NIS. For every slave server enter the
2b Enter the YPSERVERS map entry in SYS:\ETC\NIS\NISMAKE with its path in the
following format:
YPSERVERS SYS:\ETC\NIS\YPSERV
page 64.
4 Start NISSERV.
5 (Conditional)You can use the YPPUSH utility to update the Slave NIS Server.
The YPPUSH utility copies a new version of the named NIS map from the master NIS server
to the slave NIS servers. The YPPUSH utility is normally run only on the master NIS server
after the master databases are changed and the changes need to be updated in the NIS slave
servers immediately. The YPPUSH utility first constructs a list of NIS slave server hosts by
reading the NIS map Ypservers within the same domain. Then a transfer map request is sent
to the NIS server on each host.
Right-click NISSERV_Servername > click Update Slave Server . A panel similar to the
following appears:
81
Novell Confidential
Figure 16
Enter the required details such as HostName or IP Address of the Master Server, Domain
Name, and Map Name. For more details, see the online help.
NOTE: The changes done on the NIS master are automatically updated on the slave servers periodically.
server list.
2 In the left panel of ConsoleOne, click The Network.
3 Select the server tree where you want to manage the domains and maps.
4 Click the M icon on the toolbar to display the Migration panel.
5 To migrate a domain, enter the NetWare Host Name/IP Address, slave Domain Name, and
Master Server.
7 Enter the Master Servers Name /IP Address in the Slave server information.
8 To migrate the domain, click Migrate.
Configuring eDirectory Objects to be Served by NIS Server
NIS Server recognises eDirectory users/groups as NIS users/group only if they have a UNIX
profile attached to them. To configure existing eDirectory user/group objects to be served by NIS
Server, complete the following steps.
1 Choose the eDirectory User/Group object > right-click Properties > UNIX Profile. Enter the
Groups.
This is a multi-valued attribute and you can attach as many NIS Domains to this as you want.
These Users and Groups now belong to these NIS Domains and will be listed under all these
domains.
4 Verify if the eDirectory Context under which these User and Groups exist is listed in the NIS
Domain object. Right-click Domain Object > Properties > Memberships tab.
You can also create new NIS maps and NIS map records under NIS domain object as you
create normal eDirectory objects.
NOTE: No objects will be there under the passwd and group map objects in the domain. When managing
NIS through ConsoleOne, eDirectory objects of type ipService and nisObject cannot be created.
82
Novell Confidential
After migration the NIS maps and records will be available as objects under the migrated NIS
domain object.
Figure 17
When a client call is made to this domain, the NIS Server will list the data present under the
corresponding domain object. However, for user/group details, it will look for users and groups
belonging to the domain under the contexts specified by an attribute of the domain object.
To view the list of contexts where the users and groups will be located, right-click Domain object
> click Properties > Membership Tab. A panel similar to the following appears.
Figure 18
83
Novell Confidential
In case the NetWare NIS Server is a slave for a domain and the master NIS server for that domain
is changed to some other server; to get the updates from the new master, you need to change the
NIS master server name for the domain object present in the NetWare NIS slave server.
Right-click Domain object > click Change Master. A panel similar to the following appears:
Figure 19
Enter the IP address of the new NIS master server. The NIS slave server will now contact the new
master server for updates on all the maps under this domain.
You can view the properties for each map. Right-click Map object > click Properties. A panel
similar to the following appears:
Figure 20
84
Novell Confidential
Administering Maps
The following figures show the main map panels and are followed by procedures for using each
panels basic fields. Using these panels, you can view or modify the map records properties. The
standard fields remain the same.
Figure 21
1 To add the devices boot parameter, click Add, enter the boot parameter of the device in the
85
Novell Confidential
2 To delete the devices boot parameter, select the boot parameter of the device in the Boot
Parameter field, and then click Delete > Apply > OK.
Figure 23
1 To add the host address, click Add, enter the IP address of the host, and then click Apply > OK.
The network addresses are written in the conventional decimal dot notation.
2 To delete the host address, select the hosts IP address from the IP Address field, and then click
86
Novell Confidential
To add a netgroup address, enter the name of the Map Record, browse the icon for the Map Name,
enter the description of the map, and then click Apply > OK.
Figure 25
1 To enter the IP network number, click Browse, enter the network number, and click OK.
2 To enter the IP netmask number, click Browse, enter the netmask number, click OK, enter the
87
Novell Confidential
Figure 27
1 In the ONC RPC Number field, enter the RPC number of the program.
2 Enter a brief description of the record.
3 Click Apply > OK.
Figure 28
1 In the IP Service Port field, enter the port number that this service is available on.
2 In the IP Service Protocol field, enter the protocol used to access the specified service.
3 Enter a brief description of the record.
4 Click Apply > OK.
88
Novell Confidential
Figure 29
1 In the Map Record field, specify the map record using the following format:
key record
Setting Up Novell Native File Access for UNIX with Novell Cluster
Services
To get the full benefit of using Novell Native File Access for UNIX with Novell Cluster
ServicesTM, the software must be installed and configured to work in a cluster environment.
This section describes the following:
Prerequisites (page 89)
Configuring the Properties of Cluster Resource (page 91)
Component-Specific Configuration (page 93)
Starting and Stopping Native File Access for UNIX with Cluster Services (page 94)
Prerequisites
Before installing Native File Access for UNIX with cluster support, create at least one shared pool
and at least one volume in that pool.
1 Create the directory SYS:\NFSBACK.
Working with UNIX Machines
89
Novell Confidential
When cluster enabling for the first time, copy the configuration files NFS.CFG,
NFSSERVER.CFG, NIS.CFG and NISSERV.CFG from SYS:\ETC to SYS:\NFSBACK.
When upgrading from a previously cluster enabled setup, copy the configuration files
NFS.CFG, NFSSERVER.CFG, NIS.CFG and NISSERV.CFG from Shared Vol Name
:\ETC to SYS:\NFSBACK
named <clustername>_<poolname>_POOL. A virtual server object associated with the shared pool will be
created, called <clustername>_<poolname>_SERVER. ConsoleOne also creates a Cluster Pool resource
object called <poolname>_SERVER, inside the Cluster Container object.
For example, given a cluster named NFSC, shared pool named NFSP, and volume named VOL1, the objects
seen would be:
Cluster container object: NFSC
Pool Object: NFSC_NFSP_POOL
Virtual Server Object: NFSC_NFSP_SERVER
Volume Object: NFSC_VOL1
Cluster pool resource object within cluster container: NFSP_SERVER
Setting Up
1 Install Native File Access For UNIX on all the nodes in the cluster.
2 On each node of the cluster, if the NFS Services are running, run NFSSTOP.Unload
90
Novell Confidential
To cluster enable for the first time: execute the following command on all nodes, one
by one. Make sure to have the shared volume residing on the node at the time you run the
command:
spinst -o 2 -v SHARE_VOL_NAME: -n RES_NAME -i RES_IP
Using the example names given in the prerequisites section, and assuming the address
10.2.3.4 is assigned to the shared pool, the command would be:
spinst -o 2 -v VOL1: -n NFSP_SERVER -i 10.2.3.4
To upgrade from a previously cluster enabled setup: execute the following command
on all nodes, one by one. Make sure to have the shared volume residing on the node at
the time you run the command):
spinst -o 3 -v SHARE_VOL_NAME: -n RES_NAME -i RES_IP
In the command, you need to specify the shared volume name for -v, the resource name
for -n and the resource IP address for -i.
Using the example names given in the prerequisites section, the command would be:
spinst -o 3 -v VOL1: -n NFSP_SERVER -i 10.2.3.4
5 Create an ETC directory on the shared volume. Copy the following files to
shared_volume:\ETC\ :
sys:\etc\nis.cfg
sys:\etc\nfs.cfg
sys:\etc\nfsserv.cfg
sys:\system\nfsstart.ncf
sys:\system\nfsstop.ncf
Within the Cluster contain object (Console view), right-click the Cluster Pool resource object and
then click Properties. Select the Scripts tab to find the Cluster Resource Load Script and Cluster
Resource Unload Script. Following are the formats for these scripts.
Load Script
To the load script, add the following at the end of the existing script:
nfsclust AAA.BBB.CCC.DDD shared_vol_name shared_pool_name_SERVER
shared_vol_name:\ETC\NFSSTART
For the example names used in this document, the specific commands would be:
nfsclust 10.2.3.4 VOL1 NFSP_SERVER
VOL1:\ETC\NFSSTART
Unload Script
To the unload script, add the following at the beginning of the existing script:
91
Novell Confidential
shared_vol_name:\ETC\NFSSTOP
#(VOl1:\ETC\NFSSTOP, for our example)
unload nfsclust
unload nfsadmin
delay 2
unload pkernel
NOTE: A small delay might be needed before PKERNEL can unload, to allow dependant modules to finish
unloading first. If the unload pkernel command fails, the pool may go comatose rather than migrate
successfully. The delay command serves this purpose.
Setting
Description
Start
AUTO, MANUAL
Failover
AUTO, MANUAL
92
Novell Confidential
Mode
Setting
Description
Failback
AUTO, MANUAL,
DISABLE
To view or change the Start, Failover, and Failback modes, do the following:
1 In ConsoleOne, double-click the cluster object container.
2 Right-click the cluster resource object shared vol name_SERVER and select Properties.
3 Click the Policies tab on the property page.
4 View or change the Start, Failover, or Failback mode.
Component-Specific Configuration
The procedure to configure the components of Native File Access for UNIX is much the same as
when you configure the components without cluster services. However, some points must be kept
in mind while configuring the following components:
NFS Server (page 93)
Network Information Service (page 94)
For the location of the configuration files for Native File Access for UNIX with and without
Cluster Services, see Location of Configuration Files on page 94.
NFS Server
93
Novell Confidential
NFS.CFG
SYS:\ETC
shared_vol_name:\ETC
NIS.CFG
SYS:\ETC
shared_vol_name:\ETC
NFSSERV.CFG
SYS:\ETC
shared_vol_name:\ETC
NFSEXPRT
SYS:\ETC
shared_vol_name:\ETC
NFSTHOST
SYS:\ETC
shared_vol_name:\ETC
SYS:\ETC
shared_vol_name:\ETC
NISMAKE
SYS:\ETC\NIS
SYS:\ETC\NIS
NFSSTART.NCF
SYS:\SYSTEM
shared_vol_name:\ETC
NFSSTOP.NCF
SYS:\SYSTEM
shared_vol_name:\ETC
Starting and Stopping Native File Access for UNIX with Cluster Services
1 To start NFS Services, from Cluster ConsoleOne, click Cluster Object > View > Cluster State
94