Gw2014 Guide Admin
Gw2014 Guide Admin
Administration Guide
May 2016
Legal Notice
For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government
rights, patent policy, and FIPS compliance, see https://www.novell.com/company/legal/.
Copyright © 2016 Novell, Inc, a Micro Focus company. All Rights Reserved.
Contents
Part I System 31
3 GroupWise Administrators 45
3.1 Managing the GroupWise Super Admin User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
3.2 Designating Additional GroupWise System Administrators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
3.3 Designating Domain Administrators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
3.4 Designating Post Office Administrators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
3.5 Designating a Specific User as an Administrator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Contents 3
4.16 Pending Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
4.17 Record Enumerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
4.18 Recover Deleted Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
4.19 Restore Area Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
4.20 System Preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
4.20.1 Admin Preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
4.20.2 Routing Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
4.20.3 External Access Rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
4.20.4 Nickname Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
4.20.5 Default Password. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
4.20.6 Admin Lockout Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
4.20.7 Archive Service Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
4.21 Time Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
4.21.1 Modifying a Time Zone Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
4.21.2 Adding a Time Zone Definition. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
4.21.3 Deleting a Time Zone Definition. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
4.22 Trusted Applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
4.22.1 Creating a Trusted Application and Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
4.22.2 Editing a Trusted Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
4.22.3 Deleting a Trusted Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
4.23 User Import . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
4.24 User Move Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
4.25 Standalone GroupWise Database Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
4.25.1 GroupWise Check Utility (GWCheck) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
4.25.2 GroupWise Backup Time Stamp Utility (GWTMSTMP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
4.25.3 GroupWise Administration Utility (GWAdminUtil) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
4.25.4 GroupWise Database Copy Utility (DBCOPY). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Part II Domains 91
9 Managing Domains 95
9.1 Connecting to a Domain. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
9.2 Editing Domain Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
9.3 Converting a Secondary Domain to a Primary Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
9.4 Deleting a Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
9.5 Changing the MTA Configuration to Meet Domain Needs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
9.6 Releasing a Domain from Your GroupWise System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
9.7 Merging a Domain into Your GroupWise System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Contents 5
Part III Post Offices 117
Contents 7
18.5 Optimizing Calendar Publishing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Contents 9
20.92 --qfnolibs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
20.93 --qfnopreproc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
20.94 --qfnousers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
20.95 --qfuserfidbeg . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
20.96 --qfuserfidend . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
20.97 --rdaboffset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
20.98 --rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
20.99 --show . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
20.100--soap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
20.101--soapmaxthreads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
20.102--soapport. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
20.103--soapsizelimit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
20.104--soapssl. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
20.105--soapthreads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
20.106--sslciphersuite . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
20.107--ssloption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
20.108--tcpthreads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
20.109--threads. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
20.110--user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
Contents 11
26.24 --logdays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
26.25 --logdiskoff . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
26.26 --loglevel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
26.27 --logmax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
26.28 --maxidlerouters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
26.29 --maxrouters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
26.30 --messagelogdays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
26.31 --messagelogmaxsize . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
26.32 --messagelogpath. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
26.33 --messagelogsettings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
26.34 --msgtranssl . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
26.35 --noada . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
26.36 --nodns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
26.37 --noerrormail. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
26.38 --nondssync . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
26.39 --norecover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
26.40 --nosnmp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
26.41 --show . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
26.42 --sslciphersuite . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
26.43 --ssloption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
26.44 --tcpinbound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
26.45 --tcpport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
26.46 --tcpwaitconnect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
26.47 --tcpwaitdata. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
26.48 --vsnoadm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
26.49 --work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
Contents 13
33.3 Decreasing the Timeout Cycles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318
Contents 15
38 Monitoring the DVA 373
38.1 Using the DVA Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
38.1.1 Configuring the DVA Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
38.1.2 Viewing the DVA Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
38.2 Using DVA Log Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374
38.2.1 Locating DVA Log Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374
38.2.2 Configuring DVA Log Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374
38.2.3 Viewing DVA Log Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375
38.2.4 Interpreting DVA Log File Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375
Contents 17
49.5.1 Setting Up a Restore Area. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427
49.5.2 Restoring a User’s Mailbox Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429
49.5.3 Letting Client Users Restore Their Own Mailbox Items . . . . . . . . . . . . . . . . . . . . . . . . . . . 429
49.6 Recovering Deleted GroupWise Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430
Contents 19
56.7 Controlling Access to a Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 492
56.8 Enabling Users to Modify a Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 492
56.8.1 Selecting the Users Who Can Modify a Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 492
56.8.2 Granting Group Modification Rights to a User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493
56.9 Deleting a Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493
56.10 Managing Email Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493
56.10.1 Changing a Group’s Internet Addressing Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493
56.10.2 Changing a Group’s Visibility in the Address Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 494
56.11 Adding External Users to a Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 494
Contents 21
68 Setting Up GroupWise Client Modes and Accounts 543
68.1 GroupWise Client Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543
68.1.1 Online Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543
68.1.2 Caching Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543
68.1.3 Remote Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545
68.2 Email Accounts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 548
68.2.1 Accounts Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 548
68.2.2 Enabling POP3, IMAP4, and NNTP Account Access in Online Mode . . . . . . . . . . . . . . . . 548
Contents 23
79 Monitoring Calendar Publishing 635
79.1 Viewing Calendar Publishing Status in the POA Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 635
79.2 Using Calendar Publishing Host Log Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 635
79.3 Using POA Log Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 635
Contents 25
87.7 --httpagentuser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 682
87.8 --httpcertfile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 682
87.9 --httpmonpassword. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 682
87.10 --httpmonuser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 683
87.11 --httpport. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 683
87.12 --httpssl. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 683
87.13 --ipa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 684
87.14 --ipp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 684
87.15 --lang . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 684
87.16 --log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 684
87.17 --monwork . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 685
87.18 --nosnmp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 685
87.19 --pollthreads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 686
87.20 --proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 686
87.21 --tcpwaitconnect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 686
Contents 27
A.1.1 Opening Ports on OES Linux. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 729
A.1.2 Opening Ports on SLES. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 730
A.1.3 Opening Ports on Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 731
A.2 Protocol Flow Diagram with Port Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 732
A.3 Post Office Agent Port Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 733
A.4 Message Transfer Agent Port Numbers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 734
A.5 Internet Agent Port Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 734
A.6 Document Viewer Agent Port Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 735
A.7 WebAccess Application Port Numbers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 735
A.8 Calendar Publishing Host Port Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 736
A.9 Monitor Agent Port Number . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 736
A.10 Monitor Application Port Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 736
A.11 GroupWise High Availability Service Port Number (Linux Only) . . . . . . . . . . . . . . . . . . . . . . . . . . . 737
A.12 Port Numbers for Products Frequently Used with GroupWise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 737
A.12.1 Novell Messenger Port Number. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 737
A.12.2 GroupWise Mobility Service Port Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 737
A.12.3 BlackBerry Enterprise Server for Novell GroupWise Port Number . . . . . . . . . . . . . . . . . . 738
This Novell GroupWise 2014 R2 Administration Guide helps you maintain all components of your
GroupWise system.
The following resources provide additional information about using GroupWise 2014 R2:
To search the GroupWise documentation from the Novell Support website, click Advanced
Search, select Documentation in the Search In drop-down list, select GroupWise in the
Products drop-down list, type the search string, then click Search.
GroupWise Support Forums (https://forums.novell.com/forumdisplay.php/356-GroupWise)
GroupWise Support Community (http://www.novell.com/support/kb/product.php?id=GroupWise)
GroupWise Cool Solutions (https://www.novell.com/communities/coolsolutions/category/
groupwise/)
Audience
This guide is intended for those who administer a GroupWise system on Linux or Windows. Some
background knowledge of the host operating system is assumed.
Feedback
We want to hear your comments and suggestions about this manual and the other documentation
included with this product. Please use the User Comment feature at the bottom of each page of the
online documentation.
Additional Documentation
For additional GroupWise documentation, see the following guides at the GroupWise 2014 R2
documentation website (http://www.novell.com/documentation/groupwise2014r2):
Installation Guide
Server Migration Guide
Administration Guide
Multi-System Administration Guide
Interoperability Guide
Troubleshooting Guides
GroupWise User Frequently Asked Questions (FAQ)
GroupWise User Guides
GroupWise User Quick Starts
System 31
32 GroupWise 2014 R2 Administration Guide
1 GroupWise System Administration
1
The following sections of the Administration Guide detail the GroupWise objects where GroupWise
information is stored. Instructions are provided for creating and managing all GroupWise object types.
“Domains” on page 91
“Post Offices” on page 117
“Users” on page 453
“Resources” on page 495
“Groups” on page 485
The following sections of the Administration Guide detail the GroupWise software components that
make your GroupWise system run. Instructions are provided for configuring, monitoring, and
optimizing each software component.
The following additional sections of the Administration Guide provide supporting details and
background information:
The GroupWise Administration console is a web-based administration tool that provides convenient
access to your GroupWise system in your web browser. Your web browser can connect to the
GroupWise Administration Service on any domain server. From any domain server, you can access
other domain servers and post office servers throughout your GroupWise system.
https://groupwise_server_address:admin_port/gwadmin-console
You can access the Admin console on a secondary domain server to perform the following types of
administrative tasks:
In order to access a domain, the GroupWise Admin Service must be running on the domain server.
Database maintenance
User import
The number of background tasks that the Admin console is running displays in the upper right corner
of the Admin console window.
When you use the following rcgrpwise commands, the GroupWise Admin Service starts and stops
along with the GroupWise agents on the server:
rcgrpwise start
rcgrpwise restartall
rcgrpwise stop
Using rcgrpwise restart restarts the GroupWise agents, but not the GroupWise Admin Service
/var/log/novell/groupwise/gwadmin
c:\ProgramData\Novell\GroupWise\gwadmin
NOTE: On some versions of Windows Server, the ProgramData folder is not visible by default. To
display it in File Explorer, click View, then select Hidden items.
All activities performed by using the GroupWise Administration Utility are logged in the
gwadminutil.log file in the following folder:
Linux: /var/log/novell/groupwise/gwadmin
Windows: c:\ProgramData\Novell\GroupWise\gwadmin
NOTE: On some versions of Windows Server, the ProgramData folder is not visible by default. To
display it in File Explorer, click View, then select Hidden items.
GroupWise integration is available for both Novell iManager and Microsoft Management Console
(MMC).
TIP: If you need to manually download and install the GroupWise iManager plugin, visit https://
download.novell.com in your web browser, then select iManager and your version number from the
Product or Technology drop-down menu. Click Submit, and the GroupWise plugin for iManager
appears below the search area. Follow the instructions in the download to install the plugin.
NOTE: On an ongoing basis, LDAP user synchronization transfers changes in the group
membership from eDirectory over to GroupWise. For more information, see Section 6.1.2,
“Configuring User Synchronization for an LDAP Directory,” on page 80. You cannot change
group membership in the GroupWise Admin console.
NOTE: After you associate an eDirectory group with a GroupWise post office, the GroupWise tab no
longer appears in iManager. You can see which post office the group is associated with by displaying
the Group object properties in the GroupWise Admin console.
NOTE: After you associate an Active Directory group with a GroupWise post office, you cannot see
the post office that the group belongs to in MMC. You can see this information by displaying the
Group object properties in the GroupWise Admin console.
The GroupWise Admin console provides options for creating different levels of GroupWise
administrators. Each level of administrator has different rights to the Admin console and the HTTP
consoles. The following are the available roles and their rights to the different HTTP consoles:
System Administrator: Configuration rights to all MTA, POA, and GWIA consoles.
Domain Administrator: Configuration rights to all MTA, POA, and GWIA consoles in their
domain.
Post Office Administrator: Configuration rights to their POA console.
Any HTTP user you create for a console, does not have Write access to the consoles.
Because the DVA does not own or read any databases, access control rules do not apply to the
DVA.
Any changes to the HTTP consoles are logged with the user ID of the administrator appended t the
log message. The user ID is only logged when logging is set to Verbose or higher.
If you need to change the user name or password for the GroupWise Super Admin, use the
GroupWise Administration Utility (GWAdminUtil). For background on using GWAdminUtil, see
Section 2.6, “Using the GroupWise Administration Utility,” on page 39.
IMPORTANT: If your HTTP user and super admin user have the same username and password,
when you login with the HTTP user, you have full rights. If the users have different password, the
HTTP user with only have read rights to the console. To avoid any complications, please use a
different username and password for the super admin user and the HTTP console users.
Use the following command to change the user name for the Super Admin user:
Syntax:
gwadminutil setadmin -d /path_to_domain -a new_admin_user_name -p
Example:
gwadminutil setadmin -d /gwsystem/provo1 -a supergw -p [new_password]
When you change the user name of the Super Admin user, you can also specify a new
password. If you do not specify the new password on the command line, you are prompted for it.
Use the following command to change the password for the Super Admin user:
GroupWise Administrators 45
Syntax:
gwadminutil setadmin -d /path_to_domain -a existing_admin_user_name -p
Example:
gwadminutil setadmin -d /gwsystem/provo1 -a admin -p [new_password]
If you do not specify the new password on the command line, you are prompted for it.
Such GroupWise system administrators have rights throughout your GroupWise system, but they
cannot create additional system administrators. They can, however, create domain and post office
administrator.
In the GroupWise Admin console, domain administrators cannot perform any administrative tasks
that do not pertain to the domain where they have rights. As a result, some parts of the Admin
console interface are dimmed when domain administrators log in.
In the GroupWise Admin console, post office administrators cannot perform any administrative tasks
that do not pertain to the post office where they have rights. As a result, some parts of the Admin
console interface are dimmed when post office administrators log in.
TIP: If you need to remove administrator rights from an individual user, you can do it on the User
object, or you can do it in the administrator lists that are provided by using System >
Administrators.
GroupWise Administrators 47
48 GroupWise 2014 R2 Administration Guide
4 GroupWise System Tools
4
The GroupWise system tools allow you to perform various tasks to configure, maintain, and optimize
your GroupWise system. The following sections provide information about the tools listed on the
System menu in the GroupWise Admin console:
In addition to the system utilities included on the System menu in the GroupWise Admin console,
GroupWise includes the following standalone utilities:
NOTE: GroupWise gateways are legacy products that are not supported with the current GroupWise
version.
LDAP fields that you associate with GroupWise fields here are available for use in all domains
throughout your GroupWise system. You can also customize the GroupWise Address Book for
individual domains. For instructions, see Section 5.1.1, “Adding LDAP Fields to the Address
Book,” on page 70
2 Click the first field under the LDAP directory whose field you want to make available in
GroupWise.
3 Select the LDAP property that you want to associated with the admin-defined field.
4 To remove an admin-defined field, click the field, then click <Unused>.
You are prompted for whether to remove the corresponding values from user records. This might
be a time-consuming process.
5 Click Yes to clean up all obsolete references to deleted admin-defined fields in all user records.
or
Click No to perform the cleanup later.
At any time, you can click Cleanup to remove obsolete references to deleted admin-defined
fields from all user records. It is a good practice to run Cleanup periodically to ensure that the
admin-defined fields in the GroupWise Admin console match the admin-defined fields that
appear in user records.
For detailed information and instructions, see Section 53.14, “Removing GroupWise Accounts,” on
page 476.
4.11 Information
The Information tool tallies the number of objects in your entire GroupWise system, as well as the
number of external objects that represent objects in other email systems that your GroupWise system
is connected to. It also tallies the number of mailboxes and licenses in your entire GroupWise system.
You can also run an audit report for your entire GroupWise system by using the Information tool.
You can also run audit reports on a post office basis. For more details about audit reports, see
Section 13.4, “Auditing Mailbox License Usage in the Post Office,” on page 127.
In addition, after an upgrade, you might have software distribution directories that are no longer
needed in GroupWise 2014 R2. The Legacy tool enables you to easily delete them. Starting in
GroupWise 2014 R2, GroupWise client software is distributed to user workstations using Client Auto-
Update. For more information, see Section 70.1, “Using Client Auto-Update to Distribute the
GroupWise Client Software,” on page 587.
For example, you can maintain any domain’s objects you have administrative rights over. However,
because a secondary domain owns its own objects, any operation you perform from the primary
domain on a secondary domain’s objects must be validated by the secondary domain. While the
operation is being validated, the Pending Operations dialog box displays object details and the
pending operation.
While the operation is pending, the object is marked Unsafe in the primary domain database. The
Operation field in the dialog box displays the pending operation. An unsafe object can have other
operations performed on it, such as being added to a group; however, the object record is not
distributed to other domains and post offices in the system until it is marked Safe.
All pending operations require confirmation that the operation was either successfully performed or
could not be performed. If the operation was successful, the pending operation is removed from the
list, the record is marked in the database as Safe, and the record is distributed to all other domains
and post offices in your system. If the operation could not be performed, the pending operation
remains in the list where you can monitor and manage it.
1 In the GroupWise Admin console, connect to the domain whose pending operations you want to
view.
See Section 2.2, “Connecting to a Domain,” on page 35.
2 Ensure the agents are running for the domain and/or post office where you are checking for
pending operations
3 Click System > Pending Operations.
While an operation is being validated, the Pending Operations dialog box displays the object and
the operation waiting completion and confirmation.
For more information, see Chapter 47, “Troubleshooting Database Problems,” on page 421.
For complete instructions, see Section 49.6, “Recovering Deleted GroupWise Accounts,” on
page 430.
Detailed information for using restore areas is provided in Section 49.5, “Restoring Deleted Mailbox
Items,” on page 427. Information about backing up post offices is provided in Section 48.2, “Backing
Up a Post Office,” on page 423.
Admin Preferences: Controls how rights are assigned and what network ID format is used
when creating new GroupWise users. By default, rights are assigned automatically and the
fully distinguished name format is used.
Routing Options: Controls default message routing for your GroupWise system. By default,
no routing domain is assigned.
External Access Rights: Controls the access that users on external GroupWise systems
have to your GroupWise users’ information. By default, Busy Search and status tracking
information is not returned to users on external GroupWise systems.
Default Password: Assigns a default password for new GroupWise user accounts. By
default, you must manually assign a password for each GroupWise account you create.
Admin Lockout Settings: Controls access to the GroupWise administration functions in the
GroupWise Admin console. By default, there are no restrictions.
Archive Service Settings: Sets the default archive service for your GroupWise system.
Archive services are third-party applications that can function as GroupWise trusted
applications, such as NetMail Archive (http://www.netmail.com/products/m-archive-email-
archiving.html). When you install an archive service to a server, the archive service is added
to the list of archive service trusted applications that displays in the GroupWise Admin
console.
Nickname Settings: Controls how addressing is handled after you move a user from one
post office to another. By default, nicknames representing old addresses are not
automatically created when users are moved.
2 Change the system preferences as needed.
3 Click OK to save the changes.
When Creating or Modifying Objects, For Network ID Use: These options are provided for
backward compatibility for GroupWise post offices on NetWare servers. Starting in GroupWise
2012, NetWare is no longer a supported platform.
Default Routing Domain: If a domain’s MTA cannot resolve a message’s address, the
message is routed to this default domain’s MTA. The default domain’s MTA can then be
configured to handle the undeliverable messages. This might involve routing the message to
another GroupWise domain or to an Internet address (by performing a DNS lookup). Browse to
and select the GroupWise domain you want to use as the default routing domain.
Force All Messages to this Domain: This option applies only if you select a default routing
domain. Select this option to force all messages to be routed through the default routing domain
regardless of the links you have configured for your GroupWise system’s domains.
MTAs Send Directly to Other GroupWise Systems: Select this option if you want all MTAs in
your GroupWise system to perform DNS lookups and route messages out across the Internet. If
you deselect this option, you can designate individual MTAs to perform DNS lookups and route
messages to the Internet.
2 Click OK to save the changes.
Allow External Busy Search: Select this option to enable users in other GroupWise systems to
perform Busy Searches on your GroupWise users’ Calendars.
1 In the System Preferences dialog box, click the Settings tab to modify any of the following
options:
Auto-Create on User Move: Whenever you move a user, GroupWise can automatically create
a nickname with the user’s old post office. This enables messages sent to the old address to be
automatically forwarded to the user’s new address. Select whether or not you want GroupWise
to never create nicknames, always create nicknames, or prompt you during the move process.
Expire After: This option applies only if you selected Always or Prompt. If you want the
nickname to be automatically removed after a period of time, specify the time period (in days).
Valid values range from 1 to 365 days. A setting of 0 indicates that the nickname will not be
automatically removed.
2 Click OK to save the changes.
Default Password for New Users: Specify the default password you want assigned to new
GroupWise user accounts.
2 Click OK to save the changes.
Restrict System Operations to Primary Domain: Disable this option to allow an administrator
to perform system operations (Tools > GroupWise System Operations) when he or she is not
connected to the primary domain. This option is enabled by default, which means that all
operations except Select Domain, Pending Operations, Software Directory Management, and
Restore Area Management are unavailable when connected to a secondary domain.
Lock Out Older GroupWise Administration Snap-Ins: Enable this option to prevent
administrators from using older GroupWise administration tools (the GroupWise Admin console
or ConsoleOne). You can override these system lockout settings for individual domains (Domain
object > GroupWise > Admin Lockout Settings).
In the Minimum Admin Tool Release Version (x.x.x) field, specify the version number of the
oldest GroupWise administrator tool that can be used to administer your GroupWise system.
In the Minimum Admin Tool Release Date field, select the date of the oldest GroupWise
administration tool that can be used to administer your GroupWise system.
You can specify the minimum version, the minimum date, or both. If you specify both minimums,
any administrator using snap-ins that are older than both minimums cannot use the GroupWise
snap-ins. Default admin lockout settings can be overridden on individual domains as needed.
IMPORTANT: The specified release version and release date affect the Identity Manager
GroupWise Driver as well as the GroupWise admin tool. If you are using Identity Manager with
GroupWise, do not specify a release version or date that is newer than the release version and
date of the Identity Manager GroupWise Driver that you are running.
The message retention service and its associated archive service must be set up as a GroupWise
trusted application. For instructions, see Section 4.22, “Trusted Applications,” on page 63.
Different archive services provide differing storage alternatives (memory, disk, or tape, for example)
and differing alternatives for speed and cost. You can configure multiple archive services for your
GroupWise system.
Archive Service Trusted Applications: Lists the third-party archive services that are available
to your GroupWise system as trusted applications.
Select the archive service that you want to use as the default for your GroupWise system. You
can override the system default on individual post offices.
2 Click OK to save your selection.
The time zone list includes predefined definitions for each time zone. Most time zones include
multiple definitions to account for different locations within the time zone. Each time zone definition
allows you to specify the Daylight Saving Time dates and bias (1 hour, 30 minutes, etc.).
You can modify existing time zone definitions, add new definitions, or delete definitions.
2 Select the time zone to modify, then click Edit to display the Edit Time Zone dialog box.
Example:
Start day: Second Sunday of March at 2:00 am.
Last day: First Sunday of November at 2:00 am.
Bias: 1 hour 0 minutes
4 Click OK to save the changes.
2 Select the time zone to remove from the list, click Delete, then click Yes to confirm the deletion.
The Trusted Application tool allows you to edit and delete trusted applications that are available in
your GroupWise system.
For information about developing and installing trusted applications, search for GroupWise Trusted
Application API at the Novell Developer Kit website (http://developer.novell.com/wiki/index.php/
Category:Novell_Developer_Kit). For security guidelines for managing trusted applications, see
Section 97.7, “Protecting Trusted Applications,” on page 720
1 In the GroupWise Admin console, click System > Trusted Applications, then click New.
IMPORTANT: If you are creating the trusted application for use with the GroupWise Mobility
Service, do not specify an IP address or DNS hostname. For more information, see “GroupWise
Trusted Application” in the GroupWise Mobility Service 2 Installation Guide.
Requires SSL: Select this option to require a secure (SSL) connection between the trusted
application and POAs and GWIAs.
Provides Message Retention Service: Select this option if the purpose of the trusted
application is to retain GroupWise user messages by copying them from GroupWise mailboxes
into another storage medium.
Turning on this option defines the trusted application as a Message Retention Service
application. However, in order for GroupWise mailboxes to support message retention, you must
also turn on the Enable Message Retention Service option in GroupWise Client Options (Tools >
GroupWise Utilities > Client Options > Environment > Retention). You can enable individual
mailboxes, all mailboxes in a post office, or all mailboxes in a domain by selecting the
appropriate object (User, Post Office, or Domain) before selecting Client Options. For more
information, see Chapter 69, “Setting Defaults for the GroupWise Client Options,” on page 549.
For information about how the POA handles trusted application processing of message files, see
Section 15.3.6, “Configuring Trusted Application Support,” on page 154.
1 In the GroupWise Admin console, click System > Trusted Applications to display the Trusted
Applications dialog box.
2 In the Trusted Applications list, select the application you want to edit, then click Edit.
3 Modify the fields as needed for your trusted application, then click Close.
For information about how the POA handles trusted application processing of message files, see
Section 15.3.6, “Configuring Trusted Application Support,” on page 154.
2 In the Trusted Applications list, select the application you want to delete, click Delete, then click
Yes to confirm the deletion.
For more information, see Section 52.2, “Creating GroupWise Accounts by Importing Users from an
LDAP Directory,” on page 455.
List users that are currently being moved and filter the list by domain, post office, and object.
View the current status of the move for each object and see any errors that have occurred.
Immediately retry a move where some of the information on the user inventory list failed to arrive
at the destination post office. By default, the POA retries automatically every 12 hours for seven
days to move all the information included on the user inventory list.
Stop the POA from continuing its automatic retries.
Restart (from the beginning) a move that has stopped before successful completion.
Refresh the list to display current move status and clear completed moves from the list.
For more information, see Section 53.4.4, “Monitoring User Move Status,” on page 466.
For information about using GroupWise Check, see Section 51.1, “GroupWise Check,” on page 435.
For information about using the GroupWise Backup Time Stamp utility, see Section 51.3, “GroupWise
Backup Time Stamp Utility,” on page 446.
For more information about the GroupWise Administration Utility, see “GroupWise Administration
Utility” in the GroupWise 2014 R2 Utilities Reference.
For information about using the GroupWise Database Copy utility, see Section 51.2, “GroupWise
Database Copy Utility,” on page 443.
The GroupWise Address Book plays a central role in a GroupWise user’s experience with addressing
messages. The default configuration of the GroupWise Address Book is often sufficient for a typical
GroupWise system, but a variety of customization options are available to enable the GroupWise
Address Book to meet user needs.
NOTE: In addition to the administrator-controlled changes you can make to the Address Book,
GroupWise users can make individual changes such as creating personal address books, sharing
personal address books, and accessing LDAP address books. For information about the Address
Book functionality available to users, see:
“Contacts and Address Books” in the GroupWise 2014 R2 Client User Guide
“Contacts and Address Books” in the GroupWise 2014 R2 WebAccess User Guide
Name Name
Title
NOTE: Address Book fields in GroupWise WebAccess are set permanently and cannot be changed
by you or by users.
GroupWise client users can add more columns to their own Address Book. In the client, users right-
click the Address Book column header, then select a column from the drop-down list or click More
Columns to display a longer list of possible columns.
NOTE: The Address Book configuration you establish becomes the default configuration for new
GroupWise users in the domain. Changes to Address Book configuration do not affect existing users.
The Address Book Fields list shows all fields that are available for selection in the Address Book
in the GroupWise client.
The Available Fields list shows additional predefined GroupWise user fields that can be added
to the Address Book. LDAP directories also include user information that is not associated to
GroupWise user fields. You can use the Map Additional Fields button to map LDAP directory
user fields to GroupWise fields so that they can be displayed in the GroupWise Address Book.
The preset default sort order for the Address Book is First Name/Last Name. You can change the
default sort order to Last Name/First Name.
1 In the GroupWise Admin console, browse to and click the name of a domain.
2 Click the Address Book tab.
3 In the Sort Address Book By list, select the sort order you want to be the default.
4 Click Save, then click Close to return to the main Admin console window.
1 In the GroupWise Admin console, browse to and click the name of a domain.
2 Click the Address Book tab.
3 In the Address Book Fields list, select a field whose position you want to change, then use the
up-arrow and down-arrow to move the field to its new position.
4 Repeat Step 3 until you have established the field order you want.
5 Click Save, then click Close to return to the main Admin console window.
1 In the GroupWise Admin console, browse to and click the name of a domain.
2 Click the Address Book tab.
3 In the Address Book Fields list, select the field you want to remove, then click the right-arrow to
move the field to the Available Fields list.
The fields in the Available Fields list are not displayed in the Address Book.
4 Repeat Step 3 to remove additional fields you don’t want to use.
5 Click Save, then click Close to return to the main Admin console window.
TIP: To view a user’s detailed information, including the comments field, in the Address Book, select
the user’s address, then click View > Details.
1 In the GroupWise Admin console, browse to and click the name of a domain.
2 Click the Address Book tab.
3 Enable the Do Not Display User Comments option.
4 Click Save, then click Close to return to the main Admin console window.
User
Resource
Group
Nickname
IMPORTANT: Unlike the other objects listed above, nicknames that have been distributed to a post
office do not actually appear in the post office’s Address Book. Users must type the nickname’s
address in the message rather than select it from the Address Book.
1 In the GroupWise Admin console, browse to and click the name of the object, then click the
General tab or the Account tab where the Visibility tab is located.
If information in a post office’s Address Book is out-of-date or missing, you can synchronize the
missing information with the LDAP directory or rebuild the post office database to obtain updated
information from the domain.
1 In the GroupWise Admin console, browse to and click the name of a domain, post office, or user.
2 Click Client Options
3 On the Environment tab, click Address Book.
Because the Address Book updates are stored as records in the post office database, this tool
causes the post office database to grow in size as time passes. Therefore, in the GroupWise Admin
console, you can specify the maximum number of days you want to store the incremental update
records. The longer the incremental update records are stored, the larger the post office database
becomes, which can impact available disk space and backup time. You can also disable this
functionality, if necessary.
1 In the GroupWise Admin console, browse to and click the name of a post office.
2 Click the Settings tab
3 In the Max Age for Address Book Updates field, specify the number of days you want to retain
Address Book update records.
The default is 15 days. The maximum number of days is 90.
4 (Optional) Deselect Create Deltas for Address Book Updates to disable this feature.
5 Click OK to save the setting.
Caching and Remote client users should not deselect Refresh Address Books and Rules Every nn
Days because rules are still downloaded according to this schedule. Even if users do not want to
download their rules, they still should not deselect this option because it turns off the Address Book
delta sync. They can, however, set the option to a greater number of days to cause the download of
the full Address Book to occur less frequently.
By default, users’ preferred email addresses are published to eDirectory only in the format
established in the Preferred Address Format field on the Addressing Formats tab. This
publishes one email address per user in the format established for your GroupWise system.
3 Select additional options to publish additional email addresses, as needed.
4 Click OK to save the address publishing settings.
You can limit wildcard addressing to a specific level (system, domain, or post office) or allow unlimited
wildcard addressing. The default is to limit the wildcard addressing to post office only, meaning that a
user can use wild card addressing to send to all users on his or her post office only. You can change
the default for individual users, post offices, or domains.
With wildcard addressing, the sender only sees whether the item was delivered to a domain, post
office, or system (by viewing the item’s properties). The properties do not show the individual user
names or additional statuses. Recipients can reply to the sender only. Reply to All is unavailable.
NOTE: Wildcard addressing cannot be used for assigning shared folders or shared address books,
granting proxy rights, performing busy searches, or sending routing slips.
Wildcard addressing levels can be applied to a single user, to all users in a post office, or to all users
in a domain.
1 In the GroupWise Admin console, browse to and click the name of a domain, post office, or user.
2 Click Client Options, then click the Send tab.
GroupWise System
You can define the LDAP directories and servers to use with your GroupWise system. You can use
NetIQ eDirectory or Microsoft Active Directory with your GroupWise system. As needed, you can set
up multiple servers to make the directory more accessible throughout your GroupWise system.
User Synchronization: User synchronization transfers modified user information from the
LDAP directory to GroupWise for display in the GroupWise Address Book.
The LDAP directory is the primary location for user information. User information that is synced
from the LDAP directory cannot be modified in the GroupWise Admin console. GroupWise email
addresses can optionally be synced into the LDAP directory.
The MTA performs user synchronization for all users in the domain serviced by the MTA. The
MTA then replicates the user information to all domains in your GroupWise system.
For setup instructions, see Section 6.1.2, “Configuring User Synchronization for an LDAP
Directory,” on page 80.
LDAP Authentication: LDAP authentication requires that GroupWise users provide their
directory (network login) passwords instead of GroupWise passwords in order to access their
mailboxes.
The POA performs LDAP authentication on behalf of the GroupWise client, the WebAccess
Application, and the GWIA when these programs need to authenticate users to GroupWise.
For setup instructions, see “Providing LDAP Authentication for GroupWise Users” on page 153.
Complete the following tasks to configure your LDAP directory for use with GroupWise:
1 In the GroupWise Admin console, click System > LDAP Servers, then click New Directory.
2 Ensure that you know the required information for the LDAP directory that you want to use with
GroupWise.
For more information about SSL, see Section 90.2, “Server Certificates and SSL Encryption,” on
page 699.
IMPORTANT: If you want to use a limited rights user for the eDirectory sync user and want to
import group objects, the sync user needs to have read rights to the CN attribute for group
objects.
Also, if you plan on using LDAP Authentication with Active Directory and want to allow your
users to change their Active Directory password through GroupWise, you must configure SSL for
the LDAP directory object.
3 Fill in the fields, then click Test Connection to verify that you have provided accurate information
about the LDAP directory.
4 Configure user synchronization.
For detailed instructions, see Section 6.1.2, “Configuring User Synchronization for an LDAP
Directory,” on page 80.
5 Click OK to add the LDAP directory to GroupWise.
1 In the GroupWise Admin console, click System > LDAP Servers, then click the name of the
LDAP directory.
User synchronization is configured in the bottom part of the General tab of the Directory object.
ou=users,ou=org_unit,o=organization
cn=users,dc=server_name,dc=company_name,dc=com
3 In the Sync Domain field, select the domain whose MT you want to perform user synchronization
with the LDAP directory.
4 Click Sync to send a task to the MTA to perform user synchronization.
5 Click OK to close the LDAP Servers and Directories dialog box.
You want to configure a pool of LDAP servers to provide redundancy for LDAP authentication.
You want to provide GroupWise users in a remote location with a local LDAP server and
directory replica to facilitate prompt LDAP authentication.
Add one of more LDAP servers to your GroupWise system, then configure a pool of LDAP servers for
each post office.
1 In the GroupWise Admin console, click System > LDAP Servers, then click New LDAP Server.
2 Ensure that you know the required information for the LDAP server that you want to set up for
use with your LDAP directory.
3 Fill in the fields on the General tab, then click the Post Offices tab.
4 Select one or more post offices in the Available Post Offices list, then click the arrow button to
move them into the Selected Post Offices list.
5 Click OK to add the new LDAP server to your GroupWise system.
You might prefer that the POA for a post office first contact specific LDAP servers, contacting other
servers in the pool only if none of the preferred LDAP servers are available.
1 In the GroupWise Admin console, ensure that you have more than one LDAP server set up for
use with GroupWise.
2 Browse to and click the name of a post office, then click the Security tab.
Corresponding Startup Switches: You can also use the --ldappoolresettime startup switch in the
POA startup file to configure the timeout interval.
1 In the GroupWise Admin console, ensure you have provided the basic LDAP information on the
Post Office object Security tab.
IMPORTANT: Do not include any LDAP servers that require an SSL connection. There is
currently no way to specify multiple SSL key files unless you are using pooled LDAP servers. For
more information, see “Configuring a Pool of LDAP Servers” on page 83.
4 Save the POA startup file, then exit the text editor.
5 Stop the POA, then start the POA so that it reads the updated startup file.
GroupWise is a multilingual email product that meets the needs of users around the world. The
following sections provide guidance if your GroupWise system includes users who speak a variety of
languages:
See also Chapter 71, “Supporting the GroupWise Client in Multiple Languages,” on page 597.
Arabic** AR Italian IT
Bulgarian BG Japanese JA
Czech CZ Polish PL
Danish DA Portuguese PT
Dutch NL Russian RU
English EN Slovak* SK
Finnish FI Slovenian* SL
French FR Spanish ES
German DE Swedish SV
Hungarian HU Turkish TR
Language codes are used to identify language-specific files and directories. They are also used as
the values of the client language (/l) startup option. Users can select the languages they want when
they install the GroupWise client.
Users should have at least 200 MB available on their workstations to install the GroupWise client
software in one language. Users need an additional 20 MB of disk space for each additional language
they install.
By default, the GroupWise client starts in the language of the operating system, if it is available. If the
operating system language is not available, the next default language is English. When you start the
GroupWise client, you can use the /l startup switch to override the English default and select an
interface language from those that have been installed.
The online help available in the GroupWise client is provided in all languages into which the client
software is translated. The GroupWise client user guides available from the GroupWise client and on
the GroupWise 2014 R2 Documentation website are translated only into the administration
languages. If you try to access a user guide from a client that is running in a language into which the
user guide has not been translated, you can select any of the available languages.
By default, the GroupWise client uses UTF-8 for MIME encoding. This accommodates the character
sets used by all supported languages.
Language Variant
English Australia
Canada
United Kingdom
United States
French Canada
France
Norwegian Bokma
Norsk
Portuguese Brazil
Portugal
For instructions on selecting the spell checker language variants, see “Selecting the Spell Checker
Language” in the GroupWise 2014 R2 Client User Guide.
For instructions on using these open-source spell checkers with the GroupWise client, see “Adding a
New Spell Checker Language ” in the GroupWise 2014 R2 Client User Guide.
Language Code
English EN
French FR
German DE
Portuguese PT
Spanish ES
Language codes are used to identify language-specific files and directories. They are also used as
the values of the GroupWise agent /language startup switches.
When you select a language for a domain, it determines the sorting order for items in the GroupWise
Address Book. This language becomes the default for post offices that belong to the domain. You can
override the domain language at the post office level if necessary.
For example, if you set the domain and post office language to English, the Address Book items are
sorted according to English sort order rules. This is true even if some users in the post office are
running non-English GroupWise clients such as German or Japanese. Their client interface and Help
files are in German or Japanese, but the sort order is according to English standards.
By default, the agents start in the language selected for the domain. If that language has not been
installed, the agents start in the language used by the operating system. If that language has not
been installed, the agents start in English. You can also use the /language agent startup switch to
select the language for the agent to start in.
The POA also includes language-specific files in all client languages so that information returned from
the POA to the GroupWise client, such as message status and undeliverable messages, is displayed
in the language of the GroupWise client rather than the language in which the POA interface is being
displayed.
Double-byte Asian and Middle Eastern characters should not be used in directory names and file
names within your GroupWise system. This limitation is based on operating system capabilities.
You should also not use double-byte characters in passwords. You can use double-byte
characters in GroupWise user names, domain names, post office names, and so on.
If you choose to use double-byte characters or extended characters such as accented
characters in GroupWise user names or domain names, users must have Preferred E-mail IDs
that contain only characters that are valid in the SMTP RFC. For instructions, see
Section 53.8.3, “Changing a User’s Internet Addressing Settings,” on page 474.
1 In the GroupWise Admin console, browse to and click the name of the domain, post office, or
user where you want to change the maximum mailbox size.
2 Click the Send tab
3 In the MIME Encoding field, select the desired default MIME encoding.
4 Click Save, then click Close to return to the main Admin console window.
GroupWise users can override the default MIME encoding in GroupWise, as described in:
“Changing the MIME Encoding for Email You Send” in the GroupWise 2014 R2 Client User
Guide
“Changing the MIME Encoding of a Message” in the GroupWise 2014 R2 WebAccess User
Guide
Windows Default*
ISO Default*
UTF-8*
Cyrillic KOI8-R*
Japanese Shift-JIS
Korean EUC-KR*
The GWIA also has options for controlling MIME encoding when messages are set to and from the
Internet, as described in:
GroupWise Admin console settings: Section 30.4, “Determining Format Options for Messages,”
on page 298
Startup switches: Section 34.4.4, “Message Formatting and Encoding,” on page 333
On Windows 8:
On Windows 7:
On Windows XP:
1 In the Control Panel, double-click Regional and Language Options, then click Languages.
2 If you receive messages in Chinese, Japanese, or other similar languages, select Install Files
for East Asian Languages.
3 Click OK to install the required language files.
Domains 91
92 GroupWise 2014 R2 Administration Guide
8 Creating a New Domain
8
IMPORTANT: If you are creating a new domain in a clustered GroupWise system, see “Clustering” in
the GroupWise 2014 R2 Interoperability Guide.
The following diagram illustrates the logical organization of a GroupWise system with multiple
domains and post offices. All of the objects under the domain belong to that domain. All of the objects
under a post office belong to that post office.
Typical
GroupWise
System
Post
Internet Post Office
Agent Office Agent
GroupWise Users
Internet Document
GroupWise Users Viewer
Agent
Messages are moved from user to user through your GroupWise system by the GroupWise agents.
As illustrated above, each domain must have a Message Transfer Agent (MTA). The MTA transfers
messages between domains and between post offices in the same domain. Each post office must
have a Post Office Agent (POA). The POA delivers messages to users’ mailboxes and performs a
variety of post office and mailbox maintenance activities.
When you add a new domain to your GroupWise system, links define how messages are routed from
one domain to another. When you add the first secondary domain, the links between the primary and
secondary domains are very simple. As the number of domains grows, the links among them can
become quite complex. Links are discussed in detail in Chapter 10, “Managing the Links between
Domains and Post Offices,” on page 101.
The GroupWise 2014 R2 Installation Guide provides all of the information that you need to create a
new secondary domain on a new domain server:
“Planning a Domain”
“Adding a Secondary Domain”
1 In the GroupWise Admin console, click Domains, then click New > Domain.
2 Use the information that you gathered on the “Secondary Domain Worksheet” in the GroupWise
2014 R2 Installation Guide as you fill in the fields.
Notice that, because you are creating the new domain on a server where a domain already
exists, you cannot use the default port numbers.
3 Click OK to create the new domain.
As your GroupWise system grows and evolves, you might need to perform the following maintenance
activities on domains:
See also Chapter 44, “Maintaining Library Databases and Documents,” on page 407.
1 In the GroupWise Admin console, select the domain in the Connected Domain drop-down list.
1 In the GroupWise Admin console, browse to and click the name of a domain.
2 Click the objects (Post Offices, Users, Groups, and so on) to list objects of each type that belong
to the domain.
3 Click the system tools (Administrators, User Move Status, and so on) to use the tool specifically
in the context of the selected domain.
4 Click the Domain object tabs (General, Address Book, and Internet Addressing) to configure
those aspects of the domain.
5 Click Save, then click Close to return to the main Admin console window.
Managing Domains 95
9.3 Converting a Secondary Domain to a Primary
Domain
You can change which domain is primary if it becomes more convenient to administer the primary
domain from a different location. You can, however, have only one primary domain at a time. When
you convert a secondary domain to primary, the old primary domain becomes a secondary domain.
This task requires direct file access to both domain databases. For that reason, it is not available in
the GroupWise Admin console, which provides direct file access to one domain database through the
Admin Service for that domain. Instead, you use the GroupWise Administration Utility (GWAdminUtil)
to perform the task.
4 Copy the following files from the certificates folder in the old primary domain to the
certificates folder in the new primary domain:
ca.crt
ca.key
ca.srl
ca.crl
issued/*
revoked/*
Linux: /opt/novell/groupwise/certificates
Windows: c:\Program Data\Novell\GroupWise\gwadmin\certificates\<GUID>
5 In the GroupWise Admin console, verify in the list of domains that the Primary Domain icon with
the red underscore is now beside the new domain.
Section 22.2.1, “Securing the Domain with SSL Connections to the MTA,” on page 229
Section 22.2.2, “Restricting Message Size between Domains,” on page 230
Section 25.1, “Optimizing TCP/IP Links,” on page 243
This task requires direct file access to both domain databases. For that reason, it is not available in
the GroupWise Admin console, which provides direct file access to one domain database through the
Admin Service for that domain. Instead, you use the GroupWise Administration Utility (GWAdminUtil)
to perform the task.
1 On your local machine, provide folder access to both the primary domain database and the
secondary domain database.
2 Use the following command to release the domain:
3 On the server where you performed the release, set up the GroupWise Super Admin user for the
new GroupWise system:
4 On the new primary domain server, set up the GroupWise certificate authority for the new
GroupWise system:
gwadminutil ca -d /path_to_new_primary_domain -g
Managing Domains 97
5 Wait for replication of the new GroupWise system information from the primary domain to the
post office.
On each post office server, you can use the following command to view the system name in the
post office database:
6 On each post office server, install a new server certificate so that the local Admin Service can
communicate with the primary domain Admin Service:
For more information about the gwadmintuil command, see Section 2.6, “Using the GroupWise
Administration Utility,” on page 39.
For more information about the GroupWise certificate authority, see Section 90.2.1, “Using a Self-
Signed Certificate from the GroupWise Certificate Authority,” on page 699
This task requires direct file access to both domain databases. For that reason, it is not available in
the GroupWise Admin console, which provides direct file access to one domain database through the
Admin Service for that domain. Instead, you use the GroupWise Administration Utility (GWAdminUtil)
to perform the task.
1 Stop the GroupWise agents and the GroupWise Admin Service for both domains.
2 On your local machine, provide folder access to both the primary domain database and the
secondary domain database.
3 Use one of the following commands to merge the external GroupWise domain into the local
GroupWise system:
The -mergesync option establishes external system synchronization between the local
GroupWise system and any other external systems that were syncing with the external primary
domain.
4 On the new secondary domain server, install a new server certificate so that the local Admin
Service can communicate with the primary domain Admin Service:
6 On each post office server, install a new server certificate so that the local Admin Service can
communicate with the primary domain Admin Service:
7 Start the GroupWise agents and the GroupWise Admin Service for both domains.
NOTE: The principles for merging GroupWise systems are the same for GroupWise 2014 R2 as they
are for GroupWise 2012. For additional information on this topic, see “Merging GroupWise Systems”
in the GroupWise 2012 Multi-System Administration Guide.
Managing Domains 99
100 GroupWise 2014 R2 Administration Guide
10 Managing the Links between Domains
10
When you create a new secondary domain in your GroupWise system or a new post office in a
domain, you configure one direct link to connect the new domain or post office to a domain in your
GroupWise system. For simple configurations, this initial link might be adequate. For more complex
configurations, you must modify link types and protocols to achieve optimum message flow
throughout your GroupWise system.
The following topics help you manage links between domains and post offices:
Direct Links
In a direct link between domains, the source domain’s MTA communicates directly with the
destination domain’s MTA. If it is using a TCP/IP link, the source domain MTA communicates
messages to the destination domain MTA by way of TCP/IP, which does not require disk access by
the source MTA in the destination domain. This is the recommended configuration, and is the only
option for domains on Linux.
If a Windows domain is using a mapped or UNC link, the source domain MTA writes message files
into the destination domain MTA input queue, which does require disk access by the source MTA in
the destination domain. For additional details about the configuration options for direct links, see
Section 10.1.3, “Link Protocols for Direct Links,” on page 104.
Domain A Domain B
TCP/IP
Indirect Links
In an indirect link between domains, the source domain’s MTA routes messages through one or more
intermediate MTAs in other domains to reach the destination domain’s MTA. In other words, an
indirect link is a series of two or more direct links.
In large systems, direct links between each pair of domains might be impractical, so indirect links can
be common. Properly configured links optimize message flow throughout your GroupWise system. A
variety of indirect link configurations are possible, including:
Domain A
TCP/IP TCP/IP
Indirect
Link
Domain B Domain C
Domain 2
Domain 6 Domain 3
Domain 1
Domain 5 Domain 4
If you have more than ten domains, you might want to designate the central domain as a routing
domain. The sole function of a routing domain is to transfer messages between other domains; it has
no post offices of its own. See Section 22.2.3, “Configuring a Routing Domain,” on page 231.
The major drawback of the star configuration is that the central domain is a single point of failure.
Domain 1
Domain 5 Domain 2
Domain 4 Domain 3
An advantage of the two-way ring configuration is that it has no single point of failure. A disadvantage
is that, depending on the size of the system, a message might go through several domains before
arriving at its destination. A two-way ring works well in a system with five domains or less because
transferring a message never requires more than two hops.
Combination Configuration
These three basic link configurations can be combined in any way to meet the needs of your
GroupWise system.
Between a domain and a post office, the link protocol determines how the MTA transfers messages to
the post office. Messages do not flow directly from one post office to another within a domain.
Instead, they are routed through the domain. When you create a new post office, you must specify
which domain it belongs to. This creates the initial domain-to-post-office link.
There are three link protocols for direct links between domains and between a domain and its post
offices:
NOTE: On Linux, TCP/IP links are required. On Windows, they are recommended.
TCP/IP Links
“Domain-to-Domain TCP/IP Links” on page 104
“Domain-to-Post-Office TCP/IP Links” on page 104
drive:\domain_folder
The source MTA writes message files into its output queue at the following location:
drive:\domain_folder\wpcsin
The files are sent as input for the destination domain’s MTA. Because drive mappings are
changeable, you can move the domain folder structure, map its new location to the original drive
letter, and the domain-to-domain link is still intact.
drive:\post_office_folder
The MTA writes message files into its output queue at the following location:
drive:\post_office_folder\wpcsout
The files are sent as input for the post office’s POA. Because drive mappings are changeable, you
can move the post office folder structure, map its new location to the original drive letter, and the
domain-to-post-office link is still intact.
UNC Links
UNC links apply only to domains on Windows servers.
\\server\volume\domain_folder
The source MTA writes message files into its output queue at the following location:
\\server\volume\domain_folder\wpcsin
The files are sent as input for the destination domain’s MTA. Because UNC paths represent absolute
locations on your network, if you move the domain to a new location, you need to edit the link to
match.
\\server\volume\post_office_folder
The MTA writes message files into its output queue at the following location:
\\server\volume\post_office_folder\wpcsout
The files are sent as input for the post office’s POA. Because UNC paths represent absolute locations
in your network, if you move the post office to a new location, you need to edit the link to match.
1 In the GroupWise Admin console, click System > Link Configuration to display the Link
Configuration tool.
The Source column lists all domains in your GroupWise system as the beginning point of links.
The Destination column lists the end point of the links.
2 Click some domains in the Source column to see how the Destination column changes.
The following link type icons display beside domains in the Destination column:
Undefined Stops message flow from the source domain to the destination
domain.
Pending Modification Shows that you have changed link configuration information. You
cannot make further changes until the link configuration
information has been saved.
1 On the Outbound Link tab, click the Link Type drop-down list to change the link type between
the source domain and the destination domain.
The fields appropriate to each link type are provided.
2 Make changes as needed, then click Save.
3 To view the link from the point of view from the destination domain back to the source domain,
click the Inbound tab.
4 Make changes as needed, then click Save.
5 Click Close when you are finished editing domain links.
A Non-GroupWise Domain object represents a non-GroupWise email system. You can set up a non-
GroupWise domain in your GroupWise system so that users and groups in the other email system
can be represented in the GroupWise Address Book.
An External Domain objects represents a domain in another GroupWise system. You can set up an
external domain in your GroupWise system so that users, resources, and groups in the other
GroupWise system can be represented in your GroupWise system. In addition, the other GroupWise
system can set up your GroupWise system as an external domain as well. When both GroupWise
systems have external domains to represent each other, the External System Synchronization tool
can keep both GroupWise Address Books in sync as users, resources, and groups change over time.
1 In the GroupWise Admin console, click System > Link Configuration to display the Link
Configuration tool.
2 Click the non-GroupWise domain to display it’s links.
3 Configure the Gateway link:
Link Type: Select Gateway.
Gateway Link: Select the GWIA.
Return Link: Displays the domain that the non-GroupWise domain is linked to.
4 Click OK to save the changes.
The link from the GroupWise domain to the non-GroupWise domain displays as a gateway link.
5 Click Save, then click Close menu to exit the Link Configuration tool and save your changes.
6 Continue with Creating an External Post Office to Represent an Internet Host.
1 In the GroupWise Admin console, click Post Offices, then click New > External Post Office.
2 Fill in the following fields:
Name: Specify a name to associate the post office with the Internet host. Do not use the fully
qualified hostname.
Domain: Select the non-GroupWise domain.
Time Zone: Select the time zone in which the Internet host is located.
3 Click OK to create the external post office.
4 Click the name of the external post office, then click the Internet Addressing tab.
5 If you want to override the GroupWise system allowed address formats, select Override under
Allowed Address Formats, then select the allowed address formats for this Internet host.
NOTE: If you have only a few users on some Internet hosts, you can create a single external
post office for these users, then define their Internet domain names on the General tabs of the
External User objects instead of on the External Post Office object.
1 In the GroupWise Admin console, browse to and click the name of the external post office, then
click New to add a new external user.
2 In the User Name field, specify the exact user portion of the user’s Internet address.
If the address is [email protected], the portion you would specify is jsmith.
3 Click OK to create the external user.
4 Provide personal information about the external user:
4a Click the name of the new External User object.
4b Fill in the desired fields on the General tab.
Because the user is displayed in the GroupWise Address Book, you might want to define
the user’s first name and last name. This is especially important if the allowed address
formats for the Internet host include first name and last name information.
4c Click OK to save the user’s personal information.
5 Repeat Step 2a through Step 4 for each Internet user that you want to appear in the GroupWise
Address Book.
6 (Conditional) As needed, use the same basic procedure to create external resources to
represent resources in other email systems across the Internet.
7 Continue with Configuring External Users and Resources to Appear in GroupWise Busy
Searches.
1 In the GroupWise Admin console, browse to and click the name of the external user.
2 In the Internet Free/Busy URL field, specify the URL where free/busy schedule status for the
user or resource is published, then click OK.
IMPORTANT: If the external email system is a Microsoft Exchange system, and if the users of the
Exchange system want to synchronize user information with your GroupWise system, you can use
the GroupWise Coexistence Solution to set up bidirectional synchronization between the GroupWise
and Exchange systems. This solution populates the Internet Free/Busy URL field for you, as well as
providing many other capabilities to facilitate GroupWise/Exchange coexistence. For more
information, see the GroupWise/Exchange Coexistence Guide.
In your local GroupWise system, define an external domain that represents the external
GroupWise system. Configure a direct link from a local domain to the external domain. Define
the link type as a Gateway link that uses the GWIA. This allows your local GroupWise system to
deliver messages to the external GroupWise system.
In the external GroupWise system, define an external domain that represents your local
GroupWise system. Configure a direct link from a domain in the external GroupWise system to
the external domain that represents your GroupWise system. Define the link type as a Gateway
link that uses the GWIA. This allows the external GroupWise system to deliver messages to your
local GroupWise system.
If you do not have administrative rights in the other GroupWise system, you must coordinate with
that administrator of the other GroupWise system.
After you have connected the two GroupWise systems, you use the External System Synchronization
tool to exchange user information between the two systems. External System Synchronization
constantly updates the GroupWise Address Books in both systems, so that local users can easily
address messages to and access information about the users in the other GroupWise system.
1 In the GroupWise Admin console, click Domains, then click New > External Domain.
2 Fill in the fields:
Domain Name: Specify a unique name that represents the other GroupWise system.
Link to Domain: Select a local domain where the GWIA is running.
By default, all messages sent to the other GroupWise system are routed through this local
domain. The local domain’s MTA routes the messages to the local GWIA, which connects to the
external GWIA in the other GroupWise system.
Time Zone: Select the time zone where the other GroupWise system is physically located.
The time zone enables GroupWise to adjust appointment times according to local time.
Host: (Conditional) If the external domain represents a domain in the other GroupWise system
where the MTA is directly accessible from your local GroupWise system, specify either the IP
address or the DNS hostname of the external domain server. This provides the location of the
domain database for the external domain.
In this configuration, the MTAs in the two GroupWise systems can directly exchange messages,
rather than having the messages routed through GWIAs.
MTA MTP Port: (Conditional) If applicable, specify the port number on which the MTA in the
external domain listens for messages. The default message transfer port for the MTA is 7100.
3 Click OK to create the external domain that links to the other GroupWise system.
The external domain is added to the list of domains in your GroupWise system.
4 Repeat Step 1 through Step 3 to define an external domain in the other GroupWise system that
represents your local GroupWise system.
If you do not have administrative rights in the other GroupWise system, you must coordinate with
that administrator of the other GroupWise system.
5 Continue with Linking to the External Domain.
The GWIA domain in your GroupWise system must have a Gateway link to the external domain. All
other domains in your GroupWise system have indirect links to the external domain. These links were
configured automatically when the external domain was created.
1 In the GroupWise Admin console, click System > Link Configuration to display the Link
Configuration Tool.
You can see that a domain in your local GroupWise system has a link to the external domain that
represents the other GroupWise system.
2 Configure the link to the external domain:
The rest of the domains in your GroupWise system should have indirect links to the external
domain that represents the other GroupWise system.
4 Repeat Step 1 through Step 3 in the other GroupWise system to establish the Gateway link to
your GroupWise system.
If you do not have administrative rights in the other GroupWise system, you must coordinate with
that administrator of the other GroupWise system.
5 Continue with Synchronizing User Information between External GroupWise Systems.
When you use the External System Synchronization tool, users, resources, and groups in each
GroupWise system appear in the other system’s GroupWise Address Book.
IMPORTANT: The External System Synchronization tool can synchronize GroupWise 8, GroupWise
2012, and GroupWise 2014 R2 systems. It cannot synchronize earlier GroupWise systems.
External System Synchronization lets you control what information (domains, post offices, users,
resources, and groups) that you send to the external GroupWise system and what information you
want to accept from the other GroupWise system. Any user, resource, and group information that you
receive from the other GroupWise system is displayed in the GroupWise Address Book in your
GroupWise system.
External System Synchronization must be set up in both GroupWise systems in order for it to work
properly.
1 In the GroupWise Admin console, click System > External System Synchronization, then click
New to create a new External System Synchronization profile.
As your GroupWise system grows, you must add new post offices.
IMPORTANT: If you are creating a new post office in a clustered GroupWise system, see “Clustering”
in the GroupWise 2014 R2 Interoperability Guide before you create the post office:
Typical
GroupWise
System
Post
Internet Post Office
Agent Office Agent
GroupWise Users
Internet Document
GroupWise Users Viewer
Agent
As illustrated above, each post office must have a Post Office Agent (POA) running for it. The POA
delivers messages to users’ mailboxes and performs a variety of post office and mailbox
maintenance activities.
Physically, a post office consists of a set of folders that house all the information stored in the post
office. The post office folder contains user mailboxes and messages, as well as other vital
information. For an overview, see Section 14.3, “Information Stored in the Post Office,” on page 135.
1 In the GroupWise Admin console, click Post Offices, then click New > Post Office.
2 Use the information that you gathered on the “Post Office Worksheet” in the GroupWise 2014 R2
Installation Guide as you fill in the fields.
IMPORTANT: If you are creating the new post office on a server where a post office already
exists, you cannot use the default port numbers.
As your GroupWise system grows and evolves, you might need to perform the following maintenance
activities on post offices:
See also Chapter 42, “Maintaining Domain and Post Office Databases,” on page 395 and Chapter 48,
“Backing Up GroupWise Databases,” on page 423.
Proper database maintenance and backups allow recovery from accidental deletions. For more
information, see Section 49.5, “Restoring Deleted Mailbox Items,” on page 427 and Section 49.6,
“Recovering Deleted GroupWise Accounts,” on page 430.
1 In the GroupWise Admin console, browse to and click the name of the post office.
2 Click the objects (Users, Groups, Resources, and so on) to list objects of each type that belong
to the post office.
3 Click the system tools (Administrators, User Move Status, and so on) to use the tool specifically
in the context of the selected post office.
4 Click the tabs (General, Settings, Client Settings, Security, and Internet Addressing) to
configure those aspects of the post office.
5 Click Save, then click Close to return to the main Admin console window.
Functional mailbox size is computed by adding the bytes occupied by individual messages. Users are
notified when they exceed the functional mailbox size limit that you have set for them. Users can then
identify items to delete or archive.
GroupWise client users can use Tools > Check Mailbox Size to list items in the Trash folder, the
Sent Items folder, the Mailbox folder, the Work in Progress folder, and any personal items. Item
size is displayed in bytes and the list is sorted from largest to smallest, to easily identify
candidates for deletion or archiving.
WebAccess users always have the Size column visible.
When users have deleted or archived sufficient items, their functional mailbox size limit problem is
resolved.
As an administrator, you want to set functional mailbox size limits that are reasonable for users and
that make efficient use of the physical disk space that you have available. You are more concerned
about physical disk space usage in the post office. Physical disk space usage is much more complex
than counting the bytes occupied by individual messages.
In a typical post office, 85% of disk space is occupied by attachments in the offiles folder
structure. Attachments are compressed by 40% to allow more data to be stored in less space.
A large message sent to multiple users in the same post office is only stored on disk once, but
counts against mailbox size for all recipients. If it is sent to multiple post offices, a copy is stored
in each post office
A large group can cause even a small message to take up substantial disk space. If all recipients
are in the same post office, only one copy is stored, but if there are recipients in multiple post
offices, a copy is stored in each post office
User databases (userxxx.db files) might contain large numbers of contacts and folders.
Contacts and folders affect the size of the user databases, which have a maximum size of 4 GB,
but do not count against the mailbox size for users.
Shared folders count only against the owner’s mailbox size, even though sharing with users in
other post offices uses disk space in those post offices as well.
A message is stored until the last recipient deletes and empties it. As a result, you might attempt
to reduce post office disk space usage by reducing certain users’ mailboxes, but disk space
usage does not change. This can occur because large messages eliminated from the reduced
mailboxes still exist in other mailboxes.
Because of the complexity of these factors, you might consider a progressive strategy to determine
the appropriate functional mailbox limits for your users.
To set mailbox limits in a new post office, skip to Section 13.3.3, “Setting Mailbox Size Limits,” on
page 123.
For an existing post office, where users have never had functional mailbox limits set in the past,
continue with Preparing to Implement Disk Space Management.
1 In the GroupWise Admin console, browse to and click the name of the post office.
2 Click Maintenance > Mailbox/Library Maintenance.
3 In the Action field, select Analyze/Fix Databases.
4 As options to the action, select Content, Fix Problems, and Update User Disk Space Totals.
Ensure that all other options are deselected.
5 On the Databases tab, select User.
Ensure that all other types of databases are deselected.
6 Click OK.
After the POA has performed the task, current mailbox size information becomes available on
each user’s mailbox. The information is updated regularly as the user receives and deletes
messages.
7 To generate a report of current mailbox information, follow the instructions in Section 46.1,
“Gathering Mailbox Statistics,” on page 415.
8 Repeat Step 1 through Step 7 for each post office where you want to implement disk space
management.
9 Continue with Setting Mailbox Size Limits.
If you are implementing disk space management in an existing GroupWise system where users are
accustomed to unlimited disk space, you should warn them about the coming change. After you
establish the mailbox size limits as described in this section, users whose mailboxes exceed the
established limit cannot send messages until the size of their mailboxes is reduced. Users might want
to manually delete and archive items in advance in order to avoid this interruption in their use of
GroupWise.
1 In the GroupWise Admin console, browse to and click the name of a domain, post office, or user.
2 Click Client Options.
3 Click the Send tab, then click Disk Space Management.
4 Select User Limits.
5 Specify the maximum number of megabytes allowed for each user’s mailbox.
For guidance in setting mailbox size limits, visit the GroupWise Best Practices Wiki (http://
wiki.novell.com/index.php/GroupWise).
The maximum size limit that you can set for mailboxes is 4 GB.
6 Specify as a percentage the point where you want to warn users that their mailboxes are getting
full.
After users receive a warning message, they can continue to send messages until the size limit
is reached. After the size limit is reached, users must reduce the size of their mailboxes in order
to send additional messages.
7 (Optional) Specify in kilobytes the largest message that users can send.
IMPORTANT: By restricting message size, you can influence how fast users’ mailboxes fill up.
However, if users have valid reasons for sending messages that exceed this limit, the limit can
become a hindrance to users getting their work done.
When users archive and empty messages in their mailboxes, the messages are marked for removal
from the database (“expired”), but the disk space that the expired messages occupied in the
databases is retained and used again for new messages. As a result, archiving and deleting
messages does not affect the overall size of the databases.
1 In the GroupWise Admin console, browse to and click the name of the post office.
2 Click Maintenance > Mailbox/Library Maintenance.
3 In the Actions drop-down list, click Expire/Reduce Messages.
4 In the Action field, select Expire/Reduce.
To see how setting a mailbox size limit affects user activities in the GroupWise client, see “Using
Mailbox Storage Size Information” in the GroupWise 2014 R2 Client User Guide.
For HTML-formatted messages, the MIME portion of the message counts in the message size. MIME
files can be large. If a user cannot send an HTML-formatted message, he or she could use plain text
instead, in order to decrease the size of the message so that it falls within the message size
restriction.
There are four levels at which you can restrict message size:
1 In the GroupWise Admin console, browse to and click the name of a domain, post office, or user.
2 Click Client Options.
3 Click the Send tab, then click Disk Space Management.
4 Select User Limits.
5 Specify in kilobytes the largest message that users can send.
6 Click OK, then click Close to save the maximum message size setting.
13.3.6 Preventing the Post Office from Running Out of Disk Space
In spite of the best disk space management plans, it is still possible that some unforeseen situation
could result in a post office running out of disk space. To prevent this occurrence, you can configure
the POA to stop processing messages, so that disk space usage in the post office cannot increase
until the disk space problem is resolved.
1 In the GroupWise Admin console, browse to and click the name of the post office.
2 Click the Maintenance tab, then adjust the settings in the Disk Check Interval and Disk Check
Delay fields.
For more information, see Section 15.4.2, “Scheduling Disk Space Management,” on page 156.
3 Click the Scheduled Events tab
The Default Disk Check Event triggers a Reduce on user and message databases at 2048 KB (2
GB) and stop mail processing at 200 MB. You can edit the Default Disk Check actions so that all
post offices are affected, or you can create a new set of Disk Check Event actions to assign to
specific post offices.
4 Click Create to create a new scheduled event to handle an unacceptably low disk space
condition.
5 Type a unique name for the new scheduled event, then select Disk Check as the event type.
6 In the Trigger Actions At field, specify the amount of free post office disk space at which to take
preventive measures.
7 Click New to define your own disk check actions, then give the new action a unique name.
8 Configure the actions for the POA to take in order to relieve the low disk space condition.
Use the Results or Notification tab if you want to receive notification about the POA’s response
to the low disk space condition.
9 Click OK to return to the Create Scheduled Event dialog box.
10 In the Stop Mail Processing At field, specify the amount of free post office disk space at which
you want the POA to stop processing messages.
11 Click OK to create the new disk space management event and return to the Scheduled Events
tab.
12 Select the new disk space management event.
For additional instructions, see Section 15.4.2, “Scheduling Disk Space Management,” on
page 156.
13 Click Save, then click Close to return to the main Admin console window.
For an overview of Caching mode, see “Using Caching Mode” in the GroupWise 2014 R2 Client User
Guide.
When you initially force caching mode, users’ Caching mailboxes are identical with their Online
mailboxes. However, as you employ disk space management processes in the post office and reduce
the size of users’ Online mailboxes, more and more of the users’ mailbox items exist only in their
Caching mailboxes.
IMPORTANT: Ensure that users understand their responsibilities to back up their Caching mailboxes.
For more information, see “Backing Up Email” in the GroupWise 2014 R2 Client User Guide.
1 In the GroupWise Admin console, browse to and click the name of a domain, post office, or user.
2 Click Client Options.
3 On the Environment tab, click Client Access.
4 In the Client Login Mode box, select Force Use of Caching Mode.
5 Click OK to save the Caching mode setting.
If you are helping existing users, who might have sizeable mailboxes, to start using Caching mode
exclusively, you can configure the POA to respond efficiently when multiple users need to download
their entire mailboxes for the first time. See Section 15.2.5, “Supporting Forced Mailbox Caching,” on
page 149 for setup instructions.
Which mailboxes have been accessed using Full Licenses and which mailboxes have been
accessed using Limited Licenses. A mailbox is considered to be a Full License mailbox if a user
has logged in with the GroupWise client in the last 60 days.
Which mailboxes are active (have been accessed at least one time), which ones have never
been active, and which ones have been inactive for a specified period of time. The time period
for measuring account activity is established by the Log Accounts without Activity for Previous
setting when you run an audit report.
Mailbox size, last login time, and last client type for all active mailboxes.
The client type of each active license for each user is set by using Client Options > Environment
> Client Access on Domain, Post Office, and User objects.
A mailbox requires a Full License if it has been accessed by any of the following:
A mailbox requires only a Limited License if access to it has been limited to the following:
A mailbox is considered active for licensing purposes if its owner has performed at least one of the
following actions in the mailbox:
Sending a message
Opening a message
Deleting a message
Accessing the mailbox from a non-GroupWise client (for example, a POP3 email client) through
the GWIA
A mailbox is considered inactive for licensing purposes even if its owner has performed one or more
of the following actions (or similar actions):
Starting and stopping the GroupWise client without doing anything in the mailbox
Making changes under Tools > Options
Creating, modifying, or deleting rules
Granting proxy access so that a user other than the mailbox owner is performing tasks that
would otherwise indicate an active mailbox
A GroupWise 2014 R2 mailbox can be marked Inactive on the User object Account tab. An older
GroupWise mailbox cannot be marked Inactive.
1 In the GroupWise Admin console, browse to and click the name of the post office.
2 Click Maintenance > Mailbox/Library Maintenance.
3 In the Action field, select Audit Report.
4 In the Log Accounts without Activity for previous xx Days field, select the number of days you
want to use for the inactivity report.
Audit reports are stored as part of the information available on Post Office and Domain objects in the
GroupWise Admin console. Browse to and click the name of a Domain or Post Office object, then
click Diagnostics > Information. The information stored on the Domain object is cumulative for all
post offices in the domain for which audit reports have been run.
Audit reports can also be scheduled to run on a regular basis by properly configuring the POA to
perform a Mailbox/Library Maintenance event. See Section 15.4.1, “Scheduling Database
Maintenance,” on page 154.
To help you control which versions of the GroupWise client are being used to access the post office,
you can specify a required GroupWise client version for the post office. Any version that does not
match the required minimum version is locked out.
1 In the GroupWise Admin console, browse to and click the name of the post office.
2 Click the Client Settings tab.
3 Fill in the following fields:
Minimum Client Release Version: Specify the version to use as the post office’s preferred
GroupWise client version. Any version that does not match the preferred version is highlighted
on the POA console’s C/S Users page. Older versions are shown in red, and newer versions are
shown in blue. The version number syntax should match what is displayed in the GroupWise
client’s About GroupWise dialog box.
Minimum Client Release Date: This field is available only if you specify a release version. You
can use this field to associate an expected release date with the release version. The C/S Users
page highlights any dates that do not match the one entered here.
4 Click Save to save the changes.
The POA performs the LDAP authentication for users in the post office. For setup instructions, see
Section 15.3.4, “Providing LDAP Authentication for GroupWise Users,” on page 153.
A post office must be disabled if you are rebuilding the post office database (wphost.db). You might
also want to disable a post office when you are doing a complete GroupWise system backup. That
ensures that all data is consistent at the time of the backup.
1 In the GroupWise Admin console, browse to and click the name of the post office.
2 Click the Client Settings tab.
3 Select Disable Logins, then click Save to disable the post office.
4 (Conditional) To re-enable logins and make the post office available again, deselect Disable
Logins, then click Save to re-enable the post office.
1 In the GroupWise Admin console, browse to and click the name of the post office to delete.
2 Move or delete any resources that still belong to the post office.
See Section 58.4, “Moving a Resource,” on page 503 and Section 58.6, “Deleting a Resource,”
on page 504. You must more or delete resources before users, because users who own
resources cannot be deleted without assigning a new owner in the same post office.
3 Move or delete any users that still belong to the post office.
See Section 53.4, “Moving GroupWise Accounts,” on page 464 and Section 53.14, “Removing
GroupWise Accounts,” on page 476.
4 Delete any groups that still belong to the post office.
See Section 56.9, “Deleting a Group,” on page 493.
5 Delete any libraries that still belong to the post office.
See Section 64.4.4, “Deleting a Library,” on page 527.
6 Click More > Delete to delete the post office.
7 When prompted, click Yes to delete the corresponding post office folder structure.
The post office is deleted from the domain. The POA and DVA services associated with the post
office are also deleted.
8 (Conditional) If applicable, uninstall the POA software.
See the following sections in the GroupWise 2014 R2 Installation Guide:
“Uninstalling the Linux GroupWise Agents and Applications”
“Uninstalling the Windows GroupWise Agents and Applications”
Section 15.3.3, “Securing the Post Office with SSL Connections to the POA,” on page 152
Section 15.3.4, “Providing LDAP Authentication for GroupWise Users,” on page 153
Section 15.3.5, “Configuring Intruder Detection,” on page 153
Section 15.2.2, “Supporting IMAP Clients,” on page 147
Section 15.2.3, “Supporting SOAP Clients,” on page 148
Section 18.1, “Optimizing Client/Server Processing,” on page 171
Section 15.4.1, “Scheduling Database Maintenance,” on page 154
Chapter 14, “Understanding Message Delivery and Storage in the Post Office,” on page 135
Chapter 15, “Configuring the POA,” on page 143
Chapter 16, “Managing the POA,” on page 159
Chapter 17, “Monitoring the POA,” on page 163
Chapter 18, “Optimizing the POA,” on page 171
Chapter 19, “Managing Indexing of Attachment Content,” on page 177
Chapter 20, “Using POA Startup Switches,” on page 183
For a complete list of port numbers used by the POA, see Appendix A, “GroupWise Port Numbers,”
on page 729.
For detailed Linux-specific POA information, see Appendix C, “Linux Basics for GroupWise
Administration,” on page 741.
Typical
GroupWise
System
Post
Internet Post Office
Agent Office Agent
GroupWise Users
Internet Document
GroupWise Users Viewer
Agent
Message Header: The message header contains addressing information including the sender’s
address, recipient’s address, message priority, status level, and a pointer that links the header to
the message body.
Message Body: The message body contains the message text in an encrypted format and a
distribution list containing user names of the sender and recipients.
File Attachments (optional): File attachments can be any type of file that is attached to the
message.
The message store consists of folders and databases that hold messages. The message store is
shared by all members of the post office so only one copy of a message and its attachments is stored
in the post office, no matter how many members of the post office receive the message. This makes
the system more efficient in terms of message processing, speed, and storage space.
User Databases
Each member of the post office has a personal database (userxxx.db) which represents the user’s
mailbox. The user database contains the following:
When a member of another post office shares a folder with one or more members of the local post
office, a “prime user” database (puxxxxx.db) is created to store the shared information. The “prime
user” is the owner of the shared information.
Local user databases and prime user databases are stored in the ofuser folder in the post office.
Message Databases
Each member of the post office is arbitrarily assigned to a message database (msgnnn.db) where the
body portions of messages are stored. Many users in a post office share a single message database.
There can be as many as 255 message databases (numbered 0 through 254) in a post office.
Message databases are stored in the ofmsg folder in the post office.
Outgoing messages from local senders are stored in the message database assigned to each
sender. Incoming messages from users in other post offices are stored in the message database that
corresponds to the message database assigned to the sender in his or her own post office. In each
case, only one copy of the message is stored in the post office, no matter how many members of the
post office it is addressed to.
Attachments Folder
The attachments folder (offiles) contains subfolders that store file attachments, message text, and
distribution lists that exceed 2 KB. Items of this size are stored more efficiently as files than as
database records. The message database contains a pointer to where each item is found.
The guardian database is vital to GroupWise functioning. Therefore, the POA has an automated fall-
back and roll-forward process to protect it. The POA keeps a known good copy of the guardian
database called ngwguard.fbk. Whenever it modifies the ngwguard.db file, the POA also records the
transaction in the roll-forward transaction log called ngwguard.rfl. If the POA detects damage to the
ngwguard.db file on startup or during a write transaction, it goes back to the ngwguard.fbk file (the
“fall back” copy) and applies the transactions recorded in the ngwguard.rfl file to create a new, valid
and up-to-date ngwguard.db.
In addition to the POA fall-back and roll-forward process, you should still back up the ngwguard.db,
ngwguard.fbk, and ngwguard.rfl files regularly to protect against media failure. Without a valid
ngwguard.db file, you cannot access your email. With current ngwguard.fbk and ngwguard.rfl files,
a valid ngwguard.db file can be rebuilt should the need arise.
The MTA typically has a TCP/IP link to the post office. The MTA transfers user messages to the POA
by way of TCP/IP. The POA then stores the messages in the MTA output queue on behalf of the MTA,
so the MTA does not need write access to the post office.
The post_office\wpcsout\ofs subfolder is where the MTA transfers user messages for delivery by
the POA to users’ mailboxes in the local post office.
The MTA post_office\wpcsout\ads subfolder is where the MTA transfers administrative messages
instructing the POA admin thread to update the post office database (wphost.db).
The post_office\wpcsout\ofs subfolder is where the POA picks up user messages deposited
there by the MTA and updates the local message store, so users receive their messages.
The post_office\wpcsout\ads subfolder is where the POA admin thread picks up administrative
messages deposited there by the MTA and updates the post office database (wphost.db).
The dmsh.db file is a database shared by all libraries in the post office. It contains information about
where each library in the post office is located.
Each library has its own subfolder in the gwdms folder. In each library folder, the dmxxnn01-FF.db files
contain information specific to that library, such as document properties and what users have rights to
access the library.
A document storage area might be located in the post office folder structure, or in some other location
where more storage space is available. If it is located in the post office, the document storage area
can never be moved. Therefore, storing documents in the post office folder structure is not usually
recommended. If it is stored outside the post office, a document storage area can be moved when
additional disk space is required.
The following sections help you understand the various functions of the POA:
When using client/server access mode, the GroupWise client can be configured to control how much
time it spends actually connected to the POA.
For more information about the client modes available with client/server access mode, see “Using
Caching Mode” and “Using Remote Mode” in the GroupWise 2014 R2 Client User Guide
In client/server access mode, the POA is enabled for secure SSL connections by default. If
necessary, you can configure the POA to force SSL connections with all clients. See Section 15.3.3,
“Securing the Post Office with SSL Connections to the POA,” on page 152.
The POA picks up the message files and updates all user and message databases to deliver
incoming messages in the local post office. To provide timely delivery for a large volume of incoming
messages, see Section 18.2, “Optimizing Message File Processing,” on page 173.
For POA system requirements, see “Hardware and Operating System Requirements” in the
GroupWise 2014 R2 Installation Guide. The POA is automatically installed and started when you
create a new post office.
As your GroupWise system grows and evolves, you might need to modify POA configuration to meet
the changing needs of the post office it services. The following topics help you configure the POA:
Section 15.1, “Performing Basic Configuring the POA in the GroupWise Admin Console
POA Configuration,” on page 143 Binding the POA to a Specific IP Address
Configuring the POA for Remote Server Login (Windows Only)
Section 15.2, “Configuring User Simplifying Client Access with a GroupWise Name Server
Access to the Post Office,” on Supporting IMAP Clients
page 145 Supporting SOAP Clients
Checking What GroupWise Clients Are in Use
Supporting Forced Mailbox Caching
Restricting Message Size between Post Offices
Supporting Calendar Publishing
Section 15.3, “Configuring Post Securing Client Access through an External Proxy Server
Office Security,” on page 150 Controlling Client Redirection Inside and Outside Your Firewall
Securing the Post Office with SSL Connections to the POA
Providing LDAP Authentication for GroupWise Users
Configuring Intruder Detection
Configuring Trusted Application Support
For an example of why you might need to create a second POA object, see Section 15.3.2,
“Controlling Client Redirection Inside and Outside Your Firewall,” on page 151.
1 In the GroupWise Admin console, click Post Office Agents > New.
2 Specify a unique name for the new POA object.
3 Select the post office that you are creating a new POA object for.
4 Specify the IP address or DNS hostname of the post office server.
5 (Conditional) If more than one POA will run on the same server, use new unique port numbers
for the new POA.
6 (Conditional) If the new POA will run on a remote server:
6a Install the GroupWise Server component on the remote server.
6b Create the POA service:
Corresponding Startup Switches: You can also use the --ip and --mtpoutport startup switch in the
POA startup file to establish an exclusive bind to the specified IP address.
1 In the GroupWise Admin console, browse to and click the name of the post office that includes
remote components.
2 Click the Settings tab.
3 In the Remote File Server Settings section, provide the user name and password that the POA
can use to log in to the remote Windows server where post office components are located.
4 Click Save, then click Close to return to the main Admin console window.
Required Hostnames
The primary GroupWise name server must be designated using the hostname ngwnameserver. You
can also designate a backup GroupWise name server using the hostname ngwnameserver2.
6 Create an entry for the IP address of the first POA and give it the hostname ngwnameserver.
7 If you want a backup name server, create an entry for the IP address of the second
POA and give it the hostname ngwnameserver2.
You must use the hostnames ngwnameserver and ngwnameserver2. Any other hostnames are
not recognized as GroupWise name servers.
8 Save your changes.
As soon as the hostname information replicates throughout your system, GroupWise client users can
start the GroupWise client without specifying a TCP/IP address and port number.
NOTE: IMAP clients connecting to your GroupWise system from outside your firewall must connect
through the GWIA, rather than through the POA. Connecting directly through the POA provides faster
access for internal IMAP clients. For more information, see Section 31, “Configuring POP3/IMAP4
Services,” on page 307.
Corresponding Startup Switches: You can also use the --imap, --imapmaxthreads, --imapport,
--imapssl, and --imapsslport startup switches in the POA startup file to configure the POA to support
IMAP clients. In addition, you can use the --imapreadlimit and --imapreadnew startup switches to
configure how the POA downloads messages to IMAP clients.
POA Console: You can see whether IMAP is enabled on the Configuration page under the General
Settings heading.
Corresponding Startup Switches: You can also use the --soap, --soapmaxthreads, --soapport,
--soapssl, and --soapthreads startup switches in the POA startup file to configure the POA to support
SOAP clients. In addition, you can use the --evocontrol startup switch to configure the POA to allow
only specified versions of Evolution to connect to the post office.
POA Console: You can see whether SOAP is enabled on the Configuration page under the General
Settings heading.
POA Console: On the Status page of the POA console, click C/S Users to display the Current Users
page, which lists all GroupWise users who are currently accessing the post office. Users who are
running GroupWise clients older than the approved version and/or date are highlighted in red in the
list. Users who are running newer versions are shown in blue.
When client users change to Caching mode, the contents of their mailboxes must be copied to their
hard drives. This process is called “priming” the mailbox. If users individually decide to use Caching
mode, the POA easily handles the process.
If you force all users in the post office to start using Caching mode, as described in “Allowing or
Forcing Use of Caching Mode” on page 544, multiple users might attempt to prime their mailboxes at
the same time. This creates a load on the POA that can cause unacceptable response time for other
users.
Corresponding Startup Switches: You can also use the --primingmax switch in the POA startup file
to configure the POA to handle multiple requests to prime mailboxes.
POA Console: If the POA console is password protected as described in Section 16.1, “Configuring
the POA Console,” on page 159, you can change the POA’s ability to respond to caching requests for
the current POA session on the Configuration page. Under the Client/Server Settings heading, click
Max Thread Usage for Priming and Live Moves. To increase the number of client/server threads,
click Client/Server Processing Threads under the Performance Settings heading.
1 In the GroupWise Admin console, browse to and click the name of a domain.
2 Click Post Office Links, then click the name of the post office.
3 In the Maximum Send Message Size field, specify in megabytes the size of the largest message
you want users to be able to send outside the post office, then click OK.
A setting of 0 (zero) indicates that no size limitations have been set.
Delivery disallowed
The notification message also includes the subject of the original message. This message provides
information to the user about why and where the message was disallowed. However, the message is
still delivered to recipients in the sender’s own post office.
There are additional ways to restrict the size of messages that users can send, as described in
Section 13.3.5, “Restricting the Size of Messages That Users Can Send,” on page 125.
Corresponding Startup Switches: You can also use the --mtpsendmax startup switch in the POA
startup file to restrict message size.
POA Console: You can view the maximum message size on the Configuration page. If the POA
console is password protected as described in Section 16.1, “Configuring the POA Console,” on
page 159, you can change the maximum message size for the current POA session using the
Message Transfer Protocol link on the Configuration page.
If the POA is configured with both an internal IP address and an external proxy IP address, the POA
returns both IP addresses to the GroupWise client when it attempts to log in. The client tries the
internal address first, and if that does not succeed, it tries the external proxy address, then it records
which address succeeded. If the user moves from inside the firewall to outside the firewall, the client
might fail to log in on the first attempt, but succeeds on the second attempt.
POA Console You can list all POAs in your GroupWise system, along with their external IP
addresses. On the Configuration page, click IP Addresses Redirection Table under the General
Settings heading.
A POA that is configured with both an internal IP address and an external IP address automatically
redirects internal users to internal IP addresses and external users to external IP addresses.
However, if you want to control which users are redirected to which IP addresses based on criteria
other than user location, you can configure a post office with one POA to always redirect users to
internal IP addresses and a second POA to always redirect users to external IP addresses. Users are
then redirected based on which POA IP address they provide in the GroupWise Startup dialog box
when they start the GroupWise client to access their mailboxes.
1 Configure the initial POA for the post office with the IP address that you want for internal users.
Do not fill in the External IP Address field on the Agent Settings tab of the POA object.
2 Create a second POA object in the post office and give it a unique name, such as POA_EXT.
For instructions, see Section 15.1.1, “Creating a New POA in the GroupWise Admin Console,”
on page 144.
3 Configure this second POA with an external IP address.
For instructions, see Section 15.3.1, “Securing Client Access through an External Proxy Server,”
on page 150.
Do not fill in the TCP/IP Address field on the Agent Settings tab of the POA object.
4 Start the new instance of the POA.
5 Give users that you want to be redirected to internal IP addresses the IP address you used in
Step 1.
6 Give users that you want to be redirected to external IP addresses the IP address you used in
Step 3.
For background information about SSL and how to set it up on your system, see Section 90.2,
“Server Certificates and SSL Encryption,” on page 699.
IMPORTANT: To prevent closed links between agents, select Enabled when you are initially
configuring agents for SSL. Select Required for tighter security only after all agents are
successfully using SSL.
7 To enable or require SSL for other protocols, scroll down the Agent Settings tab to the SSL fields
and select the desired SSL settings.
8 Click Save, then click Close to return to the main Admin console window.
POA Console: You can view SSL information for the POA on the Status and Configuration pages. In
addition, when you list the client/server users that are accessing the post office, SSL information is
displayed for each user.
By enabling LDAP authentication for the POA, users’ password information can be retrieved from an
LDAP directory such as NetIQ eDirectory and Microsoft Active Directory. For background information
about LDAP, see Section 91.2, “Authenticating to GroupWise with Passwords Stored in an LDAP
Directory,” on page 703.
When you enable LDAP authentication, it is important to provide fast, reliable access to the LDAP
directory because GroupWise client users cannot access their mailboxes until they have been
authenticated.
1 In the GroupWise Admin console, browse to and click the name of the post office.
2 Click the Client Settings tab.
3 Specify how many unsuccessful login attempts are allowed before the user is locked out.
The default is 5; valid values range from 3 to 10.
4 Specify in minutes how long unsuccessful login attempts are counted.
The default is 15; valid values range from 15 to 60.
5 Specify in minutes how long the user login is disabled.
The default is 30; the minimum setting is 15.
6 Click Save, then click Close to return to the main Admin console window.
Corresponding Startup Switches: You can also use the --intruderlockout, --incorrectloginattempts,
--attemptsresetinterval, and --lockoutresetinterval startup switches in the POA startup file to configure
the POA for intruder detection.
POA Console: You can view current intruder detection settings on the Configuration page. If the
POA console is password protected as described in Section 16.1, “Configuring the POA Console,” on
page 159, you can change the settings by clicking the Intruder Detection link. You cannot disable
intruder detection from the POA console.
For background information about setting up trusted applications, see Section 4.22, “Trusted
Applications,” on page 63.
Default Daily Maintenance Event: The default daily maintenance event occurs at 2:00 a.m.
The POA performs a Structure check on user, message, and document databases and fixes any
problems it encounters.
Default Weekly Maintenance Event: The default weekly maintenance event occurs on
Saturday at 3:00 a.m. The POA runs and Audit Report and a Content check. The Audit report
lists the type of license (full vs. limited) each mailbox requires and which mailboxes haven't been
accessed for at least 60 days. The Content check verifies pointers from user databases to
messages in message databases and pointers from message databases to attachments in the
offiles folder structure, and fixes any problems it encounters.
You can modify the default database maintenance events, or create additional database maintenance
events for the POA to perform on a regular basis.
Structure User
Index check Message
Contents Document
Collect statistics
Logging
Attachment file check
Fix problems Log file
Update user disk space totals Verbose log level
For more detailed descriptions of the actions, click Help in the Scheduled Event Actions dialog
box. See also:
Chapter 43, “Maintaining User/Resource and Message Databases,” on page 403
Chapter 44, “Maintaining Library Databases and Documents,” on page 407
6 Select and configure the database maintenance action to perform for the database maintenance
event., then click OK to return to the Scheduled Events tab.
7 Click Save, then click Close to return to the main Admin console window.
POA Console You can see what database maintenance events the POA is scheduled to perform at
the bottom of the Configuration page.
You can modify this default disk space management event, or create additional disk space
management events for the POA to perform on a regular basis.
For more detailed descriptions of the actions, click Help in the Scheduled Event Actions dialog
box. See also Chapter 46, “Managing Database Disk Space,” on page 415.
12 Select and configure the disk space management action to perform.
13 Click OK to return to the Scheduled Events tab.
14 Click Save, then click Close to return to the main Admin console window.
You might want to create several disk space management events with different triggers and actions.
For some specific suggestions on implementing disk space management, see Section 13.3,
“Managing Disk Space Usage in the Post Office,” on page 121.
POA Console You can view the currently scheduled disk check events on the Scheduled Events
page.
The upkeep performed is determined by the settings located in each user’s Cleanup options (User
object > Client Options > Environment Options > Cleanup). Auto-Delete is run by the POA during
user upkeep, but Auto-Archive is run by the client as soon as the user accesses his or her mailbox. In
Caching mode, Auto-Delete is also run by the client.
Unread items such as messages and upcoming appointments are not deleted. However, unread
calendar items such as appointments, reminder notes, and tasks that are scheduled in the past are
deleted.
Although user upkeep includes deletion activities, it does not necessarily reduce mailbox disk space
usage. To reduce disk space usage, see Section 13.3, “Managing Disk Space Usage in the Post
Office,” on page 121.
Synchronization of personal address books with the GroupWise Address Book enables the latest
contact information to be synchronized to users’ mobile devices when a synchronization solution
such as GroupWise Mobility Service has been implemented. When users copy contacts from the
GroupWise Address Book to personal address books, changes made in the GroupWise Address
Book are mirrored in personal address books and, therefore, are available for synchronization to
mobile devices. However, changes to copied contacts made on mobile devices are not retained in
GroupWise because the contact information from the GroupWise Address Book always overrides the
contact information of the copied contacts.
You can change the time of day when the POA takes care of these user upkeep activities.
Corresponding Startup Switches: You can also configure nightly user upkeep using startup
switches in the POA startup file. By default, nightly user upkeep is enabled. Use the --nuuoffset and
--rdaboffset switches to specify the start times.
POA Console: You can view the current user upkeep schedule on the Scheduled Events page.
Corresponding Startup Switches: You can also use the --httpport, --httpuser, --httppassword, and
--httpssl startup switches in the POA startup file to enable and secure the POA console. In addition,
you can use the --httprefresh switch to control how often the POA refreshes the information provided
to your web browser.
3 In the POA console, you can change some POA configuration settings for the current POA
session. You can also stop and start some specific POA threads.
TIP: To access the POA console directly from your web browser, provide the URL where the POA is
located by supplying the network address and port number. For example:
http://poa_server_address:1677
http://poa_server_address:7181
When viewing the POA console, you can specify either the client/server port or the HTTP port.
IMPORTANT: In order to control the POA from the POA console, you must set up authentication for
the POA console. For more information, see Section 16.1, “Configuring the POA Console,” on
page 159.
If the POA console is password protected as described in Section 16.1, “Configuring the POA
Console,” on page 159, you can click hyperlinked configuration items to change settings for the
current agent session.
On this page, you can restart MTA processing between the POA and the MTA. On the MTP status
page, you can restart the send and receive threads separately.
After disabling the user in the GroupWise Admin console, you can disconnect the user in the POA
console. On the Status page in the POA console, click C/S Users, then click Disconnect User for the
user that you have already disabled in the GroupWise Admin console.
IMPORTANT: When you disable the user in the GroupWise Admin console, the POA must receive
the disable event and process it before the user can be disconnected in the POA console. You can
see the disable event occur in the POA log file. When you click Disconnect User successfully, the
user is no longer listed in the POA console. If the user does not disappear from the list after you click
Disconnect User, wait for the POA to process the disable event, then click Disconnect User again. A
disconnected user receives an error message stating that GroupWise will exit.
By monitoring the POA, you can determine whether or not its current configuration is meeting the
needs of the post office it services. You have a variety of tools to help you monitor the operation of the
POA:
Click any hyperlinked status items for additional details. Click Help for more information about any
field.
The Thread ID column provides the information you need in order to track a specific thread through
one or more POA log files. For more information, see “Viewing and Searching POA Log Files” on
page 167.
To display the time of day for the peak values, click the number in the Peak column on the C/S User
line.
You can set the peak value refresh interval to Daily, Weekly, Monthly, or Never.
QuickFinder indexing and remote downloadable Address Book generation can be controlled using
links from the Configuration page, if the POA console is password protected. For more information,
see Section 16.1, “Configuring the POA Console,” on page 159.
The Configuration page also displays information about disk check events and database
maintenance events. However, scheduled events must be created and modified using the GroupWise
Admin console.
If the POA console is password protected, the Outbound TCP/IP link displays the MTA console where
you can get status information about the MTA. For more information, see Section 16.1, “Configuring
the POA Console,” on page 159,
The Hold link displays the contents of the MTA input queue, so you can find out if messages are
waiting for processing by the MTA.
1 In the POA console, on the Configuration page, click SOAP Notification List.
The columns provide the following information:
UserID: Displays the name of the GroupWise user that is performing the event.
Key: Displays the ID of the event configuration created by the third-party application. The event
configuration describes the events that are being tracked for the user, such as creation, deletion,
or modification of records.
IP Address: Displays the IP address of the POA where the event took place.
Port: Displays the port number used for communication between the POA and the listener
application.
Date/Time: Displays the date and time when the event took place. An asterisk (*) after the date
and time indicates that the user has pending notifications. After the notifications have been sent,
the asterisk is removed.
For example, the GroupWise Mobility Service synchronizes GroupWise data to mobile devices.
Whenever a user connects a mobile device to GroupWise through the GroupWise Mobility Service,
an event configuration is created for that user and his or her mobile device. If the user has multiple
mobile devices, there is an event configuration for each of the user's mobile devices.
1 In the POA console, on the Configuration page, click Event Configuration List.
The columns provide the following information:
UserID: Displays the name of the GroupWise user associated with the event configuration.
Key: Displays the ID of the event configuration created by the external application. For example,
the GroupWise Connector uses a GroupWise trusted application key.
Linux: /var/log/novell/groupwise/post_office_name.poa
Windows: post_office\wpcsout\ofs
You can change the location where the POA creates its log files, as described in Configuring POA
Log Settings and Switches.
Corresponding Startup Switches: You can also use the --log, --loglevel, --logdays, --logmax, and
--logdiskoff switches in the POA startup file to configure logging.
On Linux, you can use the tail command to monitor a file named poa.currentlog, where poa is the
name of the POA eDirectory object. This file is a symbolic link to the current POA log file, so that you
do not need to keep track of the exact POA log file name, which includes the log file creation date and
an incrementing extension for multiple log files created on the same date.
Because the POA consists of multiple threads, you might find it useful to retrieve the log file into an
editor and sort it on the thread ID that follows the date and time information. Sorting groups all
messages together for the same POA thread.
For installation and setup instructions, see “Setting Up GroupWise Monitor” in the GroupWise 2014
R2 Installation Guide. For usage instructions, see Part XVII, “Monitor,” on page 641.
Although the GroupWise agents are SNMP-enabled by default, the server where the GroupWise
agents are installed must be properly configured to support SNMP, and the agents must also be
properly configured. To set up SNMP services, complete the following tasks:
The snmpconf command creates the snmpd.conf file in one of the following folders, depending
on your version of Linux:
/usr/share/snmp
/usr/local/share/snmp
~/.snmp
IMPORTANT: Ensure that the SNMP daemon always starts before the POA starts.
Skip to Section 17.5.2, “Copying and Compiling the POA MIB File,” on page 169.
On some versions of Windows Server, the SNMP Service is not included during the initial operating
system installation. The SNMP Service can be added either before or after the GroupWise agents are
installed on the Windows server.
Before you can monitor an SNMP-enabled GroupWise agent, you must compile the agent MIB file
using your SNMP management program. GroupWise agent MIB files are located in the /agents/
mibs folder in your GroupWise software installation.
The MIB file contains all the Trap, Set, and Get variables used for communication between the
GroupWise agent and the SNMP management console. The Trap variables provide warnings that
point to current and potential problems. The Set variables allow you to configure portions of the
application while it is still running. The Get variables display the current status of different processes
of the application.
1 Copy the agent MIB file to the location required by your SNMP management program.
2 Compile or import the agent MIB file as required by your SNMP management program.
1 In the GroupWise Admin console, browse to and click the GroupWise agent object.
2 Click the Agent Settings tab, then locate the SNMP Community “Get” String field.
3 Provide your system SNMP community “Get” string, then click OK.
4 Configure the SNMP Service with the same community “Get” string.
5 Restart the GroupWise agent.
The GroupWise agent should now be visible to your SNMP monitoring program.
You can adjust how the POA functions to optimize its performance. Before attempting optimization,
you should run the POA long enough to observe its efficiency and its impact on other network
applications running on the same server. See Chapter 17, “Monitoring the POA,” on page 163.
Also, remember that optimizing your network hardware and operating system can make a difference
in POA performance.
If the POA is frequently not keeping up with the client/server requests from GroupWise client users,
you can increase the maximum number of client/server handler threads so the POA can create
additional threads as needed. The default is 10 client/server handler threads; valid values range from
1 to 99.
If GroupWise client users cannot connect to the POA immediately or if response is sluggish, you can
increase the number of threads.
Corresponding Startup Switches: You can also use the --tcpthreads switch in the POA startup file
to adjust the number of POA client/server handler threads.
If the POA console is password protected as described in Section 16.1, “Configuring the POA
Console,” on page 159, you can change the number of client/server handler threads on the
Configuration page. Under Performance Settings, click C/S Handler Threads.
Application connections: Each GroupWise user uses one application connection when he or
she starts GroupWise. Depending on what activities the user is doing in the GroupWise client,
additional application connections are used. For example, the GroupWise Address Book and
GroupWise Notify use individual application connections. The default maximum number of
application connections is 2048. You should plan about 3 to 4 application connections per user,
so the default is appropriate for a post office of about 500 users.
Physical connections: Each GroupWise user could have zero or multiple active physical
connections. One physical connection can accommodate multiple application connections.
Inactive physical connections periodically time out and are then closed by the clients and the
POA. The default maximum number of physical connections is 2048. You should plan about 1 to
2 physical connections per user, so the default is appropriate for a post office of about 500 users.
If the POA is configured with too few connections to accommodate the number of users in the post
office, the POA can encounter an error condition such as “GWPOA: Application connection table full”.
Corresponding Startup Switches: You can also use the --maxappconns and --maxphysconns
switches in the POA startup file to adjust the POA client/server processing.
POA Console: The Status page helps you assess whether the POA is currently meeting the client/
server needs of the post office. Under the Statistics heading, click C/S Requests Pending. You can
also manually select multiple log files to search in order to display a history of times during the last 24
hours when the POA was unable to respond immediately to client/server requests.
However, one result of this default behavior is that the message queues can back up during times of
heavy client activity. If necessary, you can manually adjust the POA’s ratio of client/server threads
and message handler threads to help the POA clear out its message queues.
The more message threads the POA uses, the faster it can process messages. However, the more
threads the POA uses, the fewer resources are available to other processes running on the server.
Corresponding Startup Switches: You can also use the --threads switch in the POA startup file to
adjust the number of message handler threads.
POA Console: The Status page helps you assess whether the POA is currently meeting the
message file processing needs of the post office. Under the Thread Status heading, click Message
Worker Threads to display the workload and status of the message handler threads.
By default, the POA starts one thread to handle all POA scheduled events and also all usage of the
Mailbox/Library Maintenance tool in the GroupWise Admin console.
Corresponding Startup Switches: You can also use the --gwchkthreads switch in the POA startup
file to increase the number of POA threads started for database maintenance activities.
POA Console: The Status page helps you assess whether the POA is currently meeting the
database maintenance needs of the post office. Under the Thread Status heading, click GWCheck
Worker Threads to display the workload and status of the database maintenance handler threads.
If the POA console is password protected as described in Section 16.1, “Configuring the POA
Console,” on page 159, you can change the number of database maintenance handler threads on the
Configuration page. Under Performance Settings, click Maximum GWCheck Worker Threads.
By default, the POA is configured to efficiently handle a typical amount of purging. However, if the
default configuration is unacceptably slow during periods of heavy purging, you can prevent users'
client response time from degrading. You can configure the POA to restrict the amount of purging that
can take place concurrently.
Content
There are several things that you can do to customize how the POA handling indexing of messages
and attached documents.
NOTE: To facilitate the Find feature in the GroupWise client, the POA searches unindexed messages
as well as those that have already been indexed, so that all messages are immediately available to
users whenever they perform a search. The POA does not search unindexed documents, so
documents cannot be located using the client Find feature until after indexing has been performed.
For a list of the file types that the POA can index, see Oracle Outside In Technology Supported
Formats (http://www.oracle.com/technetwork/middleware/content-management/ds-oitfiles-
133032.pdf).
Corresponding Startup Switches: You can also use the --qfinterval, --qfintervalinminute,
--qfbaseoffset, and --qfbaseoffsetinminute switches in the POA startup file to regulate indexing.
Corresponding Startup Switches: You can also use the --dvanipaddr, --dvanport, and --dvanssl
switches in the POA startup file to configure multiple DVAs.
You control the maximum document conversion size and time using startup switches in the POA
startup file. After you edit the POA startup file, you must restart the POA in order to put the changes
into effect.
Use the --dvamaxsize switch to restrict the size of documents that it sends for conversion. Set the --
dvamaxsize switch to the maximum document size in kilobytes. For example, you would use 20480
for 20 MB.
Use the --dvamaxtime switch to change the amount of time the POA waits for the HTML version. Set
the --dvamaxtime switch to the number of seconds that you want the POA wait. The default is 600
seconds.
Occasionally, circumstances arise where indexing needs are especially heavy for a short period of
time. This can occur when you move users to a different post office or if the QuickFinder indexes for a
post office become damaged. Startup switches are available for temporary use in the POA startup file
to customize the way the POA handles indexing. In general, they are not intended for long-term use.
You might want to set up a separate POA just to handle the temporary indexing needs, and use these
switches only with the dedicated indexing POA.
Because the switches are placed in the POA startup file, you must stop and then start the POA to put
the settings into effect.
When you have a large number of user databases that need to be indexed, you can configure the
POA to index a specific range of databases based on user FIDs. For a task of this magnitude, you
should run multiple dedicated indexing POAs with each POA configured to process a specific range
of databases. Use the --qfuserfidbeg and --qfuserfidend switches to define the range for each POA.
You can determine the FID numbers of the databases by listing the user databases (userxxx.db) in
the ofuser folder. The xxx part of the user database name is the FID.
Priority Description
Level
0 Index a maximum of 1000 items at a time, rather than the default of 500.
1 Index a maximum of 500 items at time, using a low-priority thread. This keeps frequent daytime
indexing cycles from interfering with users’ activities in their mailboxes.
2 Index a maximum of 1000 items at a time, using a medium-priority thread. This allows additional
items in each database to be processed in each indexing cycle. Using a medium-priority thread
makes indexing more important than some user activities in mailboxes. Users might notice some
slowness in response from the GroupWise client. This is the default setting for the --qflevel switch.
3 Index a maximum of 2000 items at a time, using a high-priority thread. Using a high- priority thread
makes indexing more important than many user activities in mailboxes. Users will notice some
slowness in response from the GroupWise client. This is warranted only when the immediate
completion of indexing is extremely important.
999 Index constantly until all databases have been indexed, then wait until the next indexing cycle set on
the QuickFinder tab of the POA object before starting to index again.
If you have users who consistently receive more items than are processed during your current daily
indexing cycle, you could implement an appropriate --qflevel setting for permanent use.
Use the --dvafilter switch in the POA startup file to specify the file extensions that you do not want the
POA to index. After you edit the POA startup file, you must restart the POA to put the change into
effect.
You can override settings provided in the GroupWise Admin console by using startup switches in the
POA startup file. The default location for the POA startup file is in the post office folder.
When you create a post office and install the POA, an initial POA startup file is created. It is named
using the first 8 characters of the post office name with a .poa extension. This initial startup file
includes the --home startup switch set to the location of the post office folder.
Startup switches specified on the command line override those in the startup file. Startup switches in
the startup file override corresponding settings in the GroupWise Admin console. You can view the
POA startup file from the Configuration page in the POA console.
The table below summarizes POA startup switches for all platforms and how they correspond to
configuration settings in the GroupWise Admin console.
20.1 @startup_file_name
Specifies the location of the POA startup file. The POA startup file is created in the post office folder
and is named after the post office, with a .poa extension. The POA startup file includes the --home
switch.
20.3 --attemptsresetinterval
Specifies the length of time during which unsuccessful login attempts are counted, leading to lockout.
The default is 30 minutes; valid values range from 15 to 60. See Section 15.3.5, “Configuring Intruder
Detection,” on page 153.
20.4 --certfile
Specifies the full path to the public certificate file used to provide secure SSL communication between
the POA and other programs. See Section 15.3.3, “Securing the Post Office with SSL Connections to
the POA,” on page 152.
20.5 --cluster
Informs the POA that it is running in a cluster. When communicating with a clustered POA, the
GroupWise client extends the retry period for reconnection. A clustered POA automatically binds to
the IP address configured for the POA object even if the Bind Exclusively to TCP/IP Address option
is not selected on the POA Agent Settings tab in the GroupWise Admin console. This prevents
20.6 --dhparm
Specifies a Diffie-Hellman cipher parameters file used for SSL/TLS to replace the default parameters
set by GroupWise. GroupWise uses default Diffie-Hellman parameters of 2048 bits to generate the
DH key. A valid DH parameter is in PEM format.
20.7 --dvafilter
Sets the file name extensions for attached documents that you do not want the POA to hand off to the
DVA for conversion into HTML format. See “Preventing Indexing of Specific Document Types” on
page 181.
To specify multiple file name extensions, specify a comma-delimited list, surrounded by quotation
marks (").
20.8 --dvanipaddr
Specifies the IP address of a DVA that the POA can use to convert documents into HTML format for
indexing. You can configure the POA to communicate with up to three DVAs. In the switch, replace n
with 1, 2, or 3 to identify multiple DVAs. See Section 19.3, “Configuring the POA with Multiple DVAs
for Indexing,” on page 178.
20.9 --dvanport
Specifies the port number used for the POA to communicate with the corresponding DVA. The default
port number is 8301. In the switch, replace n with 1, 2, or 3 to identify multiple DVAs. See
Section 19.3, “Configuring the POA with Multiple DVAs for Indexing,” on page 178.
20.10 --dvanssl
Sets the availability of SSL communication between the POA and the corresponding DVA. Valid
values are enable and disable. SSL is disabled by default. In the switch, replace n with 1, 2, or 3 to
identify multiple DVAs. See Section 19.3, “Configuring the POA with Multiple DVAs for Indexing,” on
page 178.
20.11 --dvamaxsize
Sets the maximum size for attached documents that the POA hands off to the DVA for conversion into
HTML format so that the documents can be indexed. By default, there is no maximum size limit. See
Section 19.4, “Controlling Maximum Document Conversion Size and Time,” on page 179.
20.13 --dvaquarantine
Enables the document quarantine where the POA places documents that the DVA fails to convert into
HTML for indexing.
20.14 --enforceclientversion
Enforces the minimum client release version and/or date so that users of older clients are forced to
update in order to access their GroupWise mailboxes. Valid settings are version, date, both, and
disabled. See Section 15.2.4, “Checking What GroupWise Clients Are in Use,” on page 148.
To encourage users to update to the latest version of Evolution, you can use the --evocontrol switch
to configure the POA to allow only specified versions of Evolution. For information about configuring a
post office to support Evolution, see Section 15.2.3, “Supporting SOAP Clients,” on page 148.
You can put as many as 10 entries in the startup file, so that you can list as many as 10 versions of
Evolution. Entries beyond 10 are ignored. You can view the current entries at the POA console with
the other SOAP settings. The POA log file lists the settings in the Soap Session section.
20.16 --externalclientssl
Sets the availability of SSL communication between the POA and GroupWise clients that are running
outside your firewall. Valid values are enabled, required, and disabled. See Section 15.3.3, “Securing
the Post Office with SSL Connections to the POA,” on page 152.
20.17 --gwchkthreads
Specifies the number of threads the POA starts for Mailbox/Library Maintenance activities. The
default is 4; valid values range from 1 to 8. See Section 18.3, “Optimizing Database Maintenance,” on
page 174.
20.19 --gwclientreleaseversion
Specifies the version of the approved GroupWise client software for your system. See Section 15.2.4,
“Checking What GroupWise Clients Are in Use,” on page 148.
20.20 --help
Displays the POA startup switch Help information. When this switch is used, the POA does not start.
20.21 --home
Specifies the post office folder, where the POA can access message and user databases. There is no
default location. You must use this switch in order to start the POA.
20.22 --httppassword
Specifies the password for the POA to prompt for before allowing POA status information to be
displayed in your web browser. Do not use an existing eDirectory password because the information
passes over the non-secure connection between your web browser and the POA. See Section 17.1,
“Using the POA Console,” on page 163.
20.23 --httpport
Sets the HTTP port number used for the POA to communicate with your web browser. The default is
7181; the setting must be unique. See Section 17.1, “Using the POA Console,” on page 163.
20.24 --httprefresh
Specifies the rate at which the POA refreshes the status information in your web browser. The default
is 60 seconds. See Section 17.1, “Using the POA Console,” on page 163.
20.26 --httpuser
Specifies the user name for the POA to prompt for before allowing POA status information to be
displayed in a web browser. Providing a user name is optional. Do not use an existing eDirectory user
name because the information passes over the non-secure connection between your web browser
and the POA. See Section 17.1, “Using the POA Console,” on page 163.
20.27 --imap
Enables IMAP so that the POA can communicate with IMAP clients. Valid settings are enabled and
disabled. See Section 15.2.2, “Supporting IMAP Clients,” on page 147.
20.29 --imapreadlimit
Specifies in thousands the maximum number of messages that can be downloaded by an IMAP
client. For example, specifying 10 represents 10,000. The default is 20,000. The maximum allowed
limit is 65. The server caches all downloaded items, so setting a high limit could consume more
server resources than you would prefer the POA to use.
20.30 --imapreadnew
By default, the IMAP agent reads items in a folder from the oldest to the newest. As a result, if a folder
contains more items than are allowed by the --imapreadlimit setting, users receive the older items but
not the newer items. Enable this switch so that the POA reads items from the newest to the oldest.
This ensures that users receive all their new items in a timely manner.
20.31 --imapport
Sets the TCP port number used for the POA to communicate with IMAP clients when using a non-
SSL connection. The default is 143. See Section 15.2.2, “Supporting IMAP Clients,” on page 147.
20.32 --imapssl
Sets the availability of secure SSL communication between the POA and IMAP clients. Valid settings
are enable and disable. See Section 15.3.3, “Securing the Post Office with SSL Connections to the
POA,” on page 152.
20.33 --imapsslport
Sets the TCP port number used for the POA to communicate with IMAP clients when using an SSL
connection. The default is 993. See Section 15.2.2, “Supporting IMAP Clients,” on page 147.
20.34 --incorrectloginattempts
Specifies the number of unsuccessful login attempts after which lockout occurs. The default is 5
attempts; valid values range from 3 to 10. See Section 15.3.5, “Configuring Intruder Detection,” on
page 153.
20.36 --intruderlockout
Turns on intruder lockout processing, using defaults that can be overridden by the
--incorrectloginattempts, --attemptsresetinterval, and --lockoutresetinterval switches. See
Section 15.3.5, “Configuring Intruder Detection,” on page 153.
20.37 --ip
Binds the POA to a specific IP address when the server where it runs uses multiple IP addresses,
such as in a clustering environment. The specified IP address is associated with all ports used by the
POA (HTTP, IMAP, LDAP, and so on.) Without the --ip switch, the POA binds to all available IP
addresses and users can access the post office through all available IP addresses. See
Section 15.1.3, “Binding the POA to a Specific IP Address,” on page 144.
20.39 --keypassword
Specifies the password used to encrypt the private SSL key file when it was created. See
Section 15.3.3, “Securing the Post Office with SSL Connections to the POA,” on page 152.
20.40 --language
Specifies the language to run the POA in, using a two-letter language code. You must install the POA
in the selected language in order for the POA to display in the selected language.
The initial default is the language used in the post office. If that language has not been installed, the
second default is the language used by the operating system. If that language has not been installed,
the third default is English. You only need to use this switch if you need to override these defaults.
Contact your local Novell sales office for information about language availability. See Chapter 7,
“Multilingual GroupWise Systems,” on page 85 for a list of language codes.
20.42 --ldapipaddr
Specifies the LDAP server’s network address as either an IP address or a DNS hostname. You can
specify multiple network addresses to provide failover capabilities for your LDAP servers. See
“Specifying Failover LDAP Servers (Non-SSL Only)” on page 83.
If you specify multiple LDAP servers, use a space between each address. When so configured, the
POA tries to contact the first LDAP server in order to authenticate a user to GroupWise. If that LDAP
server is down, the POA tries the next LDAP server in the list, and so on until it is able to authenticate.
20.43 --ldappoolresettime
Specifies the number of minutes between the time when the POA receives an error response from a
pooled LDAP server and the time when that LDAP server is reinstated into the pool of available LDAP
servers. The default is 5 minutes; valid values range from 1 to 30. See “Configuring a Pool of LDAP
Servers” on page 83.
20.45 --ldappwd
Provides the password for the LDAP user that the POA uses to log in to the LDAP server. See
Section 15.3.4, “Providing LDAP Authentication for GroupWise Users,” on page 153.
20.46 --ldapssl
Indicates to the POA that the LDAP server it is logging in to is using SSL. See Section 15.3.4,
“Providing LDAP Authentication for GroupWise Users,” on page 153.
20.47 --ldapsslkey
Specifies the full path to the SSL key file used with LDAP authentication. See Section 15.3.4,
“Providing LDAP Authentication for GroupWise Users,” on page 153.
20.48 --ldaptimeout
Specifies the number of seconds that the POA connection to the LDAP server can be idle before the
POA drops the connection. The default is 30 seconds. See Section 15.3.4, “Providing LDAP
Authentication for GroupWise Users,” on page 153.
20.49 --ldapuser
Specifies the user name that the POA can use to log in to the LDAP server in order to authenticate
GroupWise client users. See Section 15.3.4, “Providing LDAP Authentication for GroupWise Users,”
on page 153.
20.50 --ldapuserauthmethod
Specifies the LDAP user authentication method you want the POA to use when accessing an LDAP
server. Valid settings are bind and compare. See Section 15.3.4, “Providing LDAP Authentication for
GroupWise Users,” on page 153.
20.51 --lockoutresetinterval
Specifies the length of time the user login is disabled after lockout. The default is 30 minutes; the
minimum setting is 15; there is no maximum setting. The login can also be manually re-enabled in the
GroupWise Admin console on the Account tab of the User object. If --lockoutresetinterval is set to 0
(zero), the login must be re-enabled manually in the GroupWise Admin console. See Section 15.3.5,
“Configuring Intruder Detection,” on page 153.
20.52 --log
Specifies the folder where the POA stores its log files. The default location varies by platform.
Linux: /var/log/novell/groupwise/post_office_name.poa
Windows: post_office\wpcsout\ofs
For more information, see Section 17.2, “Using POA Log Files,” on page 166.
You typically find multiple log files in the specified folder. The first four characters represent the date.
The next three characters identify the agent. A three-digit extension allows for multiple log files
created on the same day. For example, a log file named 0518poa.001 indicates that it is a POA log
file, created on May 18. If you restarted the POA on the same day, a new log file is started, named
0518poa.002.
20.54 --logdiskoff
Turns off disk logging for the POA so no information about the functioning of the POA is stored on
disk. The default is for logging to be turned on. See Section 17.2, “Using POA Log Files,” on
page 166.
20.55 --loglevel
Controls the amount of information logged by the POA. Logged information is displayed in the log
message box and written to the POA log file during the current agent session.
The default is Normal, which displays only the essential information suitable for a smoothly running
POA. Use Verbose to display the essential information, plus additional information helpful for
troubleshooting. Verbose logging does not degrade POA performance, but log files saved to disk
consume more disk space when verbose logging is in use. Diagnostic logging turns on Extensive
Logging Options and SOAP Logging Options on the POA console Log Settings page. See
Section 17.2, “Using POA Log Files,” on page 166.
20.57 --maxappconns
Sets the maximum number of application connections allowed between the POA and the GroupWise
clients run by GroupWise users. The default maximum number of application connections is 2048.
See Section 18.1.2, “Adjusting the Number of Client/Server Connections,” on page 172.
20.58 --maxphysconns
Sets the maximum number of physical TCP/IP connections allowed between the POA and the
GroupWise clients run by GroupWise users. The default maximum number of physical connections is
2048. See Section 18.1.2, “Adjusting the Number of Client/Server Connections,” on page 172.
20.60 --mtpinport
Sets the message transfer port number the POA listens on for messages from the MTA. The default is
7101.
20.61 --mtpoutipaddr
Specifies the network address of the server where the MTA for the domain runs, as either an IP
address or a DNS hostname.
20.62 --mtpoutport
Specifies the message transfer port number the MTA listens on for messages from the POA. The
default is 7100.
20.63 --mtpsendmax
Sets the maximum size in megabytes for messages being sent outside the post office. By default,
messages of any size can be transferred to the MTA. See Section 15.2.6, “Restricting Message Size
between Post Offices,” on page 149.
20.64 --mtpssl
Sets the availability of secure SSL communication between the POA and its MTA. Valid settings are
enabled and disabled. See Section 15.3.3, “Securing the Post Office with SSL Connections to the
POA,” on page 152.
20.65 --name
Specifies the object name of the POA object in the post office. If you have multiple POAs configured
for the same post office, you must use this switch to specify which POA configuration to use when the
POA starts.
The POA admin thread must run for at least one POA for each post office. However, it can be
disabled for POAs with specialized functioning where the database update and repair activities of the
POA admin thread could interfere with other, more urgent processing.
Historical Note: In GroupWise 5.2 and earlier, a separate agent, the Administration Agent (ADA),
handled the functions now consolidated into the POA admin thread. Hence the switch name, --noada.
20.67 --nocache
Disables database caching. The default is for caching to be turned on. Use this switch if your backup
system cannot back up open files.
20.68 --noconfig
Ignores any configuration information provided for the POA in the GroupWise Admin console and
uses only settings from the POA startup file. The default is for the POA to use the information
provided in the GroupWise Admin console, overridden as needed by settings provided in the startup
file or on the command line.
20.69 --noerrormail
Prevents problem files from being sent to the GroupWise administrator. The default is for error mail to
be sent to the administrator. See Section 24.6, “Receiving Notifications of Agent Problems,” on
page 242.
20.71 --nomf
Turns off all message file processing for the POA. The default is for the POA to process all message
files.
20.72 --nomfhigh
Turns off processing high priority messages files (message queues 0 and 1).
20.73 --nomflow
Turns off processing lower priority messages files (message queues 2 through 7).
20.75 --nonuu
Disables nightly user upkeep. See Section 15.4.3, “Configuring Nightly User Upkeep,” on page 157.
20.76 --noqf
Disables the periodic QuickFinder indexing done by the POA. The default is for periodic indexing to
be turned on. See Section 19.1, “Configuring Indexing,” on page 177.
20.77 --nordab
Disables daily generation of the GroupWise Address Book for Remote users. See Section 15.4.3,
“Configuring Nightly User Upkeep,” on page 157.
If the POA detects a problem with a database when automatic database recovery has been turned
off, the POA notifies the administrator, but it does not recover the problem database. The
administrator can then recover or rebuild the database as needed. See Chapter 42, “Maintaining
Domain and Post Office Databases,” on page 395.
20.79 --nosnmp
Disables SNMP for the POA. The default is to have SNMP enabled. See Section 17.5, “Using an
SNMP Management Console,” on page 168.
20.80 --notcpip
Disables TCP/IP communication for the POA. The default is to have TCP/IP communication enabled.
Use this switch if you do not want this POA to communicate with GroupWise clients using TCP/IP.
20.81 --nuuoffset
Specifies the number of hours after midnight for the POA to start performing user upkeep. The default
is 1 hour; valid values range from 0 to 23. See Section 15.4.3, “Configuring Nightly User Upkeep,” on
page 157.
20.83 --peakrefreshinterval
Sets the refresh interval for the peak values that are displayed in the POA console. The default is
daily. Valid values are daily, weekly, monthly, or never. For more information, see Section 17.1.3,
“Tracking Peak Values for Connections, Queue Contents, and Thread Usage,” on page 163.
20.84 --port
Sets the TCP port number used for the POA to communicate with GroupWise clients in client/server
access mode. The default is 1677.
20.85 --primingmax
Sets the maximum number of client/server handler threads that POA can use for priming users’
Caching mailboxes. The default is 30 per cent. See Section 15.2.5, “Supporting Forced Mailbox
Caching,” on page 149.
20.86 --qfbaseoffset
Specifies the number of hours after midnight for the POA to start its indexing cycle as specified by the
--qfinterval or --qfintervalinminute switch. The default is 20 hours (meaning at 8:00 p.m.); valid values
range from 0 to 23. See Section 19.1, “Configuring Indexing,” on page 177.
20.87 --qfbaseoffsetinminute
Specifies the number of minutes after midnight for the POA to start its indexing cycle as specified by
the --qfinterval or --qfintervalinminute switch. The default is 20 hours (1200 minutes, meaning at 8:00
p.m.). The maximum setting is 1440 (24 hours). See Section 19.1, “Configuring Indexing,” on
page 177.
20.88 --qfdeleteold
Deletes previous versions of QuickFinder .idx and .inc files to conserve disk space during periods
of heavy indexing. In general, it is applicable for use only with --qflevel=1, where indexing activities
are a lower priority task than user activities in their mailboxes. See “Reclaiming Disk Space” on
page 180.
20.90 --qfintervalinminute
Specifies the interval in minutes for the POA to update the QuickFinder indexes in the post office. The
default is 24 hours (1440 minutes). See Section 19.1, “Configuring Indexing,” on page 177.
20.91 --qflevel
Customizes the way the POA performs indexing. Valid levels are 0 through 3 and 999. See
“Determining Indexing Priority” on page 180.
Priority Description
Level
0 Index a maximum of 1000 items at a time, rather than the default of 500.
1 Index a maximum of 500 items at time, using a low-priority thread. This keeps frequent daytime
indexing cycles from interfering with users’ activities in their mailboxes.
2 Index a maximum of 1000 items at a time, using a medium-priority thread. This allows additional
items in each database to be processed in each indexing cycle. Using a medium-priority thread
makes indexing more important than some user activities in mailboxes. Users might notice some
slowness in response from the GroupWise client. This is the default setting for the --qflevel switch.
3 Index a maximum of 2000 items at a time, using a high-priority thread. Using a high- priority thread
makes indexing more important than many user activities in mailboxes. Users will notice some
slowness in response from the GroupWise client. This is warranted only when the immediate
completion of indexing is extremely important.
999 Index constantly until all databases have been indexed, then wait until the next indexing cycle set on
the QuickFinder tab of the POA object before starting to index again.
20.92 --qfnolibs
Suppresses QuickFinder indexing of documents in libraries in favor of indexing user mailbox
contents. For full suppression, use --qfnopreproc as well. See “Determining What to Index” on
page 179
20.93 --qfnopreproc
Suppresses generation of document word lists that are normally written to user databases when
libraries are indexed. Use with --qfnolibs. See “Determining What to Index” on page 179.
20.94 --qfnousers
Suppresses QuickFinder indexing of user mailbox contents in favor of indexing documents in
libraries. See “Determining What to Index” on page 179.
20.96 --qfuserfidend
Specifies the end of a range of FIDs associated with user databases (userxxx.db) that you want to
index. The xxx in the user database file name is the FID. To determine what FIDs are in use, list the
contents of the ofuser folder in the post office folder. See “Determining What to Index” on page 179.
If you want to index just one user database, use the same FID with the --qfuserfidbeg switch and the
--qfuserfidend switch. To determine a user’s FID, click Help > About GroupWise in the GroupWise
client. In Online mode, the FID is displayed after the user name. In Caching or Remote mode, the FID
is the last three characters of the Caching or Remote folder name (for example, gwstr7bh).
20.97 --rdaboffset
Specifies the number of hours after midnight for the POA to generate the daily copy of the GroupWise
Address Book for Remote users. The default is 0; valid values range from 0 to 23. See
Section 15.4.3, “Configuring Nightly User Upkeep,” on page 157.
When it is started with this switch, the POA lists folders it is checking, which can be a lengthy process.
Use this switch on an as needed basis, not in the POA startup file. If the POA encounters inadequate
rights or permissions, it indicates the problem and shuts down.
20.99 --show
Starts the POA with a server console user interface. The agent user interface requires that the X
Window System and Open Motif are running on the Linux server.
By default, no user interface is provided for the agents on Linux. An agent that runs with a user
interface cannot be managed in the GroupWise Admin console.
The --show startup switch can be used on the command line or in the gwha.conf file used by the
GroupWise High Availability Service. It cannot be placed in the agent startup file.
20.100 --soap
Enables SOAP so that the POA can communicate with SOAP clients. Valid settings are enabled and
disabled. See Section 15.2.3, “Supporting SOAP Clients,” on page 148.
20.101 --soapmaxthreads
Specifies the maximum number of SOAP threads the POA can create to service SOAP clients. The
default is 4; the maximum is 40. This setting is appropriate for most systems. See Section 15.2.3,
“Supporting SOAP Clients,” on page 148.
20.102 --soapport
Sets the TCP port number used for the POA to communicate with SOAP clients. The default is 7191.
See Section 15.2.3, “Supporting SOAP Clients,” on page 148.
20.103 --soapsizelimit
Sets the maximum amount of data that the POA can return in a single request from a SOAP client.
The default is 1024 KB (1 MB), which is the recommended setting. The maximum allowed setting is
65534 (64 MB). Specify 0 (zero) if you do not want the POA to check the data size. See
Section 15.2.3, “Supporting SOAP Clients,” on page 148.
20.104 --soapssl
Sets the availability of secure SSL communication between the POA and SOAP clients. Valid settings
are enable and disable. See Section 15.3.3, “Securing the Post Office with SSL Connections to the
POA,” on page 152.
20.106 --sslciphersuite
Sets the SSL cipher suites used by the Archive Agent, the Messaging Agent, and Messenger clients.
The cipher list must be in OpenSSL format. For more information on OpenSSL format, see Cipher
List Format (https://www.openssl.org/docs/apps/ciphers.html#CIPHER-LIST-FORMAT)
20.107 --ssloption
Specify a specific SSL protocol to disable. By specifying SSL_OP_NO_TLSv1, GroupWise will
disable TLSv1 support. Specify additional options by adding the SSL key work separated by a
comma.
20.108 --tcpthreads
Specifies the maximum number of client/server handler threads the POA can create to service client/
server requests. The default is 10; valid values range from 1 to 99. Plan on about one client/server
handler thread per 20-30 client/server users. See Section 18.1.1, “Adjusting the Number of Client/
Server Threads,” on page 171.
20.109 --threads
Specifies the maximum number of message handler threads the POA can create. The default is 8;
valid values range from 1 to 20. See Section 18.2, “Optimizing Message File Processing,” on
page 173.
20.110 --user
Provides the network user ID for the POA to use when accessing post offices and/or document
storage areas on remote servers. You can also provide user and password information on the Post
Office Settings tab in the GroupWise Admin console.
Linux: On OES Linux, the linux_user_ID is a Linux-enabled user that the POA can use to log in to the
remote OES Linux server. On SLES Linux, it is a standard Linux user.
Windows: The windows_user_ID is a user that the POA can use to log in to the remote Windows server.
Windows Note: The Windows POA gains access to the post office folder when it starts. However, a
particular user might attempt to access a remote document storage area to which the POA does not
yet have a drive mapping available. By default, the POA attempts to map a drive using the same user
ID and password it used to access the post office folder. If the user ID and password for the remote
storage area are different from the post office, use the --user and --password switches to specify the
needed user ID and password. You can also provide user and password information on the Post
Office Settings tab in the GroupWise Admin console. However, it is preferable to use the same user
ID and password on all servers where the POA needs access.
For a complete list of port numbers used by the MTA, see Section A.4, “Message Transfer Agent Port
Numbers,” on page 734.
For detailed Linux-specific MTA information, see Appendix C, “Linux Basics for GroupWise
Administration,” on page 741.
Typical
GroupWise
System
Post
Internet Post Office
Agent Office Agent
GroupWise Users
Internet Document
GroupWise Users Viewer
Agent
Address information about all GroupWise objects (such as users, resources, and post offices in
the domain)
System configuration and linking information for the domain’s MTA
Address and message routing information to other domains
The first domain you create is the primary domain. In the primary domain, the wpdomain.db file
contains all administrative information for your entire GroupWise system (all its domains, post offices,
users, and so on). Because the wpdomain.db file in the primary domain is so crucial, you should back
it up regularly and keep it secure. See Section 48.1, “Backing Up a Domain,” on page 423.
You can re-create your entire GroupWise system from the primary domain wpdomain.db file;
however, if the primary domain wpdomain.db file becomes unusable, you can no longer make
administrative updates to your GroupWise system.
For a mapped or UNC link between domains, the MTA requires read/write access rights to its input/
output queues in the other domains. For a TCP/IP link, no access rights are required because
messages are communicated by way of TCP/IP.
The MTA does not have an output queue for user messages in the local domain. Because its primary
task is routing messages, the local MTA has output queues in all post offices in the domain. See
“POA Input Queue in the Post Office” on page 138. The local MTA also has output queues in all
domains to which it is directly linked.
For more specific information about how domains are linked to each other, and about how domains
and post offices are linked, see Chapter 10, “Managing the Links between Domains and Post
Offices,” on page 101.
For MTA system requirements, see “Hardware and Operating System Requirements” in the
GroupWise 2014 R2 Installation Guide. For detailed instructions about installing and starting the MTA
for the first time, see “” in the GroupWise 2014 R2 Installation Guide.
As your GroupWise system grows and evolves, you will probably need to modify MTA configuration to
meet changing system needs. The following topics help you configure the MTA:
Chapter 22, “Configuring the Creating an MTA Object in the GroupWise Admin Console
MTA,” on page 227 Configuring the MTA in the GroupWise Admin Console
Binding the MTA to a Specific IP Address
Enabling MTA Message Logging
Section 22.2, “Configuring Securing the Domain with SSL Connections to the MTA
Domain Access,” on page 229 Restricting Message Size between Domains
Configuring a Routing Domain
IMPORTANT: If you bind the MTA (or POA) to a specific IP address, the Admin Service is also bound
to that IP address.
TIP: To determine from the command line whether an MTA is bound to a specific IP address, use the
following command:
If an IP address is listed, the MTA is bound to that address. If 0.0.0.0 displays, the MTA is not bound
to any IP address.
Corresponding Startup Switches: You can also use the --ip switch in the MTA startup file to bind
the MTA to a specific IP address.
Tracking messages
Gathering statistics to help optimize your GroupWise system
Billing customers for messages delivered
Tracking messages from the MTA console and from GroupWise Monitor
When you enable MTA message logging, the MTA stores data about GroupWise message traffic as it
processes messages. The stored data is then available for use by the MTA console Message
Tracking option and by the GroupWise Monitor Message Tracking Report option. In addition, third-
party programs can produce customized billing, tracking, and statistical reports based on the
information stored in the database.
Corresponding Startup Switches: You can also use the --messagelogsettings, --messagelogpath,
--messagelogdays, and --messagelogmaxsize switches in the MTA startup file to configure MTA
message logging.
For background information about SSL and how to set it up on your system, see Section 90.2,
“Server Certificates and SSL Encryption,” on page 699.
IMPORTANT: To prevent closed links between agents, select Enabled when you are initially
configuring agents for SSL. Select Required for tighter security only after all agents are
successfully using SSL.
7 To enable SSL between the MTA and the MTA console, select Enabled or Required in the HTTP
SSL drop-down list.
8 Click Save, then click Close to return to the main Admin console window.
Corresponding Startup Switches: You can also use the --certfile, --keyfile, --keypassword, --httpssl,
and --msgtranssl switches in the MTA startup file to configure the MTA to use SSL.
MTA Console: You can list which connections the MTA is using SSL for from the Links page. Click
View TCP/IP Connections to display the list if TCP/IP links.
IMPORTANT: If you have also set a message size limit for your GWIAs, as described in
“Creating a Class of Service” on page 281, ensure that the MTA message size limit is equal to or
greater than the GWIA message size limit.
3 (Conditional) If you want to delay large messages, specify the size in megabytes for message
files the MTA can process immediately in the Delay Message Size field.
If a message file exceeds the delay message size, the message file is moved into the low priority
(6) message queue, where only one MTA thread is allocated to process very large messages.
This arrangement allows typical messages to be processed promptly, while delaying large
If a user’s message is not sent out of the domain because of this restriction, the user receives an
email message providing the following information:
There are additional ways to restrict the size of messages that users can send, as described in
Section 13.3.5, “Restricting the Size of Messages That Users Can Send,” on page 125.
Messages that are otherwise undeliverable can be automatically sent to a single routing domain.
This routing domain can be set up to perform DNS lookups and route messages out across the
Internet.
All messages from a domain can be automatically routed through another domain, regardless of
the final destination of the messages. This provides additional control of message flow through
your GroupWise system.
MTA Console: You can check routing information on the Configuration page under the General
Settings heading.
For instructions, see Section 6.1.2, “Configuring User Synchronization for an LDAP Directory,” on
page 80.
Exchange address book synchronization requires its own license. If you enable Exchange address
book synchronization, your GroupWise system might be subject to additional licensing fees. We invite
you to contact your Novell representative, reseller, or partner to learn more about this feature or for
pricing and licensing information.
To setup the Outlook client to connect to the GroupWise System Address Book through the LDAP
server, see Configuring GroupWise Address Lookup in the Microsoft Outlook Client in the GroupWise
Mobility Quick Start for Microsoft Outlook Users.
Known Limitations
You cannot run a Contains search.
Any filter beginning with a “*” will fail.
In Outlook, autocomplete will only work if you manually add the users as a contact. This is an
Outlook limitation.
Corresponding Startup Switches: You can also use the --httpport, --httpuser, and --httppassword
startup switches in the MTA startup file to enable the MTA console. In addition, you can use the
--httprefresh switch to control how often the MTA refreshes the information provided to your web
browser.
TIP: To access the MTA console directly from your web browser, provide the URL where the
MTA is located by supplying the network address and port number. For example:
http://mta_server_address:7100
http://mta_server_address:7180
IMPORTANT: In order to control the MTA from the MTA console, you must set up authentication
for the MTA console, as described in Section 23.1, “Setting Up the MTA Console,” on page 235.
Click the Event Log Settings heading to change the MTA log settings for the current MTA session.
By monitoring the MTA, you can determine whether or not its current configuration is meeting the
needs of your GroupWise system. You have a variety of resources to help you monitor the operation
of the MTA:
The MTA console provides several pages of information to help you monitor the performance of the
MTA. The title bar at the top of the MTA console displays the name of the MTA and its domain. Below
the title bar appears the MTA console menu that lists the pages of information available in the MTA
console. Online help throughout the MTA console helps you interpret the information being displayed
and use the links provided.
Click the Router link to display details about the MTA routing queue (gwinprog). You can quickly
determine how many messages are awaiting processing, how large they are, and how long they have
been waiting in the routing queue.
Click a closed location to display its holding queue to see how many messages are waiting for
transfer.
You can click any queue to view the message files it contains.
Click a location to view its holding queue. Click View Link Configuration to determine the address of
each location and access the agent consoles of other domains and of post offices that belong to the
local domain. Click View TCP/IP Connections to view incoming and outgoing TCP/IP links. Click View
Gateways to restrict the list to just gateways.
To track a specific message, have the sender check the Sent Item Properties for the message in the
GroupWise client. The Mail Envelope Properties field displays the message ID of the message; for
example, 3AD5EDEB.31D : 3 : 12763. To track all messages sent by a particular user, make a note of
the user’s GroupWise user ID.
Fill in one of the fields, depending on what you want to track, then click Submit. The results of the
search are displayed on a separate page which can be printed.
Linux: /var/log/novell/groupwise/domain_name.mta
You can change the location where the MTA creates its log files, as described in Configuring MTA Log
Settings and Switches.
Corresponding Startup Switches: You can also use the --log, --loglevel, --logdays, --logmax, and
--logdiskoff switches in the MTA startup file to configure logging.
Because the MTA consists of multiple threads, you might find it useful to retrieve the log file into an
editor and sort it on the thread ID that follows the date and time information. Sorting groups all
messages together for the same MTA thread.
For installation and setup instructions, see “Setting Up GroupWise Monitor” in the GroupWise 2014
R2 Installation Guide. For usage instructions, see Part XVII, “Monitor,” on page 641.
Although the GroupWise agents are SNMP-enabled by default, the server where the GroupWise
agents are installed must be properly configured to support SNMP, and the agents must also be
properly configured. To set up SNMP services, complete the following tasks:
The snmpconf command creates the snmpd.conf file in one of the following folders, depending
on your version of Linux:
/usr/share/snmp
/usr/local/share/snmp
~/.snmp
IMPORTANT: Ensure that the SNMP daemon always starts before the POA starts.
Skip to Section 24.5.2, “Copying and Compiling the MTA MIB File,” on page 241.
On some versions of Windows Server, the SNMP Service is not included during the initial operating
system installation. The SNMP Service can be added either before or after the GroupWise agents are
installed on the Windows server.
Before you can monitor an SNMP-enabled GroupWise agent, you must compile the agent MIB file
using your SNMP management program. GroupWise agent MIB files are located in the /agents/
mibs folder in your GroupWise software installation.
The MIB file contains all the Trap, Set, and Get variables used for communication between the
GroupWise agent and the SNMP management console. The Trap variables provide warnings that
point to current and potential problems. The Set variables allow you to configure portions of the
application while it is still running. The Get variables display the current status of different processes
of the application.
1 Copy the agent MIB file to the location required by your SNMP management program.
2 Compile or import the agent MIB file as required by your SNMP management program.
1 In the GroupWise Admin console, browse to and click the GroupWise agent object.
2 Click the Agent Settings tab, then locate the SNMP Community “Get” String field.
3 Provide your system SNMP community “Get” string, then click OK.
4 Configure the SNMP Service with the same community “Get” string.
5 Restart the GroupWise agent.
The GroupWise agent should now be visible to your SNMP monitoring program.
Corresponding Startup Switches: By default, the MTA generates error mail if an administrator has
been assigned for the domain. Error mail can be turned off using the --noerrormail switch.
TIP: Another way to receive email notification of MTA problems is to use GroupWise Monitor. See
Section 83.5.1, “Configuring Email Notification,” on page 649.
You can adjust how the MTA functions to optimize its performance. Before attempting optimization,
you should run the MTA long enough to observe its efficiency and its impact on other network
applications running on the same server. See Chapter 24, “Monitoring the MTA,” on page 237.
Also, remember that optimizing your network hardware and operating system can make a difference
in MTA performance.
Use the --tcpinbound switch in the MTA startup file to increase the maximum number of inbound
connections the MTA can establish from the default of 40 to whatever setting meets the needs of your
system. There is no maximum setting.
If the MTA is receiving more requests than it can accept, the sending MTAs must wait until a
connection becomes available, which slows down message transfer. Each connection requires only
about 20 KB. For example, if you configure the MTA to accept 600 connections, it would require
approximately 12 MB of RAM. Although there is no maximum setting for inbound connections, this
setting is adequate to handle very heavy usage. Use lower settings to conserve RAM or for lighter
usage.
MTA Console: You can check the maximum number of TCP/IP connections that the MTA can start
on the Configuration page under the TCP/IP Settings heading.
By default, the MTA waits 5 seconds for a response when trying to contact another MTA or a POA
across a TCP/IP link. If no response is received from the other MTA or the POA, the sending MTA
tries again three more times. If all four attempts fail, the MTA reports an error, then waits 10 minutes
before it tries again.
When the MTA attempts to send messages to another MTA or a POA across a TCP/IP link, the
sending MTA tries for 20 seconds before reporting an error.
On some networks, these wait intervals might not be sufficient, and the MTA might report an error
when, by waiting longer, the needed connection or data transfer could take place.
Use the --tcpwaitdata switch in the MTA startup file to increase the number of seconds the MTA
attempts to send messages to another MTA or a POA across a TCP/IP link.
MTA Console: You can check the current wait intervals on the Configuration page under the TCP/IP
Settings heading.
MTA Console: You can view the current contents of the routing queue from the Status page. Click
Router under the Queue Information heading.
Set --maxrouters to a lower number to conserve resources and keep the MTA from starting more than
the specified maximum number of router threads.
Set --maxidlerouters to a lower number if you want the MTA to terminate idle router threads more
quickly. Set --maxidlerouters to a higher number if you want the MTA to keep more idle router threads
ready to process incoming message traffic.
By default, the MTA waits 600 seconds (10 minutes) between its attempts to contact a closed
location. You can adjust the time interval the MTA waits to meet the needs of your GroupWise
system.
For a TCP/IP link, a location is considered open if the MTA receives a response from the receiving
agent within the currently configured wait intervals. See Section 25.1.2, “Adjusting the MTA Wait
Intervals for Slow TCP/IP Connections,” on page 243. Otherwise, the location is considered closed.
For a mapped or UNC link, a location is considered open if the MTA can perform the following
actions:
Create a temporary folder in the MTA input queue (domain\wpcsin and post_office\wpcsin
folders)
Create a temporary file in that new folder
Delete the temporary file
Delete the temporary folder
You can override settings provided in the GroupWise Admin console by using startup switches in the
MTA startup file. The default location for the MTA startup file is in the domain folder.
When you create a domain and install the MTA, an initial MTA startup file is created. It is named using
the first 8 characters of the domain name with a .mta extension. This initial startup file includes the
--home startup switch set to the location of the domain folder.
Startup switches specified on the command line override those in the startup file. Startup switches in
the startup file override corresponding settings in the GroupWise Admin console. You can view the
MTA startup file from the Configuration page of the MTA console.
The table below summarizes MTA startup switches and how they correspond to configuration settings
in the GroupWise Admin console.
26.2 --activelog
Displays the active log window rather than the alert box when the MTA starts with a user interface.
26.3 --adminport
Specifies the port number used for the MTA to communicate with the GroupWise Admin Service. The
default port number is 9710.
26.4 --certfile
Specifies the full path to the public certificate file used to provide secure SSL communication between
the MTA and other programs. See Section 22.2.1, “Securing the Domain with SSL Connections to the
MTA,” on page 229.
26.6 --cyhi
Sets the number of seconds in the scan cycle that the MTA uses to scan its priority 0-1 input queues.
The default is 5 seconds.
26.7 --cylo
Sets the number of seconds in the scan cycle that the MTA uses to scan its priority 2-7 input queues.
The default is 15 seconds.
26.8 --defaultroutingdomain
Identifies the domain name in your GroupWise system to which all MTAs should send messages
when they cannot resolve the available routing information to a specific user.post_office.domain
GroupWise address. See Section 22.2.3, “Configuring a Routing Domain,” on page 231.
26.9 --dhparm
Specifies a Diffie-Hellman cipher parameters file used for SSL/TLS to replace the default parameters
set by GroupWise. GroupWise uses default Diffie-Hellman parameters of 2048 bits to generate the
DH key. A valid DH parameter is in PEM format.
26.10 --fast0
Causes the MTA to monitor and process the priority 0 and 1 subfolders independently with separate
scanner threads, rather than in sequence with the same scanner thread.
26.11 --fast4
Causes the MTA to monitor and process the priority 2 and 3 subfolders with a separate scanner
thread from the priority 4 through 7 subfolders.
26.12 --help
Displays the MTA startup switch Help information. When this switch is used, the MTA does not start.
If you specify a UNC path with the --home switch when you run the MTA as a Windows service, you
must configure the MTA service to run under a specific Windows user account. If you specify a local
folder or a mapped drive, you can configure the MTA service to run under the local system account.
However, running under the Administrator account is highly recommended.
26.14 --httppassword
Specifies the password for the MTA to prompt for before allowing MTA status information to be
displayed in your web browser. Do not use an existing LDAP directory password because the
information passes over the non-secure connection between your web browser and the MTA. See
Section 24.1, “Using the MTA Console,” on page 237.
26.15 --httpport
Sets the HTTP port number used for the MTA to communicate with your web browser. The default is
7180; the setting must be unique. See Section 24.1, “Using the MTA Console,” on page 237.
26.17 --httpssl
Enables secure SSL communication between the MTA and the MTA console displayed in your web
browser. See Section 22.2.1, “Securing the Domain with SSL Connections to the MTA,” on page 229.
26.18 --httpuser
Specifies the user name for the MTA to prompt for before allowing MTA status information to be
displayed in your web browser. Providing a user name is optional. Do not use an existing LDAP
directory user name because the information passes over the non-secure connection between your
web browser and the MTA. See Section 24.1, “Using the MTA Console,” on page 237.
26.19 --ip
Binds the MTA to a specific IP address when the server where it runs uses multiple IP addresses. The
specified IP address is associated with both ports used by the MTA (message transfer and HTTP)
Without the --ip switch, the MTA binds to all available IP addresses. See Section 22.1.3, “Binding the
MTA to a Specific IP Address,” on page 228.
26.20 --keyfile
Specifies the full path to the private file used to provide secure SSL communication between the MTA
and other programs. See Section 22.2.1, “Securing the Domain with SSL Connections to the MTA,”
on page 229.
26.21 --keypassword
Specifies the password used to encrypt the private SSL key file when it was created. See
Section 22.2.1, “Securing the Domain with SSL Connections to the MTA,” on page 229.
26.22 --language
Specifies the language to run the MTA in, using a two-letter language code as listed below. You must
install the MTA in the selected language in order for the MTA to display in the selected language.
The initial default is the language used in the domain. If that language has not been installed, the next
default is the language used by the operating system. If that language has not been installed, the final
default is English. You only need to use this switch if you need to override these defaults.
Contact your local Novell sales office for information about language availability.
26.23 --log
Specifies the folder where the MTA will store its log files. The default location varies by platform.
Linux: /var/log/novell/groupwise/domain_name.mta
For more information, see Section 24.2, “Using MTA Log Files,” on page 238.
You typically find multiple log files in the specified folder. The first four characters represent the date.
The next three characters identify the agent. A three-digit extension allows for multiple log files
created on the same day. For example, a log file named 0518mta.001 indicates that it is an MTA log
file, created on May 18. If you restarted the MTA on the same day, a new log file is started, named
0518mta.002.
26.24 --logdays
Sets the number of days you want MTA log files to remain on disk before being automatically deleted.
The default log file age is 30 days. The valid range is from 1 to 350 days. See Section 24.2, “Using
MTA Log Files,” on page 238.
26.26 --loglevel
Controls the amount of information logged by the MTA. Logged information is displayed in the log
message box and written to the MTA log file during the current agent session. The default is Normal,
which displays only the essential information suitable for a smoothly running MTA. Use Verbose to
display the essential information, plus additional information helpful for troubleshooting. Verbose
logging does not degrade MTA performance, but log files saved to disk consume more disk space
when verbose logging is in use. See Section 24.2, “Using MTA Log Files,” on page 238.
26.27 --logmax
Sets the maximum amount of disk space for all MTA log files. When the specified disk space is
consumed, the MTA deletes existing log files, starting with the oldest. The default is 102400 KB (100
MB) of disk space for all MTA log files. The maximum allowable setting is 102400000 (1 GB). Specify
0 (zero) for unlimited disk space. See Section 24.2, “Using MTA Log Files,” on page 238.
26.29 --maxrouters
Specifies the maximum number of router threads the MTA can start. The default is 16; valid values
range from 1 to 16. See Section 25.2, “Optimizing the Routing Queue,” on page 244.
26.30 --messagelogdays
Sets the number of days you want MTA message log files to remain on disk before being
automatically deleted. The default is 30 days. See Section 24.2.2, “Configuring MTA Log Settings and
Switches,” on page 238.
26.31 --messagelogmaxsize
Sets the maximum size for MTA message log files. The default is 102400 KB (100 MB). The
maximum allowable setting is 102400000 (1 GB). See Section 22.1.4, “Enabling MTA Message
Logging,” on page 228.
26.32 --messagelogpath
Specifies the folder for the MTA message log. The default location is mlocal\msglog. See
Section 22.1.4, “Enabling MTA Message Logging,” on page 228.
26.33 --messagelogsettings
Enables MTA message logging. See Section 22.1.4, “Enabling MTA Message Logging,” on page 228.
26.34 --msgtranssl
Enables secure SSL communication between the MTA and the POAs in its domain. See
Section 22.2.1, “Securing the Domain with SSL Connections to the MTA,” on page 229.
26.35 --noada
Disables the MTA admin thread.
26.36 --nodns
Disables DNS lookups for the MTA.
26.37 --noerrormail
Prevents error files from being sent to the GroupWise administrator. The default is for error mail to be
sent to the administrator. See Section 24.6, “Receiving Notifications of Agent Problems,” on
page 242.
26.38 --nondssync
Disables LDAP user synchronization.
26.39 --norecover
Disables automatic database recovery. The default is for automatic database recovery to be turned
on. If the MTA detects a problem with the domain database (wpdomain.db) when automatic database
recovery has been turned off, the MTA notifies the administrator, but it does not recover the problem
database. See Chapter 42, “Maintaining Domain and Post Office Databases,” on page 395.
26.41 --show
Starts the MTA with a server console user interface.
By default, no user interface is provided for the agents on Linux. An agent that runs with a user
interface cannot be managed in the GroupWise Admin console.
The --show startup switch can be used on the command line or in the gwha.conf file used by the
GroupWise High Availability Service. It cannot be placed in the agent startup file.
The --show switch cannot be used in the MTA startup file. However, if you want the MTA to start with
a user interface when you run the grpwise script or when the server reboots, you can configure the
GroupWise High Availability service (gwha) to accomplish this, as described in “Editing the gwha.conf
File to Enable SSL and Customize Agent Management (Optional)” in the GroupWise 2014 R2
Installation Guide.
26.42 --sslciphersuite
Sets the SSL cipher suites used by the Archive Agent, the Messaging Agent, and Messenger clients.
The cipher list must be in OpenSSL format. For more information on OpenSSL format, see Cipher
List Format (https://www.openssl.org/docs/apps/ciphers.html#CIPHER-LIST-FORMAT)
26.43 --ssloption
Specify a specific SSL protocol to disable. By specifying SSL_OP_NO_TLSv1, GroupWise will
disable TLSv1 support. Specify additional options by adding the SSL key work separated by a
comma.
26.44 --tcpinbound
Sets the maximum number of inbound TCP/IP connections for the MTA from POAs and GWIAs
belonging to the domain and from MTAs and GWIAs in other domains in your GroupWise system.
The default is 40. There is no maximum number of outbound connections. The only limit on the MTA
for outbound connections is available resources. See Section 25.1.1, “Adjusting the Number of MTA
TCP/IP Connections,” on page 243.
26.45 --tcpport
Sets the TCP port number on which the MTA listens for incoming messages from other MTAs, POAs,
and GWIAs. The default is 7100.
26.46 --tcpwaitconnect
Sets the maximum number of seconds the MTA waits for a connection to another MTA. The default is
5. See Section 25.1.2, “Adjusting the MTA Wait Intervals for Slow TCP/IP Connections,” on page 243.
26.48 --vsnoadm
Prevents GroupWise administration messages from being processed by an integrated virus scanner.
Because administration messages are created within your GroupWise system, they are not likely to
contain viruses. In a GroupWise system with a large amount of administrative activity (adding users,
deleting users, etc.), skipping the virus scanning of administrative messages can speed up
processing of users’ email messages.
26.49 --work
Specifies the folder where the MTA creates its local working folder (mslocal). The default is the
domain folder. However, if the domain is located on a different server from where the MTA will run,
use a local folder so the MTA cannot lose its connection to its mslocal folder.
For a complete list of port numbers used by the GWIA, see Section A.5, “Internet Agent Port
Numbers,” on page 734.
For detailed Linux-specific GWIA information, see Appendix C, “Linux Basics for GroupWise
Administration,” on page 741.
For outgoing messages to the Internet, the MTA passes the messages to the GWIA, which then
converts the messages to Internet messaging format, and then sends them to the designated Internet
addresses.
Internet
Agent
Internet
Domain Message
Transfer Document
Agent Viewer
Agent
Post
Office
Agents
Post Post
Office Office
SMTP/MIME Service
The SMTP/MIME service in the GWIA enables you to send and receive email with standard encoding
on attachments, international character sets, and multipart messages. Multimedia email with images,
sound, and video can also be exchanged. The service also includes these additional features:
SMTP Dial-Up Service: The GWIA includes SMTP dial-up functionality. This can be useful
when your system does not meet the requirements of a dedicated Internet connection, or when
you prefer not to have a permanent Internet connection. With the SMTP dial-up feature, you can
establish a schedule to periodically check the message store without maintaining a permanent
link.
Flexible Addressing: The GWIA offers full GroupWise addressing support, including system
groups, nicknames, and individual users.
The GWIA also takes advantage of GroupWise Internet addressing, which allows inbound
messages addressed in a variety of formats to be delivered to GW users. These formats include:
User_Name@Internet_domain_name
User_Name.PostOffice@Internet_domain_name
Last_Name.First_Name@Internet_domain_name
First_Name.Last_Name@Internet_domain_name
First_Initial_Last_Name@Internet_domain_name
Internet Users in the Address Book: Internet users can be added to the GroupWise Address
Book so users won’t have to remember long Internet addresses.
Real-Time Blacklists: Organizations such as SpamCop provide lists of IP addresses that are
known to be open relay hosts or spam hosts. You can use the real-time blacklists provided by
such sites to protect your users from offensive spam.
Spam Protection: Anti-spam services use different indicators to mark potential spam. One
might use a string of asterisks; the more asterisks, the greater the likelihood that the message is
spam. Another might use a numerical value; the higher the number, the greater the likelihood
that the message is spam. You can configure the GWIA to recognize as spam whatever
indicators your anti-spam service uses and flag such messages for processing by the client Junk
Mail Handling feature.
Accounting: The accounting feature provides inbound and outbound tracking of messages
passing through the GWIA. This lets administrators track how the GWIA is being used.
GroupWise Monitor includes a Gateway Accounting report that organizes information gathered
in GWIA accounting files into a format that is visually easy to read.
DNS Name Resolution: The GWIA can access a DNS server directly to resolve host names to
IP addresses, or it can rely on a relay host to perform the name resolution.
Connect to Other GroupWise Systems Through the Internet: With passthrough addressing,
you can connect to other GroupWise systems anywhere on the Internet and have access to all of
the GroupWise features. The Internet simply becomes a mail transport medium for GroupWise.
POP3 Service
The Post Office Protocol 3 (POP3) service in the GWIA allows you to download messages from your
GroupWise post office to a POP3 client application such as a web browser’s email program or a
Telnet application. The GWIA acts as the POP3 server, providing a TCP connection between the
IMAP4 Service
The GWIA supports the Internet Messaging Access Protocol 4 (IMAP4). As an IMAP4 server, the
GWIA allows IMAP4-compliant email clients to read and manipulate GroupWise messages.
Access Control
The GWIA includes security capabilities called Access Control that allow administrators to control
user access to all services (SMTP/MIME, POP3, and IMAP4). Access Control can help you reduce
costs and provide added security.
With the SMTP/MIME service, Access Control can be used to block messages being sent to or
received from specific host or IP addresses.
Multiple Threading
Multiple threading enables more than one send or receive process to be running concurrently. You
can configure the number of threads to enhance the speed and performance of the GWIA. The
number of threads are set separately for the SMTP/MIME service, POP3 service, and IMAP4 service.
SNMP-Compliant
The GWIA can be managed by any SNMP-compliant network manager.
For GWIA system requirements, see “Internet Agent Functional Requirements” in the GroupWise
2014 R2 Installation Guide. The GWIA can optionally be installed as part of creating a new domain.
For installation instructions, see “GWIA Configuration” and “Adding a Secondary Domain” in the
GroupWise 2014 R2 Installation Guide. The GWIA can also be added to a domain after it has been
created. For setup instructions, see Section 28.1, “Creating a New GWIA in the GroupWise Admin
Console,” on page 269.
As your GroupWise system grows and evolves, you might need to modify your GWIA configuration to
meet the changing needs of your system.
1 In the GroupWise Admin console, connect to the domain where you want to install the GWIA.
2 Click Internet Agents > New.
3 Specify a unique name for the GWIA object.
4 Specify the fully qualified Internet hostname of the server where the GWIA runs, such as
gwia.example.com, or the name of the "A record" in your DNS table that associates the
hostname with the server's IP address.
5 Set the time zone, language, and platform as needed, then click OK.
If you want additional GWIAs that are not associated with domains where post offices and mailboxes
are located, you can set up a new domain server specifically to house one or more additional GWIAs.
The MTA always tries to transfer outbound Internet messages to the primary GWIA first, so after an
outage the primary GWIA automatically resumes its normal processing for the domain.
You can use the /ip startup switch in the GWIA startup file to establish an exclusive bind to the
specified IP address. If you have used this switch in the GWIA startup file, remove it to turn off the
exclusive bind.
For background information about SSL and how to set it up on your system, see Section 90.2,
“Server Certificates and SSL Encryption,” on page 699.
IMPORTANT: To prevent closed links between agents, select Enabled when you are initially
configuring agents for SSL. Select Required for tighter security only after all agents are
successfully using SSL.
7 (Optional) Select Enabled or Required in the SSL drop-down list for other protocols as needed.
8 Click Save, then click Close to return to the main Admin console window.
When you created your GroupWise system, you set up the initial Internet domain name. You can
establish additional Internet domain names for your GroupWise system as needed. As you manage
the Internet domain names for your GroupWise system, you do the following tasks:
Define additional Internet domain names for your GroupWise system. You can have one or more
domain names (for example, novell.com, gw.novell.com, and support.novell.com).
Set up the default Internet address format for use when displaying user addresses in the
GroupWise Address Book and in sent messages. There are six formats that can be assigned at
the system, domain, post office, or user level. In addition, there is a free-form format that can be
used at the user level.
Designate the address formats that can be used to address messages to your GroupWise users.
There are five possible formats to choose from. You can allow all five formats, or only one.
Specify the default GWIA to be used when sending messages from your GroupWise system to
the Internet. This becomes your system’s default GWIA for outbound messages sent from all
domains; however, if you have multiple GWIAs, you can override this setting by assigning
GWIAs at the domain level.
The following sections help you plan and set up Internet addressing:
If your GroupWise system includes only one GWIA, that GWIA must be assigned to all domains and
is used for all outbound messages.
If your GroupWise system includes multiple GWIAs, you must decide which GWIA you want to be
responsible for outbound messages for each domain. You must select one GWIA as your system’s
default GWIA, but you can override the default at each domain.
After you have associated Internet domains with your GroupWise system, all users in your system
can be addressed using any of the domains (for example, [email protected],
[email protected], and [email protected]). The addresses can be used both
internally and externally.
To make this process easier, GroupWise lets you assign a preferred Internet domain to be used as
the default for your GroupWise system (for example, novell.com). The system’s preferred Internet
domain is applied to all users in your GroupWise system. However, you can override the system’s
preferred Internet domain at the domain, post office, or user level, meaning that different users within
your GroupWise system can be assigned different preferred Internet domains. For example, users in
one domain can be assigned gw.novell.com as their preferred Internet domain while users in
another domain are assigned support.novell.com.
user_name.post_office.domain@internet_domain_name
user_name.post_office@internet_domain_name
user_name@internet_domain_name
firstname.lastname@internet_domain_name
lastname.firstname@internet_domain_name
firstinital lastname@internet_domain_name
As with the preferred Internet domain, you must assign a preferred address format to be used as the
default for your GroupWise system. The system’s preferred address format is applied to all users in
your GroupWise system. However, you can override the system’s preferred address format at the
domain, post office, and user/resource level.
The following sections explain some of the advantages and disadvantages of each address format:
user_name.post_office.domain@internet_domain_name
user_name.post_office@internet_domain_name
user_name@internet_domain_name
firstname.lastname@internet_domain_name
lastname.firstname@internet_domain_name
firstinitial lastname@internet_domain_name
user_name.post_office.domain@internet_domain_name
Advantages
Reliable format. GroupWise guarantees that each address is unique.
Identical user names can be used in different post offices.
user_name.post_office@internet_domain_name
Advantages
Guarantees uniqueness if all your post offices have unique names.
Identical user names can be placed in different post offices.
Disadvantages
Addresses tend to be long and hard to remember.
Addresses might change over time as users are moved from one post office to another.
user_name@internet_domain_name
Advantages
Addresses are short and easy to remember.
Backward-compatible with previous versions of GroupWise. (Users won’t need to update their
business cards.)
Addresses do not change as users are moved.
Disadvantages
When you first enable this address format, you might have duplicate user names in your
GroupWise system. However, in the future, the GroupWise Admin console prevents you from
creating duplicate user names within the same Internet domain name. The same user name can
be used in different Internet domains without problem.
firstname.lastname@internet_domain_name
Advantages
Addresses are intuitive and easy to remember.
Addresses do not change as users are moved.
Disadvantages
When you first enable this address format, you might have duplicate first and last names in your
GroupWise system. However, in the future, the GroupWise Admin console prevents you from
creating users with the same first and last names within the same Internet domain name. The
same first name and last name combination can be used in different Internet domains without
problem.
The probability of conflicts increases if any user’s first and last names match any GroupWise
domain or post office name, if any two users have the same first and last names, or if any two
users have the opposite first and last names (such as James Dean and Dean James).
Advantages
Addresses are intuitive and easy to remember.
Addresses do not change as users are moved.
Disadvantages
When you first enable this address format, you might have duplicate first and last names in your
GroupWise system. However, in the future, the GroupWise Admin console prevents you from
creating users with the same first and last names within the same Internet domain name. The
same last name and first name combination can be used in different Internet domains without a
problem.
The probability of conflicts increases if any user’s first and last names match any GroupWise
domain or post office name, if any two users have the same first and last names, or if any two
users have the opposite first and last names (such as James Dean and Dean James).
firstinitial lastname@internet_domain_name
Advantages
Addresses are intuitive and easy to remember.
Addresses do not change as users are moved.
Disadvantages
When you first enable this address format, you might have duplicate first initial and last names in
your GroupWise system. However, in the future, the GroupWise Admin console prevents you
from creating users with the same first initials and last names within the same Internet domain
name. The same first initial and last name combination can be used in different Internet domains
without problem
The probability of conflicts increases when using first initials instead of complete first names.
The allowed address formats, on the other hand, determine which address formats are accepted by
the GWIA. There are five possible allowed formats:
user_name.post_office@internet_domain_name
user_name@internet_domain_name
firstname.lastname@internet_domain_name
lastname.firstname@internet_domain_name
firstinital lastname@internet_domain_name
If you select all five formats, the GWIA accepts messages addressed to users in any of the formats.
For example, John Peterson would receive messages sent using any of the following addresses:
You must designate the allowed address formats to be used as the default formats for your
GroupWise system. The system’s allowed address formats are applied to all users in your GroupWise
system. However, you can override the system’s allowed address formats at the domain, post office,
and user/resource level.
For example, assume you have two John Petersons with user names of jpeterson and japeterson.
The user_name.post_office and user_name address formats do not cause message delivery
problems, but the firstname.lastname, lastname.firstname, and firstinitial lastname
address formats do. To overcome this problem, you could disallow the three problem formats for
these users at the user level.
You can override the system default Internet domain name separately for each domain.
1 In the GroupWise Admin console, browse to and client the name of a domain.
2 Click the Internet Addressing tab.
3 Click Override, then select the Internet domain name for this domain.
1 In the GroupWise Admin console, click System > Internet Addressing, then click the Address
Formats tab.
2 Change the address formats as needed then click Save.
If your users are associated with User objects in an LDAP directory, and if you changed the
preferred address format, you are prompted to update the email addresses for the affected users
in the LDAP directory. We recommend that you allow this update. However, performing it for a
large segment of your GroupWise system might take a while.
3 Click Yes to confirm, then click Close when the process is completed.
1 In the GroupWise Admin console, browse to and click a domain, a post office, a user, a group, or
a resource.
2 Click the Internet Addressing tab.
At the domain level, you can override all Internet addressing defaults assigned to your
GroupWise system.
At the post office level, you can override the preferred Internet domain name, the preferred
address format, and the allowed address formats that the post office has inherited from its
domain. You cannot override the GWIA that is assigned to handle outbound messages from the
domain.
At the user, group, and resource level, you can override the preferred Internet domain, the
preferred address format, and the allowed address formats that the user/resource has inherited
from its post office. You cannot override the GWIA that is assigned to handle outbound
messages from the domain.
3 Select Override for the settings that you want to change, adjust the settings as needed, then
click Save.
If you changed the preferred address format, and if the users are associated with User objects in
an LDAP directory, you are prompted to update the Internet email address. The Internet email
address is the address that is returned in response to LDAP queries to the LDAP directory. We
recommend that you allow this update. However, performing it for a large segment of your
GroupWise system might take a while.
4 Click Save, then click Close to return to the main Admin console window.
For example, if you have selected First Name.Last Name@Internet domain name as your
system’s preferred address format and you have two John Petersons, each on a different post office
in your system, you would end up two users having the same address
([email protected]). You could use this field to differentiate them by including their middle
initials in their address ([email protected] and [email protected]).
You can use the same email ID for more than one user in your GroupWise system, if each user is in a
different Internet domain. Rather than requiring that each email ID be unique in your GroupWise
system, each combination of email ID and Internet domain must be unique. This provides more
flexibility for handling the situation where two people have the same name.
1 In the GroupWise Admin console, browse to and click the name of a User, a Group, or a
Resource, then click Internet Addressing.
2 In the Preferred Email ID section, click Override, then specify the unique email address for the
user/group/resource.
Use any RFC-compliant characters.
3 Click Save, then click Close.
Access Control can be implemented at a user, group, post office, or domain level.
Choose from the following information to learn how to set up and use Access Control.
Whether SMTP/MIME messages are allowed to transfer to and from the Internet
Whether SMTP/MIME messages are allowed to transfer to and from specific domains on the
Internet
The maximum size of SMTP/MIME messages that can transfer to and from the Internet
Whether SMTP/MIME messages generated by GroupWise rules are allowed to transfer to the
Internet
Whether IMAP4 clients are allowed to access the GroupWise system
Whether POP3 clients are allowed to access the GroupWise system, and if allowed, how
messages to and from POP3 clients are managed by the GroupWise system
The default class of service, which all users belong to, allows incoming and outgoing SMTP/MIME
messages, and allows POP3 and IMAP4 access. You can control user access, at an individual,
group, post office, or domain level, by creating different classes of service and adding the appropriate
members to the classes. For example, you could create a class of service that limits the size of
SMTP/MIME messages for a selected individual, group, post office, or domain.
Because you can assign membership at the user, group, post office, and domain level, it is possible
that a single user can be a member of multiple classes of service. This conflict is resolved
hierarchically, as shown in the following table:
If a user’s membership in two classes of service is based upon the same level of membership (for
example, both through individual user membership), the class that applies is the one that allows the
most privileges.
IMPORTANT: The GWIA uses the message size limit set for the default class of service as the
maximum incoming message size for your GroupWise system. Therefore, you should set the
message size for the default class of service to accommodate the largest message that you want to
allow into your GroupWise system. As needed, you can then create other classes of service with
smaller message size limits to restrict the size of incoming messages for selected users, groups, post
offices, or domains. Methods for restricting message size within your GroupWise system are
described in Section 13.3.5, “Restricting the Size of Messages That Users Can Send,” on page 125.
NOTE: If a member of the class of service to allow or prevent has an alias, you must also add
the member’s alias to the class of service. Ongoing use of aliases is not recommended.
Prevent Messages Larger Than: This option is available only if you chose Allow Incoming
Messages or Prevent Incoming Messages. In the case of Prevent Incoming Messages, this
option only applies to messages received from Internet sites listed in the Allow Messages From
list.
If you want to set a size limit on incoming messages, select the limit.
Internet messages that exceed the limit are not delivered. The sender receives an email
message indicating that the message is undeliverable and including the following explanation:
Message exceeds maximum allowed size
IMPORTANT: If you have also set a message size limit for your MTAs, ensure that the MTA
message size limit is equal to or greater than the GWIA message size limit. For more
information, see Section 22.2.2, “Restricting Message Size between Domains,” on page 230.
Exceptions: This option is available only if you chose Allow Incoming Messages or Prevent
Incoming Messages.
Prevent Messages From: If you chose to allow incoming messages but you want to prevent
messages from specific Internet sites (IP addresses or DNS hostnames), add the sites to the
Prevent Messages From list.
Allow Messages From: Conversely, if you chose to prevent incoming messages but you want
to allow messages from specific Internet sites (IP addresses or DNS hostnames), add the sites
to the Allow Messages From list.
If you want to allow messages where the user name is blank, add Blank-Sender-User-ID to the
Allow Messages From list.
Real-Time Blacklists
Organizations such as SpamCop (http://www.spamcop.net) provide lists of IP addresses that are
known to be open relay hosts or spam hosts. If you want to use free blacklist services such as these,
or if you subscribe to fee-based services, you must define the blacklist addresses for these services.
The GWIA then uses the defined services to ensure that no messages are received from blacklisted
hosts. The following sections provide information to help you define blacklist addresses and, if
necessary, override a host address included in a blacklist.
bl.spamcop.net
4 Type the blacklist address in the Address box, then click OK to add the address to the Blacklist
Addresses list.
5 If you have multiple blacklists in the Blacklist Addresses list, use the up-arrow and down-arrow
to position the blacklists in the order you want them checked. The GWIA checks the blacklists in
the order they are listed, from top to bottom.
6 Click Save, then click Close to return to the main Admin console window.
Overriding a Blacklist
In some cases, a blacklist might contain a host from which you still want to receive messages. For
example, goodhost.com has been accidentally added to a blacklist but you still want to receive
messages from that host.
You can use the SMTP Incoming Exceptions list on a class of service to override a blacklist. For
information about editing or creating a class of service, see “Creating a Class of Service” on
page 281.
You can also create a list of hosts that you always want to allow messages from, so you can create
your own white list.
For information about editing or creating a class of service, see “Creating a Class of Service” on
page 281.
You can manually edit the blocked.txt file to add or remove hosts. To maintain consistency for your
system, you can also copy the list to other GWIA installations.
where address is either a hostname or an IP address. You can block on any octet. For example:
IP Address Blocks
172.16.10-34.* Any IP address starting with 172.16 and any octet from 10 to 34
Hostname Blocks
There is no limit to the number of IP addresses and hostnames that you can block in the
blocked.txt file
3 Save the file as blocked.txt.
For additional protective startup switches, see Section 34.4.13, “Mailbomb and Spam Security,” on
page 344.
The list is saved in the xspam.cfg file in the domain\wpgate\gwia folder. As described above, each
line of the xspam.cfg file identifies an “X” header field that your anti-spam service is writing to the
MIME header, along with the values that flag the message as spam. The GWIA examines the MIME
header for any field listed in the xspam.cfg file. When a match occurs, the message is marked for
handling by the GroupWise client Junk Mail Handling feature.
Outbound Authentication
For outbound authentication to other SMTP hosts, the GWIA requires that the remote SMTP hosts
support the AUTH LOGIN authentication method. To set up outbound authentication:
1 Include the remote SMTP host’s domain name an authentication credentials in the gwauth.cfg
file, located in the domain\wpgate\gwia folder. The format is:
For example:
2 If you have multiple SMTP hosts that require authentication before they accept messages from
your system, create an entry for each host. Ensure include a hard return after the last entry.
3 If you want to allow the GWIA to send messages only to SMTP hosts listed in the gwauth.cfg
file, use the following startup switch:
/forceoutboundauth
With the --forceoutboundauth switch enabled, if a message is sent to an SMTP host not listed in
the gwauth.cfg file, the sender receives an Undeliverable message.
Inbound Authentication
For inbound authentication from other SMTP hosts, you can use the --forceinboundauth startup
switch to ensure that the GWIA accepts messages only from SMTP hosts that use the AUTH LOGIN
authentication method to provide a valid GroupWise use name and password. The remote SMTP
hosts can use any valid GroupWise user name and password. However, for security reasons, we
recommend that you create a dedicated GroupWise user account for remote SMTP host
authentication.
By default, the GWIA does not reject messages from unidentified hosts. It accepts messages from
any host, but it displays a warning if the sender’s host is not authentic.
The accounting file is an ASCII-delimited text file that records the source, priority, message type,
destination, and other information about each message sent through the gateway. The file, which is
updated daily at midnight (and each time the GWIA restarts), is called acct and is located in the
xxx.prc folder. If no accountant is specified for the gateway in the GroupWise Admin console, the file
is deleted and re-created each day. Follow the steps below to set up accounting.
Selecting an Accountant
You can select one or more GroupWise users to be accountants. Every day at midnight, each
accountant receives an accounting file (acct) that contains information about the messages the
gateway sent that day.
Enabling Accounting
1 In the GroupWise Admin console, browse to and click the GWIA.
2 Click the GroupWise tab, then click Optional Settings.
3 Set Accounting to Yes.
4 Set Correlation Enabled to Yes.
5 Click Save, then click Close to return to the main Admin console window.
GroupWise user’s domain Provo The domain in which the GroupWise user
resides.
GroupWise user’s post office Research The post office where the GroupWise user’s
mailbox resides.
Message subject Meeting Agenda The message’s Subject line. Only the first 32
characters are displayed.
Foreign user’s address [email protected] The foreign user’s email address. For inbound
messages, the foreign user is the message
sender. For outbound messages, the foreign
user is the message recipient.
Message size 11388 The total size, in bytes, of the message and its
attachments.
SMTP and MIME are standard protocols that the GWIA uses to send and receive email messages
over the Internet. SMTP, or Simple Mail Transfer Protocol, is the message transmission protocol.
MIME, or Multipurpose Internet Mail Extension, is the message format protocol. Choose from the
following topics for information about how to enable SMTP/MIME services and configure various
SMTP/MIME settings:
Number of send and receive threads that the GWIA starts and how often the send threads poll
for outgoing messages
Hostname of the server where the GWIA is running and of a relay host if your system includes
one
IP address to bind to at connection time if the server has multiple IP addresses
Whether to use 7-bit or 8-bit encoding for outgoing messages
How to handle messages that cannot be sent immediately and must be deferred
Whether to notify senders when messages are delayed
Whether to display GroupWise version information when establishing an SNMP connection
Use GroupWise User Address as Mail From: for Rule Generated Messages:
Configure the GWIA to use the real user in the Mail From field instead of having auto-
forwards come from Postmaster and auto-replies come from Mailer-Daemon. This setting
corresponds with the GWIA’s --realmailfrom switch.
4 Click Save, then click Close to return to the main Admin console window.
Number of GWIA threads for converting messages into the specified format
The view in which incoming messages are displayed to GroupWise users
Text encoding method (Basic RFC-822 or MIME)
Text wrapping
Message prioritization based on x-priority fields
NOTE: RFC-822 is a very old format. Use it only if you have a specific need for it.
Message Text Line Wrapping: The Quoted Printable text line wrapping setting lets you select
the Quoted Printable MIME standard for line wrapping, which provides “soft returns”. By default
this setting is turned on. If you turn the setting off, MIME messages go out as plain text and wrap
text with “hard returns” according to the number of characters specified in the line wrap length
setting. This setting corresponds with the GWIA’s --nqpmt switch.
novell.com
10.1.1.10
You can enter a specific address, as shown above, or you can use wildcards and IP address
ranges to specify multiple addresses, as follows:
*.novell.com
10.1.1.*
10.1.1.10-15
NOTE: If the user for whom you want to define an exception has an alias, you must also define
an exception for the user’s alias. Ongoing use of aliases is not recommended.
You are using a relay host for outbound messages. However, you want some outbound
messages sent directly to the destination host rather than the relay host. Whenever a message
is addressed to a user at a host that is included in the route.cfg file, the GWIA sends the
message directly to the destination host rather than the relay host.
You need to send messages to SMTP hosts that are unknown to the public Domain Name
Servers. The route.cfg file acts much like a hosts file to enable the GWIA to resolve addresses
not listed in DNS.
The GWIA uses external DNS servers but the server it is running on has an internal IP address.
This prevents the GWIA from querying external DNS servers for its own internal domain names
and receiving Host Down errors from the external DNS servers.
You want to route messages through an SMTP host that checks for viruses (or performs some
other task) before routing them to the destination host.
hostname address
Replace hostname with a DNS hostname or an Internet domain name. Replace address with an
alternative hostname or an IP address. For example:
novell.com gwia.novell.com
unixbox [172.16.5.18]
.novell.com gwia.novell.com
Ensure that you include a hard return after the last entry.
3 Save the route.cfg file.
4 Restart the GWIA.
By default, the GWIA uses internal status messages. However, you can override the internal status
messages by using a status.xml file that includes the status messages you want to use.
You can modify text in the <SUBJECT> tag or in the <TEXT> tags.
You can add additional <TEXT> tags in the <MESSAGE_BODY>.
The GWIA now uses the status messages defined in the status.xml file rather than its internal status
messages.
Images
Sounds
Linux Tar Files
PostScript
FTP-able File Pointers
Non-ASCII Character Sets
Enriched Text
Nearly any other file
Because MIME handles such a variety of file types, you might need to customize aspects of MIME for
your users.
The content of the preamble.txt file is a warning, in English, that the file is being sent in MIME
format. If the recipient cannot read the message, he or she needs to either use a MIME-compliant
mail reader or reply to the sender and request the message not be sent in MIME format.
We recommend that you use the preamble.txt file so that those who read MIME messages coming
from your GroupWise system and who lack MIME-compliant mail readers can understand why they
cannot read the message and can take corrective action.
The GWIA’s gateway folder also contains a preamble.all file. The preamble.all file includes the
text of preamble.txt translated into several languages. If you anticipate that your users will be
sending mail to non-English speaking users, you might want to copy the appropriate language
sections from the preamble.all file to the preamble.txt file.
The 1024-byte limit on the size of the preamble.txt file still applies, so ensure that the file does not
exceed 1024 bytes.
The GWIA uses a mimetype.cfg file to map attachments to the appropriate MIME content types.
Based on an attachment’s content type, the GWIA encodes the attachment using quoted-printable,
Base64, or BinHex. Generally, quoted-printable is used for text-based files, Base64 for application
files, and BinHex for Macintosh files.
The mimetype.cfg file includes mappings for many standard files. If necessary, you can modify the
file to include additional mappings. If an attachment is sent that does not have a mapping in the file,
the GWIA chooses quoted-printable, BinHex, or Base64 encoding.
The mimetype.cfg file is also used for RFC-822 attachments, but UUencode or BinHex encoding is
used regardless of the mapped content type.
The mimetype.cfg file is located in the domain\wpgate\gwia folder. The following sections provide
information you need to know to modify the file:
Mapping Format
Each mapping entry in the file uses the following format:
Element Description
content-type The MIME content type to which the file type is being mapped (for example, text/
plain). You can omit the content-type only if you use the /parms element to
explicitly define the encoding scheme for the file type.
.ext|dtk-code|mac-ttttcccc The .ext element, dtk-code element, and mac-ttttcccc element are mutually
exclusive. Each entry contains only one of the elements.
.ext: The file type extension being mapped to the content type (such as
.txt).
dtk-code: The detect code being mapped to the content type (for example,
dtk-1126). GroupWise assigns a detect code to each attachment type.
mac-ttttcccc: The Macintosh file type and creator application being
mapped to the content type (for example, mac-textmswd). The first four
characters (tttt) are used for the file type. The last four characters (cccc) are
used for the creator application. You can use ???? for the creator portion
(mac-text????) to indicate a certain file type created by any application.
You can use ???? in both portions (mac-????????) to match any file type
created by any application.
/parms Optional parameters that can be used to override the default encoding assigned
to the MIME content type. Possible parameters are:
/alternate
/parallel
/base64
/quoted-printable
/quoted-printable-safe
/uuencode
/plain
/binhex
/nofixeol
/force-ext
/noconvert
/apple-single
/apple-double
"comment" Optional content description
File Organization
The mimetype.cfg file contains the following four sections:
[Parameter-Override]
[Mac-Mappings]
[Detect-Mappings]
[Extension-Mappings]
[Mac-Mappings]
The [Mac-mappings] section defines mappings for Macintosh file attachments. The following is a
sample entry:
Macintosh files have a type and creator associated with them. The first four characters are used for
the type and the last four characters are used for the creator application.
In the above example, the type is wdbn and the creator application is mswd. When a user attaches a
Macintosh file to a message, the GWIA uses the appropriate entry in the [Map-mappings] section to
map the file to a MIME content type and then encode the file according to the assigned encoding
scheme. Unless otherwise specified by the /parms element, BinHex 4.0 is used for the encoding. The
following example shows how you can use the /parms element to change the encoding from the
default (BinHex) to Base64:
If necessary, you can use ???? for the creator portion (mac-text????) to indicate a certain file type
created by any application. Or, you can use ???? in both portions (mac-????????) to match any file
type created by any application. For example:
This causes all Macintosh files to be encoded using Base64 rather than BinHex.
[Detect-Mappings]
GroupWise attempts to assign each attachment a detect code based on the attachment’s file type.
The [Detect-mappings] section defines the mappings based on these detect codes. The following
is a sample entry:
The GWIA uses the detect code to map to a MIME content type and then encode the file according to
the assigned encoding scheme. If there is no mapping specified or if the file type cannot be
determined, one of the other mapping methods, such as Extension-Mappings, are used. The detect
codes associated with attachments are GroupWise internal codes and cannot be changed.
[Extension-Mappings]
If a mapping could not be made based on the entries in the [Mac-mappings] and [Detect-
mappings] section, the GWIA uses the [Extension-mappings] section. The [Extension-
mappings] section defines mappings based on the attachment’s file extension. The following is a
sample entry:
application/pdf .pdf
The Post Office Protocol 3 (POP3) and the Internet Message Access Protocol 4 (IMAP4) are
standard messaging protocols for the Internet. The GroupWise GWIA can function as a POP3 or an
IMAP server, allowing access to the GroupWise domain database and message store. With POP3 or
IMAP server functionality enabled, GroupWise users can download their messages from GroupWise
to any POP3/IMAP4-compliant Internet email client. To send messages, POP3/IMAP4 clients can
identify the GWIA as their SMTP server.
NOTE: Internal IMAP clients can connect directly to the POA, rather than connecting through the
GWIA. For more information, see Section 15.2.2, “Supporting IMAP Clients,” on page 147. Direct
connection provides faster access for internal IMAP clients.
The Post Office Agent (POA) can also be configured to support IMAP connections. You could offer
IMAP services internally through the POA to provide faster response time for internal users. For more
information, see Section 15.2.2, “Supporting IMAP Clients,” on page 147. However, IMAP is primarily
available on the POA to support several third-party applications that communicate with the POA using
IMAP, while the IMAP services provided by the GWIA provide the standard IMAP access used by
users across the Internet.
1 In the GroupWise Admin console, browse to and click the name of a domain.
2 Click Post Office Links, then click the name of the post office.
3 Edit the post office link as needed, then click OK.
If you changed the default class of service to exclude POP3 or IMAP4 access rights, or if you defined
additional classes of services that do not provide POP3 or IMAP4 access rights, you might want to
evaluate your currently defined classes of service to ensure that they provide the appropriate POP3
or IMAP4 access. For details, see Section 29.5.1, “Controlling User Access to the Internet,” on
page 279.
Most email clients are configured differently. However, all Internet clients need to know the following
information:
Login options are appended to the user name with a colon character (:) between the user name and
the switches:
Syntax: user_name:switch
Example: User1:v=1
You can combine options by stringing them together after the user name and the colon without any
spaces between the options:
Syntax: user_name:switch1switch2
Example: User1:v=1sdl=10
The syntax for the user name options is not case sensitive. Login options are not required. If you do
not want to include any login options, just enter the user name in the text box, or following the USER
command if you are using a Telnet application as your POP3 client.
v=number between 1-31 The v option defines the POP3 client’s view number. If multiple User_Name:v=1
POP3 clients access the same GroupWise mailbox, each
client must use a different view number in order to see a fresh
mailbox.
t=1-1000 The t option defines the download period, starting with the User_Name:t=14
current day. For example, if you specify 14, then only
messages that are 14 days old or newer are downloaded. If
this option is not used, the default value is 30 days.
s The s option presets the file size when the STAT command is User_Name:S
executed. If the user mailbox contains a lot of messages or
large messages, it can take a long time to calculate the file
size. With this option, the STAT command always reports an
artificial file size of 1, which can save time.
l=1-1000 The l option limits the number of messages to download for User_Name:L=10
each POP3 session. For example, if you want to limit the
number of messages to 10, you enter l=10. If this option is not
used, the default value is 100 messages.
You can monitor the operation of the GWIA by using several different diagnostic tools. Each provides
important and helpful information about the status of the GWIA and how it is currently functioning.
Choose from the titles listed below to learn more about how to monitor the operations of the GWIA.
TIP: To access the GWIA console directly from your web browser, provide the URL where the GWIA
is located by supplying the network address and port number. For example:
http://gwia_server_address:9850
Linux: /var/log/novell/groupwise/gwia.domain
Windows: domain\wpgate\gwia\000.prc
You can change the location where the GWIA creates its log files in the GroupWise Admin console
and the GWIA configuration file (gwia.cfg).
Corresponding Startup Switches: You can also use the --log, --loglevel, --logdays, and --logmax
switches in the GWIA startup file to configure logging.
For installation and setup instructions, see “Setting Up GroupWise Monitor” in the GroupWise 2014
R2 Installation Guide. For usage instructions, see Part XVII, “Monitor,” on page 641.
Although the GroupWise agents are SNMP-enabled by default, the server where the GroupWise
agents are installed must be properly configured to support SNMP, and the agents must also be
properly configured. To set up SNMP services, complete the following tasks:
Section 32.5.1, “Setting Up SNMP Services for the GWIA,” on page 314
Section 32.5.2, “Copying and Compiling the GWIA MIB File,” on page 315
Section 32.5.3, “Configuring the GWIA for SNMP Monitoring,” on page 315
snmpconf -g basic_setup
The snmpconf command creates the snmpd.conf file in one of the following folders, depending
on your version of Linux:
/usr/share/snmp
/usr/local/share/snmp
~/.snmp
IMPORTANT: Ensure that the SNMP daemon always starts before the POA starts.
Skip to Section 32.5.2, “Copying and Compiling the GWIA MIB File,” on page 315.
On some versions of Windows Server, the SNMP Service is not included during the initial operating
system installation. The SNMP Service can be added either before or after the GroupWise agents are
installed on the Windows server.
Before you can monitor an SNMP-enabled GroupWise agent, you must compile the agent MIB file
using your SNMP management program. GroupWise agent MIB files are located in the /agents/
mibs folder in your GroupWise software installation.
The MIB file contains all the Trap, Set, and Get variables used for communication between the
GroupWise agent and the SNMP management console. The Trap variables provide warnings that
point to current and potential problems. The Set variables allow you to configure portions of the
application while it is still running. The Get variables display the current status of different processes
of the application.
1 Copy the agent MIB file to the location required by your SNMP management program.
2 Compile or import the agent MIB file as required by your SNMP management program.
1 In the GroupWise Admin console, browse to and click the GroupWise agent object.
2 Click the Agent Settings tab, then locate the SNMP Community “Get” String field.
3 Provide your system SNMP community “Get” string, then click OK.
4 Configure the SNMP Service with the same community “Get” string.
5 Restart the GroupWise agent.
The GroupWise agent should now be visible to your SNMP monitoring program.
In addition, you can use the following methods that do not apply to the other GroupWise agent:
The message to shut down the GWIA must be addressed to the GWIA, not a non-GroupWise
domain. The syntax for the To line is:
gwia:shutdown
The following sections provide information about some of the methods you can use to optimize the
speed and reliability of the GroupWise GWIA:
Ensure that you balance your processing speed requirements with the other applications running on
the same server as the GWIA.
For information about adjusting the SMTP sending and receiving threads, see Section 30.1,
“Configuring Basic SMTP/MIME Settings,” on page 293.
For information about configuring the timeout settings in the GroupWise Admin console, see
Section 30.5, “Configuring the SMTP Timeout Settings,” on page 299. For information about
configuring the settings using startup switches, see Section 34.4.9, “Timeouts,” on page 340.
You can override settings provided in the GroupWise Admin console by using startup switches in the
GWIA startup file (gwia.cfg). The default location for the gwia.cfg file is in the wpgate/gwia
subfolder in the domain folder.
When you create a domain and install the GWIA, an initial gwia.cfg file is created. This initial file
includes the --home startup switch set to the wpgate/gwia subfolder.
Startup switches specified on the command line override those in the gwia.cfg file. Startup switches
in the gwia.cfg file override corresponding settings in the GroupWise Admin console. You can view
the gwia.cfg file from the Configuration page of the GWIA console.
--dsnage /dsnage SMTP/MIME > ESMTP Settings > DSN Hold Age
--force7bitout /force7bitout SMTP/MIME > Settings > Use 7 Bit Encoding for
--noforce7bitout /noforce7bitout All Outbound Messages
--imapsport /imapsport GroupWise > Network Address > IMAP SSL Port
--keyfile /keyfile GroupWise > SSL Settings > SSL Key File
--log /log GroupWise > Log Settings > Log File Path
--logdays /logdays GroupWise > Log Settings > Max Log File Age
--logmax /logmax GroupWise > Log Settings > Max Log Disk
Space
--popsport /popsport GroupWise > Network Address > POP SSL Port
--smtphome /smtphome Server Folders > Settings > Advanced > SMTP
Service Queues Directory
--dhome
--hn
--home
34.2.1 @config_file_name
Specifies the location of the GWIA configuration file (gwia.cfg). The gwia.cfg file is created in the /
domain_folder/wpgate/gwia folder. The gwi.cfg file includes the --home switch.
34.2.2 --dhome
Points to the SMTP service work area. This is normally the same as the GWIA folder (/
domain_folder/wpgate/gwia).
This switch is required only under certain circumstances. Normally, the GWIA gets the information
from another source and does not need this switch. If you receive a message that the --hn switch is
required, you must use the switch.
34.2.4 --home
Specifies the GWIA home folder (/domain_folder/wpgate/gwia), where the GWIA can find its
databases, input/output queues, and configuration files. There is no default location. You must use
this switch in order to start the GWIA.
If you specify a UNC path with the --home switch when you run the GWIA as a Windows service, you
must configure the GWIA service to run under a specific Windows user account. If you specify a local
folder or a mapped drive, you can configure the GWIA service to run under the local system account.
--cluster
--ip
--ipa
--nosnmp
--smtphome
--work
34.3.1 --cluster
Informs the GWIA that it is running in a cluster. A clustered GWIA automatically binds to the IP
address configured for the GWIA object even if the Bind Exclusively to TCP/IP Address option is not
selected on the GWIA Agent Settings tab in the GroupWise Admin console. This prevents
unintended connections to other IP addresses, such as the loopback address or the node’s physical
IP address. For information about clustering the GWIA, see “Clustering” in the GroupWise 2014 R2
Interoperability Guide.
Syntax: --cluster
34.3.3 --ipa
Specifies the IP address (or hostname) of a GroupWise POA that the GWIA can use to resolve IP
addresses of other POAs in the system. This replaces the need to configure post office links for the
GWIA in the GroupWise Admin console (Domain object > Post Office Links).
If you have established a GroupWise name server (ngwnameserver), you can use it. See
Section 15.2.1, “Simplifying Client Access with a GroupWise Name Server,” on page 145.
34.3.4 --ipp
Specifies the port number of a GroupWise POA that the GWIA can use to resolve IP addresses of
other POAs in the system. This replaces the need to configure post office links for the GWIA in the
GroupWise Admin console (Domain object > Post Office Links).
If you have established a GroupWise name server (ngwnameserver), you can use it. See
Section 15.2.1, “Simplifying Client Access with a GroupWise Name Server,” on page 145.
34.3.5 --nosnmp
Disables SNMP for the GWIA. The default is to have SNMP enabled. See Section 32.5, “Using an
SNMP Management Console,” on page 313.
Syntax: --nosnmp
34.3.6 --smtphome
Specifies a secondary SMTP queues folder for inbound and outbound messages. This secondary
folder can be helpful for troubleshooting by providing a way to trap messages before they are routed
to the Internet. You can also use the secondary folder to run third-party utilities such as a virus
scanner on Internet-bound messages.
The GWIA places all outbound messages in this secondary folder. The messages must then be
moved manually (or by another application) to the primary SMTP queue’s send folder (--dhome
switch) before the GWIA routes them to the Internet.
Linux: domain/wpgate/gwia/000.prc/gwwork
Windows: c:\grpwise\gwia
34.3.8 --nasoq
By default, the GWIA sends the accounting file (acct) to users specified as accountants in the
GroupWise Admin console (GWIA object > GroupWise > Administrators). The file is sent daily at
midnight and any time the GWIA shuts down.
This switch configures the GWIA to send the acct file once daily at midnight, not each time the GWIA
quits or is shut down.
Syntax: --nasoq
--smtp
--smtp
Enables the GWIA to process SMTP messages. See Section 30.1, “Configuring Basic SMTP/MIME
Settings,” on page 293.
Syntax: --smtp
--nosmtpversion
Suppresses the GroupWise version and copyright date information that the GWIA typically responds
with when contacted by another SMTP host or a telnet session.
Syntax: --nosmtpversion
--imip
--imip
Converts outbound GroupWise Calendar items into MIME text/calendar iCal objects and converts
incoming MIME text/calendar messages into GroupWise Calendar items.
Syntax: --imip
--aql
--aqor
--ari
--blockrulegenmsg
--dia
--displaylastfirst
--dontreplaceunderscore
--fd822
--fdmime
--group
--keepsendgroups
--msstu
--nomappriority
--notfamiliar
--realmailfrom
This switch is valid only if your system is not configured to use Internet-style addressing. For more
information, see Chapter 29, “Managing Internet Domains, Addressing, and Access,” on page 273,
Or you have configured the GWIA to ignore Internet-style addressing. For more information, see
Section 30.3, “Configuring How the GWIA Handles Email Addresses,” on page 296.
Example: --aql po
Option Description
auto This option causes the gateway to include the addressing components required to make the user’s
address unique. If a user name is unique in a GroupWise system, the outbound address uses only
the user_name. If the post_office or domain.post_office components are required to make the
address unique, these components are also included in the outbound address. The auto option is
the default.
userid This option requires the gateway to include only the user_name in the outbound Internet address,
even if the user name is not unique in the system. If a recipient replies to a user whose user name
is not unique and no other qualifying information is provided, that reply cannot be delivered.
po This option requires the gateway to include post_office.user_name in every outbound address,
regardless of the uniqueness or non-uniqueness of the user name.
domain This option requires the gateway to include the fully qualified GroupWise address (domain.post
office.user_name) in every outbound address, regardless of the uniqueness or non-uniqueness of
the user name. This option guarantees the uniqueness of every outbound Internet address, and
ensures that any replies are delivered.
--aqor
The user part of a GroupWise user’s outbound Internet address (user@host) can and sometimes
must include the full Groupwise address (domain.post_office.user_name@host) in order to be
unique. The --aqor switch configures the GWIA to move any GroupWise address components, except
the user_name component, to the right side of the address following the at sign (@). In this way,
GroupWise addressing components become part of the host portion of the outbound Internet
address. The --aql switch specifies which components are included.
For example, if the --aqor switch is used (in conjunction with the --aql-domain switch), Bob
Thompson’s fully qualified Internet address ([email protected]) is
resolved to [email protected] for all outbound messages.
If the --aqor switch is used with the --aql-po switch, Bob’s Internet address is resolved to
[email protected] for all outbound messages.
If you use the --aqor switch to move GroupWise domain or post office names to be part of the host
portion on the right side of the address, you must provide a way for the DNS server to identify the
GroupWise names. You must either explicitly name all GroupWise post offices and domains in your
system as individual MX Records, or you can create an MX Record with wildcard characters to
represent all GroupWise post offices and domains. For information about creating MX Records, see
details found in RFC #974.
--ari
Enables or disables additional routing information that is put in the SMTP return address to facilitate
replies. This switch might be needed in large systems with external GroupWise domains in which the
external GroupWise users have not been configured in your local domain. Options include Never and
Always. Most sites do not need to use this switch.
--blockrulegenmsg
In the GroupWise Admin console, you can control whether or not rule-generated messages are
allowed to leave your GroupWise system by selecting or deselecting the Rule-Generated Messages
options available in each class of service defined for the GWIA. This switch allows you to be specific
in the types of rule-generated messages that are blocked.
In order for this switch to take effect, senders must be in a class of service where rule-generated
messages are allowed. For more information, see “Creating a Class of Service” on page 281.
--dia
GroupWise supports both Internet-style addressing (user@host) and GroupWise proprietary
addressing (user_name.post_office.domain). By default, the GWIA uses Internet-style addressing.
See Section 30.3, “Configuring How the GWIA Handles Email Addresses,” on page 296. You can use
this switch to disable Internet-style addressing.
Syntax: --dia
--displaylastfirst
By default, users’ display names are First Name Last Name. If you want users’ display names to be
Last Name First Name, you can use the --displaylastfirst switch. This forces the display name format
to be Last Name First Name, regardless of the preferred address format.
Syntax: --displaylastfirst
--dontreplaceunderscore
By default, the GWIA accepts addresses of the format:
firstname_lastname@internet_domain_name
Even though this is not an address format that the GroupWise Admin console included in the Allowed
Address Formats list in the GroupWise Admin console for configuring Internet addressing, you can
use this switch to prevent this address format from being accepted by the GWIA. For more
information, see Section 29.3.2, “Allowed Address Formats,” on page 276.
--fd822
Specifies a return address for GroupWise replies. A message that has been received by a GroupWise
user through the GWIA and is replied to has this return address form. These switches cause the
GWIA to produce a return address of the form foreign domain.type:"user host." Foreign domain can
be any foreign domain you have configured and linked to the GWIA.
You can use the same foreign domain name for both the --fd822 switch and the --fdmime switch. You
can specify multiple foreign domain and kind pairs by placing them in quotes. If multiple foreign
domain and kind pairs are used, the first domain/kind pair is the return address for replies to
messages received through the GWIA. The second domain/kind pair is checked to see what
message format is used for old replies in the system. Up to four pairs can be specified with an 80-
character limit.
This switch lets you change your foreign domain names in your GroupWise system and still have
replies work. For example, if your foreign domain is called faraway and you added a foreign domain
called Internet, you could use --fd822-"internet.nonmime smtp.nonmime." This causes replies to have
a return address of internet.nonmime.:"user@host." The GWIA would also recognize faraway. This
switch also lets you migrate from one foreign domain to another.
--fdmime
Specifies a return address for GroupWise replies. A message that has been received by a GroupWise
user through the GWIA and is replied to has this return address form. These switches cause the
GWIA to produce a return address of the form foreign_domain.type:"user host." Foreign_domain can
be any foreign domain you have configured and linked to the GWIA. Type can be either mime or
nonmime.
You can use the same foreign domain name for both the --fd822 switch and the --fdmime switch.
You can specify multiple foreign domain and kind pairs by placing them in quotes. If multiple foreign
domain and kind pairs are used, the first domain/kind pair is the return address for replies to
messages received through the GWIA. The second domain/kind pair is checked to see what
message format is used for old replies in the system. Up to four pairs can be specified with an 80-
character limit.
This switch lets you change your foreign domain names in your GroupWise system and still have
replies work. For example, if your foreign domain is called SMTP and you add a foreign domain called
Internet, you can use --fdmime-"internet.mime smtp.mime." This causes replies to have a return
address of internet.mime:"user@host." The GWIA also recognizes SMTP. This switch also lets you
migrate from one foreign domain to another.
Use this switch to expand groups into individual email addresses of the group members, so that the
recipients in groups do receive incoming Internet messages addressed to groups. See Section 30.3,
“Configuring How the GWIA Handles Email Addresses,” on page 296.
Syntax: --group
--keepsendgroups
When constructing the MIME for outgoing messages, discard all users that expanded out of system
distribution lists. Instead include a reference to the distribution list. This results in a smaller MIME and
Reply to All list for the recipient. This setting corresponds with the GWIA’s --keepsendgroups switch.
Syntax: --keepsendgroups
NOTE: If you retain groups on outgoing messages, Reply to All might not work unless you also
enable inbound group expansion by using the --group switch.
--msstu
Replaces spaces with underscores (_) in the email address of the sender for outbound messages.
For example, john smith becomes john_smith.
Syntax: --msstu
--nickgroup
Turns on group expansion only for groups that have nicknames. By default, the GWIA does not
expand groups, which means that recipients listed in groups do not receive incoming Internet
messages that are addressed to groups. If you use the --group switch, the GWIA expands all groups.
Use this switch to expand only nicknamed groups. This means that recipients listed in nicknamed
groups do receive incoming Internet messages that are addressed to the nickname of the group, but
they do not receive incoming Internet messages that are addressed to groups that do not have
nicknames. For information about nicknames, see Section 53.8, “Managing User Email Addresses,”
on page 473. See also Section 30.3, “Configuring How the GWIA Handles Email Addresses,” on
page 296.
Syntax: --nickgroup
Syntax: --nomappriority
--notfamiliar
Configures the GWIA to not include the user’s familiar name, or display name, in the From field of the
message’s MIME header. In other words, the From field is address rather than "familiar_name"
address.
Syntax: --notfamiliar
--realmailfrom
Configures the GWIA to use the real user in the Mail From field instead of having auto-forwards come
from Postmaster and auto-replies come from Mailer-Daemon.
Syntax: --realmailfrom
--attachmsg
--dbchar822
--charsetconfidencelevel
--defaultcharset
--defaultnonmimecharset
--force7bitout
--iso88591is
--koi8
--mime
--noiso2022
--noqpmt
--relayaddsignature
--rt
--st
--uueaa
--wrap
For more information, see Section 7.4, “MIME Encoding,” on page 88.
--attachmsg
Configures the GWIA to maintain the original format of any file type attachment.
Syntax: --attachmsg
Example: --charsetconfidencelevel 35
--dbchar822
Configures the GWIA to map inbound non-MIME messages to another character set that you specify.
The mapped character set must be an Asian (double-byte) character set.
--defaultcharset
Specifies what character set to use if no character set is specified in an incoming MIME-encoded
message.
--defaultnonmimecharset
Specifies what character set to use if no character set is specified in an incoming message that is not
MIME encoded. The default is US_ASCII.
--force7bitout
By default, the GWIA uses 8-bit MIME encoding for any outbound messages that are HTML-
formatted or that contain 8-bit characters. If, after connecting with the receiving SMTP host, the GWIA
discovers that the receiving SMTP host cannot handle 8-bit MIME encoded messages, the GWIA
converts the messages to 7-bit encoding.
You can use the --force7bitout switch to force the GWIA to use 7-bit encoding and not attempt to use
8 bit MIME encoding. You should use this option if you are using a relay host that does not support 8-
bit MIME encoding. See Section 30.1, “Configuring Basic SMTP/MIME Settings,” on page 293.
Syntax: --force7bitout
--koi8
Configures the GWIA to map all outbound MIME messages to the KOI8 (Russian) character set.
Syntax: --koi8
--mime
Configures the GWIA to send outbound messages in MIME format rather than in RFC-822 format. If
you’ve defined an RFC-822 non-GroupWise domain, users can still send RFC-822 formatted
messages by using the RFC-822 domain in the address string when sending messages. For more
information, see Section 5.8, “Adding External Users to the GroupWise Address Book,” on page 78.
Removing the switch corresponds to enabling the Default Message Encoding: Basic RFC-822 setting
in the GroupWise Admin console. See Section 30.4, “Determining Format Options for Messages,” on
page 298.
Syntax: --mime
--noiso2022
Configures the GWIA to not use ISO-2022 character sets. ISO-2022 character sets provide 7-bit
encoding for Asian character sets.
Syntax: --noiso2022
--nqpmt
Disables quoted printable message text for outbound messages. If this switch is turned on, messages
are sent with Base64 MIME encoding, unless all the text is US-ASCII. If you use this switch you need
to review the setting for the --wrap switch to ensure that message text wraps correctly. See
Section 30.4, “Determining Format Options for Messages,” on page 298.
Syntax: --nqpmt
--relayaddsignature
Appends the global signature to messages that are relayed through your GroupWise system (for
example, messages from POP and IMAP clients) in addition to messages that originate within your
GroupWise system. See Section 53.3, “Adding a Global Signature to Users’ Messages,” on
page 462.
Syntax: --relayaddsignature
Multiple threading allows for more than one receive process to be running concurrently. A receive
request is assigned to a single thread and is processed by that thread. If you anticipate heavy
inbound message traffic, you can increase the number of threads to enhance the speed and
performance of the GWIA. The number of threads is limited only by the memory resources of your
server.
Syntax: --rt
--st
Specifies the maximum number of threads that the GWIA uses when converting outbound messages
from GroupWise message format to MIME or RFC-822 format. The default setting is 4. The lowest
valid setting is 1. There is no upper limit, but the larger the number of threads, the more resources are
used, perhaps with little benefit unless a very large amount of data needs to be processed in a very
small amount of time. See Section 30.4, “Determining Format Options for Messages,” on page 298.
Multiple threading allows for more than one send process to be running concurrently. A send request
is assigned to a single thread and is processed by that thread. If you anticipate heavy outbound
message traffic, you can increase the number of threads to enhance the speed and performance of
the GWIA. The number of threads is limited only by the memory resources of your server.
Syntax: --st
--uueaa
Forces the GWIA to UUencode any ASCII text files attached to outbound RFC-822 formatted
messages. This switch applies only if the --mime switch is not used. Without this switch, the GWIA
includes the text as part of the message body. See Section 30.4, “Determining Format Options for
Messages,” on page 298.
Syntax: --uueaa
--wrap
Sets the line length for outbound messages that do not use quoted printable or Base64 MIME
encoding. This is important if the recipient’s email system requires a certain line length. See
Section 30.4, “Determining Format Options for Messages,” on page 298.
Example: --wrap 72
--flatfwd
--delayedmsgnotification
--maxdeferhours
--msgdeferinterval
--flatfwd
Automatically strips out the empty message that is created when a message is forwarded without
adding text, and retains the original sender of the message, rather than showing the user who
forwarded it. This facilitates users forwarding messages from GroupWise to other email accounts.
Messages arrive in the other accounts showing the original senders, not the users who forwarded the
messages from GroupWise.
Syntax: --flatfwd
--delayedmsgnotification
Provides a notification message to users whose email messages cannot be immediately sent out
across the Internet. This provides more noticeable notification to users than manually checking the
Properties page of the sent item to see whether it has been sent.
Syntax: --delayedmsgnotification
--maxdeferhours
Specifies the number of hours after which the GWIA stops trying to send deferred messages. The
default is 96 hours, or four days. You might prefer to receive an undeliverable notification sooner,
perhaps in as little as 5 hours. A deferred message is any message that can’t be sent because of a
temporary problem (host down, MX record not found, and so on). See Section 30.1, “Configuring
Basic SMTP/MIME Settings,” on page 293.
Example: --maxdeferhours 48
--msgdeferinterval
Specify in a comma-delimited list the number of minutes after which the GWIA retries sending
deferred messages. The default is 20, 20, 20, 240. The GWIA interprets this list as follows: It retries
20 minutes after the initial send, 20 minutes after the first retry, 20 minutes after the second retry, and
240 minutes (4 hours) after the third retry. You might prefer for the fourth retry to occur sooner,
perhaps in only 2 hours.
Thereafter, it retries according to the last retry interval until the number of hours specified in the
Maximum Number of Hours to Retry a Deferred Message field is reached. You can provide additional
retry intervals as needed. It is the last retry interval that repeats until the maximum number of hours is
reached. See Section 30.1, “Configuring Basic SMTP/MIME Settings,” on page 293.
--noesmtp
--dsn
--dsnage
--noesmtp
Disables ESMTP support in the GWIA.
Syntax: --noesmtp
--dsn
Enables Delivery Status Notification (DSN). The GWIA requests status notifications for outgoing
messages and supplies status notifications for incoming messages. This requires the external email
system to also support Delivery Status Notification. Currently, notification consists of two delivery
statuses: successful and unsuccessful. See Section 30.2, “Using Extended SMTP (ESMTP)
Options,” on page 295.
Syntax: --dsn
--dsnage
The --dsnage switch specifies the number of days that the GWIA retains information about the
external sender so that status updates can be delivered to him or her. For example, the default DSN
age causes the sender information to be retained for 4 days. If the GWIA does not receive delivery
status notification from the GroupWise recipient’s Post Office Agent (POA) within that time period, it
deletes the sender information and the sender does not receive any delivery status notification. See
Section 30.2, “Using Extended SMTP (ESMTP) Options,” on page 295.
Syntax: --dsnage
--p
--rd
--sd
--killthreads
--smtpport
Example: --p 5
--rd
Specifies the maximum number of threads used for processing SMTP receive requests (inbound
messages). Each thread is equivalent to one connection. The default is 16 threads. Setting the
receive threads to 0 stops messages from being received through the GWIA. There is no upper limit,
but the larger the number of threads, the more resources are used, perhaps with little benefit. See
Section 30, “Configuring SMTP/MIME Services,” on page 293.
Example: --rd 20
--sd
Specifies the maximum number of threads used for processing SMTP send requests (outbound
messages). Each thread is equivalent to one connection. The default is 8 threads. Setting the send
threads to 0 stops messages from being sent through the GWIA. There is no upper limit, but the
larger the number of threads, the more resources are used, perhaps with little benefit. See
Section 30.1, “Configuring Basic SMTP/MIME Settings,” on page 293.
Example: --sd 12
--killthreads
Configures the GWIA to quickly terminate any active send/receive threads when it restarts.
Syntax: --killthreads
Syntax: --smtpport
--usedialup
--usedialup
Enables SMTP dial-up services.
Syntax: --usedialup
--etrnhost
Specifies the IP address or DNS hostname of the mail server where your mail account resides at your
Internet Service Provider. You should obtain this address from your Internet Service Provider.
--etrnqueue
Specifies your email domain as provided by your Internet Service Provider.
Syntax: /dialuser-user_name
Example: /dialuser-rasuser
Syntax: /dialpass-password
Example: /dialpass-raspassword
34.4.9 Timeouts
The following switches specify how long SMTP services waits to receive data that it can process.
After the time expires, the GWIA might give a TCP read/write error. Leave these switches at the
default setting unless you are experiencing a problem with communication.
--tc
--td
--tc
Specifies how long the program waits for an SMTP command. The default is 2 minutes.
Example: --tc 3
--td
Specifies how long the program waits for data from the receiving host. The default is 5 minutes.
Example: --td 2
--te
Specifies how long the program waits for the receiving host to establish a connection. The default is 5
minutes.
Example: --te 2
--tg
Specifies how long the program waits for the initial greeting from the receiving host. The default is 3
minutes.
Example: --tg 2
--tr
Specifies how long the program waits for a TCP read. The default is 10 minutes.
Example: --tr 2
--tt
Specifies how long the program waits for the receiving host to terminate the connection. The default is
5 minutes.
Example: --tt 2
--mh
--mh
Specifies the IP address or DNS hostname of one or more relay hosts that you want the GWIA to use
for outbound messages. Use a space to separate multiple relay hosts in a list.
The relay host can be part of your network or can reside at the Internet service provider’s site. This
switch is typically used in firewall integration if you want one server, the specified relay host, to route
all mail. See Section 30.1, “Configuring Basic SMTP/MIME Settings,” on page 293.
--forceinboundauth
--forceoutboundauth
--forceinboundauth
Ensures that the GWIA accepts messages only from remote SMTP hosts that use the AUTH LOGIN
authentication method to provide a valid GroupWise user name and password. The remote SMTP
hosts can use any valid GroupWise user name and password. However, for security reasons, we
recommend that you create a dedicated GroupWise user account for remote SMTP host
authentication.
Syntax: --forceinboundauth
NOTE: Using the --forceinboundauth switch overrides the Prevent Message Relaying setting for the
GWIA in the GroupWise Admin console for POP and IMAP users. To completely prevent message
relaying when using the --forceinboundauth switch, you must also specify the --disallowauthrelay
switch.
--forceoutboundauth
Ensures that the GWIA sends messages only to remote SMTP hosts that are included in a
gwauth.cfg text file. The remote SMTP hosts must support the AUTH LOGIN authentication method.
The gwauth.cfg file must reside in the domain\wpgate\gwia folder and use the following format:
For example:
If you use this switch, you need to include your GWIA as an entry in the gwauth.cfg file to enable
status messages to be returned to GroupWise users. You can use any GroupWise user name and
password for your GWIA’s authentication credentials. However, for security reasons, we recommend
that you create a dedicated GroupWise user account for your GWIA.
Syntax: --forceoutboundauth
--badmsg
--fut
--mudas
--badmsg
Specifies where to send problem messages. Problem messages can be placed in the GWIA problem
folder (gwprob), they can be sent to the postmaster, or they can be sent to both or neither. The values
for this switch are move, send, both, and neither.
The move option specifies to place problem messages in the gwprob folder for the GWIA. The send
option specifies to send the message as an attachment to the GWIA postmaster defined in the
GroupWise Admin console (GWIA object > GroupWise > Administrators). The both option specifies
to move the message to gwprob and send it to the postmaster. The neither option specifies to discard
problem messages. The default when no switch is specified is move. See Section 30.6, “Determining
What to Do with Undeliverable Messages,” on page 300.
--fut
Forwards undeliverable messages to the specified host. See Section 30.6, “Determining What to Do
with Undeliverable Messages,” on page 300.
--mudas
Controls how much of the original message is sent back when a message is undeliverable. By
default, only 2 KB of the original message is sent back. The value is specified in KB (8=8KB). See
Section 30.6, “Determining What to Do with Undeliverable Messages,” on page 300.
Syntax: --mudas KB
Example: --mudas 16
--disallowauthrelay
--mbcount
--mbtime
--rejbs
--xspam
--rbl
--disallowauthrelay
Prevents spammers from using GroupWise accounts to authenticate to the GWIA and using it as a
relay host for their spam. It has no effect on normal GroupWise account usage in a GroupWise client
or WebAccess. However, it does prevent users who access their GroupWise mailboxes from a POP
or IMAP client from sending messages to users outside of the GroupWise system, because the GWIA
identifies this activity as relaying.
Syntax: --disallowauthrelay
--mbcount
Sets the number of messages that can be received from a single IP address in a given number of
seconds before the GWIA denies access to its GroupWise system. It provides a form of system
security to protect your system from mailbombs.
For example, with --mbcount set to 25 and --mbtime set to 60 seconds, if these limits are exceeded
then the sender’s IP address is blocked from sending any more messages for the remainder of that
60 second window. The IP address of the sender is also displayed in the GWIA console. You can
permanently restrict access to your system by that IP address through settings on the Access Control
tab in the GroupWise Admin console (GWIA object > Access Control). By default, the mailbomb
feature is turned off. To enable this feature, you must specify a value for mailbomb count and
mailbomb time. See “Mailbomb (Spam) Protection” on page 287.
Syntax: --mbcount-number
Example: --mbcount 25
--mbtime
Specifies the mailbomb time limit in seconds. This switch works with the --mbcount switch to block
access to your GroupWise system from unsolicited inundations of email. The default value is 10
seconds. See “Mailbomb (Spam) Protection” on page 287.
Example: --mbtime 60
If this switch is not used, the GWIA accepts messages from any host, but displays a warning if the
initiating host is not authentic.
Syntax: --rejbs
--xspam
Flags messages to be handled by the client Junk Mail Handling feature if they contain an x-spam-
flag:yes in the MIME header. See “Customized Spam Identification” on page 288.
Syntax: --xspam
--rbl
Lets you define the addresses of blacklist sites (free or fee-based) you want the GWIA to check for
blacklisted hosts. If a host is included in a site’s blacklist, the GWIA does not accept messages from
it.
This switch corresponds to the Blacklist Addresses list (GWIA object > Access Control > Blacklists).
For details about this setting, see “Real-Time Blacklists” on page 285.
--nopopversion
--pop3
--popintruderdetect
--popport
--popsport
--popssl
--pt
--sslpt
34.5.1 --nopopversion
Suppresses the GroupWise version and copyright date information that the GWIA typically responds
with when contacted by a POP client.
Syntax: --nopopversion
Syntax: --pop3
34.5.3 --popintruderdetect
Configures the GWIA to log POP email clients in through the POA so that the POA’s intruder
detection can take effect, if intruder has been configured in the GroupWise Admin console (Post
Office object > Client Settings > Intruder Detection).
Syntax: --popintruderdetect
34.5.4 --popport
By default, the GWIA listens for POP3 connections on port 110. This switch allows you to change the
POP3 listen port.
34.5.5 --popsport
By default, the GWIA listens for secure (SSL) POP3 connections on port 995. This switch allows you
to change the POP3 SSL listen port.
34.5.6 --popssl
Disables, enables, or requires secure (SSL) connections between POP3 clients and the GWIA. See
Section 28.5, “Securing Internet Access with SSL Connections to the GWIA,” on page 271.
Option Description
enabled The POP3 client determines whether an SSL connection or non-SSL connection is used. By
default, the GWIA listens for SSL connections on port 995 and non-SSL connections on port
110. You can use the --popsport and --popport switches to change these ports.
required The GWIA forces SSL connections on port 995 and port 110. Non-SSL connections are denied.
You can use the --popsport and --popport switches to change these ports.
disabled The GWIA listens for connections only on port 110, and the connections are not secure. You can
use the --popport switch to change this port.
Example: --pt 15
34.5.8 --sslpt
Specify the maximum number of threads you want the GWIA to use for secure POP3 connections.
You are limited only by the memory resources of your server. See Section 31.1, “Enabling POP3/
IMAP4 Services,” on page 307.
Example: --sslpt 15
--imap4
--imapport
--imapreadlimit
--imapreadnew
--imapsport
--imapssl
--it
--noimapversion
--sslit
34.6.1 --imap4
Enables IMAP4 client access to GroupWise mailboxes through the GWIA. See Section 31.1,
“Enabling POP3/IMAP4 Services,” on page 307.
Syntax: --imap4
34.6.2 --imapport
By default, the GWIA listens for IMAP4 connections on port 143. This switch allows you to change the
IMAP4 listen port.
Example: --imapreadlimit 10
34.6.4 --imapreadnew
By default, the GWIA reads items in a folder from the oldest to the newest. As a result, if a folder
contains more items than are allowed by the /imapreadlimit setting, users receive the older items but
not the newer items. Enable this switch so that the GWIA reads items from the newest to the oldest.
This ensures that users receive all their new items in a timely manner.
Syntax: --imapreadnew
34.6.5 --imapsport
By default, the GWIA listens for secure (SSL) IMAP4 connections on port 993. This switch allows you
to change the IMAP4 SSL listen port.
34.6.6 --imapssl
Disables, enables, or requires secure (SSL) connections between IMAP4 clients and the GWIA. See
Section 28.5, “Securing Internet Access with SSL Connections to the GWIA,” on page 271.
Option Description
enabled The IMAP4 client determines whether an SSL connection or non-SSL connection is used. By
default, the GWIA listens for SSL connections on port 993 and non-SSL connections on port
143. You can use the --imapsport and --imapport switches to change these ports.
required The GWIA forces SSL connections on port 993 and port 143. Non-SSL connections are denied.
You can use the --imapsport and --imapport switches to change these ports.
disabled The GWIA listens for connections only on port 143, and the connections are not secure. You can
use the --imapport switch to change this port.
Example: --it 15
34.6.8 --noimapversion
Suppresses the GroupWise version and copyright date information that the GWIA typically responds
with when contacted by an IMAP client.
Syntax: --noimapversion
34.6.9 --sslit
Specify the maximum number of threads you want the GWIA to use for secure IMAP4 connections.
You are limited only by the memory resources of your server. See Section 31.1, “Enabling POP3/
IMAP4 Services,” on page 307.
Example: --sslit 15
--certfile
--dhparm
--keyfile
--keypasswd
--smtpssl
--httpssl
--popssl
--imapssl
--ldapssl
--sslciphersuite
--ssloption
34.7.1 --certfile
Specifies the server certificate file to use. The file must be in Base64/PEM or PFX format. If the file is
not in the same folder as the GWIA program, specify the full path.
34.7.2 --dhparm
Specifies a Diffie-Hellman cipher parameters file used for SSL/TLS to replace the default parameters
set by GroupWise. GroupWise uses default Diffie-Hellman parameters of 2048 bits to generate the
DH key. A valid DH parameter is in PEM format.
Linux Windows
34.7.3 --keyfile
Specifies the private key file to use. The key file is required if the certificate file does not contain the
key. If the certificate file contains the key, do not use this switch. When specifying a file name, use the
full path if the file is not in the same folder as the GWIA program.
34.7.4 --keypasswd
Specifies the private key password. If the key does not require a password, do not use this switch.
34.7.5 --smtpssl
Enables the GWIA to use a secure connection to other SMTP hosts. The SMTP host must also be
enabled to use SSL or TLS (Transport Layer Security); if it is not, a non-secure connection is used.
Valid settings are enabled and disabled.
34.7.6 --httpssl
Enables the GWIA to use a secure connection to a web browser being used to display the GWIA
console. The web browser must also be enabled to use SSL; if it is not, a non-secure connection is
used. Valid settings are enabled and disabled.
Option Description
enabled The POP3 client determines whether an SSL connection or non-SSL connection is used. By
default, the GWIA listens for SSL connections on port 995 and non-SSL connections on port 110.
You can use the --popsport and --popport switches to change these ports.
required The GWIA forces SSL connections on port 995 and port 110. Non-SSL connections are denied.
You can use the --popsport and --popport switches to change these ports.
disabled The GWIA listens for connections only on port 110, and the connections are not secure. You can
use the --popport switch to change this port.
34.7.8 --imapssl
Disables, enables, or requires secure (SSL) connections between IMAP4 clients and the GWIA.
Option Description
enabled The IMAP4 client determines whether an SSL connection or non-SSL connection is used. By
default, the GWIA listens for SSL connections on port 993 and non-SSL connections on port 143.
You can use the --imapsport and --imapport switches to change these ports.
required The GWIA forces SSL connections on port 993 and port 143. Non-SSL connections are denied.
You can use the --imapsport and --imapport switches to change these ports.
disabled The GWIA listens for connections only on port 143, and the connections are not secure. You can
use the /imapport switch to change this port.
34.7.9 /ldapssl
Configures the GWIA to use a secure (SSL) connection with an LDAP server. For more information
about why the GWIA would need to connect to an LDAP server, see Section 34.9, “Log File
Switches,” on page 355
Syntax: /ldapssl
Linux Windows
34.7.11 --ssloption
Specify a specific SSL protocol to disable. By specifying SSL_OP_NO_TLSv1, GroupWise will
disable TLSv1 support. Specify additional options by adding the SSL key work separated by a
comma.
Linux Windows
The following sections describe the switches required to configure this functionality:
This process works automatically if the GWIA’s link to the post office is client/server (meaning that it
communicates through TCP/IP to the post office’s POA). If the GWIA is using a direct link to the post
office folder rather than a client/server link to the post office’s POA, the GWIA must communicate
directly with the LDAP server rather communicate through the POA.
The following switches are used to provide the GWIA with the required LDAP server information:
--ldapipaddr
--ldapport
--ldapssl
--ldapipaddr
Specifies the IP address of the LDAP server through which GroupWise authentication takes place.
--ldapport
Specifies the port number being used by the LDAP server. The standard non-SSL LDAP port number
is 389. The standard SSL LDAP port number is 636.
--ldapssl
Configures the GWIA to use a secure (SSL) connection with the LDAP server.
Syntax: --ldapssl
--ldapuser
Specifies a user that has rights to the LDAP folder. The user must have at least Read rights.
--ldappwd
Specifies the password of the user specified by the --ldapuser switch.
--ldap
--ldapthrd
--ldapcntxt
--ldaprefurl
--ldaprefcntxt
--ldapserverport
--ldapserversslport
Syntax: --ldap
--ldapthrd
Specifies the maximum number of threads the GWIA can use for processing LDAP queries. The
default is 10.
Example: --ldapthrd 5
--ldapcntxt
Limits the folder context in which the LDAP server searches. For example, you could limit LDAP
searches to a single Novell organization container located under the United States country container.
If you restrict the LDAP context, you must ensure that users, when defining the folder in their email
client, enter the same context (using the identical text you did) in the Search Base or Search Root
field.
--ldaprefurl
Defines a secondary LDAP server to which you can refer an LDAP query if the query fails to find a
user or address in your GroupWise system. For this option to work, the requesting web browser must
be able to track referral URLs.
--ldaprefcntxt
Limits the folder context in which the secondary (referral) LDAP server searches.
--ldapserverport
Changes the LDAP listen port from the default of 389.
--log
--logdays
--loglevel
--logmax
34.9.1 --log
The default location for GWIA log files varies by platform:
Linux: /var/log/novell/groupwise/domain_name.gwia
Windows domain\wpgate\gwia\000.prc
The log files are named after the month, day, and log number for that date (mmddgwia.nn).You can
use the --log switch to redirect the log files to a different location.
Syntax: --log-log_file_folder
34.9.2 --logdays
Specifies how many days to keep GWIA log files on disk. The default log file age is 30 days. The valid
range is from 1 to 350 days.
Example: --logdays 5
34.9.3 --loglevel
Defines the amount of information to record in log files.
Diagnostic
Verbose
34.9.4 --logmax
Controls the maximum amount of disk space for all log files. The amount of disk space each log file
consumes is added together to determine the total amount of disk space used. When the limit is
reached, the GWIA deletes the existing log files, starting with the oldest one. The default is 102400
(100 MB). The maximum allowable setting is 102400000 (1 GB). Specify 0 (zero) for unlimited disk
space.
Syntax: --logmax KB
--httpport
--httpuser
--httppassword
--httprefresh
--httpssl
34.10.1 --httpport
Specifies the port where the GWIA listens for the console. The default port established during
installation is 9850.
34.10.2 --httpuser
By default, any user who knows the GWIA’s address and port (--httpport) can use the console. This
switch adds security to the console by forcing users to log into the console using the specified user
name. The --httppassword switch must also be used to establish the user password.
34.10.4 --httprefresh
By default, the GWIA refreshes the console information every 60 seconds. You can use this switch to
override the default refresh interval.
34.10.5 --httpssl
Enables the GWIA to use a secure connection to a web browser being used to display the GWIA
console. The web browser must also be enabled to use SSL; if it is not, a non-secure connection is
used. See Section 28.5, “Securing Internet Access with SSL Connections to the GWIA,” on page 271.
Syntax: --httpssl
--color
--help
--mono
--show
34.11.1 --color
Sets the default color of the GWIA console. The values range from 0-7.
Syntax: color-0|1|2|3|4|5|6|7
Example: --color 3
You can also change the color of the screen for a GWIA session. From the menu on the bottom of the
console, select Options, then press the key for Colors.
34.11.2 --help
Displays the Help screen for the startup switches.
Syntax: --help
Syntax: --mono
By default, no user interface is provided for the agents on Linux. An agent that runs with a user
interface cannot be managed in the GroupWise Admin console.
The --show startup switch can be used on the command line or in the gwha.conf file used by the
GroupWise High Availability Service. It cannot be placed in the agent startup file.
Syntax: --show
The --show switch cannot be used in the GWIA startup file (gwia.cfg). However, if you want the
GWIA to start with a user interface when you run the grpwise script or when the server reboots, you
can configure the GroupWise High Availability service (gwha) to accomplish this. An agent that runs
with a user interface cannot be managed in the GroupWise Admin console because it is not running
as a service.
For port number information, see Section A.6, “Document Viewer Agent Port Numbers,” on page 735.
For detailed Linux-specific DVA information, see Appendix C, “Linux Basics for GroupWise
Administration,” on page 741.
The document files that users attach to messages are as varied as the combinations of document
formats, tools, and users throughout the world. The Document Viewer Agent (DVA) accommodates
multiple attachment formats by converting GroupWise attachments into HTML format. For a list of the
file types that the DVA can convert, see Oracle Outside In Technology Supported Formats (http://
www.oracle.com/technetwork/middleware/content-management/ds-oitfiles-133032.pdf).
Post Office Agent: When GroupWise users access their mailboxes in any manner and use the
Find feature to search for text, they expect to locate the text in attached documents as well as in
email messages and other GroupWise items. For all GroupWise users, the DVA converts
attached document files into HTML, so that attachments can be indexed by the POA.
GroupWise WebAccess: When GroupWise users access their mailboxes through GroupWise
WebAccess, they expect to view attached documents in their web browser, regardless of the file
format of the attached file. For WebAccess users, the DVA converts attached document files into
HTML so that the attachments can be viewed along with the email messages or other
GroupWise items to which the documents are attached.
Because some document files contain unexpected data, they cannot be successfully converted into
HTML format. The DVA isolates the document conversion task from other GroupWise activities. If the
DVA encounters a problem converting a particular document file, the problem does not affect
conversion of other document files, nor does it affect the user experience in GroupWise, except that
the problem document cannot be viewed in WebAccess and cannot be located using the Find
feature.
If your GroupWise system is relatively small (one domain and a few post offices), a basic installation
of one DVA along with each POA might meet your needs. However, if your GroupWise system is
large or requires failover support, you can scale your DVA installation to better meet the reliability,
performance, and availability needs of your GroupWise users.
Network
Server
When you install WebAccess on a web server, you configure the WebAccess Application to
communicate with any DVA in your GroupWise system.
Web
Server
Network
Server
If you have a post office with a heavy load of attachment indexing, you can install and configure
multiple DVAs to service the POA for that post office.
Document
Viewer
Agent
Document Post
Viewer Office Network
Agent Agent Server
Document
Viewer
Agent
Network
Server
Network
Server
For more information about this configuration, see Section 19.3, “Configuring the POA with Multiple
DVAs for Indexing,” on page 178.
WebAccess
Network Application
Server
Document
Viewer Web
Agent Server
Network
Server
For more information about this configuration, see Section 76.1.3, “Configuring WebAccess
Application with Multiple DVAs for Attachment Viewing,” on page 613.
Document Post
Viewer Office WebAccess
Agent Agent Network Application
Server
Document
Viewer Web
Agent Server
Network
Server
Network
Server
The DVA software is installed along with the GroupWise Server component. Then you use the
GroupWise Administration Utility (GWAdminUtil) to configure the DVA as an agent service.
rcgrpwise status
2d Skip to Step 4.
3 (Conditional) If you are setting up the DVA on a server with a domain or post office, enter the
following command to view the GroupWise agent services that are already set up on the server:
This list shows what is currently configured in the gwha.conf file. For background information
about the gwha.conf file, see “Automatically Restarting the Linux GroupWise Agents with the
GroupWise High Availability Service” in the GroupWise 2014 R2 Installation Guide.
5 Use the list command provided in Step 3 to see that the DVA is now configured as an agent
service.
6 Enter the following command to check the statuses of all the GroupWise services on the server:
rcgrpwise status
8 Repeat the status command in Step 6 to verify that the new DVA is running.
You cannot start and stop the DVA in the GroupWise Admin console as you can the other
GroupWise agents. You must mange the DVA on the command line.
9 Skip to Section 36.3, “Setting Up the DVA,” on page 367.
gwsc -i -dva
5 Enter the following command to see that the DVA is now configured as an agent service.
gwsc --list
6 Refresh the list of Windows services to check the statuses of all the GroupWise services on the
server.
Notice that the new DVA is not yet running.
1 In the GroupWise Admin console, click System > Document Viewer Agent.
2 Click New to set up a new DVA.
3 In the Name field, specify a unique and descriptive name for the new DVA object.
Do not use invalid characters.
4 In the Address field, specify the IP address or DNS hostname of the server where the DVA is
running.
5 (Conditional) If the POA that the DVA will communicate with uses SSL, select Enable SSL.
For more information, see Section 15.3.3, “Securing the Post Office with SSL Connections to the
POA,” on page 152.
6 Click OK to create the new DVA object and add it to the list of DVAs in your GroupWise system.
7 Continue with Adding a DVA to a POA.
1 In the GroupWise Admin console, browse to and click the POA where you want to add the DVA.
2 Click the Document Viewer Agent tab.
3 Click Add Document Viewer Agent, then specify or select the DVA in the drop-down list.
4 Click Save, then click Close.
5 (Optional) Repeat Step 1 through Step 4 to add the DVA to additional POAs as needed.
The same result can be obtained by using POA startup switches. For more information, see
Section 19.3, “Configuring the POA with Multiple DVAs for Indexing,” on page 178.
The default configuration of the DVA is sufficient to provide basic document conversion functionality.
The DVA is configured by editing its startup file (startup.dva).
Linux: /opt/novell/groupwise/agents/share
You can use any ASCII text editor to edit the startup.dva file.
IMPORTANT: When you update the DVA software, a new startup.dva file is installed. The existing
startup.dva file is retained as startup.nnn, where nnn increments each time you update the DVA
software.
Linux: /var/opt/novell/groupwise/gwdva
Windows: c:\ProgramData\novell\groupwise\gwdva
NOTE: On some versions of Windows Server, the ProgramData folder is not visible by default. To
display it in File Explorer, click View, then select Hidden items.
The DVA home folder has three subfolders (quarantine, temp, and template). If this folder
consumes more disk space than you want consumed in the default location, you can move it to a
different location on the local server or to a location on a remote server.
/home
Linux: /tmp/gwdva
Windows: c:\temp\gwdva
m:\gwsystem\gwdva
\\gwserver5\c\gwsystem\gwdva
IMPORTANT: For simplicity of DVA administration, running the DVA as the Windows
Administrator user is highly recommended.
5 (Optional) Use the --log switch to move the log subfolder out from under the DVA home folder.
The quarantine folder cannot be moved.
6 Save the startup.dva file.
7 Skip to Section 37.6, “Putting DVA Configuration Changes into Effect,” on page 372.
/ip
/httpport
For information about how the DVA interacts with other programs, see:
“Configuring WebAccess Application with Multiple DVAs for Attachment Viewing” on page 613
“Configuring the POA with Multiple DVAs for Indexing” on page 178
“Configuring the DVA Console” on page 373
For background information about using SSL with GroupWise agents, see Section 90.2, “Server
Certificates and SSL Encryption,” on page 699. The server where the DVA is installed must have a
public certificate file and private key file before you can enable SSL for the DVA.
NOTE: When you enable SSL for the DVA, any POAs that it communicates with must also be
enabled for SSL.
/httpssl
/quarantine
With the quarantine activated, document files that fail HTML conversion are placed in the
quarantine subfolder of the DVA home folder (gwdva).
3 Remove the semicolon (;) to activate the setting.
4 (Optional) As needed, increase or decrease the number of days that document files are held in
quarantine.
The default is 7 days.
5 (Optional) As needed, increase or decrease the amount of disk space that the quarantine is
allowed to consume.
IMPORTANT: Quarantined document files are not encrypted, so you should disable the
quarantine as soon as you are finished examining the quarantined files.
NOTE: If files passed to the DVA from the POA for HTML conversion in preparation for indexing fail in
HTML conversion by the DVA, they are placed in the post_office/oftemp/gwdca/problem folder.
Section 37.6.1, “Linux: Stopping and Starting the DVA,” on page 372
Section 37.6.2, “Windows: Stopping and Starting the DVA,” on page 372
The DVA can be conveniently monitored in your web browser. You can also use log files to monitor
the DVA.
httpuser
httppassword
httpport
http://server_address:port_number
Through the DVA console you can view the following information:
Status: Displays how long the DVA has been up, the number of worker threads it has started,
the peak number of threads that have been busy, statistics about the files the worker threads
have processed, and the worker processes and the process IDs.
Configuration: Displays the current settings of all the options that you can set in the DVA
startup file (startup.dva). For more information, see Chapter 37, “Configuring the DVA,” on
page 369.
Environment: Displays server information such as name, operating system date, memory,
processor utilization, and loaded modules.
Log Files: Lets you view the contents of the DVA log files and the current log settings. For more
information, see Section 38.2, “Using DVA Log Files,” on page 374.
Quarantine Files: Indicates whether the document quarantine is enabled, and if so, what files
have been quarantined. For more information, see Section 37.5, “Enabling the DVA Document
Quarantine,” on page 371
You cannot use the console to change any DVA settings. Changes must be made through the DVA
startup file (startup.dva).
Linux: /var/log/novell/groupwise/gwdva
Windows: c:\ProgramData\Novell\GroupWise\gwdva\log
NOTE: On some versions of Windows Server, the ProgramData folder is not visible by default. To
display it in File Explorer, click View, then select Hidden items.
You can change the location where the DVA creates its log files. For more information, see
Configuring DVA Log Settings.
When logging is turned on, the DVA creates a new log file each day and each time it is restarted.
Therefore, you find multiple log files in the log file folder. The first four characters represent the date
(mmdd). The next three characters identify the agent (dva). A three-digit extension allows for multiple
log files created on the same day. For example, a log file named 0518dva.001 indicates that it is a
DVA log file created on May 18.
For convenience, you can view DVA log files in the DVA console.
Because the DVA consists of multiple threads, you might find it useful to retrieve the log file into an
editor and sort it on the thread ID that follows the date and time information. Sorting groups all
messages together for the same DVA thread. You can also use the search capability of the DVA web
console to gather information about events that contain a specific string.
/httpthread
/httpmaxthread
3b Skip to Section 37.6, “Putting DVA Configuration Changes into Effect,” on page 372.
3c Specify the maximum number of worker threads that the DVA is allowed to start.
You can increase the maximum number of worker threads to allow the DVA to use more
server resources, or you can decrease the maximum number of worker threads to cause
the DVA to use fewer server resources.
4 Save the startup.dva file.
5 Skip to Section 37.6, “Putting DVA Configuration Changes into Effect,” on page 372.
POA: Section 19.4, “Controlling Maximum Document Conversion Size and Time,” on page 179
WebAccess: Section 76.3.5, “Controlling Viewable Attachment Size,” on page 621
The DVA is configured by editing its startup file (startup.dva). The default location for the startup file
varies by platform.
Linux: /opt/novell/groupwise/agents/share
When you update the agent software, the existing DVA startup file can be retained or overwritten as
needed.
Linux: When you use both the Install and Configure options in the Agent Installation program, the
existing DVA startup file is backed up and then overwritten. When you use only the Install option,
the existing DVA startup file is retained.
Windows: When you select Install the software files, but do not configure the agents in the Agent
Installation program, the existing DVA startup file is retained. When you do not select this option,
the existing DVA startup file is backed up and then overwritten.
The table below summarizes DVA startup switches and how they correspond to configuration settings
in the GroupWise Admin console.
40.1 @startup_file_name
Specifies the location of the DVA startup file if you want to change it from the default location. The
default location varies by platform:
Linux: /opt/novell/groupwise/agents/share
40.2 --cleanTmpInterval
Specifies an interval when the /tmp directory is cleaned up on a Linux server. This switch only works
on Linux. The default interval is 1440 minutes or once at day and it triggers at 1 AM.
Linux DVA
40.3 --dhparm
Specifies a Diffie-Hellman cipher parameters file used for SSL/TLS to replace the default parameters
set by GroupWise. GroupWise uses default Diffie-Hellman parameters of 2048 bits to generate the
DH key. A valid DH parameter is in PEM format.
Linux: /var/opt/novell/groupwise/gwdva
Windows: c:\ProgramData\novell\groupwise\gwdva
NOTE: On some versions of Windows Server, the ProgramData folder is not visible by default. To
display it in File Explorer, click View, then select Hidden items.
For background information, see Section 37.2, “Setting the DVA Home Folder,” on page 369.
On Windows, if you are running the DVA as a Windows service rather than as an application, the
format you use for the path name influences the Windows user account that the DVA service can run
under. If you specify a home folder on the local server or on a mapped drive, the DVA service can run
under the local system account. If you specify a home folder as a UNC path to a remote server, the
DVA service must run as a Windows user that has rights to access the remote home folder.
40.5 --httpmaxthread
Specifies the maximum number of worker threads that the DVA can start. By default, the DVA creates
new worker threads as needed to handle the current document conversion load, and the default is 20
threads. The maximum recommended setting is 30 as setting it higher can negatively impact the
system. See Section 39.1, “Controlling Thread Usage,” on page 377.
40.7 --httppassword
Specifies the password for the DVA to prompt for before allowing DVA status information to be
displayed in your web browser in the DVA console. See “Configuring the DVA Console” on page 373.
40.8 --httpssl
Enables secure SSL connections between the DVA and other programs (the POA, the WebAccess
Application, and your web browser for the DVA console). See Section 37.4, “Securing Document
Conversion with SSL Connections,” on page 371.
40.9 --httpthread
Sets the default number of worker threads that the DVA starts. The default is 5 threads. As the
document conversion load increases, the DVA starts additional worker threads until the number set
by the --httpmaxthread startup switch is reached. See Section 39.2, “Controlling Maximum Document
Conversion Size and Time Limits,” on page 377.
40.10 --httpuser
Specifies the user name for the DVA to prompt for before allowing DVA status information to be
displayed in a web browser at the DVA console. See “Configuring the DVA Console” on page 373.
40.11 --ip
Specifies the IP address that the DVA listens on for HTTP requests from other programs (the POA,
the WebAccess Application, and the DVA console). The default is the first IP address that the DVA
finds on the server. See Section 37.3, “Changing the DVA IP Address or Port Number,” on page 370.
40.12 --lang
Specifies the ISO language code that the DVA should use if it cannot determine the language of a
document that needs conversion. The default is en for English.
See Chapter 7, “Multilingual GroupWise Systems,” on page 85 for a list of GroupWise language
codes.
Linux: /var/log/novell/groupwise/gwdva
Windows: c:\ProgramData\Novell\GroupWise\gwdva\log
NOTE: On some versions of Windows Server, the ProgramData folder is not visible by default. To
display it in File Explorer, click View, then select Hidden items.
For more information, see Section 38.2.2, “Configuring DVA Log Settings,” on page 374.
40.14 --logdays
Specifies how many days to keep DVA log files on disk. The default is 30 days. See Section 38.2.2,
“Configuring DVA Log Settings,” on page 374.
40.15 --loglevel
Controls the amount of information logged by the DVA. Valid settings are Normal, Verbose,
Diagnostic, and Off. The default is Normal. For more information, see Section 38.2.2, “Configuring
DVA Log Settings,” on page 374.
40.17 --maxquarantineage
Specifies the maximum number of days that document files that fail in HTML conversion are retained
in the quarantine. By default, the quarantine is disabled. See Section 37.5, “Enabling the DVA
Document Quarantine,” on page 371
40.18 --maxquarantinesize
Specifies in megabytes the maximum amount of disk space that the document quarantine can
occupy. The default is 100 MB. To clear out the contents of the quarantine, set --maxquarantinesize to
0 (zero); this also disables the quarantine in the future. See Section 37.5, “Enabling the DVA
Document Quarantine,” on page 371.
When the DVA provides HTML conversion for the POA, the setting of the DVA --maxtime switch
interacts with the setting of the POA --dvamaxtime switch, which sets the amount of time that the
POA waits for a response from the DVA.
40.20 --PDFSizeThreshold
Specifies the conversion size threshold for PDF documents requested from WebAccess. If a PDF has
a lot of images, it can take a long time to convert. If this option is set, the DVA only returns the text
from the PDF if the PDF exceedds the size threshold. The default is no limit. The value is set in MB.
40.21 --PDFReturnNoImage
Disables the DVA from returning any image during PDF document conversion. This overrides the --
PDFSizeThreshold switch if it is set. This switch is either enabled or disabled. It is disabled by default.
40.22 --quarantine
Enables the document quarantine feature of the DVA, which is disabled by default. See Section 37.5,
“Enabling the DVA Document Quarantine,” on page 371
NOTE: If files passed to the DVA from the POA for HTML conversion in preparation for indexing fail in
HTML conversion by the DVA, they are placed in the post_office/oftemp/gwdca/problem folder.
40.24 --sslciphersuite
Sets the SSL cipher suites used by the Archive Agent, the Messaging Agent, and Messenger clients.
The cipher list must be in OpenSSL format. For more information on OpenSSL format, see Cipher
List Format (https://www.openssl.org/docs/apps/ciphers.html#CIPHER-LIST-FORMAT)
40.25 --sslkey
Specifies the full path to the private file used to provide secure SSL communication between the DVA
and other programs (the WebAccess Application, the POA, and the DVA console). See Section 37.4,
“Securing Document Conversion with SSL Connections,” on page 371.
40.27 --ssloption
Specify a specific SSL protocol to disable. By specifying SSL_OP_NO_TLSv1, GroupWise will
disable TLSv1 support. Specify additional options by adding the SSL key work separated by a
comma.
Databases 389
390 GroupWise 2014 R2 Administration Guide
41 Understanding GroupWise Databases
41
Your GroupWise system includes numerous databases where vital information is stored.
NOTE: The maximum size for all types of GroupWise databases is 4 GB. Domains, post offices, and
mailboxes consist of multiple databases, so there are no physical size limits for domains, post offices,
and mailboxes. However, there are feasibility limitations based on potentially time-consuming
activities such as backup/restore procedures.
Address information about all GroupWise objects (such as users, resources, groups, and post
offices) in the domain
System configuration and linking information for the domain’s MTA
System configuration and linking information for the domain’s GWIA (if there is one)
Address and message routing information to other domains
The first domain you create is the primary domain. In the primary domain, the wpdomain.db file
contains all administrative information for your entire GroupWise system (all domains, post offices,
users, and so on). Because the wpdomain.db file in the primary domain is so crucial, you should back
it up regularly and keep it secure. See Section 48.1, “Backing Up a Domain,” on page 423.
You can re-create your entire GroupWise system from the primary domain wpdomain.db file;
however, if the primary domain wpdomain.db file becomes unusable, you can no longer make
administrative updates to your GroupWise system.
Every domain you create after the primary domain is a secondary domain. The contents of secondary
domains are automatically synchronized with the primary domain.
The database version for GroupWise 2014 R2 post office databases is 1420.
When a member of another post office shares a folder with one or more members of the local post
office, a “prime user” database (puxxxxx.db) is created to store the shared information. The prime
user is the owner of the shared information.
Local user databases and prime user databases are stored in the ofuser folder in the post office.
Because resources are addressable just like users, resources also have user databases.
Outgoing messages from local senders are stored in the message database assigned to each
sender. Incoming messages from users in other post offices are stored in the message database with
the same name as the message database assigned to the sender in his or her own post office. In
each case, only one copy of the message is stored in the post office, no matter how many members
of the post office it is addressed to.
The databases for managing libraries are stored in the gwdms folder and its subfolders in the post
office.
The dmsh.db file is a database shared by all libraries in the post office. It contains information about
where each library in the post office is located.
Each library has its own subfolder in the gwdms folder. In each library folder, the dmxxnn01-FF.db files
contain information specific to that library, such as document properties and what users have rights to
access the library.
The actual documents in a library are not kept in the library databases. They are kept in a document
storage area, which consists of a series of folders for storing documents. Documents are encrypted
and stored in BLOBs (binary large objects) to make document management easier. A document, its
versions, and related objects are stored together in the same BLOB.
See Chapter 64, “Creating and Managing Libraries,” on page 519 and Chapter 66, “Creating and
Managing Documents,” on page 531 for more information about Document Management Services.
The guardian database is vital to GroupWise functioning. Therefore, the POA has an automated
back-up and roll-forward process to protect it. The POA keeps a known good copy of the guardian
database called ngwguard.fbk. Whenever it modifies the ngwguard.db file, the POA also records the
transaction in the roll-forward transaction log called ngwguard.rfl. If the POA detects damage to the
ngwguard.db file on startup or during a write transaction, it goes back to the ngwguard.fbk file (the
“fall back” copy) and applies the transactions recorded in the ngwguard.rfl file to create a new, valid
and up-to-date ngwguard.db.
In addition to the POA back-up and roll-forward process, you should still back up the ngwguard.db,
ngwguard.fbk, and ngwguard.rfl files regularly to protect against media failure. Without a valid
ngwguard.db file, you cannot access your email. With current ngwguard.fbk and ngwguard.rfl
files, a valid ngwguard.db file can be rebuilt should the need arise.
The ngwguard.dc file is the structural template for building the guardian database and its subordinate
databases. Also called a dictionary file, the ngwguard.dc file contains schema information, such as
data types and record indexes. If this dictionary file is missing, no additional databases can be
created in the post office.
Databases
NOTE: Unfortunately, damage to databases cannot be prevented. A power outage can occur in the
middle of a write to a database. A hard drive can fail. However, the GroupWise tools for repairing
damaged databases are very effective and should be able to resolve most damage to GroupWise
databases.
To further protect your GroupWise system against loss of domain and post office information, see:
To ensure that the same information exists in all domain and post office databases throughout your
GroupWise system, see:
Section 45.2, “Replicating Secondary Domains, Post Offices, and Libraries,” on page 412
Section 45.3, “Synchronizing the Primary Domain from a Secondary Domain,” on page 412
1 In the GroupWise Admin console, connect to the domain where the database is located.
2 Browse to and click the name of the domain or post office where you want to validate the
database.
3 From a domain, click Maintenance.
or
From a post office, click Maintenance > Post Office Database.
4 Select Validate Database, then click Run.
You are notified if there are any physical problems, so you can then recover or rebuild the
database. If the task takes a while to complete, see Section 2.4, “Monitoring Background
Administrative Tasks,” on page 36.
If the Validate process reveals problems with the database, see Section 42.2, “Recovering
Domain or Post Office Databases,” on page 396 and Section 42.3, “Rebuilding Domain or Post
Office Databases,” on page 398.
If you receive an administrative message informing you that an internal database error has occurred,
or if you detect database damage and don’t want to take users out of GroupWise, you can recover the
database. If no errors are reported after the recover process, you do not need to take further action.
The recover process is run against a copy of the domain database (wpdomain.db) or post office
database (wphost.db). Therefore, while the recover process is running, you can continue to access
the database through the GroupWise Admin console and you do not need to stop the MTA or the
POA.
wpdomain.db
wpdomain.db
recover.ddb
Rename wpdomain.db
to recover.ddb.
creating.ddb
NO Successful? YES
creating.ddb recover.ddb
recover.ddb creating.ddb
wpdomain.db wpdomain.db
1 Ensure that you have sufficient disk space for the copy of the database that is created during
recovery.
2 In the GroupWise Admin console, connect to the domain where the database is located.
3 Browse to and click name of the domain or post office where you want to recover the database.
4 From a domain, click Maintenance.
or
From a post office, click Maintenance > Post Office Database.
5 Select Recover Database, then click Run.
You are notified if there are any physical problems, so you can then rebuild the database. If the
task takes a while to complete, see Section 2.4, “Monitoring Background Administrative Tasks,”
on page 36.
6 Click Close to return to the main Admin console window.
If recovery is successful, the backup database is deleted, and the new domain database is renamed
to wpdomain.db, or the new post office database is renamed to wphost.db.
If recovery fails for any reason, the backup database is copied back to wpdomain.db or wphost.db. If
any data was lost, you are notified by an administrative message.
You have several options for retrieving lost data from other sources:
If data has been lost from the primary domain, you can synchronize it with a secondary domain
that is known to contain current information. See Section 45.3, “Synchronizing the Primary
Domain from a Secondary Domain,” on page 412.
If data has been lost from a secondary domain, you can replicate the information from the
primary domain. See Section 45.2, “Replicating Secondary Domains, Post Offices, and
Libraries,” on page 412.
You can also rebuild the database at a later time when you have exclusive access to the
database where the data has been lost. See Section 42.3, “Rebuilding Domain or Post Office
Databases,” on page 398.
You should rebuild a domain or post office database if you encounter any of the following conditions:
When you rebuild a secondary domain database, information is retrieved from the primary domain.
When you rebuild a post office database, information is retrieved from the owning domain.
IMPORTANT: If you need to rebuild a secondary domain database that is a version previous to
GroupWise 2014 R2, use gwadminutil to rebuild the database.
During the rebuild process, a backup of the domain or post office database is created as well as a
new wpdomain.db or wphost.db. The records from the primary domain database are copied into the
new wpdomain.db. There should not be any data loss. When the rebuild process is complete, the
temporary database and the backup database are deleted.
Primary Domain
wpdomain.db wpdomain.db creating.ddb
NO Successful? YES
creating.ddb
Delete wpdomain.db.
Delete creating.ddb.
creating.ddb
wpdomain.db wpdomain.db
wpdomain.db wpdomain.db
1 Ensure that you have sufficient disk space for the copy of the database that is created during the
rebuild process.
2 In the GroupWise Admin console:
2a (Conditional) If you are rebuilding a secondary domain database, connect to the primary
domain.
NOTE: If you need to rebuild the primary domain database, you must use the GroupWise
Administration Utility (gwadminutil). For instructions, see Rebuilding a Domain or Post
Office Database in the GroupWise 2014 R2 Utilities Reference.
or
2b (Conditional) If you are rebuilding a post office database, connect to the domain that owns
the post office.
3 Browse to and click the name of the domain or post office where you want to rebuild the
database.
4 From a domain, click Maintenance.
or
From a post office, click Maintenance > Post Office Database.
5 Select Rebuild Database.
6 Stop the agent that accesses the database.
If you are rebuilding a post office database, stopping the POA prevents users from accessing
their mailboxes while the rebuild is in progress.
7 Click Run.
If the task takes a while to complete, see Section 2.4, “Monitoring Background Administrative
Tasks,” on page 36.
8 Click Close to return to the main Admin console window.
9 Restart the agent that accesses the rebuilt database.
The GroupWise client uses the post office database to list users. If you are in the GroupWise client
and the indexes for listing system, domain, and post office users are different than the domain
database indexes, you should rebuild the post office database indexes.
1 In the GroupWise Admin console, connect to the domain that owns the database.
2 Browse to and click the name of the domain or post office where you want to rebuild the
database index.
3 From a domain, click Maintenance.
or
From a post office, click Maintenance > Post Office Database.
4 Select Rebuild Indexes.
5 Click Run.
If the task takes a while to complete, see Section 2.4, “Monitoring Background Administrative
Tasks,” on page 36.
6 Click Close to return to the main Admin console window.
Databases
NOTE: Unfortunately, damage to databases cannot be prevented. A power outage can occur in the
middle of a write to a database. A hard drive can fail. However, the GroupWise tools for repairing
damaged databases are very effective and should be able to resolve most damage to GroupWise
databases.
To further protect your GroupWise users against loss of mailbox contents, see Chapter 48, “Backing
Up GroupWise Databases,” on page 423 and Chapter 49, “Restoring GroupWise Databases from
Backup,” on page 425.
To ensure that the same information exists for users and messages throughout your GroupWise
system, see Section 45.1, “Replicating Users, Resources, and Groups,” on page 411.
By default, the POA can use up to 4 maintenance handler threads for database recovery. You can
changed the maximum number of threads as needed.
1 In the GroupWise Admin console, browse to and click the name of the user or resource whose
message databases you would like to analyze/fix.
or
Browse to and select one or more Post Office objects to select all user and/or message
databases in the post office.
2 Click Maintenance > Mailbox/Library Maintenance.
3 From the Actions drop-down menu, select Analyze/Fix Databases.
4 Select from the following options:
Structure: When a user experiences a problem that is related to the user, message, or library
databases, you should perform a structure check. The structure check verifies the integrity of the
databases and reports the amount of space that could be recovered. If there is a structural
problem, the databases are rebuilt with free space reclaimed.
Index Check: If you select Structure, you can also select Index Check. You should run an index
check if a user tries to open a message and gets a read error, or when sent items that show a
delivered status in the Properties window do not appear in the recipient’s mailbox. An index
check can be time-consuming.
Contents: The user databases (located in the ofuser folder) do not contain user messages.
Messages are contained in the message databases under the ofmsg folder. However, the
message databases do not contain the message attachments; these are located in the offiles
folder. A contents check analyzes references to other items. For example, in the user database,
Mailbox/Library Maintenance verifies that any referenced messages actually exist in the
message database. In the message database, it verifies that any attachments that are
referenced actually exist in the attachment folders. A contents check also restores system
folders (Mailbox, Sent Items, Calendar, Cabinet, and Trash to their default locations if any of
them have been moved into a subfolder.
Collect Statistics: If you selected Contents, the Collect Statistics option is available to collect
and display statistics about the post office, such as the number of messages and appointments
in the post office and the average number per user. In addition, you can display any user
mailboxes that have more than a specified number of items. This can help determine if some
users are using an excessive amount of disk space. If this is a problem, you might want to
encourage users to delete unneeded items or to use the Archive feature in the GroupWise client
to store messages on their local drives. You can also limit the amount of disk space each user
can have. See Section 13.3, “Managing Disk Space Usage in the Post Office,” on page 121.
Attachment File Check: Files that are attached to messages are stored under the offiles
subfolder in the post office. When Mailbox/Library Maintenance performs an attachment file
check, it reads each attachment file, verifying the file structure. If you skip the attachment file
check, Mailbox/Library Maintenance verifies that the attachment file exists but it does not
process the file in any way.
Fix Problems: This option tells Mailbox/Library Maintenance to fix any problems it finds.
Otherwise, Mailbox/Library Maintenance just reports the problems.
Update User Disk Space Totals: Recalculates the total disk space a GroupWise user is using
by reading the selected user mailboxes and updating the poll record used for disk space
management. Because disk space is user-specific, the program calculates the amount of disk
space in use by the user in the user databases, in any of the message databases, and in the
attachment folder. Disk space limitations do not take into account the disk space used in
document libraries. This option is usually run if the user totals are not being reflected correctly.
5 Using the tabs at the bottom of the Mailbox/Library Maintenance dialog box, set the following
options:
TIP: You can also perform this task for more than one user or resource at a time by using the
Maintenance > Mailbox/Library Maintenance dialog on the Post Office where the users or resources
are located, then selecting Maintenance on User/Resources on this Post Office.
Analyze/Fix can also be run using the stand-alone GroupWise Check program. See Section 51.1,
“GroupWise Check,” on page 435. It can also be scheduled to run on a regular basis by properly
configuring the POA. See Section 15.4.1, “Scheduling Database Maintenance,” on page 154.
1 In the GroupWise Admin console, browse to and click the name of the user or resource whose
database needs to be rebuilt.
2 Click Maintenance > Mailbox/Library Maintenance.
3 From the Actions drop-down list, select Structural Rebuild.
4 Using the tabs at the bottom of the Mailbox/Library Maintenance dialog box, set the following
options:
TIP: You can also perform this task for more than one user or resource at a time by using the
Maintenance > Mailbox/Library Maintenance dialog on the Post Office where the users or resources
are located, then selecting Maintenance on User/Resources on this Post Office.
You should never need to select this option for regular database maintenance. It is designed for
severe problems, such as replacing a user database that has been accidentally deleted and for which
you have no backup copy. A substantial amount of information is lost in the re-creation process. For a
list of the data, see “User Databases” on page 136.
Because folder assignments are lost, all items are placed into the Cabinet folder. The user must then
reorganize all the items in his or her mailbox. Using filters and searching can facilitate this process,
but it is not a desirable experience. It is, however, preferable to losing everything.
1 In the GroupWise Admin console, browse to and click the name of the user or resource that
need the user database re-created.
2 Click Maintenance > Mailbox/Library Maintenance.
3 From the Actions drop-down list, select Recreate User Database.
4 Using the tabs at the bottom of the Mailbox/Library Maintenance dialog box, set the following
options:
TIP: You can also perform this task for more than one user or resource at a time by using the
Maintenance > Mailbox/Library Maintenance dialog on the Post Office where the users or resources
are located, then selecting Maintenance on User/Resources on this Post Office.
Documents
GroupWise Document Management Services (DMS) uses libraries as repositories for documents.
For a review of library database structure, see Section 41.5, “Library Databases,” on page 392.
Section 44.1, “Analyzing and Fixing Databases for Libraries and Documents,” on page 407
Section 44.2, “Analyzing and Fixing Library and Document Information,” on page 408
NOTE: Unfortunately, damage to databases cannot be prevented. A power outage can occur in the
middle of a write to a database. A hard drive can fail. However, the GroupWise tools for repairing
damaged databases are very effective and should be able to resolve most damage to GroupWise
databases.
1 In the GroupWise Admin console, browse to and click the name of the name of the library that
you want to analyze/fix.
2 Click Maintenance > Mailbox/Library Maintenance.
3 From the Action drop-down menu, select Analyze/Fix Databases.
4 Select from the following options:
Structure: When a user experiences a problem that is related to the library databases, you
should perform a structure check. The structure check verifies the integrity of the databases and
reports the amount of space that could be recovered. If there is a structural problem, the
databases are rebuilt with free space reclaimed.
Index Check: If you select Structure, you can also select Index Check. An index check can be
time-consuming.
Contents: The library database (located in the gwdms folder of the post office) does not contain
documents. Documents are stored in the lib0000-FF folders. A contents check analyzes
references from libraries to documents.
Collect Statistics: If you selected Contents, the Collect Statistics option is available to collect
and display statistics about the library, such as the number and size of documents.
Attachment File Check: Files that are attached to messages are stored under the offiles
subfolder in the post office. When Mailbox/Library Maintenance performs an attachment file
check, it reads each attachment file, verifying the file structure. If you skip the attachment file
check, Mailbox/Library Maintenance verifies that the attachment file exists but it does not
process the file in any way.
Fix Problems: This option tells Mailbox/Library Maintenance to fix any problems it finds.
Otherwise, Mailbox/Library Maintenance just reports the problems.
TIP: You can also perform this task for more than one library object at a time by using the
Maintenance > Mailbox/Library Maintenance dialog on the Post Office where the library objects are
located, then selecting Maintenance on Libraries on this Post Office.
Analyze/Fix Databases can also be run using the stand-alone GroupWise Check program. See
Section 51.1, “GroupWise Check,” on page 435. It can also be scheduled to run on a regular basis by
properly configuring the POA. See Section 15.4.1, “Scheduling Database Maintenance,” on
page 154.
1 In the GroupWise Admin console, browse to and click the name of the name of the library that
you want to validate.
2 Click Maintenance > Mailbox/Library Maintenance.
3 From the Action drop-down menu, select Analyze/Fix Library.
4 Select from the following options:
Verify Library: This is a post office-level check. It verifies that all libraries are on the libraries list.
It also checks the schema and guarantees its integrity. If there is a problem with the schema, it
resets to a default schema to reclaim any missing items. For example, if you deleted the
Document Type property, you could recover it using this option.
Fix Document/Version/Element: This performs an integrity check to verify the following:
Each document has one or more versions linked to it.
Each version has one or more elements linked to it.
All versions are linked to a document.
All elements are linked to a version.
If there are any missing links, the missing documents or versions are created from the
information contained in the existing version or element for which the link is missing. For
example, if a version is found that shows no link to a document, a document is created from the
TIP: You can also perform this task for more than one library object at a time by using the
Maintenance > Mailbox/Library Maintenance dialog on the Post Office where the library objects are
located, then selecting Maintenance on Libraries on this Post Office.
Analyze/Fix Library can also be run using the stand-alone GroupWise Check program. See
Section 51.1, “GroupWise Check,” on page 435. It can also be scheduled to run on a regular basis by
properly configuring the POA. See Section 15.4.1, “Scheduling Database Maintenance,” on
page 154.
In general, replication of object information throughout your GroupWise system occurs automatically.
Whenever you add, delete, or modify a GroupWise object, the information is automatically replicated
to all appropriate databases. Ideally, each domain database (wpdomain.db) in your system contains
original records for all objects it owns and accurately replicated records for all objects owned by other
domains. However, because unavoidable events such as power outages and hardware problems can
disrupt network connectivity, information in various databases might become inconsistent.
If you think you have a replication problem, especially soon after adding, deleting, or modifying
objects, it is wise to check Pending Operations to ensure that your changes have been processed.
See Section 4.16, “Pending Operations,” on page 53. When waiting for replication to take place,
patience is a virtue.
When information differs between the original record and a replicated record, the original record is
considered correct. If you perform replication from the owning domain, the owning domain notifies the
primary domain of the correct information, then the primary domain broadcasts the correct
information to all secondary domains. Therefore, the best place to perform replication is from the
domain that owns the object whose information as become inconsistent. The next best place to
perform replication is from the primary domain, because the primary domain sends a request to the
owning domain for the correct information, then broadcasts the correct information to all secondary
domains.
1 In the GroupWise Admin console, browse to and click the name of the user, resource, or group.
2 Click More > Replicate.
The task to replicate the object is passed to the GroupWise Admin Service for processing.
If many User, Resource, and Group objects are being replicated, you can check progress by viewing
pending operations. See Section 4.16, “Pending Operations,” on page 53.
After replication is complete, you can verify that it was successful by checking the replicated objects
in Address Books and several post offices in your GroupWise system.
1 In the GroupWise Admin console, browse to and click the name of the domain, post office, or
library.
2 (Conditional) For a secondary domain, if there is any doubt about the correctness of that
secondary domain’s information as stored in the primary domain database, synchronize the
primary domain with the secondary domain before proceeding.
See Section 45.3, “Synchronizing the Primary Domain from a Secondary Domain,” on page 412.
3 Click More > Replicate.
The task to replicate the object is passed to the GroupWise Admin Service for processing.
After replication is complete, you can verify that it was successful by checking the domain, post office,
or library information when connected to different domains in your GroupWise system.
When you synchronize the primary domain database from a secondary domain database, any
records the secondary domain owns, such as post offices or users added to the secondary domain,
are replicated from the secondary domain database to the primary domain database.
You must use the GroupWise Administration Utility (GWAdminUtil) to synchronize the primary domain
from a secondary domain because direct file access to both databases is required.
1 From the primary domain server, establish direct file access to the secondary domain server.
On Linux, mount the file system on the secondary domain server to the primary domain server.
On Windows, map a drive from the primary domain server to the secondary domain server.
2 Use the following command to synchronize the primary domain from the secondary domain:
3 To ensure that the primary domain database is totally up-to-date, repeat Step 1 and Step 2 for
each secondary domain in your system.
One of the most common maintenance issues in a growing system is running out of disk space. In
addition to sending messages, users tend to use GroupWise for all sorts of communication, such as
transferring large files. Library documents created with Document Management Services (DMS) can
use huge amounts of disk space. Archived library documents can also quickly use up disk space
assigned to the post office, where space is usually limited.
You should let your users know about the archive and auto-delete features of GroupWise mail, or set
Client Options in the GroupWise Admin console to automatically archive or delete. See Chapter 69,
“Setting Defaults for the GroupWise Client Options,” on page 549.
See also Section 13.3, “Managing Disk Space Usage in the Post Office,” on page 121.
The Mailbox Statistics option in Mailbox/Library Maintenance collects and displays statistics about the
post office, such as the number of messages and appointments in the post office and the average
number per user. It is valid only for user databases. In addition, you can display any user mailboxes
that have more than a specified number of items. This can help determine which users might be using
an excessive amount of file server disk space.
1 In the GroupWise Admin console, browse to and click the name of the user, resource, or post
office.
2 For a user or resource, click Maintenance.
or
For a post office, click Maintenance > Mailbox/Library Maintenance.
3 From the Actions drop-down menu, select Mailbox Statistics.
4 Select Mailbox Statistics.
Mailbox Statistics: Specify a maximum number of items to see a report showing each user
whose mailbox has more items in it than the number you specify.
or
Select Expire Statistics.
Expire Statistics: Select one of the following:
Items Older Than: Shows how many items are older than the number of days you specify.
Downloaded Items Older Than: Shows how many items have been downloaded to users’
GroupWise Caching or Remote mailboxes that are older than the number of days you
specify. This does not include items that have been downloaded to non-GroupWise
mailboxes (for example, POP and IMAP accounts).
Items Larger Than: Shows how many items are larger than the size you specify.
1 In the GroupWise Admin console, browse to and click the name of a user or resource to expire/
reduce messages for them.
or
Browse to and click the name of the post office to expire/reduce messages for all users and
resources in each selected post office.
2 For a user or resource, click Maintenance.
or
For a post office, click Maintenance > Mailbox/Library Maintenance.
3 From the Actions drop-down menu, select Expire/Reduce Messages.
4 Click Reduce Only to delete items that have already expired (that is, items that have been
archived or deleted by users).
or
Click Expire and Reduce to expire items in addition those that users have already archived or
deleted, based on the criteria you select.
Expire and Reduce: Select one or more of the following:
Items Older Than: Expires items that are older than the number of days you specify.
Downloaded Items Older Than: Expires items that have been downloaded to users’
GroupWise Caching or Remote mailboxes that are older than the number of days you
specify. It does not expire items that have been downloaded to non-GroupWise mailboxes
(for example, POP and IMAP accounts).
Items Larger Than: Expires items that are larger than the size you specify.
Trash Older Than: Expires items in the Trash that are older than the number of days you
specify.
Reduce Mailbox To: Expires items until the mailbox is reduced to the size you specify.
Older, larger items are expired before newer, smaller items.
Reduce Mailbox to Limited Size: Expires items until the mailbox is the size specified
using the Disk Space Management feature under Client Options. For more information, see
Section 13.3.3, “Setting Mailbox Size Limits,” on page 123.
5 In the Include box, select Received Items, Sent Items, Calendar Items, Only Backed-Up Items,
and/or Only Retained Items. You might want to notify users of the types of items that will be
deleted.
TIP: You can also perform this task for more than one user or resource at a time by using the
Maintenance > Mailbox/Library Maintenance dialog on the Post Office where the users or resources
are located, then selecting Maintenance on User/Resources on this Post Office.
For additional disk space management assistance, see Section 13.3, “Managing Disk Space Usage
in the Post Office,” on page 121.
1 In the GroupWise Admin console, browse to and click the name of the domain or post office
where you want to reclaim disk space.
2 For a domain, click Maintenance.
or
For a post office, click Maintenance > Post Office Database.
3 Select Reclaim Unused Space.
4 Click Run.
If the task takes a while to complete, see Section 2.4, “Monitoring Background Administrative
Tasks,” on page 36.
If you are using GroupWise Document Management Services, you must determine storage
requirements for your documents. If you feel your current disk space usage by documents is not
representative of your long-term requirements, you can estimate the disk space users need for
documents by multiplying an average document size by the average number of documents per user
by the total number of users in the post office.
For example, the typical document size is 50 KB. Each user owns about 50 documents and there are
100 users on your post office.
Sample Calculation:
50 KB (document size)
x 50 documents (per user)
x 100 users
-----
2.5 GB of disk space
When room to grow is no longer available, the following tasks help you make the best use of available
disk space:
See also Section 66.3.2, “Backing Up and Restoring Archived Documents,” on page 534.
Documents that have reached their document life and been marked for deletion in the document type
are simply deleted from the library, after which the document and its property information can no
longer be found by any search. You can recover deleted documents from database backups.
When documents are archived, their BLOBs are moved to archive folders. These folders are named
arnnnnnn (where nnnnnn is an incremented integer with leading zeros), and are automatically
created as needed. They are sometimes referred to as archive sets. The archive folders are located
at post_office_folder\gwdms\lib01-FF\archive. When a document is archived, GroupWise
determines if the document BLOB fits in the current archive folder. If the BLOB does not fit, another
archive folder is created and the BLOB is archived there.
To archive/delete documents from one library or all libraries in the selected post offices:
1 In the GroupWise Admin console, browse to and click the name of the library or post office which
contains the documents you want to archive/delete.
TIP: You can also perform this task for more than one library object at a time by using the
Maintenance > Mailbox/Library Maintenance dialog on the Post Office where the library objects are
located, then selecting Maintenance on Libraries on this Post Office.
1 In the GroupWise Admin console, browse to and click the name of the library or post office where
you want to delete activity logs.
2 For a library, click Maintenance.
or
For a post office, click Maintenance > Post Office Database.
3 From the Actions drop-down menu, select Delete Activity Logs.
4 Specify the number of days in the Delete Activity Logs Older Than field. The default is 60 days.
5 Using the tabs at the bottom of the Mailbox/Library Maintenance dialog box, set the following
options:
The Record Enumerations tool lets you look inside your GroupWise databases to view the contents
on a record-by-record basis. This is very useful for troubleshooting database issues such as checking
replication between domains and GroupWise systems.
You should back up GroupWise databases regularly so that if a database sustains damage that
cannot be repaired using the GroupWise database maintenance tools, you can still recover with
minimum data loss.
Use your backup software of choice to back up GroupWise databases to a secure location. For a list
of compatible products, see the Partner Product Guide (http://www.novell.com/partnerguide/). You
can also use the GroupWise Database Copy utility (DBCopy) and the GroupWise Backup Time
Stamp utility (GWTMSTMP) to assist with backups. For details about how to use these utilities, see
Chapter 51, “Stand-Alone Database Maintenance Programs,” on page 435.
Database Location
wphost.db \post_office_folder
ngwguard.db \post_office_folder
msgnnn.db \post_office_folder\ofmsg
userxxx.db \post_office_folder\ofuser
puxxxxx.db \post_office_folder\ofuser
fd0-F6 \post_office_folder\offiles
dmsh.db \post_office_folder\gwdms
dmxxnn01-FF.db \post_office_folder\gwdms\lib0000-FF
fd0-FF \post_office_folder\gwdms\lib0000-FF\docs
After you have initially performed a full backup of your document storage areas, you can perform
incremental backups by backing up to the same location to shorten the backup process.
To ensure consistency between the backups of post office databases and document storage areas:
1 Use your backup software of choice to back up your document storage areas.
2 Back up the post office.
For instructions, see Section 48.2, “Backing Up a Post Office,” on page 423.
3 Perform an incremental backup of your document storage areas to pick up all new documents
and document modifications that occurred while backing up the post office.
You should need to restore data in a document storage area only if files have been damaged or
become inaccessible due to a hard disk failure.
Backup
Database damage can usually be repaired using the database maintenance tools provided with
GroupWise. Only very occasionally should you need to restore databases from backup.
If damage to the domain database is so severe that rebuilding the database is not possible:
Chapter 42, “Maintaining Domain and Post Office Databases,” on page 395
Chapter 43, “Maintaining User/Resource and Message Databases,” on page 403
Section 51.3, “GroupWise Backup Time Stamp Utility,” on page 446
If damage to the post office was so severe that rebuilding databases is not possible:
1 Ensure that the user to whom the affected database belongs is not running the GroupWise client.
2 Use your backup software of choice to restore the database into the proper location in the post
office folder.
User databases are stored in the ofuser subfolder in the post office. Message databases are
stored in the ofmsg subfolder.
3 To update the restored database with the most current information available, run Analyze/Fix
Databases with Contents selected.
For instructions, see Section 43.2, “Analyzing and Fixing User/Resource and Message
Databases,” on page 403.
NOTE: Setting up a restore area enables users to restore deleted mailbox items (messages,
appointments, tasks, and so on), but not deleted contacts (entries in Contacts folders and personal
address books).
A restore area is a location you designate to hold a backup copy of a post office so that you or
GroupWise client users can access it to retrieve mailbox items that are unavailable in your live
GroupWise system.
1 Create a backup copy of the post office folder for users to access as a restore area.
The name of the restore area folder must follow the same conventions as a post office folder.
Linux: 755
Windows: Change
12 (Conditional) For a restore area on Windows, if the restore area is located on a different server
from where the post office folder is located, provide the POA with a user name and password for
logging in to the remote server.
You can provide that information using the Remote User Name and Password fields on the Post
Office Settings tab, or using the /user and /password startup switches.
13 Continue with Section 49.5.2, “Restoring a User’s Mailbox Items,” on page 429 or
Section 49.5.3, “Letting Client Users Restore Their Own Mailbox Items,” on page 429 as
needed.
1 In the GroupWise Admin console, browse to and click the name of a user or resource for which
you need to restore mailbox items.
2 Click More > Restore.
3 Click Yes to restore the user’s or resource’s mailbox items.
4 Notify the user and explain the following about the restored items:
The user might want to manually delete unwanted restored items.
The user should file or archive the items that he or she wants within seven days. After seven
days, unaccessed items are deleted after the amount of time allowed by existing auto-
delete settings. For details, see “Environment Options: Cleanup” on page 559. If auto-
deletion is not enabled, the restored items remain in the mailbox indefinitely.
In the backup copy of a mailbox, only items that are different from the live mailbox are displayed. If
the backup mailbox looks empty, it means that it matches the contents of the live mailbox.
1 Make available a backup copy of a domain database (wpdomain.db) where the deleted
GroupWise account still exists.
2 In the GroupWise Admin console, click System > Recover Deleted Account.
3 Browse to and select the backup copy of the domain database.
4 Click Account to Recover, select the user or resource that you need to recover the account for,
then click OK.
At this point, you have restored the user’s or resource’s GroupWise account into the GroupWise
system. However, this does not restore ownership of resources, nor does the account’s mailbox
contain any item at this point.
5 If the restored user owned resources, manually restore the ownership.
For instructions, see Section 58.2, “Changing a Resource’s Owner,” on page 502.
6 Restore the contents of the account’s mailbox.
For instructions, see Section 49.5, “Restoring Deleted Mailbox Items,” on page 427.
GroupWise enables you to retain user messages until they have been copied from message
databases to another storage location. This means that a user cannot perform any action, such as
emptying the mailbox Trash, that results in a message being removed from the message database
before it has been copied.
Not allowing users to remove messages until they have been retained.
Retaining the messages by copying them from message databases to another location.
Time-stamping the retained messages so that they can be subsequently deleted.
GroupWise supplies the ability to not allow users to remove messages until they have been retained.
It also provides methods for message retention applications to securely access user mailboxes and
copy messages. However, it does not provide the message retention application. You must develop
or purchase a third-party (non-GroupWise) application that performs this service.
When the GroupWise Admin console reads a trusted application record that has the Provides
Message Retention Service setting enabled, it adds the Message Retention Service to the Retention
tab in the Environment Options (GroupWise Admin console > Domain object, Post Office object, or
User object > Client Options > Environment > Integrations > Retention).
You use this Retention tab to enable message retention at the domain, post office, or user level,
meaning that you can enable it for all users in a domain, all users in a post office, or individual users.
Enabling message retention alters the GroupWise client purge behavior by preventing a user from
purging any messages from his or her mailbox that have not yet been retained.
To determine whether or not mailbox messages have been retained, the message retention
application adds a time stamp to the mailbox. The message retention application can use the
GroupWise Object API or GroupWise IMAP support to write (and read) the time stamp. In the
GroupWise Admin console, you can click More > Time Stamp on an object in order to apply a basic
time stamp. In addition, you can use the GroupWise Backup Time Stamp Utility to manually set the
time stamp. For more information, see Section 51.3, “GroupWise Backup Time Stamp Utility,” on
page 446.
The time stamp represents the most recent date and time that message retention was completed for
the mailbox. Messages delivered after the time stamp cannot be purged until they have been
retained. This requires that the message retention application retain items chronologically, oldest to
newest. For example, assume a mailbox has a message retention time stamp of May 7, 2014
12:00:00. The mailbox has three folders with a total of seven messages:
The message retention application reads the existing time stamp (May 7, 2014 12:00:00) and selects
a time between that time and the current time. For example, suppose the current time is May 9, 2014
14:00:00. The message retention application could choose May 8, 2014 12:00:00 as the new time
stamp. It would then retain any messages delivered between the existing time stamp (May 7, 2014
12:00:00) and the new time stamp (May 8, 2014, 12:00:00).
In the above example, messages 1, 4, and 6 are older than the existing time stamp (May 7, 2014
12:00:00). The message retention application would not retain these messages again, assuming that
they had already been safely retained. Messages 2 and 5 have dates that fall between the existing
time stamp (May 7, 2014 12:00:00) and the new time stamp (May 8, 2014, 12:00:00) so they would
be retained. Messages 3 and 7 have dates that fall after the new time stamp (May 8, 2014, 12:00:00)
so they would not be retained until the next time the message retention application ran against the
mailbox.
Optionally, the message retention service can be associated with an archive service. For more
information, see Section 4.20.7, “Archive Service Settings,” on page 59.
For information about GroupWise partners that provide message (email) retention applications,
see the Partner Product Guide (http://www.novell.com/partnerguide/).
Message retention is not enabled until you designate the users whose messages you want retained
by the application. You can designate users at the domain level, post office level, or individual user
level.
1 In the GroupWise Admin console, browse to and click the name of the domain, post office, or
user for which you want to enable message retention.
2 Click Client Options to display the GroupWise Client Options dialog box.
3 Click the Integrations tab, then click Retention.
4 Select Enable Message Retention Service.
5 (Conditional) If you want to lock the setting at this level, click the Lock button.
For example, if you lock the setting at the domain level, the setting cannot be changed for any
post offices or users within the domain. If you lock the setting at the post office level, it cannot be
changed individually for the post office’s users.
This setting does not display in the GroupWise client. Therefore, there is no lock available when
editing this setting for individual users.
6 Click OK to save the changes.
Programs
The GWCheck utility runs on Linux and Windows. You should match the platform of GWCheck to the
platform where the databases are located. Linux GWCheck processes databases on Linux. Windows
GWCheck processes databases on Windows.
IMPORTANT: GWCheck should not be used to process databases that are located across a network
connection between different machines.
The post office database The guardian database The file system for this post office is
(wphost.db) is checked for the (ngwguard.db) is checked to find out checked to see if the user database
file ID (FID) of the selected if this user database has been (userxxx.db) for this user exists.
user. created.
After GWCheck makes the database comparisons, it begins processing according to the databases
selected and any inconsistencies found.
? userabc.db userabc.db
No entry for this user is found in the An entry is found in the guardian Also, a user database
post office database (wphost.db). database (ngwguard.db), indicating (userxxx.db) for this user is
that the user has been deleted. found in the ofuser folder.
WARNING: If a post office database becomes damaged so some users are unable to log in,
GWCheck should not be run until the post office has been rebuilt. For more information, see
Section 42.3, “Rebuilding Domain or Post Office Databases,” on page 398.
The user appears in the post office The guardian database A user database (userxxx.db) for the
database (wphost.db). (ngwguard.db) shows no user user does exist in the ofuser folder.
database for this user.
GWCheck creates the user in ngwguard.db, using database userabc.db. Even if ngwguard.db is
damaged, it is unlikely that data is lost.
The user is found in the post office The user is found in the guardian No user database (userxxx.db)
database (wphost.db). database (ngwguard.db). is found in the ofuser folder.
Contents Check: GWCheck deletes all of this user’s messages from the message databases if they
are not referenced by other users.
Structural Rebuild: GWCheck creates a blank user database for this user. Existing messages for
this user are ignored.
Re-create User Database: GWCheck creates a blank user database for this user and populates it
with messages in the message databases that have been sent to or from this user.
WARNING: If a user database has been deleted, do not run a Contents Check until after a Structural
Rebuild or Re-create User Database has been run for that user. For more information, see
Section 43.3, “Performing a Structural Rebuild of a User/Resource Database,” on page 405 and
Section 43.4, “Re-creating a User/Resource Database,” on page 406.
Over time, a collection of options files might accumulate. To see what maintenance activities an
options file performs, use ./gwcheckt options_file_name --dump.
To remind yourself of these options when you are at your Linux server, view the gwcheckt man page.
As an administrator, you can run GWCheck for databases in any post office accessible from the
workstation where GWCheck is installed. The GWCheck program performs all database maintenance
itself, rather than handing off a task to the POA as the GroupWise Admin console would do to perform
database maintenance.
For the Repair Mailbox item to display on the GroupWise client Tools menu, the following files must
be installed in the GroupWise software folder:
gwcheck.exe
gwchkxx.dll (Replace xx with your language code)
gwchkxx.chm (Replace xx with your language code)
To run GWCheck:
1 From the Start menu, click Run, then browse to and double-click gwcheck.exe.
2 Continue with Section 51.1.4, “Performing Mailbox/Library Maintenance Using GWCheck,” on
page 438.
Databases
To select the types of database to perform the Mailbox/Library Maintenance check on, click
Databases.
Depending on the object type and action already selected in the main window, some database types
might be unavailable. If all the database types are unavailable, then one or more database types
have been preselected for you.
You can perform an action on the following databases when the type is not unavailable:
Logging
To specify the name of the file where you want the results of the MailBox/Library Maintenance check
to be stored, click Logging.
Specify a file name. By default, the file is created in the home folder of the user who is running
GWCheck. Specify a full path to create the log file in a different location.
Click Verbose Logging to log detailed information. Verbose logging might produce large log files and
slow execution.
Results
To select users to receive the results of the Mailbox/Library Maintenance check, click Results.
Select Administrator to send the results to the user defined as the GroupWise domain’s notification
user. For more information, see Section 24.6, “Receiving Notifications of Agent Problems,” on
page 242.
Select Individual Users to send each user the results that pertain to him or her. Specify each user’s
GroupWise user name or email address in a comma-delimited list. Click Message to include a
customized message with the results file.
Misc
If you need to run a Mailbox/Library Maintenance check with special options provided by Novell
Support, click Misc.
Use the Support Options field to specify command line parameters. Support options are typically
obtained from Novell Support representatives when you need assistance resolving specific database
problems. Search the Novell Support Knowledgebase (http://www.novell.com/support/) for TIDs and
Support Pack Readmes that list support options. Ensure that you clearly understand what the
Support options do before you use them.
Exclude
If you want to exclude certain users in the selected post office from having the Mailbox/Library
Maintenance check performed on their databases, click Exclude.
Click Add, select one or more users to exclude, then click OK.
/opt/novell/groupwise/agents/bin
2 To create an options file, see “Saving Mailbox/Library Maintenance Options” on page 440.
It is also installed along with the GroupWise client software in the gwcheck subfolder of the
GroupWise client installation folder.
2 To create an options file, see “Saving Mailbox/Library Maintenance Options” on page 440.
--batch /batch
--lang /lang
--opt /opt
--pa /pa
--po /po
--pr /pr
--batch
Runs GWCheck in the background, without a user interface. Use an options file to specify the
database repair options.
For example, to specify that you want GWCheck to run it batch mode, you would use:
--lang
Specifies the language to run GWCheck in, using a two-letter language code. You must install
GWCheck in the selected language in order for it to display in the selected language.
For a list of current language codes, see Chapter 7, “Multilingual GroupWise Systems,” on page 85.
For example, to specify that you want GWCheck to run in Spanish, you would use:
--opt
Specifies a database maintenance options file created in a GWCheck session. This starts GWCheck
with the same options settings as the session in which the options file was created.
If the options file is not in the default folder, you must specify the full path name.
For example, to start GWCheck with saved settings, you would use:
--pa
Specifies the path to the archive folder.
For example, to specify the archive database that a user keeps is his or her home folder, you would
use:
--po
Specifies the path to the post office folder.
--pr
Specifies the path to the remote mailbox folder.
For example, to specify the Remote mailbox that a user keeps on a computer at home, you would
use:
IMPORTANT: If you want to move domains and post offices from NetWare or Windows to Linux, see
the GroupWise Server Migration Guide. The migration process includes DBCopy startup switches
that are not described in this GroupWise 2014 R2 Administration Guide because they are used only
for migration.
DBCopy is a multi-threaded application that provides highly efficient copying of large quantities of
data.
DBCopy copies only GroupWise-recognized folders and files in domain and post office folders.
DBCopy does not copy some folders:
Post office queue folders (wpcsin and wpcsout): Only post office data files and folders are
copied. Queue folders are not copied.
All domain subfolders: Only domain files are copied. Queue folders are not copied.
All subfolders under each GWIA folder in wpgate: Only GWIA files are copied from each GWIA
folder. Queue folders of GWIA folders are not copied. For example, under gwia, GWIA files are
copied, but no GWIA subfolders are copied.
When planning disk space for your backups, you should plan to have at least three times the size of a
post office. This accommodates the post office itself, the backup of the post office, and extra space for
subsequent growth of the post office.
Typically, domains grow less than post offices, so domain backups should occupy somewhat less disk
space.
/opt/novell/groupwise/agents/bin
or
Use the following command to back up a remote document storage area:
You can include the -i switch in any of these commands to provide the date (mm-dd-yyyy) of the
previous copy. This causes DBCopy to copy only files that have been modified since the
previous copy, like an incremental backup.
To remind yourself of these options when you are at your Linux server, view the dbcopy man
page.
DBCopy creates a log file named mmddgwbk.nnn. The first four characters represent the date. A
three-digit extension allows for multiple log files created on the same day. The log file is created
at the root of the destination folder. Include the -v switch in the dbcopy command to enable
verbose logging for the backup.
3 After DBCopy has finished copying the post office, domain, or remote document storage area,
use your backup software of choice to back up the static copy of the data.
4 After the backup has finished, delete the static copy of the data to conserve disk space.
You might find it helpful to set up a cron job to run DBCopy regularly at a time of day when your
system is not busy.
IMPORTANT: If you are planning on running dbcopy in a script outside of the /opt/novell/
groupwise/agent/bin directory, then you need to add the following export to your script:
export LD_LIBRARY_PATH=/opt/novell/groupwise/agents/lib
or
Use the following command to back up a domain:
or
Use the following command to back up a remote document storage area:
You can include the /i switch in any of these commands to provide the date (mm-dd-yyyy) of the
previous copy. This causes DBCopy to copy only files that have been modified since the
previous copy, like an incremental backup.
-i /i Incremental backup
-t /t Number of threads
-v /v Verbose logging
-b
Indicates that DBCopy is copying a document storage area, which includes BLOB (binary large
object) files. Use this switch only when you need to copy BLOB files.
-i
Specifies the date of the previous copy of the data. This causes DBCopy to copy only files that have
the specified date or newer, such as an incremental backup. There is no default date; you must
specify a date or an increment backward from today. Valid increments are -1 to -31.
-i -days /i -days
-i -1 /i -7
-j
Raises the priority of DBCopy processing. By default, if DBCopy detects that a POA is running, it
lowers its own priority so that it does not interfere with POA processing. If DBCopy runs at night,
when GroupWise users are not active, use the -j switch so that DBCopy does not lower its own
priority. This speeds up DBCopy processing.
Example: -t 10 /t 10
-v
Turns on verbose logging, which provides more detail than the default of normal logging. DBCopy
creates a log file named mmddgwbk.nnn. The first four characters represent the date. A three-digit
extension allows for multiple log files created on the same day. The log file is created at the root of the
destination domain, post office, or document storage area folder. In addition to status and error
messages, it lists any remote document storage areas associated with a post office.
-w
Turns on continuous logging to the screen.
If a user deletes an item from his or her mailbox and purges it from the Trash, the item is removed
from the user’s database only if the time stamp shows that the item has already been backed up.
Otherwise, the item remains in the user’s database until the database is backed up, at which time it is
purged from the database.
You can run GWTMSTMP on all user databases in a post office or on a single user database. No
other databases are affected.
The Do Not Purge Items Until They Are Backed Up option must be selected for the post office in
the Admin console (post_office_object > Client Options > Environment > Cleanup).
User databases (userxxx.db) must be time-stamped every time a backup is performed so that
items can be purged only after they are backed up.
Restore
You can use GWTMSTMP to manually add the restore time stamp to the database. The restore time
stamp is not required for any GroupWise feature to work properly. Its primary purpose is
informational.
Retention
If you use a message retention application, the application should automatically add the retention
time stamp after retaining the database’s messages. Any messages with dates that are newer than
the retention time stamp cannot be purged from the database. You can use GWTMSTMP to manually
add a retention time stamp.
For more information, see Chapter 50, “Retaining User Messages,” on page 431.
Modified Retention
If you use a message retention application, you might need to retain items more than once if you want
to capture changes to personal subjects and personal attachments on items. You can use
GWTMSTMP to manually update the retention time stamp on modified items, so that they are
retained again.
To check the existing time stamp on all GroupWise user databases in a post office, use the following
command:
Syntax:
./gwtmstmp -p /post_office_folder
Example:
./gwtmstmp -p /gwsystem/acct
To set a current time stamp on all user databases in a post office, use the following command:
Example:
More specialized functionality is provided through additional GWTMSTMP startup switches. See
Section 51.3.4, “GWTMSTMP Startup Switches,” on page 448.
To remind yourself of these options when you are at your Linux server, view the gwtmstmp man page.
To check the existing time stamp on all GroupWise user databases in a post office, use the following
command:
Syntax:
gwtmstmp.exe /p-drive:\post_office_folder
Example:
gwtmstmp.exe /p-m:\gwsystem\acct
To set a current time stamp on all user databases in a post office, use the following command:
Syntax:
Example:
-p /p
--backup or -b /backup
--restore or -r /restore
--retention or - n /retention
--get or -g /get
--set or -s /set
--clear or -c /clear
--date or -d /date
--time or -t /time
--gmttime or -m /gmttime
--userid or -u /u
--userdb or -e /userdb
-p
(Required) Specifies the full path to the post office folder where the user databases to time-stamp are
located.
For example, to set the restore time stamp, you would use:
--get
Lists existing backup, restore, and retention time stamp information for user databases. If no time
stamps are set, no times are displayed. If no other operational switch is used, --get is assumed.
The following example returns the same results as the above example because --get is assumed:
--set
Sets the current date and time (of backup, restore, or retention) on user databases.
For example, to set the backup time stamp, you would use:
or
--clear
Removes time stamps (of backup, restore, or retention) from user databases.
For example, to clear all time stamps on databases in a post office, you would use:
For example, to set the restore date to June 15, 2014, you would use:
--time
Specifies the time that you want placed on user databases. If no time is specified, 00:00 is used.
For example, to set the restore time to 4:45 p.m., you would use:
--gmttime
Specifies the number of seconds since midnight on January 1, 1970 Greenwich Mean Time (GMT),
that you want placed on the user databases.
--userid
Provides a specific GroupWise user name so that an individual user database can be time-stamped.
--userdb
Provides a specific user database (userxxx.db) so that an individual user database can be time-
stamped.
For example, to set the retention time stamp for a user whose user database is named user3gh, you
would use:
Users 453
454 GroupWise 2014 R2 Administration Guide
52 Creating GroupWise Accounts
52
For users to be able to use GroupWise, you must give them GroupWise accounts. A GroupWise
account defines the user in the GroupWise system by providing the user with a GroupWise user
name and mailbox.
You can give GroupWise accounts to users during or after their creation in an LDAP directory such as
NetIQ eDirectory or Microsoft Active Directory. You can also give GroupWise accounts to users who
do not have LDAP accounts.
1 In the GroupWise Admin console, click System > System Preferences and locate the Default
Password section.
2 Type the password you want to use as the default, then click OK.
3 Explain to users how to set their own passwords in GroupWise, as described in:
“Assigning a Password to Your Mailbox” in the GroupWise 2014 R2 Client User Guide
“Changing Your Password” in the GroupWise 2014 R2 WebAccess User Guide
NOTE: Users cannot change their passwords in GroupWise WebAccess Mobile on tablet
devices.
1 In the GroupWise Admin console, configure your GroupWise system to communicate with the
LDAP directory.
For instructions, see Section 6.1, “Setting Up an LDAP Directory,” on page 79.
2 Click System > User Import.
3 (Conditional) If you have multiple LDAP directories, select the one from which you want to import
the GroupWise users.
4 Select the post office into which you want to import the users.
5 (Conditional) If the context of the User objects is under the Base DN, browse to and select the
LDAP context where User objects are located.
IMPORTANT: Characters that are valid and even desirable in a GroupWise user name, such as
accented characters, might not be valid in an email address. For some users, you might need to
set up a preferred email ID in order to ensure that they have a valid email address. For
instructions, see Section 29.4.5, “Setting a Preferred Email ID,” on page 279.
cn=user_name,ou=org_unit,o=organization
cn=user_name,ou=users,dc=server_name,dc=company_name,dc=com
LDAP Authentication Directory: (Conditional) After you specify the user’s LDAP DN, select
the LDAP directory where the user is located.
Expiration Date: If you want the user’s GroupWise account to no longer work after a certain
date, specify the expiration date. For more information, see Section 53.14.2, “Expiring a
GroupWise Account,” on page 478.
Disable Logins: Select this option to prevent the user from accessing his or her GroupWise
mailbox. For more information, see Section 53.10, “Disabling and Enabling GroupWise
Accounts,” on page 475.
3 (Conditional) If the user was imported from an LDAP directory, click the General tab to see the
user information that has been imported from the LDAP directory.
When user information changes in the LDAP directory, it is automatically synchronized to
GroupWise.
4 (Conditional) If the user was manually created, click the General tab to provide user information.
5 (Optional) Click the Internet Addressing tab to customize the user’s email address information.
For more information, see Section 29.4.4, “Overriding Internet Addressing,” on page 278.
6 (Optional) Click the Objects tab to configure how the new user associates with other GroupWise
objects:
7 Click Save, then click Close to return to the main Admin console window.
During user import from LDAP: In the Admin Console > System > User Import, if you select
Import User Photo and the user has a photo associated with their LDAP account, the photo will
be imported and used in GroupWise.
Associating a GroupWise user to an LDAP object: If you have a user that was created in
GroupWise and associate them to an LDAP user that has a photo connected to their LDAP
account, it will associate that photo with the GroupWise user. This is done through the Admin
Console > Users > (select a specific user) > More > Associate.
Adding the image through the user’s properties page: In the user’s properties page, you can
click the Edit option that appear when you hover over the image in the top left of the page to edit
the user’s photo. The user’s properties page is found in the Admin Console > Users > (select a
specific user).
NOTE: When you upload photos to the System Address Book, they are automatically sized to 64
pixels x 64 pixels by GroupWise, so the size of the original photo does not matter. You may want to
make sure that the photo sizes properly to this size before uploading.
If you would like users to be able to add or edit their own photos, you can enable this functionality in
their client:
1 Go to the Admin Console > (select domain or post office) > Client Options > Environment >
Address Book.
2 Select Allow update of picture in the System Address Book.
3 Click OK.
This will allow users to change their photo that is displayed in the System Address Book. If a user
updates their photo, it is only stored in GroupWise and does not sync back to a directory.
You can also provide users with Quick Starts that cover specialized GroupWise functionality:
You can also refer users to the GroupWise 2014 R2 User Frequently Asked Questions.
Click Help > Help Topics to learn to perform common GroupWise tasks.
Click Help > What’s New to learn about the latest new GroupWise features.
Click Help > Training and Tutorials to display the BrainStorm, Inc. QuickHelp for GroupWise
2014 R2 (http://www.brainstorminc.com/videos/gw2014) or customized training materials
provided for your users.
You can change the URL that displays when users click Help > Training and Tutorials. In the
GroupWise Admin console, use Client Options > Integration > Tutorial on a domain, post office,
or user to specify the URL for your customized training materials.
Click Help > User Guide to view the GroupWise 2014 R2 Client User Guide in HTML format. The
guide includes more background information on GroupWise features than the Help does.
Click Options > Help to learn to perform common WebAccess tasks on your tablet.
Click Options > Help > What’s New in GroupWise 2014 R2 WebAccess Mobile to learn about the
latest new WebAccess features for your tablet.
Click Options > Help > Novell GroupWise 2014 R2 Documentation website to access the
GroupWise 2014 R2 WebAccess User Guide. The guide includes more background information
on GroupWise features than the Help does.
Users
As your GroupWise system grows, you will need to add users and manage their GroupWise
accounts.
See also:
Chapter 42, “Maintaining Domain and Post Office Databases,” on page 395
Chapter 43, “Maintaining User/Resource and Message Databases,” on page 403
Chapter 48, “Backing Up GroupWise Databases,” on page 423
Proper database maintenance and backups allow recovery from accidental deletions, as described in
the following sections:
1 In the GroupWise Admin console, browse to and click the name of user.
2 Click the Objects tab, then click Groups.
3 Click Add, select one or more groups that you want to add the user to, then click OK.
By default, the user is added as a primary recipient (To recipient).
4 (Optional) If you want to change the user’s recipient type, select the group, click Participation,
then click To, CC, or BC.
5 Click Save, then click Close to return to the main Admin console window.
The global signature is appended by the GroupWise client to messages after any personal signatures
that users create for themselves. It is appended after the user clicks Send. If S/MIME encryption is
enabled, the global signature is encrypted along with the rest of the message. GroupWise client users
can choose whether global signatures are appended only for recipients outside the local GroupWise
system or for all recipients, local as well as external. For GroupWise client users, you can assign a
global signature based on users, resources, post offices, and domains.
The Internet Agent (GWIA) can append global signatures to the end of messages for recipients
outside the local GroupWise system. However, the GWIA does not append global signatures to S/
MIME-encoded messages, nor does it duplicate global signatures already appended by the
GroupWise client. You can assign a default global signature for all users in your system, and then
override that default by editing the properties of each GWIA object
NOTE: If a user sends an external message with a subject only (no message body), a global
signature is not appended. This is working as designed. The presence of a global signature on an
external message with an empty message body would prevent the GWIA /flatfwd switch from
functioning correctly.
A global signature set at the post office level overrides the global signature set at the domain level. A
global signature set at the user level overrides the global signature set at the post office and domain
level.
1 In the GroupWise Admin console, browse to and select the domain, post office, or set of users to
which you want to assign a global signature.
2 Click Client Options.
3 Click the Send tab, then click Global Signature.
4 In the Global Signature drop-down list, select the global signature that you want to use.
By default, the selected signature is applied only to messages that are being sent outside your
GroupWise system.
5 (Optional) If you want to also use global signatures internally, select Apply Signature to All
Messages.
6 Click OK to save the settings.
1 In the GroupWise Admin console, browse to and select the domain, post office, or users for
which you want to suppress a global signature.
2 Click Client Options.
3 Click the Send tab, then click Global Signature.
4 In the Global Signature drop-down list, select <None>, then click OK.
When you move a user’s GroupWise account, all items are moved correctly and all associations
(proxy rights, shared folder access, and so on) are resolved so that the move is transparent to the
user. Occasionally, some client options the user has set (GroupWise client > Tools > Options) might
be lost and must be re-created for the new mailbox.
The following sections provide information you should know before performing a move and
instructions to help you perform the move.
A live move uses a TCP/IP connection between POAs to move a user from one post office to another.
In general, a live move is significantly faster (approximately 5 to 10 times) than a file transfer move.
However, it does require that TCP/IP is functioning efficiently between the two POAs.
A file transfer move uses the transfer of message files (using POAs and MTAs) rather than a TCP/IP
connection between POAs. A file transfer move is required if you are moving a user across a WAN
link where TCP/IP might not be efficient.
By default, when you initiate a user move, the post office’s POA attempts to establish a live move
session with the destination post office’s POA. If it cannot, a file transfer move is used instead.
If desired, you can disable the live move capability (Post Office object > GroupWise > Settings >
Disable Live Move). Any moves to or from the post office would be done by file transfer.
Ensure that the POAs for the user’s current post office and destination post office are running.
The POA automatically resolves this issue when it performs its nightly user upkeep. During the nightly
user upkeep process, the POA ensures that all addresses in a user’s Frequent Contacts address
book are valid addresses in the GroupWise Address Book. For more information, see Section 15.4.3,
“Configuring Nightly User Upkeep,” on page 157.
If you want to ensure that messages sent to the user’s old email address are delivered even before
the POA cleans up the Frequent Contacts address book, you can create a nickname using the old
GroupWise email address. For more information, see Part XII, “Nicknames,” on page 505.
While a GroupWise user account is being moved, the POA in the source post office and the POA in
the destination post office communicate back and forth. You can track the move process progresses
through various steps and statuses:
1 In the GroupWise Admin console, browse to and click the name of a post office or domain, click
the Objects tab, then click User Move Status to display the user moves specific to the post office
or domain.
or
Click System > User Move Status to display all users moves in your GroupWise system.
All moves occurring within the selected location are listed.
At the beginning of the move process, most buttons are dim, because it would not be safe for
you to perform those actions at that point in the move process. When those actions are safe, the
buttons become active.
2 (Optional) To restrict the number of users and resources in the list, type distinguishing
information in any of the Search field, then press Enter to filter the list.
3 During the move, click Refresh to update the status information.
During the move, you might observe some of the following statuses:
Destination post office updated: The destination POA has updated the destination post
office database with the user’s account information. At this point, the user account exists in
the new location and appears in the GroupWise Address Book with the new location
information.
Source post office updated: The source POA has updated the user in the source post
office database to show the new destination post office. At this point, the user can no longer
access the mailbox at the old location.
Moving mailbox information: The POAs have finished exchanging administrative
information and are ready to move items from the old mailbox to the new mailbox.
1 Ensure that the user has exited the GroupWise client and GroupWise Notify.
2 Ensure that the domain’s MTA and post office’s POA are running.
3 In the GroupWise Admin console, browse to and click the name of a user, then click More >
Rename.
4 Specify the new GroupWise user name.
5 (Optional) Select Create Nickname for This User so that messages that will be undeliverable at
the old email address are successfully delivered to the new email address.
For more information, see Part XII, “Nicknames,” on page 505.
6 Click OK to rename the user.
However, some users might have the user’s old email address in their Frequent Contacts address
book. In this case, if the sender types the modified user’s name in the To field rather than selecting it
from the Address Book, GroupWise uses the old email address stored in the Frequent Contacts
address book instead of the new email address in the GroupWise Address Book. This results in the
message being undeliverable.
The POA automatically resolves this issue when it performs its nightly user upkeep. During the nightly
user upkeep process, the POA ensures that all addresses in a user’s Frequent Contacts address
book are valid addresses in the GroupWise Address Book. For more information, see Section 15.4.3,
“Configuring Nightly User Upkeep,” on page 157.
If you want to ensure that messages sent to the user’s old email address are delivered even before
the POA cleans up the Frequent Contacts address book, you can create a nickname using the old
GroupWise email address. For more information, see Part XII, “Nicknames,” on page 505.
IMPORTANT: Ensure that, on each new Active Directory User object, the User logon name (pre-
Windows 2000) field (the sAMAccountName property in Active Directory) exactly matches the
GroupWise user name (the uniqueID property in eDirectory). Any user for whom these names do
not match must be manually migrated.
TIP: Initially, migrate only a small number of users to ensure that the migration process is
working as expected.
9 Click Associate.
10 Continue with Verifying the Directory Associations.
1 In Active Directory, verify that the user’s GroupWise information has synchronized to Active
Directory:
1a On the General tab of a GroupWise User object, verify that the Email Address field displays
the user’s GroupWise email address.
1b To provide a test of user synchronization from Active Directory to GroupWise, modify the
user’s phone number.
4 In the GroupWise Admin console, verify that the user’s information in Active Directory has
synchronized to GroupWise:
4a Click Users, then click the name of the user whose phone number you modified in Active
Directory in Step 1b.
4b On the General tab, verify that the user’s phone number matches what is in Active Directory.
4c Change the user’s phone number back, then click Save.
5 Continue with Verifying Successful Authentication.
1 In the GroupWise Admin console, verify that the post office of the migrated users is configured
for LDAP authentication:
1a Browse to and click the name of the post office.
1b On the Security tab, verify that LDAP Authentication is selected.
2 Start the GroupWise client for a user that has been migrated to Active Directory.
3 Verify that the user credentials provided by Active Directory result in a successful login into the
GroupWise mailbox.
4 Continue with Verifying a Complete User Migration.
1 In the GroupWise Admin console, click Users to list all of your GroupWise users.
2 Use the Search User Name field to check for users that might have been missed:
2a Use the following filter to search for users who are not currently associated with any LDAP
directory:
directory = null
2b Use the following filter to search for users who are not associated with Active Directory:
directory != active_directory_name
3 (Conditional) If your searches revealed orphan users that no longer need GroupWise accounts,
plan to disable their accounts at an appropriate time.
For instructions, see Section 53.10, “Disabling and Enabling GroupWise Accounts,” on
page 475.
4 (Conditional) If your searches revealed users whose Active Directory logon name did not match
their GroupWise user name, you can associate them manually:
4a After searching for the unassociated users, click a user name.
4b Click More > Associate.
4c Select the LDAP directory where you want to associate the user.
4d Browse to and select the user in the LDAP directory.
4e Click OK.
When you are sure that you no longer need the User objects in eDirectory, you can delete them.
Using an SSL connection between GroupWise and Active Directory is strongly recommended. The
process for establishing an SSL connection is beyond the scope of the GroupWise product
documentation.
As administrator, you can use the GroupWise Admin console to create or change a password for a
user.
1 In the GroupWise Admin console, browse to and click the name of the user.
2 Click Change Password.
3 Specify and confirm the password.
4 Click OK.
1 In the GroupWise Admin console, browse to and click the name of the user.
2 Click Change Password.
3 Select Clear User’s Set Password.
4 Click OK.
When adding or changing users’ email addresses you can check to ensure that the email address
you want to use for a particular user is not already in use.
1 In the GroupWise Admin console, click System > Email Address Lookup.
2 In the Search field, specify the email address.
You can specify the user name only (for example, jsmith) or the entire address (for example,
[email protected]).
3 Press Enter.
You can manually perform the user synchronization if information has changed in the LDAP directory,
and you want to see it immediately in GroupWise.
1 In the GroupWise Admin console, browse to and click the name of a user.
2 Click Synchronize.
1 In the GroupWise Admin console, browse to and click the name of a user.
2 Click the Accounts tab, then select Disable Logins.
3 Click Save, then click Close to return to the main Admin console window.
4 (Conditional) If the user is logged in to his or her Online mailbox when you disable logins,
disconnect the user.
For instructions, see “Disconnecting a User Session from the POA” on page 161.
5 To enable the user’s account when access is again permitted, deselect Disable Logins, click
Save, then click Close.
While a user’s account is disabled, other users to whom proxy rights have been granted can still
access the mailbox. This is convenient for reviewing the contents of the mailbox of a departed
employee and pulling out those messages that are of use to the incoming employee.
When a user is locked out, access is automatically granted again after the incorrect login reset time
interval has passed. If a user needs quicker access, you can unlock the GroupWise account in the
GroupWise Admin console or in the POA console.
1 In the GroupWise Admin console, browse to and click the name of a user.
2 Click the Accounts tab, then deselect Disable Logins.
3 Click Save, then click Close to return to the main Admin console window.
1 Click Status.
2 In the Statistics section, click Intruder Detection.
As soon as the POA receives the changed setting, the user can again log in.
You can measure message traffic from individual GroupWise mailboxes. See Section 85.3.5, “User
Traffic Report,” on page 666.
1 In the GroupWise Admin console, browse to and click the name of a user.
2 Click the Accounts tab, then select Force Inactive Status.
3 Click Save, then click Close to return to the main Admin console window.
For complete information about licensing, see Section 13.4, “Auditing Mailbox License Usage in the
Post Office,” on page 127.
If you delete a GroupWise account by accident, or need to retrieve a deleted account for some other
reason, see Section 49.6, “Recovering Deleted GroupWise Accounts,” on page 430.
NOTE: When you remove a GroupWise account, any personal databases, such as an archive, a
Caching mailbox, or a Remote mailbox, that are associated with the account are unaffected by the
account deletion. Such databases are not located where the GroupWise Admin console could delete
them, so they must be deleted manually.
1 (Conditional) If the user owns library documents, see “Ensuring that a User’s Library Documents
Remain Accessible” on page 477 before deleting the user.
2 (Conditional) If the user owns resources, transfer the resources to another user in the same post
office.
3 Ensure that the user has exited the GroupWise client and GroupWise Notify.
4 Ensure that the POA for the user’s post office is running.
If the POA is not running, the user mailbox is not deleted until the next time the POA runs.
5 In the GroupWise Admin console, browse to and click the name of the user you want to delete.
6 Click More > Delete.
7 Click Yes to confirm the deletion.
8 (Conditional) If the user was originally imported from an LDAP directory, delete the user from the
LDAP directory.
If you or other users need access to the documents, you have the following choices:
Change the mailbox password so that the user cannot log in. Other users can continue
accessing the documents, and you can log in with the new password to manage the documents.
For instructions, see Section 53.7.1, “Creating or Changing a Mailbox Password,” on page 473.
Disable the user’s ability to log in. For instructions, see Section 53.10, “Disabling and Enabling
GroupWise Accounts,” on page 475.
Change the mailbox to an inactive account. For instructions, see Section 53.13, “Forcing Inactive
Status,” on page 476.
Delete the user, then reassign the orphaned documents to another user. For instructions, see
Section 44.2, “Analyzing and Fixing Library and Document Information,” on page 408.
This option is useful for providing GroupWise accounts to temporary or contract employees who
come and go. You can set a user’s GroupWise account to expire immediately or at a future date and
time.
1 Ensure that the user has exited the GroupWise client and GroupWise Notify.
2 In the GroupWise Admin console, browse to and click the name of the user.
3 On the Account tab, select Expiration Date, then set the date to expire the account.
4 Click Save, then click Close to return to the main Admin console window.
GroupWise 2014 R2 supports single sign-on with KeyShield, eDirectory, Active Directory, and CASA.
Make sure both the POA Server and the user workstation are joined to the same Active Directory
domain.
Make sure the POA has the DNS name specified instead of the IP address in the GroupWise
Admin Console > Post Office Agents > select the POA > Agent Settings > TCP/IP Address
field.
Enable LDAP Authentication in the GroupWise Admin Console > Post Offices > select the PO
> Security tab.
Select Network authentication (eDirectory or Active Directory) in the Admin Console > Post
Office Agents > select the POA > Client Options > Security tab.
Register the POA as a Service Principle Name (SPN) by running the following command:
gwadminutil adsso -a <path to post office directory>
Make sure that all krb5 rpms are installed on the server.
Make sure that the Linux server points to the AD server as its DNS server.
Join the Linux POA server to the windows domain by configuring the YaST2 > Network Services
> Windows Domain Membership applet. The Kerberos Method in the Advanced Settings or
Expert Settings needs to be system keytab.
Configure Kerberos by editing the /etc/krb5.conf file using the documentation for your version
of SLES:
SLES 11
SLES 12
Add GroupWise to the keytab file for Kerberos by running the following command:
net ads keytab add groupwise
The GroupWise client includes several options that users can choose from to enable them to log in
without providing a password. These options, located on the Security Options dialog box (GroupWise
client > Tools > Options > Security), are described in the following table:
No Password Required with This option is available only when logged in to NetIQ eDirectory.
eDirectory
When GroupWise starts, it automatically logs in to the GroupWise
account associated with the user who is logged in to eDirectory at the
workstation. No GroupWise password is required.
Use Single Sign-On This option is available only when using Novell Single Sign-on 2.0 and
SecureLogin 3.0 and later products.
Use Collaboration Single Sign-On This option is available only when using Novell Common
(CASA) Authentication Services Adapter (CASA) 1.0 and later.
As shown in the table, these options appear only if certain conditions are met, such as the user
having Novell Single Sign-on or SecureLogin installed. If you don’t want the option to be available to
users even if the condition is met, you can disable the option. Doing so removes it from the
GroupWise client’s Password dialog box.
1 In the GroupWise Admin console, browse to and click the name of a domain, post office, or user.
2 With the appropriate GroupWise object selected, click Client Options to display the GroupWise
Client Options dialog box.
3 Click the Security tab.
4 Select Use eDirectory Authentication Instead of Password if you want NetIQ eDirectory users
to be able to use the GroupWise client’s No Password Required with eDirectory option.
This option is available only if LDAP authentication is enabled for the post office. For more
information, see Section 15.3, “Configuring Post Office Security,” on page 150.
5 Deselect Enable Single Sign-on if you don’t want Single Sign-on or SecureLogin users to be
able to use the GroupWise client’s Use Novell Single Sign-on option.
Groups 485
486 GroupWise 2014 R2 Administration Guide
55 Understanding Groups
5
Groups are sets of users (and optionally, resources and other groups) that can be addressed as a
single entity. When a GroupWise user addresses an item (message, appointment, task, or note) to a
group, each user or resource that is a member receives the item if he or she has a GroupWise
account.
The following sections provide information to help you learn about groups:
A group can consist of users, resources, and other groups. Members do not need to be in the same
post office as the group’s post office.
Because a group is an addressable entity, you must assign it to a post office when you create it.
Regardless of the group’s post office, all GroupWise users can use the group when addressing a
message.
LDAP groups are administered in the associated LDAP directory. eDirectory groups are administered
in iManager. Active Directory groups are administered in the Microsoft Management Console (MMC).
GroupWise includes plugins for eDirectory and for MMC to enable LDAP administrators to add new
LDAP groups to GroupWise in the administrative environment with which they are familiar. For
information about installing and using the GroupWise plugins, see Section 2.7, “Using an LDAP
Directory Management Tool for Adding LDAP Users and Groups to GroupWise,” on page 40.
The name that you give to the LDAP Group object in the LDAP directory management tool becomes
the name by which it is displayed in the GroupWise Address Book. You make an LDAP group
available in your GroupWise system by assigning it to a post office. Regardless of the post office
where the LDAP group is assigned, all GroupWise users can use it when addressing a message.
Apart from modifying group membership, a group that was originally an LDAP group and a native
GroupWise group can be managed essentially the same.
A GroupWise group can contain GroupWise users, resources, and other groups. When creating the
group, you can determine each member’s participation in the group (primary recipient, courtesy copy
recipient, or blind copy recipient). Groups are displayed in the GroupWise Address Book. When a
GroupWise user addresses an item (message, appointment, task, or note) to a group, each user or
resource that is a member receives the item if he or she has a GroupWise account.
IMPORTANT: Characters that are valid and even desirable in a group name, such as accented
characters, might not be valid in an email address. For some groups you might need to set up a
preferred email ID in order to ensure that they have a valid email address. For instructions, see
Section 56.10.1, “Changing a Group’s Internet Addressing Settings,” on page 493.
NOTE: If the group is being synchronized from an LDAP group, you cannot modify group
membership in the GroupWise Admin console. Instead, you must use the same LDAP directory
management tool to modify group membership that you used to create the LDAP group. Changes to
membership in the LDAP group automatically synchronize to the GroupWise group.
1 In the GroupWise Admin console, browse to and click the name of the group.
2 Click Add to add members to the group:
2a Select Users to list and select users, then click OK.
2b Select Resources to list and select resources, then click OK.
2c Select Groups to list and select groups, then click OK.
You cannot select more than one type of object at a time.
By default, all users are given To participation.
3 To change the participation of members to CC or BC, select the members, click Participation,
then select CC or BC.
Groups are typically managed by an administrator in the GroupWise Admin console. In addition,
users can be granted rights to modify groups. For instructions, see Section 56.8, “Enabling Users to
Modify a Group,” on page 492.
As an alternative, GroupWise client users can create shared address books and then create groups
within those shared address books, so that the groups are available to all users with whom the
address book has been shared. The creator of the shared address book can give other users read-
only rights, or can choose to grant them additional rights for adding, editing, and deleting information.
For more information about shared address books, see “Sharing an Address Book with Another User”
in the GroupWise 2014 R2 Client User Guide.
NOTE: If the group is being synchronized from an LDAP group, you cannot modify group
membership in the GroupWise Admin console. Instead, you must use the same LDAP directory
management tool to modify group membership that you used to create the LDAP group. Changes to
membership in the LDAP group automatically synchronize to the GroupWise group.
1 In the GroupWise Admin console, browse to and click the name of a group.
2 On the Membership tab, select one or more members that you want to remove from the list, then
click Delete.
The group retains the same name in the new post office as it has on the current post office. If another
user, resource, or group assigned to the new post office has the same name, you must rename one of
them before you move the group. For details, see Section 56.6, “Renaming a Group,” on page 491.
1 In the GroupWise Admin console, browse to and click the name of the group.
2 Click More > Move.
3 Select the post office to which you want to move the group.
4 (Optional) Create a nickname for the group so that messages that will be undeliverable at the
original post office location are successfully delivered to the new post office location.
For more information, see Part XII, “Nicknames,” on page 505.
5 Click OK to move the group.
To rename a group:
1 In the GroupWise Admin console, browse to and click the name of the group.
2 Click More > Rename.
3 Specify the new name for the group.
4 Click OK to rename the group.
1 In the GroupWise Admin console, browse to and click the name of the group.
2 Click the Access Control tab.
3 Click Add, select one or more users who are allowed to send to the restricted group, then click
OK to add the users to the Access Control list.
4 (Optional) Click Add, select Resources, select one or more resources that are allowed to send to
the restricted group, then click OK to add the resources to the Access Control list.
5 (Optional) Click Add, select Groups, select one or more groups that are allowed to send to the
restricted group, then click OK to add the groups to the Access Control list.
IMPORTANT: After you add users, resources, and groups to the Access Control list, only those
users, resources, and groups can send to the restricted group.
6 Click Save, then click Close to return to the main Admin console window.
7 Notify the users that they have rights to send to the restricted group.
In addition to the users that you add to the Access Control list, users to whom you have granted edit
rights can also send to the restricted group, even if you do not explicitly add them to the Access
Control list. For more information, see Section 56.8, “Enabling Users to Modify a Group,” on
page 492.
1 In the GroupWise Admin console, browse to and click the name of the group.
2 Click the Access Control tab, then locate the People Who Can Modify This Group section.
3 Click Add, then select one or more users who can edit the group.
4 Click OK to grant the edit rights.
5 Notify the users that they have rights to modify the group.
1 In the GroupWise Admin console, browse to and click the name of user.
2 Click the Objects tab, then click Group Administration.
3 Click Add, then select one or more system-level groups for the user to edit.
4 Click Save, then click Close to return to the main Admin console window.
5 Notify the user that he or she has rights to modify the system-level groups.
In the GroupWise client, the editable group does not appear any different to the user who has
rights to edit it, except that Add and Remove are active for that user.
In Online mode, the user can edit the group in the GroupWise Address Book. In Caching mode, the
user cannot edit the group in the GroupWise Address Book. However, the user can edit the group in
the Address Selector in a new message.
1 In the GroupWise Admin console, browse to and click the name of the group.
2 Click Delete.
3 Click Yes to confirm the deletion.
1 In the GroupWise Admin console, browse to and click the name of the post office.
2 Click the Objects tab, then click Groups.
3 Select one or more groups, then click Delete.
4 Click OK to complete the deletion.
NOTE: If the group was being synchronized from an LDAP group, deleting the GroupWise group in
the GroupWise Admin console does not delete the LDAP group in the LDAP directory. If the group no
longer serves a purpose in the LDAP directory, you must use the same LDAP directory management
tool to delete the group that you used to create the group.
Resources 495
496 GroupWise 2014 R2 Administration Guide
57 Creating Resources
57
A resource is an item or place, such as a computer, company vehicle, or conference room, that users
can schedule or check out. A resource can also be a role that different users might have at different
times.
Although you can import users and groups from an LDAP directory such as NetIQ eDirectory or
Microsoft Active Directory, you cannot import LDAP resources.
When a user schedules a resource that is defined as a place, the resource name is automatically
added to the Place field in the appointment.
Starting in GroupWise 2012 SP2, a role resource represents a position in an organization that can be
reassigned from one owner to the next. As owners change, the role resource mailbox retains all
information associated with the role. Unlike general resources and place resources, role resources
are included in a Reply to All.
A resource’s account enables it to receive scheduling requests (sent as appointments). The owner
assigned to the resource can access the resource’s mailbox to accept or decline the requests. For
example, you might want to have all your conference rooms defined as place resources. When
sending a meeting appointment, users can schedule the conference room as well as the meeting
attendees. The place resource, just like the other users scheduled for the meeting, receives an
appointment in its mailbox which can be accepted or declined by the owner.
When scheduling a resource, users can perform a busy search to see when the resource is available.
Even though a resource is assigned to a single post office, all users in your GroupWise system can
schedule the resource.
Resources can receive all item types (mail messages, phone messages, appointments, tasks, and
notes). Generally, if your purpose in defining resources is to allow them to be scheduled through
GroupWise, they only receive appointments.
The owner automatically receives proxy rights to the resource’s mailbox. The owner can also grant
proxy rights to another user to manage the resource.
The owner cannot log in directly to the resource mailbox. However, the owner can set a password on
the resource mailbox to facilitate secure access by an IMAP client. After proxying in to the resource
mailbox, click Tools > Options > Security > Password to set a password on the resource mailbox.
For more information about how owners can manage resources, see “Managing Resources” in the
GroupWise 2014 R2 Client User Guide.
IMPORTANT: Characters that are valid and even desirable in a resource name, such as
accented characters, might not be valid in an email address. For some resources, you might
need to set up a preferred email ID in order to ensure that they have a valid email address. For
instructions, see Section 58.7.1, “Changing a Resource’s Internet Addressing Settings,” on
page 504.
GroupWise Post Office: Select the post office where the resource will be located.
Owner: Select the user who will be responsible for accepting or declining requests to use the
resource. The owner must have a GroupWise account on the same post office as the resource.
3 Click OK to create the resource.
4 Click Save, then click Close to return to the main Admin console window.
5 Continue with Configuring the New Resource.
A resource’s mailbox, just like a user’s mailbox, is a combination of the information stored in its user
database and the message databases located at its post office. Occasionally, you might want to
perform maintenance tasks on the resource’s mailbox to ensure the integrity of the databases. For
details about performing maintenance on a resource’s mailbox, see Chapter 43, “Maintaining User/
Resource and Message Databases,” on page 403.
If you are the resource owner, you can proxy to the resource mailbox in order to set up the rules. If
you are not the resource owner, be sure that the resource owner understands how to set up effective
rules for the resource.
1 In the GroupWise client, in the resource mailbox, click Tools > Rules, then click New.
2 Type a name for the auto-accept rule.
3 Select Received.
4 Select Appointment.
5 In the Appointment conflict exists drop-down list, select No.
6 Create an action to accept the appointment:
6a Click Add Action.
6b Click Accept.
6c Select a Show As setting.
6d (Optional) Type a comment to include with the acceptance.
6e Click OK.
7 Create an action to notify the appointment scheduler that the resource has accepted the
appointment:
7a Click Add Action.
7b Click Reply.
7c Click OK to accept the default of replying only to the appointment scheduler.
7d In the Subject field, indicate that the resource has accepted the appointment.
7e (Optional) In the Message field, provide any additional information that might be helpful to
the appointment scheduler.
7f Click OK.
1 In the GroupWise client, in the resource mailbox, click Tools > Rules, then click New.
2 Type a name for the auto-decline rule.
3 Select Received.
4 Select Appointment.
5 In the Appointment conflict exists drop-down list, select Yes.
6 Create an action to decline the appointment:
6a Click Add Action.
6b Click Delete/Decline.
6c (Optional) Type a comment about the resource declining the appointment.
6d Click OK.
7 Create an action to notify the appointment scheduler that the resource has declined the
appointment:
7a Click Add Action.
7b Click Reply.
7c Click OK to accept the default of replying only to the appointment scheduler.
or
Select Reply to all (sender and recipients) to ensure that everyone involved with the
appointment is notified that the resource has declined the appointment.
7d In the Subject field, indicate that the resource has declined the appointment.
7e (Optional) In the Message field, provide any additional information that might be helpful to
the appointment scheduler.
7f (Optional) In the CC field or the BC field, include one or more additional users such as the
resource owner to notify when a resource declines an appointment.
7g Click OK.
8 Test the rule by scheduling an appointment that includes the resource for a time when the
resource is not available.
The new owner automatically receives proxy rights to the resource’s mailbox. Proxy rights are
removed for the old owner.
1 In the GroupWise Admin console, browse to and click the name of the resource.
2 Click the General tab, then locate the Owner field.
3 Select the new owner from the drop-down menu, then click OK to display the user’s name in the
Owner field.
4 Click Save, then click Close to return to the main Admin console window.
1 In the GroupWise Admin console, browse to and click the name of the resource.
2 Click the Groups tab.
3 Click Add, select one or more groups that you want to add the resource to, then click OK.
By default, the resource is added as a primary recipient (To recipient).
4 (Conditional) If you want to change the resource’s recipient type, select the group, click
Participation, then click To, CC, or BC.
5 Click Save, then click Close to return to the main Admin console window.
The resource retains the same name in the new post office as it has in the current post office. If
another user, resource, or group assigned to the new post office has the same name, you must
rename one of them before you move the resource. For details, see Section 58.5, “Renaming a
Resource,” on page 504.
When you move the resource, all items in its mailbox are moved to the new post office, which means
that all schedules for the resource are kept intact.
1 In the GroupWise Admin console, browse to and click the name of the resource.
2 Click More > Move.
3 Select the post office to which you want to move the resource.
4 (Optional) Select Create Nickname(s) for the Selected Object(s), so that messages that will be
undeliverable to the old email address are successfully delivered to the new email address.
For more information, see Part XII, “Nicknames,” on page 505.
5 Click OK to display the Choose New Owner dialog box.
6 Select the user who will be the resource’s owner, then click OK to move the resource.
1 In the GroupWise Admin console, browse to and click the name of the resource.
2 Click More > Rename.
3 In the New GroupWise Name field, specify the new name for the resource.
4 (Optional) Select Create Nickname for This Object, so that messages that will be undeliverable
to the old email address are successfully delivered to the new email address.
For more information, see Part XII, “Nicknames,” on page 505.
5 Click OK to rename the resource.
1 In the GroupWise Admin console, browse to and click the name of the resource.
2 Click More > Delete.
3 Click Yes to confirm the deletion.
Nicknames 505
506 GroupWise 2014 R2 Administration Guide
59 Understanding Nicknames
59
A nickname is an additional object name for a user, resource, or group that facilitates message
delivery and controls the object’s availability in the GroupWise Address Book. Nicknames can be
manually established on the Nickname tab of User, Group, and Resource objects. They can also be
generated when you rename an object or move an object to a different post office. The nickname
gives the object an additional email address.
You rename a user, resource, or group. You can create a nickname that retains the original
object name, so that messages with the original object name in the email address are routed to
the new email address. You can configure the GroupWise Admin console to prompt for or
automatically create nicknames when you rename objects.
You move a user, resource, or group. You can create a nickname that retains the old post office
location. As messages to the moved object arrive in your GroupWise system, the email address
is routed to the new post office location. You can configure the GroupWise Admin console to
prompt for or automatically create nicknames when you move objects.
You need to restrict the visibility of a user, resource, or group in the GroupWise Address Book,
but you need to make the object visible in one or more specific Address Books outside of the
restricted visibility. You can create a nickname that provides the specific visibility that is ruled out
by the required restriction. For more information about visibility, see Section 5.2, “Controlling
Object Visibility,” on page 72.
You can retain a nickname permanently, or you can configure it to expire after a specified amount of
time.
In the GroupWise Admin console, you can list all the nicknames in your GroupWise system by
clicking Nicknames in the Administration panel. In the GroupWise client, you can display nicknames
in the GroupWise Address Book if you enable Filter for Contacts. When addressing a message,
users need to know a nickname in order to use it.
1 In the GroupWise Admin console, browse to and click the user name, click the Objects tab, click
Nicknames, then click New.
2 Fill in the following fields:
Nickname: Specify a unique user name. Do not use any of the characters listed in “Invalid
Characters in GroupWise Object Names and Email Addresses”.
First Name: (Optional) Specify the user’s first name or given name.
Last Name: (Optional) Specify the user’s last name or surname.
Post Office: Select the post office that you want to own the nickname. This can be any post
office in your GroupWise system; it does not need to be the user’s post office.
Visibility: Select the Address Book visibility for the nickname. This determines where the
nickname is available (system, domain, post office, or none). However, nicknames are not
displayed in the Address Book unless you filter for them. In order to address a message to a
nickname, a user must specify the nickname address, and the nickname must be available in the
user’s post office.
Expiration Date: If you want the nickname to be removed by the Expire Records feature after a
certain date, select Expiration Date, then select the desired date.
For more information, see Section 53.14.3, “Managing Expired or Expiring GroupWise
Accounts,” on page 478.
3 Click OK to add the nickname to the list.
4 Click Save, then click Close to return to the main Admin console window.
1 In the GroupWise Admin console, browse to and click the resource name, click the Nicknames
tab, then click New.
2 Fill in the following fields:
Nickname: Specify a unique name for the resource. Do not use any of the characters listed in
“Invalid Characters in GroupWise Object Names and Email Addresses”.
First Name: (Not applicable for a resource.)
Last Name: (Not applicable for a resource.)
Post Office: Select the post office that you want to own the nickname. This can be any post
office in your GroupWise system; it does not need to be the post office that owns the resource.
1 In the GroupWise Admin console, browse to and click the group name, click the Nicknames tab,
then click New.
2 Fill in the following fields:
Fill in the following fields:
Nickname: Specify a unique name for the group. Do not use any of the characters listed in
“Invalid Characters in GroupWise Object Names and Email Addresses”.
First Name: (Not applicable for a group.)
Last Name: (Not applicable for a group.)
Visibility: Select the Address Book visibility for the nickname. This determines where the
nickname is available (system, domain, post office, or none). However, nicknames are not
displayed in the Address Book unless you filter for them. In order to address a message to a
nickname, a user must specify the nickname address, and the nickname must be available in the
user’s post office.
Expiration Date: If you want the nickname to no longer work after a certain date, click
Expiration Date, then select the desired date.
3 Click OK to add the nickname to the list.
4 Click Save, then click Close to return to the main Admin console window.
Creation
By default, the GroupWise Admin console offers you the opportunity to create a nickname whenever
you move or rename a user.
You can configure the GroupWise Admin console so that nicknames are always created or never
created whenever you move or rename objects.
1 In the GroupWise Admin console, click System > System Preferences, then click the Settings
tab.
2 Select Always so that the Create Nicknames field is always selected and dimmed.
or
Select Never so that the Create Nicknames field is always deselected and dimmed.
3 Click OK to save the setting.
Although you create nicknames on the objects that are affected by the nicknames, you can list all of
the nicknames in your GroupWise system all at once.
Overview
GroupWise Document Management Services (DMS) lets users create documents with integrated
applications, save them, then easily locate a specific document later without knowing the application,
a specific document name, or the document’s physical location. Users can create, share, locate, edit,
view, and check out documents that are created under the management of GroupWise DMS.
63.1 Libraries
A library is a set of documents and a database that allows the documents to be managed as a unit. A
library must belong to a specific post office but can be accessed by users in other post offices. The
GroupWise client enables users to store and manage their documents in the library. The GroupWise
Post Office Agent (POA) transfers documents between the GroupWise client and the library.
In the GroupWise client, users can view a list of all the libraries to which they have access by clicking
Tools > Options > Documents.
For complete information on libraries, see Chapter 64, “Creating and Managing Libraries,” on
page 519.
Preferably, documents should be stored outside the post office, in document storage areas.
Document storage areas are physical locations, such as drive volumes, optical devices, hard drives
on other servers, and so on. Document storage areas can be located anywhere that the POA can
access them locally or using direct network access (mapped drive or mounted file system).
A document storage area has the same internal folder structure that is used to store documents at the
post office. The only difference is that a document storage area can be located anywhere in your
system. Therefore, a document storage area can be moved easily, so it is easy to expand your
document storage capacity if you store documents in a document storage area rather than at the post
office.
For complete information on document storage areas, see Section 65, “Managing Document Storage
Areas in Libraries,” on page 529.
For complete information on documents, see Chapter 66, “Creating and Managing Documents,” on
page 531.
To use one or more libraries as part of your GroupWise system, perform the following tasks as
needed:
IMPORTANT: If you are creating a new library in a clustered GroupWise system, see “Clustering” in
the GroupWise 2014 R2 Interoperability Guide before you create the library.
After you have completed the tasks and filled out the worksheet, you are ready to continue with
Section 64.2, “Creating a Library,” on page 521.
64.1.1 Selecting the Post Office That the Library Will Belong To
If you are creating a new library for each post office in your GroupWise system, print a copy of
Section 64.5, “Library Worksheet,” on page 527 for each post office.
If users in several post offices will store documents in the same library, you must decide which post
office should own the library. A library can never be reassigned to a different post office, so you
should choose the owning post office carefully. You should consider which users will use the library
most frequently and where you might want to create additional libraries in the future.
LIBRARY WORKSHEET
Under Post Office, specify the name of the post office that will own the new library.
After you have specified the library’s name and created the Library object, the name cannot be
changed. Therefore, if you have or will have other libraries, you should pick a name that uniquely
identifies the library. For example, use the name to identify the post office it is assigned to.
Do not use any invalid characters in the library’s name. For more information, see “Invalid Characters
in GroupWise Object Names.”
By default, the library name that users see in the GroupWise client is the same as the Library object
name. However, you can change the display name if you want it to be different from the Library object
name.
Under Library Description, provide a brief description of the planned use for the library.
Under Display Name, specify the library name you want users to see in the GroupWise client, if it is different
from the Library object name.
A document storage area has the same internal folder structure that is used to store documents at the
post office, but it can be located anywhere in your system. Document storage areas can be moved
easily, so it is easy to expand your document storage capacity when you store documents in
document storage areas rather than at the post office.
You might want to set up a document storage area on the same server where the POA runs so as not
to increase network traffic. The POA can index and serve documents to users most efficiently if the
document storage area is located locally.
LIBRARY WORKSHEET
Under Store Documents at the Post Office?, mark Yes or No. (Storing documents at the post office is
recommended for permanent document storage).
To define a document storage area, you must know its direct access path. For example, a UNC path
specifies the absolute location of the document storage folder.
\\windows_server\share_name\storage_folder
For example:
\\win7\c$\docs
LIBRARY WORKSHEET
Under Document Storage Area Path, specify the direct access path.
Under Document Storage Area Description, enter a useful description of the document storage area. (This
description is displayed only in the GroupWise Admin console.)
Version numbers are automatically increased from the number you select. If you select 0, the first
version of a document will be 000. If you select 1, the first version will be 001.
When you archive documents, their BLOB files are moved into archive folders. Each library in a
document storage area has its own set of archive folders that are automatically created as needed.
They are named arxxxxxx (where xxxxxx is an incremental integer with leading zeros). A document
storage area has the same archive folder structure as the gwdms subfolder in the post office.
When a document is archived, GroupWise determines if the document’s BLOB file can fit in the
current archive folder. If it cannot fit, another archive folder is created and the BLOB is archived there.
An archive set consists of all documents in one archive folder. The Maximum Archive Size property
on the Library object establishes in bytes each archive folder’s size limit. You should set this to mirror
the capacity of your archival medium. It should not be more than your archival medium’s capacity.
It is usually better to keep archive sets small in comparison to the size of the backup medium. This
lets you back up archive folders often enough to keep your hard disk space from being used up too
quickly between backups. For example, if your backup medium has 1 GB capacity, you could limit
your archive sets to a maximum archive size of 200 MB.
If your archival system only lets you back up in one pass (in other words, you cannot perform
consecutive backups to the medium), the Maximum Archive Size should match the archival medium’s
capacity.
Some archival mediums require extra space for recording file storage data, such as an index of the
files stored to tape. Ten percent is usually sufficient. For example, a tape system with 100 MB
capacity means you should set your Maximum Archive Size to 90 MB.
Consult your archival medium documentation for information on setting up an effective backup
strategy. Include in your strategy such concepts as multiple archive sets per backup medium, or
allowing extra space for the medium’s file storage data.
LIBRARY WORKSHEET
Under Maximum Archive Size, enter a number (in bytes, with no abbreviations or commas).
1 Ensure that the POA is running for the post office that will own the new library.
2 In the GroupWise Admin console, click Libraries > New.
3 Fill in the following fields that you planned for the new post office:
Name
Display Name
Description
Start Version Number
Maximum Archive Size
7 (Conditional) If you want to store documents outside of the post office folder structure
(recommended), click the Storage Areas tab.
For instructions on working with document storage areas, see Section 65, “Managing Document
Storage Areas in Libraries,” on page 529.
8 Click Save, then click Close to return to the main Admin console window.
9 Continue with Seeing the New Library in the GroupWise Client.
Delete Allows users to delete documents, regardless of who created them or has rights to the
documents. However, to be able to delete a document, users must also have rights to
locate and modify the document (View and Change rights), in addition to the Delete right.
View By itself, this right allows searching, viewing, or copying documents, but does not permit
editing them. Copies can be edited, because a copy is saved as a separate document.
Therefore, editing a copy does not affect the original document or any of its versions.
Designate Official Allows any version of a document to be designated as the official version. The official
Version version, which is not necessarily the most recently edited version, is the one located in
searches.
The official version is usually determined by the creator or author of the document.
However, the official version can be designated by the last user to edit the document (if
the user has this right). A user also needs the Change right to the document to be able to
designate an official version.
Reset In-Use Flag The In-Use flag protects against data loss by preventing multiple users from concurrently
opening the same document. The purpose of the Reset In-Use Flag right is to allow a
user or librarian to reset a document’s status when the document is in use by someone
else or when it is erroneously flagged as in use.
In the GroupWise client the document properties Status field displays the current In-Use
flag setting for a document. The Status field is automatically set to In Use when a
document is opened and reset to Available when a document is closed. There can also
be other values, such as Checked Out. A document cannot be checked out when its
status is In Use.
There are a variety of reasons for which you might want to restrict certain library rights, including:
Your libraries are specialized by department and you want to restrict access to sensitive libraries,
such as a payroll library.
Your libraries are distributed across multiple post offices and you want to restrict the scope of
user searches to only the libraries they should use, thereby speeding up searches.
Your libraries are distributed across multiple servers and you want to minimize network traffic.
You have some users who should have more rights than other users to certain libraries.
1 In the GroupWise Admin console, browse to and click the name of the library.
2 Click the Rights tab.
3 In the Public Rights box, deselect the rights that you want to remove from all users.
4 In the Individual or Group Rights box, click Add, select the users or groups to grant rights to,
then click OK.
If the number is large, you might find it easier to create a group for users who need rights. Then
you can select one group rather than multiple users. See Chapter 56, “Creating and Managing
Groups,” on page 489
5 Above the list, select the rights that you want to grant.
6 Click Save, then click Close to return to the main Admin console window.
Librarian Identity
Any GroupWise user with access to a library can be a librarian for the library. You can have multiple
librarians for a single library. You can also assign a single user as a librarian for multiple libraries.
Because being a librarian entails additional functions and rights in the library, you should choose
responsible users as librarians.
Librarian Functions
A librarian can perform the following actions:
All operations available to a normal user are also available to a librarian, as long as the security
requirement discussed under “Librarian Rights” on page 525 is not compromised. The intention is that
librarians can modify their own documents and document properties.
Unless the librarian’s own GroupWise user name is in the Author or Security fields, a librarian cannot
perform the following functions:
Open a document
To help new librarians get started, you should explain these librarian functions to them. You can also
refer new librarians to the “librarian users” topic in the GroupWise client help.
Librarian Rights
In addition to the six public rights, libraries also have a Manage right. When you grant the Manage
right to a GroupWise user, you designate that user as a librarian. The Manage right gives the librarian
full access to the properties of every document in the library. However, the Manage right does not
grant the librarian direct access to the content of any document.
Because a librarian has full access to document properties, the librarian could add his or her own
personal GroupWise user name to the Author or Security field of a document, thus gaining access to
the document’s content. However, a high-priority email notification would automatically be sent to the
original person listed in the Author field informing him or her of the action by the librarian. Therefore,
document privacy is maintained.
The following table lists the various librarian functions, and whether an email notification is sent if the
function is performed.
Replace a document with a copy from backup High-priority email to the author
Mass operation notifications do not specify what action was taken by the librarian; they only specify
that an action was taken.
The following table lists the document property fields that the librarian has rights to modify, and
whether an email notification is sent if the field is modified.
Subject No
Author Yes
Document Type No
Version Description No
Custom Fields No
File Extension No
Official Version No
Current Version No
If you remove the Manage right from a user, you must manually deselect any rights that the user
gained from being made a librarian that the user did not previously have.
To allow users assigned as librarians to act as normal GroupWise users, you could create a single
librarian account for a library and have users who need to perform librarian tasks log in using the
librarian GroupWise account and password instead of their own.
If users assigned as librarians log in under a librarian GroupWise account, they do not have access to
any documents they would normally have access to under their own accounts, except by altering the
Author or Security fields.
Assigning Librarians
To add librarians to a library:
1 In the GroupWise Admin console, browse to and click the name of the library.
2 Click the Rights tab.
3 In the Individual or Group Rights box, select the librarian users, then select Manage (Librarian).
4 Click Save, then click Close to return to the main Admin console window.
When document creators or authors are removed from your GroupWise system, orphaned
documents might be left behind. See Section 66.3.3, “Handling Orphaned Documents,” on page 535.
To supplement your library maintenance procedures, you should back up your libraries and
documents regularly. See Section 48.3, “Backing Up a Library and Its Documents,” on page 424.
Post Office Section 64.1.1, “Selecting the Post Office That the
Library Will Belong To,” on page 519.
Start Version Number Section 64.1.4, “Setting the Start Version Number,”
on page 520.
No
Yes
Libraries
For a review, see Section 63.2, “Document Storage Areas,” on page 517 and Section 64.1.3,
“Deciding Where to Store Documents,” on page 520.
Typically, the initial document storage area for a library is set up when the library is created.
Thereafter, you can create additional document storage areas as the library grows. You can move a
document storage area to a location where more storage is available. You can delete a document
storage area if it is no longer used.
1 In the GroupWise Admin console, browse to and click the name of the library.
2 Click the Storage Areas tab.
Existing document storage areas are listed.
3 (Conditional) Deselect Store documents at post office.
4 Click Add to create a new document storage area.
5 Provide a description for the document storage area.
6 Specify the path to the folder where you want to create the document storage area.
If the folder does not exist, it will be created as the document storage area is set up.
If the location is on a remote Windows server:
6a Specify the remote location as a UNC path.
6b Configure the POA service to run as This Account on the Windows server with administrator
rights to access the remote location.
6c (Conditional) If the remote location requires different credentials from those in use by the
POA service, specify the user name and password for the remote location on the Post
Office Settings tab.
7 Click OK to create the new document storage area and add it to the list of storage areas for the
library.
8 In the Storage Areas list, select the new document storage area to enable it as an active
document storage area.
9 (Conditional) If you want to stop storing documents in the previous document storage area,
deselect it in the Storage Areas list.
10 Click Save, then click Close to return to the main Admin console window.
1 In the GroupWise Admin console, browse to and click the name of the library.
2 Click the Storage Areas tab.
3 Select a document storage area, then click Remove.
4 Click Save, then click Close to return to the main Admin console window.
If the above steps are not successful in deleting a document storage area, perhaps because one or
more documents were in use during the deletion process, you can use the Analyze/Fix Library action
of Mailbox/Library Maintenance, with the Remove Deleted Storage Areas and Move Documents First
options selected, to finish cleaning up the deleted document storage area. For more information, see
Chapter 44, “Maintaining Library Databases and Documents,” on page 407.
GroupWise Document Management Services (DMS) lets GroupWise client users create documents,
save them, then easily locate a specific document later without knowing the application, a specific
document name, or the document’s physical location.GroupWise client users can create, share,
locate, edit, view, and check out documents that are created under the management of GroupWise
DMS.
Index Storage
When documents are indexed, the information is stored in QuickFinder indexes, which are located in
a library’s index subfolder. A library’s QuickFinder index is partitioned into ten *.idx files. Additionally,
temporary *.inc (incremental) files are created that contain each day’s new index information. The
*.inc files are combined once per day into the *.idx files (usually at midnight).
In a system with multiple libraries, each library has its own set of QuickFinder index files. Depending
on how many libraries belong to a post office, and how many post offices with libraries are in your
GroupWise system, there can be many sets of QuickFinder index files.
Newly-created documents must be indexed before users can search for them. In setting up your
indexing strategy, you must know how quickly users will need access to newly-created documents.
The standard search is limited to the QuickFinder indexes in the user’s default library. But users can
choose to search for documents in other libraries to which they have access.
You can configure the POA for a post office to meet varying indexing needs. See Section 19.1,
“Configuring Indexing,” on page 177. On a server with adequate memory and disk space, the POA
can keep up with indexing demands in a typical post office.
If you want to set up an additional POA specifically to handle indexing, see Section 15.1.1, “Creating
a New POA in the GroupWise Admin Console,” on page 144. You can temporarily use multiple
indexing POAs for importing documents to speed up importing time.
Indexing Cycle
The frequency of indexing is determined by the POA QuickFinder Interval setting. The default is once
every 24 hours at 8:00 p.m. You can specify the QuickFinder Interval setting in one-hour increments.
For example, a setting of 1 would allow users to find documents created as recently as an hour ago.
You can set the QuickFinder Interval to 0 (zero) for continuous indexing, but this might impact other
POA functioning.
See also Section 65, “Managing Document Storage Areas in Libraries,” on page 529.
You can also configure the POA to archive and delete documents on a regular schedule. See
Section 15.4.2, “Scheduling Disk Space Management,” on page 156.
1 Ensure that you have a backup medium operating with your system.
2 Ensure that you have already archived documents that have reached their expiration dates.
Documents that have not been archived cannot be removed to a backup medium.
3 Start the software for your backup medium.
4 When the backup software asks for the location of your archive files, give the full path.
Example:
j:\post_office\gwdms\lib0\archive\ar000001
If the document is in the post office archive set, and has not yet been physically moved from the
archive location, the document opens normally. The user does not realize it was archived. The
document is unarchived from the archive set at that time; that is, it is moved back to the library
document folder from which it was archived. It is also given a new archive date according to the
document type.
The user sees a message indicating the document cannot be opened. In this case, the archive
set containing the document has been physically moved to a backup medium. Therefore, the
document cannot be automatically unarchived. In this case, the user might contact you, asking
you to locate or recover the document. You can restore either the document’s BLOB or the
archive set that contains the BLOB. After the document is restored to its archive folder, the user
will be able to open the document normally.
1 Obtain the Document Number for the document the user was trying to access.
2 In the GroupWise client, click Tools > Find.
3 Specify the Document Number, then click OK.
4 Right-click the document in the Find Results listing, then click Properties > Version.
5 Note the archive folder in the path listed in the Current Location field.
The subfolder listed after the ..\archive folder is the archive set containing the document, for
example, \ar000001.
However, orphaned documents can be reassigned to another author so that someone can access
them again. This can be done in one of two ways:
In the GroupWise Admin console, the Analyze/Fix Library action in Mailbox/Library Maintenance
can reassign orphaned documents to a specified user. Then, the new user has access to all
orphaned documents in that library. For more information, see Chapter 44, “Maintaining Library
Databases and Documents,” on page 407.
A librarian has the ability to alter the Author field of documents. Therefore, a librarian can replace
the previous user’s GroupWise user name with his or her own user name. In doing so, the
librarian becomes the new author of the document. This can also be done as a mass operation
for multiple documents with varying GroupWise user names in the Author field. For more
information, see Section 64.4.2, “Adding and Training Librarians,” on page 524.
Client 537
538 GroupWise 2014 R2 Administration Guide
67 Using GroupWise Client Custom
67
Installation Options
You can customize the installation of the GroupWise client for use with ZENworks or other software
distribution system by using GWTuner. Along with customizing the installation, you can extract the
GroupWise client software to deploy to your workstations or to make it available on your web server.
Languages You can install the GroupWise client in one or more languages. For a list of available
languages, seeSection 7.1, “GroupWise User Languages,” on page 85.
Internet Browser By default, GroupWise is enabled to be the default email application when you click a
Mail Integration mailto link in your web browser or use the Mail command in your web browser.
Program Folder By default, the Setup program creates a Novell\GroupWise program folder. You can use
a different folder as needed.
Add GroupWise to By default, the Setup program creates a GroupWise icon on your Windows desktop.
the Desktop
Add GroupWise to By default, the Setup program adds a GroupWise icon to the Windows Quick Launch bar
Quick Launch
Add Notify to the By default, the Setup program does not add Notify to the Windows Startup folder. If you
Startup Folder want to start Notify automatically, but if you do not want to use the Windows Startup folder,
you can click Tools > Options > Environment, then select Launch Notify at startup in the
GroupWise client to have GroupWise automatically start Notify.
Add Icons to the By default, the Setup program adds GroupWise to the Windows Start Menu and includes
Start Menu a list of GroupWise tasks that can be performed directly from the Start Menu.
1 On the Windows server, ensure that you have write access to the following folder in the
downloaded GroupWise 2014 software image:
\groupwise_software_image\admin\utility\tools
NOTE: The GWTuner utility is available in both the Windows and Linux GroupWise 2014
software image.
\groupwise_software_image\admin\utility\tools\gwtuner.exe
3 When prompted for the client directory, browse to the following folder, then click Next.
4 In the Install path field, specify where you want to install the GroupWise client software on users’
workstations.
The typical location varies depending on the architecture of the workstations:
If all of the workstations in your environment have the same architecture, specify the appropriate
location for that architecture. If you have both 32-bit and 64-bit workstations in your environment,
you can specify either path in GWTuner. In ZENworks Configuration Management, you will
create a separate launch action for each architecture.
5 Select GroupWise client installation options as needed.
For information about the GroupWise client installation options, see “Using GroupWise Client
Custom Installation Options” in the GroupWise 2014 R2 Administration Guide.
6 Select all the languages that you want to install on users’ workstations, then click Next.
7 Select the default GroupWise client startup language, then click Finish.
8 Click OK to exit GWTuner.
The following MST transform file is created in the downloaded GroupWise 2014 software image:
\groupwise_software_image\client\win32\groupwise.mst
For instructions on installing the GroupWise client using ZENworks, see “Using ZENworks
Configuration Management to Distribute the GroupWise Client” on page 596.
Linux: /opt/novell/groupwise/agents/data/client/setup/win32
Windows: c:\Program Files\Novell\GroupWise Server\agents\data\client\setup\win32
If you do not want to run the GroupWise Installation Wizard to gain access to these files, you can
manually extract the files.
1 Create a temporary folder on the web server for storing the GroupWise software.
For example, you could name the folder gw2014software.
2 On Linux, use the following procedure to extract the GroupWise software files:
2a Change to the folder that you created in Step 1.
2b Know the path to the novell-groupwise-server.64bit.rpm file in the downloaded
GroupWise 2014 R2 software image:
/groupwise_software_image/server/linux/x86_64/
/gw2014software/agents/data/client/setup/win32
3 On Windows, use the following procedure to extract the GroupWise software files.
3a Change to the following folder in the downloaded GroupWise 2014 R2 software image:
\groupwise_software_image\server\win64
3b Use the following command to extract the GroupWise Server component into the folder that
you created in Step 1.
This creates the folder where the GroupWise client software is located:
\gw2014software\Novell\GroupWise Server\agents\data\client\setup\win32
Accounts
As a GroupWise administrator, you might need to help users with the various GroupWise modes and
account types.
Most GroupWise features are available in all three GroupWise modes, with a few exceptions:
Users should use this mode if they do not have a lot of network traffic, or if they use several different
workstations and do not want to download a local mailbox to each one.
Users should use this mode if they have enough disk space on the local drive to store the Caching
mailbox. If users run Caching mode and Remote mode on the same computer, the same local
mailbox can be used to minimize disk space usage.
By backing up their Caching mailboxes, users can protect items that might be deleted if the system is
set up to automatically clean up items, or if the GroupWise administrator runs an Expire and Reduce.
Several users can set up their Caching mailboxes on a single shared computer.
Windows 8: c:\Users\user_name\AppData\Roaming\Novell\GroupWise
Windows 7: c:\Users\user_name\AppData\Roaming\Novell\GroupWise
As a GroupWise administrator, you have some control over what modes GroupWise client users
choose to use and how Caching mode worked:
1 In the GroupWise Admin console, browse to and click the name of the post office.
2 Click Client Options.
3 Click the Environment tab, then click Client Access.
4 Select or deselect Allow Use of Caching Mode.
5 Select or deselect Force Use of Caching Mode.
Specify the number of days before Caching mode is enforced. This allows the user to continue
using Online mode until the grace period has passed. The grace period begins the first time the
user connects to the POA. The setting applies per user per workstation.
The Force Caching Mode setting is not enforced on a workstation that does not have enough
disk space for a Caching mailbox. The amount of disk space that is required is the size of the
mailbox + 20 MB + 25% of the mailbox size.
The Force Caching Mode setting is also not enforced when a user connects from a shared
Windows workstation or terminal server if you configure these workstations to be excluded. You
do this by setting a registry key on the Windows workstation. The registry key is in
HKEY_LOCAL_MACHINE. Under Software\\Novell\\GroupWise\\Client, add a dword
value named No Local Store with a value of 1. This prevents the user from creating a Caching or
Remote mailbox by using the GroupWise client menus. However, the user can still create a
Caching or Remote mailbox by using the startup options /pc, /pr, or /ps.
If you force Caching mode and then restrict Online mailbox size so that users have items in their
Caching mailboxes that are no longer available online, you need to ensure that users understand
about doing backups. See “Backing Up Email” in the GroupWise 2014 R2 Client User Guide.
Users can also specify to download the GroupWise Address Book (and any rules they have created)
on a regular basis.
If you configure the POA to generate the GroupWise Address Book regularly, Caching mode users
always have a current copy to download.
You can choose the time when you want the generation to take place.
If you want to generate the GroupWise Address Book for download more than once a day, you can
delete the existing wprof50.db file from the \wpcsout\ofs subdirectory of each post office. A new
downloadable GroupWise Address Book is generated automatically for users on each post office.
As a GroupWise administrator, you can allow or disallow the use of Remote mode for client users.
1 In the GroupWise Admin console, browse to and click the name of the post office.
2 Click Client Options.
3 Click the Environment tab, then click Client Access.
4 Select or deselect Allow Use of Remote Mode.
The following topics explain the capabilities users have when they are allowed to use Remote mode.
Hit the Road creates a TCP/IP connection to the Online mailbox. GroupWise can then use this
connection to connect to the GroupWise system when running in Remote mode. For example, a
network connection lets users of docked laptops run GroupWise in Remote mode and connect to the
GroupWise system through the network connection rather than a modem connection.
If Hit the Road created the user’s Remote mailbox on a removable storage device, the user needs to
install the Remote mailbox on the computer that will be running in Remote mode.
1 Insert the removable storage device containing the Remote mailbox into the computer.
2 Run setup.exe on the removable storage device.
Follow the prompts. The Setup program creates a Remote mailbox and copies the required files
to the computer’s hard drive.
Remote Properties
Users can change the way Remote mode is set up, including the connection, time zone, signature,
and so on, by using Account Options on the Accounts menu. Remote is listed as an account.
By default, if an item is deleted from the Remote mailbox, the item is deleted from the Online mailbox
the next time a connection is made. Deletion options in Remote Properties can be changed so that an
item deleted from the Remote mailbox stays in the Online mailbox or vice versa.
Method Description
When All Updates Are Received Disconnects after requests are sent and after all responses to the
requests are received (or disconnects automatically when the
time allowed by the gateway has expired).
Do Not Wait for Responses Disconnects immediately after requests are sent and pending
responses are received. Pending responses are responses to
other requests that are waiting to be downloaded to you.
7 Click OK.
8 Select the connection you want, then click Select.
9 Select the location you are connecting from in the Connecting From box. If none are listed, use
the Default Location option.
If you need to create a new location, click the Connect From button. This is useful for laptop
users who are calling into the GroupWise system from different geographic locations.
10 Click OK, then click Close.
Method Description
When All Updates Are Received Disconnects after requests are sent and after all responses to
the requests are received (or disconnects automatically when
the time allowed by the gateway has expired).
Do Not Wait for Responses Disconnects immediately after requests are sent and pending
responses are received. Pending responses are responses to
other requests that are waiting to be downloaded to you.
8 Click OK.
9 Select the connection you want, then click Select.
10 Select the location you are connecting from in the Connecting From box. If none are listed, use
the Default Location option.
If you need to create a new location, click the Connect From button. This is useful for laptop
users who are calling into the GroupWise system from different geographic locations.
11 Click OK, then click Close.
To enable POP3, IMAP4, and NNTP account access for clients in Online mode for an entire post
office:
1 In the GroupWise Admin console, browse to and click the name of the post office.
2 Click Client Options.
3 Click the Environment tab, then click General.
4 Select Allow Use of News (NNTP) Accounts in the Online Mailbox.
5 Select Allow Use of POP and IMAP Accounts in the Online Mailbox.
6 Click OK.
Client Options
The GroupWise client includes options (preferences) that can be set by individual users. As a
GroupWise administrator, you can determine the default settings for many of the options. If you do not
want users to change the default settings that you have established, you can lock the settings.
If you set a lock on an option at a higher level, the higher level then overrides the lower-level setting.
When you change an option and lock it, the new setting is immediately put into effect.
1 In the GroupWise Admin console, browse to and click a domain, post office, or user.
2 Click Client Options.
The client options table in this section summarizes all client options and provides links to descriptions
of the options. For more detailed instructions, see Chapter 69, “Setting Defaults for the GroupWise
Client Options,” on page 549.
Environment
Send
Calendar
Security
Integrations
Documents
If you set a lock on an option at a higher level, the higher level then overrides the lower-level setting.
When you change an option and lock it, the new setting is immediately put into effect.
1 In the GroupWise Admin console, browse to and click the name of a domain if you want to
modify the settings for all users in the domain.
or
Browse to and click the name of a post office object if you want to modify the settings for all
users in the post office.
or
Refresh Interval
Determines how often the GroupWise client message lists are updated to reflect new message
status. The default is 1 minute.
By default, this option is disabled. If you enable this option, an Accounts menu is added to the
GroupWise client, allowing users to add POP and IMAP accounts to GroupWise, set account
properties, and send and retrieve items from their POP and IMAP accounts. In addition, users are
allowed to upload POP and IMAP items from the Remote mailbox to the Online mailbox.
Enable Auto-Saving
By default, email addresses of those to whom users send messages are automatically added to their
Frequent Contacts address books. Users can also choose to automatically save email addresses of
those from whom they receive messages. Deselect this option if you do not want email addresses to
be automatically saved.
Save Addresses of Items That Are Received: Select this option to allow users to
automatically add external and internal email address from items that they receive to their
Frequent Contacts address books. If desired, you can restrict users to collecting email
addresses only if the user’s name or email address appears in the To field, as opposed to the CC
or BC fields.
Save Addresses of Items That Are Sent: Select this option to allow users to automatically add
external and internal email address from items that they send to their Frequent Contacts address
books.
Schemes
There are four available schemes that determine how the GroupWise Client appears.
Default: The Default scheme displays the Nav Bar, Full Folder List, the Main Menu, and two
columns with panels.
GroupWise Classic: The GroupWise Classic scheme has the Folder List, Main Toolbar, and
Item List, displaying in the old GroupWise 6.5 colors.
Simplified: The Simplified scheme has the Nav Bar, Simple Folder List, and two columns with
panels.
Scheme Settings
You can also control individual appearance settings for the GroupWise client.
Display Main Menu: Displays the menu at the top of the window in the GroupWise client.
Display Nav Bar: Displays the Nav Bar at the top of the window in the GroupWise client.
Display Main Toolbar: Displays the toolbar underneath the Nav bar in the GroupWise client.
GroupWise Color Scheme: Overrides any operating system color schemes for the GroupWise
client.
Display Folder List: Displays the Folder List on the left side of the window in the GroupWise
client. You can select from a Favorites Folder List, Simple Folder List, Full Folder List, or Long
Folder List. For descriptions, see “Customizing Individual GroupWise Appearance Settings” in
the GroupWise 2014 R2 Client User Guide.
Display QuickViewer: Displays the QuickViewer in the GroupWise client. You can select to
display the QuickViewer on the right side or at the bottom.
Client Licensing
GroupWise offers two types of mailbox licenses: Full Licenses and Limited Licenses.
You can use this option to specify the type of mailbox license that you want applied to users’
mailboxes. This enables you to support the type of GroupWise mailbox licenses you purchase. For
example, if you only purchased Limited License mailboxes for users on a specific post office, you can
mark all mailboxes on that post office as being Limited License mailboxes.
For licensing details, see Section 13.4, “Auditing Mailbox License Usage in the Post Office,” on
page 127.
Allow Use of Remote Mode: Select this option to enable users to log in with GroupWise in
Remote mode. With Remote mode, the GroupWise client uses a Remote mailbox on the user’s
local drive. The user must initiate a connection (modem, direct, or TCP/IP) to send or retrieve
items from the GroupWise system. For more information about Remote mode, see
Section 68.1.3, “Remote Mode,” on page 545. By default, this option is enabled.
Allow Use of Caching Mode: Select this option to enable users to log in with GroupWise in
Caching mode. With Caching mode, the GroupWise client uses a Caching mailbox on the user’s
local drive (this can be the same mailbox as the Remote mailbox). The GroupWise client
periodically initiates a connection with the GroupWise system to send and receive items. For
more information about Caching mode, see Section 68.1.2, “Caching Mode,” on page 543. By
default, this option is enabled.
Manual Delete and Archive: Select this option to have mail and phone messages deleted or
archived only when users manually do it. This is the default setting.
Auto-Delete After: Select this option to have GroupWise automatically delete mail and phone
messages that are older than the specified number of days. If you use this option, you should
notify users so they know they must archive items they want to save.
Auto-Archive After: Select this option to have GroupWise archive mail and phone messages
that are older than the specified number of days. Users must have an archive directory specified
in order for items to be archived. See “Environment Options: File Location” on page 561 for
information about setting a default archive directory location.
Manual Delete and Archive: Select this option to have appointments, tasks, and notes deleted
or archived only when users manually do it. This is the default setting.
Auto-Delete After: Select this option to have GroupWise automatically delete appointments,
tasks, or notes that are older than the specified number of days. If you use this option, you
should notify users so they know they must archive items they want to save.
Auto-Archive After: Select this option to have GroupWise automatically archive appointments,
tasks, and notes older than the specified number of days. Users must have an archive directory
specified in order for items to be archived. See “Environment Options: File Location” on
page 561 for information about setting a default archive directory location.
Empty Trash
Deleted items are moved to the Trash folder. They can be retrieved from the Trash until it is emptied.
Items in the Trash still take up disk space. Select from the following settings to determine how the
Trash folder is emptied:
Manual: Select this option to require the user to manually empty the Trash. This is the default
setting.
Automatic: Select this option to have GroupWise automatically empty items from the trash after
they have been in it for the specified number of days.
Maintenance
Do Not Purge Items Until They Are Backed Up: Select this option to prevent items that have
not been backed up from being removed from the Trash. This option is disabled by default.
Select the Prompt Before Purging option (available only if Do Not Purge Items Until They Are
Backed Up is disabled) to prompt the user to confirm the purging of any files that have not been
backed up.
Archive Directory
Select the directory to be used for archiving items for the GroupWise client. Each user must have his
or her own archive directory. You could choose a location similar to the default location for users’
Caching mailbox, for example:
Windows 8: c:\Users\user_name\AppData\Roaming\Novell\GroupWise\archive
Windows 7: c:\Users\user_name\AppData\Roaming\Novell\GroupWise\archive
It could also be a personal user directory on a network server. If you select a network drive, ensure
that users have the necessary rights to access the location.
IMPORTANT: If you want to use a network location, do not specify the same directory for users in
more than one post office. The names of users’ individual archive directories are based on their FIDs.
FIDs are unique within a post office, but users in different post offices can have the same FID.
When this setting is disabled, the client does not display any Junk Mail Handling menus or dialog
boxes, and the POA does not perform any junk mail handling for the user. When this setting is
enabled, the client displays Junk Mail Handling menus and dialog boxes, and the POA performs junk
mail handling if the block and junk lists are also enabled.
When this setting is enabled or disabled and not locked, the user’s initial setting to use the Junk List is
enabled or disabled. Users can change the setting. When the setting is enabled and locked, a user's
Enable Junk List setting is enabled and cannot be disabled. When the setting is disabled and locked,
the Junk List is unavailable to the user. Client menu options and dialog boxes involving the Junk List
are not displayed.
When this setting is enabled or disabled and not locked, the user’s initial setting to use personal
address books is enabled or disabled. Users can change the setting. When the setting is enabled and
locked, a user's Enable Junk Mail Using Personal Address Book setting is enabled and cannot be
disabled. When the setting is disabled and locked, this option is unavailable to the user.
Auto-Delete After
Select this option and specify the number of days after which you want junked items to be
automatically deleted from users' mailboxes. The default is 14 days.
When this setting is enabled or disabled and not locked, the user's initial setting to delete junked
items is enabled or disabled. Users can change the setting. When the setting is enabled and locked,
a user’s Automatically Delete Items setting is enabled and cannot be disabled. When the setting is
disabled and locked, this option is unavailable to the user.
When this setting is enabled or disabled and not locked, the user’s initial setting to use the Block List
is enabled or disabled. Users can change the setting. When the setting is enabled and locked, a
user's Block List setting is enabled and cannot be disabled. When the setting is disabled and locked,
blocking is unavailable to the user. Client menu options and dialog boxes involving the Block List are
not displayed.
View Options
Choose from the following settings to determine what occurs when the user performs an action that
closes the current view.
Read Next after Accept, Decline, or Delete: Select this option to have the next available
received item automatically open after the user accepts, declines, or deletes an appointment,
task, or note. By default, this option is enabled.
Open New View after Send: Select this option to have a new send view open after a user
sends a message. By default, this option is disabled.
Disable HTML View: Select this option to turn off the ability to view or compose messages in
HTML View.
Plain Text (Default): Select this option to allow users to read items in plain text.
HTML: Select this option to allow users to read items in HTML.
Plain Text (Default): Select this option to allow users to compose items in plain text.
HTML: Select this option to allow users to compose items in HTML.
For complete usage instructions, see Section 70.1, “Using Client Auto-Update to Distribute the
GroupWise Client Software,” on page 587.
The GroupWise client software can be installed along with the POA software for each post office, and
the Client Auto-Update functionality is triggered at the post office level. If necessary, you can enable
and configure it at the domain level so that it functions consistently across all post offices in each
domain.
Auto-Update URL
(Optional) Specify the URL where the GroupWise client software can be distributed by your web
server. You can use the same URL for multiple domains and post offices, or you can specify different
URLs for different domains and post offices.
If Client Auto-Update is enabled but no URL is specified, the POA distributes the GroupWise client
software to users’ workstations. This can be convenient in a small GroupWise system, because no
web server setup is required. However, it places an additional load on the POA whenever client
software updates are called for.
Force Update
Automatically updates users’ GroupWise client software without prompting users.
Users can still click Cancel to cancel the update. However, they cannot run the GroupWise client to
access their mailboxes until they update the software
You can customize the Client Auto-Update settings at the user level to tailor the Client Auto-Update
experience for individual users. For example, you might not want to force the software update for
selected users, or perhaps you want to allow more grace logins for selected users.
Classification
Select the default for the security classification label at the top of the message box. The
classifications do not provide any encryption or additional security. They are meant to alert the
recipient to the relative sensitivity of the item. The options are Normal, Proprietary, Confidential,
Secret, Top Secret, and For Your Eyes Only. The default is Normal.
MIME Encoding
Select the default MIME encoding for all outgoing messages. The MIME encoding is used to specify
the character set that is used for all outgoing messages. This is important when your company has
users who are using different character sets. For more information, see Section 7.4, “MIME
Encoding,” on page 88.
For this option to work, the Enable Delivery Confirmation option must be enabled in the GroupWise
client (Tools > Options > Send Options > Mail > Enable Delivery Confirmation). This is the default
setting.
Notify Recipients
Select this option to have recipients notified when they receive an item, if they are using GroupWise
Notify. By default, this option is enabled.
Expiration Date
Select this option to have unopened messages expire after the specified number of days. By default,
this option is disabled.
Delay Delivery
Select this option to delay the delivery of messages for the specified number of days. For example, if
you specify 3 days, a message is not delivered until 3 days after the day it is sent. Messages are
delivered at 12:01 a.m. of the appropriate day. By default, this option is disabled.
Priority
Select High, Standard, or Low as the default item priority. Priority determines which post office
directory an item is placed in. This, in turn, determines how quickly items are delivered. High priority
items are queued ahead of normal or low priority items.
Reply Requested
Select the Reply Requested option to have items always include a reply request. By default, this
option is disabled. If you enable the option, select whether the recipient is asked to reply when it is
convenient or within a specific number of days.
Delivered: Select this option to track delivered status only. The user can open the Properties
window of the message to view the status.
Delivered and Opened (Default): Select this option to track delivered and opened status only.
The user can open the Properties window of the sent message to view the status.
All Information: Select this option to track all status information (delivered, opened, deleted,
emptied). The user can open the Properties window of the message to view the status.
Auto-Delete Sent Item: Select this option to automatically delete messages from the user’s
Mailbox after all the recipients have deleted the messages and emptied them from the Trash.
Return Notification
In addition to status tracking information, the user can receive notification when a message is opened
or deleted. Choose from the following notification options:
Delivered: Select this option to track delivered status only. The user can open the Properties
window of the appointment to view the status.
Delivered and Opened: Select this option to track delivered and opened status only. The user
can open the Properties window of the appointment to view the status.
All Information (Default): Select this option to track all status information (delivered, opened,
deleted, emptied). The user can open the Properties window of the appointment to view the
status.
Return Notification
In addition to status tracking information, the user can receive notification when an appointment is
opened, accepted, or deleted. Choose from the following notification options:
Delivered: Select this option to track delivered status only. The user can open the Properties
window of the task to view the status.
Delivered and Opened: Select this option to track delivered and opened status only. The user
can open the Properties window of the task to view the status.
All Information (Default): Select this option to track all status information (delivered, opened,
deleted, emptied). The user can open the Properties window of the task to view the status.
Return Notification
In addition to status tracking information, the user can receive notification when a task is opened,
accepted, completed, or deleted. Choose from the following notification options:
Delivered: Select this option to track delivered status only. The user can open the Properties
window of the note to view the status.
Return Notification
In addition to status tracking information, the user can receive notification when a note is opened or
deleted. Choose from the following notification options:
User Limits
Select this option if you want to impose limits on the size of users’ mailboxes or the size of messages
they can send. By default, this option is disabled, so there are no size limits. If you enable it, you can
modify the following options:
Mailbox Size Limit: Specify the maximum amount of post office disk space available to each
user for storing message and attachment files. The setting uses logical disk space because
attachments are shared by all recipient users on the same post office. Messages in shared
folders are counted as disk space only for the owner of the shared folder. If you do not want to
limit the mailbox size, set the value to zero (0). The physical maximum size limit for a mailbox is
4 TB.
If users meet or exceed their mailbox size limits, they cannot send items until their mailboxes are
under the size limit. Users can reduce the size of their mailboxes by deleting or archiving items.
If you select Default Global Signature, the default signature that is used by the GWIA is applied. If
you select None, then no signature is applied.
NOTE: All Global Signature options pertain only to the GroupWise client.
Conceal Subject
Select this option to conceal the item’s subject so the notification that appears on the recipient’s
screen does not include the subject. The subject of the item is also concealed in the recipient’s
mailbox and the sender’s Sent Items folder. It is visible only when the item is being read.
Do Not Allow Use of S/MIME: Select this option to disable S/MIME functionality. This disables
the Encrypt and Digitally Sign buttons (and other related S/MIME functionality) in the
GroupWise client. By default, this option is enabled. When it is enabled, you can modify the rest
of the options in the dialog box.
URL for Certificate Download: Specify the Internet address of your preferred certification
authority. If it is not otherwise changed in this field, the GroupWise client accesses http://
www.novell.com/groupwise/certified.html, which lists several common certification authorities.
Sign Digitally: Select this option to enable users to add a digital signature to their outgoing
messages. Recipients of a digitally signed item who have S/MIME-enabled email products are
able to verify that the item is actually from the sender. This setting is not a useful security
measure unless you lock it as the default.
Encrypt for Recipients: Select this option to enable users to encrypt an outgoing item so they
can ensure that the intended recipients who have an S/MIME-enabled email product are the only
individuals who can read the item. This setting is not a useful security measure unless you lock it
as the default.
If you enable the Encrypt for Recipients options, you can set the encryption algorithm and key
size. The available algorithm methods (RC2, RC4, DES, 3DES) are trusted algorithms that
encrypt or transform data to mask the original content. The key size sets the default size (in bits)
of the encryption key that is used with the algorithm you select. These settings are not useful
security measures unless you lock them.
First of Week: Select the day of the week that you want to display as the first day on the
calendar.
Highlight Day: Select any days you want highlighted, such as weekends and holidays.
Show Week Number: Select this option to display the week number (1 through 52) at the
beginning of the calendar week.
Appointment Options
Select from the following options to determine how appointments are handled:
Include Myself on New Appointments: Select this option to have the sender automatically
included in the appointment’s To: list. This option is enabled by default.
Display Appointment Length As: When creating an appointment, the sender must specify the
appointment’s length. You can use this option to determine whether the sender enters a duration
for the appointment or an end time for the appointment. Select the Duration setting to have
appointments display a Duration field that the sender must fill in (for example, 30 minutes, 1
Alarm Options
Users can set appointment alarms so that they are notified prior to an appointment time. Select from
the following options to determine the default settings for an alarms:
Set Alarm When Accepted: Select this option to have an alarm automatically set when the user
accepts an appointment. By default, this option is enabled.
Default Alarm Time: Select the number of minutes before an appointment to notify the user.
The default is 5 minutes.
Work Schedule
The work schedule determines the user’s normal work days and hours. In the calendar and during
busy searches, any days or hours outside of the work schedule are represented by gray squares (Out
of Office). Users can still be scheduled for appointments during non-work hours.
Work Days: Select the work days. The start time and end time are applied to each work day.
Start Time: Select the daily start time. The default is 8:00 a.m.
End Time: Select the daily end time. The default is 5:00 p.m.
Work Schedule
Select the days to search. By default, the typical work days (Monday through Friday) are selected.
For background information about passwords, see Chapter 89, “GroupWise Passwords,” on
page 691.
IMPORTANT: Novell Single Sign-on must be installed on the user’s workstation in order for this
option to take effect.
http://vibe_server:port_number/ssf/ws/TeamingServiceV1
Message retention is configurable only by administrators, not by GroupWise users. The Retention
options do not display in the GroupWise client.
After a user’s mailbox is enabled for message retention, the user cannot perform any action (purging,
archiving, etc.) that removes messages from the mailbox until the messages have been copied to
another storage location by a trusted application that has been designed to provide the Message
Retention Service.
http://www.brainstorminc.com/videos/gw2014
Specify the URL for a custom training and tutorial web page.
For information about libraries and document management, see Part XIII, “Libraries and Documents,”
on page 515.
1 To reset the client options of a single user, browse to and click the name of the user, then click
Maintenance.
or
To reset the client options for multiple users:
1a Browse to and click the name of the post office where the users are located.
1b Click Maintenance > Mailbox/Library Maintenance.
1c Select Maintenance on Users/Resources in This Post Office.
1d Type a comma-separated list of user names.
2 In the Actions list, select Reset Client Options, then click OK.
Section 70.1, “Using Client Auto-Update to Distribute the GroupWise Client Software,” on
page 587
Section 70.2, “Using ZENworks Configuration Management to Distribute the GroupWise Client,”
on page 596
For information about client licensing requirements, see Section 13.4, “Auditing Mailbox License
Usage in the Post Office,” on page 127.
When you run the GroupWise Installation Wizard to install the GroupWise Server component, the
GroupWise client software is installed in the following locations:
Linux: /opt/novell/groupwise/agents/data/client/setup/win32
Windows: c:\Program Files\Novell\GroupWise Server\agents\data\client\setup\win32
Client Auto-Update is disabled by default. For a small GroupWise system, you can have the POA
distribute the GroupWise client software. However, this represents an extra load on the POA
whenever the GroupWise client software is updated and needs to be downloaded to users’
workstations. A more robust solution is to configure your web server to distribute the GroupWise
client software.
1 In the GroupWise Admin console, browse to and click the name of a domain, post office, or user.
2 Click Client Options > Client Auto-Update.
3 Select Enable Client Auto-Update.
1 Browse to and click the name of a post office where Client Auto-Update is enabled, either for all
users in the post office or for individual users.
2 Click More > Client Auto-Update.
3 (Conditional) If you want to verify the update settings, click Modify Settings to go to the Post
Office object Client Auto-Update tab, then return to the Client Auto-Update dialog box.
4 Click Trigger Update.
5 Skip to Section 70.1.4, “Understanding the User’s Client Auto-Update Experience,” on page 596.
“Setting Up the GroupWise Client Software on Your Web Server” on page 588
“Enabling Client Auto-Update for Your Web Server” on page 590
“Triggering a Client Update from Your Web Server” on page 591
1 Create a folder in the document root folder of your web server for the GroupWise client software
files used by Client Auto-Update, for example:
Apache on Linux
1 Open the Apache configuration file (/etc/apache2/httpd.conf) in a text editor.
2 Search for the following section:
<Directory />
3 After the default Directory section, add the following section for the GroupWise client software:
<Directory /srv/www/htdocs/gwclient/14.0.0>
Options Indexes
</Directory>
4 On the Directory line, specify the client software directory that you created in Step 1 in “Setting
Up the GroupWise Client Software on Your Web Server” on page 588.
5 Save the file.
6 Restart Apache:
rcapache2 restart
7 Test the availability of the client software on the web server by displaying the following URL and
verifying the contents of the win32 directory:
http://web_server_address/gwclient/14.0.0
8 Continue with “Enabling Client Auto-Update for Your Web Server” on page 590.
http://web_server_address/gwclient
1 In the GroupWise Admin console, browse to and click the name of a domain, post office, or user.
2 Click Client Options > Client Auto-Update.
3 Select Enable Client Auto-Update.
4 Specify the URL where you have made the GroupWise client software available on your web
server.
5 (Conditional) As needed, modify the update settings.
6 Click OK.
7 (Conditional) As needed, modify the setup configuration file (setup.cfg) used by the GroupWise
Client Setup Wizard to customize the client installation process before you trigger the
installation.
The default configuration is often appropriate. To explore what customizations are available, see
Section 70.1.3, “Working with the Setup.cfg File,” on page 591.
8 Continue with Triggering a Client Update from Your Web Server.
1 Browse to and click the name of a post office where Client Auto-Update is enabled, either for all
users in the post office or for individual users.
2 Click More > Client Auto-Update.
3 (Conditional) If you want to verify the update settings, click Modify Settings to go to the Post
Office object Client Auto-Update tab, then return to the Client Auto-Update dialog box.
4 Click Trigger Update.
5 Skip to “Understanding the User’s Client Auto-Update Experience” on page 596.
downloaded_groupwise_software_image\client
The setup.cfg file is an ASCII text file that supports extended ASCII characters. The file contains the
responses that are normally provided by the user during the installation of the GroupWise client. For
example, the path for the GroupWise client software and the folder for the GroupWise client desktop
icon are specified in the setup.cfg file. In addition, information can be added to the setup.cfg to
add predefined LDAP directory service accounts to the GroupWise Address Book in the GroupWise
client during installation.
When the GroupWise Client Setup Wizard (setup.exe) is executed, it looks in the same folder for a
setup.cfg file. If none is found, the installation proceeds, prompting the user for the needed
information. If the setup.cfg file is found, the GroupWise Client Setup Wizard proceeds, using the
information specified in the setup.cfg file. Depending on the entries in the setup.cfg file, the user
might be prompted to provide information during the installation.
The setup.cfg file is divided into the following sections. In the setup.cfg file, each section head
must be enclosed in brackets [ ] as shown.
Version= This entry must match the version being installed; otherwise, the Setup
Wizard does not use setup.cfg. The default is 14.0.
Path= This entry specifies the path where you want the GroupWise client to be
installed. The default path for GroupWise 2014 R2 is c:\Program
Files\Novell\Groupwise.
Folder= This entry creates and installs the GroupWise client shortcuts to the
specified folder in the user’s Start menu. The default folder is Novell
GroupWise.
OutlookFirewallException This entry specifies whether Outlook should be added to the Windows
Firewall exceptions list. The default is Yes (add Outlook to the
exceptions list).
GWMailTo= This entry specifies whether the GroupWise client should be the default
email application in your web browser. The default is Yes, so that the
Internet Browser Mail Integration is installed along with the GroupWise
client.
IPAddress= This optional entry specifies the IP address for the GroupWise client to
always use. Use this setting to set the IP address per post office when
using multiple post offices.
IPPort= This optional entry specifies the IP port for the GroupWise client to
always use.
DefaultIPAddress= This optional entry specifies the default IP address for the GroupWise
client to use the first time it is started. This should be an IP address that
everyone on the system has access to.
DefaultIPPort= This optional entry specifies the default IP port for the GroupWise client
to use the first time it is started.
StopService= Use this entry when you are running integrated third-party software along
with the GroupWise client, and that software might be locking some
GroupWise client DLLs. If client DLLs are locked, the client software
cannot be installed. Specify the service for the client Setup Wizard to
stop before it installs the client software. Use the name as it appears in
the list provided by Control Panel > Administrative Tools > Services.
You can stop only one service before installing the client software.
ShowDialogs= Specify No to hide dialog boxes during the installation. Specify Yes to
show the dialog boxes. The default is Yes.
NOTE: This option does not suppress the language selection dialog box
that appears when you install the GroupWise client from the
multilanguage software image. For more information, see “Unwanted
Language Selection Dialog Box” in the GroupWise 2014 Readme.
ShowProgress= Specify Yes to show the progress indicator during the installation. Specify
No to hide the progress indicator during installation. The default is Yes.
ShowFinish= Specify Yes to display the Finish dialog box after the installation. Specify
No to hide this dialog box. The default is Yes.
[Startup]
Notify= If you specify Yes, the Setup Wizard places Notify in the Windows Startup
folder to be started automatically when the computer starts. The default is
No.
[GWCheck]
This section installs and enables GroupWise Check (GWCheck). GWCheck is a tool that performs
maintenance and repair tasks on users’ mailboxes to keep GroupWise operating efficiently. It is
essentially a standalone version of the Mailbox/Library Maintenance feature available in the
GroupWise Admin console. GWCheck checks and repairs GroupWise user, message, library, and
resource databases independent from the Admin console. In addition to checking post office, user,
and library databases, it also checks Caching, Remote, and archive databases.
InstallGWCheck= Specify Yes to install GWCheck files to the workstation. Specify No to not install
GWCheck. The default is Yes.
GWCheckEnabled= Specify Yes to install the files to the same folder as the GroupWise client,
which results in the Repair Mailbox option being enabled under the Tools
menu in the GroupWise client. Specify No to install the files in a GWCheck
subfolder below the client folder, which disables the Repair Mailbox option
until the files are manually copied into the GroupWise folder. The default is No.
[Languages]
The default language is set to English, and all other languages are set to No, meaning they are not
installed. See the setup.cfg file for a listing of the different languages.
\groupwise_software_image\client
EnableLangDlg=No
NOTE: If you retained the default folder names, rather than creating the /gwclient/14.0.0
client software folder that these instructions use, the result of this step is a /client/setup/
win32/win32 folder.
7b Copy the customized setup.cfg file to the new win32 subfolder on the web server.
The Client Setup Wizard looks for the setup.cfg file in a win32 subfolder relative to the
location of the setupip.fil file.
7c (Conditional) If you customized the setup.cfg file in Step 6, copy it to the client software
folder on the web server.
7d Test the availability of the files in the gwclient folder on the web server by displaying the
following URL and verifying the contents of the win32 subfolder:
http://web_server_address/gwclient
When the setupip.fil file and setupip.en file are extracted on users’ workstations prior
to the client software installation, the files in the win32 subfolder on the web server replace
the standard files.
8 (Optional) Continue with Adding LDAP Directory Service Accounts to the Setup Configuration
File.
You can add predefined LDAP directory service accounts to the Address Book by adding information
to setup.cfg. This information can be added even after the initial installation. After the accounts are
added, this information does not need to be removed from setup.cfg. During subsequent
installations, GroupWise adds any new accounts listed but does not update or duplicate existing
LDAP accounts.
The user can also choose to add LDAP directory service accounts after the GroupWise client is
installed. For more information, see “Using the LDAP Address Book” in the GroupWise 2014 R2
Client User Guide.
To add an LDAP address book during installation, add the following lines to the setup.cfg file,
providing information that is specific to the LDAP account:
[LDAP Account 1]
Description=Ldap Server1
Server=ldap.server1.com
Port=389
SearchRoot=c=us
Login=TRUE
[LDAP Account 2]
Description=Ldap Server2
Server=ldap.server2.com
Port=389
SearchRoot=0=widget, c=us
Login=FALSE
Parameter Description
Description= The name that displays in the list of LDAP directory services in the Address Book.
Port= The LDAP directory service’s port number. The number is usually 389.
SearchRoot= The base or root of the LDAP directory service where the user searches for names. For
example, the base could be a country, organization, or other type of grouping. This is not
required for all LDAP directory services. If a search root is required, the LDAP directory
service provides the information.
Login= TRUE means users are prompted for a user name and password when they use that LDAP
directory service.
If you are forcing the user to update, the following message appears:
If you are not forcing the user to update, the following message appears:
Multiple Languages
The GroupWise client software is available in a broad range of languages to meet the needs of users
in many countries.
By installing the GroupWise client software in their language of choice, users can begin using
GroupWise in that language immediately. However, some language-related details of GroupWise
functionality are not taken care of by the client software running on users’ workstations. Those aspect
are affected by the language in use by the POA running for the post office to which users belong. The
POA returns certain text in the language in which it is running, not the language in use on users’
workstations.
The status information (Delivered, Opened, an so on) displayed in the Properties page of items
The text of return notification mail receipts (if the user has enabled this type of notification)
The sort order in the GroupWise Address Book
In some circumstances, these issues can be resolved by grouping users who speak the same
language into the same post office and then installing the POA in the same language that the users
are using. For more information, see Chapter 12, “Creating a New Post Office,” on page 119.
At present, the POA is available in fewer languages than the GroupWise client, so this solution helps
only those client users who are somewhat familiar with the language in use by the POA. For more
information, see Chapter 7, “Multilingual GroupWise Systems,” on page 85.
The following tools can assist you in analyzing and correcting GroupWise client problems.
The report is saved in \temp\grpwise.rpt. The \temp directory used is the one specified by the
TMP environment variable, or if not defined by TMP, the one specified by the TEMP environment
variable. If neither environment variable is defined, GroupWise uses the current the windows
directory.
Each time an exception or crash occurs, a new report is appended to grpwise.rpt. If the file reaches
100 KB, the oldest reports (at the beginning of the file) are deleted.
The GroupWise Exception Report contains information such as the date and time the report was
generated, the exception code, fault address, date of grpwise.exe, computer and user name where
the exception occurred, hardware and operating system information, process modules, raw stack
dumps, and call stacks.
GroupWise Check can be installed with the GroupWise client (unless you have specified in
setup.cfg that it not be installed), and is available by clicking Tools > Repair Mailbox in the client in
Caching and Remote modes after you complete the following:
1 Locate the directory named gwcheck. This is a subdirectory of the directory where the client is
installed (usually c:\Program Files\Novell\GroupWise).
2 Locate grpwise.exe. It is usually in c:\Program Files\Novell\GroupWise.
3 Copy all the files in gwcheck to the directory where grpwise.exe is located.
You can now run GroupWise Check in Caching and Remote mode. The GroupWise Check dialog box
is titled GroupWise Mailbox Maintenance. You can also use Ctrl+Shift when accessing a Caching or
Remote mailbox to run GroupWise Check before opening the mailbox.
Client
The GroupWise client has optional startup options that you can use when you start the program.
Some of these startup options are for your convenience, while others are necessary to run
GroupWise on your particular hardware. For a complete listing, see “Startup Options” in the
GroupWise 2014 R2 Client User Guide.
For a complete list of port numbers used by the WebAccess Application, see Section A.7,
“WebAccess Application Port Numbers,” on page 735.
For detailed Linux-specific WebAccess Application information, see Appendix C, “Linux Basics for
GroupWise Administration,” on page 741.
WebAccess 603
604 GroupWise 2014 R2 Administration Guide
74 Accessing Your GroupWise Mailbox in a
74
Web-Based Environment
GroupWise WebAccess consists of the WebAccess Application, which is installed to your web server,
and the WebAccess user interface, where users work in their GroupWise mailboxes. WebAccess
offers three different web-based environments for users. All three environments are made available
when you install the WebAccess Application.
http://web_server_address/gw/webacc
Replace web_server_address with the IP address or DNS hostname of your web server. If the
web server uses SSL, use https rather than http.
2 Type your GroupWise user ID in the User Name box and your GroupWise mailbox password in
the Password box.
3 (Optional) If you are in a secure location, select This is a private computer.
On a private computer in a secure location, the default WebAccess timeout is 480 minutes (8
hours), which is convenient for day-long use. On a public or shared computer, the default timeout
is 20 minutes, which protects your personal data. You can change these settings. For more
information, see Section 76.2.1, “Setting the Timeout Interval for Inactive WebAccess Sessions,”
on page 615.
4 (Optional) To change the WebAccess interface language, click Options, then select the
language you want from the Language drop-down list.
5 Click Login to display the GroupWise WebAccess main window.
6 Click Help for more information about using GroupWise WebAccess.
http://web_server_address/gw/webacc
Replace web_server_address with the IP address or DNS hostname of your web server. If the
web server uses SSL, use https rather than http. The WebAccess Application detects that it is
communicating with a tablet and provides the WebAccess Mobile interface.
or
(Conditional) If you have a tablet that is not yet supported, but you want to see how well the
mobile interface works on your device, use the following URL:
http://web_server_address/gw/webacc?User.interface=mobile
2 Type your GroupWise user name in the User Name box and your GroupWise mailbox password
in the Password box.
http://web_server_address/gw/webacc
Replace web_server_address with the IP address or DNS hostname of your web server. If the
web server uses SSL, use https rather than http. The WebAccess Application detects that it is
communicating with a mobile device such as a cell phone and provides the WebAccess basic
interface.
2 Enter your GroupWise user ID and GroupWise mailbox ID.
The appearance of the WebAccess basic interface varies, depending on the size of the screen
where it is displayed.
3 For more information about using WebAccess on your mobile device, see the WebAccess Basic
Interface Quick Start (http://www.novell.com/documentation/groupwise2014/
gw2014_qs_webaccbasic/data/gw2014_qs_webaccbasic.html).
4 Follow the instructions in your mobile device’s documentation to add this URL to your Favorites
or Bookmarks so you don’t need to type the URL every time you log in on your mobile device.
As an alternative to this limited interface, you can synchronize GroupWise data to your mobile device
using the GroupWise Mobility Service. For more information, see the GroupWise Mobility Service
Documentation website (http://www.novell.com/documentation/groupwisemobility2).
Installation
If your GroupWise system is relatively small (one domain and a few post offices) and all post offices
reside in the same location, installing the GroupWise WebAccess Application on one web server
might meet your needs. However, if your GroupWise system is large, spans multiple locations, or
requires failover support, you might need to install the WebAccess Application on multiple web
servers to meet the reliability, performance, and availability needs of your GroupWise WebAccess
users.
The following sections provide information about the various configurations you can implement and
instructions to help you create the configuration you choose.
For information about installing the initial instance of the WebAccess Application, see “Setting Up
GroupWise WebAccess” in the GroupWise 2014 R2 Installation Guide.
Post
WebAccess Office
WebAccess
Secure Application Agent
Login
Document
Web Browser Internet Web Server Viewer
Agent
Configuring the WebAccess Application for multiple POAs provides more stable access. Three POAs
are recommended, but there is no limit to the number of POAs that you can configure the WebAccess
Application to communicate with. When a POA stops responding, the WebAccess Application
contacts the next POA in the list to provide uninterrupted access (except, of course, for the users
whose mailboxes are in the post office where the POA is down).
For setup instructions, see Section 76.1.2, “Configuring the WebAccess Application with Multiple
POAs for Fault Tolerance,” on page 612.
Configuring the WebAccess Application for multiple DVAs provides more reliable document
conversion. Three DVAs are recommended, but there is no limit to the number of DVAs that you can
configure the WebAccess Application to communicate with. When a DVA stops responding, the
WebAccess Application contacts the next DVA in the list to provide uninterrupted document
conversion.
WebAccess Document
WebAccess
Application Viewer Agent
Secure
Login
Post OfficeAgent
Web Document
Web Browser Internet Viewer Agent
Server
For setup instructions, see Section 76.1.3, “Configuring WebAccess Application with Multiple DVAs
for Attachment Viewing,” on page 613.
WebAccess WebAccess
Application
Web Browser
WebAccess WebAccess
Application
Improving WebAccess reliability: One WebAccess Application might provide sufficient access
and performance, but you want to protect against downtime that would occur if the WebAccess
Application became unavailable because of web server failure or some other reason. Installing
more than one WebAccess Application enables you to set up failover support to make your
system more reliable.
Improving WebAccess performance: The WebAccess Application is designed to be close to
GroupWise post offices. It requires SOAP access to the POAs. For best performance, you
should ensure that the WebAccess Application is on the same local area network as the POA
that it communicates with. For example, in most cases you do not want a WebAccess
Application in Los Angeles communicating with a POA in London.
Improving WebAccess availability: Adding additional WebAccess Applications enables
GroupWise WebAccess users on an intranet to access GroupWise through an internal web
server and WebAccess users on the Internet to access GroupWise through an exposed web
server.
Improving web server performance: Adding additional WebAccess Applications increases
web server performance by balancing the workload among several web servers, especially if you
are using the web server for other purposes in addition to GroupWise WebAccess.
When you have multiple WebAccess Applications for your GroupWise system, its recommended to
have a Layer 4 Switch in front of the two or more WebAccess Application web servers. Select a
friendly hostname such as gwmail.yourcompanyname.com that users can type in their web browsers.
Set up a DNS redirection so that gwmail.yourcompanyname.com automatically redirects to https://
gwmail.yourcompanyname.com/gw/webacc, and when the WebAccess Application on that main web
server communicates with a POA, it then redirects the WebAccess user to the proper post office and
POA for mailbox access.
For WebAccess system requirements, see “GroupWise WebAccess System Requirements” in the
GroupWise 2014 R2 Installation Guide. For detailed instructions about installing and setting up the
WebAccess Application for the first time, see “Setting Up GroupWise WebAccess” in the GroupWise
2014 R2 Installation Guide.
The default configuration of WebAccess is adequate for users to start accessing their GroupWise
mailboxes from web browsers. You can customize the WebAccess configuration to meet the specific
needs of you and your GroupWise users by editing the webacc.cfg file.
Section 76.2, “Managing User Access,” on Setting the Timeout Interval for Inactive WebAccess Sessions
page 615 Customizing Auto-Save Functionality
Preventing Users from Changing Their GroupWise
Passwords in WebAccess
Helping Users Who Forget Their GroupWise Passwords
Controlling WebAccess Usage
Section 76.3, “Customizing User Customizing the WebAccess User Interface with Your
Functionality,” on page 619 Company Logo
Controlling the WebAccess New Item Notification Sound
Customizing Auto-Refresh Functionality
Controlling Viewable Attachment Types
Controlling Viewable Attachment Size
Customizing the Default Calendar View
Customizing the Default List Functionality
Enabling an LDAP Address Book
During installation, the WebAccess Application is set up with a default configuration in the
webacc.cfg file. You can modify the WebAccess Application configuration to meet the needs of your
WebAccess users and your administrator preferences.
Linux: /var/opt/novell/groupwise/webaccess
Windows: c:\Novell\GroupWise\webaccess
You can use any ASCII text edit that you prefer to edit the webacc.cfg file.
IMPORTANT: We strongly recommend that you do not modify any settings that are not documented
in the following sections.
If the POA that the WebAccess Application is communicating with becomes unavailable, the
WebAccess Application contacts the next POA in the list, providing uninterrupted service for
WebAccess users.
Provider.SOAP.1.ip=
Provider.SOAP.1.port=
These lines identify the POA that you specified during installation.
3 Copy and paste those two lines, replace 1 with 2, then specify the IP address and SOAP port of
a another POA, for example:
Provider.SOAP.2.ip=172.16.5.18
Provider.SOAP.2.port=7191
4 Repeat Step 3, incrementing the number, and providing the IP addresses and SOAP ports for
additional POAs as needed.
5 Save the webacc.cfg file.
6 Skip to Section 76.1.7, “Putting WebAccess Configuration Changes into Effect,” on page 614.
If the DVA that the WebAccess Application is communicating with becomes unavailable, the
WebAccess Application contacts the next DVA in the list, providing uninterrupted document
conversion for viewing attachments in HTML format.
Provider.DVA.1.ip=
Provider.DVA.1.port=
These lines identify the DVA that you specified during installation.
3 Copy and paste those two lines, replace 1 with 2, then specify the IP address and SOAP port of
a another DVA, for example:
Provider.DVA.2.ip=172.17.5.18
Provider.DVA.2.port=8301
4 Repeat Step 3, incrementing the number, and providing the IP addresses and SOAP ports for
additional DVAs as needed.
5 Save the webacc.cfg file.
6 Skip to Section 76.1.7, “Putting WebAccess Configuration Changes into Effect,” on page 614.
Other WebAccess Application security features, such as session cookies, provide excellent security,
even without the IP address checking. If you have a large number of mobile WebAccess users, you
can turn off the web browser IP address confirmation to make WebAccess more stable for these
mobile users.
Security.UseClientIP.enable=
#Cookie.domain=.novell.com
Config.Update.check=10
3 Change 10 to the number of minutes you want the WebAccess Application to wait before
checking for changes to its configuration file.
4 Save the webacc.cfg file.
Windows: 1. At the Windows server, click Start > Administrative Tools > Services.
2. Right-click Tomcat 6, then click Restart.
The timeout interval depends on whether the user selects This is a public or shared computer or
This is a private computer in the Login window. On a private computer in a secure location, the
default WebAccess timeout is 480 minutes (8 hours), which is convenient for day-long use. On a
public or shared computer, the default timeout is 20 minutes, which protects your personal data. The
timeout interval provides security for GroupWise WebAccess users who forget to log out. It also helps
the performance of the web server by freeing the resources dedicated to that user’s connection.
Security.timeout=20
3 Change the default of 20 to the number of minutes that you prefer for the public/shared timeout
interval.
4 To change the timeout interval for use on a private computer, search to find the following line:
Security.Private.timeout=480
5 Change the default of 480 to the number of minutes that you prefer for the private timeout
interval.
6 Save the webacc.cfg file.
7 Skip to Section 76.1.7, “Putting WebAccess Configuration Changes into Effect,” on page 614.
The timeout interval applies to all users who log in through the web server where the WebAccess
Application is running. You cannot set individual user timeout intervals. However, if you have multiple
web servers, you can set different timeout intervals for the web servers by completing the above
steps for each server’s WebAccess Application.
Increasing the settings so that users’ work is saved less frequently reduces the load on the web
server but increases the amount of work that users could potentially lose. Reducing the settings so
that users’ work is saved more frequently increases the load on the web server, but reduces the
amount of work that users could potentially lose.
User.Access.security
/var/opt/novell/tomcat5/webapps/gw/webaccess/yyyymmddnnnn/images/helpdesk.htm
The variable yyyymmddnnnn represents the year, month, day, and build number of the WebAccess
software that you have installed.
You can use your HTML editor of choice to customize the contents of this file. For example, you might
want to include the email address of the local GroupWise administrator who handles password
issues, or perhaps the URL of your company’s Help Desk web page.
As an alternative, you can configure the WebAccess Application to display any URL of your choosing.
#Helpdesk.url=http://www.novell.com/helpdesk.html
You can control access based on the domain or post office where the user’s mailbox is located. You
can control access for related users based on groups, and you can control access for individual
users.
Access control is established through the gwac.xml file, located in the same folder with the
webacc.cfg file.
<!-- To allow access to all EXCEPT a few, use this technique. -->
<!--
<gwac access="prevent">
<domain name="domain1" />
<postOffice name="po2.domain2" />
<user name="jdoe.po3.domain3" />
<distributionList name="helpdesk.po4.domain4" />
<resource name="confroom.po4.domain4" />
</gwac>
-->
<!-- To prevent access to all EXCEPT a few, use this technique -->
<!--
<gwac access="allow">
<domain name="domain1" />
<postOffice name="po2.domain2" />
<user name="jdoe.po3.domain3" />
<distributionList name="helpdesk.po4.domain4" />
<resource name="confroom.po4.domain4" />
</gwac>
-->
You can use any ASCII text editor that you prefer to edit the gwac.xml file.
<domain name="provo5"/>
<domain name="provo6"/>
4 (Optional) Create one or more lines to prevent users in one or more post offices from using
WebAccess, for example:
<postOffice name="interns.provo1"/>
<postOffice name="temps.provo1"/>
<distributionList name="webaccessdenied.admin.provo1"/>
<user name="sjones.interns.provo1"/>
<user name="gbock.interns.provo1"/>
7 (Conditional) If you want to prevent most users and allow only specified users, use a <gwac
access="allow"> line instead of a <gwac access="prevent"> line.
8 Save the gwac.xml file.
9 Skip to Section 76.1.7, “Putting WebAccess Configuration Changes into Effect,” on page 614.
1 Ensure that you have company logo that approximately match the size and shape of the Novell
logo that you are replacing.
2 Copy the logo image file to a location on your web server where it can be displayed by specifying
a URL.
The logo image file must reside on the same server with the WebAccess Application that you are
configuring. You can put it in a subfolder under your web server’s document root folder.
3 Open the customization.cfg file in a text editor.
4 Specify the logo image to use in the WebAccess Login window:
4a Uncomment the following line:
Company.Logo.Login.src=
4b Replace the sample URL with the URL for the company logo file for the Login window.
4c Replace the sample mouse-over text with the mouse-over text for your company logo.
5 Save the customization.cfg file.
6 Skip to Section 76.1.7, “Putting WebAccess Configuration Changes into Effect,” on page 614.
1 Copy the desired sound file to a location on your web server where it can be played by specifying
a URL.
The sound file must reside on the same server with the WebAccess Application that you are
configuring. You can put it in a subfolder under your web server’s document root folder.
2 Open the webacc.cfg file in a text editor.
3 Search to find the following line:
Notification.NewMail.sound=
4 Replace the default URL with the URL for the desired sound file.
5 Save the webacc.cfg file.
6 Skip to Section 76.1.7, “Putting WebAccess Configuration Changes into Effect,” on page 614.
Notification.enabled=true
By default, WebAccess uses 5 threads for polling, with a maximum of 20 threads allowed, and polling
takes place on port 8500.
By default, WebAccess starts actively polling for updates from the POA after 10 minutes of inactivity,
and keeps checking every minute until it is contacted by the POA
#SOAP.Poll.port=8500
#SOAP.Poll.Threads.default=5
#SOAP.Poll.Threads.max=20
Poll.Idle.timeout=10
Poll.Idle.interval=1
To add to the list of file types that WebAccess users cannot view in native file format:
Document.View.excludeDocExtensions=
3 Add file extensions to the list, separating each file extension with a comma.
Do not include periods on the file extensions or spaces between the file extensions.
4 Save the webacc.cfg file.
5 Skip to Section 76.1.7, “Putting WebAccess Configuration Changes into Effect,” on page 614.
For allowable attachment types that do not exceed the size limit, the View link is available in
WebAccess. For allowable attachment types that exceed the size limit, the View link is not available,
and users must save the large attachments in order to view them.
Document.View.maxSize=
The default you select affects how the Calendar displays for GroupWise users to access their
mailboxes through this instance of the WebAccess Application.
User.Calendar.defaultView=
Some web-based interfaces use check boxes for multiple selection. This interface option is also
available for GroupWise WebAccess.
List.Checkboxes.show=
Mobile.Interface.UnreadItem.showMessagePreview=true
User.Access.LDAP=false
The WebAccess Application can be monitored in your web browser. You can also use log files to
monitor the WebAccess Application.
http://server_address/gw/webacc?action=Admin.Open
Linux: /var/opt/novell/groupwise/webaccess/logs
Windows: c:\novell\groupwise\webaccess\logs
Log.path=C:/User/jdoe/logs
When logging is turned on, the WebAccess Application creates a new log file each day and each time
it is restarted (as part of the web server startup). Therefore, you find multiple log files in the log file
folder. The first four characters represent the date (mmdd). The next three characters identify the
WebAccess Application (waa). A three-digit extension allows for multiple log files created on the same
day. For example, a log file named 0518waa.001 indicates that it is a WebAccess Application log file,
created on May 18.
For convenience, you can view WebAccess Application log files in the WebAccess Application
console.
For a complete list of port numbers used by the Calendar Publishing Host, see Section A.8,
“Calendar Publishing Host Port Numbers,” on page 736.
Host
For Calendar Publishing (CalPub) Host system requirements, see “GroupWise Calendar Publishing
Host System Requirements” in the GroupWise 2014 R2 Installation Guide. For detailed instructions
about installing and setting up the GroupWise CalPub Host for the first time, see “Setting Up the
GroupWise Calendar Publishing Host” in the GroupWise 2014 R2 Installation Guide.
The default configuration of the CalPub Host is adequate to begin publishing calendars. As your
GroupWise system grows and evolves, you might need to modify its configuration to meet the
changing needs of the users it services.
Section 78.1, “Using the CalPub Admin Changing Post Office Settings
Console,” on page 629 Adjusting Log Settings
Configuring Authentication
Customizing the Calendar Publishing Host Logo
Section 78.2, “Using the calhost.cfg File,” on Setting the Published Calendar Auto-Refresh Interval
page 631 Setting the Default Published Calendar View
Configuring an External POA IP Address
Providing an SSL Trusted Root Certificate
http://network_address/gwcal/admin
2 Provide the administrator user and password for the CalPub Host Admin console, then click
Login.
For more information, see “Setting Up Calendar Publishing Administration” in the GroupWise
2014 R2 Installation Guide
Linux: /var/opt/novell/groupwise/calhost/logs
Windows: c:\novell\groupwise\calhost\logs
Windows: c:\novell\tomcat6\logs
The CalPub Host checks its configuration file (calhost.cfg) every 10 minutes. Therefore, it can take
up to 10 minutes for the changes you made in the CalPub Admin console to take effect in the
functionality of the CalPub Host.
Windows: 1. At the Windows server, click Start > Administrative Tools > Services.
2. Right-click Tomcat 6, then click Restart.
Windows: c:\Novell\GroupWise\calhost
You can use any ASCII text edit that you prefer to edit the calhost.cfg file.
IMPORTANT: It is strongly recommended that you do not modify any settings that are not
documented in the following sections.
Templates.Content.Refresh=
3 Replace 0 (zero) with the number of seconds after which you want the CalPub Host to refresh
the content of published calendars.
4 Save the calhost.cfg file, then exit the text editor.
5 Skip to Section 78.1.6, “Putting the CalPub Host Configuration Changes into Effect,” on
page 631.
User.Calendar.defaultView=
po.1.Is.IPAddress.External=
po.1.IPAddress=ip_address
po.1.port=calendar_publishing_port
4a Replace ip_address with the external IP address used by the POAs in your GroupWise
system.
4b Replace calendar_publishing_port with the calendar publishing port number for the
POAs.
The default calendar publishing port number is 80.
5 Save the calhost.cfg file, then exit the text editor.
6 Skip to Section 78.1.6, “Putting the CalPub Host Configuration Changes into Effect,” on
page 631.
Admin.Ldap.trustedRoot=
By monitoring the CalPub Host and the POAs that it communicates with, you can determine whether
its current configuration is meeting the needs of your GroupWise users.
http://network_address:port
Replace network_address with the IP address or DNS hostname of a POA that is configured for
calendar publishing and port is the POA HTTP port. The default HTTP port is 7181.
2 Click Configuration.
3 Under the Internet Protocol Agent Settings heading, view the configuration information about
the POA’s connection to the CalPub Host.
4 Click Calendar Publishing Post Office List to view all POAs in your GroupWise system that have
been configured for calendar publishing.
5 On the Configuration page, click Calendar Free/Busy Publishing User List to view all users who
have published free/busy information or personal calendars.
A list of all CalPub Hosts in your GroupWise system is also provided.
Linux: /var/opt/novell/groupwise/calhost/logs
Windows: c:\novell\groupwise\calhost\logs
Logging is enabled by default. You can increase the amount of information that is logged. For more
information, see Section 78.1.3, “Adjusting Log Settings,” on page 630.
List
The CalPub Host creates a browse list of published calendars. However, by default, no calendars are
displayed in the calendar browse list. To create a corporate calendar browse list, you need to grant
rights to specific users, or at the post office or domain level, in order to publish to the corporate
calendar browse list.
Host
As circumstances change over time, you might need to change the configuration of your CalPub Host
to better meet the needs of your GroupWise users.
If you have users in remote locations, and response time is slow for these users, you can add a
CalPub Host to a POA that is closer to these remote users.
NOTE: Sections referenced in the following steps are found in the GroupWise 2014 R2 Installation
Guide.
For a complete list of port numbers used by Monitor, see Section A.9, “Monitor Agent Port Number,”
on page 736 and Section A.10, “Monitor Application Port Numbers,” on page 736.
For detailed Linux-specific Monitor information, see Appendix C, “Linux Basics for GroupWise
Administration,” on page 741.
Monitor 641
642 GroupWise 2014 R2 Administration Guide
82 Understanding the Monitor Agent
82
Consoles
The Monitor Agent offers three different consoles where you can check the status of your GroupWise
agents.
For a comparison of the capabilities of the three consoles, see Chapter 86, “Comparing the Monitor
Consoles,” on page 677.
For detailed instructions about installing and starting the GroupWise Monitor Agent for the first time,
see “Setting Up GroupWise Monitor” in the GroupWise 2014 R2 Installation Guide.
All agent configuration tasks can be performed at the Monitor Agent server console, but some reports
are not available.
http://web_server_address:8200
To create the Monitor Agent console display in your web browser, your web browser communicates
directly with the Monitor Agent to obtain agent status information. You must be behind your firewall to
use the Monitor Agent console. The Linux Monitor Agent does not have a server console.
The Monitor Agent console is divided into the Agent Groups window on the left and the Agent Status
window on the right. You can use the Agents Groups window to create and manage agent groups in
the same way that you can at the Windows Monitor Agent server console.
Several Monitor features are available at the Monitor Agent console that are not available at the
Windows Monitor Agent server console or the Monitor web console. These are summarized in
Chapter 86, “Comparing the Monitor Consoles,” on page 677.
http://web_server_address/gwmon/gwmonitor
To create the Monitor web console display, your web server communicates with the Monitor
Application (a component of your web server), which then communicates with the Monitor Agent to
obtain agent status information. This enables the Monitor web console to be available outside your
firewall, while the Monitor Agent console can be used only inside your firewall.
The Monitor web console does not include some features that are available at the Windows Monitor
Agent server console and the Monitor Agent console. These are summarized in Chapter 86,
“Comparing the Monitor Consoles,” on page 677.
For GroupWise Monitor system requirements, see “GroupWise Monitor System Requirements” in the
GroupWise 2014 R2 Installation Guide. For detailed instructions about installing and starting the
GroupWise Monitor Agent for the first time, see “Setting Up GroupWise WebAccess” in the
GroupWise 2014 R2 Installation Guide.
The default configuration of the GroupWise Monitor Agent is adequate to begin monitoring existing
GroupWise agents (Post Office Agents, Message Transfer Agents, and Internet Agents). You can
also customize the configuration to meet your specific monitoring needs.
http://localhost:8200
Agents in the Filtered Out list are not monitored and do not appear in the Monitor Agent console. To
start monitoring a filtered-out agent, move it back to the Monitored list.
If the new server is part of your local GroupWise system, you can simply restart the Monitor Agent
and it picks up all new agents in your system.
If the new servers are part of your local GroupWise system, you can simply restart the Monitor Agent
and it picks up all new agents in your system.
Agent groups are displayed on the left side of the Monitor Agent console. When you select an agent
group, the monitored agents in the group and their status information are listed on the right side of the
Monitor Agent console.
You can create additional groups and subgroups as needed to make monitoring similar agents easier.
You might want to create agent groups based on geographical areas, on administrative
responsibilities, or on agent configuration similarities. The number of agents in the group is displayed
to the right of the group name in the Agent Groups window.
In addition, by creating agent groups, you can provide configuration settings for monitoring just once
for all agents in each group, rather than providing them individually for each agent in your GroupWise
system.
NOTE: On Linux, you perform these tasks at the Monitor Agent console or Monitor console, using
steps similar to those provided in this section.
To rename an agent group, click Rename, type the new name, select the group to rename, then
click Rename.
To move an agent group, click Move, select the group to move, select the new location, then click
Move.
To delete an agent group, click Delete, select the group to delete, then click Delete.
You can establish default configuration settings for all agents by setting them on the root agent group
that is named the same as your GroupWise system. By default, those default settings are inherited by
each subgroup that you create thereafter. Groups, subgroups, and individual agents can be
configured differently from the configuration provided at the higher level.
1 In the Monitor Agent console, click Preferences > Setup, then scroll down to the HTTP Settings
section.
2 Modify the HTTP settings as needed:
HTTP Refresh Rate: Specify the number of seconds after which the Monitor Agent sends
updated information to the Monitor console. The default is 300 seconds (5 minutes).
Poll Cycle: Specify the number of seconds after which the Monitor Agent polls all monitored
GroupWise agents for updated information.
By default, the Monitor Agent starts 20 threads to poll monitored agents. You can use the
--pollthreads startup switch to adjust the number of threads. For more information, see
Chapter 87, “Using Monitor Agent Startup Switches,” on page 679.
New Browser: Select this option to open a new web browser window whenever you display an
agent console. This enables you to view the Monitor Agent console and an agent console at the
same time, or to view two agent consoles at the same time for comparison.
3 Click Submit to put the new HTTP settings into effect.
1 In the Monitor Agent console, click Preferences > Setup, then scroll down to the SNMP Settings
section.
2 In the SNMP box, modify the SNMP settings as needed:
SNMP Community Strings: Provide a comma-delimited list of community strings required to
access the servers where GroupWise agents run.
Time-out: Specify the number of seconds the Monitor Agent should wait for a response from
servers where GroupWise agents run.
Number of Retries: Specify how often the Monitor Agent should try to contact the servers where
GroupWise agents run.
Force polling through SNMP: Select this option to use SNMP polling instead of the default of
XML polling when contacting servers where agents in the group run.
3 Click Submit to put the new SNMP settings into effect.
4 Ensure that the GroupWise agents you want to monitor using SNMP are enabled for SNMP.
See Section 17.5.1, “Setting Up SNMP Services for the POA,” on page 168, Section 24.5.1,
“Setting Up SNMP Services for the MTA,” on page 240, and Section 32.5.1, “Setting Up SNMP
Services for the GWIA,” on page 314. The same instructions can be followed for all versions of
the GroupWise agents.
1 In the Monitor Agent console, select one or more agents, click Preferences > Setup, then scroll
down to the HTTP Settings section.
2 Increase or decrease the poll cycle as needed, then click Submit.
1 In the Monitor Agent console, select one or more agents, then click Preferences > Setup to
display the Notify settings.
2 Specify one or more comma delimited email and/or pager addresses to notify.
3 Specify the Internet domain name of your GroupWise system.
4 If the mail system to which email notification is being sent performs reverse DNS lookups,
specify the IP address or hostname of a server to relay the notification messages through.
The Monitor Agent should relay email notifications through a server that has a published DNS
address.
5 Select the events to trigger email notification messages.
Agent Down
Server Down
Threshold Exceeded
State Returns to Normal
If you want to be notified of more specific states, see Section 83.5.2, “Customizing Notification
Thresholds,” on page 650.
6 Select the amount of time that you want to elapse before repeat email notifications are sent.
7 To monitor the Monitor Agent and assure it is functioning normally, specify the number of minutes
between Monitor Agent email notification messages.
8 Click Submit to save the email notification settings.
Icon State
Unknown
Normal
Informational
Marginal
Warning
Minor
Major
Critical
or
Create a new state:
7a In the Monitor Agent console, click Preferences > States.
7b Type a name for the new state.
7c Select a severity level.
7d Provide instructions about how to handle the new state.
7e Click Close to save the new state.
8 Click OK to create the new threshold.
1 In the Monitor Agent console, select one or more agents, then click Preferences > Setup to
display the Notify settings.
NOTE: The Use Parent Notification Options and Apply Options to Subgroups options are not
available on Linux.
Use the --httpmonuser and --httpmonpassword startup switches when you start the Monitor Agent.
For more information, see Chapter 87, “Using Monitor Agent Startup Switches,” on page 679.
Event log files record error messages, status messages, and other types of event-related
messages.
History log files record dumps of all MIB values gathered during each poll cycle.
Log files can provide a wealth of information for resolving problems with Monitor Agent functioning or
agent monitoring.
Linux: /var/log/novell/groupwise/gwmon
NOTE: On some versions of Windows Server, the ProgramData folder is not visible by default.
To display it in File Explorer, click View, then select Hidden items.
Maximum Event Log File Age: Specify the number of days you want Monitor Agent event log
files to remain on disk before being automatically deleted. The default event log file age is 30
days.
Maximum Event Log Disk Space: Specify the maximum amount of disk space for all Monitor
event log files. When the specified disk space is used, the Monitor Agent overwrites existing
Monitor Agent event log files, starting with the oldest. The default is 102400 KB (100 MB) of disk
space for all Monitor Agent event log files.
Maximum History Log File Age: Specify the number of days you want Monitor Agent history
log files to remain on disk before being automatically deleted. The default history log file age is
30 days.
Maximum History Log Disk Space: Specify the maximum amount of disk space for all Monitor
history log files. When the specified disk space is used, the Monitor Agent overwrites existing
Monitor Agent history log files, starting with the oldest. The default is 102400 KB (100 MB) of
disk space for all Monitor Agent history log files.
3 Click Submit to put the new log settings into effect.
4 To view existing event logs, click Log > Event Log.
5 To view existing history log files, click Log > History Log.
Linux: /var/opt/novell/groupwise/monitor
Windows: c:\Novell\GroupWise\monitor
Provider.GWMP.Agent.Http.level=basic
3 Change it to:
Provider.GWMP.Agent.Http.level=full
Without proxy service support enabled, the Monitor web console communicates directly with the
GroupWise agent after it gets a GroupWise agent’s address from the Monitor Agent. This process,
however, does not work when communicating through a firewall.
With proxy service support enabled, all communication is routed through the Monitor Agent and
Monitor Application (on the web server). As long as the web server can be accessed through the
firewall, the Monitor web console can receive information about all GroupWise agents that the
Monitor Agent knows about.
During installation, the GroupWise Monitor Application is set up with a default configuration. However,
you can use the information in the following sections to optimize the Monitor Application
configuration.
Linux: /var/opt/novell/groupwise/monitor
Windows: c:\Novell\GroupWise\monitor
You can use any ASCII text edit that you prefer to edit the gwmonitor.cfg file.
IMPORTANT: We strongly recommended that you do not modify any settings that are not
documented in the following sections.
The timeout interval provides security for GroupWise administrators who forget to log out of the
Monitor web console. It also helps the performance of the web server by freeing the resources
dedicated to that administrator’s connection.
Security.timeout=20
3 Change the default of 20 to the number of minutes that you prefer for the timeout interval.
4 Save the gwmonitor.cfg file.
5 Skip to Section 84.6, “Putting the Monitor Configuration Changes into Effect,” on page 658.
Other Monitor Application security features such as session cookies provide excellent security, even
without the IP address checking. If you have multiple GroupWise administrators who check
GroupWise status from various locations, you can turn off the need for confirming the web browser IP
address to make the Monitor web consoles more stable for these mobile administrators.
Security.UseClientIP.enable=
#Cookie.domain=.novell.com
Linux: /var/opt/novell/groupwise/monitor/logs
Windows: c:\Novell\GroupWise\GWMonitor\logs
You can change the location where the Monitor Application creates its log files. See Configuring
Monitor Application Log Settings.
When logging is turned on, the Monitor Application creates a new log file each day and each time it is
restarted (as part of the web server startup). Therefore, you find multiple log files in the log file folder.
The first four characters represent the date (mmdd). The next three characters identify the Monitor
Application (mon). A three-digit extension allows for multiple log files created on the same day. For
example, a log file named 0518mon.001 indicates that it is a Monitor Application log file, created on
May 18.
Use your text editor of choice to view the Monitor Application log files.
Config.Update.check=10
3 Change 10 to the number of minutes Monitor Application to wait before checking for changes to
its configuration file
4 Save the gwmonitor.cfg file.
Windows: 1. At the Windows server, click Start > Administrative Tools > Services.
2. Right-click Tomcat 6, then click Restart.
For a review of the three Monitor Agent consoles, see Chapter 82, “Understanding the Monitor Agent
Consoles,” on page 643. This section focuses on using the Monitor Agent console, although many of
these tasks can also be performed at the Monitor web console.
After you create agent groups, the agents in each group are displayed when you select a group. For
more information, see Section 83.2, “Creating and Managing Agent Groups,” on page 647.
You can display many types of monitoring information in the Monitor Agent console.
1 In the Monitor Agent console, click the root agent group, then click Show Subgroup Agents.
1 In the Monitor Agent console, click the domain or post office link in the Name column.
For information about the agent consoles, see the GroupWise agent documentation:
http://web_server_address/gwmon/gwmonitor
where web_server_address represents the IP address or hostname of the web server where the
Monitor Application is installed.
Global features of the Monitor web console are available on icon buttons at the top of the main
Monitor page.
Problem
Link Trace
Link Configuration
Global Options
States
Search
Click the Problem icon button to display only agents in your GroupWise system whose status is other
than Normal. Click the name of your GroupWise system to display all agents again.
Click the status of an agent in the Status column to display agent status details.
Click an agent group in the left panel to display all monitored agents in the group. Click the Problem
button above the agent list to display only those agents whose status is other than Normal in the
agent group. The Problem button then changes to Monitored. Click the Monitored button to include
working agents as well as problem agents in the list.
Click Refresh to update the agent status information. To modify the default poll cycle, see
Section 83.4, “Configuring Polling of Monitored Agents,” on page 649.
To see what specific tasks can be performed at the Monitor console, see Chapter 86, “Comparing the
Monitor Consoles,” on page 677.
If a message fails to arrive at its destination, this report can help you pinpoint its current location, so
you can resolve the problem and get messages flowing smoothly again.
Linux: /tmp/gwmon/monwork/maps
NOTE: On some versions of Windows Server, the ProgramData folder is not visible by default.
To display it in File Explorer, click View, then select Hidden items.
You can change the location using the --monwork startup switch. For more information, see
Chapter 87, “Using Monitor Agent Startup Switches,” on page 679
3 Continue with Setting Up Maps.
Setting Up Maps
1 In the Monitor Agent console, click Map.
Initially, no maps are available in Monitor.
2 Click New to display all the maps that are available in the maps folder.
The file name of each map is displayed below it.
Setting Up Regions
If some of your maps are subsets of other maps, you can set up a large-scale map so that it links to
one or more smaller-scale maps. For example, a map of the world could have a region for each
continent or country, or a map of a city or country could have a region for each office where
GroupWise domains or post offices are located.
7 To define more regions on the large-scale map, click Done to return to the available maps, then
repeat Step 3 through Step 6 for each region.
or
To place agents on a map, continue with Adding Agents to a Map.
5 In the Line Color drop-down list, select the color to use to show links between locations.
Ensure that you select a color that shows up well on the particular map. Lines display on the map
only when links between locations are down.
6 Click Done when the map includes all the needed GroupWise agents in their respective
locations.
7 Continue with Using an Image Map to Monitor Agents.
At this point, the Monitor Agent checks the status of each agent on the map. Any agent that is
down or that has a status of Major, Critical, or Warning displays in red on the map. Agents with a
lower status do not display on the map. If a link between agents is down, a line displays between
the agents.
In order for the information to be available to generate a user traffic report, you must configure the
MTA to perform message logging. See Section 22.1.4, “Enabling MTA Message Logging,” on
page 228.
In order for the information to be available to generate a link traffic report, you must configure the
MTA to perform message logging. See Section 22.1.4, “Enabling MTA Message Logging,” on
page 228.
In order for the information to be available to generate a message tracking report, you must configure
the MTAs in your GroupWise system to perform message logging. See Section 22.1.4, “Enabling
MTA Message Logging,” on page 228.
In addition, you need to determine the message ID of the message. Have the sender check the Sent
Item Advanced Properties of the message in the GroupWise client. The Message Id field displays the
message ID of the message; for example, 3AD5EDEB.31D : 3 : 12763.
In order run a performance testing report, you must configure the Monitor Agent for performance
testing. See Section 85.4, “Measuring Agent Performance,” on page 669.
In order to run a Gateway Accounting report, you must configure the Monitor Agent to collect gateway
accounting data. See Section 85.5, “Collecting Gateway Accounting Data,” on page 671.
The Monitor Agent uses an external GroupWise domain as part of measuring GroupWise agent
performance. By creating an external domain, you enable the Monitor Agent to approximate the
round-trip time for email messages to travel to recipients and for status messages to travel back to
senders. If you also plan to set up gateway accounting reports, you can use this same external
domain for collecting accounting data. For more information, see Section 85.5, “Collecting Gateway
Accounting Data,” on page 671.
1 In the GroupWise Admin console, connect to a domain where the MTA will communicate with the
Monitor Agent for the purpose of measuring agent performance.
2 Create an external GroupWise domain.
For background information about external GroupWise domains, see Section 11.2, “Using an
External Domain to Connect GroupWise Systems,” on page 112.
3 Name the external domain to reflect its role in your GroupWise system.
For example, you could name it ExternalMonitorDomain.
4 Continue with Configuring the Link for the External Monitor Domain.
1 In the GroupWise Admin console, click System > Link Configuration to open the Link
Configuration tool.
2 In the Source column, select the domain whose MTA you want the Monitor Agent to
communicate with.
3 In the Destination column, select the external domain that you just created.
4 Configure the outbound link from the selected MTA to the external Monitor domain.
4a Specify the IP address of the server where the Monitor Agent runs.
4b Specify a unique port number for the MTA to use to communicate with the Monitor Agent.
4c Click Save, then click Close to exit the Link Configuration tool.
5 Continue with Configuring the Monitor Agent for Agent Performance Testing.
1 In the Monitor Agent console, click Preferences > Setup, then scroll down to the Performance
Testing section.
2 Fill in the fields:
Domain to Send Messages To: Select the external Monitor domain that you configured for
system performance testing.
You might need to restart the Monitor Agent in order to see the new Monitor domain in the drop-
down list.
Minutes between Messages: Specify in minutes the time interval for the Monitor Agent to send
performance test messages.
Enable GroupWise Performance Testing: Select this option to turn on performance testing.
Deselect this option when you have finished your performance testing.
Send Performance Messages To: Select All Agents to send performance test messages to all
domains in your GroupWise system. Select Monitored Agents to send performance test
messages only to the agents currently listed at the Monitor Agent console.
3 Click Submit to put the performance testing settings into effect.
4 Continue with Section 85.4.4, “Viewing Agent Performance Data,” on page 670.
Section 85.5.1, “Setting Up an External Monitor Domain for Gateway Accounting,” on page 671
Section 85.5.2, “Configuring the Link for the External Monitor Domain,” on page 672
Section 85.5.3, “Configuring the Monitor Agent to Communicate through the External Monitor
Domain,” on page 672
Section 85.5.4, “Setting Up an External Post Office and External User for the Monitor Agent,” on
page 672
Section 85.5.5, “Receiving and Forwarding the Accounting Files,” on page 673
Section 85.5.6, “Viewing the Gateway Accounting Report,” on page 674
1 (Conditional) If you are already using the GroupWise Performance Testing feature, use the same
external domain and MTA for gathering accounting data.
Skip to Section 85.5.4, “Setting Up an External Post Office and External User for the Monitor
Agent,” on page 672.
For more information, see Section 85.4, “Measuring Agent Performance,” on page 669.
2 In the GroupWise Admin console, connect to a domain where the MTA will communicate with the
Monitor Agent for the purpose of gathering accounting data.
3 Create an external GroupWise domain.
For background information about external GroupWise domains, see Section 11.2, “Using an
External Domain to Connect GroupWise Systems,” on page 112.
4 Name the external domain to reflect its role in your GroupWise system.
1 In the GroupWise Admin console, click System > Link Configuration to open the Link
Configuration tool.
2 In the Source column, select the domain whose MTA you want the Monitor Agent to
communicate with.
3 In the Destination column, select the external domain that you just created.
4 Configure the outbound link from the selected MTA to the external Monitor domain.
4a Specify the IP address of the server where the Monitor Agent runs.
4b Specify a unique port number for the MTA to use to communicate with the Monitor Agent.
4c Click Save, then click Close to exit the Link Configuration tool.
5 Continue with Configuring the Monitor Agent to Communicate through the External Monitor
Domain.
85.5.4 Setting Up an External Post Office and External User for the
Monitor Agent
Now that you have set up the link for the accounting data to flow through, you need to create an
external user to receive the accounting files.
1 In the GroupWise client, create a new rule to forward all accounting messages to the external
Monitor user in the external Monitor post office.
A typical subject line for an accounting message is Agent Accounting Data File.
2 In order to establish the link for the first time, restart the Monitor Agent and the MTA for the
domain that the external Monitor domain is linked to.
3 Verify that the accounting files are being received by the Monitor Agent:
3a In the Monitor Agent console, click Log > Gateway Accounting Logs.
3b Select the GWIA, then click View Accounting Logs.
If files are listed, then accounting data is successfully arriving to the Monitor Agent. The
Monitor Agent uses the accounting log files to generate Gateway Accounting reports.
The accounting log files on stored on the server where the Monitor Agent is running. The
default location varies by platform.
Linux: /var/log/novell/groupwise/gwmon/acct
Windows: c:\ProgramData\Novell\GroupWise\Monitor\acct
3 In the Users list, click a user to list all messages sent to and from the user.
4 In the list of messages, click a message ID to run a Message Tracking report for that message.
For more information, see Section 85.3.7, “Message Tracking Report,” on page 667.
5 In the Users list, click View Domains to list the Internet domains associated with the GWIA.
6 In the list of domains, click an Internet domain to list all messages sent and received through that
Internet domain.
1 In the Monitor Agent console, click the agent status link in the Status column.
2 In the Assigned field, type the name of the GroupWise administrator who is responsible for this
agent.
The name is displayed to the right of the agent status in the status window of the Monitor Agent
console and the Monitor web console.
3 In the Notes field, type any comments you might have about the agent.
If a problem with the agent occurs, the Thresholds field and the Suggestions field display helpful
information about the problem if you have set up customized thresholds.
For more information, see Section 83.5.2, “Customizing Notification Thresholds,” on page 650.
4 Click Update to save the information about who is assigned to the agent.
Many aspects of agent monitoring are available in one or more of the Monitor consoles. The table
below summarizes agent monitoring features and where they are available.
GroupWise Monitor Agent startup switches must be used on the command line when you start the
Monitor Agent, or in a script or batch file created to start the Monitor Agent. The Monitor Agent does
not have a startup file for switches.
Linux: If you start the Monitor Agent by running the gwmon executable, you can create a script like the
following:
If you start the Monitor Agent by running the grpwise-ma script, you can edit the MA_OPTIONS
variable to include any switches you want to set.
Windows: If you are running the Monitor Agent as an application, you can create a batch file like the
following:
You can create a desktop icon for your batch file, or you can add startup switches to the Monitor
Agent desktop icon that is created when you install the Monitor Agent.
If you are running the Monitor Agent as a Windows service, you can provide startup options in the
Start Parameters field on the General tab of the Monitor Agent service Properties dialog box.
The table below summarizes Monitor Agent startup switches for all platforms and how they
correspond to configuration settings in the Windows Monitor Agent Server Console.
Linux Monitor Agent Windows Monitor Agent Windows Monitor Agent Server Console
--log /log Log > Log Settings > Log File Path
NOTE: The Monitor Agent console does not include any settings comparable to the Monitor Agent
startup switches.
87.1 --hapassword
Specifies the password for the Linux user name that the Monitor Agent uses to log in to the Linux
server where the GroupWise High Availability service is running. See Section 83.10, “Supporting the
GroupWise High Availability Service on Linux,” on page 653.
87.2 --hapoll
Specifies in seconds the poll cycle on which the Monitor Agent contacts the GroupWise High
Availability service to provide agent status information. The default is 120. The actual duration of the
poll cycle can vary from the specified number of seconds because the actual duration includes the
time during which the Monitor Agent is checking agent status and restarting agents as needed. Then
the specified poll cycle begins again and continues for the specified number of seconds. See
Section 83.10, “Supporting the GroupWise High Availability Service on Linux,” on page 653.
87.4 --help
Displays the Monitor Agent startup switch Help information. When this switch is used, the Monitor
Agent does not start.
87.5 --home
Specifies a domain folder where the Monitor Agent can access a domain database (wpdomain.db).
From the domain database, the Monitor Agent can determine which agents to monitor, what user
names and passwords are necessary to access them, and so on.
87.7 --httpagentuser
Specifies the user name for the Monitor Agent to use when contacting monitored agents for status
information. Providing a user name is optional. See Section 83.3.1, “Configuring the Monitor Agent
for HTTP,” on page 648.
87.8 --httpcertfile
Specifies the full path to the public certificate file used to provide secure SSL communication between
the Monitor Agent and the Monitor console displayed in your web browser. See Section 83.7,
“Securing the Monitor Web Console,” on page 651.
87.10 --httpmonuser
Specifies the user name for the Monitor console to prompt for before allowing a user to display the
Monitor console. Providing a user name is optional. Do not use an existing LDAP directory user name
because the information passes over the non-secure connection between your web browser and the
Monitor Agent. See Section 83.7, “Securing the Monitor Web Console,” on page 651.
87.11 --httpport
Sets the HTTP port number used for the Monitor Agent to communicate with your web browser. The
default is 8200; the setting must be unique. See Section 83.3.1, “Configuring the Monitor Agent for
HTTP,” on page 648.
87.12 --httpssl
Enables secure SSL communication between the Monitor Agent and the Monitor console displayed in
your web browser. See Section 83.7, “Securing the Monitor Web Console,” on page 651.
87.13 --ipa
Specifies the network address (IP address or DNS hostname) of a server where an MTA is running.
The Monitor Agent can communicate with the MTA to obtain information about agents to monitor.
87.14 --ipp
Specifies the TCP port number associated with the network address of an MTA with which the
Monitor Agent can communicate to obtain information about agents to monitor. Typically, the MTA
listens for service requests on port 7100.
87.15 --lang
Specifies the language to run the Monitor Agent in, using a two-letter language code. You must install
the Monitor Agent in the selected language in order for the Monitor Agent to display in the selected
language.
See Chapter 7, “Multilingual GroupWise Systems,” on page 85 for a list of language codes.
Linux: /var/log/novell/groupwise/gwmon
NOTE: On some versions of Windows Server, the ProgramData folder is not visible by default. To
display it in File Explorer, click View, then select Hidden items.
See Section 83.8, “Configuring Monitor Agent Log Settings,” on page 651.
87.17 --monwork
Specifies the location where the Monitor Agent creates its working folder. The default location varies
by platform.
Linux: /tmp/gwmon
87.19 --pollthreads
Specifies the number of threads that the Monitor Agent uses for polling the agents for status
information. Valid values range from 1 to 32. The default is 20. See Section 83.4, “Configuring Polling
of Monitored Agents,” on page 649.
87.20 --proxy
Routes all communication through the Monitor Agent and the Monitor Application (on the web server).
As long as the web server can be accessed through the firewall, the Monitor console can receive
information about all GroupWise agents that the Monitor Agent knows about. Without --proxy, the
Monitor console cannot communicate with the GroupWise agents through a firewall. See
Section 83.9, “Configuring Proxy Service Support for the Monitor Console,” on page 652.
87.21 --tcpwaitconnect
Sets the maximum number of seconds the Monitor Agent waits for a connection to a monitored agent.
The default is 5.
For additional assistance in managing your GroupWise system, see GroupWise Best Practices (http:/
/wiki.novell.com/index.php/GroupWise).
By default, GroupWise native encryption is employed throughout your GroupWise system. This
means that all files related to GroupWise items are automatically encrypted when they are stored on
disk. In addition, all connections between the GroupWise client and GroupWise agents use a
proprietary, encrypted protocol.
By default, the GroupWise client runs in Online mode, so that all files related to mailboxes are stored
on the GroupWise server where the POA for the post office runs. As an administrator, you can chose
whether to allow users to set up their mailboxes to use Caching mode or Remote mode, where
mailboxes are located on users’ workstations.
If you decide to allow users to use Caching mode or Remote mode, the mailbox files on users’
workstations are all protected by GroupWise native encryption.
The following sections help you configure your GroupWise system for even tighter security:
Section 89.1.1, “Using Post Office Security Instead of GroupWise Passwords,” on page 691
Section 89.1.2, “Requiring GroupWise Passwords,” on page 692
Section 89.1.3, “Managing GroupWise Passwords,” on page 692
Section 89.1.4, “Using LDAP Passwords Instead of GroupWise Passwords,” on page 694
Section 89.1.5, “Bypassing GroupWise Passwords with Single Sign-On,” on page 694
Section 89.1.6, “Bypassing GroupWise Passwords to Respond to Corporate Mandates,” on
page 695
If you select GroupWise Authentication (the default), you can set a default password on mailboxes.
For instructions, see Section 52.1, “Establishing a Default Password for All New GroupWise
Accounts,” on page 455. Users can then set their own passwords after they log in.
If you select GroupWise Authentication and also select Allow Login from users with No Password,
you create passwordless mailboxes. This is not recommended except for testing purposes.
If you select LDAP Authentication for the post office, users are still not required to set passwords on
their GroupWise mailboxes, but they are required to be successfully logged in to a network before
they can access their mailboxes.
NOTE: A GroupWise password can contain as many as 64 characters and can contain any typeable
characters.
Keep in mind that some situations require users to have passwords on their GroupWise mailboxes,
as listed in Section 89.1.2, “Requiring GroupWise Passwords,” on page 692.
Intruder detection for the GroupWise client is performed by the POA and is configurable. You can set
the number of failed login attempts before lockout, the length of the lockout, and so on. If a user is
locked out, you can re-enable his or her account in the GroupWise Admin console. See
Section 15.3.5, “Configuring Intruder Detection,” on page 153.
Intruder detection for the GroupWise WebAccess is built in and is not configurable. After five failed
login attempts, the user is locked out for 10 minutes. If a user is locked out, the user must wait for the
lockout period to end.
It is easy for GroupWise users to reset their own passwords (GroupWise client > Tools > Options >
Security > Password). However, if this method is used when users are in Caching or Remote mode,
this changes the password on the local Caching or Remote mailboxes, but does not change the
password on the Online mailboxes. To change the Online mailbox password while in Caching or
Remote mode, users must use a method they might not be familiar with (GroupWise client >
Accounts > Account Options > Novell GroupWise Account > Properties > Advanced > Online
Mailbox Password).
It is also easy for GroupWise WebAccess users to reset their own passwords (WebAccess > Options
> Password). However, you might not want users to be able to reset their GroupWise passwords from
web browsers. See Section 76.2.3, “Preventing Users from Changing Their GroupWise Passwords in
WebAccess,” on page 617. GroupWise client users cannot be prevented from changing their
GroupWise passwords.
If you have forgotten your GroupWise password, contact your local GroupWise
administrator.
For your convenience and for the convenience of your WebAccess users, you can customize the
information that is provided by the Can’t log in link. For set instructions, see Section 76.2.4, “Helping
Users Who Forget Their GroupWise Passwords,” on page 617.
When LDAP authentication is enabled, you can control whether users can use the GroupWise client
to change their LDAP passwords (GroupWise Admin console > System > LDAP Servers > select an
LDAP object > LDAP Authentication tab > Disable LDAP Password Changing). If you allow them to,
GroupWise users can change their passwords through the Security Options dialog box (GroupWise
client > Tools > Options > Security) or on the Passwords page (GroupWise WebAccess > Options >
Password). If you do not allow them to change their LDAP passwords in the GroupWise client, users
must use a different application in order to change their LDAP passwords.
You and users can use some of the same methods to bypass LDAP passwords as you can use for
bypassing GroupWise passwords. See “Accepting eDirectory Authentication Instead of GroupWise
Passwords” on page 692.
For more information about LDAP passwords, see Section 91.2, “Authenticating to GroupWise with
Passwords Stored in an LDAP Directory,” on page 703.
Fill in the Remote User Name and Remote Password fields (GroupWise Admin console > Post
Office object > Settings)
Add the /user and /password startup switches to the POA startup file to provide a user name and
password
Providing passwords in clear text in a startup file might seem like a security risk. However, the servers
where the agents run should be kept physically secure. If an unauthorized person did gain physical
access, they would not be doing so for the purpose of obtaining these particular passwords. The
passwords are encrypted as they pass over the wire between servers, so the security risk is minimal.
GroupWise native encryption is employed throughout your GroupWise system. For background
information, see Chapter 88, “Native GroupWise Security,” on page 689. Additional security
measures should also be utilized to secure your GroupWise data.
Section 90.1, “Personal Digital Certificates, Digital Signatures, and S/MIME Encryption,” on
page 697
Section 90.2, “Server Certificates and SSL Encryption,” on page 699
Section 90.3, “Trusted Root Certificates and LDAP Authentication,” on page 702
For additional providers, consult the Novell Partner Product Guide (http://www.novell.com/
partnerguide/).
These products enable users to digitally sign and encrypt their messages using S/MIME encryption.
When a sender digitally signs a message, the recipient is able to verify that the item was not modified
en route and that it originated from the sender specified. When a sender encrypts a message, the
sender ensures that the intended recipient is the only one who can read it. Digitally signed and
encrypted messages are protected as they travel across the Internet, but native GroupWise
encryption is removed as messages leave your GroupWise system.
After users have installed an S/MIME security provider on their workstations, you can configure
default functionality for it (GroupWise Admin console > Domain object, Post Office object, or User
object > Client Options > Send > Security > Secure Item Options). You can specify a URL from which
you want users to obtain their S/MIME certificates. You can require the use of digital signatures and
encryption, rather than letting users decide when to use them. You can even select the encryption
algorithm and encryption key size if necessary. For more information, see “Send Options: Security”
on page 576.
Novell, Inc. (if you have installed Novell Certificate Server 2 or later (http://www.novell.com/
solutions/identity-and-security/?redir=products/certserver))
VeriSign, Inc. (http://www.verisign.com)
Thawte Certification (http://www.thawte.com)
GlobalSign (https://www.globalsign.com)
NOTE: Some certificate providers charge a fee for certificates and some do not.
After users have selected the appropriate security provider and obtained a personal digital certificate,
they can protect their messages with S/MIME encryption by digitally signing them (GroupWise client
> Actions > Sign Digitally) and encrypting them (GroupWise client > Actions > Encrypt). Buttons are
added to the GroupWise toolbar for convenient use on individual messages, or users can configure
GroupWise to always use digital signatures and encryption (GroupWise client > Tools > Options >
Security > Send Options). The messages they send with digital signatures and encryption can be
read by recipients using any other S/MIME-enabled email product.
GroupWise client users are responsible for managing their personal digital certificates. Users can
have multiple personal digital certificates. In the GroupWise client, users can view their own
certificates, view the certificates they have received from their contacts, access recipient certificates
from LDAP directories, change the trust level on certificates, import and export certificates, and so on.
For more information, see Section 91.3, “Accessing S/MIME Certificates in an LDAP Directory,” on
page 704.
The certificates are stored in the local certificate store on the user’s workstation. They are not stored
in GroupWise. Therefore, if a user moves to a different workstation, he or she must import the
personal digital certificate into the certificate store on the new workstation, even though the same
GroupWise account is being accessed.
If your system includes smart card readers on users’ workstations, certificates can also be retrieved
from this source, so that after composing a message, users can sign them by inserting their smart
cards into the card readers. The GroupWise client picks up the digital signature and adds it to the
message.
The GroupWise client verifies the user certificate to ensure that it has not been revoked. It also
verifies the certificate authority. If a certificate has expired, the GroupWise user receives a warning
message.
For complete details about using S/MIME encryption in the GroupWise client, see “Sending S/MIME
Secure Messages” in the GroupWise 2014 R2 Client User Guide.
Any messages that are not digitally signed or encrypted are still protected by native GroupWise
encryption as long as they are within your GroupWise system.
The advantage of using a self-signed certificate is that you can proceed to set up SSL immediately,
without waiting to the certificate from a certificate authority. However, the first time the GroupWise
client encounters the self-signed certificate, it prompts the user to accept the certificate. The
advantage of a commercially generated certificate is that the GroupWise client accepts it
automatically. You might choose to use a self-signed certificate initially, while you are waiting to obtain
a commercially generated certificate.
If you have not already set up SSL on your system, obtain a certificate for each GroupWise server,
then configure the agents to use SSL:
Section 90.2.1, “Using a Self-Signed Certificate from the GroupWise Certificate Authority,” on
page 699
Section 90.2.2, “Using a Commercially Signed Certificate,” on page 699
Section 90.2.3, “Configuring the Agents to Use SSL,” on page 701
If you have already set up SSL on your system and are using it with other applications in addition to
GroupWise, skip to Section 90.2.3, “Configuring the Agents to Use SSL,” on page 701.
For more information, see gwadminutil ca in the GroupWise 2014 R2 Utilities Reference
1 Open a terminal window, become root, and change to a convenient folder where you want to
create the CSR.
2 Enter the following command to create a private key file:
Replace key_file_name.key with a convenient name for the private key file, such as gw.key.
3 Create the CSR:
3a Enter the following command:
Replace key_file_name.key with the key file that you created in Step 2.
3b Enter the two-letter code for your country, such as US for the United States, DE for Germany,
and so on.
3c Enter your state or province.
3d Enter your city.
3e Enter the name of your company or organization.
3f Enter your department or other organizational unit.
3g Enter the fully qualified domain name of the server for which you are obtaining a certificate,
such as gw3.novell.com.
3h Enter the email address of a contact person for that server.
3i (Optional) Enter a password for the CSR.
3j (Optional) Enter a secondary name for your company or organization.
4 Skip to “Submitting the Certificate Signing Request to a Certificate Authority” on page 701.
5 In the Common Name field, specify the fully qualified domain name of the server for which you
are obtaining a certificate, such as gw3.novell.com.
6 Fill in the rest of the fields with the requested information, then click Next.
7 The default cryptographic service provider and bit length are acceptable, so click Next.
8 Specify a name for the CSR file, such as gw.csr, then click Finish.
If you do not specify a full path name, the CSR file is created in the c:\Windows\System32
folder.
9 Continue with Submitting the Certificate Signing Request to a Certificate Authority.
The process of submitting the CSR varies from company to company. Most provide online
submission of the request. Follow their instructions for submitting the request. The certificate
authority must be able to provide the certificate in Base64/PEM or PFX format.
“Securing the Post Office with SSL Connections to the POA” on page 152
“Securing the Domain with SSL Connections to the MTA” on page 229
“Securing Internet Access with SSL Connections to the GWIA” on page 271
“Securing Document Conversion with SSL Connections” on page 371
A trusted root certificate is automatically created for a server when you install an LDAP directory such
as NetIQ eDirectory or Microsoft Active Directory on that server.
LDAP (Lightweight Directory Access Protocol) is a standard Internet protocol for accessing commonly
used network directories. If you are new to GroupWise or LDAP, you might find it useful to review TID
2955731, “GroupWise and LDAP,” in the Novell Support Knowledgebase (http://www.novell.com/
support/). This TID provides an overview of LDAP and explains the two address-book-related ways
that GroupWise makes use of LDAP.
This section briefly summarizes the address book usages of LDAP, and explains how LDAP can also
be used to store security information such as passwords and certificates for use with GroupWise.
Section 91.1, “Accessing Public LDAP Directories from GroupWise,” on page 703
Section 91.2, “Authenticating to GroupWise with Passwords Stored in an LDAP Directory,” on
page 703
Section 91.3, “Accessing S/MIME Certificates in an LDAP Directory,” on page 704
When you understand these LDAP capabilities, you are ready to set up LDAP authentication for your
GroupWise users. See Section 15.3.4, “Providing LDAP Authentication for GroupWise Users,” on
page 153.
Bind: With a bind, the POA essentially logs in to the LDAP server. When responding to a bind
request, most LDAP servers enforce password policies such as grace logins and intruder
lockout, if such policies have been implemented by the LDAP directory.
Compare: With a compare, the POA provides the user password to the LDAP server. When
responding to a compare request, the LDAP server compares the password provided by the
POA with the user’s password in the LDAP directory, and returns the results of the comparison.
Using a compare connection can provide faster access because there is typically less overhead
involved because password policies are not being enforced.
Regardless of whether the POA is submitting bind requests or compare requests to authenticate
GroupWise users, the POA can stay connected to the LDAP server as long as authentication
requests continue to occur before the connection times out. This provides quick response as users
are accessing their mailboxes.
LDAP User Login: If you want the POA to access the LDAP server with specific rights to the
LDAP directory, you can provide a user name and password for the POA to use when logging in.
The rights of the user determine what information in the LDAP directory will be available during
the authentication process.
Public or Anonymous Login: If you do not provide a specific LDAP user name and password
as part of the LDAP configuration information, then the POA accesses the LDAP directory with a
public or anonymous connection. Only public information is available when using such a login.
When a certificate is stored on an LDAP server, the GroupWise client searches the LDAP server
every time the certificate is used. Certificates from LDAP servers are not downloaded into the local
certificate store on the user’s workstation.
To facilitate this process, the user must select a default LDAP directory in the LDAP address book
(GroupWise client > Address Book > Novell LDAP Address Book > Directories > Set as Default) and
enable searching (GroupWise client > Tools > Options > Security > Send Options > Advanced
Options > Search for recipient encryption certificates in the default LDAP directory defined in
LDAP Address Book).
An advantage to this is that recipients’ certificates are available no matter what workstation the
GroupWise user sends the message from.
The GroupWise client accommodates users’ preferences for security and privacy when sending
messages. Users can do the following:
Sign a message with standardized text (GroupWise client > Tools > Options > Environment >
Signature).
Sign a message with an electronic business card (vCard) (GroupWise client > Tools > Options >
Environment > Signature).
Digitally sign and encrypt a message. See Section 90.1, “Personal Digital Certificates, Digital
Signatures, and S/MIME Encryption,” on page 697.
Give a message a security classification (GroupWise client > New Mail > Send Options >
General > Classification > Normal, Proprietary, Confidential, Secret, Top Secret, or For your
eyes only).
Conceal the subject of an email message (GroupWise client > New Mail > Send Options >
Security > Conceal subject).
Mark messages and appointments private so that proxy users cannot see them. (GroupWise
client > Actions > Mark Private).
Attach a password-protected document to a message and have the application prompt the
recipient to supply the password before the recipient can open the document
Require a password in order to mark a Routing Slip completed (GroupWise client > Tools >
Options > Security > Send Options > Require password to complete routed item). This can
prevent a user who is proxied to the mailbox from marking the item completed, or if multiple
users proxy to the mailbox, it can be used to ensure that only the user for whom the item was
intended can complete it.
In addition, if the users in your GroupWise system exchange messages with users in other
GroupWise systems, you can set preferences to control what types of information pass between the
two systems. For example, you can prevent external GroupWise users from performing busy
searches or obtaining message delivery status. See Section 4.20.3, “External Access Rights,” on
page 57.
One of the purposes of the GroupWise Address Book is to make user information available to all
GroupWise users. However, there might be types of information that you do not want to display.
Section 93.1, “LDAP Directory Information Displayed in the GroupWise Address Book,” on
page 709
Section 93.2, “Suppressing the Contents of the User Description Field,” on page 709
Section 93.3, “Controlling GroupWise Object Visibility in the GroupWise Address Book,” on
page 710
Section 93.4, “Controlling GroupWise Object Visibility between GroupWise Systems,” on
page 710
Name
Office phone number
Department
Fax number
User name
You can configure the GroupWise Address Book to display more or less information to meet the
needs of your users. See Section 5.1, “Customizing Address Book Fields,” on page 69.
Unwanted Internet email messages (spam) can be a distracting nuisance to GroupWise client users.
Your first line of defense against spam is the Internet Agent (GWIA). Your second line of defense is
the Junk Mail Handling feature of the GroupWise client.
Section 94.1, “Configuring the GWIA for Spam Protection,” on page 711
Section 94.2, “Configuring the GroupWise Client for Spam Protection,” on page 711
Messages are received from known open relay hosts or spam hosts (GroupWise Admin console
> GWIA object > Access Control > Blacklists).
Messages are received from any hosts that you specifically do not want to receive messages
from (GroupWise Admin console > GWIA object > Access Control > Default Class of Service >
Edit > Allow Incoming Messages, Prevent Incoming Messages, and Exceptions).
Messages are received through an anti-spam service that uses an “X” header field to identify
potential spam (GroupWise Admin console > GWIA object > SMTP/MIME > Settings > Junk
Mail).
Thirty messages are received within 10 seconds from the same sending host (GroupWise Admin
console > GWIA object > SMTP/MIME Settings > Security Settings). The number of message
and the time interval can be modified to identify whatever you consider to be a potential
mailbomb.
Messages are received from SMTP hosts that are not using the AUTH LOGIN host
authentication method (--forceinboundauth startup switch).
The sender’s identify cannot be verified (GroupWise Admin console > GWIA object > SMTP/
MIME Settings > Security Settings).
For detailed setup instructions on these anti-spam security measures, see Section 29.5.2, “Blocking
Unwanted Email from the Internet,” on page 285.
Messages that are identified as spam by the GWIA are not accepted into your GroupWise system.
Individual email addresses or entire Internet domains can be placed on the user’s Block List.
Messages from blocked addresses never arrive in the user’s mailbox.
The Junk Mail Handling feature in the GroupWise client is enabled by default, although you can
control its functionality (GroupWise Admin console > Domain object, Post Office object, or User
object > Client Options > Environment > Junk Mail).
For detailed usage instructions for the Junk Mail Handling feature in the GroupWise client, see
“Handling Unwanted Email (Spam)” in the GroupWise 2014 R2 Client User Guide.
Virus protection for your GroupWise system is provided by third-party products. For information about
security products for use with your GroupWise system, see the Novell Partner Product Guide (http://
www.novell.com/partnerguide/) and the Novell Open Enterprise Server Partner Support site (http://
www.novell.com/products/openenterpriseserver/partners/).
Section 15.3.3, “Securing the Post Office with SSL Connections to the POA,” on page 152
Section 22.2.1, “Securing the Domain with SSL Connections to the MTA,” on page 229
Section 28.5, “Securing Internet Access with SSL Connections to the GWIA,” on page 271
Section 37.4, “Securing Document Conversion with SSL Connections,” on page 371
Section 83.7, “Securing the Monitor Web Console,” on page 651
GroupWise agents are initially configured with self-signed certificates provided by the GroupWise
certificate authority. Publicly signed certificates provide stronger protection. For more information, see
Section 90.2.2, “Using a Commercially Signed Certificate,” on page 699.
Trusted applications log in to GroupWise agents by using trusted application keys that are created
when the trusted application is created. It is essential that these keys are protected and not allowed to
become public. Steps you can take to protect trusted application keys include:
Associating the trusted application key with a single IP address whenever possible
Section 98.1, “Using a Proxy Server with Client/Server Access,” on page 723
Section 98.2, “Using LDAP Authentication for GroupWise Users,” on page 723
Section 98.3, “Managing Mailbox Passwords,” on page 723
Section 98.4, “Enabling Intruder Detection,” on page 723
GroupWise WebAccess users access their GroupWise mailboxes through their web browsers, so
your web server handles the access issues for such users.
On the LDAP Directory object, the LDAP user name that you provide on the LDAP Authentication tab
should be granted only browser rights in the LDAP directory. The password for the LDAP user should
be long and randomly generated.
On your LDAP servers, the trusted root certificate file should be write protected so that it cannot be
tampered with.
For more information about the GroupWise Server Migration Utility, see the GroupWise Server
Migration Guide.
In addition, the Server Migration Utility needs read/write access to the domain or post office folder
that is being migrated. Read/write access enables the Server Migration Utility to copy the contents of
the post office folder or domain folder, including the post office database and domain database, so
that file locking is respected while the data is being copied. File locking prevents database damage.
In addition, root permissions might be required to write the post office or domain data to the Linux
server, depending on where the user decided to locate the post office or domain. After the migration,
the user can configure the GroupWise agents to run as a non-root user for improved security. For
more information, see “Running the Linux GroupWise Agents as a Non-root User” in the GroupWise
2014 R2 Installation Guide.
Appendixes 727
728 GroupWise 2014 R2 Administration Guide
A GroupWise Port Numbers
A
Section A.1, “Opening Ports for GroupWise Agents and Applications,” on page 729
Section A.2, “Protocol Flow Diagram with Port Numbers,” on page 732
Section A.3, “Post Office Agent Port Numbers,” on page 733
Section A.4, “Message Transfer Agent Port Numbers,” on page 734
Section A.5, “Internet Agent Port Numbers,” on page 734
Section A.6, “Document Viewer Agent Port Numbers,” on page 735
Section A.7, “WebAccess Application Port Numbers,” on page 735
Section A.8, “Calendar Publishing Host Port Numbers,” on page 736
Section A.9, “Monitor Agent Port Number,” on page 736
Section A.10, “Monitor Application Port Numbers,” on page 736
Section A.11, “GroupWise High Availability Service Port Number (Linux Only),” on page 737
Section A.12, “Port Numbers for Products Frequently Used with GroupWise,” on page 737
1 On the Start menu, click Control Panel, then under System and Security, click Check firewall
status.
2 In the left panel, click Advanced Settings to open Windows Firewall with Advanced Security.
3 In the left panel, click Inbound Rules.
4 Click Action > New Rule.
5 Select Port, then click Next.
6 Ensure that TCP is selected.
7 In the Specific local ports field, list the port numbers, in a comma-delimited list, for the
GroupWise agents and applications on this server, as provided in this appendix, then click Next.
8 Accept the default of Allow the connection, then click Next.
9 Accept the default for when the rule applies, or change it depending on your security preferences
for the GroupWise agents and applications, then click Next.
10 In the Name field, specify a unique name for this set of port numbers, such as GroupWise Ports,
then click Finish.
Alternate GWIA
for SMTP/MIME
MTA MTA MTA MTA
Message Transfer
MTP 7100 MTP 7100 MTP 7100 MTP 7100
HTTP 7180 HTTP 7180 HTTP 7180 HTTP 7180
SNMP 161 SNMP 161 SNMP 161 SNMP 161
[GWHA 8400] [GWHA 8400] [GWHA 8400] [GWHA 8400]
Agent Monitoring [UNC] [UNC]
eDirectory User
Synchronization
AD Monitor Agent/
Application
LDAP
Directory HTTP 8200
HTTP 80/443
LDAP SSL 636 SMTP 25
LDAP
Authentication Agent
Monitoring
Browser
POA POA GWIA GWIA
MTP 7101 MTP 7101 MTP 7102 MTP 7102
HTTP 7181 HTTP 7181 HTTP 9850 HTTP 9850
SNMP 161 SNMP 161 SNMP 161 SNMP 161
[GWHA 8400] [GWHA 8400] [GWHA 8400] [GWHA 8400]
Live Move
C/S 1677 C/S 1677 [UNC] [UNC]
SOAP 7191 SOAP 7191 SMTP 25 SMTP 25
IMAP 143/993 IMAP 143/993 POP 110/995 POP 110/995
Cal Pub 7171 Cal Pub 7171 IMAP 143/993 IMAP 143/993
Calendar Access
Mailbox Agent
Access Monitoring
HTML Notifications
Conversion
for Indexing
Email
Transfer
Calendar
WebAccess Publishing
DVA Application Host Application
HTTP 8301 HTTP 80/443 HTTP 80/443
SOAP 8500
Internet
Browser Browser
See also Section A.12, “Port Numbers for Products Frequently Used with GroupWise,” on page 737.
POA console
Internal 1677 TCP/ Yes Local communication between the POA and GroupWise clients
Client/ UDP
Server
External 0 TCP/ Yes External communication between the POA and GroupWise
Client/ UDP clients (administrator-defined port number)
Server
Section 15.3.1, “Securing Client Access through an External
Proxy Server,” on page 150
MTA console
GWIA console
HTTP SSL 443 Yes Communication between the Mobility Connector and mobile
devices
Administrator URLs
In a URL, an agent server can be specified by its IP address or DNS hostname. The port numbers
listed below are the default port numbers.
User URLs
http://webaccess_server/gw/webacc WebAccess
Administration
Some GroupWise administrators might be new to the Linux operating system. This appendix provides
basic Linux commands, directories, and files to assist you if are running GroupWise on Linux for the
first time.
Command Description
man command Displays information about any Linux command, including the commands used to start
GroupWise programs.
uname -a Displays the kernel version, along with other useful information
Command Description
ls -l Lists the files in the current directory, along with useful information about
them.
ls -al Includes hidden system files (those whose names start with a dot) in the list.
less file_name Pages through the contents of a file and lets you page back up through the
file.
tail file_name Displays the last 10 lines of a file. This is helpful for log files. (The head
commands displays the first 10 lines.)
find starting_directory - Find the specified file, starting in the specified directory. Specifying / starts
name file_name the find operation in the root directory.
grep string file Searches the specified file for the specific string of characters. This is useful
for locating specific information in GroupWise agent startup files.
Command Description
top Lists all processes, sorted by CPU percentage with the highest at the top of
the list.
ps -eaf | grep program Lists all processes and their IDs associated with the specified program.
Wildcard characters can be used to list a group of related programs (for
example, gw*).
ps -aux | grep user_name Lists all processes and their IDs associated with the specified user.
kill -9 process_ID Stops the specified process after it has failed to exit normally. Temporary
files are not cleaned up.
killall program Kills all processes associated with the specified program.
xkill Closes the window that you click on with the resulting box-shaped cursor.
Command Description
df Lists file system disk space usage in terms that make sense to your
computer.
df -h Lists file system disk space usage in terms that make sense to humans.
du Lists disk space usage of each subdirectory below your current working
directory
du -s Lists the cumulative disk space usage of your current working directory.
du -s file_or_directory Lists the disk space usage for a file or the cumulative disk space usage for a
directory and its contents.
Command Description
rpm -qa | grep novell Lists all Novell packages installed on your server
rpm -qi package_name Lists useful information about an installed package, such as name, version,
release date, install date, size description, build date, and so on.
rpm -ql package_name Lists where each file in the package has been installed
Command Description
Command Description
ifconfig -a Lists the IP address and other detailed information about the NIC in
your Linux server.
netstat -lnp | grep program Lists the port numbers in use by one or more programs. It is also a
netstat -lnp | egrep handy command for checking to see whether the specified
‘program|program|...' programs are currently running.
ping ip_address_or_hostname Checks to see if the specified server is responding on the network.
Directory Description
/opt/novell/groupwise/agents/bin Executables
/opt/novell/groupwise/agents/lib Libraries
File Description
Command Description
./gwpoa --show @post_office.poa & Starts a specific GroupWise agent with a user interface in
./gwmta --show @domain.mta & the /opt/novell/groupwise/agents/bin directory.
./gwia --show @gwia.cfg &