NOVELL Manual Netware Ingles42
NOVELL Manual Netware Ingles42
3 15 Apr 97
VERSION 4.2
SOFTWARE
Guide to
NetWare 4
NETWORK
Fi na l D ra f t
Networks
export notice This product may require export authorization from the U.S.
Department of Commerce prior to exporting from the U.S. or Canada.
trademarks Novell and NetWare are registered trademarks of Novell, Inc. in the
United States and other countries.
F ina l D r aft
Novell, Inc.
122 East 1700 South
Provo, UT 84606
U.S.A.
www.novell.com
Online Documentation: To access the online documentation for this and other
Novell products, and to get updates, see www.novell.com/documentation.
Contents
F ina l D r a ft
Defining Your Team Organization. . . . . . . . . . . . . . . . . . . . . . . . . . 1
Assessing the Necessary Skills . . . . . . . . . . . . . . . . . . . . . . . . 2
Identifying Member Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Determining Team Training Needs . . . . . . . . . . . . . . . . . . . . . . . . . 10
Identifying Training Topics . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Identifying Training Opportunities . . . . . . . . . . . . . . . . . . . . . . . 13
Where to Go from Here . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Contents iii
F ina l D r a ft
Where to Go from Here . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Contents v
F ina l D r a ft
10 Creating an Implementation Schedule
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
Identifying Tasks and Assignments . . . . . . . . . . . . . . . . . . . . . . . . . 198
Creating a Task List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
Assigning Task Responsibilities . . . . . . . . . . . . . . . . . . . . . . . . 199
Determining an Efficient Implementation Schedule . . . . . . . . . . . . . . . . . 199
Scheduling Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
Tracking Progress . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
Creating an Implementation Schedule Draft . . . . . . . . . . . . . . . . . 200
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
Where to Go from Here . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
Contents vii
C Template Examples
Application Compatibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
Implementation Schedule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
Name Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254
NetWare 4 Server Worksheet . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
Replica Placement Worksheet . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
Server Migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
Workstation Configuration Worksheet . . . . . . . . . . . . . . . . . . . . . . . 259
D Supplemental Information
Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
Online Help. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
Additional Help Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
Trademarks
Novell Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
Third-Party Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
Introduction
All network installations, regardless of size or complexity, benefit from
sound planning and efficient implementation. The goal of this guide is
to give you practical information regarding processes, guidelines, and
rationale for planning and implementing a NetWare 4TM network.
F ina l D r a ft
Much of the information included in this guide originated from
extensive research and testing done by consultants in the Novell
Consulting Services group. The processes and rationale in this guide are
derived from case-proven operations performed by these consultants.
The processes and guidelines that are provided can be easily tailored to
your particular project and network infrastructure.
Once you complete your NetWare 4 implementation, you will see the
numerous benefits of using NetWare 4 in your network environment.
Sizing your network into a single view of the entire network for
simpler access, use, and administration.
Project approach
Design
Fin al D ra f t
Implementation
Each phase contains a series of procedures you may or may not need to
perform, depending on your particular network environment.
F ina l D r a ft
Plan
* conditional
procedure
Pointers are provided for accessing only the pertinent information for
your particular network type. Administrators of simple networks are
guided to information that addresses their particular needs.
Administrators of complex networks, or those that have WAN link
considerations, can access critical information useful during their
planning process.
chapter
1 Organizing and Training the Project
Team
F ina l D r a ft
The following topics are discussed in this chapter:
Identify the necessary member roles within the team and who will
perform those roles.
It is not important how many people are on your project team, however,
all expectations and concerns for each team member role should be
Fin al D ra f t
To determine the person best suited for a specific role, refer to the
following list of questions:
Who tests and analyzes hardware and software for use on the
network?
F ina l D r a ft
role. The following lists will help you identify the responsibilities of
each role.
MIS Manager
Priorities
Expectations
Managing costs
Organizing meetings
Concerns
Evaluating software
NDS Expert
This person has worked with NetWare 4 and NDS or has completed
training relative to NetWare 4 and NDS. (This role could also be filled
by a NetWare consultant.) The NDS expert would most likely be the
team lead in the design process and possibly throughout the
implementation process.
Priorities
Formulating partitioning
Expectations
Meeting timelines
Concerns
Understanding NDS
F ina l D r a ft
NetWare Server Specialist
Priorities
Expectations
Reducing administration
Concerns
Workstation Specialist
This person works daily with users and workstations. This person
maintains login scripts and loads and upgrades network client
software.
Priorities
Expectations
Concerns
Testing compatibility
F ina l D r a ft
Determining mobile client issues
Application Specialist
Priorities
Expectations
Concerns
Printing Specialist
Priorities
Expectations
Concerns
Connectivity Specialist
Priorities
Expectations
Concerns
F ina l D r a ft
Setting up and maintaining single or multiple protocols
This person sets up and tests the networking software with current
applications, runs diagnostics, and provides statistics on performance
and network and application software stability.
Priorities
Expectations
Concerns
This person analyzes the skills required and creates or provides training
to help administrators and users with network operating procedures.
Priorities
Training users
Expectations
Fin al D ra f t
Performing on-the-job-training
Concerns
Object organization
F ina l D r a ft
Directory tree design
Time synchronization
Bindery services
Workstation
Workstation configuration
NetWare 4 utilities
Administrative utilities
User utilities
Migrating to NetWare 4
File system
File compression
Suballocation blocks
Fin al D ra f t
Auditing
AUDITCON utility
User auditor
Architecture
NDS synchronization
Internationalization
Novell Education
For more information or to find the NAEC or NAEP nearest you, in the
United States and Canada call 1-800-233-EDUC. In all other areas, call
1-801-861-5508, or contact your nearest Novell sales office.
F ina l D r a ft
A quick 24-hour-a-day tool for information is Novell Education
FaxBack. Call 1-801-861-5363 for access to FaxBack. Ask for document
1448 for current courses. Ask for additional documents listing the
NAEC in your area and the courses they offer.
BrainShare
Some of the best material presented about NetWare 4 and other Novell
products are presented during Novell's BrainShareSM conference.
BrainShare conferences are held in Salt Lake City, Utah; Europe; Japan;
and Australia.
Seminars
Helpful seminars are held in the local Novell sales offices. Your local
account representative can assist you.
AppNotes
For more information in the United States and Canada call 1-800-377-
4136 or (303) 297-2725. In all other areas, call (303) 297-2725, or contact
your nearest Novell sales office.
NUI Groups
Joining the local NetWare User Group allows you to share information
and experiences with other NetWare 4.1x users. Novell engineers and
consultants are often invited to speak on topics of interest.
For more information in the United States and Canada call 1-800-228-
4684. In all other areas call (801) 228-4538, or contact your nearest
Novell sales office or NetWare Users International group.
To Go to
chapter
2 Gathering Information and Defining
the Project Scope
F ina l D r a ft
approach to rights structures, resource access, performance tuning, and
management for your NetWare 4TM implementation.
Organization chart
Resource lists
Workflow information
Location maps
Maintenance schedules
Configuration information
MIS Manager
The following table list the type of information needed by the MIS
manager:
NDS Expert
The following table lists the type of information needed by the NDS
expert:
Organization chart Identifies the major divisions and workgroups within the
organization.
WAN topology Determines how many sites exist in the organization and
what types of WAN links exist between sites.
LAN topology Identifies what major resources exist and where they are
located. Helps determine wire type and configurations.
The following table lists the type of information needed by the NetWare
server specialist:
WAN topology Shows how many servers exist and where they are
located. Helps identify what function NetWare servers
perform for WAN communications.
LAN topology Shows how many NetWare servers are in a given LAN
segment. Helps identify servers with unique
configurations.
F ina l D r a ft
Resource lists Lists all the NetWare servers and their locations. Helps
determine what type of client support is needed and
what versions of software exist or are needed.
Workstation Specialist
WAN topology Shows how many sites exist in the organization and
what type of access is needed to the network.
Application Specialist
Printing Specialist
The following table lists the type of information needed by the printing
specialist:
Connectivity Specialist
WAN topology Helps determine the speed of WAN links between each
site. Identifies how often remote sites dial in.
F ina l D r a ft
efficient method can be used.
The following table lists the type of information needed by the testing
lab coordinator.
LAN topology Helps identify the kinds of routing LAN configuration that
need to be simulated.
WAN topology Helps identify the kinds of WAN links that need to be
simulated.
Organization chart Shows which groups need training and identifies key
contacts for scheduling training.
Determining complexity
Identifying expectations
Determining Complexity
The following table reviews the factors that help determine the
complexity of your organization:
F ina l D r a ft
Number of users Fewer than 1000 More than 1000 objects/
objects/users users
5 or more servers
30 or more servers
Multiple sites
Design partitioning
Identifying Expectations
Review the complexity and determine the expectations for the design
project, including
To Go to
F ina l D r a ft
logical units within a Directory tree Tree Structure, on page 25
chapter
3 Designing the Directory Tree
Structure
This chapter describes the process for designing a Directory tree. The
following topics are discussed:
F ina l D r a ft
Planning Placement of Network Resources on page 52
Introduction
The Novell Directory ServicesTM (NDSTM ) technology allows you to
develop a common, distributed Directory database of logical and
physical resources regardless of where the resources are physically
locatedforming a single information system.
Hint: The term Directory used in Novell Directory Services is capitalized in this
document to differentiate it from the term directory used in the file system.
All NetWare 4TM servers on the network access the Directory database
for information about network resources and access to those resources.
Because of this, network information is not server specific. Each
network resource is represented by a unique entry in the database and
is accessed by its name, not by its association to a particular server.
Object-Oriented Database
Directory objects are structures that store information; they are not the
actual entity represented by the object. For example, a Printer object
stores information about a specific printer and helps manage how the
Fin al D ra f t
The specific information that is stored for each object then becomes the
directory information that can be used by applications and resources
across the entire network. The Directory information is stored in the
Directory database .
Many properties are multivalued. This means that more than one value
can be set for a given property of an object. For example, values for
multiple phone numbers can be set in the Telephone Property of a User
object.
Object Classes
F ina l D r a ft
Container objects
Leaf objects
Base Schema
The basis for all entries in a Directory database is a set of defined object
classes referred to as the base schema . Object classes such as servers,
users, and print queues are some of the base object classes defined by
the base schema.
Schema Extension
The NDS schema can be modified and extended to suit the specific
needs of your organization. Object class definitions can be added to and
modified for the existing base schema. This is consistent with the X.520
specifications defined by CCITT. You can extend the NDS base schema
Note: The complete list of flags associated with each property can be found in
the Novell Directory Services Schema Specification , which is part of the
NetWare server SDK.
However, the Novell 4.11 utilities will not allow you to add or modify objects in
your new object classification. You will need to create utilities that can manage
these new objects along with the currently defined NDS objects.
Note: The Directory tree replaces the bindery (flat file system) that was used in
previous versions of NetWare.
The way in which objects are created and structured in the Directory
tree is determined by the physical and organizational environments of
your network.
For example, a small network with multiple WAN links might have
many more design concerns than a large network with no WAN links.
This is because of unique physical attributes associated with different
WAN architecture types.
Single server network Typically maintains only LAN connections. The entire
network is housed in one building or office and all
connections lead to a single server.
F ina l D r a ft
network sites. It relies on data transmission across LAN and
WAN links, with issues concerning speed and
volume.
The Directory tree design is the most important procedure in the design
phase. All other NetWare 4 design is based on the tree structure that you
create. Nevertheless, NDS is extremely flexible and will allow
modifications to the Directory tree structure as your organization
changes.
Objectives
Prerequisites
Organizational charts
Fin al D ra f t
Resource maps
Location maps
Workflow information
Table 3-1
Naming Standard Example
F ina l D r a ft
Item Standard Examples Rationale
User object First initial, middle msmith, Using unique names company-
common name initial (if applicable), bgashler wide is not required by NDS but
(login name) last name (all lower helps avoid conflicting names in the
case), 8 characters same context.
maximum. All common
names are unique in An 8-character maximum simplifies
the company user home directory creation.
User object Last name (lowercase) poulton Using lowercase for the last name
last name helps distinguish it as the last name
of a user.
Directory tree For the main corporate ACMECORP Separate trees may be created for
tree. Use a location sites where connection to the
name for other trees if corporate tree is not economical.
necessary.
Organizational Units Two-letter location AT, CH, CU, LA, Short, standard names are used for
whose names are code BA, BO, DA, MU efficient searching.
based on a major
location
Other OU names Department name or Sales, Eng Short, standard names are used for
abbreviation efficient searching.
Common names of Unique company-wide LaserJet 4 Avoid extremely long names; some
leaf objects other than printer in utilities will not display them. NDS
users One-letter object class, Chicago: requires server names to be unique
dash, two-letter P-CH-LJ4-023 in the tree.
location code, brand or
department Engineering
information, unique server in
Fin al D ra f t
number Chicago:
S-CH-Eng-1
Avoid spaces
Consistency
Name length
Compatibility
Conventions
F ina l D r a ft
Consistency
Name Length
Ensure that the naming schemes are short, yet as descriptive as possible.
For example, SW Engineering could be shortened to SWEng.
Compatibility
Backwards compatibility
Note: The object naming rules apply to most objects. See the
documentation provided with your application to obtain specific naming
rules.
DOS commands
Avoid using spaces because they make it more difficult for users
to reference objects from the DOS environment. If you want to use
a space in names, use an underscore character ( _ ) instead of a
space. NDS treats spaces and the underscore character
interchangeably.
International
IPX numbers
You may want to set standards for IPX internal and external
network numbers. This makes setting up servers more difficult,
but it can simplify troubleshooting and packet filtering.
Type Explanation
F ina l D r a ft
IPX The IPX external network number consists of eight hexadecimal
external digits (0 through F) which identify the cable segment. A new IPX
network external network number is assigned to each segment for
number additional protocols or frame types.
You can set standards for the IPX external network number by
assigning codes for the digits. For example, you could specify that
all cable segments in Chicago begin with the digits 01. The
remaining digits could further narrow the location of the cable
segment or the type of protocol.
Like the external number, you can set standards for the internal
number to help locate the source of packets during
troubleshooting. For instance, you could specify that all cable
segments in Chicago begin with the digits 01. The remaining
digits could further narrow the location or type of the server.
If you create a NetWare Server object for servers that are not
running NetWare 4, you must ensure that the object name is the
same as the server name. This is because NDS searches for the
server by name to verify its existence.
Hint: Because of these restrictions, we recommend renaming NetWare
Server objects by changing their names in the AUTOEXEC.NCF file.
Unique names are required for all devices on the network which
send out Service Advertising Protocols (SAP). File and print
server names, even though they are stored in NDS, need to be
unique because they use SAP.
Conventions
Assign user login names using the first initial of the first name and
then up to seven characters of the last name. For example, user
John Smith would have a login name of JSmith.
F ina l D r a ft
efficient for your particular network environment. To ensure that you
build the most efficient structure, you should maintain four goals:
The basic design principles provided in this section should assist you in
accomplishing these goals.
You should build your tree structure by actually drawing each layer of
the Directory tree as you read the following discussions. You can use
modeling or drawing software, or create diagrams of the structure on
paper.
The most helpful documents for this procedure are organization and
resource charts, location maps, and WAN topology charts.
[Root] object
Organization objects
These layers build a solid framework for the bottom layers to be built
upon. A few users and network resources need to be placed in the
upper layers of the tree.
The highest object in the Directory tree is the [Root] object and is given
the tree name. The [Root] object resides at the top of the tree and all
other objects branch downward from it.
A Directory tree name must be unique. Use a name that identifies your
network and the organizational environment that the tree is designed
for.
Important: Multiple Directory trees can exist on the same network, but each
tree needs a unique name.
Workstations use the tree name to connect to a server within the correct
Directory tree. Network utilities reference the tree name by its unique
name or by the [Root] object. Many utilities only refer to the object as
[Root].
The Directory tree name or [Root] object can have trustees, and the
rights granted to these trustees flow down the tree. One example is the
User object ADMIN, which is created automatically during installation.
F ina l D r a ft
Country (C)
When used, the Country object must be placed directly below the
[Root] object.
Figure 3-1
Example of a Tree Design with and without a
Country Object
Usage of Country No Country name Usage of Country with No Country name -
multiple Organizations multiple Organizations
(C)=US (C)=US
Locality (L)
When used, the Locality object can be placed below the [Root]
object, Country object, Organization object, or Organizational
Fin al D ra f t
Unit object.
When used, the Licensing Product object can be placed below the
[Root] object, Country object, Organization object, or
Organizational Unit object.
Organization (O)
F ina l D r a ft
must be placed directly below an Organization, Organizational
Unit, or a Locality object.
The most helpful documents for this task are organization charts,
location maps, and WAN topology charts.
A single Organization object under the [Root] object also allows for
easier merging of trees with other organizations.
Single Organization
ACMECORP
(O)=ACME
(OU)=TOKYO
(OU)=LA (OU)=NEW YORK (OU)=ASIA
Multiple Organizations
ACMECORP
(O)=ACME (O)=ACME_EURO
(OU)=TOKYO
(OU)=LA (OU)=NEW YORK (OU)=FRANCE (OU)=GERMANY
The upper layers of the Directory tree are most affected by the
geographical and physical structure of your network environment.
F ina l D r a ft
Because of this, you should structure the upper layers of your Directory
tree to represent the major geographical locations in your organization
and the network's hardware, communication links, and LAN/WAN
topology. Doing this allows you to scale the Directory database
according to the network's WAN structures.
Type Purpose
Type Purpose
Note: If you are designing a tree for a single site or a single or multiple campus
environment with fast WAN links (T1 or better) and have no future plans for
expanding to other locations, you won't have issues concerning the
geographical or physical network structure. Go to Designing Lower Layers on
page 46 to continue.
Figure 3-3
Physical Map of an Organizational Structure
ACME Corporation
Corporate Headquarters
in New York
Boston
WEST
MID NYC
SLC
Denver Cincinnati
EAST
Kansas
Los
F ina l D r a ft
Angeles Alberquerque
San Phoenix
Diego Atlanta
Dallas
Miami
Figure 3-4
Example of Region-based Tree Design
ACMECORP
(O)=ACME
Bandwidth
Speed
Cost
Regulations
Fin al D ra f t
The lower tree layers provide a high level of flexibility to support any
layout that suits your environment needs.
Leaf objects
These layers are built upon the foundation established in the upper
layers. They provide the logical divisions of network resources and
lower level organizational structures that exist in your organization.
Most objects in your tree will be in these layers.
The most helpful documents for this task are organization and resource
charts.
The following two figures illustrate how container objects can be used
F ina l D r a ft
to design the lower layers of your Directory tree structure.
Figure 3-5
Lower Layer of a Simple Directory Tree
[ROOT]
(O)=ACME
(OU)=MFG (OU)=HQ
(OU)=TOKYO
(OU)=QA (OU)=ENG (OU)=DEV
Figure 3-6
Lower Layer of a Complex Directory Tree
Single Organization
ACMECORP
(O)=ACME
(OU)=TOKYO
(OU)=LA (OU)=NEW YORK (OU)=ASIA
(OU)=CORP (OU)=INTL
(OU)=MKTG
(OU)=FIELD (OU)=COMM
F ina l D r a ft
Use Organizational Unit objects to represent the projects or products as
container objects. Place these containers under Organizational Unit
objects in a division or department. These types of containers are
usually created at the lowest layers within the tree.
Administrative Action
Model
Some specific design elements may exist for your network that affect
the framework used in the lower layers of the Directory tree. These
elements are:
Number of objects
Network infrastructure
Number of Objects
Network Infrastructure
F ina l D r a ft
Create a container for remote sites with slow links that belong to a
particular division or department. For example, objects that represent
resources belonging to a field sales office should be separated into their
own container.
You should also ensure that the accumulated name length from the
lowest layer to the top of the tree ([Root] object) does not exceed 256
characters.
When objects are created, they are checked to ensure that the maximum
name length of the object isn't exceeded. However, it is possible to later
rename an object and cause the name to exceed 255 characters.
As you draw (model) the Directory tree structure, also evaluate the tree
design. Each member of the project team should have the opportunity
to review the tree structure before continuing to the next procedure for
placing network resources in containers.
If you are upgrading from NetWare 3TM , you can use the Novell
Upgrade wizard to assist you in modeling your bindery data for
migrating to the NetWare 4 Directory database.
The most helpful documents for this procedure are the Directory tree
structure drawing, resource charts, and administration maps.
Leaf objects are objects that do not contain any other objects. These
commonly represent actual network entities such as users, servers,
printers, and computers. You create leaf objects within a container
object.
Note: If you are upgrading from a previous version of NetWare or migrating from
a different operating system, the installation or migration utilities will identify
many of the objects for you and place them in the container representing the
server they were located on.
The following table lists the current set of leaf object types available in
NetWare 4. You should review the list to identify which object types you
can create from the base set of objects.
Table 3-2
Available Leaf Objects
Leaf Object Description When to Use
Alias Points to another object in the Use this object to allow access
Directory tree and makes it to an object that is in another
F ina l D r a ft
appear as if the object that it context.
points to actually exists in the
Directory tree where the Alias For example, you can use an
object is. Alias to represent a resource,
such as a special printer, that
Although an object appears most users in the tree need to
both where it was actually access.
created and where an Alias
referring to it was created, Also, when you move or rename
only one copy of the object a container object in a Directory
really exists. tree, you have the option of
creating an Alias object in place
If you delete or rename an of the moved or renamed
Alias, the Alias itself (not the object. If you select this option,
object it is pointing to) is NetWare Administrator
deleted or renamed. automatically creates the Alias
for you and assigns it the same
name as the original object.
F ina l D r a ft
to DOS 6.2 and rename the
directory, you have to change
the mapping in every login
script where that search
mapping appears.
F ina l D r a ft
server.
Print Queue Represents a print queue on You must create a Print Queue
the network. object for every print queue on
the network.
Print Server Represents a network print You must create a Print Server
server. object for every print server on
the network.
Profile Contains a profile login script. Create a Profile object for a set
When the Profile object is of users who need to share
listed as a User object's common login script commands
property, the Profile object's but who are not located in the
login script is executed when same container in the Directory
that User object logs in. The tree, or who are a subset of
Profile login script executes users in the same container.
after the profile login script
and before the user login
script.
F ina l D r a ft
create a User object, you can
you can set login restrictions, create a home directory for that
intruder detection limits, user. When you create User
password and password objects, you can also choose to
restrictions, security apply a template to the User
equivalences, etc. object that provides default
property values.
Note: The Message Routing Group, External Entity, and Distribution List objects
are NetWare Message Handling Service (NetWare MHS) objects. They appear
in NetWare Administrator only if you have installed NetWare MHS Services on
your NetWare servers.
The following figures illustrate how leaf objects can be placed in the
Directory tree structure.
Figure 3-7
Example of Leaf Objects in a Simple Tree
Design
(O)=HQ
(OU)=TOKYO
(OU)=ACCT (OU)=HR (OU)=PAY
HR_SRV3
NetWare servers
PAY_SRV1
PAY_PS1
Print servers
HR_PS3
ACCT_LJ1
Printers
ACCT_APL3
HR_LJQ
Print queues
HR_EPQ
PAY_SYS
F ina l D r a ft
PAY_VOL1
Volumes
RPT_SYS
RPT_HOME
MANAGERS Group
PAYROLL Organizational role
MRICHARD
JSMITH
RJONES
User objects
SSNOW
KTOLBERT
JRICHARD
etc.
Figure 3-8
Example of Leaf Objects in a
Complex Tree Design
[ROOT]
(O)=ACME
(OU)=MFG (OU)=HQ
(OU)=HQ (OU)=ENG
(OU)=TOKYO
(OU)=ACCT (OU)=HR (OU)=PAY
HR_SRV3
(OU)=TOKYO
(OU)=R&D (OU)=QA (OU)=TEST NetWare servers
PAY_SRV1
Fin al D ra f t
PAY_PS1
NetWare server PROD1_SRV3 Print servers
HR_PS3
Print server PROD1_PS1
ACCT_LJ1
Printer TEST_LJ3 Printers
ACCT_APL3
Print queue TEST_LJQ
HR_LJQ
TEST_SYS Print queues
Volumes HR_EPQ
TEST_APPS
PAY_SYS
Group SUPERVISORS
PAY_VOL1
Organizational role QA Volumes
RPT_SYS
Alias DEV_MNGT
RPT_HOME
ESAYERS
MANAGERS Group
SWILLIAMS
PAYROLL Organizational role
MRICHARDS
User objects MRICHARD
ESMITH
JSMITH
MWILKENS
RJONES
TTHOMPSON User objects
SSNOW
etc.
KTOLBERT
JRICHARD
etc.
Place shared leaf objects in the lowest container level that incorporates
all the objects which need access to it.
Place NetWare Server objects in the same container that contains the
objects that access the server. For example, all User objects, services,
print queues, and other leaf objects in the tree that attach to or are stored
on a given server should reside in the same container.
You should also determine where to place central group servers such as
e-mail and public servers. When considering where to place common
servers, consider the amount of network traffic that will be generated
on the wire and where users will find the server easily. Use Alias objects
for these common servers to allow users easier access to them.
F ina l D r a ft
Designing for environment-wide aliases should be done when
determining where to place common servers and resources.
Place an Alias object of servers that mobile users commonly access close
to the [Root] of the tree to make the authentication process faster.
Keep the profiles and scripts either on the same server that the
user's home directory is located on or relatively close to the user
across fast LAN or WAN links. This will decrease the time for the
user during the authentication process.
When a global application that needs access to the entire tree such
as e-mail or calendars relies upon the Directory database, build a
branch of the tree that contains Alias objects to the real objects.
Summary
After you have considered all the factors that will affect your tree
Fin al D ra f t
design, lay out the final draft of your tree with a modeling or drawing
application or diagram it on paper.
Evaluation
Once you have completed your design, review the following questions
to evaluate the efficiency of your tree design:
What logical structure of the Directory tree makes the most sense
for the physical layout of your network?
How will your tree design affect the length and format of object
names?
How does your tree design support designing other services such
as printing and security?
Defaults
F ina l D r a ft
Default Objects after NetWare 4 Default Objects after NetWare 4 Upgrade
Installation
NetWare Server object for the server NetWare Server object for the server
on which NetWare 4 was installed. you upgraded to NetWare 4.
Volume objects for any other volumes Volume objects for every other
besides SYS: that you created during volume besides SYS: on the server
installation. you upgraded.
When User object ADMIN is first When User object ADMIN is first
created, by default it is placed in the created, by default it is placed in the
Organization container object. This Organization container object. This
may not be the same context in which may not be the same context in which
you installed the server. you installed the server.
Note: The upgrade utility converts most existing bindery objects to NDS objects.
To Go to
Plan the approach you will use to Chapter 5, Planning the Time
maintain a consistent network time for Synchronization Strategy, on
servers and clients on the network page 89
chapter
4 Determining a Partition and
Replication Strategy
F ina l D r a ft
If you have a single server environment, you do not need to determine
a partition strategy. Continue with Chapter 5, Planning the Time
Synchronization Strategy, on page 89.
No WAN links
Introduction
Directory objects and their attributes exist in a database that is
maintained and managed by Novell Directory ServicesTM (NDSTM ).
NDS distributes information about each Directory object to servers
throughout the network.
NDS does this by dividing the database into logical segments of the
Directory tree, and then copying each logical segment to a group of
servers on the network. This logical segmenting is referred to as
partitioning. The process of copying each logical segment to servers is
referred to as replication.
Although partitioning and replicating the database means that not all of
the Directory database information exists on each server throughout the
network, links are established between servers to allow access to all of
the database information. This does not mean, however, that every
server on the network holds partition replicas. NetWare 4 utilities
manage and monitor the partitioning process and the links between
servers.
You should also determine a partition strategy that provides the most
Fin al D ra f t
Objectives
Use resource maps, location maps, LAN and WAN topology maps, the
Directory tree structure, and partitioning guidelines to determine the
partition boundaries and what types of replicas to store on which
servers in the network.
Prerequisites
Location maps
Resource maps
Partitioning guidelines
F ina l D r a ft
Avoid partitioning if it
The [Root] object is always included in the first partition created, which
Fin al D ra f t
Figure 4-1
Parent and Child Partitions
RootPartition
(parent)
[ROOT]
(O)=ACME
WEST Partition EAST Partition
(child) (child)
(OU)=TOKYO
(OU)=MFG (OU)=PROD (OU)=HQ (OU)=ENG (OU)=TOKYO
(OU)=ACCT (OU)=HR (OU)=PAY
F ina l D r a ft
(OU)=TOKYO
(OU)=ENG1 (OU)=ENG2 (OU)=TEST
(OU)=DESIGN
(OU)=TOKYO (OU)=ENG (OU)=TEST
Legend
Partitions must follow a strict set of rules. These rules are as follows:
The [Root] partition is the only partition that the installation process
creates. All other partitions must be created manually.
F ina l D r a ft
objects) that use the resource contained within the partition.
Partitions that contain more than 1,000 objects will cause long
delays in synchronization and high levels of network traffic
depending on the network hardware used.
A tree design that contains many slow WAN links may require
additional partitions.
The static nature of objects in the tree may determine the number
of partitions. If your network is rapidly growing, you should
allow for future growth by maintaining relatively small partitions.
Nevertheless, splitting or joining partitions is a simple task.
F ina l D r a ft
Basic Functions of Replicas
Under this scenario, the only means of providing some level of fault
tolerance is by maintaining a up-to-date backup copy of the Directory
database. Make sure that your backup software can back up NDS.
Also, partition replication does not provide fault tolerance for the file
system. Only information about Directory objects is replicated. To provide
fault tolerance for your files, you must mirror or duplex your hard disks and
enable the Transaction Tracking SystemTM (TTSTM) feature.
F ina l D r a ft
If you add a read/write or read-only replica of the child partition
to the server, the subordinate reference replica is removed.
When changes are made to objects within a partition, those changes are
automatically sent to all other replicas of that partition. This ensures
that the global Directory database remains consistent. Only changes are
sent to other replicas. For example, if a user changes a phone number,
only the new phone number is sent, not the entire User object.
Attribute Description
When the first server of a Directory tree is installed, the first replica of
the [Root] partition is placed on that server. This first server contains the
master replica of the [Root] partition.
There are no special rights or considerations for this server. The replica
of [Root] can be removed at any time or changed to a read/write replica
once other servers are in the tree.
F ina l D r a ft
Logical View 1 Partition
[ROOT]
O=AMG
Admin
OU=ABC OU=XYZ
Servers Servers
Volumes Volumes
Users Users
Physical View
[ROOT] [ROOT]
MR Server1 RW Server2
[ROOT] [ROOT]
MR Master replica
RW Server3 RW Server4
RW Read/Write replica
When you install additional servers in the tree, follow two simple rules
to determine if a replica should be placed on the server.
In all other cases, if a replica is desired on a server, the replica will have
to be added manually.
Figure 4-3
Example of Replica Placement
[Root] Partition
(parent)
[ROOT]
(O)=ACME
MFG Partition Sales Partition
(child) (child)
F ina l D r a ft
(OU)=TOKYO
(OU)=PROD1 (OU)=PROD2 (OU)=TEST
PROD_SRV1
Partitions
[Root] PROD Sales MFG
S 1 PROD_SRV1 R/W MR SR SR
e
r 2 SALES_SRV2 R/W SR MR R/W
v
1 HQ_SRV3 R/W SR R/W MR
e
r
1 HQ_SRV1 MR R/W R/W R/W
s
Legend
Place at least one copy of each replica off site, in another building or
location. You may want more locations, depending on the disaster
recovery plan being used by the organization. You can rebuild most of
the network by using partition replicas.
Ensure that subordinate reference replicas are not used for fault
tolerance. Subordinate reference replicas can be used to restore the tree
structure, but not leaf objects.
Place replicas in the location of highest access. This means that if groups
of users in two separate containers need access to the same object within
another partition boundary, you should place the replica on a server
that exists in the container one level above the two containers holding
the groups.
Place replicas on servers that contain objects for users and resources
that are physically near the server. This allows for faster response to
users' requests for login authentication and access to network resources.
Place replicas on the server that stores the users HOME directories that
access it. Also, store replicas of Directory objects that exist on opposite
sides of a WAN link on the local servers that users access.
F ina l D r a ft
Placing Replicas for Bindery Services
Place replicas on the best servers in your network. Slow servers can
affect the replica synchronization for all servers within the replica ring.
(The replica ring refers to the group of servers that hold replicas of the
same partition.)
You should create a replication matrix for your network. Use the
following table to organize the physical placement of the replicas for
each partition. We recommend that each partition have three replicas
for fault tolerance, but you may need more replicas depending on user
access. See Appendix C, Template Examples, on page 251 for more
information.
Summary
Partitioning and replica placement allow you to scale your Directory
tree to meet your organization's needs. This process can be as simple as
accepting all defaults or as complex as designing a partitioning and
Fin al D ra f t
The following table list reviews some of the basic guidelines to follow
when partitioning your Directory:
Condition Guideline
Location
Place fewer partitions at the top of the tree with more at the
bottom
Size
The following table list reviews some of the basic guidelines to follow
when placing replicas in your Directory:
Condition Guideline
Placement
Number
F ina l D r a ft
Always keep two or three replicas per partition, and no
more than ten
Evaluation
Once you have completed your partition strategy, review the following
questions to evaluate the efficiency of your strategy:
Defaults
Upgraded server
Read-only None.
To Go to
Plan the approach you will use to Chapter 5, Planning the Time
maintain a consistent network time for Synchronization Strategy, on
servers and clients page 89
F ina l D r a ft
network applications
chapter
5 Planning the Time Synchronization
Strategy
F ina l D r a ft
Identifying an Efficient Time Source and Configuration on
page 95
If you have a single server environment, you do not need to plan for
time synchronization. Continue to the next procedure. See Chapter 6,
Creating an Accessibility Plan, on page 107 for more information.
See Defaults on page 104 for more information. You might also want
to review information about using a combination of internal and
external time synchronization methods. See Using a Combination of
Time Synchronization Methods on page 94 for more information.
Introduction
Directory objects exist in a database that is maintained and managed by
NetWare Directory ServicesTM (NDSTM ). The database can exist on a
single server or can be partitioned and distributed as replicas on other
servers. NDS ensures that when changes are made to objects in a
partition, the changes are made to all replicas of that partition in the
proper order in which they were performed.
To ensure that events occur in their proper sequence, NDS records the
time of each event relative to a common time source. This time record is
referred to as a time stamp . NDS uses the time stamp to ensure that
when it modifies the database, the particular event occurs in the time
and order that it was intended. NDS also uses time stamps to record real
world time values for the network and set expiration dates.
The common time source necessary for tracking the proper sequence of
events is provided through time synchronization across all NetWare 4
servers. You should plan your time synchronization strategy to ensure
that a common time source is maintained efficiently and accurately.
Note: The standard format used for times and time offsets is [+|-] HH:MM:SS.
In practice, only the significant portion of the time need be specified (+7:0:0 is
the same as 7).
In addition, the examples used in this chapter show the colon as a time
separator. The actual character used as the time separator is determined by the
country information for each server. In most instances in NetWare 4, input and
output routines dealing with dates and times are language enabled to use the
locally preferred format and characters.
Objectives
Use resource maps, location maps, LAN and WAN topology maps, and
the tree design document to determine which time servers to use and
what communication format to use between the network servers.
Prerequisites
F ina l D r a ft
Resource maps
Location maps
Establishing a common time source for the network can be done using
one or a combination of the following two methods:
Using TIMESYNC
Fin al D ra f t
The TIMESYNC utility allows you to set up four types of time servers
in NetWare 4. See the following table for a listing and description.
Table 5-1
Time Server Types
Server Type Function Caution Description
Secondary Receives time from a time You can have a Secondary Attempts to stay
(Default) source server and provides time server contact another synchronized with one time
time to client workstations. Secondary time server to source.
obtain the correct time.
Does not participate in
However, if the intermediate voting.
Secondary time server is
unavailable, servers that Most servers will be
contact it for the correct time secondary servers.
might be too many hops
away from a time source
server to get synchronized.
F ina l D r a ft
Primary time Polls and votes with other Must be able to contact at Polls all other time sources
server Primary time servers to least one other Primary time to determine correct
determine time, and server or a Reference time network time and
provides time to Secondary server. compensate for clock errors
time servers and client
workstations. Sets synchronization status
based on its deviation from
Use with Reference time calculated network time,
servers to pass time to without regard to status of
Secondary time servers and other time sources polled.
client workstations.
Single Provides time to Secondary All servers must be able to Functions the same as
Reference time servers and client contact the Single Reference time server,
time server workstations. Typically used Reference time server. No however it does not
for smaller LANs. Primary or Reference time synchronize with any other
servers can be on the server.
network.
Reference Receives time from an Typically, only one Functions the same as a
time server external time source and Reference time server is Primary time server, except
provides time to Primary installed on a network. If that it does not adjust its
and Secondary time there is more than one internal clock.
servers. Reference time server, each
must be synchronized with Provides a central point of
Use when it is important to the same external time time control for the entire
have a central point of source. network.
control for time on the
network.
Adjusts its internal clock rate to correct for drift and maintain UTC
synchronization
Some examples of external time source are radio clocks, atomic clocks,
or Internet time.
You can ensure the accuracy of your network's time of day by simply
checking the time provider's Universal Coordinated Time (UTC) value
against a wristwatch, or by attaching the time provider to an external
time source service through a modem, radio, or Internet time source.
Hint: Adjust the synchronization radius if the time provider servers are
separated by WAN or satellite links that cause delays in packet transmissions.
Identifying the time source type for your network is based on the
F ina l D r a ft
method of synchronization you choose. See Determining an Efficient
Time Synchronization Method on page 91 for more information.
Modem and radio sources are most commonly used to synchronize the
Fin al D ra f t
There are basically two efficient time server configurations. The two
configurations are:
Single Reference
No WAN links
F ina l D r a ft
Single time zone
You should ensure that the Single Reference time server is centrally
located and is equipped with an accurate internal clock. The Single
Reference time server should be monitored on a daily basis to ensure
proper time of day and time synchronization.
However, if the Single Reference time server loses its connection, you
can designate one of the Secondary time servers as a temporary Single
Reference time server until the original is reconnected.
Figure 5-1
Single Reference Time Server
Secondary Clients
Fin al D ra f t
servers
and clients
Secondary
servers
and clients
The Single Reference time server works on networks of any size, but the
time synchronization configuration shown in Figure 5-1 is used
primarily for small networks that don't include WAN links.
Important: If you use a Single Reference time server, avoid using Primary or
Reference time servers in the same tree because the time references might
conflict.
Figure 5-2
Time Provider Group with a Single Reference
Time Server
Single Reference
time server
Primary Primary
F ina l D r a ft
Secondary Secondary
Figure 5-3
Two Reference Time Servers Using an
External Time Source
External
Time Source
SYD1 LON1
Reference Reference
Fin al D ra f t
SYDx LONx
Secondary Secondary
Configured Lists
Australia Provider Group or SAP Filtering Europe Provider Group
This configuration requires that you modify the time parameters on the
NetWare 4 servers in the time provider group.
If your WAN infrastructure forces you to have more than seven Primary
time servers in the time provider group, you should implement
additional time provider groups as necessary. However, you should
ensure that each Reference time server is synchronized to the same
external time source. Reference time servers cannot synchronize time
with other Reference time servers.
F ina l D r a ft
Time synchronization:communication format, identifyingTime
providers and time consumers need to communicate in order to send
and receive time. Time providers need to communicate with other
providers in order to vote and negotiate the correct network Universal
Coordinated Time.
Time source servers use one of two methods to find each other: SAP, or
a custom configuration list.
Secondary time servers use the SAP information to choose a time server
to synchronize with.
It is also possible to list the specific time source servers that a server
should contact.
To customize your time servers, you can use the SERVMAN utility or
SET parameters to set the following parameters:
Time Sources
Lists the specific time source servers that a server should contact.
Configured Sources
Specifies that a server should not listen for SAP information from
other time source servers.
Service Advertising
F ina l D r a ft
Using a Combination of Communication Formats
You can use both the SAP and custom configuration methods on the
same network. However, the custom configuration list that is stored on
a server always takes precedence over the SAP information received by
the server.
Hint: On a network where servers are rarely added or reconfigured after initial
installation and where the network uses a Single Reference time server,
consider using SAP (this is the installation default).
Summary
Time synchronization is a means to maintain a proper sequence of NDS
events when the Directory database is partitioned and replicated.
Evaluation
If your network meets the following conditions, are you using the
default settings?
If you maintain slow WAN links, are you using a configured list?
If you have more than seven Primary time servers in the time
provider group, are you implementing additional time provider
groups synchronized to the same external time source?
Defaults
To Go to
F ina l D r a ft
chapter
6 Creating an Accessibility Plan
This chapter describes the process used for creating an accessibility plan
for your network. The following topics are discussed:
F ina l D r a ft
Determining Access Needs on page 115
The depth of your Directory tree and number of containers has the
greatest impact on how network resource are accessed.
Single server environments with only one or two Directory tree layers
and limited security concerns might not need to create an accessibility
plan.
Introduction
Access to network resources and file system data in a NetWare 4
environment is controlled by the Novell Directory ServicesTM (NDSTM
) technology and NetWare operating system. Network resources are all
contained in a single-information system represented by the Directory
tree.
Network file system data is linked to the Directory tree through Volume
objects, and is represented in the tree structure by its relationship to the
Volume object.
You should also create an accessibility plan that provides the most
effective use of login scripts and global objects for quick access and
security throughout the network without high management overhead.
Objectives
You should identify access and security needs for users, applications,
and network resources. Afterwards, create accessibility guidelines for
designing and configuring login scripts and placing access and
administration objects in the tree.
This will enable you to use resource maps, location maps, LAN and
WAN topology maps, organizational charts, and guidelines to
determine the level of access and security to meet your network's needs.
Prerequisites
Resource maps
Location maps
Organizational charts
Each leaf object has a name to identify it. This name is referred to as the
leaf objects common name (CN). For User objects, the common name is
F ina l D r a ft
the User's login name. Other leaf objects also have common names such
as a Printer object name, NetWare Server object name, or Volume object
name.
Complete Name
The full path of an objects location in the tree, which is from its current
location up to the [Root] object, forms the objects complete name, or
distinguished name (DN) .
For example, a complete name or fully distinguished name (DN) for the
User object ESAYERS could be
.CN=ESAYERS.OU=SALES.OU=HQ.O=ACME
Note: The objects in the name are separated by periods, similar to the
backslash (/) used in DOS paths. A leading period is used. A leading period
directs NDS to ignore the current context of the object and resolve the name at
the [Root] object. A trailing period cannot be used.
Partial Name
When using an object's partial name only the portion of that object's
complete name that is not common between another objects is used.
For example, a partial name for the User object ESAYERS relative to
other objects in OU=SALES would be
CN=ESAYERS.
The partial name of the User object ESAYERS that has a complete name
of
CN=ESAYERS.OU=SALES.OU=HQ.O=ACME
CN=PDLJ4_02.OU=PROD.OU=MFG.O=ACME
is CN=ESAYERS.OU=SALES.OU=HQ.
Note: The objects in the name are separated by periods, similar to the
backslash (/) used in DOS paths. A leading period and trailing period can be
used. A leading period directs NDS to ignore the current context of the object
and resolve the name at the [Root] object. A trailing period allows a network
resource to select a new context when resolving an object's complete name at
the [Root].
A partial name must still be resolved at the [Root] object. This is done by adding
a trailing period at the end of the partial name. Adding a trailing period forces
NDS to identify the objects context and automatically resolve the rest of the
objects complete name.
CN=ESAYERS.OU=SALES.OU=HQ.O=ACME
F ina l D r a ft
referencing a Directory object. This kind of naming is referred to as an
objects typeless name. For example,
ESAYERS.SALES.HQ.ACME
If the object types are not provided in an objects complete name, NDS
identifies the attribute type for each object in the name.
When leaf objects are created, they are checked to ensure that the
maximum name length of the complete name isn't exceeded.
CN=JSMITH.OU=SALES.OU=HQ.O=ACME.ACMECORP
but that the user's view of the Directory tree is changed to a different
context.
A network resource can also use the complete name or partial name of
an object for searching the Directory tree.
For the User object ESAYERS to access a Volume object located in the
HQ container, the following map statement should be used:
For example, to map the APPS volume of the server SALES1 to drive
letter G:, type,
MAP G:=CN=SALES1_APPS.OU=HQ.:
Note: The typeful or typeless can be used for accessing other objects in the tree.
Alias Object
For example, users in the SALES Organizational Unit object can access
a Printer object located in the HQ Organizational Unit object through an
Alias object in their same container. This allows users to reference the
actual printer by using only the common name of the Alias object.
F ina l D r a ft
Alias objects can also point one Organizational Unit object to another
Organizational Unit object. This allows the access rights to objects
within the aliased container to apply to users in the container holding
the Alias object.
For example, you might create an Organizational Unit object that holds
a group of application servers. Users outside of this Organizational Unit
object might also need access rights to the application servers. If you
create an Alias object in the users' container to the container holding the
application server, the users have the same access rights to the
application servers that exist for the container that holds the servers.
You might want to give an Alias object a name that indicates that it is a
pointer to a primary object. For example, the name might include the
word Alias such as ALIAS_MKT_SRV1.
Inversely, you might not want to distinguish the Alias object from the
primary object. Users may not need to know the difference, and adding
Alias to the name might only confuse them.
If you delete the primary object of an Alias object, the Alias object is
automatically deleted.
For example, users in the SALES Organizational Unit object can access
a Directory Map object pointing to a database application stored on a
volume located in the HQ Organizational Unit object. This allows users
to reference the actual database volume by using only the common
name of the Volume object.
Note: Directory Map objects can point to a specific Volume object or file system
directory on the volume.
When you assign the Directory Map object a path to the files or
applications you are referencing, you must also grant each User object
Read and File Scan rights to the files or applications in the directory. You
can do this by granting Read and File Scan rights to the Directory Map
object, and then make each user security equivalent to the Directory
Map object. You might also assign file rights to each Organizational
A Group object contains users from any container in the Directory tree.
It can be located in any container and be granted any rights. This allows
you to create a global Group object to regulate global access to the
Directory tree for a specific set of users.
F ina l D r a ft
Group objects allow you to grant users in Organizational Unit objects
specialized rights assignments. Therefore, you can manage a much
smaller subset of users within the Directory tree.
4. What network resources do users access and how are they shared?
Authenticated
Licensed
Note: Administrators can browse and manage the Directory tree and not use a
licensed connection by loading utilities from their workstations local drives.
DOS and NetWare 4 provides full NDS support for DOS and
Windows Windows clients running Novell Client Software. The
Novell Client Software supports container and user login
scripts in DOS and Windows.
F ina l D r a ft
Windows.
Local
Mobile
Placing an Alias object close to the [Root] for mobile users makes
login and authentication easier. This eliminates the need for users
to remember their complete name (distinguished name).
You might need to create special containers close to the [Root] that
contain Alias objects or Directory Map objects of global resources. For
example, you can create a container that has Directory Map objects to a
common application suite.
You could also create a container with an Alias object of each network
user so that global applications such as e-mail would reference a single
location for Directory information. This container could be partitioned
and replicated across the network. Because Alias objects are extremely
small objects with few updates to them, sychronization is very efficient.
When a user authenticates to the network, the profiles and scripts for
that user are executed. If any of those are not kept locally, the login
process retrieves those profiles and scripts across LAN or WAN links.
Keeping copies of profiles and scripts close to the user decreases the
time needed to complete the authentication process.
Leaf objects such as Volume objects and Printer objects are easiest to
access when they are in the lowest container level that incorporates all
the objects that need access to them.
F ina l D r a ft
With bindery services, NDS imitates a flat structure for leaf objects in an
Organization or Organizational Unit object. When bindery services is
enabled, all objects in the specified container can be accessed by NDS
objects and by bindery-based servers and client workstations.
[ROOT]
Organizational Organizational
Bindery context is
Unit Unit set here.
You can add replicas to other servers if needed for bindery services. If a
read/write or master replica is not present, use the NDS Manager
option in NetWare Administrator or PARTMGR to add one to the
server.
Note: If a bindery context is not set, NDS cannot support bindery services.
Users
Groups
Queues
Print servers
Profiles
Bindery programs
If you or a service require the bindery user GUEST, you must create
GUEST in the Directory database.
F ina l D r a ft
bindery object.
You can create an NDS User object SUPERVISOR and assign ADMIN-
equivalent rights to it in NDS. However, the bindery object and the NDS
object are unique and separate objects even though they are identified
by the same name.
After installing the NetWare server, you can use a migration utility to
convert bindery user accounts to NDS User and Group objects. If you
do, all users except SUPERVISOR and all groups are updated to NDS
objects. The user SUPERVISOR is migrated, but with supervisory rights
for that server's file system and bindery context only. SUPERVISOR
does not appear as an Directory object.
Information Limitations
E-mail name
Phone number
Aliases
Profiles
Partitioning Limitations
The bindery context for a server can be set to a container that is part of
a partition stored on a different server. But, before you can use bindery
services, you must place a writable replica of the partition that includes
the bindery context on the bindery services-enabled server.
Fin al D ra f t
If you set the bindery context for a server to a container object that is not
part of a writable replica on that server, users will not be able to log in
through bindery services.
Avoid changing a server s bindery context once you set it. Changing a
server's bindery context leaves users in the original context without
access to bindery services. Changing the server's bindery context can
also cut off access to print queues.
Partition farther down the tree so that fewer servers hold the
replica of any partition.
F ina l D r a ft
Access control to Directory objects is maintained through the following
set of features:
Authentication
Administrative objects
Authentication
NetWare 4 supports two divisions of security for the Directory tree and
file system.
The NetWare file system security affects how Directory objects can
access files and directories on network volumes. This type of security
provides control of the application programs and data files on network
servers.
NDS security and file system security are based on the same principles
but function separately. This allows for single or divided administration
of network resources and network data.
The common principles for NDS and file system security are
Trustee assignments
Inheritance
Security equivalence
Effective rights
Trustee Assignments
F ina l D r a ft
other Directory objects and their properties, and access to file system
directories and files. These assignments are made by explicitly
assigning rights to a Directory object and its properties, and file system
files and directories.
Trustee assignments for the file system are stored in the directory
entry table (DET), while trustee assignments for Directory objects
and properties are stored in the ACL (Access Control List).
Inheritance
Because the Directory tree and file system are hierarchical tree
structures, rights assigned in the Directory tree or file system flow
down through the tree. This is referred to as inheritance. Inheritance
allows rights assigned at upper levels in the tree or file system to flow
down to subordinate levels. Rights received from upper levels are
referred to as inherited rights. These inherited rights flow down without
specific trustee assignments.
The Supervisor object right and property right can be blocked by an IRF.
However, the Supervisor rights to files and directories can't be blocked
by an IRF.
Security Equivalence
Every object is security equivalent to all container objects that are a part
of its complete name (distinguished name). This is known as implied
security equivalence .
F ina l D r a ft
Security equivalence is not transitive. For example, a User object that is
security equivalent to User object ADMIN receives security
equivalences that the User object ADMIN might have with other
objects.
Effective Rights
An object's effective rights are what control its access to another object
and that object's properties. These rights define what the object can
actually do at a particular level in the Directory tree or file system.
NDS Security
Once a user has logged into the network, access to leaf and container
objects is determined by the NDS security structure. At the foundation
of NDS security is the Access Control List (ACL.
Each object listed in an ACL can have different rights to that object's
properties. For example, if ten users are listed in a Printer object's ACL
as trustees, each of those ten users can have different rights to that
Printer object and to its properties. One object might have the Read
right, another might have the Delete right, etc.
Object rights
Property rights
In summary, object rights define who can access the object and what
they can do with the object. Property rights further refine the level of
access by specifying the object properties that can be accessed.
Object Rights
Object rights control what trustees of an object can do with that object.
Object rights control the object as a single entity in the Directory tree,
but do not allow the trustee to access information stored in that objects
properties (unless the trustee has the Supervisor object right, which also
includes the Supervisor property right).
The following table describes object rights you can assign to a trustee.
Right Description
F ina l D r a ft
Browse Grants the right to see the object in the Directory tree. Also
allows a user performing a search to see the object if it
matches the search value. (This is true only when
comparing the base object class or partial name;
otherwise, the Compare right for property objects is
required.)
Delete Grants the right to delete an object from the Directory tree.
However, a container object cannot be deleted unless all
the objects in the container are deleted first.
Rename Grants the right to change the partial name of the object, in
effect changing the naming property. This changes the
object's complete name.
Supervisor Grants all rights to the object and to all its properties.
Anyone with Supervisor rights to an object has access to all
of its properties. The Supervisor right can be blocked with
the Inherited Rights Filter (IRF).
Property Rights
While object rights allow you to see an object, delete an object, create a
new object, etc., only the Supervisor property right allows you to see the
information stored in an object's properties.
Right Description
Add or Delete Self Allows you to add or remove yourself as a value of the
property, but you cannot change any other values of the
property.
This right is included in the Write right; that is, if the Write
right is given, Add or Delete Self operations are also
allowed.
This right includes the Compare right; that is, if the Read
right is given, Compare operations are also allowed.
Supervisor Gives you all rights to the property. This Supervisor right
can be blocked by an object's Inherited Rights Filter
(IRF).
Right Description
This right includes the Add or Delete Self right; that is, if
the Write right is given, Add or Delete Self operations are
also allowed.
F ina l D r a ft
Assigns the rights you choose to all properties for the object. For
example, the Read All Properties right setting would allow you to
view the value of all properties for an object.
NetWare file system security exists at the server level. The server stores
volumes that contain the directories which contain files. The file system
security does not transition into the NDS security structure.
There are however a few minor difference between NDS and file system
security:
Objects
Properties
Rights do not flow from NDS into the file system except in the case
of the Supervisor [S] object rights to the NetWare Server object.
This grants the trustee Supervisor [S] file system rights to the root
of all server volumes.
The Supervisor [S] object rights can be blocked by the IRF. The
Supervisor [S] file system rights cannot be blocked by the IRF.
Fin al D ra f t
Once a user has logged into the network, access to files and directories
is determined by the NetWare file system security structure. At the
foundation of NetWare file system security is the directory entry table
(DET).
Filename
File owner
Trustee assignments
Before you can access files and directories, you must have sufficient file
system access rights.
The following table lists the available file system rights for making
trustee assignments in NetWare 4:
Access Add and remove trustees and change rights to files and
Control directories.
File Scan View file and directory names in the file system structure.
Read Open and read files, and to open, read, and execute
F ina l D r a ft
applications.
There are three rights that you should use with caution.
Supervisor [S]
Modify [M]
The Modify [M] right allows users to change files and directories.
It also allows users to change file system attributes.
For example, if you assign the Delete Inhibit attribute to a file, no one,
including the owner of the file or the system supervisor, can delete the
file. But any trustee with the Modify right can change the attribute to
allow deletion.
The following table lists and explains the rights stored in the directory
entry table (DET) for files and directories:
Fin al D ra f t
Table 6-1
Directory and File Attributes
Attribute Description Applies to
code
A Archive Needed identifies files that have been modified since the last Files only
backup. This attribute is assigned automatically.
Cc Can't Compress indicates the file cannot be compressed because of Files only
limited space savings.
Dc Dont Compress keeps data from being compressed for all files in a Directories and files
directory or individual files. This attribute overrides settings for
automatic compression of files not accessed within a specified number
of days.
F ina l D r a ft
Di Delete Inhibit means that the file or directory cannot be deleted. This Directories and files
attribute overrides the Erase trustee right.
Dm Don't Migrate prevents files and directories from being migrated from Directories and files
the server's hard disk to another storage medium.
H The Hidden attribute hides files and directories so they cant be listed Directories and files
using the DIR command. A user with File Scan rights can use FILER or
the NDIR command to list directories and files with the Hidden attribute.
I Index allows large files to be accessed quickly by indexing files with Files only
more than 64 File Allocation Table (FAT) entries. This attribute is set
automatically.
Ic Immediate Compress sets data to be compressed as soon as a file is Directories and files
closed. If applied to a directory, every file in the directory is compressed
as each file is closed.
M Migrate indicates that a file has been migrated from the server's hard Files only
disk to another storage medium.
N Normal indicates the Read/Write attribute is assigned and the Directories and files
Shareable attribute is not. This is the default attribute assignment for all
new files.
P Purge flags a file or directory to be erased from the system as soon as Directories and files
it is deleted. Purged files and directories cannot be recovered.
Ri Rename Inhibit prevents the file or directory name from being modified. Directories and files
Ro Read Only prevents a file from being modified. This attribute Files only
automatically sets Delete Inhibit and Rename Inhibit.
Rw Read/Write allows you to write to a file. All files are created with this Files only
attribute.
Sh Shareable allows more than one user to access the file at the same Files only
time. This attribute is usually used with Read Only.
Sy The System attribute hides the file or directory so it can't be seen by Directories and files
using the DIR command. It can be seen if a user with File Scan rights
uses FILER or the NDIR command. System is normally used with
Fin al D ra f t
X The Execute Only attribute prevents the file from being copied, Files only
modified, or backed up. It does allow renaming. The only way to remove
this attribute is to delete the file. Use the attribute for program files such
as .EXE or .COM. Make a copy of a file before you flag it as Execute
Only, so you can replace the file if it becomes corrupted.
Login scripts define the users drive mapping, capture statements, and
variable settings. They also invoke menus and applications. For ease of
network administration, users and the resources they use should be
placed together within Organizational Unit objects.
When a user logs in, the LOGIN utility executes the appropriate login
scripts. Four types of login scripts are available, and they can be used
separately or together to create a custom environment for your users.
All but the default login script are optional.
This sets the general environments for all users in a container. The
LOGIN utility executes container login scripts first. A user can use
only one container login script.
Note: A container login script replaces the system login script from
NetWare 3TM.
This sets environments for several users at the same time. The
LOGIN utility executes a profile login script after the container
login script.
F ina l D r a ft
A user can be assigned only one profile login script, but can
specify other profile login scripts on the command line. Several
users can use the same profile login script.
The default login script is executed for all users (including user
ADMIN) unless you create a user login script. The default login
script contains only essential commands such as drive mappings
to the NetWare utilities.
If you don't want to create any user login scripts and you don't
want the default login script to execute for any users, you can
disable the default login script by including the NO_DEFAULT
command in the container or profile login script.
For example, if all users need access to the NetWare utilities in the same
Fin al D ra f t
Create profile login scripts if there are several users with identical login
script needs.
Finally, in user login scripts, include only those individual items that
can't be included in profile or container login scripts.
Since up to three login scripts can execute whenever a user logs in,
conflicts can occur. If this happens, the last login script to execute
(usually the user login script) overrides any conflicting commands in a
previous login script.
Login scripts are properties of objects. The following table shows which
objects can contain which login scripts.
Organization Container
Profile Profile
User User
The following conventions can help you plan effective login scripts.
Table 6-2
Login script conventions
Subject Conventions
Minimum login scripts No minimum. All four types of login scripts are optional. Login scripts can
have only one line or they can have many. There are no required
commands for login scripts.
Characters per line 150 characters per line is maximum; 78 characters per line (common
screen width) is recommended for readability.
Punctuation and symbols Type all symbols (#, %, , _ ) and punctuation exactly as shown in examples
and syntax.
F ina l D r a ft
Commands per line Use only one command per line. Start each command on a new line; press
<Enter> to end each command and start a new command.
Sequence of commands Generally, enter commands in the order you want them to execute, with the
following restrictions:
Blank lines Blank lines don't affect login script execution. Use them to visually separate
groups of commands.
Remarks (REMARK, REM, Lines beginning with REMARK, REM, an asterisk, or a semicolon are
asterisks, and semicolons) comments, which don't display when the login script executes. Use
remarks to record the purpose of each command or group of commands.
Identifier variables Type identifier variables exactly as shown. For the value of an identifier
variable to be displayed on the workstation's screen as part of a WRITE
command, you must enclose the identifier in quotation marks and precede
it by a percent sign (%).
If you want to create a more global login script and include users from
multiple Organizational Unit objects, you could use the Profile object to
set up a specific environment for a group of users. A Profile object
Fin al D ra f t
You can create a Profile object for a special function script, such as one
to assign access for applications. For example, you can create a profile
script that will be used by backup administrators only. This script may
give these users a specific drive assignment to backup software and
utilities.
Administrative Objects
The first time you log in to a new Directory tree, you log in as the User
object ADMINthe only User object created during the NetWare 4
installation process. ADMIN is created when you first set up a Directory
tree but not when you later add other servers to an existing tree.
F ina l D r a ft
ADMIN is assigned all rights (including the Supervisor right) to every
object and property in the Directory tree. This gives ADMIN complete
control of the Directory tree.
Hint: When you first log in to a new Directory tree, you may want to create a
User object and assign that object Supervisor rights to ensure that you have
more than one object with sufficient rights to completely control the tree. Such
an object can be critically important if the ADMIN object is deleted accidentally.
You can rename or delete ADMIN at any time; however, you should
assign another User object the Supervisor object right to the [Root]
object before you delete ADMIN.
Warning: Never delete ADMIN without having assigned the Supervisor right to
another User object. Neglecting to do so can be disastrous because you
eliminate supervising control of the Directory tree. Restoring access to the tree
can only be accomplished with the assistance of Novell Technical Support.
This warning also applies to other sections of the Directory tree where you have
a User object ADMIN defined. At each level of the tree where you have ADMIN
defined, be sure you also have a User object with explicit Supervisor rights.
Also note that if you create a User object and assign it security equivalence to
User object ADMIN and then delete ADMIN, the new User object loses the
security equivalence.
You create the Organizational Role object and assign specific rights
depending on the characteristics needed for the role. You then assign
users to the Organizational Role as occupants through NetWare
Administrator or NETADMIN.
Summary
Efficient planning decrease the amount of time necessary to manage
installation of NetWare 4 by placing users, services and resources in
proximity to each other within the tree.
This allows you to grant most rights to a container and have those rights
flow through the tree to the users that will need them. For example,
applying rights once to a container could effectively manage all the
Evaluation
Once you have completed your accessibility plan, review the following
questions to evaluate the efficiency of your plan:
F ina l D r a ft
Will all users in a certain container have the same access to a
resource?
Defaults
A new user has enough rights to read all their own properties, but can
view only group membership, network address, and default server for
other users. The login script is the only explicit read property defined
for container objects.
User objects inherit the following default rights when they are created:
Table 6-3
User Object Rights
Object Name Explicit Trustee Object Rights from Property Rights for User
PUBLIC
F ina l D r a ft
Read
The default NDS object and NDS object property rights for newly
created objects are listed in the following table. These rights are shown
as an ACL entry with the following format:
The term [Entry Rights] means the rights to the object itself, while [All
Attribute Rights] means rights to all attributes of the object. Values not
in brackets (such as Network Address) are actual property names.
For example, the [Creator] of a Group object has Supervisor rights to the
object's [Entry Rights], meaning that the creator has Supervisor object
rights to the object.
The [Root] object has Read rights to the Member object property,
meaning that every user can read the membership of the group object.
F ina l D r a ft
[S]
For objects that are installed with NetWare 4, the [Creator] is the
ADMIN User object.
Note: The ability for a user to create the object in the first place derives from the
user having a Create right to the container in which the object is created.
When you create an object, the server optimizes the ACL to remove
unnecessary entries. Typically, this means that the ACL entry [Creator],
[Entry Rights], [S] is removed, since in most cases the creator of an
object has the Supervisor rights to the container where the object is
found, and hence has the Supervisor rights to the newly created object
by inheritance.
If, however, the creator only had the Create rights to the container, then
the ACL for the newly created object retains the [Creator], [Entry
Rights], [S] entry, since the creator would not otherwise have any rights
on the newly created object.
Thus, if you create an object and then set its Inherited Rights Filter, you
may no longer have access to the object, even though the [Creator],
[Entry Rights], [S] ACL entry would appear to give you such rights.
Fin al D ra f t
You should never assign any rights to [Public] beyond what is assigned at
default. Any user, whether they are logged in or not, is security equivalent to
[Public]. If you want to allow all users access to a property, it is better to assign
those rights to [Root] or to the container the users are in.
To Go to
chapter
7 Designing a Data Protection Plan
This chapter describes the process used for designing a data protection
plan for your network. The following topics are discussed:
F ina l D r a ft
Establishing a Redundant Hardware System on page 150
Introduction
NetWare 4TM networks maintain data in the file system and in the
Directory database. The file system stores files and applications that are
used by network users and resources. The Directory database stores
information that is used to maintain and manage operation of the
network, such as access to network resources, printing, and security.
Redundant hardware
Objectives
You should identify backup and restore needs, data integrity needs, and
fault tolerance needs.
This will enable you to update your existing backup and restore
methods and develop a disaster recovery plan for your network to
determine the level of data protection you need.
Fin al D ra f t
Prerequisites
Backup plans
Location maps
Resource maps
Partitioning guidelines
F ina l D r a ft
experiences an internal hardware failure. Several third-party vendors
offer standby-server products that allow for a hot copy of data from one
system to another.
Third-Party Solutions
Third-party backup package vendors can also use SMS to enable their
backup software to work on a NetWare network. Contact your Novell
authorized reseller for a list of backup solutions that have been certified
by Novell Labs.
You can also receive Novell Labs Bulletins with a list of the most current
certification list by accessing the Novell Labs faxback system.
Follow the directions provided on the phone. You are prompted to enter
a document number and then a fax number to send the document to.
Compatibility
Novell has SMS TSA software available for NetWare 3.11 and 3.12
servers, NetWare 4 servers, Novell Directory Services, NetWare
SQLTM, and DOS and Windows, and UnixWare* clients.
F ina l D r a ft
Note: Because implementation details vary from vendor to vendor, it is
important to review the documentation and readme files included with the SMS
backup application of your choice. If the solution you choose has been tested
and approved by Novell Labs, you can also obtain information on this product
from Novell Labs Bulletins.
Note: If you lose one partition and all its replicas, you can restore the objects
that existed in that partition. However, the procedure for rebuilding the links to
the lost portion of the Directory tree requires significant technical expertise and
To minimize data traffic across WAN links and to speed up backup and
restore operations, consider performing backups locally at the remote
sites. You might also design your Directory tree so that you have
F ina l D r a ft
replicas of every partition stored at the same site as the backup host
server. Then you can back up and restore the Directory database
without having data go across WAN links.
If you back up and restore the Directory database and file system data
for remote sites from a central location, you should ensure that the
WAN connections, such as routers, bridges, and telecommunications
links are functional before you begin.
Use your offline SMS backup to restore NDS data only if it cannot
be restored from a replica.
4. Stay current with the newest operating system patches and NLM
versions.
6. Ensure that NDS is fully functional and WAN links are up before
backing up or restoring.
F ina l D r a ft
tree the same and restore servers to the same container objects as
they were in before.
Summary
Efficient planning decreases the amount of time necessary to manage
backup and restoration of the Directory database. It also ensures that a
sufficient data protection plan is established before implementing
NetWare 4 on your network.
You should always keep your backup software current and ensure that
it is compatible with all of the NetWare operating systems running in
your network.
Fin al D ra f t
To Go to
chapter
8 Designing an Application
Management Strategy
F ina l D r a ft
Ensuring NetWare Compatibility on page 161
Introduction
Network applications are the productivity tools for your organization.
How you manage these tools depends on the type of applications you
are using.
Network-aware
Network-enabled
Network-integrated
Objectives
Prerequisites
Backup plans
Location maps
Resource maps
Partitioning guidelines
F ina l D r a ft
Ensuring NetWare Compatibility
You should determine whether your applications are NetWare
compatible before you purchase them. Approximately 5,000 software
packages are compatible and registered with Novell . This
compatibility information is important because NetWare makes
demands on application software that can cause corrupt data or impede
user's productivity.
The Yes Program identifies products that are compatible with NetWare
network operating systems and other Novell products such as
ManageWiseTM, GroupWiseTM, and NetWare Telephony ServicesTM.
By separating the program files from the data files, you can easily
control access and better support data protection plans. You might also
consider separating program and data files by placing each on different
volumes or servers. This will help balance the load on servers by
reducing the amount of traffic on the server.
F ina l D r a ft
Providing Adequate Load Balancing
Applications servers are physically near the users that use its
applications.
You should ensure that you are protected from the following conditions
through proper access control:
Accidental deletion
Intentional deletion
User access
You should ensure that you are protected from the following conditions
through proper disaster recovery methods and backups:
Server failure
Catastrophe
Software updates
Distribution
Installation
F ina l D r a ft
The ability to perform necessary configuration management for
each client an application is deployed to.
Operational control
Generally speaking, the solution you choose must enhance your ability
to perform the basic tasks required to manage the entire lifecycle of a
network application.
network.
Users dont need to worry about drive mappings, paths, or rights to the
application directories. The administrator can manage the application
launcher on a Container, Group, or User object level.
The user cannot delete the application icon or change any of its
information.
F ina l D r a ft
The users can log in to the network using any workstation and can
still access all their applications.
For information on how best to use NAL and NAM in your network,
see the online help provided through the NetWare Administrator help
menu or see Setting Up and Using NetWare Application Management
Software in Supervising the Network .
Metering Applications
Licensing Applications
Fin al D ra f t
Until recently, software use licenses were often nothing more than a
printed license statement included in the product's packaging. Software
vendors relied on the integrity of their customers to not violate the
license; in many cases, this was sufficient to protect the vendor's
investment in developing the software.
F ina l D r a ft
appropriate software vendor.
NLS also provides a basic license metering tool, as well as libraries that
export licensing service functionality to developers of other licensing
systems.
NLS Components
NLS also provides a basic license metering tool, as well as libraries that
export licensing service functionality to developers of other licensing
systems.
Transaction databases
For information on how best to use NLS in your network, see the online
help provided through the NetWare Administrator help menu and
Managing NetWare Licensing Services in Supervising the Network .
F ina l D r a ft
Summary
Efficient planning decreases the amount of time necessary to manage
application installation, distribution, and configuration.
If you want to Go to
chapter
9 Developing a Migration Strategy
F ina l D r a ft
The following topics are discussed on the indicated pages:
You might want to review information about setting up a test lab for
integration testing of hardware and software applications if your
network environment meets any of the following requirements:
Introduction
Creating an efficient migration strategy is important to the success of
your NetWare 4 implementation. By doing so, you can successfully
transition existing network resource settings and data to NetWare 4.
Server migration
Fin al D ra f t
Other factors that will affect the success of your implementation should
be managed through lab testing and setting up a pilot system. These
factors are:
Software compatibility
Hardware compatibility
By testing these factors in a lab setting, the team will have more time to
familiarize themselves with the new operating system and utilities.
Objectives
Use resource maps, location maps, LAN and WAN topology maps,
installation and configuration information, backup schedules, and
workflow information to determine the best strategy to use to for
migrating NetWare 4.
Prerequisites
Physical maps
Logical maps
Installation information
Configuration information
Backup schedule
Workflow information
F ina l D r a ft
NetWare 4 supports the following client types:
NFS* UNIX*
NetWare 4 provides full NDS support for DOS and Windows clients
running the 16-bit NetWare DOS RequesterTM software and the Novell
ClientTM software. The NetWare DOS Requester supports all of the
migration and administration utilities.
F ina l D r a ft
Novell provides the following client software for the different types of
workstations:
Novell Client for With NetWare 4, Novell introduced a new DOS client
DOS and architecture called the NetWare DOS Requester software.
Windows 3.1x
The NetWare DOS Requester software consists of
individual functions in NET.CFG for the client.
F ina l D r a ft
RequesterTM software can access Application objects in
the Directory.
Novell Client for The Novell Client for Windows NT allows Windows NT
Windows NT workstations to integrate into NetWare networks. Users can
4.0 log in to their NT workstation once and access all the
services on their NetWare network.
You can automate the migration process for existing Novell Client
workstations by using the Automatic Client Upgrade (ACU) instead of
the INSTALL.EXE program.
With NetWare 4, you can use the Automatic Client Upgrade (ACU)
feature to easily migrate a set of network clients. The following table
summarizes the upgrade scenarios that ACU is designed to address.
From. To
Workstations using the 16-bit The Novell Client for DOS and
NetWare DOS Requester software Windows software
F ina l D r a ft
feature, see the help system for the Novell Client for DOS and Windows
or Novell Client for Windows 95/98 and Windows NT software
(depending on the software to which you want to upgrade).
This option is for those who have an existing NetWare 3.1x server
and want to migrate the server bindery and data across-the-wire
to an existing NetWare 4 server using the Novell Upgrade Wizard.
This option allows you to see and refine a model of your updated
Directory tree before completing its migration.
Fin al D ra f t
Then, you can migrate the server files using the NetWare File
Migration utility (for NetWare 3.1x servers).
F ina l D r a ft
Progress bar indicating percent completion
See the Installation and Upgrade for information on how to load and use
the Novell Upgrade Wizard.
With bindery services, NDS imitates a flat structure for leaf objects
within an Organization or Organizational Unit object. Thus, when
bindery services is enabled, all objects within the specified container
can be accessed by NDS objects and by bindery-based servers and client
workstations.
Figure 9-1
Bindery Services in a Directory Tree
[ROOT]
Organizational Organizational
Bindery context is
Unit Unit set here.
F ina l D r a ft
in this context. User object
requiring
bindery serices
You can add replicas to other servers if needed for bindery services. If a
read/write or master replica is not present, use the NDS Manager or
PARTMGR utility to add one to the server. For information and
procedures, see Placing Replicas for Bindery Services on page 83.
Ideally, all objects a user wants to access under bindery services should
be located in the same bindery context. However, this is not always
possible or practical.
You can set multiple bindery contexts for users who need to access
objects outside of their own bindery contexts. For example, consider the
Directory tree in the following figure.
Figure 9-2
Multiple Bindery Contexts
ACMECORP
(C)=US
(O)=ACME
(OU)=MFG (OU)=HQ
(OU)=TOKYO
(OU)=ACCT (OU)=HR (OU)=PAY
Fin al D ra f t
(CN)=HQ_SRV1 (CN)=HQ_SRV2
(CN)=HQ_SRV1 (CN)=HQ_SRV2
(OU)=DESIGN
(OU)=TOKYO (OU)=PROD (OU)=TEST
(OU)=PROD1 (OU)=PROD2 (OU)=TEST
Legend
To set multiple bindery contexts, you must set the contexts to include
the path all the way to the [Root] of the tree. You can set up to 16
contexts per server. Use semicolons to separate the complete names of
the containers that you want a bindery context set to.
Warning: Do not change a server's bindery context once you set it. Changing a
server's bindery context prevents all bindery services users (from the original
context) who need to log in to that server from accessing bindery services.
Changing the server's bindery context can also disable access to print queues.
F ina l D r a ft
not distributed to other servers.
When you plan and implement bindery services, you need to consider
the following.
Created Objects
If you require the user GUEST, or if you use a service that requires
GUEST, you must create such a user in the Directory database.
Inaccessible Information
E-mail name
Fin al D ra f t
Phone number
Aliases
Profiles
Limited Partitioning
The bindery context for a server can be set to a container that is part of
a partition stored on a different server. But, before you can use bindery
services, you must place a writable replica of the partition that includes
the bindery context on the bindery services-enabled server.
If you set the bindery context for a server to a container object that is not
part of a writable replica on that server, users will not be able to log in
via bindery services.
F ina l D r a ft
Maintain up to 12 NetWare 3 servers in a NetSync cluster
You should use NetSync for either of the following two reasons:
You should not use NetSync for any of the following reasons:
For more information about setting up and using NetSync, see Installing
and Using NetSync.
Chapter 9: Developing a Migration Strategy 189
The NDS base schema has been modified in NetWare 4.2. The new
schema is compatible with DS.NLM version 5.00 and later, and the
DS.NLM versions supported in NetWare 4.2.
You can check which version of DS.NLM you are loading by going to
the server console and typing
MODULES <Enter>
DS.NLM
NetWare 4.2 Directory Services
Version 6.00 September 23, 1998
Copyright 1993-1998 Novell, Inc. All rights
reserved
The sample above indicates that the NetWare 4.2 server is using
DS.NLM version 6.00.
If Then
Important: To avoid NDS base schema conflicts, always upgrade the server
holding the master replica of the [Root] partition first.
Setting Up a Lab
You should set up a lab should be set up to install, configure, and test
NetWare 4.2 for your particular network environment. It will provide
the hands-on experience important to developing an efficient migration
strategy and implementation of NetWare 4.
The lab environment should not affect the current operation of the
existing network but should maintain a connection to the current
F ina l D r a ft
network backbone. This will allow for migration and backward
compatibility testing.
With NetWare 4, there are two types of utilities used at the server
console:
A list of all server utilities included with NetWare 4.2 and those that are
new or updated since NetWare 3.1x is available in Utilities Reference.
Graphical utilities
Graphical utilities are run from within the Windows 3.1, Windows
95/98, or Windows NT environments.
A list of all server utilities included with NetWare 4 and those that are
new or updated since NetWare 3.1x . is available in Utilities Reference.
F ina l D r a ft
The Directory tree foundation is created during the installation
process. You should test your tree design by creating the actual
tree structure that was developed during the design process.
Ensure that you use the naming standards for your organization
and create actual container and leaf objects that will exist in your
network environment. Only the [Root] Organization object and
first level of Organizational Unit objects are created with the
installation utility. All other objects are created with NetWare
Administrator or NETADMIN.
Use the SERVMAN server utility to change the time server setting
if needed.
Application testing
Summary
An efficient migration strategy for client workstations and servers will
make the implementation process straightforward. The lab
environment will give you the hands-on experience you need to
effectively implement NetWare 4.
Evaluation
To Go to
F ina l D r a ft
interoperability testing for NetWare 4 Novell Web site.
chapter
10 Creating an Implementation
Schedule
F ina l D r a ft
your implementation of the NetWare 4TM operating system.
If you have a new network with only one server, you do not need to
create an implementation schedule. Continue to the next procedure. See
Chapter 11, Implementing NetWare 4 Services, on page 203 for more
information.
Introduction
A smooth implementation of NetWare 4 requires adequate planning to
manage the various implementation phases. A well-planned
implementation eliminates confusion, provides efficient execution of
tasks, and communicates migration tasks.
Objectives
You should
Doing so will ensure that network client workstations and servers can
continue to operate uninterrupted.
This enables you to organize your schedule by tasks and identify the
general tasks needed to perform the implementation process.
Fin al D ra f t
Prerequisites
Resource maps
Location maps
F ina l D r a ft
File and print services setup and configuration
The task owner should ensure that the person or team responsible for
the task is familiar with the procedures and utilities necessary for
completing their assignments.
Scheduling Tasks
You should identify a projected start and end date for each task. This
allows the project team to better manage the sequence of
interdependent tasks and workflows.
Tracking Progress
Summary
Creating an efficient implementation schedule requires you to complete
the following tasks:
To Go to
F ina l D r a ft
chapter
11 Implementing NetWare 4 Services
This chapter describes the process used for implementing the NetWare
4TM operating system.
F ina l D r a ft
Implementing NDS on Various Network Types on page 208
Introduction
Implementing the Novell Directory ServicesTM (NDSTM ) technology
on your network can be as simple or complex as you want it to be. The
flexibility of NDS allows you to install and run it on a single server or
many servers.
Objectives
You should
Prerequisites
Resource maps
Location maps
Accessibility plan
Implementation schedule
Fin al D ra f t
You must then set the server context within the Directory tree. If
you want to participate in the information superhighway, add a
country code when setting the server context and a Country object
will be created directly below the tree name or [Root] object.
2. Migrate workstations
With the client software, you can upgrade network clients without
modifying your existing server configurations. Your users will
retain connectivity to all versions of NetWare. Once your client
With the Novell Client Software, you can install only the
connectivity options needed on any workstation. For small
networks, users can choose their optimal configuration to
minimize memory use and maximize performance. For large
network environments, you can establish a common
configuration for multiple workstations.
F ina l D r a ft
these utilities, you must first install and set up a DOS or Windows*
client workstation.
Then, you can set up the remaining Directory tree structure, create
objects for all network resources you want available in the
Directory database, and create Profile objects for maintenance
purposes.
Leaf objects Place leaf objects in containers that provide the best
access for the resources, groups, and users that use them.
To add a new server, first create the container object you want to
install a new server into by using NetWare Administrator or
NETADMIN.
To improve security
If, for example, network supervisors in three different cities
have supervisor rights over the same container object
(bindery context), each of them can assign rights that the
other two would disagree with.
F ina l D r a ft
Partition Operation Partitions Affected
If you create your Directory tree with the network user and
resources in mind, you will find that the most efficient use of
replicasreducing WAN traffic while providing fault tolerance
means you should not need many replicas.
Single-Site Network
Figure 11-1
Example of a Single-Site Directory Tree
[ROOT]
(O)=ACME
(OU)=MFG (OU)=HQ
(OU)=HQ
(OU)=TOKYO
(OU)=ACCT (OU)=HR (OU)=PAY
F ina l D r a ft
(CN)=RJONES (CN)=ACCT_SRV1 (CN)=JSMITH (CN)=ACCT_SRV2
Legend
The Directory tree begins with a single Organization object with few or
no Organizational Unit objects below. If Organizational Units exist, they
are based on functional groups, projects, and departments within a
single site.
Time Services
Partitions
required in a tree. You should partition your tree in relation to the use
and physical location of network resources. You should create
partitions only if they provide better performance or fault tolerance to
the network and tree. Single-site networks may not require partitioning.
Replicas
Each server on the network should contain all the resources needed for
the users that it services. You should copy two to three replicas of each
partition somewhere on the network to provide fault tolerance.
Multiple-Site Network
Figure 11-2
Example of Multiple-Site Directory Tree
[Root] Partition
(parent)
[ROOT]
(O)=ACME
MFG Partition Sales Partition
(child) (child)
F ina l D r a ft
(OU)=TOKYO
(OU)=PROD1 (OU)=PROD2 (OU)=TEST
PROD_SRV1
Partitions
[Root] PROD Sales MFG
S 1 PROD_SRV1 R/W MR SR SR
e
r 2 SALES_SRV2 R/W SR MR R/W
v
1 HQ_SRV3 R/W SR R/W MR
e
r
1 HQ_SRV1 MR R/W R/W R/W
s
Legend
Time Services
Partitions
F ina l D r a ft
Organizational Unit objects. You might want to create a partition for
each high-level Organizational Unit in the tree.
This allows each partition to contain all of the resource objects that a
particular department needs to access. Place the [Root] and
Organization objects in the same partition.
Replicas
For servers that provide local services, place replicas of the partitions
that include them on other local servers.
If only one server exists at a location, place a replica of the partition that
includes the server on a server in a different location. Provide
additional replicas if possible.
Multiple-Campus Network
Figure 11-3
Example of Multiple-Campus Directory Tree
[Root] Partition
(parent)
[ROOT]
(O)=ACME
MFG Partition Sales Partition
(child) (child)
F ina l D r a ft
(OU)=TOKYO
(OU)=PROD1 (OU)=PROD2 (OU)=TEST
PROD_SRV1
Partitions
[Root] PROD Sales MFG
S 1 PROD_SRV1 R/W MR SR SR
e
r 2 SALES_SRV2 R /W SR MR R/W
v
1 HQ_SRV3 R /W SR R/W MR
e
r
1 HQ_SRV1 MR R /W R /W R /W
s
Legend
Centralized Management
Time Services
F ina l D r a ft
It is critical to have a constant reference of time in order for NDS
synchronization to take place. Time is also important to the proper
execution of certain events and features, such as network backups and
time-based security.
You should use one Reference time server and a group of Primary time
servers as the basis for network time services in a time provider group.
This ensures that a proper and accurate time reference is available at all
times.
Each geographically distinct site should have at least one Primary time
server.
Partitions
The [Root] and Organization objects should form one partition. This
partitioning structure ensures that all of the critical access points in the
tree are available and can be replicated for redundancy.
Replicas
Fin al D ra f t
For servers that provide local services, place replicas of the partitions
that include them on other local servers.
If only one server exists at a location, place a replica of the partition that
includes the server on a server in a different location. Provide
additional replicas if possible.
Summary
Implementing NetWare 4 requires you to complete the following tasks:
F ina l D r a ft
3. Sort objects into a logical hierarchy.
appendix
A NDS Object Classes and Properties
Overview
This appendix explains the object classes and properties available in the
Novell Directory ServicesTM architecture.
Note: Some Novell documents use the term attributes and properties
F ina l D r a ft
interchangeably.
Table A-1
Object Class, Function, and Possible Containment
Object Class Function Possible Container
F ina l D r a ft
Message Routing Represents a group of messaging servers Organization
Group with direct connectivity for transferring Organizational Unit
messages between any two of them
Table A-2
Object Class and Properties
AFP Server Object Class (Inherited from CN (Common Name) (Inherited
Top) from Server)
Unique to Class
ACL Account Balance
Serial Number Authority Revocation Allow Unlimited Credit
Supported Connections Backlink Descriptions
Bindery Property Full Name
F ina l D r a ft
CA Private Key Host Device
CA Public Key L (Locality Name)
Certificate Revocation Minimum Account Balance
Certificate Validity Interval Network Address
Cross Certificate Pair O (Organization Name)
Equivalent To Me OU (Organizational Unit Name)
Last Referenced Time Private Key
Obituary Public Key
Reference Resource
Revision Security Equals
Security Flags
See Also
Status
User
Version
Bindery Queue Object Class (Inherited from Common Name (Inherited from
Top) Resouce)
Unique to Class
ACL Description
Bindery Type Authority Revocation Host Resource Name
Backlink L (Locality Name)
Bindery Property O (Organization Name)
CA Private Key OU (Organizational Unit Name)
CA Public Key See Also
Certificate Revocation
Certificate Validity Interval Queue Directory (Inherited
Cross Certificate Pair from Queue)
Equivalent To Me
Device
Last Referenced Time
Host Server
Obituary
Network Address
Reference
Operator
F ina l D r a ft
Revision
Server
User
Volume
F ina l D r a ft
Revision
F ina l D r a ft
Revision Profile Membership
See Also
Security Flags
See Also
Status
User
Version
F ina l D r a ft
Revision
Postal Office Box
Role Occupant
S (State or Province
Name)
SA (Street Address)
See Also
Telephone Number
Security Flags
See Also
Status
User
Version
F ina l D r a ft
Revision
F ina l D r a ft
Revision
appendix
B Referencing and Using Leaf Objects
Overview
Directory leaf objects are objects that do not contain any other objects.
These represent actual network entities such as users, servers, printers,
and computers. You create leaf objects in a container object.
F ina l D r a ft
This appendix explains the leaf objects available in the Novell
Directory ServicesTM architecture.
Table B-1
Application Leaf Object
Leaf Object Function Usage Situation
Table B-2
Auditing Leaf Object
Leaf Object Function Usage Situation
Auditing The Auditing File Object (AFO) is the An audit utility (such as AUDITCON)
File Novell Directory Services data creates the AFO when you enable
structure used to manage an audit auditing. The server then checks for
trail's configuration and access rights. access rights each time a user
attempts to access the audit trail.
Table B-3
Informational Leaf Object
Leaf Object Function Usage Situation
F ina l D r a ft
This object has no effect on the
operation of the network; it only stores
information about the computer.
These objects are created and controlled using the MHS utilities. MHS
Services software is available on NetWire .
Table B-4
Messaging-Related Leaf Objects
Leaf Object Function Usage Situation
Distribution List Represents a list of mail Use this object to simplify sending
recipients. mail to recipients.
Table B-5
Miscellaneous Leaf Objects
Leaf Object Function Usage Situation
Alias Points to another object in the Use this object to allow access to an
Directory tree and makes it appear object that is in another context.
as if the object that it points to
actually exists in the Directory tree For example, you can use an Alias to
where the Alias object is. represent a resource, such as a special
printer, that most users in the tree need
F ina l D r a ft
Although an object appears both to access.
where it was actually created and
where an Alias referring to it was Also, when you move or rename a
created, only one copy of the object container object in a Directory tree, you
really exists. have the option of creating an Alias
object in place of the moved or
If you delete or rename an Alias, the renamed object. If you select this
Alias itself (not the object it is option, NetWare Administrator
pointing to) is deleted or renamed. automatically creates the Alias for you
and assigns it the same name as the
original object.
Bindery Object Represents an object placed in the It is used by NDS only to provide
Directory tree by an upgrade or backward compatibility with bindery-
migration utility. based utilities.
Bindery Queue Represents a queue placed in the It is used by NDS only to provide
Directory tree by an upgrade or backward compatibility with bindery-
migration utility. based utilities.
Unknown Represents an NDS object that has Directory Services utilities rename
been invalidated and cannot be objects that they do not recognize.
identified as belonging to any of the Delete or re-create the correct object
other object classes. for the resource.
Table B-6
NetWare Licensing Services Leaf Object
Leaf Object Function Usage Situation
LSP Server When you register an LSP (License A client-specific component packages
Service Provider) with NDS, an LSP the request and submits it to the
Server object is created, by default, in nearest connected LSP.
the same context as the NCP Server
object on which it is loaded. The LSP If the client is not connected to an LSP,
the client checks the Novell Directory
Fin al D ra f t
These objects are created and controlled using the NetWare print
utilities.
Table B-7
Printer-Related Leaf Objects
Leaf Object Function Usage Situation
Print Queue Represents a print queue on the You must create a Print Queue object for
network. every print queue on the network.
F ina l D r a ft
This object cannot be created with
NETADMIN. Use the NetWare Administrator
or PCONSOLE.
Print Server Represents a network print You must create a Print Server object for
server. every print server on the network.
Printer Represents a physical printing You must create a Printer object for every
device on the network. printer on the network.
Table B-8
Server-Related Leaf Objects
Leaf Object Function Usage Situation
Directory Map Represents a particular directory Use this object to avoid making changes
in the file system. Directory Map to many login scripts when the location
objects can be especially useful in of applications changes; instead, you
login scripts by pointing to change only the Directory Map object.
Fin al D ra f t
NetWare Represents a server running Use the NetWare Server object to tie the
Server NetWare. physical server to the Directory tree.
Without this object, you cannot access
Store information about the server file systems that are on that server's
in the NetWare Server object's volumes.
properties, such as the server's
address, the physical location of If you have a non-NetWare 4 server, you
the server, and what services it must create this object to be able to
provides. access those non-NetWare 4 volumes.
When you create a NetWare Server
In addition to storing information object for a non-NetWare 4 server, the
about the NetWare server, the non-NetWare 4 server must be running.
NetWare Server object affects the
network in that it is referred to by
several other objects.
Volume Represents a physical volume on You can create a Volume object for every
the network. physical volume on the network. (During
installation of NetWare 4 on a server,
In the Volume object's properties, Volume objects are created for every
you can enter identification physical volume on that server.)
information, such as the Host
server, volume location, etc. You Use INSTALL to create volumes on
can also set restrictions for use of NetWare 4 servers.
the volume, such as space limits
for users. When a Volume object is created, the
server name and the volume name
information is placed in the Volume
object's properties.
F ina l D r a ft
information about the directories and
files on that volume.
Table B-9
User-Related Leaf Objects
Leaf Object Function Usage Situation
Group Assigns a name to a list of User Create a Group when you have many
objects that can be located User objects that need the same
anywhere in the Directory tree. trustee assignments. Rather than
making many trustee assignments,
you make just one trustee
assignment to all the users who
belong to the group by making the
trustee assignment to the Group
object itself.
Profile Contains a profile login script. Create a Profile object for a set of
When the Profile object is listed as users who need to share common
a User object's property, the login script commands but who are
Profile object's login script is not located in the same container in
executed when that User object the Directory tree, or who are a
logs in. The Profile login script subset of users in the same
executes after the system login container.
script and before the user login
script.
User Represents a person who uses You must create a User object for
your network. every user who needs to log in to the
network. When you create a User
In the User object properties, you object, you can create a home
can set login restrictions, intruder directory for that user. When you
detection limits, password and create User objects, you can also
password restrictions, security choose to apply a user template to
equivalences, etc. the User object that provides default
property values.
F ina l D r a ft
You should create User objects in the
container where the users will
typically log in.
appendix
C Template Examples
You should customize all these templates examples to fit your specific
network environment.
F ina l D r a ft
The following templates examples are provided on the indicated pages.
Application Compatibility
The following template provides an example of an application
compatibility template you could use for your network migration.
Figure C-1
Application Compatibility Template
SoftWare and Version Date Scheduled VLM Tested
Word Processors
Spreadsheets
Fin al D ra f t
Menu Systems
Databases
Gateways
Implementation Schedule
The following template provides an example of an implementation
schedule template.
Figure C-2
Implementation Schedule Template
Target Percent
Task Title and Description Owner Begin Date
End Date Complete
F ina l D r a ft
Install and configure first server (Name the
Directory tree and setup time synchronization)
Name Standards
The following template provides an example of an Novell Directory
ServicesTM (NDSTM ) naming standards document.
Figure C-3
Name Standards Worksheet Template
Item Standard Examples Rationale
Directory tree
Organization
Other OU names
Special objects
Organizational Role
Profile
Directory Map
All
F ina l D r a ft
Network boards (Fill in columns that apply to each network board.)
Name LAN I/O Memory Interrupt DMA Node Slot IPX external Frame
driver port address (IRQ) channel address number network # type
Other boards (Internal or external disk controllers, serial controllers, SCSI controllers, video adapters, etc.)
Name Driver I/O Memory Interrupt DMA SCSI
(if applicable) port address (IRQ) channel address Other info
Disks
Drive Make/Model Size Mirrored with # Volume segments
1.
2.
3.
4.
5.
6.
7.
8.
Figure C-5
Server Worksheet Template
Directory tree information
Server name:
Time Configuration
Volumes
Volume name File compression Block suballocation Data migration Name space
ON OFF ON OFF ON OFF
F ina l D r a ft
M=master replica, R/W=read/write replica, R/O=read-only replica, SR=subordinate reference replica
Server Migration
The following template provides an example of a server migration
template.
Figure C-7
Server Migration Template
Department Old Server Name Planned Name Server OS Disk Storage Comments
Fin al D ra f t
Boot method: Hard disk Floppy disk Remote Path: Disk Size:
Memory (RAM): Base: Extended: Total:
F ina l D r a ft
Operating System
DOS Macintosh Miscrosoft
Windows
OS/2 UNIX NFS
Time Configuration
Time zone: Offset from UTC Sync with server: Yes No
Other boards (Internal or external disk controllers, serial controllers, SCSI controllers, video adapters, etc.)
Name Driver I/O Memory Interrupt DMA SCSI
(if applicable) port address (IRQ) channel address Other info
Disks
Drive Make/Model Size Volume name
1.
2.
3.
appendix
D Supplemental Information
Resources
F ina l D r a ft
Following are some additional information resources on NetWare 4,
Novell Directory ServicesTM (NDSTM ), SMSTM, and related topics.
You can also check for the most recent versions of NetWare third-party
books at your favorite bookstore.
Online Help
Context-sensitive help
Online documentation
Customer service
Hardware documentation
ManageWise services
F ina l D r a ft
from within the United States or Canada, call the Novell Research
Order Desk at 1-800-377-4136. From other locations, call 303-297-
2725.
In Germany: 0130-37-32
The Novell internet sites support access through FTP, Gopher, and
World Wide Web (WWW) systems. Over 9,000 documents exist on
the WWW system for providing technical hints and information.
In Germany: ftp.novell.de
See public areas in these sites for possible listings of other sites'
addresses.
Fin al D ra f t
In Germany: www.novell.de
FaxBack Service
F ina l D r a ft
subscription basis. Updates are sent out several times each year.
More information is available on NetWire or from your Novell
Authorized Reseller.
Trademarks
Novell Trademarks
Trademarks 267
Enterprise Certified Novell Engineer and ECNE are service marks of Novell,
Inc.
Envoy is a registered trademark of Novell, Inc. in the United States and other
countries.
EtherPort is a registered trademark of Novell, Inc. in the United States and other
countries.
EXOS is a trademark of Novell, Inc.
Global MHS is a trademark of Novell, Inc.
Global Network Operations Center and GNOC are service marks of Novell, Inc.
Grammatik is a registered trademark of Novell, Inc. in the United States and
other countries.
Graphics Environment Manager and GEM are registered trademarks of Novell,
Inc. in the United States and other countries.
GroupWise is a registered trademark of Novell, Inc. in the United States and
other countries.
GroupWise 5 is a trademark of Novell, Inc.
GroupWise XTD is a trademark of Novell, Inc.
Hardware Specific Module and HSM are trademarks of Novell, Inc.
Hot Fix is a trademark of Novell, Inc.
InForms is a trademark of Novell, Inc.
Instructional Workbench is a registered trademark of Novell, Inc. in the United
States and other countries.
Internetwork Packet Exchange and IPX are trademarks of Novell, Inc.
IPX/SPX is a trademark of Novell, Inc.
IPXODI is a trademark of Novell, Inc.
IPXWAN is a trademark of Novell, Inc.
LAN WorkGroup is a trademark of Novell, Inc.
LAN WorkPlace is a registered trademark of Novell, Inc. in the United States
and other countries.
LAN WorkShop is a trademark of Novell, Inc.
LANalyzer is a registered trademark of Novell, Inc. in the United States and
other countries.
LANalyzer Agent is a trademark of Novell, Inc.
Link Support Layer and LSL are trademarks of Novell, Inc.
MacIPX is a registered trademark of Novell, Inc. in the United States and other
countries.
ManageWise is a registered trademark of Novell, Inc. in the United States and
other countries.
Media Support Module and MSM are trademarks of Novell, Inc.
Mirrored Server Link and MSL are trademarks of Novell, Inc.
Mobile IPX is a trademark of Novell, Inc.
Multiple Link Interface and MLI are trademarks of Novell, Inc.
Multiple Link Interface Driver and MLID are trademarks of Novell, Inc.
My World is a registered trademark of Novell, Inc. in the United States and
other countries.
N-Design is a registered trademark of Novell, Inc. in the United States and other
countries.
Natural Language Interface for Help is a trademark of Novell, Inc.
Trademarks 269
Trademarks 271
Novell Press Logo (teeth logo) is a registered trademark of Novell, Inc. in the
United States and other countries.
Novell Replication Services is a trademark of Novell, Inc.
Novell Research Reports is a trademark of Novell, Inc.
Novell RX-Net/2 is a trademark of Novell, Inc.
Novell Service Partner is a trademark of Novell, Inc.
Novell Storage Services is a trademark of Novell, Inc.
Novell Support Connection is a trademark of Novell, Inc.
Novell Technical Services and NTS are service marks of Novell, Inc.
Novell Technology Institute and NTI are registered service marks of Novell, Inc.
in the United States and other countries.
Novell Virtual Terminal and NVT are trademarks of Novell, Inc.
Novell Web Server is a trademark of Novell, Inc.
Novell World Wide is a trademark of Novell, Inc.
NSE Online is a service mark of Novell, Inc.
NTR2000 is a trademark of Novell, Inc.
Nutcracker is a registered trademark of Novell, Inc. in the United States and
other countries.
OnLAN/LAP is a registered trademark of Novell, Inc. in the United States and
other countries.
OnLAN/PC is a registered trademark of Novell, Inc. in the United States and
other countries.
Open Data-Link Interface and ODI are trademarks of Novell, Inc.
Open Look is a registered trademark of Novell, Inc. in the United States and
other countries.
Open Networking Platform is a registered trademark of Novell, Inc. in the
United States and other countries.
Open Socket is a registered trademark of Novell, Inc. in the United States.
Packet Burst is a trademark of Novell, Inc.
PartnerNet is a trademark and service mark of Novell, Inc.
PC Navigator is a trademark of Novell, Inc.
PCOX is a registered trademark of Novell, Inc. in the United States and other
countries.
Perform3 is a trademark of Novell, Inc.
Personal NetWare is a trademark of Novell, Inc.
Pervasive Computing from Novell is a registered trademark of Novell, Inc. in
the United States and other countries.
Portable NetWare is a trademark of Novell, Inc.
Presentation Master is a registered trademark of Novell, Inc. in the United
States and other countries.
Print Managing Agent is a trademark of Novell, Inc.
Printer Agent is a trademark of Novell, Inc.
QuickFinder is a trademark of Novell, Inc.
Red Box is a trademark of Novell, Inc.
Reference Software is a registered trademark of Novell, Inc. in the United States
and other countries.
Remote Console is a trademark of Novell, Inc.
Remote MHS is a trademark of Novell, Inc.
Third-Party Trademarks
Trademarks 273