-
NetWare 6 Readme Novell NetWare 6 ® www.novell.com 6.
-
Manual 99a 38 July 17, 2001 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc.
-
Manual 99a 38 July 17, 2001 Novell Trademarks ConsoleOne is a trademark of Novell, Inc. DirXML is a trademark of Novell, Inc. eDirectory is a trademark of Novell, Inc. GroupWise is a registered trademark of Novell, Inc. in the United States and other countries. Hardware Specific Module and HSM are trademarks of Novell, Inc. Internetwork Packet Exchange and IPX are trademarks of Novell, Inc. IPX/SPX is a trademark of Novell, Inc. Link Support Layer and LSL are trademarks of Novell, Inc.
-
Manual NetWare 6 Readme 103-000171-001 October 25, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a 37 June 14, 2001 Contents NetWare 6 Readme 7 1 General Information 9 2 Installation and Upgrade 13 Before the Installation or Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 During the Installation or Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 After the Installation or Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 3 ConsoleOne 1.3 21 4 DNS/DHCP 25 5 iManage 1.0 and iMonitor 1.
-
Manual 99a June 14, 2001 37 18 Novell Compatibility Mode Driver 63 19 Novell eDirectory 8.6 for NetWare 65 20 Novell GroupWise 67 21 Novell iFolder 69 22 Novell International Cryptographic Infrastructure (NICI) 71 23 Novell Modular Authentication Service (NMAS) 73 24 Novell Native File Access Protocols General Issues . . . . Macintosh / AFP Issues Windows / CIFS Issues UNIX / NFS Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 . . . .
-
Manual 99a 38 July 17, 2001 NetWare 6 Readme This document provides information on known issues and limitations for NetWare® 6. The issues are divided into sections based on product features. Use the Table of Contents or the Search feature to locate the information you need. For information about additional issues discovered after the release, see the Novell Support Knowlegebase (http://support.novell.com/search/ kb_index.jsp) and enter TID #10064501.
-
Manual 8 NetWare 6 Readme NetWare 6 Readme 103-000171-001 October 25, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 1 99a July 17, 2001 38 General Information This chapter contains general information about the NetWare® 6 release. For information about additional issues discovered after the release, see the Novell® Support Knowlegebase (http://support.novell.com/search/ kb_index.jsp) and enter TID #10064501. NetWare 6 Contents The NetWare 6 package consists of the following: Operating System CD Client CD Novell ClientTM 4.81 for Windows* NT*/2000 Novell Client 3.31 for Windows 95/98 NMAS Client 2.
-
Manual 99a 38 July 17, 2001 MP-Enabled Components The following core NetWare 6 components are MP-enabled: Core operating system ODITM (including LSLTM, LAN, TSMTM, MSMTM, HSMTM) TCP/IP NCP/IP Winsock (including NILE and BSD) CLIB BSD calls Novell Storage ServicesTM file system Novell eDirectoryTM, including LDAP Novell JVM for NetWare Novell Modular Authentication Service (NMASTM) Novell Cluster ServicesTM NetWare Enterprise Web Server NetWare Web Search NetWare FTP Server
-
Manual 99a July 17, 2001 38 Novell Portal Services 1.0 Novell Single Sign-on 2.1 If you install Novell Single Sign-on to a NetWare 6 server that is not an SD Key Server and you select No when prompted to make the server an SD Key Server, you may see messages indicating that Novell Single Signon did not successfully install. The messages and entries in the log file (sys:system\sssi.log) falsely indicate that the SD Key Client and Secret Store Service were not installed successfully.
-
Manual 99a 38 July 17, 2001 Client DOS Utilities Many DOS utilities have been removed from NetWare 6. The following utilities are still included for your convenience, but they are not supported: CAPTURE CX FILER LOGIN LOGOUT MAP NCOPY NDIR NetWare Administrator NLIST NPRINTER RIGHTS International Issues Euro Character. There are several places throughout Netware 6 where the euro character is displayed as its hex value “[20AC]”.
-
Manual 2 99a 38 July 17, 2001 Installation and Upgrade This chapter contains the following subsections: “Before the Installation or Upgrade” on page 13 “During the Installation or Upgrade” on page 16 “After the Installation or Upgrade” on page 18 You should also review the other sections of this Readme for additional installation and upgrade issues. For complete instructions on preparing the network and installing or upgrading to NetWare 6, see the NetWare 6 Overview and Installation Guide.
-
Manual 99a 38 July 17, 2001 Upgrading NetWare 5 Servers with NDS 7 and NSS Volumes A NetWare 5 server with NDS® 7 and NSS volumes is inaccessible after completing the Prepare a Server with NDS 7 and NSS step in NetWare Deployment Manager. For this reason, complete this step just before you upgrade to NetWare 6.
-
Manual 99a 38 July 17, 2001 Deployment Manager and specifically complete Step 3: Prepare for NDS eDirectory 8.6. This step identifies and updates a server on the network that holds the Master or Read/Write replica of the Root of the tree. NetWare Deployment Manager (NWDEPLOY.EXE) runs on a Windows workstation and is located on the NetWare Operating System CD. For complete instructions on preparing the network, see the NetWare 6 Overview and Installation Guide.
-
Manual 99a 38 July 17, 2001 During the Installation or Upgrade Copying and Overwriting Existing Files Because all the components of NetWare 6 have been tested as a whole, you should select Overwrite on all files that report a new date conflict during an upgrade. Installing from a Bootable CD If your server supports a bootable CD-ROM and you want to boot to the NetWare Operating System CD, make sure that the machine boot order specifies that the CD boots before the hard drive.
-
Manual 99a 38 July 17, 2001 Installing a NetWare 5.1 Server into a Tree with a NetWare 6 SDI Server When installing a NetWare 5.1 server into a tree with a NetWare 6 Security Domain Infrastructure (SDI) server, the installation fails with a “125” error due to a security upgrade. The following error message is displayed: Error while Contacting Security Domain Infrastructure Key Server: NW6_1.Servers.RCH.TX.
-
Manual 99a 38 July 17, 2001 Search, iManage, NetWare Web Access, and Novell NetStorage. If you plan to install any of these products after the upgrade, make sure that you install the Apache Web server first. After the Installation or Upgrade Missing Device Drivers The server installation program copies to a startup directory (C:\NWSERVER) only drivers (such as HAMs, CDMs and PSMs) for devices that were auto-detected during the installation process.
-
Manual 99a 38 July 17, 2001 To maintain backup and restore services on NetWare 6 and your network, you must install the patch. The patch will supersede the SMS modules installed by default during the NetWare 6 installation. For more information, see the Readme included with the patch. Agent Installation for GroupWise 6 Replaces LDAP Files Needed by iFolder The Agent Installation program for GroupWise® 6 lets you overwrite LDAP modules that consequently disable iFolder running on NetWare 6.
-
Manual 20 NetWare 6 Readme NetWare 6 Readme 103-000171-001 October 25, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 3 99a July 17, 2001 38 ConsoleOne 1.3 Installing the NICI Client Some of the ConsoleOne snap-ins for NetWare 6 require the NICI Client. To use those snap-ins, you must install NICI on every workstation where you will use ConsoleOne. IMPORTANT: Two versions of NICI are provided for Windows platforms: 1.5.7 and 2.0.2. We recommend that you install both versions. NICI 1.5.7 is implemented as a kernel driver, while NICI 2.0.2 is implemented as a shared DLL. Applications using NICI 1.5.
-
Manual 99a 38 July 17, 2001 ConsoleOne Is Not Refreshing Properly With 3D mouse pointer software installed on a machine running ConsoleOne, the screen might appear to not refresh properly. To solve this problem, remove the 3D mouse pointers. For more information on this issue, refer to Solution #10058840 (http:// support.novell.com). ConsoleOne Does Not See the Tree In a pure IP environment, ConsoleOne does not see the eDirectoryTM tree of the server that ConsoleOne is running on.
-
Manual 99a 38 July 17, 2001 Option Setting File Cache Level Change from 3 to 0. File Write Through Change from Off to On. True Commit Change from Off to On. 4 Click OK. Support for the Hong Kong Supplementary Character Set This release of ConsoleOne does not support the Hong Kong Supplementary Character Set (HKSCS). We are currently working on a patch to allow HKSCS support in future releases of ConsoleOne. ConsoleOne 1.
-
Manual 24 NetWare 6 Readme NetWare 6 Readme 103-000171-001 October 25, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 4 99a 38 July 17, 2001 DNS/DHCP Known Issues The Novell® iManage browser-based DNS/DHCP management utility does not support the following: IPV6.INT zones Configuring DHCP Option 60 Pooled Mac addresses (Use the Java Management tool to manage this feature.) While importing the DHCP configuration, a default subnet address range is automatically created. The DHCP Server reference is not automatically updated; you can manually update the server reference later.
-
Manual 99a 38 July 17, 2001 While importing the DHCP configuration, if the subnet address range contains a reference to an external DHCP server, this reference is automatically replaced by a reference to the default DHCP server that you specify. The Novell DNS and DHCP servers are based on ISC BIND Version 4.9.6 and ISC DHCP Version 2.
-
Manual 5 99a 38 July 17, 2001 iManage 1.0 and iMonitor 1.5 for Novell eDirectory 8.6 This chapter contains the following subsections: “iManage 1.0” on page 27 “iMonitor 1.5” on page 31 iManage 1.0 Associating a Role to a Scope If you add a member to a role and then try to associate that role to a scope that does not exist, you will get an error message. Click OK to clear the error message.
-
Manual 99a 38 July 17, 2001 Setting Up Encoding for Foreign Languages If you are experiencing problems with correct character display in iManage, you should verify that your browser's language and character set encoding are configured properly.
-
Manual 99a 38 July 17, 2001 When creating new rbsRole objects in iManage, the tasks for that role should be assigned from the same rbsCollection container that the role was created in. Out-of-Memory Errors If you receive out-of-memory errors when running iManage (Error: 500 on client browsers and OutOfMemory Java exception on the Server Login Screen), edit the SYS:TOMCAT\33\BIN\TOMCAT33.
-
Manual 99a 38 July 17, 2001 Modifying the iManage Installation Path during a NetWare 6 Custom Installation You should not modify the iManage installation path during the NetWare custom installation unless the container you specify in the installation field already exists. If you do specify a container that does not exist, you will receive -601 (No Such Entry) errors on the following files: .../BASE/EDIR.XML .../DNSDHCP/DNSDHCP.XML .../IPRINT/IPRINT.XML .../NLS/NLS.
-
Manual 99a 38 July 17, 2001 Performing a Post-installation of iManage When performing a post-installation of iManage, you must restart both Apache and Tomcat after the installation is complete in order for iManage to work properly. Granting Additional eDirectory Rights to Owners of rbsCollection Containers When you make a user an owner of an rbsCollection container, you should grant that user the additional eDirectory rights needed to fully administer that collection.
-
Manual 32 NetWare 6 Readme NetWare 6 Readme 103-000171-001 October 25, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 6 99a 38 July 17, 2001 iPrint/NDPS Installing Printers on Windows NT/2000 To install a printer on Windows NT/2000, you must have Administrator rights or be a Power User. Managing iPrint iPrint can be managed with the Novell® iManage browser-based management utility. Not all operations have been included in iManage. For those operations that you cannot complete in iManage, you can use NetWare Administrator. For information on setting up iManage, see the Novell iManager Administration Guide.
-
Manual 99a 38 July 17, 2001 Running iPrint Map Designer To have full functionality of the iPrint Map Designer, IPPSRVR.NLM must be loaded before starting iPrint Map Designer. Changing Printer Security Levels If you change the printer agent security level to high and do not check the Requires Security check box on the IPP Support page of the printer’s Client Support Page in iManage, you will receive the following error: Error message: iPrint Client - "The request requires user authentication.
-
Manual 99a 38 July 17, 2001 3 Remount the volume with TTS enabled by entering mount NDPS_Manager_host_volume_name iPrint Client Install Page Has No Link When using a map generated by the iPrint Map Designer, if users click on a printer from a workstation that does not have the iPrint client installed, they might be redirected to an iPrint client install page that does not have the client install link. To resolve this, use a text editor to edit LOGIN\IPPDOCS\TOOLS.
-
Manual 36 NetWare 6 Readme NetWare 6 Readme 103-000171-001 October 25, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 7 99a 38 July 17, 2001 IPX Dependencies If you select TCP/IP as your only protocol during the NetWare® 6 installation, IPX/SPXTM will no longer be available. If you have problems loading IPX/SPX-dependent NLMTM programs, add the following line after the Server Name in the AUTOEXEC.NCF file: serverID XXXXXXXX Replace XXXXXXXX with the internal IPXTM address you want to assign to the server. This address can be numbers and letters A, B, C, D, E, F only (serverID is a hex value).
-
Manual 38 NetWare 6 Readme NetWare 6 Readme 103-000171-001 October 25, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 8 99a 38 July 17, 2001 NetWare Enterprise Web Server No NDS Replica on the Web Server If the Web server does not have an NDS® replica, users cannot access private pages through the Web server. Users are allowed to authenticate, but the page access returns a 404 error. To avoid this problem, make sure the Web server has an NDS replica. Internet Explorer Issues Folder operations in WebDAV have limitations.
-
Manual 99a 38 July 17, 2001 3 Click Microsoft Internet Explorer 5 > Change/Remove > Repair Internet Explorer. 4 Restart your system if required. INDEX.HTML Renamed When upgrading to NetWare 6 from an earlier version of NetWare, the file INDEX.HTML in the document root of the Enterprise Web Server (volume:\NOVONYX\SUITESPOT\DOCS) might be renamed to INDEX_ENTERPRISE.HTML. This occurs when the new NetWare 6 default home page is installed as INDEX.HTML.
-
Manual 9 99a July 17, 2001 38 NetWare FTP Server Intruder Detection To disable intruder detection, both intruder detection parameters (INTRUDER_HOST_ ATTEMPTS and INTRUDER_USER_ATTEMPTS) must be set to zero (0). To enable intruder detection, both intruder detection parameters (INTRUDER_HOST_ ATTEMPTS and INTRUDER_USER_ATTEMPTS) must be set to a value greater than zero (0).
-
Manual 42 NetWare 6 Readme NetWare 6 Readme 103-000171-001 October 25, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 10 99a 38 July 17, 2001 NetWare Migration Wizard 6 NOTE: Additional Readme information is available at the end of the NetWare Migration Wizard 6 installation. Once Migration Wizard is installed, you can also view the Readme before you launch the wizard by clicking Start > Programs > Novell > NetWare Migration Wizard > NetWare Migration Wizard Readme.
-
Manual 44 NetWare 6 Readme NetWare 6 Readme 103-000171-001 October 25, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 11 99a 38 July 17, 2001 NetWare WebAccess Do Not Run NetWare WebAccess and Novell Portal Services on Same Server NetWare WebAccess and Novell Portal Services cannot be run simultaneously on the same server. NetWare WebAccess is based on Novell Portal Services technology. Therefore, the limitation of not being able to run two instances of Novell Portal Services on the same server also applies when attempting to run NetWare WebAccess and Novell Portal Services on the same server.
-
Manual 46 NetWare 6 Readme NetWare 6 Readme 103-000171-001 October 25, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 12 99a 38 July 17, 2001 NetWare Web Manager Upgrading Products Accessible through NetWare Web Manager If you are upgrading products accessible through NetWare Web Manager, new configuration files will be written out and the old configuration files will be backed up in their current location. A “_BKddd” (where ddd is a number) will be appended to the old configuration file. For example, MAGNUS.CONF will become MAGNUS.CONF_BK000. If another installation is done on top of this one, MAGNUS.
-
Manual 48 NetWare 6 Readme NetWare 6 Readme 103-000171-001 October 25, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 13 99a 38 July 17, 2001 NetWare Web Search Server Web Search and Web Server Interaction The NetWare Web Search installation program automatically detects and registers itself with both the Apache and Enterprise Web servers if they are installed on your server. However, the NetWare Web Search Manager (AdminServlet) will be registered only with the Apache Web server, which is the Web server used by all NetWare Web administration utilities (such as NetWare Web Manager and NetWare Remote Manager).
-
Manual 99a 38 July 17, 2001 To fix this problem so that all available indexes display on the search page, either use the templates that ship with the newer Web Search (located in the \NSearch\Templates\Samples directory) or make the following changes to the SEARCHTEMPLATE.HTML file that you are currently using as your search page: 1. Change $$BeginCollectionsLoop to $$BeginServerCollectionsLoop. 2. Change $$EndCollectionsLoop to $$EndServerCollectionsLoop.
-
Manual 14 99a 38 July 17, 2001 Novell Advanced Audit Service Default Configuration NAAS is not supported a mixed network environment containing NDS® 6.x, 7.x, and 8.x. NAAS enables auditing only for NetWare servers that are running in pure NDS (Novell eDirectoryTM) 8.x networks. It does not audit NetWare servers running NDS 8.x even if they are part of a mixed network running NDS versions earlier than NDS 8.x. Therefore, you should install and configure NAAS only in networks solely running NDS 8.x.
-
Manual 99a 38 July 17, 2001 The default configuration utility can make a user Auditor for only one partition. To make the same user an Auditor for more than one partition, do the following: Manually configure NAAS. Grant the auditor Read and Compare rights to the LDAP Server attribute for the partition containing the User object. Grant the auditor Read and Compare rights to the LDAP:keyMaterialName attribute for the partition containing the User object.
-
Manual 99a 38 July 17, 2001 Loading the Shims If all three NAAS Shims are required to be loaded, the load order should be FSSHIM.NLM NSSSHIM.NLM DSSHIM.NLM eDirectory Auditing Auditing is not enabled for the following events in Novell eDirectory: DSE ADD MEMBER DSE DELETE MEMBER If the NetWare server hosts two partitions and the server partition is a child partition of the other, only the server partition is audited.
-
Manual 54 NetWare 6 Readme NetWare 6 Readme 103-000171-001 October 25, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 15 99a 38 July 17, 2001 Novell Certificate Server Novell Certificate Server Dependencies The Certificate Server ConsoleOneTM snap-in has the following dependencies: Client NICI 2.0.2 or later for Windows Novell LDAP SDK Novell ClientTM version 4.8 or later for Windows NT/2000, or Novell Client version 3.
-
Manual 99a 38 July 17, 2001 Browser Support You must use the Internet Explorer 5 or later or the Netscape Navigator 4 or later browser to use the certificates generated by Novell Certificate Server for SSL or LDAP connections. Older browsers are not supported.
-
Manual 16 99a 38 July 17, 2001 Novell Client for Windows See the Novell® ClientTM Readme (http://www.novell.com/documentation/lg/ noclienu/index.html) for issues related to the Novell Client for Windows 95/ 98 and Novell Client for Windows NT/2000.
-
Manual 58 NetWare 6 Readme NetWare 6 Readme 103-000171-001 October 25, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 17 99a July 17, 2001 38 Novell Cluster Services This chapter contains the following subsections: “Installation/Upgrade Issues” on page 59 “Other Issues” on page 60 Installation/Upgrade Issues Perform Cluster Pre-upgrade from an NT Workstation You must run the Deployment Manager option to prepare your cluster for an upgrade from an NT workstation rather than from a Windows 9x workstation. Also ensure that your cluster-enabled volumes are in the Running state.
-
Manual 99a 38 July 17, 2001 NSS volume corruption occurs if all of the following conditions exist on your system: The Prepare a Novell Cluster for Upgrade option in the Deployment Manager was run and completed. At least one of the NetWare 5 servers in the cluster was upgraded to NetWare 6. One of the NetWare 5 servers not yet upgraded was rebooted and an attempt was made on that server to create a traditional partition using NWCONFIG.
-
Manual 99a 38 July 17, 2001 Do Not Use the Prepare Volume for Use by Novell Cluster Services Option in NetWare Remote Manager If you are using NetWare Remote Manager to create NSS pools and volumes to use in your cluster, do not check the Prepare Volume for Use by Novell Cluster Services check box. This feature does not work and will not correctly cluster enable your newly created pool or volume.
-
Manual 62 NetWare 6 Readme NetWare 6 Readme 103-000171-001 October 25, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 18 99a 38 July 17, 2001 Novell Compatibility Mode Driver There is no control on the Designated Router Election process. To make any migration agent a Designated Router, use INETCFG to assign it the highest priority IP Address.
-
Manual 64 NetWare 6 Readme NetWare 6 Readme 103-000171-001 October 25, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 19 99a 38 July 17, 2001 Novell eDirectory 8.6 for NetWare Installing into an Existing Tree With this release, you cannot install a NetWare 6 server into a partition that has all of its replicas on a NetWare 4 server if that server will get a replica of the partition. If you are installing into a tree that has NetWare 5 servers, each NetWare 5.0 server must be running NetWare 5.0 Support Pack 6a (http:// support.novell.com/misc/patlst.htm#nw) or later. Each NetWare 5.
-
Manual 99a 38 July 17, 2001 Additional Readme Information For information on additional eDirectory issues for this release, see TID #10063534 (http://support.novell.com) in the Novell Support Connection Knowledgebase.
-
Manual 20 99a 38 July 17, 2001 Novell GroupWise In order to use GroupWise® 5.5 Enhancement Pack WebAccess on NetWare® 6, you must download and install the WebAccess 5.5 EP SP4 Rev 3 patch or later (FWAEP4C.EXE, FWAEP4D.EXE, etc.) available from Novell Support Connection® Patches and Files (http://support.novell.com/filefinder). The patch is a prerelease version (Field Test File) of GroupWise 5.5 Enhancement Pack Support Pack 4. Your system must be running GW 5.5 SP3a before you can install this patch.
-
Manual 68 NetWare 6 Readme NetWare 6 Readme 103-000171-001 October 25, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 21 99a 38 July 17, 2001 Novell iFolder Selecting the Pre-migration Server Option If you install iFolder via a Custom installation of the Pre-migration server option available in NetWare 6, make sure NetWare Web Manager is also selected to be installed. You will need to reboot your server after the installation in order for iFolder to work properly.
-
Manual 99a 38 July 17, 2001 Apply the iFolder Patch 1 Go to the Novell Support Web site (http://support.novell.com) and click Patches and Files. 2 Enter IFLDRCLA.EXE The A is a variable and will change as the iFolder client is updated. 3 Double-click IFLDRCLA.EXE to begin the download process. Creating a User Account Before you can access your iFolder files from the iFolder Web site, you must first download and install the iFolder client and then log in.
-
Manual 22 99a 38 July 17, 2001 Novell International Cryptographic Infrastructure (NICI) Some of the ConsoleOneTM snap-ins for NetWare® 6 require the NICI Client. To use those snap-ins, you must install NICI on every workstation where you will use ConsoleOne. IMPORTANT: Two versions of NICI are provided for Windows platforms: 1.5.7 and 2.0.2. We recommend that you install both versions. NICI 1.5.7 is implemented as a kernel driver and NICI 2.0.2 is implemented as a shared DLL.
-
Manual 72 NetWare 6 Readme NetWare 6 Readme 103-000171-001 October 25, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 23 99a 38 July 17, 2001 Novell Modular Authentication Service (NMAS) NICI Client You must have the NICI Client installed on each client that will run ConsoleOneTM and NMAS. See “Novell International Cryptographic Infrastructure (NICI)” on page 71 for more information.
-
Manual 99a 38 July 17, 2001 4 Configure the BorderManager services to use the Login Policy Object. Refer to the Border Manager documentation (http://www.novell.com/ documentation/) for details. 5 Run the NMAS installation from the server-side GUI. 6 Reinstall any NMAS Methods and re-create any NMAS login sequences. Simple Password and Force Password Change The Simple Password method is used for various authentication services in NetWare 6.
-
Manual 24 99a 38 July 17, 2001 Novell Native File Access Protocols This chapter contains the following subsections: “General Issues” on page 75 “Macintosh / AFP Issues” on page 78 “Windows / CIFS Issues” on page 80 “UNIX / NFS Issues” on page 82 General Issues Update NetWare 5 Servers Running NMAS before Installing Novell Native File Access Protocols Before installing Novell Native File Access Protocols (as part of the NetWare 6 installation or otherwise), all NetWare 5 servers (in the tree)
-
Manual 99a 38 July 17, 2001 Uninstalling the Software To remove the software, complete the following steps on each server running Novell Native File Access Protocol software. 1 Run Native File Access for Macintosh* (AFP) Uninstall using NWCONFIG or the GUI Uninstall. Reboot the server or unload the AFPTCP.NLM (AFPSTOP.NCF). 2 Run Native File Access for Windows (CIFS) Uninstall using NWCONFIG or the GUI Uninstall. Reboot the server or unload the CIFS NLMTM programs (CIFSSTOP.NCF).
-
Manual 99a 38 July 17, 2001 Possible Login Error If you encounter a login error while connecting to the server from a Macintosh or Windows workstation, run ConsoleOne and verify that the Simple Password, LSMCIFS, and LSMAFP login sequences are installed. If the sequences are not installed, do the following: 1 Run ConsoleOne and locate the Security container. 2 Double-click the Security container. 3 Right-click the Login Policy icon and click Properties > New Sequence.
-
Manual 99a 38 July 17, 2001 Macintosh / AFP Issues AppleTalk Not Supported as a Transport Protocol The legacy AppleTalk* protocol stack is not supported as a transport protocol in this version of Novell Native File Access Protocols for Macintosh. AppleTalk migration is targeted for a subsequent release. Older Mac applications that have unique dependencies upon AppleTalk as a transport protocol must be updated to a version that is known to work over TCP/IP.
-
Manual 99a 38 July 17, 2001 Mac OS 8.x Will Not Mount Volumes Checked to Mount at Startup Mac OS 8.x will not mount volumes checked to mount at startup. To resolve this, add the server volume's alias to the StartUp Items folder inside the System Folder on the Mac's local startup disk. Drag a NetWare Folder to the Trash and Errors Occur When you drag a NetWare folder to the trash, an error occurs because it is unable to leave the item in the trash and it will delete it immediately.
-
Manual 99a 38 July 17, 2001 Volume ID You might get pervasive errors in a clustered AFP environment when the volume ID is set to higher than 32. To eliminate these errors, use ConsoleOne to edit the cluster AFP/TCP volume resource and change the volume ID to 32 or lower. Remember to make the value you choose unique from other volume IDs. Windows / CIFS Issues Problem with Microsoft Patch Microsoft recently released a patch to its Windows NT 4.
-
Manual 99a 38 July 17, 2001 Password Changes Trying to change a password from a Windows 9x or NT4 client workstation might fail if the default network username and password in the client's cache is not a valid combination on the CIFS server where the password change was attempted. To avoid this problem, validate the username and password combination in the client's cache on the CIFS server before attempting the password change.
-
Manual 99a 38 July 17, 2001 MS Paint "Out of Memory" Error CIFS users might occasionally see an Out of Memory error when using MS Paint on a Windows NT workstation. This error message is incorrect and no processes are out of memory. The error message will disappear if the data file is first saved to local storage and then copied to the remote storage directory. UNIX / NFS Issues Upgrade Issues Before beginning an upgrade from NetWare 5.0 with NetWare NFS Services 2.
-
Manual 99a 38 July 17, 2001 When Native File Access for UNIX is installed, the nfsstart entry is added to AUTOEXEC.NCF, so the services are not automatically available after installation. To make Native File Access for UNIX available, run nfsstart after installation or reboot the server. ConsoleOne If you administer NFS exports of multiple servers and switch between them, it is possible that the data you view is for the previous server.
-
Manual 99a 38 July 17, 2001 Traditional volumes can be mounted only using NFS version 2. Even though showmount shows the volumes as exported, they are not mountable using NFS version 3. You need to explicitly mount the exported traditional volumes specifying the mount version as 2.
-
Manual 25 99a 38 July 17, 2001 Novell NetDrive NetDrive supports HTTPS for WebDAV only on Windows NT 4.0 and Windows 2000 workstations. If your NetDrive client is behind a firewall regulated by a BorderManagerTM server that is configured for FTP proxy and authentication, NetDrive cannot map a network drive via FTP to any servers that reside outside the firewall. To solve this problem, disable the FTP proxy authentication on the BorderManager server.
-
Manual 86 NetWare 6 Readme NetWare 6 Readme 103-000171-001 October 25, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 26 99a 38 July 17, 2001 Novell NetStorage Changing iFolder IP Address after NetStorage Installation If you change the iFolderTM server IP address, DNS name, or port number after NetStorage has been installed, you must either reinstall NetStorage or edit the XSYNCNSP\IFOLDER SERVER registry setting to reflect the change. NetStorage will not function properly without this change.
-
Manual 99a 38 July 17, 2001 Internet Explorer Unable to Open Some Web Folders If you use Microsoft Web Folders with NetStorage to create a new folder, you might not be able to open that folder using Internet Explorer. Hosts File Not Usable by NetStorage NetStorage cannot use the SYS:\ETC\HOSTS file to resolve DNS names. If you have applications that can use DNS names (such as iFolder), your DNS names must be registered with a valid DNS server which is identified in the SYS:\ETC\RESOLVE.CFG file.
-
Manual 27 99a 38 July 17, 2001 Novell Storage Services Previous NSS Volumes Not Automatically Upgraded Previous NSS volumes are not automatically upgraded during the NetWare 6 installation process. After you install NetWare and reboot the server, you can upgrade previous NSS volumes to the current NSS volume layout. Before you upgrade previous NSS volumes, you must ensure that NDS® is up and running and that the Backlink process is complete.
-
Manual 99a 38 July 17, 2001 Modifying a Volume’s NDS Object When Converting Volumes You can convert traditional volumes to NSS volumes after you upgrade to NetWare 6. The following is an example of using the volume conversion utility (VCU) when you want to modify the volume’s NDS object: vcu TRAD NSSPOOL provo_tree\novell\provo ds_poolname ds_volName DS tree: provo_tree DS context:provo.
-
Manual 28 99a 38 July 17, 2001 Novell TCP/IP Missing INETCFG Information If any information is missing from INETCFG after a new installation, it is because no information was uploaded to the TCPIP.CFG file. Similarly, if INETCFG information is missing or you get configuration error messages after an upgrade, it is because no new information was uploaded to the TCPIP.CFG file and some entries have become invalid. In either case, delete the SYS:/ETC/TCPIP.CFG file and reconfigure through INETCFG.
-
Manual 99a 38 July 17, 2001 Load Balancing Load balancing might not work when all the clients’ IP address are mapped to a single server NIC and all the clients start data transfer simultaneously. Multihoming might not work in some cases where the hosts are supernetted. Viewing Bindings You can discover and load drivers using NWCONFIG and subsequently bind the boards to IP addresses through INETCFG. However, NWCONFIG does not show the bindings.
-
Manual 29 99a 38 July 17, 2001 Pervasive.SQL Pervasive.SQL 2000 Database Licenses A permanent two-user license is installed during the NetWare 6 installation process. If you are upgrading an existing NetWare server, an unlimited license that will expire 90 days after installation is also installed. The permanent two-user license is intended for use by the NetWare operating system. If you have additional applications using Pervasive.SQL 2000 or Pervasive.
-
Manual 99a 38 July 17, 2001 Known Issues So that Pervasive can update known issue reports periodically between releases, all Known Issues are now published in the Pervasive Knowledge Base (http://support.pervasive.com/eSupport/). Search on "Pervasive.SQL 2000 Service Pack 3 known issues". You can also see a static list of known issues, including links to the associated Knowledge Base articles, at their Fixed Defects and Known Issues Web page (http://www.pervasive.com/support/updates/psql2kfixed.asp).
-
Manual 30 99a 38 July 17, 2001 Scripting Products Scripting Products Included The following scripting products are included with NetWare 6. Readme information can be found at the links provided. Novell Script for NetWare (NSN) (http://www.developer.novell.com/ ndk/nscript.htm#readme) Perl for NetWare (http://www.developer.novell.com/ndk/ perl5.htm#readme) NetBasic* 6.0 (http://www.developer.novell.com/ndk/nb6.htm#readme) Universal Component System (UCS) (http://www.developer.novell.
-
Manual 99a 38 July 17, 2001 Novell Script Pages Novell® Script Pages (NSP) prevents any NSP page from being uploaded and executed without the execute bit set on the NSP file itself or on the parent directory. To mark an NSP file or directory with the execute bit, do the following: 1 Access NDS® from the NetWare Web Manager General Administration page. 2 Navigate to the NSP file or directory and display the access control rights for that object. 3 Check the Execute check box and save your changes.
-
Manual 31 99a 38 July 17, 2001 Storage Management Services (SMS) This chapter contains the following subsections: “Backup and Restore Issues” on page 97 “Client Issues” on page 98 “Other Issues” on page 99 Backup and Restore Issues Update SMS Components A new release of Storage Management Services (SMS) is available at the Novell Support Web site (http://support.novell.com). This release contains important fixes to the SMS components delivered with NetWare 6.
-
Manual 99a 38 July 17, 2001 Exclude/Include Options for Workstation Restore When Exclude/Include options are set for a workstation restore, only the selected data sets are restored. The log file and the status window of the session reports incorrect status. All the data sets are reported as restored, whereas only the data sets matching the specified options are actually restored. Hard Links Not Supported by NSS in NetWare 6 Hard links are not supported by NSS in NetWare 6.
-
Manual 99a 38 July 17, 2001 If you need to assign a security policy to a group, do the following: Return to the Administrative Tools window and click Local Security Policies > Local Policies > User Rights Assignment. The list of policies and the local and effective settings are displayed. Double-click Act As Part of the Operating System Security Policy to display the Local Security Policy Setting dialog box.
-
Manual 100 NetWare 6 Readme NetWare 6 Readme 103-000171-001 October 25, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 32 99a 38 July 17, 2001 Third-Party Adapters, Drivers, and Applications Using Virus Scan Software with NetWare 6 When performing virus scans with Norton or McAfee software, you must exclude the protected NSS volume named _ADMIN. Otherwise, the server will abend. ISA Adapters Are Not Supported on NetWare 6 For performance and scalability reasons, all ISA adapter drivers have been removed from NetWare 6.
-
Manual 99a 38 July 17, 2001 Suggested LAN Driver Substitution In some cases there are no substitutes for LAN drivers. For example, Compaq no longer supports the Netflex 3 LAN hardware associated with the CPQNF3.LAN driver. 3Com provides limited support for their 3c90x LAN card line to LAN cards starting with the 3c905b hardware and beyond. Unsupported versions of these drivers are located on the NetWare 6 Operating System CD and can be installed in the NWSERVER\DRIVERS\UNSUPDRV directory.
-
QuickStart Rev 99a 44 August 22, 2001 To begin a QuickStart (English): Click in the box under the word Novell. Insert QuickStart and Title elements. 2. Type the product name. 3. Insert the HeadQS element and type the title of your card. 4. Put in your product version: Click Special > Variable > select the variable named Version > Edit Definition > enter the version number > click Done > Done. It will appear as background text replacing Version X.X.
-
QuickStart Rev 99a 44 August 22, 2001 UPGRADE SYSTEM REQUIREMENTS The server to be upgraded must be running one of the following: NetWare 5.1 with Support Pack 2 or later NetWare 5 with Support Pack 6 or later NetWare 4.2 with Support Pack 8 or later NetWare 4.
-
QuickStart Rev 99a 44 August 22, 2001 IP address and domain names (required for connecting to the Internet): An IP address An IP address of a domain name server The name of your domain Network board and storage device properties, such as the interrupt and port address (required if not included in NetWare) PREPARE THE NETWORK 1 Run NetWare Deployment Manager (NWDEPLOY.EXE), located on the NetWare 6 Operating System CD. 2 Complete all relevant tasks in the Prepare the Network section.
-
QuickStart Rev 99a 44 August 22, 2001 5 Set up Domain Name Service (DNS). 6 Set the server time zone. 7 Set up Novell eDirectory. 8 License the NetWare server. SELECT AND INSTALL ADDITIONAL PRODUCTS Additional installation screens will appear depending on the products you select. 1 Set up Novell Certificate Server. 2 Configure LDAP. 3 Install Novell Native File Access Protocols. 4 Set up NetWare WebAccess. 5 Set up Novell iManage. 6 Install Novell iFolderTM. 7 Install Novell NetStorage.
-
QuickStart Rev 99a 44 August 22, 2001 WHAT’S NEXT? Although you have installed or upgraded to NetWare 6, you might need to configure products to work in the new environment. Additionally, some products such as Novell Cluster ServicesTM can be set up only after completing the server installation. You can install products using NetWare Deployment Manager or from the GUI server console screen. Copyright © 2001 Novell, Inc. All rights reserved.
-
NetWare 6 Overview and Installation Guide Novell NetWare 6 ® www.novell.
-
Manual 99a 38 July 17, 2001 Contents Preface 9 Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 User Comments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 1 Welcome to NetWare 6 11 Make End Users More Effective with NetWare 6 . . . . . . . . . . . . . . . . . . . Eliminate Client Software with Novell Native File Access Protocols . . . . . . . . Print from Anywhere with Novell iPrint . . . . . . . . . . .
-
Manual 99a July 17, 2001 38 Migrate Network Data to another Server with NetWare Migration Wizard . Use Other Installation Options to Simplify the Move to NetWare 6 . . . . Let’s Get Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Step 1: Decide What Solutions You Want . . . . . . . . . . . . . . . . . Step 2: Install or Upgrade to NetWare 6 . . . . . . . . . . . . . . . . . . 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
-
Manual 99a Installing Networking Protocols . . . . . . . . . . . . . . . . About Internet Protocol (IP). . . . . . . . . . . . . . . . . About IPX . . . . . . . . . . . . . . . . . . . . . . . . . . Using Both IP and IPX . . . . . . . . . . . . . . . . . . . Setting Up Domain Name Service . . . . . . . . . . . . . . . Configuring a NetWare Server as a DNS Server (Optional) Setting the Server Time Zone . . . . . . . . . . . . . . . . . Setting Up Novell eDirectory . . . . . . . . . . . . . . . . . .
-
Manual 8 99a 38 NetWare 6 Overview and Installation Guide NetWare 6 Overview and Installation Guide 100-004725-001 August 30, 2001 Novell Confidential July 17, 2001
-
Manual 99a 38 July 17, 2001 Preface This book is divided into the following sections: Chapter 1, “Welcome to NetWare 6,” on page 11 explains the features and benefits of NetWare 6. It also includes descriptions of products that ship with NetWare 6 and how they add value to your network. Chapter 2, “Setting Up NetWare 6,” on page 27 explains the prerequisites and instructions for installing a NetWare 6 server.
-
Manual 99a 38 July 17, 2001 User Comments We want to hear your comments and suggestions about this manual and the other documentation included with NetWare 6. To contact us, send e-mail to webdoc@novell.com or send comments to: Novell, Inc.
-
Manual 1 99a July 17, 2001 38 Welcome to NetWare 6 NetWare® 6 provides your business and your network with new solutions, updated products, and rock-solid applications that give you the power to change. NetWare 6 is the Net services software solution that adds tremendous value to your company’s ability to communicate on your network and on the Internet.
-
Manual 99a 38 July 17, 2001 got access to servers on your network. No more client configuration. No more client software. No more problems. For more information, see the Novell Native File Access Protocols Installation and Administration Guide. NetWare Server IP CIFS AFP NFS Windows MAC UNIX Print from Anywhere with Novell iPrint Novell iPrint allows mobile employees, business partners, and customers to access printers from a variety of remote locations using existing Internet connections.
-
Manual 99a July 17, 2001 38 Office Laptop John Home Novell iFolder Server John Home LDAP Directory Home John Home John Home Kathy Home Your iFolder Files through a Browser Sam Home Use Novell NetStorage to Access Files with an Internet Browser Novell NetStorage provides simple Internet-based access to file storage and serves as a bridge between a company's protected Novell network and the Internet.
-
Manual 99a 38 July 17, 2001 Access Internet Services from a Centralized Location with NetWare WebAccess NetWare WebAccess allows administrators to set up a Web page that lets users access multiple network resources from their Web browser. Users do not need a Novell Client or VPN client to access to their resources. They can access these resources on the Web from any computer with a compliant browser. Customized content is provided through gadgets.
-
Manual 99a July 17, 2001 38 For more information about NetWare Remote Manager, see the NetWare Remote Manager Administration Guide. Manage eDirectory Objects from an Internet Browser with iManage iManage runs in an Internet browser and is used for administering, managing, and configuring Novell eDirectory objects. iManage lets you assign specific tasks or responsibilities to users and presents users with only the tools (and accompanying rights) necessary to perform those tasks.
-
Manual 99a 38 July 17, 2001 Novell ConsoleOne For more information, see the ConsoleOne 1.3 User Guide. Manage IP Addresses with the Novell DNS/DHCP Administration Tool The DNS/DHCP Administration Tool runs in an Internet browser and enables network administrators to easily configure and manage DNS (Domain Name System Service) and DHCP (Dynamic Host Configuration Protocol Service). For more information, see the Novell DNS/DHCP Services Administration Guide.
-
Manual 99a July 17, 2001 38 Internet Laptop PC Firewall Net Services Web Sevices iFolder iLogin iPrint Tomcat Servlet Engine eFrame Web Search Enterprise Web Server etc. Portal Services Apache Web Server HTTP Stack NetWare NetWare 6 lets you manage documents with WebDAV, transfer files using FTP, and communicate with HTTP. For more information, see Getting Results with Novell Web Services.
-
Manual 99a 38 July 17, 2001 Publish Web Pages with NetWare Enterprise Web Server The NetWare Enterprise Web Server is optimized to run in the NetWare environment. It serves up Web pages to the Internet, an intranet, or an extranet. Use the NetWare Enterprise Web Server to communicate across departments or throughout the world. Let customers, suppliers, vendors, or consultants access specific information.
-
Manual 99a July 17, 2001 38 Track Network Usage with Novell Advanced Audit Service Novell Advanced Audit Service (NAAS) is an Novell eDirectory enabled robust, flexible, and scalable auditing framework. It can audit services, both Novell and third-party, and can provide a single, unified view of audit data for the entire Net. It provides a single point of management by storing configurable audit policies in eDirectory.
-
Manual 99a July 17, 2001 38 Novell Cluster Services allows you to configure up to 32 NetWare servers into a high-availability cluster, where resources can be dynamically switched or moved to any server in the cluster. Resources can be configured to automatically switch or be moved in the event of a server failure, or they can be moved manually to troubleshoot hardware or balance the workload.
-
Manual 99a July 17, 2001 38 Manage Disk Storage Devices with Novell Storage Services Novell Storage Services (NSS) is a file storage and management system that meets the needs of your growing file system requirements. NSS can take free space from multiple storage devices and create unlimited volumes which can store up to 8 trillion files (each up to 8 terabytes in size). You can quickly mount as many as 255 volumes.
-
Manual 99a 38 July 17, 2001 Back up Data with Storage Management Services Storage Management ServicesTM (SMSTM) is the data protection system for all your storage requirements. SMS allows backup and restore of targets such as eDirectory, the file system, or an individual workstation's hard disk onto a tape device that can be stored offsite. If you have a hardware failure, corrupted data, or incorrectly deleted or changed data, you can recover a previous version of the data.
-
Manual 99a July 17, 2001 38 segments. The Migration Agent is used to migrate systems from IPX to IP in a phased manner without losing connectivity. For more information, see the Server Communications Administration Guide. Reduce Deployment Costs with NetWare 6 NetWare 6 includes several options that help you install a new server, upgrade a legacy NetWare server, or migrate from a Windows NT* server.
-
Manual 99a 38 July 17, 2001 Use Other Installation Options to Simplify the Move to NetWare 6 Several other options are also available to help you install or upgrade to NetWare 6. Quickly upgrade with NetWare Accelerated Upgrade—You can run NetWare Accelerated Upgrade from a Windows client workstation so that you don’t need to be physically present at the server console.
-
Manual 99a July 17, 2001 38 Installation Option Refer to Add a NetWare 6 server to an existing network Chapter 2, “Setting Up NetWare 6,” on page 27 Upgrade from NetWare 3, NetWare 4, or NetWare 5 Chapter 3, “Upgrade to NetWare 6,” on page 87 Migrate data from another NetWare server or NT Server NetWare Migration Wizard 6 Administration Guide Use advanced installation/ upgrade options Other Installation Options All this information is available on the NetWare 6 Online Documentation CD included
-
Manual 26 99a 38 NetWare 6 Overview and Installation Guide NetWare 6 Overview and Installation Guide 100-004725-001 August 30, 2001 Novell Confidential July 17, 2001
-
Manual 2 99a July 17, 2001 38 Setting Up NetWare 6 This chapter describes how to set up a NetWare® 6 server.
-
Manual 99a 38 July 17, 2001 A Super VGA display adapter A DOS partition of at least 200 MB and 200 MB available space 2 GB of available disk space outside the DOS partition for volume SYS: One network board A CD drive A USB, PS/2*, or serial mouse (recommended but not required) Recommended System Requirements For optimal performance, NetWare 6 has the following recommended system requirements: A server-class PC with two-way Pentium III 700 MHz or higher processors NOTE: NetWare 6 can run
-
Manual 99a July 17, 2001 38 Supervisor right to the container where the server will be installed Read right to the Security container object for the eDirectory tree DOS and CD drivers (required if the computer does not boot from CD) You can make a bootable floppy diskette using the MKFLOPPY.BAT program located in the INSTALL directory of the NetWare 6 Operating System CD. Client connection utilities (optional, for installing from a network): Novell ClientTM for DOS and Windows* 3.
-
Manual 99a 38 July 17, 2001 Preparing the Network Before you introduce a NetWare 6 server into an existing network, you must run NetWare Deployment Manager to update the network. To update the network for NetWare 6, you must do the following: 1 Log in from a Windows 95/98 or Windows NT/2000 workstation to your existing network as a user with the Supervisor right.
-
Manual 99a 38 July 17, 2001 5 Run the View and Update eDirectory Version program to update eDirectory as required. HINT: If you are prompted to log in again while running NetWare Deployment Manager, you can enter the IP address of the server by clicking Details. 6 Run the Prepare for eDirectory program to extend the network schema.
-
Manual 99a 38 July 17, 2001 7 (Conditional) If you are upgrading a cluster of NetWare servers, run the Prepare a Novell Cluster for Upgrade program. 8 (Conditional) If you are upgrading a NetWare 5 server running NDS® 7 that has NSS volumes, run the Prepare a Server with NDS 7 and NSS program. 9 Follow the instructions in the Update Certificate Authority (CA) Object step to create or update a Security container object and a Certificate Authority (CA) object.
-
Manual 99a July 17, 2001 38 Preparing the Computer To prepare your computer for NetWare 6, do the following: Install computer and networking hardware Create and format a DOS partition Access the installation files Installing Computer and Networking Hardware Follow the manufacturer’s instructions to install and connect the network board and network cabling to your computer. Make sure that all storage devices are properly attached to storage adapters.
-
Manual 99a 38 July 17, 2001 diskette. DOS 7 and all required DOS utilities are included on the diskette and on the CD. 5 If the computer already has an operating system installed, such as Windows or NetWare, you should completely remove the partitions and the operating system. Use FDISK to remove partitions. 6 Use FDISK to create an active DOS partition by entering FDISK. Create a primary DOS partition and make it the active partition. See “System Requirements” on page 23 for minimum requirements.
-
Manual 99a July 17, 2001 38 Installing the Software To begin the installation, complete the following steps. 1 Insert the NetWare 6 Operating System CD, or log in to the network to access the installation files on the network. 2 At the CD drive or network drive prompt, enter INSTALL. Navigating in the Character-Based Screens The initial screens of the installation program display in text-based mode. Auto-detected and default settings appear on each screen.
-
Manual 99a 38 July 17, 2001 Selecting the Language and Accepting the License Agreement The installation program is available in several languages. You can install other language options, such as the language for the operating system or for users, later during the installation program. Accepting each License Agreement means that you have read and you accept terms and conditions contained in the License Agreement. Press F10 to accept.
-
Manual 99a 38 July 17, 2001 New Server, Upgrade or Pre-Migration Server You can install NetWare on a new computer or you can upgrade an existing computer running NetWare 4 or NetWare 5. New Server—Installs a new server. Creates a new NetWare partition but does not delete system partitions or other partitions such as DOS, UNIX*, or Windows. If you select Express Installation, you can skip to “Naming the Server” on page 46.
-
Manual 99a 38 July 17, 2001 Specifying Server Settings You can change the following default server settings for your networking environment. Server ID Number—A unique server identification number (up to eight hexadecimal digits) identifies the server on the network. The server ID number functions like an internal IPX number.
-
Manual 99a 38 July 17, 2001 Selecting the Regional Settings Choose the country, code page, and keyboard mapping for your language and computer.
-
Manual 99a 38 July 17, 2001 Mouse Type—Choose a mouse type, if available on the computer. The installation program supports USB, PS/2 and serial mouse types, but a mouse is not required. Video Type—The NetWare installation program is optimized to display with video display hardware that is VESA 2 compliant. NOTE: The video type is not auto-detected by the installation program. You must select the settings for the computer.
-
Manual 99a July 17, 2001 38 To delete a driver, in the Options box select Modify. Select the driver field and press Enter. Select the driver to delete and press Delete. To modify a driver, in the Options box select Modify. Select the driver field and press Enter. Select the driver to modify and press Enter. Select the property to modify.
-
Manual 99a 38 July 17, 2001 Editing the Properties of the Storage Adapter (If Required) The storage adapter must be installed and configured correctly. Properties such as interrupt, port value, and slot must not conflict with any other device in the computer. If you need specific storage adapter properties, contact the storage adapter manufacturer.
-
Manual 99a July 17, 2001 38 Selecting a Storage Device Storage devices such as hard disks, CD drives, and tape devices require a software driver to communicate with the storage adapter. The software driver for the storage device is called a custom device module (CDM). Each type of storage device requires a CDM. The installation program auto-detects many types of storage devices, such as IDE drives, SCSI drives, CD drives, and tape drives.
-
Manual 99a 38 July 17, 2001 Creating a NetWare Partition and Volume SYS: Partitions correspond with operating systems, such as NetWare, DOS, or UNIX. Partitions divide a large storage region into smaller, more manageable sections. A single storage device can contain up to four partitions. You can divide NetWare partitions into smaller sections called volumes. Each NetWare partition can contain up to eight volumes.
-
Manual 99a 38 July 17, 2001 When removing volume SYS: during a new server installation, you must choose one of the following options: Replace Volume SYS: and its NetWare Partition—This removes the existing volume SYS: as well as the entire NetWare partition containing volume SYS:. Any volume that is part of the NetWare partition that contains volume SYS: is also removed—even if the volume spans to other NetWare partitions.
-
Manual 99a 38 July 17, 2001 Volume SYS: Size—The size that you specify for the NetWare partition will be used for the size of volume SYS:. To modify the volume SYS: size, in the Options box select Modify. Select the appropriate storage device. Select the NetWare Partition Size field and press Enter. Backspace over the current size. Type the new size and press Enter. The size of volume SYS: will change accordingly. Press F10 to save the settings and continue.
-
Manual 99a July 17, 2001 38 Although a mouse is recommended, you can use the keyboard commands in Table 1 to navigate through the installation program. Use the arrow keys on the numeric keypad for cursor movements. HINT: NumLock (number lock) must be on in order for cursor movements to be enabled on the keypad.
-
Manual 99a 38 July 17, 2001 Keystroke Action Hold Shift while pressing keypad Accelerate cursor movement Keypad 5 Select or click an object Keypad 0 Lock a selected object (for dragging) Keypad . (period) Unlock a selected object (to drop) Keypad + (plus) Double-click an object Alt+F7 Move to next window Alt+F8 Move to previous window Enabling Cryptography Some technologies require the use of cryptography. To enable cryptography, you must provide a cryptographic file (.
-
Manual 99a July 17, 2001 38 Installing the NetWare Server File System The server should now have a NetWare partition and one volume named SYS:. If you have space available for creating additional partitions and volumes, you can create them now. NOTE: If you have allocated all available space to volume SYS:, you will not be prompted for NetWare server file system information. You can skip to “Installing Networking Protocols” on page 53.
-
Manual 99a 38 July 17, 2001 Creating Volumes Volumes are created from free space. A large disk can be divided into several volumes during installation. Conversely, a volume can be distributed over multiple disks. WARNING: Creating a volume that spans two or more storage devices is not recommended. If a volume spans disk devices and one of the devices fails, all data on the entire volume could be lost.
-
Manual 99a 38 July 17, 2001 To create a volume, select Free Space and click Create. Type the name of the volume and click OK. To allocate only a portion of the selected free space to the volume, type the amount of space to use and click Apply to Volume. Modifying Volumes The size of any existing volume can be increased but not decreased. To decrease the size of an existing volume, the volume must be deleted and recreated.
-
Manual 99a 38 July 17, 2001 Mount Volumes Now—You should mount volumes now if you plan to install additional products and services, such as documentation, on volumes other than volume SYS:. You should also mount volumes that you might be moving forward from a previous NetWare server so they can be updated. Mount Volumes after Installation Completes—If you are installing products and services on volume SYS: only, you can wait to mount volumes after the installation program completes.
-
Manual 99a 38 July 17, 2001 Installing Networking Protocols NetWare 6 can process IP (Internet Protocol) network packets and traditional IPX (Internetwork Packet ExchangeTM) packets. Both protocols can be assigned to a single network board, which allows the server to communicate using IP and IPX. To install IP, click a network board and then check the IP check box. Enter the required IP information. To install IPX, click a network board and then check the IPX check box.
-
Manual 99a 38 July 17, 2001 About Internet Protocol (IP) Internet protocol (IP) lets your network share data with other IP networks, including the Internet. Using IP requires a unique IP address, a subnet, and a router or gateway address. IP Address—Identifies each device on the network. The address consists of 32 bits, which are represented as decimal values separated by periods, such as 123.45.67.89. If your server will connect to the Internet, you must obtain a unique IP address.
-
Manual 99a 38 July 17, 2001 About IPX Novell’s traditional protocol, Internetwork Packet Exchange (IPX), lets you continue using IPX-based applications. If IPX, but not IP, is installed on your server, it will actively process IPX packets and ignore packets using other protocols, such as IP. During the installation program, existing IPX frame types will be detected. The installation program will detect one of the following conditions.
-
Manual 99a 38 July 17, 2001 HINT: If this server will not be available to the Internet, you can skip this screen and ignore any associated error messages. If you want this server to be available to the Internet, you must enter the following: Host Computer—The simple, readable name on the DNS server that matches this NetWare server’s name (or the name that you have bound to the network board). HINT: Set up the host computer name on the DNS server to use the NetWare server name.
-
Manual 99a 38 July 17, 2001 Configuring a NetWare Server as a DNS Server (Optional) In addition to standard services, a NetWare server can be configured to provide DNS services. The DNS Server setup is done after completing the NetWare server installation. Setting the Server Time Zone The server time and time zone are important in order to synchronize network events. Advanced time synchronization settings are available during the Customize section of the installation.
-
Manual 99a 38 July 17, 2001 Choosing the Type of eDirectory Installation To set up eDirectory, you must choose one of the following options: Install the server into an existing eDirectory tree Create a new eDirectory tree Before completing this task, you should understand the concepts relating to eDirectory trees, containers, and context. Tree Name—The top level of the available network resources and must be unique from other eDirectory tree names on the network.
-
Manual 99a July 17, 2001 38 Install the Server into an Existing eDirectory Tree Installing your server into an existing eDirectory tree incorporates the server into your network. The server can be installed in any Organization (O) or Organizational Unit (OU) container in the eDirectory tree where you have the Supervisor right. You can create containers during the installation program.
-
Manual 99a 38 July 17, 2001 Each eDirectory tree must have a name unique from other eDirectory trees on the network. You will also be prompted to create a user (default name Admin) with the Supervisor right, identify an eDirectory context, and assign a password. Summary Now that you have created a new eDirectory tree or installed the server into an existing eDirectory tree, the NetWare Server object and Volume objects will be installed in the container you specified.
-
Manual 99a 38 July 17, 2001 If you have created a new eDirectory tree, a user (default name Admin) with Supervisor rights to the eDirectory tree will be created in the same eDirectory container as the NetWare Server object. IMPORTANT: Record the administrator password and other relevant information before proceeding. Licensing the NetWare Server NetWare 6 must have a valid license in order to function as a server.
-
Manual 99a 38 July 17, 2001 If prompted, select where in the tree you want to install the license. Install Networking Products After completing the NetWare server portion of the installation, you can select other networking products to install. Other networking products provide enhanced functionality, such as network management and Internet access, to NetWare 6. NOTE: Some products can be installed only by using NetWare Deployment Manager after the server installation is complete.
-
Manual 99a 38 July 17, 2001 Although you can choose which products to install, installing the products that are already selected by default will ensure that you receive the features recommended for NetWare. For more information on NetWare products, see Chapter 1, “Welcome to NetWare 6,” on page 11. Depending on the products selected to be installed, you may need to complete the steps in the following sections.
-
Manual 99a 38 July 17, 2001 Configuring IP-Based Services (Conditional) Make sure that port assignments and addresses do not conflict. Some port number assignments in NetWare 6 can be reassigned from one service to another. Other port numbers cannot be reassigned. For information on default port assignments, which ports can be reassigned, and which ports cannot be reassigned, see "Port Number Assignments" in Getting Results with Novell Web Services.
-
Manual 99a 38 July 17, 2001 Only one Organizational CA object can exist in an eDirectory tree. Once the Organizational CA object is created on a server, it cannot be moved to another server. Deleting and re-creating an Organizational CA object will invalidate any certificates associated with the Organizational CA. Make sure that the server that you intend to permanently host the Organizational CA object and will be a reliable, accessible, and continuing part of your network.
-
Manual 99a 38 July 17, 2001 Configuring LDAP TCP and SSL port numbers can be configured for LDAP services. You can also configure ports after the server installation using ConsoleOne. The default setting for the Allow Cleartext Passwords option (unchecked) disallows cleartext passwords, effectively disabling eDirectory user binds on non-SSL connections. Any sent password, however, is received by the server before the bind fails.
-
Manual 99a 38 July 17, 2001 Installing Novell Native File Access Protocols Novell Native File Access Pack lets Macintosh, Windows, and UNIX workstations access and store files on NetWare servers without having to install any additional software—such as Novell Client software. The software is installed only on the NetWare server and provides "out of the box" network access. Just plug in the network cable, start the computer, and you have access to servers on your network.
-
Manual 99a 38 July 17, 2001 User Benefits of Novell Native File Access Protocols Enabling native protocols on NetWare means that users can access files, map network drives, and create shortcuts to NetWare servers using the native methods available in their specific operating system. Windows users can use their familiar Network Neighborhood. Macintosh users can use Chooser or the Go menu to access network files and even create aliases.
-
Manual 99a July 17, 2001 38 Name is the NetWare server name with an added underscore (_) and a W. For example, a NetWare server named SERVER1 defaults to a NNFAP server name of SERVER1_W. NNFAP Server Comment The text in the NNFAP Server Comment field displays when viewing details of the NNFAP server from a Windows workstation. Enabling Unicode When enabled, this command enables Unicode characters (used in doublebyte languages). To support Unicode, an additional file named UNINOMAP.
-
Manual 99a 38 July 17, 2001 Workgroup Name: The domain or workgroup that the server will belong to. In this case, Workgroup and Domain are interchangeable. WINS Address: Address of WINS server to be used to locate the primary domain controller (PDC), if the PDC and server running Novell Native File Access Protocols software are on different subnets.
-
Manual 99a 38 July 17, 2001 PDC Is On Same Subnet Indicates that the PDC is on the same subnet. Specify PDC Using DNS or WINS Select this option to use DNS or WINS to specify the primary domain controller. PDC Name A PDC server name and static IP address are needed if the PDC is on a different subnet. This option should be used only when there is a valid reason for overriding WINS or DNS.
-
Manual 99a 38 July 17, 2001 Selecting IP Addresses to Service Windows Workstations Although we recommend that you enable the CIFS protocol on all IP addresses, you can specify which IP addresses will respond to CIFS protocol requests. Specifying Share Points for Windows Workstations Any volume or directory on the server can be specified as a shared point and made accessible via the Network Neighborhood or My Network Places. If no share points are specified, then all mounted volumes are displayed.
-
Manual 99a 38 July 17, 2001 Directory The path to the server volume or directory which becomes the root of the sharepoint. Beginning at the volume name, the full path must be specified and it must end with a backslash (\). For example: VOL1:GRAPHICS\ Share Name The name by which the sharepoint is displayed to Windows computers.
-
Manual 99a 38 July 17, 2001 Set up Contexts for Windows Workstations You must specify the NDS contexts of Windows users that require access to the network. These contexts are saved in the context search file. When the Windows user enters a username, the Novell Native File Access Protocol software searches through each context in the list until it finds the correct User object. For example if you had users with full NDS distinguished names such as Bob.sales.acme, Sue.graphics.marketing.acme, Pat.
-
Manual 99a 38 July 17, 2001 Next Steps for Novell Native File Access Protocols After completing the installation of the Novell Native File Access Protocols, you must create passwords for users before they can access the files on the server. For more information, see the Novell Native File Access Protocols Installation and Administration Guide.
-
Manual 99a 38 July 17, 2001 Choose which gadgets you want to enable and configure now and which gadgets you want to enable and configure later by checking or unchecking the check boxes next to each gadget type. All gadgets are installed automatically when you install NetWare WebAccess. This screen lets you choose whether to enable and configure those gadgets now or later.
-
Manual 99a 38 July 17, 2001 For GroupWise®, the URL will be similar to http://IP_address or DNS name/servlet/webacc. Substitute the IP address or DNS name of the Web server running GroupWise WebAccess. For Web-based e-mail, provide the URL you assigned either the IMAP or POP3 server when you set it up. For Microsoft Exchange, provide the URL for accessing your Exchange server. The URL might be an IP address like http://192.168.0.1.
-
Manual 99a 38 July 17, 2001 During installation, roles and tasks are installed and associated with the logged-in user (typically the Admin user) by default. These role and task objects are stored in a new eDirectory container (rbsCollection). You can select the location and name of the new container or use the defaults provided. Location Enter the path to the eDirectory container that you want to create the rbsCollection container in, or use the default location.
-
Manual 99a 38 July 17, 2001 Install Novell iFolder Novell iFolder is a file storage and management solution to the universal problems associated with storing and retrieving data. With iFolder you have the latest version of your data when you need it and where you need it from any computer that you regularly use. And if you are not at a computer that you regularly use, you can still access and manage your files if you have an Internet connection and a Java-enabled browser.
-
Manual 99a 38 July 17, 2001 example, if you wanted users JSmith and Admin to have rights to administer the Server Management Console, you would enter admin;jsmith. Network Domain Enter the IP address or the DNS name of your iFolder server. Install Novell NetStorage Novell NetStorage provides simple Internet-based access to file storage and serves as a bridge between a company's protected Novell network and the Internet.
-
Manual 99a 38 July 17, 2001 does not necessarily have to be the IP address or DNS name of the server where NetStorage is to be installed. When a user attempts to log in, NetStorage searches the eDirectory database on the server you specify for the User object. If the User object is found, NetStorage attempts to authenticate the user to eDirectory.
-
Manual 99a 38 July 17, 2001 Customizing the Installation You can customize the installation of many products for your networking environment. To customize products and components, at the Summary screen click Customize to access the Customize screen.
-
Manual 99a 38 July 17, 2001 Select the product to customize. Click Properties. Modify the product as required. Click OK to return to the Summary screen. Completing the Server Installation The server installation program is now ready to copy files to your computer. Depending on which products you are installing, you might be prompted for additional information. At the Summary screen, click Finish to begin copying the files to the server.
-
Manual 99a 38 July 17, 2001 After the files are copied, click Yes to reboot the server. If you chose to load server on reboot, the NetWare 6 server software will automatically load when the computer reboots. If you chose not to load the server on reboot, you can load it manually. To load the server manually, reboot the computer by clicking Yes. When the computer reboots, change to the startup directory containing the NetWare server files (C:\NWSERVER) and enter SERVER.
-
Manual 99a 38 July 17, 2001 products using NetWare Deployment Manager or from the GUI server console screen. Install Additional Products Using NetWare Deployment Manager 1 Log in to the network from a Windows workstation running Novell Client software. 2 Run NWDEPLOY.EXE located at the root of the NetWare 6 Operating System CD. 3 Click Post Installation Tasks > Install NetWare 6 Products. 4 Follow the on-screen instructions for adding the product. HINT: Select the PRODUCT.
-
Manual 86 99a 38 NetWare 6 Overview and Installation Guide NetWare 6 Overview and Installation Guide 100-004725-001 August 30, 2001 Novell Confidential July 17, 2001
-
Manual 3 99a July 17, 2001 38 Upgrade to NetWare 6 The NetWare® 6 installation program can be used to upgrade an existing NetWare 4 or NetWare 5 server to NetWare 6.
-
Manual 99a 38 July 17, 2001 Meet System and Software Requirements To upgrade to NetWare 6, your system must meet the minimum requirements listed below. System and Software Requirements The server to be upgraded must be running one of the following: NetWare 5.1 with Support Pack 2 or later NetWare 5 with Support Pack 6 or later NetWare 4.2 with Support Pack 8 or later NetWare 4.
-
Manual 99a July 17, 2001 38 Client connection utilities (optional, for upgrading from another server): Novell ClientTM for DOS and Windows* 3.1x (optional, for upgrading from a NetWare server running IPXTM). IP Server Connection Utility (optional, for installing from a NetWare server running IP only). For instructions, see PRODUCTS\SERVERINST\IPCONN.TXT on the Novell Client CD.
-
Manual 99a 38 July 17, 2001 3 Double-click the Network Preparation folder to view the tasks and read the Overview section to get an understanding of the tasks. 4 Back up any server data and Novell eDirectory data following the instructions in the Back Up Data step. 5 Run the View and Update eDirectory Version program to update eDirectory as required. HINT: If you are prompted to log in again while running NetWare Deployment Manager, you can enter the IP address of the server by clicking Details.
-
Manual 99a July 17, 2001 38 6 Run the Prepare for eDirectory program to extend the network schema. 7 (Conditional) If you are upgrading a cluster of NetWare servers, run the Prepare a Novell Cluster for Upgrade program.
-
Manual 99a 38 July 17, 2001 8 (Conditional) If you are upgrading a NetWare 5 server running NDS® 7 that has NSS volumes, run the Prepare a Server with NDS 7 and NSS program. 9 Follow the instructions in the Update Certificate Authority (CA) Object step to create or update a Security container object and a Certificate Authority (CA) object.
-
Manual 99a 38 July 17, 2001 Preparing the Computer To prepare your existing server for the NetWare 6 operating system, do the following: Back up the NetWare server files Prepare application files Verify a valid DOS partition Access the upgrade program Backing Up the NetWare Server Files Make at least one backup of your NetWare server files, including files on the DOS partition. Do not attempt an upgrade without a backup.
-
Manual 99a 38 July 17, 2001 Preparing Servers Running ZENworks for Server 2 (Conditional) If the server is running ZENworks for Servers 2, you must install ZENworks for Servers 2 Support Pack 1 prior to upgrading the server to NetWare 6. ZENworks for Servers 2 Support Pack and related information can be obtained from Novell Technical Support (htttp://support.novell.com). Verify a Valid DOS Partition Your NetWare server uses the DOS partition to start the computer and load NetWare.
-
Manual 99a 38 July 17, 2001 5 Make sure that the CONFIG.SYS file contains the FILES=50 and BUFFERS=30 commands. 6 (Conditional) To upgrade from NetWare 6 files located on a network, install the Novell Client for DOS and Windows 3.1x or IP Server Connection Utility software located on the Novell Client CD. What’s Next After accessing the NetWare 6 installation files, follow the instructions for installing a server beginning with “Installing the Software” on page 35.
-
Manual 96 99a 38 NetWare 6 Overview and Installation Guide NetWare 6 Overview and Installation Guide 100-004725-001 August 30, 2001 Novell Confidential July 17, 2001
-
Other Installation Options Novell NetWare 6 ® www.novell.
-
doc_tpl.fm Rev 99a 28 October 99 17 Contents Overview 9 Using NetWare Accelerated Upgrade . . . . . . . . . . . Automating the NetWare Installation with a Response File Using Installation Scripts for NetWare Installation . . . . . Documentation Conventions . . . . . . . . . . . . . . . . 1 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
-
doc_tpl.fm [NWI:Install Options] Section . . . . . . . . . . . . . . . . [NWI:Server Settings] Section . . . . . . . . . . . . . . . . [NWI:Locale] Section . . . . . . . . . . . . . . . . . . . . [NWI:Mouse and Video] Section . . . . . . . . . . . . . . . [NWI:Hardware] Section . . . . . . . . . . . . . . . . . . . [NWI:Excluded From Detection] Section. . . . . . . . . . . [NWI:Multi-Processor System] Section . . . . . . . . . . . [NWI:Storage Adapter n] Section . . . . . . . . . . . . . .
-
doc_tpl.fm [Novell:SYSDirectory:1.0.0] Section . [Novell:ConfigDirectory:1.0.0] Section [Novell:LANFiles:1.0.0] Section. . . . [Novell:SBDFiles:1.0.0] Section . . . [Novell:portalzip:1.0.0] Section . . . . [Novell:Rconjzip:1.0.0] Section . . . . [Novell:Perl5zip:1.0.0] Section . . . . [Novell:beanszip:1.0.0] Section. . . . [Novell:nscriptzip:1.0.0] Section . . . [Novell:scripteszip:1.0.0] Section . . . [Novell:console1zip:1.0.0] Section . . [Novell:ldapzip:1.0.0] Section. . . . . [Novell:wanmanzip:1.0.
-
doc_tpl.
-
Manual 99a 38 July 17, 2001 Overview The following advanced options can help you upgrade or install NetWare® servers. Using NetWare Accelerated Upgrade You can run NetWare Accelerated Upgrade from a Windows* client workstation, so that you don’t need to be physically present at the server console. Although NetWare Accelerated Upgrade is quicker than the standard installation process, it does not install additional network products, licensing services, or license certificates.
-
Manual 99a 38 July 17, 2001 Using Installation Scripts for NetWare Installation NetWare installation scripts let you Alter or extend the NetWare installation process Install additional products or services on a NetWare server after the operating system has been installed See Chapter 3, “Installation Scripts for NetWare,” on page 101. Documentation Conventions In this documentation, a greater-than symbol (>) is used to separate actions within a step and items in a cross-reference path.
-
Manual 1 99a 38 July 17, 2001 Using NetWare Accelerated Upgrade The NetWare® Accelerated Upgrade utility is an advanced utility that can be used to upgrade a NetWare 4.11, NetWare 4.2, or NetWare 5 server to NetWare 6. NetWare Accelerated Upgrade is intended for use by network administrators who are skilled at troubleshooting and installing NetWare networks. WARNING: Back up all data before using this utility.
-
Manual 99a 38 July 17, 2001 NetWare 4 or 5 targeted server Logs in File copy Windows client workstation running NetWare Accelerated Upgrade -ROM files CD Logs in Staging server After the NetWare 6 Operating System CD files are copied to the staging server, you will log in to a Windows workstation and launch the NetWare Accelerated Upgrade utility (ACCUPG.EXE), located at the root of the NetWare 6 Operating System CD.
-
Manual 99a 38 July 17, 2001 Upgrading to NetWare 6 To run NetWare Accelerated Upgrade, complete the following tasks: 1. Prepare the Workstation (page 13) 2. Prepare a Staging Server (page 13) 3. Prepare the Network (page 17) 4. Prepare the Target Server (page 15) 5. Run NetWare Accelerated Upgrade (page 18) 6. Complete Post-Upgrade Tasks (page 20) Prepare the Workstation A Windows 95/98, Windows NT*, Windows 2000, or Windows ME workstation with 50 MB of available disk space.
-
Manual 99a 38 July 17, 2001 2 (Conditional) If you are upgrading a target server that does not have NICI installed, copy the NetWare 6 NICI file to your target server. Do one of the following: If you copied the NetWare 6 CD files in Step 1 on page 13, create directory named License at the root of the copied NetWare 6 Operating System CD and then copy the #.NFK file from the NetWare 6 License/Cryptography diskette to the newly created License directory.
-
Manual 99a 38 July 17, 2001 Prepare the Target Server The target server is the NetWare 4 or NetWare 5 server that you plan to upgrade to NetWare 6. Make sure your target server meets the minimum requirements listed below. WARNING: Do not use NetWare Accelerated Upgrade to upgrade the first server in your tree to NetWare 6. You must already have a server running NetWare 6 in your tree in order to use NetWare Accelerated Upgrade.
-
Manual 99a 38 July 17, 2001 Prompt enter Exit, at the Distributor console. Select Subscriber from the list. Prompt enter Exit, at the Subscriber console. Select ZENworks for Servers from the list. Prompt enter Exit, at the ZENworks for Servers console. Select Remote Web Console from the list. Prompt enter Exit, at the Remote Web Console. The following table lists the procedures that NetWare Accelerated Upgrade does not support during a NetWare 4 or NetWare 5 upgrade.
-
Manual 99a 38 July 17, 2001 3 (Conditional) If you are upgrading a server in a multiserver tree that is clustered, do the following: 3a Run the NetWare Deployment Manager utility (NWDEPLOY.EXE), located at the root of the NetWare 6 Operating System CD. 3b Click Network Preparation > Prepare a Novell Cluster for Upgrade. 4 Run DSREPAIR > Time Synchronization at the server console of the target server. If you encounter any NDS® synchronization errors, make sure you resolve these before continuing.
-
Manual 99a 38 July 17, 2001 Run NetWare Accelerated Upgrade 1 From your workstation, log in to the staging server and double-click the NetWare Accelerated Upgrade executable (ACCUPG.EXE), located at the root of the NetWare 6 Operating System CD. 2 Read the Welcome screen and click the right-arrow. 3 Enter the location where you copied or mounted the NetWare 6 files to the staging server and click the right-arrow.
-
Manual 99a 38 July 17, 2001 9 Check any of the following options that you want NetWare Accelerated Upgrade to automatically perform during the upgrade, and then click the right-arrow: Reboot the target server after the upgrade is completed. Even if you checked this option, there might be an instance where you might need to manually reboot the target server once the file copy is complete. Update the existing drivers on the target server to NetWare 6 LAN and disk drivers.
-
Manual 99a 38 July 17, 2001 Complete Post-Upgrade Tasks Installing Licensing Certificates Because the NetWare Accelerated Upgrade utility does not install licenses, use iManage via NetWare Web Manager to install license certificates on the new NetWare 6 server. NOTE: If licenses are installed at the [Root] of the NDS tree or you are on an MLA account, you might not need to install additional licenses.
-
Manual 99a 38 July 17, 2001 specific drivers manually, you must create and configure a \STARTUP directory that contains the disk drivers and the STARTUP.NCF file. 1 Copy the NetWare 6 Operating System CD files to a volume on a staging server. IMPORTANT: Do not copy the files onto the target server that you are upgrading or onto the client workstation. 2 Make sure that the target server can connect to the staging server. 3 Copy any additional .HAM and .
-
Manual 99a 38 July 17, 2001 Setting the Target Server’s Gate Parameter to Its Default Router IP Address For a NetWare 4 Target Server 1 At the server console, enter LOAD INSTALL 2 Select NCF Files Options > Edit AUTOEXEC.NCF File. 3 In the AUTOEXEC.NCF file, add LOAD TCP/IP 4 Add a command that loads the network board and specifies the slot, frame, and name of the network board (the AUTOEXEC.NCF file should list this information).
-
Manual 99a 38 July 17, 2001 3 At the BIND IP command line, after the mask address, set the gate parameter to the default router IP address for the target server. For example, if your default router IP address was 137.65.178.1, at the BIND IP command line you would enter the following after the mask address: gate=137.65.178.
-
Manual 24 Other Installation Options Other Installation Options 103-000143-001 August 30, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 2 99a 38 July 17, 2001 Automating the NetWare Installation with a Response File Installing the NetWare® operating system software can be easier and more flexible when you use a response file. When used with the graphical server installation, a response file lets you Set and display specific defaults Bypass entire sections of the installation Automate the entire server installation process A response file is a text file containing sections and keys (similar to a Windows .INI file).
-
Manual 99a 38 July 17, 2001 This chapter contains the following sections: “Creating a Response File” on page 26 “Using a Response File” on page 27 “Syntax” on page 28 “NetWare Sections and Keys” on page 33 “Performing a Fully Automated Installation” on page 78 “Automating the Installation of Additional Products and Services” on page 79 “CD Boot and the Response File” on page 87 “Customizing the Installation Using Install Scripts” on page 87 “Performing a Factory Install” on page 90 Cr
-
Manual 99a 38 July 17, 2001 3 Copy RESPONSE.NI from the SYS:NI\DATA directory to either a diskette or to the new server. 4 Modify the file by adjusting the parameters and removing unwanted sections.
-
Manual 99a 38 July 17, 2001 Syntax A response file is a Windows .INI-type file. Data items are identified as keys, and keys have associated values (Key = value). These keys are grouped in sections. For the NetWare installation program, each data input screen has one or more sections associated with it. Section names of the installation generally correspond to the function of the screens. Section and key names are case sensitive. Values associated with keys are not case sensitive.
-
Manual 99a 38 July 17, 2001 Section Purpose “[NWI:Excluded From Detection] Section” on page 44 Identifies what drivers will be excluded from the auto-detection. “[NWI:Multi-Processor System] Section” on page 44 Identifies the driver associated with the processor system in the server. “[NWI:Storage Adapter n] Section” on page 45 Identifies the driver and its associated parameters for a specific storage adapter. This Section can be duplicated for as many adapters as are in the server.
-
Manual 30 99a 38 July 17, 2001 Section Purpose “[NWI:Protocols] Section” on page 61 Controls whether the protocol screen is displayed. “[NWI:TCPIP] Section” on page 62 Specifies TCP/IP parameters. “[NWI:IPX] Section” on page 63 Specifies IPXTM parameters. “[NWI:IPCMD] Section” on page 64 Specifies Compatibility Mode parameters. “[NWI:SNMP] Section” on page 65 Specifies Simple Network Management Protocol parameters.
-
Manual 99a 38 July 17, 2001 Section Purpose “[Novell:DNS_DHCP:1.0.0] Section” on page 85 Specifies full automation of products and services. “[NWI:Install Script] Section” on page 88 Specifies full automation of products and services. “[NWI:Factory] Section” on page 91 Specifies full automation of factory install. “[Novell:StartupDirectory:1.0.0] Section” on page 92 Specifies full automation of factory install. “[Novell:SYSDirectory:1.0.
-
Manual 99a 38 July 17, 2001 The Prompt key is listed with each section that corresponds to a data input screen and it Controls whether the screen will be displayed. Lets you use the response file to pass in the keys and values of the section. Lets you bypass the screen. If the value of Prompt is True, the screen will be displayed and the data specified in the response file will be presented as default values. The screen will not be displayed if the value of Prompt is False.
-
Manual 99a 38 July 17, 2001 NetWare Sections and Keys The NetWare installation sections and their associated keys are specified below. Section names and Key names are in bold. Included with each key are the default value, possible values, whether the Key is required for the NetWare installation to run silently (for example, to create a new NDS tree without any user input, New Tree=True must appear in the response file). Also included with each Key is a short description of the Key’s purpose.
-
Manual 99a 38 July 17, 2001 Small Business = Default False Value True or False Key Required No Example Small Business = True Purpose Controls whether the Small Business licensing model is used. [NWI:Language] Section Prompt = Default True Values True or False Key Required Yes Example Prompt = True Purpose Controls whether the screen is displayed.
-
Manual 99a 38 July 17, 2001 Additional Languages = Default (none) Values 1-100 (values are specified in INSTALL\PROFILE.TXT) Key Required No Example Additional Languages = 5,6 Purpose Specifies additional languages that will be installed on the server. [NWI:Install Options] Section Prompt = Default True Values True or False Key Required Yes Example Prompt = True Purpose Controls whether the screen is displayed.
-
Manual 99a 38 July 17, 2001 Startup Directory = Default C:\NWSERVER Values (existing DOS path up to 255 characters) Key Required Yes Example Startup Directory = C:\NWSERVER Purpose Identifies the directory where the server’s initialization files will reside on the Boot Partition. Allow User response file = Default True Values True or False Key Required No Example Allow User response file = True Purpose Makes the F3 key available on the opening screen.
-
Manual 99a 38 July 17, 2001 [NWI:Server Settings] Section Prompt = Default True Values True or False Key Required Yes Example Prompt = True Purpose Controls whether the screen is displayed. NDS Version = Default 8 Values 7 or 8 Key Required Yes Example NDS Version = 8 Purpose Specifies the version of NDS to install on this server.
-
Manual 99a 38 July 17, 2001 CD Driver = Default NetWare Values NetWare or DOS Key Required No Example Source Media Access = NetWare Purpose Determines the driver type (DOS or server) used to access the CD during installation. [NWI:Locale] Section Prompt = Default True Values True or False Key Required Yes Example Prompt = True Purpose Controls whether the screen is displayed.
-
Manual 99a 38 July 17, 2001 Code Page = Default 437 Values (values are specified in INSTALL\NLS\language number\LOCALE.TXT) Key Required Yes Example Code Page = 437 Purpose Sets the character set for the server. Keyboard = Default United States Values (values are specified in INSTALL\NLS\\LOCALE.TXT) Key Required Yes Example Keyboard = United States Purpose Sets the keyboard type.
-
Manual 99a 38 July 17, 2001 Mouse = Default PS/2 Values PS/2, Serial COM1, Serial COM2, No Mouse (values are specified in INSTALL\NLS\language number\LOCALE.TXT) Key Required Yes Example Mouse = PS/2 Purpose Specifies the mouse type that will be used for the graphical portion of the installation.
-
Manual 99a 38 July 17, 2001 Update Storage Driver Directory = Default (none) The Install always looks in C:\NWUPDATE as well. Values (existing DOS path up to 255 characters) Key Required No Example Update Storage Driver Directory = F:\DRV\UPDATE Purpose Specifies the directory path where updated storage (HAM and CDM) drivers will be found; the directory should already exist and be a local DOS path. NOTE: Associated DDI files must accompany the storage drivers in this directory.
-
Manual 99a 38 July 17, 2001 Update PSM Driver Directory = Default (none) The Install always looks in C:\NWUPDATE as well Values (existing DOS path up to 255 characters) Key Required No Example Update PSM Driver Directory = F:\DRV\UPDATE Purpose Specifies the directory path where updated processor (PSM) drivers will be found; the directory should already exist and be a local DOS path. NOTE: Associated PDI files must accompany the storage drivers in this directory.
-
Manual 99a 38 July 17, 2001 Storage Detection = Default True Values True or False Key Required No Example Storage Detection = True Purpose Controls whether detection of storage adapters and driver matching is performed. If storage adapter and driver information is identified in the response file (see Storage Adapter section), detection can be set to False.
-
Manual 99a 38 July 17, 2001 HotPlug Detection = Default True Values True or False Key Required No Example HotPlug Detection = True Purpose Controls whether detection of Hot Plug devices and driver matching is performed. [NWI:Excluded From Detection] Section Driver File = Default (none) Values (name of driver) Key Required No Example Driver File =AHA2940.HAM Purpose Identifies the driver that will be excluded from auto-detection.
-
Manual 99a 38 July 17, 2001 [NWI:Storage Adapter n] Section Example [NWI:Storage Adapter 1] Description This section can be included for each storage adapter in the server. Several Keys are described under this section which are optional; if the driver is detectable by NetWare, only the Driver File key is required for the section. The other Keys and Values are varied and are extracted from the driver’s corresponding DDI file.
-
Manual 99a 38 July 17, 2001 INT = Default (none) Values 1-F Key Required No, unless the driver is for an ISA adapter. Example INT = F Purpose Specifies the interrupt that the adapter is set to; this parameter is commonly used for ISA bus adapters.
-
Manual 99a 38 July 17, 2001 [NWI:Network Adapter n] Section Example [NWI:Network Adapter 1] Description This section can be included for each network adapter in the server. Several Keys are described under this section which are optional; if the driver is detectable by NetWare, only the Driver File Key is required for the section. The other Keys and Values are varied and are extracted from the driver’s corresponding LDI file.
-
Manual 99a 38 July 17, 2001 INT = Default (none) Values 1-F Key Required No, unless the driver is for an ISA adapter Example INT = F Purpose Specifies the interrupt that the adapter is set to; this parameter is commonly used for ISA bus adapters.
-
Manual 99a 38 July 17, 2001 Frame Type n = Default (none) Values (frame types supported by the driver are found in the driver’s LDI file) Key Required No Example Frame Type 1 = Ethernet_802.2 Purpose Identifies the network frame type to be used when loading the driver. There can be as many descriptions as there are frame types supported by the driver—n uniquely identifies the frame type (for example, 1, 2, etc.).
-
Manual 99a 38 July 17, 2001 [NWI:Reserved Adapter n] Section Example [NWI:Reserved Adapter 1] Description This section can be included for each slot in the server. Default (none) Values (can be a 5-digit Hardware Instance Number assigned on servers with buses that support detection—such as PCI) Key Required No, unless the driver is for an ISA adapter Example SLOT = 5 Purpose Specifies the bus slot that should be reserved. If an adapter is found in this slot, an error is generated.
-
Manual 99a 38 July 17, 2001 [NWI:NetWare Loadable Module] Section Driver File = Default (none) Values (name of NLM) Key Required No Example Driver File = ROUTE.NLM Purpose Identifies the NLM to load during installation. This is typically used for network support NLM programs.
-
Manual 99a 38 July 17, 2001 GUI Prompt = Default True Values True or False Key Required Yes Example GUI Prompt = True Purpose Controls whether the File System screen is displayed during the graphical portion of the install. [NWI:Partition n] Section Example [NWI:Partition 0] Description This section allows partitions to be created on specific devices in the system during installation. The devices are specified by the key entries in the section.
-
Manual 99a 38 July 17, 2001 IDE Device Serial Number = Default (none) Values (string of characters) Key Required No Example IDE Device Serial Number = AX8273430930. Purpose Specifies the serial number of the device designated by the manufacturer. (It is usually found on a sticker attached to the device.
-
Manual 99a 38 July 17, 2001 SCSI Device Adapter Slot = Default (none) Values 1 to16 Key Required No Example SCSI Device Adapter Slot = 1 Purpose Identifies the physical slot number of the SCSI adapter SCSI Device ID = Default (none) Values 0 to 15 Key Required Yes Example SCSI Device ID = 0 Purpose Specifies the ID of the device on the SCSI chain Partition Type = 54 Default NSS Values NetWare or NSS or Free Key Required No Example Partition Type
-
Manual 99a 38 July 17, 2001 Partition Size = or Default (none) Values (up to the size of free space on the device in MB) Key Required No Example Partition Size = 1000 Purpose Identifies the size of the partition. Note that the number is modified to align with a cylinder boundary. "ALL FREE SPACE" specifies that all remaining free space on the device will be used.
-
Manual 99a 38 July 17, 2001 [NWI:Volume n] Section Example [NWI:Volume 0] Description This section can be included for each volume defined on the server. Note that SYS must be Volume 0. This section allows volumes to be created on specific partitions in the system during installation. The partitions are specified by the key entries in the section. The zero-based sequence number (n = 0, 1, 2, 3, ...) in the section heading specifies the order in which the volumes are created.
-
Manual 99a 38 July 17, 2001 Block Size = Default (calculated on the size of the first segment of the volume) Values 4 or 8 or 16 or 32 or 64 Key Required No Example Block Size = 64 Purpose Identifies the volume’s block size. Note that this key does not apply to NSS volumes. Compression = Default True Values True or False Key Required No Example Compression = True Purpose Specifies whether compression is enabled on the volume.
-
Manual 99a 38 July 17, 2001 Data Migration = Default False Values True or False Key Required No Example Data Migration = True Purpose Specifies whether data migration is enabled on the volume. Note that this key does not apply to NSS volumes. Default False Values True or False Key Required No Example Mount = True Purpose Specifies whether the volume should be mounted during installation.
-
Manual 99a 38 July 17, 2001 Segment n Size = or Default (none) Values (up to free space on a partition in MB) Key Required Yes Example Segment 1 Size = 1000 Purpose Specifies the size of the volume segment. "ALL FREE SPACE" specifies that all remaining free space on the partition will be used. [NWI:Misc] Section Relogin Password = Default (none) Values (text) Key Required No, unless it is a network installation.
-
Manual 99a 38 July 17, 2001 [NWI:File Server] Section NOTE: This is the first section used during the graphical portion of the installation. Prompt = Default True Values True or False Key Required Yes Example Prompt = True Purpose Controls whether the screen is displayed.
-
Manual 99a 38 July 17, 2001 [NWI:Protocols] Section Prompt = Default True Values True or False Key Required Yes Example Prompt = True Purpose Controls whether the protocols screen is displayed.
-
Manual 99a 38 July 17, 2001 Default IPX Frame Typer= Default (none) Values (Frame types that are supported by a driver are found in the driver’s LDI file Key Required No Example Default IPX Frame Type=Ethernet 802.2 Purpose Identifies the network frame type to be bound to the IPX stack when the "Single Network Adapter" is set to True.
-
Manual 99a 38 July 17, 2001 Subnet Mask n = Default (none) Values (valid IP address) Key Required No, unless Logical Name is set. Example Subnet Mask 1 = 255.255.255.0 Purpose Specifies the subnet. Divides the IP address into network address and node address. Gateway n = Default (none) Values (valid IP address) Key Required No Gateway 1 = 127.127.0.254 Purpose Identifies the gateway or router through which this server can communicate outside the subnet.
-
Manual 99a 38 July 17, 2001 IPX Address n = Default (address detected by the installation program) Values 00000001-FFFFFFFF Key Required No, unless Logical Name is set Example IPX Address 1 = 01010102 Purpose Specifies the IPX address to be bound. [NWI:IPCMD] Section IPX Compatibility = Default True Values True or False Key Required No Example IPX Compatibility = True Purpose Controls whether SCMD is loaded on this server.
-
Manual 99a 38 July 17, 2001 CMD Net Number = Default (none) Values 00000001-FFFFFFFF Key Required No Example CMD Net Number = 01010101 Purpose Specifies the network number. Preferred IP Address = Default (none) Values (valid IP address) Key Required No Example Preferred IP Address = 130.1.130.1 Purpose Specifies the IP address.
-
Manual 99a 38 July 17, 2001 Location = Default (none) Values (text) Key Required No Example Location = Building A Purpose Identification information that is sent with SNMP traps to assist in troubleshooting. Contact = Default (none) Values (text) Key Required No Example Contact = John Doe Purpose Identification information that is sent with SNMP traps to assist in troubleshooting.
-
Manual 99a 38 July 17, 2001 Trap Targets IPX = Default (none) Values (8-character IPX address:12-character node number) Key Required No Example Trap Targets IPX = C9990111:000001B555555 Purpose Identifies MAC addresses of a computer to which SNMP traps are sent. [NWI:DNS] Section Prompt = Default True Values True or False Key Required Yes Example Prompt = True Purpose Controls whether the DNS screen is displayed.
-
Manual 99a 38 July 17, 2001 Nameservers = Default (none) Values (valid IP addresses) Key Required No Example Nameservers = 131.1.131.1, 131.1.131.2 Purpose Identifies the servers to be used for name resolution. [NWI:Host Name] Section Prompt = Default True Values True or False Key Required Yes Example Prompt = True Purpose Controls whether the screen is displayed.
-
Manual 99a 38 July 17, 2001 IP Address n = Default (none) Values (valid IP address) Key Required No Example IP Address 1 = 130.1.130.1 Purpose Specifies the IP address associated with a Host Name. Note that Host Name 1 will be set as the Primary address. [NWI:Time Zone] Section Prompt = Default True Values True or False Key Required Yes Example Prompt = True Purpose Controls whether the time zone screen is displayed.
-
Manual 99a 38 July 17, 2001 Use Daylight Saving Time = Default True, if Time Zone supports Daylight Saving Time Values True or False Key Required No Example Use Daylight Saving Time = True Purpose Controls whether daylight saving time is set.
-
Manual 99a 38 July 17, 2001 Tree Name = Default (none) Values (text) Key Required Yes Example Tree Name = Novell Purpose Specifies the tree name for either a new tree or an existing tree to install the server into. Default False Values True or False Key Required Yes Example New Tree = True Purpose Specifies whether the NDS tree to be installed is a new tree or install into an existing tree. New Tree = NOTE: This key is only used when Prompt = False.
-
Manual 99a 38 July 17, 2001 Add Replica = Default (none) Values True or False Key Required No Example Add Replica = True Purpose Controls whether a replica is added to the server. This only applies if the server is not one of the first three servers added to an NDS tree (by default the first three servers receive replicas). Upgrade User Conflict Action = Default (none) Values Delete, Merge, or Rename Key Required No, unless it is an upgrade from NetWare 3.
-
Manual 99a 38 July 17, 2001 Admin Context = Default (none) Values (NDS distinguished name) Key Required Yes Example Admin Context = .install.novell Purpose Identifies the NDS context in which the server administrator is to be installed into. Admin Password = Default (none) Values (text) Key Required Yes Example Admin Password = Novell Purpose Specifies the password for the server administrator.
-
Manual 99a 38 July 17, 2001 Display Summary = Default True Values True or False Key Required Yes Example Display Summary = True Purpose Controls whether the NDS Summary screen is displayed [NWI:License] Section Prompt = Default True Values True or False Key Required Yes Example Prompt = True Purpose Controls whether the license screen is displayed.
-
Manual 99a 38 July 17, 2001 Install Licenses Later = Default False Values True or False Key Required No Example Install Licenses Later = True Purpose Specifies that no licenses will be installed on the server. If this key is set to True, all remaining licensing keys will be ignored.
-
Manual 99a 38 July 17, 2001 Search For Existing License = Default True Values True or False Key Required Yes Example Search For Existing License = False Purpose Controls whether the licenses (such as MLA licenses) are searched for in the tree. Used in conjunction with the next key.
-
Manual 99a 38 July 17, 2001 Append Line n = Default (none) Values (decimal number) Key Required No Example Append Line 1 = LOAD NFS.NAM Purpose Adds the line to the end of the STARTUP.NCF file. If multiple lines are listed, n should increment sequentially. [NWI:Append To Autoexec.ncf] Section Line n = Default (none) Values (decimal number) Key Required No Example Line 1 = LOAD MONITOR Purpose Adds the line to the end of the AUTOEXEC.NCF file.
-
Manual 99a 38 July 17, 2001 Performing a Fully Automated Installation The following parameters must be present to completely automate an installation or upgrade. The syntax and values for the supplementary NetWare installation sections and their associated keys are specified below. For a fully automated installation to work, these sections must appear in the response file in addition to all of the required keys listed in “NetWare Sections and Keys” on page 33. [Novell:NOVELL_ROOT:1.0.
-
Manual 99a 38 July 17, 2001 allowSummary = Default True Values True or False Key Required Yes Example allowSummary = False Purpose Controls whether the installation Summary screen is displayed. Default False Values True or False Key Required Yes Example silent = False Purpose Global key that controls whether the installation runs in silent mode with no user interaction. Some sections do not support this key. If this is the case, use a "prompt=false" key instead.
-
Manual 99a 38 July 17, 2001 4 Add the following lines under the [Selected Nodes] section heading: Novell:NetWare5:1.0.0=Novell:NetWare5OS:5.0.0,Novell:Products:1.0.0,Novell:NW UpdateGroup:1.0.0 Novell:NetWare5OS:5.0.0=Novell:DiskCarver:1.0.0,Novell:Protocols:1.0.0,Novell :DS_Install:1.0.0, Novell:LicensePrompt:1.0.0,Novell:NW:1.0.0,Novell:NDPS Server Files:1.0.0 Novell:NW:1.0.0=Novell:Startup:1.0.0,Novell:SYS:1.0.0,Novell:DriverFiles:1.0. 0 Novell:Startup:1.0.0=Novell:StartupDirectory:1.0.
-
Manual 99a 38 July 17, 2001 Product Selection = Default (none) Values Default or Web Key Required No Example Product Selection = Web Purpose Specifies which bundle of Additional Products and Services to install. Default will install the Web Services bundle. Web will install the Web Services bundle plus WebSphere* Application Server. To specify a custom bundle of Additional Products and Services, do not include this key, and specify each product as described below. Novell:Products:1.0.
-
Manual 99a 38 July 17, 2001 Installing Multiple Products on a Server To install multiple products on a server, make sure that the Novell:Products:1.0.0 key has multiple values, separated by commas as shown in the example above. Product Keys and Values In addition to identifying the product in the Novell:Products:1.0.0 key, each product has its own keys and values for the [Selected Nodes] section. These keys and values for each product are listed below.
-
Manual 99a 38 July 17, 2001 Novell PKI Services Novell:PKIInstall:1.0.0=Novell:PKIModule:1.0.0,Novell:NICIModule:1.0.0 Novell:PKIModule:1.0.0=Novell:PKIFiles:1.0.0 Novell Internet Access Server Novell:RAS:4.1.0=Novell:RAS Server Files:1.0.0,Novell:SVCDEF_NODE:1.0.0,Novell:SupportedOS:1.0.0,Novell:UpgradeF rom:1.0.0 Novell:RAS Server Files:1.0.0=Novell:RAS System Connect:1.0.0,Novell:RAS System Connect Scripts:1.0.0,Novell:RAS Public:1.0.0 Storage Management Services Novell:SMS:1.0.0=Novell:SMSFiles:1.
-
Manual 99a 38 July 17, 2001 adminID = Default (none) Values (NDS distinguished name) Key Required Yes Example adminID=.CN=admin.O=install Purpose Identifies the Admin name and NDS context; this should correspond with the Admin Login Name and Admin Context identified in the NWI:NDS section of the response file. Note the case of the characters in the string.
-
Manual 99a 38 July 17, 2001 [Novell:DNS_DHCP:1.0.0] Section Prompt = Default None Values true or false Key Required Yes Example Prompt=false Purpose Controls whether the DNS/DHCP configuration screen is displayed. TreeName = Default (none) Values (text) Key Required Yes Example TreeName=Novell Purpose Specifies the NDS tree name in which DNS/DHCP Services will be installed.
-
Manual 99a 38 July 17, 2001 ExtendDNIPSchema = Default (none) Values true or false Key Required Yes Example ExtendDNIPSchema=true Purpose Controls whether the schema is extended for DNS/DHCP Services. Note that this should be set to true. LocatorNDSContext = Default (none) Values (NDS distinguished name) Key Required Yes Example LocatorNDSContext=O=install Purpose Identifies the NDS context that the Locator Object is to be installed into.
-
Manual 99a 38 July 17, 2001 RootSrvrNDSContext = Default (none) Values (NDS distinguished name) Key Required Yes Example RootSrvrNDSContext=O=install Purpose Identifies the NDS context that the RootSrvr Zone is to be installed into. In addition to the DNS/DHCP keys identified above, there must also be a line in the [Settings] section with the entry: Novell:DNS_DHCP:1.0.
-
Manual 99a 38 July 17, 2001 There are two places in the NetWare installation where you can use install scripts: At the end of the preliminary file copy (just prior to the launching of the graphical portion of the install). An install script executed here can be used for copying files from the DOS partition to the SYS volume. At the end of the NetWare installation. It is called right after you answer AOK@ or ANo@ on the closing screen and before the install cleanup process.
-
Manual 99a 38 July 17, 2001 Support Pack Script = Default Support Pack Script = C:\spack\silent.ics Values (existing DOS path up to 255 characters) Key Required No Example If the support pack image is located on the C: drive, use this path: Support Pack Script=c:\nw51sp1\spack.ips e=c:\facterr.log s=c:\nw51sp1 If the support pack image is on a mounted CDROM, use this path: Support Pack Script=NW51:\spack.ips e=c:\err.
-
Manual 99a 38 July 17, 2001 Performing a Factory Install A Factory Install can reduce the complexity and time spent on an installation. Much of the hardware configuration and file copy is done in the Factory so that you only need to use the graphical portion of the NetWare installation to complete the on-site configuration. Because the network operating system files are pre-copied to the server, installation time is reduced to a few minutes.
-
Manual 99a 38 July 17, 2001 [NWI:Factory] Section Preinstall = Default True Values True or False Key Required Yes Example Preinstall = True Purpose Controls whether the Factory Install option of the NetWare installation is invoked. If Preinstall=True, the remaining keys are checked.
-
Manual 99a 38 July 17, 2001 [Novell:StartupDirectory:1.0.0] Section Precopy = Default True Values True or False Key Required No Example Precopy = True Purpose Controls whether the files in the \STARTUP\NLS directory of the install image and destined for the C:\Startup_Directory\NLS directory are copied in Phase 2. If Precopy = True, the files are not copied again in the final file copy routine. [Novell:SYSDirectory:1.0.
-
Manual 99a 38 July 17, 2001 [Novell:ConfigDirectory:1.0.0] Section Precopy = Default True Values True or False Key Required No Example Precopy = True Purpose Controls whether the files in the \CONFIG directory of the install image, destined for volume SYS, are copied in Phase 2. If Precopy = True, the files are not copied again in the final file copy routine. [Novell:LANFiles:1.0.
-
Manual 99a 38 July 17, 2001 [Novell:SBDFiles:1.0.0] Section Precopy = Default True Values True or False Key Required No Example Precopy = True Purpose Controls whether the files in the \DRIVERS\SBD directory of the install image, destined for the SYS:SYSTEM directory, are copied in Phase 2. If Precopy = True, the files are not copied again in the final file copy routine. [Novell:portalzip:1.0.
-
Manual 99a 38 July 17, 2001 [Novell:Rconjzip:1.0.0] Section Precopy = Default True Values True or False Key Required No Example Precopy = True Purpose Controls whether the files in the zip file, destined for volume SYS, are copied in Phase 2. If Precopy = True, the files are not copied again in the final file copy routine. [Novell:Perl5zip:1.0.
-
Manual 99a 38 July 17, 2001 [Novell:beanszip:1.0.0] Section Precopy = Default True Values True or False Key Required No Example Precopy = True Purpose Controls whether the files in the zip file, destined for volume SYS, are copied in Phase 2. If Precopy = True, the files are not copied again in the final file copy routine. [Novell:nscriptzip:1.0.
-
Manual 99a 38 July 17, 2001 [Novell:scripteszip:1.0.0] Section Precopy = Default True Values True or False Key Required No Example Precopy = True Purpose Controls whether the files in the zip file, destined for volume SYS, are copied in Phase 2. If Precopy = True, the files are not copied again in the final file copy routine. [Novell:console1zip:1.0.
-
Manual 99a 38 July 17, 2001 [Novell:ldapzip:1.0.0] Section Precopy = Default True Values True or False Key Required No Example Precopy = True Purpose Controls whether the files in the zip file, destined for volume SYS, are copied in Phase 2. If Precopy = True, the files are not copied again in the final file copy routine. [Novell:wanmanzip:1.0.
-
Manual 99a 38 July 17, 2001 Install Command Line Options The following command line options that can be used when initiating the installation executable. /SERVER_LOG = Default (none) Values (existing DOS path up to 255 characters) Key Required No Example Install /LOG=C:\TMP\ERROR.LOG Purpose Designates where an installation log file will be created.
-
Manual 100 Other Installation Options Other Installation Options 103-000143-001 August 30, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 3 99a 38 July 17, 2001 Installation Scripts for NetWare WARNING: This document describes software that is subject to change. Novell® intends to keep it as current as possible, but the user must assume any inherent risk in developing or maintaining code based on the information in this document. Novell may discontinue or decline to support any software feature described within this document at any time. This chapter describes the installation script support for NetWare®.
-
Manual 99a 38 July 17, 2001 Launching a Script File 1 At the server console, enter NWCONFIG.NLM. 2 Click Products Options on the Configuration Options screen. 3 Click Other Installation Actions menu > Install a product not listed. 4 Press F3, and then specify the directory path to the script file. The directory path is first checked for an .IPS file. If only one .IPS file exists, it is executed. If more than one exists, only the first one found is executed. If there is no .IPS file, PINSTALL.
-
Manual 99a 38 July 17, 2001 Descriptors and Commands This section describes the descriptors and commands found in NETMAIN.ILS and other installation script files. The product installation script files you write contain the same types of descriptors and commands as those in NETMAIN.ILS. A descriptor is a keyword preceded by the @ character. The installation NLM scans the descriptors and uses them to build linked lists and menus in memory.
-
Manual 99a 38 July 17, 2001 ANSI escape sequences are recognized by the parser within double or single quotes. For example, '\\', "\n", and '\t' represent a backslash, a new line, and a tab, respectively. A NULL character (ASCII value 0) is not allowed anywhere in the file. Comments Syntax ; Description A comment (semicolon followed by text) exists for documentation purposes only—it does not invoke a script file operation.
-
Manual 99a 38 July 17, 2001 @DeletePartition Syntax @DeletePartition Description @DeletePartition deletes the existing partitions that you specify. In contrast, the installation NLM’s automatic partition creation deletes (by default) existing partitions of the first two types listed below. In both cases, all active partitions are left untouched.
-
Manual 99a 38 July 17, 2001 @Driver @EndDriver Syntax @Driver Help: “Help description for finding drivers” [Dir: , , , ] [Dir: , , , ] ... @EndDriver Description @Driver specifies help for finding drivers in maintenance-mode installations, or finding disks and directories that contains drivers. specifies the directory to read.
-
Manual 99a 38 July 17, 2001 Example @Driver Help: “If installing from a floppy, disk drivers will be on disk NetWare-2 and LAN drivers will be on disk NetWare-3. If installing from CDROM, all drivers will be in the directory :\NW40\SERVER\DRIVERS.” Dir: DDSK, '', 'NETWARE-2', 'NetWare-2' Dir: LAN, '', 'NETWARE-3', 'NetWare-3' @EndDriver Disk NetWare-2 will be scanned for .DSK and .DDI files; disk NetWare-3 will be scanned for .LAN and .LDI files.
-
Manual 99a 38 July 17, 2001 Class specifies how the fileset will be used: File Action MANDATORY Always executed. CORE Always copied in a sequential install, but optionally copied in the selective install/maintain mode. OPTIONAL Displayed to the user for selection. They are defaulted to on (selected for copy). OPTIONAL_OFF Displayed for the user to choose, but are defaulted to off.
-
Manual 99a 38 July 17, 2001 For a DOS file: Attribute1 Meaning 00000001 Read Only 00000002 Hidden 00000004 System 00000008 Volume Label For a NetWare file: Attribute1 Meaning 00000001 Read Only 00000002 Hidden 00000004 System 00000008 Execute 00000010 Subdirectory 00000020 Archive 00000080 Shareable 00000700 Smode 00001000 Transaction 00004000 Read Audit 00008000 Write Audit 00010000 Immediate Purge 00020000 Rename Inhibit 00040000 Delete Inhibit 00080000 Copy In
-
Manual 99a 38 July 17, 2001 The meaning for Attribute2 is 00000001 (do not decompress or process file). The default for Attribute2 is zero, which should be used in all usual circumstances. Flag Meaning 00000001 Do only for a custom install. 00000002 Do in first-phase copy (bit reset = second-phase). 00000004 Do only if NetWare for OS/2*. 00000008 Do only if native (not SFT IIITM or NetWare for OS/2). 00000010 Do only if SFT III. 00000020 Do only for a simplified installation.
-
Manual 99a 38 July 17, 2001 @IncludeFile @EndIncludeFile Syntax @IncludeFile File: [DiskDescription: “...[disk description]...”] [DiskVolume: 11 char vol name>] @EndIncludeFile Description @IncludeFile specifies a file () with additional commands to parse and execute. DiskDescription specifies the printed name on the media that shows where the include file is located; DiskVolume is the corresponding media volume name. The command file's directory is searched first.
-
Manual 99a 38 July 17, 2001 @MessageFile @EndMessageFile Syntax @MessageFile File: [Version: ] @EndMessageFile Description @MessageFile specifies a file, usually with the extension .MSG, containing message strings. It is typically located in the same directory as the script file or in an NLS subdirectory.
-
Manual 99a 38 July 17, 2001 @StartAppObject @EndAppObject Syntax @StartAppObject AppPlatform: AppName: AppPath: [AppDescription: “...Text...”] [AppContact: ] [AppMapping: ] [AppFlags: <>] [AppIcon: ] [AppCaption: “...Text...
-
Manual 99a 38 July 17, 2001 Variable Description AppContact The list of usernames to contact for resolving issues with the Application object. AppMapping A list of drive mappings that are made for the application to run correctly. AppIcon The filename and location of the applications icon. AppWorkingDir The startup directory for the application. AppUser A list of users authorized to run the application.
-
Manual 99a 38 July 17, 2001 Description Description is the menu description displayed for the @Other configuration option. This label must be first in the set of labels for a particular @Other option. File specifies the *.IPS file to execute, or the NLM to load to install the @Other option. DiskDescription is the prompt name that will be displayed to the user to prompt for another diskette. DiskVolume is the volume name for the disk specified in DiskDescription.
-
Manual 99a 38 July 17, 2001 If the other filename extension is .IPS, the file is assumed to be a script and is interpreted. If the other filename extension is .NLM, the file is loaded and executed as an NLM. Example @Other Description: “Install NetWare for Macintosh” DiskDescription: 'NWM System 1' DiskVolume: 'MAC-1' File: PINSTALL.NLM Description: “Install TCP/IP Protocol” DiskDescription: 'TCPIP System 2' DiskVolume: 'TCPIP-2' File: TCPIP.
-
Manual 99a 38 July 17, 2001 @StartSchemaMod @EndStartSchemaMod Syntax @StartSchemaMod SchemaFileName: , @EndSchemaMod Description @StartSchemaMod lets NDS schemas be extended through installation scripts. SchemaFileName specifies the filename for the schema file, along with a Description for displaying to the screen during the modification. Example @StartSchemaMod SchemaFileName: “sys:\\system\\schema\\nwadmin.
-
Manual 99a 38 July 17, 2001 Standard specifies information to be displayed to the user once the time zone has been selected. This includes the time zone abbreviation and the adjust +/x:xx:xx from GMT (Greenwich Mean Time) or UTC (Universal Coordinated Time). If Daylight exists, it specifies that daylight savings time exists for part of the year. It also specifies the daylight abbreviation, and the adjust +/-x:xx:xx from standard time.
-
Manual 99a 38 July 17, 2001 Two time zone descriptions are displayed. When one is selected, the time parameters are filled in according to the above information, and the user can verify or edit them. @TranslateModule @EndTranslateModule Syntax @TranslateModule ,, ,, ... @EndTrandlateModuel Description @TranslateModule is used internally by NETMAIN.ILS.
-
Manual 99a 38 July 17, 2001 Commands Command Syntax Command Description Command specifies the name of an optional command handler for commands not included in this file. The command handler name must be eight characters or less and correspond to the name of an NLM that exports external command entry points. Example Command ICMD.NLM ICMD.NLM provides external command support (see “External Command Syntax” on page 126).
-
Manual 99a 38 July 17, 2001 Example CopyDriverToServer SYSTEM, '*.LAN', 'NETWARE-3', “NetWare diskette [3]” The *.LAN files are copied to the SYS:SYSTEM directory. CopyDriverToStartup Syntax CopyDriverToStartup , , Description CopyDriverToStartup replaces driver files in the startup or boot directory (where STARTUP.NCF is) with new driver files.
-
Manual 99a 38 July 17, 2001 is a directory path relative to SYS: where the files will be copied. names the files to be copied; it might be in the “directory/file” form to copy files from a subdirectory. specifies the name of a diskette volume label and specifies the string used to prompt for the diskettes.
-
Manual 99a 38 July 17, 2001 Exec Syntax Exec Description Exec issues the operating system command LOAD , pauses until the child NLM unloads, then continues executing. To load from other subdirectories of the system volume besides \SYSTEM, specify a filename (SYS:// and /). Example Exec MY.NLM MY.NLM will be loaded and executed. Exec will follow the normal NLM search path to find MY.NLM.
-
Manual 99a 38 Record Type Data [6] Delete STARTUP line (255 char max) [7] Delete file line (255 char max) July 17, 2001 Example ProductRecord MYPROD, 1, “Description for my product” This creates a product description record for MYPROD with the quoted description. RegisterLanguage Syntax RegisterLanguage , Description RegisterLanguage renames to the respective name .
-
Manual 99a 38 July 17, 2001 Example SaveLanguageFile SERVER.MSG If the current language ID is 4, SERVER.MSG in the DOS startup directory (BOOT directory) is copied to the subdirectory 4 in the DOS startup directory. Spawn Syntax Spawn Description Spawn issues the operating system command LOAD , then the installation continues to execute. See “Exec” on page 123. Example Spawn MY.NLM The MY.NLM file is loaded and executed. Spawn follows the normal NLM search path to find MY.NLM.
-
Manual 99a 38 July 17, 2001 Using this method ensures that the ICMD.NLM version in SYS:SYSTEM is the actual 4.10 version and that all built-in products that use it will work properly. The new ICMD.NLM might still be fully backward-compatible, but it has not yet been fully tested in that regard. External Command Syntax To use any of the external commands made available by the ICMD.NLM command handler, include the statement command [] ICMD in the script file. Use CopyToServer to copy ICMD.
-
Manual 99a 38 July 17, 2001 Description AppendFile appends the contents of the source file onto the destination file. It creates a temporary file that is as large as the destination file, then renames that file to the destination file. Wildcard characters for are not allowed. Example AppendFile input, file1, 'NETWARE-1', “NW [1]”, output, file2, '', '' The user is prompted for diskette NW [1], which is verified by checking for volume label NETWARE-1.
-
Manual 99a 38 July 17, 2001 CheckFile Syntax CheckFile , , , Description CheckFile checks for the existence of at a path determined by the value of . If the path is a floppy, and is non-null (not ''), the user will be prompted for disk if it is not already in the drive. If the file is found, the value of variable NWSTATUS will be zero; otherwise it will be non-zero. Example CheckFile NWSRC, file1.
-
Manual 99a 38 July 17, 2001 and time services information. The existing AUTOEXEC.NCF on SYS:SYSTEM is overwritten. Console Syntax Console , Description Console enters the text on the system console screen and delays before returning control back to the calling process. Because the system installation process executes in a different thread from the console, it is possible that the next command might finish before this Console command does.
-
Manual 99a 38 July 17, 2001 (0|1|2|3) Value Description 0 Source is a file. 1 Source (including ) is a directory; copy directory contents to destination. 2 Source and the destination are files (file-to-file copy). must be 0 if is 2 3 Source (including ) is a directory; copy directory contents to destination only if that directory already exists on the destination.
-
Manual 99a 38 July 17, 2001 For a DOS file: Attribute Meaning 00000001 Read Only 00000002 Hidden 00000004 System 00000008 Volume Label For a NetWare file: Attribute Meaning 00000001 Read Only 00000002 Hidden 00000004 System 00000008 Execute 00000010 Subdirectory 00000020 Archive 00000080 Shareable 00000700 Smode 00001000 Transaction 00004000 Read Audit 00008000 Write Audit 00010000 Immediate Purge 00020000 Rename Inhibit 00040000 Delete Inhibit 000800
-
Manual 99a 38 July 17, 2001 Reserved path names () are NWSRC, NWDST and NWBOOT, the standard source, destination and boot path for NetWare files. can be a null string. Value Description 0 (or not present) Unconditionally copy this file. 1 Copy if destination file is not present. 2 Copy if destination file is not present; if it is, prompt user (no version check).
-
Manual 99a 38 July 17, 2001 CopyFloppyImage Syntax CopyFloppyImage , , , , , , , , , Description CopyFloppyImage copies a diskette image file sector by sector to the specified drive (destination path which must be a diskette drive). Variable Description (0|1) 0 indicates a 3.5-inch high-density drive. 1 indicates a 5.
-
Manual 99a 38 July 17, 2001 DiskReset Syntax DiskReset Description DiskReset tells DOS to rescan the directories on the floppy drive. This is necessary because the drive change interrupt is disabled while NetWare has control. Example Assuming myDir corresponds with A:\ DiskReset myDir Drive A:\will be rescanned. Dismounted CD Syntax DisMountCD Description DisMountCD is to be used with PromptForCD (below).
-
Manual 99a 38 July 17, 2001 Example GetPath sys, 1, 'SYS:', '' Display_Text_File sys, “license.txt”, ccode The completion code will return a 0 (zero) for a successful return. Anything else is an error. Display Syntax Display <0|1|2>, “......” Description Display displays a message, accompanied by a beep if the first argument is 1. If the argument is 2, the message is displayed as a copy status. Example Display 0, “Product XYZ installation is complete.
-
Manual 99a 38 July 17, 2001 Variable Description 1: Daylight savings time exists in this time zone 0: Daylight savings time doesn't exist in this time zone “set parameter” daylight savings time start string. For Example First Sunday of April at 2:00:00 a.m “set parameter” daylight savings time end string. For Example Last Sunday of October at 2:00:00 a.m.
-
Manual 99a 38 July 17, 2001 EraseFile Syntax EraseFile , , , , Description EraseFile recursively erases the file or directories indicated in . Wildcards are acceptable. In NetWare, files can be removed no matter what their attributes; in DOS, only normal files can be removed. IMPORTANT: Use this command with care to delete only the intended data.
-
Manual 99a 38 July 17, 2001 Example GetPath startup, 1, 'C:\\NWSERVER', '' EditNCF_KEYSTRING '' EditNCF_KEYSTRING 'PK411.NLM' EditNCF startup, 'startup.ncf', 'bak', ccode The contents of C:\NWSERVER\STARTUP.NCF will be searched for a line containing PK411.NLM and will be commented out by the EditNCF command.
-
Manual 99a 38 July 17, 2001 EditNCF_KEYSTRINGS Syntax EditNCF_KEYSTRINGS Description EditNCF_KEYSTRINGS defines a list of keystrings to be used by EditNCF when determining which lines to comment out. (A line will be commented out if it contains any of the keystrings). NOTE: The list must be terminated with a null string (empty quotes) for the last entry. This command can be used multiple times. Each time replaces the previously defined list.
-
Manual 99a 38 July 17, 2001 The variable version contain the string “v2.11”. ExtractVersionNumbers returns a value of 2 in the variable major, a value of 11 in the variable minor. And a value of 0 in the variable revision.
-
Manual 99a 38 July 17, 2001 GetPath Syntax GetPath , , , , [] Description GetPath prompts the user for a path using the prompt. The prompt string will be displayed, with “%s” (like C-language print formatting) being replaced by the string. The keystrokes to modify will be added to your prompt. Trailing backslashes are always removed before the path is displayed. is a variable name that can be used later in a CopyFile command.
-
Manual 99a 38 July 17, 2001 Goto Syntax Goto Description Goto causes execution to continue at the first occurrence of label . The scope of a label is always local to a file set. Therefore, a Goto statement cannot transfer execution to a file set different from the current one. Example Goto Done Label Done The statement Goto Done will cause execution to continue at the label Done.
-
Manual 99a 38 July 17, 2001 GotoIfNEqual GotoIfGreater GotoIfLess GotoIfGrEqual GotoIfLsEqual Syntax GotoIfNEqual , , GotoIfGreater , , GotoIfLess , , GotoIFGrEqual , , GotoIfLsEqual , , Description These are identical to GotoIfEqual (page 142), except that execution branches only if (respectively): not equal to is greater than is less than
-
Manual 99a 38 July 17, 2001 IsSubString Syntax IsSubString , , Description IsSubString returns the zero based of where starts, if is indeed contained within , otherwise is -1. Example IsSubString ‘Little Miss Muffet sat on’, ‘Miss Muffet’, index In this example, would return as 7. Label Syntax Label Description Label serves only as a target of a goto statement with .
-
Manual 99a 38 July 17, 2001 Description LangVar sets a variable to the number of a language. It starts with , then it looks for a subdirectory whose name is a number that matches the current server language number. If the subdirectory is found, is set to that number; otherwise, is set to . Example Assuming the current language is 6: LangVar 4, lang, NWSRC, '', '' This command looks in the source install directory for a subdirectory named 6.
-
Manual 99a 38 July 17, 2001 NLMExec NLMExecIO Syntax NLMExec , Description NLMExec executes the NLM specified by . If is 1, NLMExec waits for the NLM to complete execution, then continues. NLMExec is the external command version of the Exec (page 123) command. NLMExecIO is identical to NLMExec except it executes the command line on the default DOS server on a NetWare SFT III server. See “SetDOSServer” on page 149 for more information.
-
Manual 99a 38 July 17, 2001 PromptForCD Syntax PromptForCD , Description PromptForCD is to be used with DisMountCD (above). PromptForCD will prompt the user to insert the CD labeled into the CD drive and then will attempt to mount the CD volume within the time frame. Example PromptForCD ‘CD 1’, 30 Quit Syntax Quit Description Quit will exit the script processing at this point. No further processing will take place.
-
Manual 99a 38 July 17, 2001 This command is the counterpart to the ProductRecord command. See “ProductRecord” on page 123 for more information on record types. Example ReadProductRecord MYPROD, 0, version, ccode The command will search the products database and return the value for for product 'MYPROD'. Read_Var_File Syntax Read_Var_File , , Description Read_Var_File will read the contents of the filename and create variables for script processing.
-
Manual 99a 38 July 17, 2001 indicates normal attributes. If the <0|1> argument is 1, the server container object (or everyone) is given rights to the directory. Example If myDir corresponds to VOL1:\ SetDir myDir, DOC, '', '', 10, 1, 0 The directory VOL1:\DOC will be created and all applicable users will have rights to it.
-
Manual 99a 38 July 17, 2001 SetLConfigLang Syntax SetLConfigLang Description SetLConfigLang looks for the LCONFIG.SYS file in the server boot directory. The default server language ID number is changed to . Example SetLConfigLang 9 The default server language ID number in the LCONFIG.SYS file is changed to 9 (Japanese). SetVar Syntax SetVar , , [] Description SetVar sets a variable with to the string value.
-
Manual 99a 38 July 17, 2001 SGotoIfEqual SGotoIfNEqual SGotoIfGreater SGotoIfLess SGotoIfGrEqual SGotoIfLsEqual The SGotoIf commands have the same options as the GotoIf commands. The SGotoIf commands perform a string comparison instead of an integer comparison. SpaceCheck Syntax SpaceCheck , Description SpaceCheck looks at .
-
Manual 99a 38 July 17, 2001 SrchNCF Syntax SrchNCF , , , Description SrchNCF searches an .NCF file for line containing a substring matching (non case-sensitive). If found, the line of text will be returned; otherwise will be empty. NOTE: The same value as not found will be returned if an error is encountered (for example, invalid filename, read error, etc).
-
Manual 99a 38 July 17, 2001 Volumes Syntax Volumes Description Volumes creates and mounts volumes on this server, with the volume SYS: placed on the first device larger than (512 bytes per sector). Additional volumes, named “VOL1”, “VOL2”, etc., will be created on other devices, one per device.
-
Manual 99a 38 July 17, 2001 part of the variable name and must be included with the variable when referencing it later. If the filename doesn't exist, it will be created. The varname and var value will then be written. If the file does exist, the varname and var value will be appended to the contents of the file. External Command Programming Interface The external command programming interface contains the functions described below. IMPORTANT: These functions require ICMD.NLM 2.18 or later.
-
Manual 99a 38 July 17, 2001 ICMDGetVar Use the ICMDGetVar function to get the value of a script variable. Function int ICMDGetVar (char *variableName, char *variableValue) *variableName: Pointer to name of variable *variableValue: Buffer containing value of variable; must be at least 128 bytes Return 0 if successful; non-zero error code if unsuccessful or if variableName does not exist. Description ICMDGetVar is a function exported by ICMD.NLM that another NLM can call.
-
Manual 99a 38 July 17, 2001 External Command Variable Substitution A variable, such as the value returned by GetPath (page 141), can be used inside any quoted string within an executed external command. The variable is global. It goes out of scope only when the command processor is replaced by a different one. The variable can be dereferenced explicitly by an expression %{} within another string. Variable Description NWSERVER The name of the server the script is processing on.
-
Manual 99a 38 July 17, 2001 All path variables, including the predefined ones, allow subfield specifiers in the form .. PATH String containing the actual path. VOL Disk volume name. PROMPT Disk volume prompt. TYPE Path type. SUBTYPE Path subtype. CONN Connection number (hex). ENGINE Engine number.
-
Manual 99a 38 July 17, 2001 Installation NLM Command Line Options Command line options can be preceded by '-', but this is not required. IMPORTANT: These options are not intended for general distribution; they apply only to the NetWare installation NLM. Other Switches are not guaranteed to be supported in all versions. User-Documented Switches for NetWare Installation Switch Description DSREMOVE Allows absolute removal of DS. R Allows license replacement.
-
Manual 99a 38 July 17, 2001 Other Switches Switch Description MDEBUG Memory debug. TRANSPORT Transport layer type. (IPX is the default). IPX TCP UDP C= Source path remote context. DS= Specifies that NDS authentication will be used. If command is not present, the connection is made through the bindery. F= Front end flag. Q simplified mode T calculate file set totals V suppressed delayed init (DELAY) X allow more DS options K= Default startup.ncf file spec. L= Mode of installation.
-
Manual 99a 38 July 17, 2001 NetWare 4.1 Remote Installation Wrapper You can use NetWare installation to remotely install a product that was not originally intended for remote installation. 1 Create a wrapper script that copies the associated files to the server before executing PINSTALL.NLM. Make sure the system volume is large enough to contain the scratch files, even in local install cases. In the example below, the directory layout is as follows on the diskette: \ (root) PINSTALL.IPS PINSTALL.
-
Manual 99a 38 July 17, 2001 NetWare Installation Command Version Availability The following tables list the available NetWare installation and external installation commands. NetWare Install Commands Command NetWare 4.10 NetWare 4.
-
Manual 99a 38 July 17, 2001 Command NetWare 4.10 NetWare 4.11 NetWare for Small Business NetWare 5 and NetWare 6 Exec X X X X ProductRecord X X X X RegisterLanguage X X X X SaveLanguageFile X X X X Spawn X X X X 2.18 3.20 3.25 X X X X X X X X X NetWare External Install Commands Command Version of ICMD.NLM 2.
-
Manual Command 99a 38 July 17, 2001 Version of ICMD.NLM 2.00 2.18 3.20 3.
-
Manual Command SetDir 99a 38 July 17, 2001 Version of ICMD.NLM 2.00 2.18 3.20 3.
-
NetWare Migration Wizard 6 Administration Guide Novell NetWare Migration Wizard 6 ® www.novell.
-
Manual Rev 99a July 17, 2001 38 Contents Contents 5 NetWare Migration Wizard 6 Administration Guide 7 Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1 Migrating Data from NetWare 3 9 Meet System and Software Requirements . . . . . . . Preparing the Workstation . . . . . . . . . . . . . Preparing the Source Server . . . . . . . . . . . . Preparing the Servers in the Destination NDS Tree Creating a Template Object . . . . . . . . . . . .
-
Manual Rev 99a July 17, 2001 38 Migrate Users and Data to the Destination NDS Tree. . . . . . . . . . . . . . . . . . . . . . . 46 Perform Post-Migration Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 4 Troubleshooting 51 General Connection Problems . . . . . . . . . . . . . Workstation-to-Server Connections . . . . . . . . . . . Server-to-Server Connections . . . . . . . . . . . . . . File Copy . . . . . . . . . . . . . . . . . . . . . . . . SMDR Errors . . . . . . .
-
Manual Rev 99a 38 July 17, 2001 NetWare Migration Wizard 6 Administration Guide Novell® NetWare® Migration Wizard 6 lets you copy data from a NetWare or a Windows* NT* server to another NetWare server in your network. Migrating Data from NetWare 3—Migration Wizard copies the NetWare 3 file system and bindery objects to a destination NDS® tree. When the bindery objects are copied to the destination NDS tree, they are automatically converted to NDS objects.
-
Manual 8 Rev 99a NetWare Migration Wizard 6 Aministration Guide NetWare Migration Wizard 6 Aministration Guide 103-000161-001 August 29, 2001 Novell Confidential 38 July 17, 2001
-
Manual 1 Rev 99a 38 July 17, 2001 Migrating Data from NetWare 3 Novell® NetWare® Migration Wizard 6 copies and consolidates your NetWare 3 bindery and file system from one or more existing NetWare 3 servers to a destination NDS® tree. The following figure shows how the Migration Wizard manages the migration of data from multiple NetWare 3 servers to a destination NDS tree. NetWare 3 Servers Data Destination NDS Tree files volumes objects NetWare Migration Wizard Windows 98 or Windows NT 4.
-
Manual Rev 99a 38 July 17, 2001 3. “Verify Your Migration Project” on page 17 4. “Migrate Users and Data to the Destination NDS Tree” on page 17 5. “Perform Post-Migration Tasks” on page 20 Meet System and Software Requirements Log in to your destination NDS tree with a user that is listed in the bindery context of the destination NDS tree. Make sure the user has the Supervisor right to the destination servers that you are migrating file data to and three available user licenses.
-
Manual Rev 99a 38 July 17, 2001 Preparing the Source Server The source server is the existing server that contains the data that will be copied to the destination NDS tree. The source server must be running NetWare 3.11 or later. Load the following NLMTM program at the server console of each NetWare 3 source server that you are planning to migrate: For NetWare 3.11, load TSA311.NLM For NetWare 3.12 and 3.2, load TSA312.
-
Manual Rev 99a 38 July 17, 2001 If there is a conflict between the properties of a Template object and properties of a NetWare 3 user, the properties of the Template object will, in most cases, take priority.
-
Manual Rev 99a 38 July 17, 2001 8 Click Next. 9 Name your migration project, choose a place to save it, and then click Next. By default, Migration Wizard saves your project in C:\Program Files\Novell\NetWare Migration Wizard. 10 Select the source servers that you want to migrate. Only servers that you are already logged in to appear in the Selected Servers text box. To log in to a server, click the Server icon. When you are finished selecting your servers, click Next.
-
Manual Rev 99a 38 July 17, 2001 any changes, Migration Wizard will automatically merge the NetWare 3 user with the displayed NDS user. Figure 1 Merging Your NetWare 3 Users with Duplicate NDS Users You have the following options for each NetWare 3 user: Merge the NetWare 3 user with the displayed NDS user Simply leave the NetWare 3 user displayed as it is in the table and continue with the next user.
-
Manual Rev 99a 38 July 17, 2001 15e Once you have made a decision for each listed NetWare 3 user, click Finish. The NetWare 3 users that you chose to merge with NDS User objects appear automatically as dropped objects in the destination NDS tree. Continue with the next section, "Model Your Migration Project.
-
Manual Figure 2 Rev 99a 38 July 17, 2001 Using the Project Window Dialog Box The three basic steps outlined in this dialog box should be performed for each migration project. Once you are familiar with the tasks that you will be performing, click Close to access the Project Window and begin modeling your migration. Complete the following tasks: 1 Determine which NetWare 3 bindery objects and volume data will be copied to which containers in the destination server’s NDS tree.
-
Manual Rev 99a 38 July 17, 2001 Verify Your Migration Project Once you have modeled your migration in the Project Window, you should verify that the proposed locations for these new objects do not conflict with existing names in the destination NDS tree. Remember, dragged-and-dropped items appearing in the NDS tree are merely assigned to be copied to that area in the NDS tree. Objects will not actually be migrated until you begin the migration.
-
Manual Rev 99a 38 July 17, 2001 4 If prompted, select what volume you want to migrate your NetWare 3 print queue volume to, and then click Next. 5 If you want to apply a Template object to newly created users, browse the tree, select the Template object from the tree view and then click Next. If you do not want to use a Template object, uncheck the check box and click Next. IMPORTANT: Home directories are not automatically migrated.
-
Manual Rev 99a 38 July 17, 2001 10 Click Next to verify that you have enough disk space on the destination volume to accommodate your NetWare 3 file system. Migration Wizard will also scan the contents of all dropped folders and verify that you have sufficient rights to migrate them. 11 If prompted, resolve any naming conflicts between different-type objects, and then click Next. You can choose to rename different-type objects or to not migrate them.
-
Manual Rev 99a 38 July 17, 2001 17 (Migration only) View the Error Log and the Success Log. Continue with the next section, "Perform Post-Migration Tasks." Perform Post-Migration Tasks After you’ve migrated the bindery objects and file system to the destination server, complete the following tasks: Modify the print configuration if you want to convert your queue-based printing to NDPS®. For more information, see the Novell Documentation Web site (http:// www.novell.
-
Manual 2 Rev 99a 38 July 17, 2001 Migrating Data from NetWare 4, 5, or 6 When you migrate data from a NetWare® 4, NetWare 5, or NetWare 6 source server to a NetWare destination server, Novell® NetWare Migration Wizard 6 copies the file system and NDS® database from the source server to the newly installed NetWare destination server.
-
Manual Rev 99a 38 July 17, 2001 To migrate data from NetWare 4, NetWare 5, or NetWare 6, complete the following tasks in the order they are listed. 1. “Meet System and Software Requirements” on page 22 2. “Run Migration Wizard” on page 25 3. “Perform Post-Migration Tasks” on page 32 Meet System and Software Requirements Preparing the Workstation Make sure your workstation has the following: A Windows 98 or Windows NT 4/2000 workstation with 50 MB of available disk space.
-
Manual Rev 99a 38 July 17, 2001 (Conditional) If you are migrating data from NetWare 4, make sure that the source server’s volumes are running long name space support on all volumes to be copied. To add long name space support to a NetWare 4.11 or NetWare 4.2 volume, enter the following at the server console: LOAD LONG and then ADD NAME SPACE LONG TO volumename.
-
Manual Rev 99a 38 July 17, 2001 During the installation, create volumes on the destination server that are the same size as, or larger than, volumes on the source server. Volume names on the destination server must be the same as the volume names on the source server. Migration Wizard migrates compressed volumes. If you are migrating compressed volumes to uncompressed volumes, Migration Wizard decompresses the volumes during the migration.
-
Manual Rev 99a 38 July 17, 2001 Run Migration Wizard 1 Download and install NetWare Migration Wizard 6 from the NetWare section of the Novell Software Downloads Web site (http:// www.novell.com/download). 2 Run Migration Wizard from the location where you installed it. The installation program, by default, installs Migration Wizard at this location: Start Menu > Programs > Novell > Netware Migration Wizard > NetWare Migration Wizard. 3 Read the Welcome screen and click OK.
-
Manual Rev 99a 38 July 17, 2001 Copy Volumes 1 In the Project Window, click Copy Volumes. Before Migration Wizard starts copying files, it backs up your directory and file trustees and saves them in files located on the source and the destination server. Once the NDS migration is complete, Migration Wizard restores the trustees from the files it stored on the destination server. You do not need to copy all volumes at once.
-
Manual Rev 99a 38 July 17, 2001 directories, Migration Wizard migrates them to the SYS:SYS.MIG directory on the destination server. If there are files in the source server’s SYS: directories that you want to utilize on the destination server, after the NDS migration is completed, copy the files from the SYS:SYS.MIG directory into the appropriate SYS: directory on the destination server. Remember, any applications that have NLM programs in this directory will need to be reinstalled after the migration.
-
Manual Rev 99a 38 July 17, 2001 Edit Configuration Files 1 In the Project Window, click Edit Configuration Files. Migration Wizard lets you modify any .NCF or .CFG files on the destination server. These files contain default LOAD statements and parameters. IMPORTANT: If you are editing your AUTOEXEC.NCF, make sure the file is closed before you migrate your NDS database. 2 In the text box, select the configuration file that you want to edit and then click Edit File.
-
Manual Rev 99a 38 July 17, 2001 Begin NDS Migration 1 In the Project Window, click Begin NDS Migration. 2 Back up all volumes that you are not planning to migrate and complete the following tasks before continuing: Make sure all volume data migrated successfully. Make sure all critical errors from the file copy are resolved. Make sure the servers in your source NDS tree are in time sync and that NDS is synchronized. For more information, see Step 2 on page 31. 3 Click Next.
-
Manual Rev 99a 38 July 17, 2001 IMPORTANT: If you are getting NICI errors when NDS is trying to load or when you are copying the NICI files, you should first check and see if PKI.NLM will load on the destination server. If PKI.NLM won’t load, see “NICI Errors” on page 55. 8 Delete all user connections (except your own) to the source and destination servers, and then click Next. 9 Enter the passwords for the source and destination trees, and then click Next.
-
Manual Rev 99a 38 July 17, 2001 14 Reboot your workstation and log in to the former destination server. If you can’t log in, refer to “Workstation-to-Server Connections” on page 52. Continue with the next section, "Finish NDS Migration." Finish NDS Migration 1 In the Project Window, click Finish NDS Migration.
-
Manual Rev 99a 38 July 17, 2001 Perform Post-Migration Tasks 1 Run DSREPAIR on the destination server and select Unattended Full Repair. 2 Make sure that user information migrated successfully. 3 Reinstall any applications that have files or NLM programs associated with the following volume SYS: directories: SYSTEM, PUBLIC, MAIL, ETC, and NETBASIC.
-
Manual 3 Rev 99a 38 July 17, 2001 Migrating Data from Windows NT Novell® NetWare® Migration Wizard 6 automates key tasks, such as migrating users and their file permissions, assigning passwords, and migrating the NT file system to a designated NDS® tree. This automation eliminates the need to choose from various utilities that would help you perform these tasks individually. Windows NT 3.51/4 Server NetWare Server Data File System and NT Objects NetWare Migration Wizard Windows NT 4.
-
Manual Rev 99a 38 July 17, 2001 This information will help you decide which NT servers to migrate first and how many servers you will need to migrate at one time. When you migrate your users and groups, you will want to migrate all files and directories that they have access to at the same time that you migrate their User objects.
-
Manual Rev 99a 38 July 17, 2001 Do you have any trusted domains? If so, you must reassign any trusted domain permissions to the appropriate NT user and groups after the migration is complete. Use ConsoleOneTM to reassign all lost trusted domain permissions. Once you have planned your migration, you’re ready to begin your NT migration. Complete the following tasks in the order they are listed. 1. “Meet System and Software Requirements” on page 35 2. “Perform Prerequisite Tasks” on page 36 3.
-
Manual Rev 99a 38 July 17, 2001 Platform Hardware Software Windows NT 4 and Windows NT 2000 workstations Minimum hardware requirements of Windows NT 4 and 2000 workstations Novell ClientTM for Windows NT 4 and 2000 version 4.8 or later Minimum hardware requirements of Windows NT 4 Novell Client for Windows NT version 4.
-
Manual Rev 99a 38 July 17, 2001 If there is a conflict between the properties of a Template object and an NT policy, the properties of the Template object will, in most cases, take priority. For example, if a minimum password length of seven characters is specified for user Jeff in an NT policy and a minimum password length of nine characters is specified in the Template object, then when Jeff’s object is migrated, the object will be created in NDS with a password length of nine characters.
-
Manual Rev 99a 38 July 17, 2001 To create ZENworks User Policy Packages in ConsoleOne, do the following: 1 In NetWare Administrator, right-click an NDS Organizational Unit in the tree view and then click Create > Policy Package. The type of workstation you have in your NT network (Windows NT/ 2000, Windows 95/98, or both) will determine whether you want to create WINNT-2000 user policy packages, WIN 95-98 policy packages, or both. 2 In ConsoleOne, click the user policy package icon in the toolbar.
-
Manual Rev 99a 38 July 17, 2001 3 Click Properties and enter the computer name and appropriate domain, and then click OK. 4 Reboot the workstation and launch Migration Wizard again; then continue with the next section, "Run Migration Wizard." Run Migration Wizard 1 Download and install Migration Wizard from Novell Software Downloads (http://www.novell.com/download) > NetWare > NetWare Migration Wizard 6 or from the NetWare 6 Operating System CD. Follow the download and installation instructions.
-
Manual Rev 99a 38 July 17, 2001 The destination NDS tree is the NDS tree that you want to migrate your NT data to. If you are not logged in to your NDS tree, the NDS tree name will not appear in the drop-down list. If this is the case, click the Browse button to log in to your NDS tree. Once you are logged in, the NDS tree name automatically appears in the drop-down list.
-
Manual Figure 3 Rev 99a 38 July 17, 2001 Merging Your NT Users with Duplicate NDS Users You have the following options for each listed NT user: Merge the NT user with the displayed NDS user. Simply leave that user as it is displayed in the table and continue with the next listed NT user. Merge an NT user with a different NDS user. Click the arrow by the NDS username to view a drop-down list containing all the NDS users that have the same username (including contexts) as the adjacent NT user.
-
Manual Rev 99a 38 July 17, 2001 Model Your Migration Project Most of your work will be done in the Project Window, where you can drag and drop NT User and Group objects into NDS containers, and NT folders and volumes into any volume or folder in the destination NDS tree. The Project Window is a place to model different migration scenarios before you begin the actual migration without affecting your NT domain or your destination NDS tree.
-
Manual Rev 99a 38 July 17, 2001 performing, click Close to access the Project Window and begin modeling your migration project. Using the Project Window Review the following tips to help you organize your migration project and use the Project Window more effectively. Creating a New NDS Organizational Unit or Folder—To create a new NDS Organizational Unit (OU), right-click the parent NDS Organizational Unit or folder and then click New Organizational Unit or New Folder.
-
Manual Rev 99a 38 July 17, 2001 Uppercase and lowercase letters, underscores, and spaces are not acknowledged by NDS. For example, Manager_Profile and MANAGER PROFILE are considered identical names in NDS. Setting the Context—To set the context, right-click an NDS Organizational Unit and then click Set Context. When you set the context, you can designate what part of the NDS tree will appear in the right side of the Project Window. This is useful if you have a large NDS tree with many objects.
-
Manual Rev 99a 38 July 17, 2001 Finding Out Where a Dropped NT Object Came From—To find out where a dropped object was located in the NT domain, right-click an NT object and then click Where Did It Come From? When dragging and dropping a large number of objects, this will help you remember where a dropped object was previously located in the NT domain.
-
Manual Rev 99a 38 July 17, 2001 Migrate Users and Data to the Destination NDS Tree Although you have selected the volumes and containers where the NT data will be copied, no data has yet been migrated. When migrated, NT User objects are converted to NDS objects and placed in the destination NDS tree. To begin the migration, do the following: 1 From the Migration Wizard toolbar, click Project > Verify and Migrate Project. 2 Read the Welcome screen and then click Next.
-
Manual Rev 99a 38 July 17, 2001 4c Review the NT groups that you chose to associate with specific ZENworks User Policy Packages, and then click Next. If you want to change an association, click Back and follow the instructions in Step 4b. HINT: This screen will not appear if you are using ZENworks 3.0. 5 Decide how you want to handle any duplicate filenames between the Microsoft NT domain and the destination NDS tree.
-
Manual Rev 99a 38 July 17, 2001 Everyone permissions, be sure to drop the NT Domain Info object high enough in the NDS tree so that all NT users will inherit those permissions. HINT: Every new folder that is created in the NT domain automatically receives the Everyone permissions by default.
-
Manual Rev 99a 38 July 17, 2001 12 If prompted, verify that you do not want to migrate the listed NT users and groups, and then click Next. This procedure must be done three times—once for all your NT local groups, NT global groups, and NT users that were not dragged and dropped into the destination NDS tree. If you migrated all of your users and groups, you will not see this dialog box. If you have made a mistake, click Cancel. This will return you to the Project Window.
-
Manual Rev 99a 38 July 17, 2001 Perform Post-Migration Tasks After you’ve migrated your NT data to the destination NDS tree, complete the following tasks: Install the latest Novell Client software on any workstations that it was not previously installed on. You can download the client from the Novell Software Download Web site (http://www.novell.com/download). For instructions on installing the Novell Client on multiple workstations at the same time, see the Novell Client Documentation at (http://www.
-
Manual 4 Rev 99a 38 July 17, 2001 Troubleshooting Refer to the appropriate section if you are having trouble with any of the following: General Connection Problems (page 51) Workstation-to-Server Connections (page 52) Server-to-Server Connections (page 53) File Copy (page 53) SMDR Errors (page 54) Restoring Trustees (page 54) NUWAGENT.
-
Manual Rev 99a 38 July 17, 2001 The NDS user that you are using to do the migration has the Supervisor right to the source server’s NDS object. Use ConsoleOneTM to verify that the NDS object of the NDS user is listed in the source server’s Operators list.
-
Manual Rev 99a 38 July 17, 2001 Server-to-Server Connections If you have problems establishing or maintaining connections between your servers, try one or more of these troublshooting suggestions: Do not remove the source or destination server from the NDS tree. The servers must be able to communicate with the other servers in the tree during the migration. Make sure the destination and source servers can communicate with each other. For IPX connections, enter DISPLAY SERVERS at the server console.
-
Manual Rev 99a 38 July 17, 2001 SMDR Errors Sometimes the SMDR.NLM program that is running on the destination server can’t make a connection to the source server. To correct this problem, try one or more of the following: Reboot the source server. Unbind the protocol you are not using from the destination server. For example, if you are using IPX for the migration, but IP is bound on the destination server, unbind the IP protocol on the destination server during the migration.
-
Manual Rev 99a 38 July 17, 2001 NUWAGENT.NLM NUWAGENT.NLM is the NLM program that the Migration Wizard uses to do much of its work. If you get errors that the NUWAGENT.NLM won’t load, try the following: Manually load NUWAGENT.NLM from the server console. Enter SMDR NEW at the destination server console. This re-creates the SMDR configuration and allows NUWAGENT.NLM to load.
-
Manual Rev 99a 38 July 17, 2001 NDS Migration If the migration fails during the NDS Migration step, you need to restore the source and destination servers to their original configuration before you can retry the NDS migration. The instructions for restoring the servers to their original configurations are different depending on when the migration of data failed.
-
Manual Rev 99a 38 July 17, 2001 4 To perform the NDS migration again, launch Migration Wizard and open the project you were previously working on. When the project opens and you see the Project Window, click the Begin NDS Migration button and follow the instructions in “Begin NDS Migration” on page 29.
-
Manual Rev 99a 38 July 17, 2001 If the message appears saying that NDS has already been removed, bring the destination server down and continue with the next section, "Remove NDS from the Source Server." If NDS was not successfully removed, exit NWCONFIG and enter NWCONFIG -DSREMOVE at the destination server console.Then follow this procedure again, beginning with Step 2. Remove NDS from the Source Server Once NDS has been removed from the destination server, remove NDS from the source server.
-
Manual Rev 99a 38 July 17, 2001 Restore NDS to the Source Server By removing NDS from the source server, you removed the server from any replica rings that held a partition of the source server. Now you must complete the following procedure to restore NDS to the source server. 1 Enter one of the following at the server console: If your source server was running NetWare 4, enter LOAD INSTALL. If your source server was running NetWare 5 or later, enter LOAD NWCONFIG.
-
Manual Rev 99a 38 July 17, 2001 15 Enter the Admin username and password. 16 Exit DSREPAIR. 17 At the workstation where you performed the migration, open your project. 18 From the Migration Wizard Tools menu, click Restore Trustees to restore the trustee assignments. 19 If the source server held the master replica of any partitions and you want to restore these partitions prior to doing the NDS migration again, use DSREPAIR to re-create them.
-
Novell Client for Windows Novell Client for Windows www.novell.
-
doc_tpl.fm Rev 99a 22 June 00 28 Contents Novell Client Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 1 Installing Novell Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Preparing to Install the Client Software . . . . . . . . Checking Server Protocols and Requirements . . . Downloading the Latest Client Software . . . . . .
-
doc_tpl.fm Rev 99a 22 June 00 Logging In to the Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Logging Out of the Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Setting Up Passwords in Windows NT/2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Setting Client Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Setting Properties before Installation . . . . . . . . . . . . .
-
doc_tpl.fm Text File Usage . . . . Other . . . . . . . . . # . . . . . . . . . . . . . Command Format . . Example . . . . . . . @. . . . . . . . . . . . . Command Format . . Examples . . . . . . . ATTACH . . . . . . . . . BREAK . . . . . . . . . . Command Format . . CONTEXT . . . . . . . . Command Format . . Example . . . . . . . DISPLAY . . . . . . . . . Command Format . . Example . . . . . . . DRIVE . . . . . . . . . . Command Format . . Example . . . . . . . EXIT . . . . . . . . . . . FDISPLAY . . . . .
-
doc_tpl.fm PROFILE . . . . . . Command Format Example . . . . . REMARK . . . . . . Command Format Example . . . . . SCRIPT_SERVER . Command Format SET . . . . . . . . . Command Format Examples . . . . SET_TIME . . . . . . Command Format SHIFT . . . . . . . . Command Format Examples . . . . TERM . . . . . . . . Command Format Example . . . . . TREE . . . . . . . . Command Format Example . . . . . WRITE. . . . . . . . Command Format Examples . . . . B C . . . . . . . . . . . . . . . . . . . . . . . . . .
-
Manual 99a 38 July 17, 2001 Novell Client Documentation This documentation includes information on installing and configuring Novell® ClientTM for Windows* XP version 4.82, Novell Client for Windows NT*/2000 version 4.81, and Novell Client for Windows 95/98 version 3.31 and later software. If you are using a previous version of Novell Client software, you should update it to the latest version (http://www.novell.com/download).
-
Manual 12 Novell Client for Windows Novell Client for Windows 103-000159-001 December 7, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 1 99a July 17, 2001 38 Installing Novell Clients This chapter explains how to install Novell® ClientTM for Windows XP, Novell Client for Windows NT/2000, and Novell Client for Windows 95/98 software on one workstation or across the network.
-
Manual 99a 38 July 17, 2001 Checking Server Protocols and Requirements You must prepare your servers to work with the Novell Client software. You must know what protocols you use on the server and make sure that the servers are configured to support long filenames. NetWare® 5 or later automatically supports long filenames and does not need to have the name space added to it. However, you must add long filename support to NetWare 3 and NetWare 4 servers.
-
Manual 99a July 17, 2001 38 Adding Long Name Space Make sure that long filename support is installed on NetWare 3 or NetWare 4 servers. NetWare 5 or later servers automatically support long filenames. IMPORTANT: Each name space added to a volume requires additional server memory. If you add name space support to a volume on a server without sufficient memory, that volume cannot be mounted.
-
Manual 99a 38 July 17, 2001 If you have never installed a client or created a network connection, you might not have access to Network Neighborhood or My Network Places. Therefore, you must install the client software from CD-ROM. See “Installing Novell Client at the Workstation” on page 17.
-
Manual 99a July 17, 2001 38 Additional Information “Installing Novell Client at the Workstation” on page 17 “Installing Clients from the Network” on page 19 Installing Novell Client at the Workstation If you plan to install Novell Client software on a small number of workstations, or if the workstations are not yet connected to a network, install from the Novell Client CD or download it from the Novell Web site (http:// www.novell.com/download).
-
Manual 99a 38 July 17, 2001 For Windows NT/2000/XP, enter path_to_the_software/ SETUPNW.EXE /508 2 Click a language, a platform, and then the software you want to install. 3 Follow the on-screen instructions. Once Novell Client is installed, check your network protocol configuration. See “Configuring Network Protocols” on page 18. Configuring Network Protocols After you install Novell Client, make sure that it is configured correctly for your network.
-
Manual 99a 38 July 17, 2001 Installing Clients from the Network You can install Novell Client software on multiple workstations from the network by copying files to the server and modifying the login script. This installation is sometimes referred to as an Automatic Client Upgrade (ACU). HINT: You can install the Novell Client using the Application Launcher component of ZENworks.
-
Manual 99a 38 July 17, 2001 Copying Files 1 Do one of the following: From the Novell Client CD, copy the WINNT or WIN95 directories to the new folder. If you are installing only one platform, you need to copy only the platform directory (WINNT or WIN95) for the platform you will install.
-
Manual 99a July 17, 2001 38 If you did not create the status log file prior to running the network installation, you must give users the Create and Write rights to the directory. Modifying the ACU Configuration File The Automatic Client Upgrade utility (ACU.EXE) determines whether the client needs to be updated and allows you to specify several installation options. Option Description Settings [LAUNCHINSTALL] Specifies whether the platformspecific setup utility will be launched once ACU.
-
Manual 99a July 17, 2001 38 Option Description Settings [CLIENTLOCAL INSTALL] Specifies whether the installation will be copied to a specified local directory and run locally. LocalInstall=Yes | No (default: No) LocalDirectory=directory where you want the installation copied (default: C:\Novell\ClientLocalInstall) DeleteLocalInstall=Yes | No (default: No) HINT: If you want to delete the files after the installation is complete, set the DeleteLocalInstall parameter to Yes.
-
Manual 99a July 17, 2001 38 IMPORTANT: If you are configuring Windows 95/98 workstations, options that were set in the NWSETUP.INI file or on the command line in previous versions of Novell Client (such as Display First Screen or CAB FIX) are now set up in Novell Client Install Manager. To create a configuration file, do the following: 1 Start Novell Client Install Manager (NCIMAN.EXE).
-
Manual 99a 38 July 17, 2001 Creating or Modifying the Login Script You need to modify login scripts for users whose workstations will be upgraded. To upgrade workstations for users in a container, modify that container’s login script. To upgrade workstations for users in a profile, modify that profile’s login script. To upgrade specific users’ workstations, modify those users’ login scripts.
-
Manual 99a 38 July 17, 2001 Sample Client Installation Login Script (Windows 95/98 and NT/2000 Only) The following sample shows the commands that you add to the login script in order to install the client software from the network. The sample includes text for installing across an internal network. HINT: In this sample, the text that is necessary to the script is represented in uppercase letters. The information that you should customize for your network is in lowercase letters.
-
Manual 99a 38 July 17, 2001 Upgrading a Client Workstation to Windows 2000 You can upgrade a Windows 95/98 or Windows NT 4.0 workstation with Novell Client software to Windows 2000 without uninstalling the client software. NOTE: IPX Compatibility and Novell NetWare/IP Adapter will not be upgraded from Windows NT to Windows 2000. Some Windows NT 4.0 printer drivers are incompatible with Windows 2000 and will not install. Contact Microsoft for more information.
-
Manual 99a July 17, 2001 38 For more information on Automatic Client Upgrade, see “Installing Clients from the Network” on page 19. For more information on installing Novell Client on individual workstations, see “Installing Novell Client at the Workstation” on page 17. Upgrading a Client Workstation to Windows XP If you are upgrading your Windows operating system on workstations that already have the Novell Client installed, you must first uninstall the Novell Client to ensure a clean upgrade.
-
Manual 28 Novell Client for Windows Novell Client for Windows 103-000159-001 December 7, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 2 99a July 17, 2001 38 Setting Up Client Login You can customize the client login environment to suit your network and have greater control over what users can access during login.
-
Manual 99a 38 July 17, 2001 Profile sets environments for several users at the same time. Profile login script are executed after the container login script and are associated with Profile objects. A user can be assigned only one profile login script but can choose other profile login scripts. User sets environments (such as printing options or an e-mail username) specific to a single user.
-
Manual 99a 38 July 17, 2001 Where Login Scripts Should Be Located Login scripts are properties of objects. Consequently, only certain objects can contain login scripts. This, in turn, largely determines where login scripts can be located. The following figure shows how the different types of login scripts can reside in an NDS tree and how they affect users. In the figure, there are three users: ESAYERS, SWILLIAMS, and MRICHARD.
-
Manual 99a 38 July 17, 2001 For example, in the previous figure, although there are two levels of container objects above users ESAYERS and SWILLIAMS, only the script for the container they’re in (OU=SALES_PV) executes when they log in. If the SALES_PV Organizational Unit had no container login script defined, no container login script would execute for ESAYERS and SWILLIAMS, even though a container login script exists at a higher level.
-
Manual 99a July 17, 2001 38 To create or modify a login script using ConsoleOne, complete the following steps: 1 Double-click the object whose login script you want to create or modify. 2 Click Login Script. 3 Enter the login script commands and information into the login script text box. For a sample, see “Sample Login Scripts” on page 93. IMPORTANT: Make sure that you edit the sample login script to match the server names, directory paths, and specifications of your own network.
-
Manual 99a 38 July 17, 2001 The User object is now a trustee of the Profile object and has the rights necessary to run the profile login script. Repeat these steps for all additional users who need to use this script. Getting around the One Profile Login Script Restriction Users can belong to only one profile login script and so, as a rule, only one profile login script can be executed for any user.
-
Manual 99a 38 July 17, 2001 4 Make necessary changes to the sample login script to customize it for your network. IMPORTANT: Make sure that you edit the sample login script to match the server names, directory paths, and specifications of your own network. 5 Click OK to save the new login script. If the login script that you just created was a container or user login script, you’re finished.
-
Manual 99a 38 July 17, 2001 Setting Up Login Restrictions Login restrictions are limitations on user accounts that control access to the network.
-
Manual 99a July 17, 2001 38 HINT: To create and then distribute location profiles that will be used by multiple workstations, use the Novell Client Configuration policy created in the Workstation Configuration policy package in ConsoleOne. For more information on using ZENworks for Desktops policy packages, see the ZENworks for Desktops documentation. If you have questions while setting up a policy package, click Help.
-
Manual 99a 38 July 17, 2001 Removing a Location Profile You might need to remove a location profile once it has been created. If you are removing a location profile created on an individual workstation, complete the procedure below. If you want to remove a location profile created in a Client Configuration policy, you can either delete the Client Configuration policy or change the associations of specific users with this policy.
-
Manual 99a July 17, 2001 38 The Workstation Only check box that appears under the Password field during an initial NT/2000 login If you do not want to allow workstation-only logins—for example, if you want to require that the user log in to NetWare in order to use the workstation—you can hide the Workstation Only check box.
-
Manual 99a 38 July 17, 2001 Logging In to the Network IMPORTANT: We recommend that users do not use the command line LOGIN utility. There are several ways to initiate a Novell Client Login once users have already logged in to NetWare or to the local workstation: Right-click the red N icon in the System Tray and then click NetWare Login. Right-click Network Neighborhood and then click NetWare Login. Click Start > Programs > Novell (Common) > Novell Login.
-
Manual 3 99a 38 July 17, 2001 Setting Client Properties You can optimize Novell® ClientTM for your network by using property pages to configure installation options and protocol support, optimize performance, configure optional client parameters, and set a variety of other parameters. By default, the client is configured for high speed with moderate use of memory and data protection. You can adjust the client to optimize its performance in any of these areas.
-
Manual 99a 38 July 17, 2001 3 Modify the installation options as needed. 3a Double-click the configuration option that you want to modify in the Installation options list box. 3b In the property pages, set the parameters and then click OK. The values that you set appear in the right list box.
-
Manual 99a 38 July 17, 2001 Using DHCP If a DHCP server is set up on your network, the DHCP server can inform Novell Client of network-specific configuration information. You can easily configure Novell DHCP servers (NetWare 5 and later) to distribute this information to the clients. See the server configuration documentation for your NetWare product.
-
Manual 44 Novell Client for Windows Novell Client for Windows 103-000159-001 December 7, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 4 99a July 17, 2001 38 Managing Novell Client Managing Novell® ClientTM requires that you manage users’ network connections, passwords, rights and other security issues, etc. All of these features are available from the Novell Client desktop. Common Networking Tasks Novell Client software is integrated with Windows. Features are integrated into standard Windows interfaces such as My Computer, Network Neighborhood, Control Panel, and the N icon in the system tray.
-
Manual 99a 38 July 17, 2001 File rights apply only to the file that they are assigned to. The rights can be inherited from the folder that contains the file. Folder rights apply not only to the folder but also to the files and folders it contains. Checking File or Folder Rights 1 In Windows Explorer or Network Neighborhood, right-click the file that you want to check. 2 Click Properties > NetWare Rights. 3 In the Trustees box, click the user account.
-
Manual 99a 38 July 17, 2001 This check box is available only if you’re viewing the NetWare rights for multiple files or folders. Additionally, at least one of the files or folders must have at least one trustee assignment. The trustees and rights shown are the combined trustees and rights for all the files. 5 Check or uncheck the check box. If you check Combine Multiple Trustees, the trustee assignments that are shown will apply to all selected files after you click OK or Apply. 6 Click OK.
-
Manual 99a 38 July 17, 2001 AutoAdminLogon Options This section lists the options that you can choose from when setting AutoAdminLogon. To set the options, use the procedure in “Setting the AutoAdminLogon Options” on page 50. Additional information on AutoaAdminLogon may also be available in Technical Information Document # 10052847 on the Novell Technical Support Web site (www.support.novell.com).
-
Manual 99a July 17, 2001 38 does not have to type this information. For more information, see “Setting Up Location Profiles” on page 36. NOTE: The NT Credential information in the Location Profile will not be used. The NT user information in the registry will be used instead.
-
Manual 99a 38 July 17, 2001 AutoAdminLogon for NetWare under Terminal Server Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ WindowsNT\CurrentVersion\Winlogon Key: HKEY_LOCAL_MACHINE\SOFTWARE\Novell\ Login AutoAdminLogon=1 DefaultLocationProfile=Name of the Location Profile that contains the information about the Novell User to log in to the NetWare network such as Username, Tree, Context, Server, etc.
-
Manual 99a 38 July 17, 2001 If the primary connection’s password expires when running NetWare Login from the icon, the user will be given the chance to synchronize all NetWare and NT passwords. Make sure that users do not synchronize the NT password, because NetWare Login does not update the Registry setting for AutoAdminLogon. Uninstalling Novell Client You can uninstall the Novell Client by using the uninstall utility or by selecting Remove in Network Properties.
-
Manual 52 Novell Client for Windows Novell Client for Windows 103-000159-001 December 7, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 5 99a 38 July 17, 2001 Printing to a Network Printer Printer setup can be automated so that users’ workstations attach to the network printers they use each time users log in to the network. Users can use the network printers without having to manually connecting to the printer every time they want to print. After connecting to a network printer, users can select the printer from any application that they are using. See the application’s documentation for information on using printers.
-
Manual 99a 38 July 17, 2001 Setting Up Network Printing 1 Click Start > Settings > Printers. 2 Double-click Add Printer. 3 Click Network Printer Server > Next. 4 Select a printer you want to use from the Shared Printers box. For NetWare 4 or later (NDS®) networks, double-click Novell Directory Services® and find the context for the printer. Then select a Printer object from the list. For NetWare 3.x and bindery networks, double-click NetWare Servers.
-
Manual 99a 38 July 17, 2001 3 Enter the correct information in the dialog box. 4 Click Settings. These settings apply only to printer ports that are captured from Windows. Printer ports that are captured in a login script or from the command line do not use these settings. These settings do not apply to printers that appear in the Windows Printers folder. Changing the printer settings for a specific captured printer port does not change the default printer settings.
-
Manual 99a 38 July 17, 2001 Printing DBCS Characters from DOS in Windows NT/ 2000 In Windows NT and Windows 2000, the default command window runs as a 32-bit process. In order to use the existing DOS printer driver for DOSintrinsic commands, you must use a 16-bit command window. This allows DOS-intrinsic commands such as COPY, TYPE, etc., to use the print driver. The following instructions explain how to set up NT to support this.
-
Manual 99a 38 July 17, 2001 Disabling NetWare Login Dialog Boxes Brought Up by the Print Provider If users log in to a workstation but do not log in to NetWare and they have NetWare printers installed, they will be prompted to log in to NetWare once by the QMS print provider and once by the NDPS® print provider. These login dialog boxes can be disabled if desired.
-
Manual 99a 38 July 17, 2001 NetWare and then manually turn the printer online by opening the Printers folder, right-clicking the printer, and deselecting Print Offline. If you set HKLM\SOFTWARE\Novell\Print\Never Login\UserDialupSettings=1 the print provider sets Never Login to the dial-up connection settings and attempts to print. NOTE: This functionality is available only in Windows 95B or later.
-
Manual A 99a 38 July 17, 2001 Login Script Commands and Variables This appendix lists login script commands alphabetically and by the type of tasks the commands perform. It also contains a list of identifier variables used in login scripts. Before implementing any commands or variables, make sure you understand basic login script conventions. See “Login Script Conventions” on page 59 and “Using Identifier Variables” on page 62. NOTE: Commands that work only on DOS or Windows 3.
-
Manual 99a 38 July 17, 2001 Convention Explanation Characters per line Maximum 512 characters per line, including any variables after they are replaced by their values; 78 characters per line (common screen width) is recommended for readability. Punctuation and symbols Type all symbols (#, %, ", _) and punctuation exactly as shown in examples and syntax. Commands per line Use one command per line. Start each command on a new line; press Enter to end each command and start a new command.
-
Manual 99a 38 July 17, 2001 Convention Explanation NDS Attribute Values Any NDS® attribute value can be read from a login script, including extended names. The syntax for accessing NDS attributes is identical to common script variables with a few exceptions: The NDS attribute must be at the end of the string. If multiple variables are required, they must be in separate strings. You must use the actual NDS attribute value names. You cannot use localized names or nicknames.
-
Manual 99a 38 July 17, 2001 Using Identifier Variables Many login script commands allow you to take advantage of identifier variables to make login scripts more efficient and flexible. Use identifier variables to enter a variable (such as LAST_NAME) rather than a specific name (such as Smith) in a login script command. When the login script executes, it substitutes real values for the identifier variables. By using the variable, you can make the same login script command applicable to multiple users.
-
Manual 99a 38 July 17, 2001 The following table lists the identifier variables. Category Identifier Variable Function Date DAY Day number (01 through 31) DAY_OF_WEEK Day of week (Monday, Tuesday, etc.) MONTH Month number (01 through 12) MONTH_NAME Month name (January, February, etc.) NDAY_OF_WEEK Weekday number (1 through 7; 1=Sunday) SHORT_YEAR Last two digits of year (99, 00, 01) YEAR All four digits of year (1999, 2000, 2001) AM_PM a.m. or p.m.
-
Manual 99a 38 Category Identifier Variable Function User (cont’d.
-
Manual 99a 38 July 17, 2001 Category Identifier Variable Function DOS Environment Any DOS environment variable can be used in angle brackets. To use a DOS environment variable in MAP, COMSPEC, and FIRE PHASERS commands, add a percent sign (%) in front of the variable.
-
Manual 99a 38 July 17, 2001 name. The remaining variables change, depending on what the user types when executing the login utility. The %n variables must precede all command line options. The “SHIFT” on page 86 login script command allows you to change the order in which these %n variables are substituted. Login Scripts Commands by Task This list identifies which specific login script commands to use, depending on what you need your login scripts to accomplish.
-
Manual 99a 38 July 17, 2001 Workstation Environment SET (page 84) SET_TIME (page 86) Text File Usage @ (page 68) # (page 67) DISPLAY (page 71) EXIT (page 72) FDISPLAY (page 72) TERM (page 88) WRITE (page 90) Other LASTLOGINTIME (page 80) REMARK (page 83) # Use the # command to execute a program that is external to the login script. The # command executes an external program and waits until it is finished running before continuing with other login script commands.
-
Manual 99a 38 July 17, 2001 Command Format # [path] filename [parameter] Replace path with a drive letter or, if you have specified NOSWAP on the command line or in the login script, you can replace variable with a full directory path beginning with the NetWare volume name. Replace filename with an executable file (files that end in .EXE, .COM, or .BAT, for example). It isn’t necessary to include the extension, but doing so can speed up the execution of the external program.
-
Manual 99a 38 July 17, 2001 The executable file cannot be found Insufficient workstation memory is available to load the file Command Format @ [path] filename [parameter] Replace path with a drive letter. Replace filename with an executable file (files that end in .EXE, .COM, or .BAT, for example). Do not include the extension. Replace parameter with any parameters that must accompany the executable file.
-
Manual 99a 38 July 17, 2001 BREAK Use BREAK ON to allow the user to terminate execution of the login script. The default is BREAK OFF. If BREAK ON is included in a login script, the user can press Ctrl+C or Ctrl+Break to abort the normal execution of the login script. NOTE: When the BREAK option is ON, type-ahead keyboard input is not saved to the buffer. Command Format BREAK ON|OFF CONTEXT Use CONTEXT to set a user’s current context in the NDS tree.
-
Manual 99a 38 July 17, 2001 DISPLAY Use DISPLAY to show the contents of a text file when the user logs in. When you use DISPLAY, all characters in the file, including any printer and word processing codes, appear. This command works best with an ASCII file. To display only the text and suppress codes, use “FDISPLAY” on page 72. NOTE: If the given path does not exist or if the file is not found, no error message appears on the screen when the user logs in.
-
Manual 99a 38 July 17, 2001 Instead of specifying a drive letter such as F: or G:, you can use an asterisk followed by a number n to represent the nth network drive (for example, *3). This allows drive letters to reorder themselves automatically if previous drive mappings are deleted or added. Command Format DRIVE [drive |*n] Replace drive with a local or network drive letter, or replace n with a drive number. The use of either is dependent on their already being assigned within the login script.
-
Manual 99a 38 July 17, 2001 NOTE: If the given path does not exist or if the file is not found, no error message appears on the screen when the user logs in. Command Format FDISPLAY [path] filename Replace path with either a drive letter or a full directory path beginning with the NetWare volume name. Replace filename with the complete name (including the extension) of the file that you want to display. Examples Suppose you put messages in a file called SYSNEWS.
-
Manual 99a 38 July 17, 2001 Examples The following line executes the phaser sound four times upon login: FIRE 4 The following line executes the rifle sound three times upon login: FIRE 3 RIFLE.WAV To use a variable as the number of times to fire, use % before the variable, as follows: FIRE %variable For more information about using variables, see “Using Identifier Variables” on page 62. GOTO Use GOTO to execute a portion of the login script out of the regular sequence.
-
Manual 99a 38 July 17, 2001 The GOTO command looks at the value of (a DOS environment variable). If the value of is less than 9, then increments by 1 and GOTO loops back to the AGAIN label. When gains the value of 9, the IF...THEN test becomes false, the GOTO is ignored, and the script continues normally. IF...THEN Use IF...THEN to perform an action only under certain conditions.
-
Manual 99a 38 July 17, 2001 IF...THEN statements can be nested (up to 10 levels). However, GOTO should not be used in a nested IF...THEN statement to enter or exit from the body of an IF...THEN statement. If your IF...THEN statement consists of only one line, you do not need to include END even if that line wraps. If your IF...THEN statement must be on more than one line (for example, if you used ELSE or WRITE, which must be on separate lines), you must include END.
-
Manual 99a 38 July 17, 2001 The following lines mean “If the hour (on a 24-hour scale) is greater than or equal to 12, then write ‘afternoon’”: IF VALUE HOUR24>="12" THEN WRITE "afternoon" END The following command executes the CAPTURE utility on the fourth day of the week (Wednesday): IF NDAY_OF_WEEK="4" THEN #CAPTURE Q=FAST_Q NB TI=10 NFF END The following example shows nested IF...THEN statements.
-
Manual 99a 38 July 17, 2001 INCLUDE Use INCLUDE to execute independent files or another object’s login script as a part of the login script currently being processed. These subscripts can be text files that contain valid login script commands (any of the commands explained in this appendix) or login scripts that belong to a different object you have rights to. Text files that contain login script commands, as well as other objects’ login scripts, can be used as subscripts.
-
Manual 99a 38 July 17, 2001 Examples To execute a text file called SCRIPT.NEW (located in volume VOL1) as a subscript, add the following line to your main login script: INCLUDE VOL1:ADMIN\USERS\SCRIPT.NEW Suppose you are creating a container login script for all users under the Organizational Unit object SALES_LA. You recently created a container login script for users under the Organizational Unit object SALES_PV.
-
Manual 99a 38 July 17, 2001 LASTLOGINTIME Use LASTLOGINTIME to display the last time the user logged in. If you include this command in the login script, the time of the last login is displayed on the workstation screen. Command Format LASTLOGINTIME MAP Use MAP to map drives and search drives to network directories or to map to NDS objects such as cluster-enabled volumes.
-
Manual 99a 38 July 17, 2001 Command Format MAP [[options]|[parameters][drive:=path] Replace drive with any valid network drive letter, local drive letter, or search drive number. Replace path with either a drive letter, a full directory path, a Directory Map object, or an NDS object such as a cluster-enabled volume.
-
Manual 99a 38 July 17, 2001 The Windows NT/2000 native environment forces a map root on all drives. To prevent a forced map root in a Windows NT/2000 environment, set the MAP ROOT OFF = 1 environment variable. All drives are then mapped as specified, and only explicit map root drives are rooted. C (CHANGE) changes a search drive mapping to a regular mapping or a regular mapping to a search drive mapping.
-
Manual 99a 38 July 17, 2001 Command Format PAUSE PROFILE Use PROFILE in a container script to set or override a user’s assigned or command line-specified profile script. This is useful when defining a group profile.
-
Manual 99a 38 July 17, 2001 ; [text] Replace text with the comment you want to include in the login script. Example The following are examples of explanatory text that you might use with the REMARK command and its variants: * This is Richard’s login script ; Mapped network drives follow: REM The next mapping is a fake root. REMARK This login script is for new users. SCRIPT_SERVER NetWare 2 and NetWare 3 users can use SCRIPT_SERVER to set a home server where the bindery login script is read from.
-
Manual 99a 38 July 17, 2001 This command does not work in a login script if the DOS workstation’s environment is too small. In this case, you should set the environment size in the CONFIG.SYS file. After you use the SET command to set a value for an environment variable, you can use that variable in other login script commands. To include an environment variable as an identifier variable in a command, enclose the name of the variable in angle brackets (for example, ).
-
Manual 99a 38 July 17, 2001 For example, the following line displays My path is G:\REPORTS\DAILY: WRITE "My path is ";path To include an environment variable in a MAP command, precede the variable with a percent sign (%). For example, you could include the following lines in a login script to set and map a drive to the variable NWS: SET NWS="C:\XYZ" MAP S16:=% SET_TIME Use SET_TIME to set the workstation time equal to the time on the NetWare server that the workstation first connects to.
-
Manual 99a 38 July 17, 2001 Command Format SHIFT [n] Replace n with the number of places that you want the variable to shift. The default is SHIFT 1. Examples When Mary logs in, she wants to access her word processing program, change the way it is set up, and map a drive to her work directory called ACCNTS. Mary also has a command in her login script to map a drive to her DATABASE directory, but she does not need it today.
-
Manual 99a 38 July 17, 2001 %2 now becomes ACCNTS. Upon executing the loop, the login script maps a drive to the ACCNTS directory. Mary could also change the order of her login command without affecting the way her work environment is set up, as follows: LOGIN MARY ACCNTS WP The parameters in this login command are given the following values: %0=FS1 %1=MARY %2=ACCNTS %3=WP In this case, Mary’s login script looks for %2, which is now ACCNTS. The login script maps a drive to the ACCNTS directory.
-
Manual 99a 38 July 17, 2001 Command Format TERM nnn Replace nnn with an error level. Any error level between 000 and 999 is valid. Example If you want the login script to exit and return an error code of 718, you can add the following statement to the login script: TERM 718 TREE The TREE command can be used only with clients that support multiple NDS tree attachments. Use TREE to attach to another NDS tree within the network and to access its resources.
-
Manual 99a 38 July 17, 2001 IMPORTANT: Use caution when including passwords in a login script. It is more secure to eliminate the password. Then, at the point in the login script where the TREE command is executed, the user is prompted for the password. Example To attach the user with the complete name MRICHARD.ACME (whose password is BUTTERFLY) to an NDS tree named CORP, add the following line to the login script: tree corp/.mrichard.
-
Manual 99a 38 July 17, 2001 Text strings can include the following special characters: Character Meaning \r Causes a carriage return \n Starts a new line of text \" Displays a quotation mark on the screen \7 Makes a beep sound In addition to the semicolon, you can use other operators to form compound strings (in other words, to join text and identifier variables into one command).
-
Manual 99a 38 July 17, 2001 For example, either of the following lines displays Hello, Smith when user Bob Smith logs in: WRITE "Hello, ";%LAST_NAME WRITE "Hello, %LAST_NAME" To make a beep sound occur while the phrase Good morning appears on the screen, add the following line to the login script: WRITE "Good %GREETING_TIME \7" 92 Novell Client for Windows Novell Client for Windows 103-000159-001 December 7, 2001 Novell Confidential
-
Manual B 99a 38 July 17, 2001 Sample Login Scripts You can create login scripts from these sample login scripts using NetWare® Administrator. Using a sample login script can help reduce syntax errors, reducing the time it takes you to create your login scripts. For more information on how to create login scripts, see “Creating Login Scripts from a Sample or Existing Login Script” on page 34.
-
Manual 99a 38 July 17, 2001 IF OS = "WINNT" THEN MAP P:=SYS:USERS\%LOGIN_NAME\WINNT MAP INS S16:=SYS:APPS\WINAPPS\WINNT SET TEMP = "P:\USERS\%LOGIN_NAME\WINNT\TEMP" END MAP MAP MAP MAP INS S16:=VOL1:APPL\LOTUS INS S16:=SYS:EMAIL M:=VOL1:SHARED N:=VOL1:MODEMS MAP O=SYS:DOC IF MEMBER OF "MANAGERS" THEN MAP *3:=VOL1:PROJECTS\REPORTS END Sample Profile Login Script If you have groups of users with identical login script needs, you can create a Profile object and then create a login script for it.
-
Manual 99a 38 July 17, 2001 Sample User Login Script The following sample login script is an example of a login script created for user Mary. The user login script executes after the container and profile login scripts have executed. In addition, a user login script prevents the default login script from executing for this specific user. Therefore, you should consider whether any commands in the default login script are necessary for setting the user’s environment.
-
Manual 96 Novell Client for Windows Novell Client for Windows 103-000159-001 December 7, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual C 99a July 17, 2001 38 Troubleshooting Issues This appendix provides troubleshooting information for known issues. HINT: If you do not find a solution to your issue here, check the Readme file that accompanied the software as well as the Novell® Support Connection® information database (http://www.support.novell.com). Windows 95/98 Issues The following issues will help you troubleshoot Novell ClientTM for Windows 95/98. For additional issues, check the Novell Client Readme.
-
Manual 99a 38 July 17, 2001 located in TID 2952441. This update addresses an issue in which a file opened once by different threads (one open in each thread) in an application and then closed leaves an instance of the file open, even after exiting the application. This problem could cause the server to run out of memory or hang. IP with IPX Compatibility Dependency When using the IP with IPXTM Compatibility client configuration, make sure that the TCP/IP stack has been configured with a TCP/IP gateway.
-
Manual 99a July 17, 2001 38 Installing ZENWorks for Desktops 2 Remote Management and Novell Client Software Version 3.31 on a New Workstation If you have new workstations that require ZENworks for Desktops 2 Remote Management and Novell Client for Windows 95/98 version 3.31, do one of the following. Install Remote Management Using an Application Object 1 Install Novell Client for Windows 95/98 version 3.31 without selecting Remote Management.
-
Manual 99a 38 July 17, 2001 Login Restrictions Set for IPX/SPX Prevent User from Logging In Symptom: Login restrictions are set for IPX/SPXTM and the node address. When the administrative workstation is reset, the new client files are automatically updated and the reboot prompt is displayed. After restarting, the workstations that are placed in the restriction list as being able to log in as Admin and which now have the new client cannot log in and no administration of the server can be done.
-
Manual 99a 38 July 17, 2001 By default, the client uses DHCP to locate a Discovery Agent. (This assumes that a Discovery Agent is configured on the dial-up host network.) The client uses an NWHOST file, if present, which contains server names and their addresses. This might be a preferred way to run your client. (The file is created in the NOVELL\CLIENT32 directory on the workstation.) The client also supports DNS names.
-
Manual 99a 38 July 17, 2001 Printing Do Not Configure a Local NPRINTER with Interupts Do not configure a local NPRINTER with interrupts. Use the default Polled Mode instead. Windows NT/2000/XP Issues The following issues will help you troubleshoot Novell Client for Windows NT/2000 and Novell Client for Windows XP. For additional issues, check the Novell Client Readme.
-
Manual 99a 38 July 17, 2001 Update Required on NetWare 4.11 and NetWare 4.2 Servers NetWare 4.11 and NetWare 4.2 servers require an update on the server prior to the installation of this Client. The server update information is located in TID 2952441. This update addresses an issue in which a file opened once by different threads (one open in each thread) in an application and then closed leaves an instance of the file open, even after exiting the application.
-
Manual 99a 38 July 17, 2001 Login MFC42.DLL Error Novell Client runs with MFC42.DLL version 4.21.7022 or later. MFC42.DLL version 6.00.8267.0 is installed when you install Novell Client. If an older version is installed over the version installed by Novell Client, the client login fails with an error message similar to the following: The ordinal 6453 could not be located in the dynamic link library MFC42.DLL. The actual message might vary, depending on the version of MFC42.DLL you are using.
-
Manual 99a July 17, 2001 38 Login Script CAPTURE Execution in a Login Script If you use a login script that contains an external CAPTURE command using CAPTURE.EXE, the screen might go blank with a blinking cursor in the upper-left corner. The capture eventually executes and the screen returns to normal. This happens if Windows NT or Windows 2000 is set to “full screen” when the CAPTURE command is executed from the login script.
-
Manual 99a 38 July 17, 2001 MAP.EXE The MAP.EXE utility might function improperly if the computer’s DOS environment size is too small. If you encounter problems while running MAP.EXE, increase the DOS environment size by adding or editing the SHELL= line in the WINNT\SYSTEM32\CONFIG.NT file. For example: SHELL=%SYSTEMROOT%\SYSTEM32\COMMAND.COM /E:2048 MAP.EXE was not designed as a Windows NT/2000/XP executable and, therefore, does not recognize drives mapped to NT servers as network drives.
-
Manual 99a 38 July 17, 2001 You can turn off the default by adding SET MAPROOTOFF="1" as the first line in the login script. This will globally force all NT workstations using the login script to not map root drives. Or, you can perform the following procedure on a local workstation: 1 Right-click My Computer. 2 Click Properties > Environment. 3 Enter MAPROOTOFF as a variable. 4 Set the value of the MAPROOTOFF variable to 1. 5 Click Select.
-
Manual 99a 38 July 17, 2001 Printing Issues NDPS and NetWare 5 You might experience difficulties printing through NDPS if your network connection is dropped and later auto-reconnects. You could receive the following error messages: Error writing to : Space to store the file waiting to be printed is not available on the server. A write fault occurred while printing. To resolve this problem, you must download and install NetWare 5 Support Pack 2 or later.
-
Manual 99a 38 July 17, 2001 IPX Compatibility Requirements for RAS Client IPX Compatibility Mode requires the services of SLP. For more information, see “SLP Requirements for Server Name Resolution from RAS Clients” on page 108. Before installing the Novell IP Client with IPX Compatibility support, make sure that the RAS Client is configured to perform only IP networking over the RAS connections.
-
Manual 99a 38 July 17, 2001 IPX Compatibility Network Number over the LAN adapter but configure a different network number for IPX Compatibility to use over the RAS connection (WAN adapter). You should be aware that nodes utilizing IPX Compatibility on the same network should be configured to use the same network number in order to directly communicate when using Client/Server IPX applications.
-
Manual 99a 38 July 17, 2001 Software Compatibility Issues Microsoft SMB Client Support over IPX Novell Client for Windows NT/2000/XP coexists with the Microsoft SMB Client over IPX networks. The Microsoft SMB Client utilizes NetBIOS when communicating over IPX, which increases the utilization of your network.
-
Manual 112 Novell Client for Windows Novell Client for Windows 103-000159-001 December 7, 2001 Novell Confidential 99a 38 July 17, 2001
-
Novell Licensing Services Administration Guide Novell NetWare 6 ® www.novell.
-
Manual 99a June 14, 2001 37 Contents Overview 7 Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 1 Understanding Novell Licensing Services 9 Key NLS Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Examples of NLS Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 How NLS Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
-
Manual 6 99a 37 Novell Licensing Services Administration Guide Novell Licensing Services Administration Guide 103-000138-001 August 30, 2001 Novell Confidential June 14, 2001
-
Manual 99a 38 July 17, 2001 Overview Novell® Licensing Services (NLS) that ships with NetWare® 6 supports the User Access License (UAL) model. User objects gain access to network services by connecting to the network instead of to servers. These User objects receive a permanent license unit that allows them to access network services at any time and from any workstation attached to the network. For information on NLS concepts and how NLS works, see “Understanding Novell Licensing Services” on page 9.
-
Manual 99a 38 July 17, 2001 This documentation does not cover information about policy managers and license certificates for specific products. Refer to product-specific documentation for that information. Documentation Conventions In this documentation, a greater-than symbol (>) is used to separate actions within a step and items in a cross-reference path. Also, a trademark symbol (®, TM, etc.) denotes a Novell trademark. An asterisk (*) denotes a third-party trademark.
-
Manual 1 99a 38 July 17, 2001 Understanding Novell Licensing Services Since NLS is integrated with eDirectoryTM, you need to be familiar with the basics of eDirectory, especially eDirectory objects, partitions, and replicas of partitions. “Key NLS Terms” on page 9 “How NLS Works” on page 17 Key NLS Terms Understanding the following terms will help you maintain licensing and license units on your network.
-
Manual 99a 38 July 17, 2001 An license service provider provides the actual licensing service. It handles requests from NLS clients and maintains the license certificates, which are stored within eDirectory. When you install NetWare and licensing certificates, NLS Installs the license service provider software on the server Creates an License Service Provider object (NLS_LSP_servername) in the eDirectory tree You can also use NetWare Deployment Manager to accomplish these two tasks.
-
Manual 99a 38 July 17, 2001 NLS client—Software that requests licensing services from license service providers. An NLS client runs on client workstations and on NetWare servers. (The client can run on either a workstation or a server or on both the workstation and the server.) This software supports 32-bit Windows* and NetWare Loadable ModuleTM (NLMTM) platforms.
-
Manual 99a 38 July 17, 2001 License Certificate object—An object in eDirectory; represents a license certificate. License certificates correspond to the printed license statement that is typically included in the packaging for software products. The icon for a License Certificate object looks like a single sheet of paper representing a license certificate.
-
Manual 99a 38 July 17, 2001 Because multiple license certificates can exist in an envelope, envelopes allow you to install several license certificates at the same time. Envelopes can contain an embedded activation key for license certificates. A sample envelope file is 4234171D.NLF. License Container object—An object in eDirectory; contains one or more License Certificate objects. A License Container object is a special container object in eDirectory.
-
Manual 99a 38 July 17, 2001 Policy—An electronic representation of a term or condition in your license agreement. Policies are contained in license certificates. For example, a certificate for a company could include the following tags for policies: Each license unit is consumable. Each license unit allows nodal reuse. (A user can use it multiple times from different workstations.) The certificate does not require an license service provider assignment.
-
Manual 99a 38 July 17, 2001 Each NLS-enabled product has its own policy manager. The policy manager for NetWare differs from the policy manager for BorderManager. Both of these policy managers differ from the policy manager for a third-party software manufacture’s application. Because each application or service supports a different policy, you might have many policy managers running on a network.
-
Manual 99a 38 July 17, 2001 NOTE: NLS is a service. The terms and conditions of your license agreement determine how the product is to be used. A soft stop policy informs users that they are out of compliance but allows them to continue using license units under certain conditions. A no stop policy ignores situations in which no license units are available. NLS keeps track of the overage by logging the noncompliance, but does not inform or warn the user.
-
Manual 99a July 17, 2001 38 Example 3: Metering A client workstation requests an application that is not NLS-enabled. ZENworks, integrated with NLS, requests a license unit on behalf of the application. Depending on the response from NLS, Application Launcher in ZENworks chooses whether or not to load the application. Therefore, Application Launcher can be configured to request license units for applications that are not NLS-aware. How NLS Works The following figure illustrates how NLS Works.
-
Manual 99a 38 July 17, 2001 In NetWare, for example, the NLS client communicates with the license service provider on that server. 3. The license service provider examines the request and determines whether it can fill the request. It does this by checking the eDirectory context of the requesting client for the specific information or license unit being requested. In NetWare, for example, the license service provider searches the user’s context for a NetWare license unit. 4.
-
Manual 99a July 17, 2001 38 A License certificate B C Server D E User Begins searching here In this example, the user accesses the network from context .E.C.A. To search for a license unit, the license service provider begins its search in the user’s context—.E.C.A The license service provider searches up the tree to context A and finds an available license unit. 5. The license service provider returns status to the client library.
-
Manual 20 99a 38 Novell Licensing Services Administration Guide Novell Licensing Services Administration Guide 103-000138-001 August 30, 2001 Novell Confidential July 17, 2001
-
Manual 2 99a 38 July 17, 2001 Installing Novell Licensing Services This chapter discusses “Guidelines for Installing NLS” on page 21 “Installing NLS” on page 22 “Verifying That NLS Is Installed” on page 22 Guidelines for Installing NLS Prepare the network. If you are upgrading a server, the server should have a read/write replica of the partition where the NetWare® 6 server will be installed. Provide fault tolerance. Two servers running NLS in a partition provide fault tolerance.
-
Manual 99a 38 July 17, 2001 NOTE: If you are running NetWare for Small Business or NetWare for Growing Business, you should install the corresponding Support Pack before upgrading to NetWare 6. Know where to install NLS. For more information, see Guidelines for Installing License Certificates in the User Access Licensing for NetWare Guide. Installing NLS When you install or upgrade to NetWare 6, NLS is automatically installed.
-
Manual 3 99a 38 July 17, 2001 Using Novell Licensing Services You can manage NLS functionality in iManage, the Novell® browser-based management tool, to complete the following tasks: “Managing License Certificates” on page 23 “Deleting a License Certificate” on page 25 “Moving a License Certificate” on page 25 “Modifying or Deleting Server Assignments” on page 26 “Viewing Information about License Certificates and Containers” on page 26 You can still use NetWare Administrator to administer NL
-
Manual 99a 38 July 17, 2001 If you purchase and install additional license certificates, they will also be added to the eDirectory tree as objects in the appropriate License Container object. About Envelopes An envelope is an .NLF file containing one or more license certificates. (The envelope might have just one certificate because it also contains other information associated with the product—for example, information for NISenabled installations.
-
Manual 99a 38 July 17, 2001 4 Fill in the following fields: Location: Browse to or enter the context where you want the licenses installed. User licenses should be installed at or above the user's context. You might want to install the licenses high in the tree so that they will be available to more users. Server licenses should be installed at or above the server's context. Server Assignment: If you are installing a server base license, the Server Assignment field displays.
-
Manual 99a 38 July 17, 2001 Assigning Licenses to a Server Each server needs a server license. You need to install a server license only if you did not install licenses during the installation process or if the server license was deleted. To install a server license certificate, follow the steps in “Installing License Certificates” on page 24. Modifying or Deleting Server Assignments 1 In iManage, click License Management > Manage License Properties.
-
Manual 99a 38 July 17, 2001 Using SNMP You can use SNMP to find out about licensing service events on your network. About SNMP and NLS SNMP is a management interface and high-level protocol. General-purpose protocols such as IPXTM, TCP/IP, and UDP can host SNMP. NLS takes events and errors, wraps them in one of these protocols, and sends them to a management utility or console. For example, suppose you instruct SNMP to raise an event whenever a license unit is conveyed to a User object.
-
Manual 99a 38 July 17, 2001 Three Configuration Files for SNMP NLS uses three configuration files for SNMP. The configuration files allow the various systems which provide SNMP information to tailor that information to your needs as you manage the network. All three files are installed into SYS:\ETC. SNMP.CFG lets you add descriptive strings that might be included in SNMP packets.
-
Manual 99a 38 July 17, 2001 5 Load SNMP.NLM on a server. SNMP.NLM (the SNMP agent) provides the APIs and framework to allow SNMP to work on NetWare. SNMP.NLM traps events, generates SNMP messages about the trapped events, and sends the messages to the management console. 6 At the management console, view the SNMP messages.
-
Manual 30 99a 38 Novell Licensing Services Administration Guide Novell Licensing Services Administration Guide 103-000138-001 August 30, 2001 Novell Confidential July 17, 2001
-
Manual 4 99a 38 July 17, 2001 Troubleshooting Novell Licensing Services This chapter contains tips, information about system messages and error codes, and a list of Technical Information Documents. “Tips” on page 31 “Error Codes and System Messages” on page 33 “TIDs” on page 34 Tips Unable to get a server base license Problem: The server console displays “Unable to get a Server Base license.” Action: Delete and reinstall the license certificate.
-
Manual 99a 38 July 17, 2001 Place server license certificates so that NLS servers do not have to traverse slow WAN links to access license units. Place user certificates so that NLS dos Not have to traverse WAN links when users are authenticating to the tree. Place at least one License Service Provider object in a container near the root of the tree. Also, consider loading license service provider software on servers that many or most users log in to in the eDirectory tree.
-
Manual 99a 38 July 17, 2001 Error Codes and System Messages Many messages for Novell® Licensing Services are self-documenting; information that you need appears on-screen with the message. Additional information about error codes are provided below. Other error codes are provided in NLSLSP Messages in System Messages. Error Code C0001002 Displays Possible Problem Possible Solutions You removed and reinstalled eDirectoryTM. See TID 2941280. The Server object and [Public] don’t have enough rights.
-
Manual 99a 38 July 17, 2001 Error Code C0001005 Diplays Possible Problem Possible Solution The license certificate requires a server assignment but doesn’t have one. Assign a server. See “Modifying or Deleting Server Assignments” on page 26. TIDs The following TIDs might help you resolve some issues relating to NLS on your network. The TIDs are available at www.support.novell.com/servlet/ knowledgebase.
-
Novell iFolder Administration Guide Novell iFolder www.novell.com 1.
-
Manual 99a July 17, 2001 38 Contents Contents 5 Novell iFolder Administration Guide 7 Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1 Welcome to Novell iFolder 9 What Is Novell iFolder? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2 Installing Novell iFolder on NetWare 5.1 Server Requirements. . . . . . . . . . . Client Workstation Requirements . . . . Browser Requirements . . . . . . . . . .
-
Manual Using the Server Management Console Removing an iFolder Account . . . . Restoring a User’s Folder . . . . . . Changing LDAP Settings . . . . . . Optimizing Your iFolder Server . . . . . 6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99a July 17, 2001 38 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Novell iFolder Administration Guide Novell iFolder Administration Guide 103-000132-001 November 21, 2001 Novell Confidential . . . . .
-
Manual 99a 38 July 17, 2001 Novell iFolder Administration Guide Novell® iFolderTM 1.0 is a file storage and management solution to the universal problems associated with storing and retrieving data. With iFolder you have the latest version of your data when you need it and where you need it from any computer that you regularly use. And if you are not at a computer that you regularly use, you can still access and manage your files if you have an Internet connection and a Java-enabled browser.
-
Manual 8 99a Novell iFolder Administration Guide Novell iFolder Administration Guide 103-000132-001 November 21, 2001 Novell Confidential 38 July 17, 2001
-
Manual 1 99a July 17, 2001 38 Welcome to Novell iFolder Novell® iFolderTM gives you automatic, secure, and transparent synchronization of files between your hard drive and the iFolder server, which results in easy access to personal files anywhere, anytime. Being able to access your files from any computer from any location eliminates the editing mistakes and menial updating tasks that frequently occur when your local machine is not accessible from different access points.
-
Manual 99a 38 July 17, 2001 What Is Novell iFolder? There are three components to Novell iFolder: iFolder server software iFolder runs on NetWare® 5.1, NetWare 6, Windows NT* 4.0, and Windows 2000 servers. Once you have installed the iFolder server software on your server, your users can install the iFolder client in order to access their iFolder files, and you can access the Server Management Console and the default iFolder Web site to manage your iFolder user accounts.
-
Manual 99a 38 July 17, 2001 need to have the application installed on your workstation in order to access that file. Any changes that are made in this directory, from any workstation, are uploaded to the iFolder server. The frequency of the uploading can be determined by either the user or the network administrator. The iFolder icon appears in the system tray of your workstation.
-
Manual 99a 38 July 17, 2001 If you are installing Novell iFolder on Windows NT 4.0 or Windows 2000, follow the instructions in Chapter 4, “Installing Novell iFolder on Windows NT 4.0 or Windows 2000,” on page 25. If you are installing Novell iFolder on Novell Cluster Services, follow the instructions in Chapter 5, “Installing Novell iFolder on Novell Cluster Services,” on page 33.
-
Manual 2 99a 38 July 17, 2001 Installing Novell iFolder on NetWare 5.1 Before you begin the iFolderTM installation, make sure that you have met the following iFolder server, client, and browser requirements. Server Requirements NetWare® 5.1 server with Support Pack 3 installed. NetWare Support Packs are available at the Consolidated Support Pack Home Page (http://support.novell.com/csp/csplist.html). An LDAP v3 enabled directory, such as NDS® eDirectoryTM 8.5.
-
Manual 99a 38 July 17, 2001 Client Workstation Requirements Novell® iFolder is compatible with Windows 95, 98, 2000, NT, and ME workstations. The iFolder client is very small and will take only about 2 MB of free space on your workstation. IMPORTANT: If you are installing the iFolder client on a Windows 95 workstation, you must have the Winsock 2 update from Microsoft installed. This update can be downloaded from the Microsoft Web site (http://www.microsoft.
-
Manual 99a 38 July 17, 2001 5 Enter your username and the name of your company, and then click Next. 6 Browse to the drive letter that you mapped in Step 1 and then click Next. HINT: In order to install Novell iFolder on multiple servers from the same workstation, you must delete the directory that represents your last installation. To do this, go to C:\Program Files\Installshield Installation Information.
-
Manual 99a 38 July 17, 2001 This will be the path to the SYS:Public directory where you copied the ROOTCERT.DER prior to the installation. For more information, see “Server Requirements” on page 13. 12 Enter the LDAP login DN context. This is the context of the container where your User objects are located. iFolder allows you to enter multiple contexts. After each context, insert a semicolon. Do not put any spaces between the contexts.
-
Manual 99a 38 July 17, 2001 16 (Conditional) Create an LDAP proxy user. 16a Launch ConsoleOne. 16b Create a user without a password. 16c Right-click your Tree object and then click Properties > NDS Rights > Add Trustee. 16d Select the User object you just created and then click OK. 16e When the Rights Assigned to Selected Object dialog box appears, click Add Property. 16f Check the Show All Properties check box, select the CN property from the list, and then click OK. 16g Click OK > Apply > Close.
-
Manual 99a 38 July 17, 2001 admin to have rights to administer the Server Management Console, you would enter admin;jsmith. 21 If prompted, enter the IP address or the DNS name of your server and then click Next. 22 Click Finish to complete the installation. 23 Do one of the following: If you are using only one IP address, to start Novell iFolder you can reboot your server (this will run the edited AUTOEXEC.
-
Manual 3 99a 38 July 17, 2001 Installing Novell iFolder on NetWare 6 Before you begin the iFolderTM installation, make sure that you have met the following iFolder server, client, and browser requirements. Server Requirements 10 MB of free space on the SYS: volume where you plan to install iFolder. Client Workstation Requirements Novell® iFolder is compatible with Windows 95, 98, 2000, NT, and ME workstations.
-
Manual 99a 38 July 17, 2001 Installing Novell iFolder on NetWare 6 1 Do a Custom install of NetWare 6. For instructions on installing NetWare 6, see the NetWare 6 Overview and Installation Guide. 2 During the NetWare 6 installation, select iFolder as one of the products that you want to install. 3 (Conditional) If prompted, resolve port conflicts or assign secondary IP addresses. If you are installing iFolder with no other Web products, you will not see this screen.
-
Manual 99a 38 July 17, 2001 6 (Optional) Continue with the NetWare 6 installation until you get to the Summary screen at the end of the NetWare 6 installation. The Summary screen lists all the products that you have selected to install with NetWare 6. 7 At the Summary screen, click NetWare 6 > iFolder > Configure > Primary LDAP Settings. 8 Enter the following LDAP information for your primary LDAP server: LDAP Host Enter the IP address of your LDAP server in the LDAP Host field.
-
Manual 99a 38 July 17, 2001 9 (Conditional) If you have a secondary LDAP server, click Secondary LDAP Settings. 10 Enter the settings for the secondary LDAP server. Fill in this information only if you have two LDAP directories that contain usernames that need iFolder accounts.
-
Manual 99a 38 July 17, 2001 Assign the CN Property to the Public Object IMPORTANT: Any rights assigned to the Public object are automatically inherited by all other objects in the Novell® eDirectoryTM tree. You might not want to assign the CN property to the Public object if these rights will cause a security risk.
-
Manual 99a 38 July 17, 2001 Novell iFolder is now installed and running on your NetWare 6 server. To learn more about Novell iFolder, go to Chapter 6, “Using Novell iFolder,” on page 37. LDAP over SSL If your LDAP server is not the same server as your iFolder server, and you want LDAP over SSL, you need to export your LDAP server’s trusted root certificate and then copy it to your iFolder server. This certificate (ROOTCERT.DER) should be located in your LDAP server’s SYS:PUBLIC directory.
-
Manual 4 99a 38 July 17, 2001 Installing Novell iFolder on Windows NT 4.0 or Windows 2000 Before you begin the iFolderTM installation, make sure that you have met the following iFolder server, client, and browser requirements. Server Requirements A Windows NT 4.0 server with Service Pack 6A or later installed or a Windows 2000 server with Service Pack 1 installed. Microsoft Service Packs are available at the Microsoft Web site (http:// updates.zdnet.com/products/pr_13616.htm).
-
Manual 99a 38 July 17, 2001 You can do this in either of two ways: 1) If you have your own certificate server, such as Novell Certificate Server, then you can get a certificate from your server, or 2) You can go to a certificate vendor, such as Entrust* or VeriSign*, and purchase a certificate from them. For more information on installing and creating SSL certificates for IIS 4, go to the Microsoft Product Support Services Web site (http:// support.microsoft.com/support/kb/articles/Q228/9/91.ASP).
-
Manual 99a 38 July 17, 2001 2 Locate the iFolder software that you downloaded and double-click the iFolder IIS server executable (IISiFolderServer.EXE). 3 Read the Welcome screen and click Next. 4 Click Yes to accept the licensing agreement. 5 Enter your username and the name of your company, and then click Next. 6 Browse to the location where you want iFolder to install the setup files and then click Next. 7 Enter the IP address of your LDAP server in the LDAP host field.
-
Manual 99a 38 July 17, 2001 If you are assigning the CN property to the Public object, continue with the next step. Any rights assigned to the Public object are automatically inherited by all other objects in the NDS tree. You might not want to assign the CN property to the Public object if these rights will cause a security risk.
-
Manual 99a 38 July 17, 2001 15g Double-click the user so that the name appears in the Proxy Username field. 15h Click Apply > OK. 16 Click Next in the iFolder setup. 17 (Conditional) If you are using a secondary LDAP server, enter the LDAP information for that server. Fill in this information only if you have two LDAP directories that contain usernames that need iFolder accounts.
-
Manual 99a 38 July 17, 2001 Configuring the iFolder Web Site on Windows NT 4.0 1 Launch the Internet Services Manager by clicking Start > Windows NT 4.0 Option Pack > Microsoft Internet Information Server > Internet Service Manager. 2 Right-click the Default Web Site icon and then click Properties > Home Directory. 3 Set the local path.
-
Manual 99a 38 July 17, 2001 6 Click the Documents tab. 7 Check the Enable Default Documents check box. 8 Click the Add button. 9 Enter index.html into the text field and click OK. Novell iFolder in now installed on your Windows 2000 server. For more information about Novell iFolder, go to Chapter 6, “Using Novell iFolder,” on page 37. Installing Novell iFolder on Windows NT 4.
-
Manual 32 99a Novell iFolder Administration Guide Novell iFolder Administration Guide 103-000132-001 November 21, 2001 Novell Confidential 38 July 17, 2001
-
Manual 5 99a 38 July 17, 2001 Installing Novell iFolder on Novell Cluster Services Before you set up Novell® iFolderTM on Novell Cluster ServicesTM, you should already have a basic understanding of how Novell Cluster Services works. A short overview is provided in the Novell Cluster Services Overview and Installation Guide (http://www.novell.com/documentation/lg/ncs/ index.html). NOTE: Novell Clustering Services runs only on NetWare.
-
Manual 99a 38 July 17, 2001 Post-Installation Tasks 1 Do one of the following: For NetWare 5.1 servers, create an NSS volume on your shared storage disk system, commonly referred to as a storage area network or SAN. This is the volume that will contain all your iFolder user data and accounts. The size of this volume will vary according to how many iFolder users you plan to have and the amount of data they will be storing. For more information, see NetWare Cluster Services (http:// www.novell.
-
Manual 99a 38 July 17, 2001 For more information, see Novell Cluster Services (http:// www.novell.com/documentation/lg/ncs6p/index.html) > Installation and Setup > Setting Up Cluster Services. 3 Create a folder on the cluster-enabled volume. 4 Choose one iFolder server in the cluster and go to the SYS:Apache\iFolder\Server directory and edit the HTTPD_NW_ADDITIONS.CONF file.
-
Manual 99a 38 July 17, 2001 Locate the ServerName parameter. By default, this parameter displays the IP address of the server. Replace this IP address with the IP address or DNS name of the cluster-enabled volume. Locate the SecureListen ipaddress "SSL CertificateIP" parameter. Change the IP address that is listed to the IP address or DNS name of the cluster-enabled volume. 8 Save your changes to the HTTPD.CONF file and then copy it to every iFolder server in the cluster.
-
Manual 6 99a July 17, 2001 38 Using Novell iFolder This chapter covers the following three topics: “Managing Novell iFolder Accounts” on page 37 “Using the Server Management Console” on page 38 “Optimizing Your iFolder Server” on page 40 Managing Novell iFolder Accounts Once Novell® iFolderTM is installed and running on your server, your users can download and install the iFolder client.
-
Manual 99a 38 July 17, 2001 Management Console by opening a browser and entering https:// ifolderserverip/iFolderServer/Admin. IMPORTANT: The Server Management Console URL is case sensitive. For more information, see the next section, Using the Server Management Console. Using the Conflict Bin The iFolder client has a feature called the Conflict Bin. A user will rarely need to access this option, however, it is useful for you to undestand how this feature works.
-
Manual 99a 38 July 17, 2001 Once you are logged in, you can view and modify iFolder accounts as well as set specific policies for your iFolder clients and server. You can perform the following tasks in the Server Management Console: View general server information View and Modify LDAP settings View user account information As an administrator, you can remove a user account, change a user’s disk storage quota on the iFolder server, and set specific policies for individual users.
-
Manual 99a 38 July 17, 2001 Restoring a User’s Folder If a user wants to recover data from a deleted or corrupted file, you can restore his folder to a secondary iFolder server and from there he can access his files. 1 At the Server Management Console, click User Accounts. 2 Roll your mouse over the user’s ID and look at the ID that appears in the bottom of your browser. 3 Restore this folder from a backup tape to a secondary iFolder server that the user can attach to and restore the files.
-
Novell NetDrive Administration Guide Novell NetWare 6 ® www.novell.
-
Manual 99a July 17, 2001 38 Contents Contents 5 Novell NetDrive Administration Guide 7 Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1 Installing Novell NetDrive Workstation Requirements . . . . . . . . . Workstation and Protocol Compatibility Application Compatibility . . . . . . . . Installing NetDrive . . . . . . . . . . . . . 2 9 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
-
Manual 6 99a Novell NetDrive Administration Guide Novell NetDrive Administration Guide 103-000170-001 September 4, 2001 Novell Confidential 38 July 17, 2001
-
Manual 99a 38 July 17, 2001 Novell NetDrive Administration Guide Novell® NetDrive is an easy-to-use Internet client that lets you access your NetWare® 6 servers over standard Internet protocols, such as WebDAV and FTP. NetDrive does not rely on the Novell ClientTM in order to map network drives. Documentation Conventions In this documentation, a greater-than symbol (>) is used to separate actions within a step and items in a cross-reference path. Also, a trademark symbol (®, TM, etc.
-
Manual 8 99a Novell NetDrive Administration Guide Novell NetDrive Administration Guide 103-000170-001 September 4, 2001 Novell Confidential 38 July 17, 2001
-
Manual 1 99a 38 July 17, 2001 Installing Novell NetDrive Novell® NetDrive lets you to map a network drive to any NetWare® 6 server without using Novell ClientTM software. This means that with NetDrive, you can access and modify your files from any workstation using just an Internet connection. Once a network drive is mapped, the drive letter that you assigned during the mapping appears in Windows* Explorer and functions just like those that are mapped through Novell Client.
-
Manual 99a 38 July 17, 2001 Workstation Requirements You need only 2 MB of available space on your hard drive to install and run the NetDrive client. Workstation and Protocol Compatibility Review the following table for information on what protocols are supported with your workstation operating system. IMPORTANT: If you are installing the NetDrive client on a Windows 95 workstation, download the Winsock 2 update from Microsoft*. This update can be downloaded from the Microsoft Web site (http://www.
-
Manual 99a 38 July 17, 2001 Installing NetDrive 1 Double-click NETDRIVE.EXE located in the NetDrive directory at the the root of the NetWare 6 Client CD. 2 Follow the installation instructions. When you click Finish on the last installation screen, Windows Explorer launches and the following shortcuts appear in an Explorer window: Help on NetDrive, NetDrive, and Uninstall NetDrive. 3 Double-click the NetDrive shortcut icon.
-
Manual 12 99a Novell NetDrive Administration Guide Novell NetDrive Administration Guide 103-000170-001 September 4, 2001 Novell Confidential 38 July 17, 2001
-
Manual 2 99a July 17, 2001 38 Using Novell NetDrive Once NetDrive is installed, you can perform many basic tasks within the NetWare® Main Window. Adding a Site 1 In the NetWare Main Window, click New Site. 2 Enter the name of your site and the URL for the NetWare 6 server in the appropriate fields of the New Site dialog box. If you omit the FTP or HTTP suffix from the URL, then NetDrive defaults to FTP.
-
Manual 99a 38 July 17, 2001 Mapping a Drive Once you have created a site and clicked Finish, the name of your site and the URL of your NetWare 6 server are automatically generated in the NetDrive Main Window; however, you still need to complete the following steps before you can connect to a NetWare 6 server. 1 From the Server Type drop-down list, select the protocol that your NetWare 6 server is using, and then select the drive letter that you want to use for the mapped drive.
-
Manual 99a 38 July 17, 2001 Copying Files To copy files, copy or cut and paste files as you normally would in Windows Explorer. To disconnect from the server, right-click the Drive icon in Explorer and click Disconnect. WARNING: Since a connection can be interrupted in the middle of a file transfer, you should always keep a backup copy of files that are transferred or modified on your server.
-
Manual 16 99a Novell NetDrive Administration Guide Novell NetDrive Administration Guide 103-000170-001 September 4, 2001 Novell Confidential 38 July 17, 2001
-
Manual 3 99a 38 July 17, 2001 Using NetDrive in a Thin-Client Environment NetDrive lets you access your iFolderTM files in a thin-client environment. If you are accessing your virtual desktop through one of the following applications running on your thin-client server, you can use NetDrive to access your iFolder server and files: Terminal Services Client Citrix* MetaFrame Novell® OnDemand ServicesTM To access your iFolder files, do the following: 1 Install NetDrive on your thin-client server.
-
Manual 18 99a Novell NetDrive Administration Guide Novell NetDrive Administration Guide 103-000170-001 September 4, 2001 Novell Confidential 38 July 17, 2001
-
Manual 4 99a 38 July 17, 2001 Troubleshooting FTP Problems The following are troubleshooting tips that should help when you encounter FTP errors. If you can’t create files using Microsoft Word, your NetWare® 6 FTP server that is running FTP might not support filenames that have the tilde (~). To configure NetDrive to remove or replace tildes when connecting to your FTP Web server, click your FTP site in the NetDrive Main Window and then click Advanced > File Names.
-
Manual 99a 38 July 17, 2001 If you can’t copy a file from an FTP mapped drive, check the Drive Monitor Log window for FTP/HTTP status responses. If you can’t find a file on your NetWare 6 FTP server, flush your directory cache. To do this, in the NetDrive Main Window click File > Program Settings > Cache > Flush Directory Listing upon Each Connection. If you can’t rename your files, it might be because your NetWare 6 FTP server doesn’t support this functionality.
-
QuickStart Rev 99a 44 August 22, 2001 To begin a QuickStart (English): Click in the box under the word Novell. Insert QuickStart and Title elements. 2. Type the product name. 3. Insert the HeadQS element and type the title of your card. 4. Put in your product version: Click Special > Variable > select the variable named Version > Edit Definition > enter the version number > click Done > Done. It will appear as background text replacing Version X.X.
-
QuickStart Rev 99a 44 August 22, 2001 System Requirements If you have met the requirements for NetWare 6 and have NetWare 6 installed, you have met almost all of the system requirements for NetStorage. The following list specifies the system requirements for installing and running Novell NetStorage: At least one NetWare 6 server in the eDirectoryTM tree where NetStorage will be installed A Netscape* Navigator* 4.7 or later or Internet Explorer 5.
-
QuickStart Rev 99a 44 August 22, 2001 5 (Optional) Specify IP addresses or DNS names of servers in other eDirectory trees that have at least read/write eDirectory replicas, or specify the same IP address or DNS name you used for the primary eDirectory server but with a different context. You can add two alternate eDirectory server IP addresses or DNS names and context settings.
-
QuickStart Rev 99a 44 August 22, 2001 STARTING AND USING NOVELL NETSTORAGE Once you install NetStorage, it will start automatically when you start your NetWare 6 server. If NetStorage is not accessible, restart the NetWare 6 server where NetStorage is installed. Also, the date and time on the server running NetStorage should be reasonably close (within a few hours) of the date and time on the machine being used to access NetStorage.
-
QuickStart Rev 99a 44 August 22, 2001 Clicking the Folder View button in the browser window displays folders in another column and lets you expand and contract folders. The Text View only displays the files and folders in the current directory and does not let you expand or contract folders. Local files and folders are not accessible using NetStorage. Also, mapping drives or changing login scripts is not permitted. Copyright © 2001 Novell, Inc. All rights reserved.
-
Novell Storage Services Administration Guide Novell NetWare 6 ® www.novell.
-
Manual 99a July 17, 2001 38 Contents Introducing Novell Storage Services 7 Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1 Overview 9 NSS Features and Benefits . . . . . . . . . . . . . . . . . . . . NSS Management . . . . . . . . . . . . . . . . . . . . . . . Combine Logical Volumes in a Single Storage Pool . . . . . . Create Logical Volumes . . . . . . . . . . . . . . . . . . . .
-
Manual Setting Up ConsoleOne on a Workstation . . . . . . Configuring Disk Space . . . . . . . . . . . . . . . Renaming a Storage Pool . . . . . . . . . . . . . . Renaming a Logical Volume . . . . . . . . . . . . . Increasing the Size of a Storage Pool . . . . . . . . Deleting NSS Pools or Logical Volumes . . . . . . . Reviewing and Restoring Deleted Logical Volumes . Changing the Purge Delay Setting. . . . . . . . . . Creating a Traditional Volume . . . . . . . . . . . .
-
Manual 99a 38 July 17, 2001 Introducing Novell Storage Services As your network structure grows, you need larger storage capacity, more efficient file management, and faster volume mounting speed. For example, you might need large volumes for numerous directories and files, or have numerous files open simultaneously. Novell® Storage ServicesTM (NSS) is a 64-bit file storage and management system that meets your file system needs.
-
Manual 8 99a 38 Novell Storage Services Administration Guide Novell Storage Services Administration Guide 103-000141-001 August 30, 2001 Novell Confidential July 17, 2001
-
Manual 1 99a 38 July 17, 2001 Overview Novell® Storage ServicesTM is a storage and file system that provides an efficient way to use all of the space on your storage devices. NSS is best used with systems that require the ability to store and maintain large volumes and numerous files or large databases. Novell Storage Services is the default storage and file system for NetWare® 6. You use it to create, store, and maintain both traditional and NSS volumes. The NSS volumes are called logical volumes.
-
Manual 99a 38 July 17, 2001 and logical volumes, it includes instructions for setting up and maintaining traditional volumes. NSS Features and Benefits This section describes the features and benefits of NSS. NSS Management ConsoleOneTM is the primary utility used to configure and maintain both traditional and NSS logical volumes. See “Using ConsoleOne to Configure Novell Storage Services” on page 25. NOTE: NWCONFIG and NSS Menu are not compatible with some of the NetWare 6 NSS features.
-
Manual 99a 38 July 17, 2001 Exceed the Limit of Volumes in a Storage Pool (Overbooking) Individual logical volumes cannot exceed the size of a storage pool. However, you can create numerous volumes in a storage pool. Individual logical volumes must be smaller than the storage pool, but the sum of multiple logical volumes can exceed the pool size. This feature, called overbooking, can be an efficient way to manage your file system.
-
Manual 99a 38 July 17, 2001 Retain Previously Saved Files (Snapshot) The File Snapshot feature allows your backup utility to keep a consistent copy of all files. This is done by having the file system keep an original copy of all open files. For example, when your system backs up or crashes at a time when you are modifying a file, the backup could contain both old and new data. Snapshot captures the most recent closed copy of the file.
-
Manual 99a 38 July 17, 2001 Prevent Access to Deleted Files (Data Shredding) The Data Shredding feature overwrites purged disk blocks with random patterns of hexidecimal characters. This prevents unauthorized users from using a disk editor to access purged files. You can place up to seven data shred patterns over deleted data. Set Up User Space Restrictions User space restrictions let you limit the space users have on volumes.
-
Manual 99a 38 July 17, 2001 Redirect Data from Unreliable Blocks (Hot Fix) As your file system constantly reads and writes data to disk, some disk storage blocks lose their ability to reliably store data. NSS uses Hot Fix to prevent data from being written to unreliable blocks. Hot FixTM redirects the original block of data (still in memory) to the Hot Fix Redirection Area of the partition where the data can be stored correctly.
-
Manual 99a 38 July 17, 2001 You can specify no Hot Fix Redirection Area when you create disk partitions. Having no Hot Fix Redirection Area saves partition space. This might be useful on large RAID systems that provide a method of fault tolerance. IMPORTANT: If Hot Fix is not enabled, then the partition will not have the fault tolerance provided by NetWare. Data on corrupted sectors of the disk won’t be redirected to the Hot Fix Redirection Area.
-
Manual 99a 38 July 17, 2001 You can only mirror partitions. However, you might want to mirror an entire storage pool. Because you can have only one storage pool on a partition, the only way to mirror that storage pool is to mirror all of the partitions the pool resides on. To mirror partitions, you need to select an option that makes the partitions compatible for mirroring when you create them—you cannot change that mirroring option after you create a partition.
-
Manual 99a 38 July 17, 2001 Important Information about NSS RAID Each element in the RAID configuration should come from a different device. NSS will let you obtain RAID elements from the same device, but this will severely impede the performance of your file system. Currently, the NSS RAID supports RAID 0. The stripe size ranges between 4 KB and 256 KB in increments of 2 KB.
-
Manual Figure 1 99a 38 July 17, 2001 Novell Storage Services Configuration Free Space Storage Devices CD-ROM Free Space = Storage Deposit Partitioned Free Space Free Space Free Space Storage Pool Storage Pool Free Space Volume size can equal storage pool size Logical Vol1 18 Logical Vol2 Logical Traditional NSS volume volume Vol3 (Read-Only) Novell Storage Services Administration Guide Novell Storage Services Administration Guide 103-000141-001 August 30, 2001 Novell Confidential
-
Manual 2 99a 38 July 17, 2001 Setting Up and Configuring Novell Storage Services Novell® Storage ServicesTM installs automatically when you install NetWare® 6. This section provides instructions for setting up and configuring Novell Storage Services (NSS) after the installation. It also contains information about configuring and maintaining traditional partitions and volumes.
-
Manual 99a 38 July 17, 2001 Do the following to ensure NDS is running: 1 Use iMonitor to determine that the upgrade process is complete. 1a Open iMonitor in a network browser by entering the IP address of the server followed by /nds. For example: http://155.555.1/nds. 1b Click Agent Process Status > External Reference Status. 1c Make sure the time stamp (under the Time column) shows a time after the time you began the upgrade—specifically when NDS unloaded during the upgrade.
-
Manual 99a 38 July 17, 2001 Upgrading NSS Volumes To upgrade NSS volumes, enter one of the following commands at the NetWare 6 server console: NSS /ZLSSVOLUMEUPGRADE=ALL NSS /ZLSSVOLUMEUPGRADE=volumename Transaction Tracking System (TTS) Transaction Tracking protects database applications by backing out transactions that are incomplete due to a system failure. TTS can be available on either all traditional or all NSS logical volumes.
-
Manual Task 99a Purpose Command Set number of cache buffers This sets the minimum number of cache buffers allocated for NSS file system access. The default and minimum number of cache buffers is 512. The range is 256 to 1048576. nss/ MinBufferCacheSize= value Look up cache buffers To quickly look up cache buffers, the cache uses a hashing algorithm that maps names to buckets. Sometimes multiple names map to the same bucket.
-
Manual 99a 38 July 17, 2001 Task Purpose Command Set the amount of cache NSS takes from the traditional file system This is the percent of cache between NSS and the server. The CacheBalance percentage determines how many cache blocks NSS will take from the traditional file system for its own cache. A high cache balance percentage will impede the performance of the traditional file system. A low cache balance will impede the performance of NSS.
-
Manual 99a July 17, 2001 38 Task Purpose Command Show the cache hit ratio at the server console This is the number of cache hits divided by the number of attempts to get a file cache buffer from the cache. Any amount above 90 percent is good. This means the system is spending less time going to the disk to retrieve data. Lower numbers indicate NSS needs more memory. If this occurs, you might want to set the cache balance percentage higher.
-
Manual 99a 38 July 17, 2001 Task Purpose Command Determine how often NSS rebalances the amount of cache it uses This timer lets you determine how often (in seconds) NSS will rebalance the amount of cache it uses according to the total amount of memory on the server. If you have difficulty loading NLMs because of low memory, you might want to lower this timer setting. A lower setting forces NSS to rebalance more often.
-
Manual 99a 38 July 17, 2001 This opens the ConsoleOne interface where you can access the snap-ins for managing NSS. The NSS configuration features are in the Media snap-in. Setting Up ConsoleOne on a Workstation To use ConsoleOne on a client workstation, you need to load ConsoleOne 1.3 or later. Then you must copy the NSS JAR files from your server to your client machine. 1 Copy these three NSS JAR files to your local LIB directory: public\mgmt\consoleone\1.3\lib\nssadmin.jar public\mgmt\consoleone\1.
-
Manual 99a 38 July 17, 2001 Creating a RAID Device NSS lets you create a RAID 0 device by striping data across multiple drives on your system. This RAID configuration occurs at the software level. You can use this RAID feature for both logical and traditional volumes. Important information about NSS RAID Each element in the RAID configuration should come from a different device.
-
Manual 99a 38 July 17, 2001 Deleting a RAID Device When you delete a RAID device, the file system deletes all the partitions and volumes from all physical storage devices used in the RAID configuration. 1 From ConsoleOne, open the tree you want. 2 Right-click on the server object and select Properties. 3 Click Media > Raid Devices. 4 Select the Raid device you want to delete. 5 Click Delete. The file system displays a warning message to ensure you want to delete the RAID device. 6 Click Yes or No.
-
Manual 99a 38 July 17, 2001 Marking a Device as Sharable for Clustering Some storage devices exist in a storage area network (SAN). These devices can be shared by multiple servers in a cluster. IMPORTANT: The system hardware does not specify disk drives to come up automatically as sharable for clustering or not sharable for clustering. You must manually set different devices according to the configuration of your storage system.
-
Manual 99a 38 July 17, 2001 5 Select the type of partition you want to create (NSS, Traditional, Remote Storage Device). 6 Enter the size of the partition in bytes (B), kilobytes (KB), megabytes (MB), or gigibytes (GB). 7 To reserve space for the Hot Fix error correction feature, select Hot Fix and enter the amount of space or percentage you want to reserve. Mirrored partitions must be compatible in data area size.
-
Manual 99a 38 July 17, 2001 Delete a Partition 1 From ConsoleOne, open the tree you want. 2 Right-click the server object and select Properties. 3 Click Media > Partitions. 4 Select the partition you want to delete, click Delete. Creating a Storage Pool After creating and setting up your partitions, you can create storage pools within the partitions. When you create a storage pool, NSS lets you determine how much space to use from each storage device on your server.
-
Manual 99a 38 July 17, 2001 Creating a Logical Volume After creating storage pools, you can create any number of logical volumes for the storage pools according to the physical space available. When you create a logical volume, you can either assign it a space or allow it to expand to the pool size. The size of a single volume cannot exceed the size of a storage pool. However, the combined sizes of multiple volumes can exceed the size of the storage pool. This is called overbooking.
-
Manual 99a 38 July 17, 2001 use. This means your backup system might not recognize this option whether you select it or not. Compression. Activates file compression in the logical volumes. Data Shredding. Activates the Data Shredding security feature. This feature scrambles any data that you delete to prevent anyone from accessing the information with a disk reader. Enter the number of times you want the data shredder to scramble your deleted files. You can select between one and seven times.
-
Manual 99a 38 July 17, 2001 Renaming a Storage Pool You can rename existing storage pools. For example, you might want to assign a storage pool name that relates to a department name change. 1 From ConsoleOne, open the tree you want. 2 Right-click on the server object and select Properties. 3 Click Media > NSS Pools. 4 Select a pool to rename. 5 Click Rename. 6 Enter a new name for the pool. 7 Click Finish. Renaming a Logical Volume You can rename logical volumes.
-
Manual 99a 38 July 17, 2001 6 Enter the amount of space you want from each storage object in the Used column. 7 Click Finish. Deleting NSS Pools or Logical Volumes You might need to delete a storage pool or a logical volume to create more free space for other storage pools. When you delete a logical volume or a traditional volume from a partition, that partition still owns the space, but you can reassign the space to another storage pool or traditional file system volume.
-
Manual 99a 38 July 17, 2001 deleted volumes. You purge or restore volumes in the “Deleted Logical Volumes on Pool” screen. 1 From ConsoleOne, open the tree you want. 2 Right-click on the server object and select Properties. 3 Click Media > Logical Volumes. 4 Click Deleted Volumes. 5 Select one of the following options: Purge. Click Purge to immediately purge all the deleted volumes. Prevent Purge/Allow Purge. Click Prevent Purge to stop the volume purging process.
-
Manual 99a 38 July 17, 2001 Creating a Traditional Volume NSS is the default file storage and management system in NetWare 6. However, you might want to continue maintaining traditional partitions and volumes in NSS. The following is a list of guidelines for creating traditional volumes in NetWare 6: NWCONFIG and NSS Menu are not compatible with NetWare 6. Use ConsoleOne to create, mount, modify, and rename traditional volumes.
-
Manual 99a 38 July 17, 2001 Suballocation. Enables the file system to divide partially used disk blocks into suballocation blocks of 512 bytes. These blocks can be used by other data files. Mount Volume on Creation. Instructs the operating system to mount the volume when you create it. Otherwise, you can mount it later. 10 Click Finish. Increasing the Size of a Traditional Volume To increase the size of a traditional volume, you need to add another segment to that volume.
-
Manual 99a 38 July 17, 2001 Deleting a Traditional Volume You can delete traditional volumes. 1 From ConsoleOne, open the tree you want. 2 Right-click on the server object and select Properties. 3 Click Media > Traditional Volumes. 4 Select the volume you want to delete and click Delete. Dismounting a Traditional Volume To repair a traditional volume, you need to dismount that volume. 1 From ConsoleOne, open the tree you want. 2 Right-click on the server object and select Properties.
-
Manual 99a 38 July 17, 2001 The server console displays a mirroring error when the server boots. This mirroring refers to the two copies of FATs and DETs that the operating system keeps (if disks are mirrored, NetWare keeps four copies). If a volume fails to mount as the server is booting, VREPAIR loads automatically and attempts to repair the volume. When VREPAIR autoloads, it uses the default options.
-
Manual 99a 38 July 17, 2001 2b To set alternate options at the Options menu, choose Set VRepair Options by typing 2 Enter 3 To begin the repair process, choose Repair A Volume from the Options menu. If more than one volume is dismounted, select the volume to repair from those listed. If only one volume is dismounted, VREPAIR assumes it is the volume that needs repairing and begins the repair.
-
Manual 99a 38 July 17, 2001 Setting Up File Snapshot The File Snapshot feature enables your backup utility to keep an original copy of all data files. For example, when your system backs up or crashes at a time when you are modifying a file, the file backup could contain both old and new data. Snapshot captures the most recent closed copy of the file. This way, if you lose data between the backup cycles, you still have a solid copy of the previously saved file.
-
Manual 99a 38 July 17, 2001 The following are some additional calls that return information about File Snapshot: GetFileSize GetFileHoles You can also use ConsoleOne to select the File Snapshot feature. See “Creating a Logical Volume” on page 32. Converting Traditional Volumes to Logical Volumes You can convert traditional volumes to logical volumes. This is not an automatic process or an in-place upgrade.
-
Manual 99a 38 July 17, 2001 /d: Delete original volume if copy process is successful. If you choose to delete the traditional volume, the new volume will retain the name of the that volume. /r: Remove xxx_new NSS volume and restore xxx traditional volume (use this option if you want to keep the original volume name for the new logical volume name).
-
Manual 99a 38 July 17, 2001 Modifying NDS Objects The volume conversion utility lets you modify the NDS objects and physical names for both logical and traditional volumes except the VOL SYS. Use the following commands VCU commands if you want to change the NDS objects with the volume conversion process.
-
Manual 99a 38 July 17, 2001 8 Click Modify. 9 Enter or edit the user space amount in the Limit field and click OK. Setting Up Directory Space Restrictions You can limit the amount of space occupied by a directory and the files it contains. 1 Open ConsoleOne. 2 Right-click on the directory you want. 3 Click Properties and then Facts. 4 Select Restrict Size. 5 Enter the amount you want to limit the size to and click Apply. 6 Click Close.
-
Manual 99a 38 July 17, 2001 2 Right-click on the server object and select Properties. 3 Click Media > NSS Pools or Logical Volumes. 4 Select the storage pool or volume you want to activate or deactivate. 5 Click Activate or Deactivate. 6 Click Activate when you are ready to restore access to the volume or pool. Salvaging and Purging Deleted Files You can salvage files that were deleted by users, or purge deleted files to improve your file system performance. Deleted files are in a DELETED.
-
Manual 99a 38 July 17, 2001 Rebuilding NSS Storage Pools and Volumes To repair storage pools and logical volumes, NSS uses the VERIFY and REBUILD utilities. VERIFY checks the file system integrity for an NSS pool by searching for inconsistent data blocks or other errors. This utility indicates if there are problems with the file system. REBUILD verifies and uses the existing leaves of an object tree to rebuild all the other trees in the system.
-
Manual 99a 38 July 17, 2001 NSS Server Console Commands Use the following commands at the server console to view NSS information and perform tasks. Online Help Commands Enter nss /help or nss /? to access Help. NSS Configuration Information Commands nss /modules Lists the providers, loadable storage subsystems, and semantic agents. nss /status Lists the current NSS status. volumes Lists all NetWare and NSS volumes that are mounted, including Admin volume.
-
Manual 99a 38 July 17, 2001 tasks such as flushing file metadata to disk in the background. Increasing the number of WorkToDo entries might be useful on a system that is heavily used. NSS always reserves 20 WorkToDo entries. The default is 40. The range is 5 to 100. nss /FileFlushTimer=value Sets the flush time for modified open files in seconds. Increasing this number might reduce the number of writes to disk; however, it increases the amount of data that will be lost if the system crashes.
-
Manual 99a 38 July 17, 2001 FlushFilesImmediately Synchronously flush files in the volume when they are closed. NoFlushFilesImmediately Disable synchronously flushing files in the volume. FileCopyOnWrite Create a copy of files in the volume when they are open for write. NoFileCopyOnWrite Do not create a copy of files on the volume when they are open for write. UpgradeObjectsOnVolume Upgrade objects on volumes to the current version.
-
Manual 99a 38 July 17, 2001 PoolRebuild Select pools from a menu and rebuild them. PoolVerify=pool Verify the specified pool’s physical integrity. PoolVerify Select pools from a menu and verify their physical integrity. LogicalVolumePurgeDelayAfterLoad The number of seconds to delay purging deleted logical volumes. This allows time to reverse the deletion. LogicalVolumePurgeDelayAfterContinue The number of seconds to delay purging a logical volume after clicking continue.
-
Manual 99a 38 July 17, 2001 DOS FAT Commands nss /(No)FATLongNames Enables long filenames on FAT volumes. The default is ON. nss /(No)FATLazyWrites Performs lazy writes of FAT. If set to ON, data that is written will be kept in memory for a specified period of time before it is also written to FAT. This increases performance. The default is ON. nss /FATLazyWriteDelay=value Sets the FAT lazy write delay (in seconds).
-
Manual 99a 38 July 17, 2001 The CD9660.NSS module makes the contents of the standard ISO9660 CDROM available as a Read-Only logical volume. If the CDROM is in the drive when CD9660 loads, it will mount as a logical volume immediately. The volume name displayed by the NetWare volumes command is the CDROM volume label if one exists. Otherwise, NSS generates a volume name in this form: CDXXXXXX (where X is a number). This volume functions the same as any other NetWare volume, except that it is Read-Only.
-
Manual 99a 38 July 17, 2001 NetWare utilities. Any client or server utility that accesses or manages NetWare volumes can do the same with DOS FAT partitions. MAP command. NetWare clients can map to the volume and use it as any other NetWare mapping. Local partition. Allows access to the local partition.
-
Manual 56 99a 38 Novell Storage Services Administration Guide Novell Storage Services Administration Guide 103-000141-001 August 30, 2001 Novell Confidential July 17, 2001
-
Manual 3 99a 38 July 17, 2001 Viewing Storage Objects We recommend that you monitor the status of your storage objects and Novell® Storage ServicesTM configuration to ensure they work properly and have available disk space. Viewing Storage Devices You can use ConsoleOneTM to view your storage devices and see which ones have free space. 1 From ConsoleOne, open the tree you want. 2 Right-click on the server object and select Properties. 3 Click Media > Show Devices.
-
Manual 99a 38 July 17, 2001 pool. On a traditional partition, space that is not occupied by a NetWare® volume is free space. 1 From ConsoleOne, open the tree you want. 2 Right-click on the server object and select Properties. 3 Click Media > Free Space. The left panel lists the storage devices that have free space. 4 Select the device you want. For information about the Free Space screen, click Help. Any time the Devices button appears, you can click it to open the Devices screen.
-
Manual 99a 38 July 17, 2001 View the Status of Your NSS Storage Pools You can view the status of NSS storage pools. For example, you might want to see what volumes are in a particular storage pool, or how much space is in all your storage pools. 1 From ConsoleOne, open the tree you want. 2 Right-click on the server object and select Properties. 3 Click Media > NSS Pools. The left panel lists the NSS storage pools. 4 Select a storage pool. For information about the NSS Pools screen, click Help.
-
Manual 99a 38 July 17, 2001 3 Click Media > Logical Volumes. 4 Click Properties. 5 Click Statistics > NSS Quota Usage. This screen shows the volume’s quota, amount of spaced used, and the remaining space. The screen also shows the amount of space used and the available space on the storage pool. For information about the NSS Quota Usage screen, click Help. View and Modify Logical Volume Attributes You can view and modify the attribute settings for specific volumes.
-
Manual 4 99a 38 July 17, 2001 Troubleshooting The following table describes some problems you might experience with Novell® Storage ServicesTM (NSS) and provides suggestions for solving the problems. For additional troubleshooting information, see the Novell Knowledgebase at (www.support.novell.com). Problem Explanation Solution NSS does not recognize a Device NSS recognizes only what the Media Manager recognizes. For this release, NSS recognizes only hard drives and CD ROMs.
-
Manual 62 99a 38 July 17, 2001 Problem Explanation Solution Cannot compress a file You must choose the file compression option when you create a logical volume. Apply the file compression option to an existing logical volume: From ConsoleOne, click Media > NSS Logical Volumes > Properties > Attributes > NSS Attributes. Then select compression.
-
Traditional File Services Administration Guide Novell NetWare 6 ® www.novell.
-
Manual 99a July 17, 2001 38 Contents Preface 7 Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 1 Overview of Traditional File System Volume . . . . . . . . . . . . . . . . . Understanding Mounting a Volume. Volume Objects in NDS . . . . . . Understanding Volume Segments . Directories . . . . . . . . . . . . . . . Directory Path . . . . . . . . . . . Fake Root. . . . . . . . . . . . . . Directory Map Objects . . . . . . . Optimizing Performance .
-
Manual 99a July 17, 2001 38 Mapping Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Mapping Drives in Windows 95/98, NT/2000 . . . . . . . . . . . . . Mapping Drives in DOS . . . . . . . . . . . . . . . . . . . . . . . . Distributing Applications on the Network . . . . . . . . . . . . . . . . . Security: Rights to Files and Directories. . . . . . . . . . . . . . . . . . Description of Directory and File Rights . . . . . . . . . . . . . . . . Adding a Trustee to a Directory or File . .
-
Manual 99a 38 July 17, 2001 Preface NetWare® provides the traditional NetWare file system components and utilities, such as NetWare partitions, NetWare volumes, and file management utilities.
-
Manual 99a 38 July 17, 2001 Documentation Conventions In this documentation, a greater-than symbol (>) is used to separate actions within a step and items in a cross-reference path. Also, a trademark symbol (®, TM, etc.) denotes a Novell trademark. An asterisk (*) denotes a third-party trademark.
-
Manual 1 99a 38 July 17, 2001 Overview of Traditional File System This chapter of the file system documentation explains key aspects of the traditional NetWare® file system and contains the following topics: Volume (page 9) Directories (page 12) Optimizing Performance (page 14) Drive mapping (page 16) How NetWare Protects Network Data (page 17) “Security” on page 18 Information on volumes, directories, files, and other characteristics of the file system is presented to give you background n
-
Manual 99a July 17, 2001 38 A NetWare server is divided into one or more volumes. The first network volume is named SYS: and is created during NetWare installation. Using ConsoleOne, you can create a new volume on any hard disk that has a NetWare partition. A NetWare server supports up to 64 volumes. NetWare volumes are subdivided in two ways: Physically. You divide volumes into volume segments; different segments of a volume can be stored on one or more hard disks.
-
Manual 99a 38 July 17, 2001 Because of this, volumes with a smaller block size require more server memory to mount and manage. However, if most of your files are small, a large block size wastes disk space. The volume's DET is loaded into memory If a volume fails to mount, it might be because you have run out of RAM. This is because the FAT takes up cache buffers. NOTE: The new file system, Novell Storage Services (NSS), mounts volumes more quickly and can mount any size volume with 1 MB of memory.
-
Manual 99a 38 July 17, 2001 However, when you spread segments of a volume over several disks, you should protect the volumes against disk failure by mirroring; otherwise, if a single disk fails, one or more entire volumes shut down. You can add segments to a volume, but removing a segment from a volume destroys the entire volume.
-
Manual 99a 38 July 17, 2001 characters in a directory path (counting the drive letter and delimiters), but DOS permits only 127 characters. Also, some applications restrict the number of characters in the directory path. For more information, check the application's documentation. Fake Root A fake root is a subdirectory that functions as a root directory. NOTE: Fake roots work with the NetWare DOS Requester, with NetWare shells, and clients including Windows* 3.x, Windows 95, and Windows NT*.
-
Manual 99a 38 July 17, 2001 If you create a Directory Map object to point to an application, users can access the application by mapping a drive to the Directory Map object. If the application's location in the directory structure changes, you can update the object instead of having to change all users' drive mappings.
-
Manual 99a 38 July 17, 2001 Salvageable Files Salvageable files are files saved by NetWare, after being deleted by users, that can be salvaged (recovered). Salvageable files are usually stored in the directory they were deleted from. If a user deletes that directory, the salvageable files are saved in a DELETED.SAV directory located in the volume's root directory. The user can view a list of deleted files in a directory and recover files by using ConsoleOneTM.
-
Manual 99a 38 July 17, 2001 Drive mapping A drive mapping is a pointer to a location in the file system, represented as a letter assigned to a directory path on a volume. A path includes the volume, directory, and any subdirectories leading to the file. A drive mapping assigns a letter to a path so that the letter can be used instead of the complete path name. Drive mappings can be temporary or permanent: Permanent mappings.
-
Manual 99a 38 July 17, 2001 Network Drive Mappings Network drive mappings point to volumes and directories on the network. Normally, drives F: through Z: are used for network mappings. Each user can map drive letters to different directories. To create a network drive mapping, use the MAP command. Network Search Drive Mappings Network search drive mappings point to directories containing files such as applications or files.
-
Manual 99a 38 July 17, 2001 Security Security is one of the most important aspects of file system organization. NDS rights and the file system's directory and file attributes allow you to determine who may access what, and whether that access amounts to being able to merely read a file or modify it. To use the capabilities described in the NDS area of this documentation, you might want to organize your approach to designing an appropriately secure system by doing the following: 1.
-
Manual 2 99a 38 July 17, 2001 Planning This chapter presents a simple example of a network directory structure to help you plan your file system. Based on the example and the accompanying information, you can begin to design a directory hierarchy suitable to your own needs. NOTE: You use the Novell® Storage ServicesTM (NSS) file system to meet your file system needs. NSS lets you create and maintain NSS logical volumes along with traditional NetWare® volumes.
-
Manual 99a 38 July 17, 2001 deleted directory are moved to the DELETED.SAV directory. Deleted files can be salvaged if they have not yet been purged. SYS:ETC contains sample files to help you configure the server. SYS:LOGIN contains the programs necessary for users to log in to the network, such as LOGIN.EXE. An NLS subdirectory contains subdirectories for login message files for each supported language. SYS:MAIL might or might not contain subdirectories or files.
-
Manual 99a 38 July 17, 2001 The following figure shows this type of directory structure: Figure 2 Application Volume SYSTEM PUBLIC LOGIN MAIL SYS NetWare server WORDPROC DBAPP SPRDSHT APPSVOL Create a separate directory off volume SYS: for each application. Make trustee assignments for each application. Then go into the system or profile login script and map a search drive to each application. The following figure shows this type of directory structure.
-
Manual 99a 38 July 17, 2001 However, users can see and use all applications. Use this directory structure only if you want all users to have access to all applications. The following figure shows this type of directory structure. Figure 5 Application Directory in SYS:PUBLIC APPS PUBLIC NetWare server WORDPROC DBAPP SPRDSHT SYS Installing applications in SYS:PUBLIC is not recommended (unless you create a subdirectory for each application).
-
Manual 99a July 17, 2001 38 Home or Username Directories To provide personal workspace for users, create home or username directories. You can create a parent directory in volume SYS: called HOME or USERS. Or, you can create a separate HOME or USERS volume. Then you can create a subdirectory for each user. The name of each subdirectory should be the username. Usernames can be up to 47 characters, but DOS displays only 8 characters in a one-level directory name.
-
Manual 24 99a 38 Traditional File Services Administration Guide Traditional File Services Administration Guide 103-000180-001 August 30, 2001 Novell Confidential July 17, 2001
-
Manual 3 99a 38 July 17, 2001 Setting Up the File System The procedures in this section of the documentation focus on specific tasks pertaining to system administration. Procedures involve various utilities and applications that are provided in the Novell Storage Services Administration Guide. The most productive use of file system documentation is to identify the task you want to complete and find an appropriate procedure.
-
Manual 99a 38 July 17, 2001 The following name space NLM programs are available with NetWare: MAC.NAM (Macintosh) LONG.NAM (OS/2, Windows 95/NT/2000) NFS.NAM (NFS). An FTAM name space module is available from third-party providers. Calculating Memory Required for Name Space Support Use the following formula to calculate the name space memory requirement for traditional NetWare non-DOS volumes: 0.032 x volume_size (in MB) / block_size (in MB) Round the size up to the highest number.
-
Manual 99a 38 July 17, 2001 3 To verify that the name space loaded, enter the following command: VOLUMES This shows a list of all name spaces. Removing Name Spaces You can remove the name space by deleting the volume and re-creating it, or by using VREPAIR. For instructions on using VREPAIR, see Repairing a Traditional Volume in the Novell Storage Services Administration Guide. Creating a Directory You create directories in ConsoleOneTM.
-
Manual 99a 38 July 17, 2001 Mapping Drives Mapping Drives in Windows 95/98, NT/2000 See Common Networking Tasks in the Novell Client for Windows documentation. Mapping Drives in DOS Use the command to map drives and search drives to network directories. For a general description of the MAP command, see MAP in Utilities Reference.
-
Manual 99a 38 July 17, 2001 You can create a Directory Map object that points to an application directory. Directory Map objects are useful in login scripts. Instead of mapping a drive to a specific directory path, you map a drive to a Directory Map object that points to a directory. For information about Directory Map objects, see “Directory Map Objects” on page 13. Then, if you change the directory path, you need to change only the Directory Map object’s definition.
-
Manual 99a 38 July 17, 2001 Description of Directory and File Rights Trustee rights determine the access users have to directories and files. These rights can be given to NDS object such as User objects, Group objects, Organizational Role objects, or container objects. The following table contains a list and description of rights. Table 1 Trustee Rights Right Allows you to Access Control Add and remove trustees and change rights to directories and files. Create Create subdirectories and files.
-
Manual 99a 38 July 17, 2001 Setting Directory or File Attributes To set up attributes and change owners for a directory or file, see the following: “Description of Directory and File Attributes” on page 31 “Changing Attributes of a Directory or File” on page 33 “Changing Attributes of a Directory or File” on page 33 For information on how to use Windows 95 to set directory or file attributes, see Common Networking Tasks in Novell Client for Windows 95 (http:// www.novell.com/documentation/).
-
Manual 99a 38 July 17, 2001 Attribute code Description Applies to Dm Do not Migrate prevents directories and files from being migrated from the server's hard disk to another storage medium. Directories and files Ds Do not Suballocate prevents data from being suballocated. Files only H The Hidden attribute hides directories and files so they cannot be listed using the DIR command.
-
Manual 99a 38 July 17, 2001 Attribute code Description Applies to X The Execute Only attribute prevents the file from being copied, modified, or backed up. It does allow renaming. The only way to remove this attribute is to delete the file. Use the attribute for program files such as .EXE or .COM. Make a copy of a file before you flag it as Execute Only, so you can replace the file if it becomes corrupted.
-
Manual 34 99a 38 Traditional File Services Administration Guide Traditional File Services Administration Guide 103-000180-001 August 30, 2001 Novell Confidential July 17, 2001
-
Manual 4 99a 38 July 17, 2001 Optimizing File System Performance This chapter on file system optimization focuses exclusively on tasks for the network administrator. Procedures in this section pertain primarily to disk space utilization, and affect performance only as space utilization affects network performance.
-
Manual 99a 38 July 17, 2001 To avoid the overhead of uncompressing files that do not compress well, the system calculates the compressed size of a file before actually compressing it. If no disk space will be saved by compression, or if the size difference does not meet the value specified by the SET parameter named Minimum Percentage Compression Gain, the file is not compressed. For a general description of the SET command, see SET in Utilities Reference.
-
Manual 99a 38 July 17, 2001 To change SET parameters, execute the SET command at the server console prompt. The following list identifies SET command parameters that affect file compression. The settings apply to all files and directories in compressionenabled volumes on the server. For the function and range of values associated with each SET parameter, see SET in Utilities Reference.
-
Manual 99a 38 July 17, 2001 You can purge files automatically using SET. For a general description of the SET command, see SET in Utilities Reference. Saving Disk Space with Block Suballocation Use block suballocation to enhance use of disk space. Block suballocation divides any partially used disk block into suballocation blocks of 512 bytes. These suballocation blocks can be used by files to share what would otherwise be unavailable space.
-
Manual 5 99a 38 July 17, 2001 Managing The procedures in the Managing section of the file system documentation pertain to network administrators and users. Procedures for viewing directory and file information, copying, moving, and other routine functions are of interest to users as well as system administrators. Procedures pertaining to volume management and the protection of network data necessarily belong to network administration.
-
Manual 99a 38 July 17, 2001 Deleting a Traditional Volume Repairing a Traditional Volume Volume Conversion Viewing Directory and File Information You can see extended information about a directory or file using ConsoleOne. For instructions on viewing directory and File information, see Viewing or Modifying Information about a File or Folder in the ConsoleOne 1.3 User Guide.
-
Manual 99a 38 July 17, 2001 instructions on copying directories and files, see Viewing or Modifying Information about a File or Folder in the ConsoleOne 1.3 User Guide. Salvaging and Purging Files Files deleted from the NetWare server remain on the disk until the deleted files are purged. Deleted files can be salvaged any time before they are purged. Purging frees the space used to store the deleted files on the server's hard disk.
-
Manual 99a 38 July 17, 2001 If you create a Directory Map object to point to an application, users can access the application by mapping a drive to the Directory Map object. Directory Map objects can be especially useful in login scripts by indicating directories that contain applications or other frequently used files. For instructions on creating Directory Map Objects, see Creating a Directory Map Object in the ConsoleOne 1.3 User Guide.
-
Manual 6 99a 38 July 17, 2001 Troubleshooting This chapter presents various troubleshooting procedures for resolving problems with traditional volume including the following: Resolving File I/O Errors (page 43) Resolving Volume I/O Errors (page 44) Resolving Problems When the Server Hangs after Mounting Last Volume (page 44) Resolving Problems When No Volumes Mount (page 45) Resolving Problems When Only Some Volumes Mount (page 45) Resolving Disk Error Problems When a Volume Is Mounting (pa
-
Manual 99a 38 July 17, 2001 Check how much space remains on volume SYS:. If it is low, increase the size by adding free space. To increase the amount of free space, do one or more of the following: Delete extraneous files (if you can log in from a workstation). Enter SET IMMEDIATE PURGE OF DELETED FILES = ON at the console prompt and then retry the action. If you have an additional disk, increase the size of the volume by creating an additional segment of the volume on the disk.
-
Manual 99a July 17, 2001 38 Make sure that all server and workstation network boards are seated properly and that cabling and connections are attached securely. Make sure that the terminators on cables have the right ohm rating and are installed correctly. The IBM* PC Cluster sends a broadcast message during initialization and then stops processing if the network is not cabled or terminated properly. Check the network boards in all workstations for correct node address settings.
-
Manual 99a 38 July 17, 2001 The server does not have enough RAM The disk driver for external drives are not be loaded To resolve problems when only some volumes mount, do the following: Add more RAM. Verify which drivers are loaded. Resolving Disk Error Problems When a Volume Is Mounting To diagnose problems when disk errors occur while a traditional volume is mounting, identify whether the following conditions exist: The server does not have enough memory to mount the volume.
-
Manual 99a 38 July 17, 2001 Each additional name space support that you add to a volume increases the size of the file allocation tables and directory entry tables. Adding name space support can cause the tables to grow so large that the server does not have enough RAM to mount the volume. To resolve memory errors when a volume mounts, perform the following actions or ensure that the following conditions exist: Check the status of the available cache buffers.
-
Manual 99a 38 July 17, 2001 A power failure has occurred and the server has not been shut down with the DOWN command. A hard disk has failed. A disk channel error has occurred. A volume does not dismount when you enter the DISMOUNT command. Directory information in cache is not completely written to disk. To resolve problems when mismatches exist in the duplicate copies of the FAT and DET, do the following: Run VREPAIR.
-
Manual 99a 38 July 17, 2001 WARNING: This is a destructive step that destroys all of the extended file information. Back up all non-DOS files. Load VREPAIR and select Set VRepair Options. Then select the Remove Name Space Support from the Volume and Write All Directory and FAT Entries to Disk options. Then exit to the main menu. Run VREPAIR > Repair a Volume on the volume that would not mount.
-
Manual 50 99a 38 Traditional File Services Administration Guide Traditional File Services Administration Guide 103-000180-001 August 30, 2001 Novell Confidential July 17, 2001
-
NetWare Server Disks and Storage Devices Administration Guide Novell NetWare 6 ® www.novell.
-
Manual 99a 38 July 17, 2001 Contents Server Disks and Storage Devices Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . Partitioning Disks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Logical Partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Device and Partition Numbering . . . . . . . . . . . . . . . . . . . . . . . . . Object Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Device Names . . . . . . . . .
-
Novell Cluster Services Overview and Installation Novell Cluster Services www.novell.com 1.
-
Manual Rev 99a 9 June 00 28 Contents Introduction to Novell Cluster Services 7 Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1 Overview Product Features . . . . Product Benefits . . . . Cluster Configuration. . Cluster Components 2 9 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
-
Manual Rev 99a Migrating Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Identifying Cluster and Resource States . . . . . . . . . . . . . . . . . . . Additional Cluster Operating Instructions . . . . . . . . . . . . . . . . . . . Installing NetWare on a Server That Will Be Added to an Existing Cluster Readding a Node to a Cluster That Was Prevously in the Cluster . . . . Cluster-enabled Volume Connection Required for Some Utilities . . . . . Some Applications Do Not Fail Over . . . .
-
Manual 99a 38 July 17, 2001 Introduction to Novell Cluster Services Novell® Cluster ServicesTM is a server clustering system that ensures high availability and manageability of critical network resources including data (volumes), applications, server licenses, and services. It is a multinode, eDirectoryTM enabled clustering product for NetWare® 6 that supports failover, failback, and migration (load balancing) of individually managed cluster resources.
-
Manual 8 99a 38 Novell Cluster Services Overview and Installation Novell Cluster Services Overview and Installation 103-000154-001 August 29, 2001 Novell Confidential July 17, 2001
-
Manual 1 99a 38 July 17, 2001 Overview Novell® Cluster ServicesTM is a server clustering system that ensures high availability and manageability of critical network resources including data (volumes), applications, server licenses, and services. It is a multinode clustering product for NetWare® that is enabled for eDirectoryTM and supports failover, failback, and migration (load balancing) of individually managed cluster resources. Licenses for two cluster nodes is included with NetWare 6.
-
Manual 99a 38 July 17, 2001 Product Benefits Novell Cluster Services allows you to configure up to 32 NetWare servers into a high-availability cluster, where resources can be dynamically switched or moved to any server in the cluster. Resources can be configured to automatically switch or be moved in the event of a server failure, or can be moved manually to troubleshoot hardware or balance the workload. Novell Cluster Services provides high availability from commodity components.
-
Manual Figure 1 99a July 17, 2001 38 Three-Server Cluster Web Server 1 Web Server 2 Web Server 3 Web Site A Web Site C Web Site E Web Site B Web Site D Web Site F Fiber Channel Switch Shared Disk System During normal cluster operation, each server is in constant communication with the other servers in the cluster and performs periodic polling of all registered resources to detect failure.
-
Manual 99a 38 July 17, 2001 Web Site A moves to Web Server 2 and Web Site B moves to Web Server 3. IP addresses and applicable licenses also move to Web Server 2 and Web Server 3. When you configured the cluster, you decided where the Web sites hosted on each Web server would go should a failure occur. In the previous example, you configured Web Site A to move to Web Server 2 and Web Site B to move to Web Server 3. This way, the workload once handled by Web Server 1 is evenly distributed.
-
Manual 99a 38 July 17, 2001 Cluster Configuration Typical cluster configurations normally include a shared disk subsystem connected to all servers in the cluster. The shared disk subsystem can be connected via high-speed fiber channel cards, cables, and switches, or be configured to use shared SCSI. If a server fails, another designated server in the cluster automatically mounts the shared disk volumes previously mounted on the failed server.
-
Manual Figure 4 99a 38 July 17, 2001 Typical Shared SCSI Cluster Configuration Network Hub Network Interface Card Server 1 SCSI Adapter Network Interface Card Sys Server 2 SCSI Adapter Sys Shared Disk System Cluster Components The following components make up a Novell Cluster Services cluster: From 2 to 32 NetWare servers configured to use IP, each containing at least one local disk device (used for a local SYS: volume).
-
Manual 2 99a July 17, 2001 38 Installation and Setup Hardware Requirements The following list specifies hardware requirements for installing Novell® Cluster ServicesTM. These requirements represent the minimum hardware configuration. Additional hardware might be necessary depending on how you intend to use Novell Cluster Services.
-
Manual 99a 38 July 17, 2001 Shared Disk System Requirements A shared disk system (Storage Area Network or SAN) is required for each cluster if you want data to be highly available. If a shared disk subsystem is used, ensure the following: At least 15 MB of free disk space on the shared disk system for creating a special cluster partition The Novell Cluster Services installation automatically allocates one cylinder on one drive of the shared disk system for the special cluster partition.
-
Manual 99a July 17, 2001 38 When working with shared storage, do not attach a noncluster server to the same shared storage device as a cluster unless you have isolated the storage so that the noncluster server has access only to its own volumes. Failure to do so will result in data corruption or volume loss.
-
Manual 99a 38 July 17, 2001 Prepare Cluster Servers for an Upgrade If you are upgrading Novell Cluster Services from a previous version and your cluster has shared storage, you must prepare your cluster servers before upgrading them to NetWare 6 and before upgrading Novell Cluster Services. This preparation is necessary to ensure existing shared-volume trustee assignments can be used after the upgrade. To prepare cluster servers for an upgrade, from a NetWare client run NWDEPLOY.
-
Manual 99a July 17, 2001 38 Run the Installation Program To install Novell Cluster Services, insert the NetWare 6 Operating System CD in a NetWare client workstation and allow the NetWare Deployment Manager to automatically launch. You can also run NWDEPLOY.EXE from the root of the CD to launch the NetWare Deployment Manager.
-
Manual 4 99a 38 July 17, 2001 Enter the name of the server you want to add to the cluster, or browse and select one from the list, and then click Add to Cluster. Repeat this step for every server you want to add to the cluster. Then click Next. You can also remove servers you just added to the cluster by selecting them from the NetWare Servers in Cluster list and clicking Remove. When you add a server to a cluster, Novell Cluster Services automatically detects the server’s IP address.
-
Manual 99a July 17, 2001 38 If you choose to not start Novell Cluster Services software on each server that you upgrade or add to your cluster, you will need to manually start it after the installation or you will need to reboot cluster servers to automatically start it. You can manually start Novell Cluster Services by running LDNCS at the server console on each cluster server.
-
Manual 99a 38 July 17, 2001 Setting Up Novell Cluster Services If you created a new cluster, you now need to create and configure cluster resources. You might also need to create shared disk partitions if they do not already exist and, if necessary, configure all shared disk system pools and volumes to work with Novell Cluster Services. You might also need to cluster enable the shared disk system pools and volumes.
-
Manual 99a July 17, 2001 38 If Cluster Services was previously installed and shared disk partitions were already created, the Partitions List field will include this information. 4 5 On the Media tab, click Partitions >New, and then select the device where you want to create the partition (the same device you selected in the previous step). Specify the size of the partition and click OK to create it. Continue with “Create NSS Pools” on page 24.
-
Manual 99a 38 July 17, 2001 Create NSS Pools The new Storage Pools feature in NSS gives you more flexibility in planning and configuring your storage to work with Novell Cluster Services. More than one cluster-enabled volume can now be part of a single cluster resource, and volumes can dynamically grow as needed to take advantage of free disk space. Only one NSS pool can be created on a partition. Storage pools must be created prior to creating and cluster-enabling volumes.
-
Manual 99a July 17, 2001 38 Create Cluster Volumes If you plan on using a shared disk system in your cluster and need to create new NetWare pools or volumes after installing Novell Cluster Services, the server used to create the volumes should already have NSS installed and running. NSS is the default file system for NetWare 6. Using ConsoleOne 1 2 In ConsoleOne, on the property page of the Server object, click the Media tab and select NSS Logical Volumes.
-
Manual 99a 38 July 17, 2001 by default. In the AUTOEXEC.NCF file of the server where the volume is to be mounted, add separate MOUNT commands followed by the volume name for each of the noncluster volumes you want to mount. Using NetWare Remote Manager The same procedure for creating shared disk partitions using NetWare Remote Manager is used to create cluster volumes. To create a cluster volume on shared storage using NetWare Remote Manager go to Step 1 on page 23.
-
Manual 99a July 17, 2001 38 Using ConsoleOne 1 2 3 4 Browse and select the Cluster object. Click File > New > Cluster > Cluster Volume. Browse and select a volume on the shared disk system to cluster enable. Enter an IP address for the volume. This is only required for the first volume to be cluster enabled in the pool. This IP address will be assigned to the pool where the volume resides.
-
Manual 99a 38 July 17, 2001 All other fields on this screen should be automatically updated. You can change or edit the information in the fields as desired. See Step 5 on page 27 and Step 6 on page 27 for more information. This is only required for the first volume to be cluster enabled in the pool. This IP address will be assigned to the pool where the volume resides. Checking the Auto-Online check box will cause the resource to automatically start once it is created.
-
Manual 99a July 17, 2001 38 To finish creating a cluster resource template, you need to configure load and unload scripts, set failover and failback modes and, if necessary, change the node assignments for the resource template. Using NetWare Remote Manager 1 2 3 4 5 On the left column under the Clustering section, click Cluster Config. At the bottom of the screen above Create New Objects, click New Cluster Resource. Enter a name for the new cluster resource template.
-
Manual 99a 38 July 17, 2001 Using NetWare Remote Manager 1 2 3 4 On the left column under the Clustering section, click Cluster Config. At the bottom of the screen under Create New Objects, click New Cluster Resource. Enter a name for the new cluster resource. If a template exists for the resource you are creating, select it from the list and then click Apply. If a template does not exist, check the Define Additional Properties check box and then click Apply.
-
Manual 99a July 17, 2001 38 Using ConsoleOne 1 2 Select the Load Script tab on the resource property page. Edit or add the necessary commands to the script to load the resource on the server. Some commands may require command line input. You can add << to a command to indicate command line input. For example, a script command might read LOAD SLPDA <
-
Manual 99a 38 July 17, 2001 Configure Unload Scripts Depending on your cluster application or resource, you can add an unload script to specify how the application or resource should terminate. An unload script is not required by all resources or applications, but it can ensure that during a failback or manual migration, a resource unloads before it loads on another node. Consult your application vendor or documentation to determine if you should add commands to unload the resource.
-
Manual 99a July 17, 2001 38 Set Start, Failover, and Failback Modes You can configure the start, failover, and failback of cluster resources to happen manually or automatically. With the resource Start Mode set to AUTO, the resource automatically starts on a server when the cluster is first brought up. If the resource Start Mode is set to MANUAL, you can manually start the resource on a server when you want, instead of having it automatically start when servers in the cluster are brought up.
-
Manual 4 99a 38 July 17, 2001 Check the Master Only check box to ensure the resource runs only on the master node in the cluster. If the master node in the cluster fails, the resource will fail over to whichever node becomes the master. 5 Click Apply to save changes. Using NetWare Remote Manager 1 2 3 4 On the left column under the Clustering section, click Cluster Config. From the list of Resources, select the desired resource. On the Resource Information screen, click Policies.
-
Manual 3 4 99a July 17, 2001 38 Click the Up- and Down-arrow buttons to change the failover order of the servers assigned to the resource or volume. Click Apply to save node assignment changes. Using NetWare Remote Manager 1 2 3 4 5 On the left column under the Clustering section, click Cluster Config. From the list of Resources, select the desired resource. On the Resource Information screen, click Nodes. Select or type in the nodes that you want assigned to this resource.
-
Manual 99a 38 July 17, 2001 Membership The Quorum Membership is the number of nodes that must be running in the cluster before resources will start to load. When you first bring up servers in your cluster, Novell Cluster Services reads the number specified in the Membership field and waits until that number of servers is up and running in the cluster before it starts loading resources.
-
Manual 99a July 17, 2001 38 Using NetWare Remote Manager 1 2 3 On the left column under the Clustering section, click Cluster Config. Select the Cluster object name. Click Protocol. Heartbeat Heartbeat specifies the amount of time between transmits for all nodes in the cluster except the master. For example, if you set this value to 1, nonmaster nodes in the cluster send a signal that they are alive to the master node every second.
-
Manual 99a 38 July 17, 2001 Cluster IP Address and Port Properties The Cluster IP address is assigned when you install Novell Cluster Services. The Cluster IP address normally does need to be changed, but can be if needed. The default cluster port number is 7023, and is automatically assigned when the cluster is created. The cluster port number does not need to be changed unless a conflict is created by another resource using the same port number.
-
Manual 4 99a July 17, 2001 38 To change the priority for a resource, select the resource in the list and then click the Increase or Decrease button to move the resource up or down in the list. This lets you change the load order of the resource relative to other cluster resources on the same node. You can also select a resource and then click the Selected button to reset the resource back to its default load order. 5 Click the Apply button to save changes made to resource priorities.
-
Manual 3 4 5 6 99a 38 July 17, 2001 On the Cluster Object property page, select the Notification tab. Check or uncheck the Enable Cluster Notification Events check box to enable or disable e-mail notification. If you enable e-mail notification, add the desired e-mail address in the field provided and click the button next to the field to add the address to the list. Repeat this process for each address you want on the notification list.
-
Manual 99a July 17, 2001 38 parser that lets you customize the message information for your specific needs. 5 Click the Apply button to save your changes. Cluster Node Properties You can view or edit the cluster node number or IP address of the selected node or view the context for the NetWare Server object. Using ConsoleOne 1 2 3 Select the Cluster object and right-click the desired cluster node on the right side of the ConsoleOne display screen. Click Properties.
-
Manual 99a 38 July 17, 2001 Migrating Resources You can migrate resources to different servers in your cluster without waiting for a failure to occur. You might want to migrate resources to lessen the load on a specific server, to free up a server so it can be brought down for scheduled maintenance, or to increase the performance of the resource or application by putting it on a faster machine.
-
Manual 99a July 17, 2001 38 Identifying Cluster and Resource States Both the Cluster State view in ConsoleOne and the Cluster Management link in NetWare Remote Manager give you important information about the status of servers and resources in your cluster. Cluster servers and resources display in different colors, depending on their operating state. When servers and resources are green, they are in a normal operating condition.
-
Manual 44 99a 38 July 17, 2001 Resource State Description Possible Actions Alert Either the Start, Failover, or Failback mode for the resource has been set to Manual. The resource is waiting to start, fail over, or fail back on the specified server. Click the Alert status indicator and depending on the resource state, you will be prompted to Start, Failover, or Failback the resource. Comatose The resource is not running properly and requires administrator intervention.
-
Manual 99a July 17, 2001 38 Resource State Description Possible Actions Running The resource is in a normal running state. Click the Running status indicator and choose to either migrate the resource to a different server in your cluster, or unload (offline) the resource. Unassigned There isn’t an assigned node up that the resource can be loaded on. Click the Unassigned status indicator and if desired, Offline the resource.
-
Manual 99a 38 July 17, 2001 Readding a Node to a Cluster That Was Prevously in the Cluster 1 If necessary, install NetWare, including the latest service pack on the server using the same node name and IP address. 2 If the Cluster object for the server is still present, use ConsoleOne to delete the object. You can do this by going to the Cluster container, selecting the node in the right frame, and pressing Delete. 3 Run the Novell Cluster Services installation.
-
Manual 99a July 17, 2001 38 Cluster Console Command Description ALERT {resource}{YES/NO} The resource start, failover, or failback mode is set to manual and the resource is waiting to start on a node, or fail over or fail back to another node. Specify the resource name in the command and use the YES or NO switch to specify whether or not you want the resource to fail over, fail back, or start.
-
Manual 48 99a 38 July 17, 2001 Cluster Console Command Description OFFLINE {resource} Unloads the specified resource from the node where it is currently running. ONLINE {resource}{node name} Starts the specified resource on the most preferred node that is currently active. You can start the resource on a different node by specifying that node in the command. POOLS Lists the NSS pools on the shared disk system that are accessible by Novell Cluster Services.
-
Manual 6 99a 38 July 17, 2001 NetWare Server Disks and Storage Devices Administration Guide NetWare Server Disks and Storage Devices Administration Guide 103-000179-001 August 30, 2001 Novell Confidential
-
Manual 99a 38 July 17, 2001 Server Disks and Storage Devices With NetWare®, you can create up to four NetWare (or other) partitions on one hard disk. The primary storage and file system for NetWare is Novell® Storage ServicesTM (NSS). For information about the NSS file system, see Introducing Novell Storage Services in the Novell Storage Services Administration Guide. After you create partitions on your storage devices, you can create volumes where you place your data files.
-
Manual 8 99a 38 July 17, 2001 NetWare Server Disks and Storage Devices Administration Guide NetWare Server Disks and Storage Devices Administration Guide 103-000179-001 August 30, 2001 Novell Confidential
-
Manual 1 99a 38 July 17, 2001 Overview of Server Disks and Storage Devices Server hard disks and remote storage devices (such as tape drives and CDROM drives) are all managed by the NetWare® operating system. Hard disks are divided into partitions, including one DOS partition and at least one NetWare partition per server. A hard disk can also contain other partitions, such as a UNIX* partition.
-
Manual 99a 38 July 17, 2001 Partitioning Disks You can divide a NetWare server hard disk into units called disk partitions. You can also leave free (unassigned) space on a disk. NOTE: A NetWare disk partition is not related to an NDS® partition. One of the server's hard disks must contain a DOS partition. This is the primary boot partition where server.exe is stored. You need only one boot partition per server. You also need to keep a SYS: volume.
-
Manual Figure 2 99a 38 July 17, 2001 DOS Partition on First Disk, NetWare and Non-NetWare Partitions on Second Disk Disk 1 Disk 2 SYS: Volume (1 disk segment) Data1: Volume (1 disk segment) DOS Partition (Entire Disk) NetWare Partition Data2: Volume (1 disk segment) Hot Fix Redirection Area UNIX Figure 3 Non-NetWare Partition Disk with One NetWare Partition and Free Space Assigned to NSS Disk Free Space NSS File System NetWare Partition DOS Partition Logical Partitions Server hard disks can
-
Manual 99a 38 July 17, 2001 If you do not use Hot Fix and mirroring, the entire physical partition is the logical partition. Figure 4 Logical and Physical Partitions on a Server Disk Disk NetWare Logical Partition Hot Fix Redirection Area NetWare Physical Partition DOS Partition The logical partition contains four redundant copies of the volume definition table (VDT). Each table contains a list of all volume segments in that partition.
-
Manual 99a 38 July 17, 2001 Object Numbers Object numbers are hexadecimal numbers assigned to devices, adapters, media, partitions, and divisions of a partition (such as the Hot Fix redirection area). If you mirror partitions, each logical partition in the mirrored set has the same object number as the other partitions in the set. Object numbers are not sequential or persistent. New numbers can be assigned when the server is restarted.
-
Manual 99a 38 July 17, 2001 Partition examples The following are example partition entries with the device information: Unpartitioned - D:0x1-1 Unpartitioned indicates that the device is unpartitioned. D:0x is the device number. -1 is the chunk number. (A unique number that this is the first unpartitioned segment on device 1.) NSS-P:0x15-1 NSS-P:0x15-1 indicates that this is an unassigned NSS partition. P:0x15 is the partition ID.
-
Manual 99a 38 July 17, 2001 To see a list of storage devices and their names, execute the LIST STORAGE ADAPTERS command at the server console prompt. The screen lists each device adapter, followed by a list of devices driven by that adapter. In the following example, the first line identifies an IDE disk adapter.
-
Manual 99a 38 July 17, 2001 Drivers for Host Adapters and Storage Devices All storage devices require drivers. The NetWare Peripheral Architecture (NWPA) divides device drivers into two kinds: a custom device module (CDM) that drives the device itself and a host adapter module (HAM) that drives the adapter has been attached to. The following are two types of drivers: Custom Device Module (CDM) CDMs drive storage devices, including autochangers, that are attached to the host adapter bus.
-
Manual 99a 38 July 17, 2001 In the following illustration, several smaller disks are mirrored to partitions on one larger disk. Disk 4 Disk 3 Mirrored to partition 3 Disk 2 Mirrored to partition 2 NetWare Partition 2 Disk 1 Mirrored to partition 1 NetWare Partition 1 Disk 0 Mirrored to partition 0 NetWare Partition 3 NetWare Partition 0 To mirror partitions you must enable Hot Fix. For information about Hot Fix, see “Redirecting Bad Blocks” on page 18.
-
Manual 99a 38 July 17, 2001 ranges in order to make the data area identical to the other partitions in the group.) Mirrored partitions must have the same sharable status. Partitions you add to a mirror group cannot be part of any other mirror group. They must be standalone Mirror objects. The partitions you add must include the Mirror and Hot Fix options. You select these options when you create the partition; you cannot add the options later.
-
Manual 99a July 17, 2001 38 Read redirection occurs following a disk error during a read request. If the disk is mirrored, the system retrieves the data from the mirrored disk and redirects the data on the primary disk. If the disk isn't mirrored, the data is lost, and the block is marked as bad. Read-after-write-verify redirection occurs after data is written to disk. The data on disk is then read and compared to that in memory.
-
Manual 99a 38 July 17, 2001 However, if Hot Fix is not enabled, the partition will not have the fault tolerance. Data on corrupted sectors of the disk will not be redirected to the Hot Fix Redirection Area. For instructions on how to specify no Hot Fix redirection area, see Creating a Partition in the Novell Storage Services Administration Guide.
-
Manual 2 99a 38 July 17, 2001 Optimizing the File System Performance NetWare® provides several methods for improving the performance of your file system. For a list of general guidelines for conserving disk space and improving disk performance, see “Optimizing Storage Disk Capacity” on page 21. To improve disk reads and writes, see “Improving Disk Reads” on page 24 and “Improving Disk Writes” on page 26.
-
Manual 99a 38 July 17, 2001 is created. If block suballocation has been disabled, enable it in ConsoleOneTM when you create a partition. For information about enabling block suballocation, see Creating a Partition in the Novell Storage Services Administration Guide. Once block suballocation is enabled, you cannot disable the feature without recreating the volume. If you use block suballocation, set your file block size to 64 KB.
-
Manual 99a 38 July 17, 2001 prevent large volumes from mounting. As soon as possible, upgrade the system to a newer board that can access higher memory. For instructions on using the SETcommand, see SET in Utilities Reference. For instructions on using MONITOR, see MONITOR in Utilities Reference. Use a driver that supports scatter gather functionality. Provide at least one device large enough to hold a core dump of the server's memory. A core dump cannot span devices.
-
Manual 99a 38 July 17, 2001 CD-ROM drives can create large index files. Don't use or mount the CD-ROM unless you have enough space. Limit the size of auditing files. (Auditing works only on traditional NetWare partitions.) Improving Disk Reads On a server that is read-intensive, the following procedures can improve the speed of disk reads. “Changing Concurrent Disk and Directory Writes for Faster Reads” on page 24.
-
Manual 99a 38 July 17, 2001 5 Increase the value of Directory Cache Buffer Non Referenced Delay. This parameter specifies how long a directory entry must be cached before it can be overwritten. Increasing this value causes the system to allocate more directory cache buffers and thus speeds up directory access. If the parameter is currently set to the default value of 5.5 seconds, try setting the value to 60 seconds. 6 Press Esc until you return to Available Options.
-
Manual 99a 38 July 17, 2001 Improving Disk Writes For a write-intensive server, the following procedures can improve the speed of disk writes. “Increasing the Number of Concurrent Writes” on page 26. “Changing Disk and Directory Caching for Faster Writes” on page 27. “Turning Off Read-After-Write Verification” on page 28.
-
Manual 99a 38 July 17, 2001 Changing Disk and Directory Caching for Faster Writes Use this procedure if network users frequently make many small write requests and the server is slow to respond to the requests. 1 From the MONITOR Available Options, select Server Parameters > File Caching. For instructions on using MONITOR, see MONITOR in Utilities Reference. NOTE: You can also set file caching parameters with the SET command in MONITOR. 2 Increase the value of Dirty Disk Cache Delay Time.
-
Manual 99a 38 July 17, 2001 NOTE: Increasing the number of concurrent directory cache writes decreases the speed of directory cache reads. Balance the speed of writes and reads to meet the needs or your users. If the parameter is currently at the default value of 10, try increasing the value to 25. The changed value is now persistent. 6 Press Esc until you return to Available Options. Turning Off Read-After-Write Verification Read-After-Write Verify is almost always provided by the hard disk.
-
Manual 3 99a 38 July 17, 2001 File System Management It is important to monitor disk space regularly and keep a log to track disk usage over time. For instructions on checking disk space, see Viewing Storage Objects in the Novell Storage Services Administration Guide. Adding a hard disk to the server requires both installing and partitioning the disk, as well as loading disk drivers.
-
Manual 99a 38 July 17, 2001 View a List of Adapters and Devices To see a list of server hardware devices, type the following at the server console prompt: LIST DEVICES To see a list of storage adapters and the devices they drive, at the server console prompt enter: LIST STORAGE ADAPTERS The screen lists each adapter, followed by a list of devices driven by that adapter.
-
Manual 99a 38 July 17, 2001 3 Scroll to Disk Space and note the available disk space for the volume and record it in a log. 4 Press Tab to return to the list of Mounted Volumes. Check additional volumes as necessary. 5 Press Esc until you return to Available Options. 6 Repeat this procedure weekly for each volume. Checking for Disk Errors MONITOR indicates how many data blocks have been redirected by Hot FixTM because of bad sectors on the disk.
-
Manual 99a 38 July 17, 2001 System Hot Fix Blocks: The number of blocks in the Hot Fix redirection area set aside for Hot Fix and Mirroring tables. These blocks are used to manage both Hot Fix and mirroring. The number of available Hot Fix blocks equals the total number of Hot Fix blocks, minus the used and system Hot Fix blocks. 4 Note the number of used Hot Fix blocks and compare it to the total number of blocks and the number of available blocks.
-
Manual 99a 38 July 17, 2001 Procedure Use the following procedure to install an additional hard disk in a functioning NetWare server. 1 Follow the instructions that came with your hard disk to install the disk and associated hardware, such as a disk adapter and cable. If necessary, configure the computer to recognize the new disk Refer to the documentation that came with the computer for more information about configuration methods and requirements. 2 Start the server.
-
Manual 99a 38 July 17, 2001 4 Select a volume that is on the disk you are replacing, click Dismount. Repeat this step for all volumes on the disk. 5 Click Media > Partitions. 6 Select a partition that is on the disk you are replacing, click Mirror. 7 Select a partition, click Remove. This removes the partition from the mirror group. Repeat steps 6 and 7 for each partition that is on the disk you are replacing. 8 Remove the hard disk and install the replacement.
-
Manual 99a 38 July 17, 2001 IMPORTANT: Some drivers do not have a description file (a configuration file that's appended to the driver). These drivers have to be loaded manually at the system console. To load these drivers, follow the screen prompts or press F1 for help. For general information about .cdm and .ham modules, see “Drivers for Host Adapters and Storage Devices” on page 16.
-
Manual 99a 38 July 17, 2001 If you have partitions from previous versions of NetWare that you are no longer using, you can delete them and create a new NetWare partition. (See “Deleting NetWare Partitions” on page 36 for more information.) WARNING: When creating a disk partition, never specify a partition size larger than the actual size of the disk. If you specify a larger size, NetWare will eventually try to use the excess disk space.
-
Manual 99a 38 July 17, 2001 child to the object above it. In ascending order, parent objects appear immediately above the highlighted object. 2 Select the appropriate hard disk from the list. The Drive Status window appears. The Operating Status field indicates whether the device is activated or deactivated. 3 Press Enter to access the Operating Status options. 4 To change the operating status of the disk, highlight either Activate or Deactivate and press Enter.
-
Manual 99a 38 July 17, 2001 1 From ConsoleOne, open the tree you want. 2 Right-click on the server object and select Properties. 3 Click Media > Partitions. 4 Select a Partition that contains the data you want to recover, click Mirror > Resync. This initiates the resynchronization process for the mirror group that contains the partition you selected. Managing Removable Media Devices Mounting a Removable Media Device Use this procedure to mount a removable media device, such as a CD-ROM drive.
-
Manual 99a 38 July 17, 2001 4 Select Mount Drive. 5 Press Esc until you return to Available Options. Dismounting a Removable Media Device Use this procedure to dismount a removable media device, such as a CD-ROM device. 1 From the MONITOR Available Options, select Storage Devices. For instructions on using MONITOR, see MONITOR in Utilities Reference. A list of Registered Storage Objects appears. The device information associated with a highlighted storage device appears in the upper window.
-
Manual 99a 38 July 17, 2001 A list of Registered Storage Objects appears. The device information associated with a highlighted storage device appears in the upper window. Check the Device Type field to verify the type of storage device. NOTE: Storage devices are listed in hierarchical order to reflect each object's dependencies. In descending order, each object is indented to indicate that it is a child to the object above it.
-
Storage Management Services Administration Guide Novell NetWare 6 ® www.novell.
-
Manual 99a July 17, 2001 38 Contents Preface 7 Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1 Overview 9 Backup Services . . . . . . . . . . . . . . . SMS Components . . . . . . . . . . . . Supported Storage Devices and Drivers . Storage Management Engine (SME) . . . Storage Management Data Requester . . Memory Requirements . . . . . . . . . . Backup Files . . . . . . . . . . . . . . . Backup Types . . . . . . . . . . . . . .
-
Manual 99a Loading SBCON . . . . . . . . . . . . . . . . . . . . . Prerequisites . . . . . . . . . . . . . . . . . . . . . Unloading SBCON . . . . . . . . . . . . . . . . . . . Loading NWBACK32 . . . . . . . . . . . . . . . . . . Exiting NWBACK32 . . . . . . . . . . . . . . . . . . . Backing Up Data . . . . . . . . . . . . . . . . . . . . Prerequisites . . . . . . . . . . . . . . . . . . . . . Backing Up from the Server . . . . . . . . . . . . . Backing Up from a Workstation . . . . . . . . . . .
-
Manual 99a 38 July 17, 2001 Preface Novell® Storage Management ServicesTM (SMSTM) is a collection of software programs that provides backup and restore services. These services are performed by a collection of components that are independent of operating systems and hardware. You can backup SMS Targets such as Novell eDirectoryTM, binderies, the file system, cluster-enabled pools or an individual workstation's hard disk onto a media that can be stored off-site.
-
Manual 8 99a 38 Storage Management Services Administration Guide Storage Management Services Administration Guide 103-000134-001 August 29, 2001 Novell Confidential July 17, 2001
-
Manual 1 99a 38 July 17, 2001 Overview Backup services is an essential piece of the Novell® Storage Management ServicesTM (SMSTM) software, a collection of services that provides backup, restore, and data migration. These services are performed by various components and are independent of operating systems and hardware.
-
Manual 99a 38 July 17, 2001 The following topics are discussed in this section: “SMS Components” on page 10 “Backup Types” on page 16 “Customizing Your Backup” on page 16 “Keeping a Backup Logbook” on page 21 “Preparing to Back Up” on page 22 “Backups and eDirectory” on page 23 “Backups and the File System” on page 27 “Backups and Clusters” on page 29 “Session Files” on page 37 SMS Components Storage Management Engine (SME) for backup and restore operations.
-
Manual 99a 38 July 17, 2001 keeps the names of these workstations in an internal list and displays the list, allowing you to select a target for a backup or restore procedure. The SBCON process involves two machines: The host server is typically the NetWare server running the backup program. The SMS components will include the backup engine, the SMDR, the Storage Device Driver, the tape device, and the required Target Service Agents.
-
Manual 99a 38 July 17, 2001 Supported Storage Devices and Drivers SBCON supports 0.25-inch, 4mm, and 8mm storage devices. If you are using 4mm tape, use only DDS (Digital Data Storage)-certified, computer-grade tapes. IMPORTANT: To ensure reliable operations, pretest all media storage devices that are not Novell certified with the appropriate NetWare device driver and SBCON backup and restore utility. Use the driver files recommended by your hardware manufacturer.
-
Manual 99a 38 July 17, 2001 Storage Management Data Requester The Storage Management Data Requester (SMDR) is the communication module in the SMS architecture. It provides transparent access to SMS services in an intranet as it allows access to local or remote SMS services. The SMDR APIs are used by SBCON and other third-party applications as well. SMDR uses TCP Port Number 413. Features of SMDR The features of the SMDR 6.00 include the following: Protocol Independence: SMDR 6.
-
Manual 99a 38 July 17, 2001 represents an instance of a predefined group class in the eDirectory schema. Any number of such groups can exist in eDirectory. The SMDR can become a member of one or more groups by registering its object's (SMS RPC object) context. When SMDR requires name resolution, it searches all members of the SMDR Group at SMDR Group Context. The SMDR Group Context and SMDR Group are specified in the SMDR.CFG file.
-
Manual 99a 38 July 17, 2001 If NetWare Common Install is used to install SMS (see “Customizing the NetWare Server as the Backup Server” on page 43 for more information), this problem will not occur. If the SMDR is explicitly loaded for the first time, the screen for configuration information will not be hidden.
-
Manual 99a 38 July 17, 2001 Backup Types SBCON has three types of backup sessions: Full backup—Backs up the entire file system of the selected target regardless of whether the data has changed since the last backup, and clears the Modify bit after the backup. Differential backup—Available only for the file system; backs up only data that has been changed since the last full or incremental backup. When you perform a differential backup, the modify bit is not cleared after the backup.
-
Manual 99a July 17, 2001 38 Exclude and Include Options Whenever you perform a custom backup or restore, you can use the exclude and include options to select subsets of what you want to back up. Whether you use exclude or include usually depends on the size of the data you want to back up, compared to the size of the data you do not want to back up.
-
Manual 99a 38 July 17, 2001 The same principle applies when you specify a directory with the include option. The figure below shows that all directories, subdirectories, and files under the NetUsers directory are included in the backup. All other areas of the file system structure are excluded from the backup. SYS HOME Public Mail System Login NetUsers Project A2ZCO Widget.exe Report January.prj February.prj March.prj Proposal Tessier.
-
Manual SYS HOME 99a Public Mail System Login NetUsers Appl July 17, 2001 38 Project A2ZCO Widget.exe Report January.prj February.prj March.prj Proposal Tessier.Inc Nu_Artco Karl Mary Directories Subdirectories Files Thomas Directories Subdirectories Files Scan Data Sets You can specify a different type of data set to be scanned. A data set is a group of data that can be manipulated by SBCON.
-
Manual SYS HOME 99a Public Mail System Login NetUsers Appl July 17, 2001 38 Project A2ZCO Widget.exe Report January.prj February.prj March.prj Proposal Tessier.Inc Nu_Artco Training Workbook Viewgraph Script Schedules June July August Karl Mary Thomas Manuals Widget.Co chapt.1 chapt.2 chapt.3 chapt.4 appx.A appx.B glossary index Acme.
-
Manual 99a 38 July 17, 2001 Keeping a Backup Logbook Keep a hard copy log of your backups in case your online log and error files become corrupted.
-
Manual 99a 38 July 17, 2001 Preparing to Back Up Careful planning can help you minimize the impact of data loss. Before you back up, consider the following: What should be backed up Where to back up Backup type Who should back up When to back up How to prepare for a backup How to track backup Open Files Backup TSA600.NLM supports backup of open files on Novell Storage Services (NSS) volumes if the CopyOnWrite feature is enabled.
-
Manual 99a 38 July 17, 2001 Determining an Appropriate Backup Type Each type of backup has a different effect on the backup and restore process. When planning your backup schedule, consider all of the following variables before determining which schedule is right for you. Media usage and backup speed. This helps increase the speed of the restore. Restoring after incremental backups.
-
Manual 99a 38 July 17, 2001 Distributed Database The network of servers that comprise an eDirectory tree structure continually exchange updates and other time-sensitive information. The eDirectory database exists as a set of files that are stored in the SYS: volume and are hidden so they are not accidentally tampered with or deleted. The eDirectory database files cannot be backed up, as was the case with bindery files in NetWare 3.12 or earlier versions.
-
Manual 99a 38 July 17, 2001 Placeholder (Unknown) Objects Whenever insufficient information is known about an object, such as when one of its mandatory attributes is missing, eDirectory creates as a placeholder an Unknown object. During a restore session of the eDirectory database information, Unknown objects are created when restoring an object that has an access control list (ACL) or any other attribute that refers to other objects that do not currently exist in the eDirectory tree structure.
-
Manual 99a 38 July 17, 2001 traffic during the backup process and improves performance when the backup program performs name resolution across the eDirectory tree structure. The version of TSANDS.NLM that ships with NetWare allows selective backup and restoration of an eDirectory tree structure. HINT: Not all third-party backup applications support this selective backup and restoration. Check with the application vendor for details on product features.
-
Manual 99a 38 July 17, 2001 eDirectory backup to back up the portions of the tree for which they have rights. The network administrator assigns the Supervisor right to the backup administrators for the section of the eDirectory tree structure that they are responsible to back up. The network administrator then needs to create a TSANDS.CFG file that lists the fully distinguished names of the containers where each of the backup administrators' rights begin. The TSANDS.
-
Manual 99a 38 July 17, 2001 Trustee Assignments Trustee assignments are stored as part of the file system as an ID. They are backed up by default when the file system is backed up with the SMS TSA software. If a User object is deleted and then re-created or restored, its object ID changes. This is why the SMS TSA module uses fully distinguished names for objects to back up the trustee rights from the file system.
-
Manual 99a 38 July 17, 2001 Backups and Clusters Novell Cluster ServicesTM allows you to configure up to 32 NetWare servers into high-availability cluster, where resources can be dynamically switched or moved to any server in the cluster. Consolidation of applications and operations on a cluster has benefits such as lower costs, scalability, and increased availability. See the Novell Cluster Services documentation (http:// www.novell.com/documentation) for more information.
-
Manual 99a 38 July 17, 2001 If a cluster server is chosen as the target, only noncluster volumes will be backed up. You have to back up each pool individually. You might abort an ongoing backup job with the intention of resubmitting the same job later. In such situations, the job will not restart from where it was terminated; it will restart from the beginning. For more information, see “Backing Up Cluster-enabled Pools from the Server” on page 56.
-
Manual 99a 38 July 17, 2001 The TSA packages data from the target and presents it to the SME in a generic format. This allows one SME to interact with many types of TSAs. NetWare 6 provides TSA600.
-
Manual 99a 38 July 17, 2001 How SMS Restores Data During a restore session, SBCON reads the backup storage media, and the Target Service Agent (TSA) compares the media data set to the existing hard disk data set.
-
Manual BEGIN 99a July 17, 2001 38 END Go to backup session on storage media. no Is there another data set to read? yes Read data set. Overwrite data set? Is the data set to be renamed yes only if newer no yes no ignore Rename the dataset Is data set a subset of what you´re restoring? restore Compare date of data set on media to date of data set on disk.
-
Manual 99a 38 July 17, 2001 Restore Options For a custom restore session, you can specify exactly which data to restore. Several options work together to allow you maximum flexibility in your restore session.
-
Manual 99a 38 July 17, 2001 Restoring eDirectory and the File System The only way to ensure that your eDirectory database can be fully restored is through partition replication, with replicas of the entire database on multiple servers. On a single-server network, you need to rely more heavily on backing up the data because you do not have replicas to restore information.
-
Manual 99a 38 July 17, 2001 stored on volume SYS:, losing SYS: is equivalent to removing NetWare and eDirectory from the file server. You must reinstall NetWare and eDirectory before you restore your data. The procedures for this scenario are divided into two cases: Loss of the only server in a single-server network. Loss of a single server in a multiple-server network. Single-Server Network In a single-server network, server failure brings all network operations to a halt.
-
Manual 99a 38 July 17, 2001 5. Restore the file system. (See “Restoring Data” on page 62 and “Custom File System Restore” on page 74.) 6. Restore any replicas that were removed from the server. Loss of the Entire eDirectory Tree If all servers on a network are destroyed because of a disaster, you must perform a complete restore of NetWare, eDirectory, and file system data.
-
Manual 99a 38 July 17, 2001 Log and Error Files The files of the backup session are stored in a default directory (such as SYS:SYSTEM\TSA\LOG). If you prefer, you can create your own directory for the log and error files as long as it resides on the host server. The files of the restore session are stored in the directory (SYS:SYSTEM\TSA\RESTORE). You cannot modify the location for the files.
-
Manual 99a 38 July 17, 2001 Error File The error file is created on the host server the first time a particular set of data is backed up. It contains a list of any errors that occurred during a backup or restore session. This file contains the following: The session date and time and the description you entered. The target from which the data was backed up for a backup session. The target that was backed up and the location on the server where the data was restored to during a restore session.
-
Manual 40 99a 38 Storage Management Services Administration Guide Storage Management Services Administration Guide 103-000134-001 August 29, 2001 Novell Confidential July 17, 2001
-
Manual 2 99a 38 July 17, 2001 Setting Up In addition to being able to back up data from a server with SBCON, you can use a Windows 95, 98, 2000 or Windows NT workstation to perform your backups using the graphical interface. This chapter discusses the following: How to customize the NetWare server as the backup server. See “Customizing the NetWare Server as the Backup Server” on page 43. How to load the backup software.
-
Manual 99a 38 July 17, 2001 SBCON Guidelines Before you set up and begin backups, follow these guidelines to make backups easier and to avoid problems later. Log in. You will have limited success backing up and restoring if you log in without the Supervisor right. For security reasons, many SBCON options are limited to the network administrator. Reserve disk space for temporary files.
-
Manual 99a 38 July 17, 2001 Before Loading the Backup Software Before you load the backup software on the server or on a Windows machine, you need to configure a server to execute your backups. Determine the following: The tree to which the server belongs which must be made the current tree The full eDirectoryTM context of the server Before Running the Backup Software Before backing up software, in general you must: Load the controller and storage device drivers on the server.
-
Manual 99a 38 July 17, 2001 The SMDR Group object is where all NetWare and workstation SMDRs are registered for name resolution purposes. 6 Accept the default name of the Backup Queue where all backup jobs will be submitted, or enter a new name and context. Loading Controller and Storage Device Drivers on the Server Controller and device drivers control the mechanical operation, such as read, write, forward, back, and stop of various storage devices and media.
-
Manual 99a July 17, 2001 38 Loading the Target Service Agents Target Service Agents are loaded on servers and workstations. If you want to back up a server, load the TSA on the server. Ensure that the controllers and device drivers are loaded.
-
Manual 99a 38 July 17, 2001 Loading the files when the server starts. Place the commands in the server's STARTUP.NCF, and in the workstation's NET.CFG file, AUTOEXEC.BAT file (for DOS), or Startup folder (for OS/2). Loading SBCON You can load SBCON from the server command line. If you use NWBACK32 on a client, you do not need to load SBCON. 1 At the server console, enter SMSSTART TSA600.NLM, TSAPROXY.NLM, and SMDR.NLM modules are loaded with default configuration values. SBSC.NLM, QMAN.NLM, SMSDI.
-
Manual 99a 38 July 17, 2001 Unloading SBCON To ensure maximum memory utilization and throughput, you should unload backup software and other Storage Management ServicesTM (SMSTM) modules when you are finished performing your backup. That way, more memory will become available on your host or target. 1 Exit SBCON from the Main Menu. Press Esc until you reach the SBCON Main Menu; then press Esc again and confirm the prompt.
-
Manual 99a 38 July 17, 2001 3 Run NWBACK32.EXE from SYS:PUBLIC. The following screen appears. You are now ready to back up data. Go to “Backing Up Data” on page 49 to continue. Exiting NWBACK32 1 Exit NWBACK32 from the Quick Access window. 2 Unload all the modules loaded on the server by entering the following command at the server console: SMSSTOP Unloads all the previously loaded SMS modules.
-
Manual 99a 38 July 17, 2001 Backing Up Data You can use SBCON to create a tape backup of the eDirectory database or of the file system on your servers or workstations. The prerequisites listed here use SBCON as the Storage Management Engine (SME). Prerequisites Understand the process for loading SBCON. See “Loading SBCON” on page 46 Ensure that you know the workstation password if you are backing up a workstation.
-
Manual 99a 38 July 17, 2001 Ensure that media is inserted into your storage device. You can back up your data two ways: from a server using SBCON or from a Windows workstation using NWBACK32. Backing Up from the Server When you back up your data from one server to a target server or workstation, you should use the command line. 1 Load the SBCON modules. See “Loading SBCON” on page 46. 2 Click Main Menu > Job Administration > Backup.
-
Manual 99a 38 July 17, 2001 4 Select a target from the Target Services list. The following table describes the targets that can be selected for backup.
-
Manual 99a 38 July 17, 2001 This is a descriptive name of the job, which will help you identify the specific backup session; if a restore is necessary, you can easily identify the session you need. There is no special requirement for what to enter as the session description. HINT: You might want to include the full path of the data (for example, SYS:HOME\REPORTS\JULY.02) which you will need to know if a restore session is necessary. 10 Click Device/Media Name and select a device.
-
Manual 99a 38 July 17, 2001 14 To return to the Main Menu, press Esc until you back out to the Main Menu. 15 To exit SBCON, press Esc again and answer the confirmation prompt. Customizing Backup You can customize your backup using the Advanced Backup Options form when you use SBCON at the server to launch your backup program. This form allows you to specify exactly what you want to back up data. It could be the server, the eDirectory database, workstation, directory, or file.
-
Manual 99a 38 July 17, 2001 3 Select Subsets of What To Backup. The default setting means that everything in the Subsets of What You Want to Backup screen is backed up. Include/Exclude TSA Resources—Includes or excludes resources such as servers or volumes. Include/Exclude Directories—Includes or excludes directories. Include/Exclude Files—Includes or excludes files. Include/Exclude path/files—Includes or excludes pathnames and files. 4 Select Scan Options.
-
Manual 99a 38 July 17, 2001 The day, month, or year you enter should not be the actual date when you want the job to run; rather, it is the duration after which the job gets executed.
-
Manual 99a 38 July 17, 2001 4 Select where you want your backup data to go. 4a Double-click Where to Backup. 4b Change to the correct eDirectory tree structure and context by clicking the Change to Context button on the toolbar. 4c Double-click Queues. 4d Select a Queue object from the list. 4e Right-click the server to open the drop down box. 4f Click Submit the Job. This step allows you to submit the job to a queue on the chosen server or on the chosen media type. Queue.
-
Manual 99a 38 July 17, 2001 5 When prompted, enter the username (and context, if required) for the target. If SBCON rejects the username you entered, you probably need to include the context where the User object is located. For example, instead of entering ADMIN as the username, enter .CN=ADMIN.O=company_name or .ADMIN.company_name.
-
Manual 99a 38 July 17, 2001 If the storage media does not have a label, SBCON displays a message saying that the media cannot be identified. Set the label before selecting it for a backup job. 11 Select Advanced Options and set the desired values for all the fields. For more details, see “Customizing Backup” on page 53. NOTE: If you set Enable Auto Recovery to NO in Cluster Options, the remaining options become invalid. 12 Select Append Session.
-
Manual 99a 38 July 17, 2001 Backing Up a Workstation To back up the workstation (the target), a Target Service Agent (TSA) must be loaded on the workstation. (See “Loading the Target Service Agents” on page 45.) You can select the directories to back up or back up the entire workstation. Windows 95 and 98 Workstation Make sure that the W95TSA is installed and configured. It is a part of the Novell Client modules (checkbox for Target Service Agent).
-
Manual 99a 38 July 17, 2001 Windows 2000 and Windows NT Workstation Make sure that the NT TSA is installed and configured. It is a part of the Novell Client modules (checkbox for Novell Target Service Agent). The Windows NT TSA has two parts: TSA Service (TSAMAIN.EXE) is a service that waits for and acts when there is a request from the backup engine. TSAPrefs (TSAPREFS.EXE) allows an NT administrator to set preferences and monitor the activities of the TSA Service.
-
Manual 99a 38 July 17, 2001 Changing Your Target Any time you are performing a series of backup or restore sessions, you might need to change your target. This can be easily done from the SBCON Main Menu either at the command line or from the Windows workstation using NWBACK32. If you do not specify a new target, SBCON automatically selects the target used during the last session and continues without asking you to make a selection.
-
Manual 99a 38 July 17, 2001 Restoring Data Use SBCON to restore information from tape backup. These procedures use SBCON as the Storage Management Engine (SME). Know the username and password for the target server or workstation to which you want to restore data. Know the session description that you want to restore. You can get this information from your session log and error files. (See “Session Files” on page 37.
-
Manual 99a 38 July 17, 2001 3 Load SBCON. See “Loading SBCON” on page 46. 4 Select Main Menu > Job Administration > Restore. The Restore Options screen appears. 5 Select Target Service and then the NetWare server running your backup and restore Target Services Agent. This is the name of the server or workstation on which you want to restore your data. Before selecting it, you must load the correct TSA. See “Loading the Target Service Agents” on page 45.
-
Manual 99a 38 July 17, 2001 Target Service to Restore Dataset to Select Workstation The workstation's host server and then the workstation Server-specific information The server whose server-specific information you want to restore and then the file system to restore 6 When prompted for the target username, enter your username (and context if required) as the network administrator for the target.
-
Manual 99a 38 July 17, 2001 volume without compression, the file is corrupted and no error message is displayed. 11 Specify the path to the session log file of the session you want to restore. Use one or more of the following methods: Press Enter to accept the default; then go to Step 12 on page 65. Press Insert to select from a list of directories, press Esc to return to the previous window, and then go to Step 12 on page 65.
-
Manual 99a 38 July 17, 2001 The Esc key allows you to exit SBCON one screen at a time until you reach the Main Menu. If you want to exit SBCON, answer the confirmation prompt. NOTE: To unload SBCON and applicable Target Service Agents, see “Unloading SBCON” on page 47. Customizing Restore Using the Advanced Restore Options form at the server, you can perform a custom restore of the database you need. 1 Select Main Menu > Job Administration > Restore. The Restore Options screen appears.
-
Manual 99a 38 July 17, 2001 The screen lists major and minor resources. Default indicates that none of that type of subset has been specified. 6 To specify a subset, do the following: 6a Select any item on the screen. 6b Edit the Include or Exclude screens using Insert and Enter. 6c Press Esc to save changes. 6d To view a list of values associated with major TSA resources (for example, server or volumes) select either the include or exclude line. The Selection List Options form appears.
-
Manual 99a 38 July 17, 2001 Restoring Data from a Workstation When you restore data, you are copying your backed up data to a server or workstation. 1 Run NWBACK32. See “Loading NWBACK32” on page 47. You can run the NWBACK32 program (NWBACK32.EXE) from SYS:PUBLIC. 2 At the Quick Access window, click Restore. 3 Click What you Want to Restore. 3a Double-click What to Restore. 3b Select the context. 3c Double-click Queues and select the queue. 3d Double-click Servers and select a server.
-
Manual 99a 38 July 17, 2001 Restoring eDirectory The procedures in the following sections are performed at the beginning of the restore process.
-
Manual 99a 38 July 17, 2001 Make sure disk partitions are at least as large as they were before, and that the volumes are defined as before. 3 Restore eDirectory using “Customizing Restore” on page 66. Restoring Volume SYS: in a Multiple-Server Network To restore SYS: volumes on several servers, do the following. 1 Restore the server-specific eDirectory information file (SERVDATA.
-
Manual 99a 38 July 17, 2001 4e Select Remove This Server from the Replica Ring. 4f Enter the supervisor name and password. 4g Select Yes to continue. 5 Exit DSREPAIR. 6 Reinstall NetWare. 6a Begin the installation. 6b When prompted for DS install, select Create a New DS Tree and complete the installation. 6c Load NWConfig and remove DS. 6d Install DS, when prompted for DS install and select Install into an Existing Tree. 6e When prompted to choose a eDirectory tree structure, press F5.
-
Manual 99a 38 July 17, 2001 Restoring the Entire eDirectory Tree Structure To restore an entire network from a full backup in a multiple-server environment, do the following: 1 Reinstall NetWare on the first server. By default, this server will hold the master replica of the [Root] partition. When NWCONFIG asks for the names of Organization objects immediately under the [Root] object, use the same names that existed before in the eDirectory tree.
-
Manual 99a 38 July 17, 2001 eDirectory Restore Session Types You can choose to restore eDirectory in one of the following ways: “Single Server or an Entire Tree Restore” on page 73 “Custom eDirectory Restore” on page 73 “Custom File System Restore” on page 74 “Server-Specific Information Restore” on page 76 “Single File or Directory Restore” on page 76 Single Server or an Entire Tree Restore 1 Restore the entire eDirectory session from your SMS backup.
-
Manual 99a 38 July 17, 2001 If you do not want to overwrite the parent or child that exists on the hard disk, regardless of whether the existing version or the backed-up version has the latest date, select the option (parent or child or both), and enter N. 6 Continue through Step 14 on page 65 to Step 19 on page 65. Custom File System Restore To perform a custom file system restore, do the following. 1 Enter SBCON at the server console prompt.
-
Manual 99a 38 July 17, 2001 Follow these important rules about restoring to a new location: When you specify a particular portion of the file system structure as the source location, it does not necessarily mean that this will be the only data restored. You can influence what is restored by using the Include and Exclude options on the Choose Subsets Of What You're Restoring screen (Job Administration > Restore Options > Advanced Restore Options > Subsets of What to Restore).
-
Manual 99a 38 July 17, 2001 If you want to overwrite the child that exists on the hard disk only if the date of the backed-up copy on the media is later than the date of the copy on the hard disk, select Overwrite Existing Child and select the option. 8 Continue through Step 15 on page 65 to Step 19 on page 65. Server-Specific Information Restore To view and restore server information, do the following.
-
Manual 99a 38 July 17, 2001 3 Press Insert and enter the name space for the name space format you used when entering the file or directory name. The name space allows SBCON to correctly interpret the path information entered earlier in this menu in either the directory field or the location field. IMPORTANT: If files are restored to a new location, the name spaces must be the same or an error message will occur.
-
Manual 99a 38 July 17, 2001 Completing the eDirectory Restore If you restored the eDirectory database to volume SYS:, you should complete the restoration for the following to make sure the eDirectory database is working properly: Volume Other than SYS: To finish restoring eDirectory on a volume other than SYS:, do the following. 1 Bring the server up.
-
Manual 99a 38 July 17, 2001 Entire Tree To finish restoring eDirectory on the tree, do the following. 1 Restore the file system information to each server following “Restoring Data” on page 62. 2 Re-create partitions and replicas. 3 (Optional) Verify proper restoration of the data, trustee assignments, file ownership, and other related information by spot-checking some of the restored directories and files.
-
Manual 99a 38 July 17, 2001 identifies the file server on which the queue directory resides. This information is used to determine the physical location of the resource. The specifics of restoring objects vary depending on what type of object is involved and whether the object's dependencies are physical entities (servers and volumes) or logical entities. In some cases, you can simply restore an object and everything will work fine.
-
Manual 3 99a 38 July 17, 2001 Managing After you install and load SBCON, you can manage your jobs, data, devices, reports, and so on either from the server or workstation. Though the screens might look different, you can perform the same tasks in each interface. Be sure to read “Prerequisites for SBCON Tasks” on page 81 before performing any tasks in this section.
-
Manual 99a 38 July 17, 2001 Jobs The backup or restore jobs created by you can be administered anytime. You can delete, hold, reschedule, abort, or enable a job. Administering Jobs Jobs can be managed either from the server or from the workstation. From the Server On the SBCON Main Menu at the server, the Current Job List option gives you a job management facility where you can delete a job, hold a job, or enable it if it has been disabled after a job failure.
-
Manual 99a 38 July 17, 2001 Dynamic properties contains data that indicates how much data has been backed up along with the filenames. This dialog box appears when a job is running and SBSC is loaded on the server. Enable job allows you to start a job that has been disabled. Delete the job allows you to remove a job. Start/Hold the job allows you to start a job that is in the hold state or place it on hold if it is not in a hold state.
-
Manual 99a 38 July 17, 2001 Viewing Job Details This screen gives you all the details of the job you submitted including job name, the time the job was submitted, and the time the job should be executed. You can also schedule the job to run at a predefined time again after its execution. You can view job details from the server or a workstation. Ensure that you have met the prerequisites detailed in “Prerequisites for SBCON Tasks” on page 81.
-
Manual 99a 38 July 17, 2001 Serviced By—This indicates the name of the server where the job is to be executed. From a single server, you can submit jobs to various servers. This field indicates which job is serviced by which server. This field is active only when the job is active; otherwise, it indicates None. Scheduling Options—You can schedule the same job to run at another time. For information, see “Customizing Backup” on page 53.
-
Manual 99a 38 July 17, 2001 From a Workstation 1 At the Quick Access window, click Job Administration. 2 Double-click the context. 3 Double-click Queues. 4 Select the job to place on hold. 5 Right-click the job and then click Start/Hold the Job. (Optional) You can also hold the job using the toolbar. Click Job Administration > Start/Hold the Job.
-
Manual 99a 38 July 17, 2001 From the Server 1 Select Main Menu > Storage Device Administration. 2 Select a device and press Insert. 3 Select Utilities > Device Status. The Device Status screen is displayed listing the following information: Current Operation—Indicates whether the device is currently reading, writing, formatting the media, or none of these. Device Mode—Indicates whether the device is selected for reading, writing, or both.
-
Manual 99a 38 July 17, 2001 You can change a device label from the server or a workstation. Ensure that you have met the prerequisites detailed in “Prerequisites for SBCON Tasks” on page 81. From the Server 1 Select Main Menu > Storage Device Administration. 2 Select a device name and press Insert. 3 Select Utilities > Change the Device Label. 4 Enter the new name in the field. 5 Press Esc as required to return to the Main Menu.
-
Manual 99a 38 July 17, 2001 From the Server 1 Select Main Menu > Storage Device Administration. A list of devices is displayed. If no device is displayed in the list, run LIST DEVICES at the server prompt. 2 Select a device name and press Enter. The List of Media screen appears displaying the following information: Slot—The slot number given by the manufacturer. Media name—The name of the media, which can be changed using the Utilities menu. See “Erasing or Retaining Media” on page 90.
-
Manual 99a 38 July 17, 2001 Erasing or Retaining Media This task erases media headers, erases all data on the media, or retentions media in tape devices. Ensure that you have met the prerequisites detailed in “Prerequisites for SBCON Tasks” on page 81. The following table describes all media options. Option Explanation Change the Media Label This is permanent. Blank media (tape) does not have a label. Before submitting a job to the media, you need to label it.
-
Manual 99a 38 July 17, 2001 3 Double-click Queues. 4 Double-click the preferred queue. 5 Double-click Servers. 6 Double-click the preferred server. 7 Double-click Devices. 8 Right-click the media > click Erase Media [or] Retension. (Optional) You can also use the toolbar. Click Device Administration > Media > Erase Media [or] Retension. Checking the Media Status in a Device This task lets you check the status of a particular media type from either the server or a workstation.
-
Manual 99a 38 July 17, 2001 Media mode—Whether the media is selected for reading, writing or both, or whether the mount request is pending. Media type—The type of media in the device, such as 4mm DDS (Digital Data Storage) tape, or 8mm tape. Total capacity—The total capacity of the media, if known. Sometimes it is not displayed, depending on the media manager. The type of media manager controls the display of the total capacity of the media.
-
Manual 99a 38 July 17, 2001 Log and Error Files SBCON keeps a list of all the log and error files, which show specific information about the backup and restore session. See “Session Files” on page 37 for more information. You can manage these files as follows: View information contained in the log and error files. See “Viewing a Log File” on page 93 and “Viewing an Error File” on page 94 for information. Create these files. See “Creating Log and Error Files” on page 96 for information.
-
Manual 99a 38 July 17, 2001 To change the directory, delete the existing directory path and type a new one, and then go to Step 3 on page 94. You can also press Insert during this process to select existing parts of the path from a list. The backup log displays all supported name space types. The DOS name space is the first in the group. A right-angle bracket (>) appears next to the file creator's name space type.
-
Manual 99a 38 July 17, 2001 From the Server 1 From the SBCON Main Menu, select Log File Administration > View an Error File. 2 If necessary, set the location of the log and error files for a backup session. (This option is not supported for a restore session.) To set the location, use one or more of the following methods: Press Enter to accept the default location, and then go to Step 3 on page 95.
-
Manual 99a 38 July 17, 2001 4 Double-click the preferred queue. 5 Double-click Servers. 6 Right-click the preferred server. 7 Select Error Report. Creating Log and Error Files If you do not know what is on the media, or you have lost or deleted the log and error files, you can re-create them. Ensure that you have met the prerequisites detailed in “Prerequisites for SBCON Tasks” on page 81. To create a log or error file, see “Creating Session Files” on page 98.
-
Manual 99a 38 July 17, 2001 Deleting the Log Files SBCON allows you to overwrite sessions and reuse storage media. When you delete the log file for a session using the following procedure, you automatically delete the corresponding error file as well. To prevent outdated session information from taking up disk space and to help prevent confusion when you select sessions to view or restore, delete the session log files for any session that has been overwritten.
-
Manual 99a 38 July 17, 2001 Creating Session Files If you do not know what is on the media, or you have lost or deleted the log and error files, you can re-create them from either the server or a workstation. Ensure that you have met the prerequisites detailed in “Prerequisites for SBCON Tasks” on page 81. From the Server 1 From the SBCON Main Menu, select Job Administration > Create Session File. The Session Files Options screen appears. 2 Enter a descriptive name.
-
Manual 99a 38 July 17, 2001 9 Select the preferred media. 10 Right-click the job and select Submit the Job. 11 Check the appropriate fields in the Submission of Job dialog box. Verifying Backup Data This option allows you to check the data on the media from either the server or a workstation to make sure it has been backed up properly, and to check later that the data is valid and can be restored.
-
Manual 99a 38 July 17, 2001 From a Workstation 1 At the Quick Access window, click Verify. 2 Double-click the context if necessary. 3 Double-click Queues. 4 Double-click the preferred queue. 5 Double-click Servers. 6 Double-click the preferred server. 7 Double-click Devices. 8 Double-click the preferred device. 9 Right-click the preferred media. 10 Select Submit the Job. 11 In the Submission of Job dialog box, click the session. 12 Click Finish.
-
Manual 4 99a 38 July 17, 2001 Optimizing This chapter discusses the following topics: Whether you should compress your files before backup. See “Compressed Files” on page 101. How to increase speed when backing up your files. See “Host Server Performance” on page 102. How to enhance or optimize server performance. See “Setting Minimum Packet Receive Buffers” on page 103. How to synchronize memory between your media and your server. See “Setting Reserved Buffers Below 16 MB” on page 103.
-
Manual 99a 38 July 17, 2001 To help you make a decision about whether to compress or decompress your backed up data, follow these guidelines: Backups are faster if files already compressed are left compressed. Compression is not supported in some environments (such as a NetWare 3.11 server, a DOS workstation, or Novell Storage ServicesTM). If you intend to restore a file that is currently compressed to an environment that does not support compression, back it up in a decompressed state.
-
Manual 99a 38 July 17, 2001 Setting Minimum Packet Receive Buffers Packet receive buffers represent the space in the server memory dedicated to handling network traffic. If the buffers are set too low, the server performance may be degraded. To reset the packet receive buffers at the server console prompt, include the following SET command in the STARTUP.NCF file: SET MINIMUM PACKET RECEIVE BUFFERS = X The x represents the number of buffers. Set two buffers for each user on the system.
-
Manual 99a 38 104 Storage Management Services Administration Guide Storage Management Services Administration Guide 103-000134-001 August 29, 2001 Novell Confidential July 17, 2001
-
Manual 5 99a 38 July 17, 2001 Troubleshooting Common Backup Problems The media owner is unidentified Possible Cause: Action: Media is blank or was written in a non-SIDF format. See “Checking the Media Status in a Device” on page 91. Backup speed is slow Possible Cause: Action: Compressed files are being backed up in a decompressed format. See “Compressed Files” on page 101. Restore speed is slow Possible Cause: File compression and SBCON are running at the same time.
-
Manual 99a 38 July 17, 2001 Data is corrupted, but no error message was given Possible Cause: Action: Compressed files were restored to a volume without compression. See Step 10 on page 64. You (the network administrator) can't back up a workstation Possible Cause: The /Password option is set and is denying access to data on the workstation. Action: See “Setting Rights to Back Up Portions of the eDirectory Tree” on page 26.
-
Manual 99a July 17, 2001 38 Files were restored but the error file contains a message specifying which name space formats were not restored Possible Cause: Action: The file attributes and name space formats are not configured on the volume you restored to. Check to make sure you selected the correct name space.
-
Manual 99a 38 108 Storage Management Services Administration Guide Storage Management Services Administration Guide 103-000134-001 August 29, 2001 Novell Confidential July 17, 2001
-
Storage Management Services Administration Guide Novell NetWare 6 ® www.novell.
-
Manual 99a July 17, 2001 38 Contents Preface 7 Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1 Overview 9 Backup Services . . . . . . . . . . . . . . . SMS Components . . . . . . . . . . . . Supported Storage Devices and Drivers . Storage Management Engine (SME) . . . Storage Management Data Requester . . Memory Requirements . . . . . . . . . . Backup Files . . . . . . . . . . . . . . . Backup Types . . . . . . . . . . . . . .
-
Manual 99a Loading SBCON . . . . . . . . . . . . . . . . . . . . . Prerequisites . . . . . . . . . . . . . . . . . . . . . Unloading SBCON . . . . . . . . . . . . . . . . . . . Loading NWBACK32 . . . . . . . . . . . . . . . . . . Exiting NWBACK32 . . . . . . . . . . . . . . . . . . . Backing Up Data . . . . . . . . . . . . . . . . . . . . Prerequisites . . . . . . . . . . . . . . . . . . . . . Backing Up from the Server . . . . . . . . . . . . . Backing Up from a Workstation . . . . . . . . . . .
-
Manual 99a 38 July 17, 2001 Preface Novell® Storage Management ServicesTM (SMSTM) is a collection of software programs that provides backup and restore services. These services are performed by a collection of components that are independent of operating systems and hardware. You can backup SMS Targets such as Novell eDirectoryTM, binderies, the file system, cluster-enabled pools or an individual workstation's hard disk onto a media that can be stored off-site.
-
Manual 8 99a 38 Storage Management Services Administration Guide Storage Management Services Administration Guide 103-000134-001 August 29, 2001 Novell Confidential July 17, 2001
-
Manual 1 99a 38 July 17, 2001 Overview Backup services is an essential piece of the Novell® Storage Management ServicesTM (SMSTM) software, a collection of services that provides backup, restore, and data migration. These services are performed by various components and are independent of operating systems and hardware.
-
Manual 99a 38 July 17, 2001 The following topics are discussed in this section: “SMS Components” on page 10 “Backup Types” on page 16 “Customizing Your Backup” on page 16 “Keeping a Backup Logbook” on page 21 “Preparing to Back Up” on page 22 “Backups and eDirectory” on page 23 “Backups and the File System” on page 27 “Backups and Clusters” on page 29 “Session Files” on page 37 SMS Components Storage Management Engine (SME) for backup and restore operations.
-
Manual 99a 38 July 17, 2001 keeps the names of these workstations in an internal list and displays the list, allowing you to select a target for a backup or restore procedure. The SBCON process involves two machines: The host server is typically the NetWare server running the backup program. The SMS components will include the backup engine, the SMDR, the Storage Device Driver, the tape device, and the required Target Service Agents.
-
Manual 99a 38 July 17, 2001 Supported Storage Devices and Drivers SBCON supports 0.25-inch, 4mm, and 8mm storage devices. If you are using 4mm tape, use only DDS (Digital Data Storage)-certified, computer-grade tapes. IMPORTANT: To ensure reliable operations, pretest all media storage devices that are not Novell certified with the appropriate NetWare device driver and SBCON backup and restore utility. Use the driver files recommended by your hardware manufacturer.
-
Manual 99a 38 July 17, 2001 Storage Management Data Requester The Storage Management Data Requester (SMDR) is the communication module in the SMS architecture. It provides transparent access to SMS services in an intranet as it allows access to local or remote SMS services. The SMDR APIs are used by SBCON and other third-party applications as well. SMDR uses TCP Port Number 413. Features of SMDR The features of the SMDR 6.00 include the following: Protocol Independence: SMDR 6.
-
Manual 99a 38 July 17, 2001 represents an instance of a predefined group class in the eDirectory schema. Any number of such groups can exist in eDirectory. The SMDR can become a member of one or more groups by registering its object's (SMS RPC object) context. When SMDR requires name resolution, it searches all members of the SMDR Group at SMDR Group Context. The SMDR Group Context and SMDR Group are specified in the SMDR.CFG file.
-
Manual 99a 38 July 17, 2001 If NetWare Common Install is used to install SMS (see “Customizing the NetWare Server as the Backup Server” on page 43 for more information), this problem will not occur. If the SMDR is explicitly loaded for the first time, the screen for configuration information will not be hidden.
-
Manual 99a 38 July 17, 2001 Backup Types SBCON has three types of backup sessions: Full backup—Backs up the entire file system of the selected target regardless of whether the data has changed since the last backup, and clears the Modify bit after the backup. Differential backup—Available only for the file system; backs up only data that has been changed since the last full or incremental backup. When you perform a differential backup, the modify bit is not cleared after the backup.
-
Manual 99a July 17, 2001 38 Exclude and Include Options Whenever you perform a custom backup or restore, you can use the exclude and include options to select subsets of what you want to back up. Whether you use exclude or include usually depends on the size of the data you want to back up, compared to the size of the data you do not want to back up.
-
Manual 99a 38 July 17, 2001 The same principle applies when you specify a directory with the include option. The figure below shows that all directories, subdirectories, and files under the NetUsers directory are included in the backup. All other areas of the file system structure are excluded from the backup. SYS HOME Public Mail System Login NetUsers Project A2ZCO Widget.exe Report January.prj February.prj March.prj Proposal Tessier.
-
Manual SYS HOME 99a Public Mail System Login NetUsers Appl July 17, 2001 38 Project A2ZCO Widget.exe Report January.prj February.prj March.prj Proposal Tessier.Inc Nu_Artco Karl Mary Directories Subdirectories Files Thomas Directories Subdirectories Files Scan Data Sets You can specify a different type of data set to be scanned. A data set is a group of data that can be manipulated by SBCON.
-
Manual SYS HOME 99a Public Mail System Login NetUsers Appl July 17, 2001 38 Project A2ZCO Widget.exe Report January.prj February.prj March.prj Proposal Tessier.Inc Nu_Artco Training Workbook Viewgraph Script Schedules June July August Karl Mary Thomas Manuals Widget.Co chapt.1 chapt.2 chapt.3 chapt.4 appx.A appx.B glossary index Acme.
-
Manual 99a 38 July 17, 2001 Keeping a Backup Logbook Keep a hard copy log of your backups in case your online log and error files become corrupted.
-
Manual 99a 38 July 17, 2001 Preparing to Back Up Careful planning can help you minimize the impact of data loss. Before you back up, consider the following: What should be backed up Where to back up Backup type Who should back up When to back up How to prepare for a backup How to track backup Open Files Backup TSA600.NLM supports backup of open files on Novell Storage Services (NSS) volumes if the CopyOnWrite feature is enabled.
-
Manual 99a 38 July 17, 2001 Determining an Appropriate Backup Type Each type of backup has a different effect on the backup and restore process. When planning your backup schedule, consider all of the following variables before determining which schedule is right for you. Media usage and backup speed. This helps increase the speed of the restore. Restoring after incremental backups.
-
Manual 99a 38 July 17, 2001 Distributed Database The network of servers that comprise an eDirectory tree structure continually exchange updates and other time-sensitive information. The eDirectory database exists as a set of files that are stored in the SYS: volume and are hidden so they are not accidentally tampered with or deleted. The eDirectory database files cannot be backed up, as was the case with bindery files in NetWare 3.12 or earlier versions.
-
Manual 99a 38 July 17, 2001 Placeholder (Unknown) Objects Whenever insufficient information is known about an object, such as when one of its mandatory attributes is missing, eDirectory creates as a placeholder an Unknown object. During a restore session of the eDirectory database information, Unknown objects are created when restoring an object that has an access control list (ACL) or any other attribute that refers to other objects that do not currently exist in the eDirectory tree structure.
-
Manual 99a 38 July 17, 2001 traffic during the backup process and improves performance when the backup program performs name resolution across the eDirectory tree structure. The version of TSANDS.NLM that ships with NetWare allows selective backup and restoration of an eDirectory tree structure. HINT: Not all third-party backup applications support this selective backup and restoration. Check with the application vendor for details on product features.
-
Manual 99a 38 July 17, 2001 eDirectory backup to back up the portions of the tree for which they have rights. The network administrator assigns the Supervisor right to the backup administrators for the section of the eDirectory tree structure that they are responsible to back up. The network administrator then needs to create a TSANDS.CFG file that lists the fully distinguished names of the containers where each of the backup administrators' rights begin. The TSANDS.
-
Manual 99a 38 July 17, 2001 Trustee Assignments Trustee assignments are stored as part of the file system as an ID. They are backed up by default when the file system is backed up with the SMS TSA software. If a User object is deleted and then re-created or restored, its object ID changes. This is why the SMS TSA module uses fully distinguished names for objects to back up the trustee rights from the file system.
-
Manual 99a 38 July 17, 2001 Backups and Clusters Novell Cluster ServicesTM allows you to configure up to 32 NetWare servers into high-availability cluster, where resources can be dynamically switched or moved to any server in the cluster. Consolidation of applications and operations on a cluster has benefits such as lower costs, scalability, and increased availability. See the Novell Cluster Services documentation (http:// www.novell.com/documentation) for more information.
-
Manual 99a 38 July 17, 2001 If a cluster server is chosen as the target, only noncluster volumes will be backed up. You have to back up each pool individually. You might abort an ongoing backup job with the intention of resubmitting the same job later. In such situations, the job will not restart from where it was terminated; it will restart from the beginning. For more information, see “Backing Up Cluster-enabled Pools from the Server” on page 56.
-
Manual 99a 38 July 17, 2001 The TSA packages data from the target and presents it to the SME in a generic format. This allows one SME to interact with many types of TSAs. NetWare 6 provides TSA600.
-
Manual 99a 38 July 17, 2001 How SMS Restores Data During a restore session, SBCON reads the backup storage media, and the Target Service Agent (TSA) compares the media data set to the existing hard disk data set.
-
Manual BEGIN 99a July 17, 2001 38 END Go to backup session on storage media. no Is there another data set to read? yes Read data set. Overwrite data set? Is the data set to be renamed yes only if newer no yes no ignore Rename the dataset Is data set a subset of what you´re restoring? restore Compare date of data set on media to date of data set on disk.
-
Manual 99a 38 July 17, 2001 Restore Options For a custom restore session, you can specify exactly which data to restore. Several options work together to allow you maximum flexibility in your restore session.
-
Manual 99a 38 July 17, 2001 Restoring eDirectory and the File System The only way to ensure that your eDirectory database can be fully restored is through partition replication, with replicas of the entire database on multiple servers. On a single-server network, you need to rely more heavily on backing up the data because you do not have replicas to restore information.
-
Manual 99a 38 July 17, 2001 stored on volume SYS:, losing SYS: is equivalent to removing NetWare and eDirectory from the file server. You must reinstall NetWare and eDirectory before you restore your data. The procedures for this scenario are divided into two cases: Loss of the only server in a single-server network. Loss of a single server in a multiple-server network. Single-Server Network In a single-server network, server failure brings all network operations to a halt.
-
Manual 99a 38 July 17, 2001 5. Restore the file system. (See “Restoring Data” on page 62 and “Custom File System Restore” on page 74.) 6. Restore any replicas that were removed from the server. Loss of the Entire eDirectory Tree If all servers on a network are destroyed because of a disaster, you must perform a complete restore of NetWare, eDirectory, and file system data.
-
Manual 99a 38 July 17, 2001 Log and Error Files The files of the backup session are stored in a default directory (such as SYS:SYSTEM\TSA\LOG). If you prefer, you can create your own directory for the log and error files as long as it resides on the host server. The files of the restore session are stored in the directory (SYS:SYSTEM\TSA\RESTORE). You cannot modify the location for the files.
-
Manual 99a 38 July 17, 2001 Error File The error file is created on the host server the first time a particular set of data is backed up. It contains a list of any errors that occurred during a backup or restore session. This file contains the following: The session date and time and the description you entered. The target from which the data was backed up for a backup session. The target that was backed up and the location on the server where the data was restored to during a restore session.
-
Manual 40 99a 38 Storage Management Services Administration Guide Storage Management Services Administration Guide 103-000134-001 August 29, 2001 Novell Confidential July 17, 2001
-
Manual 2 99a 38 July 17, 2001 Setting Up In addition to being able to back up data from a server with SBCON, you can use a Windows 95, 98, 2000 or Windows NT workstation to perform your backups using the graphical interface. This chapter discusses the following: How to customize the NetWare server as the backup server. See “Customizing the NetWare Server as the Backup Server” on page 43. How to load the backup software.
-
Manual 99a 38 July 17, 2001 SBCON Guidelines Before you set up and begin backups, follow these guidelines to make backups easier and to avoid problems later. Log in. You will have limited success backing up and restoring if you log in without the Supervisor right. For security reasons, many SBCON options are limited to the network administrator. Reserve disk space for temporary files.
-
Manual 99a 38 July 17, 2001 Before Loading the Backup Software Before you load the backup software on the server or on a Windows machine, you need to configure a server to execute your backups. Determine the following: The tree to which the server belongs which must be made the current tree The full eDirectoryTM context of the server Before Running the Backup Software Before backing up software, in general you must: Load the controller and storage device drivers on the server.
-
Manual 99a 38 July 17, 2001 The SMDR Group object is where all NetWare and workstation SMDRs are registered for name resolution purposes. 6 Accept the default name of the Backup Queue where all backup jobs will be submitted, or enter a new name and context. Loading Controller and Storage Device Drivers on the Server Controller and device drivers control the mechanical operation, such as read, write, forward, back, and stop of various storage devices and media.
-
Manual 99a July 17, 2001 38 Loading the Target Service Agents Target Service Agents are loaded on servers and workstations. If you want to back up a server, load the TSA on the server. Ensure that the controllers and device drivers are loaded.
-
Manual 99a 38 July 17, 2001 Loading the files when the server starts. Place the commands in the server's STARTUP.NCF, and in the workstation's NET.CFG file, AUTOEXEC.BAT file (for DOS), or Startup folder (for OS/2). Loading SBCON You can load SBCON from the server command line. If you use NWBACK32 on a client, you do not need to load SBCON. 1 At the server console, enter SMSSTART TSA600.NLM, TSAPROXY.NLM, and SMDR.NLM modules are loaded with default configuration values. SBSC.NLM, QMAN.NLM, SMSDI.
-
Manual 99a 38 July 17, 2001 Unloading SBCON To ensure maximum memory utilization and throughput, you should unload backup software and other Storage Management ServicesTM (SMSTM) modules when you are finished performing your backup. That way, more memory will become available on your host or target. 1 Exit SBCON from the Main Menu. Press Esc until you reach the SBCON Main Menu; then press Esc again and confirm the prompt.
-
Manual 99a 38 July 17, 2001 3 Run NWBACK32.EXE from SYS:PUBLIC. The following screen appears. You are now ready to back up data. Go to “Backing Up Data” on page 49 to continue. Exiting NWBACK32 1 Exit NWBACK32 from the Quick Access window. 2 Unload all the modules loaded on the server by entering the following command at the server console: SMSSTOP Unloads all the previously loaded SMS modules.
-
Manual 99a 38 July 17, 2001 Backing Up Data You can use SBCON to create a tape backup of the eDirectory database or of the file system on your servers or workstations. The prerequisites listed here use SBCON as the Storage Management Engine (SME). Prerequisites Understand the process for loading SBCON. See “Loading SBCON” on page 46 Ensure that you know the workstation password if you are backing up a workstation.
-
Manual 99a 38 July 17, 2001 Ensure that media is inserted into your storage device. You can back up your data two ways: from a server using SBCON or from a Windows workstation using NWBACK32. Backing Up from the Server When you back up your data from one server to a target server or workstation, you should use the command line. 1 Load the SBCON modules. See “Loading SBCON” on page 46. 2 Click Main Menu > Job Administration > Backup.
-
Manual 99a 38 July 17, 2001 4 Select a target from the Target Services list. The following table describes the targets that can be selected for backup.
-
Manual 99a 38 July 17, 2001 This is a descriptive name of the job, which will help you identify the specific backup session; if a restore is necessary, you can easily identify the session you need. There is no special requirement for what to enter as the session description. HINT: You might want to include the full path of the data (for example, SYS:HOME\REPORTS\JULY.02) which you will need to know if a restore session is necessary. 10 Click Device/Media Name and select a device.
-
Manual 99a 38 July 17, 2001 14 To return to the Main Menu, press Esc until you back out to the Main Menu. 15 To exit SBCON, press Esc again and answer the confirmation prompt. Customizing Backup You can customize your backup using the Advanced Backup Options form when you use SBCON at the server to launch your backup program. This form allows you to specify exactly what you want to back up data. It could be the server, the eDirectory database, workstation, directory, or file.
-
Manual 99a 38 July 17, 2001 3 Select Subsets of What To Backup. The default setting means that everything in the Subsets of What You Want to Backup screen is backed up. Include/Exclude TSA Resources—Includes or excludes resources such as servers or volumes. Include/Exclude Directories—Includes or excludes directories. Include/Exclude Files—Includes or excludes files. Include/Exclude path/files—Includes or excludes pathnames and files. 4 Select Scan Options.
-
Manual 99a 38 July 17, 2001 The day, month, or year you enter should not be the actual date when you want the job to run; rather, it is the duration after which the job gets executed.
-
Manual 99a 38 July 17, 2001 4 Select where you want your backup data to go. 4a Double-click Where to Backup. 4b Change to the correct eDirectory tree structure and context by clicking the Change to Context button on the toolbar. 4c Double-click Queues. 4d Select a Queue object from the list. 4e Right-click the server to open the drop down box. 4f Click Submit the Job. This step allows you to submit the job to a queue on the chosen server or on the chosen media type. Queue.
-
Manual 99a 38 July 17, 2001 5 When prompted, enter the username (and context, if required) for the target. If SBCON rejects the username you entered, you probably need to include the context where the User object is located. For example, instead of entering ADMIN as the username, enter .CN=ADMIN.O=company_name or .ADMIN.company_name.
-
Manual 99a 38 July 17, 2001 If the storage media does not have a label, SBCON displays a message saying that the media cannot be identified. Set the label before selecting it for a backup job. 11 Select Advanced Options and set the desired values for all the fields. For more details, see “Customizing Backup” on page 53. NOTE: If you set Enable Auto Recovery to NO in Cluster Options, the remaining options become invalid. 12 Select Append Session.
-
Manual 99a 38 July 17, 2001 Backing Up a Workstation To back up the workstation (the target), a Target Service Agent (TSA) must be loaded on the workstation. (See “Loading the Target Service Agents” on page 45.) You can select the directories to back up or back up the entire workstation. Windows 95 and 98 Workstation Make sure that the W95TSA is installed and configured. It is a part of the Novell Client modules (checkbox for Target Service Agent).
-
Manual 99a 38 July 17, 2001 Windows 2000 and Windows NT Workstation Make sure that the NT TSA is installed and configured. It is a part of the Novell Client modules (checkbox for Novell Target Service Agent). The Windows NT TSA has two parts: TSA Service (TSAMAIN.EXE) is a service that waits for and acts when there is a request from the backup engine. TSAPrefs (TSAPREFS.EXE) allows an NT administrator to set preferences and monitor the activities of the TSA Service.
-
Manual 99a 38 July 17, 2001 Changing Your Target Any time you are performing a series of backup or restore sessions, you might need to change your target. This can be easily done from the SBCON Main Menu either at the command line or from the Windows workstation using NWBACK32. If you do not specify a new target, SBCON automatically selects the target used during the last session and continues without asking you to make a selection.
-
Manual 99a 38 July 17, 2001 Restoring Data Use SBCON to restore information from tape backup. These procedures use SBCON as the Storage Management Engine (SME). Know the username and password for the target server or workstation to which you want to restore data. Know the session description that you want to restore. You can get this information from your session log and error files. (See “Session Files” on page 37.
-
Manual 99a 38 July 17, 2001 3 Load SBCON. See “Loading SBCON” on page 46. 4 Select Main Menu > Job Administration > Restore. The Restore Options screen appears. 5 Select Target Service and then the NetWare server running your backup and restore Target Services Agent. This is the name of the server or workstation on which you want to restore your data. Before selecting it, you must load the correct TSA. See “Loading the Target Service Agents” on page 45.
-
Manual 99a 38 July 17, 2001 Target Service to Restore Dataset to Select Workstation The workstation's host server and then the workstation Server-specific information The server whose server-specific information you want to restore and then the file system to restore 6 When prompted for the target username, enter your username (and context if required) as the network administrator for the target.
-
Manual 99a 38 July 17, 2001 volume without compression, the file is corrupted and no error message is displayed. 11 Specify the path to the session log file of the session you want to restore. Use one or more of the following methods: Press Enter to accept the default; then go to Step 12 on page 65. Press Insert to select from a list of directories, press Esc to return to the previous window, and then go to Step 12 on page 65.
-
Manual 99a 38 July 17, 2001 The Esc key allows you to exit SBCON one screen at a time until you reach the Main Menu. If you want to exit SBCON, answer the confirmation prompt. NOTE: To unload SBCON and applicable Target Service Agents, see “Unloading SBCON” on page 47. Customizing Restore Using the Advanced Restore Options form at the server, you can perform a custom restore of the database you need. 1 Select Main Menu > Job Administration > Restore. The Restore Options screen appears.
-
Manual 99a 38 July 17, 2001 The screen lists major and minor resources. Default indicates that none of that type of subset has been specified. 6 To specify a subset, do the following: 6a Select any item on the screen. 6b Edit the Include or Exclude screens using Insert and Enter. 6c Press Esc to save changes. 6d To view a list of values associated with major TSA resources (for example, server or volumes) select either the include or exclude line. The Selection List Options form appears.
-
Manual 99a 38 July 17, 2001 Restoring Data from a Workstation When you restore data, you are copying your backed up data to a server or workstation. 1 Run NWBACK32. See “Loading NWBACK32” on page 47. You can run the NWBACK32 program (NWBACK32.EXE) from SYS:PUBLIC. 2 At the Quick Access window, click Restore. 3 Click What you Want to Restore. 3a Double-click What to Restore. 3b Select the context. 3c Double-click Queues and select the queue. 3d Double-click Servers and select a server.
-
Manual 99a 38 July 17, 2001 Restoring eDirectory The procedures in the following sections are performed at the beginning of the restore process.
-
Manual 99a 38 July 17, 2001 Make sure disk partitions are at least as large as they were before, and that the volumes are defined as before. 3 Restore eDirectory using “Customizing Restore” on page 66. Restoring Volume SYS: in a Multiple-Server Network To restore SYS: volumes on several servers, do the following. 1 Restore the server-specific eDirectory information file (SERVDATA.
-
Manual 99a 38 July 17, 2001 4e Select Remove This Server from the Replica Ring. 4f Enter the supervisor name and password. 4g Select Yes to continue. 5 Exit DSREPAIR. 6 Reinstall NetWare. 6a Begin the installation. 6b When prompted for DS install, select Create a New DS Tree and complete the installation. 6c Load NWConfig and remove DS. 6d Install DS, when prompted for DS install and select Install into an Existing Tree. 6e When prompted to choose a eDirectory tree structure, press F5.
-
Manual 99a 38 July 17, 2001 Restoring the Entire eDirectory Tree Structure To restore an entire network from a full backup in a multiple-server environment, do the following: 1 Reinstall NetWare on the first server. By default, this server will hold the master replica of the [Root] partition. When NWCONFIG asks for the names of Organization objects immediately under the [Root] object, use the same names that existed before in the eDirectory tree.
-
Manual 99a 38 July 17, 2001 eDirectory Restore Session Types You can choose to restore eDirectory in one of the following ways: “Single Server or an Entire Tree Restore” on page 73 “Custom eDirectory Restore” on page 73 “Custom File System Restore” on page 74 “Server-Specific Information Restore” on page 76 “Single File or Directory Restore” on page 76 Single Server or an Entire Tree Restore 1 Restore the entire eDirectory session from your SMS backup.
-
Manual 99a 38 July 17, 2001 If you do not want to overwrite the parent or child that exists on the hard disk, regardless of whether the existing version or the backed-up version has the latest date, select the option (parent or child or both), and enter N. 6 Continue through Step 14 on page 65 to Step 19 on page 65. Custom File System Restore To perform a custom file system restore, do the following. 1 Enter SBCON at the server console prompt.
-
Manual 99a 38 July 17, 2001 Follow these important rules about restoring to a new location: When you specify a particular portion of the file system structure as the source location, it does not necessarily mean that this will be the only data restored. You can influence what is restored by using the Include and Exclude options on the Choose Subsets Of What You're Restoring screen (Job Administration > Restore Options > Advanced Restore Options > Subsets of What to Restore).
-
Manual 99a 38 July 17, 2001 If you want to overwrite the child that exists on the hard disk only if the date of the backed-up copy on the media is later than the date of the copy on the hard disk, select Overwrite Existing Child and select the option. 8 Continue through Step 15 on page 65 to Step 19 on page 65. Server-Specific Information Restore To view and restore server information, do the following.
-
Manual 99a 38 July 17, 2001 3 Press Insert and enter the name space for the name space format you used when entering the file or directory name. The name space allows SBCON to correctly interpret the path information entered earlier in this menu in either the directory field or the location field. IMPORTANT: If files are restored to a new location, the name spaces must be the same or an error message will occur.
-
Manual 99a 38 July 17, 2001 Completing the eDirectory Restore If you restored the eDirectory database to volume SYS:, you should complete the restoration for the following to make sure the eDirectory database is working properly: Volume Other than SYS: To finish restoring eDirectory on a volume other than SYS:, do the following. 1 Bring the server up.
-
Manual 99a 38 July 17, 2001 Entire Tree To finish restoring eDirectory on the tree, do the following. 1 Restore the file system information to each server following “Restoring Data” on page 62. 2 Re-create partitions and replicas. 3 (Optional) Verify proper restoration of the data, trustee assignments, file ownership, and other related information by spot-checking some of the restored directories and files.
-
Manual 99a 38 July 17, 2001 identifies the file server on which the queue directory resides. This information is used to determine the physical location of the resource. The specifics of restoring objects vary depending on what type of object is involved and whether the object's dependencies are physical entities (servers and volumes) or logical entities. In some cases, you can simply restore an object and everything will work fine.
-
Manual 3 99a 38 July 17, 2001 Managing After you install and load SBCON, you can manage your jobs, data, devices, reports, and so on either from the server or workstation. Though the screens might look different, you can perform the same tasks in each interface. Be sure to read “Prerequisites for SBCON Tasks” on page 81 before performing any tasks in this section.
-
Manual 99a 38 July 17, 2001 Jobs The backup or restore jobs created by you can be administered anytime. You can delete, hold, reschedule, abort, or enable a job. Administering Jobs Jobs can be managed either from the server or from the workstation. From the Server On the SBCON Main Menu at the server, the Current Job List option gives you a job management facility where you can delete a job, hold a job, or enable it if it has been disabled after a job failure.
-
Manual 99a 38 July 17, 2001 Dynamic properties contains data that indicates how much data has been backed up along with the filenames. This dialog box appears when a job is running and SBSC is loaded on the server. Enable job allows you to start a job that has been disabled. Delete the job allows you to remove a job. Start/Hold the job allows you to start a job that is in the hold state or place it on hold if it is not in a hold state.
-
Manual 99a 38 July 17, 2001 Viewing Job Details This screen gives you all the details of the job you submitted including job name, the time the job was submitted, and the time the job should be executed. You can also schedule the job to run at a predefined time again after its execution. You can view job details from the server or a workstation. Ensure that you have met the prerequisites detailed in “Prerequisites for SBCON Tasks” on page 81.
-
Manual 99a 38 July 17, 2001 Serviced By—This indicates the name of the server where the job is to be executed. From a single server, you can submit jobs to various servers. This field indicates which job is serviced by which server. This field is active only when the job is active; otherwise, it indicates None. Scheduling Options—You can schedule the same job to run at another time. For information, see “Customizing Backup” on page 53.
-
Manual 99a 38 July 17, 2001 From a Workstation 1 At the Quick Access window, click Job Administration. 2 Double-click the context. 3 Double-click Queues. 4 Select the job to place on hold. 5 Right-click the job and then click Start/Hold the Job. (Optional) You can also hold the job using the toolbar. Click Job Administration > Start/Hold the Job.
-
Manual 99a 38 July 17, 2001 From the Server 1 Select Main Menu > Storage Device Administration. 2 Select a device and press Insert. 3 Select Utilities > Device Status. The Device Status screen is displayed listing the following information: Current Operation—Indicates whether the device is currently reading, writing, formatting the media, or none of these. Device Mode—Indicates whether the device is selected for reading, writing, or both.
-
Manual 99a 38 July 17, 2001 You can change a device label from the server or a workstation. Ensure that you have met the prerequisites detailed in “Prerequisites for SBCON Tasks” on page 81. From the Server 1 Select Main Menu > Storage Device Administration. 2 Select a device name and press Insert. 3 Select Utilities > Change the Device Label. 4 Enter the new name in the field. 5 Press Esc as required to return to the Main Menu.
-
Manual 99a 38 July 17, 2001 From the Server 1 Select Main Menu > Storage Device Administration. A list of devices is displayed. If no device is displayed in the list, run LIST DEVICES at the server prompt. 2 Select a device name and press Enter. The List of Media screen appears displaying the following information: Slot—The slot number given by the manufacturer. Media name—The name of the media, which can be changed using the Utilities menu. See “Erasing or Retaining Media” on page 90.
-
Manual 99a 38 July 17, 2001 Erasing or Retaining Media This task erases media headers, erases all data on the media, or retentions media in tape devices. Ensure that you have met the prerequisites detailed in “Prerequisites for SBCON Tasks” on page 81. The following table describes all media options. Option Explanation Change the Media Label This is permanent. Blank media (tape) does not have a label. Before submitting a job to the media, you need to label it.
-
Manual 99a 38 July 17, 2001 3 Double-click Queues. 4 Double-click the preferred queue. 5 Double-click Servers. 6 Double-click the preferred server. 7 Double-click Devices. 8 Right-click the media > click Erase Media [or] Retension. (Optional) You can also use the toolbar. Click Device Administration > Media > Erase Media [or] Retension. Checking the Media Status in a Device This task lets you check the status of a particular media type from either the server or a workstation.
-
Manual 99a 38 July 17, 2001 Media mode—Whether the media is selected for reading, writing or both, or whether the mount request is pending. Media type—The type of media in the device, such as 4mm DDS (Digital Data Storage) tape, or 8mm tape. Total capacity—The total capacity of the media, if known. Sometimes it is not displayed, depending on the media manager. The type of media manager controls the display of the total capacity of the media.
-
Manual 99a 38 July 17, 2001 Log and Error Files SBCON keeps a list of all the log and error files, which show specific information about the backup and restore session. See “Session Files” on page 37 for more information. You can manage these files as follows: View information contained in the log and error files. See “Viewing a Log File” on page 93 and “Viewing an Error File” on page 94 for information. Create these files. See “Creating Log and Error Files” on page 96 for information.
-
Manual 99a 38 July 17, 2001 To change the directory, delete the existing directory path and type a new one, and then go to Step 3 on page 94. You can also press Insert during this process to select existing parts of the path from a list. The backup log displays all supported name space types. The DOS name space is the first in the group. A right-angle bracket (>) appears next to the file creator's name space type.
-
Manual 99a 38 July 17, 2001 From the Server 1 From the SBCON Main Menu, select Log File Administration > View an Error File. 2 If necessary, set the location of the log and error files for a backup session. (This option is not supported for a restore session.) To set the location, use one or more of the following methods: Press Enter to accept the default location, and then go to Step 3 on page 95.
-
Manual 99a 38 July 17, 2001 4 Double-click the preferred queue. 5 Double-click Servers. 6 Right-click the preferred server. 7 Select Error Report. Creating Log and Error Files If you do not know what is on the media, or you have lost or deleted the log and error files, you can re-create them. Ensure that you have met the prerequisites detailed in “Prerequisites for SBCON Tasks” on page 81. To create a log or error file, see “Creating Session Files” on page 98.
-
Manual 99a 38 July 17, 2001 Deleting the Log Files SBCON allows you to overwrite sessions and reuse storage media. When you delete the log file for a session using the following procedure, you automatically delete the corresponding error file as well. To prevent outdated session information from taking up disk space and to help prevent confusion when you select sessions to view or restore, delete the session log files for any session that has been overwritten.
-
Manual 99a 38 July 17, 2001 Creating Session Files If you do not know what is on the media, or you have lost or deleted the log and error files, you can re-create them from either the server or a workstation. Ensure that you have met the prerequisites detailed in “Prerequisites for SBCON Tasks” on page 81. From the Server 1 From the SBCON Main Menu, select Job Administration > Create Session File. The Session Files Options screen appears. 2 Enter a descriptive name.
-
Manual 99a 38 July 17, 2001 9 Select the preferred media. 10 Right-click the job and select Submit the Job. 11 Check the appropriate fields in the Submission of Job dialog box. Verifying Backup Data This option allows you to check the data on the media from either the server or a workstation to make sure it has been backed up properly, and to check later that the data is valid and can be restored.
-
Manual 99a 38 July 17, 2001 From a Workstation 1 At the Quick Access window, click Verify. 2 Double-click the context if necessary. 3 Double-click Queues. 4 Double-click the preferred queue. 5 Double-click Servers. 6 Double-click the preferred server. 7 Double-click Devices. 8 Double-click the preferred device. 9 Right-click the preferred media. 10 Select Submit the Job. 11 In the Submission of Job dialog box, click the session. 12 Click Finish.
-
Manual 4 99a 38 July 17, 2001 Optimizing This chapter discusses the following topics: Whether you should compress your files before backup. See “Compressed Files” on page 101. How to increase speed when backing up your files. See “Host Server Performance” on page 102. How to enhance or optimize server performance. See “Setting Minimum Packet Receive Buffers” on page 103. How to synchronize memory between your media and your server. See “Setting Reserved Buffers Below 16 MB” on page 103.
-
Manual 99a 38 July 17, 2001 To help you make a decision about whether to compress or decompress your backed up data, follow these guidelines: Backups are faster if files already compressed are left compressed. Compression is not supported in some environments (such as a NetWare 3.11 server, a DOS workstation, or Novell Storage ServicesTM). If you intend to restore a file that is currently compressed to an environment that does not support compression, back it up in a decompressed state.
-
Manual 99a 38 July 17, 2001 Setting Minimum Packet Receive Buffers Packet receive buffers represent the space in the server memory dedicated to handling network traffic. If the buffers are set too low, the server performance may be degraded. To reset the packet receive buffers at the server console prompt, include the following SET command in the STARTUP.NCF file: SET MINIMUM PACKET RECEIVE BUFFERS = X The x represents the number of buffers. Set two buffers for each user on the system.
-
Manual 99a 38 104 Storage Management Services Administration Guide Storage Management Services Administration Guide 103-000134-001 August 29, 2001 Novell Confidential July 17, 2001
-
Manual 5 99a 38 July 17, 2001 Troubleshooting Common Backup Problems The media owner is unidentified Possible Cause: Action: Media is blank or was written in a non-SIDF format. See “Checking the Media Status in a Device” on page 91. Backup speed is slow Possible Cause: Action: Compressed files are being backed up in a decompressed format. See “Compressed Files” on page 101. Restore speed is slow Possible Cause: File compression and SBCON are running at the same time.
-
Manual 99a 38 July 17, 2001 Data is corrupted, but no error message was given Possible Cause: Action: Compressed files were restored to a volume without compression. See Step 10 on page 64. You (the network administrator) can't back up a workstation Possible Cause: The /Password option is set and is denying access to data on the workstation. Action: See “Setting Rights to Back Up Portions of the eDirectory Tree” on page 26.
-
Manual 99a July 17, 2001 38 Files were restored but the error file contains a message specifying which name space formats were not restored Possible Cause: Action: The file attributes and name space formats are not configured on the volume you restored to. Check to make sure you selected the correct name space.
-
Manual 99a 38 108 Storage Management Services Administration Guide Storage Management Services Administration Guide 103-000134-001 August 29, 2001 Novell Confidential July 17, 2001
-
iPrint Administration Guide Novell NetWare 6 ® www.novell.
-
Manual 99a July 17, 2001 38 Contents Contents 5 Simplify Printing Using iPrint 7 Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1 Understanding iPrint 9 The Novell iPrint Solution . . . . . . . . . Scenario 1: Printing across the Internet Scenario 2: Mobile Users . . . . . . . . Scenario 3: Printing Instead of Faxing . 2 . . . . . . . . . . . . 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
-
Manual 5 A July 17, 2001 38 Printer Availability on Workstations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Printer Driver Default Install Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 28 Setting Up a Secure Printing Environment 31 Secure Printing Using SSL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Configuring the HTML Interface 33 iPrint Client HTML Interface Description . .
-
Manual 99a 38 July 17, 2001 Simplify Printing Using iPrint iPrint is Novell’s® next generation of printing software that lets users to print from anywhere to anywhere. Utilizing the Internet Printing Protocol standarad, iPrint lets users use their Web browser to install printers on their workstations. Once installed, users can print to iPrint printers through their applications just like any other printer. These printers can be located down the hall or across the ocean.
-
Manual 8 iPrint Administration Guide iPrint Administration Guide 103-000136-001 August 31, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 1 99a July 17, 2001 38 Understanding iPrint iPrint lets mobile employees, business partners, and customers access printers from a variety of remote locations using existing Internet connections. Whether users are located in an office building, telecommuting from home, or attending a sales meeting in another country, iPrint ensures that they can print documents quickly, easily, and reliably. Using a Web browser, users point to a Web page that displays the available printers.
-
Manual 99a 38 July 17, 2001 In addition to the benefits of IPP, Novell’s implementation of iPrint adds the following value: One Net printing for global access Print driver download and installation Location-based printing Browser-enabled print interface Customizable user interface Secure information transfer Using iPrint, mobile users no longer have to hunt down administrators to find out a printer’s name and context and the required print driver.
-
Manual 99a 38 July 17, 2001 Scenario 1: Printing across the Internet John is an employee working at home who wants to send a document to a printer at his office. John does not remember how to dial into the company’s network, but he has access to the Internet. 1. After the administrator has set up iPrint, he will need to enable a port on his firewall to allow access to the company’s intranet from the Internet. For security, the administrator should enable port 443, which uses SSL.
-
Manual 99a 38 July 17, 2001 Scenario 3: Printing Instead of Faxing Dan has just returned to his hotel room in Chicago after visiting with some clients. While checking his email, he is reminded that he needs to submit a color report to his boss in the corporate office in New York. The report is due by 8 a.m.Although he could send the report by fax, he wants a high-quality printout in color and he does not want to incur additional telephone charges. 1.
-
Manual 2 99a 38 July 17, 2001 Setting Up iPrint on Your Server iPrint is based on the Novell® Distributed Print ServicesTM (NDPS®) architecture. In order to use iPrint, you must have NDPS installed and configured. If you do not have an NDPS system set up, refer to the Novell Distributed Print Services Administration Guide for more information.
-
Manual 99a 38 July 17, 2001 iPrint System Requirements Before you set up iPrint, you must have the following: NDPS Broker:Provides network support services. For more information, see Creating NDPS Brokers in the Novell Distributed Print Services Administration Guide. Print Services Manager: Provides a platform for printer agents. When IPP printing is configured for a printer, the print services manager loads the IPP software, IPPSRVR.NLM.
-
Manual 99a 38 July 17, 2001 Enable DNS on the Print Services Manager To configure a DNS name for the print services manager, use the print services manager startup switch. Syntax NDPSM NDPS_Manager_Object_Name /dnsname=NDPS_Manager_DNS_Name Example NDPSM PrintManager1 /dnsname=Printing.MyCompany.Com where PrintManager1 is the print services manager name and Printing.MyCompany.Com is the desired DNS name.
-
Manual 99a 38 July 17, 2001 Configuring iPrint Printers Complete the following steps for printers that are already set up in NDPS. For more information on creating an NDPS printer, see Creating NDPS Printers in the Novell Distributed Print Services Administration Guide. 1 From iManage, click iPrint Management > Manage Printer. 2 Browse to and select the printer you want to enable IPP printing for. 3 Click Client Support > IPP Support. 4 Check the Enable IPP Access check box.
-
Manual 99a 38 July 17, 2001 Enabling iPrint on All Printers To enable iPrint on all printers associated with a print services manager, complete the following: 1 From iManage, click iPrint Management > Enable iPrint Access. 2 Browse to and select the print service manager you want to enable IPP printing for. 3 To enable all printers associated with this print services manager, check the first check box next to Enabled.
-
Manual 18 iPrint Administration Guide iPrint Administration Guide 103-000136-001 August 31, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 3 99a 38 July 17, 2001 Setting Up iPrint on Client Workstations In order for users to use iPrint, they need to install the Novell® iPrint Client software and a printer. When a user selects a printer to be installed by iPrint, iPrint checks to see if the Novell iPrint Client software is installed and installs it if necessary. Then the printer driver is downloaded, and the printer is installed in the user’s Printer folder.
-
Manual 99a 38 July 17, 2001 Using the Default Printer Lists Generated by iPrint To enable users to use iPrint, you must give them the iPrint URL, which is http://server_IP_ address_or_dns_name:631/IPP. For example, if the DNS name is printing.mycompany.com, then the user would access IPP from the following URL: http://printing.mycompany.com:631/ipp If users need to print through a secure port using SSL, they should use port 443.
-
Manual 99a 38 July 17, 2001 posted on a Web server for users to access. As users view the maps, they find a printer close to their location to install and then click a printer icon. The client software (if not yet installed) and the printer are installed on their workstation. For more information, see “Using the iPrint Map Designer” on page 23. Using ZENworks to Distribute iPrint You can use ZENworks to distribute the Novell iPrint Client and printers to users’ workstations.
-
Manual 99a 38 July 17, 2001 Saving Passwords for Secure Printers When users print to a secure printer, they are prompted for the eDirectory username and password. Users can select to have their workstation remember their password for printing. For Windows NT/2000 users, passwords are saved on a per-user basis. By default the Remember Password feature is enabled. To disable it, use a text editor to edit the SYS:\LOGIN\IPPDOCS\IPRINT.INI file to reflect the settings you want.
-
Manual 4 99a July 17, 2001 38 Customizing iPrint This chapter describes how to customize iPrint for your company by using the iPrint Map Designer and modifying the HTML pages and iPrint Client interface.
-
Manual 99a 38 July 17, 2001 made outside of the iPrint Map Designer are not supported. If you need to add links to a map, you should create a frameset file and then display the map file in one frame and display your links in a different frame. Creating a Map 1 Copy all of your background images (maps) to SYS:LOGIN\IPPDOCS\IMAGES\MAPS on the server. File types that can be used for background images are .JPEG, .GIF, and .BMP.
-
Manual 99a 38 July 17, 2001 8 (Optional) In the Printer Caption field, enter the information to display, using Enter to parse the information onto multiple lines. 9 Repeat Step 4 through Step 8 and to add additional printers to your map. 10 To edit a printer’s information, click the desired printer’s icon and then edit the printer information fields. To deselect a Printer icon while in the map, click anywhere in the design area. 11 Click Save, and save the Map to SYS:LOGIN\IPPDOCS.
-
Manual 99a 38 July 17, 2001 Using the Keyboard with iPrint Map Designer You can use the keyboard to create maps using iPrint Map Designer. The table below lists the tasks to complete and the corresponding keystrokes required. Table 1 Using the Keyboard Task Press Move between fields Tab Insert printer icon Insert key Before you can insert a priner, your focus must be the design area.
-
Manual 99a 38 July 17, 2001 Customizing the HTML Interface You can edit any of the HTML files provided or you can create your own to customize iPrint for your environment. The HTML files are installed in the SYS:LOGIN\IPPDOCS directory. For information on the HTML interface, see Appendix A, “Configuring the HTML Interface,” on page 33.
-
Manual 99a 38 July 17, 2001 Printer Driver Default Install Options You can change the default options for the printer driver when it is installed on the workstation. For example, you might want the printer driver default for paper size to be 8-1/2 x 11. This means every time the printer and corresponding driver is installed on a workstation, the paper size is set at 8-1/ 2 x 11.
-
Manual 99a July 17, 2001 38 Printer Setting Acceptable Parameter Values Color yes=color no or false=monochrome Duplex simplex, horizontal, vertical Collate yes or true=collate no=do not collate 4 Save the file.
-
Manual 30 iPrint Administration Guide iPrint Administration Guide 103-000136-001 August 31, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 5 99a 38 July 17, 2001 Setting Up a Secure Printing Environment Setting up a secure printing environment can be done on three different levels. Access Control lets you assign users to a User, Operator or Manager role to control printers, print services managers, and brokers. For more information, see Managing Printing Security in the Novell Distributed Print Services Administration Guide.
-
Manual Table 3 99a 38 July 17, 2001 Effects of Printer Security with Secure Printing Enabled Printer Security Level Secure Printing Disabled (No SSL) Secure Printing Enabled (With SSL) Low Full access eDirectory authentication Medium Check of user’s effective rights eDirectory authentication and check of user's effective rights High Users must use SSL and authenticate to eDirectory eDirectory authentication, check user’s effective rights, and connection verification Users will receive an er
-
Manual A 99a 38 July 17, 2001 Configuring the HTML Interface This appendix discusses the HTML parameters and operations used in the iPrint interface. This information is provided to give developers insight into how to customize their HTML files. Using this information, HTML developers can edit iPrint Web pages to customize them for their companies. The iPrint HTML files are located in the SYS:\LOGIN\IPPDOCS directory.
-
Manual 99a 38 July 17, 2001 Internet Explorer Browser Customization “HTML Script Example” on page 34 “HTML Code Example” on page 35 HTML Script Example The ExecuteRequest() operation simplifies HTML coding when working with Internet Explorer. It lets you pass/get information from the iPrint without having to reload a Web page. A result type called object is implemented and should be used only in conjunction with ExecuteRequest().
-
Manual 99a 38 July 17, 2001 HTML Code Example The following defines the interface between HTML pages and the browser plug-in. The HTML element
-
Manual 99a 38 July 17, 2001 HTML Parameters The following parameters can be used to enhance the iPrint HTML pages. The parameters are used in the HTML files as PARAM NAME=parameter VALUE=identifier statements.
-
Manual 99a 38 July 17, 2001 driver-options As a printer is being installed, the plugi-n can optionally set some default driver options. For a list of driver options, see Table 2, “Driver Default Setting Options,” on page 28 Example: PARAM NAME=driver-options VALUE=papersize:A4;duplex:vertical;color:false error-type Used to tell the plug-in how to report errors associated with the requested operation. The plug-in has the ability to return the errors in. Option Description none No response.
-
Manual 99a 38 July 17, 2001 job-list The plug-in can perform several operations on jobs. job-list is a commadelimited string of job IDs to indicate which jobs to operate on. A job list with the job ID of -1 is equivalent to selecting all jobs Example: PARAM NAME=job-list VALUE=3,5,7 job-list-options When the plug-in creates the HTML for job-list, it can add buttons to allow the user to hold, resume, delete, or display information for selected jobs.
-
Manual 99a 38 July 17, 2001 Examples: PARAM NAME=persistence VALUE=volatile-reboot PARAM NAME=persistence VALUE=volatile-date-time:2001,3,22,8,30 printer-url Indicates which printer the operation should be directed to. Example: PARAM NAME= printer-url VALUE=ipp://DNS name/ipp/printername result-type Used to tell the plug-in how to report the results of the requested operation. The plug-in has the ability to return the results in one of the following ways: Option Description none No response.
-
Manual 99a 38 July 17, 2001 Supported Operations Strings All requests to the plug-in have two required parameters. The first is operation, and the second is results-type. All operations except op-clientinterface-version and op-client-version-info require the parameter printer-url. All requests support the optional parameter error-type.
-
Manual 99a 38 July 17, 2001 op-client-interface version Description: Determines a version associated with the plug-in’s HTML interface. Can also determine if a client upgrade needs to be invoked or for any other client plug-in/HTML file compatibility issues. Required information: None Supported return types: URL, Cookie op-client-is-printer-installed Description: Determines if the indicated printer is installed on the workstation.
-
Manual 99a 38 July 17, 2001 op-job-get-info Description: Gets job information for indicated jobs. The information returned depends on the printer's capabilities. This information can include job name, ID, owner, size, bytes processed, hold until, priority, time created, time started printing, and time finished printing. Required information: Printer URL, job-list Supported return types: Message box, HTML, URL, Cookie Description: Put sa hold on the indicated jobs.
-
Manual 99a 38 July 17, 2001 op-printer-get-info Description: Gets additional information about the printer. The information returned depends on the printer's capabilities. This information can include printer location, printer make and model, and supported document formats (PDLs). Required information: Printer URL Supported return types: Message box, HTML, URL, Cookie op-printer-get-status Description: Gets status information from the indicated printer.
-
Manual 99a 38 July 17, 2001 op-printer-list-all-jobs Description: Lists jobs for this printer. Required information: Printer URL Supported return types: Message box, HTML, URL, Cookie op-printer-pause Description: Pauses the printer. If results are requested for this operation, the op-printer-get-status operation is executed to provide the new printer status.
-
Manual 99a 38 July 17, 2001 op-printer-resume Description: Resumes the printer. If results are requested for this operation, the op-printer-get-status operation is executed to provide the new printer status. Required information: Printer URL Supported return types: None, Message box, HTML, URL, Cookie op-printer-send-file Description: Sends a printer-ready file to this printer.
-
Manual 46 iPrint Administration Guide iPrint Administration Guide 103-000136-001 August 31, 2001 Novell Confidential 99a 38 July 17, 2001
-
Novell Distributed Print Services Administration Guide Novell NetWare 6 ® www.novell.
-
Manual 99a July 17, 2001 38 Contents Welcome to Novell Distributed Print Services 11 Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 1 Understanding Novell Distributed Print Services 13 Overview of NDPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Bi-directional Feedback and Control . . . . . . . . . . . . . . . . . . . Configurable Event Notification. . . . . . . . . . . . . . . . . . . . . . Tight Integration with eDirectory . .
-
Manual Using Legacy Printers and NDPS Gateways . . . . . Printing through Third-party Gateways . . . . . . Printing through the Novell Gateway . . . . . . . Using Printers with Embedded NDPS Technology . . Migration Scenarios . . . . . . . . . . . . . . . . . . Migrating from Queue-Based Printing to NDPS . . Migrating from IPX-Based NDPS to IP-based NDPS . Migrating an IPX-Based Third-Party Gateway to IP Migrating a Printer in RP Mode to IP . . . . . . . Migrating a Printer in QServer Mode to IP . . . . .
-
Manual 99a Installing Printers on Workstations . . . . . . . . . . . Designating Printers to Be Automatically Installed . Designating a Default Printer . . . . . . . . . . . . Using Remote Printer Management . . . . . . . . . . How Remote Printer Management Works . . . . . Accessing Remote Printer Management . . . . . . Setting Up Printer Configurations . . . . . . . . . . . Creating Configurations . . . . . . . . . . . . . . Configuration Options . . . . . . . . . . . . . . . Modifying Configurations . .
-
Manual 7 99a Managing Printing Security Setting Printer Security Levels . . . . . . . . . . . . . . . . . . . . . . . Setting Access Control for NDPS Printers. . . . . . . . . . . . . . . . . . Printer Access Control Roles . . . . . . . . . . . . . . . . . . . . . . Assigning Printer Access Control Roles through NDPS Printer Objects. Assigning Printer Access Control Roles through User Objects . . . . . Planning Your Printer Connections and Locations for Better Security. .
-
Manual 99a 38 Tracking Jobs from a Workstation . . . . . . . . . . . . . . . . . . . . . . E1. Pause output of NDPS printer . . . . . . . . . . . . . . . . . . . . E2. Check job list in iManager . . . . . . . . . . . . . . . . . . . . . . E3. Resume printer output . . . . . . . . . . . . . . . . . . . . . . . . E4. Job printed this time but nothing was changed. . . . . . . . . . . . E5. Job did not print and is still in the job list . . . . . . . . . . . . . . . E6.
-
Manual 10 99a 38 Novell Distributed Print Services Administration Guide Novell Distributed Print Services Administration Guide 103-000137-001 August 31, 2001 Novell Confidential July 17, 2001
-
Manual 99a 38 July 17, 2001 Welcome to Novell Distributed Print Services Novell® Distributed Print ServicesTM (NDPS®) offers improvements over Novell's legacy queue-based print service architecture. NDPS was designed to handle the increased complexity of managing modern printers in a network environment and to exploit the new functionality offered by these printers.
-
Manual 99a 38 July 17, 2001 Chapter 5, “Managing the Print Services Manager,” on page 87 Chapter 6, “Managing the Broker,” on page 91 Chapter 8, “Troubleshooting Your Print System,” on page 111 Documentation Conventions In this documentation, a greater-than symbol (>) is used to separate actions within a step and items in a cross-reference path. Also, a trademark symbol (®, TM, etc.) denotes a Novell trademark. An asterisk (*) denotes a third-party trademark.
-
Manual 1 99a 38 July 17, 2001 Understanding Novell Distributed Print Services Novell® Distributed Print ServicesTM (NDPS®) is the default and preferred print system in NetWare®. It is designed to handle the increased complexity of managing printing devices in any type of network environment, ranging in size from small workgroups to enterprise-wide systems. NDPS allows you to use iManage, Novell’s Web-based management tool.
-
Manual 99a 38 July 17, 2001 Some of the most significant features of NDPS include the following: “Bi-directional Feedback and Control” on page 14 “Configurable Event Notification” on page 15 “Tight Integration with eDirectory” on page 16 “Automatic Printer Driver Download and End User Convenience” on page 16 “Printer and Job Configuration Options” on page 17 “Job Scheduling Options” on page 17 “Protocol Independence” on page 17 “Compatibility with Multiple Clients, Applications, and Oper
-
Manual is the printer available? what is the status of the printer? what features are available? how many copies are printing? what media is being used? has the job actually printed out? 99a 38 July 17, 2001 printer is available toner is low duplex, tabloid-size, color, . . . five copies will be printed upper tray, transparency job has been printed The bi-directional feedback provided by NDPS is limited only by the bidirectional capabilities of the printer itself.
-
Manual 99a 38 July 17, 2001 Tight Integration with eDirectory Novell Distributed Print Services is designed to take full advantage of Novell eDirectory. Integration with eDirectory allows you to create a single eDirectory object—an NDPS Printer object—to represent each printer on the network. As a Printer object, printers become as secure as the other objects in the tree, and they are just as easy to manage. In the eDirectory tree, printers can be conveniently grouped.
-
Manual 99a 38 July 17, 2001 From this list, you can select drivers you want to be automatically downloaded and installed on client workstations. You can add drivers to this database as they become available. Printer and Job Configuration Options The NDPS interface supports many printer options in common use today, while the open architecture of NDPS allows printer manufacturers to add their own custom interfaces for specific printers.
-
Manual 99a July 17, 2001 38 Non-enhanced clients NDPS printer DOS OS/2 NON-NDPS PRINT JOBS Queue Mac Unix Enhanced clients Windows NT/2000 NDPS-aware printer Windows 95/98/ME Server ADVANCED NDPS FEATURES Support for Existing Printers (Full Backward Compatibility) NDPS lets you preserve your investment in your existing printing resources. All clients can print to legacy printers. All currently available printers can be used in NDPS environments.
-
Manual 99a 38 July 17, 2001 Comparing NDPS with Queue-Based Print Services The architecture of Novell legacy queue-based print services was based on the creation and linking of three components: printers, print queues, and print servers. Setting up queue-based printing was often a complex task. In order to print, users first had to capture the printer port. Then the client would redirect the data to a file in a print queue, where it was stored while waiting to be sent to a printer by the print server.
-
Manual 99a 38 July 17, 2001 Queue-Based (Legacy) Print Services Novell Distributed Print Services Does not accommodate add-ons or extensions from third parties. Extensible framework for print devices, including snap-in interfaces. Administrators must create and configure Printer objects manually. Plug-and-print public access printing not available. Plug-and-print option available for installing public access printers using specially designed third-party gateways.
-
Manual 99a July 17, 2001 38 Understanding the Architecture of NDPS The architecture of Novell Distributed Print Services ensures the scalability of the printing environment, allowing you to print in LAN, WAN, and enterprise document production environments. It also allows you to print to devices ranging from simple dot-matrix printers to laser printers and large-scale production devices. eDirectory Object & BROKER.
-
Manual 99a 38 July 17, 2001 Understanding Printer Agents Before a printer can be incorporated into a NDPS printing environment, it must be represented by a Printer Agent. No Printer Agent can represent more than one printer, and no printer can be represented by more than one Printer Agent. The Printer Agent lies at the heart of NDPS, combining the functions previously performed by a printer, print queue, print server, and spooler into one intelligent and simplified entity.
-
Manual 99a 38 July 17, 2001 A Printer Agent provides the following services: It manages the processing of print jobs and many operations performed by the printer itself. Manages job processing PA job job Client Printer It answers queries from network clients about a print job or document, or about the attributes of the printer.
-
Manual Broker 99a 38 July 17, 2001 NDPS Manager Services SERVICE REGISTRY EVENT NOTIFICATION RESOURCE MANAGEMENT PA 3rdparty gateway PA NDPS gateway Understanding the NDPS Manager A NDPS Manager provides a platform for Printer Agents that reside on the server. An NDPS Manager must be created as an object in the eDirectory tree before you can create server-based Printer Agents. The NDPS Manager object stores information used by the NetWare Loadable ModuleTM (NLMTM), NDPSM.NLM.
-
Manual 99a 38 July 17, 2001 Where to Place NDPS Managers Use the following guidelines to determine where and when to place an NDPS Manager. Only one NDPS Manager can be loaded per server. Load this resource only on servers configured to service print jobs. The only exception to this rule is any server which has a printer connected directly to it. In that case, the NDPS Manager must be loaded on that server as well.
-
Manual 99a 38 July 17, 2001 developed to interact with specific proprietary printers, they can provide a wider array of information and offer options that are not available for the generic Novell gateway. Some third-party gateways provide utilities that can be configured to automatically create Printer Agents when one of their printers is attached to the network. For more information, see Chapter 9, “Selecting the Correct Gateway to Use,” on page 135.
-
Manual Broker 99a 38 July 17, 2001 NDPS Manager Services SERVICE REGISTRY EVENT NOTIFICATION RESOURCE MANAGEMENT PA 3rdparty gateway PA NDPS gateway Understanding the Broker The Broker provides three network support services not previously available in NetWare: the Service Registry Service (SRS), Event Notification Service (ENS), and Resource Management Service (RMS). While these services are invisible to end users, network administrators should be aware of them.
-
Manual Broker 99a July 17, 2001 38 NDPS Manager Services SERVICE REGISTRY EVENT NOTIFICATION RESOURCE MANAGEMENT PA 3rdparty gateway PA NDPS gateway Understanding the Service Registry Service The Service Registry allows public access printers to advertise themselves so that administrators and users can find them. This service maintains information about device type, device name, device address, and devicespecific information such as the printer manufacturer and model number.
-
Manual 99a 38 July 17, 2001 NOTE: For IPX, the SRS uses SAP type 8202; for IP environments, it uses Multicast. Through the SRS, plug-and-print public access printers, as well as those created manually, are immediately made available to users. If there are multiple Service Registries running on the network, they synchronize automatically. This synchronization allows users to choose public access printers anywhere on the network.
-
Manual 99a 38 July 17, 2001 The Event Notification service supports both consumers of events (users) and suppliers of events (printers). Users can register with the ENS by identifying the types of events they want to be notified about, while the printer can register the kinds of events it is capable of reporting. For example, the administrator for a specific printer (by default a Manager of that printer) can designate an Operator to be notified if the printer runs out of paper or if the toner is low.
-
Manual 99a 38 July 17, 2001 Understanding the Resource Management Service This service allows resources to be installed in a central location and then downloaded to clients, printers, or any other entity on the network that needs that resource. It provides a single place where a variety of file types are stored for immediate access by Novell Distributed Print Services (NDPS).
-
Manual 99a 38 July 17, 2001 Automatic printer driver download from a central repository Plug-and-print printer availability Availability of network resources to applications through a common interface For more information about other brokered services, see the following: “Understanding the Service Registry Service” on page 28 “Understanding the Event Notification Service” on page 29 Where to Place NDPS Brokers Although the distribution of your Brokers is not really a critical issue initially,
-
Manual 99a 38 July 17, 2001 Issue Recommendations Reliability of server / fault tolerance On multi-server networks, enable at least two SRS per network.Network traffic (network layout) Enable at least one SR per site (WAN link). Memory 1MB base for SR, an additional 10KB per resource added (such as NDPS Manager) Event Notification Service: NDPS printers can be configured to provide event notification of print jobs and printer status.
-
Manual 99a 38 July 17, 2001 a variety of file types are stored for immediate access by NDPS. For more information, see “Understanding the Resource Management Service” on page 31. 34 Issue Recommendations Number of trees Enable at least one RMS per tree. Reliability of server / fault tolerance On multiserver networks, enable at least two RMS per tree.
-
Manual 2 99a 38 July 17, 2001 Planning the Migration to Novell Distributed Print Services There is no single ideal strategy for implementing the Novell® Distributed Print ServicesTM (NDPS®) printing system or for upgrading your current queue-based system to take advantage of the many printer management and ease-of-use features provided by NDPS.
-
Manual 99a 38 July 17, 2001 Establishing your planning base consists of the following tasks: “Assessing Your Current Printing Environment” on page 36 “Identifying Critical Planning Issues” on page 37 “Designing Your New System” on page 39 Assessing Your Current Printing Environment Beginning with NetWare® 5, NDPS became the default and preferred print system while still offering compatibility with Novell’s legacy, queue-based print system.
-
Manual 99a 38 July 17, 2001 Migrating any of these configurations to NDPS will result in simpler and more reliable printing, in addition to the benefits inherent in using NDPS. Non-NetWare SystemIf you are implementing a new Novell network from scratch, or if you are changing over from a different networking system altogether (such as Windows* NT*, Windows 2000, 3COM*, or LAN Manager*), you should implement NDPS as your printing solution.
-
Manual 99a 38 July 17, 2001 (CMD). Compatibility Mode is implemented as a set of system components that allow IPX client or server applications to locate and communicate with their IPX counterparts without IPX packets being visible on the wire. Compatibility Mode components translate SAP advertise and query requests into their SLP equivalents, allowing IPX applications to dynamically advertise and/or discover without generating IPX traffic on the wire.
-
Manual 99a 38 July 17, 2001 For guidelines on when and where to enable various brokered services, see Chapter 6, “Managing the Broker,” on page 91. Designing Your New System As a final planning step, before you begin the implementation process, you should create a written record of all the network resources and components that will be incorporated into your new printing system (printers, servers, workstation clients, routers, etc.).
-
Manual 99a 38 July 17, 2001 Determining Your Implementation Strategy Now that you have done some initial information-gathering, identified the major issues you will face, and created a diagram of the new eDirectory layout you want to implement, you can now consider your strategy for implementing your new or upgraded NDPS system. If you have not already done so, be sure to read Chapter 1, “Understanding Novell Distributed Print Services,” on page 13 in the before you proceed.
-
Manual 99a 38 July 17, 2001 See “Maintaining Your Queues during the Transition” on page 42 for more details on this printing configuration. Eventually, only a few queues serviced by NDPS Printer Agents will remain to support your DOS and Windows DOS-box printing needs, while most printing will be through the following basic NDPS configuration and its variations, which will be explained in “Using Legacy Printers and NDPS Gateways” on page 44. Determine which gateway you will use.
-
Manual 99a 38 July 17, 2001 Advantages to Running NDPS on the Server Additional Advantages of Running NDPS on Clients also Simpler management and configuration Local printer installation and management integrated into native operating system facilities Advanced error reporting and troubleshooting tools for administrators Public access printing Queues no longer needed Potentially less network traffic Improved error reporting and troubleshooting tools for users Advanced job-related event notificatio
-
Manual 99a 38 July 17, 2001 After you have created NDPS Printer objects to represent the printers that are still servicing queues, you can delete your legacy Print Server and Printer objects (but not your Queue objects) if you want, reducing the number of objects in your tree you need to manage.
-
Manual 99a 38 July 17, 2001 Understanding Your Implementation Options Possible scenarios for printing with NetWare range from maintaining a legacy queue-based system (available only for IPX-based systems), to integrating NDPS into a heterogeneous print system, to implementing a pure NDPS printing system in a Pure IP environment. A wide range of heterogeneous configurations exist between all IPX and Pure IP systems, and between allqueue-based and all-NDPS systems.
-
Manual 99a 38 July 17, 2001 Printing through Third-party Gateways A third-party gateway is designed specifically for a printer or printer family. NDPS Manager Novell client PA 3rdparty gateway Printer Agent Printer This scenario requires two components running on a NetWare server: the NDPS Manager and the third-party gateway. The NDPS Manager is an integral part of NDPS and implements a platform on which to run Printer Agents.
-
Manual 99a 38 July 17, 2001 Advantages of Printing through a Third- Disadvantages of Printing through a Party Gateway Third-Party Gateway Feedback and control as good as the protocols used by the gateway Simple administration Printing through the Novell Gateway For legacy and specialized printers that are not supported by third-party gateways, NetWare includes a generic Novell gateway that allows the NDPS Manager to communicate with print devices using the LPR/LPD protocol on IP, the Internet Printing
-
Manual 99a 38 July 17, 2001 Using Printers with Embedded NDPS Technology As printers with embedded NDPS technology become more available, this will become the optimal configuration and achieve the most powerful NDPS capabilities. PA Novell client NDPS-embedded printer With this configuration, administrators and end-users can directly interact with print devices. This configuration requires printers to have an embedded NDPS Printer Agent.
-
Manual 99a July 17, 2001 38 Migration Scenarios The following scenarios will help you better understand the process for making the transition to a NDPS environment that will best meet your printing needs.
-
Manual 99a July 17, 2001 38 NDPS Manager PA Novell client 3rdparty gateway Printer Agent Printer The Novell gateway provides a straightforward migration path. The NDPS configurations corresponding to the queue-based printing configurations illustrated earlier, as well as an additional configuration for Pure IP support, are shown in the following illustration: Queue QServer-mode printer See “Important” note below 1 RP-mode printer 2 NDPS Manager Novell client NPRINTER.
-
Manual 99a 38 July 17, 2001 The first NDPS configuration above is not recommended because a back-end queue is still required, increasing network traffic and delaying job completion.
-
Manual 99a 38 July 17, 2001 NDPS gateways to communicate with printers that have inherent IPX dependencies. This section provides guidelines for switching these configurations to use IP-based protocols. None of the changes described will require the clients' installation and configuration to change.
-
Manual 99a July 17, 2001 38 The Remote Printer protocol (RP) is inherently IPX-based. Configurations using printers in remote printer mode can use one of the following configurations to conform to an IP setting: LPR/LPD-mode printer 2 Printer Agent NDPS Manager PA PA RP-mode printer Migration Agent LPR 3rdNovell RP party gateway gateway LPT/COM 3 IP NPRINTER.
-
Manual 99a 38 July 17, 2001 Migrating a Printer in QServer Mode to IP NDPS Manager PA Printer Agent Novell gateway Queue QServer-mode printer The best alternatives for this scenario to support IP are to (1) use a third-party gateway (see “Migrating a Printer in RP Mode to IP” on page 51) or (2) reconfigure the Novell gateway to communicate with the printer through a different protocol altogether.
-
Manual 99a July 17, 2001 38 NetWare-to-UNIX Printing The following shows how to route jobs from NetWare out to a UNIX system.
-
Manual 99a July 17, 2001 38 UNIX-to-NetWare Printing This configuration uses the NFS Print Services to route print jobs from a UNIX system into NetWare.
-
Manual 56 99a 38 Novell Distributed Print Services Administration Guide Novell Distributed Print Services Administration Guide 103-000137-001 August 31, 2001 Novell Confidential July 17, 2001
-
Manual 3 99a 38 July 17, 2001 Setting Up a New NDPS Printing System Creating a new Novell® Distributed Print ServicesTM (NDPS®) system will not automatically disable your current printing setup. Users can continue to print just as they always have until you decide to replace old printing setup with NDPS. You can do this gradually or all at once.
-
Manual 99a 38 July 17, 2001 Getting Started The following tasks are basic to creating a new NDPS printing system. These steps assume that NetWare® is installed and running. 1. Create an NDPS Broker, if one does not exist. The Broker provides three network support services: the Service Registry Service, Event Notification Service, and Resource Management Service. See “Creating NDPS Brokers” on page 61 for more information. 2. Create an NDPS Manager.
-
Manual 99a 38 July 17, 2001 Workstations” on page 68 and “Setting Up LPR Clients on UNIX” on page 69 for more information. Novell Client 32: The Novell Client is required in order for NDPS features to be available on your client workstations. Other clients can print to NDPS printers through the backward compatibility feature, but only NDPS clients can take full advantage of the advanced features offered by NDPS. See “Preparing Client Workstations to Use NDPS” on page 69 for more information.
-
Manual 99a 38 July 17, 2001 Rights Required for Configuring NDPS Installation You must have the Supervisor right at the root of the tree because the schema will be modified. In order to install the resource database (in the SYS:NDPS\ RESDIR directory), the administrator must also have file system rights (rights to the volume) where it will be installed.
-
Manual 99a 38 July 17, 2001 Creating NDPS Brokers Each eDirectoryTM tree should have at least one NDPS Broker. You might want to create additional Brokers in certain situations. For example, you might want to create a Broker on a local server for each site on a wide area network (WAN). See “Where to Place NDPS Brokers” on page 32 for information on broker placement. 1 In iManage, click iPrint Management > Create Broker. 2 Fill in the fields. Click help for explanations about the fields. 3 Click OK.
-
Manual 99a 38 July 17, 2001 IMPORTANT: If you move the NDPS Manager to a different server, its database will move also. As a result, local printers assigned to this NDPS Manager will no longer work. To avoid this, you can assign a DNS name to the Manager before creating Printer Agents associated to it using the /dnsname= startup switch. For more information, see “NDPS Manager Startup Switches” on page 89.
-
Manual 99a 38 July 17, 2001 Prerequisites Have at least Read, Write, Modify, and Create rights for the destination container where its associated Printer object will reside Be designated as a Manager of the NDPS Manager that will control this Printer Agent Have a Broker running Have an NDPS Manager object created Procedure 1 In iManage, click iPrint Management > Create Printer. 2 Fill in the fields. Click help for explanations about the fields. 3 Click OK.
-
Manual 99a 38 July 17, 2001 Configuring LPR Printers UNIX, Macintosh, and other LPR clients can print to iPrint printers using LPR. IMPORTANT: In order for LPR to work, the printer agent name cannot contain spaces. If it does, you will need to rename the printer agent or select a different printer. 1 In iManage, click iPrint Management > Manage Printer. 2 Browse to and select the printer you want to enable LPR printing for. 3 Click Client Support > LPR Support.
-
Manual 99a 38 July 17, 2001 Setting Up NDPS Printers to Service Legacy Queues In many cases, you will want to continue using print queues while you make the transition to NDPS. This strategy is discussed in detail in “Making the Transition Gradually” on page 41. For information on how to set up your NDPS printers to service legacy queues, see “Supporting Queue-Based Client Workstations” on page 86.
-
Manual 99a 38 July 17, 2001 6 At the Gateway Types window, select the Novell Printer Gateway. For more information about using gateways, see “Selecting the Correct Gateway to Use” on page 135. 7 Configure the Novell PDS by selecting the Printer Type and Port Handler Type, and then click OK. 8 At the Connection Type field, select Forward Jobs to a Queue and then click Next. The Port Type options are grayed when you select the Queue connection type. 9 Provide the Queue Name and Queue User Name.
-
Manual 99a 38 July 17, 2001 You can select it from the browser to complete the following tasks: “Assigning Printer Access Control Roles through NDPS Printer Objects” on page 107 “Optimizing Event Notification” on page 82 Using Bindery Reference Queues While we strongly urge you to upgrade all of your printers to NDPS as soon as possible, you might still want to provide your users with access to queuebased printing resources for a variety of reasons.
-
Manual 99a 38 July 17, 2001 3 In the Create Print Queue dialog box, select Reference a Bindery Queue. Notice that the dialog changes when you select this option. 4 (Optional) If you want to assign a bindery reference queue name different from the queue's name on the legacy server, enter the reference name in the Print Queue Name field. If you do not want to assign a reference name, leave the field blank. 5 Click the browser button to select a bindery server and queue.
-
Manual 99a 38 July 17, 2001 3 Enter the printer address information. LPR Address: Enter the DNS name or IP address of the server where the NDPS printer agent is running. This is the LPR Host address displayed when enabling LPR for a printer. Queue: Enter the printer agent name. This name may not include spaces. This is the LPR Printer/Queue name displayed when enabling LPR for a printer. 4 Click Create and save the printer to a desired location on the Macintosh.
-
Manual 99a 38 July 17, 2001 Enabling NDPS on a Previously Installed Client If you have previously installed the correct version of the Novell Client on one or more Windows workstations but you did not enable NDPS at that time, you will need to add go to your network properties and add the service Novell Distributed Print Services. On Windows 3.x workstations, you must reinstall the Client to enable NDPS.
-
Manual 4 99a July 17, 2001 38 Managing Printers Although the default settings in Novell® Distributed Print ServicesTM (NDPS®) allow your users to print without further configuration being necessary, you will probably want to modify some of those settings so that you can manage your printing resources most effectively. While most tasks can be done in iManage, some tasks will require you to use NetWare® Administrator.
-
Manual 99a 38 July 17, 2001 Viewing Print Job Information You can view information about individual print jobs waiting to be processed by a specific printer by using the following procedure. 1 In iManage, click Print Management > Manage Printer. 2 Browse to and select the printer the job was sent to. 3 Click Printer Control > Jobs. Information about the print jobs is displayed.
-
Manual 99a July 17, 2001 38 Moving Print Jobs NDPS allows operators and job owners to copy or move a print job to another printer. The target printer must be running on the same server (managed by the same NDPS Manager) as the printer on which the job currently resides. Also, the target printer must be compatible with the driver that formatted the job. For example, if a job was formatted with an HP5si driver, it should not be copied or moved to an HP LaserJet* III.
-
Manual 99a 38 July 17, 2001 Administrators can modify any print job after it has been submitted if the job has not yet started printing. Users can modify only their own print jobs. To modify a job, do the following. 1 In NetWare Administrator, select the printer the job was sent to from the browser window, and then click Jobs/Job List. If you want to see a list of jobs already processed and being retained, click the Show Retained Jobs option. 2 Select the job you want to modify.
-
Manual 99a July 17, 2001 38 Designating Printers to Be Automatically Installed While NDPS allows users to download and install printers on their workstations, it also allows administrators to designate printers to be downloaded and installed automatically. These printers then appear on the user's installed printers list with no action required by the user. You can designate a printer to be installed automatically by using the Remote Printer Management feature in iManage.
-
Manual 99a 38 July 17, 2001 How Remote Printer Management Works After a printer has been designated for automatic installation on a user's workstation, this information is stored on the eDirectory container object where the administrator has configured it. When a user logs in after the machine is rebooted, the workstation's client software checks the container object where the User object resides for the Remote Printer Management configuration.
-
Manual 99a July 17, 2001 38 From the Details page for the Container object By pressing the NDPS Remote Printer Management button from this page, you can manage printers for this container only. From the Details page for a specific printer By pressing the NDPS Remote Printer Management button from this page, you can remotely manage that printer. From Users and Groups Setting Up Printer Configurations If you use configurations wisely, they can help you manage your system more effectively.
-
Manual 99a 38 July 17, 2001 “Modifying Configurations” on page 80 “Setting Configuration Locks” on page 81 Creating Configurations Use the following procedure in NetWare Administrator to create a new configuration based on the current Default Configuration. 1 Select the NDPS Printer object that you want to create a configuration for. 2 Click the Configuration button.
-
Manual 99a July 17, 2001 38 job will print in relation to other jobs with different priorities sent to this printer. Banner: A list of banner pages users can select from. Banner pages will be printed at the beginning of print jobs using the configuration. (If multiple copies of a document are printed, the banner page will only be printed at the beginning of the first copy.
-
Manual 99a 38 July 17, 2001 Operator does not intervene. This setting can be changed at the server console by changing the Configuration setting Job Wait Time.) Retain Job No Longer Than. The maximum amount of time that jobs using this configuration can be retained after printing before being deleted (Minutes, Hours, Days, Years). By default, jobs are not retained. Retain Job For.
-
Manual 99a July 17, 2001 38 4 Assign the configuration properties you want for print jobs. For specific information about these tabs, see “Configuration Options” on page 78. If you want to lock certain configuration properties so that workstation users cannot modify them, see “Setting Configuration Locks” on page 81. 5 Click OK in the Printer Configuration dialog box. 6 Click OK in the NDPS Printer Details dialog box. Your changes will not be saved until you have done this.
-
Manual 99a 38 July 17, 2001 Use the following procedure to lock one or more properties for a printer. 1 In iManage, click iPrint Management > Manage Printer. 2 Browse to and select the printer you want to lock a property on. 3 Click the Configuration tab. 4 Check the check boxes of the properties you want to lock. 5 Click OK.
-
Manual 99a July 17, 2001 38 Delivery Methods The availability of the following delivery options are dependent on which of them you have enable. See “Enabling Event Notification Delivery Methods” on page 97 for more information. Pop-up notification. Messages will pop up on the screen of individuals designated to receive them. Users designated for pop-up notification must have a default server defined in their User Environment specified in NetWare Administrator.
-
Manual 99a 38 July 17, 2001 Notification for a Configuration The following procedure explains how to configure job-owner notification by modifying an existing configuration. You can also configure job-owner notification when creating a new configuration. 1 In NetWare Administrator, select the printer that you want to configure. 2 Click the Configuration button.
-
Manual 99a July 17, 2001 38 Setting Print Job Spooling Although NDPS has eliminated the need to send print jobs through queues, jobs submitted to NDPS printers will often need to be stored somewhere when the printer is already processing other jobs or when the job is on hold or retain status. Job spooling allows you to specify where you want jobs to be stored while they await processing.
-
Manual 99a 38 July 17, 2001 There are four common job scheduling algorithms available: First In, First Out, Print Shortest Job First, Minimize Media Changes, Backward Compatibility. 5 Click OK. Supporting Queue-Based Client Workstations If your network includes clients like Macintosh and OS/2 that are not able to send jobs to Printer Agents directly, the backward compatibility of Novell Distributed Print Services (NDPS) allows these clients to submit jobs to the same queues they always have.
-
Manual 5 99a 38 July 17, 2001 Managing the Print Services Manager Although the default settings in Novell® Distributed Print ServicesTM (NDPS®) allow your users to print without further configuration being necessary, you will probably want to modify some of those settings so that you can manage your printing resources most effectively.
-
Manual 99a 38 July 17, 2001 Modifying the Database Backup Options 1 At the server console, go to the Available Options menu for the NDPS Manager. 2 Select NDPS Manager Status and Control > Database Options. 3 Modify the desired settings. 4 Escape back out to the Available Options menu. Restoring a Database from eDirectory 1 At the server where you want to restore the database, enter load ndpsm /dbvolume See “NDPS Manager Startup Switches” on page 89 for more information.
-
Manual 99a 38 July 17, 2001 If you need to use a startup switch, see “NDPS Manager Startup Switches” on page 89. 3 Select the NDPS Manager object you want to load. A specific NDPS Manager can run only once. You will be prompted to download the database, and the Manager will start running. NDPS Manager Startup Switches Syntax : load ndpsm NDPS_Manager_name_and_context /startup parameter Example: load ndpsm .sales_manager.corp.
-
Manual 99a 38 July 17, 2001 Startup Parameter Description dbvolume=full_DNS_volume name Download the database from NDS® and reconnect pointers to the local server where the command is executed. This is useful for moving the NDPS Manager to a new volume. dbvolume=nocheck The NDPS Manager will not validate that the database volume is local. This is used with Clustering. setens=broker_name Set the Event Notification Service to the specified broker for all printers associated this NDPS Manager.
-
Manual 6 99a July 17, 2001 38 Managing the Broker Although the default settings in Novell® Distributed Print ServicesTM (NDPS®) allow your users to print without further configuration being necessary, you will probably want to modify some settings so that you can manage your printing resources most effectively.
-
Manual 99a 38 July 17, 2001 To add new resources through the Resource Management Service, do the following. 1 Make sure the Resource Management Service is enabled either in iManage or by going to your server console and viewing the Broker status screen. 2 In iManage, click Manage Broker and then browse to and select the Broker you want to work with. 3 Click Resource Management Service and then the resource you want to work with. 4 Add or delete resources. 5 Click OK.
-
Manual 99a July 17, 2001 38 Adding Banners to the Resource Management Service 1 Make sure the Resource Management Service is enabled either in iManage or by going to your server console and viewing the Broker status screen. 2 In iManage, click Manage Broker and then browse to and select the Broker you want to work with. 3 Click Resource Management Service > Banners. 4 Add or delete banners. 5 Click OK.
-
Manual 99a 38 July 17, 2001 All custom banners that are created should have one of these extensions. When creating custom banners, keep in mind that complex banners will increase the print time for jobs. Here are some tips for creating an efficient banner: Use internal/resident printer fonts instead of rasterized system fonts. When using graphics, use vector graphics when possible. Bitmaps take up a lot more space. Avoid half-toned images.
-
Manual 99a July 17, 2001 38 3 Add the banner to the Resource Management Service. See “Adding or Updating Brokered Resources” on page 91 for more information. Creating a PostScript Banner A working knowledge of the Adobe* PostScript printer definition language is needed in order to create a custom PostScript banner. The easiest way to create a PostScript banner is to create the banner using an application like WordPerfect or MS Write.
-
Manual 99a 38 July 17, 2001 Adding or Updating Printer Drivers A printer driver is a software entity that directly supports a physical printer, enabling it to carry out the functions it is intended to perform. Hardware vendors develop printer drivers, which are specific to each printer. Most printers require different printer drivers for each operating system they interact with.
-
Manual 99a July 17, 2001 38 When adding a resource, you will need to browse to the location of the print driver’s .INF file. If the file contains multiple print drivers, you will need to select the drivers you want to add to RMS. 5 Click OK or Apply to save your changes to the database. The drivers will not be added to the database until you do this. The process described above might not work if the driver installation .
-
Manual 99a 38 July 17, 2001 5 Specify the ENM filename for the notification method you want to load. This ENM must be in your server\SYS:SYSTEM directory or in another location in your server's search path in order to be loaded. The Broker object will load this notification method automatically in the future. Enabling and Disabling Brokered Services When NDPS is initially installed, the three network services provided by the NDPS Broker are automatically enabled on the Broker object.
-
Manual 99a July 17, 2001 38 If the Resource Management Service cannot be enabled, check for one of the following problems: The Broker object does not have rights to access the RMS data storage area (the default is NDPS\RESDIR\). Use NetWare Administrator to grant the Supervisor right to the Broker for that subdirectory. The RMS data storage area has a directory name that is longer than eight characters or includes invalid characters.
-
Manual 99a 38 July 17, 2001 the Broker saying that the Broker cannot be enabled. (You can copy resources from another RMS to this directory if you want.) Procedure The following procedure explains how to reconfigure an existing Broker object or move your brokered resources to a different location. 1 In NetWare Administrator, select the Broker object you want to reconfigure. 2 If you want to change the location of your resources, complete the following: 2a Click Resource Management.
-
Manual 99a July 17, 2001 38 Broker Startup Switches Syntax: load broker broker_name_and_context / startup_parameter Example: load broker .sales_manager.corp.acme / dbvolume=sales_sys The following lists the startup switches you can use when loading BROKER.NLM. Startup Parameter Description noui Loads the Broker without displaying the user interface. noipx The NDPS Manager will not support the IPXTM protocol. noip The NDPS Manager will not support the IP protocol.
-
Manual 99a 38 102 Novell Distributed Print Services Administration Guide Novell Distributed Print Services Administration Guide 103-000137-001 August 31, 2001 Novell Confidential July 17, 2001
-
Manual 7 99a 38 July 17, 2001 Managing Printing Security NDPS® is designed to take full advantage of eDirectoryTM. You receive all the benefits of eDirectory security and the easy management provided by the industry's most advanced and robust directory service. The Access Control feature for NDPS allows you to specify the access each User, Group, or container object will have to your NDPS printing resources.
-
Manual 99a 38 July 17, 2001 Setting Printer Security Levels Printer security levels affect how rights to a printer are determined and enforced. The default security level is Medium. With sensitive print data, you might want to set the security level to High; however, performance will be effected. Printer Security Level Secure Printing Enabled Low Security is enforced by the client applications only Medium (default) Security is enforced by NDPS Manager if print data integrity is involved.
-
Manual 99a 38 July 17, 2001 Setting Access Control for NDPS Printers Printer security is ensured through the assignment of the Manager, Operator, and User access control roles and by the strategic placement of your printers and printer configurations. You can assign multiple Printer objects to represent a single Printer Agent. You can then make different access control assignments to each Printer object.
-
Manual 99a 38 July 17, 2001 Role Description Manager NDPS tasks performed exclusively by the Printer Manager are those that require the creation, modification, or deletion of NDPS Printer objects, as well as other eDirectory administrative functions. Printer Managers are automatically designated as printer Operators and Users as well, so they can perform all tasks assigned to the Operator role.
-
Manual 99a 38 July 17, 2001 Assigning Printer Access Control Roles through NDPS Printer Objects Different User, Group, or container objects can have different access rights to the same printer. For example, if you want only certain users to be able to send jobs to a particular printer, you can specify which users should have access and what access roles each will be given. 1 In iManage, click iPrint Management > Manage Printer. 2 Browse to and select the printer you want to enable Access Control for.
-
Manual 99a 38 July 17, 2001 Planning Your Printer Connections and Locations for Better Security Depending on your organization's needs, the network administrator can attach printers directly to NetWare® servers or to the network. Both types of setup can provide security and administrative advantages. The ideal combination for each installation is different and will change as needs change. Be sure to consider the advantages of each approach when you set up your network.
-
Manual 99a 38 July 17, 2001 Role Description Manager NDPS tasks performed exclusively by the Manager are those that require the creation, modification, or deletion of eDirectory objects, or that involve other eDirectory administrative functions.
-
Manual 99a 38 July 17, 2001 Setting Access Control for NDPS Brokers Broker security is ensured through the assignment of the Manager access control role and by the optional assignment of a password to the Broker. Broker Access Control Roles The access control roles available to the NDPS Broker are Manager and Public Access User.
-
Manual 8 99a 38 July 17, 2001 Troubleshooting Your Print System This chapter focuses on troubleshooting issues that might arise with Novell® Distributed Print ServicesTM (NDPS®) printing. It also presents general principles that can be of value for a variety of network printer configurations, and it provides help for troubleshooting problems with the printer itself.
-
Manual 99a July 17, 2001 38 Initial Troubleshooting Steps Chart A NDPS Troubleshooting INITIAL PRINTING PROBLEM Attempt to resolve the error and try again. SEE NOTE Are there any error messages on printer, server, or client? YES A1 NO Try some quick fixes. SEE NOTE A2 Determine printing environment.
-
Manual 99a 38 July 17, 2001 A1. Attempt to resolve the error and try again With many printing problems, an error will be reported on the printer, the client trying to print, or the server. If an error condition exists, use the information provided to try to resolve the problem and then try again. If the error is on the printer, see your printer's operating manual. A2. Try some quick fixes Many times, printing problems occur due to simple or temporary conditions.
-
Manual 99a 38 July 17, 2001 A3. Determining your printing environment If there is no obvious solution to the problem, then you will need to begin analyzing your printing system. In order to find the problem, the printing environment being used must be identified. NetWare provides two printing environments: the legacy queue-based printing (see “A4. All queue-based environment” on page 114) and NDPS (see “A5. All NDPS environment” on page 115).
-
Manual 99a 38 July 17, 2001 For more information, see Troubleshooting General Printing Problems (http:/ /www.novell.com/documentation/lg/nw51/printenu/data/hlgnvvum.html) in NetWare 5.1 Queue-Based Print Services. A5. All NDPS environment If you have the new client software and are submitting jobs to the printer through Printer Agents and a Print Device Subsystem, then you are using NDPS. See “Narrowing Your Focus” on page 116 for more information. A6.
-
Manual 99a July 17, 2001 38 Narrowing Your Focus Chart B NDPS Troubleshooting START HERE Gather information on setup and configuration. SEE NOTE Send job to same printer from other workstation(s). B3 SEE NOTE B1 NO Has printing ever worked with the current configuration? NOTE B4 YES SEE CHART G NO Can other users print to the printer from their workstations? YES Has workstation printed to this printer before? NOTE NO Gather information on setup and configuration.
-
Manual 99a 38 July 17, 2001 B1. Send job to same printer from other workstations Try printing to the same printer from one or more different workstation. This will help you narrow your search to the specific workstation or to the whole printing system. B2.
-
Manual 99a July 17, 2001 38 Determining Your Platform When Problem Affects Only One Workstation Chart C NDPS Troubleshooting DETERMINE WORKSTATION'S PLATFORM DOS, Mac, UNIX (legacy, non-NDPS clients) Windows GO TO NO Are queues being serviced by an NDPS printer? NOTE C1 Don't know. SEE NOTE C4 YES Go to “Troubleshooting General Printing Problems” in QueueBased Print Services. SEE NOTE C2 Go to Chart H.
-
Manual 99a 38 July 17, 2001 C1. Are queues being serviced by an NDPS printer? Clients running on DOS, Macintosh, OS/2, and UNIX platforms are either queue-based, meaning that they print to network printers by redirecting jobs to a queue, or set up for LPR printing. You will need to determine whether the network printer is being serviced by a queue-based print server (such as PSERVER.NLM) or if NDPS is redirecting jobs through a Printer Agent. C2.
-
Manual 99a July 17, 2001 38 Isolating Printing Problems Affecting Only One Windows Workstation Chart D NDPS Troubleshooting START HERE Check Status of printer in Windows Control Panel. SEE NOTE D1 Status is good. Check to see what network object installed printer is servicing. SEE NOTE Printer is set for working offline D9 SEE NOTE SEE NOTE Are queues going to an NDPS printer? D3 NOTE Status is not good. NO D6 Go to Chart H.
-
Manual 99a 38 July 17, 2001 D1. Check status of printer in Windows Control Panel Printing from a Windows environment introduces several complexities which might or might not be related to the network or the printer. Some problems can be found and resolved right in the Windows environment. Check the status of the printer in the Windows Control Panel to see if any problems are evident. D2.
-
Manual 99a 38 July 17, 2001 D6. Are queues going to an NDPS printer? The next thing you need to know is whether the network printer is being serviced by a queue-based print server (such as PSERVER.NLM) or if NDPS is redirecting jobs through a Printer Agent. Load iManage and look to see if any NDPS Printer objects are defined. If no NDPS Printer objects are defined, there should be a Print Server object. Check the configuration of the print server to see if the queue is configured to be serviced by it.
-
Manual 99a July 17, 2001 38 Tracking Jobs from a Workstation Chart E NDPS Troubleshooting START HERE Pause output of NDPS printer. SEE NOTE E1 Resend the print job. Check job list in NetWare Administrator. SEE NOTE SEE CHART F SEE NOTE No E2 Yes Does print job appear in the job list? Resume printer output. SEE NOTE E3 E6 No Is job still in job list? Recheck the job list.
-
Manual 99a 38 July 17, 2001 E1. Pause output of NDPS printer One method of troubleshooting is putting stops in the printing process and then resending a job and testing how far in the process the job gets. The first stop you can make is pausing the printer output. Pausing printer output is a common technique used when troubleshooting printing; it forces NDPS to spool your print job and save it as a file.
-
Manual 99a 38 July 17, 2001 E4. Job printed this time but nothing was changed If the job printed now, there is no authoritative explanation as to why it didn't print the first time. If you followed these steps, no configurations have been changed; the job was only paused and released. Try printing the job again and see if normal printing continues. If not, try pausing the printer again and see if any other symptoms occur. E5.
-
Manual 99a July 17, 2001 38 Checking Printer Output and Using Test Files Chart F NDPS Troubleshooting START HERE Check availability of network printer. SEE NOTE F1 Pause output of NDPS printer. SEE NOTE SEE NOTE F2 No Does print job appear in the job list? NOTE SEE NOTE E1 Yes Resume printer output. SEE NOTE E2 E3 F5 No Is the job still in the job list? Recheck the job list.
-
Manual 99a 38 July 17, 2001 F1. Check availability of network printer Make sure that the printer is set to accept jobs. In iManage, verify that input is not paused. F2. Check for error messages With many printing problems, an error will be reported on the printer, the client trying to print, or the server. If an error condition exists, use the information provided to try to resolve the problem and then try again. If the error is on the printer, see your printer's operating manual.
-
Manual 99a 38 Printing Problems Affecting All Users 128 Novell Distributed Print Services Administration Guide Novell Distributed Print Services Administration Guide 103-000137-001 August 31, 2001 Novell Confidential July 17, 2001
-
Manual 99a July 17, 2001 38 Chart G NDPS Troubleshooting START HERE Determine degree of printing problems. SEE NOTE No print jobs are printing from any networked printer. SEE NOTE G1 No print jobs are coming from a specific printer. G2 SEE NOTE Jobs are printing but are slowed or corrupted. G3 SEE NOTE Determine printing environment. SEE NOTE A3 Printer Agent is pulling jobs from a queue. SEE NOTE Printer Agent is submitting print .jobs to a queue.
-
Manual 99a 38 July 17, 2001 G1. Determine severity and scope of printing problems If printing is affecting all users, determine the degree of severity of the printing problems. Can no users print from specific printers, or are no jobs printing from any network printer? Or are jobs printing, but printing slowly? G2.
-
Manual 99a 38 July 17, 2001 XON/XOFF might need to be enabled (serial printers). Your hardware (cable, port, printer) might be faulty. Job Corruption If jobs are printing in pieces, the printer might not have sufficient memory to hold the entire page to be printed. If it does not, it will print the part of the page it has in memory and continue printing on the next page. This problem occurs when printing jobs that contain large graphics. G5.
-
Manual 99a July 17, 2001 38 Problems Integrating with Queue-Based Components Chart H NDPS Troubleshooting PROBLEM: Jobs sent through a queue are not printing. PA Non-NDPS Client Queue NDPS Printer Agent NDPS Printer Printer is receiving jobs from an NDPS Printer Agent which is pulling the print jobs from a queue. Reconfigure spooling. Check Printer Agent job list.
-
Manual 99a 38 July 17, 2001 H1. Check the printer's spooling configuration Make sure the printer is configured to service the queue you are expecting the job to go to. See “Setting Print Job Spooling” on page 85 for more information. H2. Reconfigure spooling for this printer The spooling configuration specifies a different queue than the one you want this printer to service. See “Setting Print Job Spooling” on page 85 for information on how to configure job spooling. H3.
-
Manual 99a 38 134 Novell Distributed Print Services Administration Guide Novell Distributed Print Services Administration Guide 103-000137-001 August 31, 2001 Novell Confidential July 17, 2001
-
Manual 9 99a 38 July 17, 2001 Selecting the Correct Gateway to Use Gateways allow Novell® Distributed Print ServicesTM (NDPS®) clients to send jobs to printers that are not NDPS-aware (that is, printers that are not equipped with embedded NDPS Printer Agents). You select and configure a printer gateway when you create a new Printer Agent. Gateways translate NDPS queries or commands to printer-specific language that the physical printer can use.
-
Manual 99a 38 July 17, 2001 The Novell gateway supports most printers and provides support for other print systems. The gateway supports LPR/LPD printing and IPP printing. LPR is a UNIX-based printing protocol used by network-attached printers in TCP/ IP environments to service jobs submitted to print queues. Using Third-party Gateways A number of printer vendors have created their own gateways to run with Novell Distributed Print Services.
-
Manual A 99a 38 July 17, 2001 Configuring Remote Printers The NDPS® gateway allows you to configure all of your current remote printers so that they will work just as they always have, whether they are attached to a workstation or a remote file server or are directly attached to the network running in RP mode. A remote printer controlled by an NDPS Printer Agent will emulate a legacy print server (PServer Emulation) and will no longer require PSERVER.NLM.
-
Manual 99a 38 July 17, 2001 4 In the Printer Agent Source field, select Create a New Printer Agent and click Create. 5 Confirm the Printer Agent name (default is the name of the new printer you are creating) and browse to select the NDPS Manager you want to assign it to. 6 In the Gateway Types window, select the Novell Printer Gateway. For more information about using gateways, see “Selecting the Correct Gateway to Use” on page 135.
-
Manual 99a 38 July 17, 2001 13 At the workstation or remote server that this printer is attached to, run NPRINTER and select the SAP name specified in Step 10. Workstation users can now select the printer and print to it. Configuring Remote Printers Running in RP Mode These instructions are for configuring a printer attached directly to the network and running in RP mode, unless that printer is an HP printer.
-
Manual 99a 38 July 17, 2001 These drivers will be automatically downloaded to users' workstations when they install this printer in the future. Select a driver for each operating system. If you choose a Windows 3.x driver but not a Windows 95/98/ME or Windows NT/2000 driver, a 16-bit driver will be selected. Normally this will not create problems. Since the list of printer drivers shipped with this product is limited, you can add drivers to the Resource Management Service database.
-
Manual 99a 38 July 17, 2001 8 Select the printer driver for each client operating system. These drivers will be automatically downloaded to users' workstations when they install this printer in the future. Select a driver for each operating system. If you choose a Windows 3.x driver but not a Windows 95/98/ME or Windows NT/2000 driver, a 16-bit driver will be selected. Normally this will not create problems.
-
Manual 99a 38 142 Novell Distributed Print Services Administration Guide Novell Distributed Print Services Administration Guide 103-000137-001 August 31, 2001 Novell Confidential July 17, 2001
-
Novell eDirectory 8.6 Quick Start Novell eDirectory ™ www.novell.com 8.
-
QuickStart Rev 99a August 22, 2001 44 Contents Novell eDirectory Overview . . . . . . . . . . . . . . . . . . . . . . . 7 Supported Platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 For More Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Installing or Upgrading Novell eDirectory on NetWare . . . . . . 9 System Requirements. . . . . . . . . . . . . . . . Hardware Requirements . . . . . . . . . . . . . . Forcing the Backlink Process to Run . . . .
-
QuickStart Forcing the Backlink Process to Run . Prerequisites . . . . . . . . . . . Installing eDirectory on Linux . . . . ConfigurinG eDirectory on Linux . . Rev 99a August 22, 2001 44 . . . . . . . . . . . . . . . . . . . . 6 160-000267-001 November 30, 2001 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
-
QuickStart Rev 99a 44 August 22, 2001 To begin a QuickStart (English): Click in the box under the word Novell. Insert QuickStart and Title elements. 2. Type the product name. 3. Insert the HeadQS element and type the title of your card. 4. Put in your product version: Click Special > Variable > select the variable named Version > Edit Definition > enter the version number > click Done > Done. It will appear as background text replacing Version X.X.
-
QuickStart Rev 99a 44 8 000-0000-000 November 30, 2001 August 22, 2001
-
QuickStart Rev 99a 44 August 22, 2001 To begin a QuickStart (English): Click in the box under the word Novell. Insert QuickStart and Title elements. 2. Type the product name. 3. Insert the HeadQS element and type the title of your card. 4. Put in your product version: Click Special > Variable > select the variable named Version > Edit Definition > enter the version number > click Done > Done. It will appear as background text replacing Version X.X.
-
QuickStart Rev 99a 44 August 22, 2001 HARDWARE REQUIREMENTS Hardware requirements depend on the specific implementation of eDirectory. For example, a base installation of eDirectory with the standard schema requires about 74 MB of disk space for every 50,000 users. However, if you add a new set of attributes or completely fill in every existing attribute, the object size grows. These additions affect the disk space, processor, and memory needed.
-
QuickStart Rev 99a 44 August 22, 2001 Backlinks keep track of external references to objects on other servers. For each external reference on a server, the backlink process ensures that the real object exists in the correct location and verifies all backlink attributes on the master of the replica. The backlink process occurs two hours after the database is open and then every 780 minutes (13 hours). The interval is configurable from 2 minutes to 10,080 minutes (7 days).
-
QuickStart Rev 99a 44 August 22, 2001 If one or both of the following conditions exist, you must run DSREPAIR.NLM before installing the first eDirectory server in your tree: Any NetWare 5 server in your eDirectory tree is eDirectory 8. Your first installation of eDirectory 8.6 is on a NetWare 5 server that does not hold a writable replica of the root partition. To update the eDirectory schema: 1 Copy the appropriate DSREPAIR.
-
QuickStart Rev 99a 44 August 22, 2001 If you are running DSREPAIR.NLM from here Do this A server that holds a writable replica of the root partition Reapply the Post NetWare 5 Schema Update to your eDirectory tree. From any other server Click Advanced Options > Global Schema Operations > Request Schema from Tree. This action resynchronizes the schema from the root of the tree. 7 Close DSREPAIR.NLM before installing eDirectory on the server. If DSREPAIR.NLM is loaded, the server might not restart.
-
QuickStart Rev 99a 44 August 22, 2001 6 Select options. Follow the online instructions to install the support pack. During installation, the support pack might prompt you concerning extending the schema. Although you have already extended the schema for eDirectory, you most likely need to extend the schema for other functionality, such as Novell Licensing Services. 7 Take the server down, then restart it. If you checked the Reboot Server option in Step 6, the server automatically restarts.
-
QuickStart Rev 99a 44 August 22, 2001 7 Follow the online instructions concerning the Certificate Server, LDAP, languages, components, and products to install. 8 When the installation is completed, restore the lines that you commented out in Step 1a on page 14 > restart the server by clicking Yes. Repeat this procedure for each NetWare server you want to upgrade to eDirectory for NetWare.
-
QuickStart Rev 99a 44 16 000-0000-000 November 30, 2001 August 22, 2001
-
QuickStart Rev 99a 44 August 22, 2001 To begin a QuickStart (English): Click in the box under the word Novell. Insert QuickStart and Title elements. 2. Type the product name. 3. Insert the HeadQS element and type the title of your card. 4. Put in your product version: Click Special > Variable > select the variable named Version > Edit Definition > enter the version number > click Done > Done. It will appear as background text replacing Version X.X.
-
QuickStart Rev 99a 44 August 22, 2001 Two factors increase performance: more cache memory and faster processors. For best results, cache as much of the DIB Set as the hardware allows. eDirectory scales well on a single processor. However, Novell eDirectory 8.6 takes advantage of multiple processors. Adding processors improves performance in some areas, for example, logins and having multiple threads active on multiple processors. eDirectory itself is not processorintensive, but it is I/O-intensive.
-
QuickStart Rev 99a 44 August 22, 2001 INSTALLING NOVELL EDIRECTORY ON WINDOWS NT/2000 Novell eDirectory 8.6 for NT upgrades NT servers running NT Service Pack 4 or later and eDirectory 8.35 or later. If no eDirectory tree exists, you can install eDirectory 8.6. The installation program creates an eDirectory tree.
-
QuickStart Rev 99a 44 August 22, 2001 Updating the eDirectory Schema To upgrade an existing tree, run DSREPAIR on the server that contains the master replica of the Tree partition. IMPORTANT: If the master replica of the Tree partition resides on a NetWare server, follow the instructions in “Updating the eDirectory Schema” on page 11. The eDirectory installation program checks the existing schema’s version.
-
QuickStart Rev 99a 44 August 22, 2001 Follow the online instructions in the Installation Wizard. Select the type of setup you want to install: Directory: Use eDirectory to manage, configure, and store Directory Agents, scopes, and services. Local: The Directory Agent and its associated scopes and services are stored and configured through the local machine. Install ConsoleOne This option installs ConsoleOneTM 1.3. Follow the online instructions in the Installation Wizard.
-
QuickStart Rev 99a 44 22 000-0000-000 November 30, 2001 August 22, 2001
-
QuickStart Rev 99a 44 August 22, 2001 To begin a QuickStart (English): Click in the box under the word Novell. Insert QuickStart and Title elements. 2. Type the product name. 3. Insert the HeadQS element and type the title of your card. 4. Put in your product version: Click Special > Variable > select the variable named Version > Edit Definition > enter the version number > click Done > Done. It will appear as background text replacing Version X.X.
-
QuickStart Rev 99a 44 August 22, 2001 threads active on multiple processors. eDirectory itself is not processor-intensive, but it is I/O-intensive. The following table illustrates typical system requirements for Novell eDirectory for Solaris. Objects Processor Memory Hard Disk 100,000 Sun* Enterprise 220 384 MB 144 MB 1 million Sun Enterprise 450 2 GB 1.
-
QuickStart Rev 99a 44 August 22, 2001 PREREQUISITES eDirectory Server must be installed on all servers that you want to place an eDirectory replica on. Meet the “System Requirements” on page 23. Enable the Solaris host for multicast routing on the server on which you are installing the product. Enter the following command to check whether the host is enabled for multicast routing: /usr/bin/netstat -nr The following entry should be present in the routing table: 224.0.0.
-
QuickStart Rev 99a 44 August 22, 2001 4 Specify the option for the component you want to install. The appropriate packages are installed on the Solaris host. Table 3 lists the packages installed for each eDirectory component. Table 3 eDirectory Component Packages Installed Description eDirectory Server The eDirectory replica server will NDSbase, NDScommon, be installed on the specified server NDSsecur, NDSsecutl, NDSmasv, NDSserv, NDSimon, NDSrepair, NDSslp and NDSdexvnt.
-
QuickStart Rev 99a 44 August 22, 2001 2. Use the ldapconfig utility to modify, view, and refresh LDAP object attributes. 3. Use the nmasconfig utility to configure NMAS and the policy-based authentication methods (log in methods). 4.
-
QuickStart Rev 99a 44 28 000-0000-000 November 30, 2001 August 22, 2001
-
QuickStart Rev 99a 44 August 22, 2001 To begin a QuickStart (English): Click in the box under the word Novell. Insert QuickStart and Title elements. 2. Type the product name. 3. Insert the HeadQS element and type the title of your card. 4. Put in your product version: Click Special > Variable > select the variable named Version > Edit Definition > enter the version number > click Done > Done. It will appear as background text replacing Version X.X.
-
QuickStart Rev 99a August 22, 2001 44 Objects Processor Memory Hard Disk 100,000 Pentium* III 450-700 MHz (single) 384 MB 144 MB 1 million Pentium III 450-700 MHz (dual) 2 GB 1.5 GB 10 million Pentium III 450-700 MHz (2 to 4) 2 GB + 15 GB Requirements for processors might be greater than the table indicates, depending upon additional services available on the computer as well as the number of authentications, reads, and writes that the computer is handling.
-
QuickStart Rev 99a 44 August 22, 2001 PREREQUISITES eDirectory Server must be installed on all servers that you want to place an eDirectory replica on. Meet the “System Requirements” on page 29. Enable the Linux host for multicast routing on the server on which you are installing the product. Enter the following command to check whether the host is enabled for multicast routing: /bin/netstat -nr The following entry should be present in the routing table: 224.0.0.0 0.0.0.
-
QuickStart Rev 99a 44 August 22, 2001 3 When prompted, accept the license agreement. The installation program displays a list of eDirectory components that you can install. 4 Specify the option for the component you want to install. The appropriate RPMs are installed on the Linux host. Table 4 lists the RPMs installed for each eDirectory component.
-
QuickStart Rev 99a 44 August 22, 2001 To remove a replica, enter ndsconfig rm -a cn=admin.o=company 2. Use the ldapconfig utility to modify, view, and refresh LDAP object attributes. 3. Use the nmasconfig utility to configure NMAS and the policy-based authentication methods (log in methods). 4.
-
QuickStart Rev 99a 44 34 000-0000-000 November 30, 2001 August 22, 2001
-
Novell Native File Access Protocols Installation and Administration Guide Novell NetWare 6 ® www.novell.
-
Manual 99a July 17, 2001 38 Contents Contents 5 Preface 9 Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 1 Overview 11 Native Protocols . . . . . . . . . . . . . . . . . Network Neighborhood and Macintosh Chooser. Understanding Passwords . . . . . . . . . . . . Local Password. . . . . . . . . . . . . . . . Domain Controller Password . . . . . . . . . NetWare Password . . . . . . . . . . . . . . Simple Password . . . . . . . . . . . . . . .
-
Manual 4 99a What’s Next? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Working with Macintosh Computers 33 Administrator Tasks . . . . . . . . . . . . . . . . . . . . . . . . . Creating Simple Passwords for Several Macintosh Users. . . . Editing the Context Search File . . . . . . . . . . . . . . . . . Creating a Guest User Account . . . . . . . . . . . . . . . . . Renaming Volumes . . . . . . . . . . . . . . . . . . . . . . . Macintosh End User Tasks . . .
-
Manual 99a 38 NIS Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Setting Up Novell Native File Access for UNIX with Novell Cluster Services Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configuring the Properties of Cluster Volume Resource . . . . . . . . . Component-Specific Configuration . . . . . . . . . . . . . . . . . . . Location of Configuration Files . . . . . . . . . . . . . . . . . . . . . .
-
Manual 8 99a 38 July 17, 2001 Novell Native File Access Protocols Installation and Administration Guide Novell Native File Access Protocols Installation and Administration Guide 103-000162-001 September 4, 2001 Novell Confidential
-
Manual 99a 38 July 17, 2001 Preface This book is divided into the following sections. Chapter 1, “Overview,” on page 11—An explanation of the benefits of Novell® Native File Access Protocols and the concepts required to understand its implementation. Chapter 2, “Installing Novell Native File Access Protocols,” on page 15—Instructions for meeting the prerequisites and installing the software.
-
Manual 99a 38 July 17, 2001 Documentation Conventions In this documentation, a greater-than symbol (>) is used to separate actions within a step and items in a cross-reference path. Also, a trademark symbol (®, TM, etc.) denotes a Novell trademark. An asterisk (*) denotes a third-party trademark.
-
Manual 1 99a 38 July 17, 2001 Overview Novell® Native File Access Protocols let Macintosh, Windows, and UNIX workstations access and store files on NetWare® servers without having to install any additional software—such as Novell ClientTM software. The software is installed only on the NetWare server and provides "out of the box" network access. Just plug in the network cable, start the computer, and you have access to servers on your network. No client configuration, no client software, no problem.
-
Manual 99a 38 July 17, 2001 Network Neighborhood and Macintosh Chooser Enabling native protocols on NetWare means that users can access files, map network drives, and create shortcuts to NetWare servers using the native methods available in their specific operating system. Windows users can use their familiar Network Neighborhood. Macintosh users can use Chooser or the Go menu to access network files and even create aliases.
-
Manual 99a 38 July 17, 2001 NetWare Password To access the network, each user must have a network account created specifically for them. This account is called a User object. It consists of a NetWare username and a corresponding NetWare password. When the workstation is running Novell Client software, the user logs in by entering the NetWare username (including context) and password. NetWare usernames and passwords are stored securely on NetWare servers.
-
Manual 14 99a 38 July 17, 2001 Novell Native File Access Protocols Installation and Administration Guide Novell Native File Access Protocols Installation and Administration Guide 103-000162-001 September 4, 2001 Novell Confidential
-
Manual 2 99a 38 July 17, 2001 Installing Novell Native File Access Protocols To install the Novell® Native File Access Protocols, you must complete the following: 1. Prepare the NetWare 6 server according to the instructions in “NetWare Server Prerequisites” on page 15. 2. Set up a client workstation following the instructions in “Administrator Workstation Prerequisites” on page 17. 3.
-
Manual 99a 38 July 17, 2001 To load Macintosh Name Space to a volume, enter the following commands at the server console: LOAD MAC.NLM ADD NAME SPACE MACINTOSH TO VOLUME volume_name. (For Macintosh only) AFP.NLM and APPLETLK.NLM must be unloaded from the server (if loaded). If BorderManagerTM Enterprise Edition version 3.5 or later is running in the same tree as the NetWare server, the Login Policy Object (LPO) must be created by completing the following procedure.
-
Manual 99a 38 July 17, 2001 Administrator Workstation Prerequisites To install, set up, and administer Novell Native File Access Protocols, make sure that at least one workstation meets the following requirements: Windows workstation running one of the following: Windows 95/98 running Novell Client for Windows 95/98 version 3.21.0 or later. Download the client software. (http:// www.novell.com/download/) Windows NT/2000 running Novell Client for Windows NT/2000 version 4.80 or later.
-
Manual 99a 38 July 17, 2001 Installing the Software during the Server Installation Novell Native File Access Protocols are part of the NetWare 6 server installation program. Instructions are located in the NetWare 6 Overview and Installation Guide. If you did not install the software during the NetWare 6 server installation, you can install it by following the steps beginning with “Installing the Software after Server Installation” on page 18.
-
Manual 99a 38 July 17, 2001 From NetWare Deployment Manager 1 At the Administrator Workstation, log in to the destination server that will run the Novell Native File Access Protocols. 2 Insert the NetWare 6 Operating System CD. 3 Run NetWare Deployment Manager (NWDEPLOY.EXE) located on the root of the NetWare 6 Operating System CD. 4 Click Post-Installation Tasks > Install NetWare 6 Products.
-
Manual 99a 38 July 17, 2001 Installing the Software 1 Select to install Macintosh, UNIX, and/or Windows components. 2 Click Next. 3 (Conditional) If you choose to install the Windows component (CIFS), complete the following steps: 3a Log in as a user with the Supervisor right. You must specify the full context for the user. 3b Enter the Server Name and Server Comment that will appear in Network Neighborhood.
-
Manual 99a 38 July 17, 2001 The Server Name must be 11 or fewer characters and must be different from the actual NetWare server name. The Server Comment is optional. 3c Specify whether to enable UNICODE. When checked, this option enables Unicode characters used in double-byte languages. NOTE: To support Unicode, an additional file named UNINOMAP.TXT must be created and saved in the SYS:\ETC directory. When the -UNICODE value is set to ON, the UNINOMAP.
-
Manual 99a 38 July 17, 2001 For Windows users, there are two types of authentication methods available with Novell Native File Access: Local and Domain. Local authentication requires a simple password to log in to a NetWare server, but a simple password is not required for Domain authentication. When Novell Native File Access Protocols are configured for domain authentication, it is not possible to change the simple password or the NetWare password using Windows’ native Change Password feature.
-
Manual 99a 38 July 17, 2001 To specify a new share point, click New and then enter the path to the directory, a name, and a description. The directory name must end with a backslash (\). For example, SYS:\SYSTEM\. 3g Specify the NDS contexts for all Windows users who need access to the server. The list of NDS contexts are maintained in the CIFSCTXS.CFG file that can also be updated after installation. For more information, see “Specifying Contexts in the Context Search File” on page 41.
-
Manual 99a 38 July 17, 2001 4 (Conditional) If you choose to install the Macintosh component (AFP), complete the following steps: 4a From the Administrator Workstation, log in as a user with the Supervisor right. 4b Open the SYS:ETC\CTXS.CFG file in a text editor. 4c Enter the contexts of each Macintosh user that requires access to the server. For example: sales.hongkong.acme graphics.ny.acme sales.ny.
-
Manual 99a 38 July 17, 2001 Starting and Stopping the Windows (CIFS) Protocols 1 At the server console, enter CIFSSTRT to load the Windows (CIFS) protocols. Any changes in the configuration files are applied when the service is loaded. 2 At the server console, enter CIFSSTOP to unload the Windows (CIFS) protocols. What’s Next? After completing the installation, you need to assign simple passwords to users before Windows and Macintosh users can access the network.
-
Manual 26 99a 38 July 17, 2001 Novell Native File Access Protocols Installation and Administration Guide Novell Native File Access Protocols Installation and Administration Guide 103-000162-001 September 4, 2001 Novell Confidential
-
Manual 3 99a 38 July 17, 2001 Assigning Simple Passwords Windows, Macintosh, and UNIX users must have a User object and simple password before they can access network resources using native protocols. A User object specifies attributes and information about which network resources the user can access. User objects are created using ConsoleOneTM. For more information about creating User objects, see the ConsoleOne Users Guide. (http://www.novell.com/documentation/lg/consol12d/index.
-
Manual 99a 38 July 17, 2001 Using ConsoleOne to Create Simple Passwords ConsoleOne lets you create simple passwords for users one at a time by completing the following procedure. 1 From the Administrator Workstation, log in as a user with the Supervisor right. Make sure that the Administrator Workstation meets the prerequisites described in “Administrator Workstation Prerequisites” on page 17. 2 Run CONSOLEONE.EXE (located in \PUBLIC\MGMT\CONSOLEONE\1.2\BIN\).
-
Manual 99a 38 July 17, 2001 Since you have created simple passwords for User objects in NetWare, those users can now use native access methods (Network Neighborhood, Chooser, etc.) to access network resources. When prompted, they will enter their NetWare username (without context) and the corresponding simple password.
-
Manual 99a 38 July 17, 2001 Creating Simple Passwords for Multiple Users 1 Select an option to identify the users to receive simple passwords. Select all User objects in a context by typing in the context in the NDS Context field. Select all User objects in the NDS® tree by clicking Traverse Context Tree for User Objects. NOTE: Searching the entire NDS tree may take several minutes. 2 Select an option for choosing and communicating the password to the user.
-
Manual 99a 38 July 17, 2001 Creating a Simple Password for a Single User 1 In the Username.Context field, type the username and context of the user to receive the simple password. 2 In the New Password field, type the text to be used as the simple password. 3 Click Set. You will need to notify the user of the password Managing Users and Rights to Network Resources ConsoleOne helps you manage Novell Native File Access Protocols for each computer platform (Macintosh, Windows, and UNIX).
-
Manual 32 99a 38 July 17, 2001 Novell Native File Access Protocols Installation and Administration Guide Novell Native File Access Protocols Installation and Administration Guide 103-000162-001 September 4, 2001 Novell Confidential
-
Manual 4 99a 38 July 17, 2001 Working with Macintosh Computers This chapter is divided into two sections—tasks administrators can perform and tasks end users can perform using Macintosh computers. Administrator Tasks There are several ways that you can simplify your administration tasks and customize how Macintosh workstations interact with the network.
-
Manual 99a 38 July 17, 2001 Editing the Context Search File A context search file allows Macintosh users to log in to the network without specifying their full context. The context search file contains a list of contexts that are searched when no context is provided or the object cannot be found in the provided context. When the Macintosh user enters a username, the server searches through each context in the list until it finds the correct User object.
-
Manual 99a 38 July 17, 2001 Creating a Guest User Account Novell Native File Access Protocols let you create a Guest User object. Macintosh users are accustomed to being able to log in as Guest with no password required. 1 From the Administrator Workstation, use ConsoleOne to create a User object named Guest. 2 Determine and assign the appropriate rights to the Guest object by double-clicking the Guest object and then clicking Rights to Files and Folders.
-
Manual 99a 38 July 17, 2001 For example: System volume "server1.sys". 4 Unload and reload the AFPTCP.NLM program. Volumes will appear to Macintosh users with the new volume names. Macintosh End User Tasks Accessing Network Files Once the Novell Native File Access Protocols are properly configured on the server, Macintosh users can use Chooser to access files and directories each time they are required or they can create an alias on the desktop that is retained after rebooting.
-
Manual 99a 38 July 17, 2001 Logging In to the Network as Guest If the network administrator has set up the Guest User object account as described in “Creating a Guest User Account” on page 35, Macintosh users can log in to the network as Guest with no password required. 1 In Mac OS 8 or 9, click the Apple menu > Chooser > AppleTalk > Server IP Address. In Mac OS X, click Go > Connect to Server. 2 Enter the IP address or DNS name of the NetWare server, and then click Connect.
-
Manual 99a 38 July 17, 2001 NetWare Rights versus Macintosh Rights Using Chooser to access network files and folders is fairly consistent with the Macintosh environment, but there are some differences between NetWare and Macintosh file sharing. Macintosh users can view the sharing information about specific folders by clicking Get Info/Sharing.
-
Manual 99a 38 July 17, 2001 Owner Rights In the Apple File Sharing environment, an owner is a user who can change access rights. In the NetWare environment, users can change access rights if they have been granted the Access Control right for the folder. In NetWare, an owner means the one who created the file. A NetWare owner has no rights by virtue of ownership. In the NetWare environment, the owner is the current user if he has Access Control rights to the folder.
-
Manual 99a 38 July 17, 2001 Adding a group or user does not remove the current group or user; it simply adds the rights to the group or user specified. If the user enters the wrong user or group name, the user gets no feedback. If multiple users or groups are assigned to the folder, it is possible that the user is unable to see the user or group that was just assigned. It could be very difficult to know if the rights assignment worked or not.
-
Manual 5 99a 38 July 17, 2001 Working with Windows Computers This chapter is divided into two sections—tasks administrators can perform and tasks end users can perform using Windows computers. Administrator Tasks There are several ways that you can simplify your administration tasks and customize how Windows workstations interact with the network.
-
Manual 99a 38 July 17, 2001 Sophia.graphics.marketing, and Ivan.marketing.acme, then you would enter the following contexts to the CIFSCTXS.CFG file: sales.acme graphics.marketing.acme marketing.acme 3 Save the file in the SYS:\ETC directory. 4 At the server console, enter CIFSSTOP to unload the current context search file. 5 Enter CIFSSTRT to load the new context search file and apply the changes. When Windows users log in, they enter only a username and the simple password.
-
Manual 99a 38 July 17, 2001 The context that you select will be automatically written to the CIFSCTXS.TXT file, which contains all the contexts of all users. Status of the import is given on the interval that you select. 6 When the import is complete, click Done to clear the screen. Customizing the Network Environment Using a Configuration File 1 Log in to the server running the Novell Native File Access Protocols. 2 Change to the SYS:\ETC\ directory. 3 Edit CIFS.CFG using a text editor.
-
Manual 99a 38 July 17, 2001 -AUTHENT The method of authentication used by Novell Native File Access Protocols. Domain—Clients are members of a domain. A Windows domain controller performs user authentication.The username and password on the domain controller must match the username and password used to log in to the Windows workstation. Local—Clients are members of a workgroup. The server running Novell Native File Access Protocols performs the user authentication.
-
Manual 99a 38 July 17, 2001 -PDCNAME The PDC server name. If the PDC and server running Novell Native File Access Protocols are on different subnets, clients must use DNS name resolution to find the server. PDCNAME does not include the IP address. Value: ‘PDC_Name’ Default: None -WINS Address of WINS server to be used to locate the PDC, if the PDC and server running Novell Native File Access Protocols are on different subnets.
-
Manual 99a 38 July 17, 2001 -UNICODE When On (enabled), this command enables Unicode characters (used in double-byte languages). Value: On | Off Default: Off (disabled) IMPORTANT: To support Unicode, an additional file named UNINOMAP.TXT must be created and saved in the SYS:\ETC directory. When the -UNICODE value is set to On, the UNINOMAP.TXT file is used to resolve Unicode-to-ASCII "nomap" problems. To specify "no-map" cases in the UNINOMAP.
-
Manual 99a 38 July 17, 2001 Configuration File Shortcuts You can enter the following commands at the server console to modify the configuration file. CIFS SHARE ADD ‘localpath’ ‘sharename’ connectionlimit ‘comment’ adds a new sharepoint and also adds the command to the CIFS.CFG file. CIFS SHARE REMOVE ‘sharename’ removes the sharepoint and comments it out of the CIFS.CFG file.
-
Manual 99a 38 July 17, 2001 Although it is the same computer, the Novell Native File Access server name is not the same as the NetWare server name. For more information, ask your network administrator. HINT: You can enter the server name or the server IP address in Find Computer to quickly access the server running Novell Native File Access software. 5 Browse to the desired folder or file. Mapping Drives from a Windows Computer 1 Enter your username and local password for Microsoft* Networking.
-
Manual 99a 38 July 17, 2001 4 Enter the username, old password, and new password as prompted. The NetWare password and the simple password will be synchronized only if the old simple password matches the NetWare password. If they are different, the NetWare password will not be changed and access to the network will be denied. To change and synchronize the NetWare password, you must use the Administrator Workstation running Novell Client software.
-
Manual 99a 38 July 17, 2001 For Computers Using Domain Authentication If the computer is configured to use domain authentication, then the password checking is done by the domain controller. The password can be changed using the Windows administration tools for a domain controller. For more information, contact your network administrator.
-
Manual 6 99a 38 July 17, 2001 Setting Up Novell Native File Access Protocols in a NetWare 6 Cluster NetWare® 6, Novell® Cluster ServicesTM software, and Novell Native File Access Protocols provides high availability, scalability, and security to your network while reducing administrative costs associated with managing client workstations.
-
Manual 99a 38 July 17, 2001 Setting Up for Macintosh To set up the Macintosh portion of Novell Native File Access Protocols in an environment running Novell Cluster Services, complete the following: 1 Load AFPTCP.NLM on all servers in the cluster by entering LOAD AFPTCP at the server system console. HINT: You can add this command to the AUTOEXEC.NCF file of each server. 2 Cluster-enable the shared-disk volumes by following the procedures described in the Cluster Services documentation. (http:// www.
-
Manual 99a 38 July 17, 2001 2a Log in as a user with the Supervisor right to a server in the cluster. 2b Run ConsoleOneTM located in SYS:\PUBLIC\MGMT\CONSOLEONE\1.2\BIN\. 2c Select the Cluster Resource object. 2d Click File > New > Cluster > Cluster Resource. 2e Name the Cluster Resource (for example, Native_File_Access). 2f Enter CIFS Server in Inherit From Template. 2g Click Create. 3 Follow the instructions and substitute variables in the template to customize the resource for your environment.
-
Manual 99a 38 July 17, 2001 What’s Next? With the NetWare 6 cluster configured with Novell Native File Access Protocols, Macintosh and Windows users can receive the benefits of a clustered environment—without needing additional client software. For an explanation of how Macintosh users access network files and for more information on managing Macintosh workstations, see “Working with Macintosh Computers” on page 33.
-
Manual 7 99a 38 July 17, 2001 Working with UNIX Machines Novell® Native File Access for UNIX* provides an NFS Server that lets UNIX workstations access and store files on NetWare® servers. It is an implementation of the Network File System (NFS) protocol. The required software components are installed and run only on the NetWare servers; no additional software is required on the UNIX workstations. UNIX users attach to NetWare storage using NFS over the TCP/IP protocol.
-
Manual 99a 38 July 17, 2001 Network Information Services NIS is a yellow pages service widely implemented in UNIX environments. NIS on NetWare acts as a central repository for NIS information by storing them as eDirectory objects that can be centrally maintained and administered. See “Network Information Service” on page 59.
-
Manual 99a July 17, 2001 38 Overview of Native File Access for UNIX NFS Server Network File System (NFS) enables UNIX users to access a NetWare file system as if it were a local directory on the UNIX workstation. Any client that supports the NFS protocol can also access NetWare files using the NFS Server. This section uses the UNIX operating system as the example when referring to the remote NFS client. The following figure shows an example of the NFS Server file sharing process.
-
Manual 99a 38 July 17, 2001 Accessing the NetWare File System from NFS Clients After exporting the NetWare file system from a NetWare server, you must mount the exported file system on the UNIX workstation for normal access. This process is called mounting the file system. Mounting a NetWare file system from a UNIX workstation consists of the following: Creating a mount point A mount point is an empty directory you create. This directory becomes the access point for the NetWare file system.
-
Manual 99a 38 July 17, 2001 NFS Server Access Control NetWare and UNIX use different methods for controlling access to files. Although both have similar directory and file security, NetWare security is more elaborate. At a basic level, both systems assign access controls to similar user types. The access control mode is known as Independent Mode wherein there are no rights/permissions mappings. NFS Client rights apply to NFS client access and NetWare rights apply to NetWare client access.
-
Manual 99a 38 July 17, 2001 This NISSERV_ServerName is the main NIS Server eDirectory object. It maintains a list of all the NIS Domains it is serving. To view and edit the list, do the following: 1 Right-click NISSERV_Servername object. 2 Click Properties. 3 Click the Memberships Tab to display the list of NIS Domains served by this NIS Server object. 4 Click the Others Tab to view the IP Address of the NetWare server where NIS server is installed.
-
Manual 99a 38 July 17, 2001 Bootparams Map—A source of information for various boot parameters. The Boot objects store information about the boot parameters of the various devices that are running. If the Bootparams text filename is to be migrated from the ConsoleOne, it should be named bootp. Hosts Map—Contains one entry for each IP address of each host. If a host has more than one IP address, it will have one entry for each.
-
Manual 99a 38 July 17, 2001 To create a phone list map, you would begin by creating a text file containing each employee's name and phone number. An NIS map text file must conform to the following rules: Each data line begins a new entry key. The backslash character (\) at the end of a line appends the next line to the current line. The pound sign (#) at the beginning of a line tells the converter to ignore the line. Blanks separate the key and the value.
-
Manual 99a 38 July 17, 2001 NIS Slave Server You can set up read-only copies of the NIS database on secondary servers. The secondary servers are referred to as slaves. When the server is set up as an NIS slave, it contacts the master NIS server and requests a complete copy of the NIS maps on that server. Once the slave server is set up, you don’t need to manage the update process manually.
-
Manual 99a 38 July 17, 2001 migration, if the UNIX user or group is not present, a new eDirectory User or Group object is created with default NetWare rights. If the User or Group object exists, the user or group's UNIX-related information is updated by default during the migration. User and Group Information NetWare and UNIX both use the same User and Group objects to get the information they need.
-
Manual 99a 38 July 17, 2001 NFS group names also have identification numbers. The range of numbers is between 0 and 65,535, with the numbers 0 through 99 reserved. The GID identifies the user as a member of the primary group identified by that GID. User Home Directories The home directory is the absolute pathname of the user's home directory on UNIX machines. User Preferred Shells The shell information identifies the path of the shell program that runs when the UNIX user logs in to the system.
-
Manual 99a 38 July 17, 2001 Novell Cluster Services Support In a non-cluster environment, if the server running Native File Access for UNIX fails, then UNIX users will not be able to use this service until the NetWare server is up. To achieve high availability, you can run Native File Access for UNIX on Novell Cluster ServicesTM. The product is installed on all the required nodes in the cluster. Cluster enabling is achieved by storing the required configuration files on the shared disk in the cluster.
-
Manual 99a 38 July 17, 2001 Administration Utilities The following administration utilities are provided with Novell® Native File Access for UNIX: SCHINST This utility is run automatically during the installation of Native File Access for UNIX. This utility extends the schema necessary for storing the UNIX information of objects. If the directory services are reinstalled or if the NISUserDef/NISUser object is deleted, run this utility manually.
-
Manual 99a 38 July 17, 2001 NISINST This utility creates an eDirectory object with the name NISSERV_Servername by default or whatever name was specified with the s option. NIS Server uses this object to store the domains served by the NIS Server. NIS Server validates every request against the list of domains specified in this object. It serves the request only when the domain in the request is present in the above list.
-
Manual 99a 38 July 17, 2001 Setting Up and Managing Novell Native File Access for UNIX This section explains how to set up and manage Native File Access for UNIX.
-
Manual Figure 2 99a 38 July 17, 2001 Novell Native File Access for UNIX Objects WARNING: After the Novell Native File Access for UNIX installation, two objects are created in the tree: NISUser / NISUserDef and NISSERV_Servername. These objects should not be deleted. File-Based Configuration The configuration (.CFG) files are used to configure the services. All of these files have the following format: PARAMETER_NAME = VALUE Within the .CFG files, a pound sign (#) indicates a comment.
-
Manual 99a 38 July 17, 2001 Configuring Server General Parameters The server general parameters required by Native File Access for UNIX are located in the NFS.CFG file. These parameters are common to NFS and NIS. When modifying this file, make sure you stop the services using nfsstop and restart using nfsstart. File-Based Configuration of Server General Parameters The following table lists the configuration parameters in NFS.CFG.
-
Manual 99a 38 July 17, 2001 ConsoleOne-Based Configuration of Server General Parameters This section explains the following tasks: Viewing the Server General Parameters (page 72) Configuring the Server General Parameters (page 73) Viewing the Server General Parameters 1 In the ConsoleOne main menu, right-click the server you want to configure and then click Properties. The following panel appears: Figure 3 Server General Parameters Panel These are the general parameters.
-
Manual 99a 38 July 17, 2001 Context—The context or logical position of the server within the eDirectory tree. Tree—The current eDirectory tree. Time Zone—The world time zone reference for your area. The time zone is used for time stamps and to set time synchronization. The time zone reference is set during the NetWare installation. Configuring the Server General Parameters 1 In the ConsoleOne main menu, right-click the server you want to configure and then click Properties > Directory Access.
-
Manual 99a 38 July 17, 2001 Enable NIS Client—Specifies whether the NIS Client is enabled or not. NIS Server—Specifies the remote NIS server name. NIS Domain—Specifies the domain served by that remote NIS. 3 Click OK. 4 Modify the following parameters as necessary: SNMP Alert Level—The level of SNMP alerts reported to SNMP management stations. Select an alert level from the drop-down list. You can also turn off SNMP reporting from this list. None—Suppresses SNMP reporting.
-
Manual 99a 38 July 17, 2001 domainname_U and the groups are migrated to domainname_G. The rest of the data is migrated under the Map objects created under the Domain object. IMPORTANT: The User and Group objects will not be created under the passwd and group Map object. They will spread across the eDirectory tree and DomainName_U, DomainName_G depending upon the SEARCH_ROOT configuration parameter.
-
Manual 99a 38 July 17, 2001 To capture the results of the migration, use the following format: makenis -r resultfilename -d domainname To remove the existing domain data and then migrate, use the following format: makenis -rd domainname To specify the context where you want to create your Domain object and data, enter it as the contextname: makenis -d domainname -x contextname Edit the context parameter by prefixing each of the dots in the Relative Distinguished Names with a backslash (\) to di
-
Manual 99a 38 July 17, 2001 Line offset is used to start migration from a particular line from the map text file. If the migration fails while migrating large maps, instead of migrating it again from the beginning, you can specify the byteoffset to start from the offset specified in the migration log file. For more details on this offset, refer to the description of the configuration parameter FILEMARK_LOG_FREQ in NIS.CFG. ConsoleOne-Based Migration 1 In the left panel of ConsoleOne, click The Network.
-
Manual 99a 38 July 17, 2001 7 Click the radio button for the type of the migration you want to perform: Replace, Update, or Merge. 8 To set the NIS Server as Slave Server, enter the Master Server Name/IP Address in the Slave Server Info section. 9 To migrate the domain for default maps, click Migrate. The available default maps are ethers, hosts, networks, protocols, RPC, services, passwd, group, netgroup, and bootparams. By default, these files should be present in SYS:\ETC\NIS.
-
Manual Figure 7 99a 38 July 17, 2001 Add Map Panel 11a Enter the Map Name and the Text File name. 11b If you want to enable secure access to the map, click Secure. 11c In the Comment Character box, enter the comment character present in the specified text file and click OK. The default comment character is #. 12 Click Migrate. Managing Users and Groups You can add and modify the information of a User or Group object that already exists in eDirectory.
-
Manual Figure 8 99a 38 July 17, 2001 UNIX Profile Tab of User Properties Panel 4 To modify the UNIX user profile, click UNIX Profile and specify the information in the following fields: User ID—The users’ UNIX UID. Primary Group—The group ID (GID) of the group this user belongs to. To enter the GID of the user, click Browse and select the appropriate group. Login Shell—The preferred login shell of the user.
-
Manual 99a 38 July 17, 2001 3 Right-click the Group object whose properties you want to change and click Properties. The following panel appears, showing the various forms which should be specified to add and modify the group information in eDirectory. All the forms except the UNIX Profile form are standard forms.
-
Manual 99a 38 July 17, 2001 To add a new group, do the following: 1 In the left panel of the ConsoleOne main menu, click the context where you want to add the new group. 2 Select File > New, and then click Group. 3 Enter the group information. To make this newly added user/group an NIS User and NIS Group record, add the attribute nisUserGroupDomain to the object. This attribute holds a list of the domains to which that record belongs.
-
Manual 99a 38 July 17, 2001 File-Based Management for NFS Server NFS Server Configuration Parameters The following table lists the parameters that can be set in NFSSERV.CFG: Parameter Default Value Range Description REQ_Q_FULL_ALERT 90 20 - 99 Minimum percentage of request queue utilization which triggers an SNMP alert. REQ_CACHE_FULL_ ALERT 90 20 - 99 Minimum percentage of request cache utilization which triggers an SNMP alert.
-
Manual 99a 38 July 17, 2001 Parameter Default Value Range Description NFS_V3_THREADS 5 1 - 150 Number of NFS Server threads servicing the NFS 3 protocol. MOUNT_V2_THREADS 1 1 - 150 Number of threads servicing Mount V2 requests. MOUNT_V3_THREADS 1 1 - 150 Number of threads servicing Mount V3 requests. NFS_V2_TCP_SEND_Q_ ENTRIES 30 1 - 150 Size of the TCP send queue for the NFS V2 protocol. NFS_V3_TCP_SEND_Q_ ENTRIES 30 1 -150 Size of the TCP send queue for the NFS V3 protocol.
-
Manual 99a 38 July 17, 2001 Exporting NetWare Volumes and Directories The Export Path information file, NFSEXPRT, contains the list of the paths that are exported from the system. It also gives the specified properties for the exported path. This file contains one exported path per line. The format of each line is as follows: ExportedPath isReadonly anonymousAccess mode webccess Exported Path—The directory path to be exported. For example /nfsvol.
-
Manual 99a 38 July 17, 2001 Access Type (1, 2, 3)—Specifies the type of access to be granted to a specific host. The values it can take are as follows: Trusted 1 RootAccess 2 ReadWriteAccess 3 Host/Hostgroup (1, 0)—This field shows whether the Host Name specified is a Host or a Hostgroup. This field should always be set to 1 (Host).
-
Manual 99a 38 July 17, 2001 Starting and Stopping NFS Server To start NFS Server enter at the system console, enter: load nfsserv To stop NFS Server enter at the system console, enter: unload nfsserv ConsoleOne-Based Management for NFS Server This section describes how to manage the NFS Server from ConsoleOne. NFS Server General Configuration Parameters 1 After logging in, click the server you want to administer from the list of servers under NFSAdmin in the ConsoleOne left panel.
-
Manual 99a 38 July 17, 2001 3 Modify the following parameters as necessary: Request Q Alert Level—After what percentage of request queue utilization an SNMP alert is sent. Default = 90. Range = 20 - 99. Request Cache Alert Level—After what percentage of request cache utilization an SNMP alert is sent. Default = 90. Range = 20 - 99. Open File Cache Alert Level—After what percentage of open file cache utilization an SNMP alert is sent. Default = 90. Range = 20 - 99.
-
Manual Figure 11 99a 38 July 17, 2001 Advanced Parameters in the NFS Server Options Panel 5 Modify the following parameters as necessary: NFS V2 Threads—Number of NFS Server threads servicing the NFS 2 protocol. Default = 5. Range = 1 - 150. NFS V3 Threads—Number of NFS Server threads servicing the NFS 3 protocol. Default = 5. Range = 1 - 150. Mount V2 Threads—Number of NFS Server threads servicing the Mount V2 Requests. Default = 1. Range = 1 - 150.
-
Manual 99a 38 July 17, 2001 Log File Path—Directory that NFS Server creates the log file in. Default directory is SYS:\ETC. Log File Name—Name of the NFS Server Log File. Default name is NFSSERV. A .LOG extension is automatically added. NFS Server Log Level—Indicates the types of messages to be logged. 6 Click OK. Exporting NetWare Volumes and Directories Exporting a directory enables NFS client users to view NetWare volumes and directories as part of the client file system.
-
Manual Figure 13 99a 38 July 17, 2001 Browse Panel for exporting NetWare Volumes and Directories 3 Double-click the server name to see the volumes with NFS name space. 4 Select the volume or directory you want to export and click OK. 5 On the Export New Path panel, modify the following fields as necessary: Export Path—Path of the directory to be exported. Access Control Mode—The access control mode that applies to this directory: independent mode.
-
Manual 99a 38 July 17, 2001 7 Click the Trustee name on the Export New Path panel to set their access rights. Hosts with Root Access—The host whose users with root privileges have Admin rights to the exported directory. Select this field to display a list of these hosts. If a host with access is not specified as having root access, root users on that host have the rights of the NFS user Nobody. Hosts with Read-Write Access—The hosts with access whose users have read/write access to the exported path.
-
Manual 99a 38 July 17, 2001 Getting the UNIX information from Remote NIS For file system sharing by NFS server, the UNIX user and group information is obtained from eDirectory by default. This can be modified so that UNIX information is obtained from a remote NIS server. To set this, do the following: 1 Run NFSSTOP. 2 Set the parameters in the NFS.CFG file as follows by following Steps 1 to 5 in “Configuring the Server General Parameters” on page 73.
-
Manual 99a 38 July 17, 2001 Managing NFS Server Log Files When NFS Server service is running it logs messages into a log file named NFSSERV.LOG created by default in SYS:\ETC. This file records messages that provide following information: When and where the serivices are started and stopped Clients where the exported volumes are mounted. NIS Server There is an NIS Server object in eDirectory called NISSERV_Servername. This object is created during installation.
-
Manual 99a 38 July 17, 2001 Parameter Default Value Description FILEMARK_LOG_FREQ 100 Puts the file in the log after parsing the specified number of records. This is used by the migration utility when the administrator wants to migrate maps which have large records. After transferring a number of records successfully, an index is maintained. If a transfer breaks, it can start from the index kept previously.
-
Manual 99a 38 July 17, 2001 Setting Up a NetWare Server as a NIS Master 1 Copy the NIS related text files required for the domain from the UNIX machine (which are available in /ETC in UNIX) into SYS:\ETC\NIS. 2 (Conditional) If you want to set up other NIS server as slave to this NIS server, do the following: 2a Create a text file called YPSERV in SYS:\ETC\NIS.
-
Manual 99a 38 July 17, 2001 4 Make sure NISSERV.NLM is loaded. 5 Run MKSLAVE, to setup the NetWare machine as slave, with the following parameters: mkslave -d domainname -m master [-x contextname] Setting Up a NetWare Server as NIS Client 1 Run NFSSTOP. 2 In the NetWare server, make sure that the parameter NIS_CLIENT_ACCESS=1 in the file SYS:\ETC\NFS.CFG. 3 Run NFSSTART.
-
Manual 99a 38 July 17, 2001 Map Refresh Frequency— The Frequency At Which All The Records Of The Map Should Be Refreshed. Range = 1 To 2400 Hours (100 Days). Log File Path—The Path In The Netware Server Where You Want To Write The Nis Log Files. Maximum Log Messages—The Maximum Number Of Log Messages That Can Be Logged. The Information Is Specific To Each Log File. By Default The Last 5000 Messages Are Displayed. If The Number Of Log Messages Is Set To N, The Last N Messages Are Retained.
-
Manual 99a 38 July 17, 2001 Setting Up a NetWare Server As a NIS Master 1 Copy the NIS related text files required for the domain from the UNIX machine (which are available in /ETC in UNIX) into SYS:\ETC\NIS. 2 (Conditional) If you want to set up other NIS server as slave to this NIS server, do the following: 2a Create a text file called YPSERV in SYS:\ETC\NIS.
-
Manual 99a 38 July 17, 2001 Right-click NISSERV_Servername > click Update Slave Server . A panel similar to the following appears: Figure 16 YPPUSH Dialog Box Enter the required details such as HostName or IP Address of the Master Server, Domain Name, and Map Name. For more details, see the online help. NOTE: The changes done on the NIS master are automatically updated on the slave servers periodically.
-
Manual 99a 38 July 17, 2001 Configuring eDirectory Objects to be Served by NIS Server NIS Server recognises eDirectory users/groups as NIS users/group only if they have a UNIX profile attached to them. To configure existing eDirectory user/group objects to be served by NIS Server, complete the following steps. 1 Choose the eDirectory User/Group object > right-click Properties > UNIX Profile. Enter the required fields in this page and move to the Other tab.
-
Manual 99a 38 July 17, 2001 Managing NIS Data on eDirectory After migration the NIS maps and records will be available as objects under the migrated NIS domain object. Figure 17 Maps under the Migrated Domain When a client call is made to this domain, the NIS Server will list the data present under the corresponding domain object. However, for user/group details, it will look for users and groups belonging to the domain under the contexts specified by an attribute of the domain object.
-
Manual Figure 18 99a 38 July 17, 2001 Domain Properties Panel In case the NetWare NIS Server is a slave for a domain and the master NIS server for that domain is changed to some other server; to get the updates from the new master, you need to change the NIS master server name for the domain object present in the NetWare NIS slave server. Right-click Domain object > click Change Master.
-
Manual 99a 38 July 17, 2001 You can view the properties for each map. Right-click Map object > click Properties. A panel similar to the following appears: Figure 20 General Map Properties Panel Map Master—The name of the master server serving this map. Map Last Modified—The last time the map was modified by adding or removing records. Is Map Secure—Sets the secure flag of the map when checked. Description—Any general comments that you want to record.
-
Manual 99a 38 July 17, 2001 Administering Maps The following figures show the main map panels and are followed by procedures for using each panel’s basic fields. Using these panels, you can view or modify the map record’s properties. The standard fields remain the same. Figure 21 Ethers Map Records Properties Panel This panel shows the Ethernet address of the host. The standard address form is x:x:x:x:x:x, where x is a hexadecimal number.
-
Manual Figure 22 99a 38 July 17, 2001 Boot Map Records Properties Panel 1 To add the device’s boot parameter, click Add, enter the boot parameter of the device in the Boot Parameter field, and then click Apply > OK. 2 To delete the device’s boot parameter, select the boot parameter of the device in the Boot Parameter field, and then click Delete > Apply > OK.
-
Manual Figure 23 99a 38 July 17, 2001 Host Map Records Properties Panel 1 To add the host address, click Add, enter the IP address of the host, and then click Apply > OK. The network addresses are written in the conventional decimal dot notation. 2 To delete the host address, select the host’s IP address from the IP Address field, and then click Delete > Apply > OK.
-
Manual Figure 24 99a 38 July 17, 2001 Netgroup Map Records Properties Panel To add a netgroup address, enter the name of the Map Record, browse the icon for the Map Name, enter the description of the map, and then click Apply > OK.
-
Manual 99a 38 July 17, 2001 1 To enter the IP network number, click Browse, enter the network number, and click OK. 2 To enter the IP netmask number, click Browse, enter the netmask number, click OK, enter the description of the record, and then click Apply > OK. Figure 26 Protocols Map Records Properties Panel 1 Enter the protocol number and a brief description of the record. 2 Click Apply > OK.
-
Manual Figure 27 99a 38 July 17, 2001 RPC Map Records Properties Panel 1 In the ONC RPC Number field, enter the RPC number of the program. 2 Enter a brief description of the record. 3 Click Apply > OK.
-
Manual 99a 38 July 17, 2001 1 In the IP Service Port field, enter the port number that this service is available on. 2 In the IP Service Protocol field, enter the protocol used to access the specified service. 3 Enter a brief description of the record. 4 Click Apply > OK. Figure 29 General Map Records Properties 1 In the Map Record field, specify the map record using the following format: key record 2 Enter the map name that the record belongs to. 3 Enter a brief description of the record.
-
Manual 99a 38 July 17, 2001 Setting Up Novell Native File Access for UNIX with Novell Cluster Services To get the full benefit of using Novell Native File Access for UNIX with Novell Cluster ServicesTM, the software must be installed and configured to work in a cluster environment.
-
Manual 99a 38 July 17, 2001 IMPORTANT: After the shared volume servername_shared vol name is cluster- enabled, ConsoleOne renames it to cluster object name_shared vol name. ConsoleOne creates a virtual server associated with the shared volume called cluster object name_shared vol name_SERVER. ConsoleOne also creates a Cluster Volume object called shared vol name_SERVER in the Cluster object container. 3 Install Native File Access For UNIX on all the nodes in the cluster.
-
Manual 99a 38 July 17, 2001 Load Script To the load script, add the following at the end of the existing script: nfsclust AAA.BBB.CCC.DDD shared vol name shared vol name_SERVER shared vol name:\ETC\NFSSTART Unload Script To the unload script, add the following at the beginning of the existing script: shared unload unload unload vol name:\ETC\NFSSTOP nfsclust nfsadmin pkernel Setting the Start, Failover, and Failback Modes The following table explains the different resource modes.
-
Manual 99a 38 July 17, 2001 Mode Setting Description Failover AUTO, MANUAL AUTO allows Native File Access for UNIX to automatically start on the next server in the Assigned Nodes list in the event of a hardware or software failure. MANUAL lets you intervene after a failure occurs and before Native File Access for UNIX is moved to another node.
-
Manual 99a 38 July 17, 2001 3 Click the Policies tab on the property page. 4 View or change the Start, Failover, or Failback mode. Component-Specific Configuration The procedure to configure the components of Native File Access for UNIX is much the same as when you configure the components without cluster services.
-
Manual 99a July 17, 2001 38 Location of Configuration Files Most of the configuration files are now located in the shared volume’s ETC directory. The following table lists the location with and without the cluster services. Table 3 Location of Configuration Files Filename Without Cluster Services With Cluster Services NFS.CFG SYS:\ETC shared_vol_name:\ETC NIS.CFG SYS:\ETC shared_vol_name:\ETC NFSSERV.
-
Manual 99a 38 July 17, 2001 118 Novell Native File Access Protocols Installation and Administration Guide Novell Native File Access Protocols Installation and Administration Guide 103-000162-001 September 4, 2001 Novell Confidential
-
Server Communications Administration Guide Novell NetWare 6 ® www.novell.com 8.
-
Manual 99a July 17, 2001 38 Contents Server Operating System Communications 9 Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 1 Understanding Network Communications Identifying Devices . . . . . . . . . Finding Services . . . . . . . . . . Moving Packets . . . . . . . . . . Coordination . . . . . . . . . . . . IP Addressing . . . . . . . . . . . IP Subnetting . . . . . . . . . . . . IPX Addressing. . . . . . . . . . . ARP . . . . . . . . . . . . .
-
Manual 2 99a July 17, 2001 38 Planning 29 Protocol Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . Planning Migration. . . . . . . . . . . . . . . . . . . . . . . . . . . . Compatibility Mode (CM) . . . . . . . . . . . . . . . . . . . . . . . . IPX Compatibility Feature Dependencies . . . . . . . . . . . . . . The Virtual IPX Network Created for the IPX Compatibility Feature . Migration Agent (MA) . . . . . . . . . . . . . . . . . . . . . . . . . . Migration Agent Dependencies . . .
-
Manual 4 99a Optimizing 63 Using Large Internet Packets . . . . . . . . . . . . . . . . . . Using Packet Burst . . . . . . . . . . . . . . . . . . . . . . . Increasing Maximum and Minimum Packet Receive Buffers . . Increasing the Maximum Number of Packet Receive Buffers Increasing the Minimum Number of Packet Receive Buffers. 5 July 17, 2001 38 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
-
Manual 8 99a 38 Server Communications Administration Guide Server Communications Administration Guide 103-000145-001 August 30, 2001 Novell Confidential July 17, 2001
-
Manual 99a 38 July 17, 2001 Server Operating System Communications NetWare® has traditionally used IPXTM and its protocols for network communication. NetWare 4 supported IP networks through NetWare/IPTM. The release of NetWare 6 allows a choice of running networks with just IPX, with both IP and IPX, or with pure IP. The Internet Protocol comprises a set of publicly available protocols that provides the means by which computers communicate on the Internet.
-
Manual 99a 38 July 17, 2001 Operating System Communications documentation outlines and contrasts the protocols used in Novell's IP and IPX implementations of NetWare 6. Documentation Conventions In this documentation, a greater-than symbol (>) is used to separate actions within a step and items in a cross-reference path. Also, a trademark symbol (®, TM, etc.) denotes a Novell trademark. An asterisk (*) denotes a third-party trademark.
-
Manual 1 99a 38 July 17, 2001 Understanding Network Communications Network communications involve many complex operations, but these operations can be grouped into four major categories: Identifying Devices (page 12) For computers to communicate on networks, each must have an address. Just as postal services are unable to deliver a package without an address, computers are unable to communicate without an address.
-
Manual 99a 38 July 17, 2001 with other servers and relay the correct network time to NetWare clients. NDS replication is similar to time synchronization in that servers must keep and share accurate information to maintain fault tolerance and distributed access to the database. Identifying Devices Devices on networks must be uniquely identified so that other devices can find and use their services.
-
Manual 99a July 17, 2001 38 Finding Services Once a computer is uniquely identified on the network, it can let other computers know what services it offers, or it can request services from another computer.
-
Manual 99a 38 July 17, 2001 Distance vector routing protocols determine the best route from one computer to another based on the distance, or number of hops, and the time, or ticks, that separate hosts. Link state routing protocols use a cost metric to determine the best path between hosts. Link state routing protocols are generally more accurate and efficient than distance vector routing protocols and are better suited for traversing WAN links.
-
Manual 99a 38 July 17, 2001 two types. The Address Resolution Protocol (ARP) maps the IP address to the physical address. ARP mapping is limited to networks that support hardware broadcast. IP Subnetting One IP network can be divided into smaller networks, called subnets.
-
Manual 99a 38 July 17, 2001 IPX Addressing IPX defines its own internetwork and intranode (or intranetwork) addressing. For intranode addressing, IPX uses the physical address assigned to the network board. The IPX network address uniquely identifies an IPX server on an IPX network and individual processes within the server.
-
Manual 99a 38 July 17, 2001 DHCP The Dynamic Host Configuration Protocol (DHCP) uses a client-server structure to provide configuration parameters to hosts. DHCP consists of a protocol for providing host-specific configuration parameters from a DHCP server (or collection of DHCP servers) to a host and a mechanism to allocate network addresses to a host. When the DHCP server is loaded, it reads its configuration information from NDS and stores the information in its cache.
-
Manual 99a 38 July 17, 2001 SLP Agents The three types of agents that NetWare 5 SLP uses are User agents, which acquire service handles for user applications Service agents, which advertise service handles Directory agents, which collect service handles in internetworked enterprises Applications running on a computer are represented by a User agent that understands the service and resource needs of the application.
-
Manual 99a 38 July 17, 2001 Service Registration A Service agent forwards all known services to the Directory agent using a service register request. The register contains the URL, attributes, language indicator, and a time to live (lifetime). The service registration occurs when attributes are being updated or modified and once every lifetime period. Service Deregistration A Service agent sends a service deregister request to the Directory agent when the service is no longer available.
-
Manual 99a 38 July 17, 2001 routers must forward the multicast packets to all registered nodes. To solve this problem, NetWare SLP Directory agents collect the information from local segments and then establish IP unicast relationships. Although the SLP RFC defines the Directory agent and its relationship to the user and Service agents, the specification doesn't address the relationship among multiple Directory agents.
-
Manual Figure 1 User Agent (Server) 99a July 17, 2001 38 Service Location Protocol Directory Agent Service Agent User Agent (Workstation) Once the application has registered with the SLP User agent, it can look up a service or get a list of services and read the attributes of a service, using either blocking calls or synchronous calls.
-
Manual Figure 2 99a 38 July 17, 2001 Integrated Network Services Discovery WAN & LAN Segments Other Naming Services X.
-
Manual 99a 38 July 17, 2001 SLP Scope Container Object The SLP Scope container object is the storage container for SLP service information. Each object contains all the SLP Service objects for the specific scope. The NDS administrator can replicate the container into other partitions within the tree or within federated trees. The object is a stand-alone entity within the NDS tree and there is no relationship between its distinguished name, the tree name, and the scope name.
-
Manual 99a 38 July 17, 2001 SAP The Service Advertising Protocol provides the same function in IPX networks as SLP in IP networks. It registers information in a database and allows clients to query the database to find services.NetWare servers using IPX use SAP to advertise their services and network addresses. Routers gather this information and share it with other routers.
-
Manual 99a 38 July 17, 2001 OSPF Open Shortest Path First (OSPF) is an IP link state routing protocol. Link state routers exchange information about the state of their network connections or links. Using this information, each router can construct the topology of the internetwork, and from that derive a routing table consisting of the most efficient paths between devices.
-
Manual 99a 38 July 17, 2001 RIP II is an IP routing protocol that includes the following enhancements over RIP: Provides a password for authentication Allows specification of a subnet mask Allows multicast addressing Time Synchronization Synchronizing time across the network provides a service that maintains consistent time stamps for enterprise environments with several servers in different time zones.
-
Manual 99a 38 July 17, 2001 NDS Replication NDS replica synchronization ensures that changes to NDS objects are synchronized among all replicas of the partition. This means that any server that holds a replica of a partition must communicate with the other servers to synchronize a change.
-
Manual 28 99a 38 Server Communications Administration Guide Server Communications Administration Guide 103-000145-001 August 30, 2001 Novell Confidential July 17, 2001
-
Manual 2 99a 38 July 17, 2001 Planning As an open standard, pure IP offers flexibility and interoperability, now available to users of NetWare®. Although many customers may use both IP and IPXTM on their networks, a pure IP network is easier to administer and more easily integrated with other systems, such as UNIX* and Windows NT*. New IP migration tools and services in NetWare 6TM make migrating to a pure IP network managable, even for the largest networks.
-
Manual 99a 38 July 17, 2001 Protocol Selection Previous versions of NetWare used Internetwork Packet Exchange (IPX), a proprietary protocol developed by Novell®, for network communications. NetWare 6 uses TCP/IP (Transmission Control Protocol/Internet Protocol), IPX, or a combination of both IP and IPX. With increasing access to worldwide data exchange through the Internet, IP has become so popular that many companies'networks now require it. But IPX and IP are two separate protocols.
-
Manual 99a 38 July 17, 2001 Because most existing NetWare servers have some dependency on IPX applications and services, NetWare 6 installs with IP running Compatibility Mode as the default. When you install NetWare 6, you can choose to load with IPX only, or IP with Compatibility Mode. Although the Compatibility Mode driver is loaded on the server by default, it remains dormant until the server receives a request for IPX services.
-
Manual 99a 38 July 17, 2001 The Virtual IPX Network Created for the IPX Compatibility Feature The default IPX network number (CMD network number) assigned to the virtual IPX network created by the IPX Compatibility drivers is 0xFFFFFFFD. If you want to set up Migration Agents to interconnect IP systems with IPX systems, you must ensure that the CMD network number does not conflict with the internal IPX network number of a server or with the IPX network number of a network segment.
-
Manual Figure 3 IPX server 99a July 17, 2001 38 Migration Agent Interconnecting IP and IPX Nodes IPX client IPX printer IPX network NetWare 5 Migration Agent Server CMD network IP client IP server More than one MA is needed to enable resiliency and load-sharing, or when you want to interconnect IPX segments with an IP backbone. Figure 4 on page 34 shows two Migration Agents interconnecting two IPX segments.
-
Manual Figure 4 IPX server 99a July 17, 2001 38 Migration Agents Interconnecting IPX Segments IPX client IPX segment NetWare 5 Migration Agent Server IP backbone NetWare 5 Migration Agent Server IPX segment IPX client IPX server The MA is supported only at the NetWare server. The MA is enabled by loading the IPX Compatibility driver (scmd.nlm) with the Migration Agent option. The Migration Agents are then used by the IP systems on the network.
-
Manual 99a 38 July 17, 2001 Migration Agent Dependencies To set up an MA, the Service Location Protocol must be enabled across the networks, because Migration Agents are dependent on the capabilities of SLP. Dynamic Discovery of Migration Agents by IP Systems The IPX Compatibility drivers are capable of dynamically discovering Migration Agents, but you can also choose to statically configure the address of the MA if more control is desired.
-
Manual Figure 5 99a 38 July 17, 2001 IP Only Architecture Diagram Application APIs SPX / IPX NCP TCP / IP IPX Compatibility Driver Network adapters The IPX stack is loaded on systems installed with IP to give those systems the ability to execute IPX applications and to connect with IPX systems through a Migration Agent.
-
Manual 99a 38 July 17, 2001 They can execute IPX applications and communicate directly with other NetWare 6 systems installed with IP. They can execute IPX applications and communicate through a Migration Agent with IPX nodes. IPX Install Option These systems have the IPX stack loaded and may also have the TCP/IP stack loaded. Systems installed with IPX only are configured to establish only NCP connections over the IPX stack.
-
Manual 99a 38 July 17, 2001 NetWare 6 clients installed with IPX have the following capabilities: They can establish NCP connections with pre-NetWare 6 servers or with NetWare 6 servers installed with one of the install options that include IPX. They can establish NCP connections through a Migration Agent with NetWare 6 servers installed with IP. They can execute IPX applications and communicate directly with other IPX nodes.
-
Manual 99a 38 July 17, 2001 NetWare clients installed with IP and IPX have the following capabilities: They can establish NCP connections with pre-NetWare 6 servers or with NetWare 6 servers installed with one of the install options that include IPX. They can establish NCP connections with NetWare 6 servers installed with IP if the clients are able to obtain IP addresses for those servers.
-
Manual Figure 8 99a 38 July 17, 2001 Migration Agent Architecture Diagram Application APIs SPX / IPX NCP TCP / IP IPX Router IPX Compatibility Driver in Migration Agent Mode Network adapters Notice that the MA makes use of the IPX router present in the IPX stack to route packets between the CMD network and the IPX networks. NetWare 6 servers installed with the MA enabled are capable of communicating directly with other systems without regard for the install option used to install them.
-
Manual 3 99a 38 July 17, 2001 Setting Up If you want to migrate from your existing IPX-based network to a NetWare® 6 pure IP-based network, you should first read the Planning section. It discusses Compatibility Mode Drivers (CMD) and Migration Agents (MA), the building blocks needed to successfully migrate an IPXTM network to NetWare 6 and pure IP. Also discussed in the Planning section are the NetWare 6 server and client installation options. You can install using IP only, IPX only, or IP and IPX.
-
Manual 99a 38 July 17, 2001 Migrating to Obtain Internet Connectivity To add Internet connectivity to NetWare systems, simply upgrade to NetWare 6 using the IP and IPX option. This upgrade path requires administration of both IP and IPX networking protocols.Those who choose this migration path do not have to worry about setting up Migration Agents to maintain connectivity as they upgrade their systems.
-
Manual 99a July 17, 2001 38 1 Select and upgrade/install some servers to serve as Migration Agents in the network section to be migrated. 2 Upgrade/Install all servers in the network section using the IP and IPX option. 3 Upgrade/Install all clients in the network section using the IP only option. 4 Modify the configuration of the servers in the network section to be IP only. 5 Turn off IPX networking between the selected section of the network and the rest of the network.
-
Manual 99a 38 July 17, 2001 Migrating Leaf Networks First Migrating leaf networks first reduces the impact of the migration on the IPX routing infrastructure of the network, and it allows the administrator to focus efforts on specific sites. However, since the backbone is the last portion of the network migrated, administrative costs may not be offset as quickly. The steps below describe how to migrate a network from IPX to IP starting with the leaf networks first.
-
Manual Figure 10 99a 38 July 17, 2001 Migrating a Leaf of the Network First Servers . . . Clients . . . Segment C Servers . . . WAN link WAN link Router B Router C Segment B Se Router A Clients . . . Servers . . . Clients . . . Segment A Servers . . . Clients . . . 1 Identify Segment C as the backbone. 2 Upgrade/Install two servers in Segment C as NetWare 6 Migration Agents.
-
Manual 99a 38 July 17, 2001 Migrating the Backbone First Migrating the backbone first alleviates administrative costs associated with maintaining IPX over the backbone.
-
Manual Figure 11 99a July 17, 2001 38 Migrating the Backbone First Servers . . . Clients . . . Segment A Router A Servers . . . Clients . . . WAN link Segment B WAN link WAN link Router B Router C Segment C Segment D Servers . . . Clients . . . Servers . . . Clients . . . 1 Identify Segment B as the backbone. 2 Upgrade/Install one or two servers in segments A, C, and D as NetWare 6 Migration Agents with the Backbone Support feature enabled.
-
Manual 99a 38 July 17, 2001 Avoiding Inefficient Routing The following two examples show problems that you can avoid by carefully selecting the placement of Migration Agents in the network. Example 1 The following figure shows a client installed as IP only in Segment C trying to communicate with an IPX server in Segment A.
-
Manual 99a July 17, 2001 38 The problem presented here could be solved by placing a Migration Agent in Segment A as shown in the foloowing figure. The Migration Server would then present to Server A the best route to the CMD network and the packets from Server A to Client A would follow the path shown by the broken line.
-
Manual Figure 14 99a 38 July 17, 2001 Sample Network Setup for Example 2 Migration Agent Segment A WAN link Router Segment B Client A Client B IP only IPX only The problem could be solved by placing a Migration Agent in Segment B as shown in the following figure.
-
Manual Figure 15 99a July 17, 2001 38 Sample Network Setup for Example 2 Migration Agent Segment A WAN link Router Segment B Client A IP only Migration Agent Client B IPX only SAP/RIP Filters and the Migration Agent Backbone Support Feature If the Backbone Support feature of the Migration Agents is enabled, then the SAP/RIP information exchange between these agents can bypass the SAP/RIP filters that you might have set up in your routers.
-
Manual 99a 38 July 17, 2001 Turning Off Microsoft IPX Networking Clients might be set up to use Microsoft Networking over IPX and/or IP. If clients are set up this way and you want to migrate them from IPX to IP, you should first enable Microsoft Networking over TCP/IP and then disable Microsoft Networking over IPX. This might be necessary to reduce the demand on the services provided by the IPX Compatibility feature.
-
Manual 99a 38 July 17, 2001 4 Turn off IPX networking at the routers when all the IPX applications have been migrated and all the NetWare servers and clients have been upgraded/installed using the IP and IPX option. 5 Modify the configuration of the NetWare servers and clients to be IP only servers and clients. Configuring the Compatibility Mode Compatibility Mode can be loaded in two different modes. When you enter the command, SCMD.NLM, the product is loaded in Compatibility Mode Server mode.
-
Manual 99a 38 July 17, 2001 Setting the Preferred IP Address If multiple IP interfaces are present in the server, you can set the preferred IP address to be used by CMD. Enter the following command: Set Preferred IP Address=XX.XX.XX.XX This option can be used when the SCMD.NLM is running either in the Compatibility Mode Server mode or Migration Agent mode. Optionally, the Preferred IP address can be changed dynamically while loading the module.
-
Manual 99a 38 July 17, 2001 Setting the SCMD.NLM to Provide IP Backbone Support By default, IP Backbone is enabled when the SCMD.NLM is loaded using the /MA option. Ensure the following: Each IPX disconnected network has at least one Migration Agent running SCMD. All the Migration Agents should have NetWare Link Service Protocol (NLSP) routing enabled and should have the same CMD network number. SLP visibility exists among all the Migration Agents.
-
Manual 99a 38 July 17, 2001 Optionally, you can load CMD in the SLP-independent mode and set the communication time for the Migration Agents to communicate with each other. To do so, at the console prompt type: Load Scmd /Noslp /Synctime = X minutes You can specify the Preferred Migration Agents which this node will be using.
-
Manual 99a 38 July 17, 2001 Viewing the CMD Server Statistics You can use the statistics option to view the current status of the CMD server or Migration Agent. Enter the following command to view the information on the CMD information screen: Scmd /stat If you want the information to be sent to a file, enter the following command: Scmd /stat [/Dump] The information will be written in the CMDSTAT.DAT file in the SYS:\ETC\ directory.
-
Manual 99a July 17, 2001 38 public realm. A realm should be assigned a unique name. The next figure depicts two private routing realms, BLR and Provo, connected by a public realm to the Internet. To enable CMD communication between BLR and Provo, use the options mentioned in “Configuring CMD to Support NAT” on page 59. Figure 16 Two private routing realms, BLR and Provo, connected by a public realm to the Internet Pb-CMD-Clnt 201.1.1.3 Pb-MA 201.1.1.2 201.1.1.1 Internet NAT Router 172.16.1.
-
Manual 99a 38 July 17, 2001 A sample configuration for a section of the network is given below: Prv-MA Blr-CMD PB-CMD-CLNT NAT realm = Provo NAT Realm = Blr Preferred MA List = 172.16.1.2 201.1.1.2 Public IP Address = 137.65.2.2 Public IP Address = 193.97.54.3 NA Public IP Subnet = 255.255.0.0 Public IP Subnet = 255.255.255.0 NA Local client number = 172.16.0.0/ Local client number = 0.0.0.0/ NA The NAT support feature cannot be used when CMD is running in SLPindependent mode.
-
Manual 99a 38 July 17, 2001 You can also use the SET command to configure the CMD for NAT support. These options are listed below. To assign the public IP address, enter the following command: Set Public IP Address = XX.XX.XX.XX To assign the public IP subnet, enter the following command: Set Public IP Subnet = XX.XX.XX.
-
Manual 99a 38 July 17, 2001 Troubleshooting the NAT Support Feature If the NAT support feature is not working, check whether: The Service Location Protocol Directory Agent (SLPDA) has been loaded on one server and pointed to by all the servers that need to communicate using NAT. The NAT router public interface has been set to RIP Receive Only. All clients in the private realm are pointing to a private interface of the NAT router. Default routers are specified on servers.
-
Manual 62 99a 38 Server Communications Administration Guide Server Communications Administration Guide 103-000145-001 August 30, 2001 Novell Confidential July 17, 2001
-
Manual 4 99a 38 July 17, 2001 Optimizing Once your network is running, the protocols associated with IP and IPXTM are largely responsible for auto-tuning themselves based on network conditions. There are, however, some settings that you can change to further optimize the way your server receives and forwards packets.
-
Manual 99a 38 July 17, 2001 3 Click Large Internet Packet Start Size and enter the size. 4 Click OK. Using Packet Burst The Packet BurstTM protocol speeds the transfer of NCPTM data between a workstation and a NetWare server by eliminating the need to sequence and acknowledge each packet. With Packet Burst protocol, the server or workstation can send a whole set (burst) of packets before it requires an acknowledgment.
-
Manual 99a 38 July 17, 2001 For workstations to send and receive Packet Burst data, you must enable Packet Burst under the NetWare DOS Requester (for DOS or Windows 3.x) or under the Novell Client Properties, Advanced Settings (for Windows 95 or Windows NT). For the procedures, see the help files associated with your client software.
-
Manual 99a 38 July 17, 2001 2 Scroll down the Communications Parameters list. 3 Select Maximum Packet Receive Buffers. 4 Increase the value of this parameter and press Enter. A good guideline is to set this value to twice the size of the Minimum Packet Receive Buffer value. The changed value is now persistent. For additional suggestions, see the discussion of the Maximum Packet Receive Buffer parameter in SET Communication Parameters.
-
Manual 5 99a 38 July 17, 2001 Managing Once your network is running, network communications management involves maintaining the physical connections between machines and maintaining the drivers that communicate with the network board. To use a network board, the LAN driver must be bound to the board.
-
Manual 99a 38 July 17, 2001 Once the LAN driver is loaded, you must bind the LAN driver to a communication protocol. Binding a LAN driver assigns a network communication protocol to the driver and the network board. Without a protocol, the LAN driver can't process packets, and workstations attached to the cabling scheme from that board can't log in. The protocol is actually bound to a protocol ID (PID) that is part of a frame type.
-
Manual 99a 38 July 17, 2001 3 If you want NetWare to automatically detect all the drivers that are compatible with your network boards, select Discover and Load Additional Drivers; otherwise, skip to Step 5. NetWare automatically finds the parameter values for the driver, loads the driver with the parameters, and then discovers the IPX protocol for the frame type supported for the driver. NetWare then displays the IPX internal and external network addresses in a confirmation box.
-
Manual 99a 38 July 17, 2001 10 Use the down arrow key to move the cursor to the parameter window; enter parameter values as needed. Press for help if necessary. In some cases, the system displays a pop-up list of values for the field from which you select the desired value. In other cases, you must type in a value and press to move to the next field. You can also specify a specific frame type if desired.
-
Manual 99a 38 July 17, 2001 Using Logical Boards A LAN driver can be loaded with multiple frame types. Each instance of a LAN driver and an associated frame type is one logical board. Therefore, while there might be only one physical network board in the server with one LAN driver, there can be multiple logical boards. For example, if your server contains an NE2000TM board, you can load the NE2000 LAN driver with frame types Ethernet_802.2 and Ethernet_II.
-
Manual 99a 38 July 17, 2001 Shutting Down and Resetting Logical Boards You can shut down a logical board without removing its resources. In this case, you can restart the board, if needed, without reloading and binding the LAN driver. 1 Determine the logical board number or name. A name can be assigned to a logical board when the board is loaded using the LOAD command. If no name was assigned to the board, you can determine the logical board number by using MONITOR.
-
Manual 99a 38 July 17, 2001 1 Determine the filename and the instance number for the board you want to remove. The filename is the name of the LAN driver, such as ne2000.lan. The board instance number is the number of the board if there is more than one board of the same type installed in the server. 1a At the server console prompt, load MONITOR. 1b Select LAN/WAN Drivers and highlight the desired LAN driver. A screen displays the instance number and other data for boards associated with the driver.
-
Manual 99a 38 July 17, 2001 A screen displays the instance numbers and other data for boards associated with the driver. Note the instance number for the board you want to remove. 2 Enter the following at the server console prompt: RESET NETWORK ADAPTER filename, [board_instance_number] Include the board instance number only if there are multiple instances of the same adapter in the server. Preventing Cabling Problems Use the proper cabling for your network topology as specified by IEEE.
-
TCP/IP Administration Guide Novell NetWare 6 ® www.novell.
-
Manual Rev 99a 18 April 00 27 Contents About This Guide 9 Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 1 Understanding 11 The TCP/IP Suite of Protocols . . . . . . . . . Overview of TCP/IP Protocol Usage . . . . . . Transport Layer Protocols . . . . . . . . . . . UDP. . . . . . . . . . . . . . . . . . . . . TCP . . . . . . . . . . . . . . . . . . . . . Internet Protocol . . . . . . . . . . . . . . . . Path Maximum Transfer Unit . . . . . . .
-
Manual Multiple Default Gateway . . . . . . . . . . . . . Dead Gateway Detection . . . . . . . . . . . . . Probe Interval . . . . . . . . . . . . . . . . . Probe Timeout . . . . . . . . . . . . . . . . . Path MTU Black Hole Detection and Recovery . . Provision of Non-ARPable Secondary IP Address 3 4 6 . . . . . . 18 April 00 27 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
-
Manual Rev 99a Configuring Static Routes for LANs . . . . . . . . . . . . . . . . How to Configure a LAN Static Route . . . . . . . . . . . . . Configuring a Default Gateway (LAN Static Route) . . . . . . Comparing Different Default Gateway Configuration Methods . Enabling Dead Gateway Detection . . . . . . . . . . . . . . . Configuring Dead Gateway Detection . . . . . . . . . . . . . Configuring Load Balancing . . . . . . . . . . . . . . . . . . . . Configuring Fault Tolerance . . . . . . . . . . . . . .
-
Manual Rev 99a Routing Table Maintenance Problems . . . . . . . . . . . . . . . . . IP Address Duplication across Machines . . . . . . . . . . . . . . Server Not Responding under Heavy Stress Conditions . . . . . . . Load Not Balanced across NICs although LB is enabled in INETCFG Network Traffic Is Not Balanced across NICs . . . . . . . . . . . . . Losing INETCFG Configuration Information upon Rebooting . . . . . Loss of Secondary IP Address upon Deleting Any Binding . . . . . . A 18 April 00 27 . . .
-
Manual 99a 38 July 17, 2001 About This Guide This guide provides the information you need to configure and manage the Novell® TCP/IP networking software. In addition to planning information, this guide provides troubleshooting tips, techniques, and tools, as well as the symptoms of and solutions to commonly occurring problems with the TCP/IP components.
-
Manual 10 99a NetWare TCP/IP Administration Guide NetWare TCP/IP Administration Guide 103-000151-001 August 30, 2001 Novell Confidential 38 July 17, 2001
-
Manual 1 99a 38 July 17, 2001 Understanding This chapter introduces TCP/IP and provides an overview of the TCP/IP suite of protocols.
-
Manual 99a July 17, 2001 38 illustrates the seven layers of the OSI reference model, as defined by ISO, and the roughly corresponding layers of the TCP/IP protocol suite.
-
Manual 99a 38 July 17, 2001 Protocol Service Address Resolution Protocol (ARP) Maps IP addresses to physical addresses. Transmission Control Protocol (TCP) Provides reliable data-stream delivery service between end nodes. User Datagram Protocol (UDP) Provides unreliable datagram delivery service between end nodes. File Transfer Protocol (FTP) Provides application-level services for file transfer. TELNET Provides terminal emulation.
-
Manual 99a 38 July 17, 2001 computer are peers. Each layer of the protocol stack on the source computer communicates with its peer layer on the destination computer. From the perspective of the software developer or user, the transfer takes place as if the peer layers sent their packets directly to one another.
-
Manual 99a 38 July 17, 2001 3. The IP layer creates a packet with a data portion containing the TCP segment. The IP layer adds a packet header containing source and destination IP addresses. 4. The IP layer also determines the physical address of the destination computer or intermediate computer on the way to the destination host. It passes the packet and the physical address to the Data-Link layer. A checksum is computed on the IP header. 5.
-
Manual 99a 38 July 17, 2001 identify which port the process uses. The port must be in the range of 1,024 to 65,535. UDP UDP identifies applications through ports. The protocol defines two types of protocol ports: well-known port assignments and dynamically bound ports. For well-known port assignments, certain UDP port numbers are reserved for particular applications. Then the application can direct UDP datagrams to that port.
-
Manual Figure 3 99a 38 July 17, 2001 A UDP datagram encapsulated in an IP datagram which, in turn, is encapsulated in an Ethernet frame UDP Header Source Port Destination Port UDP Data UDP Data UDP Datagram IP Header IP Datagram Frame Header Ethernet CRC Ethernet Frame In this example, the IP address transmits the IP datagram to the node. At that destination, the IP software extracts the UDP datagram and delivers it to the UDP-layer software.
-
Manual 99a 38 July 17, 2001 responding to the transfer request, known as the server side, generally uses a well-known TCP port. The client side is typically the active side and initiates the connection to the passive server side. Like the UDP datagrams, TCP segments are encapsulated in an IP datagram. TCP buffers the stream by waiting for enough data to fill a large datagram before sending the datagram.
-
Manual Figure 4 99a 38 July 17, 2001 Basic frame of an IP Datagram IP Datagram Data IP Datagram Header Header Information Source IP Address Destination IP Address Options Data The IP address for a node is a logical address and is independent of any particular hardware or network topology. It has the same form, regardless of the media type.
-
Manual 99a July 17, 2001 38 largest IP packet that can be sent across the path without fragmentation. This feature conforms to RFC 1191. This feature is automatically enabled when you enable TCP/IP. Path MTU Discovery Process There are two advantages to this feature. The Path MTU avoids fragmentation anywhere along the path and it reduces the protocol overhead. The Path MTU discovery process prevents fragmentation between two routers.
-
Manual 99a 38 July 17, 2001 6. Host A receives the error message from Router 1. In response, it adjusts the maximum segment size to 1,460 bytes. 7. Host A resends the data from Step 3. Each packet consists of 1,460 bytes of data and 40 bytes of header information. 8. Router 1 accepts the packets and forwards them to Router 2, which then sends them on to Host B. Assigning IP Network Addresses IP network addresses should be assigned by one person at your company.
-
Manual 99a 38 July 17, 2001 The addresses for all the nodes on the network must meet the following criteria: All addresses within a network must use the same prefix. For example, any node on network 129.47 must have an address in the form 129.47.x.x. Each node must have a unique IP address.
-
Manual Figure 6 38 July 17, 2001 A Class A IP address 3 Bytes 1 Byte 0 99a Network Address Host Portion Class B Addresses A Class B IP address consists of a 2-byte network portion followed by a 2-byte host portion, as shown in Figure 7. The two highest-order bits of the network portion are always set to 10. Thus, within a single internetwork there can be approximately 16,000 Class B networks (128.0 through 191.255), with more than 65,000 nodes in each.
-
Manual 99a 38 July 17, 2001 The format of a Class C address is as follows: 110nnnnn.nnnnnnnn.nnnnnnnn.hhhhhhhh where n represents the network address and h represents the host address. Class C addresses contain 21 bits of network address and 8 bits of host address. Figure 8 A Class C IP address 3 Bytes 110 1 Byte Network Address Host Portion Identifying Network Classes The first byte of an IP address identifies which of the three network classes that address belongs to.
-
Manual 99a 38 July 17, 2001 Selecting an Appropriate Address Class When selecting an IP address class, you must decide on both network numbers and host address portions. Because the first 1, 2, or 3 bits of the IP address determine how the entire address is to be interpreted and where the division between the network address and host address portion is to occur, you should know the consequences of your choice.
-
Manual 99a 38 July 17, 2001 Physical and IP Addresses Each node has a physical address for the specific hardware device that connects it to a network. For instance, a physical address on an Ethernet network is a 6-byte numeric value, such as 08-00-14-57-69-69. It is assigned by the manufacturer of the Ethernet interface hardware. X.25 networks, which conform to the specification of the ITU-T (International Telecommunications Union, Telecommunications sector), previously CCITT, use the X.
-
Manual 99a 38 July 17, 2001 Mapping Internet Addresses to Physical Addresses When an IP address is mapped to a physical, or MAC, address, ARP is used on broadcast networks such as Ethernet, token ring, and ARCnet. When a node uses IP to send a packet, it must determine which physical address on the network corresponds to the destination IP address. To find the physical address, the node broadcasts an ARP packet containing the destination IP address.
-
Manual 99a 38 July 17, 2001 Creating Subnets One IP network can be divided into smaller networks, called subnets. The following are reasons to divide your network: Use multiple media—It can be impossible, inconvenient, or too expensive to connect all nodes to a single network medium when these nodes are too far apart or already connected to different media. Reduce congestion—Traffic between nodes on a single network uses network bandwidth.
-
Manual 99a 38 July 17, 2001 Subnet Addresses and Masks Communication between a node on a local subnet and a node on a different subnet is similar to communication between nodes on two different networks. To a user, routing between subnets is transparent. Internally, the IP software recognizes any IP addresses that are destined for a remote subnet and sends those packets to the router on that subnet.
-
Manual Figure 11 99a 38 July 17, 2001 A single IP network divided into two subnets 129.47.192.254 129.47.192.253 Subnet Address: 192(1100) 129.47.193.1 129.47.192.1 Subnet Mask for Network Address 129.47.0.0: 255.255.240.0 or 0xFF.0xFF.0xF0.0x00 (11111111.11111111.11110000.00000000) Router All Other Networks 129.47.128.1 129.47.129.1 129.47.128.254 Subnet Address: 128(1000) 129.47.128.
-
Manual Table 2 99a July 17, 2001 38 Subnet Masks with Class C Addresses Class C IP Address 200.2.1.209 Network Number Subnet Number Host Number Available Networks, Subnets, and Hosts FF.FF.FF.0 200.2.1.0 None 0.0.0.209 1 network, 0 subnets, and 254 hosts FF.FF.FF.E0 200.2.1.0 200.2.1.192 0.0.0.17 7 subnets and 30 hosts per subnet FF.FF.FF.F0 200.2.1.0 200.2.1.208 0.0.0.
-
Manual 99a 38 July 17, 2001 Subnet Zero Subnet zero is a subnet with all the bits in the subnet field of the IP address set to 0. For example, subnet 130.57.0.0, with a mask of 255.255.240.0, is a subnet zero of network 130.57, as shown in Figure 13 on page 32. Figure 13 A subnet zero Subnet Address Local Host Portion Network Address Subnet Mask: 11111111.11111111.11110000.00000000 130.57.0.1: 10000010.00111001.00000000.
-
Manual 99a 38 July 17, 2001 For example, subnet 16 of network 130.57.0.0 with mask 255.255.240.0, 130.57.16.0, can be further divided into 16 sub-subnets with 256 hosts each. (Actually, this division creates 15 sub-subnets with 254 hosts each because sub-subnet 130.57.31.0, host 0, and host 255 are not used.) NOTE: OSPF and RIP II recognize subnet masks and support variable size subnets.
-
Manual 99a 38 July 17, 2001 Then, you assign host addresses on each subnet as follows: ... Using this method leaves a buffer zone between the subnet and host addresses, which enables future network growth. The method of assigning subnet addresses described in this section summarizes the method suggested in RFC 1219, On the Assignment of Subnetwork Numbers. For a complete description of this method, refer to RFC 1219.
-
Manual 99a 38 July 17, 2001 and 224.0.0.6. Two are used by Router Discovery messages to multicast router advertisements and solicitation messages. These addresses are 224.0.0.1 and 224.0.0.2. RIP II uses multicast address 224.0.0.9. Routing The term routing refers to the transmission of a datagram from one node to another on the same or a different network.
-
Manual Figure 14 99a 38 July 17, 2001 How the router connects the source to the destination network Token Ring Network 130.58.0.0 Ethernet Network 130.58.1.1 140.88.0.0 Router 140.88.12.1 140.88.3.4 130.58.1.2 Each host has a default router or a list of routers in other networks. When IP sends a datagram the following happens: 1. IP searches the routing table of the sending node for a default route or a path to the destination IP address. 2.
-
Manual 99a 38 July 17, 2001 Error and Control Messages Another protocol in the TCP/IP suite is the Internet Control Message Protocol (ICMP). ICMP packets contain information about errors and control on the network: inoperative nodes and gateways, packet congestion at a gateway, and so on. The IP software, rather than the application, interprets an ICMP message. The IP software then takes the appropriate action with respect to the ICMP message, independently of the application.
-
Manual 99a 38 July 17, 2001 Forwarding is disabled, the Router Discovery Protocol will send Router Solicitation Messages. these messages are explained in the next section. Router Discovery Messages The two message types that are used by the Router Discovery Protocol to communicate between hosts and routers are discussed in the following sections. ICMP Router Advertisement Message The ICMP Router Advertisement Message is ICMP message type 9.
-
Manual 2 99a 38 July 17, 2001 Novell TCP/IP The Novell® TCP/IP stack consists of the following five NetWare® Loadable ModuleTM (NLMTM) programs: BSDSOCK.NLM provides the BSD standards sockets interface. TCP.NLM provides the transport layer TCP and UDP interfaces. TCPIP.NLM provides IP, ICMP, IGMP, Routing and other networking layer protocols. NETLIB.NLM is a library of the entire stack. INETCFG.NLM allows you to configure the stack with the help of TCPCFG.NLM.
-
Manual 99a 38 July 17, 2001 Multihoming (page 41) Multiple Default Gateway (page 43) Dead Gateway Detection (page 43) Path MTU Black Hole Detection and Recovery (page 44) Provision of Non-ARPable Secondary IP Address (page 45) Selective Acknowledgement The Selective Acknowledgment (SACK) is a mechanism that includes a retransmission algorithm which helps overcome weak links on the TCP/IP stack. The selective acknowledgment extension uses two TCP options.
-
Manual 99a 38 July 17, 2001 TCP Defend Fin Attack The TCP Defend Fin Attack solution provides a simple, single tuning option, the Minimum Threshold parameter. In the TCP stack, the wait states (FIN_WAIT1, FIN_WAIT2, CLOSED_WAIT, LAST_ACK and CLOSING) are arranged in ascending order of importance by considering which of the states are less risky to terminate. The order is static. The stack assumes that there is no risk in terminating all connections in a less important state.
-
Manual 99a 38 July 17, 2001 address. If the secondary address is not valid on any of the networks bound to existing interfaces, the address is rejected and an error message is produced. Load Balancing and Fault Tolerance With this release, the multihoming feature is extended to help configure the stack for load balancing and fault tolerance at NIC/Link level.
-
Manual 99a 38 July 17, 2001 Multiple NIC Single IP Address—Here the clients use the same IP address to communicate with the server. This is achieved through using the round robin method of distributing the NIC addresses for the ARP requests sent by the clients. This solution avoids the extra configuration and transparently achieves the load balancing for incoming packets. During a NIC failure, the server sends a message to the clients to forcefully use them as the other interface's MAC address.
-
Manual 99a 38 July 17, 2001 Probe Interval This configured parameter lets you fine-tune the performance of the Dead Gateway Detection feature by modifying the time interval (in seconds) at which probes are sent to the default gateway to determine whether it is functional or not. For more information on this, see “Configuring Probe Interval” on page 74.
-
Manual 99a 38 July 17, 2001 The feature specifies the maximum transmission unit size of an interface. Each media type has a maximum frame size that can't be exceeded. The Link layer is responsible for discovering this MTU and reporting it to the protocols above it. For more information on this, see “Path MTU Black Hole Detection and Recovery” on page 57.
-
Manual 46 99a NetWare TCP/IP Administration Guide NetWare TCP/IP Administration Guide 103-000151-001 August 30, 2001 Novell Confidential 38 July 17, 2001
-
Manual 3 99a 38 July 17, 2001 Setting Up This chapter describes how to set up the basic components of Novell® TCP/ IP. For this release, only LAN configurations are supported. The following topics are discussed: “Configuring Boards” on page 47 “Enabling TCP/IP” on page 51 “Binding Protocols” on page 52 Configuring Boards Configuring, or reconfiguring, a board involves choosing a driver for the board, assigning a name to the board, and configuring the board parameters.
-
Manual 99a 38 July 17, 2001 Loading INETCFG To load INETCFG at from the server prompt enter inetcfg The Internetworking Console interface is displayed. For the next set of operation you need to select options on the Internetworking Console screens. Configuring a LAN Board To configure a board, complete the following steps: 1 Load INETCFG and then click Boards. 2 Do one of the following: 2a If you are configuring a new board: Press Ins to display the list of available drivers.
-
Manual 99a 38 July 17, 2001 Slot—Number of the slot where the board is installed. Status—Status of the board, which is Enabled by default. Comment—Any comments that you enter about the board or its configuration. NOTE: Not every board-driver configuration requires all this information; in fact, some configurations require other, link-specific parameters that are not shown in the Configured Boards screen.
-
Manual 99a 38 July 17, 2001 LAN boards with a single network interface need no further configuration; however, an enabled driver is not loaded unless a protocol is bound to it. After a data-link protocol has been associated with the board, select Reinitialize System or restart the router to make the changes take effect. If there are any conflicts with the hardware parameters of other boards, one or more messages describe them.
-
Manual 99a 38 July 17, 2001 and reinitialize the system. To avoid this problem, use INETCFG to load both drivers. 3 Press Esc to return to the Internetworking Configuration menu. Deleting a LAN Board 1 Load INETCFG and then click Boards 2 Select the board you want to delete and press Del. A message is displayed indicating that deleting the board also deletes all existing binds to the board's interfaces. 3 When prompted, select Yes to delete the board.
-
Manual 99a 38 July 17, 2001 You can further set the detailed configuration of each of the above fields. For more information of how to configure TCP/IP, see chapter Chapter 3, “Setting Up,” on page 47. Binding Protocols 1 Load INETCFG and then click Binding. 2 Select a protocol. Here you need to enter data in terms of Protocol, Interface/Group, Status and Identifier. There might be instances when you need to enter data in the screens still to come and that is reflected here.
-
Manual 4 99a 38 July 17, 2001 SET Parameters This chapter discusses how to use SET parameters to change some of the default parameters or enable/disable the various features provided in Novell® TCP/IP stack. Configuration Using SET Options The following SET options allow you to configure certain parameters from the command line on the host.
-
Manual 99a 38 July 17, 2001 ARP Cache Update Timeout Syntax: set arp entry update time = n Description: Specifies a timeout period for a cache table entry to be removed from the ARP cache table if the entry has not been updated. Range: 240 to 14400 (seconds) Default: 300 BSD Socket Default Buffer Size Syntax: set bsd socket default buffer size in bytes = n Description: Sets the BSD Socket default send and receive buffer sizes.
-
Manual 99a July 17, 2001 38 IP Address Duplicates Syntax: set allow ip address duplicates = string Description: Binds the IP address even if it conflicts with another node in the network. (TCP/IP normally will not allow you to bind IP addresses that conflict with other nodes in the network.) Range: On | Off Default: Off (disabled) Syntax: set tcp large window option = string Description: Enable or disable the Large Window option.
-
Manual 99a 38 July 17, 2001 Maximum Packet Receive Buffers Syntax: set maximum packet receive buffers = string Description: Allocate the maximum packet receive buffers to the server. This option can be set in the AUTOEXEC.NCF file. You can also use this option to fine-tune the server when it is stressed. Range: 50 to 3303820 (packets) Default: 10000 HINT: If you want to see the current value, do not assign any variable to set the parameter.
-
Manual 99a 38 July 17, 2001 Path MTU Black Hole Detection and Recovery Syntax: set tcp path mtu black hole detection and recovery = string Description: Enable or disable the Path MTU Black Hole Detection and Recovery option. Range: On | Off Default: Off (disabled) Selective Acknowledgement Syntax: set tcp sack option = string Description: Enable or disable the SACK option.
-
Manual 99a 38 July 17, 2001 TCP Defend Land Attacks Syntax: set tcp defend land attacks = string Description: Enable or disable defense against land attacks. Range: On | Off Default: On (enabled) TCP Defend SYN Attacks Syntax: set tcp defend syn attacks = string Description: Enable or disable defense against SYN attacks.
-
Manual 5 99a 38 July 17, 2001 Protocols The Novell® TCP/IP software provides a set of configurable parameters with which you can modify operational characteristics of the Internet Protocol (IP). You can select its routing protocol and configure it to run over a LAN. In NetWare® 6, configuration over WAN connections is not supported. To configure IP, you enable the protocol, set its parameters, and bind it to a network interface.
-
Manual 99a 38 July 17, 2001 “Configuring Source Route Packet Forwarding” on page 82 “Configuring BOOTP Forwarding” on page 82 “Configuring EGP” on page 83 “Configuring Multiple Logical Interfaces” on page 84 “Configuring a Secondary IP Address” on page 86 Configuring RIP RIP is probably the most common IP routing protocol in use. It is widely available and presents few obstacles to interoperability with other IP internetworks, most notably the Internet.
-
Manual 99a 38 July 17, 2001 example, you might want to increase the cost of an interface that uses a slow link so that, given the choice, RIP uses the interface to a faster, less costly link. The default cost for each interface is 1. Do not increase this value on an interface unless you want to discourage its use as an eligible routing path.
-
Manual 99a 38 July 17, 2001 Status—Status of RIP routing on this interface. RIP routing is enabled by default; to disable RIP routing only on this interface, select this parameter, then select Disabled. RIP Version—Version of RIP to use on this interface. Select one of the following options: RIP I—Standard version of RIP used by most IP routers and end nodes. This is the default option. RIP I & RIP II—Both versions of RIP.
-
Manual 99a 38 July 17, 2001 configuring these parameters can increase routing traffic or cause loss of connectivity on your network. 4 Press Esc until you are prompted to save your changes, and then select Yes. 5 Press Esc to return to the Internetworking Configuration menu. 6 If you want these changes to take effect immediately, select Reinitialize System > Yes to activate your changes.
-
Manual 99a 38 July 17, 2001 the Router ID, you should use the default unless you need a simpler numbering scheme for administrating several hundred routers on an internetwork. HINT: If you are using an unnumbered point-to-point interface, we recommend that you configure a unique router ID. Optionally, OSPF can be configured to authenticate its packets by providing an authentication key —an 8-byte, alphanumeric password—in each OSPF packet header.
-
Manual 99a 38 July 17, 2001 routing protocols besides OSPF. To help you configure only what is necessary, this section provides the following procedures: Basic OSPF configuration Advanced OSPF configuration Basic OSPF Configuration To enable OSPF routing on the router and to configure OSPF on a network interface, do the following: 1 Load INETCFG and then select Protocols > TCP/IP 2 Select the OSPF field and then Enabled. This action enables OSPF routing globally on the router.
-
Manual 99a 38 July 17, 2001 5 If you want these changes to take effect immediately, select Reinitialize System > Yes. Advanced OSPF Configuration To configure advanced OSPF features, do the following: 1 Load INETCFG and then select Protocols > TCP/IP. 2 Select OSPF Configuration.
-
Manual 99a 38 July 17, 2001 Area ID—Four-byte decimal number that identifies the area. For example, a valid Area ID is 85.8.0.11. However, the Area ID does not have to be an IP address. You can enter any number, but it must be in the format of an IP address. If you enter a hexadecimal number, INETCFG converts it to decimal. For the router to belong to an area, the Area ID that identifies that area must be assigned to at least one of the router's interfaces.
-
Manual 99a 38 July 17, 2001 This parameter is required only if you enabled the Authentication parameter for the area you select, as described in Step 6 on page 66. IMPORTANT: Not all interfaces within the same area are required to have the same authentication key; however, all interfaces connected to the same network must have the same authentication key. 10 Press Esc until you are prompted to save your changes, and then select Yes. 11 Press Esc to return to the Internetworking Configuration menu.
-
Manual 99a 38 July 17, 2001 7 If you want these changes to take effect immediately, select Reinitialize System > Yes. Configuring Static Routes for LANs Static routes are useful if you want to do any of the following on your network: Eliminate routing traffic, which increases the bandwidth available for data. Limit user access to one portion of the network.
-
Manual 99a 38 July 17, 2001 packet on the network until a router can forward it to its final destination. IP Address of Network/Host—Enter the address of the destination network or host. To select from a list of symbolic network or host names and addresses, press Ins. The list of symbolic network names and addresses comes from the SYS:\ETC\NETWORKS file. The list of symbolic host names and addresses comes from the SYS:\ETC\HOSTS file.
-
Manual 99a 38 July 17, 2001 4 Optional: Disable the routing protocol on this interface to reduce routing traffic. 4a Select Bindings > an existing binding. 4b Select RIP Bind Options > Status > Disabled 4c Press Esc and then select OSPF Bind Options > Status > Disabled 4d If your router has multiple interfaces and you want to disable them, repeat these steps for each interface. 5 Press Esc until you are prompted to save your changes, and then select Yes.
-
Manual 99a 38 July 17, 2001 board name is the name of the interface board that you assigning as the default gateway. addr is the IP address of the board. mask is the subnet mask address associated with the IP address of the board. gate is the IP address of the gateway, and cost is the value associated with the gateway and is also the primary routing metric for this gateway. Using TCPCON to Add a Default Gateway 1 Load TCPCON and then select IP Routing Protocol.
-
Manual 99a 38 July 17, 2001 from end nodes. End nodes use it to locate a gateway on their network. To configure Router Discovery, see “Configuring Router Discovery” on page 76. Comparing Different Default Gateway Configuration Methods The table below explains the implications of using different methods for configuring multiple default gateways and describes the priorities associated with each method.
-
Manual 99a 38 July 17, 2001 Enabling Dead Gateway Detection 1 Load INETCFG and then select Protocols > TCP/IP. 2 Select Dead Gateway Detection > Enabled. 3 Press Esc until you are prompted to save your changes, and then select Yes. 4 Press Esc to return to the Internetworking Configuration menu. 5 If you want these changes to take effect immediately, select Reinitialize System > Yes. Configuring Dead Gateway Detection You can fine-tune the performance of the Dead Gateway Detection feature.
-
Manual 99a 38 July 17, 2001 Configuring Probe Timeout 1 Load INETCFG and then select Protocols > TCP/IP > Dead Gateway Detection Configuration. 2 Select Probe Timeout and then enter a value in seconds. 3 Press Esc until you are prompted to save your changes, and then select Yes. 4 Press Esc to return to the Internetworking Configuration menu. 5 If you want these changes to take effect immediately, select Reinitialize System > Yes.
-
Manual 99a 38 July 17, 2001 4 Select Fault Tolerance Configuration. 5 Configure Fault Detection Interval, Minimum Error Level and Configure Individual Groups. 6 In the Configure Individual Groups, select the network listed and enable fault tolerance. Configuring Router Discovery Both IP routers and end nodes can use the ICMP Router Discovery Protocol. Routers use it to advertise themselves as an IP router and to answer queries from end nodes. End nodes use it to locate an IP router on their network.
-
Manual 99a 38 July 17, 2001 Configuring Type of Service (TOS) Using TOS, you can set the type of service for the IP data packets going out through an interface over a network. Assign a value to set the TOS and the precedence bits of the IP header for outgoing packets. To set only TOS bits, use a value between 0 and 15. To set TOS and precedence bits, use a value between 0 and 127. The valid range of values for TOS is from 0 to 127. Default value is 0, which indicates normal TOS.
-
Manual 99a 38 July 17, 2001 4 Press Esc to return to the Internetworking Configuration menu. 5 If you want these changes to take effect immediately, select Reinitialize System > Yes. Configuring ARP IP routers and end nodes use ARP to determine the physical address of a node to which they want to send a packet. ARP is enabled by default. For one node to send a packet to another, the sending node must know the physical address of the destination node.
-
Manual 99a 38 July 17, 2001 so only if the device is reachable through the router. To determine whether the device is reachable, the router examines its own routing table. Proxy ARP is required on the parent network of a stub subnet. The parent network has an IP address range that includes the IP address range of the stub subnet. The router responds to ARP requests sent on the parent network on behalf of devices on the stub subnet.
-
Manual 99a 38 July 17, 2001 Enabling Proxy ARP 1 Load INETCFG and then select Bindings > an existing binding > Expert TCP/IP Bind Options > ARP Options. 2 Select Force Proxy ARP > Enabled. 3 Press Esc until you are prompted to save your changes, and then select Yes. 4 Press Esc to return to the Internetworking Configuration menu. 5 If you want these changes to take effect immediately, select Reinitialize System > Yes.
-
Manual 99a 38 July 17, 2001 Configuring ARP Cache Stale Timeout 1 Load INETCFG and then select Bindings > an existing binding > Expert TCP/IP Bind Options > ARP Options. 2 Select ARP Cache Stale Timeout, then enter a value in seconds. 3 Press Esc until you are prompted to save your changes, then select Yes. 4 Press Esc to return to the Internetworking Configuration menu. 5 If you want these changes to take effect immediately, select Reinitialize System and select Yes to activate your changes.
-
Manual 99a 38 July 17, 2001 Configuring Source Route Packet Forwarding Source route packets enable you to determine the route a packet takes to reach its destination. This feature is disabled by default. 1 Load INETCFG and then select Protocols > TCP/IP > Expert Configuration Options. 2 Select Forward Source Route Packets. Enabled to permit forwarding IP source route packets. 3 Press Esc until you are prompted to save your changes, and then select Yes.
-
Manual 99a 38 July 17, 2001 Log to File—Logs BOOTP activity to the SYS:\ETC\BOOTP.LOG file by default. To use a different file, type its full path name in the Log File field. 7 If you do not want to record the activity of the BOOTP forwarder, select Do Not Log. 8 Press Esc until you are prompted to save your changes, and then select Yes. 9 Press Esc to return to the Internetworking Configuration menu. 10 If you want these changes to take effect immediately, select Reinitialize System > Yes.
-
Manual 99a 38 July 17, 2001 Neighbor List—Select this field to add, modify, or delete EGP neighbors. This router attempts to establish a relationship with the configured EGP neighbors to exchange network reachability information. Press Ins. Configure the following parameters: Neighbor's Address—Press Ins to display a list of symbolic hostnames from the SYS:\ETC\HOSTS file. Select a host here or enter the address.
-
Manual 99a 38 July 17, 2001 the same interface or different interfaces. To configure multihoming, see “Configuring a Secondary IP Address” on page 86. Merging Two Networks When the Connecting Router Fails Suppose a router that connects IP networks 130.81.0.0 and 167.10.0.0 fails. For simplicity, assume that the physical medium is Ethernet.
-
Manual 99a 38 July 17, 2001 Reassigning IP Addresses Suppose you must change network number 89 to 130.57. If the system does not have multiple logical interfaces, you must change all IP addresses on network 89 at the same time or lose connectivity to any host that did not have its address changed. With multiple logical interfaces, you can assign the new IP addresses gradually. Networks 89 and 130.57 can coexist on the same network segment until the transition is complete.
-
Manual 99a 38 July 17, 2001 Noarp is used to add the secondary IP address as the non-ARPable one. If you don’t use noarp, it will be added as ARPable. Prompt allows you to select from the available interfaces. If you don’t use prompt, it will be added to the first bound interface of the same network. 2 Delete the secondary IP address by entering the following command: del secondary IPAddress x.x.x.
-
Manual 88 Place Book Title Here Place Book Title Here Place Part Number Here August 30, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 6 99a 38 July 17, 2001 Managing This chapter describes the diagnostic utilities used to manage the Novell® TCP/IP software. These utilities enable you to manage, optimize, and troubleshoot the product and its connections.
-
Manual 99a 38 July 17, 2001 You can use TCPCON to perform the following tasks: Monitor activity in the TCP/IP network segments of your internetwork Display configuration information and statistics about the following TCP/IP protocols—IP, ICMP, UDP, TCP, OSPF, and EGP Display the IP routes currently known to a TCP/IP node Display the network interfaces supported by a TCP/IP node Access the trap log maintained by SNMPLOG (for the local system only) Access TCP/IP information in any remote proto
-
Manual 99a 38 July 17, 2001 Determining Whether a Remote TCP/IP Node Is Reachable To determine whether a remote node is reachable, run an Echo test by doing the following: 1 Load PING 2 Specify the remote node address in the Host Name field. 3 Specify the number of seconds between each transmission in the Seconds to Pause between pings field. 4 Specify the packet size to be transmitted in the IP Packet Size to send in Bytes field. 5 Press Esc to begin transmitting.
-
Manual 99a 38 July 17, 2001 Monitoring TCP/IP Information Monitoring TCP/IP information can give you a clear view of the status of your TCP/IP network and whether the router is configured properly to run efficiently in the network. This information can also be helpful in troubleshooting and optimizing of the network. Checking the TCP/IP Routing Table To check the TCP/IP routing table and information associated with each route, load TCPCON and select IP Routing Table > Proceed > entry you want to view.
-
Manual 7 99a July 17, 2001 38 Troubleshooting This chapter contains IP troubleshooting information that is divided into three categories: “Troubleshooting Tools” on page 93 “Troubleshooting Checkpoints” on page 94 “Common Problems” on page 95 If a problem that is general in nature occurs, the procedure described in Troubleshooting Checkpoints will help you isolate and resolve the problem.
-
Manual 99a 38 July 17, 2001 Troubleshooting Checkpoints To isolate and resolve TCP/IP problems, do the following: 1 To verify that IP is bound to the desired interfaces with the correct addresses and masks for your internetwork. Load TCPCON Select Protocols > IP > IP Addresses. Use INETCFG to make any required corrections. 2 To check the routing table for routes to the required network.
-
Manual 99a July 17, 2001 38 Unknown protocol errors (unsupported IP clients) Load the required applications. No route found (router failure) Check the configuration of the routing protocols. 8 Load TCPCON for the following ICMP statistics: Destination unreachable (network failure) Use a network analyzer to determine the unreachable destination. Check that the routers on the path to the destination advertise the route.
-
Manual 99a 38 July 17, 2001 “Losing INETCFG Configuration Information upon Rebooting” on page 101 “Loss of Secondary IP Address upon Deleting Any Binding” on page 101 LAN Connectivity Problems The router does not forward IP packets Verify that the IP Packet Forwarding statistic is set to Router Enabled in TCPCON (Protocols > IP). If routing is not enabled, enable IP Packet Forwarding under Protocols in INETCFG, and then issue the REINITIALIZE SYSTEM command.
-
Manual 99a 38 July 17, 2001 A TCP/IP host cannot reach a remote host Verify that the IP address and mask are proper. Verify that the local TCP/IP host has the local router listed as the default router. Verify that each router has a routing protocol enabled and that it has not been disabled on the interface. Starting at the local router, verify that each router has a route to the remote host's network.
-
Manual 99a 38 July 17, 2001 To check that fault tolerance is enabled, do the following: 1 Load INETCFG and select Protocols > TCP/IP. 2 In the screen that appears, fault tolerance should be enabled. This could be for the complete system. You still need to verify whether Fault Tolerance is enabled for the particular Net Group. 3 Select Fault Tolerance Configuration > Configure Individual Group. 4 Select the particular Net Group and check whether fault tolerance is enabled for it. If not, set it to Yes.
-
Manual 99a 38 July 17, 2001 Use TCPCON to examine the routing table and determine which routes are missing. Check TCPCON for IP errors. Check TCPCON for ICMP errors. If you are using RIP, then in INETCFG under Bindings, verify that the RIP Mode option is not set to Send Only or Receive Only. If the RIP Version option is set to RIPII, verify that the other routers also support RIP II. Verify that no route filters are configured that would block route information packets for that interface.
-
Manual 99a 38 July 17, 2001 RIP routes are not accessible to hosts on OSPF networks. Check the status of the Autonomous System Boundary Router statistic in TCPCON (select Protocol Information > OSPF). Verify that no filters are configured that would block access to the network. IP Address Duplication across Machines When you are trying to bind an IP address, you get an error message stating a conflict for the IP address. Set allow ip address duplicates command off under SET parameters.
-
Manual 99a 38 July 17, 2001 Network Traffic Is Not Balanced across NICs If the application is binding to the local host (0.0.0.0), the data is always sent through the Primary. So the Primary should be inside the LBFT group for the load to be evenly balanced. Check whether the interface designated as Primary is within the group or not. If not, either group the Primary interface or make one of the group members Primary.
-
Manual 99a 102 NetWare TCP/IP Administration Guide NetWare TCP/IP Administration Guide 103-000151-001 August 30, 2001 Novell Confidential 38 July 17, 2001
-
Manual A 99a 38 July 17, 2001 Planning This appendix explains what decisions must be made before you can configure TCP/IP beyond its most basic configuration. Configuration Decisions How you configure TCP/IP beyond the most basic configuration depends on the following decisions: Whether a multiprocessor server can use this version of TCP/IP The TCP/IP stack distributes the connection across all processors uniformly resulting in packet processing on different processors in parallel.
-
Manual 99a 38 July 17, 2001 To configure your router as an OSPF router, see “Configuring OSPF” on page 63. To configure a mixed RIP-OSPF environment, refer to both of the preceding procedures. Whether to use static routes on a router Static routes are useful for reducing routing traffic, providing security, accessing isolated networks, and operating as backup routes on routers. Static routes are required for on-demand connections.
-
Manual 99a 38 July 17, 2001 Whether to enable the router to forward directed broadcasts A directed broadcast is a broadcast intended only for a subnet rather than all nodes on the network. To enable directed broadcast forwarding, see “Configuring Directed Broadcast Forwarding” on page 81. Whether to configure the router or end node as a BOOTP forwarder The BOOTP protocol enables end nodes to obtain an IP address at startup time.
-
Manual 99a 106 NetWare TCP/IP Administration Guide NetWare TCP/IP Administration Guide 103-000151-001 August 30, 2001 Novell Confidential 38 July 17, 2001
-
Manual B 99a 38 July 17, 2001 TCP/IP Database Files This appendix describes how the database files of the TCP/IP stack should be configured. Configuring Database Files TCP/IP uses four database files in the SYS:\ETC\directory to convert internal data, such as IP addresses, into more identifiable and workable names.
-
Manual 99a 38 July 17, 2001 You can modify these files with a standard text editor from any NetWare® client, or you can use EDIT.NLM from the NetWare system console. The following sections describe the formats of the files, which are compatible with the same files on standard 4.3BSD UNIX* systems. The examples in the sample files can also help you create your own entries. The files have the same names and format as the files on UnixWare* systems and other UNIX systems.
-
Manual 99a July 17, 2001 38 The IP_address is a 4-byte address in standard dotted decimal notation. Each byte is a decimal, hexadecimal, or octal value and is separated by a period. Hexadecimal numbers must start with the character pair 0x or 0X; octal numbers must start with 0. The host_name is the name of the system associated with this IP address. The name cannot contain a space, tab, pound sign (#), or end-of-line character. Each hostname must be unique.
-
Manual 99a 38 July 17, 2001 The network_name is the name of the network associated with this network number. The name cannot contain a space, tab, pound sign (#), or end-of-line character. The network name must be unique. The network_number is the number of the network. Hexadecimal numbers must start with the character pair 0x or 0X. The network_number can be specified with or without trailing zeros. For example, the addresses 130.57 and 130.57.0.0 denote the same IP network.
-
Manual 99a July 17, 2001 38 The PROTOCOL file entry has the following format: protocol_name protocol_number [alias [...]] The protocol_name is the name of the Internet protocol associated with this protocol number. The name cannot contain a space, tab, pound sign (#), or end-of-line character. The protocol_number is the number of the Internet protocol. The alias is an alternate name for the protocol. The sample file SYS:\ETC\SAMPLES\PROTOCOL is included with the TCP/IP software.
-
Manual 99a 38 July 17, 2001 end-of-line character. These are generally Application-layer, Presentationlayer, or Session-layer services, such as TFTP, FTP, SMTP, and TELNET. The port_number is the number of the Internet port used by the service. The protocol_name is the protocol with which the service is associated. This is generally a Transport- or Network-layer protocol, such as TCP or UDP. You must put a slash between the port number and the protocol name (for example, SMTP 25/TCP MAIL).
-
NetWare FTP Server Administration Guide Novell NetWare 6 ® www.novell.com 6.
-
Manual 99a July 17, 2001 38 Contents Preface 7 Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1 Overview 9 Features of the NetWare FTP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 2 Setting Up 13 Upgrading from NetWare 5.1 to NetWare 6.0 . . . . . Configuring FTP Server . . . . . . . . . . . . . . . . Configuring FTP Server from NetWare Web Manager. Configuring Server Settings . . . . . . . . . . . .
-
Manual A 6 99a 38 July 17, 2001 FTP Server Messages 53 NWFTPD Messages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . FTPUPGRD Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
-
Manual 99a 38 July 17, 2001 Preface Welcome to the NetWare FTP Server Administration Guide. NetWare® FTP Server software provides FTP service for transferring files to and from NetWare volumes. You can perform file transfers from any FTP client by using the FTP server to log in to a Novell® eDirectoryTM tree. After logging in, you can navigate to other NetWare servers (in the same eDirectory tree) even if they are not be running FTP service.
-
Manual 8 99a 38 NetWare FTP Server Administration Guide NetWare FTP Server Administration Guide 103-000172-001 August 30, 2001 Novell Confidential July 17, 2001
-
Manual 1 99a 38 July 17, 2001 Overview NetWare® FTP Server software is based on the standard ARPANET File Transfer Protocol that runs over TCP/IP and conforms to RFC 959. You can perform file transfers from any FTP client by using the FTP Server to log in to the Novell® eDirectoryTM tree.
-
Manual 99a 38 July 17, 2001 whether or not the remote servers are running NetWare FTP Server software. See “Accessing a Remote Server” on page 28 and Table 5, “Login Parameters,” on page 15. Anonymous user access An Anonymous user account can be set up to provide users with basic access to public files. See “Anonymous User Access” on page 37. Special Quote Site commands These NetWare-specific commands can be used to change or view some of the NetWare server-specific parameters.
-
Manual 99a 38 July 17, 2001 FTP logs The FTP service maintains a log of various activities: FTP sessions, unsuccessful login attempts, active sessions details, and system error and FTP server-related messages. See “FTP Log Files” on page 38 Welcome banner and message file support NetWare FTP Server software displays a welcome banner when an FTP client establishes a connection as well as a message file when a user changes the directory in which the file exists.
-
Manual 12 99a 38 NetWare FTP Server Administration Guide NetWare FTP Server Administration Guide 103-000172-001 August 30, 2001 Novell Confidential July 17, 2001
-
Manual 2 99a 38 July 17, 2001 Setting Up This chapter discusses the following sections: Upgrading from NetWare 5.1 to NetWare 6.0 (page 13) Configuring FTP Server (page 14) Configuring FTP Server from NetWare Web Manager (page 19) Upgrading from NetWare 5.1 to NetWare 6.0 The upgrade utility (FTPUPGRD.NLM) is automatically invoked to upgrade the default configuration of NetWare FTP Server when you choose NetWare FTP Server while upgrading the operating system from NetWare 5.1 to NetWare 6.0.
-
Manual 99a 38 July 17, 2001 Configuring FTP Server Before you start the NetWare FTP Server software, you should configure it by setting the configuration parameters in the configuration file. The default configuration file is SYS:/ETC/FTPSERV.CFG. The parameters in this configuration fils are commented with their default values.
-
Manual Table 3 99a 38 July 17, 2001 Anonymous User Access Parameters Parameter Default Value Description ANONYMOUS_ACCESS No Specifies whether anonymous user access is allowed. Valid values are Yes and No. ANONYMOUS_HOME SYS:/PUBLIC The Anonymous user’s home directory. ANONYMOUS_PASSWORD_R EQUIRED Yes Specifies whether to ask for an Email ID as the password for Anonymous user to log in. Valid values are Yes and No.
-
Manual 99a 38 July 17, 2001 Parameter Default Value Description IGNORE_HOME_DIR No Specifies whether to ignore the home directory and go to the default directory. Valid values are Yes and No. SEARCH_LIST Table 6 A list of fully distinguished names of containers in which FTP users are be looked for, separated by commas. The length of this string including the commas should not exceed 2048 bytes. You can specify a maximum of 25 containers.
-
Manual Table 7 99a 38 July 17, 2001 Firewall Support Parameters Parameter Default Value Description PASSIVE_PORT_MIN 1 Minimum port number used for establishing passive data connection. The port value range is 1 to 65534. The minimum value should always be less than or equal to the maximum value. PASSIVE_PORT_MAX 65534 Maximum port number used for establishing passive data connection. The port value range = 1 to 65534.
-
Manual Table 9 99a 38 July 17, 2001 FTP Logs Parameters Parameter Default Value Description FTP_LOG_DIR SYS:/ETC The directory where log files will be stored. NUM_LOG_MSG 3200 Maximum number of messages that will be logged in each log file. LOG_LEVEL 7 Indicates the level of messages logged. These are: 1= ERROR 2= WARNING 4= INFORMATION The following combinations can be given.
-
Manual 99a 38 July 17, 2001 Configuring FTP Server from NetWare Web Manager You can use the NetWare Web Manager for administering FTP Service from client- side. To do this, enter the following URL to display the Service Selector panel (the default port number is 2200): https://remote_server_name : port_number Figure 1 Service Selector Panel In the Service Selector panel, select NetWare FTP Server to display the Service Manager panel.
-
Manual Figure 2 99a 38 July 17, 2001 Service Manger Panel In the Service Manager panel you can view the Server Preferences menu, which provides links to the configuration pages of FTP Server by clicking the Server Preferences icon at the top of the panel. When you click this icon, the initial main panel displays FTP Server On/off Panel. You can start or stop NetWare FTP Service from the client side by clicking either of the buttons.
-
Manual 99a 38 July 17, 2001 Configuring Server Settings 1 In the Server Preferences menu, click Server Settings. Figure 3 Server Settings Panel 2 Specify the FTP Server settings. For specific information about each parameter, refer the online help. 3 Click Save to save your settings or click Reset to retain the previous settings.
-
Manual 99a 38 July 17, 2001 Configuring Security Settings 1 In the Server Preferences menu, click Security. Figure 4 Security Panel 2 Specify the FTP Server Security settings. For specific information about each parameter, refer the online help. 3 Click Save to save your settings or click Reset to clear your settings.
-
Manual 99a 38 July 17, 2001 Configuring User Settings 1 In the Server Preferences menu, click User Settings. Figure 5 User Settings Panel 2 Specify the FTP Server User Settings. For specific information about each parameter, refer the online help. 3 Click Save to save your settings or click Reset to clear your settings.
-
Manual 99a 38 July 17, 2001 Configuring Log Settings 1 In the Server Preferences menu, click Log Settings. Figure 6 Log Settings Panel 2 Select the type of log messages from the Log Messages of Type drop down list, and enter the Number of Log messages. For specific information about each parameter, refer the online help. 3 Click Save to save your settings or click Reset to retain previous settings.
-
Manual 3 99a 38 July 17, 2001 Managing This chapter discusses the following topics: “FTP Server Startup” on page 25 “Using the FTP Server from an FTP Client” on page 26 “Administering the NetWare FTP Server” on page 33 FTP Server Startup The FTP Server software can be loaded from the NetWare® server using the following command: nwftpd The server takes the default configuration file SYS:/ETC/FTPSERV.CFG.
-
Manual 99a 38 July 17, 2001 Creating an Anonymous User To create an anonymous user, enter nwftpd -a [-c Configfile] The server takes the anonymous user home directory from the configuration file and displays it on the screen with the option to modify the directory. NOTE: The -a option modifies the configuration file for anonymous user access. For this change to take place, reload nwftpd.
-
Manual 99a 38 July 17, 2001 The following are the session-based details and are not tied to individual user logins: bytes sent, bytes received, session duration, files sent, files received, and current Novell® eDirectoryTM context. For more details, see Table 2, “FTP Session Parameters,” on page 14.
-
Manual 99a 38 July 17, 2001 To log in to an IBM server from a browser, the following format should be used: ftp //+IBMserver+username:password@FTPHost For logging in as anonymous user, the user name and password can be omitted: ftp //+IBMservername@FtpHost After logging in to an IBM server, the user is placed in the home directory in that IBM server. While logging in to an IBM server, the user is not authenticated to the eDirectory tree.
-
Manual Figure 7 99a 38 July 17, 2001 How a NetWare FTP Server Accesses Remote NetWare Servers Workstation running FTP client software 1 FTP A user uses FTP to connect to the local NetWare FTP Server. Remote NetWare server (running NetWare 4.1 or later) without the FTP service News Feed NCP 2 After logging in to the FTP server, the user accesses the remote server from the command line. Local NetWare server running the FTP service 3 The user can now access files on the remote NetWare server.
-
Manual Figure 8 99a 38 July 17, 2001 How a NetWare FTP Server Accesses Remote IBM Servers Workstation running FTP client software 1 A user uses FTP to connect to the local IBM server. FTP Remote IBM server FTP of NetWare SAA 2 After logging in to the FTP Server, the user accesses the remote server from the command line. Local NetWare server running the FTP service 3 The user can now access files on the remote IBM server.
-
Manual 99a 38 July 17, 2001 Paths Formats The volume and directory path name must be specified in following format:. //server_name/volume_name/directory_path To navigate to different volumes, enter: cd /volume_name To switch back to home directory, enter: cd ~ To switch to home directory of any user, enter: cd ~user_name Quote Site Commands The SITE command enables FTP clients to access features specific to the NetWare FTP Server.
-
Manual 99a 38 July 17, 2001 Command Description CX CX without a context displays the current context of the FTP Server CX with a context as an argument sets the current eDirectory context to a given value. For example: cx ou=test sets the context to the OU test using the relative context cx.ou=test.
-
Manual 99a 38 July 17, 2001 supported on a specific volume, users must follow the DOS file naming conventions of using no more than eight characters for the name plus no more than three additional characters for the extension. In both name spaces, the user views the response to the ls or Dir in the NetWare format only.
-
Manual 99a 38 July 17, 2001 The IP address of the host (HOST_IP_ADDR) and the port number (FTP_PORT) as defined in the configuration file are used to bind to and listen for FTP client connection requests. The configuration file can be specified while starting the FTP server. If these parameters are not defined in the configuration file, the default IP address and the standard FTP port number are used. For more details, see Table 1, “Multiple Instances Parameters,” on page 14.
-
Manual 99a 38 July 17, 2001 Restriction Levels The following table describes the supported levels of access restrictions. Restriction Level Description Container Restriction can be specified for any eDirectory container. This will control all the users in that container and its sub-OUs. Container level: Restriction can be specified for any eDirectory container. This will control all the users in that container and its sub-OUs. *.
-
Manual 99a 38 July 17, 2001 Access Rights The following table describes the permitted access rights. Access Right Description DENY Denies access to the FTP Server for that client. READONLY Gives read-only access to the client. NOREMOTE Restricts access to remote server navigation. GUEST Gives only Guest access to the user. guest users are those users who cannot navigate to remote servers. A guest user has access only within the guest user’s home directory and subdirectories.
-
Manual 99a 38 July 17, 2001 All rights specified in the same line will be applied to that entity. If the RESTRICT file does not exist or is empty, the access is given to all users without any restrictions. Example 1 *.novell *.testou.novell .user1.testou.novell ACCESS=ALLOW ACCESS=DENY ACCESS=READONLY User1 at testou will be allowed read-only rights. The other users at testou.novell will be denied the right. However, all other OUs at .novell will be allowed. Example 2 *.testou.novell *.
-
Manual 99a 38 July 17, 2001 administrator name and password are then taken from the screen and the Anonymous user is created in the eDirectory tree at the default context. Also, the configured anonymous home directory is displayed on the screen with an option to modify it. If the administrator does not specify a home directory, then the default directory is taken. The Anonymous user will have only Read and File Scan rights to the default directory.
-
Manual 99a 38 July 17, 2001 The general Audit log format is Log Level:Thread ID:Date Time:IPaddress:Username:message Viewing Audit Log File from NetWare Web Manager 1 In the NetWare Web Manager Service Selector panel, click NetWare FTP Server. 2 In the Service Manager panel, click the Server Status icon. 3 In the Server Log panel, click View Auditor Trail Log to display the following panel.
-
Manual 99a 38 July 17, 2001 Viewing Statistics Log file from Web Manager 1 In the NetWare Web Manager Service Selector panel, click the NetWare FTP Server. 2 In the Service Manager panel, click the Server Status icon. 3 In the Server Log menu, click View Statistics Log link to display a panel similar to the following: Figure 10 Statistics Log Panel Intruder Log File The Intruder log file contains information about unsuccessful login attempts. The default path is SYS:/ETC/FTPINTR.LOG.
-
Manual 99a 38 July 17, 2001 If the parameter INTRUDER_HOST_ATTEMPTS = 0 then intruder detection is disabled. Viewing Intruder Detection from Web Manager 1 In the NetWare Web Manager Service Selector panel, click the NetWare FTP Server. 2 In the Service Manager panel, click the Server Status icon.
-
Manual 99a 38 July 17, 2001 Active Sessions Display To load the Active Sessions Display utility, enter ftpstat [-p port number] Enter the port number that the HTTP browser should connect to in order to view the NetWare FTP Active Sessions: http://servername:port/ The default port is 2500. You can directly view the active sessions information using NetWare Web Manager. 1 In the NetWare Web Manager Service Selector panel, click the NetWare FTP Server.
-
Manual 99a 38 July 17, 2001 The FTP Instance panel appears displaying active sessions of the FTP server. You can view details such as the total number of active session, IP address, port number, number of sessions, peak bandwidth, and configuration.
-
Manual 44 99a 38 NetWare FTP Server Administration Guide NetWare FTP Server Administration Guide 103-000172-001 August 30, 2001 Novell Confidential July 17, 2001
-
Manual 4 99a 38 July 17, 2001 Configuring with Cluster Services Before configuring NetWare® FTP Server with Novell® Cluster ServicesTM, NetWare FTP Server must be installed on each server in your cluster that will run it. NetWare FTP Server is selected by default during the NetWare 6.0 installation, and might already be installed.
-
Manual 99a 38 July 17, 2001 A separate unique IP address must be assigned to the FTP server so that it can move with the FTP server during failover and failback. Edit the FTPSERV.CFG file and change the HOST_IP_ADDR line to specify the unique IP address you want to assign to the FTP server. For example, if the unique IP address you want to assign to the FTP server is 123.45.67.012, the line would read Host_IP_ADDR=123.45.67.012.
-
Manual 99a 38 July 17, 2001 If you are running multiple FTP servers on your cluster, repeat the ADD and DEL SECONDARY IPADDRESS lines for each FTP server, because each FTP server requires its own IP address. Also, each FTP server must have its own uniquely named configuration file which specifies the FTP server's IP address and shared volume directory. Running FTP Server in ACTIVE/ ACTIVE mode is required if you plan to run more than one FTP Server on the same NetWare server.
-
Manual 99a 38 July 17, 2001 Novell Cluster Services Configuration and Setup Once FTP Server is installed, you must create and configure an FTP server resource in Novell Cluster Services for each FTP server that will run in your cluster. This includes configuring load and unload scripts; setting Start, Failover, and Failback modes; and assigning the FTP server resource to specific nodes in your cluster.
-
Manual 99a 38 July 17, 2001 Configuring FTP Server Load and Unload Scripts Select and right-click the Cluster Volume object and then click Properties to find the Cluster Resource Load Script and Cluster Resource Unload Script. Load and unload scripts are required by Novell Cluster Services to start and stop the FTP server. 1 To the load script, add the following at the end of the existing script: NSS /ACTIVATE=VOLUME MOUNT VOLUME ADD SECONDARY IPADDRESS A.B.C.
-
Manual 99a 38 July 17, 2001 Setting FTP Server Start, Failover, and Failback Modes The following table explains the different FTP Server resource modes. Mode Settings Description Start AUTO, MANUAL AUTO allows FTP Server to automatically start on a designated server when the cluster is first brought up. MANUAL lets you manually start the FTP Server on a specific server whenever you want.
-
Manual 99a 38 July 17, 2001 Mode Settings Description Failback AUTO, MANUAL, DISABLE AUTO allows FTP Server to automatically move back to its preferred node when the preferred node is brought back online. MANUAL prevents FTP Server from moving back to its preferred node when that node is brought back online until you are ready to allow it to happen. DISABLE causes FTP Server to continue running in an online state on the node it has failed to.
-
Manual 52 99a 38 NetWare FTP Server Administration Guide NetWare FTP Server Administration Guide 103-000172-001 August 30, 2001 Novell Confidential July 17, 2001
-
Manual A 99a July 17, 2001 38 FTP Server Messages NWFTPD Messages Failed to bind to FTP port Source: Explanation: Possible Cause: Action: NWFTPD.NLM The port that the FTP Server is trying to bind to is busy. Another instance of the FTP Server or another application is bound to the port. Unload the application that is bound to the port, bind the FTP Server to a different port, or delete the busy port from TCPCON. Failed to initialize Anonymous user Source: Explanation: NWFTPD.
-
Manual 99a 38 July 17, 2001 Failed to open configuration file Source: Possible Cause: Action: NWFTPD.NLM The configuration file is not available at specified location. Verify if the configuration file is available at the specified location. Unable to find default configuration file Source: Possible Cause: Action: NWFTPD.NLM Configuration file is not available at default location (SYS:/ETC). Verify if the configuration file is availabl at the default location.
-
Manual 99a July 17, 2001 38 FTPUPGRD Messages Could not create the .cfg file. Source: Possible Cause: Action: FtpUpgrd.nlm Configuration file does not exist for ftp server upgrade, or existing configuration file has read only access. Modify the file access if it is read only or specify proper configuration file name with ftpupgrd [-c Config File] usage. Could not create the FTP Server Restriction file. Source: Possible Cause: Action: FtpUpgrd.
-
Manual 56 99a 38 NetWare FTP Server Administration Guide NetWare FTP Server Administration Guide 103-000172-001 August 30, 2001 Novell Confidential July 17, 2001
-
Novell DNS/DHCP Services Administration Guide September 4, 2001 Novell Confidential
-
Manual 99a 38 July 17, 2001 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc.
-
Manual 99a 38 Novell Trademarks NetWare is a registered trademark of Novell, Inc. in the United States and other countries. NetWare Core Protocol and NCP are trademarks of Novell, Inc. Novell is a registered trademark of Novell, Inc. in the United States and other countries. Novell eDirectory is a trademark of Novell, Inc. Third-Party Trademarks All third-party trademarks are the property of their respective owners.
-
Manual 99a 38 Novell DNS/DHCP Management Utility Administration Guide 103-000164-001 September 4, 2001 Novell Confidential July 17, 2001
-
Manual 99a 38 Novell DNS/DHCP Management Utility Administration Guide 103-000164-001 September 4, 2001 Novell Confidential July 17, 2001
-
Manual 99a 38 Novell DNS/DHCP Management Utility Administration Guide 103-000164-001 September 4, 2001 Novell Confidential July 17, 2001
-
doc_tpl.fm Rev 99a 28 October 99 Contents About This Guide. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Trademark Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 1 Understanding . . . . . . . . . . . . . . . . . . . . . . . . . . .
-
doc_tpl.fm Manual Allocation . . . . . . . . . . . . . . . . Lease Options . . . . . . . . . . . . . . . . . . Managing the Database . . . . . . . . . . . . . . . DHCP Options . . . . . . . . . . . . . . . . . . . . Assigning Options . . . . . . . . . . . . . . . . DHCP Options for eDirectory . . . . . . . . . . NetWare/IP Options . . . . . . . . . . . . . . . Dynamic DNS . . . . . . . . . . . . . . . . . . . . Compatibility with BOOTP . . . . . . . . . . . . . . Using a BOOTP Relay Agent . . . . . . . . .
-
doc_tpl.fm Rev 99a 28 October 99 Representing Addresses in eDirectory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 Restricting Address Assignment to Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 Hostnames . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 3 Setting Up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 Configuring DNS . . . . . . . . . . . . . . . . . . . . . . . . . . .
-
doc_tpl.fm Detailed DHCP Configuration . . . . . . . . . . . . . . . . . . . . Modifying a DHCP Server Object . . . . . . . . . . . . . . . . Starting/Stopping the DHCP Server . . . . . . . . . . . . . . . Modifying an Existing Subnet Object . . . . . . . . . . . . . . Modifying a Subnet Address Range Object . . . . . . . . . . . Modifying an Existing IP Address Object . . . . . . . . . . . . Creating a Subnet Pool Object . . . . . . . . . . . . . . . . . Modifying a Subnet Pool Object . . . . . . . . . .
-
doc_tpl.fm Using the "-F" Command Line Option for DNIPINST.NLM . . Server Access to DNS/DHCP Locator Object Not Required . DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting Checkpoints. . . . . . . . . . . . . . . . . Common Operational Problems . . . . . . . . . . . . . . . Releasing and Renewing DHCP Addresses . . . . . . . . . Rev 99a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 October 99 . . .
-
doc_tpl.
-
Manual 99a July 17, 2001 38 About This Guide This document describes the concepts of the Domain Naming System (DNS) and the Dynamic Host Configuration Protocol (DHCP), the setup and configuration of these functions, and how to use Novell DNS/DHCP Services in NetWare® 6. The audience for this document is network administrators. This documentation is not intended for users of the network.
-
Manual 14 99a 38 Novell DNS/DHCP Management Utility Administration Guide Novell DNS/DHCP Management Utility Administration Guide 103-000164-001 September 4, 2001 Novell Confidential July 17, 2001
-
Manual 1 99a 38 July 17, 2001 Understanding This chapter describes the eDirectoryTM schema extension, the Domain Name System (DNS), and the Dynamic Host Control Protocol (DHCP) server, and it explains their eDirectory-related functions. This chapter also provides information about the DNS/DHCP Management Utility. Overview of DNS/DHCP Services Novell® DNS/DHCP Services in NetWare® 6 integrates the Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) into the eDirectory database.
-
Manual 99a 38 July 17, 2001 DNS The DNS software in Novell DNS/DHCP Services integrates DNS information into the eDirectory database. Previously, DNS used Btrieve* as its database for configuration information. Integrating DNS with eDirectory moves all the information currently held in Btrieve files into eDirectory. Integrating DNS with eDirectory greatly simplifies network administration by enabling you to enter all configuration information into one distributed database.
-
Manual 99a 38 July 17, 2001 DNS data can be exported from eDirectory into BIND Master file format. Root server information is stored in eDirectory and shared by all eDirectory-based DNS servers. Zone transfers are made to and from eDirectory through Novell servers and include interoperability with non-eDirectory-based DNS. A Novell DNS server can be authoritative for multiple domains. Novell DNS servers maintain a cache of data from eDirectory so they can quickly respond to queries.
-
Manual 99a 38 July 17, 2001 RFC 1536—Common DNS Implementation Errors and Suggested Fixes RFC 1537—Common DNS Data File Configuration Errors RFC 1591—Domain Name System Structure and Delegation RFC 1597—Address Allocation for Private Internets RFC 1627—Network 10 Considered Harmful (Some Practices Shouldn't Be Codified) RFC 1713—Tools for DNS Debugging RFC 1884—IP Version 6 Addressing Architecture RFC 1886—DNS Extensions to Support IP Version 6 RFC 1912—Common DNS Operations and Config
-
Manual 99a 38 July 17, 2001 DHCP is based on BOOTP and maintains some backward compatibility. Novell DHCP servers can be configured to respond to requests from BOOTP clients. Novell DNS/DHCP Services provides the following DHCP features: All DHCP configuration is done in eDirectory, facilitating enterprisewide management.
-
Manual 99a 38 July 17, 2001 The DHCP software has one DHCP server NetWare Loadable ModuleTM (NLMTM) file that supports both LAN and remote access clients. You can configure the DHCP server to ping an address to verify that no other device is using it before assigning the address to a client. Provides fault tolerance as follows: A server can survive a temporary local eDirectory service outage and recover automatically. DHCP configuration is replicated like other eDirectory data.
-
Manual 99a 38 July 17, 2001 It operates within the common eDirectory Management Framework (iManage) and is thus tightly integrated with Netware 6. For more detailed information about the DNS/DHCP Management Utility, refer to “Understanding the DNS/DHCP Management Utility” on page 51. Understanding the eDirectory Schema Extension The eDirectory schema extension defines additional objects needed for DNS and DHCP.
-
Manual 99a July 17, 2001 38 The RootSrvrInfo Zone is a Zone object, an eDirectory container object that contains resource record sets for the DNS root servers. The resource record sets contain Address records and Name Server records that provide pointers for DNS queries to the root servers. The RootSrvrInfo Zone object is the equivalent of the BIND db.root file.
-
Manual 99a 38 July 17, 2001 DNS Zone Object The DNS Zone object is a container object that contains all the data for a single DNS zone. A Zone object is the first level of the DNS zone description. A Zone object can be contained under an Organization (O), Organizational Unit (OU), a Country (C), or a Locality (L). Multiple DNS domains can be represented within eDirectory by using separate, independent DNS Zone objects.
-
Manual 99a 38 July 17, 2001 DNS Server Object The DNS Server object (or Service object) is different from the NetWare Core ProtocolTM (NCPTM ) Server object. A DNS Server object can be contained in an Organization (O), Organizational Unit (OU), Country (C), or Locality (L).
-
Manual Figure 2 99a July 17, 2001 38 eDirectory Objects for DHCP (O)=NOVELL (OU)=SAN JOSE DHCP Server Subnet Attr: Bldg8_1ST_FLOOR Subnet Attr: Bldg8_2ND_FLOOR Subnet (1.2.3.0) Subnet (1.2.4.0) SUBNET_A SUBNET_B IP Address (1.2.3.2) Subnet Pool: Subnet A Subnet B IP Address (1.2.3.1) Subnet Address Range (1.2.3.10-254) 1ST_FLOOR_CLIENTS IP Address (1.2.4.2) IP Address (1.2.4.1) Subnet Address Range (1.2.4.
-
Manual 99a 38 July 17, 2001 You can use multiple Address Range objects under a Subnet object. You can also specify different range types, such as a range for dynamic address assignment, a range for BOOTP clients, or a range to be excluded from the subnet. IP Address Object The IP Address object represents a single IP address. The IP Address object must include an address number and an assignment type.
-
Manual 99a 38 July 17, 2001 DHCP server unless a DHCP/BOOTP forwarder that is on the same computer as the client has been configured to forward the addresses. The Subnet Pool object contains a list of subnet object references and comments. Understanding DNS The Domain Name System (DNS) is a distributed database system that provides hostname-to-IP resource mapping (usually the IP address) and other information for computers on an internetwork.
-
Manual Table 1 99a July 17, 2001 38 Top-Level DNS Domains Domain Used by .com Commercial organizations, as in novell.com .edu Educational organizations, as in ucla.edu .gov Governmental agencies, as in whitehouse.gov .mil Military organizations, as in army.mil .org Nonprofit organizations, as in redcross.org .net Networking entities, as in nsf.net .int International organizations, as in nato.int Additional top-level domains organize domain name space geographically.
-
Manual 99a 38 July 17, 2001 Domains and Subdomains A domain is a label of the DNS tree. Each node on the DNS tree represents a domain. Domains under the top-level domains represent individual organizations or entities. These domains can be further divided into subdomains to ease administration of an organization's host computers. For example, Company A creates a domain called companya.com under the .com top-level domain .
-
Manual 99a 38 July 17, 2001 Domain Names The domain name represents an entity's position within the structure of the DNS hierarchy. A domain name is simply a list of all domains in the path from the local domain to the root. Each label in the domain name is delimited by a period. For example, the domain name for the Providence domain within Company A is providence.companya.com, as shown in Figure 4, “Domains and Subdomains,” on page 29 and the list below.
-
Manual 99a 38 July 17, 2001 companya.com, which has authority over companya.com, washington.companya.com, and providence.companya.com zones chicago.companya.com, which has authority over the chicago.companya.com zone IN-ADDR.ARPA Domain The IN-ADDR.ARPA domain (or zone) provides mapping of IP addresses to names within a zone, enabling a client (or resolver) to request a hostname by providing an IP address. Some security-based applications require this function, also known as reverse-lookup.
-
Manual 99a 38 July 17, 2001 Primary Name Servers One DNS name server in each administrative zone maintains an authoritative database of hostname and address information for an entire domain. This name server is the primary name server, and the domain administrator updates it with hostnames and addresses as changes occur. All name servers maintain information about how to contact name servers that are at higher or lower levels within the DNS hierarchy.
-
Manual 99a 38 July 17, 2001 Start of Authority (SOA)—Indicates the start of authority for the zone. The name server must contain one SOA record specifying its zone of authority. Canonical name (CNAME)—Specifies the canonical or primary name for the owner. The owner name is an alias. Address (A)—Provides the IP address for the zone.
-
Manual 99a 38 July 17, 2001 RR Type Field Differences PTR Domain name PX Preference, Map 822 (domain name), and Map x400 fields (domain name in X.
-
Manual Figure 5 99a July 17, 2001 38 Traditional DNS Structure Master DNS Server Secondary DNS Server 1 (novell.com) Replica: novell.com Secondary DNS Server 2 (other.com) Replica: Replica: novell.com Resource Records SOA Zone: novell.com Resource Records A NS SOA Resource Records MX A CNAME NS SOA A MX A A CNAME NS A A MX A A CNAME . . A A . A A . . A . A . . . other.com Replica: other.com Resource Records SOA Zone: other.
-
Manual 99a 38 July 17, 2001 DNS within eDirectory Novell has integrated DNS into eDirectory by extending the eDirectory schema and creating new eDirectory objects to represent zones, RRSets, and DNS name servers. Integrating these new objects into eDirectory simplifies the administration of DNS, enabling centralized administration and configuration. A Zone object is an eDirectory container object that holds RRSet objects, which are leaf objects. A DNS Server object is a leaf object.
-
Manual 99a July 17, 2001 38 These updates cause additions and deletions of resource records and updates to the zone's serial number. Figure 6 illustrates a Novell server as the primary DNS name server and primary and secondary zones within eDirectory. In this example, there are two primary zones. Any of the Novell DNS servers assigned to a zone are able to respond to queries for the zone. For each zone, one server is designated by the administrator to act as the DDNS server.
-
Manual 99a 38 July 17, 2001 Figure 7 shows a representation of eDirectory objects within a DNS zone. Figure 7 DNS Zone (Locality)=Chicago DNS Zone DNS Server chicago.company.com RRSet (host) RRSet (host2) RRSet (printer) RRSet (mail server) DNS Master File A DNS master file contains resource records that describe a zone. When you use the DNS/DHCP Management Utility to build a zone, the DNS objects and their attributes translate into resource records for that zone.
-
Manual 99a 38 July 17, 2001 Understanding DHCP The Dynamic Host Configuration Protocol (DHCP) uses a client-server structure to provide configuration parameters to hosts. DHCP consists of a protocol for providing host-specific configuration parameters from a DHCP server (or collection of DHCP servers) to a host and a mechanism to allocate network addresses to a host. NOTE: In this document, the term host refers to a network device that requires an IP address and might have a hostname.
-
Manual 99a 38 July 17, 2001 IP Address Allocation Allocation of IP addresses, either temporary or permanent, is one of the two primary services provided by DHCP. The client requests an IP address, and the DHCP server (or collection of DHCP servers) provides an address and guarantees not to give that address to another client within a specified time. Additionally, the server tries to return the same address to the client each time the client requests an address.
-
Manual 99a 38 July 17, 2001 Manual Allocation Use Manual or static allocation to assign addresses to DHCP or BOOTP clients using the DNS/DHCP Management Utility. A specific IP address is assigned to the client based on an identifier such as the client's hardware or MAC address. Manual allocation of DHCP eliminates the error-prone method of manually configuring hosts with IP addresses in networks for which IP address management without DHCP is desired.
-
Manual 99a 38 July 17, 2001 Managing the Database The Lease Time attribute of the Subnet object enables a dynamic DHCP client to specify a lease time for the entire subnet. Lease expiration time can be modified for each manual IP address allocation. An IP address can be returned to a DHCP server for one of the following reasons: The address is explicitly released by a DHCP client. The address is implicitly released because the lease has expired.
-
Manual 99a July 17, 2001 38 The DHCPSRVR.NLM software supports local address assignments that obtain IP addresses from multiple local subnets. For example, a DHCP server might have multiple IP addresses bound to one of its network interface cards. Each address is a server address on a separate subnet. No special configuration of the eDirectory database is required. The DHCPSRVR.NLM software also supports remote address assignments that obtain IP addresses from multiple remote subnets.
-
Manual 99a July 17, 2001 38 Level Option Value Subnet 1, Subnet Mask 255.254.0.0 5, Name Server 10.73.57.251 7, Log Server 10.73.58.2 13, Boot File Size 1024 7, Log Server Null 13, Boot File Size 256 IP Address Table 5 lists the effective options for the client with the IP address referred to in the preceding table. Table 5 Client's Effective Options Option Value 1, Subnet Mask 255.254.0.0 3, Router 132.57.3.8 4, Time Server 129.23.120.5 5, Name Server 10.73.57.
-
Manual 99a 38 July 17, 2001 NetWare/IP Options Novell uses option codes 62 and 63 in the DHCP packet for Netware/IP. Option 62 contains the Netware/IP domain name. Option 63, the IPX Compatibility option, contains general configuration information such as the primary DSS, preferred DSS, and the nearest servers. Option 63 provides additional information in the form of sub-options, listed in Table 6.
-
Manual 99a 38 July 17, 2001 Dynamic DNS The Dynamic DNS (DDNS) feature of Novell DNS/DHCP Services provides a way to update DNS with accurate Address (A) records and Pointer (PTR) records for address assignments made by a DHCP server. Address (A) records map a domain name to an IP address. A Pointer (PTR) record specifies a domain name that points to some location in the domain name space.These resource records are required so that both name-to-address and address-toname DNS resolutions can be made.
-
Manual 99a 38 July 17, 2001 When a client loses or ends its lease and is subject to DDNS updates, the DNS server receives the DDNS update request and deletes the PTR and A records associated with the client. Compatibility with BOOTP DHCP is based on the Bootstrap Protocol (BOOTP) and maintains some backward compatibility. BOOTP was designed for manual configuration of the host information in a server database. Novell has extended support for BOOTP to provide Dynamic BOOTP support.
-
Manual 99a 38 July 17, 2001 When a client starts up, it sends a UDP broadcast message, called a Discover packet, to address 0xFFFFFFFF over port 67 requesting an address. The forwarder has an IP address on the network and acts like a DHCP server, listening for Discover packets from clients on its LAN that are meant for a DHCP server. The forwarder must be configured with the destination address of the actual DHCP server on a different LAN segment that will provide DHCP service.
-
Manual 99a 38 July 17, 2001 Clients that are on the same subnet as the DHCP server do not have to be configured for the subnet pool if the server is bound to all local subnet addresses, or if the server has an address on each local subnet. SNMP Event Generation You can use the DNS/DHCP Management Utility to set up SNMP event generation in the case of critical, major, warning, or minor events. The default setting is Major, which causes the server to log all major and critical events.
-
Manual 99a 38 July 17, 2001 DHCP Auditing Auditing can be used to perform an analysis of historical data and to help diagnose operational difficulties. Auditing uses a Btrieve database to store and manage data enabling meaningful trend analysis. When auditing is enabled, every incidence of address deletion, addition, and rejection is recorded in the audit log. The beginning and end of each session is marked to help make sense of the audit log.
-
Manual Table 7 99a 38 July 17, 2001 Debug Log - Use of Flags Flag Use -d1 Turns on a background screen log of DHCP packets -d2 Turns on a background screen log of Debug statements and DHCP packets -d3 Turns on a background screen log of Debug statements and DHCP packets and writes the log to the server's \ETC\DHCP\DHCPSRVR.
-
Manual 99a 38 July 17, 2001 Overview of Interface Interaction The DNS/DHCP Management Utility manages one eDirectory tree at a time. When the DNS/DHCP Management Utility is started in the browser, the first interface screen you see is the login screen. You are prompted to enter your username, password, eDirectory context and the eDirectory tree whose objects you wish to manage.
-
Manual Figure 8 99a 38 July 17, 2001 The DNS/DHCPManagement Utility Interface The main screen has three parts: a taskbar on the top of the screen that displays icons for top-level management functions and is part of the common iManagebased utilities in Netware 6, a left panel that displays roles, tasks and other administrative functions, and a main panel that allows you to manage rolebased and administrative tasks. For more information on the taskbar, refer to “Taskbar” on page 53.
-
Manual 99a 38 July 17, 2001 Roles and Tasks: Displays the roles and tasks on the left panel Administration: Enables you to carry out role intallation and role management Help: Launches global help for the utility Figure 9 The iManage Taskbar Each button on the taskbar has roll-over help associated with it; if you position the cursor over the icon, the icon's name appears on the task bar, to the right of the Help icon.
-
Manual 99a 38 July 17, 2001 appear under it. At the top is the task DNS Server Management . This is followed by DNS/DHCP Scope Settings that allows you to specify the location of the Locator object, and the administrative scope for the session. At the following level is Zone Management, which provides the next level of DNS entity management that is, managing zones handled by DNS Servers. Finally Resource Record Management allows you to manage resource records contained within a zone.
-
Manual 56 99a 38 Novell DNS/DHCP Management Utility Administration Guide Novell DNS/DHCP Management Utility Administration Guide 103-000164-001 September 4, 2001 Novell Confidential July 17, 2001
-
Manual 2 99a 38 July 17, 2001 Planning This chapter provides a summary of issues for you to consider as you plan and design your implementation of and maximize the DNS and DHCP capabilities of the Novell® DNS/DHCP Services software. eDirectory Considerations When installed and configured, the DNS and DHCP servers extend the eDirectoryTM schema to create new objects with which to administer and control their services.
-
Manual 99a 38 July 17, 2001 Plan to create an Organizational Unit (OU) container object near the top of your eDirectory tree. The location of this container object should be easily and widely accessible. Locate the DNS/DHCP Group and Locator objects and the RootServerInfo Zone object under the container object. Plan to create an Administrator Group object under this container also.
-
Manual 99a 38 July 17, 2001 the primary name server to determine whether the information it contains has been changed. If the zone information in the secondary name server is older than the zone information in the primary name server, a zone transfer occurs and the secondary name server receives the zone information from the primary name server.
-
Manual 99a 38 July 17, 2001 You are using a master DNS server and do not want to designate it as a primary name server because of the responsibility it entails. This approach is easy to implement in your existing DNS model. You want to install more secondary name servers to provide better load balancing. You want to gradually make the transition to operating a primary name server. Configuring a DNS Server to Forward Requests If a name server cannot answer a query, it must query a remote server.
-
Manual 99a 38 July 17, 2001 Restricting Forwarding If you have a primary name server with subdomains below it and the primary name server is not aware of the subdomains, the name server sends queries to external name servers. You can configure your primary name server to not forward queries for specified internal subdomains to external name servers. Instead, the primary name server sends a negative response to any queries for the internal subdomains. Setting Up the IN-ADDR.
-
Manual 99a 38 July 17, 2001 from InterNIC, contact them at http://rs.internic.net. You can also obtain the form for in-addr.arpa domain registration from the same location. Detailed information about the registration process is available from the InterNIC web site. You can also use the InterNIC web site to research domain names to ensure that the name you want is not already registered and to obtain additional information and help.
-
Manual 99a 38 July 17, 2001 Initiating the DHCP Service If you are planning to use DHCP for the first time, you must gather a significant amount of information. You need to make a list of all hosts to be served by the DHCP server. You must include all devices that use network addresses in every segment of your network. You must also compile lists of IP address assignments. Organize your lists of hosts and IP addresses by geographic location.
-
Manual 99a 38 July 17, 2001 considerations, but three might be too costly in terms of eDirectory performance. Lease Considerations Many factors must be considered when you decide how long to set your client leases.
-
Manual 99a 38 July 17, 2001 Considering the Length of Leases When considering the length of leases, ask these questions: Will the default of three days work well in your environment? The default of three days provides a good balance between a long-lease and a short-lease duration. Do you have more users than IP addresses? If you have more users than IP addresses, keep leases short to allow access to more users. A short lease could be 15 to 30 minutes, two to four hours, or even a matter of days.
-
Manual 99a 38 July 17, 2001 If your typical server outage lasts two hours, a lease of four hours would avoid loss of lease to clients that were active at the time of the server outage. We recommend setting your lease times to twice the length of a typical server outage. The same recommendation applies to communications line outages. If a communications line is down long enough that leases expire, you might see a significant network load when the service is restored.
-
Manual 99a 38 July 17, 2001 Lease Time Rationale 6 hours Covers a DHCP server outage of 6 hours 12 hours Ensures that retraction of address assignment takes less than one day 3 days Used by many sites simply because of software defaults 6 days Affords a weekend server outage without losing leases 4 months Enables students to keep their address over a summer vacation, for example Controlling Client Access to Leases There usually is a trade-off when an attempt is made to control specific clien
-
Manual 99a 38 July 17, 2001 Subnetting Your Addresses One of the more difficult configuration tasks concerns configuring your routers if you have multiple subnets. Each might require one or more subnets, depending on your router configuration. Create a Subnet object for each LAN segment that requires dynamic IP address assignment. Assigning Addresses Manually Your site might have devices, such as servers and printers, that have addresses assigned by means other than DHCP.
-
Manual 99a 38 July 17, 2001 Hostnames Every host on your network that uses the Internet or that can be reached from the Internet should have a name. Each resource record has a hostname field. Some simple rules are required for hostnames for conformance to accepted Internet standards. Hostnames are called labels and can have alphabetic and numeric characters. A hyphen is allowed if it separates two character strings. Labels might not be all numbers, but they can have a leading digit.
-
Manual 70 99a 38 Novell DNS/DHCP Management Utility Administration Guide Novell DNS/DHCP Management Utility Administration Guide 103-000164-001 September 4, 2001 Novell Confidential July 17, 2001
-
Manual 3 99a 38 July 17, 2001 Setting Up This document provides information about configuring DNS and DHCP, and importing and exporting database information. Configuring DNS The DNS/DHCP Management Utility provides a common Web-based interface for configuring both DNS and DHCP. For information on installing the DNS/DHCP Management Utility, refer to “Installing the DNS/DHCP Management Utility” on page 118.
-
Manual 99a July 17, 2001 38 DNS/DHCP Objects Object Rights All Property Rights Locator object Browse Supervisor Group object Browse Supervisor Existing objects Supervisor Supervisor Administrators who manage a given set of DHCP subnets or DNS zones require rights to create or delete IP addresses, ranges of addresses, or resource record sets. The following table lists the rights requirements of administrators who perform these tasks.
-
Manual 99a 38 July 17, 2001 DNS/DHCP Scope Settings For better performance results with the DNS/DHCP Management Utility particularly in a distributed DNS/DHCP set-up, you should configure the DNS/DHCP Scope Settings for the session before you proceed with other administrative tasks. If you do not configure the DNS/DHCP Scope Settings for the session, you will receive a warning before every task you attempt to perform that the Scope Settings are not set. You can however, still proceed with the task.
-
Manual 99a 38 July 17, 2001 Importing DNS Configuration Information You can use the Novell DNS/DHCP Management Utility to import existing DNS configuration information. The DNS information should be in DNS BIND Master file format. To import existing DNS configuration information using the Management Utility, complete the following steps: 1 Open the DNS/DHCP Management Utility in a browser window. 2 Click DNS Management > Import DNS File. This opens the Zone Management window in the main panel.
-
Manual 99a 38 July 17, 2001 DNS Prerequisites The following steps must be completed before setting up DNS: 1. Install Novell Netware® 6 on the selected server or servers. 2. Install iManage on the Netware machine. 3. Install Internet Explorer 5.0. Loading the DNS Server After you have created and set up a DNS Server object and a DNS Zone object, enter the following command at the DNS server console: LOAD NAMED After NAMED.NLM is loaded, the DNS server can respond to queries for the zone.
-
Manual 99a 38 July 17, 2001 5 Enter the IP address of DNS servers for this client in the search order of preference, then click OK. The client can now send DNS queries to the DNS name server. Detailed DNS Configuration This section provides detailed information about configuring DNS objects using the DNS/DHCP Management Utility.
-
Manual 99a 38 July 17, 2001 4 Enter a unique host name for the DNS server object. 5 Enter a domain name for the server object. 6 Click Create. A message indicates that the new DNS server was created. Modifying a DNS Server Object After you create a DNS Server object you can modify its configuration parameters. To do so, complete the following steps: 1 Click DNS Management > DNS Server Management to open the DNS Server Management window in the main panel.
-
Manual 99a 38 July 17, 2001 Events Log: Specifies the degree of event data the server is to collect. Major or critical events denote a significant change in the state of server processing. To configure the event log, choose from the following options: None: Turns off event logging (default) Major Events: Logs only critical events All: Logs both major and minor events Audit Log: Check Enable Audit Trail Log to log audit trails and events.
-
Manual 99a 38 July 17, 2001 Creating a Primary DNS Zone Object After you create a DNS Server object, use the DNS/DHCP Management Utility to create and set up a Primary DNS zone. For information about how to create a secondary DNS Zone object refer to “Creating a Secondary DNS Zone Object” on page 79. For information about how to create an INADDR.ARPA Zone object, refer to “Creating an IN-ADDR.ARPA Object” on page 80.
-
Manual 99a 38 July 17, 2001 3 Choose Create New Zone. 4 Enter the eDirectory context for the zone or browse to select it. 5 Enter a name for the zone object. 6 Under Zone Type, choose Secondary. 7 Enter the IP address of the DNS server that will provide zone out transfers for this secondary zone. 8 Select a DNS server from the Assign Authoritative DNS Server drop- down menu. This is an optional parameter.
-
Manual 99a 38 July 17, 2001 5 Enter the IP address of the zone in the Zone Domain Name field. The IN- ADDR.ARPA zone name is displayed. 6 Under Zone Type, choose Primary (default). 7 Select a DNS server from the Assign Authoritative DNS Server drop- down menu. or Enter a unique host name in the Name Server Host Name box and optionally, enter a domain name or select it from the Domain drop-down menu. 8 Click Create. A message indicates that the new Primary IN-ADDR.ARPA Zone object has been created.
-
Manual 99a 38 July 17, 2001 9 Click Create. A message indicates that the new Secondary IN-ADDR.ARPA Zone object has been created. Modifying a Zone Object After you have created a Zone object, you can modify it and provide more detailed configuration information. To modify a new Zone object's attributes, complete the following steps: 1 Click DNS Management > Zone Management to open the Zone Management window in the main panel.
-
Manual 99a 38 July 17, 2001 Modify Zone Out Filter: Specifies a list of IP addresses or networks authorized to do zone out transfers from this zone. Use the Add and Delete buttons to add or remove particular IP addresses and networks. Zone Master: Specifies the name of the DNS zone. E-mail Address: Specifies the e-mail address for the zone. Serial Number: Use this field to set a date and revision number for the Start of Authority.
-
Manual 99a 38 July 17, 2001 6 Choose the Resource Record Type (RR Type) from the available options under the Others drop-down menu and enter appropriate Resource Record data corresponding to the type chosen. 7 Click Create. For more information on Resource Record Types, refer to Table 2, “Resource Record Types and Field Differences,” on page 33.
-
Manual 99a 38 July 17, 2001 You can now modify the Resource Record Data of all but the following types of resource records: - A (or IPv4) - AAAA (or IPv6) 6 Click Done to save the changes. Configuring DNS Features This section provides procedures to help you configure the DNS features of Novell DNS/DHCP Services.
-
Manual 99a 38 July 17, 2001 Configuring to Support Child Zones If you are supporting child zones, you must configure the glue logic or glue records to associate the child zones with the parent zone. The parent zone contains a referral to the child zone, meaning that its zone information contains an Name Server (NS) record that names the zone server for the child zone and an Address record that specifies the IP address for the child zone's DNS name server.
-
Manual 99a 38 July 17, 2001 Importing DHCP Configuration Information You can use the DNS/DHCP Management Utility to import existing DHCP configuration information. The DHCP information should be in DHCP version 2.0 or 3.0 file format. To import existing DHCP configuration information, complete the following steps: 1 Open the DNS/DHCP Management Utility in a browser window. 2 Click DHCP Management > Global DHCP Configuration to open the Global DHCP Configuration window in the main panel.
-
Manual 99a 38 July 17, 2001 Setting Up DHCP This section provides the following procedures required to accomplish a basic DHCP setup: “DHCP Prerequisites” on page 88 “Setting Global DHCP Options” on page 89 “Creating a DHCP Server Object” on page 91 “Creating a Subnet Object” on page 91 “Creating Subnet Address Ranges” on page 92 “Creating IP Address Objects” on page 92 “Loading the DHCP Server” on page 93 “Configuring Clients to Use DHCP” on page 94 This section does not describe how to
-
Manual 99a 38 July 17, 2001 Setting Global DHCP Options To define a global DHCP option: 1 Click DHCP Management > Global DHCP Configuration to open the Global DHCP Configuration window in the main panel. 2 Select Set Global Preferences from the drop-down menu > click OK to open the Global DHCP Preferences window. 3 Click Modify to open the DHCP Options window. 4 The DHCP Options you can configure globally are listed in the Available DHCP Options list box.
-
Manual 99a 38 July 17, 2001 3 Click Next to open the Excluded Hardware Addresses list in the Global DHCP Defaults window. This list contains the MAC addresses of clients that should not receive IP addresses from DHCP servers. These exclusions apply to all DHCP servers in the eDirectory tree. 4 Click Next to open the Included Hardware Addresses list in the Global DHCP Defaults window. This list contains the MAC addresses of clients that will receive IP addresses from DHCP servers.
-
Manual 99a 38 July 17, 2001 Creating a DHCP Server Object You use the DNS/DHCP Management Utility to create and set up a DHCP Server object. A DHCP Server object can be created or located under any of the following objects: Organization (O) Organization Unit (OU) Country (C) Locality (L) To create and set up a DHCP server object, complete the following steps: 1 Click DHCP Management > DHCP Server Management to open the DHCP Server Management window in the main panel.
-
Manual 99a 38 July 17, 2001 subnet, unless a different server is specified when the range is created. The default server also is the only server that responds to BOOTP requests for the subnet. 6 Click Create. A message indicates that the new subnet has been created. IP address objects are simultaneously created to exclude routing and broadcast addresses.
-
Manual 99a 38 July 17, 2001 If you have set up subnets and subnet address ranges, you are not required to set up individual IP addresses unless you want to perform manual address assignment or exclude addresses from assignment. To create and set up an IP Address object, complete the following steps: 1 Click DHCP Management > IP Address Management to open the IP Address Management window in the main panel.
-
Manual 99a 38 July 17, 2001 After you load DHCPSRVR.NLM, the DHCP server can respond to client requests and assign IP addresses. For information about other command line options, refer to “DHCPSRVR Command Line Options” on page 112. After DHCPSRVR.NLM is loaded, you can use the DNS/DHCP Management Utility to start and stop the DHCP Server. For more information on starting and stopping the DHCP server, refer to “Starting/Stopping the DHCP Server” on page 96.
-
Manual 99a 38 July 17, 2001 “Modifying an Existing IP Address Object” on page 100 “Creating a Subnet Pool Object” on page 101 “Modifying a Subnet Pool Object” on page 102 Modifying a DHCP Server Object Refer to “Creating a DHCP Server Object” on page 91 for information about creating a DHCP Server object.
-
Manual 99a 38 July 17, 2001 Audit Trail and Alerts Option: Auditing allows you to analyze historical data and diagnose operational difficulties. Choose from the following options: - None: Disables auditing - Major Events: Audits only major events such as SNMP traps (default) - All: Audits all events Enable Audit Trail Log: Check this to log audit trails and events. Mobile User Option: The DHCP server can be configured to support mobile users such as laptop users.
-
Manual 99a 38 July 17, 2001 Stop button: If the DHCP Server module is loaded but in START mode, click to stop the DHCP server. NOTE: To use the Start/Stop DHCP service, DHCPSRVR.NLM must be loaded. Modifying an Existing Subnet Object For information about creating a Subnet object, refer to “Creating a Subnet Object” on page 91.
-
Manual 99a 38 July 17, 2001 Set Boot Parameter Options: Check this to specify the Server Address, Server Name, and Boot File Name for the BOOTP service. This information, provided at boot time, includes the address and name of a server the client can contact for a boot image, as well as a boot filename. Other DHCP Options: To configure an option, complete the following steps: Click Modify to open the DHCP options page that list the available DHCP Options.
-
Manual 99a 38 July 17, 2001 From the Select Range Type drop-down menu, choose one of the following: Dynamic DHCP: A range of addresses used by the DHCP server to assign addresses to clients making only DHCP requests. If the Dynamic DHCP range type is assigned, the DNS Update Option parameter can be enabled.
-
Manual 99a 38 July 17, 2001 Modifying an Existing IP Address Object Refer to “Creating IP Address Objects” on page 92 for information about creating IP Address objects. After an IP Address object has been created, you can modify its configuration parameters by completing the following steps: 1 Click DHCP Management > IP Address Management to open the IP Address Management window in the main panel. 2 Select Modify IP Address from the drop-down menu > click OK to open the Modify IP Address window.
-
Manual 99a 38 July 17, 2001 MAC Address: Specifies the hardware address of the NIC (Network Interface Card). Host Name: Specifies the name of the host server. Associated eDirectory Object : Use this field to select another object in the eDirectory database to maintain a reference to. For example, identify a user who typically uses the device associated with this address. Comments: You can type comments about the address object in this box. This is an optional parameter.
-
Manual 99a 38 July 17, 2001 4 Enter the eDirectory context where the subnet pool record will be placed. 5 Click OK. A message indicates that the new subnet pool object has been created. Modifying a Subnet Pool Object Refer to “Creating a Subnet Pool Object” on page 101 for information about creating subnet pool objects.
-
Manual 99a 38 July 17, 2001 “Configuring Dynamic DNS” on page 103 “Configuring Multiple Logical Networks” on page 104 Configuring a DNS Server to be Authoritative for Multiple Zones A Netware 6 DNS server can be authoritative for multiple zones. There is no limit to the number of zones a Netware 6 server can support other than those mentioned in “Optimizing DNS Performance” on page 115. Those limitations have to do with the total number of objects.
-
Manual 99a 38 July 17, 2001 2 Select the desired Subnet Address Range and ensure that the range type is set to Dynamic BOOTP and DHCP or Dynamic DHCP. 3 Set the DNS update option to Always Update. 4 Click Save. Configuring Multiple Logical Networks When you configure multiple logical networks, also known as virtual local area networks (VLANs), you associate each individual LAN or Subnet object with a Subnet Pool object.
-
Manual 99a 38 July 17, 2001 Configuring DNS Auditing To configure a DNS server to audit activities, complete the following steps: 1 Click DNS Management > DNS Server Management to open the DNS Server Management window in the main panel. 2 Select Modify Server from the drop-down menu > click OK to open the Modify DNS Server window. 3 Select the DNS Server. 4 Click OK. 5 Click Next > Next > and select Major Events or All under Event Log. 6 Check the Enable Audit Trail Log check box. 7 Click OK.
-
Manual 99a 38 July 17, 2001 m/d/yy m.d.yy m d yy mmm d yy where yy represents the last two digits of the year and mmm the first three letters of the name of the month, for example Jan, Feb etc. 5 Click OK. This opens the DNS Audit Trail Log table that lists the following data: Entry Time: Date and time the event occurred. Type: Type of event. IP Address: IP Address at which the event occurred. Domain Name: Domain Name at which the event occurred.
-
Manual 99a 38 July 17, 2001 4 Modify the Starting Date and Ending Date in the appropriate fields, if you want to filter the Audit Period. The following date formats are accepted: mm-dd-yyyy mm/dd/yyyy mm.dd.yyyy mm dd yyyy mmm dd yyyy mmddyyyy m-d-yyyy m/d/yyyy m.d.yyyy m d yyyy mmm d yyyy m-d-yy m/d/yy m.d.yy m d yy mmm d yy where yy represents the last two digits of the year and mmm the first three letters of the name of the month, for example Jan, Feb etc. 5 Click OK.
-
Manual 99a 38 July 17, 2001 Severity options define which event levels are recorded: critical, major, warning, and informational. State settings define the condition of events recorded: operational, degraded, and inoperative. Configuring DHCP Auditing You can configure a DHCP server for auditing using the Audit Trail and Alerts Option.
-
Manual 99a 38 July 17, 2001 m-d-yyyy m/d/yyyy m.d.yyyy m d yyyy mmm d yyyy m-d-yy m/d/yy m.d.yy m d yy mmm d yy where yy represents the last two digits of the year and mmm the first three letters of the name of the month, for example Jan, Feb etc. 5 Click OK.
-
Manual 99a 38 July 17, 2001 Viewing the DHCP Event Log 1 Click DHCP Management > DHCP Server Management to open the DHCP Server Management window in the main panel. 2 Select Event Log from the drop-down menu > click OK to open the DHCP Event Log window. 3 Select the server from the Select DHCP Server drop-down menu. 4 Modify the Starting Date and Ending Date in the appropriate fields, if you want to filter the Audit Period. The following date formats are accepted: mm-dd-yyyy mm/dd/yyyy mm.dd.
-
Manual 99a 38 July 17, 2001 6 To define a view filter on the DHCP Events Log, click the Display Options button. You can now filter events on the following parameters: Start Date: to set a start date for monitoring the DHCP Event Log. End Date: to set an end date for monitoring the DHCP Event Log. Severity defines the severity level of the event: critical, major, warning, and informational. State settings define the condition of events recorded: operational, degraded, and inoperative.
-
Manual 99a 38 July 17, 2001 Parameter Function -q Disables verbose mode for debug messages (default setting) -r Deletes and removes an existing zone from the zone database -rp Replaces listed characters with a dash (-) in host names for which resource records are dynamically created -s [zone name] Prints status information; zone name is optional -u Imports file.
-
Manual 99a 38 July 17, 2001 Parameter Function -d3 Turns on a background screen log of Debug statements and DHCP packets and writes the log to the server's \ETC\DHCPSRVR.
-
Manual 99a 38 114 Novell DNS/DHCP Management Utility Administration Guide Novell DNS/DHCP Management Utility Administration Guide 103-000164-001 September 4, 2001 Novell Confidential July 17, 2001
-
Manual 4 99a 38 July 17, 2001 Optimizing You can optimize the performance of Novell® DNS/DHCP Services software by using state-of-the-art servers. We highly recommend that you use a server with a 200 MHz (or higher) Pentium* processor with 64 MB of memory. If your network configuration is large, more memory might provide improved performance. For optimum performance, the designated server should be the most powerful server available.
-
Manual 99a 38 July 17, 2001 subnet to no more than 2,048. A Novell DHCP server can support several large subnets in a DHCP-only configuration. However, the higher the number of IP Address objects supported, the greater the impact on DHCP server run-time performance.
-
Manual 5 99a 38 July 17, 2001 Managing This document provides information about installing and using the DNS/ DHCP Management Utility to perform management tasks. DNS/DHCP Management Utility The DNS/DHCP Management Utility is a Web-based utility that enables network administrators to set up and manage DNS (DNS Service) and DHCP (DHCP Service) and the eDirectoryTM objects created for DNS and DHCP.
-
Manual 99a 38 July 17, 2001 Installing the DNS/DHCP Management Utility Prerequisites Hardware Requirements Pentium II processor. Pentium III recommended. SVGA display 256 MB of RAM (minimum) 50 MB DOS partition (minimum). 1GB recommended. 50 MB of available disk space (minimum). 1GB recommended. SYS volume of size 2 GB (minimum); 4 GB default. Software Requirements Novell Netware® 6 iManage Internet Explorer 5.
-
Manual 99a 38 July 17, 2001 The DNS/DHCP Management Utility roles appear in the left pane. To manage DNS services, click DNS Management and choose from the available options. To manage DHCP services, click DHCP Management and choose from the available options. Using the DNS/DHCP Management Utility You must have sufficient rights to use the DNS/DHCP Management Utility. All network administrators must have Read and Write rights to the container where the DNS/DHCP Locator and Group objects are located.
-
Manual 99a 38 July 17, 2001 Managing DHCP After configuring your DHCP servers and beginning to provide DHCP services, you can also perform auditing or generate SNMP traps. Deciding which DHCP options to use depends on your implementation. Refer to “DHCP Options” on page 43 for information about available DHCP and BOOTP options. Managing DDNS is complicated because each Subnet Address Range type requires a different configuration.
-
Manual 99a 38 July 17, 2001 Auditing Server Activity The audit trail log records a history of activity logged by DNS and DHCP servers. You can use the Audit Trail log to diagnose network trends. A DNS audit trail would include a history of DNS queries and the hosts requesting them. A DHCP audit trail would include a history of address assignments, including which host had an address during a given period of time and a list of addresses that had already been in use when pinged.
-
Manual 99a 38 122 Novell DNS/DHCP Management Utility Administration Guide Novell DNS/DHCP Management Utility Administration Guide 103-000164-001 September 4, 2001 Novell Confidential July 17, 2001
-
Manual 6 99a July 17, 2001 38 Troubleshooting This chapter contains troubleshooting information for DNS and DHCP. DNS This section provides the following troubleshooting information for DNS: “Troubleshooting Checkpoints” on page 123 “Common Configuration Problems” on page 124 “Common Operational Problems” on page 125 “Troubleshooting Windows 95 TCP/IP Problems” on page 128 “Using the "-F" Command Line Option for DNIPINST.
-
Manual 99a 38 July 17, 2001 The IP address is already in use by another client. 2. Ping an IP address on your local network. If this approach fails, one of the following conditions might be the cause: The client you pinged is not operational. The LAN is experiencing problems. Your client's TCP/IP stack is experiencing problems. 3. Ping an address on a different network or on the internet.
-
Manual 99a July 17, 2001 38 3. Verify consistency between Pointer records in the IN-ADDR.ARPA domain and other domains. 4. If you change the IP address of a name server, ensure that the parent zone reflects that change. 5. Verify that you have configured a name server to correctly serve every zone. 6. Verify that zone transfers are occurring properly. Ensure that the secondary name server can identify the primary name server. 7. If you cannot access a particular host, verify that PTR records exist.
-
Manual 99a 38 July 17, 2001 Cause 1—When you created a new zone, the PTR records were not created or the PTR records have been deleted or changed. Solution 1—When you configure a zone, always select Yes when prompted to create a companion zone. If you created a companion zone, verify that the IP address and hostname are correct. Checkers can easily catch neglected PTRs. For further information, refer to RFCs 1537 and 1713. Cause 2—The host is down or is unreachable.
-
Manual 99a July 17, 2001 38 Solution—Enter the correct domain name or name server address in the hosts's resolv.cfg file (or equivalent). Problem—Hosts cannot access an entire external domain. Cause 1—The root name server information is invalid; therefore, the root servers are unreachable. For non-eDirectory systems running DNS, changes to this information are not automatically propagated through a domain; you must enter the changes manually.
-
Manual 99a 38 July 17, 2001 Cause 1: The Zone SOA serial number is not automatically updated after the modification is made. Solution 1: After you modify the Resource Record, change the Zone SOA serial number manually. Cause 2: The server cache is not atomically refreshed after modifications are made. Solution 2: Unload the NAMED.NLM module and reload it to refresh the DNS server settings. Problem: The client is not assigned an IP address. Cause: The DHCP Server object is not properly configured.
-
Manual 99a July 17, 2001 38 Hostname DNS Server If the client has obtained an address from a DHCP server, click More Info to identify the DHCP server, when the lease began, and when it expires. Four additional buttons provide the following functions: Renew—Sends a DHCPREQUEST to the DHCP server, updates the lease, and updates any assigned values such as a default gateway or DNS server.
-
Manual 99a 38 July 17, 2001 Pinging www.novell.com [137.65.2.5] with 32 bytes of data:Reply from 137.65.2.5: bytes=32 time=27ms TTL=59Reply from 137.65.2.5: bytes=32 time=22ms TTL=59Reply from 137.65.2.5: bytes=32 time=31ms TTL=59 If you use the IP address of the host, you will receive the same type of reply. Using the host's domain name is a good way to determine the host's IP address, and doing so also causes the client to request DNS name resolution before sending the ICMP packet.
-
Manual 99a July 17, 2001 38 Option Meaning -f Set Don't Fragment flag in packet -i TTL Time-To-Live value -v TOS Type of service -r count Record route for count hops -s count Time stamp for count hops -j host-list Loose source route along host-list -k host-list Strict source route along host-list -w timeout Timeout in milliseconds to wait for each reply NOTE: You can find unauthorized addresses in an exported DHCP configuration by searching for IP Address objects with an Assignment Ty
-
Manual Table 12 99a 38 July 17, 2001 TRACERT Options Option Meaning -d Do not resolve addresses to host names -h maximum_hops Maximum number of hops to search for target -j host-list Loose source route along host-list -w timeout Timeout in milliseconds to wait for each reply Using ARP ARP is an advanced utility that should be used only by those who have a detailed understanding of TCP/IP and must troubleshoot complex problems.
-
Manual 99a July 17, 2001 38 Option Meaning -s Adds the host and associates the internet address inet_addr with the physical address eth_addr. The physical address is given as six hexadecimal bytes separated by hyphens. The entry is permanent. eth_addr Specifies a physical address. if_addr If present, specifies the Internet address of the interface whose address translation table should be modified. If not present, the first applicable interface is used.
-
Manual 99a 38 July 17, 2001 Option Meaning interval Redisplays selected statistics, pausing interval seconds between each display. Press Ctrl+C to stop redisplaying statistics. If omitted, NETSTAT prints the current configuration information once. If you suspect that a LAN card is malfunctioning, use the -e option while troubleshooting. The -e option displays Ethernet statistics, including discards and errors.
-
Manual 99a July 17, 2001 38 DHCP Locator object to obtain a copy of any global configuration from the object. The DHCP server saves a copy of the global configuration in SYS:\ETC\DHCP\DHCPLOC.TAB. In subsequent loads, the DHCP server will try to obtain the global configuration information from the DNS/DHCP Locator object. If the information is not available, the DHCP server will read the information from the last saved copy of SYS:\ETC\DHCP\DHCPLOC.TAB.
-
Manual 99a 38 July 17, 2001 If DHCP hosts cannot obtain a DHCP lease when required, verify that enough leases exist to accommodate all hosts that use DHCP. If there are too few leases, obtain more IP addresses and configure more leases or reduce the lease time to a few hours. This ensures that more leases are made available to other clients that are waiting to use the IP addresses.
-
Manual 99a July 17, 2001 38 Cause—An unauthorized DHCP server has been configured by someone attempting to control or disrupt your network. The unauthorized DHCP server is assigning IP addresses and other configuration parameters that have already been assigned to other nodes by an authorized DHCP server. The result is that nodes are assigned duplicate IP addresses or incorrect configuration parameters.
-
Manual 99a 38 July 17, 2001 eDirectory is set to DELETE_DUPLICATE. This ensures that only one lease is in use at a time because the original lease is deleted when the mobile client requests a new lease. If the remote office is on the same subnet as that of the local office, the client should use the same IP address. If the client does not use the same IP address, verify that there is only one DHCP server for the subnet.
-
Manual 99a July 17, 2001 38 Solution—Check the server's physical connections. Load INETCFG to ensure that proper binding exists. Problem—DHCPSRVR.NLM is loaded and the trace screen shows client packets being received, but the server is not responding and the REQUEST packets are dropped. Cause—The server's configuration for its local interfaces does not match the configuration within the Directory for the same server.
-
Manual 99a 38 July 17, 2001 Windows NT To manually release and renew a DHCP-assigned IP address in Windows NT, complete the following steps: 1 Select Start > Programs > MS-DOS Command Prompt. 2 From the DOS prompt, execute the command ipconfig /release A message is displayed indicating that the assigned IP address has been successfully released. 3 From the DOS prompt, execute the command ipconfig /renew A message is displayed indicating the new IP address that has been assigned.
-
Internetwork Packet Exchange Novell NetWare 6 ® www.novell.
-
Manual 99a July 17, 2001 38 Contents About This Guide 9 Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 1 Understanding 11 The IPX Protocol . . . . . . . . . . . . . . . . . . . . . . . IPX Packet Structure . . . . . . . . . . . . . . . . . . . . . IPX Addressing. . . . . . . . . . . . . . . . . . . . . . . . Network Number . . . . . . . . . . . . . . . . . . . . . Node Number. . . . . . . . . . . . . . . . . . . . . . . Socket Number . . . . .
-
Manual 3 Setting Up 99a 38 July 17, 2001 51 Turning Off IPX Packet Forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 How to Turn Off IPX Packet Forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 Configuring Static Routes and Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Configuring Static Routes and Services with NIASCFG . . . . . . . . . . . . . . . . . . . . 54 Configuring Static Routes and Services with STATICON . . . . . . .
-
Manual 4 July 17, 2001 38 Managing 111 Using the IPXCON Utility. . . . . . . . . . . . . . . . . . Using the IPXPING Utility on the Server . . . . . . . . . . Using the IPXPING Utility on the Workstation . . . . . . . Syntax . . . . . . . . . . . . . . . . . . . . . . . . . Parameters . . . . . . . . . . . . . . . . . . . . . . . Example . . . . . . . . . . . . . . . . . . . . . . . . Using the SPFCON Utility . . . . . . . . . . . . . . . . . Main Window . . . . . . . . . . . . . . . . . . . . . .
-
Manual 99a 38 July 17, 2001 Multiple Systems on a LAN Become Unreachable Intermittently . . . . . . . Connectivity Across a Point-to-Point Link Has Been Lost . . . . . . . . . . . An NLSP Server on a LAN Cannot Be Accessed . . . . . . . . . . . . . . . LAN Is Partitioned . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . No Communication Occurs between Two Networks. . . . . . . . . . . . . . Services Are Inaccessible in the Area . . . . . . . . . . . . . . . . . . . . .
-
Manual 99a 38 July 17, 2001 About This Guide This guide provides the information you need to configure and manage the Novell® Internet Access Server 4.1 IPXTM routing software. In addition to planning information, this guide provides troubleshooting tips, techniques, and tools, as well as the symptoms of and solutions to commonly occurring problems for the IPX components of Novell Internet Access Server 4.1.
-
Manual 10 Internetwork Packet Exchange Internetwork Packet Exchange 103-000176-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 1 99a 38 July 17, 2001 Understanding This section describes the processes and protocols that govern Internetwork Packet ExchangeTM (IPXTM) routing in the NetWare® networking environment. In particular, it examines the mechanics of IPX packet routing and the administration of routing and service information on an IPX internetwork. Each NetWare protocol plays a different role in enabling a NetWare router to perform its tasks.
-
Manual Figure 1 99a 38 July 17, 2001 How NetWare Protocols Correspond to the OSI Reference Model Application Presentation NetBIOS Applications Session NetWare Applications SAP NCP NetBIOS Transport Network SPX IPX Data Link NLSP RIP MAC Protocols (Ethernet, token ring, ARCnet*) Physical The higher-level protocols (NetBIOS, SAP, NCP, SPX, NLSP, and RIP) rely on the MAC protocols and IPX to handle lower-level communications, such as node addressing.
-
Manual 99a 38 July 17, 2001 For more information about the IPX protocol, refer to “IPX Packet Structure” on page 13 “IPX Addressing” on page 17 “How IPX Routing Works” on page 21 IPX Packet Structure The IPX packet is similar to an XNS IDP packet and comprises two parts: A 30-byte IPX header, which includes the network, node, and socket addresses for both the destination and the source A data section, which often includes the header of a higher-level protocol, such as SPX The minimum IPX pack
-
Manual Figure 2 99a 38 July 17, 2001 IPX Packet Structure IPX Packet Checksum (2 bytes) Packet Length (2 bytes) Transport Control (1 byte) MAC Protocol Envelope Packet Type (1 byte) MAC Header Destination Network (4 bytes) Destination Node (6 bytes) Destination Socket (2 bytes) Data Source Network (4 bytes) Source Node (6 bytes) MAC Trailer Source Socket (2 bytes) Higher-Level Protocol Headers Data The following describes the IPX packet fields: Checksum —Packet integrity check.
-
Manual 99a 38 July 17, 2001 Sending nodes always set the Transport Control field to zero when building an IPX packet. When a router receives a packet that requires further routing, it increments this field by one and forwards the packet. Packet Type —Type of service offered or required by the packet. Novell currently uses the packet types listed in Table 1.
-
Manual 99a 38 July 17, 2001 reserved network numbers, refer to “Reserved Network Numbers” on page 18. Destination Node —Physical address of the destination node. Not all LAN topologies use the same size address field. A node on an Ethernet network requires all 6 bytes to define its address; a node on an Ammonite network requires only 1 byte. A node address of 0xFFFFFFFFFFFF (that is, 6 bytes of 0xFF) broadcasts the packet to all nodes on the destination network.
-
Manual 99a 38 July 17, 2001 IPX Addressing IPX defines its own internetwork and intranode addressing. For intranetwork (node) addressing, IPX uses the physical address assigned to the network interface board. The IPX network address uniquely identifies an IPX server on an IPX network and individual processes within the server.
-
Manual 99a 38 July 17, 2001 IPX network. After you configure a board and select a driver during the initial router configuration, the router sends a RIP all routes request packet to the network. From the responses it receives, the router determines the network number and frame type it needs to use. Reserved Network Numbers The destination network of an IPX packet is typically an IPX network to which a unique network number has been assigned.
-
Manual 99a 38 July 17, 2001 Internal Network Number NetWare 3 servers and NetWare 4 servers have an additional identifier called an internal network number. This is a unique hexadecimal number between one and eight digits that is assigned to the server at installation. The internal network is a logical network that NetWare uses to advertise services and route IPX packets to the physical networks attached to the server.
-
Manual 99a 38 July 17, 2001 Socket Number The socket number is the 2-byte hexadecimal number that identifies the ultimate destination of an IPX packet within the node. This destination is actually a process —such as routing (RIP) or advertising (SAP)—that operates within the node. Because several processes are typically operating at any given time, socket numbers provide a type of mail slot by which each process can identify itself to IPX.
-
Manual 99a 38 July 17, 2001 How IPX Routing Works NetWare routers interconnect different IPX network segments and receive instructions for addressing and routing packets between these segments from the IPX protocol. IPX accomplishes these and other Network-layer tasks with the help of RIP, SAP, and NLSP.
-
Manual 99a 38 July 17, 2001 3. The sending workstation places the node address of the router that responded to the RIP request in the Destination Address field of the MAC header. 4. The sending workstation places its own node address in the Source Address field of the MAC header. 5. The sending workstation sends the packet. When a Router Receives an IPX Packet When a router receives an IPX packet, it performs the following tasks: 1.
-
Manual 99a 38 July 17, 2001 If the packet is addressed to the router, the appropriate socket process handles it internally; otherwise, the router forwards the packet. NOTE: Packets that must be handled internally are those addressed directly to the router and those broadcast (destination node = 0xFFFFFFFFFFFF) to any network segment to which the router is directly connected. Usually, only RIP, SAP, and diagnostic packets fall into this category.
-
Manual 99a 38 July 17, 2001 IPX Operation over WAN Links For packets to travel between two IPX network segments separated by a WAN, there must be a connection between the two routers representing each segment. This connection is represented by the WAN call destination , a unique name that identifies the router on the other end of the connection.
-
Manual 99a 38 July 17, 2001 Call Types Associated with each WAN call destination is the call type, which characterizes the behavior of the call after it is established. Calls can be permanent or on-demand. For more information about call types, refer to: “Permanent Calls” on page 25 “On-Demand Calls” on page 25 “Routed On-Demand Calls” on page 26 Permanent Calls A permanent call is a connection that remains active between the local router and the remote router identified by the call destination.
-
Manual 99a 38 July 17, 2001 With an on-demand call, the link remains inactive until user data needs to cross it. Workstations needing to reach remote destinations send packets to their local IPX router advertising the routes, assuming the packets can reach their destination. The local router stores the packets and tries to establish a connection to the remote router.
-
Manual 99a 38 July 17, 2001 You configure a routed on-demand call the same way you configure a standard on-demand call with one exception: you must configure a routing protocol to operate over the link. Routing Types IPXWAN negotiates the WAN routing type, which determines which IPX routing protocol—if any—runs over the connection.
-
Manual 99a 38 July 17, 2001 For example, two routers running NLSP at their respective WAN interfaces automatically use the WAN NLSP routing type over the connection. Whether a third-party router is running at the other end of the connection Some third-party routers might support only Numbered RIP connections for IPX routing over WANs.
-
Manual 99a July 17, 2001 38 necessary, connections to the main office need only be low-speed, dial-up lines. For this reason, the first several minutes of the call should not be taken up by a flood of routing and service information into a branch office. Nor should there be a relatively smaller flood of (mostly irrelevant) routing and service information from a branch office into the main office. Figure 3 shows a typical configuration for static routes and services over an on-demand call.
-
Manual 99a 38 July 17, 2001 To configure static routes and services for permanent and on-demand calls, you can use either of the following utilities: NIASCFG, which you also use for configuring boards and network interfaces, and for enabling protocols and bindings on the router. If you use NIASCFG, you must configure all routes and services manually. STATICON, the static routes and services configuration utility for IPX.
-
Manual Figure 4 99a 38 July 17, 2001 Watchdog Spoofing Enabled over an On-Demand Call Main Office Router Branch Office Router Watchdog Query: "Are you still there?" On-Demand Call Query Response: "Yes, I am still here." Workstation Main Office Accounting Server When watchdog spoofing is enabled on an on-demand call, watchdog packets, going from a server to a client, cause the router to reply that the workstation is active without initiating the call.
-
Manual 99a 38 July 17, 2001 Compression Slots When you enable header compression, you can also specify the number of compression slots. A compression slot is a location in router memory that stores packet header information. The compression algorithm uses this information to compress outgoing—and decompress incoming—packet headers. IMPORTANT: You must allocate the same number of compression slots on each router. If the values are different, the IPXWAN protocol chooses the lesser of the two.
-
Manual 99a 38 July 17, 2001 Compression Packet Types Five packet types are used to exchange compression-state information about packets sent over a connection on which header compression is enabled. Three of these packet types—slot initialization, reject, and acknowledgment packets—manage the flow of compressed and uncompressed packets over the connection; these are the compression protocol packets. The packet type, along with other information, is indicated in the first byte of a compressed packet.
-
Manual 99a July 17, 2001 38 Acknowledgment packet — A compression protocol packet that acknowledges receipt of an IPX slot initialization packet. The transmitting node continues to send slot initialization packets until it receives an acknowledgment packet. After receiving the acknowledgment packet, the transmitting node begins to send compressed packets. IPXCON does not track acknowledgment packets.
-
Manual 99a 38 July 17, 2001 For more information about IPX route aggregation, refer to “Introducing Aggregated Routes into NLSP” on page 35 “Consistent Use of Routers that Support Route Aggregation” on page 36 “Interaction with SAP” on page 36 “Metrics Used with Aggregated Routes” on page 36 Introducing Aggregated Routes into NLSP Aggregated routes are introduced into NLSP in the same way that external RIP routes are introduced.
-
Manual 99a 38 July 17, 2001 Consistent Use of Routers that Support Route Aggregation Route aggregation into an NLSP area is possible only if all routers in that area support address summaries. Routers that do not support route aggregation do not recognize destination addresses for aggregated routes; they forward packets to the default route or drop packets if no default route is configured.
-
Manual 99a 38 July 17, 2001 IPX Address Mapping Gateway Using the IPX Address Mapping Gateway (IAMG) offers the following three advantages: Your hosts can connect to a backbone network even when your local network numbers are not compatible with the backbone addressing scheme. If the routing protocol in the backbone does not support route aggregation (such as earlier implementations of NLSP), the routing protocol probably cannot manage the number of network addresses from every customer.
-
Manual Figure 6 99a 38 July 17, 2001 IAMG Implementation Gateway Address 01014000 Backbone Service Customer Network Backbone Network IPX Address Mapping Gateway Backbone Services 00001234 NetWare Workstation NetWare File Server The IAMG allows multiple gateways to be connected between the customer network and backbone network in parallel. All such gateways on a customer's network share a single gateway address.
-
Manual 99a 38 July 17, 2001 When the IAMG is configured, care must be taken to avoid address conflicts. We recommend using the following configuration guidelines: Conflicts might occur when token ring and Ethernet interfaces are used on the same network. For instance, when the NetWare Mobile IPXTM software and NetWare remote access software assign node addresses, they set the IEEE Local bit and clear the IEEE Multicast bit.
-
Manual 40 Internetwork Packet Exchange Internetwork Packet Exchange 103-000176-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 2 99a 38 July 17, 2001 Planning This section explains what decisions must be made before you can configure IPXTM beyond its most basic configuration. IPX Configuration Decisions How you configure IPX beyond its most basic configuration depends on the following decisions: Whether to turn off IPX packet forwarding or to use the system as an IPX router The routing software enables you to turn off IPX packet forwarding on a NetWare® file server.
-
Manual 99a 38 July 17, 2001 NOTE: Before you can configure IPX to run over a WAN connection, you must configure the WAN board, a network interface, and at least one WAN call destination. To configure static routes and services for a permanent or on-demand call, refer to “Configuring Static Routes and Services” on page 53. To configure watchdog packet spoofing, refer to “Configuring Watchdog Spoofing” on page 65.
-
Manual 99a 38 July 17, 2001 Whether to use the IPX Address Mapping Gateway The IPX Address Mapping Gateway provides the following advantages: You can connect to a backbone network even when your local network numbers are not compatible with the backbone addressing scheme. If the routing protocol in the backbone does not support route aggregation, like most implementations of NLSP, the routing protocol probably cannot manage the number of network addresses from every user.
-
Manual 99a 38 July 17, 2001 Whether to change the hop count limit of outbound IPX packets This enables you to control the range of outbound IPX packets on your router. To control the range of IPX packets, refer to “Changing the Hop Count Limit for IPX Packets” on page 90.
-
Manual 99a 38 July 17, 2001 NetWare Mobile IPX Configuration Decisions Each of the following is key to the success of NetWare Mobile IPXTM configuration: Mobile Client Driver Selection Planning for Efficient Use of Your Mobile Client Deciding Where to Locate a Home Router Mobile Client Driver Selection When selecting your driver for the mobile client, verify with the vendor that the driver is written specifically with mobile operations in mind and that it supports the following: PCMCIA card in/
-
Manual 99a 38 July 17, 2001 destined for the mobile client travels more hops than necessary before arriving at the destination, as shown in Figure 7.
-
Manual 99a 38 July 17, 2001 The request from the mobile client takes the shortest route to the server. The response from the server is first forwarded to the Home Router, because the destination address is the internal network configured for the server on which the Home Router resides. The router then patches the response with the mobile client's actual address and forwards the packet to the mobile client.
-
Manual 99a 38 July 17, 2001 The best place to install the NetWare Mobile IPX Home Router software is on the file server that the mobile clients use most, as shown in Figure 9. In this way, when mobile clients access the file server, the responses from the file server are patched with the mobile client's actual location before they ever leave the server. Therefore, the responses do not travel an extra hop before reaching the client.
-
Manual Figure 10 99a 38 July 17, 2001 Home Router Positioning over WAN Links Server 1 Server 3 Mobile Client 2 Home Router 1 Router Access Point Access Point WAN Link Router Router Home Router 2 Mobile Client 1 Server 2 IMPORTANT: When a mobile client is transferred between the two sites over the WAN and not restarted, the client still uses the original Home Router for communications—crossing the WAN if necessary—until the mobile client is restarted.
-
Manual 50 Internetwork Packet Exchange Internetwork Packet Exchange 103-000176-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 3 99a 38 July 17, 2001 Setting Up Novell® Internet Access Server 4.1 routing software provides a set of configurable parameters with which you can modify operational characteristics of the Internetwork Packet ExchangeTM (IPXTM) network protocol. You configure all IPX parameters from the Novell Internet Access Server Configuration utility (NIASCFG).
-
Manual Figure 11 99a 38 July 17, 2001 Turning Off IPX Packet Forwarding on a NetWare File Server NetWare Router IPX Internetwork IPX Internetwork Routed Traffic IPX Internetwork NetWare Workstation NetWare Workstation File Services NetWare Workstation NetWare File Server Packet Forwarding = Disabled You should turn off IPX packet forwarding if you do not want the server to forward IPX packets between its interfaces.
-
Manual 99a 38 July 17, 2001 3 Press Esc and save your change. 4 Press Esc to return to the Internetworking Configuration menu. 5 If you want this change to take effect immediately, select Reinitialize System . If you want to configure other parameters, do so now, then reinitialize the system when you are finished.
-
Manual 99a 38 July 17, 2001 automatically and allows you to try the static configuration before saving it to disk. The STATICON configuration becomes active immediately; you do not need to reinitialize or restart the router. For more information about static routes and services and related topics, refer to “Static Routes and Services” on page 28.
-
Manual 99a 38 July 17, 2001 Ticks to Network —Number of ticks used to allow a packet to reach the destination network. Add one tick to this value for each LAN hop. 5 Press Esc and save your changes. 6 Press Esc to return to the Internetworking Configuration menu. 7 If you want these changes to take effect immediately, select Reinitialize System . If you want to configure other parameters, do so now, then reinitialize the system when you are finished.
-
Manual 99a 38 July 17, 2001 Service Address Node —Node address where the service resides. If you are specifying a file service or a service on a server or router, enter 1 . If you are specifying a NetWare 2 file server, specify the NIC address of LAN board A. Service Address Socket —Socket number on which this service listens for service requests. If you are specifying a file service, enter 0x0451 .
-
Manual Table 3 99a 38 July 17, 2001 Select Configuration Method Menu Options Menu Option Description Dynamically Configure Static Routing Tables Opens an on-demand call to the remote router and allows you to edit the local and remote configurations using dynamically obtained selection lists. Configure Services from Gatekeepers Opens an on-demand call to obtain a list of services available from a gatekeeper and allows you to select the services you want.
-
Manual 99a 38 July 17, 2001 Write Connection Routing Tables to Permanent Storage —Sends IPX SNMP requests to the local and remote routers to save the current local and remote routing tables for this connection to permanent storage. Each router is polled to make sure the operation is completed.
-
Manual 99a 38 July 17, 2001 Selectively Configuring Static Routes and Services Through selective configuration, you can choose specific routes and services you want to add to a routing table. This feature lets you select from an existing routing table the routes and services that your router does not have in its table. You can copy routes to a remote router from a local router, or copy routes to a local router from a remote router.
-
Manual 99a 38 July 17, 2001 9 If you selected Configure Local Routing Tables , complete the following steps; otherwise, continue with Step 10 on page 60. A progress screen appears while the local system reads the currently configured routes and services. After the Locally Configured Routes screen appears, you can remove items from the routing table by highlighting or marking the entries and pressing Del . 9a Press Ins to add static routes or services to the local routing table.
-
Manual 99a 38 July 17, 2001 After the Remote Router's Configured Routes and Services screen appears, you can remove items from the routing table by highlighting or marking the entries and pressing Del . 10a Press Ins to add static routes or services to the remote routing table. A progress screen appears while the local system reads the currently configured routes and services. The Selectable Routes and Services screen appears. The routes and services listed here are from the local router's table.
-
Manual 99a 38 July 17, 2001 In this case, the configuration remains in router memory. If you decide later to save the configuration to disk, return to the Select Configuration Option For This Call screen and select Write Connection Routing Tables to Permanent Storage .
-
Manual 99a 38 July 17, 2001 4 If the Status field associated with the call reads Not Connected , press Ins to connect the call. 5 Wait for the Status field to change to Connected . This can take several seconds if you are using a dial-up line. 6 Press Enter . 7 Select Autoconfigure Local and Remote Routing Tables . 8 Enter the SNMP Control Community name associated with the remote router, or press Enter to accept the default Control Community public . The remote router must have write access enabled.
-
Manual 99a 38 July 17, 2001 10 Select Save the Routing Tables to Permanent Storage . NOTE: Changes you make from STATICON take effect immediately; you do not need to reinitialize or restart either router after completing the configuration. The following message appears after the configuration is saved to disk: Writing static routing tables for this call to permanent storage completed successfully. 11 Press Esc until you return to the Select Configuration Method menu.
-
Manual 99a 38 July 17, 2001 8 Press Ins to display a list of gatekeepers. 9 Use the arrow keys to select a gatekeeper, then press Enter . STATICON displays messages that it is attaching to the selected gatekeeper and that it is scanning the gatekeeper for services. Service names are displayed as STATICON discovers them. When the scanning is completed, a list is displayed of all the services available from the gatekeeper.
-
Manual 99a 38 July 17, 2001 For more information about watchdog spoofing and related topics, refer to “Watchdog Packet Spoofing” on page 30. This section contains the following topics: How to Configure Watchdog Spoofing on an Interface How to Configure Watchdog Spoofing for Call Destinations How to Configure Watchdog Spoofing on an Interface By default, watchdog spoofing is enabled for all on-demand WAN connections.
-
Manual 99a 38 July 17, 2001 3 Select Expert Options . 4 Select On Demand Spoofing . The default state is Use Default . This means the call uses the spoofing state to which the interface is currently set. If spoofing is enabled on the interface but you want to disable it only for this call, select Disabled. If spoofing is disabled on the interface but you want to enable it only for this call, select Enabled. 5 Press Esc and save your changes.
-
Manual 99a 38 July 17, 2001 somewhere, the link will not come up. After the link comes up, other services and routes can be accessed. For more information about routed and static on-demand calls and related topics, refer to “Call Types” on page 25. How to Configure Routed or Static On-Demand Calls Before you begin, you must complete the following tasks: Configure at least one on-demand WAN call destination. Configure a minimal set of routes and services for key server access.
-
Manual 99a 38 July 17, 2001 5 For a routed on-demand call only, do the following: 5a Select RIP Bind Options. 5b Configure the routing protocol you want to run over the call. If you want to run RIP/SAP: Select RIP Options . Set RIP State Override to On . Configure the other RIP override parameters as necessary. Press Esc . Select SAP Options . Set SAP State Override to On . Configure the other SAP override parameters as necessary.
-
Manual 99a 38 July 17, 2001 When you enable header compression, you can also specify the number of compression slots . A compression slot is a location in router memory that stores packet header information. The compression algorithm uses this information to compress outgoing—and decompress incoming—packet headers. By default, the number of allocated compression slots is 16. In general, a session between two end points uses one slot; routing information uses one or two.
-
Manual 99a 38 July 17, 2001 The more concurrent IPX sessions you use over the interface, the more compression slots you should allocate. IMPORTANT: Be careful not to allocate too many compression slots. Memory is required to store the headers, and the compression algorithm must scan through stored headers to find a match for each transmitted packet. An excessive number of slots results in a higher processing load and slower performance. 4 Press Esc and save your changes.
-
Manual 99a 38 July 17, 2001 5 Select Compression Slots , then enter the number of slots you want to allocate to this call. IMPORTANT: Be careful not to allocate too many compression slots. Memory is required to store the headers, and the compression algorithm must scan through stored headers to find a match for each transmitted packet. An excessive number of slots results in a higher processing load and slower performance. 6 Press Esc and save your changes.
-
Manual 99a 38 July 17, 2001 transmission is that NLSP packets sent by multicast do not clutter nonrouting nodes with unnecessary traffic. NOTE: All NetWare systems on the same LAN must use the same NLSP packet transmission mode. NLSP makes large IPX internetworks more manageable by allowing you to partition them into administrative domains called routing areas .
-
Manual 99a 38 July 17, 2001 IMPORTANT: Novell Internet Access Server 4.1 provides a set of convergence parameters that enable you to customize the operation of NLSP on your router. The default values for these parameters are sufficient for most IPX networks and should be changed only on the advice of your technical support representative. When configuring NLSP on an interface, you can set the NLSP State parameter to one of two states: On or Off .
-
Manual 99a 38 July 17, 2001 If the router supports two or more interfaces and you want to filter routes and services to a remote site through this interface: Select Off . Enable RIP and SAP on the interface. To enable RIP and SAP, refer to “Configuring RIP and SAP” on page 77. 5 Select MAC Channel , then select the NLSP packet transmission mode. If you select Multicast , NLSP automatically determines the multicast address.
-
Manual 99a 38 July 17, 2001 default—and maximum—pace for NLSP packets is 30 pps; on a WAN, the NLSP pace is derived from the throughput of the link. The default value for this parameter is 0, which means do not override the current pace. 7 Press Esc and save your changes. 8 Press Esc to return to the Internetworking Configuration menu. 9 If you want these changes to take effect immediately, select Reinitialize System .
-
Manual 99a 38 July 17, 2001 Configuring RIP and SAP RIP and SAP are the routing and service advertising protocols traditionally used by NetWare systems to exchange route and service information on an IPX network. RIP is currently the most common routing protocol used on IPX networks. RIP and SAP perform well in small networks that have simple architectures and few routers.
-
Manual 99a 38 July 17, 2001 disabling SAP and enabling NLSP. On enables the router to exchange SAP packets freely with other routers on the network. Off disables SAP advertising on the interface but does not prevent the router from responding to incoming requests for services from local NetWare workstations. Additionally, the Off state still allows the router to import locally advertised services. NOTE: If you want to filter routes or services between routers, use RIP and SAP.
-
Manual 99a 38 July 17, 2001 If non-NLSP devices, such as NetWare 2 servers, are operating on the attached network and you want the router to accept and broadcast RIP packets received from these devices, select Auto. Auto is the default state. 5 If you want to customize RIP operation further, configure one or more of the following parameters: IMPORTANT: Because the default settings for these parameters are suitable for most RIP-based IPX networks, you should change them only for a specific purpose.
-
Manual 99a 38 July 17, 2001 Packet Size Override —Specifies the size, in bytes, of RIP packets sent on this interface. The default value is 0, which means do not override the current value. Each router on the network segment must use the same RIP packet size. 6 Press Esc and save your changes. 7 Press Esc to return to the Internetworking Configuration menu. 8 If you want these changes to take effect immediately, select Reinitialize System .
-
Manual 99a 38 July 17, 2001 If non-NLSP devices, such as NetWare 2 servers, are operating on the attached network and you want the router to accept and broadcast SAP packets received from these devices, select Auto. Auto is the default state. 5 If you want to customize SAP operation further, configure one or more of the following parameters: IMPORTANT: Because the default settings for these parameters are suitable for most RIP-based IPX networks, you should change them only for a specific purpose.
-
Manual 99a 38 July 17, 2001 Pace Override —Specifies the maximum number of SAP packets that can be sent each second through this interface. The default—and maximum—pace for SAP packets is 9 pps. The default value for this parameter is 0, which means do not override the current pace. Packet Size Override —Specifies the size, in bytes, of SAP packets sent on this interface. The default value is 0, which means do not override. Each router on the network segment must use the same SAP packet size.
-
Manual Figure 12 99a 38 July 17, 2001 IPX Router Accepting and Advertising Services from a Network Not Listed in the Routing Information Table Backbone Network LAN Router NetWare LAN Backbone Router SAP NetWare File Server on Network 0x01234567 Suppose a NetWare server somewhere within the backbone network advertises its file services, which the backbone router receives as a SAP packet (Service Type=0x0004 and Network Number=0x01234567, for example).
-
Manual 99a 38 July 17, 2001 Proxying a NetWare File Server If you have a dedicated router—a PC running Novell Internet Access Server 4.1 over a two-user version of NetWare 4.11—and several NetWare workstations operating on a network, the router can reply with a NetWare file server's name—instead of its own—when it receives a SAP Get Nearest Server request. This is called proxying a file server .
-
Manual 99a 38 July 17, 2001 2 If you want the router to ignore Get Nearest Server requests, set Get Nearest Server Requests to Ignore . 3 Select Override Nearest Server , then select Enabled . This parameter enables the router to respond to a workstation's Get Nearest Server requests with the proxied server name instead of its own name. 4 Select Nearest Server , then enter the name of a reliable server (one that is operating most of the time). 5 Press Esc and save your changes.
-
Manual 99a 38 July 17, 2001 Configuring the IPX Address Mapping Gateway The IPX Address Mapping Gateway allows you to connect to a backbone network even when your local network numbers are not compatible with the backbone addressing scheme. To configure the IPX Address Mapping Gateway, complete the following steps: 1 Load NIASCFG and select the following parameter path: Select Configure NIAS > Protocols and Routing > Protocols > IPX 2 Select Address Mapping Gateway and select Enabled .
-
Manual 99a 38 July 17, 2001 If the source network number in a packet being forwarded to an IPX Address Mapping Gateway circuit passes the outbound RIP filter on that circuit, the packet is not mapped. If the source network number does not pass a RIP filter, the packet is mapped. The default is Disabled . When disabled, RIP filters are not used to determine nonmappable network addresses.
-
Manual 99a 38 July 17, 2001 Configuring IPX Route Aggregation IPX Route Aggregation enables you to introduce routes learned through RIP in a summarized form. Route aggregation compactly describes many IPX network numbers simultaneously by using an address and mask pair. For example, all addresses from C9000000 to C9FFFFFF can be represented using the address C9000000 and the mask FF000000.
-
Manual 99a 38 July 17, 2001 3 Press Esc and save your changes. 4 Press Esc to return to the Internetworking Configuration menu. Controlling the Propagation of Type 20 Packets Novell Internet Access Server 4.1 enables you to control the propagation of type 20 packets with the Advanced Packet Type 20 Flooding parameter. Type 20 is an IPX packet type that refers to any propagated packet. NetBIOS packets, for example, are type 20 packets.
-
Manual 99a 38 July 17, 2001 How to Control Propagation of Type 20 Packets To configure the propagation of type 20 packets from the server console, enter the following console command: SET IPX NETBIOS REPLICATION OPTION = [0|1|2|3] To check the current setting, you can type the command by itself.
-
Manual 99a 38 July 17, 2001 If the diameter of your IPX network is close to the 16-hop limit, you should run NLSP on the routers at the network boundary to ensure continued connectivity across the network as it grows. Figure 13 provides a simple, conceptual view of how this can work.
-
Manual 99a 38 July 17, 2001 Balancing Traffic Loads over Equal-Cost Routes If a NLSP router has two or more network interfaces with routes to the same destination, it can distribute outbound traffic among those interfaces for an effective increase in throughput. This is called load balancing or load sharing . NLSP uses an assigned path cost to select the best route by which to forward outbound IPX packets. The higher the throughput of the network medium, the lower the cost of the route.
-
Manual 99a 38 July 17, 2001 If you configure equal-cost routes on two or more interfaces, make sure the associated media throughputs fall within—or near—the same range, as indicated in Table 4. For example, equal-cost routes between a 10-Mbps Ethernet link and a 16-Mbps token ring link are viable; equal-cost routes between a 4-Mbps token ring link and a 16-Mbps token ring link are not.
-
Manual 99a 38 July 17, 2001 5 Enter a cost for each interface over which you want to balance IPX traffic. 5a Select the following path: Select Bindings > a network interface > Expert Bind Options > NLSP Bind Options 5b Select the Cost Override parameter, enter a value between 1 and 63, then press Enter . 6 Press Esc and save your changes. 7 Press Esc to return to the Internetworking Configuration menu. 8 If you want these changes to take effect immediately, select Reinitialize System .
-
Manual 99a 38 July 17, 2001 The default values for these parameters are sufficient for most NetWare applications. Any application that requires a change to one or more of these parameters typically tells you so.
-
Manual 99a 38 July 17, 2001 Some NetWare protocols, such as SPX, use the ticks value to calculate retransmit timers. If you are configuring LAN routers that must communicate over a bridge, a satellite, or both, you probably need to adjust the delay and throughput values on the routers. Setting the throughput to match the speed of the link and increasing the link delay prevent SPX retransmissions and timeouts between systems separated by a slow link.
-
Manual 99a 38 July 17, 2001 How to Set Delay and Throughput for a Slow Link To set delay and throughput on an interface, complete the following steps: 1 Load NIASCFG, then select the following parameter path: Select Configure NIAS > Protocols and Routing > Bindings > a network interface > Expert Bind Options 2 Select Delay Override , then enter a value. By default, this parameter is set to 0, which means the router uses the default value for LANs or the value estimated by IPXWAN.
-
Manual 99a 38 July 17, 2001 This topic contains the following sections: “Configuring a Home Router” on page 98 “Configuring a Mobile Client” on page 99 Configuring the NetWare Mobile IPX Home Router and client software is straightforward and simple. The only decision you need to make before you get started is where to locate the Home Router on your network. The next section helps you determine the best location.
-
Manual 99a 38 July 17, 2001 A mobile client cannot obtain a Time To Live value longer than the one you specify here. 3b The Watchdog Spoofing parameter is enabled by default; to disable watchdog spoofing on the Home Router, select Disabled . Watchdog Spoofing controls whether the Home Router answers NetWare Core ProtocolTM (NCPTM ) watchdog packets on behalf of a mobile client. If Watchdog Spoofing is enabled, users do not lose their connections to file servers as they roam out of wireless range.
-
Manual 99a 38 July 17, 2001 Configure a mobile client board that is mobile aware and supports PCMCIA card in/card out capability, in-range and out-of-range capability, and NESL. To configure a mobile client, complete the following steps: 1 Open the client's STARTNET.BAT file using a text editor. A typical STARTNET.
-
Manual 99a 38 July 17, 2001 A STARTNET.BAT file configured for NetWare Mobile IPX operation looks something like this: @ECHO OFF CD C:\NWCLIENT SET NWLANGUAGE=ENGLISH LH C:\NWCLIENT\LSL.COM LH C:\NWCLIENT\NESL.COM LH C:\NWCLIENT\NE2000.COM LH C:\NWCLIENT\IPXODI.COM /M C:\NWCLIENT\VLM.EXE /ps=MY_SERVER 3 Restart the client. How to Customize Your Mobile Client This section describes the optional parameters you can add to the Mobile IPX section of a mobile client's NET.CFG file.
-
Manual 99a 38 July 17, 2001 HR Time To Live specifies the time-to-live interval, in minutes, that the IPXODI module attempts to use with the Home Router. It defines how long the Home Router serves the mobile client before the router requires an update from the mobile client. If this is not defined, IPXODI uses a default value of 30 minutes. NOTE: HR Time To Live can be overridden by the Home Router's Time To Live Override parameter.
-
Manual 99a 38 July 17, 2001 gracefully through the address change; as a result, connections might be terminated. Specifying an Alternate Board The NET.CFG parameters described in this section enable you to specify an alternate board to be used in the portable computer. Alternate board parameters enable IPXODI to use a second board for mobile communications if the primary board loses connectivity. The driver for the alternate board must be specified in the Mobile IPX section of NET.CFG.
-
Manual 99a 38 July 17, 2001 Alt Frame=Alternate_Frame_Type Alt Frame specifies the frame type for the alternate board (for example, ETHERNET_802.2). The driver loaded first in STARTNET.BAT becomes the primary driver. If IPXODI cannot locate the alternate driver during initialization, an error is issued and only the primary board is used. If there is no primary board either, IPXODI issues an error and fails to load. The drivers for both the primary and alternate boards must be loaded before IPXODI.
-
Manual 99a 38 July 17, 2001 information on the use of the Watchdog protocol, refer to “Watchdog Packet Spoofing” on page 30. Example NET.CFG File This section provides an example NET.CFG file that shows the format of mobile client customization parameters. LINK DRIVER Wireless FRAME = ETHERNET_802.2 LINK DRIVER Wireless2 FRAME = ETHERNET_802.2 NETWARE DOS REQUESTER NETWARE PROTOCOL = NDS BIND FIRST NETWORK DRIVE = F SHOW DOTS = ON USE DEFAULTS = ON VLM = AUTO.
-
Manual 99a 38 July 17, 2001 NetWare server or print documents on NetWare printers. Users and developers must rely on NetWare for Macintosh software for NetWare file and print services.
-
Manual 99a 38 July 17, 2001 Configuring and Binding the Gateway Driver Configuring the MacIPX gateway is similar to configuring a typical LAN board and binding a network protocol to the board. Before you begin, you must complete the following tasks: Ensure that your router has at least 65 KB of RAM available. Ensure that APPLETLK.NLM is loaded and configured. Ensure that IPX packet forwarding is turned on. Know the network number of the IPX network to which the gateway interface is attached.
-
Manual 99a 38 July 17, 2001 option is used, unnecessary packets are distributed to non-MacIPX clients on the network. If you want to send IPX broadcast packets to each MacIPX client, enter a number equal to or higher than the number of MacIPX clients served by the gateway. If the number of clients exceeds this threshold, the MacIPX gateway starts sending broadcast packets.
-
Manual 99a 38 July 17, 2001 Restricting Gateway Service to Selected Networks The MacIPX gateway, by default, serves all AppleTalk networks that make up the AppleTalk cloud. If you want the gateway to serve only selected AppleTalk networks, you must use a configuration file called MACIPXGW.DAT, which resides in SYS:SYSTEM. You indicate the AppleTalk networks you want the gateway to serve—or not serve—by placing commands in MACIPXGW.
-
Manual 99a 38 July 17, 2001 To restrict gateway service to selected AppleTalk networks, complete the following steps: 1 Use a DOS ACSII text editor to create a file called MACIPXGW.DAT in the router's SYS:SYSTEM directory. 2 Place commands in the file using the following syntax: [exclude | include] [-net_number ] . . . ] 3 Save and close the file.
-
Manual 4 99a 38 July 17, 2001 Managing This chapter describes how to monitor IPXTM LAN and WAN connections using the available router management consoles and utilities. Using the IPXCON Utility IPXCON is an NLM utility that provides access to statistics and information about the status of various components of the IPX protocol. IPXCON uses SNMP over IPX or UDP/IP to monitor remote servers, routers or network segments.
-
Manual 99a 38 July 17, 2001 Using the IPXPING Utility on the Server The IPXPING.NLM program enables you to check connectivity to an IPX server on your internetwork. The IPXPING utility sends a packet request to the target node, an IPX server or workstation. After the target node receives the packet, it sends an IPXPING reply packet to the system that sent the request packet.
-
Manual 99a 38 July 17, 2001 Using the IPXPING Utility on the Workstation The program is a DOS utility that determines the time to transport IPX packets to a specific server and back. IPXODI (or an equivalent IPX interface) must be loaded before IPXPING can be used. The time is displayed in milliseconds (although resolution is 1/18 second). The user can specify the number of pings to send and the interval between sends.
-
Manual 99a 38 July 17, 2001 Example To use IPXPING.EXE, type the following command at the DOS prompt: ipxping 2e64afe3 The following information is displayed: IPXPING: estimated time to send a 0.5K packet to 2E64AFE3 is 166 ms. IPXPING: sent ping packet number 1. IPXPING: packet 1 response received in 166 ms. IPXPING: 1 send, 1 received, low 166 ms high 166 ms, average 166 ms. NOTE: If you don't receive a response to the final ping, press Ctrl+C to terminate the program.
-
Manual 99a 38 July 17, 2001 Main Window The Main Window offers two options: Interfaces enable users to view the spoofing statistics on a per interface basis SPX spoofing enables users to view the spoofing statistics of all SPX connections Interfaces Window The Interfaces Window displays a list of WAN interfaces. At this time, only PPP interfaces will be included on this list. You can select either one or all listed interfaces. When you select an interface, the Connections Window is displayed.
-
Manual 99a 38 July 17, 2001 Field Meaning Acknowledge Numbers Shows the sent and received acknowledge number. Allocation Numbers Shows the sent and received allocation number. Spoofing packets Shows the number of packets spoofed. Keep Alive Packets Dropped Shows the number of keep-alive packets dropped during this active spoof session. NOTE: In the spoofing statistics fields, Sequence Numbers, Acknowledge Numbers, Allocation Numbers, and Keep Alive Packets Dropped don't apply for NCPTM.
-
Manual 99a 38 July 17, 2001 Determining Which IPX Services Are Reachable If you want to know whether a specific IPX service is available, you need to find out which IPX services are reachable. To determine the services available to a router, load IPXCON and follow this path: Select Services > service you want to reach to get information about If a service is visible, it is reachable. If you want to see information about a service, select the service and press Enter.
-
Manual 99a 38 July 17, 2001 First hop circuit to the destination Name of the destination The Destination Information window expands on this by showing information about the Next Hop (Name, Circuit, NIC Address), and by giving access to the services on the destination router that are available to the current router. If the destination is an NLSP destination, you can determine potential paths to the destination by selecting Potential Paths.
-
Manual 99a 38 July 17, 2001 Determining Where NLSP Is Running in Your Network If you have migrated your network to NLSP, you can identify which LANs on your IPX network are using NLSP or RIP—or both—as the routing protocol. If you partitioned your IPX network into routing areas, note the following points: The procedure in this section shows only the LANs and NLSP routers that are within the same routing area as the system you are currently monitoring.
-
Manual 99a 38 July 17, 2001 You can also select System Information and check the following information: Level 1 Overloaded—It should read No. If it reads Yes, the router does not have enough memory to process routing information. Detailed NLSP System Information—The Level 1 Database Overloads field indicates how many times the router has run out of memory.
-
Manual 99a 38 July 17, 2001 Monitoring Error Counters Error counters are monitored to make sure they are not increasing rapidly, because a rapid increase indicates a problem. For information about troubleshooting these problems, refer to Chapter 5, “Troubleshooting,” on page 125. You can monitor error counters for IPX interfaces in the following ways: By using MONITOR to view counters such as Checksum Errors, Send and Receive Packet Errors, and interface-specific errors.
-
Manual 99a 38 July 17, 2001 Viewing the MacIPX Gateway Configuration To view information about the configuration and operation of a MacIPX® gateway, enter the following command at the server prompt: LOAD MACIPXGW SHOW=YES This command does not reload the MacIPX gateway, but instead displays information about the MacIPX gateway and the AppleTalk networks that it serves, as in the following example: MACIPXGW: Unicast threshold set at 1.
-
Manual Table 7 99a 38 July 17, 2001 MacIPX Gateway Custom Statistics Statistic Explanation Received Tickle Packets Number of tickle packets sent by MacIPX clients served by the gateway. MacIPX clients send tickle packets to the MacIPX gateway; the gateway sends IPX broadcast packets back to the clients. IPX Broadcast Requests from IPX Stack Number of IPX broadcast packets sent to the MacIPX gateway by the IPX stack in the NetWare server +79595or Novell router.
-
Manual 124 Internetwork Packet Exchange Internetwork Packet Exchange 103-000176-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 5 99a 38 July 17, 2001 Troubleshooting This section dicusses IPX troubleshooting information that is divided into four categories: Troubleshooting tools Configuration tips Troubleshooting checkpoints Common problems If a problem that is general in nature occurs, the procedure described in “Troubleshooting Checkpoints” on page 127 will help you isolate and resolve the problem. If a problem with a specific symptom occurs, refer to “Common Problems” on page 131.
-
Manual 99a 38 July 17, 2001 networks. For more information on IPXCON, refer to Chapter 4, “Managing,” on page 111. Enter LOAD IPXCON at the system console prompt.
-
Manual 99a 38 July 17, 2001 TRACK ON This command displays three types of RIP and SAP information: Server, Network, and Connection Requests. This information is formatted according to whether the router/server is receiving the information (IN), broadcasting the information (OUT), or receiving a connection request. Refer to Utilities Reference for more details.
-
Manual 99a 38 July 17, 2001 IMPORTANT: Each LAN segment must have a unique IPX network number. It is a common error to incorrectly use the same IPX network number on each side of an unnumbered PPP or WAN link. 3 Verify that all servers and routers in the entire internetwork have unique internal network numbers. In addition, each network segment has a unique network number, and all servers and routers on the same segment must have their interfaces configured with the same IPX network number.
-
Manual 99a 38 July 17, 2001 To establish an IPX connection to third-party routers over a WAN, the third-party routers must support IPXWAN; otherwise, problems with initiating, maintaining, or terminating the IPX connection occur. 8 Verify that the IPX network number is different for each WAN link unless an unnumbered RIP is used (in which case, the IPX network number is zero).
-
Manual 99a 38 July 17, 2001 3b Use IPXPING to check all routers or servers in the end-to-end path (do this from one side only). Also, check the end points. If connectivity is occurring from a workstation, make sure that the workstation can log in to the first server or router in the path or that it has access through the router in question. If the connectivity loss is only temporary (for example, you occasionally get abort retries on the workstation), then let IPXPING run for several minutes.
-
Manual 99a 38 July 17, 2001 card on each router. One of the routers you should start with is the next-hop router. Repeat these steps until you find the destination network number. If you do not find a duplicate network number in either direction, check each link in the path for errors. NLSP Checkpoints To isolate and resolve problems with NLSP, complete the following steps: 1 Determine connectivity. Verify that all neighbors are displayed under the NLSP Neighbors option in IPXCON.
-
Manual 99a 38 July 17, 2001 Other Router Names Are Not Displayed (page 135) System Frequently Appears and Disappears on the LAN (page 135) Multiple Systems on a LAN Become Unreachable Intermittently (page 138) Connectivity Across a Point-to-Point Link Has Been Lost (page 139) An NLSP Server on a LAN Cannot Be Accessed (page 140) LAN Is Partitioned (page 141) No Communication Occurs between Two Networks (page 142) Services Are Inaccessible in the Area (page 143) Number of Routes and Ser
-
Manual 99a 38 July 17, 2001 Load Balancing over IPX Is Not Working Add the following line to the workstation's AUTOEXEC.BAT file: Set loadbalance local lan = on Verify that the router is configured to use NLSP compatible with RIP/SAP. Set maximum path splits to 8.
-
Manual 99a 38 July 17, 2001 minutes of a router's operation, unless there is a duplicate NLSP system ID. Change the internal network number of one of the conflicting systems, or remove one of the systems from the network immediately. For information about how to find the node that is causing the problem, refer to “IPX Connectivity Problems (Duplicate ID or Network Number)” on page 129.
-
Manual 99a 38 July 17, 2001 Cause 2 —NLSP has a software error that is either corrupting the graph or causing the graph to be represented incorrectly. Contact technical support. NLSP Decision Process Is Running Frequently (Duplicate System ID) The NLSP decision process is running frequently. To observe this symptom, obtain access to a NetWare server or router running NLSP in the network and enter SET ISUL DEBUG=256 at the system console prompt.
-
Manual 99a 38 July 17, 2001 After you have determined that there is a local connectivity problem, check whether there are any systems in the Initializing state in IPXCON (parameter path: Select NLSP Information > Neighbors). You might need to exit and enter the Neighbors window several times over several minutes. Also check for any systems that do not have names associated with them. Any system without a name has not transmitted its LSP to the Designated Router.
-
Manual 99a 38 July 17, 2001 Cause 3 —System misconfiguration. By default, NLSP timers are set so that a system becomes unreachable when three packets are dropped. Look at the system's configuration to ensure that this setting has been used. Cause 4 —One or both of the systems are dropping packets. Check the interface boards to determine whether packets are being dropped because of insufficient Event Control Blocks (ECBs).
-
Manual 99a 38 July 17, 2001 Multiple Systems on a LAN Become Unreachable Intermittently If multiple systems on a LAN become unreachable intermittently, the Designated Router might be the source of the problem. Cause 1 —Designated Router does not have enough system memory to represent the LAN. To determine whether this is the case, you can check whether the Designated Router is overloaded when the problem occurs or whether it has been overloaded in the past.
-
Manual 99a 38 July 17, 2001 Information). However, unless you are using ARCnet* or some other media that does not have IEEE addresses, only one system has the highest priority on the LAN (the MAC address is used as a tie breaker and IEEE addresses are unique). If necessary, change the priority on one of the contending routers. Connectivity Across a Point-to-Point Link Has Been Lost You cannot bring up an IPX point-to-point link, but IP is working.
-
Manual 99a 38 July 17, 2001 If the link is corrupting data, the corrupt LSPs statistic increases. To check this, load IPXCON (parameter path: Select NLSP Information > System Information > Detailed NLSP System Information). Even a single corrupt LSP indicates a serious problem because LSPs are transmitted infrequently. Note that this counter is a global counter and it is possible that some other media is corrupting the data link.
-
Manual 99a 38 July 17, 2001 In IPXCON, look for a system that is in the Initializing state. If a system on the LAN appears in the Initializing state on all other systems but has no neighbors itself, then the system can send but not receive. Check that system, particularly if it is the Designated Router. Use IPXPING to help determine the actual source of the problem. An interface board with a conflicting interrupt is a common source of this problem.
-
Manual 99a 38 July 17, 2001 Cause 3 —System is declaring itself the owner of the LAN, even though it is not the owner. Reinitialize the system. Cause 4 —LAN has become partitioned temporarily during normal NLSP operation. This should occur only during an NLSP system's startup, and the error should be corrected within a few minutes. Verify that the condition does not persist. If it does, check for a hardware problem or for NLSP software incompatibility with other systems.
-
Manual 99a 38 July 17, 2001 malfunctioning link between the two networks. To determine which link has the problem, refer to “Applications Perform Poorly” on page 147. Cause 3 —There is a duplicate network number. This can cause a duplicate system ID, provided that both systems are in the same area and the duplicate network numbers are two internal network numbers on two NetWare implementations of NLSP.
-
Manual 99a 38 July 17, 2001 Cause 3 —Service name conflict. This occurs when you have the same service name and the same type (for example, file server). If the service is a file service, then the user logging in might not have appropriate rights and, consequently, the login is rejected. Use the Services option in IPXCON to verify that the service has the appropriate network number.
-
Manual 99a 38 July 17, 2001 set to Off. If this is the case, and if you want to run RIP between the servers, then set RIP State to On. Cause 2 —Two NLSP systems are configured with different area addresses. In this case, the Initialization Failures counter in IPXCON should be increasing (parameter path: Select Circuits > Detailed Circuit Information).
-
Manual 99a 38 July 17, 2001 In NLSP, this determination is easy to make. Simply look at an affected system's neighbors to see whether they have the problem, too. Examine each system as you move outward. If just a single NLSP system is experiencing the problem, then the cause is probably a local connectivity problem. Check the system for neighbor state changes and disappearing services. Try to determine whether the problem has a boundary.
-
Manual 99a 38 July 17, 2001 Cause 1 —Network-layer packets are being retransmitted because there is a software error or because two important timers are misconfigured in NIASCFG.
-
Manual 99a 38 July 17, 2001 Cause 2 —Application relies on ticks to retransmit its packets. This should not happen with the routing software, but it is possible that some other manufacturer's router does not comply with the ticks value. If this is the case, increase the cost of the routing software to match the value of the router in question. This procedure should not affect other paths much, but it should help to stop the application from retransmitting packets.
-
Manual 99a 38 July 17, 2001 Cause 6 —Load sharing is enabled between dissimilar paths. Verify that the two paths have comparable media and data rates. CALLMGR Shows an IPX Circuit but IPXCON Does Not CALLMGR shows an IPX circuit but IPXCON does not. IPXCON does not show a circuit until after IPXWAN has completed negotiation. Check the link for errors, and make sure that both sides of the IPX link are implementing IPXWAN properly.
-
Manual 99a 38 July 17, 2001 required by an NLSP area. We recommend that you do not exceed 400 LANs and routers (total) in any single NLSP area. It is also possible that two areas have merged when they should not have. Determine whether routers are in the area that should not be there. Prevent the areas from merging or use area addresses. Cause 2 —Backbone has been imported multiple times into the NLSP area. NLSP is careful about the way that it imports external routes and services into the NLSP network.
-
Manual 99a 38 July 17, 2001 operation to abort, retry, or fail. The method of reestablishing the connection depends on whether you lose connectivity before or after you start an operation. This method is the same for each of the following causes. Cause 1 —The NetWare Mobile IPX client was out of range of wireless coverage for too long. Return the client to the range of wireless coverage and reestablish the connection as explained in “Re-establishing the Connection” on page 151.
-
Manual 99a 38 July 17, 2001 connection. If you want the operation to be completed, you must select the Retry option when you return to the network. In the meantime, the system is unusable. If the HR Time To Live timer has expired, selecting Retry will not reestablish the connection and you must log in again. In the DOS environment, you have three options: Abort, Retry, or Fail.
-
Filter Configuration Novell NetWare 6 ® www.novell.
-
Manual 99a July 17, 2001 38 Contents About This Guide 7 Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1 Understanding 9 The Use of Filters . . . . . . . . . . . . . . . . . Packet Forwarding Filters . . . . . . . . . . . . . Service Information Filters . . . . . . . . . . . . . Routing Information Filters . . . . . . . . . . . . . Outgoing Routing Information Filters. . . . . . . . Incoming Routing Information Filters. . . . . . . .
-
Manual How to Configure IPX RIP Filtering . . . . . . . . . . . IPX RIP Filter Example . . . . . . . . . . . . . . . . . IPX NetBIOS and Packet Forwarding Filters . . . . . . Configuring IPX Packet Forwarding . . . . . . . . . . . IPX Packet Forwarding Filter Example . . . . . . . . . Configuring TCP/IP Filters. . . . . . . . . . . . . . . . . . How to Configure IP Routing Information Filters. . . . . How to Configure EGP Filters . . . . . . . . . . . . . . How to Configure OSPF External Route Filters . .
-
Manual 99a 38 July 17, 2001 About This Guide This guide provides the information you need to configure and manage Novell® Internet Access Server 4.1 filters. Documentation Conventions In this documentation, a greater-than symbol (>) is used to separate actions within a step and items in a cross-reference path. Also, a trademark symbol (®, TM, etc.) denotes a Novell trademark. An asterisk (*) denotes a third-party trademark.
-
Manual 8 Filter Configuration Filter Configuration 103-000178-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 1 99a 38 July 17, 2001 Understanding This chapter describes the Filter Configuration utility (FILTCFG) that you use to configure filters that selectively discard packets to be sent or received by a router. Filters let you control the service and route information that is accepted or advertised by a router. Filters can be useful when you want to limit specific kinds of traffic to certain parts of your network topology, or when you want to provide a certain level of security.
-
Manual 99a 38 July 17, 2001 OSPF —Controls the propagation of routing information from non-OSPF domains (RIP, EGP, and so on) to the OSPF domain. EGP —Defines the routes that a router can share with other EGP peers. Protocol ID and ring number —Filters packets of certain protocol types received by the bridge (Protocol ID filter), and filters packets received from specific rings on a token ring network (ring number filter). Both types of filters are only available for source route bridge.
-
Manual 99a 38 July 17, 2001 Although packet forwarding filters provide the highest level of security, they might affect the performance of the router because the filters are applied to each data packet received by the router. Packet forwarding filters are available for IPX and TCP/IP protocols.
-
Manual 99a 38 July 17, 2001 Outgoing Routing Information Filters Outgoing routing information filters limit routing information advertised by a router to its neighboring routers. When these filters are enabled on a router, only the allowed routes are advertised to each neighboring router. This hides specified routes from some routers and from certain parts of the network.
-
Manual Figure 1 99a 38 July 17, 2001 Outgoing RIP Filters End Station E1 Filtering Router R1 End Station E2 Filtering Router R2 (filtered) Network 1 Network 3 Network 4 Network 2 The route to Network 1 is filtered out in Router R1's advertisement to Network 3. If End Station E2 sends a packet to Network 1, Router R2 drops that packet because it does not have a route. If End Station E1 sends a packet to Network 1, Router R1 forwards it because it does have a route.
-
Manual 99a 38 July 17, 2001 A typical incoming routing information filter consists of the destination network of the route and the interface through which advertisements of the route are expected to be received. Incoming routing information filters keep the filtering router from adding certain routes to its routing table when it receives the information from its neighbors. The filtering router cannot forward a packet to a filtered route even if it receives a packet destined for it.
-
Manual 99a 38 July 17, 2001 There are two types of service information filters: Outgoing SAP filters (service advertisement filters) Outgoing SAP filters restrict the propagation of the SAP information that is known to the router. An outgoing SAP filter specifies the service provider and the potential recipient of the information. The service provider is defined by a service name and service type. The recipient is defined as an outbound interface or interface group.
-
Manual 99a 38 July 17, 2001 Incoming RIP filters Incoming RIP filters let the router discard information about a particular network. The filtered network is not recorded in the local forwarding table and cannot be propagated to other routers, servers, or users. The filter includes the network and the source of the route. The source identifies the interface or interface group from which the routing information was received. This is the most effective route filter for improving security.
-
Manual 99a 38 July 17, 2001 IP Routing Information Filters IP routing information filters let the router restrict the routes that it accepts from neighbors (incoming filters) and limit the advertised routes (outgoing filters).
-
Manual 99a 38 July 17, 2001 You can apply IP outgoing filters to RIP, EGP, and OSPF routes. You cannot filter directly connected networks. The following outgoing IP filters are available: RIP outgoing filters restrict the advertising of routing information and hide the existence of specific IP networks from other routers. OSPF external route filters define the routes learned from RIP, EGP, or static routes that are propagated into the OSPF domain.
-
Manual 99a 38 July 17, 2001 AppleTalk Filtering The AppleTalk protocol supports the following types of filters: Device hiding filters Routing information filters For more information about AppleTalk filtering, refer to “AppleTalk Device Hiding Filters” on page 19 “AppleTalk Routing Information Filters” on page 20 “AppleTalk Routing Information Filters over AURP” on page 23 AppleTalk Device Hiding Filters AppleTalk device hiding filters restrict the advertisement of services on a router's inte
-
Manual 99a 38 July 17, 2001 If filtering for that device or service location is enabled, the router drops the NBP reply so that a user or application cannot get the network address of these services. Without the NBP reply, the application cannot know about the existence of the device. NOTE: Device hiding filters provide a low level of security, but they do have limitations.
-
Manual 99a 38 July 17, 2001 Routing information filters are also available over AppleTalk Update-based Routing Protocol (AURP). In this case, a neighboring router can be either a network interface (all neighbors directly connected to the cable) or all peers on the AURP tunnel. AppleTalk outgoing route filters can be used for networks and zones. Incoming route filters can be used only for networks.
-
Manual 99a 38 July 17, 2001 Zone-Based Outgoing Route Filters Zone-based outgoing route filters limit the advertisement of all routes associated with a particular zone. A zone is an abstraction of networks into which many physical networks, including noncontiguous networks, can be grouped. The main advantage of using zone names in filters is that the filter does not need to be modified when new networks are added to the zone.
-
Manual 99a 38 July 17, 2001 route information designated in the filters received from the specified neighbors, but accepts and records all other routing information. If the specified action is to permit routes in the filter list, the router accepts only routes designated in the filter list from the named neighbors and ignores everything else. AppleTalk Routing Information Filters over AURP Routing information filters configured for AURP routers affect all AURP routers on the tunnel in the same way.
-
Manual 24 Filter Configuration Filter Configuration 103-000178-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 2 99a 38 July 17, 2001 Planning This chapter explains the decisions you must make before you can configure filters. Configuration Decisions How you configure filters depends on the following decisions: Whether you want to control access to services on your network You should enable filtering support if you want to control access to services on your network. Filters increase security by limiting the visibility of selected services.
-
Manual 26 Filter Configuration Filter Configuration 103-000178-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 3 99a 38 July 17, 2001 Setting Up You use the Filter Configuration utility (FILTCFG) to configure filters that selectively control which packets will be sent or received by a router. Filters let you control the service and route information that is accepted or advertised by a router. Filters can be useful when you want to limit specific kinds of traffic to certain parts of your network topology, or when you want to provide a certain level of security.
-
Manual 99a 38 July 17, 2001 The header of packets that match the Filters or Exceptions definitions are logged as long as the global logging status and the filters or exceptions logging status are both enabled. The logs are viewed using the NetWare Administrator utility. 4 Select the type of filter you want. The corresponding option menu is displayed. 5 For each option you select, you can configure the following general parameters: Status —Specifies the status of the selected filters.
-
Manual 99a 38 July 17, 2001 taken on the Exceptions list is always the opposite of the action taken on the Filters list. You select a filter from the list and press Enter to modify the filter or Del to remove it. Press Ins to add a new filter. For example, you could use a filter to hide all Marketing file servers from Engineering, except the server named MKTG-DEMO. 6 Press Esc to exit. NOTE: All filters affecting a primary call are automatically mapped to a configured backup call.
-
Manual 99a 38 July 17, 2001 Refer to Understanding for more information. NOTE: When you configure a filter for a primary WAN call, an equivalent filter is automatically generated for the backup call. If the primary call should fail, the backup call is automatically connected.
-
Manual 99a 38 July 17, 2001 networks. If you select to deny the services, the SAP information is not received from (or broadcast to) the local networks. NOTE: Changing a filter to permit the services on the filter list when the filter list is empty denies all services and might produce undesirable results. 4 Select Filters . This lists the incoming (or outgoing) SAP services that are currently permitted or denied, according to the Action parameter setting. 5 Modify the service list.
-
Manual 99a 38 July 17, 2001 can select a LAN interface, a WAN interface, the internal network, or all interfaces. The default is All Interfaces . Source (or Destination ) Circuit —If you selected a WAN source (or destination), press Enter to define optional circuit information: Local Frame Relay DLCI # (for frame relay)—The DLCI circuit number used for calls. Remote System ID (for PPP, X.25, or ATM)—The name of the remote system server or remote peer associated with this circuit.
-
Manual 99a 38 July 17, 2001 IPX SAP Filter Example In this example, two departmental networks are connected to a corporate network through a WAN link between Router 1 and Router 2. The two routers use the RIP/SAP routing protocol to communicate with each other. RIP enables routers to send out periodic updates of service and routing information. The internetwork topology is shown in Figure 2 below.
-
Manual 99a 38 July 17, 2001 When configuring this example, set the parameters as shown in Table 2. Table 2 Parameters for IPX SAP Filter Example Parameter Value Router 1 Action Permit Services Router 1 Filters: . Filter 1: Service Name Service Type Destination Type Destination Destination Circuit .
-
Manual 99a 38 July 17, 2001 2 Select Status and toggle the choice to read Enabled or Disabled. Any configured filters immediately become active (enabled) or inactive (disabled). NOTE: It might be easier to configure filters while they are disabled. Otherwise, you might experience temporary service loss while you are adding and setting up wildcard filters. 3 Select Action and toggle the choice to permit or deny the networks on the filter list.
-
Manual 99a 38 July 17, 2001 A network number/mask pair of 0/0 matches all IPX networks. A 1 bit in the network mask means that bit must be matched. For example, C9000000/FFFFFF00 matches C90000XX network numbers. NOTE: Bit masks do not need to be contiguous for filters. Source (or Destination ) Type —Press Enter , then select Interface or Interface Group . Source (or Destination )—Press Ins and specify the source (or destination) of the route information.
-
Manual 99a 38 July 17, 2001 7 Select Exceptions. Displays a list of exceptions to the incoming (or outgoing) RIP filters. Depending on the Actions parameter setting, routes that match a filter on this list are always or are never accepted (or advertised) by the router, even if another filter is configured to do the opposite. 8 Modify the exceptions list. Select a filter from the list and press Enter to modify the filter or Del to remove it. Press Ins to add a new network filter.
-
Manual Figure 3 99a July 17, 2001 38 IPX Routing Information Filter Example T1 WAN Link Network Ranges Network Ranges 01013xxx 01014xxx 02029xxx Router 1 256-Kbps WAN Link Router 2 010159xx 020267xx WAN-1 WAN-1 Permit only 010159xx Permit only 020267xx When configuring this example, set the parameters as shown in Table 3.
-
Manual 99a 38 July 17, 2001 IPX NetBIOS and Packet Forwarding Filters IPX packet forwarding filters allow the router to filter a packet according to the source and destination address fields and the packet type. NetBIOS filters allow the router to forward NetBIOS broadcast packets only on selected interfaces. NOTE: IPX NetBIOS and packet forwarding filters work while using either NLSP or RIP/SAP routing modes.
-
Manual 99a 38 July 17, 2001 8 Modify the filter list. Select a filter from the list and press Enter to modify the filter or Del to remove it. Press Ins to add a new filter. If you are modifying an existing filter or adding a new filter, modify the following parameters from the Define Filter menu: Source Interface Type —Press Enter and select Interface or Interface Group as the incoming IPX packet source.
-
Manual 99a 38 July 17, 2001 Destination Interface —Press Enter and select a destination from the list of network interfaces or interface groups. If you specified Interface as the Source (or Destination ) Interface Type , select a specific interface on which you want to filter the service. You can select a LAN interface, a WAN interface, the internal network, or all interfaces. The default is All Interfaces .
-
Manual 99a 38 July 17, 2001 Source IPX Address —Enter the address if you selected Network or Node. Destination Address —Press Enter and select Any Address , Network , or Node as the destination address. Destination IPX Address —Enter the address if you selected Network or Node . A network numbers/mask pair of 0/0 matches all IPX networks. A 1 bit in the network mask means that bit must be matched. For example, C9000000/FFFFFF00 matches C90000XX network numbers.
-
Manual 99a 38 July 17, 2001 IPX Packet Forwarding Filter Example In this example, an FDDI backbone connects several departments in an organization. Routers A, B, and C connect the departmental networks to the backbone. Within the organization, users can access all servers. However, the Human Resources (HR) servers can be accessed only by HR employees. To make the HR servers secure, packet forwarding filters are used in addition to the usual NetWare password security.
-
Manual Table 4 44 99a 38 Parameters for IPX Packet Forwarding Filter Example Parameter Value Action Deny Packets Filter List: Source Interface Type Source Interface Source Circuit Destination Interface Type Destination Interface Destination Circuit Packet Source Address Type Source IPX Address Destination Address Destination IPX Address .
-
Manual 99a 38 July 17, 2001 Parameter Value Exceptions: Source Interface Type Source Interface Source Circuit Destination Interface Type Destination Interface Destination Circuit Packet Source Address Type Source IPX Address Destination Address Destination IPX Address .
-
Manual 99a 38 Parameter Value Source Interface Type Source Interface Source Circuit Destination Interface Type Destination Interface Destination Circuit Packet Source Address Type Source IPX Address Destination Address Destination IPX Address Node 55:00001B2700F0 All Circuits Network 12/FFFFFFFF All Circuits Node 55:00001B2700F0 Network 12/FFFFFFFF July 17, 2001 Configuring TCP/IP Filters TCP/IP supports the following filters: Incoming RIP filters (routing information) Outgoing RIP filters
-
Manual 99a 38 July 17, 2001 How to Configure IP Routing Information Filters Before you begin, make sure that filtering support is enabled for IP in NIASCFG under the TCP/IP Protocol menu. Otherwise, filtering will not work.
-
Manual 99a 38 July 17, 2001 Subnetwork Mask —Enter a 4-byte mask address in dotted decimal or hexadecimal notation. Do this only if you selected Network for the Route to Network/Hosts parameter. Source (or Destination ) Type —Select Interface , Interface Group , or Network as the source (or destination) type. Source (or Destination )—Press Enter , then select the source (or destination) that the route is advertised to or blocked from.
-
Manual 99a 38 July 17, 2001 Logging —Optionally select Enabled to log packets that match the Filters or Exceptions definitions. The header of packets that match the Filters or Exceptions definitions are logged as long as the global logging status and this logging status are both enabled. The logs are viewed using the NetWare Administrator utility. 6 Press Esc and save the filter information. 7 Select Exceptions . This displays a list of exceptions to the configured filters.
-
Manual 99a 38 July 17, 2001 This specifies the action taken when an incoming (or outgoing) EGP packet matches a filter on the filter list. If you select to permit the routes, the matching EGP routes are accepted (or advertised) by the router. If you select to deny the routes, the matching EGP routes are not accepted (or advertised) by the router. 4 Select Filters . This lists the incoming (or outgoing) EGP routes that are permitted or denied, according to the Action parameter setting.
-
Manual 99a 38 July 17, 2001 Source (or Destination ) Circuit —If you selected a WAN source (or destination), press Enter to define optional circuit information: Local Frame Relay DLCI # (for frame relay)—The DLCI circuit number used for calls. Remote System ID (for PPP, X.25, or ATM)—The name of the remote system server or remote peer associated with this circuit. Circuit Parameter Type (for X.25 or ATM)—The type of virtual circuit used to establish a connection. Remote DTE Address (for X.25)—The X.
-
Manual 99a 38 July 17, 2001 How to Configure OSPF External Route Filters NOTE: OSPF external route filters apply only to routes learned from RIP, EGP, or static routes. Before you begin, make sure that filtering support is enabled for IP in NIASCFG. Otherwise, filtering will not work.
-
Manual 99a 38 July 17, 2001 Metric Value —Enter a metric or cost associated with the route. This option is enabled only if the filter is configured to permit or advertise the route. If you leave this option blank, the TCP/IP routing table is consulted automatically for the required information. Comment —Enter an optional short description. Logging —Optionally select Enabled to log packets that match the Filters or Exceptions definitions.
-
Manual 99a 38 July 17, 2001 The route being hidden from the rest of the network is defined by the Accounting department network with IP network address 151.1.0.0. Router C's connection to the departments outside Accounting is through the FDDI backbone. The destination from which network 151.1.0.0 is hidden is most easily defined as the FDDI interface to the backbone. Figure 5 shows the internetwork topology. Note that Router C has the route to network 151.1.0.0 in its routing table.
-
Manual 99a 38 July 17, 2001 When configuring this example, set the parameters as shown in Table 5 . Table 5 Parameters for IP Outgoing Routing Information Filter Example Parameter Value Action Deny Routes Filters: Route to Network or Host IP Address of Network Host Subnet Mask Destination Type Destination . Network 151.1.0.0 255.255.255.
-
Manual 99a 38 July 17, 2001 5 Modify the packet list. Select a filter from the list and press Enter to modify the filter or Del to remove it. Press Ins to add a new packet filter. If you are modifying an existing filter or adding a new filter, specify the following parameters from the Define Filter menu: NOTE: You cannot modify a predefined packet type. Source Interface Type —Press Enter and select Interface or Interface Group as the source type.
-
Manual 99a 38 July 17, 2001 select a LAN interface, a WAN interface, or all interfaces. The default is All Interfaces . If you specified Interface Group as the Destination Interface Type , select the specific interface group on which you want to filter the service. Destination Circuit —If you selected a WAN interface destination, press Enter to define optional circuit information: Local Frame Relay DLCI # (for frame relay)—The DLCI circuit number used for calls. Remote System ID (for PPP, X.
-
Manual 99a 38 July 17, 2001 logging status are both enabled. The logs are viewed using the NetWare Administrator utility. 6 Press Esc and save the filter information. 7 Select Exceptions to display a list of exceptions to the permitted or denied packets. This lists the exceptions to the configured packet filter list. Depending on the Action parameter setting, packets that match a filter on this list are always or are never permitted or denied, even if another filter is configured to do the opposite.
-
Manual Figure 6 99a 38 July 17, 2001 IP Packet Forwarding Filter Example IP Network 159.3.0.0 Router C IP Network 149.1.0.0 (FDDI Backbone) FDDI_B Router A Router B External Internetwork NE2000_B IP Network 153.5.0.0 Mail Server 153.5.3.1 Because internal communication is not restricted, packet forwarding filters are not required on Routers A or C. Two packet forwarding filters are required on Router B.
-
Manual 99a 38 July 17, 2001 predefined services list. The allowable destinations are limited to the corporate mail servers. Host 153.5.3.1 is the only mail server defined. When configuring this example, set the parameters as shown in Table 6 . Table 6 Parameters for IP Packet Forwarding Filter Example Parameter Value Action Permit Packets Filters List .
-
Manual 99a 38 July 17, 2001 Refer to Chapter 1, “Understanding,” on page 9 for more information.
-
Manual 99a 38 July 17, 2001 Device Type —Press Enter and select from a list of defined AppleTalk NBP device types, or press Ins to add a new NBP type with the following information: Device Type —Enter a text string of up to 32 characters. Comment —Enter an optional short description.
-
Manual 99a 38 July 17, 2001 Device Circuit —If you selected a WAN circuit, press Enter to modify the following optional circuit information: Local Frame Relay DLCI # (for frame relay)—The DLCI circuit number used for calls. Remote System ID (for PPP, X.25, ISDN, or ATM)—The name of the remote system server or remote peer associated with this circuit. Circuit Parameter Type (for X.25 or ATM)—The type of virtual circuit used to establish a connection. Remote DTE Address (for X.25)—The X.
-
Manual 99a 38 July 17, 2001 11-20, 21-30, specifying an extended range of 1-30 will filter all devices in the 1-9, 10, 11-20, and 21-30 extended networks. Zone —Press Enter , then type the name of the AppleTalk zone in which the filtered device is located. User Circuit —If you selected a WAN interface, press Enter to modify the following optional circuit information: Local Frame Relay DLCI # (for frame relay)—The DLCI circuit number used for calls. Remote System ID (for PPP, X.
-
Manual 99a 38 July 17, 2001 Example AppleTalk Device Hiding Filter FigureFigure 7 on page 65 shows the internetwork topology for an organization with an FDDI backbone connecting several departments within the organization and a link to external networks. Routers A and C connect the departmental networks to the backbone. In general, users can communicate freely across the internetwork. However, access to printers within the Accounting department is restricted.
-
Manual Table 7 99a 38 July 17, 2001 Parameters for AppleTalk Device Hiding Filter Example Parameter Value Action Deny Device Name = (for all NBP names) Device Type LaserWriter Device Location Type Zone Device Location Accounting User Location Type Interface User Location FDDI Backbone-Interface connecting to FDDI User Circuit All Circuits How to Configure AppleTalk Route Filtering Before you begin, make sure that filtering support is enabled for AppleTalk in NIASCFG.
-
Manual 99a 38 July 17, 2001 4 Modify the filter list. Select a filter from the list and press Enter to modify the filter or Del to remove it. Press Ins to add a new filter. If you are modifying an existing filter or adding a filter, specify the following parameters in the Define Filter menu: Route to Network (or Route to Network or Zone )—Select All Routes , Non-extended Network , Multiple/Extended Network , or Zone as the type of route or network to be filtered.
-
Manual 99a 38 July 17, 2001 5 Press Esc and save the filter information. 6 Select Exceptions . This lists the exceptions to the filter list. Depending on the Action parameter setting, routes that match a filter on this list are always or are never permitted or denied, even if another filter is configured to do the opposite. 7 Modify the exceptions list. Select a filter from the list and press Enter to modify the filter or Del to remove it. Press Ins to add a new filter.
-
Manual Figure 8 99a 38 July 17, 2001 AppleTalk Routing Information Filter Example AppleTalk Extended Network 165–170 Zone = Accounting Department Router C FDDI AppleTalk Extended Network 1–10 Router A External Internetwork Router B AppleTalk Extended Network 21–30 Extended network 165-170 can be hidden from the rest of the organization if an outgoing route filter is configured on Router C. The route being hidden from the rest of the network is extended network 165170.
-
Manual 99a 38 July 17, 2001 Configuring Source Route Bridge Filters Source route bridge supports the following two types of filters: Protocol ID filters Ring number filters Refer to Chapter 1, “Understanding,” on page 9 for more information. NOTE: When you configure a filter for a primary WAN call, an equivalent filter is automatically generated for the backup call. If the primary call fails, the backup call is automatically connected.
-
Manual 99a 38 July 17, 2001 If you are modifying an existing filter or adding a new filter, specify the following parameters from the Define Filter menu: Source Interface —Press Enter and select an interface from the list of configured network interfaces. This specifies the network interface at which incoming data packets are filtered. Protocol ID —Press Enter and select a protocol ID from the list. Press F3 to modify a protocol ID.
-
Manual 99a 38 July 17, 2001 This displays the action taken when a packet matches a filter in the filter list. The only action possible is to select Deny Packets . 3 Select Filters . This lists the packets that are permitted or denied, according to the Action parameter setting. 4 Modify the filter list. Select a filter from the list and press Enter to modify the filter or Del to remove it. Press Ins to add a new filter.
-
Getting Results with Novell Web Services Novell NetWare 6 ® www.novell.
-
Manual 99a July 17, 2001 38 Contents Contents 5 Getting Results with Novell Web Services 13 What’s in This Documentation? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Path References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
-
Manual Creating Your Own Web Site . . . . . . . . . . Hosting Multiple Web Servers . . . . . . . . Accessing Your Web Site . . . . . . . . . . Adding Content to Your Web Site . . . . . . How to Publish Content to Your Web Server Creating Personal Web Sites . . . . . . . . Securing Your Web Site . . . . . . . . . . . . . Controlling Access Using eDirectory Mode . Additional Web-Based Services . . . . . . . . . Using the NetWare FTP Server . . . . . . . Using the NetWare Web Search Server . . . 5 6 . . .
-
Manual 99a Creating a PUBLIC_HTML Directory . . . . . . . . Adding Users’ Contexts to the Search Contexts List . Restarting the Enterprise Web Server . . . . . . . . Activating User Document Directories . . . . . . . . Providing Public Access . . . . . . . . . . . . . . . Web Publishing through WebDAV . . . . . . . . . . . . Configuring Document Preferences . . . . . . . . . . . Specifying a Default Home Page . . . . . . . . . . . Directory Indexing . . . . . . . . . . . . . . . . . . Server Home Page . .
-
Manual Authentication Statements . . . . . Authorization Statements . . . . . Default ACL File . . . . . . . . . . Referencing ACL Files in OBJ.CONF . 9 . . . . . . . . . . . . . . . . 99a July 17, 2001 38 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Installing Server-Side Programs. . . . . . . . .
-
Manual 99a July 17, 2001 38 Becoming a Search Service Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141 Using Web Search in a Clustered Environment . . . . . . . . . . . . . . . . . . . . . . . . . 142 Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 14 Creating and Managing Search Sites About Search Sites. . . . . . . . . . . . . Creating a Search Site . . . . . . . . . . . Naming a Search Site . . . . . . . . .
-
Manual Exploring the Default Search and Print Templates Search Page Templates . . . . . . . . . . . . Search Result Templates . . . . . . . . . . . Print Result Templates. . . . . . . . . . . . . Error and Response Message Templates . . . . . How Templates Use System Memory . . . . . . . Working with Additional Languages . . . . . . . . . . . . . . . . . . . . . . 99a July 17, 2001 38 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
-
Manual ASCII Character Set . . . . . . . . Arabic Character Set . . . . . . . . Chinese (Simplified) Character Set Chinese (Traditional) Character Set Cyrillic Character Set. . . . . . . . European Character Set . . . . . . Greek Character Set . . . . . . . . Hebrew Character Set . . . . . . . Japanese Character Set . . . . . . Korean Character Set . . . . . . . Thai Character Set . . . . . . . . . Turkish Character Set . . . . . . . Vietnamese Character Set . . . . . . . . . . . . . . . . . . . . . . .
-
Manual Controlling Access Using Native eDirectory Mode . . . Controlling Access with NetWare Web Access Controls What Is Access Control?. . . . . . . . . . . . . . . User-Group Authentication . . . . . . . . . . . . . Host-IP Authentication . . . . . . . . . . . . . . . . Access Control Files . . . . . . . . . . . . . . . . . How Does Access Control Work? . . . . . . . . . . . . Restricting Access . . . . . . . . . . . . . . . . . . . . Setting Access Control Actions . . . . . . . . . . .
-
Manual 99a 38 July 17, 2001 Getting Results with Novell Web Services As an integral part of NetWare® 6, Novell® Web Services makes Novell’s One Net (http://www.novell.com/news/onenet/index.html) vision a reality by providing the enabling Web technologies for many of Novell’s Net services.
-
Manual 99a 38 July 17, 2001 Documentation Conventions In this documentation, a greater-than symbol (>) is used to separate actions within a step and items in a cross-reference path. Also, a trademark symbol (®, TM, etc.) denotes a Novell trademark. An asterisk (*) denotes a third-party trademark. Path References By default, the NetWare Web Search Server is installed to the /NSEARCH directory located at the root of your server’s volume.
-
Manual I 99a 38 July 17, 2001 Web Services: The Road to One Net This section introduces you to Novell® Web Services and how they fit in to the One Net architecture of NetWare® 6. It also introduces you to each of the Web services components so that you can understand the individual pieces of Web services.
-
Manual 16 99a 38 Getting Results with Novell Web Services Getting Results with Novell Web Services 103-000133-001 August 29, 2001 Novell Confidential July 17, 2001
-
Manual 1 99a 38 July 17, 2001 Introducing Novell Web Services Novell® Web Services is a collection of technologies that enable Novell’s Net Services products to work. For example, the Enterprise Web Server is one of the key Novell Web services components. But it is also the enabling technology for iLoginTM and might also be used to serve up your department or company Web site.
-
Manual Figure 1 99a July 17, 2001 38 The Role of Web Services in Supporting Net Services Software Internet Laptop PC Firewall Net Services iFolder Web Sevices iLogin Tomcat Servlet Engine eFrame Web Search iPrint Enterprise Web Server etc. Portal Services Apache Web Server HTTP Stack NetWare NetWare 6 Net Services that Depend on Novell Web Services Novell is the leading provider of Net Services Software.
-
Manual 99a 38 July 17, 2001 NetWare Web Search Server NetWare Web Access GroupWise Web Access iManage For details about each of these services, refer to their documentation on the Novell Documentation Web site (http://www.novell.com/documentation). NetWare Enterprise Web Server The NetWare Enterprise Web Server is an HTTP server used to serve up Web pages to the Internet, an intranet or extranet.
-
Manual 99a 38 July 17, 2001 Many companies also host their own private intranets. The target audience of an intranet is the employees. An intranet is the ideal environment for employees and departments to publish information that can benefit others in the company. A company can host both Internet and intranet Web sites. Employees inside the company can access both, while people outside the company can’t get through the firewall to access the intranet.
-
Manual 99a 38 July 17, 2001 Tomcat Servlet Engine for NetWare Also developed by the Apache Group, Tomcat is a servlet engine used to serve up Web applications. It is also used by several NetWare 6 components, including the NetWare Web Search Server. If you are a developer working to create solutions, you will likely work a great deal with Tomcat. If you are not a developer, you may never have to do anything with Tomcat.
-
Manual 99a 38 July 17, 2001 FTP Server The NetWare FTP Server provides FTP service for transferring files to and from NetWare volumes. FTP Server can be used to post new Web content to your Enterprise Web Server, or to post or retrieve documents from your NetWare file server. WebDAV Web-distributed Authoring and Versioning (WebDAV) is an industry standard protocol.
-
Manual 99a 38 July 17, 2001 Requirements for Managing Novell Web Services To manage any NetWare Web Service, you need a Web browser, such as Netscape Navigator or Navigator Gold 3.0 or later, Netscape Communicator, Internet Explorer or any other browser that supports Java* and JavaScript*. Web Browser Requirements You must enable Java or JavaScript in your Web browser because all of the configuration forms in Web Manager and other management tools require one or both of these forms of Java to function.
-
Manual 24 99a 38 Getting Results with Novell Web Services Getting Results with Novell Web Services 103-000133-001 August 29, 2001 Novell Confidential July 17, 2001
-
Manual 2 99a 38 July 17, 2001 Introducing NetWare Web Manager NetWare® Web Manager is a browser-based management tool used to configure and manage the NetWare Enterprise Web server. But it also serves as a front door to other NetWare browser-based management tools, such as NetWare Remote Manager. It can be likened to a Web site’s home page with links to other resources and tools.
-
Manual 99a 38 July 17, 2001 When to Use Web Manager There are several management tools included with NetWare 6. Some are Web or browser-based, and others require a Windows client, as with NetWare Administrator. And while you can perform basic object management tasks in eDirectory, Web Manager’s primary purpose is to provide you with a tool for configuring and managing Web services. In addition, Web Manager is a home page to other NetWare management tools, providing you with one-click access to them.
-
Manual 99a 38 July 17, 2001 Management Tool When to Use This Tool How to Access This Tool NetWare Web Manager When you need to manage eDirectory trees or objects from a remote location. Enter your Web server’s domain name or IP address, followed by a colon and the Web Manager port number, which by default is 2200. You can change the port number during and after NetWare 6 Installation. Refer to Appendix F, “Port Number Assignments,” on page 285 for more information. Example: https://mycompany.
-
Manual 99a 38 July 17, 2001 Management Tool When to Use This Tool How to Access This Tool eDirectoryTM iManage When you need to configure or manage NDPS or DHCP. Enter your Web server’s domain name or IP address, followed by a colon and the port number. Example: https:// mycompany.com:port_number Or https:// 123.456.789.
-
Manual 99a 38 July 17, 2001 can also use local database mode. For more information, see Chapter 7, “Using a Directory Service to Control User Access to Network Resources,” on page 83. When you install additional Novell Web Services, they can be configured and managed from within NetWare Web Manager. NetWare Web Manager is installed when you install NetWare. After installing NetWare, use a Web browser from a client computer in your network to access NetWare Web Manager.
-
Manual 99a 38 July 17, 2001 IMPORTANT: After accessing Web Manager for the first time, we recommend that you create a new user for managing Web Services. This will help to ensure the security of your servers from unwanted intruders. The first page you see when you access Web Manager is called the NetWare Web Manager home page. It is similar to a home page you might see on the World Wide Web in that it is a type of front door, or portal, to information and services.
-
Manual 99a 38 July 17, 2001 Admin Preferences: This appears as a button in the top frame of the Web Manager home page. It lets you configure settings that apply to Web Manager, such as changing it’s default port number or working with error and access logs.
-
Manual 99a 38 July 17, 2001 NOTE: The default installation modifies the AUTOEXEC.NCF to load the Web server whenever NetWare is restarted. To disable autoloading, remove NSWEB from AUTOEXEC.NCF. To load and unload the Web server, type NSWEB and NSWEBDN respectively, at the system console.
-
Manual 3 99a 38 July 17, 2001 Modifying Web Manager Preferences NetWare® Web Manager has a few preference settings that you can customize, which include encryption for securing Web Manager, the Web Manager port number, and working with Web Manager access and error log files. Securing Web Manager Keeping intruders out of Web Manager is best accomplished through the use of encryption and server certificates.
-
Manual 99a 38 July 17, 2001 Server (during the NetWare installation), a Key Material Object (KMO) was created by default. A KMO, also called a Server Certificate Object, includes a server certificate and key pair files. To enable or disable encryption in Web Manager, do the following: 1 From the NetWare Web Manager home page, click Admin Preferences. 2 Under Encryption, click On to enable, or Off to disable SSL.
-
Manual 99a 38 July 17, 2001 To configure logging options for NetWare Web Manager, do the following: 1 From the NetWare Web Manager home page, click the Admin Preferences icon > Log Settings. 2 In the Access Log field, type a path to the directory where you want NetWare Web Manager to store the ACCESS log file. You can type either an absolute path or a path relative to your server root directory. Leaving this field blank deactivates access logging. 3 Click OK.
-
Manual Table 2 99a 38 July 17, 2001 Descriptions of Each Field in an Access Log File ACCESS Log Field Example Hostname or IP address of client user.novell.com Username john (username entered by the client for authentication) Date/time of request 29/Mar/1998:4:36:53 -0800 Request GET /WebAdmin/https/ReadAccessLog.jsp Protocol HTTP/1.
-
Manual 99a 38 July 17, 2001 The following is an example of an error log: [13/May/1999:16:56:51] info: successful server startup [13/May/1999:16:56:51] info: NetWare Web-Administrator 97.117.0455 [13/Mar/1999:19:08:52] security: for host user.mozilla.com trying to GET /admin-serv/bin/index, acl-state reports: access of /usr/suitespot/bin/admin/admin/bin/index denied by ACL admin-serv directive 3 [13/May/1999 20:05:43] failure: for host ceo.mozilla.
-
Manual 38 99a 38 Getting Results with Novell Web Services Getting Results with Novell Web Services 103-000133-001 August 29, 2001 Novell Confidential July 17, 2001
-
Manual II 99a 38 July 17, 2001 Working with the NetWare Enterprise Web Server A Web server is a fundamental building block for bridging disparate networks together into one net. With the NetWare® Enterprise Web Server, you can host Internet, intranet, or password-protected extranets that serve as secure portals to your company’s business processes and information. The Enterprise Web Server is a key component in building true, one net, eBusiness solutions.
-
Manual 99a 38 July 17, 2001 Run server-side applications using Java servlets, CGI, scripting, Java Server Page and Active Server Page technologies The information in this section will help you become familiar with how to manage Web server settings, how to publish content to it, and how to add your own Web applications.
-
Manual 4 99a 38 July 17, 2001 Putting the Web Server to Work NetWare® Enterprise Web Server provides an important ingredient in bridging disparate networks. The Web Server is installed by default; but if you chose not to install it and you want to build One Net solutions, you will need to install it using NWCONFIG or the NetWare server GUI. For NetWare 6 installation information, see the NetWare 6 Overview and Installation Guide.
-
Manual 99a 38 July 17, 2001 Hosting Multiple Web Servers You can configure your NetWare 6 server to host multiple Web servers. This way, a single NetWare 6 server running NetWare Enterprise Web Server can host all the Web server needs of your company; or, if you are an Internet Service Provider (ISP), you can host Web sites for your customers. This makes it easy to allow two or more departments to create their own Web sites without requiring that they each have a server.
-
Manual 99a 38 July 17, 2001 Adding Content to Your Web Site NetWare Enterprise Web Server has a document root or primary document directory. By default, the path to the primary document root directory is SYS:\\NOVONYX\SUITESPOT\DOCS. This is where all of the content for the sample Web site is stored. All content placed in this folder is visible to your Web site audience. If necessary, you can easily specify another directory as the primary document root directory.
-
Manual 99a 38 July 17, 2001 firewall or on the intranet inside the firewall. Departmental Web sites are typically a software virtual server where personal Web sites are easily created by each user. How to Publish Content to Your Web Server A Web site on the Internet is typically the place for you to publish information you want visitors to read. However, a Web site on an intranet is most effective if employees can participate and share information with others.
-
Manual 99a 38 July 17, 2001 Publishing Content Using Internet Explorer 1 Make sure WebDAV is enabled on your Web server. (See “Web Publishing through WebDAV” on page 66.) 2 On a client computer, open Internet Explorer. 3 In the Address field, enter your server’s domain name, followed by "My Network". For example: https://digital.airlines.com/My Network You can also use your server’s IP address. For example: https://157.168.179.
-
Manual 99a 38 July 17, 2001 Securing Your Web Site Because information published on a Web site can be viewed by anyone, sensitive information should be guarded. Most Web sites on the Internet are designed for general access, but a company intranet is an ideal environment for Web site security. Likewise, extranets also demand tight security controls.
-
Manual 99a 38 July 17, 2001 Additional Web-Based Services NetWare 6 goes beyond simply providing a Web server and includes all the functionality for hosting a complete Web environment, including NetWare FTP server and NetWare Web Search Server. Using the NetWare FTP Server The NetWare FTP Server provides File Transfer Protocol (FTP) service for transferring files to and from NetWare volumes. You can use the FTP command from a workstation with FTP access to log in to an eDirectory tree.
-
Manual 99a 38 July 17, 2001 Using the NetWare Web Search Server With the NetWare Web Search Server you can create an enterprise-wide index of all the information on your intranet or NetWare file servers. You can organize information spanning multiple servers and file types into a knowledge base. Using a single interface accessible from any Web browser, users can access online information whether it exists in HTML, Word*, Excel*, WordPerfect*, or several other file formats.
-
Manual 5 99a 38 July 17, 2001 Managing the Web Server This chapter describes how to configure NetWare® Enterprise Web Server preferences. Starting and Stopping the Web Server Once installed, the Web server runs constantly, listening for and accepting requests. You can start and stop the server using Web Manager, NetWare Remote Manager, or the NetWare system console. 1 From the Web Manager home page, click Enterprise Web Server servername. 2 Click Server On or Server Off.
-
Manual 99a 38 July 17, 2001 Viewing Server Settings From View Server Preferences, you can view your server’s technical and content settings and see if your server is running. The technical settings come from MAGNUS.CONF and the content settings come from OBJ.CONF. These files are located in the server root, in the directory HTTP-servername CONFIG. For more information about the MAGNUS.CONF and OBJ.CONF files, see the Novell Developer Kit Web site (http:// www.developer.novell.com/ndk/nscomp.htm).
-
Manual 99a 38 July 17, 2001 AGENT.CONF MIME.TYPES ACL files RDM.CONF CSID.CONF PROCESS.CONF ROBOT.CONF FILTER.CONF To Restore (and View) a Backup Copy of Configuration Files 1 From the Web Manager home page, click Enterprise Web Server servername > Server Preferences > Restore Configuration. 2 In the Set Number of Sets of Backups field, enter the number of backups displayed on the form and click Change. 3 To restore a backup version, click Restore.
-
Manual 99a 38 July 17, 2001 Configuring Maximum Simultaneous Requests You can set the number of maximum simultaneous requests, which is the number of active requests allowed for the server at one time. If your site is processing many requests that take many seconds, you might need to increase the number of maximum simultaneous requests. However, for general Internet or intranet use, you probably will not need to change the default value (128 requests).
-
Manual 99a 38 July 17, 2001 To modify DNS settings, do the following: 1 From the Web Manager home page, click Enterprise Web Server servername > Server Preferences > Performance Tuning. 2 Select No or Yes to enable DNS. 3 Select No or Yes to enable Async DNS. 4 Select No or Yes to cache DNS entries. 5 (Conditional) If you cache DNS entries, enter the number of entries that you want cached in the Size of DNS Cache field.
-
Manual 99a 38 July 17, 2001 Configuring the HTTP Persistent Connection Time-out With HTTP 1.1, a connection can be set to be persistent (similar to Keep Alive in HTTP 1.0). However, even if a connection is persistent, it still needs to have a time-out setting or it might consume system resources. Normally, you should not change the persistent connection time-out. The default setting is sufficient in most cases.
-
Manual 99a 38 July 17, 2001 Editing a Mime Type 1 From the Web Manager home page, click Enterprise Web Server servername > Server Preferences > MIME Types. 2 Click Edit next to the category you want to edit. 3 In the Content-Type field, enter the context type. 4 In the File Suffix field, enter the file suffix. 5 Click Change MIME Type > Save and Apply. IMPORTANT: Do not enter spaces between the file suffixes when you add or edit a MIME type.
-
Manual 99a 38 July 17, 2001 Changing the Server Port Number The server port number specifies the TCP port that the server listens to. The port number you choose can affect your users. If you use a nonstandard port, then anyone accessing your server must specify a server name and port number in the URL. For example, if you use port 8090, users wanting to access your server from their Web browsers would specify the following: http://www.novell.
-
Manual 99a 38 July 17, 2001 5 In the MTA Host field, enter the name of your SMTP mail server. You must enter a valid MTA if you want to use the agent e-mail function. 6 Click OK > Save and Apply. Customizing Error Responses You can specify a custom error response that sends a detailed message to clients when they encounter errors from your server. You can specify a file to send or a CGI program to run. Instead of sending back the default file, you might want to send a custom error response.
-
Manual 99a 38 July 17, 2001 3 To choose a specific part of your server, click Browse. 4 To browse files and directories on your server, click Options. 5 To return to the Custom Error Responses form, click Back. 6 To enter the wildcard pattern to edit, click Wildcard. 7 Select the error response you want to customize. 8 In the appropriate field, enter the absolute pathname to the file or CGI script that you want to return for that error code.
-
Manual 99a 38 July 17, 2001 Making a File or Directory Public 1 From the Web Manager home page, click Enterprise Web Server servername > Server Preferences > Restrict Access. 2 Click Insert File to insert a file or directory. 3 Click Save to save your changes. Displaying a File Indicating Expired Passwords 1 In the Password Expiration Redirection File field, enter the path to the location where you have saved (or will) your password expiration notification file.
-
Manual 99a 38 July 17, 2001 4 Click OK. To affect the changes, restart the Web server by going to the Server Preferences page and clicking Server Off and then Server On. HINT: Once you have enabled security on the NetWare Web Manager or Enterprise Web Server, you must use https:// in the URL to access them.
-
Manual 6 99a 38 July 17, 2001 Managing Server Content You can use the NetWare® Web Manager to help manage Web server content. You can create HTML pages and other files such as graphics or text and then store those files on your server. When users connect to your server, they can view your files provided they have access to them. This chapter describes how your users can contribute content to your Web server and how you can configure and manage content files and folders.
-
Manual 99a 38 July 17, 2001 Setting Additional Document Directories Most of the time you keep all of your documents in the primary document directory. But sometimes you might want to serve documents from a directory outside of your document root. You can do this by setting additional document directories. By serving from a directory outside of your document root, you can let someone manage a group of documents without giving them access to your primary document root.
-
Manual 99a 38 July 17, 2001 Establishing the Path to the Directory 1 From the Web Manager home page, click Enterprise Web Server servername > Content Management > Additional Document Directories. 2 In the URL Prefix field, enter a key word (for example text) to represent the path to the virtual directory.
-
Manual 99a 38 July 17, 2001 Configuring User Document Directories User Document Directories allows you to set up document directories or home directories for each user in your directory. A great advantage to setting up home directories is that users can then access their own files using a Web browser. For every user that you want to provide a home page for, complete the following tasks: Create a home directory for each User object.
-
Manual 99a 38 July 17, 2001 Adding Users’ Contexts to the Search Contexts List 1 From the Web Manager home page, click Enterprise Web Server servername > Users and Groups. 2 Click Insert Context and enter the information for each new context in the New NDS® Context box. Use the following format: ou=yourdepartment.o=yourcompany This information is added to the Search Contexts List. If this context is already set in your AUTOEXEC.NCF file (set Bindery Context=) you don't need to add it here.
-
Manual 99a 38 July 17, 2001 Web Publishing through WebDAV There are various ways of publishing content to your Web server. (See “How to Publish Content to Your Web Server” on page 44.) Web-distributed Authoring and Versioning (WebDAV) is an industry standard protocol and is an enhancement to the HTTP protocol, turning the Web into a document database that enables collaborative creation, editing, and searching from remote locations. For your users to benefit from WebDAV, it must first be enabled.
-
Manual 99a 38 July 17, 2001 If more than one name is specified, the server searches in the order in which the names appear in this field until one is found. For example, if your index filenames are INDEX.HTML and HOME.HTML, the server first searches for INDEX.HTML and, if it doesn’t find it, the server then searches for HOME.HTML. Directory Indexing In your document directory, you’ll probably have several subdirectories.
-
Manual 99a 38 July 17, 2001 Server Home Page When users first access your server, they usually use a URL such as http:// www.novell.com/. When the server receives a request for this document, it returns a document called a home page. Usually this file has general information about your company and links to other documents. By default the server finds the index file specified in the Index Filenames field and uses that for the home page.
-
Manual 99a 38 July 17, 2001 The default is usually Text/Plain, but you should set it to the type of file most commonly stored on your server. Some common MIME types include the following: text/plain text/html text/richtext image/tiff image/jpeg image/gif application/x-tar application/postscript application/x-gzip audio/basic Parsing the Accept Language Header When clients contact a server using HTTP, they can send header information describing the languages they accept.
-
Manual 99a 38 July 17, 2001 Forwarding URLs Redirection is a method for the server to tell a user that a URL has changed— for example, if you have moved files to another directory or server. You can also use redirection to send a person who requests a document on one server to a document on another server. To map a URL to another server, you must first specify the prefix of the URL you want the server to redirect. Then, you need to choose which URL to redirect to.
-
Manual 99a 38 July 17, 2001 Setting Up Multiple Web Servers There are two approaches you can take to set up multiple Web servers on your NetWare server: Hardware virtual servers Software virtual servers Each approach has its strengths and weaknesses; you should choose the one that’s right for your situation. Hardware virtual servers allow you to map multiple IP addresses to multiple document roots.
-
Manual 99a 38 July 17, 2001 To set up hardware virtual servers, dothe following: 1 Load and bundle all IP addresses. 2 Enter the following command at the NetWare server console: add secondary IPaddress IP_address 3 Add the above command to the AUTOEXEC.NCF file after the LOAD and BIND statements or after INITSYS.NCF if INETCFG is being used to configure the server. 4 Click Enterprise Web Server servername > Content Management > Hardware Virtual Servers.
-
Manual 99a 38 July 17, 2001 servers to handle both server names (for example, http://www.novell.com/ and http://www.cambridge.com). The server can respond differently to requests depending upon the URL, even though the server only has one IP address. For example, an Internet service provider (ISP) installs a Web server and then wants to set up a software virtual server for each of its customers (for example, customers aaa, bbb, and ccc) so that each customer can have an individual domain name.
-
Manual 99a 38 July 17, 2001 About the Drop-Down Lists When working on the International Characters, Document Footer, Parse HTML, and Cache Control Directives pages of Web Manager and your Web server, you will find a drop-down box at the top of each page. It works the same for each of these features. The drop-down list and associated Browse button let you select specific resources to be configured. From the drop-down list, you select a resource to be configured.
-
Manual Table 4 99a 38 July 17, 2001 Pattern Use [a-z] Match one occurrence of a character between A and Z. [^az] Match any character except A or Z. *~ This expression, followed by another expression, removes any pattern matching the second expression. Drop-Down List Wildcard Examples Pattern Result *.netscape.com Matches any string ending with the characters .netscape.com. (quark|energy).netscape.com Matches either quark.netscape.com or energy.netscape.com. 198.93.9[23].
-
Manual 99a 38 July 17, 2001 Assigning a Character Set The character set of a document is determined in part by the language it is written in. For most Web browsers, you can override the default character set setting for a document, a set of documents, or a directory by selecting a resource and entering a character set for that resource. Most Web browsers can use the MIME type charset parameter in HTTP to change its character set.
-
Manual 99a 38 July 17, 2001 To change the character set, do the following: 1 Click Enterprise Web Server servername > Content Management > International Characters. 2 Select the server resource you want to change the character set for from the Editing drop-down list. 3 To view the different server resources, click Browse . 4 To type the pattern you want to edit, click Wildcard . 5 In the Character Set field, enter one of the character sets previsously mentioned in this section.
-
Manual 99a 38 July 17, 2001 8 Click OK > Save and Apply. 9 To change the footer text, click Deactivate Custom Trailer. When you change the document footer for an HTML page, the lastmodified date doesn’t change. Customizing Parsed HTML HTML is normally sent to the client exactly as it exists on disk without any server intervention. However, the server can search HTML files for special commands (that is, parse the HTML) before sending documents.
-
Manual 99a 38 July 17, 2001 Using Cache-Control Directives Cache-control directives are a way for the Enterprise Web Server to control what information is cached by a proxy server. By using cache-control directives, you override the default caching of the proxy to protect sensitive information from being cached and perhaps retrieved later. For these directives to work, the proxy server must comply with HTTP 1.1.
-
Manual 99a 38 July 17, 2001 Working with Configuration Styles Configuration styles are an easy way to apply a set of options to specific files or directories that your server maintains. For example, you can create a configuration style that sets up access logging. When you apply that configuration style to the files and directories that you want to log, you don’t have to individually configure access logging for all the files and directories.
-
Manual 99a 38 July 17, 2001 6 Fill out the form that appears and then click OK. 7 Repeat Step 4 and Step 5 to make any other changes to the configuration style. 8 Click OK on the form you modified. 9 Click OK on the Edit a Style form. 10 Click Save and Apply. Editing a Configuration Style 1 Click Enterprise Web Server servername > Configuration Styles > Edit Style. 2 Select a configuration style to edit from the Style drop-down list. 3 Click Edit This Style.
-
Manual 99a 38 July 17, 2001 3 Select the configuration style you want to apply from the Style drop-down list. 4 Click OK > Save and Apply. Removing a Configuration Style Before removing a configuration style, apply the None configuration style to any files or directories that had the configuration style applied to them. If you do not apply None before removing the configuration style, you must manually edit your OBJ.CONF file, search for the configuration style in the file, and replace it with None.
-
Manual 7 99a 38 July 17, 2001 Using a Directory Service to Control User Access to Network Resources Using a directory service with NetWare® Web Services lets you easily control which of your users can access sensitive data on your NetWare 6 server. The NetWare Enterprise Web Server lets you choose which directory service mode you want the Enterprise Server to use. This chapter describes each of the available directory service modes and how to set them up.
-
Manual 99a 38 July 17, 2001 need for them to set up a dialup account into your company network. As long as they can get to the Internet, they can get to their data. eDirectory is the default directory mode and is ready to go after installation of NetWare 6. After eDirectory mode is selected, Use ConsoleOneTM to maintain user and group information.
-
Manual 99a 38 July 17, 2001 LDAP Mode If your company is built around LDAP, this mode might make sense for you. However, we recommend eDirectory as your directory service. eDirectory is the leading directory service available today and is included with NetWare 6. For information about implementing LDAP with eDirectory, see LDAP Services for Novell eDirectory (http://www.novell.com/documentation/lg/ nw6p/ndsedir86/index.html).
-
Manual 99a 38 July 17, 2001 8 (Conditional) If you change directory service from a local or remote LDAP directory to eDirectory, you need to restart the Web server. NetWare Web Manager does not need to be restarted. HINT: eDirectory does not allow public access to nonpublic folders or files. All users must be authenticated before receiving any content. Content that is placed in public directories do not require authentication.
-
Manual 99a 38 July 17, 2001 5 In the Port field, enter the default number if your directory server is using a different port number than the default port number 389. 6 In the Base DN field, enter the distinguished name that will be the point which directory lookups will occur from by default and will be the location where all NetWare Web Manager’s entries will be placed in your directory tree.
-
Manual 88 99a 38 Getting Results with Novell Web Services Getting Results with Novell Web Services 103-000133-001 August 29, 2001 Novell Confidential July 17, 2001
-
Manual 8 99a 38 July 17, 2001 Understanding ACL Files This chapter describes the access control list (ACL) files and their syntax. ACL files are text files that contain lists that define who can access resources stored on your Web server. By default, the Web server uses one ACL file that contains all of the lists for access to your server. However, you can create multiple ACL files and reference them in the OBJ.CONF file.
-
Manual 99a 38 July 17, 2001 from the Server Preference forms, you must manually reference the named ACLs with resources in the OBJ.CONF file. The type line begins with the letters acl and then includes the type information in double quotation marks followed by a semicolon. Each type information for all ACLs must be a unique name, even among different ACL files. The following lines are examples of several different types of ACLs: acl "path=C:\Netscape\SuiteSpot\docs\mydocs\"; acl "*.
-
Manual 99a 38 July 17, 2001 The following example uses SSL as the authentication method for users and groups: authenticate (user, group) { method = ssl; }; Any allow or deny statements must match the lists you specify in the authenticate line. If the line says authenticate (user), the allow or deny line must also specify users.
-
Manual 99a 38 July 17, 2001 Hierarchy of Authorization Statements ACLs have a hierarchy that depends on the resource. For example, if the server receives a request for the document (URI) /MY_STUFF/WEB/ PRESENTATION.HTML, the server first looks for an ACL that matches the file type or any other wildcard pattern that matches the request, then it looks for one on the directory, and finally it looks for an ACL on the URI.
-
Manual 99a 38 July 17, 2001 Attribute Qualifier Expressions Attribute qualifier expressions define who is allowed or denied access based on their username, group name, hostname, or IP address. The following lines are examples of allowing access to different people or computers: user = “anyone” user = “smith*” group = “sales” dns = “*.organization.com” dns = “*.organization.com” or “*.accounting_mail.com” ip = “198.
-
Manual 99a 38 July 17, 2001 Operators for Expressions You can use various operators in attribute qualifier expressions. You can use parentheses to delineate the order of precedence of the operators.
-
Manual 99a 38 July 17, 2001 allow absolute (all) user = "all"; acl "default"; allow (read,execute,list,info) user = "anyone"; allow (write,delete) user = "all"; The default ACL file is referenced in MAGNUS.CONF as follows: ACLFile absolutepath/generated.https-serverid.acl You can reference multiple ACL files in MAGNUS.CONF and then use their ACLs for resources in OBJ.CONF.
-
Manual 99a 38 July 17, 2001 Referencing ACL Files in OBJ.CONF If you have named ACLs or separate ACL files, you can reference them in the OBJ.CONF file. You do this in the PathCheck directive using the check-acl function. The line has the following syntax: PathCheck fn="check-acl" acl="acl_name" The acl_name is a unique name of an ACL as it appears in any ACL file. For example, you might add the following lines to your OBJ.
-
Manual 9 99a 38 July 17, 2001 Extending Your Server with Programs In addition to serving HTML documents, your server can run programs that interact with clients. These applications that run on the server are called server-side applications. Client-side applications are downloaded to the client and run on the client machine.
-
Manual 99a 38 July 17, 2001 Each type of program is installed onto the server differently. The following list summarizes the procedures: For CGI programs, configure your server to recognize certain files as CGI-all files with certain filename extensions or all files in specified directories. For JavaScript applications, check in each application individually through the Application Manager, which you can access from the Programs form or separately.
-
Manual 99a 38 July 17, 2001 Specifying a CGI Directory 1 From the Web Manager home page, click Enterprise Web Server servername > Programs > CGI Directory. 2 In the URL Prefix field, enter the URL prefix you want to use for this directory. The text you enter appears as the directory for the CGI programs in URLs. For example, if you enter cgi-bin as the URL prefix, then all URLs to these CGI programs have the following structure: http://yourserver.domain.
-
Manual 99a 38 July 17, 2001 Copy your CGI programs into the directories you’ve specified. Remember that any files in those directories will be processed as a CGI file, so you don’t want to put HTML files in your CGI directory. Specifying CGI as a File Type 1 From the Web Manager home page, click Enterprise Web Server servername > Programs > CGI File Type. 2 Select the resource you want to apply this change to from the Editing drop-down list. 3 Click Browse to choose a part of your server.
-
Manual 99a 38 July 17, 2001 Scripting CGI Refer to the Novell Developer Kit Web site (http:// www.developer.novell.com/ndk/doc.htm) for information on PERL, NetBasic, NSN, and LCGIs. Using the Query Handler You can specify a default query handler CGI program. A query handler processes text sent to it via the ISINDEX tag in an HTML file. ISINDEX is similar to a form text field in that it creates a text field in the HTML page that can accept typed input.
-
Manual 99a 38 July 17, 2001 Installing Server-Side JavaScript Programs To install server-side JavaScript programs, you need to activate server-side JavaScript for your server and use the Application Manager. This section includes information on accessing and using the Application Manager to install server-side JavaScript applications as well as to perform other functions. For more information about writing JavaScript applications, see the Novell Developer Kit Web site (http://www.developer.novell.
-
Manual 99a 38 July 17, 2001 Stop, start, and restart an installed application. Run and debug an active application. Remove an installed application. Running the Application Manager To run the Application Manager, click Enterprise Web Server servername > Programs > Server Side JavaScript > Application Manager. You can also run the Application Manager by loading the following URL in your Web browser: https://server.
-
Manual 99a 38 July 17, 2001 Restart restarts the application that was previously started and then stopped. See “Starting, Stopping, and Restarting a Server-Side JavaScript Application” on page 107. Run: Retrieves application-Home form. See “Running a Server-Side JavaScript Application” on page 107. Debug: Retrieves application-Home form. Modify: Retrieves the specified application form. See “Modifying Installation Parameters” on page 106. Remove: Removes the application.
-
Manual 99a 38 July 17, 2001 3 Click Add Application at the top of the page. 4 In the Name field, enter the name of the JavaScript application. For specific information on application URLs, see “Application URLs” on page 106. IMPORTANT: Do not give any JavaScript applications the same names as any subdirectories of your primary document directory. If you do, the server will no longer correctly process requests from the directory.
-
Manual 99a 38 July 17, 2001 Application URLs When you install a server-side JavaScript application, you must enter a name for it. This name determines the application URL, which clients use to access a JavaScript application. Application URLs are of the form http:// server.domain/appName/page.html.
-
Manual 99a 38 July 17, 2001 Removing a Server-Side JavaScript Application Clicking Remove removes the application from the Application Manager, but does not delete files from the server. At this point, clients can no longer access the application. If you delete an application and subsequently want to run it, you must install it again. Starting, Stopping, and Restarting a Server-Side JavaScript Application Start starts an installed application that is stopped.
-
Manual 99a 38 July 17, 2001 Configuring Default Settings When you install a new application, the default installation parameters are used for the initial settings. You can specify the following default settings: Installation parameters of .WEB file path, default page, initial page, maximum number of built-in database connections, external libraries, and client object maintenance technique. You can specify a default directory path for your development area and native executables libraries.
-
Manual 99a 38 July 17, 2001 About Tomcat for NetWare Tomcat enables the NetWare Enterprise Web Server to execute Java servlets. A servlet can be thought of as a server-side applet without a user interface. Tomcat provides Web application developers with additional functionality. For example, a servlet could be written and deployed to process data obtained from a client via an HTML form and the server-side data processing could manipulate the data and store results in a database.
-
Manual 99a 38 July 17, 2001 Step 2: Upgrading to NetWare 6 Once you have completed the first step, you can proceed with your NetWare 6 server upgrade. (See the NetWare 6 Overview and Installation Guide). IMPORTANT: All of the WebSphere directories must be preserved on the disk or made available after the upgrade is performed. Failure to save the directories could result in deleting your Web applications if you remove NetWare partitions during NetWare 6 installation.
-
Manual 99a 38 July 17, 2001 Undoing the Migration If you change your mind, you can undo the migration by following a few simple steps. 1 Delete the file volume:\TOMCAT\33\CONF\APPS- WEBSPHERE.XML. 2 Remove the URL paths from the Enterprise Web Server’s OBJ.CONF file. 3 Delete the WEB-INF directory in the document root of each WebSphere Web application that was migrated. 4 Remove the entries in DBSWITCH.CONF that point to the added document root directories.
-
Manual 99a 38 112 Getting Results with Novell Web Services Getting Results with Novell Web Services 103-000133-001 August 29, 2001 Novell Confidential July 17, 2001
-
Manual 10 99a 38 July 17, 2001 Monitoring the Web Server You can monitor your Web server’s activity using one of several methods. You can view the server’s status in real time—what is happening while you view it, compared to past performance—by using the Hypertext Transfer Protocol (HTTP) or the Simple Network Management Protocol (SNMP). You can also monitor your server by recording and viewing log files. Working with Log Files Server log files record your server’s activity.
-
Manual 99a 38 July 17, 2001 Case is important; make sure the case for your entry matches the case of the word you’re searching for. 5 Click OK. Here is an example of an access log in the common logfile format: wiley.a.com wiley.a.com 204 342 wiley.a.com arrow.a.com - - [16/Feb/1996:21:18:26 -0800] “GET / HTTP/1.0” 200 751 - - [17/Feb/1996:1:04:38 -0800] “GET /docs/grafx/icon.gif HTTP/1.0” - - [20/Feb/1996:4:36:53 -0800] “GET /help HTTP/1.0” 401 571 - john [29/Mar/1996:4:36:53 -0800] “GET /help HTTP/1.
-
Manual 99a 38 July 17, 2001 Here is an example of an access log using the flexible logging format: wiley.a.com - - [25/Mar/1996:12:55:26 -0800] "GET /index.htm HTTP/1.0" "GET" "/ ?-" "HTTP/ 1.0" 304 0 - Mozilla/2.0 (WinNT; I) wiley.a.com - - [25/Mar/1996:12:55:26 -0800] "GET / HTTP/1.0" "GET" "/?-" "HTTP/ 1.0" 304 0 - Mozilla/2.0 (WinNT; I) wiley.a.com - - [25/Mar/1996:12:55:26 -0800] "GET / HTTP/1.0" "GET" "/?-" "HTTP/ 1.0" 304 0 - Mozilla/2.0 (X11; I; IRIX 5.
-
Manual 99a 38 July 17, 2001 Setting Log Preferences You can customize access logging for any resource by specifying whether to log accesses, which format to use for logging, and whether the server should spend time looking up the domain names of clients when they access a resource. Server access logs can be in common logfile format, flexible log format, or your own customized format. The Common Logfile Format is a commonly supported format that provides a fixed amount of information about the server.
-
Manual 99a 38 July 17, 2001 Status: The status code the server returned to the client. Content Length: The content length, in bytes, of the document sent to the client. HTTP Header, “Referer”: The referer specifies the page from which the client accessed the current page. For example, if a user was looking at the results from a text search query, the referer would be the page that the user accessed the text search engine from. Referers allow the server to create a list of backtracked links.
-
Manual 99a 38 July 17, 2001 Archiving Log Files You can archive the access and error log files and have the server create new ones. When you archive log files, the server renames the current log files and then creates new log files with the original names. You can back up or archive, or delete, the old log files, which are saved as the original filename followed by the date and time the file was rotated. For example, ACCESS might become ACCESS.
-
Manual 99a 38 July 17, 2001 The interactive server monitor reports the totals for the following server values on a new screen: Bytes Transferred: Number of bytes the server is transferring Total Requests: Number of requests the server is handling Bad Requests: Number of bad requests the server is handling 2xx: Number of status codes ranging from 200 to 299 that the server is handling 3xx: Number of status codes ranging from 300 to 399 that the server is handling 4xx: Number of status codes r
-
Manual 99a 38 July 17, 2001 Running the Log Analyzer from the Server Status Form 1 From the Web Manager home page, click Enterprise Web Server servername > Server Status > Generate Report. 2 Enter the name of your server in the Server Name field. This name appears in the generated report. 3 Select the output type—whether the report will appear in HTML or plain text format. 4 Select the log file you want to analyze.
-
Manual 99a 38 July 17, 2001 7 Select whether to generate the following statistics: Top Number of One-Second Periods: Number of one-second periods during which requests were highest Top Number of One-Minute Periods: Number of one-minute periods during which requests were highest Top Number of One-Hour Periods: Number of one-hour periods during which requests were highest Top Number of Users: Number of users that accessed your server, provided that you included this as an item to log when
-
Manual 99a 38 July 17, 2001 Running the Log Analyzer from the Command Line To analyze access log files from the command line, run the FLEXANLG tool, which is in EXTRAS/FLEXANLG in your server root directory. To run FLEXANLG, enter the following command and options at the command prompt: flexanlg [ -P ] [-n name] [-x] [-r] [-p order] [-i file]* [ m metafile ]* [ o file][ c opts] [-t opts] [-l opts] The following describes the syntax.
-
Manual 99a 38 July 17, 2001 Monitoring the Server Using SNMP You can monitor your server in real time by using the Simple Network Management Protocol (SNMP). SNMP is a protocol used to exchange data about network activity. With SNMP, data travels between a managed device and a network management station (NMS) where users remotely manage the network. A managed device is anything that runs SNMP (for example, hosts or routers). Your Novell® Enterprise Web Server is a managed device.
-
Manual 99a 38 July 17, 2001 NMS-Initiated Communication NMS-initiated communication is the most common type of communication between an NMS and a managed device. In this type of communication, the NMS either requests information from the managed device or changes the value of a variable stored on the managed device. The following steps make up an NMS-initiated SNMP session: 1. The NMS searches the server’s MIB to determine which managed devices and objects need to be monitored. 2.
-
Manual 99a 38 July 17, 2001 The Enterprise Web Server MIB Each Enterprise Web Server has its own management information base (MIB). The Enterprise Web Server’s MIB is a file called HTTP.MIB, which contains the definitions for various variables pertaining to network management for the Enterprise Web Server. These variables are known as managed objects.
-
Manual 99a 38 July 17, 2001 Managed Object Description httpEntityMaxProcess Maximum number of active processes on the server httpEntityMinProcess Minimum number of active processes on the server httpEntityMaxThread Maximum number of active threads on the server httpEntityMinThread Minimum number of active threads on the server httpStatisticsPort Port number that this server is listening on httpStatisticsAddress IP address that this server is bound to httpStatisticsStatus Server status (up
-
Manual 99a 38 July 17, 2001 Managed Object Description httpStatisticsNum4xx Number of 400-level status requests handled by the server httpStatisticsNum5xx Number of 500-level status requests handled by the server httpStatisticsNum200 Number of 200 (Transfer OK) requests httpStatisticsNum302 Number of 302 (Moved Temporarily) requests httpStatisticsNum304 Number of 304 (Not Modified) requests httpStatisticsNum401 Number of 401 (Unauthorized) requests httpStatisticsNum403 Number of 403 (Forb
-
Manual 99a 38 128 Getting Results with Novell Web Services Getting Results with Novell Web Services 103-000133-001 August 29, 2001 Novell Confidential July 17, 2001
-
Manual III 99a 38 July 17, 2001 Introducing NetWare Web Search Server Make your data searchable in minutes! From simple search solutions to complex, revenue-generating search services, NetWare® Web Search bridges all types of networks—from file servers, to intranets, extranets, and the Internet—by bringing critical information to busy people. It is one of the industry’s fastest and most accurate search engines available today.
-
Manual 99a 38 130 Getting Results with Novell Web Services Getting Results with Novell Web Services 103-000133-001 August 29, 2001 Novell Confidential July 17, 2001
-
Manual 11 99a 38 July 17, 2001 Introducing NetWare Web Search Server NetWare® Web Search Server offers a powerful full-text search engine you can use to add search capabilities to your Internet or intranet Web sites. Compatible with the NetWare Enterprise Web Server, you can create custom search forms and search result pages either from scratch or by using the templates provided with NetWare Web Search Server.
-
Manual Figure 4 99a July 17, 2001 38 How NetWare Web Search Handles a Search String 1 Search Form 2 Search_Site/Index/ Index_File.idx URL 1 URL 2 URL 3 ... 4 Search Result List 3 . . . /Templates/ SearchResultListTemplate.html
Time to Search: $$SearchTime In this diagram, the user (1) enters a search string such as NetWare 6. The search string is then searched for in the index file on the Web Search Server (2).
-
Manual 99a July 17, 2001 38 Components of a Search Site Typically, a search site consists of the following components: Indexes Log files Search and print templates Scheduled events A search site name and (optionally) alias Each of these components are managed through the NetWare Web Search Manager, which is accessed using a Web browser. Unlike other search services software, Web Search lets you create search services that span multiple search sites.
-
Manual 99a 38 July 17, 2001 In Figure 5, the user enters a search query in a search form found on www.digitalairlines.com (1 and 2). When the user clicks the Search button, the query is sent behind the scenes to the NetWare Web Search Server (3), which processes the query using index files that were created using the Web Search Manager. Web Search then compiles the results of the search into an HTML template, which could be modified to match the look and feel of www.digitalairlines.
-
Manual Figure 6 38 July 17, 2001 Steps to Creating a Search Site 2 1 99a Plan your search site. 3 4 Define your search site. Build your indexes. Use NetWare Web Search form to perform test searches. Repeat this process for each new search site you want to add. A search site can include files located in one or more directories on a file server, or files located in one or more directories on a Web server. Indexing a Web server (or Web site) involves a process known as crawling.
-
Manual 99a 38 July 17, 2001 Taking a Test Run When you install NetWare Web Manager, the contents of the /searchroot/ DOCS directory located at the root of your server’s SYS: volume is indexed automatically. After restarting your server upon completion of the install, Web Search Server then automatically performs a crawl of your NetWare Web Server’s /DOCS root directory.
-
Manual 12 99a 38 July 17, 2001 What’s New with the NetWare Web Search Server Since it’s release in NetWare® 5.1, NetWare Web Search Server has been significantly enhanced with new features and improved usability.
-
Manual 99a 38 July 17, 2001 Search and print templates redesigned for an enhanced look and feel New template debugging feature that displays all errors related to information that is sent or received by a template Date-based sorting that searches for results according to user-specified dates Enhanced search functions, including the ability to search for a specific filename, path, URL, or file extension, which can be used when you know the name or path to a specific file—or used to restrict or fi
-
Manual 13 99a 38 July 17, 2001 Planning Your Search Service Whether you are an Internet Service Provider (ISP), an Application Service Provider (ASP), a Web Presence Provider (WPP), or needing to add search functionality to your department, company or organization, NetWare® Web Search's new search site hosting features make it easy to host search services, big or small. However, Web Search is a search service designed for individual Web sites. It is not intended to index the entire Internet.
-
Manual 99a 38 July 17, 2001 Taking the time to plan your search service strategy can save you time and money and improve the quality of your service. When you create a new search site, you create an independent search service, meaning that it is self-contained and doesn’t depend on , or interact with, other search sites.
-
Manual 99a 38 July 17, 2001 Becoming a Search Service Host Companies who want customers to find information about their products outsource this functionality to search service companies to make their information searchable. With NetWare Web Search Server, you can offer professional search services to other companies.
-
Manual 99a 38 July 17, 2001 based information that is separate from the purpose and intent of the PDF files and they belong to the company’s sales department. So you decide to create a separate index for the sales department. After working in Web Search Manager, you have created two search sites and compiled several indexes.
-
Manual 99a 38 July 17, 2001 Ensure that the installation is identical, meaning that installation directories and install options are identically matched. Create a search site using the DNS name and IP address of your SAN device. Because Web Search can be installed on any mounted volume, you should install all of Web Search (software and indexes) onto the shared storage device.
-
Manual 99a 38 144 Getting Results with Novell Web Services Getting Results with Novell Web Services 103-000133-001 August 29, 2001 Novell Confidential July 17, 2001
-
Manual 14 99a 38 July 17, 2001 Creating and Managing Search Sites This chapter provides detailed information about how to create and manage your search sites using NetWare® Web Search Manager. About Search Sites By definition, a search site is a collection of one or more indexes and their related configuration files. Indexes are at the heart of a search site. An index is an optimized binary file that contains keywords found in documents hosted on a Web or file server.
-
Manual 99a 38 July 17, 2001 3 In the Site Alias field, enter a site alias name, which is typically the IP address of your server. See “Using the Site Alias” on page 147 for more information about aliases. 4 In the Store Site Files At field, enter the path to where you want the index and configuration files to be stored. HINT: You can store the files on any volume on the server where Web Search is installed, but not on other servers. 5 Click Create.
-
Manual 99a 38 July 17, 2001 Hosting Multiple Search Sites Using One DNS Name If you are hosting a search service for two or more customers, you can name each search site according to the organization or company name of each customer and then use the &site query parameter when handling search queries. One of the advantages of using the &site query parameter is that it allows you to use a single DNS name. For example, suppose your server's URL was searchit.novell.com.
-
Manual 99a 38 July 17, 2001 Storing Site Files Site files include a set of index and configuration files for each search site. When you create a new search site, you can specify where you want site files to be stored, or you can accept the default path which is determined by where you installed the NetWare Web Search Server. Site files can be stored on any volume visible to the NetWare server that Web Search is installed on, regardless of which volume your Web Search Server is installed on.
-
Manual 99a 38 July 17, 2001 Restricting Search Results to Specific Areas You can restrict search results to specific areas of your file or Web server in the following ways: Using multiple indexes and using the &collection=index_name query parameter. Using a single index, restrict results to certain URL paths using the &filefilter=path query parameter.
-
Manual 99a 38 July 17, 2001 Using the Define Crawled Index (Advanced) Page The Define Crawled Index (Advanced) page offers some additional options beyond those available in the standard Define Crawled Index page. Changes made using this page will override default search site settings. 1 From the Web Search Manager Global Settings page, click Manage in the row of the site that you want to work with. 2 Under Define a New Index, click New Crawled Index > Define Index.
-
Manual 99a 38 July 17, 2001 For example, volume:\searchroot\sites\mysites. By default, index files are stored at volume:\searchroot\sites\default\indexes\. HINT: Changes made to Additional Settings override Default Site Settings. 13 From the Encoding (If Not in META Tags) drop-down list, select the encoding to be used by files being indexed that do not contain an encoding specification. 14 In the Maximum File Size to Index field, enter the maximum file size (in bytes) that Web Search should index.
-
Manual 99a 38 July 17, 2001 HINT: For information about defining a URL prefix in the NetWare Enterprise Web Server, see “Setting Additional Document Directories” on page 62. 6 To add additional paths, click Add More Paths. 7 Click Apply Settings. Once you define an index, you must generate it to make it searchable. See “Generating Indexes” on page 153.
-
Manual 99a 38 July 17, 2001 For example, /SALES. HINT: For information about defining a URL prefix in the NetWare Enterprise Web Server, see “Setting Additional Document Directories” on page 62. 11 To exclude specific subdirectories from being indexed, enter their relative paths in the Subdirectories to Exclude field.
-
Manual 99a 38 July 17, 2001 Managing Existing Index Files Once created, an index can then be edited or deleted. You can also view an index’s log file. (See “Working with the Log File” on page 154) Editing an Index 1 From the indexing Management page, click Edit in the Action column of the index you want to work with. 2 Make any of the changes you need to and then click Apply Settings. HINT: If you used the Advanced page to create the index, it will appear automatically.
-
Manual 99a 38 July 17, 2001 To view an index’s log file, do the following: 1 Click View Log in the Action column of the index that you want to work with. 2 Review the contents of the log file and then either click your browser’s Back button to return to the indexing Management page, or click Management in the left frame of the Web Search Manager.
-
Manual 99a 38 July 17, 2001 3 Specify the month, days, days of the week, or time (in hours and minutes) when you want Web Search to run the event. HINT: To select multiple dates and times, hold down the Ctrl key and click all of the items you want added. To select consecutive items, click the first item and then hold down the Shift key and click the last item. 4 Select the type of operation you want performed on your indexes.
-
Manual 99a 38 July 17, 2001 Modifying Default Search Site Settings NetWare Web Search Manager’s home page displays a list of all search sites that exist on your Web Search server. This home page is called Global Settings because the changes you make from this page affect all new sites that you create, and they also affect the functionality of the search and print servlets that provide the Web Search services.
-
Manual 99a 38 July 17, 2001 6 In the Maximum Log Size field, enter the maximum size (in bytes) that Web Search will allow the log file to grow to. Depending on the number of visitors that you search site hosts, log files can become large. This setting will protect your system’s hard drive resources. Default Search Settings To modify default search site settings for search features, do the following: 1 From the Web Search Manager home page, click Search under Default Site Settings.
-
Manual 99a 38 July 17, 2001 8 In the Default Search Results Template field, enter the filename of the search results template you want to use. If you have created a custom search results template and want Web Search to use it as your default search results page, enter its name in this field. 9 In the Template to Use If No Results Returned field, enter the filename of the template that Web Search should return if no results are found.
-
Manual 99a 38 July 17, 2001 By default, this message is sent using the ResponseMessageTemplate.html file and is intended as a warning to users that they are exceeding the allowed print job size. It then asks prompts the user to confirm the print job before continuing. 7 Under Template Settings, enter a path in the Templates Directory field to where your Web Search templates are stored.
-
Manual 99a 38 July 17, 2001 Default Index Settings These settings are intended to make the process of creating indexes even easier by letting you configure common settings as default settings. This saves you time by not making you make the same selections each time you create a new index. To modify default index settings, do the following: 1 From the Web Search Manager home page, click Index under Default Site Settings.
-
Manual 99a 38 July 17, 2001 Default Security Settings Security settings let you manage access to indexed content by requiring users to authenticate to a server before seeing search result content. To modify default search site security settings, do the following: 1 From the Web Search Manager home page, click Security under Default Site Settings.
-
Manual 99a 38 July 17, 2001 Modifying Default Search Service Settings Search Service Settings are meant for the administrator of the Web Search server and are intended to give him global control over all search sites, including the ability to completely disable searching by turning it off. They also allow the administrator to control the overall performance of the Web Search Server. General Services Settings General Services Settings affect error log and site list settings for all search sites.
-
Manual 99a 38 July 17, 2001 6 In the Default Location of Search Sites field, specify the path to where you want all search site files to be stored, including index and configuration files. Changing this setting won't move existing sites to the new default location. But all new search sites will be placed here. 7 To direct Web Search to reload configuration files modified manually, outside of Web Search Manager, click Yes next to the Enable Dynamic Site Updates field.
-
Manual 99a 38 July 17, 2001 4 Select where you want log results displayed by choosing one of the following options from the Log Debug Messages To drop-down list: File: When this option is selected, you can click View next to the Log Debug Messages To drop-down list and the log results are displayed in your browser.
-
Manual 99a 38 July 17, 2001 Print Services Settings To modify print services settings, do the following: 1 From the Web Search Manager home page, click Print under Services Settings. 2 To enable print services for all search sites on your Web Search server, click Yes next to Enable Print Service. 3 Under Debug Settings, click Yes next to Enable Print Debugging if you want print debugging turned on.
-
Manual 99a 38 July 17, 2001 Backing Up Your Search Site Files As with any valuable data, you should make sure that your search site files are backed up. At minimum, you should back up your index files, which by default are stored at volume:\searchroot\sites. However, if you have customized templates, you might also want to back them up. By default, they are stored at volume:\searchroot\templates.
-
Manual 99a 38 168 Getting Results with Novell Web Services Getting Results with Novell Web Services 103-000133-001 August 29, 2001 Novell Confidential July 17, 2001
-
Manual 15 99a 38 July 17, 2001 Optimizing Search Results There are a number of ways administrators can optimize the performance of their search sites and services. Improving Search Results through Intelligent Indexing You can improve the accuracy of your search results by following these indexing guidelines: When defining and creating your indexes, start with the highest-level Web Site URLs and File System Paths possible.
-
Manual 99a 38 July 17, 2001 Using the Robots META Tag Another effective way of controlling what Web Search indexes is using the Robots META tag, a tag inserted into the content that is being indexed by Web Search. When a Web-based search engine encounters a document containing the Robots META tag, the search engine will do as the META tag instructs. There are four values you can specify in the Robots META tag: NOINDEX: Indicates that the document is not to be indexed.
-
Manual 99a 38 July 17, 2001 Modifying Document Descriptions Returned in a Search Results List Web Search returns descriptions of each hit that is listed on the search results page. By default, the following information is displayed: Description field Summary field Abstract field The first 255 characters of the document (beginning with first heading and skipping links) The first three fields are created from the content of META tags in HTML documents.
-
Manual 99a 38 July 17, 2001 To illustrate how these criteria work, consider the following examples: Words in bold face are more relevant than regular words. Words contained in the
tag are more relevant than words contained within the tag. Words contained in the Keywords and Description META tags are more relevant than content words. Words contained within the tag used for creating links are less relevant than words outside of this tag.
-
Manual 99a 38 July 17, 2001 This example directs Web Search to perform two completely separate searches. The search results from the two queries are then merged based on the relevance of the individual search results and the weighting of the respective query that produced them. Another example might be to give the search results from one index more or less relevance than the search results of another index when performing a multiple-index search.
-
Manual 99a 38 July 17, 2001 Number of concurrent active indexing jobs Other functions being performed by your server Adjusting any of these values can have a significant impact on the performance of your search services. As a general guideline, use the fastest CPU possible and include as much RAM as possible. Although the duration of each user query is very short, while it is active it consumes an average of 500 KB of memory.
-
Manual 99a 38 July 17, 2001 Using the &filter Query Parameter The &filter query parameter allows Web Search administrators to enhance searches by adding hidden, additional query details when users submit a search query. This is an enhancement over previous versions of Web Search, which required that you use JavaScript to add additional details to search queries. The &filter query parameter works just like the &query= parameter and can be used together using the optional number (#) value.
-
Manual 99a 38 July 17, 2001 Searching XML Documents Web Search provides complete hierarchical searching using the &filter=value parameter. For example, you can find information in any of the TITLE tags of an XML document. Or you can restrict Web Search to only the TITLE tag within the DOCUMENT/SUMMARY hierarchy of an XML document. The following table shows example uses of the &query=value parameter. Example Values Result search_criteria Finds search_criteria anywhere in the document.
-
Manual 16 99a 38 July 17, 2001 Understanding Templates NetWare® Web Search Server utilizes templates to generate search forms and search and print results as well as user feedback such as error or response messages. A template is an HTML document containing one or more Web Search Server variables. Variables are used to produce dynamic results when a user performs a search on the search site you have defined.
-
Manual Figure 7 99a 38 July 17, 2001 The NetWare Web Search Form As It Appears in a Web Browser The Web Search form is used to capture user input, search available search sites, and then return the results in either a search or print template, which appears to the user in a dynamically updated HTML document. Search result templates display hits according to user selections on the search form. For more information about these search result templates, see Table 8 on page 181.
-
Manual Figure 8 99a 38 July 17, 2001 A Search Results Page Produced by the Search Results Template, ResultListTemplate.html. You can also customize the search form to include additional parameters that allow you to offer more options to your users for more accurate searching.
-
Manual 99a 38 July 17, 2001 Exploring the Default Search and Print Templates NetWare Web Search Server includes several default templates used to create search forms and to format, display, and print search results for users. You can use the templates as they are or you can modify them to look and feel how you want them to. You can also create as many additional templates as you need or replace the default templates with your own templates.
-
Manual 99a 38 July 17, 2001 Search Result Templates NetWare Web Search includes several ready-made result templates, as described in the following table. Table 8 Default Search Result Templates Template Name Purpose ResultListTemplate.html Formats and organizes search results and offers additional sorting functions to the user. ResultListNoHitsTemplate.html Indicates when no hits are found during a search and offers users a chance to refine their search. ResultListTerseTemplate.
-
Manual 99a 38 July 17, 2001 The print result template formats and organizes search results, optimized for printing, including a complete table of contents. The table of contents includes hypertext links for use online. Error and Response Message Templates In addition to the print, search, and search result templates, the error and response message templates are returned when an error occurs or when information is needed from the user.
-
Manual 99a 38 July 17, 2001 Working with Additional Languages NetWare Web Search includes each of the templates described above in each of several languages. Using standard encoding practices, you can internationalize your templates. Any changes made to the default templates should also be made to the language templates you will use. For a more complete discussion about creating a multilingual search solution, see Chapter 19, “Internationalizing Your Search Solution,” on page 213.
-
Manual 99a 38 184 Getting Results with Novell Web Services Getting Results with Novell Web Services 103-000133-001 August 29, 2001 Novell Confidential July 17, 2001
-
Manual 17 99a 38 July 17, 2001 Customizing Your Search Solutions You can quickly create a custom search solution by modifying the default NetWare® Web Search templates. Templates include some fundamental options for users, but you can add or remove options and modify the form layout and design to give the search form the look, feel, and function you need. If you are creating a search service for another company’s Web site, you can modify the templates to match the look and feel of their Web site.
-
Manual 99a 38 July 17, 2001 If you are familiar with HTML, you can quickly modify the design of the default (dynamic) Web Search template or the static search template. For example, you can change the colors of the search page or add new custom graphics. To modify the functionality of the default Web Search template, you can add or remove search parameters. Search parameters are used to communicate with NetWare Web Search.
-
Manual 99a 38 July 17, 2001 If you are familiar with HTML, you can quickly modify the design of the default search result template. For example, you can change the colors of the search page or add new graphics. To modify the functionality of the default search result template, you can add or remove search result variables. Search result variables are placed in the template where you want search results to be displayed.
-
Manual 99a 38 July 17, 2001 If you are familiar with HTML, you can quickly modify the design of the default print result template. For example, you can change the colors of the print results page or add new graphics to it. To modify the functionality of the default print results template, you can add or remove print result variables. Variables are placed in the template where you want search results to be displayed.
-
Manual 99a 38 July 17, 2001 Customizing Error and Response Message Templates Error and response messages are used to either provide feedback to the user or to request information from the user. Error and response message templates are used to display the content of error and response messages sent by the Web Search Server in response to search or print errors. Similar to search and print templates, error and response templates can be customized.
-
Manual 99a 38 190 Getting Results with Novell Web Services Getting Results with Novell Web Services 103-000133-001 August 29, 2001 Novell Confidential July 17, 2001
-
Manual 18 99a 38 July 17, 2001 Working with Template Variables and Search Parameters If you are a developer or are comfortable programming in HTML and working with variables and parameters, you can create an advanced search solution that your users can use to perform complex searches. Building an advanced search solution involves the use of search and print template variables and search parameters to create or customize search and print templates, and to create or customize one or more search forms.
-
Manual 99a 38 July 17, 2001 For more information about how to implement variables in a search or print template, or how to implement search parameters in an HTML document to create a search form, see Chapter 17, “Customizing Your Search Solutions,” on page 185. Search Page Variables The following table lists all available search page variables that can be used to extend the functionality of the default search templates (SearchTemplate.html or SearchTemplate.
-
Manual Variable Name 99a 38 July 17, 2001 Description $$ServerCollectionDescription Inserts the description of a search site as found in the Web Search Manager. $$ServerCollectionName Inserts the name of the search site defined in the Web Search Manager. $$TemplateName Identifies the filename of the template. $$TemplateLocale Identifies the locale of the template, such as zh_TW. $$TemplateTheme Identifies the theme (or theme directory) that you want to place the template in.
-
Manual 99a 38 July 17, 2001 Variable Name Description $$Countervariable_number, increment_number Inserts the value of the specified var# counter into the search result page. All counters initialize to zero. The optional second parameter specifies the amount to increment or decrement the current value. A maximum of 10 counters is supported.
-
Manual 99a 38 July 17, 2001 Variable Name Description $$IncludeFiletemplate_name Automatically pulls in the designated template at the location of this variable. The included template can contain other template variables, which will be processed as though they were a part of the original template. The template name parameter can either be a full FILE:// URL based on the file system of the server or a relative path based on the location of the parent template.
-
Manual 99a 38 July 17, 2001 Variable Name Description $$NumQueryItems The number of query items contained within the current query. While most queries use only 1 query item, it is possible to construct a query with multiple search criteria, each weighted with a value between 1 and 100. While the resultant search contains hits from each of the queries, the search results are organized with the most relevant hits first (from any of the individual queries).
-
Manual 99a 38 July 17, 2001 Variable Name Description $$QueryReturnField The names of the return fields the user specified in the search query. See also “$$BeginReturnFieldsLoop” on page 193 and “$$EndReturnFieldsLoop” on page 194. $$QueryTemplate The template name requested by the client. $$QueryTemplateTheme Identifies the theme requested by the search client. $$QueryVersion The version number of the current query format.
-
Manual 99a 38 July 17, 2001 Variable Name Description $$TotalHits The total number of hits that match the search query. This is not the same as the number of hits displayed in any particular result page. Is displayed using the client’s locale. $$URL URL of the result item.
-
Manual 99a 38 July 17, 2001 Print Result Variables The following table lists all available print result variables that can be used to extend the functionality of the default print result templates or to create new templates from scratch. For more information about how to implement variables in a template (HTML) page, see Chapter 17, “Customizing Your Search Solutions,” on page 185. Table 12 Print Result Variables Variable Name Description $$BeginLoop End of the header section.
-
Manual Variable Name Description $$EndTOCList[text] End of the table of contents section. 99a 38 July 17, 2001 This is a conditional text section. The items within the brackets ( [ ] ) are written out each time a result item occurs that decreases the depth of the hierarchy. If the depth of the current item is several levels less than the previous item, the text within the conditional text block is written out that many times. $$EndLoop End of the repeating body section.
-
Manual 99a 38 July 17, 2001 Variable Name Description $$URL URL of the result item. $$URLContent The entire contents of the URL are placed into the template at this location. The URL contents are not parsed to validate their data type, formatting, or functionality. Only text/plain and text/html files are printed. All other files are inserted into the print job as an error message.
-
Manual Variable Name 99a 38 July 17, 2001 Description $$IncludeFiletemplate_name Automatically pulls in the designated template at the location of this variable. The included template can contain other template variables, which will be processed as though they were a part of the original template. The template name parameter can either be a full FILE:// URL based on the file system of the server or a relative path based on the location of the parent template.
-
Manual 99a 38 July 17, 2001 Variable Name Description $$QuerySubDirFlag For a description of this item, refer to the equivalent search result variable in Table 11 on page 193. $$QuerySynonymFlag For a description of this item, refer to the equivalent search result variable in Table 11 on page 193. $$QueryTemplate The template name requested by the client. $$QueryTemplateTheme Identifies the theme requested by the search client. $$QueryVersion The version number of the current query format.
-
Manual 99a 38 July 17, 2001 Variable Name Description $$Countervariable_number, increment_number Inserts the value of the specified var# counter into the search result page. All counters initialize to zero. The optional second parameter specifies the amount to increment or decrement the current value. A maximum of 10 counters is supported.
-
Manual 99a 38 July 17, 2001 Variable Name Description $$ResultEncoding Identifies the encoding used to return the current search results page. $$Retry[text] If the Retry button is specified by Server logic, parses and inserts the conditional text into the response page. $$TemplateLocale Identifies the locale of the template, such as zh_TW. $$TemplateName Identifies the filename of the template. $$TemplateTheme Identifies the theme (or theme directory) that you want to place the template in.
-
Manual Table 15 99a 38 July 17, 2001 Search Parameters Parameter Name Value Description querynumber String The actual search criteria that is passed to the Web Search Server. The next four parameters below are combined with this parameter and are identified by adding the unique number to them. Syntax: querynumber=searchcriteria Example: query0=novell+AND+groupwise idnumber String A document ID that is used to narrow a search.
-
Manual 99a 38 July 17, 2001 Parameter Name Value Description typenumber Integer Indicates the type of search. Options include: 0 = Normal search; 0 is the default. 1 = Searches only the given document numbers. 2 = Root search used by the search tree control to get the top tree nodes. 3 = Used to get the children of the given document number. 4 = Searches the descendants of the given document numbers and is used to narrow a search or a print request, including all of its children.
-
Manual 99a 38 July 17, 2001 Parameter Name Value Description date Integer Lets you specify a date range to be searched in milliseconds. The example shows the number of milliseconds spanning a three-month time frame. The minus sign (-) before the number indicates three months back in time. If you pass a positive number such as 940457147873, then Web Search creates a date and time based on the number of milliseconds elapsed since January 1, 1970; 12:00 a.m.
-
Manual 99a 38 July 17, 2001 Parameter Name Value Description country String Lets you specify your country using the twocharacter, uppercase country value derived from ISO3166. Syntax: country=country code Example: country=TW Default: None template String Lets you specify the specific results template you want your search results returned in. The following list of templates are the default templates included with the Web Search Server.
-
Manual 99a 38 July 17, 2001 Parameter Name Value Description retfield String Lets you determine the level of detail given about each result item. The fewer the details, the faster a search is returned to a user. Field names include title, author, URL, changedate, language, summary, relevance, and filelength. NOTE: Type these fields exactly as they appear.
-
Manual 99a 38 July 17, 2001 Parameter Name Value Description retencoding String Lets you specify a character set encoding to be used by all results pages returned to users. Syntax: retencoding=content type Example: retencoding=iso-8859-1 Default: UTF8 sortkeys Integer Lets you specify the number of sort fields that should be used to sort the search results.
-
Manual 99a 38 212 Getting Results with Novell Web Services Getting Results with Novell Web Services 103-000133-001 August 29, 2001 Novell Confidential July 17, 2001
-
Manual 19 99a 38 July 17, 2001 Internationalizing Your Search Solution NetWare® Web Search Server is capable of handling search queries, search results, templates, and Web content in many languages and character sets. Web Search can auto-detect languages and character sets, but to ensure a complete international search solution, you must identify language, country, and character information throughout your Web Search implementation.
-
Manual 99a 38 July 17, 2001 The first line of the example indicates the Chinese language (ZH) and the geographic location as Taiwan. The second line of the example indicates the Chinese language (ZH) but China as the geographic location. This combination of language and country codes is called a locale. For more information about locales, refer to Table 16 on page 222.
-
Manual 99a 38 July 17, 2001 If this scenario were reversed so that the search client was Russian and the server was Chinese (Taiwan), and the client requested the ResultListTemplate_ja.html template, then the lookup order would follow the order shown in the following table. Template Name What Web Search Concludes 1. ResultListTemplate_ja_ru.html Specific client locale (no simplified versions) 2. ResultListTemplate_ja.html Client requested name 3. ResultListTemplate_ja_zh_TW.
-
Manual 99a 38 July 17, 2001 encodings identified in the SearchServlet and PrintServlet properties files. You can modify these settings using NetWare Web Search Manager. Because most languages have several encodings that their character sets are identified by, NetWare Web Search Server supports a wide variety of character set encodings and encoding aliases. Some examples of character set encodings include iso-8859-1, shift_jis, big5, and latin2.
-
Manual 99a 38 July 17, 2001 Search Encodings The only encodings NetWare Web Search currently supports when performing a search are Unicode and UTF-8. Therefore, any page that allows Web users to enter a search must ensure that the results are passed to the server in one of these two formats. See “Template Encodings” on page 219 for more information.
-
Manual 99a 38 July 17, 2001 page. Other characters can still be sent to the Web Search services using the %uHHHH and %HH formats, but the browser will not allow users to enter normal text characters other than that supported by iso-8859-1. Although Web Search can return search results from many languages, some characters found in titles and descriptions might be returned as question marks (?) indicating that these characters are not available in the current response encoding.
-
Manual 99a 38 July 17, 2001 During indexing, if a document contains characters not supported by the designated encoding, if the document doesn't have an encoding designation, or if the designation is inaccurate, the indexer will do its best to recover. But if it cannot, it might index the information incorrectly or quit indexing that page entirely. When reading a template file, Web Search might automatically cease processing the file if it contains any characters not supported by the current encoding.
-
Manual 99a 38 July 17, 2001 or more alternate encodings from the Content-Type META tags within the file that was part of the original Web Search template. NOTE: $$IncludeFile[ ] templates can also contain their own Content-Type meta tags. To solve this problem, NetWare Web Search allows placing the Content-Type META tag specifying the template's encoding within an HTML comment.
-
Manual 99a 38 July 17, 2001 Encoding Issues When Printing When NetWare Web Search processes a print request, it gathers the entire contents of each file and builds an appended print job page, one file after another. Each file can contain its own Content-Type META tag identifying its encoding. Each file's encoding will be used by Web Search to convert that file into Unicode before being sent out using the response encoding.
-
Manual 99a 38 July 17, 2001 Where to Go From Here The following table lists additional resources for learning more about locales, country and language codes, and encodings. Table 16 Additional Information Resources Component Resource Location Language and country codes (locale) RFC1766 (http://www.ietf.org/rfc/rfc1766.
-
Manual IV 99a 38 July 17, 2001 Appendixes This section contains additional information and reference materials related to several Web service components: Appendix B, “Combined Character Sets for Use with NetWare Web Search,” on page 227 Appendix C, “HTTP Methods and eDirectory Trustee Requirements,” on page 245 Appendix D, “Managing Users and Groups Using Local Database or LDAP Modes,” on page 247 Appendix E, “Controlling Access to Your Server Using Local Database or LDAP Modes,” on page 265
-
Manual 99a 38 224 Getting Results with Novell Web Services Getting Results with Novell Web Services 103-000133-001 August 29, 2001 Novell Confidential July 17, 2001
-
Manual A 99a 38 July 17, 2001 Troubleshooting NetWare Web Search This appendix provides some troubleshooting topics that can help you overcome search and print performance issues. Troubleshooting Characters of descriptions or titles appear as intelligible characters Possible Cause: You've probably indexed documents written in multiple languages and encodings. Web Search can index most of the world’s languages and encodings. However, Web Search needs to know the encoding of each document.
-
Manual 99a 38 July 17, 2001 Some titles are returned as the URL of the document instead Possible Cause: Action: Web Search pulls document titles from within each document that it indexes. If your document doesn't have a title, Web Search uses the URL or path of the document instead. If the URL is unavailable, a Title Unavailable message is returned. Make sure all of the documents you index have specifically defined titles.
-
Manual B 99a 38 July 17, 2001 Combined Character Sets for Use with NetWare Web Search The following tables list the character set encoding names and aliases that Web Search recognizes when indexing, searching, displaying, or printing files. This information is a subset of the character names registered by the Internet Assigned Numbers Authority (IANA).
-
Manual 99a 38 July 17, 2001 ASCII Character Set Preferred MIME Name or Primary Registered Name Encoding Names US-ASCII (MIBenum: 3)* ANSI_X3.4-1968 ANSI_X3.4-1986 ASCII ascii7 iso_646-us ISO646-US ISO_646.irv:1991 iso-ir-6 646 us IBM367 cp367 csASCII IBM437 (MIBenum: 2011) ibm-437 cp437 437 csPC8CodePage437 * A MIBenum is a record number corresponding to an entry in IANA’s Management Information Base.
-
Manual 99a 38 July 17, 2001 Arabic Character Set Preferred MIME Name or Primary Registered Name Encoding Aliases ISO-8859-6 (MIBenum: 9) ISO_8859-6:1987 ISO_8859-6 iso8859-6 iso8859_6 8859_6 IBM1089 ibm-1089 cp1089 1089 iso-ir-127 ECMA-114 ASMO-708 arabic csISOLatinArabic Windows-1256 (MIBenum: 2256) cp1256 win1256 ms1256 Combined Character Sets for Use with NetWare Web Search Getting Results with Novell Web Services 103-000133-001 August 29, 2001 Novell Confidential 229
-
Manual 99a 38 July 17, 2001 Chinese (Simplified) Character Set Preferred MIME Name or Primary Registered Name Encoding Aliases gb2312 (MIBenum: 2025) csGB2312 gb_2312-80 (MIBenum: 57) iso-ir-58 chinese csISO58GB231280 gb2312-80 gb2312-1980 gb-2312-80 gbk GBK windows-936 ms936 cp936 cp-936 euc-cn EUC_CN euccn euc-gb 230 Getting Results with Novell Web Services Getting Results with Novell Web Services 103-000133-001 August 29, 2001 Novell Confidential
-
Manual 99a 38 July 17, 2001 Chinese (Traditional) Character Set Preferred MIME Name or Primary Registered Name Encoding Aliases big5 (MIBenum: 2026) Big5 windows-950 win950 ms950 csBig5 IBM950 (MIBenum: ????) ibm-950 cp950 cp-950 950 Combined Character Sets for Use with NetWare Web Search Getting Results with Novell Web Services 103-000133-001 August 29, 2001 Novell Confidential 231
-
Manual 99a 38 Cyrillic Character Set Preferred MIME Name or Primary Registered Name Encoding Aliases ISO-8859-5 (MIBenum: 8) ISO_8859-5:1988 ISO_8859-5 iso8859-5 iso8859_5 8859-5 iso-ir-144 IBM915 ibm-915 cp915 915 cyrillic csISOLatinCyrillic KOI8-R (MIBenum: 2084) koi8_r koi8 cp878 cp-878 csKOI8R Windows-1251 (MIBenum: 2251) win1251 cp1251 ms1251 232 Getting Results with Novell Web Services Getting Results with Novell Web Services 103-000133-001 August 29, 2001 Novell Confidential July 17, 200
-
Manual 99a 38 July 17, 2001 European Character Set Preferred MIME Name or Primary Registered Name Encoding Aliases Windows-1252 (MIBenum: 2252) cp1252 ms1252 win1252 ansi ansi-1252 ISO-8859-1 (MIBenum: 4) ISO_8859-1:1987 ISO_8859-1 iso8859-1 iso8859_1 8859_1 iso-ir-100 IBM819 ibm-819 CP819 819 l1 latin1 csISOLatin1 Combined Character Sets for Use with NetWare Web Search Getting Results with Novell Web Services 103-000133-001 August 29, 2001 Novell Confidential 233
-
Manual 99a 38 Preferred MIME Name or Primary Registered Name Encoding Aliases ISO-8859-2 (MIBenum: 5) ISO_8859-2:1987 ISO_8859-2 iso8859-2 iso8859_2 8859_2 iso-ir-101 IBM912 ibm-912 cp912 912 l2 latin2 csISOLatin2 ISO-8859-3 (MIBenum: 6) ISO_8859-3:1988 ISO_8859-3 iso8859-3 iso8859_3 8859-3 iso-ir-109 IBM913 ibm-913 cp913 913 l3 latin3 csISOLatin3 234 Getting Results with Novell Web Services Getting Results with Novell Web Services 103-000133-001 August 29, 2001 Novell Confidential July 17, 2001
-
Manual 99a 38 July 17, 2001 Preferred MIME Name or Primary Registered Name Encoding Aliases ISO-8859-4 (MIBenum: 7) ISO_8859-4:1988 ISO_8859-4 iso8859-4 iso8859_4 8859-4 iso-ir-110 IBM914 ibm-914 cp914 914 l4 latin4 csISOLatin4 Windows-1250 (MIBenum: 2250) cp1250 ms1250 win1250 IBM850 (MIBenum: 2009) (UNICODE) ibm-850 cp850 850 csPC850Multilingual IBM852 (MIBenum: 2010) ibm-852 cp852 852 csPCp852 Combined Character Sets for Use with NetWare Web Search Getting Results with Novell Web Services
-
Manual 99a 38 Preferred MIME Name or Primary Registered Name Encoding Aliases IBM860 (MIBenum: 2048) ibm-860 cp860 860 csIBM860 IBM863 (MIBenum: 2050) ibm-863 cp863 863 csIBM863 IBM865 (MIBenum: 2052) ibm-865 cp865 865 csIBM865 236 Getting Results with Novell Web Services Getting Results with Novell Web Services 103-000133-001 August 29, 2001 Novell Confidential July 17, 2001
-
Manual 99a 38 July 17, 2001 Greek Character Set Preferred MIME Name or Primary Registered Name Encoding Aliases ISO-8859-7 (MIBenum: 10) ISO_8859-7:1987 ISO_8859-7 iso8859-7 8859_7 IBM813 ibm-813 cp813 813 iso-ir-126 ELOT_928 ECMA-118 greek greek8 csISOLatinGreek Windows-1253 (MIBenum: 2253) cp1253 ms1253 win1253 Combined Character Sets for Use with NetWare Web Search Getting Results with Novell Web Services 103-000133-001 August 29, 2001 Novell Confidential 237
-
Manual 99a 38 Hebrew Character Set Preferred MIME Name or Primary Registered Name Encoding Aliases ISO-8859-8 (MIBenum: 11) ISO_8859-8:1988 ISO_8859-8 iso8859-8 8859_8 ibm916 ibm-916 cp916 916 iso-ir-138 hebrew csISOLatinHebrew Windows-1255 (MIBenum: 2255) win1255 cp1255 ms1255 238 Getting Results with Novell Web Services Getting Results with Novell Web Services 103-000133-001 August 29, 2001 Novell Confidential July 17, 2001
-
Manual 99a 38 July 17, 2001 Japanese Character Set Preferred MIME Name or Primary Registered Name Encoding Aliases ISO-2022-JP (MIBenum: 39) iso2022-jp iso-2022-jis junet jis jis_encoding csJISEncoding csISO2022JP ISO-2022-JP-2 (MIBenum: 40) iso-2022-jp2 csISO2022JP2 Shift_JIS (MIBenum: 17/2024) sjis shift-jis ShiftJis x-sjis x-shift-jis windows-31j csWindows31J ms932 cp932 win932 windows-932 MS_Kanji csShiftJIS pck \u30b7\u30d5\u30c8\u7b26\u53f7\u53 16\u8868\u73fe Combined Character Sets for Us
-
Manual 99a 38 July 17, 2001 Preferred MIME Name or Primary Registered Name Encoding Aliases EUC-JP (MIBenum: 18) Extended_UNIX_Code_Packed_Form at_for_Japanese eucjp x-euc-jp euc_jpnew 10/18/99 x-eucjp eucjis csEUCPkdFmtJapanese 240 Getting Results with Novell Web Services Getting Results with Novell Web Services 103-000133-001 August 29, 2001 Novell Confidential
-
Manual 99a 38 July 17, 2001 Korean Character Set Preferred MIME Name or Primary Registered Name Encoding Aliases euc-kr (MIBenum: 38) euc_kr euckr csEUCKR ks_c_5601-1987 (MIBenum: 36) ks_c_5601-1989 ksc5601-1987 ksc5601_1987 ksc_5601 ksc5601 5601 korean csKSC56011987 IBM949 (MIBenum: ????) ibm-949 cp949 cp-949 949 Windows-949 (MIDenum: ????) win949 ms949 Combined Character Sets for Use with NetWare Web Search Getting Results with Novell Web Services 103-000133-001 August 29, 2001 Novell Confi
-
Manual 99a 38 Thai Character Set Preferred MIME Name or Primary Registered Name Ecoding Aliases IBM874 (MIBEnum: ????) ibm-874 cp874 874 Windows-874 win874 ms874 Turkish Character Set Preferred MIME Name or Primary Registered Name Encoding Aliases ISO-8859-9 (MIBenum: 12) ISO_8859-9:1989 ISO_8859-9 iso8859-9 8859_9 ibm920 ibm-920 cp920 920 iso-ir-148 l5 latin5 csISOLatin5 Windows-1254 (MIBenum: 2254) win1254 cp1254 ms1254 242 Getting Results with Novell Web Services Getting Results with Nove
-
Manual 99a 38 July 17, 2001 Vietnamese Character Set Preferred MIME Name or Primary Registered Name Ecoding Aliases Windows-1258 (MIBenum: 2258) win1258 ms1258 cp1258 cp-1258 Combined Character Sets for Use with NetWare Web Search Getting Results with Novell Web Services 103-000133-001 August 29, 2001 Novell Confidential 243
-
Manual 99a 38 244 Getting Results with Novell Web Services Getting Results with Novell Web Services 103-000133-001 August 29, 2001 Novell Confidential July 17, 2001
-
Manual C 99a 38 July 17, 2001 HTTP Methods and eDirectory Trustee Requirements HTTP access to a file or resource in Novell® eDirectoryTM mode is evaluated using NetWare® file system trustee assignments, depending on the HTTP method used. The table below defines the NetWare file system trustee assignments required to grant access to Web resources using specified HTTP methods. This table applies only while running the Enterprise Web Server in eDirectory mode.
-
Manual 99a 38 246 Getting Results with Novell Web Services Getting Results with Novell Web Services 103-000133-001 August 29, 2001 Novell Confidential July 17, 2001
-
Manual D 99a 38 July 17, 2001 Managing Users and Groups Using Local Database or LDAP Modes This appendix covers creating and managing User and Group objects while running in local database or LDAP modes. If you are running the Enterprise Server in Novell® eDirectoryTM mode, refer to Chapter 7, “Using a Directory Service to Control User Access to Network Resources,” on page 83. HINT: If you are using eDirectory mode, you can use ConsoleOneTM to manage users and groups.
-
Manual 99a 38 July 17, 2001 Additional Information about User Entries The following information might be of interest to the network administrator concerning creating user entries: User entries use the inetOrgPerson, organizationalPerson, and person object classes. For more information on how these are used, search the Novell Support Connection Web site (http://support.novell.com). By default, the distinguished name for users is as follows: cn=full name, ou=organization, ...
-
Manual 99a 38 July 17, 2001 Managing Users From the Manage Users form you can Find user entries Change user attribute values Change the user's password Manage the user's licenses Rename the user's entry Delete the user's entry Change some, but not all, product-specific information. Web Services servers add additional forms to this area that allow you to manage product-specific information.
-
Manual 99a 38 July 17, 2001 An asterisk (*): Type an asterisk to see all of the entries currently in your directory (or achieve the same effect by simply leaving the field blank) Any LDAP search filter: Type a search filter to see any string that contains an equal sign (=) that is considered a search filter 3 In the Format field, select either On-Screen or Printer. 4 Click Find. The Find All Users Whose Field This field allows you to build a custom search filter.
-
Manual 99a 38 July 17, 2001 Sounds Like: Causes an approximate, or phonetic, search to be performed. Use this option if you know an attribute's value, but you are unsure of the spelling. For example, if you are not sure if a user's name is spelled Sarret, Sarette, or Sarett, use this option. Starts With: Returns all the entries whose attribute value starts with the specified search string. Ends With: Returns all the entries whose attribute value ends with the specified search string. 3.
-
Manual 99a 38 July 17, 2001 4 To create or change a password, type the new password and the confirmation password, and then click Set Password. 5 To disable the password, click Disable Password. This prevents the user from logging in to a Web Services server without deleting the user's directory entry. You can reinstate the password by using the Password Management form to enter a new password. 6 Click General to return to general user information.
-
Manual 99a 38 July 17, 2001 If you are using common name-based distinguished names, and you change the distinguished name to use a new common name, then you should make sure that this new common name is listed as the first choice in the list of full names. This ensures that the appropriate name is displayed when a list showing this entry is generated. HINT: The rename feature changes only the user’s name; all other fields are left intact.
-
Manual 99a 38 July 17, 2001 3 Click Create Group to add the group and immediately return to the New Group form. 4 Click Create and Edit Group to add the group and then proceed to the Edit Group form for the group you have just added. For information on editing groups, see “Editing Group Attributes” on page 256.
-
Manual 99a 38 July 17, 2001 4 Click Find. 5 In the resulting table, click the name of the entry you want to edit. The Find All Groups Whose Field This field lets you build a custom search filter. Use this field to narrow down the search results. Find All Groups Whose provides the following search criteria: 1. The left drop-down list lets you specify the attribute that the search is based on. The options are Full Name Description 2.
-
Manual 99a 38 July 17, 2001 Editing Group Attributes 1 From the Web Manager home page, click NetWare Enterprise Web Server servername > Users and Groups > Manage Groups. 2 Find the group you want to edit. See “Finding Group Entries” on page 254 for more information. 3 In the Group Edit form, change the displayed fields as desired. 4 Click Save Changes. HINT: To change an attribute value that is not displayed by the group edit form, use the ldapmodify command line utility.
-
Manual 99a 38 July 17, 2001 5 Click Find and Add to find all the matching entries and add them to the group. If the search returns any entries that you do not want add to the group, check the box in the Remove from List column. You can also construct a search filter to match the entries you want removed and then click Find and Remove. 6 When the list of group members is complete, click Save Changes.
-
Manual 99a 38 July 17, 2001 Managing Owners You manage a group’s owners list the same way as you manage the group members list. The following table shows you which section to read for more information.
-
Manual 99a 38 July 17, 2001 Removing Groups 1 From the Web Manager home page, click NetWare Enterprise Web Server servername > Users and Groups > Manage Groups. 2 Find the group you want to delete. See “Finding Group Entries” on page 254 for more information. 3 Click Delete Group > OK. Renaming Groups 1 From the Web Manager home page, click NetWare Enterprise Web Server servername > Users and Groups > Manage Groups. 2 Find the group you want to edit.
-
Manual 99a 38 July 17, 2001 Additional Information about Organizational Units The following information might be of interest to the directory administrator: New Organizational Units are created using the OrganizationalUnit object class. The distinguished name for new Organizational Units is of the form: ou=new organization, ou=parent organization, ...
-
Manual 99a 38 July 17, 2001 The Find All Units Whose Field This field allows you to build a custom search filter. Use this field to narrow down the search results that are otherwise returned by Find Organizational Unit. Find All Units Whose provides the following search criteria: 1. The left drop-down list allows you to specify the attribute on which the search will be based. The options include the following: Unit name Description 2.
-
Manual 99a 38 July 17, 2001 Editing Organizational Unit Attributes 1 From the Web Manager home page, click NetWare Enterprise Web Server servername > Users and Groups > Manage Organizational Unit. 2 Find the Organizational Unit you want to edit. See “Finding Organizational Units” on page 260 for more information. 3 In the Organizational Unit edit form, change the displayed fields as desired. 4 Click Save Changes.
-
Manual 99a 38 July 17, 2001 Deleting Organizational Units 1 Make sure no other entries exist in the directory under the Organizational Unit that you want to rename. 2 From the Web Manager home page, click NetWare Enterprise Web Server servername > Users and Groups > Manage Organizational Unit. 3 Find the Organizational Unit you want to delete. See “Finding Organizational Units” on page 260 for more information. 4 Click Delete > OK.
-
Manual 99a 38 264 Getting Results with Novell Web Services Getting Results with Novell Web Services 103-000133-001 August 29, 2001 Novell Confidential July 17, 2001
-
Manual E 99a 38 July 17, 2001 Controlling Access to Your Server Using Local Database or LDAP Modes You can control who accesses the files on your Web site. This appendix discusses the various methods you can use to determine who has access to specific files or directories on your Web site. If you want to control who can configure the Web server itself, see “Securing Web Manager” on page 33. The NetWare® Enterprise Web server can be secured using either Novell® eDirectoryTM or local database modes.
-
Manual 99a 38 July 17, 2001 User-Group Authentication You can require users to authenticate themselves before getting access to your Web site. Authentication means that users verify their identity either by entering a username and password or by using a client certificate installed in their Web browser. The first method of requiring the username and password is the traditional method, which can be done with or without encryption.
-
Manual 99a 38 July 17, 2001 IMPORTANT: If your server doesn't use SSL encryption, the username and password that the end user types are sent unencrypted across the network. Someone could intercept the network packets and read the username and password being sent to the Web server. For this reason, User-Group authentication is most effective when combined with SSL encryption, or Host-IP authentication, or both.
-
Manual 99a 38 July 17, 2001 Access Control Files When you use access control on your Web server, the settings are stored in a file with the extension .ACL. Access control files are stored in the directory server_root/server_typeACL, where server-type is the name of the server. The main ACL filename is GENERATED-HTTPS-server-id.ACL. The temporary working file is called GENWORK-HTTPS-server-id.ACL. If you use the Server Manager forms to restrict access, you’ll have these two files.
-
Manual 99a 38 July 17, 2001 ACL that says not to continue or until it reaches the final ACL for the requested URL (in this case, the file PRESENTATION.HTML). To set up access control for this example using the Server Manager forms, you could create an ACL for the file only or for each resource leading to the file, for example, one for the entire server, one for the MY_STUFF directory, one for the MY_STUFF/WEB directory, and one for the file.
-
Manual 99a 38 July 17, 2001 Restricting Access This section takes you through the process of restricting user access to documents on your Web site. The sections following this one describe in detail each option available when using access control. Keep in mind that most access control rules use only a subset of the available options. There is also a section of examples on restricting different resources. You can review these examples in “Restricting Access to the Entire Server” on page 278.
-
Manual 99a 38 July 17, 2001 The bottom frame displays a form where you can select whether you want to allow or deny access to the users, groups, or hosts you’ll specify in the following steps. Select the option you want > click Update. 6 Click Anyone to specify User-Group authentication listed under the Users/Groups column. 7 Select the options you want > click Update. See “Specifying Users and Groups” on page 273 for more detailed information about each option.
-
Manual 99a 38 July 17, 2001 If you click Revert, the server removes any changes you made to the rules from the time you first opened the two-frame window WARNING: Be cautious when using Revert because you cannot restore your edits. In most cases, it is probably better to delete the rule lines individually. 20 Click Save and Apply.
-
Manual 99a 38 July 17, 2001 Setting Access Control Actions You can specify the action the server takes when a request matches the access control rule. Allow: The users or computers can access the requested resource. Deny: The users or computers cannot access the requested resource. The server goes through the list of ACEs to determine the access. For example, the first ACE is usually to deny everyone. If the first ACE is set to continue, the server checks the second ACE in the list.
-
Manual 99a 38 July 17, 2001 Authenticated People Only: All users requesting the resource will have to type a username and password before getting access. If the username they enter isn’t in the database, the access control rule won’t apply to them. However, if the rule says Deny and then a group is listed, that group is denied, but everyone else in the database could be allowed depending on if there is another ACL that matches their request.
-
Manual 99a 38 July 17, 2001 SSL: Uses the client certificate to authenticate the user. If you use this method, SSL must be turned on for the server. If you have encryption on, you can combine basic and SSL methods. Other: Uses a custom method you create using the access control API. Authentication Database: Allows you to select a database that the server uses to authenticate users.
-
Manual 99a 38 July 17, 2001 Setting Access Rights You can set access rights to files and directories on your Web site. In addition to allowing or denying all access rights, you can specify a rule that allows or denies partial access rights. For example, you can give people read-only access rights to your files, so they can view the information, but not change the files. This is particularly useful when you use the Web publishing feature to publish documents.
-
Manual 99a 38 July 17, 2001 allow (read) { (group=regular and dayofweek=”mon,tue,wed,thu,fri”); (group=regular and (timeofday>=0800 and timeofday<=1700)); (group=critical) } For more information on valid syntax and ACL files, see the Help. When Access Control Is On You can turn off access control for any part of the server that a user accesses. For example, you could create an ACL that restricts access to the resource .HTML. You could then have an ACL for the entire server that is turned off.
-
Manual 99a 38 July 17, 2001 IMPORTANT: Make sure any users who get the response file have access to that file. If you have access control on the response file and the user is denied access to both the original resource and the response file, the server will send the default denied response. 5 Click Submit in the top frame. Examples of Restricting Access This section describes some common examples for restricting access to a Web server and its contents.
-
Manual 99a 38 July 17, 2001 10 Click Update. 11 Click Anyplace in the second rule. 12 In the bottom form, type a wildcard pattern for the hostnames of the computers you want to allow. For example, type *.emp.mozilla.com in the Host Names field. 13 Click Update. 14 Uncheck the Continue box in the second rule of the top frame > click Submit. 15 Click Save and Apply. Be sure to restart the server for the changes to take effect.
-
Manual 99a 38 July 17, 2001 IMPORTANT: Don’t edit the default values for the first rule. These values deny all access to the directory. You’ll edit the second rule to allow read access to the Executives group. 6 Click Deny in the second rule. 7 In the bottom form that appears, select Allow > click Update. 8 Click Anyone in the second rule. 9 In the bottom form, type the group you want to have access to the server. For this example, type Executives in the Group field. 10 Click Update.
-
Manual 99a 38 July 17, 2001 Restricting Access to a URI (Path) This example uses a URI to control access to a single user’s content on the Web server. URIs are paths and files relative to the server’s document root directory. Using URIs is an easy way to manage your server’s content if you frequently rename or move all or part of it, for example, for disk space. It’s also a good way to handle access control if you have additional document roots.
-
Manual 99a 38 July 17, 2001 This means that the server ignores any ACLs for other URIs, directories, or files under the URI you specified above. 13 Click Submit > Save and Apply. The entry in the GENERATED.HTTPS-serverid.ACL file for this example looks like this: acl "uri=/my_directory"; allow absolute (read,execute,list,info) user = "anyone"; allow absolute (all) user = "me"; Restricting Access to a File Type This example controls write and delete access to all files with the extension .CGI.
-
Manual 99a 38 July 17, 2001 12 Click Anyone. 13 In the bottom form, type Programmers in the Group field. 14 Click Update > Submit > Save and Apply. In this example, both Continue boxes are checked. This means that if a file is requested, the server will first look at the ACL for the file type, and then it will continue to look for another ACL that matches, for example, an ACL on the URI or the path. The server checks ACLs in the following order: 1. Pathcheck Functions in OBJ.
-
Manual 99a 38 July 17, 2001 5 In the bottom form that appears, select Allow > click Update. 6 Click All > uncheck the Write and Delete access rights. This means that if a user wants to add, update, or delete a file or directory, this rule won’t apply and the server will search for another rule that matches. 7 Click Update. 8 Click New Line to create a rule that restricts the write and delete methods. 9 Select Allow for the second rule. 10 Click the X link to create a customized expression.
-
Manual F 99a 38 July 17, 2001 Port Number Assignments Port numbers enable IP packets to be sent to a particular process on a computer that is connected to the Internet. Some port numbers are permanently assigned; for example, e-mail data under SMTP goes to port number 25. A process such as a Telnet session receives a temporary port number when it starts. The data for that Telnet session goes to newly assigned port number, and the port number goes out of use when the telnet session ends.
-
Manual Product or Service BorderManagerTM 99a 38 Assigned Ports and Availability Status 21 119 443 1040 1045 1959 7070 8080 9090 Common Internet File System (CIFS) 139 CsAudit 2000 DirXMLTM NDS-to-NDS® 8090 DirXML Remote Loader 8000 Domain Name Service (DNS) 53 eGuide 389 636 File Transfer Protocol (FTP) 20 21 GroupWise® Monitor July 17, 2001 1099 286 Getting Results with Novell Web Services Getting Results with Novell Web Services 103-000133-001 August 29, 2001 Novell Confidential
-
Manual Product or Service GroupWise Internet Agent (GWIA) 99a 38 July 17, 2001 Assigned Ports and Availability Status 25 110 143 389 636 9850 GroupWise Web Access 80 443 7205 iFolderTM 80 389 443 636 iMonitor 80 iPrint 443 631 Lightweight Directory Access Protocol (LDAP) 389 636 Line Printer Requester (LPR) 515 Media Server 554 Message Transfer Agent (MTA) 3800 7100 7180 Port Number Assignments 287 Getting Results with Novell Web Services 103-000133-001 August 29, 2001 Novell Confid
-
Manual Product or Service 99a 38 Assigned Ports and Availability Status NetWare Core ProtocolTM (NCPTM) 524 NetWare Enterprise Web Server 80 443 NetWare File System 20 111 2049 NetWare Graphical User Interface July 17, 2001 9000 9001 NetWare/IP (NWIP) 396 NetWare Remote Manager (NRM) 80 81 8008 8009 NetWare Web Access 80 Network Time Protocol (NTP) 123 NLSLRUP.
-
Manual Product or Service Novell Internet Messaging System (NIMSTM) 99a 38 July 17, 2001 Assigned Ports and Availability Status 80 81 110 143 389 443 444 636 Novell Modular Authentication Services (NMASTM) 1242 Portal Services 80 443 8080 Post Office Agent (POA) 1677 2800 7101 7181 Radius 1812 Remote ConsoleTM DOS 2034 Remote Console Java 2034 2036 2037 Server Compatibility Mode Driver (SCMD) 2302 Port Number Assignments 289 Getting Results with Novell Web Services 103-000133-001 Augu
-
Manual Product or Service 99a 38 Assigned Ports and Availability Status Service Locator Protocol (SLP) 427 Simple Network Management Protocol (SNMP) 161 Telnet 23 Tomcat 8080 Virtual Private Network (VPN) 213 353 2010 Web Manager 2200 ZenworksTM for Desktops 3 2544 2638 8039 Zenworks for Servers 2 July 17, 2001 80 443 1229 2037 2544 8008 8009 290 Getting Results with Novell Web Services Getting Results with Novell Web Services 103-000133-001 August 29, 2001 Novell Confidential
-
NetWare WebAccess Overview and Installation Novell NetWare 6 ® www.novell.
-
Manual 99a June 14, 2001 37 Contents Contents 5 1 Overview 7 2 Installation and Configuration Installing NetWare WebAccess . . . . . . . . . . . . . . . . . . . . System Requirements . . . . . . . . . . . . . . . . . . . . . . . Installing NetWare WebAccess during the NetWare 6 Installation . Installing NetWare WebAccess After the NetWare 6 Installation. . NetWare WebAccess Gadgets. . . . . . . . . . . . . . . . . . . . . NetWare Web Access Gadget Descriptions . . . . . . . . . . . .
-
Manual 6 99a 37 NetWare WebAccess Overview and Installation NetWare WebAccess Overview and Installation 103-000142-001 August 30, 2001 Novell Confidential June 14, 2001
-
Manual 1 99a 38 July 17, 2001 Overview NetWare® WebAccess is a feature of NetWare 6 that allows network administrators to easily and quickly set up Web access to network resources for their users with the skills they already have. Most network administrators do not need additional training to set up and configure NetWare WebAccess NetWare WebAccess is a Java* servlet or Java application that is based on Novell® Portal Services technology.
-
Manual 99a 38 July 17, 2001 Provides a customizable WebAccess page so companies can add their own logo to the NetWare WebAccess site Is fully cluster enabled, which means that NetWare WebAccess is built to work with Novell Cluster ServicesTM and can be running and available 24 hours per day 7 days per week. Gadgets are easily and centrally managed using the Java-based ConsoleOneTM utility.
-
Manual 2 99a 38 July 17, 2001 Installation and Configuration This chapter describes how to install NetWare® WebAccess during or after the NetWare 6 installation, how to configure NetWare WebAccess gadgets, and how to start and use NetWare WebAccess. Installing NetWare WebAccess NetWare WebAccess can be installed as an optional component during the NetWare 6 installation or it can be installed after the NetWare 6 installation.
-
Manual 99a 38 July 17, 2001 System Requirements If you have met the requirements for NetWare 6 and have NetWare 6 installed, you have met almost all of the system requirements for NetWare WebAccess. The following list specifies the system requirements for installing and running NetWare WebAccess: At least one NetWare 6 Server in the NDS® tree where NetWare WebAccess will be installed A Netscape* Navigator* 4.7 or later or Internet Explorer 5.
-
Manual 99a 38 July 17, 2001 5 Choose which gadgets you want to configure now and which gadgets you want to configure later by checking or unchecking the check boxes next to each gadget type. Then click Next and continue through the rest of the NetWare 6 installation. All NetWare WebAccess gadgets are installed automatically when you install NetWare WebAccess. This screen lets you choose whether to enable and configure those gadgets now or later.
-
Manual 99a 38 July 17, 2001 NetWare WebAccess Gadgets A gadget represents a window or a link to specific content from the NetWare WebAccess page. Clicking on a gadget on the NetWare WebAccess page links you to a preconfigured Web page for the application or service represented by the gadget. For example, NetWare WebAccess provides a gadget for Novell® NetStorage. Clicking the NetStorage gadget will connect you to the NetStorage service.
-
Manual 99a 38 July 17, 2001 Configuring Gadgets NetWare WebAccess allows only minor configuration changes to the included gadgets. The only gadget configuration changes supported in NetWare WebAccess include editing the URL to the service or application and adding or removing gadgets from the main NetWare WebAccess Web page. If you want additional gadgets or the ability to create or customize gadgets, you must purchase Novell Portal Services.
-
Manual 99a 38 July 17, 2001 7 Stop the Tomcat servlet engine by typing tomcat33 -stop at the NetWare 6 server console and restart it by typing tomcat33. For gadget configuration changes to take effect, it is necessary to stop and restart the Tomcat servlet engine on the NetWare 6 server where NetWare WebAccess is running. Stopping and restarting the Tomcat servlet engine might disrupt any Web services using the Tomcat servlet engine on this server.
-
Manual 99a 38 July 17, 2001 NetStorage Gadget Configuration Provide the URL to access Novell NetStorage. This URL is either the IP address or DNS name of the server where NetStorage is installed or the IP address you chose for the Apache-based services during the NetWare 6 installation. If you specified a port number other than port 80 for Apachebased services during the NetWare 6 installation, you must also specify that port number. For example, if the IP address of the NetStorage server is 127.0.0.
-
Manual 99a 38 July 17, 2001 If you leave the field blank, the user will be required to enter both a username and a password. You should use this option if the user’s GroupWise username and eDirectory username do not match. Some additional configuration is required for NetWare WebAccess to function properly with GroupWise WebAccess. After both NetWare WebAccess and GroupWise WebAccess are installed on your network, do the following: 1 Copy all NetWare WebAccess templates (.
-
Manual 99a 38 July 17, 2001 If you leave the field blank, the user will be required to enter both a username and a password. You should use this option if the user’s NIMS username and eDirectory username do not match. For more information on installing and configuring NIMS, go to Novell’s documentation Web site (http://www.novell.com/documentation). Web-based E-mail Gadget Configuration Provide the DNS name or IP address you assigned either the IMAP or POP3 server when you set it up.
-
Manual 99a 38 July 17, 2001 If you leave the field blank, the user will be required to enter both a username and a password. You should use this option if the user’s Notes username and eDirectory username do not match. For more information on installing and configuring Notes, see your Notes documentation. Microsoft Exchange Gadget Configuration Provide the URL for accessing your Exchange server. There are two possible options for the Default Username field. You can enter %cn% or leave the field blank.
-
Manual 99a 38 July 17, 2001 For example, if the IP address for NetWare WebAccess is 127.1.1.1 and the port number is 51080, then you would specify 127.1.1.1:51080/webaccess/. 2 Enter your username and password. NetWare WebAccess uses your eDirectory username and password, so you don’t need to remember or use a separate username or password. 3 Click on any of the gadgets to access the service or application represented by that gadget.
-
Manual 20 99a 38 NetWare WebAccess Overview and Installation NetWare WebAccess Overview and Installation 103-000142-001 August 30, 2001 Novell Confidential July 17, 2001
-
ConsoleOne User Guide August 29, 2001 Novell Confidential
-
Manual 99a June 14, 2001 37 Contents About This Guide 11 Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 1 Getting Started What’s New in This Release? . . . Why Use ConsoleOne? . . . . . . Accessibility Improvements . . . . Snap-Ins from Other Products . . . Installing and Starting ConsoleOne Windows . . . . . . . . . . . . NetWare . . . . . . . . . . . . Linux . . . . . . . . . . . . . . Solaris . . . . . . . . . . . . . Tru64 UNIX . . . . . . .
-
Manual Organizing Objects into Containers . . . . . . . . . . Creating an Organization Object. . . . . . . . . . Creating an Organizational Unit Object . . . . . . Creating a Locality Object . . . . . . . . . . . . . Creating a Country Object . . . . . . . . . . . . . Creating an Alias to an Object . . . . . . . . . . . Customizing Views . . . . . . . . . . . . . . . . . . Setting the Top Object in the Left Pane . . . . . .
-
Manual 5 99a Configuring Role-Based Administration 61 Setting Up Role-Based Services . . . . . . . . . . . . . . . . . . Installing RBS Schema Extensions to Your eDirectory Tree . . Defining RBS Roles . . . . . . . . . . . . . . . . . . . . . . . . Creating an RBS Role Object . . . . . . . . . . . . . . . . . Specifying the Tasks That RBS Roles Can Perform . . . . . . Assigning RBS Role Membership and Scope . . . . . . . . . . . Creating RBS Objects for Custom Applications . . . . . . . . . .
-
Manual 8 99a 37 June 14, 2001 Managing NetWare Server Resources 89 Viewing and Modifying Server and File System Information . . . . . . . . . . . . . Launching NetWare Management Portal from a Server Object . . . . . . . . . . Viewing or Modifying Information about a NetWare Server . . . . . . . . . . . . Viewing or Modifying Information about a Volume. . . . . . . . . . . . . . . . . Viewing Details on the Contents of a Volume or Folder . . . . . . . . . . . . . .
-
Manual 99a June 14, 2001 37 Designing Custom Reports. . . . . . . . . . . . . . . . . . . Adding JReport Designer to Your ConsoleOne Installation Creating a Custom Report Catalog . . . . . . . . . . . . . Creating or Modifying Report Forms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 . 109 . 109 . 110 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
-
Manual 10 ConsoleOne User Guide ConsoleOne User Guide 104-001316-001 August 29, 2001 Novell Confidential 99a 37 June 14, 2001
-
Manual 99a July 17, 2001 38 About This Guide This guide explains what ConsoleOneTM is and how to install, use, and troubleshoot it. HINT: This guide covers only the core ConsoleOne capabilities that you get if you download ConsoleOne from the Novell® Free Downloads Site (http:// www.novell.com/download). For information on ConsoleOne capabilities added by other products, see the documentation for those products.
-
Manual 12 ConsoleOne User Guide ConsoleOne User Guide 104-001316-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 1 99a 38 July 17, 2001 Getting Started ConsoleOneTM is a Java*-based tool for managing your network and its resources. By default, it lets you manage: Novell® eDirectoryTM objects, schema, partitions, and replicas NetWare® server resources If you install other Novell products, additional capabilities are snapped in to ConsoleOne automatically. For example, if you install Novell eDirectory, the capability to configure the LDAP interface to eDirectory is snapped in to ConsoleOne automatically.
-
Manual 99a 38 July 17, 2001 “Accessibility Improvements” on page 17 “Checking Partition Continuity” on page 82 In addition, the following capabilities have been enhanced in this release of ConsoleOne: Capability Enhancement “Browsing and Finding Objects” on page 30 If a tree is running NDS eDirectory 8.5 or later and is configured for DNS federation, you can access contexts in that tree whether or not you are logged in to it.
-
Manual 99a 38 July 17, 2001 Advantage Explanation Use on a Windows* computer or a NetWare server Because ConsoleOne is Java-based, it can run on Windows, NetWare, Linux*, Solaris*, and Tru64 UNIX*. The legacy NetWare Administrator, NDS ManagerTM, and Schema Manager tools run only on Windows. Manage the latest Novell products ConsoleOne lets you manage the latest Novell products and enhancements, whereas NetWare Administrator and other legacy tools aren’t being updated to do so.
-
Manual 99a 38 July 17, 2001 Advantage Explanation Assign ASN.1 identifiers to classes and attributes ConsoleOne lets you assign ASN.1 identifiers to object classes and attributes in the schema of your eDirectory tree. No legacy tool has this capability. See “Defining Custom Object Classes and Properties” on page 70. Set up role-based administration ConsoleOne lets you create roles in eDirectory so you can delegate administrative responsibilities.
-
Manual 99a 38 July 17, 2001 Accessibility Improvements ConsoleOne 1.3 includes enhancements in the software and documentation to make accessibility easier for people with disabilities. If you are unfamiliar with the control or shortcut keys used in Java software, you can find a list of these keys at the Swing Component Keystroke Assignments (http://java.sun.com/j2se/1.3/docs/api/javax/swing/doc-files/ Key-Index.html) Web site.
-
Manual 99a 38 July 17, 2001 If you install this release of ConsoleOne on the SYS volume of a NetWare server, it overwrites ConsoleOne 1.2x and disables ConsoleOne 1.1. However, existing ConsoleOne 1.2 snap-ins are retained. If you install this release of ConsoleOne locally on a workstation hard disk, other products such as eDirectory might not be able to find the right place to add snap-ins to the installation.
-
Manual 99a 38 July 17, 2001 System Requirements for Windows Operating System One of the following (or later) releases: Windows 95/98 with Novell ClientTM 3.2 Windows NT*/2000 with Novell Client 4.7 HINT: You can get Novell clients from the Novell Free Downloads Site (http:// www.novell.com/download). RAM Recommended: 128 MB Minimum: 64 MB HINT: 128 MB is required to generate reports in ConsoleOne.
-
Manual 99a 38 July 17, 2001 HINT: If you are installing on a Windows server and you will run ConsoleOne remotely through drive sharing, don’t forget to share the folder where you install ConsoleOne. Some Novell products require that this share be established before running the installation program. Starting ConsoleOne on Windows If ConsoleOne is installed locally on the Windows computer, simply doubleclick the ConsoleOne icon on the desktop.
-
Manual 99a 38 July 17, 2001 1 Download the Java Access Bridge from the Java Access Bridge (http:// java.sun.com/products/accessbridge) Web site. 2 Unpack the Java Access Bridge into the C:\ACCESSBRIDGE-1_0 directory > run the following command: C:\ACCESSBRIDGE-1_0\INSTALLER\INSTALL For more information on installing and configuring the Java Access Bridge, see the Java Access Bridge Readme (http://java.sun.com/ products/accessbridge/README.txt).
-
Manual 99a 38 July 17, 2001 Installing ConsoleOne on NetWare 1 Bring down Java and any Java applications that are running on the server, including the server GUI. You can do this by entering JAVA -EXIT at the console prompt. 2 Have all users who are currently running ConsoleOne remotely through a connection to the server exit their ConsoleOne sessions. 3 At a Windows workstation, map a drive letter to the root of the server’s SYS volume.
-
Manual 99a 38 July 17, 2001 Linux You can install and run ConsoleOne locally on a Linux computer. You can also run it from another computer through an X terminal (remote) session, if that computer has an X windowing subsystem. System Requirements for Linux IMPORTANT: This release of ConsoleOne for Linux has been tested only on the IBM* 1.3 Java runtime environment (JRE). This JRE is included in the ConsoleOne installation package in case you don’t have it.
-
Manual 99a 38 July 17, 2001 3 Locate the ConsoleOne installation program (the c1-install file) on the CD or by downloading it from the Web site as follows: Source Steps to Locate the c1-install File CD Change to the ConsoleOne/Linux directory. Web site 1. Click Management > ConsoleOne for Linux. 2. Follow the instructions on the Web site to download the ConsoleOne package (the c1linux.tar file). 3. Unpack the file you just downloaded (type tar xf c1linux.tar at the system prompt). 4.
-
Manual 99a 38 July 17, 2001 Solaris You can install and run ConsoleOne locally on a Solaris computer. You can also run it from another computer through an X terminal (remote) session, if that computer has an X windowing subsystem. System Requirements for Solaris IMPORTANT: This release of ConsoleOne for Solaris has been tested only on the Sun* 1.2.2-5a Java runtime environment (JRE). This JRE is included in the ConsoleOne installation package in case you don’t have it.
-
Manual 99a 38 Source Steps to Locate the c1-install File CD Change to the ConsoleOne/Solaris directory. July 17, 2001 Web site 1. Click Management > ConsoleOne for Solaris. 2. Follow the instructions on the Web site to download the ConsoleOne package (the c1sol.tar file). 3. Unpack the file you just downloaded (type tar xf c1sol.tar at the system prompt). 4. Change to the ConsoleOne/Solaris directory that was created by unpacking the download file.
-
Manual 99a 38 July 17, 2001 Tru64 UNIX You can install and run ConsoleOne locally on a Tru64 UNIX computer. You can also run it from another computer through an X terminal (remote) session, if that computer has an X windowing subsystem. System Requirements for Tru64 UNIX IMPORTANT: This release of ConsoleOne for Tru64 UNIX has been tested only on the Compaq* 1.2.2 Java runtime environment (JRE). This JRE is included in the ConsoleOne installation package in case you don’t have it.
-
Manual 99a 38 Source Steps to Locate the c1-install File CD Change to the ConsoleOne/Tru64 directory. July 17, 2001 Web site 1. Click Management > ConsoleOne for Tru64. 2. Follow the instructions on the Web site to download the ConsoleOne package (the c1tru64.tar file). 3. Unpack the file you just downloaded (type tar xf c1tru64.tar at the system prompt). 4. Change to the ConsoleOne/Tru64 directory that was created by unpacking the download file.
-
Manual 2 99a 38 July 17, 2001 Administration Basics In ConsoleOneTM, your network and its resources are presented as a set of objects that are organized into various containers, with My World at the top. Use the left pane to expand and collapse containers. Use the right pane to work with specific resources. Figure 1 ConsoleOne Management Tool In general, you perform administration tasks by browsing to an object, rightclicking it, and then selecting an action.
-
Manual 99a 38 July 17, 2001 This chapter explains how to perform essential tasks like finding objects, creating and modifying objects, and organizing objects into containers. For information on common Novell® eDirectoryTM object types, see Novell eDirectory Administration Guide > Object Classes and Properties.
-
Manual 99a July 17, 2001 38 Logging In to an eDirectory Tree 1 Click anywhere in the "NDS" container. 2 On the toolbar, click NDS Authenticate. 3 Fill in the Login dialog box. HINT: To see a list of the eDirectory trees you can log in to, click the tree icon. If the tree you want isn’t listed, see “Can’t Find the eDirectory Tree That I Want to Log In To” on page 113. 4 Click Login. The new tree is added to the NDS container in ConsoleOne.
-
Manual 99a 38 July 17, 2001 Filtering Extraneous Objects from View Any filters you apply to a view remain in effect for your current ConsoleOne session only. When you restart ConsoleOne, they are cleared. 1 Click View > Filter. 2 (Optional) In Name, enter a wildcard pattern to apply as a filter on the object names. An asterisk (*) is the only wildcard allowed. Example: xyz* hides all objects except those whose names start with "xyz.
-
Manual 99a July 17, 2001 38 5 In Object Type, select the type of object to find. 6 Click Find. In the search results list, you can right-click objects to perform actions just like in the ConsoleOne right pane. Finding Objects by Property Values 1 In the left pane, click the eDirectory container that you want to start searching from. 2 Click Edit > Find. 3 In Find Type, select Advanced. 4 In the query-building area of the dialog box, specify your search criteria. Click Help for details. 5 Click Find.
-
Manual 99a 38 July 17, 2001 Creating an Object 1 Right-click the container that you want to create the object in > click New > click Object. There are restrictions on the types of objects you can create in different container types. For details, see the documentation for your particular task or application. 2 Under Class, select the type of object > click OK.
-
Manual 99a July 17, 2001 38 Modifying an Object’s Properties 1 Right-click the object > click Properties. 2 Edit the property pages you want. Click Help for details on specific properties. See “Editing Object Properties” on page 36 for general information on using property pages. 3 Click OK.
-
Manual 99a 38 July 17, 2001 3 Click Save Old Name if you want to save the old name of the object. The old name is stored in the Other Name field of the object’s General Identification property page. 4 Click OK. Moving Objects 1 In the right pane, Shift+click or Ctrl+click the objects to select them. HINT: You can’t move a container object unless it’s a partition root. For details, see “Managing Partitions” on page 80. 2 Right-click your selection > click Move.
-
Manual 99a 38 July 17, 2001 In This Section “General Characteristics” on page 37 “Unique Characteristics of Editing Multiple Objects Simultaneously” on page 37 “Customizing Property Pages” on page 38 General Characteristics The table below describes the general characteristics of using property pages. Feature Notes OK, Cancel, Apply These buttons affect all the property pages.
-
Manual 99a 38 July 17, 2001 Feature Notes Check boxes Light-gray check boxes with a check in them are neutral. No changes will be made to these items in the existing objects when you click OK or Apply. White check boxes and dark-gray check boxes are live. Their settings will replace the existing settings in each object when you click OK or Apply. Missing items Individual fields and options are missing if they apply only to specific object instances.
-
Manual 99a July 17, 2001 38 Below are procedures to create common container types and aliases. For information on creating container types for specific applications, see the documentation for those applications. For general eDirectory tree design considerations, see Novell eDirectory Administration Guide > Designing Your Novell eDirectory Network.
-
Manual 99a 38 July 17, 2001 2 In Name, enter a name up to 64 characters long. Make sure to follow proper naming conventions. See Novell eDirectory Administration Guide > Naming Conventions for details. Example: Marketing 3 If you want to assign additional property values as part of the creation process for the container, select Define Additional Properties. For example, you might want to create a login script or set up intruder detection for the container. 4 Click OK.
-
Manual 99a July 17, 2001 38 Creating an Alias to an Object 1 Right-click the container that you want to create the alias in > click New > click Object. 2 Under Class, select Alias > click OK. 3 In Name, enter a name up to 64 characters long. Make sure to follow proper naming conventions. See Novell eDirectory Administration Guide > Naming Conventions for details.
-
Manual 99a 38 July 17, 2001 Setting the Top Object in the Left Pane The steps to use depend on which object you want to set at the top, as described in the table below. Object to Set at the Top Steps A container that’s below the current top object Right-click the container > click Set As Root. A container that’s above the current top object My World Double-click in the left pane until the container appears. Right-click in the left pane > click Show My World.
-
Manual 3 99a 38 July 17, 2001 Managing User Accounts Setting up a Novell® eDirectoryTM user account involves creating a User object and setting properties to control login and the user's network computing environment. You can use a template object to facilitate these tasks. You can create login scripts to cause users to be connected automatically to the files, printers, and other network resources they need when they log in.
-
Manual 99a 38 July 17, 2001 Creating a User Object 1 Right-click the container that you want to create the User object in > click New > click User. 2 Fill in the New User dialog box. Click Help for details. 2a To apply a template during creation of the user object, select Use Template. 2b To set additional user properties during creation of the user object, select Define Additional Properties. 3 Click OK. 4 If the Set Password dialog box appears, set the user’s login password > click OK.
-
Manual 99a 38 July 17, 2001 Setting Up Optional Account Features After creating a User object, you can optionally set up the user's network computing environment, implement extra login security features, and set up an accounting of the user’s NetWare server usage.
-
Manual 99a 38 July 17, 2001 Page Use to Time Restrictions Restrict the times when the user can be logged in. If the user will log in remotely, see “Login Time Restrictions for Remote Users” on page 48. Login Restrictions Limit the number of concurrent login sessions. Set a login expiration and lockout date. 3 Click OK. 4 To set up intruder detection for all the User objects in a container: 4a Right-click the container > click Properties.
-
Manual 99a 38 July 17, 2001 Setting Up Login Scripts A login script is a list of commands that executes when a user logs in. It is typically used to connect the user to network resources like files and printers. Login scripts execute on the user's workstation in the following order: 1. Container login script 2. Profile login script 3. User login script During login, if the system doesn’t find any of these login scripts, it skips to the next one in the list.
-
Manual 99a 38 July 17, 2001 Assigning a Profile to a User 1 Right-click the User or Template object that you want to assign the profile to > click Properties. Use a Template object if you haven’t created the User object yet. 2 On the Login Script page, click the browse button next to the Profile field > select the profile object > click OK. 3 Click OK. 4 Ensure that the user effectively has the Browse right to the Profile object and the Read right to the Login Script property of the profile object.
-
Manual 4 99a 38 July 17, 2001 Administering Rights Rights are system flags that you can set on individual network resources to control access to those resources. When you assign rights, you always link them with a specific user, group, or other Novell® eDirectoryTM object that is the trustee (possessor) of the rights. In ConsoleOneTM, you can grant a trustee rights to two different kinds of resources: eDirectory objects Rights to these resources are stored in and applied by eDirectory.
-
Manual 99a 38 July 17, 2001 Assigning Rights Explicitly When the default rights assignments in your eDirectory tree provide users with either too much or not enough access to resources, you can create or modify explicit rights assignments. When you create or modify a rights assignment, you start by selecting either the resource that you are controlling access to or the trustee (the eDirectory object that possesses, or will possess, the rights).
-
Manual 99a 38 July 17, 2001 2c To remove an object as a trustee, select the object > click Delete Trustee > Yes. The deleted trustee will no longer have explicit rights to the file or folder but might still have effective rights through inheritance or security equivalence. 3 Click OK. Controlling Access to the NetWare File System, by Trustee 1 Right-click the trustee (the object that possesses, or will possess, the rights) > select Properties.
-
Manual 99a 38 July 17, 2001 Controlling Access to Novell eDirectory, by Resource 1 Right-click the eDirectory resource (object) that you want to control access to > click Trustees of This Object. NOTE: Choose a container to control access to all the objects below it. 2 Edit the list of trustees and their rights assignments as needed. Click Help for details. 2a To modify a trustee’s rights assignment, select the trustee > click Assigned Rights > modify the rights assignment as needed > click OK.
-
Manual 99a 38 July 17, 2001 4a To add a rights assignment, click Add Object > select the object to control access to > click OK > assign the trustee’s rights > click OK. 4b To modify a rights assignment, select the object to control access to > click Assigned Rights > modify the trustee’s rights assignment as needed > click OK.
-
Manual 99a 38 July 17, 2001 Granting Security Equivalence by Membership 1 If you haven’t already done so, create the group or role object that you want the users to be security equivalent to. See “Creating and Manipulating Objects” on page 33 for details. 2 Grant the group or role the eDirectory and NetWare rights that you want the users to have. See “Assigning Rights Explicitly” on page 50 for details.
-
Manual 99a July 17, 2001 38 Setting Up an Administrator Over an Object’s Specific eDirectory Properties 1 If you haven't already done so, create the user, group, role, or container object that you want to make a trustee of the object’s specific properties. If you create a container as a trustee, all objects inside and below the container will have the rights you grant. You must make the property inheritable or the container and its members will not have rights below its level.
-
Manual 99a 38 July 17, 2001 Blocking Inherited Rights to a File or Folder on a NetWare Volume 1 Right-click the file or folder > click Properties. 2 On the Inherited Rights Filter page, edit the filter as needed. To block a right, deselect its check box. To let a right flow through, select its check box. The Supervisor right can’t be blocked. The other check boxes are disabled if you don't have the Supervisor or Access Control right to the file or folder.
-
Manual 99a July 17, 2001 38 In This Section “Viewing Effective Rights to a File or Folder on a NetWare Volume” on page 57 “Viewing Effective Rights to an eDirectory Object or Property” on page 57 Viewing Effective Rights to a File or Folder on a NetWare Volume 1 Right-click the file, folder, or volume > click Properties. Select a volume to view effective rights at the root of the file system. 2 On the Trustees page, click Effective Rights.
-
Manual 99a 38 July 17, 2001 About NetWare Rights This section describes the specific rights that users can have to files and folders on NetWare volumes, the possible sources of those rights, and how the NetWare file system calculates users’ effective rights to files and folders.
-
Manual 99a 38 July 17, 2001 Sources of Rights A given file or folder can have multiple rights assignments associated with it, each linked with a different trustee (possessor) of the rights. Rights to a folder are inherited by the trustee to items within the folder, so the trustee can exercise the rights on subordinate items without having an explicit assignment on those items. You can, however, place a filter on individual subordinate items to block specific rights from being inherited.
-
Manual 99a 38 July 17, 2001 4. Checks whether the user, or any of the objects that the user is security equivalent to, is assigned the Supervisor right at the current level. If so, the user effectively has all rights from this level down in the file system, and the rest of this process is skipped. If not, continues with the next step. 5. Does the following for the user and each object that the user is security equivalent to: a.
-
Manual 5 99a 38 July 17, 2001 Configuring Role-Based Administration ConsoleOneTM gives you the option to extend the schema of your Novell® eDirectoryTM tree to allow the creation of role-based services (RBS) objects. This enables administration applications to expose their functions as RBS module and task objects in your tree. You can then create RBS role objects that define the particular tasks that different users can perform in those administration applications.
-
Manual 99a 38 July 17, 2001 Installing RBS Schema Extensions to Your eDirectory Tree 1 Click anywhere in an eDirectory tree. 2 Click Tools > Install. 3 Follow the instructions in the wizard to complete the installation. Be sure to select Role Based Services on the second screen. Help is available throughout the wizard. Defining RBS Roles RBS roles specify the tasks that users are authorized to perform in specific administration applications.
-
Manual 99a 38 July 17, 2001 Specifying the Tasks That RBS Roles Can Perform 1 Right-click an RBS role or RBS task object > click Properties. RBS task objects are located only in RBS module containers. 2 On the Role Based Services tab, make the associations you want: For an RBS role, select the Role Content page > edit the list of tasks that the role can perform. For an RBS task, select the Member Of page > edit the list of roles that can perform the task. 3 Click OK.
-
Manual 99a 38 July 17, 2001 If you want a single role membership to have multiple, non-overlapping scopes (such as two different branches of the eDirectory tree), you must list that role membership multiple times, each with a different scope. 3 Click OK. Creating RBS Objects for Custom Applications Typically, administration applications that use RBS objects add the needed objects to your eDirectory tree automatically during installation.
-
Manual 99a 38 July 17, 2001 In This Section “Creating an RBS Module Object” on page 65 “Creating an RBS Task Object” on page 66 “Creating an Object That Represents a Non-eDirectory Scope” on page 66 Creating an RBS Module Object 1 Right-click the organization or organizational unit that you want to create the RBS module object in > click New > click Object. 2 Under Class, select RBS:Module > click OK. 3 In Name, enter a name for the module.
-
Manual 99a 38 July 17, 2001 Creating an RBS Task Object 1 Right-click the RBS module container that you want to create the RBS task object in > click New > click Object. 2 Under Class, select RBS:Task > click OK. 3 In Name, enter a name for the task. Be sure to follow proper eDirectory naming conventions. (See Novell eDirectory Administration Guide > Naming Conventions.
-
Manual 99a 38 July 17, 2001 4 In Name, enter a name for the scope. Be sure to follow proper eDirectory naming conventions. (See Novell eDirectory Administration Guide > Naming Conventions.) Example: DNS Scope com_xyz_usa 5 Depending on how the administration application will use the scope object, complete the appropriate steps: Application Will Read the Object to Determine the Actual Scope to Enforce? Steps No Click OK. You’re done creating the scope object. Yes 1.
-
Manual 68 ConsoleOne User Guide ConsoleOne User Guide 104-001316-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 6 99a 38 July 17, 2001 Extending the Novell eDirectory Schema The schema of your Novell® eDirectoryTM tree defines the classes of objects that the tree can contain, such as users, groups, and printers. It specifies the properties (attributes) that comprise each object type, including those that are required when creating the object and those that are optional. For details, see Novell eDirectory Administration Guide > Object Classes and Properties and Schema.
-
Manual Figure 2 99a 38 July 17, 2001 Schema Manager To extend the schema, see the appropriate section of this chapter. In This Chapter “Defining Custom Object Classes and Properties” on page 70 “Defining and Using Auxiliary Classes” on page 72 “Deleting Unused Classes and Properties” on page 77 Defining Custom Object Classes and Properties You can define your own custom types of properties and add them as optional properties to existing object classes as needed.
-
Manual 99a 38 July 17, 2001 Defining a Custom Property 1 Click anywhere in the eDirectory tree whose schema you want to extend. 2 Click Tools > Schema Manager. 3 On the Attributes tab, click Create. 4 Follow the instructions in the wizard to define the new property. Help is available throughout the wizard. Adding Optional Properties to a Class 1 Click anywhere in the eDirectory tree whose schema you want to extend. 2 Click Tools > Schema Manager.
-
Manual 99a 38 July 17, 2001 Defining and Using Auxiliary Classes An auxiliary class is a set of properties (attributes) that are added to particular eDirectory object instances rather than to an entire class of objects. For example, an e-mail application could extend the schema of your eDirectory tree to include an E-mail Properties auxiliary class and then extend individual objects with those properties as needed. With Schema Manager, you can define your own auxiliary classes.
-
Manual 99a 38 July 17, 2001 Extending an Object with the Properties of an Auxiliary Class 1 In the main ConsoleOne window, right-click the object > click Extensions of This Object. 2 Depending on whether the auxiliary class that you want to use is already listed under Current Auxiliary Class Extensions, complete the appropriate action: Auxiliary Class Is Action Already Listed? Yes Quit this procedure. See instead “Modifying an Object’s Auxiliary Properties” on page 75.
-
Manual 99a 38 July 17, 2001 Extending Multiple Objects Simultaneously with the Properties of an Auxiliary Class 1 In the ConsoleOne right pane, Shift+click or Ctrl+click the objects to select them. The objects don’t have to be the same type. 2 Right-click your selection > click Extensions of Multiple Objects.
-
Manual 99a 38 July 17, 2001 Screen Notes Extensions tab Both mandatory and optional properties of the auxiliary class might be listed. Click Help for details on specific properties. New dialog box Only mandatory properties of the auxiliary class are listed. You must know the syntax of a property to set it correctly. For details, see Novell eDirectory Administration Guide > Schema. After setting the mandatory properties, you can set optional properties as explained below.
-
Manual 99a 38 July 17, 2001 Deleting Auxiliary Properties from an Object 1 In the main ConsoleOne window, right-click the object > click Extensions of This Object. 2 In the list of current auxiliary class extensions, select the auxiliary class whose properties you want to delete. 3 Click Remove Extension > Yes. This deletes all the properties added by the auxiliary class except for any that the object already had innately.
-
Manual 99a 38 July 17, 2001 Deleting Unused Classes and Properties You can delete unused classes and properties (attributes) that aren’t part of the base schema of your eDirectory tree. We recommend that you only delete classes that you’ve defined and that you’re sure aren’t being used. ConsoleOne only prevents you from deleting classes that are currently being used in locally replicated partitions.
-
Manual 78 ConsoleOne User Guide ConsoleOne User Guide 104-001316-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 7 99a 38 July 17, 2001 Partitioning and Replicating Novell eDirectory A partition is a subdivision of your Novell® eDirectoryTM tree that can be stored and replicated as an independent unit across multiple servers. If your tree is large or spans WAN links, you can partition and replicate it to improve network performance and fault tolerance. For details, see Novell eDirectory Administration Guide > Replicas and Partitions.
-
Manual 99a 38 July 17, 2001 In This Chapter “Managing Partitions” on page 80 “Managing Replication” on page 85 “About Replica States” on page 87 Managing Partitions By default, a small eDirectory tree is stored as a single partition that is replicated on the first three servers in the tree. The procedures below explain how to perform further partitioning operations.
-
Manual 99a 38 July 17, 2001 Splitting a Partition (Creating a Child Partition) 1 Make sure you understand the overall process for creating a partition. See Novell eDirectory Administration Guide > Creating a Partition. 2 Right-click the container that will be the root of the new (child) partition > click Views > click Partition and Replica View. The right pane should display an empty replica list. If the list isn’t empty, the container is already a partition root—select a different container.
-
Manual 99a 38 July 17, 2001 Checking Partition Continuity Partition Continuity helps you identify whether any of a partition's replicas are experiencing synchronization errors. It does this by examining all of the servers holding replicas of a selected partition and verifying that each server has the same information for the partition's replica list (or replica ring). This operation is also known as "walking the replica ring.
-
Manual 99a 38 July 17, 2001 You might also see icons representing unreadable replicas. This does not necessarily signify that the servers can't talk.It might simply indicated that the client cannot contact the server for information. You can check partition continuity in ConsoleOne from the Partition and Replica View. 1 Click View > Partition and Replica View. 2 Select the partition whose synchronization status you want to view. 3 Click Partition Continuity .
-
Manual 99a 38 July 17, 2001 Synchronizing Replica Information You can synchronize the replica information of every server that holds a replica of the selected partition with the replica information on the other servers. 1 Click Repair > Synchronize Immediately. Receiving Updates This operation forces the replica on the chosen server to receive all eDirectory objects from the master replica of the partition. While in process, this operation marks the replica on the chosen server as a new replica.
-
Manual 99a 38 July 17, 2001 The other replicas of the partition will combine the new objects sent with the objects they already have. If the other replicas have data in addition to the data sent to them, they will retain that data. Although eDirectory automatically synchronizes the directory data among replicas (so that each replica is sent the most recently updated directory objects), this operation lets you manually synchronize the directory objects of replicas if any replicas get out of sync.
-
Manual 99a 38 July 17, 2001 2 View more information on a particular replica, such as its last synchronization time and any errors. 2a In the right pane, select the replica. 2b On the toolbar, click the Information button. The Replica Information dialog box appears. Click Help for details on individual information fields. If there are synchronization errors, click the question mark next to the error number for details.
-
Manual 99a 38 July 17, 2001 Modifying a Replica 1 In the left pane, right-click either the server that holds the replica, or the root container of the partition that the replica is a copy of (it should have an icon next to it) > click Views > click Partition and Replica View. The right pane displays a list of the replicas on the selected server or of the selected partition, along with the type and state of each replica.
-
Manual 99a 38 July 17, 2001 State Means That the Replica Is On Currently not undergoing any partition or replication operations New Being added as a new replica on the server Dying Being deleted from the server Dead Done being deleted from the server Master Start Being changed to a master replica Master Done Done being changed to a master replica Change Type Being changed to a different type of replica Locked Locked in preparation for a partition move or repair operation Transition Mov
-
Manual 8 99a 38 July 17, 2001 Managing NetWare Server Resources You can manage individual NetWare® servers and the file system resources on both traditional NetWare volumes and NSS volumes. For example, you can view and modify basic server information, launch NetWare Management Portal, assign server operators, copy and move files and folders, and salvage and purge deleted files.
-
Manual 99a 38 July 17, 2001 Viewing and Modifying Server and File System Information You can view and modify information about NetWare servers, volumes, files, and folders. For volumes, files, and folders, this information includes attributes, owners, and time of last modification or backup. You can also launch NetWare Management Portal from a server object in your eDirectory tree. HINT: Attributes control how files and folders are handled during processes like compression, backup, and migration.
-
Manual 99a 38 July 17, 2001 If you get an error message, the target server might not be running PORTAL.NLM. Otherwise, the NetWare Portal page should appear in your Web browser. For information on using it, see NetWare 5.1 Documentation > NetWare Management Portal Utility Guide (http://www.novell.com/ documentation/lg/nw51/port_enu/data/a3l0k9x.html). Viewing or Modifying Information about a NetWare Server 1 Right-click the NCP server object > click Properties.
-
Manual 99a 38 July 17, 2001 Viewing Details on the Contents of a Volume or Folder 1 In the left pane, right-click the volume or folder > click Views > Details View. The right pane lists the files and folders and their last modification date and current attribute settings. To resize a column, drag its border. 2 To interpret the information in the Attributes column, see NetWare 5.1 Documentation > Setting Directory or File Attributes (http:// www.novell.com/documentation/lg/nw51/trad_enu/data/ h8gdk9xq.
-
Manual 99a 38 July 17, 2001 4 On the Attributes page, set the attributes you want. For details, see NetWare 5.1 Documentation > Setting Directory or File Attributes (http://www.novell.com/documentation/lg/nw51/trad_enu/ data/h8gdk9xq.html). 5 (Volumes only) On the Dates and Times page, modify the information you want. Click Help for details. 6 On the other pages, modify the information you want. Click Help for details. 7 Click OK.
-
Manual 99a 38 July 17, 2001 Creating a File or Folder 1 Right-click the folder or volume that you want to create the new file or folder in > click New > click Object. 2 Under Class, select File or Directory > click OK. 3 In Name, enter a name for the new file or folder > click OK. If you create a file using this procedure, it will be empty. Renaming a File or Folder 1 Right-click the file or folder > click Rename. 2 In New Name, enter a new name for the file or folder > click OK.
-
Manual 99a 38 July 17, 2001 Salvaging Deleted Files and Folders 1 In the left pane, right-click the volume or folder that the files and folders were deleted from > click Views > click Deleted File View. The deleted files and folders appear in the right pane. To resize a column in the right pane, drag its border. 2 Ctrl+click or Shift+click the files and/or folders that you want to salvage. 3 Right-click your selection > click Salvage. Salvaging a folder doesn’t salvage its contents.
-
Manual 99a 38 July 17, 2001 Restricting a User's Volume Space 1 Right-click the volume > click Properties > select the Users with Space Restrictions page. 2 In the User Name column, if the user whose space you want to restrict is already listed, click the user > Modify. Otherwise, click Add to add the user. 3 In the dialog box that appears, select Limit Volume Space > enter a space limit in the field > click OK. 4 Click OK in the Properties dialog box.
-
Manual 99a 38 July 17, 2001 Creating eDirectory Objects to Facilitate File Management When you install NetWare 4.x, 5.x, or 6 on a server, objects are automatically created in the eDirectory tree to let you manage the server and its volumes. You can create additional Server and Volume objects to manage the resources of servers that are in other eDirectory trees or that are running earlier NetWare versions.
-
Manual 99a 38 July 17, 2001 Creating a Volume Object 1 Make sure the eDirectory tree contains a Server object for the NetWare server that hosts the volume. 2 Make sure the NetWare server is up and the volume is mounted and accessible on the network. 3 Right-click the container that you want to create the Volume object in > click New > Object. 4 Under Class, select Volume > click OK.
-
Manual 9 99a 38 July 17, 2001 Generating Reports This release of ConsoleOneTM includes some predefined report forms that you can use to generate reports on the objects in your eDirectoryTM tree. Here’s an example of one such report: Figure 5 Trustee Assignments Report Dialog Box The predefined eDirectory report forms are packaged into three report catalog objects that you can add to your eDirectory tree. Other Novell® products might provide additional report catalogs that you can add to your tree.
-
Manual 99a 38 July 17, 2001 In This Chapter “Available Reports” on page 100 “Setting Up Reporting” on page 103 “Generating, Printing, and Saving Reports” on page 105 “Designing Custom Reports” on page 108 Available Reports The Novell-defined report forms included in this release of ConsoleOne are described below. Only the core report forms that ship with ConsoleOne are described.
-
Manual 99a July 17, 2001 38 eDirectory User Security Reports This report catalog contains report forms that let you generate reports on eDirectory login and rights security for the users in your eDirectory tree. The following table describes the user security reports: Report Information Provided for Each Object Disabled User Accounts Name of disabled user account, other (unofficial) names of the user, status of the account—either disabled or expired (expiration date and time).
-
Manual 99a 38 July 17, 2001 Report Information Provided for Each Object User Password Requirements Username, other (unofficial) names for the user, whether a login password is required, whether the user can change his or her own password, minimum password length, whether the last eight passwords must be unique, maximum number of days a password can be used, number of grace logins allowed, number of grace logins remaining, password expiration date and time.
-
Manual 99a 38 July 17, 2001 Setting Up Reporting The reporting setup you need depends on the kind of reports you want to generate, as summarized in the table below. Steps for completing the reporting setup are given after the table. IMPORTANT: Reporting works only if you run ConsoleOne on a Windows computer with 128 MB of RAM. It doesn’t work if you run ConsoleOne on NetWare, Linux, Solaris, or Tru64.
-
Manual 99a 38 July 17, 2001 Installing Reporting Services Schema Extensions 1 Click anywhere in an eDirectory tree. 2 Click Tools > Install. 3 Follow the instructions in the wizard to complete the installation. Be sure to select Reporting Services on the second screen. Help is available throughout the wizard. Installing Novell-Defined Report Catalogs 1 Select the container that you want to put the Report Catalog objects in. HINT: You can install the Catalog objects in as many containers as you want.
-
Manual 99a July 17, 2001 38 Configuring the Data Source Used by a Report Catalog 1 In the Windows control panel, double-click the ODBC icon. 2 On the User DSN tab, click Add > select the ODBC driver to be used > click Finish. Select Novell ODBC Driver for NDS if you want to use eDirectory as your data source. This is required for the Novell-defined eDirectory report catalogs.
-
Manual 99a 38 July 17, 2001 Specifying the Part of Your eDirectory Tree (Context) to Report On 1 Right-click the Report Catalog object that you will use to generate the reports > click Properties. 2 On the Identification page, click the browse button next to the Report Context field > select the eDirectory container that is to be the top of your reporting context > click OK. Select the tree object to report on the entire tree. (This is the default.
-
Manual 99a July 17, 2001 38 Saving a Report 1 Generate the report as explained above. 2 On the toolbar of the View Report window, click Save. 3 Enter a name for the report, or select a previously saved report to overwrite. Click Help for details. 4 Click Save. Exporting a Report 1 Generate the report as explained above. 2 On the toolbar of the View Report window, click Export Report. 3 Select the filename, path, and format to export to. Click Help for details. 4 Click OK.
-
Manual Available Queries Action Only the default query is listed Click Add. 99a 38 July 17, 2001 NOTE: You can’t customize the default query on this page. To customize it, see instead “Designing Custom Reports” on page 108. Additional (nondefault) queries are listed Select the query that you want to customize > click Open. 4 In the query-building dialog box, specify the data-selection criteria that you want to be used to generate the report. Click Help for details.
-
Manual 99a July 17, 2001 38 Adding JReport Designer to Your ConsoleOne Installation 1 From the Windows computer where ConsoleOne is installed, or from a Windows computer with a drive mapped to the NetWare server where ConsoleOne is installed, start a Web browser and go to the Novell ConsoleOne site (http://www.novell.com/products/consoleone). 2 Locate and click the JReport Designer link.
-
Manual 99a 38 July 17, 2001 5 Click OK. 6 In the Add Table dialog box, select the database tables that your report forms will query > click Add. Repeat this action as needed. If you are using the Novell-defined NDS Reporting data source, most of the database tables correspond to eDirectory object classes. 7 Click Done in the Add Table dialog box. 8 Create the catalog’s report forms as explained below.
-
Manual 10 99a July 17, 2001 38 Troubleshooting This chapter gives solutions to problems you might encounter when setting up or using ConsoleOneTM. If this information doesn’t solve your problem, you can try the following contacts: Contact Use to Get Novell Support site (http:// support.novell.com/) or the vendor you purchased the software from Free technical support 1-800-NETWARE Direct, charged Novell® technical support Novell Free Downloads site (http:// www.novell.
-
Manual 99a 38 July 17, 2001 ConsoleOne Malfunctions or Won’t Start Possible Cause Solution You are starting ConsoleOne on a Windows computer that doesn’t have the required drive mapping or Novell client software. Make sure you have the system requirements and drive mappings specified for “Windows” on page 18. You are starting ConsoleOne on a NetWare® server that doesn’t have NJCL 2 installed properly. Remove the \NJCLV2 folder from SYS:JAVA on your server and reinstall ConsoleOne.
-
Manual 99a 38 July 17, 2001 Performance Is Sluggish Possible Cause Solution This is often due to insufficient RAM. Make sure ConsoleOne is running on the system configuration Under tight memory conditions, recommended in “Installing and Starting ConsoleOne” on ConsoleOne might gradually slow down. page 18. Adding more RAM is the biggest performance booster, especially if you are generating reports. If ConsoleOne has been running for a long time, you might want to restart it.
-
Manual 99a 38 July 17, 2001 Can’t Create Volume or Directory Map Object Possible Cause Solution The eDirectory tree you are trying to create the Volume or Directory Map object in doesn’t contain a NetWare server. The tree must contain a NetWare server that hosts a NetWare volume or you can’t create a Volume or Directory Map object in the tree.
-
Manual 99a 38 July 17, 2001 Field or Option is Disabled Possible Cause Solution You might need to modify some other setting before the field or option becomes available. Click Help for information about using specific fields and options. You might not have rights to access the information or perform the operation associated with the field or option. Check your effective rights to the eDirectory property associated with the field or option. (See “Viewing Effective Rights” on page 56.
-
Manual 99a 38 July 17, 2001 Quirk or Limitation Workaround Not all the values of a multi-value eDirectory property are shown if there are too many to fit in the RAM available to ConsoleOne. Increase the available RAM (try closing all other programs) and redisplay the list. Currently, Novell eDirectoryTM returns all the property values to ConsoleOne at once. A future eDirectory release will return them one chunk at a time. Property names in lists are always shown in English.
-
Novell iManage Administration Guide August 29, 2001 Novell Confidential
-
Manual 99a July 17, 2001 38 Contents About This Guide 7 Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1 Getting Started 9 System Requirements . . . . . . . . . Installing iManage . . . . . . . . . . . Accessing iManage . . . . . . . . . . Opening iManage in Regular Mode Opening iManage in Simple Mode . 2 3 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
-
Manual 6 99a Novell iManage Administration Guide Novell iManage Administration Guide 103-000182-001 August 29, 2001 Novell Confidential 38 July 17, 2001
-
Manual 99a July 17, 2001 38 About This Guide iManage is a browser-based tool used for administering, managing, and configuring Novell® eDirectoryTM objects. iManage gives you the ability to assign specific tasks or responsibilities to users and to present the user with only the tools (with the accompanying rights) necessary to performs those sets of tasks. In NetWare® 6, you can use iManage to administer iPrint, DNS/DHCP, and Novell Licensing Services.
-
Manual 8 99a Novell iManage Administration Guide Novell iManage Administration Guide 103-000182-001 August 29, 2001 Novell Confidential 38 July 17, 2001
-
Manual 1 99a 38 July 17, 2001 Getting Started This section contains the following information: “System Requirements” on page 9 “Installing iManage” on page 9 “Accessing iManage” on page 10 System Requirements iManage supports the following browsers: Internet Explorer 5.5 Netscape* 4.6, 4.7, and 6.1 iManage automatically opens in Simple mode with Netscape 4.6 or 4.7. For more information, see “Opening iManage in Simple Mode” on page 10.
-
Manual 99a 38 July 17, 2001 Accessing iManage You can open iManage in either of the following modes: “Opening iManage in Regular Mode” on page 10 “Opening iManage in Simple Mode” on page 10 Opening iManage in Regular Mode 1 In a Web browser, enter the following in the address (URL) field: https://server’s_IP_address:2200/eMFrame/iManage.html For example: https://137.65.135.150:2200/eMFrame/iManage.html 2 Log in using your username, context, password, and eDirectory tree name.
-
Manual 2 99a July 17, 2001 38 Administration Basics This chapter explains how to perform essential tasks such as creating and deleting objects, and using the iManage search and browse features. In This Chapter “Managing User Accounts” on page 11 “Organizing Objects into Containers” on page 12 “Creating Group Objects” on page 14 “Deleting Objects” on page 14 “Browsing and Finding Objects” on page 14 Managing User Accounts A user account is a User object in the Novell® eDirectoryTM tree.
-
Manual 99a 38 July 17, 2001 4 Enter a username and last name for the User object. 5 Specify the name and context of the container you want this User object created in. 6 Click OK. Modifying a User Account To modify the properties of a User object you added in iManage, use ConsoleOneTM. See Managing User Accounts in ConsoleOne User Guide for more information. To assign roles and tasks to a User object, see “Assigning RBS Role Membership and Scope” on page 24.
-
Manual 99a July 17, 2001 38 Normally, the Organization object represents your company, although you can create additional Organization objects under Tree. This is typically done for networks with distinct geographical districts or for companies with separate eDirectory trees that have merged. 1 Click the Roles and Tasks button . 2 Click eDirectory Administration > Create Object. 3 Select Organization from the list of object types > click Next.
-
Manual 99a 38 July 17, 2001 Creating Group Objects A Group object represents a set of User objects.You can create Group objects to help you manage sets of User objects. While container objects let you manage all User objects in that container, Group objects are for subsets within a container or in multiple containers. Group objects give you a way to assign roles and tasks to a number of User objects at the same time. For more information, see “Assigning RBS Role Membership and Scope” on page 24.
-
Manual 99a July 17, 2001 38 In This Section “Using Browse” on page 15 “Using Search” on page 15 Using Browse 1 Click the Object Selector button . 2 Use the following options to browse for an object: Option Description Lets you move down one level in the tree. Lets you move up one level in the tree. Look In Lets you enter the name of the container whose contents you want to view. To use this option, enter the name of the object you want > click Browse.
-
Manual 99a 38 July 17, 2001 4 In the Search For Name field, enter the name of the object you want to search for. You can use * as a wildcard character in this field. For example, g* finds all objects starting with g, such as Germany or Greg, and *te finds all entries ending in te, such as Kate or Corporate. 5 Click Search.
-
Manual 3 99a 38 July 17, 2001 Configuring Role Based Services iManage gives you the ability to assign specific tasks or responsibilities to users and to present the user with only the tools (with the accompanying rights) necessary to performs those sets of tasks. Role Based Services (RBS) gives you a way to focus the user on a specified set of tasks and objects as determined by their roles. What users see when they access iManage is based on their role assignments in Novell® eDirectoryTM.
-
Manual 99a 38 July 17, 2001 On the left, a list of available roles and tasks that the user has access to is displayed. As the user selects a task on the left, the tools necessary to execute the task are displayed on the right.
-
Manual 99a 38 July 17, 2001 NOTE: The roles and tasks will vary depending on the tree and the user. Role Based Services is represented by objects defined in eDirectory. The base eDirectory schema has been extended to accommodate this information.
-
Manual Object 99a 38 July 17, 2001 Description rbsCollection A container object that holds all RBS role and task objects. Specifies the tasks that users (members) are authorized to perform. Defining a role includes creating an rbsRole object and specifying the tasks that the role can perform. rbsRole rbsRoles can only be created in an rbsCollection container. Represents a specific function, such as resetting login passwords. rbsTask rbsTask objects are located only in rbsModule containers.
-
Manual 99a 38 July 17, 2001 Setting Up Role Based Services Before you can add RBS objects to your eDirectory tree, the schema of the tree must be extended to allow RBS object types, and you must create an rbsCollection container to hold all other RBS objects. Typically, the schema extension is performed automatically during the installation of NetWare® 6. However, you can complete the procedures below to ensure that your tree has the needed schema extensions, container object, and product packages.
-
Manual 99a 38 July 17, 2001 4 Specify an rbsCollection Container to hold the RBS objects for this plug- in. 5 Click OK. Modifying RBS Collection Owners The user who installed the NetWare 6 server is automatically added as the owner of the first rbsCollection container at install time. For additional rbsCollection containers, the user who creates them is automatically assigned as the owner of the collection.
-
Manual 99a 38 July 17, 2001 For information on assigning members to a role, see “Assigning RBS Role Membership and Scope” on page 24. In This Section “Creating an rbsRole Object” on page 23 “Modifying the Tasks That rbsRole Objects Can Perform” on page 24 “Deleting a Role Based Services Object” on page 24 Creating an rbsRole Object 1 Click the Configure button . 2 Click Role Management > Create Role. 3 Enter a name for the role in the Role Name field.
-
Manual 99a 38 July 17, 2001 Modifying the Tasks That rbsRole Objects Can Perform Each RBS role has a set of available tasks associated with it. You can choose which tasks are assigned to a particular role, adding or removing tasks as necessary. 1 Click the Configure button . 2 Click Role Management > Modify Role. 3 Click in the Task column of the role you want to modify. 4 Add or remove tasks from the Assigned Task list. 5 Click OK.
-
Manual 99a 38 July 17, 2001 A member can perform multiple roles and tasks. You can also assign the same task to multiple members. 1 Click the Configure button . 2 Click Role Management > Modify Role. 3 Click in the Members column of the role you want to modify. 4 In the Name field, specify an object name (a User, Group, or Container object) > click Add. To assign this role to multiple objects, repeat this step as many times as necessary.
-
Manual 26 99a Novell iManage Administration Guide Novell iManage Administration Guide 103-000182-001 August 29, 2001 Novell Confidential 38 July 17, 2001
-
Manual 4 99a July 17, 2001 38 Troubleshooting This section contains solutions to problems you might encounter when setting up or using iManage.
-
Manual 99a 38 July 17, 2001 Assigning the Tree Root as a Scope When a Role Based Services rbsRole object scope is set to the tree root and DSREPAIR is run, DSREPAIR invalidates the rbsRole object and makes it unusable. This happens only when you make the assignment to the tree root; any other scope in the tree is fine. To prevent this, do not assign the tree root as a scope. For more information, see Chapter 3, “Configuring Role Based Services,” on page 17.
-
Manual 99a July 17, 2001 38 Viewing and Entering Characters in Your Preferred Language To view and input characters in your preferred language, set your language to the first language in the list of available languages. If your preferred language is not available, you will need to install it. For more information on setting a preferred language in Netscape, see Basic Setup Information for International Users (http://home.netscape.com/eng/intl/ basics.html#setup).
-
Manual 30 99a Novell iManage Administration Guide Novell iManage Administration Guide 103-000182-001 August 29, 2001 Novell Confidential 38 July 17, 2001
-
NetWare Remote Manager Administration Guide Novell NetWare 6 ® www.novell.
-
Manual 99a June 14, 2001 37 Contents NetWare Remote Manager Administration Guide 7 Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1 Introducing NetWare Remote Manager 9 New Features in NetWare 6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2 Accessing NetWare Remote Manager System Requirements . . . . . . . . . . . . . . . . . . . . . . . Accessing NetWare Remote Manager . . . . . . . . . . . . . . .
-
Manual Managing Server Hardware . . . . . . . . . . . . . . Accessing Processor Information . . . . . . . . . Viewing Storage and Network Adapter Information Viewing PCI Device Information . . . . . . . . . . Viewing Hardware Resource Information . . . . . Managing Novell eDirectory . . . . . . . . . . . . . . Walking the eDirectory Tree . . . . . . . . . . . . Viewing eDirectory Partitions and Replicas . . . . Accessing Other eDirectory Management Tools. . Using Server Groups . . . . . . . . . . . . . . .
-
Manual 99a 38 July 17, 2001 NetWare Remote Manager Administration Guide NetWare® Remote Manager is a browser-based utility that you can use to manage your NetWare server from any network workstation running Netscape* 4.5 or later, or Internet Explorer 5 or later.
-
Manual 8 99a 38 NetWare Remote Manager Administration Guide NetWare Remote Manager Administration Guide 103-000144-001 August 30, 2001 Novell Confidential July 17, 2001
-
Manual 1 99a 38 July 17, 2001 Introducing NetWare Remote Manager NetWare® Remote Manager (PORTAL NLMTM) is a utility that provides most of the functionality of MONITOR, along with some functionality from other utilities available at the server console, but is available from a Web browser. You can use NetWare Remote Manager to monitor your server’s health, change the configuration of your server, or perform diagnostic and debugging tasks.
-
Manual 99a 38 July 17, 2001 Configuring Set parameters Setting schedules for running console commands Shutting down, restarting, or resetting a server Troubleshoot server problems by Finding CPU hogs Finding high memory users Tracing abend sources Locating server process hogs Finding disk space hogs Seeing who is using an open file New Features in NetWare 6 NetWare Remote Manager is the new name for the utility formerly known in NetWare 5.1 as NetWare Management Portal.
-
Manual 99a 38 July 17, 2001 Logging in The default front page for the non-logged-in user is gone. When you point your browser to the NetWare 6 server, you will see a Login window before seeing any page in NetWare Remote Manager. For more information, see “Accessing NetWare Remote Manager” on page 14. Admin and Non-admin view If you log in to NetWare Remote Manager as a user with the Supervisor right to the Server object, you can access and perform all management options.
-
Manual 12 99a 38 NetWare Remote Manager Administration Guide NetWare Remote Manager Administration Guide 103-000144-001 August 30, 2001 Novell Confidential July 17, 2001
-
Manual 2 99a 38 July 17, 2001 Accessing NetWare Remote Manager This chapter includes the following information: System Requirements (page 13) Accessing NetWare Remote Manager (page 14) Understanding the Layout of NetWare Remote Manager (page 15) Changing the Configuration of NetWare Remote Manager Views (page 17) Accessing Online Help (page 21) Accessing Novell Web Pages (page 21) System Requirements (page 13) System Requirements NetWare® 5.1 or later Netscape 4.
-
Manual 99a 38 July 17, 2001 Accessing NetWare Remote Manager To access NetWare Remote Manager, complete the following: 1 Open the Web browser at your workstation. 2 Point the browser to the URL of the server you want to manage by entering the following in the address (URL) field: http://server’s TCP/IP address For example: http://137.65.123.
-
Manual 99a 38 July 17, 2001 If the Set Bindery Context = line has been removed from the AUTOEXEC.NCF file, enter the full context of the user you are logging in as. If you log in as a user without the Supervisor right to the Server object, you will see only pages that display the volumes, directories, and files that you have access to. You can view files (where you have read access) and upload files into directories where you have write access.
-
Manual Overall Health Indicator Header Frame Navigation Frame 99a 38 July 17, 2001 Online Help Main Content Frame The header frame contains general information about the server and links to the Volumes, Health Monitor, and Configuration pages and an Exit link to close the browser window. The Volumes page is considered the Home page. The Overall Health indicator also links to the Server Health Monitoring page.
-
Manual 99a 38 July 17, 2001 Changing the Configuration of NetWare Remote Manager Views To access the NetWare Remote Manager Configuration Options page, log in to the server as a user with the Supervisor right to the Server object, and then click the Configure icon in the header frame.
-
Manual 99a 38 July 17, 2001 The status information on a specific page or the server's overall health does not change until you manually reload or refresh the overall browser view or the specific status page. To change the browser display after changing the accessibility options, refresh or reload the Web page in the browser. Whether the accessibility options are enabled or disabled, you can be notified of a change in the server's health status through e-mail notification.
-
Manual 99a 38 July 17, 2001 this file is not viewable while the logging is turned on unless you view it in NetWare Remote Manager. To view the file in its raw form, logging must be turned off so the file is no longer open. The Reset Current HTTP Log File option clears the current log and begins a new one. Restarting the log is useful if you have made a configuration change to your server and want to begin a new logging session.
-
Manual 99a 38 July 17, 2001 Unload and reload the PORTAL or HTTPSTK NLM programs. After you have made changes to the server that require the PORTAL.NLM or HTTPSTK.NLM to be restarted, or after you have loaded a newer version of these NLM programs on the server, click the applicable Restart button to unload and reload the module. A message appears asking if you are sure you want to restart the module, which temporarily disables this utility.
-
Manual 99a 38 July 17, 2001 fall within the subnet mask range, you will have access to NetWare Remote Manager. But remember, so will all other workstations that fall within the subnet mask range. To prevent people on the Internet or users of other subnets from accessing NetWare Remote Manager, set up your subnet mask so that only IS workstations can use the specified subnet mask.
-
Manual 99a 38 July 17, 2001 Customizing the Home Page You can add text, graphics, and custom links to the home (Volumes) page for NetWare Remote Manager by creating an HTML file named PRTLANNC.HTM and placing it in the server’s SYS:\LOGIN directory. Any information in this file appears at the bottom of the home page. Because this file is included in the HTML code that generates the front page, do not include the
and tags.
-
Manual 3 99a 38 July 17, 2001 Managing Servers Remotely This chapter includes instructions for the following tasks: Viewing General Server Information (page 23) Diagnosing Server Problems (page 24) Managing Servers (page 32) Managing Applications (page 50) Managing Novell eDirectory (page 60) Managing Server Hardware (page 57) Using Server Groups (page 61) Accessing and Managing Other Servers (page 62) Viewing General Server Information After accessing the server from your Web browser,
-
Manual 99a 38 July 17, 2001 Diagnosing Server Problems NetWare Remote Manager includes several tools to assist you in monitoring the health and status of your server. When you are familiar with the normal health and status of your server, diagnosing problems with your server becomes easier.
-
Manual 99a 38 July 17, 2001 Monitoring Specific Health Indicators from the Server Health Monitoring Page To access the Server Health Monitoring page, click the overall health status indicator or the Health Monitor link in the header frame or click the Health Monitor link in the navigation frame. The Server Health Monitoring page shows the health status (green, good; yellow, suspect; or red, bad) for all known components of the system, as well as current, peak, and maximum values.
-
Manual 99a 38 July 17, 2001 Configuring Health Thresholds If you have a server that runs differently than normal, you might want to configure the suspect and critical threshold values to something other than the default. To change the criteria for the suspect (yellow/suspect) and critical (red/bad), status indicators, do the following: 1 From the Server Health Monitoring page, click Configure Health Thresholds and then the Description name link for the item you want to change.
-
Manual 99a 38 July 17, 2001 3 View the information for the item that has changed by clicking the Info icon for the item. This information outlines the specific health criteria (thresholds) for green, yellow, red or statuses in that component. It also provides suggestions in some cases for what might be going wrong in that component if a yellow or red indicator is displayed. 4 Perform the recommended or appropriate action for the health item that has changed.
-
Manual 99a 38 July 17, 2001 To view the Multiple Server Health Monitor page for a server group at a later time, do the following: 1 Click the Load Group File link in the navigation frame. 2 On the Server Group File page, enter the path or browse to the configuration file for the server group that you previously saved. 3 Click the Build Server Group button.
-
Manual 99a 38 July 17, 2001 administration level, this information is usually helpful in identifying problems with a specific NLM or with threads causing the server to hang or run slow. If the thread was suspended by Abend Recovery, then the information includes details about the thread state at the time it was suspended. To get information about the NLM program that owns the thread, click the NLM program name.
-
Manual 99a 38 July 17, 2001 Performing Additional Debug Options If you are developing modules to run on NetWare and you want to access additional debug options, click the Additional Debug Options link on the Profiling and Debug Information page.
-
Manual 99a 38 July 17, 2001 A list of SET parameters (including Hidden parameters) and current settings A list of all the modules currently running on the server A list of LAN driver configurations Storage device configuration information Volume statistics for volumes SYS: and _ADMIN To run and view a Server Configuration report, click Run Config Report in the navigation frame and then click View Report on the Server Configuration Report page.
-
Manual 99a 38 July 17, 2001 Managing Servers Use the following links in the NetWare Remote Manager navigation frame to accomplish the following server management tasks: Use this link To do these tasks Volumes Browse the server’s file system View or change File Access Rights Attributes View details of directories or files and create, rename, or delete them View an individual file Upload a file to the server Download a file from the server to a local workstation Perform Text Searches Mo
-
Manual 99a 38 July 17, 2001 Use this link To do these tasks SET Parameters View the SET parameter categories Access each SET parameter by category to view the SET parameter current value and associated help and change the SET value Save the settings to a text file on volume SYS: Control whether hidden SET parameters are viewable View SET parameters with settings that are different from the server default (modified) View SET parameters with values that have been changed on the server but t
-
Manual 99a 38 July 17, 2001 Use this link To do these tasks View Memory Config View general information about how your server is using its memory Access the Swap File Usage Information page where you can view information relating to the virtual memory page swapping system on the server, enable or disable swapping for a volume, and change the parameters for swapping virtual memory Access the NetWare Loadable Modules Information page where you can view which NLM program is using the most allocate
-
Manual 99a 38 July 17, 2001 Accessing and Managing Server Volumes and Partitions The Volume Management page is the home page for NetWare Remote Manager. You can access this page by clicking the Volumes link in the header frame or under Manage Server in the navigation frame. The Volume Management page provides a list of the server’s volumes, access to the server’s DOS partitions, and the ability to perform partition management tasks.
-
Manual 99a 38 July 17, 2001 Changing File Access Rights Attributes Your eDirectoryTM rights govern your access to directories and files on NetWare partitions. These rights also regulate your ability to copy files to and from any given directory. To access the server’s DOS partition, change, or upload files to the server, you must have Supervisor right to the Server object.
-
Manual 99a 38 July 17, 2001 Viewing Individual Files If your browser is set up to recognize a certain file extension (for example, .TXT), you can browse to and click a file of that type to view it directly in NetWare Remote Manager. Otherwise, you can download any file to your local machine by clicking the filename and then saving it to a local workstation and opening it there. (This also applies to the files on the server’s DOS partition.
-
Manual 99a 38 July 17, 2001 You can also click the Mount Volume or Dismount Volume link displayed next to the volume on the Server Disk Partition Operations page. If you choose to dismount volume SYS:, the icons used by NetWare Remote Manager (which reside in SYS:\LOGIN) might not display correctly. When you remount volume SYS: and reload the page, the icons will display correctly again.
-
Manual 99a 38 July 17, 2001 To create a volume, do the following: 1 Locate and click the Create link next to the free space on the device that you want to create the volume on. 2 Select the type of volume to create. 3 Complete the required fields for the type of pool and volume, or partition and volume you want to create, and then click Create. To mirror a partition, do the following: 1 Locate and click the Mirror link next to the partition you to want to mirror.
-
Manual 99a 38 July 17, 2001 From this secondary browser window you can do the following: Cycle through the screens already loaded at the server console. To do this, click the >> or << button. (This functions the same as pressing Alt+Esc on the server console keyboard.) If you access the System Console screen from the applet window, you can load or unload any necessary module or enter any necessary console command.
-
Manual 99a 38 July 17, 2001 Viewing Console Activity You can now view on the Logger screen much of the information that used to be displayed on the System Console screen. This screen is scrollable and can be saved to a file. To access a list of commands for scrolling and saving to a file, press F1 while viewing the Logger screen.
-
Manual 99a 38 July 17, 2001 Login State displays whether users are allowed to log in to the server. To disable users from being able to log in to the server (for server maintenance or other reasons), enter DISABLE LOGIN at the System Console prompt. To allow users to log in to the server, enter ENABLE LOGIN at the System Console prompt.
-
Manual 99a 38 July 17, 2001 Clearing Specific Connections If a user’s workstation quits working, it usually leaves its connection to the server open and files open. To clear a specific connection like this and others, do the following: 1 Click the Connections link in the navigation frame to open the Connection Information page. 2 On the Connection Information page, locate the specific connection listed in the Connections table and then click the Clear Connection link next to the connection.
-
Manual 99a 38 July 17, 2001 Viewing or Changing SET Parameters From the Set Parameter Categories page, you can do the following: View the SET parameter categories To access the Set Parameter Categories page, click the Set Parameters link in the navigation frame.
-
Manual 99a 38 July 17, 2001 View SET parameters with values that have been changed on the server but that will reset to default values when the server is restarted (nonpersistent) To do this, click the View Non-persistent Set Parameters button on the Set Parameter Categories page. Nonpersistent SET parameters are those which are not stored in the NetWare Registry.
-
Manual 99a 38 July 17, 2001 Viewing Server Console Commands To view a list of commands that can be executed at the server console, click the Console Commands link in the navigation frame. To access the server console in order to execute any of these commands from NetWare Remote Manger, click the Console Screens link. To view specific syntax or help for each command, click the Info icon next to the command. Several of the hidden console commands do not have any help associated with the command.
-
Manual 99a 38 July 17, 2001 Statistics Description Current Cache Memory Amount of server memory after memory from the server cache pool is used by kernel NLM programs and virtual memory allocations. File System Memory Amount of server memory in use by the directory cache buffers in the traditional NetWare file system. Reserved Swap Memory The small footprint of reserved memory that allows the NetWare operating system to point to the physical location of the actual swap file.
-
Manual 99a 38 July 17, 2001 Statistics Description Traditional File System Cache Statistics link Accesses the Traditional File System Cache Statistics page that shows cache statistics for the traditional file system. NSS cache statistics are not included in these statistics. Current Memory Usage chart Shows how NetWare server memory usage is divided between the NetWare server's cache, the virtual memory system, and kernel NLM programs.
-
Manual 99a 38 July 17, 2001 Shutting Down, Resetting, or Restarting the Server Options for shutting down, resetting, or restarting your server are on the Down Server Options page. To access the Down Servers Options page, click the Down / Restart link in the navigation frame. To shut down, restart, or reset (warm boot) the server, click the applicable action on the Down Servers Options page, and then confirm your choice.
-
Manual 99a 38 July 17, 2001 Managing Applications When managing applications on your server using NetWare Remote Manager, use the following links in the navigation frame to help you accomplish the following tasks: Use this link To do these tasks List Modules View resource information about each module loaded on the server or in an address space Access more detailed information about a module, its flags, resources, and memory allocation as well as a button to unload the module Load an NLM progra
-
Manual 99a 38 July 17, 2001 Use this link To do these tasks NetWare Registry View key information from the NetWare registry for this server View operational information Run the consistency checker for the registry Flush the registry Winsock 2.
-
Manual 99a 38 July 17, 2001 To view the allocated memory summary for an individual NLM program, click the value link in the Alloc Memory column. This summary indicates how much memory a NetWare Loadable Module has requested from the system and how much it is currently using. This information is valuable in determining whether the module is using too much system memory.
-
Manual 99a 38 July 17, 2001 Viewing and Managing Programs in Protected Memory and Protected Address Spaces To view and manage programs in protected memory and protected address spaces, access the Address Space Information page by clicking the Protected Memory link in the navigation frame. From the Address Space Information page, you can do the following: Execute an NCF to load several modules into the same protected address space To do this, click the Load Modules Protected button.
-
Manual 99a 38 July 17, 2001 Viewing System Resources Resource tags are used to track things like allocated memory, screens, and packet receive buffers. When an NLM program wants to check out or allocate a resource from the system, it passes in a resource tag to the system and the resource tag is updated to show how much of the resource is in use. When the resource is returned to the system, the resource tag is again updated to reflect the change.
-
Manual 99a 38 July 17, 2001 Viewing Winsock 2.0 Statistics Viewing Winsock information can help you understand how the applications on your server are interacting with the Winsock APIs provided in NetWare. Error status conditions are distinguished with yellow and red for quick identification.
-
Manual 99a 38 July 17, 2001 To view a list of sockets opened by a specific application, click the link for the application in the Winsock Applications list. To view a list of all the session objects created within this protocol object, click the General WSP Protocol Object link to open the General WSP Protocol Object Session Map page. On this page, you can access links to the upper sessions and lower sessions as well as a link to the socket details page.
-
Manual 99a 38 July 17, 2001 Bytes Not Transmitted Due to Error Packet Receive Buffers In Use 0 Global API Counters link Opens the Global API Counters page that lists all of the global counter information gathered in the operating system. Viewing Information about Each Protocol Running on the Server From the Protocol information page, you can view general and specific information about each protocol running on the server.
-
Manual 99a 38 July 17, 2001 Use this link To do these tasks Disk / LAN Adapters View information about the storage and network adapters that are installed on the server and the slots they are in View additional storage adapter information, such as statistical information for the media manager of the server, resources registered, and information for the devices that are controlled by the adapter View additional network adapter information, such as statistics generated and maintained by the LSL,
-
Manual 99a 38 July 17, 2001 Many of the profiling operations in NetWare Remote Manager (PORTAL.NLM) require at least a Pentium* Pro processor (family 6 or higher). If the processor is a Pentium III or higher model, the processor serial number is also displayed. If more than one processor is present, you can stop and start processors individually (except for P0) by clicking the corresponding Stop/Start processor link.
-
Manual 99a 38 July 17, 2001 Viewing Hardware Resource Information To view the resource information that drivers have registered with the following hardware resources listed, access the Hardware Resource page: Interrupts and handlers Non-ISA slots Ports Direct Memory Access (DMA) channels (if applicable) Shared memory addresses To access the Hardware Resources page, click the Other Resources link in the navigation frame.
-
Manual 99a 38 July 17, 2001 Using Server Groups NetWare Remote Manager lets you build server groups and perform operations on those groups. Currently, the only operation you can do with a group is to monitor server health. To build a group of servers that you want to monitor from one page, access the Server Group Selection page by clicking the Build Group link in the navigation frame.
-
Manual 99a 38 July 17, 2001 Accessing and Managing Other Servers To access other servers in your eDirectory tree that have NetWare Remote Manager loaded, click the Managed Server List link. A list of servers is provided via SLP (Service Location Protocol). You can also access the file system of servers that don’t have NetWare Remote Manager loaded that are in your current tree by clicking the Basic File Access link.
-
Manual 4 99a 38 July 17, 2001 Troubleshooting Server Problems You can use NetWare® Remote Manager to troubleshoot some server problems.
-
Manual 99a 38 July 17, 2001 Click the Execution Profile Data by NLM link and note and the execution time and module name for the Parent NLM of the first entry. The first entry will have the highest execution time. Click the Execution time value. 3 Identify which part of the NLM program is causing the problem by looking at the Nearest Symbol information. From here you can trace each procedure including the one that is being called most often (indicated by the highest Call Count).
-
Manual 99a 38 July 17, 2001 Tracing Abend Sources Server abends (abnormal end of a piece of server code) are indicated on the Server Health Monitoring page by a suspect or bad status for the Abended Thread Count indicator. To trace sources of server abends, do the following: 1 Under the Diagnose Server heading, click the Profile/Debug link.
-
Manual 99a 38 July 17, 2001 Locating Server Process Hogs Server process hogs (or NLM programs that use a lot of server processes) are indicated on the Server Health Monitoring page by a suspect or bad status for the Available Server Processes indicator. To find server process hogs, do the following: 1 Under the Diagnose Server heading, click the Profile/Debug link.
-
Manual 99a 38 July 17, 2001 Seeing Who Is Using a File When you receive a message that a file has been locked, you can find out who is using that file by doing the following: 1 Under the Manage Server heading, click the Volumes link. This displays the Volume Management page that shows the volumes and local server partition information. 2 On the Volume Management page, click the volume name link and browse to the file. This displays a list of all the subdirectories and files that are on that volume.
-
Manual 68 99a 38 NetWare Remote Manager Administration Guide NetWare Remote Manager Administration Guide 103-000144-001 August 30, 2001 Novell Confidential July 17, 2001
-
Utilities Reference Novell NetWare 6 ® www.novell.
-
Manual Rev 99a 28 October 99 17 Contents Overview 9 Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 1 Utilities 11 ABORT REMIRROR . . . . . . . . . . ADD NAME SPACE . . . . . . . . . . AIOCON . . . . . . . . . . . . . . . . AIOPDCON . . . . . . . . . . . . . . ALERT . . . . . . . . . . . . . . . . . ALIAS . . . . . . . . . . . . . . . . . ARASCON . . . . . . . . . . . . . . . ATCON . . . . . . . . . . . . . . . . . ATMCON . . . . . . . . . . .
-
Manual DSDIAG (DS DIAGNOSTICS). . . . . DSMERGE . . . . . . . . . . . . . . DSREPAIR . . . . . . . . . . . . . . DTRACE. . . . . . . . . . . . . . . . EDIT . . . . . . . . . . . . . . . . . . ENABLE LOGIN . . . . . . . . . . . . Enhanced SBACKUP . . . . . . . . . FILTCFG . . . . . . . . . . . . . . . FILER . . . . . . . . . . . . . . . . . FLAG . . . . . . . . . . . . . . . . . FRCON . . . . . . . . . . . . . . . . FRTRACE . . . . . . . . . . . . . . . HELP . . . . . . . . . . . . . . . . . INETCFG . . . .
-
Manual NIASCFG. . . . . . . . . . . . . . Novell Printer Manager. . . . . . . Novell Migration Wizard . . . . . . NSS . . . . . . . . . . . . . . . . NSWEB . . . . . . . . . . . . . . NVXADM . . . . . . . . . . . . . . NVXWEB . . . . . . . . . . . . . . NWBACK32 . . . . . . . . . . . . NWCCON . . . . . . . . . . . . . NWCONFIG . . . . . . . . . . . . NWCRPAIR . . . . . . . . . . . . NWCSTAT . . . . . . . . . . . . . ORBCMD. . . . . . . . . . . . . . PING . . . . . . . . . . . . . . . . PPPCON . . . . . . .
-
Manual SEARCH . . . . . . . . . . . . . . . . SECURE CONSOLE . . . . . . . . . . SERVER. . . . . . . . . . . . . . . . . SET . . . . . . . . . . . . . . . . . . . SHUTDOWN NETWORK INTERFACE . SPEED . . . . . . . . . . . . . . . . . SPFCON . . . . . . . . . . . . . . . . SPXCONFG . . . . . . . . . . . . . . . SPXS . . . . . . . . . . . . . . . . . . START PROCESSORS . . . . . . . . . STATICON . . . . . . . . . . . . . . . STOP PROCESSORS . . . . . . . . . SWAP . . . . . . . . . . . . . . . . . . TCPCON . .
-
Manual 99a 38 July 17, 2001 Overview Utilities Reference gives you essential information about NetWare® utilities. For more information about each utility, see the online help for that utility. For step-by-step instructions to accomplish specific tasks, or for information on NetWare concepts, follow the cross-reference links listed with the respective utilities. Some new utilities have been included with NetWare 6.
-
Manual 10 99a 38 July 17, 2001 Convention Explanation Boldface characters Boldface characters indicate items that you type at the prompt, such as commands. Italicized characters Italicized characters indicate variables that you replace with information pertinent to your task. ... Ellipses indicate that parameters, options, or settings can be repeated. [] An item enclosed in square brackets is optional. You can enter the command with or without the item.
-
Manual 1 99a 38 July 17, 2001 Utilities This chapter gives you essential information about NetWare® utilities. For more information about each utility, see the online help for that utility. For step-by-step instructions to accomplish specific tasks, or for information on NetWare concepts, follow the cross-reference links listed with the respective utilities. ABORT REMIRROR Purpose Use at the server console to stop remirroring a logical partition.
-
Manual 99a 38 July 17, 2001 Additional Information Topic See Restart remirroring “REMIRROR PARTITION” on page 157 ADD NAME SPACE Purpose Use at the server console to store non-DOS files on a NetWare® volume. IMPORTANT: Before you can use this command, you must load a name space module. See “LOAD” on page 86. Syntax ADD NAME SPACE [name [TO [VOLUME]] volume_name] Parameter Use to (no parameter) Display the loaded name spaces. name Specify the name of the name space module you loaded.
-
Manual 99a 38 July 17, 2001 Using ADD NAME SPACE You need to add a name space only once to a volume with the ADD NAME SPACE command. Each time you mount a volume to which you added a name space (for example, each time you bring up the server), the corresponding name space module is autoloaded. NOTE: Because you don’t need to add a name space to a volume each time the server comes up, you don’t need to put the ADD NAME SPACE command in the autoexec.ncf file.
-
Manual 99a 38 July 17, 2001 ALERT Purpose Use at the server console to manage NetWare® alerts. You can enable or disable the display and logging of specific alerts, limit the amount of information displayed with an alert, and control other aspects of alert messages. Syntax ALERT nmID command ON|OFF Parameter Use to nmID Specify the nmID number of the alert you want to manage. This number appears in parentheses whenever the alert is generated. For example, server address changes cause a 50019 alert.
-
Manual 99a 38 July 17, 2001 Command Parameter Values Command Function EVENT Generates an event when the alert is generated. LOG Sends the alert message to a log file. EVERYONE Sends the alert to everyone on the network. CONSOLE Displays the alert message on the server console. BELL Sounds a warning bell when the alert is generated. ID Displays ID information. This information appears in some older error and alert messages but is no longer used. LOCUS Displays locus information.
-
Manual 99a 38 July 17, 2001 Examples The following command turns off logging, console display, and the warning bell for everyone on the network for all 50019 alerts (a server address change alert): ALERT 50019 ALL OFF The following command turns off logging of all 50019 alerts. ALERT 50019 LOG OFF ALIAS Purpose Use at the server console to define an alias. An alias is a user-defined keyword that represents a string. (The string can include both spaces and punctuation.
-
Manual 99a 38 July 17, 2001 Using ALIAS Define an alias to reduce keystrokes or to avoid having to remember arguments in a long command string. Examples In the following example, ALIAS associates the keyword proto with a command to bind a protocol. ALIAS PROTO BIND IPX NE3200 NET=12345678 To use the keyword, enter the alias at the server console prompt, instead of the BIND command: PROTO Executing ALIAS with no parameter displays a list of defined aliases, similar to the following: 1.
-
Manual 99a 38 July 17, 2001 ATCON Purpose Use at the server console to Monitor the activity of AppleTalk* network segments Examine the configuration of the local AppleTalk router Diagnose operational problems in network segments that support AppleTalk Verify the connectivity of an AppleTalk router to the rest of the internetwork Monitor the status of AppleTalk Update-based Routing Protocol (AURP) Syntax [LOAD] ATCON Using ATCON When you load ATCON, an Available Actions menu appears.
-
Manual 99a 38 July 17, 2001 Option Use to Lookup Network Entities Query for services available on the AppleTalk network. Packet Statistics View statistics maintained by the AppleTalk router. Protocol Configuration View the configuration of the AppleTalk protocol stack. This is a read-only screen. Routing Table View the AppleTalk router’s Routing Table Maintenance Protocol (RTMP) table. This table lists all destinations the AppleTalk router can reach.
-
Manual 99a 38 July 17, 2001 Syntax BIND protocol [TO] lan driver | board name [driver parameter...] [protocol parameter...] Bind Parameters Parameter Use to protocol Specify the communication protocol. lan driver | board name Specify either the LAN driver name or the network board name. driver parameter Identify a particular network board. If you specified a network board name, you do not need to specify driver parameters.
-
Manual 99a 38 July 17, 2001 Driver Parameters Depending on your system, one or more of the following parameters can be used to identify a particular board. Parameter Use to DMA=number Specify the DMA channel for the board. Use the same channel number you did when you loaded the driver. FRAME=number Specify the frame type for the board. Use the same type you did when you loaded the driver. INT=number Specify the interrupt number for the board.
-
Manual 99a 38 July 17, 2001 Protocol Parameters Protocol/Parameter Use to For IPX protocol: Specify the IPXTM external network number. This is the number of the cabling system attached to the board. NET=number If the board is attached to an existing cabling system, use the same IPX external network number as used by other boards of the same frame type attached to this cabling system. Do not use the same number that was used by boards of a different frame type.
-
Manual 99a 38 July 17, 2001 Additional Information Topic See Binding a protocol to a driver “INETCFG” on page 69 Viewing a list of communication protocols “PROTOCOL” on page 141 Loading LAN drivers “LOAD” on page 86 CAPITRCE Purpose If a problem with a PPP over ISDN connection cannot be traced to the PPP layer, CAPITRCE can be used to observe and debug negotiation between the CAPI Manager and its upper and lower layers (the CAPI adaptation layer and CAPI driver, respectively).
-
Manual 99a 38 July 17, 2001 Syntax CAPTURE [P=printername | Q=queuename] [L=1|LPT1] [options] Additional Information Topic See Using CAPTURE Setting Up CAPTURE for Applications Not Designed for Network Printing (http:// www.novell.com/documentation/lg/nw51/ printenu/data/hzm3nqx9.html) CDROM Purpose Use at the server console to allow a CD-ROM disk to function as a Novell® Storage ServicesTM (NSS) volume. Your NSSTM volume will mount immediately.
-
Manual 99a 38 July 17, 2001 Using CDROM IMPORTANT: Use CD-ROM as a read-only NSS volume. Don’t enable block suballocation or use file compression on the volume. CDROM won’t load unless you have loaded the NWPA.DSK NPA driver (an I/O device-independent driver that interfaces with the Media Manager). CDROM autoloads the NSS modules. NSS supports CD-ROM volumes mounted with the Macintosh* and ISO 9660 name spaces. CD9660.NSS supports High Sierra and ISO 9660 formats.
-
Manual 99a 38 July 17, 2001 Parameter Use to stay Leave the CHARSET code in memory. If you do not use the stay option, CHARSET unloads itself after it changes the code page. Using CHARSET The following code pages are supported for NetWare 6: 437, 737, 850, 852, 855, 857, 860, 861, 863, 865, 866, 869.
-
Manual 99a 38 July 17, 2001 the world. Certificate Server derives all supported cryptography and signature algorithms, as well as supported key sizes from NICI. For additional information and procedures, refer to the Help system or to the Novell Certificate Server Administration Guide. CLEAR STATION Purpose Use at the server console to clear a workstation connection.
-
Manual 99a 38 July 17, 2001 Additional Information Topic See Removing server resources from a workstation Clearing a Workstation Connection Clearing a workstation connection from a client that has Auto Restart enabled Clearing a Connection That Uses Auto Reconnect CLIB Purpose The functionality of earlier versions of CLIB has been incorporated into a server library of C functions. The server library provides an ANSI-compliant runtime interface for other NetWare® Loadable ModuleTM (NLMTM) programs.
-
Manual 99a 38 July 17, 2001 Using CLIB CLIB and the other modules of the server library are autoloaded by the server operating system. CLS Purpose Use at the server console to clear the console screen and move the console prompt to the top of the screen.
-
Manual 99a 38 July 17, 2001 On some systems, CONFIG may also display information about NetWare Loadable ModuleTM (NLMTM) programs. The kind and amount of NLM information depends on the system. The following is an example of server information that CONFIG returns. IPX internal network number: 0F42DB87 Server Up Time: 15 Days 17 Hours 7 Minutes 6 Seconds Novell NE2000 Version 3.
-
Manual 99a 38 July 17, 2001 CONLOG Purpose Use at the server console to Capture all console messages generated at the server while CONLOG is loaded. This includes system messages, eDirectory messages, the console output of all commands executed, and messages that announce RCONSOLE connections and disconnections. Write the messages to the default sys:\etc\console.log file (or to another file of your choice). View console messages for useful information although they scroll too quickly to read.
-
Manual 99a 38 July 17, 2001 Parameter Use to SAVE=backup file name Specify the filename in which you want to save the preexisting console log. By default, when you load CONLOG or when the console log file reaches its maximum size, the server deletes the existing console log file and creates a new file in its place. This parameter also enables autoexec.ncf to load CONLOG without overwriting the previous console log. Use this parameter at the command line or in autoexec.
-
Manual 99a 38 July 17, 2001 Parameter Use to MAXIMUM=max file size Specify the maximum size, in kilobytes, of the log file. If the log file exceeds the max file size, it is deleted—or renamed if backup filename was specified. In either case, logging starts over with an empty log file. Important: If a maximum file size is not specified, there is no limit.
-
Manual 99a 38 July 17, 2001 file. To record as many console messages as possible, place the LOAD CONLOG command near the beginning (immediately after the FILE SERVER NAME, as above). Use EDIT or NWCONFIG to modify the AUTOEXEC.NCF file. Examples To start capturing console messages during system initialization, enter [LOAD] CONLOG To load CONLOG but save the current log file as clog.bak and limit the size of console.log to 100 KB, enter [LOAD] CONLOG SAVE=CLOG.
-
Manual 99a 38 July 17, 2001 ConsoleOne Purpose Use at a Windows* workstation or a NetWare® server to manage your network and its resources. By default, ConsoleOneTM lets you manage: eDirectoryTM objects, rights, and schema NetWare file system resources If you install other Novell® products, additional functionality might be added to ConsoleOne. For example, if you install NDS® 8 or later, LDAP management functionality is added.
-
Manual 99a 38 July 17, 2001 CPUCHECK Purpose Use CPUCHECK at the server console to display per-processor information, including processor number, processor clock speed (MHz), processor ID, processor version and subversion, amount of L1 and L2 cache memory, and current revision number. Syntax CPUCHECK [processor_number...
-
Manual 99a 38 July 17, 2001 CX Purpose Use at a workstation to view or change your eDirectoryTM context, or to view containers and leaf objects in your eDirectory tree structure. Syntax CX [new context] [/option...] [/? | /VER] Parameter Use to (no parameter) View the current context. new context Move to a new context or specify the context you want for an option. /option Replace option with any available option. See “CX Options” on page 38. /? View online help.
-
Manual 99a 38 July 17, 2001 CX Options Option Use to /R List containers at the root level, or change context in relation to the root. /T List containers below the current context or a specified context in a tree structure. /CONT List containers at the current context or a specified context in a vertical list with no structure. /A Include all objects at or below the context. Use with /T or /CONT. /C Scroll continuously through output.
-
Manual 99a 38 July 17, 2001 To change to the root when your context is TEST.PROVO.NOVELL, type CX . . . or CX /R To change the complete context from TESTING. PROVO.NOVELL to TESTING.PARIS.NOVELL, type CX .TESTING.PARIS.NOVELL To show all containers in the current context, type CX /CONT To show all containers in the context SALES.NOVELL in a tree structure, type CX .SALES.
-
Manual 99a 38 July 17, 2001 DISMOUNT Purpose Use at the server console to make a volume unavailable to users. Syntax DISMOUNT volume_name Parameter Use to volume_name Specify the name of the volume you want to dismount. Using DISMOUNT DISMOUNT allows you to maintain or repair a volume and to upgrade disk drivers while the NetWare® server is up. Use this command to dismount all volumes residing on a removable drive before you remove the drive.
-
Manual 99a 38 July 17, 2001 DISPLAY ENVIRONMENT Purpose Use at the server console to display current search paths and current values of the settable server parameters, along with their default values and range of valid values. If you use a color monitor as your console, the parameter name appears in white and its current value in yellow. NOTE: DISPLAY ENVIRONMENT displays only settable server parameters that are not marked as hidden.
-
Manual 99a 38 July 17, 2001 New Packet Receive Buffer Wait Time: 0.1 seconds IPX CMD Mode Routing: OFF Load Balance Local LAN: OFF Garbage Collection Interval: 5 minutes Alloc Memory Check Flag: OFF Reserved Buffers Below 16 Meg: 300 Read Ahead Enabled: ON Read Ahead LRU Sitting Time Threshold: 10 seconds Minimum File Cache Buffers: 20 Maximum Concurrent Disk Cache Writes: 4000 Dirty Disk Cache Delay Time: 0.
-
Manual 99a 38 July 17, 2001 Option Use to (no option) Display interrupts currently in use. n ... Display one or more interrupts by number. ALL Display all interrupts. PROC Display per-processor interrupt information. ALLOC Display allocated interrupts. REAL Display interrupts that occurred while the OS was in real mode and that were then reflected back to protected mode to be serviced.
-
Manual 99a 38 July 17, 2001 Interrupt 12: OS Allocated Bus Interrupt 1299 Interrupt Handler: PS/2 Mouse Port Interrupt 1299 Interrupt 39: MPS14.
-
Manual 99a 38 July 17, 2001 Auto Restart After Abend: Current Setting: 0 Default Setting: 1 Default Tree Name: Current Setting: DT_BREMEN Default Setting: Additional Information Topic See List server parameters and display their current settings with defaults and limits “DISPLAY ENVIRONMENT” on page 41 Restore server parameter settings to their default values “RESET ENVIRONMENT” on page 162 Print server parameter settings to a file Printing Current Parameter Values to a File DISPLAY NETWORKS Pu
-
Manual 99a 38 July 17, 2001 Each address is followed by two numbers separated by a slash. The first number is the number of routing hops between your server and the network at that address. The second number is the number of ticks (1/18th of a second) required to send a packet to that address.
-
Manual 99a 38 July 17, 2001 Using DISPLAY PROCESSORS DISPLAY PROCESSORS lists the online or offline status of all processors. The following example illustrates the command display when all four processors are online: Processor 0 Processor Processor Processor is ONLINE. 1 is ONLINE. 2 is ONLINE. 3 is ONLINE. If you have a color monitor for your console, the output appears in green for online processors and in red for offline processor.
-
Manual 99a July 17, 2001 38 DISPLAY SERVERS Purpose Use at the server console to view a list of IPXTM servers and services being advertised by Service Advertising Protocol (SAP) packets. Syntax DISPLAY SERVERS [string] Parameter Use to (no parameter) Display a list of all servers the IPX internal router is aware of. string Specify the name of the server for which you want to display information. The string can include an asterisk (*) as the last character.
-
Manual 99a 38 July 17, 2001 The number listed after the server name indicates the number of routing hops between this server and the listed servers. Your server is indicated by 0 hops Servers more than 16 hops away aren’t recognized. DISPLAY SERVERS also displays eDirectory trees and network addresses. A server can be displayed many times, once for each service that it advertises.
-
Manual 99a 38 July 17, 2001 DOWN executes a shutdown.ncf file if one is present. For example, although most modules, including those in protected address spaces, unload automatically when you down or restart the server, some modules might require that you unload them individually first. You can unload them manually at the server prompt. Or you can simply place the UNLOAD commands in a shutdown.ncf file. (Run the MODULES command to determine address spaces for specific modules.
-
Manual 99a 38 July 17, 2001 Additional Information Topic See Using DSDIAG F1 in the utility DSMERGE Purpose Use at the server console to Merge the roots of two separate eDirectoryTM trees Rename a tree to verify that all servers in the eDirectory tree are responding properly and have the same tree name View time synchronization information and display the time server for all servers in the tree Syntax [LOAD][path]DSMERGE Parameter Use to path Specify the path to DSMERGE.
-
Manual 99a 38 July 17, 2001 When preparing a NetWare® 4.1x tree for a merge, use DSREPAIR v4.56 or later to import the schema. Previous versions of DSREPAIR import the schema for NetWare 6 incorrectly. Partition synchronization operations generally complete quickly after a merge, but in some cases can take several hours. Use DSREPAIR to check synchronization status before performing a merge to ensure that replica synchronization processes are occurring properly.
-
Manual 99a 38 July 17, 2001 Repairs the database without closing the database or locking out users. Reclaims free space by discarding empty records. If the server abends, use DSREPAIR to verify the integrity of the eDirectory database after restarting the server. Syntax [LOAD][path]DSREPAIR [-U|-A] Option Use to path Specify the path to DSREPAIR.NLM if you are not running it from SYS:SYSTEM. -U Perform a full unattended repair and exit automatically upon completion.
-
Manual 99a 38 July 17, 2001 NOTE: eDirectory operates on “synthetic time” if true synchronization has not been accomplished. Synthetic time is generated when the time stamp on a replica of a partition is ahead of the actual server time. eDirectory conducts its normal operations fully on synthetic time, but some partition and replication work can be delayed until time is synchronized.
-
Manual 99a 38 July 17, 2001 DTRACE Purpose DTRACE is a menu-driven trace utility used with U.S. Robotics* ISDN Allegra adapter with FXPRI.LAN and FXBRI.LAN ISDN drivers. EDIT Purpose Use at the server console to create or modify a text file on either a DOS or NetWare® partition. Syntax [LOAD] [path]EDIT [pathname] Parameter Use to path Specify the path to edit.nlm if you moved it from the default directory (C:\nwserver) pathname Specify the pathname of the file you want to edit.
-
Manual 99a 38 July 17, 2001 You can use EDIT to view read-only files. EDIT is particularly useful for creating .ncf batch files that automatically execute server commands. Additional Information Topic See Creating and editing text files on the server Using EDIT to Create and Edit Text and Batch Files ENABLE LOGIN Purpose Use this command at the server console prompt to Reenable the login function after using DISABLE LOGIN.
-
Manual 99a 38 July 17, 2001 Enhanced SBACKUP Purpose Use at the server console to back up and restore Storage Management ServicesTM (SMSTM) targets such as eDirectory, binderies, the file system, or hard disks on workstations to media for off-site storage. Starting Enhanced SBACKUP Certain prerequisites must be met before loading the backup software. See Storage Management Services Administration Guide in the NetWare 6 online documentation. A series of NetWare modules must be loaded in sequence: 1.
-
Manual 99a 38 July 17, 2001 Additional Information Topic See Storage Management Services Storage Management Engine (SME) in the Storage Management Services Administration Guide FILTCFG Purpose Use at the server console to set up and configure filters for IPXTM, TCP/IP, and AppleTalk* protocols. Syntax [LOAD] FILTCFG Using FILTCFG Filters help you control what kind of information is sent and received by a router by selectively discarding packets of specified types.
-
Manual 99a 38 July 17, 2001 The following table shows filtering support for protocols: Table 1 Protocol Filtering Support for Protocols Packet Forwarding Filter Service Information Filter Routing Information Filter X X X X X IPX AppleTalk TCP/IP X X Packet Forwarding Filters Packet forwarding filters restrict access to services by filtering data packets sent by the restricted location to the service location.
-
Manual 99a 38 July 17, 2001 Routing Information Filters Routing information filters restrict the exchange of routing information between routers by limiting the routes added to the routing tables of specified routers. These filters increase network security by limiting the visibility of specified networks. They also reduce the bandwidth used by the periodic exchange of routing information between routers.
-
Manual Figure 1 99a 38 July 17, 2001 FILER Functions Allows you to: Modify or view files Change current directory or server Modify, add, or view directories Modify, add, or view subdirectories Modify or view rights for files and directories View trustees for files and directories Allows you to view files or directories according to a search pattern.
-
Manual 99a 38 July 17, 2001 Syntax SYS:PUBLIC\FLAG.EXE path [[+ | -] attribute...] [/ option...] [/? | /VER] Parameter Use to (no parameter) If you type FLAG with no parameters, the attribute status of all the files in the current directory appears. path Specify the path to the file or directory whose attributes or search modes you want to modify. +|- Add attributes to a file or directory with the + (plus). Remove attributes from a file or directory with the - (minus).
-
Manual 99a 38 July 17, 2001 Using FLAG Use FLAG options to add or delete directory and file attributes, as defined in the preceding parameters table. For attributes that can be applied to directories, see “Directory Attributes” on page 64. For attributes that can be applied to files, see “File Attributes” on page 64. When you add or delete multiple attributes, include a space between attribute abbreviations. You can’t remove the Execute Only attribute.
-
Manual 99a 38 July 17, 2001 Directory Attributes Option Use to ALL Specify the Di, H, Ic, P, Ri, and Sy attributes as a group. Primarily used to assign directories these specific attributes. Di (Delete Inhibit) Prevent the directory from being deleted. Dc (Don’t Compress) Prevent the directory from being compressed (regardless of what the volume is set to). Dm (Don’t Migrate) Prevent the directory from being migrated to a secondary backup system (regardless of what the volume is set to).
-
Manual 99a 38 July 17, 2001 Option Use to Dc (Don’t Compress) Prevent a file from being compressed (regardless of what the volume or directory is set to). Di (Delete Inhibit) Prevent a file from being deleted or copied over. Dm (Don’t Migrate) Prevent a file from being migrated to a secondary backup system (regardless of what the volume or directory is set to). Ds (Don’t Suballocate) Prevent an individual file from being suballocated, even if suballocation is enabled for the system.
-
Manual 99a 38 July 17, 2001 Search Modes for Executable Files IMPORTANT: The syntax is /M=mode. Replace mode with a mode number from the following table. 66 Mode Use to 0 Search for instructions in the NET.CFG file (the default mode). 1 Search the path specified in the file. If there is no path, the file searches the default directory, and then all search drives. 2 Search the path specified in the file. If there is no path, the file searches only the default directory.
-
Manual 99a 38 July 17, 2001 Status Flags NOTE: Status flags show attribute information for a file or directory. You can’t change these flags. Status Indicates Cc (Can’t Compress) The file can’t be compressed because of limited space savings. Co (Compressed) The file has been compressed. M (Migrated) The file has been migrated. Examples To add Rw and Ic and remove Di and A from all files in the current directory, enter FLAG *.
-
Manual 99a 38 July 17, 2001 FRCON Purpose Use FRCON to view NetWare® Link/Frame RelayTM interface configuration and statistical information. FRTRACE Purpose The Frame Relay Trace utility (FRTRACE) can be used locally at the router or server console, or remotely from a workstation that is running RCONSOLE. HELP Purpose Use at the server console to view the syntax, a brief description, and an example of a console command.
-
Manual 99a 38 July 17, 2001 Examples To view help for LIST DEVICES, type HELP LIST DEVICES To view a description of each command, type HELP ALL INETCFG Purpose Use at the server console to set up and customize your internetworking configuration for IPXTM, IP, and AppleTalk*. INETCFG simplifies the process of configuring local area networks (LANs) to work with network and routing protocols supported by NetWare®.
-
Manual 99a 38 July 17, 2001 Option Use to Boards Select and configure boards. To configure a board, you select a driver, assign a name to the board, and specify values for the board parameters. Each driver that is compatible with NetWare has a driver description file, sometimes called the LDI file. The LDI file defines the parameters necessary for the driver to operate with the board you select. It also specifies the valid range of values for each parameter.
-
Manual 99a 38 July 17, 2001 Option Use to View Configuration View the INETCFG configuration information file and the console messages captured during system initialization Importorexportconfigurationinformationto or from a diskette. INETCFG records information in various configuration (.CFG) files located in SYS:\ETC. Some of these files are present at system startup; others are created by INETCFG, depending on what you configure. Here is a partial list of these files: AURP.CFG TCPIP.
-
Manual 99a 38 July 17, 2001 INITIALIZE SYSTEM Purpose Use at the server console to enable the multiprotocol router configuration by executing all commands in the system NETINFO.CFG file. Syntax INITIALIZE SYSTEM Using INITIALIZE SYSTEM This command is typically executed from the INITSYS.NCF file during server startup. WARNING: Executing INITIALIZE SYSTEM on a system that has already been initialized can generate errors when the system discovers that the commands in the NETINFO.
-
Manual 99a 38 July 17, 2001 IPXCON Purpose Use at the server console to Monitor and troubleshoot IPXTM routers and network segments throughout your IPX internetwork View the status of an IPX router or network segment View all paths through which IPX packets can flow Locate all active IPX routers on your internetwork Monitor remote IPX routers that are running NetWare® IPX Router software Syntax [LOAD] IPXCON [/P] Parameter Use to /P View the Link State Packets (LSPs) received by the router
-
Manual 99a 38 July 17, 2001 The following table explains the fields in the summary display. Because IPXCON is a real-time monitor, these fields are always active, and some values in the fields change as the router processes IPX packets. Field Explanation Host Address Name of the router being monitored. Packets Received Number of IPX packets received by the selected router. Packets Sent Number of IPX packets sent by the selected router.
-
Manual 99a 38 July 17, 2001 Option Use to IPX Information View statistics for the selected router’s IPX packet routing. To display additional packet routing statistics, select Detailed IPX Information from the bottom of the IPX Information window. IPX Router Information View general information about the selected IPX router.
-
Manual 99a 38 July 17, 2001 IPXPING Purpose Use at the server console to check connectivity to an IPXTM server on your internetwork. Syntax [LOAD] IPXPING Using IPXPING IPXPING sends an IPX ping request packet to an IPX target node (server or workstation). When the target node receives the request packet, it sends back a reply packet. To select an IPX server or workstation, enter its IPX internal network number and node number.
-
Manual 99a 38 July 17, 2001 Parameter Use to path Specify the path to IPXS.NLM if you moved it from the default directory. LDFILE = [path]\filename[.ext] (Optional) Specify a filename that contains the SAP filtering, SAP and RIP timers, and IPX configuration parameters. Note: If you don’t specify a filename, IPXS sets the parameters defined in the IPXSPX.CFG file. If you don’t specify a file extension, the default is .CFG.
-
Manual 99a 38 July 17, 2001 Additional Information Topic See Filtering RIP and SAP packets using SET “SET” on page 186 Filtering RIP and SAP packets using FILTCFG “FILTCFG” on page 58 Setting IPX parameters using SET “SET” on page 186 Setting IPX parameters using INETCFG “INETCFG” on page 69 JAVA Purpose Load at the server console to start the Novell® JVM for NetWare® product.
-
Manual 99a 38 July 17, 2001 Additional Information Topic See General information about NetWare Java-based components Java-Based Components of NetWare Using Java on the NetWare Server Using Java on the Server KEYB Purpose Use at the server console to change the console keyboard type to the language of your keyboard. The language you specify with KEYB must match the language of your keyboard, not the server language.
-
Manual 99a 38 July 17, 2001 Parameter Use to keyboard_type Specify one of the following keyboard types: Belgium Brazil Canadian French Denmark France Germany Italy Japan Latin America Netherlands Norway Portugal Russia Spain Sweden Swiss French Swiss German United Kingdom United States U.S. International Using KEYB To change the keyboard type, unload KEYB and then reload it, specifying the new keyboard type parameter.
-
Manual 99a 38 July 17, 2001 Syntax LANGUAGE [language_name | number] [LIST | REN number new_name] Parameter Use to (no parameter) View the current language setting for modules. language_name | number Specify a language by its name or number. LIST Display a list of language names and numbers. (Not all languages in the list are supported.) REN number new_name Rename a language specified by a language number.
-
Manual 99a 38 July 17, 2001 Syntax LIST DEVICES Using LIST DEVICES LIST DEVICES forces a scan for devices , displays the return list of storage devices, and registers any new devices with the Media Manager database. This command does not simply read the database. When you are installing new storage devices, you can load drivers with a no scan parameter, and then run LIST DEVICES so that drivers will find their devices simultaneously. The command output is returned by the device drivers.
-
Manual 99a 38 July 17, 2001 However, because disk manufacturers rarely use the logical unit number to identify hard disks, the LUN almost always appears as 0. The driver’s version or revision number appears at the end of the line.
-
Manual 99a 38 July 17, 2001 Examples Following is an example of a listing of a server’s storage adapter and the associated storage device: [V025-A0] NOVELL IDE HOST ADAPTER MODULE [V025-A0-D1: 0] QUANTUM FIREBALL_TM3840a The first line in the example identifies an IDE disk adapter. The second line identifies a hard disk operated by that adapter. The second line is indented to indicate that the device is associated with the adapter in the preceding line.
-
Manual 99a 38 July 17, 2001 Topic See Scan for all SCSI devices or a specified SCSI device and register new devices with the Media Manager “SCAN ALL” on page 176 Storage device drivers Drivers for Host Adapters and Storage Devices Determine the operating status of a storage device Activating and Deactivating a Hard Disk Mounting and dismounting a CD-ROM device Managing Removable Media Devices LIST STORAGE DEVICE BINDINGS Purpose Use at the server console to list all Custom Device Modules (CDMs
-
Manual 99a 38 July 17, 2001 Using LIST STORAGE DEVICE BINDINGS When you execute the command, the screen displays information similar to the following: Device: [V312-A0-D0:0] SEAGATE ST32430N rev:0510 Filter: NetWare Elevator Filter Filter: NetWare Sector Conversion Filter Base: Novell SCSI Fixed Disk CDM HAM: [V312-A0] ADAPTEC PCI Host Adapter Module The first line specifies the device. The next lines specify the CDMs associated with the device.
-
Manual 99a 38 July 17, 2001 Use the LOAD command at the server console to load server NLM programs. You can also use LOAD at a workstation running the Novell® ClientTM to load client modules. Client NLM programs used by Novell Client load without parameters. HINT: In most cases you can load an NLM program by simply entering the name of the NLM program at the server console prompt. LOAD is implied. For example, to load monitor.nlm, just enter MONITOR. The exception is if there is an .
-
Manual 99a 38 July 17, 2001 Memory Protection Parameters Parameter Use to protected module_name Load one module into a new protected address space. By default the space is named ADDRESS_SPACEn, where n is a number. If you want to load more than one module into the same address space, use the address space parameter instead of the protected parameter. restart module_name Load one module into a new protected space with restart functionality.
-
Manual 99a 38 July 17, 2001 Other modules, such as MONITOR, can be loaded, used, and then unloaded. Refer to the documentation for the specific module. You can load modules in protected address space. Because NetWare supports NLM programs running in user mode (ring 3), server-based network applications, such as GroupWise® or Lotus* Notes* can have their own execution environment. You can also load shared libraries such as CLIB in more than one space (point one copy to two places).
-
Manual 99a 38 July 17, 2001 Additional Information Topic See Loading disk drivers Loading Disk Drivers Loading LAN drivers Loading and Binding LAN Drivers Loading name space modules Storing Non-DOS Files on a Traditional Volume Loading modules Loading and Unloading NetWare Loadable Modules Using protected address spaces Loading Protected Address Spaces Using Protected Address Spaces Unloading Protected Address Spaces LOGIN Purpose Use at a workstation to access the network by logging in to a
-
Manual 99a 38 July 17, 2001 Parameter Use to /? View online help. All other parameters are ignored when /? is used. /VER View the version number of the utility and the list of files it uses to execute. All other parameters are ignored when /VER is used. Using LOGIN Using LOGIN implies use of the LOGOUT command. That is, using LOGIN to access an additional server logs you out of all other servers. To remain logged in to other servers, use the no script (/NS) option.
-
Manual 99a 38 July 17, 2001 Option Use to /B Specify a bindery login. /PR=profile_object_name Specify the Profile object script you want to run. /NOSWAP Prevent LOGIN from swapping to extended or expanded memory, or to disk. SWAP=path Tells login to swap to this path when external commands are executed. DOS only. /TREE Specify that you want to log in to a tree.
-
Manual 99a 38 July 17, 2001 Parameter Use to (no parameter) Exit the network by logging out of all servers and eDirectoryTM. server_name Specify the server you want to log out of if you want to log out of one server but remain logged in to other servers or to the eDirectory tree. /option Replace option with any available option. /T Log out of eDirectory and all servers in the eDirectory tree, but not out of bindery servers (NetWare® 2 and 3 servers). /? View online help.
-
Manual 99a 38 July 17, 2001 MAGAZINE Purpose Use at the server console in response to the screen prompts Insert Magazine and Remove Magazine. The screen prompts refer to media magazines (hardware devices that hold several pieces of media). Syntax MAGAZINE [parameter] Parameter Use to Inserted Confirm that the media magazine was inserted in response to the Insert Magazine prompt. Not Inserted Confirm that the media magazine was not inserted in response to the Insert Magazine prompt.
-
Manual 99a 38 July 17, 2001 Syntax MAP [P | NP] [option...] drive:= [drive: | path] [/? | / VER] Parameter Use to (no parameter) View drive mappings. P Map to a physical volume. Must be listed first or second. NP Overwrite local or search drives without being prompted. Must be listed first or second. option Replace option with any available option. See “MAP Options” on page 96. drive: Specify the drive you want to change. path Specify the path you want to map a drive to.
-
Manual 99a 38 July 17, 2001 If you don’t want to overwrite existing search drives, use the INS option. To map to the next available search drive, use S16:=. MAP Options Option Use to P Map to a physical volume. Must be listed first or second. Np Overwrite local or search drives without being prompted. Must be listed first or second. C Change a regular drive to a search drive, or a search drive to a regular drive. DEL Delete a drive mapping.
-
Manual 99a 38 July 17, 2001 To map search drive 4 to PRUFROCK (server) SYS (volume) APP (directory), type MAP S4:=PRUFROCK/SYS:APP To change Y: from a regular NetWare® drive to a search drive, type MAP C Y: To delete the mapping for drive G:, type MAP DEL G: To map drive F: to the DOSGAMES volume of the GAMES directory as a fake root, type MAP ROOT F:=GAMES\DOSGAMES: To map the last possible search drive to IZARD (server) SYS (volume) PUBLIC (directory), type MAP S16:=IZARD/SYS:PUBLIC T
-
Manual 99a 38 July 17, 2001 MEDIA Purpose Use at the server console in response to the screen prompts Insert Media and Remove Media. Syntax MEDIA [parameter] Parameter Use to Inserted Confirm that the specified media was inserted in response to the Insert Media prompt. Not Inserted Confirm that the specified media was not inserted in response to the Insert Media prompt. Not Removed Confirm that the specified media was not removed in response to the Remove Media prompt.
-
Manual 99a 38 July 17, 2001 About Memory Addressing On EISA bus computers, NetWare® 3.1 and later versions address memory above 16 MB. On microchannel and ISA (AT) bus computers, NetWare (all versions) can address memory only up to 16 MB. On PCI bus computers, NetWare can address up to 4 GB. Additional Information Topic See Enabling the operating system to address memory above 16 MB “REGISTER MEMORY” on page 152.
-
Manual 99a 38 July 17, 2001 MIRROR STATUS Purpose Use at the server console to View the status of mirrored disk partitions View the percentage of mirrored data on each partition Syntax MIRROR STATUS [logical_partition_number] Parameter Use to (no parameter) View a list of all logical disk partitions with their mirroring status. logical_partition_number Display the partition’s mirrored status and the devices that make up the members of the mirror group.
-
Manual 99a 38 July 17, 2001 Status Explanation Out of synchronization The partition is out of synchronization with its mirrored partners and for some reason cannot be resynchronized. Additional Information Topic See Mirroring disks Mirroring and Duplexing Partitions MODULES Purpose Use at the server console prompt (or at a workstation running Novell® ClientTM software) to display a list of currently loaded modules.
-
Manual 99a 38 July 17, 2001 Parameter Use to (no parameter) View a list of all loaded modules. string Display a list of all modules with names matching the string. The string can also contain an asterisk (*) as the last character. In this case, the system displays a list of module names where the names begin with the string. For example, MODULES D* displays a list of all modules beginning with the letter D.
-
Manual 99a 38 July 17, 2001 Additional Information Topic See Loadable modules “LOAD” on page 86 “UNLOAD” on page 272 Loading modules Loading and Unloading NetWare Loadable Modules MONITOR Purpose Use at the server console to View server statistics and activity Assess server RAM and processor utilization Set server parameter values Print server parameter settings to a file NOTE: The screen saver and the console-locking features have been removed from MONITOR and incorporated in the SCRSAVE
-
Manual 99a 38 July 17, 2001 The Available Options menu allows you to access additional server information, statistics, and settings. At some windows, you can also perform operations. The General Information window displays many of the key statistics that MONITOR reports. The arrow to the left of the vertical line in the Available Options menu indicates that the menu can be scrolled.
-
Manual 99a 38 July 17, 2001 The following table describes the fields of General Information. Field Explanation Operating system version and date The version and release date of the system (upper- left corner of the screen). Server server name on network tree name The name of the server and the eDirectoryTM tree name. Utilization Average of the server’s total processing capacity that was used during the last second (default update interval), expressed as a percentage.
-
Manual 99a 38 July 17, 2001 Field Explanation Server Up Time Time elapsed since the server was most recently started. This value is displayed in the format DD:HH:MM:SS (days:hours:minutes:seconds). Use this information to detect power failures or to determine whether an intruder brought down the server. Online Processors The number of enabled and active processors.
-
Manual 99a 38 July 17, 2001 Field Explanation Dirty Cache Buffers Number of cache buffers that contain updated data that has not yet been written to disk. The operating system writes the data to disk either as soon as the cache buffer is filled or else when the Dirty Disk Cache Delay Time elapses (default 3.3 seconds). The trade-off is between allowing small writes to wait the delay time or reducing the delay time and performing two writes.
-
Manual 99a 38 July 17, 2001 Field Explanation Packet Receive Buffers Number of buffers that are available to the file system for holding client requests until they can be processed. Also referred to as communication buffers. The buffer size is fixed and is determined by the network board. The server allocates buffers as needed within minimum and maximum parameter values. For a description of these parameters, see SET “Communications Parameters” on page 192.
-
Manual 99a 38 July 17, 2001 Field Explanation Current Service Processes Number of threads or task handlers that are currently allocated to service client NCP requests. As the number of client requests increases, the server creates more service processes within minimum and maximum parameters. As this value approaches the maximum number that can be created, server performance will be adversely affected. An alert appears when the maximum number is reached.
-
Manual 99a 38 July 17, 2001 The following table explains what information can be accessed through MONITOR options. Menu Option Use to Connections List active connections. Determine connection status—whether connections are licensed or unlicensed, authenticated or Not-Logged-In, or waiting on a lock. View client’s network address, connection time, number of requests, kilobytes read, kilobytes written, semaphores used, and number of logical record locks.
-
Manual 99a 38 July 17, 2001 Menu Option Use to Storage Devices List system storage devices, including hard disks, controllers, adapters, media, magazines, changers, and slots. View divisions of the media’s capacity given to the operating system, including partitions, Hot FixTM and Mirror objects. View dependencies of each object.
-
Manual 99a 38 Menu Option Use to Volumes View per-volume mount status. July 17, 2001 See which file system is used on each volume. View per-volume information on loaded name spaces. View per-volume information on compression status, suballocation, file migration status, and number of migrated files. See whether volume is read-only.
-
Manual 99a 38 July 17, 2001 Menu Option Use to Loaded Modules List modules loaded on the system by name. Recover unused memory pages (garbage collection) per module. View major version, minor version, revision number, and creation date of the module. View bytes of memory required to load this module (code, data, and messages). View amount of memory requested by the NLMTM for its use in bytes and nodes. View the module’s load flags. List resources allocated by the module (resource tags).
-
Manual 99a 38 July 17, 2001 Menu Option Use to Disk Cache Utilization View disk cache block request statistics, including total cache block requests, the number of times a block request had to wait because there were no available cache blocks, long and short term cache hits and dirty cache hits. Use the Long Term Cache Hits information (the percentage of time the operating system retrieves the data it needs directly from cache) to assess cache utilization.
-
Manual 99a 38 July 17, 2001 Menu Option Use to Virtual Memory View virtual memory by address spaces or swap files. View the number of NLM programs loaded in each address space. View per-address space information, including number of times the address space faulted and restarted, and elapsed time since the last fault. View page faults statistics. View amount of allocated memory the NLM requested, in bytes and nodes. Recover unused memory pages (garbage collection) in the OS address space.
-
Manual 99a 38 July 17, 2001 Menu Option Use to Kernel View kernel information by all threads, processors, interrupts, and busiest threads. View the list of all threads running on the system In NetWare 5, all threads running on a NetWare server are grouped into two categories called NetWare Application and Java Application. To access NetWare 5 thread information, you select Kernel > Applications > NetWare Application [or] Java Application.
-
Manual 99a 38 July 17, 2001 For a description of the MONITOR Server Parameters, see the tables for each parameter category in “SET” on page 186.
-
Manual 99a 38 July 17, 2001 Parameter Use to volume_name Specify the name of the volume you want to mount. ALL Mount all volumes not mounted. Using MOUNT If you set up the AUTOEXEC.NCF file to mount all volumes automatically each time the server comes up, then you would use the MOUNT command only if you have dismounted a volume and want to remount it. After you replace a removable drive, use this command to mount all volumes residing on the removable drive.
-
Manual 99a 38 July 17, 2001 NAME Purpose Use at the server console to display the server name. HINT: You can also use the SET parameter, Replace Console Prompt with Server Name = servername, in autoexec.ncf to display the server name with the console prompt. See SET “Miscellaneous Parameters” on page 210. This is very useful where you have multiple server consoles in one location or access several servers from a single management console.
-
Manual 99a 38 July 17, 2001 device address, and device-specific information such as the manufacturer and model number. Event Notification Service. This service allows printers to send customizable notifications to users and operators about printer events and print job status. The Notification Service supports a variety of delivery methods including NetWare pop-up, log file, e-mail (GroupWise®), and programmatic. Resource Management Service.
-
Manual 99a 38 July 17, 2001 NDPS Manager Purpose A Novell® Distributed Print ServicesTM (NDPS®) Manager provides a platform for Printer Agents that reside on the server. An NDPS Manager must be created as an object in the eDirectory tree before you can create serverbased Printer Agents. Using NDPS Manager The NDPS Manager object stores information used by the NetWare Loadable ModuleTM (NLM) program named NDPSM.NLM.
-
Manual 99a 38 July 17, 2001 NetWare ConnectView Purpose NetWare® ConnectViewTM opens a View All window whenever the application is started. The ViewAll window lets you quickly view a list of managed servers, display and control the servers’ resources, and view summary information about them. Server resources include the boards/ drivers, port groups, ports, and remote access services. To view this data, you need the Simple Network Management Protocol (SNMP). NetWare Login Purpose Use at a Windows* 3.
-
Manual 99a 38 July 17, 2001 Using NetWare Login Use the options provided in the NetWare Login dialog box or in your Client 32TM settings. For more information, see the online Help for NetWare Login. Additional Information Topic See NetWare Login dialog box Online Help within the dialog box Command-line options “LOGIN” on page 90 Client 32 settings Online Help within the dialog box NetWare Remote Manager Purpose Use at a workstation through a Web browser to diagnose and manage NetWare® servers.
-
Manual 99a 38 July 17, 2001 NIASCFG Purpose NIASCFG enables you to configure Novell® Internet Access Server 4.1 software. You can set up and customize your internetworking configuration for PPP, IPXTM, IP, AppleTalk*, and the source route bridge. Novell Printer Manager Purpose The Novell® Printer Manager allows workstation users to manage all of their Novell Distributed Print ServicesTM (NDPS®) printing tasks including printer installation, customized printer configuration, and print job management.
-
Manual 99a 38 July 17, 2001 Additional Information Topic See Using Novell Printer Manager Using the Novell Printer Manager Workstation Utility (http://www.novell.com/documentation/ lg/nw51/ndps_enu/data/htwn0jb2.html) Novell Migration Wizard The Novell® Migration Wizard utility lets you copy your NetWare® 3.1x server bindery and file system across the wire and place them in a desired location in an existing eDirectoryTM tree.
-
Manual 99a 38 July 17, 2001 NSS Purpose Use the Novell® Storage ServicesTM (NSSTM) console commands to do the following: Unload NSS Display NSS module or volume information Check NSS volume statistics Change NSS caching Modify other NSS tunables Using NSS To use the NSS console commands, enter the following at the server console: nss /help or nss /? opens the NSS console Help facility. nss /modules lists the providers, loadable storage subsystems, and semantic agents.
-
Manual 99a 38 July 17, 2001 NSS DOS FAT Commands Use these NSS DOS FAT commands at the server console: nss /(No)FATInMemory loads the entire FAT into memory for faster access, regardless of its size. The default is OFF. nss /(No)FATLongNames enables long filenames on FAT volumes. The default is ON. nss /(No)FATLazyWrites performs lazy writes of FAT. The default is ON. nss /FATLazyWriteDelay=value sets the FAT lazy write delay (in seconds). The default is 60. The range is 5 to 180.
-
Manual 99a 38 July 17, 2001 NSS Buffer Cache Commands Use these NSS commands at the server console to change your cache buffers: nss /MinBufferCacheSize sets the minimum buffer size. The default is 512. The range is 256 to 1048576. When NSS is loaded, it requires at least 512 cache buffers. nss /MinOSBufferCacheSize sets the minimum size for NetWare. The default is 1024. The range is 1024 to 1048576. We do not recommend that you set this value below 1024.
-
Manual 99a 38 July 17, 2001 nss /Maintenance=volume_name switches the specified NSS volume to maintenance mode. nss /ForceActivate=volume_name forces an NSS volume to become active. nss /VerifyVolume=volume_name verifies the specified NSS volume’s physical integrity. nss /RebuildVolume=volume_name rebuilds the specified NSS volume. nss /RebuildVolume allows you to select an NSS volume from the menu for rebuild. nss /AutoVerifyVolume=volume_name allows you to verify an NSS volume at startup.
-
Manual 99a 38 July 17, 2001 Additional Information Topic See Using the NSS Administration menus Setting Up and Configuring Novell Storage Services in the Novell Storage Services Administration Guide NSWEB Purpose Use NSWEB and NSWEBDN to start and stop the NetWare® Web Manager and NetWare Enterprise Web Server. Syntax NVXWEBUP NVXWEBDN NVXADM Purpose Use NVXADMUP and NVXADMDN to start and stop the NetWare® Web Manager.
-
Manual 99a 38 July 17, 2001 NVXWEB Purpose Use NVXWEBUP and NVXWEBDN to start and stop the NetWare® Web Manager. Syntax NVXWEBUP NVXWEBDN NWBACK32 Purpose From a Windows* 95 or Windows NT* workstation, use this graphical utility to back up or restore Storage Management ServicesTM (SMSTM) targets such as eDirectoryTM, binderies, the file system, or hard disks.
-
Manual 99a 38 July 17, 2001 1 Log in to the desired eDirectory tree. 2 Select Network Neighborhood > Novell > Sys:public >Nwback32. The Quick Access window appears. Using NWBACK32 The following sections describe how the elements of NWBACK32 work. There are three methods for using NWBACK32: Quick Access, the toolbar, or the menu bar. Use the Quick Access window to determine what you want to back up or restore. Then Quick Access window does not contain as many features as in the menus or toolbar.
-
Manual 99a 38 July 17, 2001 Job Administration lets you view and change jobs. Reports lets you view the details of session and error reports. Exit quits NWBACK32. When you reach your destination, in most instances you can right-click the last item. You may also use the menu bar or the toolbar to complete the task. Using the Menu Bar The menu bar displays headings for various menus. The tasks in the menus contains all the features the toolbar uses and more than the Quick Access menu.
-
Manual 99a 38 July 17, 2001 Start create session initializes a new session for the job. Job administration contains options for checking properties of jobs, enabling or deleting jobs, starting or holding jobs, rescheduling a job, or aborting a job. Device administration contains options for changing device labels or types, attaching to media, releasing a device, viewing media properties, erasing the media, moving the media, retension the media, or create a new media label.
-
Manual 99a 38 July 17, 2001 NWCCON Purpose Use this utility to configure remote access options. To use this utility, load NIASCFG and select Configure NIAS > Remote Access. NWCONFIG Purpose Use at the server console to Modify your NetWare® server’s configuration Perform server management operations Install additional products Syntax [LOAD] [path]NWCONFIG Parameter Use to path Specify the path to NWCONFIG if you moved it from the default directory.
-
Manual 99a 38 July 17, 2001 Menu Option Use to NSS Disk Options This functionality has been moved to ConsoleOne. License Option Install and remove licenses and re-create licensing objects in the eDirectoryTM tree. Copy Files Option Copy NetWare files to various directories on volume SYS:. Directory Options Install and remove eDirectory. Upgrade NetWare 3 bindery information to the eDirectory tree. Upgrade mounted volumes into the eDirectory tree.
-
Manual 99a 38 July 17, 2001 NWCRPAIR Purpose NWCRPAIR.NCF is a troubleshooting utility that recovers corrupted Btrieve* files. Corrupted Btrieve files may be the result of a remote access server abend (terminate program execution abnormally). Use this utility if you receive an initialization failure when you bring up remote access with NWCSTAT. NWCSTAT Purpose Use NWCSTAT to display remote access status.
-
Manual 99a 38 July 17, 2001 Using ORBCMD To use the Novell ORB, you must also start the Smart Agent, which provides the Novell ORB’s directory service and failure detection services. After you load ORBCMD, enter the following at the server console: [LOAD] OSAGENT To distribute and run CORBA-compliant applications on the network or to provide a development environment for CORBA applications, you will need the Open Solutions Architecture (OSA) Software Developers Kit (SDK).
-
Manual 99a 38 July 17, 2001 To start sending packets, press Esc. The sending node continues to send request packets and collect response time statistics until you press Esc again to exit PING. To select additional IP nodes, press Insert. Enter the hostname or IP address of the node in the Host Name field. Press Esc to start sending packets. PPPCON Purpose Use PPPCON to view Point-to-Point Protocol (PPP) interface configuration and statistical information.
-
Manual 99a 38 July 17, 2001 PROTECT Purpose Use at the server console to load NLMTM programs into a protected address space when the commands to load the NLM programs are in a .ncf file. Specify the .ncf file as a parameter to the command. Syntax PROTECT filename Using PROTECT Use this command when you normally use a .NCF file to load multiple modules at once, and you want the modules to be loaded into the same protected address space.
-
Manual 99a 38 July 17, 2001 Syntax PROTECTION [RESTART | NO RESTART address_space] Parameter Use to no parameter) Display a list of address spaces and the modules loaded into them. RESTART address_space Add restart functionality to the designated address space. NO RESTART address_space Remove restart functionality from the designated address space. Using PROTECTION When you execute PROTECTION without parameters, the server displays a list of all loaded address spaces.
-
Manual 99a 38 Parameter Use to REGISTER Register a protocol. July 17, 2001 It is only necessary to use PROTOCOL REGISTER in unusual cases, such as when using a new media. protocol Specify the protocol name. frame Specify the name representing the frame type that is to be bound to the communication protocol. id# Specify the protocol identification number (also called a protocol ID, PID, an Ethernet type or E-type, or an SAP).
-
Manual 99a 38 July 17, 2001 PSERVER Purpose A print server is a software program that monitors and manages printers and print queues. PSERVER is the native NetWare® print server that takes jobs from a NetWare print queue and directs them (via NPRINTER) to the assigned printer. In NetWare 6 software, PSERVER is available only as a NetWare Loadable ModuleTM (NLMTM) program that can be loaded on a NetWare server. NOTE: Multiple PSERVER modules cannot run concurrently on the same NetWare server.
-
Manual 99a 38 July 17, 2001 RCONAG6 Purpose RCONAG6.NLM is the RConsoleJ Agent. Load this NLMTM at the server console to allow remote console access to the server, using RConsoleJ Client. Syntax LOAD RCONAG6 [ENCRYPT] [-Edigest | password IP_port IPX_port secure_IP_port] Parameter Use to (no parameter) Load RCONAG6 without command line parameters. You will be prompted for a password, IP port number, and IPXTM port number, Secure IP port number.
-
Manual 99a 38 July 17, 2001 Parameter Use to IPX_port Specify the IPX port number that RCONAG6 will listen for a proxy server on. The default is 16800. -1 disables IPX listening. 0 allows a dynamically assigned port to be used. secure_ IP_port Specify the Secure IP port number that RCONAG6 will listen for RConsoleJ on a SSL-based port on. The default is 2036. -1 disables Secure IP listening. 0 allows a dynamically assigned port to be used.
-
Manual 99a 38 July 17, 2001 If you want to connect to an SPX server using RConsoleJ, you must also create a proxy server using RCONPRXY.NLM. To make RConsoleJ sessions available whenever you boot the server, enter the following command in the AUTOEXEC.NCF file. (This assumes you have encrypted the password and created the SYS:SYSTEM\LDRCONAG.NCF file.
-
Manual 99a 38 July 17, 2001 Parameter Use to TCP Port This is the TCP port number on which RCONPRXY will listen for RConsoleJ. The default is 2035. 0 allows a dynamically assigned port to be used. Using RCONPRXY Use RCONPRXY.NLM to allow RConsoleJ to communicate with an NetWare 6 server IPX-only. RCONPRXY creates a proxy server through which RConsoleJ can communicate with the IPX-only server. The proxy server must run both IP and Streams-based SPXTM services.
-
Manual 99a 38 July 17, 2001 RConsoleJ Purpose Use at a workstation or server to remotely control a NetWare® server. IMPORTANT: For security reasons, this version of RConsoleJ must be used only inside firewalls.
-
Manual 99a 38 July 17, 2001 Additional Information Topic See RConsoleJ Remote Server Management Using RCONAG6 “RCONAG6” on page 144 Using RCONPRXY “RCONPRXY” on page 146 REBUILD Purpose Use REBUILD to recover corrupted Novell® Storage ServicesTM (NSS) volumes. The REBUILD utility salvages the data it finds on your corrupted NSS volume and recovers it. NetWare® users may be used to using VREPAIR to repair and rebuild NetWare volumes.
-
Manual 99a 38 July 17, 2001 Rebuild NSS Volumes Using the NSS Administration Menus To rebuild NSS volumes, do the following. 1 Load NSS. 2 Open the NSS Administration menus, by entering nss /me 3 Select Utilities > Rebuild NSS Volume. 4 Select the volume to rebuild. 5 Return to Utilities at the main menu and select Verify NSS Volume to check your volume’s integrity. Rebuild NSS Volumes Using the Server Console To rebuild NSS volumes at the server console, do the following. 1 Load NSS.
-
Manual 99a 38 July 17, 2001 If you don’t enter the NSS volume name parameter, you will be prompted to select it. Additional Information Topic See Maintaining NSS volumes Viewing Storage Objects Setting up NSS volumes Setting Up and Configuring Novell Storage Services in the Novell Storage Services Administration Guide RECORD Purpose Use at the server console to record command sequences that you enter at the console over and over. The RECORD command creates a temporary batch file on the server.
-
Manual 99a 38 To Enter Close the recording session and save it as SYS:SYSTEM\MYLIST1.NCF RECORD STOP NCF Execute the list of commands in the MYLIST1 session REPLAY MYLIST1 Save the MYLIST1 session that has already been closed to SYS:SYSTEM\MYLIST1.NCF. RECORD SAVE MYLIST1 July 17, 2001 Additional Information For information, see “REPLAY” on page 162.
-
Manual 99a 38 July 17, 2001 Parameter Use to start_address Specify the hexadecimal address where the memory you’re adding will start. This is the amount of RAM your server currently recognizes and addresses. This number is usually 16 MB (1000000h); however, the default varies depending on the machine type. To obtain the start address, use the MEMORY command and convert its output to hexadecimal.
-
Manual 99a July 17, 2001 38 An incorrect hexadecimal value was specified for start address or amount. The amount value exceeds the total installed memory. Use the setup or reference diskette that came with the computer to determine the total amount of installed memory. NOTE: You must avoid memory address conflicts. A conflict occurs if an adapter board uses 16- or 24-bit DMA or Bus-Master DMA.
-
Manual 99a 38 July 17, 2001 Total Memory Start Address Amount of Memory to Add 256 MB 16 MB = 1000000h 240 MB = F000000h 400 MB 16 MB = 1000000h 384 MB = 18000000h 1 GB (1000 MB) 16 MB = 1000000h 984 MB = 3D800000h 3 GB (3000 MB) 16 MB = 1000000h 2984 MB = BA800000h 3 GB (3000 MB) 64 MB = 4000000h 2936 MB = B7800000h REGISTER MEMORY requires that the amount of memory to be registered is stated in hexadecimal format.
-
Manual 99a 38 July 17, 2001 Examples To add 4 MB of memory above 16 MB, type REGISTER MEMORY 1000000 400000 To add 24 MB of memory above 16 MB, type REGISTER MEMORY 1000000 1800000 Additional Information Topic See Editing the startup.ncf file Using Server Batch Files Displaying the total amount of memory the server is addressing “MEMORY” on page 98 REINITIALIZE SYSTEM Purpose Use at the server console to enable configuration changes made since the commands in the NETINFO.
-
Manual 99a 38 July 17, 2001 Limitations of REINITIALIZE SYSTEM REINITIALIZE SYSTEM unloads any NLM affected by a configuration change. If REINITIALIZE SYSTEM cannot unload the NLM because of interdependencies with other modules, the configuration change will not take effect. Additionally, not all NLM files register with SNMP for notification of REINITIALIZE SYSTEM. When you create a new configuration or delete an existing configuration, REINITIALIZE SYSTEM recognizes the change.
-
Manual 99a 38 July 17, 2001 Parameter Use to number Specify the number of the logical partition you want to start remirroring.
-
Manual 99a 38 July 17, 2001 Parameter Use to board_instance Specify the instance number of the board if there is more than one board of the same type in the server. Find the instance number in MONITOR by selecting LAN/WAN Drivers and highlighting the driver name. The information window at the top of the screen displays information about the driver, including Board Instance Number.
-
Manual 99a 38 July 17, 2001 Parameter Use to board_number Specify the logical board number. Find the logical board number in MONITOR by selecting LAN/WAN Drivers and highlighting the driver name. The information window at the top of the screen displays information about the driver, including Logical Board Number. board_name Specify the logical board name. A name can be assigned to a logical board when the board is loaded using the LOAD command.
-
Manual 99a 38 July 17, 2001 Using REMOVE STORAGE ADAPTER If only one instance of the driver is currently loaded, the entire driver is unloaded. If multiple instances of the driver are loaded, only the selected instance is unloaded. REPLACE Purpose Use at the server console to unload and reload a specific module in one step. Entering this command unloads the module and reloads it using the current search path order.
-
Manual 99a 38 July 17, 2001 REPLAY Purpose Use at the server console, to execute a list of commands that were recorded in and saved in a session using the RECORD command. Syntax REPLAY [session_name] For example, if the session was named MYLIST1, enter REPLAY MYLIST1 Additional Information For information, see “RECORD” on page 151. RESET ENVIRONMENT Purpose Use at the server console to reset server parameters that have been modified to their default values.
-
Manual 99a 38 July 17, 2001 Additional Information Topic See List server parameters with current settings “DISPLAY ENVIRONMENT” on page 41 List server parameters with modified settings “DISPLAY MODIFIED ENVIRONMENT” on page 44 Print server parameters with current settings to a file. “MONITOR” on page 103 MONITOR Available Options > Server Parameters RESET NETWORK ADAPTER Purpose Use at the server console to reset a network adapter manually.
-
Manual 99a 38 July 17, 2001 Using RESET NETWORK ADAPTER You might want to reset an adapter manually if you suspect a problem with the hardware. Resetting the adapter also resets the logical boards associated with the adapter. Network adapters reset themselves automatically if something goes wrong. About one reset a day is normal. A great number of resets, such as one reset a minute, usually indicates a hardware problem. Resets are included in the LAN statistics displayed in MONITOR.
-
Manual 99a 38 July 17, 2001 Parameter Use to board_number Specify the logical board number. Find the logical board number in MONITOR by selecting LAN/WAN Drivers and highlighting the driver name. The information window at the top of the screen displays information about the driver, including Logical Board Number. board_name Specify the logical board name. A name can be assigned to a logical board when the board is loaded using the LOAD command.
-
Manual 99a 38 July 17, 2001 RESTART SERVER Purpose Use at the server console to bring down the server and then to restart it immediately after. Syntax RESTART SERVER [-parameter] Parameter Use to (no parameter) Restart the server and invoke all .ncf files. -ns Restart the server without invoking the startup.ncf file. For example, type: RESTART SERVER -ns -na Restart the server without invoking the AUTEXEC.NCF file.
-
Manual 99a 38 July 17, 2001 RIGHTS Purpose Use at a workstation to View or modify user or group rights for files View or modify user or group rights for directories and volumes Syntax RIGHTS path [[ + | - ] rights] [/option...] [/? | /VER] Parameter Use to path Specify the path to the file, directory, or volume you want to modify or view rights to (you must always specify a path). +|- Add or delete the specified rights. See “Using RIGHTS” on page 169.
-
Manual 99a 38 July 17, 2001 Option Use to /I View the trustee and group rights that created the inherited rights, and view where the inherited rights came from. /NAME=username View or modify rights for the user or group listed. Replace username with the name of the user or group whose rights you want to view or modify. /S View or modify subdirectories below the current level. /T View trustee assignments in a directory.
-
Manual 99a 38 July 17, 2001 Using RIGHTS If you use + (plus) to add rights, the rights you list are added to the existing rights. If you use - (minus) to remove rights, the rights you list are deleted from the existing rights. If you add and delete rights in the same command, group all added rights together and all deleted rights together. If you list rights without using + or -, the rights you list replace the existing rights. You must always specify a path. You can use a period (.
-
Manual 99a 38 July 17, 2001 ROUTE and most ROUTE parameters can also be configured using the INETCFG utility. See “Configuring Source Route End Station Parameters with INETCFG” on page 174. Syntax [LOAD] [path]ROUTE [BOARD=number] [NAME=board_name] [DEF|GBR|MBR] [TIME=number] [RSP=AR|NR] [CLEAR] | [REMOVE=number] [XTX=number] [UNLOAD [BOARD=number]] Parameter Use to path Specify the path to ROUTE.NLM if you moved it from the default directory.
-
Manual 99a 38 July 17, 2001 Parameter Use to GBR (General Broadcast frames) Specify that all General Broadcast frames are to be sent as All Routes Broadcast frames. If this parameter is not specified when ROUTE is loaded, all General Broadcast frames are broadcast as Single Route Broadcast frames. If ROUTE is already loaded with the GBR parameter, reloading ROUTE with GBR broadcasts all General Broadcast frames as All Routes Broadcast frames.
-
Manual 99a 38 July 17, 2001 Parameter Use to RSP=value (Respond) Specify how the server should respond to a broadcast request. Replace value with one of the following: NR: Specifies that all Broadcast Requests are to be responded to directly; a Broadcast Response isn’t required. AR (the default): Specifies that all Broadcast Requests are to be responded to with an All Routes Broadcast frame. CLEAR Clear the Source Routing table.
-
Manual 99a 38 July 17, 2001 Parameter Use to UNLOAD [BOARD=number] Use to remove source routing support for a specified board. If you don’t specify a board number, the default is 1. Example: LOAD ROUTE UNLOAD BOARD=2 Note: This parameter does not unload ROUTE.NLM, but disables source routing only for the board that you specify. Using ROUTE No parameters are required. However, you can load ROUTE a second time with a specified parameter to change the configuration.
-
Manual 99a 38 July 17, 2001 Configuring Source Route End Station Parameters with INETCFG You can use INETCFG to load ROUTE and configure many source route end station parameters. To use INETCFG, follow these steps. 1 Load INETCFG. 2 Select Internetwork Configuration > Boards to load a token-ring board. 3 Return to the Internetwork Configuration menu and use the Protocols option to enable Source Route End Station. 4 Return to the Internetwork Configuration menu and select Bindings.
-
Manual 99a 38 July 17, 2001 Parameter Use to Send Frames with Unknown Address (same as DEF [Default] command line parameter) Specify the type of explorer frame the end station source router sends to an unknown node address. Options: Single Route Explorer Frame, All Routes Explorer Frame Default: Single Route Explorer Frame Send Broadcast Frames (same as GBR command line parameter) Specify the type of explorer frame the end station source router sends to a broadcast destination address.
-
Manual 99a 38 July 17, 2001 SCAN ALL Purpose Use at the server console to scan all LUNs of all SCSI adapters in the server or all LUNs associated with a designated SCSI adapter. IMPORTANT: SCAN ALL forces a scan and takes an order of magnitude longer to execute than SCAN FOR NEW DEVICES does. SCAN ALL should be used only when you know that there is an undetected device on a LUN other than LUN0. Syntax SCAN ALL An Parameter Use to (no parameter) Scan all LUNs of all SCSI adapters in the server.
-
Manual 99a 38 July 17, 2001 SCAN FOR NEW DEVICES forces a scan on LUN0 of SCSI adapters and registers new devices with the Media Manager so that they are available to the operating system. This command scans only SCSI devices.
-
Manual 99a 38 July 17, 2001 Using SCAN FOR NEW DEVICES Use this utility if you add new devices after you boot your server and the devices do not then appear with the LIST DEVICES command. If devices have been added, but the drivers aren’t loaded in startup.ncf, use SCAN FOR NEW DEVICES after loading the drivers to register the devices with the system. After you boot the server, if NetWare® detects new devices, SCAN FOR NEW DEVICES registers the devices with the operating system.
-
Manual 99a 38 July 17, 2001 Topic See Storage device drivers Drivers for Host Adapters and Storage Devices Determine the operating status of a storage device Activating and Deactivating a Hard Disk Mounting and dismounting a CD-ROM device Managing Removable Media Devices SCRSAVER Purpose Use to lock the server console and to activate a screen saver for the console display. NOTE: The screen saver and the console-locking features were formerly part of MONITOR. Separating them from monitor.
-
Manual Command options 99a 38 July 17, 2001 Use to AUTO CLEAR DELAY Set the number of seconds to wait before clearing the unlock dialog box. The range is 1 to 300 and the default is 60, or one minute. DELAY Set the number of seconds to wait before activating the screen saver. The range is 1 to 7000 and the default is 600, or 10 minutes. DISABLE Disable the screen saver, thereby preventing it from activating and saving the console display.
-
Manual 99a 38 July 17, 2001 Using SCRSAVER When the screen saver is displayed, a snake-like figure—one for each online processor—appears on the blank console screen. The snake for processor 0 is red and the snake for processor 1, blue, etc. The snakes move randomly on the screen, and as processor utilization increases, the snakes move faster and their tails lengthen. When scrsaver.nlm is loaded, the server console can be in one of three states. Active.
-
Manual 99a 38 July 17, 2001 SEARCH Purpose Use at the server console to Tell the server where to look for loadable module files and .ncf files Add other search paths or delete current search paths View the current search paths for the operating system Syntax SEARCH [ADD [number] path] or SEARCH DEL [number] Parameter Use to (no parameter) View the current search paths. number Specify the number of the search drive you want to add or remove.
-
Manual 99a 38 July 17, 2001 Example To display the current server search paths, type SEARCH To add vol1:ncf (a network directory) as a search path, type SEARCH ADD VOL1:NCF Additional Information Topic See Search drives Network Search Drive Mappings SECURE CONSOLE Purpose Use at the server console to increase network security by Preventing loadable modules from being loaded from any directory other than the boot directories—SYS:SYSTEM or C:\NWSERVER Preventing keyboard entry into the opera
-
Manual 99a 38 July 17, 2001 Trojan Horse modules. If you don’t use SECURE CONSOLE, a module can be loaded from a DOS partition, a diskette drive, or any directory on a NetWare® volume. If you allow modules to be loaded from all these drives, anyone who has access to the server console can load a loadable module. An intruder could create a module to access or alter any information on the server, or to change user account information at the server security level. Date and Time Modifications.
-
Manual 99a 38 July 17, 2001 Syntax SERVER [parameter] Parameter Use to -s [path]filename.NCF Specify an alternative to STARTUP.NCF. Replace filename with the name of the alternate file. (The file extension must be .NCF) The system looks for the file in the current boot directory, unless you specify a path. -na Prevent the autoexec.ncf file that you created in INSTALL from executing. This parameter is useful if you are changing drivers or other commands in your AUTOEXEC.NCF file.
-
Manual 99a 38 July 17, 2001 SERVER executes startup.ncf and autoexec.ncf, if they exist. To prevent the Novell® logo (server splash screen) from displaying, you can load SERVER with the -nl (no logo) command option. Otherwise the graphics screen displays for about 10 seconds while server components are loading in the background. HINT: To substitute a different image for the current logo screen, place a file called NWLOGO.BMP (for machines using a 256-color palette) or NWLOGO16.
-
Manual 99a 38 July 17, 2001 Parameter categories: Common File System Parameters (page 189) Communications Parameters (page 192) Directory Services Parameters (page 196) Disk Parameters (page 201) Error Handling Parameters (page 203) Licensing Services Parameters (page 207) Memory Parameters (page 207) Miscellaneous Parameters (page 210) Multiprocessor Parameters (page 218) NCP Parameters (page 219) Novell Storage Service Parameters (page 223) Service Location Protocol Parameters (page 223) Time Paramet
-
Manual 99a 38 July 17, 2001 Entering Parameters You can modify the values of most SET parameters at the console prompt. The system is immediately configured to that setting. Any setting in the AUTOEXEC.NCF file is overridden. You can enter SET commands that you execute at the console prompt in the AUTOEXEC.NCF file. When a parameter value is set in this file, the server configures itself to that setting each time the server is booted— unless the value is modified.
-
Manual 99a 38 July 17, 2001 Common File System Parameters Common File System Parameters contain parameters that apply to both the NSS file system and the traditional file system. For a description of file system parameters, see the following table. Table 4 Common File System Parameters Parameter Use to Maximum Transactions = number Specify how many transactions can occur at the same time.
-
Manual 99a 38 July 17, 2001 Parameter Use to Compression Daily Check Starting Hour = number Specify the hour when you want the file compressor to start scanning enabled volumes for files that need to be compressed. Supported values: 0 to 23 Default: 0 Hours are specified by a 24-hour clock: 0 = midnight; 23 = 11 p.m.
-
Manual 99a 38 July 17, 2001 Parameter Use to Convert Compressed to Uncompressed Option = value Specify what the file system does with an decompressed version of a file after the server has decompressed it. Supported values: 0 = Always leave the file compressed. 1 = Leave the file compressed until second access if it is read only once during the time specified by the Days Untouched Before Compression parameter. 2 = Always leave the file decompressed.
-
Manual 99a 38 July 17, 2001 Parameter Use to Days Untouched Before Compression = number Specify the number of days the system waits after a file was last accessed before it is compressed. Supported values: 0 to 100000 Default: 14 This parameter can be set in the STARTUP.NCF file. Communications Parameters Communication parameters control settings for communication buffers. Four parameters configure packet receive buffers; four control the watchdog.
-
Manual Table 5 99a 38 July 17, 2001 Communications Parameters Parameter Use to Maximum Packet Receive Buffers = number Specify the maximum number of packet receive buffers the operating system can allocate. Supported values: 50 to 25000 Default: 5000 Before increasing this parameter, use MONITOR to view the server’s use of packet receive buffers and service processes.
-
Manual 99a 38 July 17, 2001 Parameter Use to Minimum Packet Receive Buffers = number Specify the minimum number of packet receive buffers the operating system can allocate. The operating system allocates this number of buffers as soon as the server boots. You must add this command to the startup.ncf file. You cannot change the setting at the console prompt.
-
Manual 99a 38 July 17, 2001 Parameter Use to IPX NetBIOS Replication Option = number Specify how the IPXTM router handles replicated NetBIOS broadcasts. Supported values: 0 = Do not replicate NetBIOS broadcasts 1 = Duplicate broadcasts when there are redundant routes 2 = Suppress duplicate broadcasts Default: 2 Maximum Interrupt Events = number Specify the maximum number of interrupt time events (such as IPX routing) allowed before a thread switch is guaranteed to have occurred.
-
Manual 99a 38 July 17, 2001 Parameter Use to New Packet Receive Buffer Wait Time = time Specify how long the operating system waits after receiving a request for a packet receive buffer before granting a new buffer. Supported values: 0.1 second to 20 seconds Default: 0.1 second This parameter prevents the system from granting too many buffers during a sudden peak in usage. If you have an EISA bus master board in your server, don’t change this parameter.
-
Manual Table 6 99a 38 July 17, 2001 Directory Services Parameters Parameter Use to eDirectory Trace to Screen = value Enable the eDirectory trace screen; this displays information about eDirectory events on the monitor. Supported values: ON, OFF Default: OFF eDirectory Trace to File = value Send messages about eDirectory events to the eDirectory trace file on volume SYS. The default file is SYSTEM:\DSTRACE.DBG.
-
Manual 99a 38 July 17, 2001 Parameter Use to eDirectory Inactivity Synchronization Interval = number_in_minutes Specify the maximum elapsed time between exhaustive synchronization checks. As soon as you change this value, the system executes the synchronization check. Synchronization checks then recur at the specified interval. Supported values: 2 to 1440 minutes Default: 30 If the system has replicas across a WAN link, this value should be set as high as 240 minutes (4 hours) to reduce WAN traffic.
-
Manual 99a 38 July 17, 2001 Parameter Use to eDirectory Janitor Interval = number_in_minutes Specify the interval in minutes at which the janitor process is executed. The janitor process is executed as soon as you change this value and then recurs at the specified interval. Supported values: 1 to 10080 minutes Default: 60 The janitor process cleans up unused records, reclaims disk space, and purges objects flagged for deletion.
-
Manual 99a 38 July 17, 2001 Parameter Use to Check Equivalent to Me = value Enforce checking of the Equivalent To Me attribute on eDirectory authentication. Supported values: ON, OFF Default: OFF If this parameter is set to ON, DSREPAIR must be used to synchronize the Equivalence attribute and the Equivalent To Me attribute. Setting this parameter to ON might adversely affect communication performance.
-
Manual 99a 38 July 17, 2001 Disk Parameters Disk parameters control Hot FixTM redirection, as well as other aspects of disk reads and writes. For a description of disk parameters, see the following table. Table 7 Disk Parameters Parameter Use to Sequential Elevator Depth = number Set the maximum elevator depth for sequential requests. Media Manager sends the number of sequential requests up to this value to the same device.
-
Manual 99a 38 July 17, 2001 Parameter Use to Remirror Block Size = value Set the remirror block size in 4 KB increments. (1=4 KB, 2=8 KB, 8=32 KB, etc.) Supported values: 1 to 8 Default: 1 Concurrent Remirror Requests = value Set the number of remirror requests per mirror object. Ignore Disk Geometry = value Create nonstandard and unsupported partitions.
-
Manual 99a 38 July 17, 2001 Parameter Use to Enable Disk Read After Write Verify = value Control whether information written to disk is read back and compared with the original data. Supported values: ON, OFF Default: OFF Setting this parameter to ON may decrease performance significantly. To set this value for currently loaded disks, use the Storage Devices option of “MONITOR” on page 103. You can set this parameter in the STARTUP.NCF file.
-
Manual 99a 38 July 17, 2001 Parameter Use to Boot Error Log File State = number Control what happens when the BOOT$LOG.ERR file is larger than the size specified by the Boot Error Log Overflow Size parameter. Supported values: 0 = Leave BOOT$LOG.ERR as is 1 = Delete BOOT$LOG.ERR 2 = Rename BOOT$LOG.ERR 3 = Start a new log file whenever the server is restarted Default: 3 You can set this parameter in the STARTUP.NCF file.
-
Manual 99a 38 July 17, 2001 Parameter Use to Auto Restart Down Timeout = number When the server tries to go down after an abend, it sets a timeout just in case there is a problem going down. Specify the amount of time (in seconds) that the server will wait before automatically restarting.
-
Manual 99a 38 July 17, 2001 Parameter Use to Auto Restart After Abend = value Specify the system’s automatic response to an abend. Supported values: 0 = The system does not respond to the abend. 1 = After an abend, the system determines the source of the abend. Based on findings, the system either keeps the computer running or shuts down the computer and attempts to restart it.
-
Manual 99a 38 July 17, 2001 Licensing Services Parameters Licensing service parameters control Novell Licensing Service diagnosis features. For a description of licensing parameters, see the following table. Table 9 Licensing Service Parameters Parameter Use to NLSDIAG Supported values: 19 (string length) Default: 19 NLS Search Type Specify the scope of a license certificate search.
-
Manual Table 10 99a 38 July 17, 2001 Memory Parameters Parameter Use to Average Page In Alert Threshold = value Specify the point at which the server sends an alert to the console because excessive memory swapping indicates the server might be low on memory. Supported values: 0 to 4294967295 Default: 2000 The value of the parameter is the average number of pages swapped from disk to memory per second, calculated over the last five seconds.
-
Manual 99a 38 July 17, 2001 Parameter Use to Memory Protection Fault Cleanup = value Enable the server to clean up a protected address space that has faulted. Supported Values: ON, OFF Default: ON If this parameter is ON and a protected address space faults, the server removes the address space and its NLMTM programs and returns the resources to the system. If this parameter is OFF and a protected address space faults, the server does not remove the address space or return resources to the system.
-
Manual 99a 38 July 17, 2001 Miscellaneous Parameters Miscellaneous parameters do not fit aptly or neatly into other categories. The functionality is listed below and described in Table 11.
-
Manual 99a 38 July 17, 2001 Parameter Use to Maximum Service Processes = number Specify the maximum number of service processes that the operating system can create. (View the number of service processes in MONITOR.) Supported values: 5 to 1000 Default: 40 Decrease this parameter temporarily if the server is low on memory. If the server is always low on memory, add more RAM for memory. Increase this parameter if the number of service processes is at the maximum.
-
Manual 99a 38 Parameter Use to Display Lost Interrupt Alerts = value Control alert messages about lost interrupts. July 17, 2001 Supported values: ON, OFF Default: ON A lost interrupt occurs when a driver or board requests a service with an interrupt call and then drops the request before the processor can respond. Lost interrupts generate the following message: Interrupt controller detected a lost hardware interrupt.
-
Manual 99a 38 July 17, 2001 Parameter Use to Display Lost Interrupts Threshold = value Specify the minimum number of lost interrupts per second that must be detected before a lost interrupt alert message will be displayed on the system console. Supported values: ON, OFF Default: OFF Note: Set Display Spurious Interrupt Alerts must also be set to ON. You can set this parameter in the STARTUP.NCF file.
-
Manual 99a 38 July 17, 2001 Parameter Use to Display Old API Names = value Control messages about obsolescent API functions from earlier versions of NetWare. This parameter can be used as a debugging tool. Supported values: ON = Use if you write your own modules and you are upgrading your NetWare modules to use newer APIs. OFF = Use if you aren’t upgrading modules.
-
Manual 99a 38 July 17, 2001 Parameter Use to Display Relinquish Control Alerts = value Control whether messages about processor control are sent to the server console. This parameter can be used as a debugging tool. Supported values: ON = Use if you’re writing your own loadable modules. OFF = Use if you’re not writing your own loadable modules. Default: OFF If a module uses the processor for more than 0.
-
Manual 99a 38 July 17, 2001 Parameter Use to Alert Message Nodes = number Specify the number of alert message nodes that have been previously allocated. Supported values: 10 to 256 Default: 20 You can set this parameter in the startup.ncf file. Classic Work to do Pre-check Flag When a classic work to do is scheduled, this flag causes the scheduler to verify if the work to do is scheduled. If it’s on the scheduled list, the operating system will trap.
-
Manual 99a 38 July 17, 2001 Parameter Use to Command Line Prompt Default Choice = value Specify a default response to an optional command in an .ncf file. An optional command in an .ncf file is preceded by a question mark (?). The question mark causes the file to prompt you to execute the command. For information about optional commands in .ncf files, see Using Server Batch Files. Supported Values: ON, OFF Default: ON ON means the default response to the command prompt is Y (Yes).
-
Manual 99a 38 July 17, 2001 Multiprocessor Parameters Multiprocessor parameters allow you to Set the threshold for load balancing across multiple processors. Start secondary processors automatically on startup. Control whether interrupt statistics are removed from memory when a processor is taken offline or an interrupt handler is removed. Multiprocessor parameters are described in the following table.
-
Manual Parameter 99a 38 July 17, 2001 Use to Auto Clear Interrupt Statistics = value Specify whether interrupt statistics are removed from memory at the time a processor is taken offline or an interrupt handler (ISR) is removed. Supported values: ON, OFF Default: ON To retain per-processor interrupt handler statistics for offline processors or to retain the total interrupt contribution from a previously loaded handler (ISR), set the parameter to OFF. This parameter is preferably set in the STARTUP.
-
Manual Table 13 99a 38 July 17, 2001 NCP Parameters Parameter Use to NCP Packet Signature Option = number Control the NCP packet signature level on the server.
-
Manual 99a 38 July 17, 2001 Parameter Use to Enable UDP Checksums on NCP Packets Enable checksumming of NCP UDP packets. Supported values: 0 = No checksums 1 = Checksum if enabled at client 2 = Require checksums Default: 1 You can set this parameter in the STARTUP.NCF file. Client File Caching Enabled This parameter allows or disallows the client side ecaching of opened files. This parameter is also settable in the STARTUP.NCF file.
-
Manual 99a 38 July 17, 2001 Parameter Use to Display NCP Bad Component Warnings = value Control whether NCP bad component alert messages are displayed. Supported values: ON, OFF Default: OFF You can set this parameter in the STARTUP.NCF file. Reject NCP Packets with Bad Components = value Specify whether NCP packets that fail component checking are rejected. Supported values: ON, OFF Default: OFF You can set this parameter in the STARTUP.NCF file.
-
Manual Parameter 99a 38 July 17, 2001 Use to Allow Change to Client Rights = value Control whether a job server can assume the rights of a client for NCP packet signatures. Supported values: ON, OFF Default: ON Note: Some job servers and third-party applications can’t function without changing to client rights. Using OFF might prevent some job servers from getting access to the files they need, but it prevents the forging of a packet through the job or print server.
-
Manual Table 14 99a 38 July 17, 2001 Service Location Protocol Parameters Parameter Use to SLP TCP = value Use TCP packets instead of UDP packets when possible. Supported values: OFF, ON Default: OFF This parameter can be set in the STARTUP.NCF file. SLP Debug = value Enable SLP debug mode. Bit 0x01 = COMM Bit 0x02 = TRAN Bit 0x04 = API Bit 0x08 = DA Bit 0x10 = ERR Bit 0x20 = SA Supported values: 0 to 4294967255 Default: 0 This parameter can be set in the STARTUP.NCF file.
-
Manual 99a 38 July 17, 2001 Parameter Use to SLP Broadcast = value Use broadcast packets instead of multicast packets. Supported values: OFF, ON Default: OFF This parameter can be set in the STARTUP.NCF file. SLP MTU Size = value Specify an integer describing the maximum transfer unit size. Supported values: 0 to 4294967255 Default: 1472 This parameter can be set in the STARTUP.NCF file.
-
Manual 99a 38 July 17, 2001 Parameter Use to SLP Event Timeout = value Specify an integer value describing the number of seconds to wait before timing out multicast packet requests. Supported values: 0 to 4294967255 Default: 53 This parameter can be set in the STARTUP.NCF file. SLP DA Heart Beat Time = value Specify an integer value describing the number of seconds before sending the next Directory Agent heartbeat packet.
-
Manual Table 15 99a 38 July 17, 2001 Time Parameters Parameter Use to TIMESYNC ADD Time Source = server name Specify a server as a time source. Use EDIT, rather than this parameter, to add a server to the time source list in the TIMESYNC.CFG file. Maximum: 48 characters TIMESYNC Configuration File = path Specify the path where the TIMESYNC.CFG configuration file is located. Maximum: 255 characters Example: SET TIMESYNC CONFIGURATION FILE = SYS:SYSTEM\TIMESYNC.
-
Manual 99a 38 Parameter Use to TIMESYNC Hardware Clock = value Controls hardware clock synchronization.
-
Manual 99a 38 Parameter Use to TIMESYNC Restart Flag = value Control restarts of time synchronization. July 17, 2001 Supported values: ON, OFF Default: OFF Set this parameter to ON only if you want to reload TIMESYNC without rebooting the server. TIMESYNC Service Advertising = value Control time source advertising.
-
Manual Parameter 99a 38 July 17, 2001 Use to TIMESYNC Time Adjustment = [+ or - Specify when a time adjustment will take place. ] hour:minute:second [at month/day/ year hour:minute:second AM or PM] Note: You cannot use this parameter on a secondary time server. Maximum: 99 characters Default: None scheduled Use this parameter sparingly to correct network-wide time errors. Default date and time is six polling intervals or 1 hour (whichever is longer) from the current time.
-
Manual 99a 38 July 17, 2001 Parameter Use to Time Zone = time_zone_string Specifies the time zone string, which indicates: The abbreviated time zone name The offset from Coordinated Universal Time (UTC) The alternate abbreviated time zone name to be used when daylight saving time is in effect Maximum: 80 characters Default: No Time Zone This parameter causes UTC time to be recalculated from local time. You can set this parameter in the STARTUPCF file.
-
Manual Parameter 99a 38 July 17, 2001 Use to Daylight Savings Time Offset = [+ or - Control the offset applied to time calculations when daylight ] hour:minute:second saving time is in effect. Default: +1:00:00 This parameter causes UTC time to be recalculated from local time. You can set this parameter in the STARTUP.NCF file. Daylight Savings Time Status = value Indicate whether daylight saving time is in effect.
-
Manual 99a 38 July 17, 2001 The number of files kept in memory depends on the number of file cache buffers allowed. This is determined by the amount of disk cache memory available and the value of the Minimum File Cache Buffers parameter. Disk cache memory not only speeds up access to file data, it is used to cache portions of the eDirectory database. If you want to tune your NetWare server in general, or eDirectory in particular, tune the file caching parameters.
-
Manual 99a 38 July 17, 2001 Parameter Use to Minimum File Cache Buffers = number Set the minimum number of cache buffers the operating system can allow for file caching. Supported values: 20 to 1000 Default: 20 All memory not allocated for other processes is given to disk cache memory to use for file and directory caching. As memory is requested for other processes, the server gives up cache buffers. This limit specifies when the server must stop giving file cache buffers to other processes.
-
Manual 99a 38 July 17, 2001 Parameter Use to Minimum File Cache Report Threshold = number Specify how few cache buffers can be available before the operating system warns you that the number of buffers is getting low. Supported values: 0 to 1000 Default: 2 For example, if the value of the Minimum File Cache Buffers parameter is set to 20 and this parameter is set to 25, you are warned when all but 45 cache buffers are allocated for other processes.
-
Manual 99a 38 July 17, 2001 Allocation of Directory Cache Buffers When the server boots, the system allocates a minimum number of directory cache buffers (default=20). It creates these buffers immediately when it receives a request for a new buffer. The server obtains directory cache buffers by removing a minimal set of file cache buffers from the file cache during server startup. Additional directory cache buffers are obtained from the file cache later on if they are needed.
-
Manual Table 17 99a 38 July 17, 2001 Directory Caching Parameters for the Traditional File System Parameter Use to Dirty Directory Cache Delay Time = time Specify how long the system keeps a directory table write request in memory before writing it to disk. Supported values: 0 to 10 seconds Default: 0.5 second Increasing the delay time gives slightly quicker performance but increases the probability of the directory tables becoming corrupted.
-
Manual 99a 38 July 17, 2001 Parameter Use to Maximum Directory Cache Buffers = number Specify the maximum number of cache buffers that the system can allocate for directory caching. Supported values: 20 to 4000 Default: 500 This parameter keeps the system from allocating too many directory cache buffers so that memory is available for other server processes. Increase this limit if the server responds slowly to directory searches.
-
Manual 99a 38 July 17, 2001 Parameter Use to Maximum Number of Internal Directory Handles = number Specify the maximum number of directory handles available for internal NLM programs that use connection 0. Supported values: 40 to 1000 Default: 100 A directory handle is a version of the directory access rights that is held in cache memory. Caching the access rights speeds mapping to the rights.
-
Manual 99a 38 July 17, 2001 One parameter controls the reuse of turbo FATs. Ten parameters control file compression. For a description of file system parameters, see the following table. Table 18 File Parameters for the Traditional File System Parameter Use to Automatically Repair Bad Volumes = value Specify whether VREPAIR runs automatically on a volume that fails to mount. Supported values: ON, OFF Default: ON You can set this parameter in the STARTUP.NCF file.
-
Manual 99a 38 July 17, 2001 Parameter Use to Maximum Percent of Volume Space Allowed for Extended Attributes = percentage Limit the portion of volume space used for extended attribute storage. The setting takes effect only when the volume is being mounted. Supported values: 5 to 50 Default: 10 Maximum Extended Attributes per File or Path = number Limit the number of extended attributes that can be assigned to a file or path (subdirectory). This limit applies to all volumes on the server.
-
Manual 99a 38 July 17, 2001 Parameter Use to Volume Low Warn All Users = value Have the system notify users when a volume is almost full. Supported values: ON, OFF Default: ON If you choose not to have your server warn users, monitor volume statistics at least daily with MONITOR. Volume Low Warning Reset Threshold = number Control how much disk space must be freed up before a second warning is issued that the volume is almost full.
-
Manual 99a 38 July 17, 2001 Parameter Use to Volume Low Warning Threshold = number Specify the number of blocks of free disk space that can remain on a volume before the system issues a warning. Supported values: 0 to 1000000 blocks Default: 256 blocks Consider the following: A block is the minimum space allocated to a file.; a file can grow only in multiples of the block size. The block’s physical size is determined when the volume is created.
-
Manual 99a 38 July 17, 2001 Parameter Use to Turbo FAT Re-Use Wait Time = time Specify how long a turbo FAT buffer remains in memory after an indexed file is closed. Supported values: 0.3 second to 1 hour 5 minutes 54.6 seconds Default: 5 minutes 29.6 seconds Once the wait-time value has passed, the system can allocate the buffer to another indexed file. Increase the wait time if You want the turbo FAT index to remain in memory for long periods of time, even when the file is closed.
-
Manual 99a 38 July 17, 2001 Locks Parameters for the Traditional File System Locks parameters control How many open files each workstation can have How many open files the system can handle How many record locks each connection can have How many record locks the system can handle There are three types of locks: File locks secure the file and prevent other stations from accessing it. Physical record locks control data access by multiple users.
-
Manual 99a 38 July 17, 2001 Parameter Use to Maximum File Locks Per Connection = number Control how many opened and locked files a client connection can use at one time. (Use MONITOR to view how many opened and locked files a connection is using.) Supported values: 10 to 1000 Default: 250 Increase the value of this parameter when an application can’t open enough files and fails. Decrease the value of this parameter if client connections are using an excessive amount of server resources.
-
Manual 99a 38 July 17, 2001 For descriptions of error handling parameters, see the following table. Table 20 Error Handling Parameters for the Traditional File System Parameter Use to Volume Log File State = number Control what happens when the VOL$LOG.ERR file is larger than the size specified by the Volume Log File Overflow Size parameter. Supported values: 0 = Leave VOL$LOG.ERR as is 1 = Delete VOL$LOG.ERR 2 = Rename VOL$LOG.ERR Default: 1 You can set this parameter in the STARTUP.NCF file.
-
Manual 99a 38 July 17, 2001 Transaction Tracking Parameters for the Traditional File System A transaction is a set of write operations that must be completed together to maintain file and database integrity. Write operations consist not only of data and data records, but also of changes to the index and the key structures that are important to an application’s continual operation.
-
Manual 99a 38 July 17, 2001 Parameter Use to TTS UnWritten Cache Wait Time = time Specify how long a block of transactional data can be held in memory. Supported values: 11 seconds to 10 minutes 59.1 seconds Default: 1 minute 5.9 seconds Some blocks of transactional data wait for other transactional blocks to be written first. If one of these blocks reaches its maximum time limit, other write requests are held up and this block is written to disk.
-
Manual 99a 38 July 17, 2001 SHUTDOWN NETWORK INTERFACE Purpose Use at the server console to shut down a logical board without removing its resources. (A logical board is an instance of one frame type associated with one LAN driver.) After you shut down the logical board, you can restart the board, if needed, without reloading and binding the LAN driver. See “RESET NETWORK INTERFACE” on page 164.
-
Manual 99a 38 July 17, 2001 About Processor Speed Processor speed rating is determined by Processor clock speed (90 MHz, 100 MHz, 200 MHz, 233 MHz, etc.) Processor type (80486, Pentium*, Pentium Pro, Pentium II, etc.) Number of memory wait states (0, 1, 2, etc.) If your computer has a slower rating than you expected, use SPEED to check the processor’s speed rating.
-
Manual 99a 38 July 17, 2001 SPXCONFG Purpose Use at the server console to configure certain SPXTM parameters. NOTE: These parameters can also be configured from the INETCFG utility. Syntax [LOAD] SPXCONFG [option[=value]] Parameter Use to (no parameter) Load SPXCONFG and display configuration menu. option Replace option with any available option. See “SPXCONFG Options” on page 252. value Specify a numerical value for an option. For information on setting these values, see “INETCFG” on page 69.
-
Manual 99a 38 July 17, 2001 Using SPXCONFG You can use SPXCONFG in your autoexec.ncf file, as a console command, as a menu utility, or as a configuration file that is invoked by INETCFG. If you don’t specify a parameter, the following menu appears: SPX Configuration Control Program 1. SPX Watchdog Abort timeout 540 2. SPX Watchdog Verify timeout 54 3. SPX Ack wait timeout 108 4. SPX Default Retry count 10 5. Maximum concurrent SPX sessions 2048 6.
-
Manual 99a 38 July 17, 2001 Additional Information Topic See Setting SPX parameters with INETCFG “INETCFG” on page 69 SPXS Purpose Use at the server console to provide STREAMS-based SPXTM protocol services. Syntax [LOAD] [path]SPXS [LDFILE = [path]filename[ext]] Parameter Use to path Specify the path to SPXS if you moved it from the default directory. LDFILE = [path]\filename[.ext] Load the data file that contains the SPX timer defaults and physical packet size tables.
-
Manual 99a 38 July 17, 2001 To create multiple configuration files, copy the IPXSPX.CFG file to a new filename (IPXSPX2.CFG, for example). Then you can change the IPXSPX.CFG file (by using INETCFG) and still preserve the original configuration in the IPXSPX2.CFG file. To load a configuration file other than the default IPXSPX.CFG file, use the LDFILE option. For example, if you have a second configuration file called IPXSPX2.
-
Manual 99a 38 July 17, 2001 Parameter Use to n... Specify by processor number the secondary processors to start. Using START PROCESSORS To bring a specific secondary processor online, enter at the console prompt: START PROCESSORS 1 A confirmation message is displayed: Processor 1 is ONLINE. To bring all secondary processors online, enter at the console prompt: START PROCESSORS A confirmation message is displayed: Processor 1 is ONLINE. Processor 2 is ONLINE. Processor 3 is ONLINE.
-
Manual 99a 38 July 17, 2001 STOP PROCESSORS Purpose Use STOP PROCESSORs at the server console prompt to stop one or more secondary processors in a multiprocessor computer. NOTE: Because Processor 0, the boot processor, cannot be taken offline while the server is running, STOP PROCESSORS affects only secondary processors. Syntax STOP PROCESSORS [n...] Parameter Use to (no parameters) Stop all secondary processors. n... Specify by number the secondary processors to stop.
-
Manual 99a 38 July 17, 2001 SWAP Purpose Use at the server console to display information about swap files, to add or delete swap files, and to specify the parameters of swap files. Syntax SWAP [ADD vol_name [parameter = value]] [DEL vol_name] [PARAMETER vol_name parameter = value] Parameter Use to (no parameter) Display a screen containing information about swap files. ADD vol_name parameter = value Create a swap file on the designated volume.
-
Manual 99a 38 July 17, 2001 Parameter Use to DEL vol_name Delete a swap file from the designated volume. If you are using protected address spaces, the Novell® JVM for NetWare® product, or any other application that uses virtual memory, be sure to keep at least one swap file. By default a swap file is created on the Sys volume whenever you start the server. If you do not want a swap file on Sys, place the SWAP DEL command in the startup.ncf file before the command to mount volumes.
-
Manual 99a 38 July 17, 2001 place the commands to create swap files into the AUTOEXEC.NCF file so the files will be created each time the server is started. Swap files are dynamic; they change size as data is swapped in and out of memory.
-
Manual 99a 38 July 17, 2001 When you load TCPCON, the TCPCON main screen appears: The top of the main screen displays a summary of statistics for the selected host, as follows: Field Explanation Host Symbolic host name or IP address of the selected TCP/IP host (or server name if accessing a remote node using IPXTM) being queried. This is the host specified in SNMP Access Configuration in the Available Options menu.
-
Manual 99a 38 July 17, 2001 Field Explanation TCP Sent Number of TCP segments sent, excluding those containing retransmitted data. TCP Connections Number of currently established TCP connections. The Available Options menu on the main screen allows access to additional features of TCPCON, as follows: Option Use to SNMP Access Configuration View and modify TCPCON options. Protocol Information View protocol information for the selected host.
-
Manual 99a 38 July 17, 2001 Parameter Use to (no parameter) Record configuration information for the NetWare MultiProtocol Router 3.1 INETCFG NLMTM program. console_NLM_name Record configuration information for the specified NLM program. Using TECHWALK TECHWALK saves the configuration information for INETCFG (or the specified NLM program) to a file named SYS:ETC\TECHWALK.OUT. All enabled items and summary lists are recorded.
-
Manual Figure 2 99a 38 July 17, 2001 TIME Output TIMESYNC Purpose Use at the server console to monitor the internal time on a server to ensure that the time reported by all servers across the network is consistent, or synchronized. TIMESYNC autoloads when the server boots. Under very few circumstances will you ever load or unload TIMESYNC. You may, however, want to load TIMESYNC to use an alternate configuration (.CFG) file.
-
Manual 99a 38 July 17, 2001 Additional Information Topic See Setting time synchronization parameters SET “Time Parameters” on page 226 Network time synchronization "Guidelines for Time Synchronization" in Network Time Management Administration Guide TLI Purpose Use at the server console to provide Transport Level Interface (TLI) communication services. Syntax [LOAD] [path]TLI Parameter Use to path Specify the path to TLI.NLM if you moved it from the default directory.
-
Manual 99a 38 July 17, 2001 TPING Purpose Use at the server console to send an Internet Control Message Protocol (ICMP) echo request packet to an IP node on your internetwork. TPING is a command line utility that determines whether an IP target node on your internetwork is reachable. Syntax [LOAD] TPING host [packet_size [retry_count]] Parameter Use to host Specify the symbolic host name or IP address of a TCP/IP system on the network. packet_size Specify the size, in bytes, of the ICMP packet.
-
Manual 99a 38 July 17, 2001 TRACK OFF Purpose Use at the server console to prevent the server from displaying the RIP Tracking Screen. This screen displays Router Information Protocol (RIP) traffic on the server. Syntax TRACK OFF Additional Information Topic See RIP Tracking Screen “TRACK ON” on page 267 TRACK ON Purpose Use at the server console to view the RIP Tracking Screen and make it the active screen. This screen displays Router Information Protocol (RIP) traffic on the server.
-
Manual 99a 38 July 17, 2001 This information is formatted according to whether the NetWare® server is Receiving incoming information (IN) Broadcasting outgoing information (OUT) Receiving a connection request Incoming Information Incoming information looks similar to the following: IN [00D0C200:00001B026C09] 10:53:01am 010123C5 11/22 5300DEEF 3/4 00001EF0 5/365 FADE2401 12/98 00001EEE 2/3 C9008617 5/11 The packet is incoming from network address 00D0C200 and from the server at node address 0001B
-
Manual 99a 38 July 17, 2001 Connection Request When a client boots and loads a NetWare® RequesterTM (such as DOS Requester or OS/2* Requester), a Get Nearest Server request is broadcast on the network the station is cabled to. Any connected server can receive the message and respond to the station with a Give Nearest Server response. The station initially attaches to the first server that responds to the Get Nearest Server request.
-
Manual 99a 38 July 17, 2001 Parameter Use to protocol Specify the name of the protocol you want to unbind. LAN_driver | board_name Specify the name of the LAN driver or the network board from which you are unbinding the protocol. driver_parameter Specify one or more driver parameters if you have more than one network board of the same type in your server. See “UNBIND Driver Parameters” on page 270. NOTE: Enclose driver parameters in square brackets.
-
Manual 99a 38 July 17, 2001 Driver parameter Use to [SLOT=number] Specify the network board by the slot that it was installed in. Use this parameter with microchannel and EISA computers. Use the same slot number you did when you loaded the driver. [NODE=number] Specify the node number of the board. Using Driver Parameters You must tell the operating system which network board or LAN driver to unbind the communication protocol from.
-
Manual 99a 38 July 17, 2001 UNLOAD Purpose Use at the server console to Unload a module that was previously loaded with the LOAD command Unload outdated NLMTM programs so that updated modules can be loaded You can also use UNLOAD at workstations running Novell® ClientTM software for client modules that have been previously linked with LOAD.
-
Manual 99a 38 July 17, 2001 Unloading Modules The UNLOAD command unlinks a loadable module from the operating system that was previous linked to the operating system with the LOAD command. (See “LOAD” on page 86.) When you unload a module, all resources are returned to the system. To unload a module from an address space, you can specify its address space. NOTE: If an address is specified without a module, all modules in that address space will be unloaded.
-
Manual 99a 38 July 17, 2001 Disk Drivers Before unloading a disk driver, dismount all volumes stored on the hard disks connected to the controller or host bus adapter. If you don’t dismount the volumes, the system warns you that the driver is in use and lists the volumes using the driver. If you override the warning and unload the driver without dismounting the volumes, the server dismounts the volumes and notifies those who are using the volumes.
-
Manual 99a 38 July 17, 2001 Parameter Use to path Specify the path to UPS_AIO if you moved it from the default directory. DOWNTIME=number Specify the amount of time to run on battery before system shutdown. If power is restored before this time elapses, no shutdown will occur. If a low battery condition occurs before this time elapses, an immediate shutdown will occur. Supported values: 30 seconds minimum, no practical maximum limit.
-
Manual 99a 38 July 17, 2001 Parameter Use to DRIVERTYPE=number Specify the AIO device driver type. Supported values: 1, 2, 3 Default: 1 The default value of 1 represents the AIOCOMX driver, which comes with NetWare®. Other drivers might be represented by other driver type numbers. Refer to the documentation that came with the driver. BOARD=number Specify the AIO board number.
-
Manual 99a 38 July 17, 2001 Parameter Use to SIGNAL_HIGH Specify the signal_high parameter to set the normal RS232 signaling state to high. Supported values: SIGNAL_HIGH or no value Use this parameter only if your UPS system uses high values, instead of low values, to determine if power is off or the battery is low. Most UPS systems use low values. Refer to your UPS hardware documentation to determine whether you need to use the parameter. ? Display a help screen that explains these parameters.
-
Manual 99a 38 July 17, 2001 VIEW Purpose Use to view a file from the NetWare® server console. NOTE: VIEW does not let you create or modify files. To create or modify a file, use “EDIT” on page 55. Syntax [LOAD] VIEW [filename] Parameter Use to filename Specify a file to view. Using VIEW If you do not specify a filename, VIEW prompts you for the name. VOLUME Purpose Use at the server console to list mounted volumes.
-
Manual 99a July 17, 2001 38 Using VOLUME When you execute VOLUME without the name parameter, a message similar to the following appears: Mounted Volumes SYS Name Spaces DOS Flags Cp Sa Mg The output lists each mounted volume, its name spaces, and the flags that are set for that volume.
-
Manual 99a 38 July 17, 2001 Syntax [LOAD] [path] VREPAIR [volume_name] [log_filename] Parameter Use to path Specify the path to VREPAIR.NLM if you moved it from the default directory. volume_name Specify the name of a volume to repair. log_filename Specify a text filename to log errors into. Using VREPAIR For an explanation of the VREPAIR main menu, see “VREPAIR Options” on page 282.
-
Manual 99a 38 July 17, 2001 VREPAIR may have to delete some corrupted files or tables. For more information, see “Viewing Deleted Files” on page 284. VEPAIR will log bad block information into a file if you specify a log filename when you load VREPAIR. You can also specify a log filename after you load VREPAIR, when VREPAIR displays an error. When to Use VREPAIR VREPAIR can repair a bad volume that you have dismounted while other NetWare® server volumes are functioning.
-
Manual 99a 38 July 17, 2001 VREPAIR Options The VREPAIR main screen displays the following menu: Options: 1 - Repair a volume 2 - Set VRepair options 3 - Exit Main Menu Selection Use to Repair a volume Begin or continue with volume repair. You can also use this option to stop a volume repair in process or change the method of displaying errors during the repair. Set VRepair options Set VREPAIR configuration options. Exit Exit VREPAIR.
-
Manual Table 22 99a 38 July 17, 2001 VREPAIR Configuration Options Default Option Alternate Option Explanation 1. Quit if a VREPAIR Name Space Support NLMTM Is Not Loaded Remove Name Space Support From The Volume These options control whether name space support for non-DOS files is retained in the volume tables. If you add a name space to a volume and the system doesn’t have enough memory, select Remove Name Space Support From the Volume. Then select a name space to delete.
-
Manual 99a 38 July 17, 2001 Default Option Alternate Option Explanation 3. Write Changes Immediately To Disk Keep Changes In Memory For Later Update NetWare defaults to writing changes immediately to disk. In most cases, this default option speeds the repair. Disks requiring very few changes will repair faster if the alternate option is used. 4. Retain Deleted Files Purge All Deleted Files These options control whether deleted files are purged or retained.
-
Manual 99a 38 July 17, 2001 These numbered files are created in any of the following circumstances: VREPAIR found a filename that has an invalid DOS name. The filename might contain invalid characters or might be too long. VREPAIR found that the filename is not unique. (Another file exists with the same name.) VREPAIR found a FAT chain without a file showing ownership of it. NOTE: A file is divided into a series of data blocks that are linked together in a FAT chain.
-
Manual 99a 38 July 17, 2001 WANMAN ConsoleOneTM snap-in which is the interface to WAN Traffic Manager. It allows you to create or modify policies, create LAN Area objects, and apply policies to LAN Areas or to servers. When WAN Traffic Manager is installed, the schema will include a LAN Area object and three new detail pages on the Server object: LAN Area Membership WAN Policies Cost A comprehensive Help system is built into the utility.
-
Manual 99a 38 July 17, 2001 XLOG Purpose Use the XLOG utility to help diagnose ISDN-related connection problems with Eicon* Technology ISDN adapters.
-
Manual 288 Utilities Reference Utilities Reference 103-000153-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual A 99a July 17, 2001 38 LAN Driver Statistics This appendix contains information on both common and custom LAN driver statistics. Monitoring Network Traffic By comparing information about LAN drivers installed on your server, you can tell which cabling system is handling the most traffic. If errors occur frequently on a high-traffic system, you may want to switch some of the stations on the busy system to a new or less busy cabling system.
-
Manual 99a 38 July 17, 2001 Common LAN Driver Statistics The generic statistics common to most of the drivers are maintained by two modules in the NetWare® operating system that are autoloaded by LAN drivers. The modules are: The Media Support ModuleTM (MSM.NLM) The Topology Specific ModuleTM (TSM.NLM) There are three TSMTM modules. The one that is autoloaded will depend on your server’s LAN driver. The three are ETHERTSM (Ethernet), TOKENTSM (token-ring), and FDDITSM.
-
Manual 99a 38 July 17, 2001 Table 28, “Custom Statistics for Token Ring Drivers,” on page 303 Table 29, “Custom Statistics for IBM Baseband PCN2L Drivers,” on page 305 NOTE: Custom statistics vary, depending on the LAN driver installed. For statistical information about third-party drivers not listed in the custom statistics section, check the documentation that comes with the driver.
-
Manual 99a 38 July 17, 2001 Statistic Description Transmit failed, packet too big A counter that is incremented when the NetWare server tries to transmit a packet that is too large for the hardware to handle. This value is maintained by the TSM module. Transmit failed, packet too small A counter that is incremented when the NetWare server tries to transmit a packet that is too small. This value is maintained by the TSM module.
-
Manual 99a 38 July 17, 2001 Statistic Description Transmit failed, Miscellaneous Error A counter that is incremented when errors with send packets occur. This value is maintained by the HSM module. Receive failed, Miscellaneous Error A counter that is incremented when errors with receive packets occur. This value is maintained by the HSM module. Transmit failed, retried A counter that is incremented when the NetWare server tries to send a packet but fails because of a hardware error.
-
Manual Statistic 99a 38 July 17, 2001 Description Bytes received rollover Upper 32 bits of the Total Receive OK Byte Count Low. The Total Receive OK Byte Count High statistic is incremented to 1 when the Total Receive OK Byte Count Low value reaches 4 GB. This field is maintained by the TSM module. Transmitted to a group address The number of packets transmitted with a group or multicast destination address. This field is maintained by the TSM module.
-
Manual 99a 38 July 17, 2001 Statistic Description Transmit succeeded, deferred The number of frames whose transmission was delayed because of a busy medium. This happens if another station is transmitting on the wire when the adapter receives the command to transmit a packet. Transmit failed, late collision The number of transmits that had a collision after 512 bits of the packet were transmitted.
-
Manual Table 25 99a 38 July 17, 2001 Generic Statistics for Token Ring Drivers That Use Tokentsm.nlm Statistics Description AC Errors This counter is incremented when a ring station receives a Standby Monitor Present MAC frame with the A/C bits in the Frame Status field equal to zero without first receiving an Active Monitor Present MAC frame. Transmit failed, abort delimiter sent This counter is incremented when a ring station transmits an abort delimiter.
-
Manual 99a July 17, 2001 38 Statistics Description Transmit failed, lost frame This counter is incremented when a ring station transmits a frame that does not return to the station. The active monitor sends a new token. Error tokens transmitted This counter is incremented when a station acting as the active monitor recognizes an error condition that needs a token transmitted. This occurs when the TVX time expires.
-
Manual 99a 38 July 17, 2001 Statistic Description LEM, link rejected The link error monitor (LEM) count of the times that a link was rejected LEM, total errors The aggregate link error monitor (LEM) error count.
-
Manual 99a 38 July 17, 2001 Statistic Description UnsupportedMulticastCount This counter is incremented for each multicast packet received by the board that is not registered with the driver. BackToBackSendCount This counter is incremented each time the driver can buffer a send packet onto the network board while the board is sending a previous buffer. Use this counter to track congestion on the network board. See also EnqueuedSendsCount.
-
Manual 99a 38 July 17, 2001 Statistic Description TxUnderflowError (NE2100, NE1500T, or CNEAMD) This counter is incremented when something else on the bus takes control of the bus while the LAN driver is putting the data on the wire. If this occurs, the packet must be retransmitted. TXBufferError (NE2100, NE1500T, or CNEAMD) This counter is incremented when there is a problem with the transmit buffer.
-
Manual 99a July 17, 2001 38 Statistic Description TransmitRetryCount (NE3200TM) This counter is incremented when the driver is unable to transmit a packet after a specified number of times. This may indicate a hardware problem. TxClearToSendsErrors (NE3200) This counter tracks an 82586 error. There are some conditions when the Clear to Send signal from the 82586 chip is incorrect.
-
Manual 99a 38 July 17, 2001 Statistic Description RxDummyRCBUsedErrors (NE3200) This counter tracks an 82586 error. In some cases, the 82586 may attempt to receive data into a nonexistent receive buffer at the end of its receive buffer list. To catch this condition and avoid internal data corruption, a dummy receive buffer is added to the end of the list. This variable counts the number of times the 82586 attempted to write into the dummy buffer.
-
Manual Table 28 99a July 17, 2001 38 Custom Statistics for Token Ring Drivers Statistic Description Bad Correlator Count (CNTR2000TM, NTR2000TM) This counter is incremented when a network board responds with a request for data from the file server that the file server does not have. The ECB or some other code may be corrupted. Eventually, this error will abend the server. If this counter is non-zero, you should try to find the software that is corrupting the data.
-
Manual 99a 38 July 17, 2001 Statistic Description DMA Parity Errors Count (TOKENDMA) This counter is incremented when a DMA transfer completes with a parity error. If this is incremented, it could indicate a hardware problem. Command Reject Count (TOKENDMA) This counter is incremented when the driver sends a command to the board and the command is either invalid or the board is still busy processing the previous command. This number should be zero or a low number.
-
Manual Table 29 99a July 17, 2001 38 Custom Statistics for IBM Baseband PCN2L Drivers Statistic Description HotCarrierInterruptCount (PCN2L) This counter is incremented when the board detects a carrier longer than expected without a transmit. This indicates that some board on the network has failed or is beginning to fail. No82588InterruptCount (PCN2L) This counter is incremented each time the server receives an interrupt from the board, but not from the 82588 chip.
-
Manual 306 Utilities Reference Utilities Reference 103-000153-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a 38 July 17, 2001 Novell Trademarks Access Manager is a registered trademark of Novell, Inc. in the United States and other countries. Advanced NetWare is a trademark of Novell, Inc. AlarmPro is a registered trademark of Novell, Inc. in the United States and other countries. AppNotes is a registered trademark of Novell, Inc. in the United States and other countries. AppTester is a registered trademark of Novell, Inc. in the United States and other countries.
-
Manual 99a 38 July 17, 2001 Certified Internet Architect is a service mark of Novell, Inc. Certified Internet Business Strategist is a service mark of Novell, Inc. Certified Internet Manager is a service mark of Novell, Inc. Certified Internet Professional is a service mark of Novell, Inc. Certified NetWare Administrator in Japanese and CNA-J are service marks of Novell, Inc. Certified NetWare Engineer in Japanese and CNE-J are service marks of Novell, Inc.
-
Manual 99a 38 July 17, 2001 Control Access Printer is a trademark of Novell, Inc. CoPilot is a trademark of Novell, Inc. Corsair is a registered trademark of Novell, Inc. in the United States and other countries. CP/Net is a registered trademark of Novell, Inc. in the United States and other countries. CP/NET-86 is a trademark of Novell, Inc. CP/NOS is a trademark of Novell, Inc. Creativity Center is a trademark of Novell, Inc. Crested Wave Design is a trademark of Novell, Inc.
-
Manual 99a 38 July 17, 2001 ElectroText is a trademark of Novell, Inc. Embedded NetWare is a trademark of Novell, Inc. Enterprise Certified Novell Engineer and ECNE are service marks of Novell, Inc. Enterprise Perspectives is a trademark of Novell, Inc. Entry Denied is a trademark of Novell, Inc. Envoy is a registered trademark of Novell, Inc. in the United States and other countries. EtherPort is a registered trademark of Novell, Inc. in the United States and other countries.
-
Manual 99a 38 July 17, 2001 Full Service Directory is a trademark of Novell, Inc. Global MHS is a trademark of Novell, Inc. Global Network Operations Center and GNOC are service marks of Novell, Inc. Global Service Partner & Design is a registered trademark of Novell, Inc. in the United States and other countries. Graphics Environment Manager and GEM are registered trademarks of Novell, Inc. in the United States and other countries. GroupWise is a registered trademark of Novell, Inc.
-
Manual 99a 38 July 17, 2001 LAN Ranger is a trademark of Novell, Inc. LAN Service is a trademark of Novell, Inc. LAN WorkGroup is a trademark of Novell, Inc. LAN WorkPlace is a registered trademark of Novell, Inc. in the United States and other countries. LAN WorkShop is a trademark of Novell, Inc. LANalyzer is a registered trademark of Novell, Inc. in the United States and other countries. LANalyzer Agent is a trademark of Novell, Inc. LANmark is a trademark of Novell, Inc.
-
Manual 99a 38 July 17, 2001 N-Design is a registered trademark of Novell, Inc. in the United States and other countries. Natural Language Interface for Help is a trademark of Novell, Inc. NDebug is a trademark of Novell, Inc. NDS Admin is a trademark of Novell, Inc. NDS Administrator is a trademark of Novell, Inc. NDS Manager is a trademark of Novell, Inc. NE/2 is a trademark of Novell, Inc. NE/2-32 is a trademark of Novell, Inc. NE/2T is a trademark of Novell, Inc. NE1000 is a trademark of Novell, Inc.
-
Manual 99a 38 July 17, 2001 NetWare Application Notes is a trademark of Novell, Inc. NetWare Asynchronous Communication Services and NACS are trademarks of Novell, Inc. NetWare Asynchronous Services Interface and NASI are trademarks of Novell, Inc. NetWare Aware is a trademark of Novell, Inc. NetWare Basic MHS is a trademark of Novell, Inc. NetWare BranchLink Router is a trademark of Novell, Inc. NetWare C Interface is a trademark of Novell, Inc. NetWare Care is a trademark of Novell, Inc.
-
Manual 99a 38 July 17, 2001 NetWare Link/PPP is a trademark of Novell, Inc. NetWare Link/TI NetWare Link/X.25 is a trademark of Novell, Inc. NetWare Loadable Module and NLM are trademarks of Novell, Inc. NetWare LU6.2 is trademark of Novell, Inc. NetWare Management Agent is a trademark of Novell, Inc. NetWare Management Map is a trademark of Novell, Inc. NetWare Management Portal is a trademark of Novell, Inc. NetWare Management System and NMS are trademarks of Novell, Inc.
-
Manual 99a 38 July 17, 2001 NetWare Telephony Services is a trademark of Novell, Inc. NetWare Token-Ring Source Routing Drivers is a trademark of Novell, Inc. NetWare Tools is a trademark of Novell, Inc. NetWare UAM is a trademark of Novell, Inc. NetWare Update is a trademark of Novell, Inc. NetWare Update/Upgrade is a trademark of Novell, Inc. NetWare Upgrade is a trademark of Novell, Inc. NetWare User Authentication Method is a trademark of Novell, Inc.
-
Manual 99a 38 July 17, 2001 Novell Authorized Service Center and NASC are service marks of Novell, Inc. Novell BorderManager is a trademark of Novell, Inc. Novell BorderManager FastCache is a trademark of Novell, Inc. Novell CC is a trademark of Novell, Inc. Novell Certificate Server is a trademark of Novell, Inc. Novell Client is a trademark of Novell, Inc. Novell Connect Services is a trademark of Novell, Inc. Novell Corporate Symbol is a trademark of Novell, Inc.
-
Manual 99a 38 July 17, 2001 Novell N-Design is a registered trademark of Novell, Inc. in the United States and other countries. Novell NE/2 is a trademark of Novell, Inc. Novell NE/2-32 is a trademark of Novell, Inc. Novell NE3200 is a trademark of Novell, Inc. Novell Net Publisher is a trademark of Novell, Inc. Novell Network Registry is a service mark of Novell, Inc. Novell Partner Passport is a trademark of Novell, Inc. Novell Platinum Authorized Reseller is a service mark of Novell, Inc.
-
Manual 99a 38 July 17, 2001 Nutcracker is a registered trademark of Novell, Inc. in the United States and other countries. OfficeWare is a trademark of Novell, Inc. OnLAN/LAP is a registered trademark of Novell, Inc. in the United States and other countries. OnLAN/MAC is a trademark of Novell, Inc. OnLAN/PC is a registered trademark of Novell, Inc. in the United States and other countries. Open Data-Link Interface and ODI are trademarks of Novell, Inc. Open Look is a registered trademark of Novell, Inc.
-
Manual 99a 38 July 17, 2001 Presentation Master is a registered trademark of Novell, Inc. in the United States and other countries. Presentation Team is a trademark of Novell, Inc. Print Managing Agent is a trademark of Novell, Inc. Printer Agent is a trademark of Novell, Inc. Public Access Printer is a trademark of Novell, Inc. QuickFinder is a trademark of Novell, Inc. QuickPath is a trademark of Novell, Inc. Red Box is a trademark of Novell, Inc.
-
Manual 99a 38 July 17, 2001 SMSTSA is a trademark of Novell, Inc. SoftSolutions is a registered trademark of SoftSolutions Technology Corporation, a wholly owned subsidiary of Novell, Inc. Software Testing Program and STP are trademarks of Novell, Inc. Software Transformation, Inc. is a registered trademark of Software Transformation, Inc., a wholly owned subsidiary of Novell, Inc. Solution City is a registered trademark of Novell, Inc. in the United States and other countries.
-
Manual 99a 38 July 17, 2001 Virtual Loadable Module and VLM are trademarks of Novell, Inc. Visual AppBuilder is a trademark of Novell, Inc. VoiceWise is a trademark of Novell, Inc. Web Lessons is a trademark of Novell, Inc. Whenever is a trademark of Novell, Inc. WKSH is a trademark of Novell, Inc. Writer’s Workbench is a registered trademark of Novell, Inc. in the United States and other countries. X-WIN is a trademark of Novell, Inc. XREF is a trademark of Novell, Inc.
-
Server Operating System Administration Guide Novell NetWare 6 ® www.novell.com 6.
-
doc_tpl.fm Rev 99a 28 October 99 17 Contents Server Operating System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 1 Learning about the NetWare Server . . . . . . . . . . . . . . . . . . . . . . . . 11 Overview of the NetWare Server. . . . . . . . . . . . . . . . . NetWare Integrated Kernel. . . . . . . . . . . . . . . . . . . . The Run Queue. . . . . . . . . . . . . . . . . .
-
doc_tpl.fm Rev 99a Setting Server Parameter Values . . . . . . . . . . . . . . . . . . . . . Understanding Server Defaults . . . . . . . . . . . . . . . . . . . . Finding Current Parameter Values . . . . . . . . . . . . . . . . . . Printing Current Parameter Values to a File . . . . . . . . . . . . . . Checking Current Parameter Values with DISPLAY ENVIRONMENT When to Modify Defaults . . . . . . . . . . . . . . . . . . . . . . . . When Not to Modify Defaults . . . . . . . . . . . . . . . . . . . . .
-
doc_tpl.fm Using the Transaction Tracking System . . . . . . . . . How TTS Works . . . . . . . . . . . . . . . . . . . Enabling and Activating TTS . . . . . . . . . . . . . Using an Uninterruptible Power Supply (UPS) . . . . . . Preventing Virus Infection . . . . . . . . . . . . . . . . Monitoring the NetWare Server . . . . . . . . . . . . . Accessing MONITOR. . . . . . . . . . . . . . . . . What to Monitor and Why. . . . . . . . . . . . . . . Displaying Server Alerts . . . . . . . . . . . . . . . . .
-
doc_tpl.fm Rev 99a Troubleshooting Hardware and Network Problems . . . . . . . . . . . . . . . . Identifying Problems after Installation . . . . . . . . . . . . . . . . . . . . . Resolving Hard Disk Access Problems . . . . . . . . . . . . . . . . . . . . Making Computer Memory Available for Network Drivers . . . . . . . . . . . Troubleshooting the NetWare Server . . . . . . . . . . . . . . . . . . . . . . . Resolving Abends . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
-
Manual 99a 38 July 17, 2001 Server Operating System Welcome to the NetWare® Server Operating System Guide.
-
Manual 99a 38 July 17, 2001 If you want to Refer to Decide which file system to use Novell Storage Services Administration Guide Learn more about use of memory by NetWare Server Memory Administration Guide Documentation Conventions In this documentation, a greater-than symbol (>) is used to separate actions within a step and items in a cross-reference path. Also, a trademark symbol (®, TM, etc.) denotes a Novell trademark. An asterisk (*) denotes a third-party trademark.
-
Manual 1 99a 38 July 17, 2001 Learning about the NetWare Server This chapter contains the following information: To learn about See NetWare Server Operating System basics “Overview of the NetWare Server” on page 11 NetWare integrated kernel “NetWare Integrated Kernel” on page 12 Server console security and interfaces “The Server Console” on page 18 How the NetWare server optimizes its own performance “NetWare Is Self-Tuning” on page 20 Java*-based components of NetWare “Java-Based Components
-
Manual 99a 38 July 17, 2001 The principal executable for NetWare, SERVER.EXE, includes bound-in modules, such as those for Media Manager, NetWare Peripheral ArchitectureTM (NWPA), and the Link Support LayerTM (LSLTM). When SERVER.EXE is executed, the NetWare server is loaded into memory, takes control of the hardware resources, and begins to load its component modules. NOTE: NetWare uses DOS as a cold boot loader. It does not run on top of DOS.
-
Manual 99a 38 July 17, 2001 The Run Queue A thread is a stream of control that can execute its instructions independently. A simpler definition is that a thread is a unit of execution. It is not the code itself. HINT: For more information on threads, see Bil Lewis and Daniel J. Berg’s Threads Primer: A Guide to Multithreaded Programming © Sun Microsystems, Inc. Their definition of "thread" has been quoted above.
-
Manual 99a 38 July 17, 2001 Load Balancing Two important requirements of any load balancing scheme are stability (not overreacting to small load imbalances) and the ability to distribute the processing load quickly. The NetWare scheduler handles the stability requirement by using a threshold. The threshold determines how much load imbalance is permitted in the system before the load balancing mechanism kicks in.
-
Manual Figure 1 99a 38 July 17, 2001 Mean Load, Threshold, and High and Low Trigger Loads High Trigger Load (determined by Mean and Threshold) Increasing Processor Workload Threshold = value Mean Low Trigger Load (determined by Mean and Threshold) Without the margin provided by the threshold, threads would constantly move from one processor to another, thereby compromising the productivity of the system.
-
Manual 99a 38 July 17, 2001 is executing code. They are perceived as executing simultaneously because processors are very fast and time quanta are very small. On the other hand, it is the availability of hardware systems with multiple processors that makes it possible to have multiple threads actually running at exactly the same time on different processors. When threads execute simultaneously on multiple processors, they are running in parallel.
-
Manual 99a 38 July 17, 2001 Support for pre-emption provides An execution environment that allows simplified application development. Developers can rely on the scheduler to handle preemption. A mechanism that prevents ill-behaved modules from monopolizing the processor. The kernel itself is not pre-emptible.
-
Manual 99a 38 July 17, 2001 An integrated multiprocessing kernel (MPK) that also supports uniprocessing. One binary runs on both uniprocessor and multiprocessor hardware platforms. Kernel support for pre-emption. (Applications must be explicitly enabled by their developers to take advantage of the kernel’s pre-emption support.) Platform support for MPK in a single platform support module.
-
Manual 99a 38 July 17, 2001 Control settings for the Java environment and GUI backgrounds. Run any console command. Close the X Server--Graphical Console application. To restart the Graphical Console, enter STARTX at the System Console prompt. When NetWare is installed, the server console defaults to the Graphical Console screen. However, you can toggle between screens when you need access to the command line or if you choose to keep MONITOR loaded.
-
Manual 99a 38 July 17, 2001 NetWare Is Self-Tuning In many ways, NetWare is a self-tuning system. It allocates resources according to need and availability. Typically, new resources are not immediately allocated when a request is received. The operating system waits a specified amount of time to see if existing resources become available to service the request. If resources become available, no new resources are allocated.
-
Manual 99a 38 July 17, 2001 Java-Based Components of NetWare NetWare includes the The Novell JVM for NetWare and the Just In Time Compiler, along with the Java Naming Directory Interface (JNDI) and Java Class Libraries (NJCL) for Novell, that enable you to run Java-based applets and applications on the server. The Java-based components are installed automatically when you install NetWare. To use Java-based components, you must use TCP/IP.
-
Manual 22 99a 38 Server Operating System Administration Guide Server Operating System Administration Guide 103-000148-001 August 30, 2001 Novell Confidential July 17, 2001
-
Manual 2 99a 38 July 17, 2001 Setting Up the NetWare Server For information about installing a NetWare® server, including hardware and software requirements and installation instructions, see the NetWare 6 Overview and Installation Guide. For information about migrating from IPXTM to TCP/IP, see Migrating IPX to IP in the Server Communications Administration Guide.
-
Manual 99a 38 July 17, 2001 Changing the Server’s Software Configuration After installing NetWare, you can make several changes, including “Installing, Uninstalling, and Configuring a Server or Other Products” on page 25 “Setting Server Parameter Values” on page 38 Changing time synchronization For more information on changing time synchronization, see Configuring Timesync on Servers in the Network Time Management Administration Guide.
-
Manual 99a 38 July 17, 2001 The configuration report in NetWare Remote Manager is much more complete and extensive. Printing or saving a copy of this report is a quick and easy method for documenting your server before you make any changes. For information about and instructions for creating this report, see Running and Viewing the Server Configuration Report in NetWare Remote Manager Administration Guide.
-
Manual 99a 38 July 17, 2001 Changing the Language NetWare Uses The default language for NetWare is English, but other languages are available.
-
Manual 99a 38 July 17, 2001 replaced with a symbol such as a heart. In the past, these substituted characters might have caused a database such as Novell eDirectory to fail to recognize objects. To help resolve these problems, a convention called Unicode* has been adopted. Using Unicode Unicode is a 16-bit character representation, defined by the Unicode Consortium, that supports up to 65,536 unique characters.
-
Manual 99a 38 July 17, 2001 The most reliable way to determine the character is to refer to the Unicode Standard, Version 2.0. Access the Unicode Web site (http://www.unicode.org) for more information. The Web site also includes charts of Unicode characters.
-
Manual 99a 38 July 17, 2001 Changing Code Pages Changing code pages on the NetWare server or on DOS can usually be done while the computer is operating. However, changing code pages on a Windows 3.1x or a Windows 95 workstation might require installing additional software and restarting Windows. For background information about Unicode and other code pages, see “Code Pages” on page 26.
-
Manual 99a 38 July 17, 2001 Changing Server Message Files English is the default language for both the NetWare operating system and its NLM programs and utilities. You specified a language for the server when you installed it. To change the server language later, you must first copy new language files to the server and then set the server to the new language and restart the server as follows. IMPORTANT: This procedure requires you to restart the server because executing SERVER.
-
Manual 99a 38 July 17, 2001 6 When you have finished selecting languages, press F10. The system copies the selected language files. 7 Press Esc until the Other Installation Items/Products menu is displayed. 8 Select Change Server Language. The screen displays a box containing the path from which you last installed files. 9 Press Enter to accept the path. The system displays a menu listing the available languages. 10 Select the desired language from the menu.
-
Manual 99a 38 July 17, 2001 Any subsequently loaded NLM programs will be displayed in the new language. For more information, see LANGUAGE in Utilities Reference. Changing the Server Keyboard Type NetWare allows you to use keyboard types other than U.S. English by loading the KEYB utility. The language you specify with KEYB must match the language of your keyboard, not language of the server. The keyboard type can be changed without restarting the server.
-
Manual 3 99a 38 July 17, 2001 Optimizing the NetWare Server Optimizing the NetWare® server requires staying up-to-date with Novell® Technical Support (http://support.novell.
-
Manual 99a 38 July 17, 2001 Applying Patches Novell makes every attempt to solve problems in the NetWare operating system software by periodically releasing updates that you can install on your server. The latest operating system update contains all previous updates, so be sure to install the most current file. It will keep your operating system current.
-
Manual Figure 2 99a 38 July 17, 2001 A Well-Designed System Lower Performance Higher Performance a b c de a,b,c,d,e represent the performance capabilities of each system component Note that all components in a well-designed system are within the same range of performance. But in this case, a less than optimum component is cost effective. The components are so closely matched that upgrading the lowerend component a would not increase performance enough to make it worth the cost.
-
Manual 99a 38 July 17, 2001 The unbalanced system in Figure 4 would benefit noticeably if you were to upgrade component f to the performance level of g. But if you were to upgrade f to a performance level beyond g—as shown in the following figure—all additional performance characteristics in f would be lost because the bottleneck would move to component g.
-
Manual 99a 38 July 17, 2001 Setting the Load Balancing Threshold The load balancing threshold applies only to multiprocessor servers. Through extensive testing, Novell has determined the optimum threshold for load balancing across multiple processors—it addresses serious load imbalance while avoiding excessive thread migration. Without that play in the load balancing mechanism, threads would constantly move from one processor to another.
-
Manual 99a 38 July 17, 2001 Setting Server Parameter Values Default values for NetWare server parameters provide maximum performance for most systems. You should seldom need to modify these values. But when you need to modify them, we recommend that you first read the topics listed here.
-
Manual 99a 38 July 17, 2001 Maximum number of open files Turbo FAT index tables TTS transactions Router/server advertising To tune the server for its particular processing load, three utilities are available to check or set server parameter values: NetWare Remote Manager (PORTAL.NLM) is a Web-based utility that you run from a workstation.
-
Manual 99a 38 July 17, 2001 Finding Current Parameter Values Locating the SET parameter values to check or set them is different is a little different in each utility (NetWare Remote Manager, MONITOR or SET). In NetWare Remote Manager 1 Access NetWare Remote Manger. 2 Click the Set Parameters link in the navigation frame. 3 Click a parameter category. A list of parameters in that category that can be changed is displayed.
-
Manual 99a 38 July 17, 2001 In SET 1 At the System Console prompt, enter SET A numbered list of server parameter categories is displayed. 2 Enter the number associated with the category you want to view. A list of parameter names is displayed. The name of each parameter appears highlighted in white with the current setting highlighted in yellow. The information also includes the limits (or range of valid values), the .NCF file the parameter can be set in, and a brief description.
-
Manual 99a 38 July 17, 2001 Checking Current Parameter Values with DISPLAY ENVIRONMENT You can also check parameter values by using two other console commands: DISPLAY ENVIRONMENT and DISPLAY MODIFIED ENVIRONMENT. The DISPLAY ENVIRONMENT command displays the current search paths and the current values of the settable server parameters. (Hidden parameters are not displayed.) At the System Console prompt, enter DISPLAY ENVIRONMENT The name of each parameter appears highlighted in white.
-
Manual 99a 38 July 17, 2001 For example, if your server has a slow hard disk or insufficient RAM, you can compensate temporarily by modifying defaults. The long-term solution is to replace the disk or to add RAM. See “Matching Performance Capabilities” on page 34. When Not to Modify Defaults If you were to modify some defaults, you could sacrifice the system’s balance and performance.
-
Manual 99a 38 July 17, 2001 Using Optional Commands in Startup Files During initialization, NetWare executes two server boot files that are created by the installation process: STARTUP.NCF. Executes first and loads the server’s disk drivers, name spaces, and some SET parameters. This file resides in the startup directory, C:\NWSERVER. AUTOEXEC.NCF.
-
Manual 99a 38 July 17, 2001 Minimizing Replication Traffic Careful choice and placement of tree replicas can minimize replication traffic on the network. Make sure that the replica containing the User object is on the server nearest the user. Do not create more partition replicas than you need. The more replicas, the more traffic required to synchronize them all.
-
Manual 46 99a 38 Server Operating System Administration Guide Server Operating System Administration Guide 103-000148-001 August 30, 2001 Novell Confidential July 17, 2001
-
Manual 4 99a 38 July 17, 2001 Managing the NetWare Server Managing the NetWare® server operating system involves such tasks as the following: Starting and Stopping the Server (page 48) Viewing and Accessing Server Console Screens (page 50) Starting and Stopping Processors (page 52) Using Server Batch Files (page 55) Using Server Utilities and Console Commands (page 60) Using Java on the Server (page 63) Securing the Server Console (page 67) Using NCP Packet Signature (page 70) Using t
-
Manual 99a 38 July 17, 2001 Starting and Stopping the Server This section contains information and procedures on starting the server, bringing it down using an orderly shutdown, and restarting the server without exiting to DOS. Starting the Server To start the server, change to the startup directory (usually C:\NWSERVER) and enter the following at the server’s DOS prompt: SERVER HINT: You can also place the command to execute SERVER.EXE in the DOS AUTOEXEC.BAT file.
-
Manual 99a 38 July 17, 2001 Bringing Down the Server To ensure data integrity, use the DOWN command at the server console before turning off power to the server. DOWN writes all cache buffers to disk, closes all files, updates the appropriate Directory Entry Tables and File Allocation Tables, and exits the network. If you want to bring the server down and then restart the server immediately, without exiting to DOS, use the RESTART SERVER command instead of DOWN.
-
Manual 99a 38 July 17, 2001 2 Execute one of the following commands at the System Console prompt: 2a To bring down the server and exit to the local operating system, enter DOWN You can now shut off power to the system, if necessary.
-
Manual 99a 38 July 17, 2001 X Server -- Graphical Console. Lets you access and run the Java applications listed. To access the list, click Novell on the Graphical console. The default screen that is shown when the server is started is the X Server -- Graphical screen unless you have disabled it. To load this screen if you have disabled it, enter STARTX at the System Console prompt. To close this screen from the GUI menu, click Exit.
-
Manual 99a 38 July 17, 2001 Starting and Stopping Processors This section explains how to start and stop individual processors in a multiprocessing server. Only secondary processors can be handled this way. When the Platform Support Module (PSM) is loaded in the STARTUP.NCF file and the Auto Start Processors SET parameter value (Multiprocessor category) is set to On, NetWare can start the secondary processors automatically. NOTE: Server console commands for processors affect only secondary processors.
-
Manual 99a 38 July 17, 2001 L1 and L2 cache The amount of TLB Instruction and Data entries Using Server Console Commands To determine which processors are currently online from the System Console prompt, run the DISPLAY PROCESSORS command.
-
Manual 99a 38 July 17, 2001 Using Server Console Commands The following table specifies the commands to use at the System Console to take a processor offline.
-
Manual 99a 38 July 17, 2001 To Enter Bring a specific secondary processor online START PROCESSORS n Bring two or more (but not all) secondary processors online START PROCESSORS n n Bring all secondary processors online START PROCESSORS n=processor number n=processor number For more information, see START PROCESSORS in Utilities Reference. Using Server Batch Files This section explains how to use .NCF batch files to load modules, execute System Console commands, and configure subsystems.
-
Manual 99a 38 July 17, 2001 binds the protocol to the installed drivers, loads other NLM programs, and executes server parameters. This file resides in the SYS:SYSTEM directory. In addition, you can create a batch file called SHUTDOWN.NCF in SYS:SYSTEM to execute commands whenever you shut down the server. The DOWN command executes SHUTDOWN.NCF automatically whenever the server is shut down, therefore, you should never include the DOWN command in the SHUTDOWN.NCF file.
-
Manual 99a 38 July 17, 2001 3 When finished, press Esc. Select Yes to save the file or No to exit the file without saving changes. The system redisplays the pathname prompt. 4 To edit or create another file, enter the file pathname. To redisplay the System Console prompt, press Esc. For more information, see EDIT in Utilities Reference. Using NWCONFIG to Create and Edit Startup Batch Files The following procedure explains how to use NWCONFIG to create or edit the STARTUP.NCF and AUTOEXEC.NCF files.
-
Manual 99a 38 July 17, 2001 Editing and navigation keystrokes are listed at the bottom of the screen. For additional help, press F1. 5 When finished, save the file by pressing F10 and selecting Yes when prompted. To exit without saving, press Alt+F10. Changes to the file take effect after you reboot the server. IMPORTANT: Each time you edit the AUTOEXEC.NCF file or the STARTUP.NCF file, NetWare saves the previous version as AUTONCF.OLD or STARTNCF.OLD.
-
Manual 99a 38 July 17, 2001 Set the Command Line Prompt Default Choice parameter (Miscellaneous category) to either On or Off. On means the default response is Y for Yes; Off means the default response is N for No. The parameter setting is overridden by a default specified on the command line. Setting the Time Period To configure the time period before the default response is executed, set the Command Line Prompt Time Out (Miscellaneous category) parameter to a time in seconds.
-
Manual 99a 38 July 17, 2001 Using Server Utilities and Console Commands This section explains how to access help for server utilities and console commands, discusses types of NLM programs, and provides instructions for loading and unloading an NLM at the System Console. Server utilities are NetWare Loadable Modules (NLM) programs. Some NLM programs are loaded whenever you start the server, some are loaded by other NLM programs when they are needed, and some must be loaded manually.
-
Manual 99a 38 July 17, 2001 To display a list of all the console commands in NetWare Remote Manager, click the Console Commands link in the navigation frame. For help on a specific command, click the Info icon next to the command. To see online help for an NLM that displays a menu, such as MONITOR, load the NLM and then press F1. You can also press F1 at subsequent menus, lists, and information windows.
-
Manual 99a 38 July 17, 2001 NCF files (STARTUP.NCF and AUTOEXEC.NCF) allow you to store commands that load NLM programs every time the NetWare server is started. Most NLM programs included with NetWare are copied to SYS:SYSTEM during installation. As you acquire additional NLM programs, decide where you want to copy them. The operating system must be able to find the NLM programs when a LOAD command is issued.
-
Manual 99a 38 July 17, 2001 To unload an NLM program from a protected address space, enter the following at the System Console prompt: UNLOAD ADDRESS SPACE = space_name module_name For more information about loading and unloading modules, see LOAD and UNLOAD in Utilities Reference. For more information about unloading modules from protected address spaces, see Unloading Protected Address Spaces in the Server Memory Administration Guide.
-
Manual 99a 38 July 17, 2001 Environment Variable Description JAVA HOME Specifies the location of the JVM. The default value is SYS:\JAVA. CLASSPATH Specifies the location of the default classpath. XLOCALDIR Specifies the location of files needed to support other languages, including keyboard and font files. To view current variable values and to set values, follow these steps: 1 To load JAVA.
-
Manual 99a 38 July 17, 2001 The JAVA.CFG file is read whenever Java is loaded. To edit the file, use the Editor in the NetWare GUI, use EDIT at the System Console prompt, or use a word processing program at a workstation.
-
Manual 99a 38 July 17, 2001 Accessing the Desktop Menu and Other Console Screens To toggle to the next screen, press Alt+Esc. To display the NetWare screen selection list, press Ctrl+Esc. Activating the Desktop Menu To activate the desktop menu in NetWare GUI, click the Novell button in the lower left-hand corner of the screen. Configuring the Desktop Menu Installing Programs Do the following to install a program into the desktop menu: 1 Copy all the necessary program files to the server.
-
Manual 99a 38 July 17, 2001 Removing Installed Menu Items from the Desktop Menu You can remove either an entire menu file and all the contents, or you can remove only a single menu item. To remove a whole menu file, either delete the file or rename it by changing the extension to something other than .MENU. To remove a single menu item from the desktop menu, locate the item and delete it from the menu file. Setting Taskbar Properties Currently, the default taskbar property is the stay-on-top property.
-
Manual 99a 38 July 17, 2001 Why Should I Use SECURE CONSOLE? After you have provided physical security for your server, you can use the SECURE CONSOLE command to provide the following security features, while still allowing you to use the console: Prevents NetWare Loadable Module programs from being loaded from any directory other than SYS:SYSTEM or C:\NWSERVER. This means that no one can load an invasive NLM from a server’s diskette drive or boot partition unless it is already in a search path.
-
Manual 99a 38 July 17, 2001 SYS:SYSTEM or C:\NWSERVER, then in the .NCF file the SECURE CONSOLE command must follow the LOAD commands for these modules. IMPORTANT: To disable SECURE CONSOLE, you must first shut down the NetWare server and reboot it. If the SECURE CONSOLE command is in the AUTOEXEC.NCF file, use EDIT or any text editor to remove it before you shut down the server and reboot it. For more information on using SECURE CONSOLE, see SECURE CONSOLE in Utilities Reference.
-
Manual 99a 38 July 17, 2001 When you load the screen saver, the default is to enable the consolelocking feature and to require a password for access. The corresponding eDirectory user must have the Write right to the Access Control List (ACL) of the Server object. For more information, see SCRSAVER in Utilities Reference. Unlocking the Server Console To unlock the server console after locking it using SCRSAVER.
-
Manual 99a 38 July 17, 2001 NCP packets with incorrect signatures are discarded without breaking the client’s connection with the server. However, an alert message about the invalid packet is sent to the error log, the affected client, and the server console. The alert message contains the login name and the station address of the affected client. If NCP Packet Signature is installed on the server and all of its workstations, it is virtually impossible to forge a valid NCP packet.
-
Manual 99a 38 July 17, 2001 NCP Packet Signature Options Because the packet signature process consumes CPU resources and slows performance both for the client and the NetWare server, NCP Packet Signature is optional. Several signature options are available, ranging from never signing NCP packets to always signing NCP packets. NetWare servers and Novell clients each have four settable signature levels.
-
Manual 99a 38 July 17, 2001 Recommended Signature Levels The default NCP Packet Signature level is 1 for clients and 1 for servers. In general, this setting provides the most flexibility while still offering protection from forged packets. Following are some examples of situations requiring different signature levels. Situation Example Recommendation All information on the server is sensitive. If an intruder gains access to any information on the NetWare server, it could damage the company.
-
Manual 99a 38 July 17, 2001 Setting Server Signature Levels To determine the server’s current signature level, enter the following command at the System Console prompt or view the setting using NetWare Remote Manager: SET NCP Packet Signature Option To set a server’s packet signature level, enter the following command at the System Console prompt or change the setting using NetWare Remote Manager: SET NCP Packet Signature Option = number Replace number with 0, 1, 2, or 3. The default is 1.
-
Manual 99a 38 July 17, 2001 Setting Client Signature Levels Set client signature levels to 0, 1, 2, or 3. The default is 1. Increasing the value increases security, but decreases performance. Number Explanation 0 Disabled. Client does not sign packets. 1 Enabled, but not preferred. Client signs packets only if the server requests it (server level is 2 or higher). 2 Preferred. Client signs packets if the server is capable of signing (server level is 1 or higher). 3 Required.
-
Manual 99a 38 July 17, 2001 Changing the Signature Level for an NLM NLM programs that use the Novell Runtime Libraries are assigned a default NCP Packet Signature level that corresponds to the current signature level of the server. To change the packet signature level for a single NLM, use the following command syntax when you load the NLM: [LOAD] NLM [CLIB_OPT]/L number Replace number with 0, 1, 2, or 3.
-
Manual 99a 38 July 17, 2001 The default is On, because certain job servers and third-party applications cannot function without changing to client rights. To determine whether the job server can function without client rights, refer to the documentation that comes with the job server. Using the Transaction Tracking System NetWare includes a transaction-monitoring feature called the Transaction Tracking SystemTM (TTSTM).
-
Manual 99a 38 July 17, 2001 How TTS Works The Transaction Tracking System (TTS) can prevent data corruption by backing out of incomplete transactions and keeping a record of backed-out data. TTS guarantees that all changes to a database file are either wholly completed or not made at all. TTS follows these steps to track transactions: 1. When the application allocates a physical or logical record lock, TTS infers that the application is making a transaction.
-
Manual 99a 38 July 17, 2001 Only one file system can have an active TTS. Therefore, if your server is using both the Novell Storage Service (NSS) file sytem and the Traditional File System, note the following: TTS might be enabled on both file systems but it will only be active for one of them. By default, the Traditional File System has TTS always enabled.
-
Manual 99a 38 July 17, 2001 If TTS has been disabled and you have solved the problems that led to its disabling, enter one of the following at the System Console prompt to enable it again: On a server with traditional volumes: ENABLE TTS On NSS volume: NSS /Transaction=VolName To enable and manage transaction tracking for individual files on traditional volumes, use the commands and parameters in the following table. To Do the following Enable transaction tracking for a file.
-
Manual 99a 38 July 17, 2001 Using an Uninterruptible Power Supply (UPS) An uninterruptible power supply (UPS) is a backup power unit that supplies uninterrupted power if a commercial power outage occurs. A UPS is an indispensable part of your network. Not only does it help prevent damage to your computers from power surges and brownouts, but it also prevents data loss during power outages.
-
Manual 99a 38 July 17, 2001 Preventing Virus Infection Keep viruses off the network by educating users about virus dangers and by enforcing procedures that reduce virus risks, such as the following: Back up data frequently. Maintain layers of archived backups so you can retrieve a backup from a preinfected file. Keep a write-protected, bootable diskette with the latest virus scan and removal software for all servers and workstations. Keep a backup of executable files and flag them Execute Only.
-
Manual 99a 38 July 17, 2001 MONITOR is the key tool for performance monitoring at the server level from the server console. It runs in the NetWare kernel so that it can make calls directly to the operating system. Most statistics are updated every second. Accessing MONITOR To load MONITOR at the System Console prompt, enter [LOAD] [path] MONITOR The LOAD command is necessary only if you have a batch file with the same name as the NLM.
-
Manual 99a 38 July 17, 2001 The “Other Information and Statistics to Monitor” on page 87 section includes error logs, available free disk space, and user accounts. To be prepared for power supply interruptions, test your UPS (uninterruptable power system) periodically. Becoming familiar with your server’s day-to-day performance and its characteristic response to its unique load will help you to better interpret the information and statistics that the monitoring utilities provide.
-
Manual 99a 38 July 17, 2001 Server Up Time. Amount of time that has elapsed since the server was most recently started. If your server has Auto Restart enabled, use this field to determine whether your server has abended and restarted. You can also use this information to detect power failures or intruders who bring down the server. Online Processors. Number of enabled and online processors. The Platform Support Module (PSM), loaded from STARTUP.
-
Manual 99a 38 July 17, 2001 Maximum Service Processes. How many task handlers the server can allocate to service client requests. As the number of client requests increases, the server creates more service processes. When no more service processes can be allocated, server performance is adversely affected. Monitor the current number of service processes to ensure that it does not reach this value. Current Service Processes. How many task handlers are currently being used to service client requests.
-
Manual 99a 38 July 17, 2001 Wait time limits control how rapidly the operating system can allocate a new resource. If resources become available, no new resources are allocated. If they don’t become available within the time limit, new resources are allocated. The time limit ensures that sudden, infrequent peaks of server activity don’t permanently allocate unneeded resources. Consider, for example, the allocation of directory cache buffers.
-
Manual 99a 38 July 17, 2001 Sound Bell for Alerts = OFF Available alert parameters are described in the following table. Condition That Generates Alert Relevant Parameters Spurious interrupts are detected Display Spurious Interrupt Alerts Spurious Interrupt Alert Threshold (See SET > Miscellaneous Parameters in Utilities Reference.) Lost interrupts are detected Display Lost Interrupt Alerts Lost Interrupt Alert Threshold (See SET > Miscellaneous Parameters in Utilities Reference.
-
Manual 99a 38 July 17, 2001 Managing Workstation Connections This section explains how to use utilities and commands for disabling logins, clearing connections, controlling resource allocation, sending messages, and working with watchdog packets.
-
Manual 99a 38 July 17, 2001 To monitor connections to the server from utilities at the server console, see the procedures in the following table. To Do the following View a list of active server connections. 1. In MONITOR, from the Available Options menu, select Connections. The list of Active Connections appears. Determine which users are logged in. 2. (Optional) Press F3 to re-sort the connection list. List items without an asterisk (*) represent logged-in users.
-
Manual 99a 38 July 17, 2001 To Do the following Terminate one or more connections. See “Clearing a Workstation Connection” on page 92. Use this procedure to clear the connection when a workstation has crashed and left open files on the server. Note: Transaction monitoring (TTS) provides automatic backout for database records or files stored on the server if a workstation has crashed and left those files open on the server. Also a file is protected if the Transaction (T) file attribute is set for it.
-
Manual 99a 38 July 17, 2001 Clearing a Workstation Connection To clear a client connection when the workstation has crashed and left open files on the server, use one of following procedures: Clearing Specific Connections in the NetWare Remote Manager Administration Guide “Using MONITOR to Clear a Connection” on page 92 “Using CLEAR STATION to Clear a Connection” on page 92.
-
Manual 99a 38 July 17, 2001 To clear all connections, enter the following at the System Console prompt: CLEAR STATION ALL IMPORTANT: The CLEAR STATION ALL command clears all not-logged-in connections including connections by NLM programs. You should be carefull in clearing NLM-based connections because some backup NLM programs establish a connection during the server initialization process and maintain a not-logged-in connection to the server until it is time to log in and run the process.
-
Manual 99a 38 July 17, 2001 The workstation monitor displays a message: Client32: Please wait while Application retries request to servername. To stop waiting, press Enter. NetWare will then return an error and try to reconnect in the background. You can use a combination of the console commands to prevent clients from reconnecting long enough to complete your work on the server. 1. To warn users, see “Sending Console Messages to Workstations” on page 91. 2.
-
Manual 99a 38 July 17, 2001 Preventing Workstations from Overusing File Resources If you are running out of file resources, use the following SET parameters (Traditional File System category) to limit the number of locks for the server and for each connection.
-
Manual 99a 38 July 17, 2001 2 Increase the values of the following (Traditional File System category) parameters to increase the number of file and record locks allowed for each workstation: Maximum Record Locks Per Connection Maximum File Locks Per Connection The changes to the parameter values take effect immediately and are persistent.
-
Manual 99a 38 July 17, 2001 Checking Server Error Logs Check server error logs at least once a week, even if you don’t believe there have been errors. Problems caught early are easier to solve. View the error logs with EDIT (command line) or Editor (GUI) at the server console or with a text editor from a workstation. When needed, NetWare creates the following error logs in SYS:SYSTEM: BOOT$LOG.ERR for errors generated during the process of starting the server. SYS$LOG.
-
Manual 99a 38 July 17, 2001 2 Divide the value of Total Cache Buffers by the value of Original Cache Buffers to determine the percentage of available cache. Ideally, file server cache should be 70% or more of the total cache. 3 If the percentage falls below 50%, add more memory to the server. Checking Free Space on Server Disks and Volumes 1 Check server disks and volumes weekly to make sure they have enough free space. To determine the amount of free space, load MONITOR and select Volumes.
-
Manual 99a 38 July 17, 2001 Documenting the Network It is important to document your network. Keeping records of network layout, hardware and software inventory, configuration, repairs, and backup schedules will save you time and work if you need to rebuild or replace parts of the network, justify new equipment, or restore the network after a disaster. You will also need much of this information if you ever need to call Novell Technical Support.
-
Manual 99a 38 July 17, 2001 You should also gather the following information: Services provided by each server, such as file and print, databases, etc. General directory structure of each volume. Configuration information for printers Map of printer locations, the version of NLM programs, and the dates and versions of print drivers. eDirectory tree structure Print out the eDirectory structure from ConsoleOne or iMonitor. Document replicas and partitions.
-
Manual 99a 38 July 17, 2001 Performing Preventive Maintenance Tasks To avoid common server problems, review the following: “Preventing Memory Problems” on page 101 “Preventing Power Supply Errors” on page 101 “Preventing Static Electricity Problems” on page 102 “Monitoring the NetWare Server” on page 82 “Matching Performance Capabilities” on page 34 “Documenting the Network” on page 99 Preventing Cabling Problems in the Server Communications Administration Guide Preventing Memory Problems
-
Manual 99a 38 July 17, 2001 You can have reliable network performance only if you plan for power outages and fluctuations and protect against them. The following tips can help you do this: Add a dedicated power feed and ground line from your breaker box to critical equipment. Make sure the ground line connects to earth ground. Install an uninterruptible power supply (UPS) or a standby power system (SPS) to provide power to critical equipment for 15 minutes after a power outage.
-
Manual 99a 38 July 17, 2001 Never touch components or integrated chips by their electrical leads. Do not allow anyone to touch you when you are working on boards that contain integrated circuits. They might cause a static charge. Transport and store boards and integrated circuits in static-shielding bags, usually grey-silver in color. The bags must be in perfect condition because tiny pin holes will defeat their purpose.
-
Manual 99a 38 104 Server Operating System Administration Guide Server Operating System Administration Guide 103-000148-001 August 30, 2001 Novell Confidential July 17, 2001
-
Manual 5 99a 38 July 17, 2001 Troubleshooting the NetWare Server This chapter contains the following information for troubleshooting your NetWare® server: “Using a Troubleshooting Methodology” on page 105 “Creating a Core Dump” on page 112 “Troubleshooting Hardware and Network Problems” on page 114 “Troubleshooting the NetWare Server” on page 115 “Monitoring and Resolving Communication Problems” on page 147 “Suspected Multiprocessing Problems” on page 149 “Unable to Communicate with Serve
-
Manual 99a 38 July 17, 2001 “Gathering Information” on page 107 “Simplifying the System” on page 109 “Using Troubleshooting Resources” on page 109 “Developing Hypotheses and Performing Tests” on page 111 “Looking for Additional Help” on page 111 “Documenting the Solution” on page 112 You can find additional tips in TID 2938836, “Before Calling Support for OS Issues” at Novell’s Support Web site (http://support.novell.com/cgi-bin/ search/tidfinder.cgi?2938836).
-
Manual 99a 38 July 17, 2001 some cases, you will need to contact the IHV (independent hardware vendor) that wrote the driver. To verify the compatibility of the ODI modules with the LAN drivers on your server, download and run DRVSPC.EXE (http://support.novell.com/servlet/ tidfinder/2911341). NetWare 6 drivers for storage devices and host bus adapters are written to the NWPA (NetWare Peripheral ArchitectureTM) specification.
-
Manual 99a 38 July 17, 2001 Can the problem be associated with other activities happening on the network at the same time or with specific hardware and software? For example, does the problem occur only when the network activity is highest? Does it occur only on certain workstation platforms? Did anything change shortly before the problem began to occur? For example, did you install new software? What components of the network are involved—the server, some or all of the workstations, printers, or
-
Manual 99a 38 July 17, 2001 Simplifying the System If there is any danger of losing data, back up the system before you do any further troubleshooting. Simplify the system and eliminate as many variables as possible to isolate the source of the problem. Try running the server without the AUTOEXEC.NCF or STARTUP.NCF file. You can comment out the commands in the .NCF files, or you can execute SERVER with the -na or -ns option.
-
Manual 99a 38 July 17, 2001 Novell Support Forms (http://support.novell.com/forums/). Here you can post technical questions and receive a response from a Novell Certified System Operator (SysOp). You can also browse responses that have already been posted. The Novell DeveloperNet Web site (http://developer.novell.com). This site contains information about third-party products certified to run with NetWare.
-
Manual 99a 38 July 17, 2001 Developing Hypotheses and Performing Tests After you have gathered information, eliminated obvious causes, or simplified your system, you can determine what you think is the most likely cause of the problem. You might develop several hypotheses. If so, decide which is the most likely, the next mostly likely, etc. Base your hypotheses on the data you have gathered and on your own experience with the system.
-
Manual 99a 38 July 17, 2001 Using Novell Support Tools Novell has additional support tools available. For a list of these tools, see the Novell Support Web site > Support tools (http://support.novell.com/ tools.html). Opening a Support Incident You can open a support incident online. To access the form, see the Novell Support Web site > Electronic Incident (https://support.novell.com/elecinc/ eiLogin.jsp).
-
Manual 99a 38 July 17, 2001 A core dump can be started two ways: By responding to the core dump choices displayed by NetWare after an abend has occurred. The Type? prompt allows you to specify a full core dump or a cacheless core dump, as explained above. The Device? prompt allows you to specify a local drive or a DOSwriteable device. NOTE: Other types of core dumps might become possible in the future. Your Novell Technical Support representative will inform you if that is the case.
-
Manual 99a 38 July 17, 2001 Sending the Core Dump to Novell Before sending the memory image to Novell, contact a support representative to open a support incident. You will be assigned to a Technical Support Engineer who will help you analyze the memory image file. The Technical Support Engineer will make arrangements to receive the image either in the regular mail or through the Internet and will advise you on the best media format to use.
-
Manual 99a 38 July 17, 2001 To resolve hard disk access problems, perform the following actions: Make sure that the disk driver is loaded. In NetWare Remote Manager, click the Disk / LAN Adapters link in the navigation frame, and then click the Info icon for each network board in your server. Check the cables between the hard disks and the controller boards. Make sure that Pin 1 of each cable is attached to Pin 1 of each connector.
-
Manual 99a 38 July 17, 2001 Locked Device Errors Event Control Block Allocation Errors Console Command Problems Keyboard Locking Problems when Copying Files from CD-ROM Resolving Abends The NetWare operating system is very resilient, but errors can occur. Serious problems are usually accompanied by abend (abnormal end) messages. When an abend message appears, either NetWare or the CPU has detected a critical error condition and started the NetWare fault handler.
-
Manual 99a 38 July 17, 2001 You can respond to the abend manually or have the server respond automatically. When you respond manually, the server determines the nature of the abend and displays the appropriate response option on the screen, along with additional options for bringing down the server or executing a core dump. You must execute an option to respond to the abend. When the server responds automatically, it executes the appropriate response without intervention.
-
Manual 99a 38 July 17, 2001 When you execute this option, the server sends a message to users that the server is going down and advising them to save their files and log out. The server then stops the running process, updates the ABEND.LOG file, and attempts to shut down and restart the computer. The amount of time before the server shuts down and restarts is determined by the SET parameter AUTO RESTART AFTER ABEND DELAY TIME. You can set this value from 2 to 60 minutes. The default is 2 minutes.
-
Manual 99a 38 July 17, 2001 computer. Server performance might be poor, because a loaded NLM is probably malfunctioning. Read the Additional Information part of the abend message to learn which NLM might be causing the problem. At a convenient time, shut down the server and restart it. Examine the ABEND.LOG file for more information about the source of the problem. You can submit the ABEND.LOG file the the abend log database (http:// abend.provo.novell.com/index.
-
Manual 99a 38 July 17, 2001 Otherwise, power off and back on to restart If the console has been secured, you must power it off and then back on to restart the server. If you power off the server without first executing one of the S or R options to resolve the abend, the server will not update the ABEND.LOG file. When the server restarts, it moves the ABEND.LOG file from the DOS partition to the SYS:SYSTEM directory.
-
Manual 99a 38 July 17, 2001 Because the server responds to the abend automatically, you might not know when an abend has occurred. Therefore, you should periodically check the ABEND.LOG file or the Profiling and Debug Information screen in NetWare Remote Manager (look for Suspended by Abend Recovery status).
-
Manual 99a 38 July 17, 2001 The server is low on memory. The volume has too many deleted files that have not been purged. Network traffic is extremely high. The cabling system is experiencing too much interference. Insufficient directory buffers, cache buffers, or packet receive buffers have been allocated. An EISA controller board needs to be configured to use interrupts.
-
Manual 99a 38 July 17, 2001 Miscellaneous link > Current Value link for Minimum Service Processes Miscellaneous link > Current Value link for Maximum Service Processes You can also use MONITOR or the SET commands at the server console. Check the Hot FixTM status of all hard disks that use the Traditional file system. To view these status, Access Monitor. From the Available Options menu, click Storage Devices.
-
Manual 99a 38 July 17, 2001 Check the cabling for interference from fluorescent lights, microwaves, radar, X-rays, and copy machines. Either move the cable or shield it from the source of interference. Take a sniffer or LAN trace of the problem and analyize it. As a last resort, perform a core dump (see “Creating a Core Dump” on page 112) and contact a Novell Support technician.
-
Manual 99a 38 July 17, 2001 If the problem still occurs, follow the troubleshooting steps in “Using a Troubleshooting Methodology” on page 105; search the Novell Knowledgebase (http://support.novell.com/search/kb_index.jsp); and contact a Novell Support Provider. High Utilization Statistics Network performance is a key concern for network administrators and for Novell as well. Unfortunately, sometimes there is confusion about performance indicators and what their statistics mean.
-
Manual 99a 38 July 17, 2001 What Are the Most Common Solutions? Before troubleshooting high utilization problems, make sure that you have followed the steps in “Using a Troubleshooting Methodology” on page 105. Check the Novell Support Connection Web site (http://support.novell.com) for NetWare patches or updated NLM programs. Available patches will contain fixes for reported high utilization problems related to the actual code of the operating system and eDirectory.
-
Manual 99a 38 July 17, 2001 Operating System Issues Server resources. Server resources can be divided into LAN, disk, and processor resources. LAN and disk resources are the number of buffers available. Processor resources are the number of service processes available. When a network packet arrives or when a disk read or write is performed, a buffer should be available to hold the data until a service process is available to service it.
-
Manual 99a 38 July 17, 2001 Category SET Parameter Name and Value Communications Minimum Packet Receive Buffers=value Recommended value is 2 to 3 per connection. Communications Maximum Packet Receive Buffers=4000 Traditional File System Minimum Directory Cache Buffers=value Recommended value is 2 to 3 per connection. Traditional File System Maximum Directory Cache Buffers=4000 Miscellaneous Maximum Service Processes=1000 Miscellaneous New Service Process Wait Time=0.3 Processor hog.
-
Manual 99a 38 July 17, 2001 Storage Devices and Adapter Issues Drivers. See “Keeping Your Servers Patched” on page 106. For a brief explanation of NetWare Peripheral Architecture (NWPA), see Drivers for Host Adapters and Storage Devices in NetWare Server Disks and Storage Devices Administration Guide. Free blocks. When using the traditional file system, adequate free blocks are essential. A free block is a disk block that has no salvageable files stored there.
-
Manual 99a 38 July 17, 2001 avoid suballocation problems. Suballocation does not have any server parameters to adjust. To view disk space usage with NetWare Remote Manager, click the Health Monitor link in the navigation frame and then the Available Disk Space link on the Server Health Monitoring page. Print the Volume Information page for your records. Compression.
-
Manual 99a 38 July 17, 2001 Memory Issues Insufficient RAM. Memory resources are critical in a server environment.
-
Manual 99a 38 July 17, 2001 Client Issues Hung connections. Check for them and clear them. See “Clearing a Workstation Connection” on page 92. Client software. You can identify client problems by changing SET NCP SET parameter. For more information, see NCP Parameters in Utilities Reference. By setting these server parameters to On, the server displays a warning each time a bad packet is received at the server.
-
Manual 99a 38 July 17, 2001 Resolving General Server Disk I/O Errors To resolve a general disk I/O error on the server, try one or more of the following remedies: Check the disk subsystems to make sure that the power is on and the cables are correctly connected between the controller and the subsystems. Make sure that the subsystem cables are terminated correctly. Make sure that the hardware and disks are installed correctly.
-
Manual 99a 38 July 17, 2001 Check and adjust or remove any volume restrictions placed upon users. Check the size of error or log files and delete any that are unnecessary. Mirrored Partitions Do Not Remirror Automatically When mirrored partitions become unsynchronized, they should resynchronize automatically. If partitions do not resynchronize, complete the following steps: 1 In ConsoleOne, browse and select the tree you want to manage, and then click the Partition Disk Management icon.
-
Manual 99a 38 July 17, 2001 some drivers can be loaded with parameters that speed the mirroring process. Make sure the Enable Disk Read After Write Verify (Disk category) SET parameter is set to Off. Most disk drives provide their own form of read-after-write verification; therefore, NetWare’s read-after-write-verify feature is not needed and can increase the time required to mirror partitions.
-
Manual 99a 38 July 17, 2001 Resolving Disk Error Problems When a Traditional Volume Is Mounting To diagnose problems when disk errors occur while a Traditional volume is mounting, identify whether the following conditions exist: The server does not have enough memory to mount the volume. The operating system is experiencing directory sector mismatching. This mismatching can be caused if the media is defective or if the server is turned off without the DOWN command.
-
Manual 99a 38 July 17, 2001 NetWare Doesn’t Recognize All the Memory in the Server Use the following steps to find the source of the problem. 1 Verify whether you are using the NetWare memory manager or an external memory manager. Does CONFIG.SYS or AUTOEXEC.BAT include a DOS=HIGH statement or commands to load memory managers or DOS device drivers? For example, is there a command to load HIMEM.SYS or EMM386.EXE? Both are memory managers. Comment out these statements from CONFIG.SYS or delete CONFIG.
-
Manual 99a 38 July 17, 2001 To see if the server has a memory leak, restart the server and then monitor memory statistics (Total Cache Buffers) over time. When traffic hasn’t increased and no new applications are installed on the server and the statistics change, use the following steps to find the source of the problem. 1 Load all the latest patches on the server. Server patches are available from Novell’s Support Web Site (http:// support.novell.com/misc/patlst.htm) and other locations.
-
Manual 99a 38 July 17, 2001 Freeing Server Memory Temporarily To free server memory temporarily (until you can add more memory to the server), do one or more of the following: On traditional volumes, delete unused files and directories and purge them. Shorten the time period before deleted files are purged. Lower the value of the Minimum File Delete Wait Time SET parameter (Common File System category).
-
Manual 99a 38 July 17, 2001 As a last resort, back up all files in the volume, bring down the server, and reinitialize the volume. Specify a block size of 64 KB and turn the Block Suballocation option to Off. (This setting uses a lot of disk space but increases the amount of memory available.) Check the AUTOEXEC.BAT and CONFIG.SYS files to make sure no memory managers, such as HIMEM.SYS or EMM386.EXE, are being loaded and that there is no DOS=HIGH statement in either file.
-
Manual 99a 38 July 17, 2001 If you combine directories so that most directories have about 32 files, and then purge the deleted subdirectories and files, you will free up memory. Calculate how much memory you need and add memory to the server. Note the Cache Buffers settings in the Server Memory Statistics. If the percentage is below 20%, add more memory. Remove the recently added name space support. WARNING: This is a destructive step that destroys all the extended file information.
-
Manual 99a 38 July 17, 2001 AUTOEXEC.BAT. (To comment out a command, type REM and a space at the beginning of the command line.) If there is a memory manager in the server, NetWare relies upon the memory manager to determine the amount of available memory instead of registering the memory itself. Some memory managers cannot recognize more than 64 MB of memory. DOS device drivers take memory away from NetWare’s memory pool. Make sure Windows 95 is not being used to boot the server.
-
Manual 99a 38 July 17, 2001 File Cache in the Server Memory Administration Guide. To solve the problem, add more RAM. 7 Check for memory leaks. Do the LRU Sitting Time and Long Term Cache Hits gradually decline over time, even when network traffic has not increased and no new applications have been installed on the server? If yes, the server might have a memory leak. See “Resolving Server Memory Leaks” on page 137.
-
Manual 99a 38 July 17, 2001 If these situations are caused by occasional peaks in the memory demand, you should probably maintain your current maximum ECB allocation and allow the message to be generated at those times. Otherwise, if your server memory load is very high and you receive frequent ECB allocation errors, try setting your maximum ECB allocation higher. Use the following SET command in the STARTUP.
-
Manual 99a 38 July 17, 2001 Check the hardware configuration on each network board in the server to make sure that the configuration is correct. If you recorded network board configurations and they do not agree with the actual hardware configurations, reload the LAN driver with the correct parameters or change the hardware settings to match the LAN driver parameters. Check all network board settings for possible interrupt and I/O port conflicts.
-
Manual 99a July 17, 2001 38 SCSI board ! 1 2 3 Remove the CD-ROM device drivers that you used to set up the CD-ROM drive as a DOS device from your CONFIG.SYS file. This will avoid possible conflicts when the Operating System CD is mounted as a NetWare volume.
-
Manual 99a 38 July 17, 2001 8 (Conditional) If the server doesn’t boot automatically from the AUTOEXEC.BAT file, change to the subdirectory where the SERVER.
-
Manual 99a 38 July 17, 2001 Check the cables for proper termination. Make sure that cables are not running close to sources of interference. Make sure that the server network board is seated properly and is initializing. Make sure that a protocol is bound to each board and check the configuration of the network boards. Then shut down the server, turn off the power, and check the actual network board settings: Make sure that all settings agree with the settings used to load the driver.
-
Manual 99a 38 July 17, 2001 If the workstation receives a “Server cannot be found” error, make sure that the server and workstation are using the same frame type. If using 10baseT, try using a cross-cable to connect the server directly to the workstation. If this solves the communication problem between the server and workstation, then something on the network is causing the problem. Suspected Multiprocessing Problems If you suspect a multiprocessing problem, complete the following steps.
-
Manual 99a 38 July 17, 2001 4 Gather information as explained in “Using a Troubleshooting Methodology” on page 105. View the STARTUP.NCF and AUTOEXEC.NCF to determine what software pieces are running. Check with the software vendors and developers and tell them what steps you have taken and give them enough information to duplicate the problem.
-
Manual 99a 38 July 17, 2001 Options > Replica and Partition Operations > replica > Display Replica Information. 4 Make sure all replicas have the correct server name. Incorrect or duplicate server names in directory replicas make it impossible to communicate with the server. Make sure all replicas have the correct name for each server. Load DSREPAIR, select Advanced Options > Replica and Partition Operations > replica > Display Replica Information.
-
Manual 99a 38 July 17, 2001 10 If you are using IPX, reset the server’s internal IPX router. Use the RESET ROUTER command at the System Console prompt to reset the server’s internal IPX router. Troubleshoot other routers. 11 Make sure data can transfer over WAN links. Are servers separated by 56 KB WAN links? If yes, this could be the source of the problem.
-
Manual 99a 38 July 17, 2001 Workstations Can’t Communicate with Server To troubleshoot different kinds of workstation to server problems, see the following sections: “Errors Reading from and Writing to Network, Server Cannot Be Found Errors” on page 153. “Connections Dropped Periodically” on page 156. “Tips for Resolving General Communication Problems” on page 156.
-
Manual 99a 38 July 17, 2001 2 Check whether the server has had an abend. If the server has had an abend, it displays an abend message on the System Console screen. If the abend auto recovery process restarted the server, the message might have scrolled off the screen. Check the ABEND.LOG log file in SYS:SYSTEM to read the message. To troubleshoot a server abend, see “Resolving Abends” on page 116.
-
Manual 99a 38 July 17, 2001 click the Disk / LAN Adapters link in the navigation frame, and then click the name link for each of the network boards in your server. For tips on troubleshooting communications problems, see “Tips for Resolving General Communication Problems” on page 156 If necessary, use LANalyzer® or a similar product to monitor network traffic and isolate the problem. 6 Make sure server utilization is normal. Check utilization statistics.
-
Manual 99a 38 July 17, 2001 Connections Dropped Periodically Follow these steps to troubleshoot the problem: 1 Make sure server utilization is normal. Check utilization statistics. For help in responding to high utilization, see “High Utilization Statistics” on page 125. 2 If users are using old Novell clients, upgrade them to the newest version of the applicable Novell client. 3 Make sure the node number for each workstation is unique.
-
Manual 99a 38 July 17, 2001 Make sure the server network adapter is seated properly and is initializing. Then bring down the server, turn off the power, and check the actual network board settings: Make sure all settings agree with the settings used to load the driver. If you load the driver with an interrupt that conflicts with the board’s setting, the network board cannot broadcast on the network. Make sure the node address on the board is a legal address.
-
Manual 99a 38 July 17, 2001 If using 10baseT, try using a cross-cable to connect the server directly to the workstation. If this solves the communication problem between the server and workstation, then something on the network is causing the problem. Admin Account Has Been Deleted or Admin Password Is Unknown There is only one solution when the Admin account has been deleted or the Admin password has been lost: contact a Novell Support Provider for assistance.
-
Server Memory Administration Guide Novell NetWare 6 ® www.novell.com 6.
-
Manual 99a July 17, 2001 38 Contents Server Memory Administration Guide 7 Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1 Understanding Server Memory 9 Introduction to NetWare Memory. . . . . . . . . . . . . . . . . Directory Cache Buffers and File Cache Buffers . . . . . . . Logical Memory Addressing . . . . . . . . . . . . . . . . . . . Protected Address Spaces . . . . . . . . . . . . . . . . . . . .
-
Manual 6 99a Server Memory Administration Guide Server Memory Administration Guide 103-000147-001 August 30, 2001 Novell Confidential 38 July 17, 2001
-
Manual 99a 38 July 17, 2001 Server Memory Administration Guide Welcome to the Server Memory Administration Guide. This documentation contains the following information: Chapter 1, “Understanding Server Memory,” on page 9 Chapter 2, “Optimizing Server Memory,” on page 17 Chapter 3, “Managing Server Memory,” on page 33 Documentation Conventions In this documentation, a greater-than symbol (>) is used to separate actions within a step and items in a cross-reference path.
-
Manual 8 99a Server Memory Administration Guide Server Memory Administration Guide 103-000147-001 August 30, 2001 Novell Confidential 38 July 17, 2001
-
Manual 1 99a 38 July 17, 2001 Understanding Server Memory The NetWare® server operating system provides increased memory efficiency with three important features: logical memory addressing, virtual memory, and protected memory. The following information is a general introduction to these and other aspects of NetWare's memory architecture.
-
Manual 99a 38 July 17, 2001 Storing data files for users Storing NLM programs, such as LAN drivers, disk drivers, and management utilities Building hash tables for directory names Creating protected address spaces Allocated memory used by NLM programs Hash table File allocation table FAT Turbo FAT Suballocation tables Directory cache Files and NLM programs Temporary storage Open Memory from cache is allocated to an NLM program when requested.
-
Manual 99a 38 July 17, 2001 also tune the number of directory cache buffers yourself, using two server parameters that establish the minimum and maximum number of directory cache buffers the server can allocate. For information about tuning directory cache, see “Tuning Directory Cache for the Traditional File System” on page 24. File cache is used with both the traditional file system and the NSS file system. File cache is a pool of 4 KB memory pages.
-
Manual 99a 38 July 17, 2001 Protected Address Spaces Portions of the logical address space are set aside for protected address spaces (sometimes called user address spaces or ring 3). This protected address space is a portion of the logical address space that has carefully controlled interaction with the server operating system. All protected address spaces use virtual memory. For general information about virtual memory, see “Virtual Memory” on page 14.
-
Manual 99a 38 July 17, 2001 Page Translations Address_Space1 Page Translations Address_Space2 Memory Management System Page Translations Address_Space3 Replacing visible page translations is part of a context switch. Context switches take place when the NetWare kernel changes from running one thread to running another thread. Modules Not Allowed in Protected Address Spaces The following NLM programs and executables cannot be loaded into a protected space: SERVER.
-
Manual 99a 38 July 17, 2001 Virtual Memory NetWare also provides a virtual memory system that swaps little-used data to disk, thereby freeing memory for more frequently used data. Applications that run in protected address spaces use virtual memory, as does Java*. The following illustration shows the amount memory the server can recognize and what portions the virtual memory system uses.
-
Manual 99a 38 July 17, 2001 The memory management subsystem assesses the memory needs of all server and NLM processes and determines where the freed memory should be used. The Java Virtual Machine and any modules that are loaded into protected address spaces use virtual memory. Both the modules and the data they access are subject to being swapped to disk. When data is moved from memory to disk, it is stored in a swap file. You can create one swap file for each NetWare volume.
-
Manual 16 99a Server Memory Administration Guide Server Memory Administration Guide 103-000147-001 August 30, 2001 Novell Confidential 38 July 17, 2001
-
Manual 2 99a 38 July 17, 2001 Optimizing Server Memory This chapter includes information for completing the following tasks: Assessing Server RAM (page 17) Ensuring That Devices Can Access Memory (page 18) Determining Which Processes Use Too Much Memory (page 19) Tuning Server Memory (page 20) Using Virtual Memory (page 26) Optimizing Garbage Collection (page 31) Assessing Server RAM Insufficient physical memory (RAM) in the server is a common cause of a slow network.
-
Manual 99a 38 July 17, 2001 In MONITOR 1 View the General Information window and note the percentage for the Long Term Cache Hits. 2 If the percentage of Long Term Cache Hits falls below 90 percent, add more RAM to the server. HINT: If you are unable to add more RAM now, a short-term fix can help. We suggest unloading unneeded NLMTM programs or removing DOS from memory. Remember that these actions treat symptoms only and are not long-term solutions.
-
Manual 99a 38 July 17, 2001 Determining Which Processes Use Too Much Memory To determine which NLM programs are using excessive amounts of memory, do the following. In NetWare Remote Monitor 1 Click the List Modules link in the navigation frame. 2 Sort the list by allocated memory usage by clicking the Alloc Memory button in the table. NOTE: SERVER.NLM and NSS.NLM will always be high memory users.
-
Manual 99a 38 July 17, 2001 Tuning Server Memory NetWare is a self-tuning operating system; however, there are some things you can do to adjust the server's memory subsystem (as well as other aspects of server operation) to fine tune its performance. Before attempting to tune a new server's memory, let the server operate at full capacity for a week or two to allow NetWare to self-tune.
-
Manual 99a 38 July 17, 2001 60 percent. If you are using mostly NSS volumes, you can run at a much higher percentage, such as 85 to 90 percent. Closefilecachesize dictates how many closed files are kept in cache. The recommended minimum is 50,000. Fileflushtimer and Bufferflushtimer Increasing these parameters from their defaults helps the caching up to a certain point, but too much increase causes a throttling problem with writing out the metadata.
-
Manual 99a 38 July 17, 2001 time stamp of the last block in the cache list. (The time stamp is the time at which the last block entered the list.) The result is displayed in HH:MM:SS.0 format. The LRU Sitting Time measures the length of time it takes for a cache buffer at the head of the list to make its way down to the tail, where it becomes the least recently used (LRU) buffer. Every cache buffer in the list is being reused within that period of time.
-
Manual 99a 38 July 17, 2001 3 Based on the observations you made of the server's resource utilization and LRU Sitting Time, determine an average low LRU Sitting Time. 4 Tune the cache. Size the cache in such a way that the server can sustain an average low LRU Sitting Time of at least 12 minutes during peak workloads.
-
Manual 99a 38 July 17, 2001 Tuning Directory Cache for the Traditional File System The information for tuning directory cache applies only to NetWare servers using the traditional NetWare file system. Directory cache is not used by the Novell Storage ServicesTM (NSS) file system. As directory entries are read and operated upon by a user, NetWare caches the entries to make repeated use of an entry more efficient. In a default configuration, NetWare allocates 20 cache buffers of 4 KB each.
-
Manual 99a 38 July 17, 2001 In NetWare Remote Manager, click the Set Parameters link in the navigation frame, click the Traditional File System category link, click the parameter value link that you want to change, enter the new value, and click OK. In MONITOR, from the Available Options menu, select Server Parameters > Traditional File System, select the parameter you want to change, type the new value, and press Enter.
-
Manual 99a 38 July 17, 2001 For example, if your server's highest number of Directory Cache buffers since server was last started is 250, and you want to load one additional name space, you would calculate the minimum and maximum values of directory cache buffers as follows: 2 x 250 = 500 500 + 100 = 600 Before loading the additional name space, change the following SET parameter values using NetWare Remote Manager, MONITOR, or SET commands at the System Console prompt: MINIMUM DIRECTORY CACHE BUFFERS
-
Manual 99a 38 July 17, 2001 To Do the following in NetWare Remote Manager View the overall perfomance of the Virtual Memory system 1. Click the Monitor Health link in the navigation frame. 2. Click the Virtual Memory Performance link on the Server Health Monitoring page. 3. Click the Info icon for each item listed on the Health Info table on the Virtual Memory Health Information page View specific perfomance of the Virtual Memory system 1. Click the View Memory Config link in the navigation frame.
-
Manual 99a 38 July 17, 2001 You can manage the swapping of data by controlling the swap files where the data is stored on disk. To create, delete, and manage swap files, access NetWare Remote Manager and complete the tasks in the following table: To Do the following in NetWare Remote Manager Learn about the SWAP command Click the Console Commands link in the navigation frame and then the SWAP Info icon on the Console Commands page.
-
Manual 99a 38 July 17, 2001 To Do the following in NetWare Remote Manager Delete a swap file from a designated volume 1. Click the View Memory Config link in the navigation frame and then the Swap File Size link on the System Memory Information page. 2. Click the Yes value link in the Swapping Enabled column for the volume you want to delete the Swap file from. 3. On the Enable Swapping page, click the Disable button.
-
Manual 99a 38 July 17, 2001 Responding to Disk Thrashing The real value of virtual memory is in using a sufficient supply of memory more efficiently, thereby improving server performance. If the overall supply of memory is running low, then swapping will occur more often when virtual memory is in use. If memory is extremely low, the system might spend a significant amount of its time swapping memory in and out of disk and have little time to accomplish useful work. This is called disk thrashing.
-
Manual 99a 38 July 17, 2001 The value is the average number of pages swapped from disk to memory per second, calculated over the last five seconds. The default is 2000. To change the values for this parameter using NetWare Remote Manager, do the following: 1 Click the Set Parameters link in the navigation frame and then the Memory Category link on the Set Parameter Categories page. 2 Click the value link for the Average Page In Alert Threshold setting.
-
Manual 99a 38 July 17, 2001 However, you can initiate garbage collection manually for individual modules using the following steps. 1 In MONITOR, from the Available Options menu, select Loaded Modules. 2 Select the module that you want to garbage collect memory from. 3 Press F4 to garbage collect memory for that module. HINT: You can also garbage collect memory from protected address spaces. In MONITOR, from the Available Options menu, select Virtual Memory > Address Spaces.
-
Manual 3 99a 38 July 17, 2001 Managing Server Memory This chapter contains information about the following: Server Memory Management Tools (page 33) Using Protected Address Spaces (page 34) Loading Protected Address Spaces (page 35) Unloading Protected Address Spaces (page 40) Viewing Information about Address Spaces (page 41) Server Memory Management Tools NetWare® provides several tools to help you manage and tune the memory system: NetWare Remote Manager (PORTAL.
-
Manual 99a 38 July 17, 2001 access the server console to run MONITOR and execute any console commands. In most cases, NetWare Remote Manager is more useful than MONITOR when diagnosing server memory problems. For more information, see the NetWare Remote Manager Administration Guide. The MONITOR utility provides statistics that indicate how efficiently memory is being used by the server and individual modules. For more information, see MONITOR in Utilities Reference.
-
Manual 99a 38 July 17, 2001 Even if an NLM is designed to be loaded only once, you can load multiple copies of the NLM on your server if you load them into different address spaces. When you load modules into a protected address space, NetWare assigns whatever amount of memory the loaded modules need, up to a maximum size of 512 MB.
-
Manual 99a 38 July 17, 2001 To Example Enter this command at the Do this on the Address System Console prompt Space Information Page of NetWare Remote Manager Load one module into the next available protected address space [LOAD] PROTECTED module_name 1. Type module_name in the Load Module Protected field. 2. (Optional) If you want to view the System Console screen when the module loads, check the Display System Console for Module Load check box. 3. Click the Load Module Protected button.
-
Manual 99a 38 July 17, 2001 To Example Enter this command at the Do this on the Address System Console prompt Space Information Page of NetWare Remote Manager Load one module into the next available protected address space with restart functionality [LOAD] RESTART module_name Restart functionality means that if the protected space abends, the system closes the space, cleans up its resources, restarts the space, and reloads the module into it.
-
Manual 99a 38 July 17, 2001 To Example Enter this command at the Do this on the Address System Console prompt Space Information Page of NetWare Remote Manager Load one module into a protected space with a user-defined name [LOAD] ADDRESS SPACE = space_name module_name Use this command when you want to create your own name for the space. 2. (Optional) If you want to view the System Console screen when the module loads, check the Display System Console for Module Load check box.
-
Manual 99a 38 July 17, 2001 To Example Enter this command at the Do this on the Address System Console prompt Space Information Page of NetWare Remote Manager Load multiple modules at once using an .NCF file PROTECT filename The command creates a protected space with the same name as the .NCF file and executes the .NCF file to load all the modules into the space. 1. Type NCF_filename in the Load NCF File Protected field. 2.
-
Manual 99a 38 July 17, 2001 Unloading Protected Address Spaces To unload a module from a protected space or to unload the space itself, use the commands in the following table at the System Console prompt or in NetWare Remote Manager on the Address Space Information page (access by clicking Protected Memory link in the navigation frame).
-
Manual 99a 38 July 17, 2001 If a module hangs while it is being unloaded with the UNLOAD ADDRESS SPACE command, the system waits a specified time and then displays the following error message: Module_name in address_space did not unload yet. Killing the address space is the only way to remove the NLM. Should the address space be killed? Yes/No. If you answer Yes, the system shuts down the address space without unloading modules from it.
-
Manual 99a 38 July 17, 2001 At the System Console Prompt 1 To display a list of loaded modules with their address space names, enter : MODULES Each NLM name displayed is followed by the name of the address space where the NLM resides, the full utility name, version number, date, and other information. The module names are displayed in the order in which they were loaded.
-
System Messages Novell NetWare 6 ® www.novell.com 6.
-
Manual 99a June 14, 2001 37 Contents System Messages 9 Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 1 Understanding Scope of Message Documentation. Error Codes . . . . . . . . . . . . Message Syntax . . . . . . . . . . Other Resources for Help . . . . . 11 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
-
Manual FILESYS - File System Messages 6 99a 37 June 14, 2001 95 FLAG Messages 167 FPSM Messages 179 FTP Server Messages 181 HDETECT Messages 185 ICMD Messages 193 IDEATA.HAM Messages 197 IDECD.CDM Messages 201 IDEHD.
-
Manual 99a 37 June 14, 2001 NSS Messages 337 NWCONFIG Messages 343 NWPA Messages 445 NWSNUT Messages 447 NWTAPE Messages 455 Novell Certificate Server Messages 457 Policy Manager Messages 463 PSERVER Messages 475 RConsoleJ Messages 495 RCONAG6 Messages 497 RCONPRXY Messages 499 REQUESTR Messages 501 RIGHTS Messages 503 Runtime Libraries Messages 513 SBCON Messages 517 SERVER Messages 535 SMDR Messages 589 SMSDI Messages 609 SPXS Messages 627 STREAMS Messages 631 T
-
Manual 2 99a June 14, 2001 37 VREPAIR Messages 749 Shared Messages for LAN Drivers 757 Common Workstation Utilities Error Messages 775 Troubleshooting the Workstation 787 Resolving Workstation Memory Problems. . . DOS and Window 3.x Workstations . . . . Windows 95 Workstations . . . . . . . . . Resolving Workstation Disk Space Problems . A Novell Trademarks 8 System Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
-
Manual 99a July 17, 2001 38 System Messages This is a collection of the messages generated by some of the component modules contained in NetWare. Each message documented might contain an explanation and one or more possible causes and/or actions for the message. For information about messages and resources for additional help, see the following topics.
-
Manual 10 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 1 99a 38 July 17, 2001 Understanding For information about messages and resources for additional help, see the following topics.
-
Manual 99a 38 July 17, 2001 Error Codes Many messages include an error code that is generated by the software. A listing of Novell error codes and their descriptions is found in the Error Codes online documentation (http://www.novell.com/documentation/lg/nwec/docui/ index.htm). Message Syntax Most messages displayed at the console or in a DOS utility are strings of text displayed with a unique identifying code.
-
Manual 99a 38 July 17, 2001 Other Resources for Help The following resources are also available to help resolve an error: Context-sensitive help. If you are using a NetWare menu utility or graphical utility, and you want more information about how to complete a task, press F1 for help. If you are unsure about how to use a command line utility, type the utility name with the /? option at the command line.
-
Manual 99a 38 July 17, 2001 In addition, numerous networking periodicals give advice on configuring, managing, and troubleshooting Novell networks. Troubleshooting hardware and software Specialized hardware and software packages, such as the NetWare LANalyzer AgentTM software or NetWare Management AgentTM, are available to help you isolate network problems.
-
Manual 99a 38 July 17, 2001 Abend: SERVER Messages The following messages include abend server messages. Abend: SERVER-4.10-message_number message_string Source: Explanation: SERVER.EXE Abend (abnormal ending) messages are usually caused by consistency check errors, but they can be caused by insufficient memory, DMA (direct memory access) conflicts, hardware and software interrupts, or hardware problems. If the following abend message appeared, Abend: SERVER-4.
-
Manual Action: 16 99a 38 July 17, 2001 To troubleshoot server abends, see Resolving Abends in the Server Operating System Administration Guide.
-
Manual 99a 38 July 17, 2001 Authentication Messages for ConsoleOne The following messages include authentication messages for ConsoleOne. A naming exception was thrown Source: Explanation: Possible Cause: Action: Java Naming and Directory Interface (JNDI) The JNDI service provider used by the NDS Administration snap-in returned a naming error. The cause of the error is unknown to the NDS Administration snap-in. Contact a Novell support provider. Cancelling the Create Authentication Secret dialog...
-
Manual 99a 38 July 17, 2001 The Create Authentication Secrets dialog box reappears. 2. Fill in the Create Authentication Secrets dialog box, and then click OK. If you want, you can leave the Password field blank. This creates an object-key pair with a null (empty) password. You can go back later and change the password by clicking the Change Password button on the Password Restrictions property page of the User object.
-
Manual Action: 99a 38 July 17, 2001 If you are trying to log in to the same tree as a different user and your connection was lost, restore your connection to a server in the tree and then retry the operation. If you are just trying to log out of a tree and your connection was lost, you don't need to do anything, since you are already disconnected from the tree. The system could not authenticate you to the tree...
-
Manual 20 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a 38 July 17, 2001 BOOTPART Messages The following messages include messages from the BOOTPART.NLM. A bootable DOS partition was detected but it is too small. NetWare requires a 30 MB boot (DOS) partition and recommends 50 MB. Source: BOOTPART.NLM Action: Using Novell's installation software, create a partition that is large enough, or exit and create a partition. No bootable partitions were found on the computer's hard disk.
-
Manual Action: 22 99a 38 July 17, 2001 Exit installation. Delete unnecessary files, and run the installation software again.
-
Manual 99a 38 July 17, 2001 CAPTURE Messages The following messages include messages from the CAPTURE.EXE. CAPTURE-X-163: This workstation does not have enough memory to run CAPTURE. Source: Possible Cause: CAPTURE.EXE This workstation does not have enough available memory. This utility requires a minimum of from 235 KB to 275 KB of memory. NOTE: Execution time increases if limited memory is available. Action: Increase the memory that is available to the workstation.
-
Manual 99a 38 July 17, 2001 CAPTURE-X-918: This utility is trying to access an invalid context. Source: Explanation: Action: CAPTURE.EXE This error occurs while performing CAPTURE S=server J=job. Omit S=server or J=job from the command line. CAPTURE-X-921: Either the supervisor has locked the bindery or volume SYS: is not mounted on server name. Source: CAPTURE.EXE Action: See message “921: Either the supervisor has locked the bindery or volume SYS: is not mounted.” on page 779.
-
Manual 99a 38 July 17, 2001 CLIB Messages The following messages include messages from the CLIB.NLM. CLIB-X-001: Assertion failed: assertion, file name, line number. The NLM's author has requested that this notification be generated based on a specific condition. Source: Explanation: Action: CLIB.NLM This is an internal program error. Use a different version of this NLMTM program. To obtain a different version, contact the vendor of this NLM program, or contact a Novell® support provider.
-
Manual 99a 38 July 17, 2001 CLIB-X-005: Unable to open standard consoles for new thread group. There may not be enough server memory, or server memory may be corrupted. Source: Possible Cause: Action: CLIB.NLM An error occurred that was not expected by the programmer. Contact a Novell support provider. CLIB-X-006: Unable to initialize new thread. There may not be enough server memory, or server memory may be corrupted. Source: Possible Cause: Action: 26 CLIB.
-
Manual 99a 38 July 17, 2001 CNE2 Messages The following messages include messages from the CNE2.LAN. A transmit timed out. The cable might be disconnected from the board. Source: CNE2.LAN Action: See message “A transmit timed out. The cable might be disconnected from the board.” on page 770/ The board cannot be found. Source: CNE2.LAN Action: See message “The board cannot be found.” on page 770/ The board did not respond to the initialization command. Source: CNE2.
-
Manual 99a 38 July 17, 2001 The driver was unable to schedule periodic AES callbacks. 28 Source: CNE2.LAN Action: See message “The driver was unable to schedule periodic AES callbacks.” on page 773.
-
Manual 99a 38 July 17, 2001 CNE2000 Messages The following messages include messages from the CNE2000.LAN. A transmit timed out. The cable might be disconnected from the board. Source: CNE2000.LAN Action: See message “A transmit timed out. The cable might be disconnected from the board.” on page 770. The board cannot be found. Source: CNE2000.LAN Action: See message “The board cannot be found.” on page 770. The board did not respond to the initialization command. Source: CNE2000.
-
Manual 99a 38 July 17, 2001 The board's memory failed the memory test. Source: CNE2000.LAN Action: See message “The board's memory failed the memory test.” on page 772. The driver was unable to schedule periodic AES callbacks. 30 Source: CNE2000.LAN Action: See message “The driver was unable to schedule periodic AES callbacks.” on page 773.
-
Manual 99a 38 July 17, 2001 CNE2_32 Messages The following messages include messages from the CNE2_32.LAN. A transmit timed out. The cable might be disconnected from the board. Source: CNE2_32.NLM Action: See message “A transmit timed out. The cable might be disconnected from the board.” on page 770. The board cannot be found. Source: CNE2_32.NLM Action: See message “The board cannot be found.” on page 770.
-
Manual 32 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a July 17, 2001 38 CNE3200 Messages The following messages include messages from the CNE3200.LAN. The board cannot be found. Source: CNE3200.LAN Action: See message “The board cannot be found.” on page 770. The board has failed. Source: CNE3200.LAN Action: See message “The board has failed.” on page 771. The board's memory failed the memory test. Source: CNE3200.LAN Action: See message “The board's memory failed the memory test.” on page 772. No interrupt was selected.
-
Manual 34 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a 38 July 17, 2001 CNEAMD Messages The following messages include messages from the CNEAMD.LAN. The board did not respond to the initialization command. Source: CNEAMD.NLM Action: See message “The board did not respond to the initialization command.” on page 771 The board has a bad CheckSum of the ROM. Source: CNEAMD.NLM Action: See message “241: The board's ROM has checksum errors.” on page 769 The board's IRQ cannot be found. Source: CNEAMD.
-
Manual 99a 38 Unable to allocate memory. 36 Source: CNEAMD.NLM Action: See message “Unable to allocate memory.
-
Manual 99a 38 July 17, 2001 CNTR2000 Messages The following messages include messages from the CNTR2000.LAN. 201: DIR.OPEN.ADAPTER error code = error_bit_number. Source: CNTR2000.LAN Action: See message “201: DIR.OPEN.ADAPTER error code = error_bit_number.” on page 767 233: The adapter detected a duplicate station during the insertion process. Source: CNTR2000.LAN Action: See message “233: The adapter detected a duplicate station during the insertion process.
-
Manual 99a 38 July 17, 2001 239: The cable is disconnected at the board. Source: CNTR2000.LAN Action: See message “239: The cable is disconnected at the board.” on page 769 240: Cable is disconnected at the MAU. Source: CNTR2000.LAN Action: See message “240: Cable is disconnected at the MAU.” on page 769 241: The Auto Removal process reset the adapter. Source: CNTR2000.LAN Action: See message “241: The Auto Removal process reset the adapter.
-
Manual 99a 38 July 17, 2001 CX Messages The following messages include messages from the CX.EXE. CX-X-120: Control characters are not allowed in the command line. Source: Explanation: Action: CX.EXE Control character input is not allowed as a CX parameter. The key stroke sequences + and + will abort the CX command. Retry the command without using control characters in parameters. CX-X-215: The context you are trying to change to is invalid.
-
Manual 99a 38 July 17, 2001 CX-X-230: An error occurred during CX's attempt to get the object name. Source: Explanation: Action: CX.EXE CX could not get general information about a directory object. CX has terminated. Try again. Make sure to specify a valid object. If the problem persists, contact a Novell® support provider. CX-X-240: The context you want to change to does not exist. You tried to change to: name. Your context will be left unchanged as: name. Source: Explanation: Action: CX.
-
Manual 99a 38 July 17, 2001 CX-X-246: An error occurred in CX's attempt to list the subordinate objects. Error code: code. Source: CX.EXE Action: Try the operation again. Also, make sure that no associated problems have occurred such as the network going down, a connection being lost, or previous errors having occurred and been ignored. If the problem persists, contact a Novell support provider. For information about a specific error code, search the Error Codes online documentation (http://www.
-
Manual 99a 38 July 17, 2001 CX-X-826: The VLMs are not loaded. Source: CX.EXE Explanation: The user tried to run CX from a client workstation using a NetWare® shell file (for example NETX.EXE). CX requires the client workstation to be using VLMs. Action: Unload the NetWare shell file from the workstation and run VLM.EXE. Then retry CX. CX-X-900: An internal application error has occurred. Error code: code Source: CX.EXE Action: Resolve the error, then try the task again.
-
Manual 99a 38 July 17, 2001 CX-X-970: The attempt to open the Unicode table files failed. Source: CX.EXE Action: See message “970: The attempt to open the Unicode table files failed.” on page 781 CX-X-971: The workstation does not have enough memory to load the Unicode table files. Source: CX.EXE Action: See message “971: The workstation does not have enough memory to load the Unicode table files.” on page 781 CX-X-972: Access to the Unicode table files was denied. Source: CX.
-
Manual 99a 38 July 17, 2001 CX-X-998: The message file found (utility_name.MSG) is an incorrect version. The correct version is number. See your network supervisor for assistance. Source: CX.EXE Action: See message “998: The message file found (utility_name.MSG) is an incorrect version. The correct version is number. See your network supervisor for assistance.” on page 783 CX-X-999: The message file for this utility cannot be found. 44 Source: CX.
-
Manual 99a 38 July 17, 2001 DSDIAGNOSTICS Messages The following messages include messages from the DSDIAG.NLM. DSDiag-x-001: Process data not found. Exiting process. Source: Explanation: Possible Cause: Action: DSDIAG.NLM The report process could not locate its data to initialize the report. This is an unexpected error. Unload DSDIAGNOSTICS and then reload it. If the error persists, contact a Novell® support provider. DSDiag-x-002: Insufficient memory error. Source: Possible Cause: DSDIAG.
-
Manual 99a 38 July 17, 2001 DSDiag-x-004: This NLM requires a newer version of NWSNUT. Source: Explanation: Action: DSDIAG.NLM While loading, DSDIAG.NLM determined that the version of nwsnut.nlm does not support the functionality required by DSDIAG.NLM. Update the version of nwsnut.nlm on the server. DSDiag-x-005: This NLM was unable to initialize NWSNUT. Source: Explanation: Possible Cause: Action: DSDIAG.NLM NWSNUT, the support NLM program, returned an error from the initialization process.
-
Manual 99a 38 July 17, 2001 DSDiag-x-009: Error writing to log file, log file closed. Source: Explanation: Action: DSDIAG.NLM The volume the log file is writing to is unmounted or the removable media (for example, floppy, CD, or cartridge) is unavailable. Mount the volume or make sure the removable media is working properly. DSDiag-x-010: Could not register with the Tool Manager. Source: Explanation: Action: DSDIAG.
-
Manual 48 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a 38 July 17, 2001 DSI Messages This module contains some messages that are not numbered. These message are listed alphabetically after the numbered messages. DSI-X-1: An internal error has occurred. DSI cannot load the message file. Source: Explanation: Action: DSI.NLM The DSI.NLM program was unable to load the DSI.MSG message file . Make sure that the server language is set to 4 (English) for the built-in messages, or to a different number to correspond to both of the following: The DSI.
-
Manual 99a 38 July 17, 2001 DSI-X-4: An internal error has occurred. Predefined entry IDs are out of alignment. Source: DSI.NLM Action: Try the operation again. If the problem persists, contact a Novell support provider. DSI-X-5: An initialization internal table failure has occurred. Source: Possible Cause: Action: DSI.NLM An internal system error has occurred. Try the operation again. If the problem persists, contact a Novell support provider. DSI-X-6: An internal error has occurred.
-
Manual 99a 38 July 17, 2001 DSI-X-9: An internal error has occurred. The class definition is too large. Source: Possible Cause: Action: DSI.NLM An internal system error has occurred. Try the operation again. If the problem persists, contact a Novell support provider. DSI-X-10: An internal error has occurred. DSI cannot insert a class entry. Error description: description. Source: Possible Cause: Action: DSI.NLM An internal system error has occurred. Try the operation again.
-
Manual 99a 38 July 17, 2001 DSI-X-15: An internal error has occurred. DSI cannot get time stamps. Error description: description. Source: Possible Cause: Action: DSI.NLM An internal system error has occurred. Try the operation again. If the problem persists, contact a Novell support provider. DSI-X-16: The Directory Services context could not create DDSCONTEXT. Error description: description. Source: Possible Cause: Action: DSI.NLM Insufficient memory at the server would not allow INSTALL to run.
-
Manual Possible Cause: Action: 99a 38 July 17, 2001 The volume SYS: might be out of disk space. See Resolving File I/O Errors in the Traditional File Services Administration Guide. DSI-X-20: The Directory database cannot be opened. Error description: description. Source: DSI.NLM Possible Cause: The volume SYS: might not be mounted, Possible Cause: The volume SYS: might be corrupted. Action: See Resolving File I/O Errors in the Traditional File Services Administration Guide..
-
Manual 99a 38 July 17, 2001 DSI-X-24: An internal error has occurred. DSI cannot generate key pair for name. Error description: description. Source: Possible Cause: Action: DSI.NLM An internal system error has occurred. Try the operation again. If the problem persists, contact a Novell support provider. DSI-X-25: An internal error occurred while DSI was loading system Directory objects. Source: Possible Cause: Action: DSI.NLM An internal system error has occurred. Try the operation again.
-
Manual Possible Cause: Action: Possible Cause: Action: 99a 38 July 17, 2001 Disk space at the server might be insufficient. See Resolving File I/O Errors in the Traditional File Services Administration Guide. An internal system error has occurred. If the problem persists, contact a Novell support provider. DSI-X-29: The local Directory Services agent cannot be opened. Error description: description. Source: Explanation: Possible Cause: Action: Possible Cause: Action: Possible Cause: Action: DSI.
-
Manual 99a 38 July 17, 2001 DSI-X-31: An attempt to place a replica of the partition on this server failed. The partition that failed is the one that holds this server's container object. Error description: description. Source: Possible Cause: Action: Possible Cause: Action: DSI.NLM Traffic on the network might excessive. Minimize external network traffic between this server and other servers in the same Directory tree as much as possible; then retry the installation.
-
Manual Possible Cause: Action: 99a 38 July 17, 2001 Traffic on the network might be excessive. Continue with the installation. After it is completed, change the read/write replica to a master replica. You can then delete the replica on the server identified in the error message. However, this is not absolutely necessary. DSI-X-35: An NLM version mismatch has occurred. DSI version: number. Directory Services version: number. Source: DSI.NLM Possible Cause: The DSI.NLM and DS.
-
Manual Possible Cause: Action: 99a 38 July 17, 2001 An internal error might have occurred. If the problem persists, contact a Novell support provider. DSI-X-40: An internal error has occurred. DSI cannot set the bindery context. Error description: description. Source: Possible Cause: Action: DSI.NLM An internal error might have occurred. Try the operation again. If the problem persists, contact a Novell support provider. DSI-X-41: DSI cannot modify the existing NCP server object.
-
Manual 99a 38 July 17, 2001 Possible Cause: The object corresponding to the administrator that you logged in as does not have Create rights in the context. Action: Make sure you have the Supervisor right in the context (or to the nearest parent to the context) where you are installing. If this is not the case, give yourself the Supervisor right in the context and retry the installation. If the problem persists, contact a Novell support provider.
-
Manual 99a 38 July 17, 2001 DSI-X-47: An internal error has occurred. DSI cannot translate a local string to Unicode. You may have a problem with the Unicode translation files. Error description: description. Source: Possible Cause: Action: DSI.NLM An internal system error has occurred. Try the operation again. If the problem persists, contact a Novell support provider. DSI-X-48: An internal error has occurred. The object for volume name cannot be created. Error description: description.
-
Manual 99a 38 July 17, 2001 DSI-X-52: DSI cannot create the Directory database. Error description: description. Source: DSI.NLM Explanation: An attempt to create the Directory database failed. Explanation: The server might have insufficient disk space. Action: Possible Cause: Action: See Resolving File I/O Errors in the Traditional File Services Administration Guide. An internal system error has occurred. Try the operation again. If the problem persists, contact a Novell support provider.
-
Manual 99a 38 July 17, 2001 DSI-X-55: An internal error has occurred. The Directory Services bindery is not open, and must be for the bindery to be upgraded. Source: Possible Cause: Action: DSI.NLM An internal system error has occurred. Try the operation again. If the problem persists, contact a Novell support provider. DSI-X-56: Bindery upgrade information cannot be saved to file SWITCH.UPG. Source: Possible Cause: Action: DSI.
-
Manual Action: 99a 38 July 17, 2001 Write down the name of the object that failed, along with the error code. Complete the installation and re-create the object later. Also, contact a Novell support provider. For information about a specific error code, search the Error Codes online documentation (http://www.novell.com/documentation/lg/ nwec/docui/index.htm). DSI-X-59: DSI cannot map a previous bindery name to a Directory ID. Error code: code. Bindery object: name.
-
Manual 99a 38 July 17, 2001 necessary, contact a Novell support provider. For information about a specific error code, search the Error Codes online documentation (http:// www.novell.com/documentation/lg/nwec/docui/index.htm). DSI-X-64: DSI cannot write a previous bindery property. Error code: code. Object: name. Property: name. Source: DSI.NLM Explanation: An error occurred while the program was adding an old bindery object to the Directory.
-
Manual 99a 38 July 17, 2001 DSI-X-69: DSI cannot get Directory information for previous bindery object name. Error code: code. Source: Possible Cause: Action: DSI.NLM An internal system error has occurred. Try the operation again. If the problem persists, contact a Novell support provider. For information about a specific error code, search the Error Codes online documentation (http://www.novell.com/documentation/lg/nwec/ docui/index.htm). DSI-X-74: DSI cannot read a previous bindery property.
-
Manual 99a 38 July 17, 2001 DSI-X-76: DSI cannot read a previous bindery value. Error code: code. Object: name. Property: name. Source: Explanation: DSI.NLM An error occurred while the program tried to read the old bindery files (SYS:\SYSTEM\NET$OBJ.SYS, SYS:\SYSTEM\NET$PROP.SYS, SYS:\SYSTEM\ NET$VAL.SYS). Possible Cause: The bindery files might be corrupted. Possible Cause: The volume might be unreadable.
-
Manual 99a 38 July 17, 2001 DSI-X-79: Bindery file SYS:SYSTEM\NET$OBJ.SYS cannot be opened. Source: Explanation: DSI.NLM An error occurred while the program attempted to open the old bindery file (SYS:SYSTEM\NET$OBJ.SYS). Possible Cause: The bindery file might not exist or is corrupted. Possible Cause: The volume might be unreadable. Action: See Resolving File I/O Errors in the Traditional File Services Administration Guide. If the problem persists, contact a Novell support provider.
-
Manual 99a 38 July 17, 2001 DSI-X-83: An attempt to upgrade volume name failed because users were logged in. Remove all user connections and try the upgrade again. Source: Explanation: Action: DSI.NLM A volume cannot be upgraded until all users have logged out of it. Remove all connections. Retry the installation. DSI-X-84: DSI cannot allocate sufficient memory for ID tables. Source: Possible Cause: Action: DSI.NLM Sufficient memory was not available for INSTALL to run. Increase memory at the server.
-
Manual 99a 38 July 17, 2001 DSI-X-89: An attempt to remove an extraneous replica of the new Directory partition replica failed. Error: description. This is not a fatal problem, however, the installation should continue normally. A read/write replica of the partition will exist on server name. You may delete this replica after the installation is complete using the Partition Manager (PARTMGR) utility. Source: DSI.
-
Manual 99a 38 July 17, 2001 DSI-X-92: Directory Services API interface versions do not match DSI internal interface version is: interface_version DSI API interface version is: DS_access_version_expected Directory Services API interface version is: DS_access_version Source: Explanation: Action: DSI.NLM An incorrect version of one of the listed APIs exists. Note the version for each API display, and contact a Novell support provider to find out which version is required.
-
Manual 99a 38 July 17, 2001 DSI-X-96: An internal error has occurred. DSI unable to synchronize schema. Error description: description. Source: Explanation: Action: DSI.NLM An internal system error has occurred at the operation noted in the message. For information about a specific error code, search the Error Codes online documentation (http://www.novell.com/documentation/lg/nwec/docui/ index.htm).Retry the operation. If the problem persists, contact a Novell support provider.
-
Manual 99a 38 July 17, 2001 Possible Cause: Novell Directory Services is being removed from the server. Possible Cause: Insufficient information exists on the server displayed in the message to properly delete the server object. Action: Please try removing this server from the tree at a later time. DSI-X-1002: The partition name is in a transitional state. The local server is participating in a replica operation that involves this partition.
-
Manual Action: 99a 38 July 17, 2001 For information about a specific error code, search the Error Codes online documentation (http://www.novell.com/documentation/lg/nwec/docui/ index.htm). DSI-X-1007: Error code beginning Directory operation. Source: DSI.NLM Action: For information about a specific error code, search the Error Codes online documentation (http://www.novell.com/documentation/lg/nwec/docui/ index.htm). DSI-X-1008: Could not change the replica type of the partition.
-
Manual 99a 38 July 17, 2001 Error create schema. Error description description Source: Explanation: Action: DSI.NLM The message indicates the point in the installation process at which the error occurred. Note the error code displayed, For information about a specific error code, search the Error Codes online documentation (http://www.novell.com/ documentation/lg/nwec/docui/index.htm), and follow the recommended suggestions. If the problem persists, contact a Novell support provider.
-
Manual 99a 38 July 17, 2001 Unable to change the replica type of partition name on server name to master. Error Description description. Source: DSI.NLM Explanation: The message indicates the point in the installation process at which the error occurred. Action: Note the error code displayed, search the Error Codes online documentation (http://www.novell.com/documentation/lg/nwec/docui/index.htm), and follow the recommended suggestions. If the problem persists, contact a Novell support provider.
-
Manual 76 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a July 17, 2001 38 DSKSHARE Messages The following includes messages from the DSKSHARE.DSK. DSKSHARE-X-005: An internal error has occurred. System data could not be added to NetWare. Source: Explanation: Possible Cause: Action: Possible Cause: Action: DSKSHARE.DSK The program attempted to add the OS/2 adapter board to NetWare® using the function call AddDiskSystem; however, this call failed. The server does not have enough memory available. Increase the memory available to the server.
-
Manual 99a 38 July 17, 2001 DSKSHARE-X-015: An internal error has occurred. The program could not allocate a memory resource tag. Source: Explanation: Possible Cause: Action: Possible Cause: Action: DSKSHARE.DSK The program tried to allocate a memory resource tag, and the call failed. The server does not have enough memory available. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide.
-
Manual 99a July 17, 2001 38 DSREPAIR Messages The following includes messages from the DSREPAIR.NLM. DSREPAIR-x-001: Unknown switch pointer. Source: Possible Cause: Action: DSREPAIR.NLM An unknown command line switch was entered. Try the task again using a valid switch. DSREPAIR-x-002: USAGE: (–L LogFileName) (–U) unattended mode. Source: Possible Cause: Action: DSREPAIR.NLM The user has entered the DSREPAIR command with incorrect syntax. Try the command again with the indicated syntax.
-
Manual 99a 38 July 17, 2001 DSREPAIR-x-005: Unable to allocate memory for DSREPAIR process stack. Source: Possible Cause: Action: DSREPAIR.NLM The server does not have enough available memory. Increase the available memory to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. DSREPAIR-x-007: Unable to open DSREPAIR status screen. Source: Possible Cause: Action: DSREPAIR.NLM An error occurred while DSREPAIR was trying to register for OS resources.
-
Manual 99a 38 July 17, 2001 DSREPAIR-x-011: Stack overflow, frame size = hex number, ESP = hex number. Source: Possible Cause: Action: DSREPAIR.NLM An internal error occurred. Try running DSREPAIR again, or reboot the server, then run DSREPAIR again. DSREPAIR-x-013: Could not open all of the Directory Services files. Source: Explanation: Action: DSREPAIR.NLM Four Directory database files are stored in a secure area of the NetWare® server's volume SYS.
-
Manual 99a 38 July 17, 2001 DSREPAIR-x-017: Cannot initialize directory path to Directory Services files. Source: Possible Cause: Action: DSREPAIR.NLM DSREPAIR could not find the directory that contains the eDirectory database files in volume SYS:. Make sure volume SYS: is mounted, or run reinstall the server. DSREPAIR-x-018: Could not rename file: old_filename. Source: Possible Cause: DSREPAIR.NLM A file of the same name might already exist. Action: Run DSREPAIR again.
-
Manual 99a July 17, 2001 38 Action: If these actions do not work, reboot the server and try again. Action: A final option is to reinstall the server. If the problem persists, contact a Novell support provider. DSREPAIR-x-021: Could not write to file: filename, offset offset Source: Explanation: DSREPAIR.NLM DSREPAIR could not write a record to the eDirectory database. Possible Cause: The volume might be full, Possible Cause: The database might be corrupted.
-
Manual 99a 38 July 17, 2001 Action: If these actions do not work, reboot the server and try again. Action: A final option is to reinstall the server. If the problem persists, contact a Novell support provider. DSREPAIR-x-024: Could not update whole value for file: filename, offset offset Source: Explanation: DSREPAIR.NLM DSREPAIR could not write a record to the eDirectory database. Possible Cause: The volume might be full Possible Cause: The database might be corrupted.
-
Manual 99a July 17, 2001 38 Action: If these actions do not work, reboot the server and try again. Action: A final option is to reinstall the server. If the problem persists, contact a Novell support provider. DSREPAIR-x-027: Could not allocate number bytes of memory. Source: Explanation: Action: DSREPAIR.NLM The server does not have enough available memory. Increase the available memory to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide.
-
Manual 99a 38 July 17, 2001 DSREPAIR-x-031: Could not truncate the file: filename Source: Explanation: DSREPAIR.NLM DSREPAIR could not write a record to the eDirectory database. Possible Cause: The volume could be full. Possible Cause: The database could be corrupted. Action: Try rebuilding the volume using REBUILD (NSS Logical volume) or VREPAIR (Traditional volume, then try again. If the problem persists, contact a Novell support provider.
-
Manual 99a 38 July 17, 2001 DSREPAIR-x-034: Could not write to file: filename at location address. Source: Explanation: DSREPAIR.NLM DSREPAIR could not write a record to the eDirectory database. Possible Cause: The volume might be full. Possible Cause: The database might be corrupted. Action: Try rebuilding the volume using REBUILD (NSS Logical volume) or VREPAIR (Traditional volume then running DSREPAIR again. If the problem persists, contact a Novell support provider.
-
Manual 99a 38 July 17, 2001 Directory Services API interface version is: version Source: Explanation: Action: DSREPAIR.NLM The version of DSREPAIR does not match with the version DS.NLM. Get the correct version and try again. Note: The version's displayed in the message might all have the same value and still be the wrong version. These versions do not indicate the correct version. To get the correct version, contact a Novell support provider. DSREPAIR-x-039: Internal Error, number number.
-
Manual Action: Possible Cause: Action: 99a 38 July 17, 2001 Try the operation again. If the error persists, contact a Novell support provider. The server has insufficient memory. Increase the available memory to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. Try the operation again. If the server has at least 500 KB of free memory, contact a Novell support provider. DSREPAIR-x-043: Unable to create an NWSNUT portal.
-
Manual 99a 38 July 17, 2001 DSREPAIR-x-046: The Schema Tree is corrupt, no repair strategy is available. Remove the server from the Directory Services Tree and then re-install it. Source: Explanation: Action: DSREPAIR.NLM The schema cannot be repaired, and the eDirectory database on this server cannot operate without it. Deinstall the server from the tree and reinstall it. DSREPAIR-x-047: Could not locate one or more Directory Services files. 90 Source: DSREPAIR.
-
Manual 99a July 17, 2001 38 EDIT Messages The following includes messages from the EDIT.NLM. EDIT-X-7: The file could not be written to disk. Source: Explanation: Action: EDIT.NLMTM The EDIT.NLM program was unable to write the file to disk. Make sure that the volume is mounted. If the problem persists, contact a Novell support provider. EDIT-X-8: The file could not be created. Source: Explanation: Action: EDIT.NLM The EDIT.NLM program was unable to create the file.
-
Manual 99a 38 July 17, 2001 EDIT-X-14: The NLM could not allocate a resource tag. Source: Possible Cause: Action: EDIT.NLM The server might not have enough available memory. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. EDIT-X-16: The NLM could not get the process resource tag. Source: Possible Cause: Action: EDIT.NLM The server might not have enough available memory. Increase the memory available to the server.
-
Manual 99a July 17, 2001 38 EDIT-X-23: The NLM was unable to initialize NWSNUT.NLM. Source: Explanation: Action: EDIT.NLM An internal system error probably occurred. If the problem persists, contact a Novell support provider. EDIT-X-28: The NLM could not allocate memory. Source: Possible Cause: Action: EDIT.NLM The server might not have enough available memory. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide.
-
Manual 94 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a 38 July 17, 2001 FILESYS - File System Messages The following includes messages from the FILESYS.NLM. FILESYS-X-5: Enable TTS requested by user name on station number. Source: Explanation: FILESYS.NLMTM The user indicated in the message issued an ENABLE Transaction Tracking SystemTM (TTTMS) request. FILESYS-X-14: Allow unowned files to be extended. Source: Possible Cause: Action: FILESYS.NLM The server does not have enough memory to mount the volume.
-
Manual 99a 38 July 17, 2001 FILESYS-X-131: Memory for auditing cannot be allocated. Volume name is being dismounted. Source: FILESYS.NLM Possible Cause: The operating system ran out of memory when it tried to start up auditing while mounting a volume. Action: Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. FILESYS-X-132: Error writing to the audit file for volume: name.
-
Manual 99a 38 July 17, 2001 FILESYS-X-158: Internal compression error: file `name' volume number intermediate size number. Offset totals from intermediate file generation (number) and intermediate file processing (number) mismatch invalidating intermediate file. Source: FILESYS.NLM Possible Cause: This error resulted from an internal consistency check done by compression to guarantee the integrity of the data being compressed.
-
Manual 99a 38 July 17, 2001 FILESYS-X-160: Internal compression error: file `name' volume number intermediate size number. Length/Offset encode counts from intermediate file generation (number) and intermediate file processing (number) mismatch invalidating intermediate file. Source: FILESYS.NLM Possible Cause: This is an internal consistency check done by compression to guarantee the integrity of the data being compressed.
-
Manual 99a 38 July 17, 2001 FILESYS-X-164: Internal compression error: file name volume number size size. Shannon Tree depth exceeded 32 generating bit codes uncontainable in a single LONG. Source: FILESYS.NLM Possible Cause: This is an internal consistency check done by compression to guarantee the integrity of the data being compressed. During file compression, an intermediate file is created that describes the compressed version of the file.
-
Manual 99a 38 July 17, 2001 FILESYS-X-168: Compression: Invalid length or offset. Source: Possible Cause: Action: FILESYS.NLM An I/O error has occurred during file compression. The disk drive or disk hardware might be starting to malfunction. The file that was being compressed will remain uncompressed and the system will try again later to compress it. See Disk Errors in the Server Operating System Administration Guide. FILESYS-X-170: Error writing to the extended directory space. Source: FILESYS.
-
Manual 99a 38 July 17, 2001 FILESYS-X-172: Error writing to file (filename not accessible) data stream number. Write was requested by user name on station number. Source: Explanation: FILESYS.NLM A write error has prevented the operating system from correctly writing file data to the disk. Hot Fix was not able to redirect the data to a new block. The data stream number indicates the name space stream (0=DOS or Macintosh data fork, 1=Macintosh resource fork).
-
Manual 99a 38 July 17, 2001 FILESYS-X-175: File read error at offset offset data stream number. Error getting filename. Read was requested by the SERVER. Source: Explanation: FILESYS.NLM The server was processing a file-read request. When the server tried to read the disk block with the file data, a disk-read error occurred. Some data was lost that could cause the user's applications to fail on reading data from files.
-
Manual 99a 38 July 17, 2001 Possible Cause: A hard disk or channel failure occurred. The disk could have other data integrity problems. Action: See Disk Errors in the Server Operating System Administration Guide. FILESYS-X-178: Error reading file name. Offset offset data stream number. Read was requested by user name on station number. File path path. Source: Explanation: FILESYS.NLM When the operating system tried to read existing data from disk, it got a disk read error.
-
Manual 99a 38 July 17, 2001 This error might have been caused by a hard disk or channel failure. The disk might have other data integrity problems. Action: See Disk Errors in the Server Operating System Administration Guide. FILESYS-X-181: File name write preread error. Offset offset data stream number. Read was requested by the SERVER. File path path. Source: Explanation: FILESYS.
-
Manual 99a 38 July 17, 2001 FILESYS-X-185: Error expanding server\volume directory because directory size limit was exceeded. Source: Explanation: Action: FILESYS.NLM The system needs to allocate another directory block on the volume, but the maximum number of directory blocks has been reached. The server limits the amount of disk space used for the directory table to between 5% and 50% of the total space on a volume.
-
Manual 99a 38 July 17, 2001 FILESYS-X-188: Server\volume directory size is getting too large for available memory. If the directory grows much larger, you may need to add more memory to the file server. Source: Possible Cause: Action: FILESYS.NLM The size of the volume directory table has increased since the volume was mounted. The next time this volume is mounted, more memory will be used for the directory tables because a larger hash table will be created.
-
Manual 99a 38 July 17, 2001 FILESYS-X-191: Error reading one copy of the directory on server\volume. Source: Explanation: Possible Cause: Action: FILESYS.NLM The server maintains two copies of the directory on each volume. An error occurred while the server was reading from one copy of the directory. The server was able to read the other copy, and it found the needed information. A hard disk or channel failure occurred. The disk could have other data integrity problems.
-
Manual 99a 38 July 17, 2001 FILESYS-X-194: User name connection number attempted to extend the length of a file with no owner. Filename: name. Source: Explanation: Action: FILESYS.NLM A file needed to be extended; however, because the file had no owner, the operation was aborted. Delete the file, or assign the file an owner. FILESYS-X-231: Insufficient RAM to compress file. Source: Explanation: Possible Cause: Action: Possible Cause: Action: FILESYS.
-
Manual Possible Cause: Action: 99a 38 July 17, 2001 Disk restrictions for the user, volume, or directory could have been assigned, or the volume could be full. The system will try again later to compress the file. See Resolving Server Disk Space Problems in the Server Operating System Administration Guide. FILESYS-X-235: Compressed file filename being decompressed for station number uses unknown compression format. Source: Possible Cause: Action: FILESYS.
-
Manual 99a 38 July 17, 2001 FILESYS-X-240: Insufficient RAM to decompress file name. Source: Explanation: Action: FILESYS.NLM The system tried to allocate memory to decompress a file and failed. The file that was being decompressed will remain compressed, and the system will try again later to decompress it. Wait until the server is less congested and try again. FILESYS-X-241: Compressed file is corrupted and unrecoverable. Source: FILESYS.
-
Manual 99a 38 July 17, 2001 FILESYS-X-243: Compressed file name in use by station number is corrupted and unrecoverable. Source: Possible Cause: FILESYS.NLM The first block of the compressed file has been corrupted on the disk. During decompression, the integrity of the data describing the compressed file is checked. If any of the checks fail, data corruption is assumed, and compression cannot be completed, as is the case here. This error can only be caused by the data changing on the disk.
-
Manual 99a 38 July 17, 2001 FILESYS-X-255: Insufficient directory space (or memory) to preserve path during file erase. Source: Explanation: Possible Cause: Action: FILESYS.NLM While trying to delete a file, the server was unable to obtain the needed directory table space or memory to retain the deleted file in a state in which it could be salvaged. The file was deleted and purged. A preceding message on the screen should indicate the cause of this error.
-
Manual 99a 38 July 17, 2001 FILESYS-X-306: Error reading in volume directory. Source: Explanation: Possible Cause: Action: FILESYS.NLM The current directory entry being examined did not have the correct root subdirectory code number. This error probably indicates corruption. Run VREPAIR and restart the system. Warning: If you delete the volume, all data will be destroyed. You will have to restore the data from a backup. If the problem persists, make sure a volume backup exists.
-
Manual 99a 38 July 17, 2001 FILESYS-X-309: Not enough memory to validate directory. Source: Possible Cause: FILESYS.NLM The server had enough memory to read the directory tables, but not enough memory to validate the directories. Before dismounting the volume, the user received a warning that the server was running out of memory and that the volume could not be remounted because it has grown too much.
-
Manual 99a 38 July 17, 2001 FILESYS-X-313: Invalid deleted file. Source: Explanation: FILESYS.NLM While checking deleted file directory entries, the system aborted the volume mount process for one of the following reasons: The FAT chain check did not return with a successful completion code. The directory entry file size did not equal zero. Possible Cause: Action: This error probably indicates corruption. Run VREPAIR and restart the system.
-
Manual Possible Cause: Action: 99a 38 July 17, 2001 The module is corrupted or is the wrong type. Run VREPAIR on the volume. FILESYS-X-318: Invalid name space list. Source: Explanation: Possible Cause: Action: FILESYS.NLM While scanning subdirectory name space list entries, the system found that the next name space list entry was greater than or equal to the number of defined name spaces for the volume.
-
Manual Action: 99a 38 July 17, 2001 Run VREPAIR and restart the system. Warning: If you delete the volume, all data will be destroyed. You will have to restore the data from a backup. If the problem persists, make sure a volume backup exists. Delete the volume, re-create it, and restore the data from the backup. FILESYS-X-321: Invalid suballocation directory entry. Source: Explanation: Possible Cause: Action: FILESYS.
-
Manual 99a 38 July 17, 2001 FILESYS-X-323: Deleted file is a subdirectory. Source: Explanation: Possible Cause: Action: FILESYS.NLM While in the process of initializing the directory volume structures, the system found that one or both of the members of the work directory (directory flag and directory file attribute) had their subdirectory bit turned on. What was thought to be a file was in fact a subdirectory. The directory volume did not initialize properly and all resources were returned.
-
Manual 99a 38 July 17, 2001 FILESYS-X-326: Insufficient memory available for user restriction nodes. Source: Explanation: Possible Cause: Action: FILESYS.NLM A call for memory from within the set_user_restriction routine failed. This memory would have been used to create user restriction node IDs. The server does not have enough memory. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide.
-
Manual 99a 38 July 17, 2001 FILESYS-X-329: Directory block is inconsistent...has several subdirectory numbers. Source: Explanation: Possible Cause: Action: FILESYS.NLM Upon initialization, the subdirectory number vector table should contain a value of -1 (which is then changed to a zero). If the value residing in the table is not equal to -1 or 0, the volume mount is aborted and all resources are returned to the system. In this case, the table contained a different value.
-
Manual Possible Cause: Action: 99a 38 July 17, 2001 The amount of directory blocks of directory 0 didn't match the number of directory 1. The volume mount was aborted because the directory integrity was disrupted. Run VREPAIR and restart the system. Warning: If you delete the volume, all data will be destroyed. You will have to restore the data from a backup. If the problem persists, make sure a volume backup exists. Delete the volume, re-create it, and restore the data from the backup.
-
Manual 99a 38 July 17, 2001 Warning: If you delete the volume, all data will be destroyed. You will have to restore the data from a backup. If the problem persists, make sure a volume backup exists. Delete the volume, re-create it, and restore the data from the backup. FILESYS-X-342: Invalid extended directory entry FAT chain. Source: Explanation: Possible Cause: Action: FILESYS.NLM A File Allocation Table (FAT) chain is a list of directory block locations.
-
Manual 99a 38 July 17, 2001 FILESYS-X-346: UNIX Hard Link flags don't match between the name spaces. Source: Possible Cause: Action: FILESYS.NLM The name spaces cannot be linked because their flags do not match. Make sure that the UNIX hard link flags match before trying to link the name spaces. FILESYS-X-347: The server is not configured to support this volume's DOS type. Source: Possible Cause: Action: FILESYS.
-
Manual 99a 38 July 17, 2001 FILESYS-X-351: Error moving trustee node on NetWare 4 file upgrade. Source: Possible Cause: Action: FILESYS.NLM An error in rebuilding the directory entry table while upgrading to NetWare 4 or a later version occurred. This might be due to not enough disk space or other disk problems. You might need to increase the volume size or repair the volume using VREPAIR. See Resolving Server Disk Space Problems in the Server Operating System Administration Guide.
-
Manual 99a 38 July 17, 2001 FILESYS-X-412: Two subdirectories reference the same first directory block. Source: Explanation: Possible Cause: Action: FILESYS.NLM The operating system encountered a problem while mounting a volume. Two subdirectories reference the same directory block. Run VREPAIR and restart the system. Warning: If you delete the volume, all data will be destroyed. You will have to restore the data from a backup. If the problem persists, make sure a volume backup exists.
-
Manual 99a 38 July 17, 2001 FILESYS-X-417: File has both do compression and don't compress attributes set. Source: Possible Cause: Action: FILESYS.NLM The system does not know whether to perform file compression on a given file because the file has been assigned both the Immediate Compress (Ic) and Don't Compress (Dc) attribute. Use FLAG to remove the Ic or Dc attribute on the given file. FILESYS-X-418: Directory has both do file compression and don't file compress attributes set.
-
Manual 99a 38 July 17, 2001 name spaces was marked as the originating name space. NetWare assumes that the name was generated by the DOS name space. Action: Run VREPAIR and restart the system. Warning: If you delete the volume, all data will be destroyed. You will have to restore the data from a backup. If the problem persists, make sure a volume backup exists. Delete the volume, re-create it, and restore the data from the backup. FILESYS-X-472: Volume already supports this Name Space.
-
Manual 99a 38 July 17, 2001 FILESYS-X-481: Add name space aborted by the user due to insufficient disk space. Source: Possible Cause: Action: FILESYS.NLM There is insufficient disk space to add the desired name space. Increase the available disk space on the volume. See Resolving Server Disk Space Problems in the Server Operating System Administration Guide. FILESYS-X-482: Add name space aborted due to insufficient server RAM. Source: Explanation: Possible Cause: Action: FILESYS.
-
Manual 99a 38 July 17, 2001 Action: Verify that the system is large enough to handle the name space. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. Action: Increase the available disk space on the volume. See Resolving Server Disk Space Problems in the Server Operating System Administration Guide. Then re-create the volume. FILESYS-X-485: AddNameSpace error reading volume header...volume is left in a bad state.
-
Manual 99a 38 July 17, 2001 If performance is degraded, add additional memory to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. A second solution is to determine which program tried to continue a search that the server was not tracking. The search method that the program uses can be modified so that it does not require more than 51 searches to be tracked. Or, if available, an alternate program could be used.
-
Manual 99a 38 July 17, 2001 FILESYS-X-497: The FAT chain used to define the FAT overlaps on itself. Volume name was NOT mounted. Source: Explanation: Possible Cause: Action: FILESYS.NLM A File Allocation Table (FAT) chain is a list of directory block locations. This error probably indicates file system corruption. Run VREPAIR and restart the system. Warning: If you delete the volume, all data will be destroyed. You will have to restore the data from a backup.
-
Manual 99a 38 July 17, 2001 FILESYS-X-500: The FAT chain used to define the FAT has an invalid forward reference. Volume name was NOT mounted. Source: Explanation: Possible Cause: Action: FILESYS.NLM A File Allocation Table (FAT) chain is a list of directory block locations. This error probably indicates file system corruption. Run VREPAIR and restart the system. Warning: If you delete the volume, all data will be destroyed. You will have to restore the data from a backup.
-
Manual 99a 38 July 17, 2001 FILESYS-X-503: The first entry of a file's FAT chain is invalid. Volume name was NOT mounted. Source: Explanation: Possible Cause: Action: FILESYS.NLM A File Allocation Table (FAT) chain is a list of directory block locations. This error probably indicates file system corruption. Run VREPAIR and restart the system. Warning: If you delete the volume, all data will be destroyed. You will have to restore the data from a backup.
-
Manual 99a 38 July 17, 2001 FILESYS-X-507: Invalid directory FAT chain. Volume name was NOT mounted. Source: Explanation: Possible Cause: Action: FILESYS.NLM A File Allocation Table (FAT) chain is a list of directory block locations. There are duplicate extended directory chains (chain0 and chain1). If these chains do not match for some reason, this error is produced and the volume will not mount. This error probably indicates file system corruption. Run VREPAIR and restart the system.
-
Manual 99a 38 July 17, 2001 If the problem persists, make sure a volume backup exists. Delete the volume, re-create it, and restore the data from the backup. FILESYS-X-510: Suballocation encountered but not enabled on this volume. Volume name was NOT mounted. Source: FILESYS.NLM Possible Cause: This error could be due to a variety of causes, including a faulty disk drive or other hardware problem, premature downing of the server, or data corruption.
-
Manual 99a 38 July 17, 2001 Possible Cause: The number of open files and file locks on the server exceeded the maximum specified by the server parameter, Maximum File Locks: number. The default is 10,000. Action: Increase the number of file locks using the SET MAXIMUM FILE LOCKS command. For more information, see SET in Utilities Reference. FILESYS-X-519: Station number file lock threshold exceeded. Total violations number. Source: Explanation: Action: FILESYS.
-
Manual 99a 38 July 17, 2001 FILESYS-X-521: Station number record lock threshold exceeded. Total violations number. Source: FILESYS.NLM Explanation: The number of record locks on the server for the specified station exceeded the limit specified. Applications that request record locks do not function properly until record locks are released by other applications.
-
Manual 99a 38 July 17, 2001 FILESYS-X-527: Migrated Data Streams have been corrupted. Source: Possible Cause: Action: FILESYS.NLM The data for a migrated file is corrupted. Replace the corrupted file from a backup. FILESYS-X-528: Unable to access the Data Migration Look Up Key. Source: FILESYS.NLM Explanation: Data that was migrated to a writable disk player (or jukebox) for storage cannot be found. The Data Migration Look Up Key is the pointer that tells where stored data is located in the CD.
-
Manual 99a 38 July 17, 2001 FILESYS-X-557: Illegal hole in suballocation FAT chain. Source: Explanation: Action: FILESYS.NLM A File Allocation Table (FAT) chain is a list of directory block locations. If the FAT chain skips a block, a hole appears in the chain. (A hole is a section that is not sequential.) A hole indicates that the location was never allocated. Run VREPAIR and restart the system. Warning: If you delete the volume, all data will be destroyed.
-
Manual 99a 38 July 17, 2001 FILESYS-X-560: Suballocation out of memory. Source: Possible Cause: Action: FILESYS.NLM The operating system was unable to allocate memory for the suballocation FAT because it is out of memory. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. FILESYS-X-574: TTS exceeded the limit of number of active transactions. Number transactions delayed. Source: Explanation: Action: FILESYS.
-
Manual 99a 38 July 17, 2001 FILESYS-X-579: Error writing to TTS$LOG.ERR file. Source: Explanation: Possible Cause: Action: FILESYS.NLM A Transaction Tracking System (TTS) error could not be logged in the TTS error log file. The volume is probably out of space. Add more disk space to the volume containing the TTS files. See Resolving Server Disk Space Problems in the Server Operating System Administration Guide. FILESYS-X-580: Error opening or creating TTS$LOG.ERR file.
-
Manual 99a 38 July 17, 2001 FILESYS-X-583: TTS disabled because of error reading backout file. Source: Explanation: Action: FILESYS.NLM The Transaction Tracking System (TTS) could not read the backout file. TTS was disabled because it could not reliably back out any transactions. TTS protection is gone, but completed transactions are intact. No further action is required. You can continue without TTS protection. FILESYS-X-584: TTS disabled because of error writing to file during backout.
-
Manual 99a 38 July 17, 2001 TTS could not read the backout file for some reason. The problem could be a hardware failure, a power failure, or a corrupted file. Action: If you suspect file corruption, delete the file and restore from a backup. FILESYS-X-588: TTS disabled because of error growing TTS memory tables. Source: Possible Cause: Action: FILESYS.NLM The server does not have enough memory. See Resolving Server Memory Problems in the Server Operating System Administration Guide.
-
Manual 99a 38 July 17, 2001 FILESYS-X-622: Number Incomplete Transactions Found. Last record was written at date_and_time. Source: Explanation: FILESYS.NLM This message indicates that a database has closed improperly. This message lists the number of incomplete transactions and the time the last complete record was written. FILESYS-X-628: Transactions will be backed out and not displayed or logged. Source: Explanation: FILESYS.
-
Manual 99a 38 July 17, 2001 FILESYS-X-634: File has been changed (at time) since this backout file ended (at time). Source: Explanation: FILESYS.NLM This informational message indicates that the file has changed since it was backed out. FILESYS-X-637: Error reading original data. Source: FILESYS.NLM Possible Cause: This error might indicate hardware failure or a corrupted Transaction Tracking System (TTS) backout file. Action: See Disk Errors in the Server Operating System Administration Guide.
-
Manual 99a 38 July 17, 2001 FILESYS-X-646: Incomplete transactions referencing unmounted volumes were preserved. Source: Explanation: FILESYS.NLM This informational message indicates that not all of the volumes are mounted yet, so the Transaction Tracking System (TTS) backout file is being saved. An incomplete transaction occurred on one of these unmounted volumes. FILESYS-X-653: Error opening backout file. Source: Possible Cause: Action: Possible Cause: Action: FILESYS.
-
Manual 99a 38 July 17, 2001 FILESYS-X-658: TTS disabled because of error writing to file during backout. Source: Explanation: Possible Cause: Action: FILESYS.NLM The Transaction Tracking System (TTS) had a problem writing to the actual database for which it was backing out transactions, so it disabled itself to prevent further problems. The database is probably corrupted. Try to determine whether the database application can read the database.
-
Manual 99a 38 July 17, 2001 FILESYS-X-662: TTS disabled because of error growing TTS memory tables. Source: Possible Cause: Action: FILESYS.NLM The server does not have enough memory. See Resolving Server Memory Problems in the Server Operating System Administration Guide. FILESYS-X-663: TTS disabled because of error allocating more disk space for the backout file. Source: Possible Cause: Action: FILESYS.NLM The backout volume is full.
-
Manual 99a 38 July 17, 2001 FILESYS-X-668: Error creating TTS backout file. Source: Possible Cause: Action: FILESYS.NLM The volume does not have enough space to create the Transaction Tracking System (TTS) backout file. Try adding another drive to the backout volume, deleting or compressing existing files on the backout volume, or moving files from the backout volume to another volume. (Increasing disk space on volumes other than the backout volume probably will not help.
-
Manual 99a 38 July 17, 2001 FILESYS-X-674: TTS not initialized. Source: Explanation: Action: FILESYS.NLM This informational message indicates that Transaction Tracking (TTS) has not initialized. No action is necessary unless you want to initialize transaction tracking. FILESYS-X-675: TTS has been shut down. Source: Explanation: Action: FILESYS.NLM The informational message indicates that TTS has been shut down. No action is necessary unless you want to initialize transaction tracking.
-
Manual 99a 38 July 17, 2001 FILESYS-X-687: Original record data from the backout file (being written back to the file). Source: Explanation: FILESYS.NLM This informational message indicates that the original record data from the backout file is being written back to the file. FILESYS-X-688: Hole Restored To File At Offset = offset. Source: Explanation: FILESYS.NLM This inforamational message indicates that a hole in the file has been restored to the indicated code.
-
Manual 99a 38 July 17, 2001 FILESYS-X-737: Unable to create VOL$LOG.ERR on volume. Source: Explanation: FILESYS.NLM The system cannot log the error messages it produces to the VOL$LOG.ERR file. Historical error information for this volume will not be recorded at the server. Possible Cause: The volume was out of room. Possible Cause: A disk error occurred. Action: See Resolving Server Disk Space Problems in the Server Operating System Administration Guide.
-
Manual 99a 38 July 17, 2001 FILESYS-X-745: Attempt to allocate memory to read volume definition tables failed. Source: Possible Cause: Action: FILESYS.NLM The server does not have enough memory to mount the volume. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. FILESYS-X-746: Volume name could NOT be mounted. Some or all volume segments cannot be located Source: Possible Cause: Action: FILESYS.
-
Manual 99a 38 July 17, 2001 FILESYS-X-760: Volume definition table mirror mismatch on drive. NetWare partition ignored. Source: Explanation: Action: FILESYS.NLM Four copies of the Volume Segment Definition table are kept on each NetWare partition. This error indicates that these copies do not match. Rename or delete the volume. FILESYS-X-761: Block allocation size does not match. Source: Explanation: Possible Cause: Action: Possible Cause: Action: FILESYS.
-
Manual Action: 99a 38 July 17, 2001 Run VREPAIR and restart the system. Warning: If you delete the volume, all data will be destroyed. You will have to restore the data from a backup. If the problem persists, make sure a volume backup exists. Delete the volume, re-create it, and restore the data from the backup. FILESYS-X-763: Volume flags do not match. Source: Explanation: Possible Cause: Action: Possible Cause: Action: FILESYS.
-
Manual Action: 99a 38 July 17, 2001 If the volume is corrupted, try renaming or deleting the volume. Warning: If you delete the volume, all data will be destroyed. You will have to restore the data from a backup. If the problem persists, make sure a volume backup exists. Delete the volume, re-create it, and restore the data from the backup. FILESYS-X-765: First block for FAT table 1 does not match. Source: Explanation: Possible Cause: Action: Possible Cause: Action: FILESYS.
-
Manual 99a 38 July 17, 2001 Warning: If you delete the volume, all data will be destroyed. You will have to restore the data from a backup. If the problem persists, make sure a volume backup exists. Delete the volume, re-create it, and restore the data from the backup. FILESYS-X-767: First block for directory table 1 does not match. Source: Explanation: Possible Cause: Action: Possible Cause: Action: FILESYS.NLM Two segments of the volume claim a different directory table one's first block.
-
Manual 99a 38 July 17, 2001 If the problem persists, make sure a volume backup exists. Delete the volume, re-create it, and restore the data from the backup. FILESYS-X-769: Two volume segments with same sync value have mismatched data. Source: Explanation: Action: FILESYS.NLM The values specified by two segments on the volume do not match. Another message should follow this message to indicate which values do not match. Run VREPAIR and restart the system.
-
Manual 99a 38 July 17, 2001 FILESYS-X-774: Invalid volume segment position of position_number of number segments. Source: Possible Cause: Action: FILESYS.NLM The segment position is greater than the number of segments. Run VREPAIR and restart the system. Warning: If you delete the volume, all data will be destroyed. You will have to restore the data from a backup. If the problem persists, make sure a volume backup exists. Delete the volume, re-create it, and restore the data from the backup.
-
Manual 99a 38 July 17, 2001 FILESYS-X-777: Invalid segment length of number starting at number on a drive of size number. Source: Explanation: Action: FILESYS.NLM A segment of a partition has too many sectors or has sectors that exceed allowable size. The segment is probably corrupted. Run VREPAIR and restart the system. Warning: If you delete the volume, all data will be destroyed. You will have to restore the data from a backup. If the problem persists, make sure a volume backup exists.
-
Manual 99a 38 July 17, 2001 FILESYS-X-780: Invalid directory table 0 starting block of number on volume of size number. Source: Explanation: Possible Cause: Action: FILESYS.NLM A segment on the primary volume has an inconsistency in the starting point of the directory table of block pointers. The table is probably corrupted. Run VREPAIR on the primary volume. Warning: If you delete the volume, all data will be destroyed. You will have to restore the data from a backup.
-
Manual 99a 38 July 17, 2001 FILESYS-X-783: Volume name has multiple sync definitions. All definitions except number discarded. Source: Explanation: FILESYS.NLM This informational message indicates that while checking a volume definition during mounting of the volume, the operating system discarded all unneeded synchronization values. FILESYS-X-784: Volume name has multiple definitions for segment number. Source: Possible Cause: FILESYS.
-
Manual 99a 38 July 17, 2001 FILESYS-X-787: Volume name first segment (number) does not start at block 0. Source: Explanation: FILESYS.NLM The first segment of a volume must start with block 0. While mounting the specified volume, which is distributed over multiple physical disks, the operating system could not find the first segment. The segment that it found is not the first segment in the volume because it does not begin with block 0. Possible Cause: The disk was corrupted.
-
Manual 99a 38 July 17, 2001 FILESYS-X-789: Definition for volume name is invalid. Source: Explanation: FILESYS.NLM This informational message indicates that while mounting one or more volumes, the operating system found an invalid definition for the specified volume. FILESYS-X-790: Volume name not found in existing volumes list. Source: Explanation: FILESYS.NLM This informational message indicates that the operating system could not find a volume that it tried to discard.
-
Manual Action: 99a 38 July 17, 2001 Run VREPAIR and restart the system. Warning: If you delete the volume, all data will be destroyed. You will have to restore the data from a backup. If the problem persists, make sure a volume backup exists. Delete the volume, re-create it, and restore the data from the backup. FILESYS-X-817: Unable to initialize system auditing on volume name. Volume mount aborted. Source: FILESYS.NLM Possible Cause: The operating system cannot open the audit file.
-
Manual 99a 38 July 17, 2001 FILESYS-X-825: Total volume size does not match. Source: Explanation: Possible Cause: Action: Possible Cause: Action: FILESYS.NLM Two segments of the volume claim different numbers of segments. Two volumes on the server have identical names and a segment from each volume is causing the error. Unload the disk driver for the volume that you do not want to rename. Rename the other volume (the volume that is on the hard disk that still has its disk driver loaded).
-
Manual 99a July 17, 2001 38 FLAG Messages The following includes messages from the FLAG.EXE. FLAG-x-001: Action has been terminated by the operator. Source: Possible Cause: Action: FLAG.EXE The FLAG was terminated by pressing +, +, or . No further action is required. FLAG-x-225: The mode you specified is reserved. Source: Possible Cause: Action: FLAG.EXE Mode 4 or 6 was entered. These modes are reserved and cannot be used. Use modes 0, 1, 2, 3, 5, or 7.
-
Manual 99a 38 July 17, 2001 FLAG-x-300: Access is denied. Source: Possible Cause: Action: FLAG.EXE The user might not have adequate rights to access the file or modify directory attributes. Use the RIGHTS utility to check the user's rights. Possible Cause: The file is in use or the directory attributes are being modified while another user is modifying the same directory.
-
Manual 99a July 17, 2001 38 FLAG-x-400: This utility was unable to set the DOS file. Source: Possible Cause: Action: FLAG.EXE The file might be corrupted. Try to read or run the file. If you can, flag the file again. If you can't, the file is probably corrupted. Get a new copy of the file, then flag the file. FLAG-x-425: The specified attribute(s) is not supported in this version of NetWare. Source: Possible Cause: Action: FLAG.
-
Manual 99a 38 July 17, 2001 FLAG-x-575: This owner was not found. Source: Possible Cause: Action: FLAG.EXE The owner specified is not a user on the network. Make sure that the user typed the owner's name correctly. Make sure that the owner that the user specified is a current user on the network. FLAG-x-625: This utility was unable to allocate the volume handle. Source: Possible Cause: Action: Possible Cause: Action: FLAG.
-
Manual 99a July 17, 2001 38 FLAG-x-700: The Execute Only attribute cannot be assigned to local files. Source: FLAG.EXE Action: When assigning attributes to files on local drives, do not use this attribute. FLAG-x-725: The Private attribute cannot be assigned to local files. Source: FLAG.EXE Action: When assigning attributes to files on local drives, do not use this attribute. FLAG-x-750: The Index attribute is not supported in v3.x or v4.x. Source: FLAG.
-
Manual 99a 38 July 17, 2001 FLAG-x-819: You cannot assign a user and group at the same time. Source: Possible Cause: Action: FLAG.EXE Users and groups must be assigned in separate commands. The user tried to assign them at the same time. Try again, assigning users and groups separately. FLAG-x-825: The Copy Inhibit attribute is not supported in v2.x Source: FLAG.EXE Possible Cause: The user tried to use the Copy Inhibit file attribute to flag a file located on a NetWare 2 server.
-
Manual 99a 38 July 17, 2001 FLAG-x-877: The Compress attribute is supported only with NetWare v4.x Source: FLAG.EXE Explanation: The user tried to set the Immediate Compress or Don't Compress attribute on a server that is not a NetWare 4 server. Action: If the server is not a NetWare 4 server, do not use the Immediate Compress or Don't Compress attribute. FLAG-x-878: You cannot set both the Immediate Compress and Don't Compress attributes. Source: FLAG.
-
Manual 99a 38 July 17, 2001 FLAG-x-903: The command line syntax is invalid. Source: FLAG.EXE Action: See message “903: The command line syntax is invalid.” on page 775 FLAG-x-905: This utility was unable to initialize the country information. Source: FLAG.EXE Action: See message “905: This utility was unable to initialize the country information.” on page 775 FLAG-x-908: The specified path is invalid. Source: FLAG.EXE Action: See message “908: The specified path is invalid.
-
Manual 99a 38 July 17, 2001 FLAG-x-913: The specified directory cannot be found. Source: FLAG.EXE Action: See message “913: The specified directory cannot be found.” on page 778 FLAG-x-914: The specified file or directory cannot be found. Source: FLAG.EXE Action: See message “914: The specified file or directory cannot be found.” on page 778 FLAG-x-915: The specified volume does not exist. Source: FLAG.EXE Action: See message “915: The specified volume does not exist.
-
Manual 99a 38 July 17, 2001 FLAG-x-971: The workstation does not have enough memory to load the Unicode table files. Source: FLAG.EXE Action: See message “971: The workstation does not have enough memory to load the Unicode table files.” on page 781 FLAG-x-972: Access to the Unicode table files was denied. Source: FLAG.EXE Action: See message “972: Access to the Unicode table files was denied.” on page 781.
-
Manual 99a 38 July 17, 2001 FLAG-x-999: The message file for this utility cannot be found. Source: FLAG.EXE Action: See message “999: The message file for this utility cannot be found.
-
Manual 178 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a 38 July 17, 2001 FPSM Messages The following includes messages from the FPSM.NLM. FPSM-X-001: Notice: An 80x87 floating-point emulator is already present. FPSM will not attempt to register another. Source: Explanation: Action: FPSM.NLM The emulator provided by FPSM.NLM is not needed, probably because the chip provides its own 80x87 floating point emulator. No action is needed. FPSM-X-002: Error number registering the 80x87 emulator. Source: Possible Cause: Action: FPSM.NLM The FPSM.
-
Manual 99a 38 July 17, 2001 FPSM-X-004: FPSM failed to allocate its local call gate resource tag. There may not be enough server memory, or server memory may be corrupted. This is not fatal. Source: Explanation: Action: FPSM.NLM This message appears if system memory is low. Load NLMs in the kernel address space, instead of in a protected address space. Check server memory and add more memory if necessary. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide.
-
Manual 99a July 17, 2001 38 FTP Server Messages The following includes messages from the NWFTPD.NLM and FTPUPGRD.NLM. Failed to bind to FTP port Source: Explanation: Possible Cause: Action: NWFTPD.NLM The port that the FTP Server is trying to bind to is busy. Another instance of the FTP Server or another application is bound to the port. Unload the application that is bound to the port, bind the FTP Server to a different port, or delete the busy port from TCPCON.
-
Manual 99a 38 July 17, 2001 Failed to generate an ObjectKeyPair Source: Possible Cause: Action: NWFTPD.NLM The user entered has insufficient rights. Ensure that the user has sufficient rights. Failed to open configuration file Source: Possible Cause: Action: NWFTPD.NLM The configuration file is not available at specified location. Verify if the configuration file is available at the specified location. Unable to find default configuration file Source: Possible Cause: Action: NWFTPD.
-
Manual 99a 38 July 17, 2001 Could not create the FTP Server Restriction file. Source: Possible Cause: Action: FTPUPGRD.NLM Restriction file does not exist for ftp server upgrade, or existing Restriction file has read only access. Modify the file access if it is read only or specify proper restriction file name. Failed to upgrade. Source: FTPUPGRD.
-
Manual 184 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a July 17, 2001 38 HDETECT Messages The following includes messages from the HDETECT.NLM. A file copy error occurred. Error: code. Source: Possible Cause: Action: HDETECT.NLM The server ran out of disk space, or the hard disk failed. Verify that the server has enough disk space (a 50MB DOS partition) and that the hard disk is functional. For information about a specific error code, search the Error Codes online documentation (http://www.novell.com/ documentation/lg/nwec/docui/index.htm).
-
Manual 99a 38 July 17, 2001 An error occurred while opening the response file. Source: Possible Cause: Action: HDETECT.NLM Installation is using outdated information from older files in the nwupdate directory. Make sure that current files are in the nwupdate directory. Exit installation and begin again. An error occurred while reading the response file. Source: Possible Cause: Action: HDETECT.NLM Installation is using outdated information from older files in the nwupdate directory.
-
Manual 99a July 17, 2001 38 Directory path either is invalid or does not contain the desired file filename. Press (or F4>, if applicable) and specify a different path. Source: Possible Cause: HDETECT.NLM The path or filename does not exist as you specified it. File filename cannot be opened. Error code. Source: Possible Cause: Action: HDETECT.NLM The filename does not exist, or you have incorrectly specified the path. Make sure that the directory exists or specify a different path.
-
Manual 99a 38 July 17, 2001 No disk driver files (*.HAM, *.CDM) or their description files (*.DDI) were found. Source: HDETECT.NLM Possible Cause: The directory or files do not exist, or you have incorrectly specified the path. Action: Make sure that the directory or files exist and that you have correctly entered the path. No HotPlug support module files or their description files (*.HDI) were found at this path. Source: HDETECT.
-
Manual 99a 38 July 17, 2001 No LAN driver files (*.LAN) were found at path. Source: HDETECT.NLM Possible Cause: The directory or files do not exist, or you have incorrectly specified the path. Action: Make sure that the directory or files exist and that you have correctly entered the path. No psm driver files (*.PSM) or their description files (*.MDI) were found. Source: HDETECT.NLM Possible Cause: The directory or files do not exist, or you have incorrectly specified the path.
-
Manual 99a 38 July 17, 2001 No Storage driver files (*.HAM, *.CDM) or their description files (*.DDI) were found at this path. Source: HDETECT.NLM Possible Cause: The directory or files do not exist, or you have incorrectly specified the path. Action: Make sure that the directory or files exist and that you have correctly entered the path. No Storage drivers were found at path. Source: HDETECT.NLM Possible Cause: The directory or files do not exist, or you have incorrectly specified the path.
-
Manual 99a 38 July 17, 2001 Response File Source Information is missing. Source: Explanation: Possible Cause: Action: HDETECT.NLM Novell provides a response file. However, you can specify for the installation software to use your own custom response file and direct the installation program to use it (by using the /rf=path parameter). When using this parameter, you specify the complete path. You customized a response file and installation is looking for it in an incorrectly specified directory.
-
Manual module name: Unable to open screen. Source: HDETECT.NLM Action: Exit installation and begin again.
-
Manual 99a 38 July 17, 2001 ICMD Messages The following includes messages from the ICMD.NLM. ICMD-X-5: Directory directory path name cannot be created. Error: code. Source: ICMD.NLM Action: For information about a specific error code, search the Error Codes online documentation (http://www.novell.com/documentation/lg/nwec/docui/ index.htm). ICMD-X-7: DS installation could not be completed. Error code: code. Source: ICMD.
-
Manual 99a 38 July 17, 2001 ICMD-X-9: The total space required by files that will be copied (total megabytes to be copied; total bytes to be copied) is larger than the free space available on the volume volume name (free space on the volume in megabytes; free space on the volume in bytes). Source: ICMD.NLM Action: Delete unnecessary files from the volume, select a different volume, or make the volume larger. ICMD-X-10: Config file filename could not be written to. Error: code.
-
Manual 99a July 17, 2001 38 ICMD-X-15: The total space required by files that will be copied (total megabytes to be copied; total bytes to be copied) is larger than the size of volume volume name (size of the volume in megabytes; size of the volume in bytes). Source: ICMD.NLM Action: Select a different volume or make the volume larger. ICMD-X-17: File filename was not found or is invalid. The new default language number cannot be set. Source: Possible Cause: Action: ICMD.NLM The LCONFIG.
-
Manual 196 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a 38 July 17, 2001 IDEATA.HAM Messages The following includes messages from the IDEATA.HAM. IDEATA.HAM–001: This driver is not compatible with the detected bus type Source: IDEATA.HAM Possible Cause: The driver did not load because the hardware bus type of the server is incompatible with the bus type the driver was designed to support. The IDEATA.HAM driver supports IDE/ATA controller cards designed to work on ISA/EISA machines. Action: Use a controller card and compatible .
-
Manual 99a 38 July 17, 2001 IDEATA.HAM–005: Exceeded the number of allowed load instances Source: Explanation: IDEATA.HAM This informational message means that you tried to load the .ham driver more times than allowed. The IDEATA.HAM driver can be loaded four times, which corresponds to the number of I/O channels currently supported in the IDE/ATA specification. IDEATA.HAM–006: Insufficient memory to allocate during initialization Source: Possible Cause: Action: IDEATA.
-
Manual 99a 38 July 17, 2001 IDEATA.HAM–010: Load failed due to hardware resource conflict Source: Possible Cause: Action: IDEATA.HAM The driver could not be loaded because some other driver has reserved one or all of the hardware resources (port or interrupt) specified for this driver. Resolve the resource conflict between the competing controllers and reload the driver. IDEATA.HAM–011: I/O channel registration failed Source: Possible Cause: Action: IDEATA.
-
Manual 200 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a 38 July 17, 2001 IDECD.CDM Messages The following includes messages from the IDECE.CDM. IDECD.CDM–001: WARNING! This driver has not been tested with the device_name device. If you experience problems with this device, contact its manufacturer for an updated driver. Source: Possible Cause: Action: IDECE.CDM The device is not one the driver fully supports, nor is it a device that the driver excludes.
-
Manual 202 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a 38 July 17, 2001 IDEHD.CDM Messages The following includes messages from the IDEHD.CDM. IDEHD.CDM–001: Warning! The driver did not bind to device_name because it does not support this device. Contact the manufacturer for a full-function driver. Source: Possible Cause: Action: IDEHD.CDM The driver recognizes this device as a known device that it cannot support, not even generically. Contact the device manufacturer to obtain the appropriate driver. IDEHD.
-
Manual 204 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a 38 July 17, 2001 INETCFG Messages The following includes messages from the INETCFG.NLM. INETCFG-X-4: Could not get tag for resource allocation. Source: Explanation: Possible Cause: Action: INETCFG.NLM INETCFG could not be loaded because a resource tag could not be allocated from the NetWare operating system. The server is low on memory. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide.
-
Manual 206 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a July 17, 2001 38 IPXS Messages The following includes messages from the IPXS.NLM. IPXS-X-1: IPX STREAM module still in use, unloading will have unknown consequences. Source: Possible Cause: Action: IPXS.NLM The IPXS.NLM is being referenced by another NLM program or NetWare driver. Unloading the module while it is being used might produce unwanted results. Wait until the module is not being used, and then retry the unload. IPXS-X-4: Unable to register module_name device with STREAMS.
-
Manual 99a 38 July 17, 2001 IPXS-X-10: Error number was returned while trying to open filename; unable to configure RIP, SAP or IPX. Source: Explanation: Action: IPXS.NLM The error specified was returned when IPXS attempted to open the file containing the RIP, SAP, or IPX configuration information. Configuration of RIP, SAP, or IPX was not accomplished. If the problem persists, contact a Novell support provider. IPXS-X-12: Unable to configure IPX for number open IPX sockets, IPXS not loaded.
-
Manual 99a 38 July 17, 2001 IPXS-X-16: Error number was returned while trying to open name; unable to load SAP restrictions. Source: Explanation: Action: IPXS.NLM The specified error was returned while IPXS attempted to open the configuration file containing the SAP restriction information. Try the operation again. If the problem persists, contact a Novell support provider. IPXS-X-17: Bad record format; unable to complete loading SAP restrictions. Source: Explanation: Possible Cause: Action: IPXS.
-
Manual 99a 38 July 17, 2001 IPXS-X-22: Unable to open default IPX configuration file name. Using internal defaults. Source: Explanation: Action: IPXS.NLM The specified IPX configuration file could not be opened. The default configuration file will be used. None if the default file is opened successfully. IPXS-X-23: Bad record format; unable to complete loading RIP/SAP configuration. Source: Explanation: Possible Cause: Action: IPXS.
-
Manual 99a 38 July 17, 2001 LANSUP-DOS Messages The following includes messages from LADSUP.COM. LANSUP-DOS-X-001: The LSL is not loaded. Source: Explanation: Action: LANSUP.COM The computer must load the Link Support Layer (LSL) before loading the driver. Load the LSL; then load the driver, as in the following example: C:\NWCLIENT\LSL C:\NWCLIENT\LANSUP LANSUP-DOS-X-002: The LSL has no room for a board using frame type. Source: Explanation: Action: LANSUP.
-
Manual 99a 38 July 17, 2001 LANSUP-DOS-X-003: Could not find LANSUP MLID to unload. Source: Explanation: LANSUP.COM The user or another program was trying to unload the LANSUP driver and was not loaded. LANSUP-DOS-X-004: A TSR is loaded above the LANSUP MLID. Source: Explanation: Action: LANSUP.COM Another TSR (terminate-and-stay-resident) program was loaded after the LANSUP driver.
-
Manual 99a 38 July 17, 2001 LANSUP-DOS-X-007: You need another MLID Section Heading in the NET.CFG file in order to load the MLID again. Source: LANSUP.COM Possible Cause: The NET.CFG file does not have an individual entry for each driver that is intended to be loaded. This means that one of the drivers is not loaded into memory. Action: Unload the LANSUP driver. Modify the NET.CFG file to contain a unique entry for each driver to be loaded.
-
Manual 99a July 17, 2001 38 LANSUP-DOS-X-012: The protocol keyword must have a frame type. Entry ignored. Source: Possible Cause: Action: LANSUP.COM The PROTOCOL keyword entry is incomplete. Correct the protocol entry in the NET.CFG file. The proper syntax for the protocol keyword is as follows: PROTOCOL LANSUP hex_protocol_ID frame_type LANSUP-DOS-X-013: The MLID could not register Protocol ID number for protocol stack name for frame type frame. Source: Possible Cause: Action: LANSUP.
-
Manual 99a 38 July 17, 2001 LANSUP-DOS-X-016: The node address was incorrectly specified in the NET.CFG file. Source: Possible Cause: Action: LANSUP.COM The node address override in the NET.CFG file is too long. Edit the NET.CFG file and correct the node address. The node address must be less than or equal to 12 hex digits. LANSUP-DOS-X-017: An invalid keyword was specified in NET.CFG on line number. Source: Possible Cause: Action: LANSUP.COM The key word on the line indicated was not recognized.
-
Manual Possible Cause: 99a 38 July 17, 2001 The network board settings are not the defaults, and they are not defined in the NET.CFG file. Action: If the jumper settings are not the defaults, make sure that they match the settings in the NET.CFG file. Action: If the computer is not using the NET.CFG file, make sure the jumper settings are set to the defaults. Possible Cause: The network board is does not work. Action: Replace the network board with one that you know works.
-
Manual 99a 38 July 17, 2001 LFS - Logical File System Messages The following includes messages from LFS.NLM. LFS-X-60: Error writing to the extended directory space. Source: LFS.NLM Explanation: The operating system was trying to write extended directory information to disk. When it tried to write the information, it got a disk error. The information was not written to the disk and will be lost. The information which was lost might have been extended attribute data.
-
Manual 99a 38 July 17, 2001 LFS-X-62: Error writing to file (filename not accessible) data stream number. Write was requested by user name on station number. Source: Explanation: LFS.NLM A write error has prevented the operating system from correctly writing file data to the disk. Hot Fix was not able to redirect the data to a new block. The data stream number indicates the name space stream (0=DOS or Macintosh data fork, 1=Macintosh resource fork). The data was not written to disk and will be lost.
-
Manual 99a 38 July 17, 2001 LFS-X-65: File read error at offset offset data stream number. Error getting filename. Read was requested by the SERVER. Source: Explanation: LFS.NLM The server was processing a file-read request. When the server tried to read the disk block with the file data, a disk-read error occurred. Some data was lost that could cause the user's applications to fail on reading data from files.
-
Manual 99a 38 July 17, 2001 Possible Cause: A hard disk or channel failure occurred. The disk could have other data integrity problems. Action: See Disk Errors in the Server Operating System Administration Guide. LFS-X-68: Error reading file name. Offset offset data stream number. Read was requested by user name on station number. File path path. Source: Explanation: LFS.NLM When the operating system tried to read existing data from disk, it got a disk read error.
-
Manual 99a 38 July 17, 2001 This error might have been caused by a hard disk or channel failure. The disk might have other data integrity problems. Action: See Disk Errors in the Server Operating System Administration Guide. LFS-X-71: File name write preread error. Offset offset data stream number. Read was requested by the SERVER. File path path. Source: Explanation: LFS.
-
Manual 99a 38 July 17, 2001 LFS-X-75: Volume server\volume almost out of disk space. Source: Possible Cause: Action: LFS.NLM The volume is about to run out of disk space. See Resolving Server Disk Space Problems in the Server Operating System Administration Guide. Users should save files currently in use to another volume or to another server to prevent data loss.
-
Manual 99a 38 July 17, 2001 Lib0 Messages The following includes messages from LIB0.NLM. Lib0-X-001: It was not possible to register NLMs with Network management. There may be no NetWare management agent present. Source: LIB0.NLM Explanation: The Network Management agent (an NLMTM program running on the server) responsible for gathering statistics on a software module was not available or did not respond to the lib0 program's attempt to register.
-
Manual 99a 38 July 17, 2001 Lib0-X-003: RegisterTrackedResource() for BSD Sockets failed, rc=number. An internal system error has occurred. There may not be enough server memory, or server memory may be corrupted. Source: Explanation: Action: LIB0.NLM A call to RegisterTrackedResource() failed. The LIB0.NLM program cannot load at this time due to memory constraints. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide.
-
Manual 99a July 17, 2001 38 LOCALSEL Messages The following includes messages from LOCALSEL.NLM. A NetWare server was not found in the directory specified. Please enter the directory of the server to upgrade. Source: LOCALSEL.NLM Explanation: For NetWare 3.x, the default directory for installed server files is C:\SERVER. For NetWare 4 and later, the default directory is C:\NWSERVER. Files might have been installed in a different directory. Possible Cause: Upgrade software could not find SERVER.
-
Manual 99a 38 July 17, 2001 Error writing to XINITLD.NCF file on DOS partition. Installation cannot proceed. Source: Possible Cause: Action: LOCALSEL.NLM The disk is full or inaccessible. Verify that the target drive is still accessible, is not full, and can be written to. The country/codepage pair specified is not valid. Country = number, Code Page = number. Source: Possible Cause: Action: LOCALSEL.NLM You specified a code page that does not correspond with the selected country.
-
Manual 99a July 17, 2001 38 LOGIN Messages The following includes messages from LOGIN.NLM. LOGIN-X-100: Access has been denied. Source: Explanation: Possible Cause: Action: Possible Cause: LOGIN.EXE The user has no rights to log in to the network. The username or password was typed incorrectly. Log in again and type the username and password correctly. The username entered does not have an account on the network.
-
Manual 99a 38 July 17, 2001 LOGIN-X-110: You are already in a tree and cannot attach to another tree (current tree: tree name). Source: Explanation: Action: LOGIN.EXE You cannot use INS to attach to a second tree. Log out and try again. LOGIN-X-115: The selected tree (name) cannot be found. Error code: code. Source: Explanation: Action: LOGIN.EXE LOGIN tried to log the user in to a Directory tree that is either down, is not responding, or does not exist.
-
Manual 99a July 17, 2001 38 LOGIN-X-140: This account has expired or been disabled by the supervisor. Source: LOGIN.EXE Possible Cause: The account has expired. The network supervisor can limit a user's account to a specific period, after which the account expires and is no longer accessible. Possible Cause: The account has been disabled. The network supervisor can disable a user's account for any reason. Possible Cause: The user did not type a password correctly.
-
Manual 99a 38 July 17, 2001 LOGIN-X-200: The MAP command cannot change local drives. Source: Explanation: LOGIN.EXE Local drives cannot be changed to or from search drives by using MAP. Possible Cause: Explanation: Action: A MAP CHANGE command was issued within the login script that referenced a local drive. Do not try to change local drives using MAP. LOGIN-X-210: This server is being used to read login scripts. You cannot log out. Source: Explanation: Action: LOGIN.
-
Manual 99a 38 July 17, 2001 LOGIN-X-240: This utility was unable to open script file name. Source: Explanation: Possible Cause: Action: Possible Cause: Action: LOGIN.EXE LOGIN tried to open the specified script file, but the script file was not found or it could not be opened. The script file could not be located. Make sure that the login script file is in the directory specified. The user did not have the appropriate rights to access the directory or file.
-
Manual 99a 38 July 17, 2001 LOGIN-X-280: This utility could not get your connection status. Source: Explanation: Action: LOGIN.EXE LOGIN failed to verify whether the user was logged in. Attach using MAP. If this fails, reboot and reestablish all current connections. LOGIN-X-283: This utility could not get the preferred Directory Services name or connection ID. Source: Explanation: Action: LOGIN.EXE LOGIN could not find the preferred Directory tree.
-
Manual 99a July 17, 2001 38 LOGIN-X-295: This utility could not create a context. Source: Explanation: Possible Cause: LOGIN.EXE LOGIN unsuccessfully tried to allocate a context handle. Memory at the workstation might be low. Action: If you suspect low workstation memory, see message “971: The workstation does not have enough memory to load the Unicode table files.” on page 781 Action: The context for the user's name in the NET.CFG file is incorrect.
-
Manual 99a 38 July 17, 2001 ...... ENDIF ENDIF ENDIF ENDIF Action: Where possible, take the IF statements out of the nested format and placing them after the sequence of nested IF statements. LOGIN-X-370: The specified search drive does not exist. Source: Explanation: Action: LOGIN.EXE When the login script uses a SET COMSPEC= or COMSPEC= command and a network drive is specified, LOGIN ensures that the specified drive is a search drive and can be used for the COMSPEC command.
-
Manual 99a July 17, 2001 38 Possible Cause: The network supervisor can disable the login function temporarily to prevent users from logging in or attaching during system maintenance. Most likely, the network supervisor is doing maintenance work and has disabled the server. Action: This condition is usually temporary. Try to log in after the login function has been enabled. If using CAPTURE or NPRINT, attach to another server and use its printer.
-
Manual 99a 38 July 17, 2001 LOGIN-X-460: The server that you attempted to map a drive to is not accessible. The map command was command. Source: Possible Cause: Action: LOGIN.EXE The server is probably down. So, LOGIN could not attach to the server. Verify that the network is up and running and logging in again. LOGIN-X-470: The specified drive mapping is an invalid path: path. Source: Explanation: Action: LOGIN.EXE LOGIN tried to map a drive to a path that does not exist.
-
Manual 99a July 17, 2001 38 LOGIN-X-530: The line contains no end quote. Source: Possible Cause: Action: LOGIN.EXE A line in the login script does not contain an end quote. For example, WRITE Hello World! is missing the second double quote mark. Put the end quote in the login script at the end of the specified line. LOGIN-X-550: The maximum number of connections allowed on this server has been reached. Wait until another user logs out. Source: LOGIN.
-
Manual 99a 38 July 17, 2001 LOGIN-X-580: Your password has expired and all grace logins have been used. Source: Possible Cause: Action: LOGIN.EXE The account is locked because the user did not change an expired password. The network supervisor can limit the number of times a user can log in with an expired password. If desired, unlock the user's account. LOGIN-X-600: This utility could not interpret the line. Source: Explanation: Action: LOGIN.
-
Manual 99a 38 July 17, 2001 LOGIN-X-630: The NetWare shell is not loaded. Source: LOGIN.EXE Possible Cause: The user tried to log in to a server without loading the NetWare NETX or VLM bindery shell into the workstation's memory. When the workstation is booted, DOS is loaded into the workstation's memory. The NetWare shell is then loaded on top of DOS. The shell allows the workstation to communicate with the server.
-
Manual 99a 38 July 17, 2001 LOGIN-X-665: The EXIT command followed by a string is not supported on this machine. Source: Possible Cause: Action: LOGIN.EXE The EXIT command was followed by a text string in the user's login script. Remove the text string that follows the EXIT command in the user's login script. LOGIN-X-670: The variable MACHINE NAME is not supported on this platform. Source: LOGIN.EXE Explanation: The login script contains a MACHINE_NAME variable.
-
Manual 99a July 17, 2001 38 LOGIN-X-710: The password could not be changed. Error code. Source: Explanation: Action: LOGIN.EXE LOGIN was unable to change the password. For information about a specific error code, search the Error Codes online documentation (http://www.novell.com/documentation/lg/nwec/docui/ index.htm). LOGIN-X-720: This utility could not add variable to the local environment variables. Source: LOGIN.EXE Explanation: This error occurs when you try to map a search drive.
-
Manual 99a 38 July 17, 2001 LOGIN-X-740: This utility could not execute external program name. Source: Explanation: Action: LOGIN.EXE The specified file is not executable or has an invalid executable-file format. Execute an executable file. The files usually have the .EXE or .COM extension. LOGIN-X-750: This utility could not execute external program name. You do not have enough memory space available. Source: LOGIN.
-
Manual 99a 38 July 17, 2001 LOGIN-X-770: This utility could not execute external program name. Either the environment is too big or the command line is too long. Source: Possible Cause: Action: Possible Cause: Action: LOGIN.EXE The login script tried to execute a command using the #command. DOS allows only 128 characters on the command line. If the command is too long, it cannot be executed when using DOS, and LOGIN will warn you of this problem.
-
Manual 99a 38 July 17, 2001 LOGIN-X-810: An invalid string occurred in an EXIT command. The string contained more than number characters. Source: LOGIN.EXE Action: When using the EXIT command to pass a command to COMMAND.COM, make sure the specified command does not exceed 14 characters. LOGIN-X-830: You are trying to log in to too many stations simultaneously. The supervisor has limited the number of connections you may have. Source: LOGIN.
-
Manual 99a 38 July 17, 2001 LOGIN-X-860: You are trying to log in during an unauthorized time period. The supervisor has limited the times that you may log in. Source: Possible Cause: Action: LOGIN.EXE The network supervisor has set specific time periods when the user can use the server or eDirectory. The user cannot use the server until the next authorized time period. Give the user a list of authorized time periods. LOGIN-X-870: An unknown error was returned during LOGIN's attempt to attach.
-
Manual 99a 38 July 17, 2001 LOGIN-X-890: The specified server is unknown. Source: LOGIN.EXE Possible Cause: The user mistyped the name of the server, specified a server that is not on the network, or specified a server that has been brought down for system maintenance. Action: Use NLIST or NETADMIN to list the servers that the station recognizes. Type the name of the server correctly. If the server has been brought down for maintenance, try the command after the server has been brought back up.
-
Manual 99a 38 July 17, 2001 LOGIN-X-918: This utility was unable to get connection information. Error code: code. Source: LOGIN.EXE Action: See message “918: This utility was unable to get connection information. Error code: code.” on page 779 LOGIN-X-919: This utility could not create a connection list. Error code. Source: LOGIN.EXE Action: See message “919: This utility could not create a connection list. Error code.” on page 779 LOGIN-X-920: This utility does not have enough memory.
-
Manual 99a 38 July 17, 2001 LOGIN-X-923: An unexpected error has occurred. Error code: code. Source: LOGIN.EXE Action: See message “923: An unexpected error has occurred. Error code: code.” on page 780 LOGIN-X-924: All drives are in use. Source: LOGIN.EXE Action: See message “924: All drives are in use.” on page 780 LOGIN-X-925: This function is not supported on Personal NetWare servers. Source: LOGIN.EXE Action: See message “925: The server specified is a Personal NetWare server.
-
Manual 99a 38 July 17, 2001 LOGIN-X-973: The Unicode table files cannot be found in the NLS directory or in the search path. Code page: number Country: number Source: LOGIN.EXE Action: See message “973: The Unicode table files cannot be found in the NLS directory or in the search path. Code page: number Country: number .” on page 782 LOGIN-X-974: The Unicode table files are corrupt. Source: LOGIN.EXE Action: See message “974: The Unicode table files are corrupt.
-
Manual 99a 38 July 17, 2001 assign a grace period during which users can still use their expired passwords before having to choose new ones. Action: Use the SETPASS command to change the password. If the current password is used during the user's grace period, it must be changed before the grace period ends. If the grace period expires and a new password has not been set, the network supervisor will have to change the user account password. LOGIN-X-2032: The password for user name has expired.
-
Manual 99a 38 July 17, 2001 LOGIN-X-2070: The new password has been used previously. Source: Explanation: Action: LOGIN.EXE The network supervisor can restrict users from using previous passwords. Have the user select a password that has not already been used with the account. LOGIN-X-2080: New password is too short. Source: Possible Cause: Action: LOGIN.EXE The user tried to define a password that is shorter than the minimum length set by the network supervisor.
-
Manual 252 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a 38 July 17, 2001 LOGOUT Messages The following includes messages from LOGOUT.EXE. LOGOUT-X-100: This workstation could not be detached from server name. Error code: code. Source: LOGOUT.EXE Action: Try rebooting the workstation to clear all server connections. For information on the specific error code, search the Error Codes online documentation (http:/ /www.novell.com/documentation/lg/nwec/docui/index.htm). If the problem persists, contact a Novell support provider.
-
Manual Action: 99a 38 July 17, 2001 For information on the specific error code, search the Error Codes online documentation (http://www.novell.com/documentation/lg/nwec/docui/ index.htm). If the problem persists, contact a Novell support provider. LOGOUT-X-180: You have only one network connection left. LOGOUT cannot detach from it. Source: Explanation: LOGOUT.EXE This information message is notifying the workstation that the user tried to break the last connection to the network.
-
Manual 99a July 17, 2001 38 LOGOUT-X-220: You are not attached to server name. Source: Explanation: Action: LOGOUT.EXE The user tried to log out of a server that the workstation was not attached to. Make sure to type the server name correctly. LOGOUT-X-222: You are not logged in to a Directory Services tree. Source: Possible Cause: Action: LOGOUT.EXE The /TR option was used in a LOGOUT command when the user was not logged in to a Directory tree. Do not use the /TR option in a LOGOUT command.
-
Manual 99a 38 July 17, 2001 LOGOUT-X-903: The command line syntax is invalid. For help, type LOGOUT /? Source: LOGOUT.EXE Action: See message “903: The command line syntax is invalid.” on page 775 LOGOUT-X-905: This utility was unable to initialize the country information. Source: LOGOUT.EXE Action: See message “905: This utility was unable to initialize the country information.” on page 775 LOGOUT-X-918: This utility was unable to get connection information. Error code: code. Source: LOGOUT.
-
Manual 99a July 17, 2001 38 LOGOUT-X-971: The workstation does not have enough memory to load the Unicode table files. Source: LOGOUT.EXE Action: See message “971: The workstation does not have enough memory to load the Unicode table files.” on page 781 LOGOUT-X-972: Access to the Unicode table files was denied. Source: LOGOUT.EXE Action: See message “972: Access to the Unicode table files was denied.
-
Manual 99a 38 July 17, 2001 LOGOUT-X-999: Could not find message file LOGOUT.MSG. Source: LOGOUT.EXE Action: See message “999: The message file for this utility cannot be found.
-
Manual 99a 38 July 17, 2001 MAP Messages The following includes messages from MAP.EXE. MAP-X-100: Access to the server was denied. Source: MAP.EXE Possible Cause: The user incorrectly entered the username, the password, or both; or the user tried to attach to a server on which the user is not defined as a user. Action: When the utility requests login information, type the username and password correctly. A user can attach to most servers as GUEST since user GUEST seldom requires a password.
-
Manual 99a 38 July 17, 2001 Error: drive T: is mapped to a bad directory handle. Try remapping it. The mapping for drive T: was NOT deleted. > MAP T:=SERVER\SYS: Drive T is in use as a search drive. Do you want to reassign this search drive? (Y/N) Y Drive T:=SERVER\SYS:\ Then to delete it, do the following: > MAP DEL T: Drive T: is used by the following search mapping: SEARCH4 Do you still want to change it? (Y/N) Y The mapping for drive T: has been deleted.
-
Manual 99a 38 July 17, 2001 MAP-X-150: You could not be authenticated to server name. Source: Possible Cause: Action: MAP.EXE The user tried to map a drive to a Volume object off of the Directory tree to which the user was not already logged in. An invalid username or password was used. Retry with a valid username and password. MAP-X-195: Directory [name] cannot be located. Source: Possible Cause: Action: MAP.EXE The user used an invalid directory name with an INCLUDE or a MAP command.
-
Manual 99a 38 July 17, 2001 MAP-X-260: You have reached the maximum number of server attachments. Source: Possible Cause: Action: MAP.EXE Each NetWare server has a limited number of connection slots. A NetWare server can be configured in various configurations (for example, 1000 user, 250 user, 10 user, etc.). The server has filled all of its connection slots. Try again after a user has logged out of the server. MAP-X-287: This utility could not find the preferred server.
-
Manual 99a 38 July 17, 2001 MAP-X-410: The supervisor has disabled the login function for this server. Source: MAP.EXE Possible Cause: The user account on the server is locked. The network supervisor can disable the login function temporarily to prevent users from logging in or from attaching to the server during system maintenance. Most likely the network supervisor is doing maintenance work on the server. Action: This condition is usually temporary.
-
Manual 99a 38 July 17, 2001 MAP-X-520: You have exceeded your credit limit for this server. Source: Possible Cause: Action: MAP.EXE MAP denied the user access to the server because the user has no more credit on the server. Give the user more credit. MAP-X-550: The maximum number of connections allowed on this server has been reached. Wait until another user logs out. Source: Possible Cause: Action: MAP.EXE Each NetWare server has a limited number of connection slots. A NetWare 2.
-
Manual 99a July 17, 2001 38 The NetWare server can be seen with SLIST up to 15 minutes after it has lost its power, or abends. This error message appears if a user tries to log in to or issue a command on the NetWare server. Action: Try the command again when the NetWare server has been brought back up. MAP-X-640: Server name is part of domain name. This version of MAP is not a NetWare Name Service utility and cannot synchronize passwords in a domain.
-
Manual 99a 38 July 17, 2001 MAP-X-710: The password could not be changed. (code) Source: Possible Cause: Action: MAP.EXE MAP could not change the password for the reason indicated by the error code. Contact a Novell support provider. For information about a specific error code, search the Error Codes online documentation (http://www.novell.com/ documentation/lg/nwec/docui/index.htm). MAP-X-830: You are trying to log in to too many stations simultaneously.
-
Manual 99a 38 July 17, 2001 MAP-X-860: You are trying to login during an unauthorized time period. The supervisor has limited the time period during which you can log in to this server. Source: Possible Cause: Action: MAP.EXE The network supervisor has set specific time periods when the user can use the server. The user cannot use the server until the next authorized time period. Notify the user of the restricted time periods. MAP-X-870: An unknown error was returned during MAP's attempt to attach.
-
Manual 99a 38 July 17, 2001 MAP-X-915: The specified volume does not exist. Source: MAP.EXE Action: See message “915: The specified volume does not exist.” on page 778 MAP-X-919: This utility could not create a connection list. Error code. Source: MAP.EXE Action: See message “919: This utility could not create a connection list. Error code.” on page 779 MAP-X-920: This utility does not have enough memory available. Source: MAP.
-
Manual 99a 38 July 17, 2001 MAP-X-925: The server specified is a Personal NetWare server. You cannot attach to a Personal NetWare server with this utility. Use the Personal NetWare utilities to access this connection. Source: MAP.EXE Action: See message “925: The server specified is a Personal NetWare server. You cannot attach to a Personal NetWare server with this utility. Use the Personal NetWare utilities to access this connection.
-
Manual 99a 38 July 17, 2001 MAP-X-975: The Unicode table files cannot be opened because there are already too many open files. Close some files or modify your CONFIG.SYS file. Source: MAP.EXE Action: See message “975: The Unicode table files cannot be opened because there are already too many open files. Close some files or modify your CONFIG.SYS file.” on page 783 MAP-X-998: The message file found (utility_name.MSG) is an incorrect version. The correct version is number.
-
Manual 99a 38 July 17, 2001 grace period during which users can still use their recently expired passwords before having to choose new ones. The user has exceeded the grace period. Action: Use the SETPASS command to change the password. Whenever a user is notified that a password has expired, it must be changed before the grace period ends. If it is not, the network supervisor must change it for the user. MAP-X-2040: This is your last chance to change your password. You have no grace logins remaining.
-
Manual 272 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a July 17, 2001 38 MONITOR Messages The following includes messages from MONITOR.NLM. MONITOR-X-60: The NLM could not allocate memory. Source: Possible Cause: Action: MONITOR.NLM The server does not have enough memory available. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. MONITOR-X-198: The NLM could not allocate a resource tag. Source: Possible Cause: Action: MONITOR.
-
Manual 99a 38 July 17, 2001 MONITOR-X-236: This NLM requires a newer version of NWSNUT.NLM. Source: Explanation: Action: MONITOR.NLM While loading, MONITOR determined that the version of NWSNUT.NLM loaded in server memory does not support the required functionality. Update the version of NWSNUT.NLM on the server.
-
Manual 99a July 17, 2001 38 NDPSM Messages The following includes messages from NDPSM.NLM. NDPSM-X-13: Insufficient memory is available for the NDPS Manager to initialize the Printer Agents. Source: NDPSM.NLM Action: Make sure the server has sufficient memory, then retry the operation. For information on resolving memory problems, see Freeing Server Memory Temporarily in the Server Operating System Administration Guide. NDPSM-X-15: An error occurred while creating a new display portal.
-
Manual 99a 38 July 17, 2001 NDPSM-X-33: Printer Agent already exists. Source: Possible Cause: Action: NDPSM.NLM You are trying to give a Printer Agent a name that is already in use. Use a unique name. NDPSM-X-37: The NDPS Manager has lost its connection to queue . Source: Possible Cause: Action: NDPSM.NLM One of the following events probably occurred: a router went down, the volume the queue is on was dismounted, or the server that has the volume with the queue went down.
-
Manual 99a 38 July 17, 2001 NDPSM-X-95: Error occurred while attempting to log in to the network. Access to the network is denied. Source: NDPSM.NLM Possible Cause: NDPS Manager was not able to log in to the network because error code was returned during the attempt. Action: For information about the specific error code, search the Error Codes online documentation (http://www.novell.com/documentation/lg/nwec/docui/ index.htm).
-
Manual Action: 99a 38 July 17, 2001 Make sure the server has sufficient memory, then retry the operation. For information on resolving memory problems, see Freeing Server Memory Temporarily in the Server Operating System Administration Guide. NDPSM-X-104: Error occurred while creating the NDPS Manager database. Source: Explanation: Possible Cause: Action: NDPSM.NLM NDPS Manager was unable to create the database because an error code was returned. This could be a problem in the program itself.
-
Manual 99a 38 July 17, 2001 NDPSM-X-108: Error occurred while attaching to queues associated with printer . Source: NDPSM.NLM Possible Cause: An internal error stopped the NDPS Manager from attaching to the queue that is associated with the specified printer. Action: For information about the specific error code, search the Error Codes online documentation (http://www.novell.com/documentation/lg/nwec/docui/ index.htm).
-
Manual 99a 38 July 17, 2001 NDPSM-X-121: Error occurred while initializing the DPLSV386 library. Reported version: Expected version: Source: Possible Cause: Action: NDPSM.NLM Possible causes include an incorrect, outdated, or incompatible version of the library. It could also be caused by a low memory condition. Refer to the explanation that is displayed along with this message. NDPSM-X-128: Error occurred while attempting to find the next printer agent.
-
Manual 99a 38 July 17, 2001 NDPSM-X-169: Medium selected to be removed as a supported medium is being referenced and can not be removed. Source: Possible Cause: Action: NDPSM.NLM You attempted to delete the medium currently selected. Select a different medium to be the current medium, then delete the other one. NDPSM-X-190: Error occurred while initializing a printer agent. (NDPS Manager internal printer agent ID ). Source: NDPSM.
-
Manual Action: 99a 38 July 17, 2001 For information about the specific error code, search the Error Codes online documentation (http://www.novell.com/documentation/lg/nwec/docui/ index.htm). If you are unable to resolve the error, contact your Novell support provider. NDPSM-X-196: The NDPS Manager was unable to launch the housekeeping process. This is usually due to a low memory condition. Source: NDPSM.NLM Action: Make sure the server has sufficient memory, then retry the operation.
-
Manual 99a 38 July 17, 2001 NDPSM-X-200: A low memory error occurred while initializing the Job Production Manager. Source: NDPSM.NLM Action: Make sure the server has sufficient memory, then retry the operation. For information on resolving memory problems, see Freeing Server Memory Temporarily in the Server Operating System Administration Guide. For information about the specific error code, search the Error Codes online documentation (http://www.novell.com/documentation/lg/nwec/docui/ index.htm).
-
Manual 99a 38 July 17, 2001 NDPSM-X-207: Error occurred while reading the database directory path from NDS. Source: Possible Cause: Action: NDPSM.NLM An internal error prevented the NDPS Manager from reading the path. This could be a problem in the program itself. For information about the specific error code, search the Error Codes online documentation (http://www.novell.com/documentation/lg/nwec/docui/ index.htm). If you are unable to resolve the error, contact your Novell support provider.
-
Manual 99a 38 July 17, 2001 NDPSM-X-237: Error occurred while opening file . Source: Possible Cause: Action: NDPSM.NLM An internal error prevented the NDPS Manager from opening the file. This could be a problem in the program itself. For information about the specific error code, search the Error Codes online documentation (http://www.novell.com/documentation/lg/nwec/docui/ index.htm). If you are unable to resolve the error, contact your Novell support provider.
-
Manual 99a 38 July 17, 2001 NDPSM-X-251: Error occurred registering public access printer with the Service Registry Service. Source: NDPSM.NLM Possible Cause: An internal error stopped the NDPS Manager from registering the printer. This could be a problem in the program itself. Action: For information about the specific error code, search the Error Codes online documentation (http://www.novell.com/documentation/lg/nwec/docui/ index.htm).
-
Manual 99a July 17, 2001 38 NDPSM-X-268: The NDPS Manager is unable to create the console background process. This is usually due to low memory condition. Source: NDPSM.NLM Action: Make sure the server has sufficient memory, then retry the operation. For information on resolving memory problems, see Freeing Server Memory Temporarily in the Server Operating System Administration Guide. NDPSM-X-270: The NDPS Manager cannot be found. Verify that the complete NDPS Manager name is used.
-
Manual 99a 38 July 17, 2001 NDPSM-X-280: Error occurred while creating a service registry reference. Source: Possible Cause: Action: NDPSM.NLM An internal error prevented the NDPS Manager from creating the reference. For information about the specific error code, search the Error Codes online documentation (http://www.novell.com/documentation/lg/nwec/docui/ index.htm). If you are unable to resolve the error, contact your Novell support provider.
-
Manual 99a 38 July 17, 2001 NDPSM-X-284: Error occurred while creating document file . Source: Possible Cause: Action: NDPSM.NLM An internal error stopped the NDPS Manager from creating the file. This could be a problem in the program itself. For information about the specific error code, search the Error Codes online documentation (http://www.novell.com/documentation/lg/nwec/docui/ index.htm). If you are unable to resolve the error, contact your Novell support provider.
-
Manual 99a 38 July 17, 2001 NDPSM-X-311: Error was returned by the configuration utility. No changes were saved. Source: NDPSM.NLM Possible Cause: An internal error prevented the configuration from being saved. This could be a problem in the program itself. Action: For information about the specific error code, search the Error Codes online documentation (http://www.novell.com/documentation/lg/nwec/docui/ index.htm).
-
Manual 99a 38 July 17, 2001 NDPSM-X-319: The DPLSV386 library was unable to create an accessorRef. This is usually due to a low memory condition. Source: NDPSM.NLM Action: Make sure the server has sufficient memory, then retry the operation. For information on resolving memory problems, see Freeing Server Memory Temporarily in the Server Operating System Administration Guide.
-
Manual 99a 38 July 17, 2001 NDPSM-X-329: Insufficient memory is available to create a list of Printer Agents. Source: NDPSM.NLM Action: Make sure the server has sufficient memory, then retry the operation. For information on resolving memory problems, see Freeing Server Memory Temporarily in the Server Operating System Administration Guide. NDPSM-X-330: Error occurred attempting to shutdown the Printer Agent. Source: NDPSM.
-
Manual Action: 99a 38 July 17, 2001 For information about the specific error code, search the Error Codes online documentation (http://www.novell.com/documentation/lg/nwec/docui/ index.htm). If you are unable to resolve the error, contact your Novell support provider. NDPSM-X-336: Error occurred adding a medium to the supported media list. Source: Possible Cause: Action: NDPSM.NLM An internal error prevented adding the medium. This could be a problem in the program itself.
-
Manual 99a 38 July 17, 2001 NDPSM-X-341: Error occurred attempting to load module . Source: Possible Cause: Action: NDPSM.NLM An internal error prevented loading the module. This could be a problem in the program itself. For information about the specific error code, search the Error Codes online documentation (http://www.novell.com/documentation/lg/nwec/docui/ index.htm). If you are unable to resolve the error, contact your Novell support provider.
-
Manual 99a 38 July 17, 2001 NDPSM-X-346: Volume is not accessible, printer agent was not initialized. Source: Explanation: Action: NDPSM.NLM The specified volume has been dismounted. Remount the volume. NDPSM-X-347: Error occurred attempting to load . Source: NDPSM.NLM Possible Cause: An internal error prevented the module from loading. This could be a problem in the program itself.
-
Manual 99a 38 July 17, 2001 NDPSM-X-350: The NDPS Manager does not support autoloading of port handlers on SFT III servers. This must be done from the system console. Source: NDPSM.NLM Action: SFT III is not supported by NDPS. NDPSM-X-351: Error occurred while creating the portal. Source: Possible Cause: Action: NDPSM.NLM The server is out of memory. Make sure the server has sufficient memory, then retry the operation.
-
Manual 99a 38 July 17, 2001 NDPSM-X-370: There is no backup to restore from. Source: Possible Cause: Action: NDPSM.NLM The NDPS Manager database was not previously backed up, so a database restore cannot be performed. None. If a backup copy does not exist, there is no way to restore the database. In the future, be sure to back up the NDPS Manager database. NDPSM-X-373: Error occurred while initializing the NDPS Manager. Source: Possible Cause: Action: NDPSM.
-
Manual 99a 38 July 17, 2001 NDPSM-X-394: The NDPS Manager is currently running on another file server. Source: Possible Cause: Action: NDPSM.NLM You specified an NDPS Manager that is not running on the local server. Either specify an NDPS Manager on the local server, or designate the server the NDPS Manager is running on. NDPSM-X-396: Error occurred attaching to file server . Source: Possible Cause: Action: NDPSM.
-
Manual 99a 38 July 17, 2001 NDPSM-X-401: The object that was selected is not an NDPS Manager. Source: NDPSM.NLM Possible Cause: This error may simply be the result of a typing mistake made by the user at the command line. It could also occur if the eDirectory volume object associated with the NDPS Manager has been deleted, in which case eDirectory will change the NDPS Manager to an "unknown object." Action: Make sure you have typed the command correctly.
-
Manual 300 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a 38 July 17, 2001 NE1000-NW Messages The following includes messages from NE1000-NW.LAN. NE1000-NW-X-025: You cannot load MSM31X on a NetWare 3.10 server. Source: NE1000-NW.LAN Action: See message “025: You cannot load MSM31X on a NetWare 3.10 server.” on page 761 NE1000-NW-X-026: On a NetWare 3.11 server, you must load LSLENH.NLM before you load MSM31X.NLM. Source: NE1000-NW.LAN Action: See message “026: On a NetWare 3.11 server, you must load LSLENH.NLM before you load MSM31X.NLM.
-
Manual 99a 38 July 17, 2001 NE1000-NW-X-066-Adapter 1: The cable might be disconnected on the board. Source: NE1000-NW.LAN Action: See message “066-Adapter 1: The cable might be disconnected on the board.” on page 764 NE1000-NW-X-067: The group bit in the node address override was cleared. Source: NE1000-NW.LAN Action: See message “067: The group bit in the node address override was cleared.” on page 764 NE1000-NW-X-068: The local bit in the node address override was set. Source: NE1000-NW.
-
Manual 99a 38 July 17, 2001 NE1000-NW-X-075: The MLID cannot be registered with the LSL. Source: NE1000-NW.LAN Action: See message “075: The MLID cannot be registered with the LSL.” on page 765 NE1000-NW-X-076: The polling procedure cannot be added. Source: NE1000-NW.LAN Action: See message “076: The polling procedure cannot be added.” on page 765 NE1000-NW-X-077: The event notification routine cannot be registered. Source: NE1000-NW.
-
Manual 99a 38 July 17, 2001 NE1000-NW-X-092: Cannot schedule AES without an HSM routine. Source: NE1000-NW.LAN Action: See message “092: Cannot schedule AES without an HSM routine.” on page 767 NE1000-NW-X-093: Cannot schedule interrupt time call back without an HSM routine. Source: NE1000-NW.LAN Action: See message “093: Cannot schedule interrupt time call back without an HSM routine.” on page 767 NE1000-NW-X-094: Cannot set hardware interrupt without an HSM routine. Source: NE1000-NW.
-
Manual 99a 38 July 17, 2001 NE2-NW Messages The following includes messages from NE2-NW.LAN. NE2-NW-X-025: You cannot load MSM31X on a NetWare 3.10 server. Source: NE2-NW.LAN Action: See message “025: You cannot load MSM31X on a NetWare 3.10 server.” on page 761 NE2-NW-X-026: On a NetWare 3.11 server, you must load LSLENH.NLM before you load MSM31X.NLM. Source: NE2-NW.LAN Action: See message “026: On a NetWare 3.11 server, you must load LSLENH.NLM before you load MSM31X.NLM.
-
Manual 99a 38 July 17, 2001 NE2-NW-X-054: The board did not respond to the initialization command. Source: NE2-NW.LAN Action: See message “054: The board did not respond to the initialization command.” on page 763 NE2-NW-X-066-Adapter 1: The cable might be disconnected on the board. Source: NE2-NW.LAN Action: See message “066-Adapter 1: The cable might be disconnected on the board.” on page 764 NE2-NW-X-067: The group bit in the node address override was cleared. Source: NE2-NW.
-
Manual 99a July 17, 2001 38 NE2-NW-X-074: The hardware interrupt cannot be set. Source: NE2-NW.LAN Action: See message “074: The hardware interrupt cannot be set.” on page 765 NE2-NW-X-075: The MLID cannot be registered with the LSL. Source: NE2-NW.LAN Action: See message “075: The MLID cannot be registered with the LSL.” on page 765 NE2-NW-X-076: The polling procedure cannot be added. Source: NE2-NW.LAN Action: See message “076: The polling procedure cannot be added.
-
Manual 99a 38 July 17, 2001 NE2-NW-X-091: The hardware configuration conflicts. Source: NE2-NW.LAN Action: See message “091: The hardware configuration conflicts.” on page 766 NE2-NW-X-092: Cannot schedule AES without an HSM routine. Source: NE2-NW.LAN Action: See message “092: Cannot schedule AES without an HSM routine.” on page 767 NE2-NW-X-093: Cannot schedule interrupt time call back without an HSM routine. Source: NE2-NW.
-
Manual 99a 38 July 17, 2001 NE2000-NW Messages The following includes messages from NE2000-NW.LAN. 025: You cannot load MSM31X on a NetWare 3.10 server. Source: NE2000-NW.LAN Action: See message “025: You cannot load MSM31X on a NetWare 3.10 server.” on page 761 026: On a NetWare 3.11 server, you must load LSLENH.NLM before you load MSM31X.NLM. Source: NE2000-NW.LAN Action: See message “026: On a NetWare 3.11 server, you must load LSLENH.NLM before you load MSM31X.NLM.
-
Manual 99a 38 July 17, 2001 054: The board did not respond to the initialization command. Source: NE2000-NW.LAN Action: See message “054: The board did not respond to the initialization command.” on page 763 066-Adapter 1: The cable might be disconnected on the board. Source: NE2000-NW.LAN Action: See message “066-Adapter 1: The cable might be disconnected on the board.” on page 764 067: The group bit in the node address override was cleared. Source: NE2000-NW.
-
Manual 99a 38 July 17, 2001 074: The hardware interrupt cannot be set. Source: NE2000-NW.LAN Action: See message “074: The hardware interrupt cannot be set.” on page 765 075: The MLID cannot be registered with the LSL. Source: NE2000-NW.LAN Action: See message “075: The MLID cannot be registered with the LSL.” on page 765 076: The polling procedure cannot be added. Source: NE2000-NW.LAN Action: See message “076: The polling procedure cannot be added.
-
Manual 99a 38 July 17, 2001 091: The hardware configuration conflicts. Source: NE2000-NW.LAN Action: See message “091: The hardware configuration conflicts.” on page 766 092: Cannot schedule AES without an HSM routine. Source: NE2000-NW.LAN Action: See message “092: Cannot schedule AES without an HSM routine.” on page 767 093: Cannot schedule interrupt time call back without an HSM routine. Source: NE2000-NW.
-
Manual 99a 38 July 17, 2001 224: This board is configured as an NE1000. Source: NE2000-NW.LAN Action: See message “224: This board is configured as an NE1000.
-
Manual 314 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a 38 July 17, 2001 NE3200-NW Messages The following includes messages from NE3200-NW.LAN. 025: You cannot load MSM31X on a NetWare 3.10 server. Source: NE3200-NW.LAN Action: See message “025: You cannot load MSM31X on a NetWare 3.10 server.” on page 761 026: On a NetWare 3.11 server, you must load LSLENH.NLM before you load MSM31X.NLM. Source: NE3200-NW.LAN Action: See message “026: On a NetWare 3.11 server, you must load LSLENH.NLM before you load MSM31X.NLM.
-
Manual 99a 38 July 17, 2001 067: The group bit in the node address override was cleared. Source: NE3200-NW.LAN Action: See message “067: The group bit in the node address override was cleared.” on page 764 068: The local bit in the node address override was set. Source: NE3200-NW.LAN Action: See message “068: The local bit in the node address override was set.” on page 764 070: The board has failed. Source: Possible Cause: Action: NE3200-NW.
-
Manual 99a 38 July 17, 2001 075: The MLID cannot be registered with the LSL. Source: NE3200-NW.LAN Action: See message “075: The MLID cannot be registered with the LSL.” on page 765 076: The polling procedure cannot be added. Source: NE3200-NW.LAN Action: See message “076: The polling procedure cannot be added.” on page 765 077: The event notification routine cannot be registered. Source: NE3200-NW.LAN Action: See message “077: The event notification routine cannot be registered.
-
Manual 99a 38 July 17, 2001 091: The hardware configuration conflicts. Source: NE3200-NW.LAN Action: See message “091: The hardware configuration conflicts.” on page 766 092: Cannot schedule AES without an HSM routine. Source: NE3200-NW.LAN Action: See message “092: Cannot schedule AES without an HSM routine.” on page 767 093: Cannot schedule interrupt time call back without an HSM routine. Source: NE3200-NW.
-
Manual Action: 99a 38 July 17, 2001 Check the network board and other hardware. If necessary, replace the network board. 238: The firmware cannot be started. Source: Possible Cause: Action: NE3200-NW.LAN The network board passed the self-test after being reset, but it did not download the firmware Make sure the network board is in a bus-master compatible slot. You may need to replace the board. 241: The board's ROM has checksum errors. Source: Possible Cause: Action: NE3200-NW.
-
Manual 320 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a 38 July 17, 2001 NIT Messages The following includes messages from NIT.NLM. NIT-X-001: NIT failed to allocate an internal memory resource tag. There may not be enough server memory, or server memory may be corrupted. Source: Possible Cause: Action: NIT.NLM A call to AllocateResourceTag() failed. The nitlnlm program cannot load at this time due to memory constraints. Increase the memory available to the server.
-
Manual 322 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a 38 July 17, 2001 NLMLIB Messages The following includes messages from NLMLIB.NLM. NLMLib-X-013: RegisterTrackedResource() for Service Advertising failed, rc=number. An internal system error has occurred. There may not be enough server memory, or server memory may be corrupted. Source: NLMLIB.NLM Explanation: A call to RegisterTrackedResource() failed. The NLMLIB.NLM program cannot load at this time due to memory constraints. Action: Increase the memory available to the server.
-
Manual 99a 38 July 17, 2001 NLMLib-X-023: An invalid namespace was specified using the /N option. Only the namespace strings DOS, MAC, NFS, FTAM and OS2 are valid. Source: Explanation: Action: NLMLIB.NLM You specified an invalid namespace with the /N option. Try again, using valid namespace syntax. If the problem persists, contact the vendor of this NLM program or contact a NetWare support provider. NLMLib-X-024: Login using the /S option loading the NLM failed: rc = number.
-
Manual 99a July 17, 2001 38 NLSLSP Messages The following includes messages from NLSLSP.NLM. NLSLSP.NLM: DUPLICATE LICENSE: license certificate name Source: Explanation: Action: NLSLSP.NLM The licensing service detected that a license certificate is installed more than once. Remove one or more duplicate license certificates. NLSLSP.NLM: EVAL LICENSE INSTALLED TWICE. Remove license certificate name Source: Possible Cause: Action: NLSLSP.
-
Manual 99a 38 July 17, 2001 No licensing system is available. Please install a license service provider. Source: Possible Cause: Action: Possible Cause: Action: Possible Cause: Action: Possible Cause: Action: NLSLSP.NLM NLSLSP.NLM is not loaded. Load NLSLSP.NLM. eDirectory is not open. Load DS.NLM. Run DSREPAIR.NLM to make sure that the eDirectory database is open. NLSLSP.NLM cannot find the NLS_LSP_servername object in the eDirectory tree. Run SETUPNLS.NLM. The schema is not extended. Run SETUPNLS.
-
Manual Action: Possible Cause: Action: 99a 38 July 17, 2001 Verify that the operating system is functioning properly. eDirectory is not functioning properly. Verify that eDirectory is functioning properly. Novell Licensing Services (NLSLSP.NLM): An older NLS schema extension has been detected. If you have not converted your old licensing data, you may do so by running SETUPNLS.NLM Source: Explanation: Possible Cause: Action: NLSLSP.NLM NLS detected an older schema definition.
-
Manual 99a 38 July 17, 2001 Novell Licensing Services (NLSLSP.NLM): No LSP object is associated with this server. Please run SETUPNLS.NLM. Source: Explanation: Possible Cause: Action: Possible Cause: Action: NLSLSP.NLM NLS is unable to find an NLS_LSP_servername object for the server running NLSLSP.NLM. eDirectory is not functioning properly. Verify that eDirectory is functioning properly. An NLS_LSP_servername object has not been created in the eDirectory tree. Run SETUPNLS.NLM.
-
Manual 99a July 17, 2001 38 Novell Licensing Services (NLSLSP.NLM): DUPLICATE LICENSE FOUND. Please remove one of the following: license certificate name Source: Explanation: Action: NLSLSP.NLM The licensing service detected that a license certificate has been installed more than once. Remove one or more duplicate license certificates. Novell Licensing Services (NLSLSP.NLM): License container data has been corrupted. Source: Possible Cause: Action: Possible Cause: NLSLSP.NLM NLSLSP.
-
Manual 99a 38 July 17, 2001 The network is not available for use. Please load the NetWare shell and connect to a server running the licensing service. Source: Explanation: Action: NLSLSP.NLM Licensing clients could not find a server running NLS. Connect to a server that is running NLSLSP.NLM and retry the operation.
-
Manual 99a 38 July 17, 2001 Novell Native File Access for UNIX Messages This section describes the system messages of the various components of Novell Native File Access for UNIX. Setting the log file Source: Possible Cause: Action: MakeNIS The directory specified when creating the log file might be incorrect. Check for the validity of the directory path you specified. Required parameters are missing Source: Explanation: Possible Cause: Action: MakeNIS The domain name is mandatory.
-
Manual 99a 38 July 17, 2001 File is older than corresponding map Source: Possible Cause: Action: MakeNIS The text file used for making this map is older than the map that exists on eDirectory. Change the time stamp on the text file by saving it again. Object with same domain name already exists Source: Possible Cause: Action: MakeNIS An eDirectory error occurred while adding the specified object. Check whether the object already exists.
-
Manual 99a 38 July 17, 2001 Getting default host names Source: Possible Cause: Action: NIS Installation Unable to get the DNS name of the current host. Check whether entries in relevant configuration files are correct. Updating the configuration file Source: Possible Cause: Action: NIS Installation Either the configuration file is not present or it is corrupted. Check the configuration file.
-
Manual 99a 38 July 17, 2001 Unable to allocate space for domain index list Source: Possible Cause: Action: NIS Services Failure to allocate memory for the domain list of NIS Server. Unload the NISSERV.NLM and load it again. Unable to respond to RPC request Source: Possible Cause: Action: NIS Services Failure in sending the RPC response back to the client because of the PKERNAL.NLM. Repeat the client call.
-
Manual 99a 38 July 17, 2001 RPC/UDP receive queues are full, packet dropped Source: Possible Cause: NFS Server Too many UDP packets have been received and have exceeded the UDP receive queue’s capacity in the RPC module. Some UDP packets might be lost. This could be caused by an increase of activities such as a RPC broadcast storm.
-
Manual 336 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a 38 July 17, 2001 NSS Messages The following error messages apply to Novell® Storage ServicesTM (NSS). NSS-X-70: Unknown failure during ownership assignment. Source: Possible Cause: Action: NSS.NLM An internal error has occurred. Retry the operation. If the problem persists, contact your Novell support provider. NSS-X-71: Unknown failure during ownership assignment. Source: Possible Cause: Action: NSS.NLM An internal error has occurred. Retry the operation.
-
Manual 99a 38 July 17, 2001 NSS-X-74: Unknown failure during ownership assignment. Source: Possible Cause: Action: NSS.NLM An internal error has occurred. Retry the operation. If the problem persists, contact your Novell support provider. NSS-X-75: Unknown failure during ownership assignment. Source: Possible Cause: Action: NSS.NLM An internal error has occurred. Retry the operation. If the problem persists, contact your Novell support provider. NSS-X-402: The module name name is already in use.
-
Manual 99a 38 July 17, 2001 NSS-X-665: Could not find DOS namespace while renaming deleted files to DELETED.SAV. Source: Explanation: Possible Cause: Action: COMN.NSS NSS could not find the namespace for a DOS file during purge. An internal error has occurred. This message is for informational purposes only. NSS-X-820: Error mounting volume_name, status=error code. Source: Explanation: Possible Cause: Action: NWSA.NSS The NSS volume you specified cannot be mounted. An internal error has occurred.
-
Manual 99a 38 July 17, 2001 NSS-X-1408: Error adding a purge log Entry, possibly due to MEDIA Errors. Source: Explanation: ZLSS.NSS An entry could not be added to the purge log file. Possible Cause: The hard disk might be full. Possible Cause: You might have a bad sector on your hard disk. Action: Check your hard disk. Retry the operation. If the problem persists, contact your Novell support provider.
-
Manual 99a 38 July 17, 2001 NSS-X-1450: Error reading Volume Data Block error code, status=error code. Source: Explanation: Possible Cause: Action: ZLSS.NSS NSS tried to read an NSS volume. An internal error has occurred. Check the status message and retry the operation. If the problem persists, contact your Novell support provider. NSS-X-1456: ZLSS Object Storage Consumer has failed to Unregister. Source: Explanation: Possible Cause: Action: ZLSS.NSS An NSS consumer could not unregister.
-
Manual 99a 38 July 17, 2001 NSS-X-2208: Unable to add deposit to Storage Bank. Source: Explanation: Action: ZLSS.NSS An internal error has occurred. Reload NSS. Retry the operation. If the problem persists, contact your Novell support provider. NSS-X-2209: Unable to locate deposit to remove from the Storage Bank. Source: Explanation: Action: ZLSS.NSS An internal error has occurred. Reload NSS. Retry the operation. If the problem persists, contact your Novell support provider.
-
Manual 99a July 17, 2001 38 NWCONFIG Messages The following includes messages from NWCONFIG.NLM. NWCONFIG-X-1: An attempt to access NWCONFIG messages failed. It is likely that the message or help files (NWCONFIG.MSG or NWCONFIG.HLP) are out-of-date, missing, or corrupted. Source: Explanation: Action: NWCONFIG.NLM NWCONFIG.NLM cannot read its message file.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-3: Fatal error: The installation cannot complete successfully. An attempt to allocate memory failed. You must add (or reconfigure) memory and restart the installation. Source: Explanation: Action: NWCONFIG.NLM Memory is insufficient for NWCONFIG to run. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. NWCONFIG-X-4: The disk partition table could not be read. Source: NWCONFIG.
-
Manual 99a July 17, 2001 38 NWCONFIG-X-8: An attempt to add a field to a form failed. Source: Explanation: Possible Cause: Action: NWCONFIG.NLM NWCONFIG was unable to complete an operation to build a screen presentation. Memory is insufficient at the server. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. NWCONFIG-X-9: An attempt to write out partition table information failed. Error code: code.
-
Manual Action: 99a 38 July 17, 2001 Bring the disks that contain these volumes online one at a time, rather than at the same time. If one of the volumes is old and no longer needed, delete it to avoid the problem in the future. NWCONFIG-X-12: The volume flags do not match those of another volume with the same name. Source: Explanation: Action: NWCONFIG.NLM NWCONFIG found two volume segments with the same name, but the volume flags of the two do not match.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-15: The first block of FAT table 1 of the volume does not match that of another volume with the same name. Source: NWCONFIG.NLM Explanation: NWCONFIG found two volumes with the same name, but the FAT tables of the two do not match. Action: Bring the disks that contain these volumes online one at a time, rather than at the same time. If one of the volumes is old and no longer needed, delete it to avoid the problem in the future.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-19: Volume name name must be at least two characters long. Source: Explanation: Action: NWCONFIG.NLM A volume name was entered which was shorter than two characters. Enter a name at least two characters long. NWCONFIG-X-20: A volume was found with an invalid volume block size of number KB. Source: NWCONFIG.NLM Explanation: An invalid volume has been found. This volume has become corrupted. Action: Delete the volume.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-24: A volume was found with an invalid starting sector offset of number. Check to be sure all disk drivers are configured properly. Source: NWCONFIG.NLM Explanation: An invalid volume has been found. This volume has become corrupted. Action: Delete the volume. If the data is required, restore it from backups. If the problem persists, contact a Novell support provider.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-28: A volume was found with an invalid directory table 0 starting block of number on a volume of number blocks. Check to be sure all disk drivers are configured properly. Source: Explanation: Action: NWCONFIG.NLM An invalid volume has been found. This volume has become corrupted. Make sure disk drivers are configured correctly. Run VREPAIR. If these efforts fail, delete the volume. If the data is required, restore it from backups.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-32: Volume information could not be written because NWCONFIG was unable to lock disk label. Source: NWCONFIG.NLM Explanation: The disk is probably being used by another process. A mounted volume might be using it. Action: Wait to see if the process releases the device, then retry the action. If there is a disk device error, unload NLM programs (except device drivers) that might be using the disk. Then dismount volumes from the disk.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-36: The program could not find a free block during FAT block allocation. Source: Explanation: Action: NWCONFIG.NLM An internal system error has occurred. Try again. If the problem persists, contact a Novell support provider. NWCONFIG-X-37: Function FreeFATTable() was called when no FAT table was allocated. Source: Explanation: Action: NWCONFIG.NLM An internal system error has probably occurred. Try again.
-
Manual 99a July 17, 2001 38 NWCONFIG-X-41: The program could not read the mirror FAT entry from a volume. Source: Explanation: Action: NWCONFIG.NLM NWCONFIG could not read from the volume. See Resolving Volume I/O Errors in the Traditional File Services Administration Guide. NWCONFIG-X-42: An error occurred while writing name FAT block sequence number. Source: Explanation: Action: NWCONFIG.NLM NWCONFIG could not write to the volume.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-46: The program could not allocate memory for the file system directory table. Source: Explanation: Action: NWCONFIG.NLM There is insufficient memory to accomplish the desired operation. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. NWCONFIG-X-47: An error occurred while writing name file system directory block sequence number. Source: Explanation: Action: NWCONFIG.NLM NWCONFIG could not write to the volume.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-51: An attempt to read a mirror file system directory entry failed. Source: NWCONFIG.NLM Explanation: An error occurred when the program attempted to read a volume. Action: See Resolving Volume I/O Errors in the Traditional File Services Administration Guide. NWCONFIG-X-52: A file creation error occurred. Source: NWCONFIG.NLM Explanation: NWCONFIG could not write to a DOS or NetWare disk.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-55: An attempt to write out the file failed. Source: NWCONFIG.NLM Explanation: NWCONFIG could not write to a DOS or NetWare disk. If it is a diskette, it might be bad, write protected, or not inserted correctly. If it is a hard disk, the proper disk driver might not be loaded, the cabling might not be correct, or the drive parameters might be set incorrectly. Action: Make sure that there is a writable disk.
-
Manual 99a July 17, 2001 38 NWCONFIG-X-59: A system volume could not be created. Source: Explanation: Action: NWCONFIG.NLM NWCONFIG could not write to the disk. The proper disk driver might not be loaded, the cabling might be not correct, or the drive parameters might be set incorrectly. See Disk Errors in the Server Operating System Administration Guide.. NWCONFIG-X-60: Volume name was not found in volume list. Source: Explanation: Action: NWCONFIG.NLM NWCONFIG could not read the disk.
-
Manual 99a 38 July 17, 2001 information about a specific error code, search the Error Codes online documentation (http://www.novell.com/documentation/lg/nwec/docui/ index.htm). NWCONFIG-X-66: An attempt to find a non-conflicting volume name for free space failed. Source: Explanation: Action: NWCONFIG.NLM An internal system error has occurred. Try again. If the problem persists, contact a Novell support provider.
-
Manual 99a July 17, 2001 38 NWCONFIG-X-73: Two segments with volume name name were found having different block shift factors (number and number). Source: Explanation: Action: NWCONFIG.NLM Two volumes with the same name exist, but their block sizes differ. Bring the disks that contain these volumes online one at a time, rather than at the same time. If one of the volumes is old and no longer needed, delete it to avoid the problem in the future. Two volumes on the same server cannot have the same name.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-78: An attempt to access DOS on this computer was unsuccessful. Source: Explanation: Action: NWCONFIG.NLM DOS probably has been removed from this server. Try bringing up the server without removing DOS. If the problem persists, contact a Novell support provider. NWCONFIG-X-79: File Name contains an incomprehensible version number (number). The version number should be number. Source: Explanation: Action: NWCONFIG.NLM The file is corrupted.
-
Manual 99a July 17, 2001 38 NWCONFIG-X-83: The program cannot make a new NUT client. Source: Explanation: Action: NWCONFIG.NLM This error message is probably the result of insufficient memory. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. NWCONFIG-X-84: Volume name has multiple segments with different optimization flags (number and number). Source: Explanation: Action: NWCONFIG.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-87: Warning: The disk cannot be locked because it is currently being used by another process. A mounted volume may be using it. The partition table cannot be modified at this time. Source: Explanation: Action: NWCONFIG.NLM The disk cannot be locked because it is currently being used by another process. A mounted volume might be using it. Wait to see if the process releases the device, then retry the action.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-97: Abend: File block sequence number was not found in the FAT chain starting at entry number. Source: Explanation: Action: NWCONFIG.NLM An internal system error has occurred. The installation process has terminated prematurely, and NWCONFIG will be unloaded. Try again. If the problem persists, contact a Novell support provider. NWCONFIG-X-98: Abend: Block number number is invalid for volume name. Source: Explanation: Action: NWCONFIG.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-102: Abend: An error occurred in the in FAT entry sequence of last mirror FAT block. Source: Explanation: Action: NWCONFIG.NLM An internal system error has occurred. The installation process has terminated prematurely, and NWCONFIG will be unloaded. Try again. If the problem persists, contact a Novell support provider. NWCONFIG-X-103: Abend: The previous volume segment could not be found. Source: Explanation: Action: NWCONFIG.
-
Manual 99a July 17, 2001 38 NWCONFIG-X-107: The operation aborted because BTRIEVE.NLM could not be loaded. Source: Explanation: Action: NWCONFIG.NLM BTRIEVE.NLM could not be loaded. This could be caused by insufficient memory or conflicts with exported functions. The system console screen should indicate the cause of Btrieve not being loaded. Examine this screen to determine the necessary steps for resolving the conflict.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-111: This product cannot be removed. Source: Explanation: Action: NWCONFIG.NLM The nature of the product prevents it from being removed. Do not try to remove this product. NWCONFIG-X-113: File name cannot be written to. One of the following problems may exist: (1) The target disk is full. (2) The disk is write-protected. Source: NWCONFIG.NLM Action: Insert a disk with more free space on it. If the disk is write-protected, remove the write protection.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-117: A memory corruption problem has occurred. Program operation cannot continue. Source: Explanation: Action: NWCONFIG.NLM An internal system error has occurred. The installation process has terminated prematurely, and NWCONFIG will be unloaded. Try again. If the problem persists, contact a Novell support provider. NWCONFIG-X-118: An attempt to free unallocated memory has failed. Program operation cannot continue. Source: Explanation: Action: NWCONFIG.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-127: The NetWare Loadable Module name could not be loaded. Source: Explanation: Action: NWCONFIG.NLM The reason the NLM could not be loaded will be displayed on the system console screen. Take action depending upon the message displayed on the system console screen. If memory could not be allocated, increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide.
-
Manual 99a July 17, 2001 38 NWCONFIG-X-132: The program cannot get a screen resource tag. Source: Explanation: Action: NWCONFIG.NLM This error probably is caused by insufficient memory. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. NWCONFIG-X-133: The program cannot get a timer resource tag. Source: Explanation: Action: NWCONFIG.NLM This error probably is caused by insufficient memory.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-137: The program cannot get an event resource tag. Source: Explanation: Action: NWCONFIG.NLM This error probably is caused by insufficient memory. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. NWCONFIG-X-138: The program cannot open a screen. Source: Explanation: Action: NWCONFIG.NLM This error probably is caused by insufficient memory.
-
Manual 99a July 17, 2001 38 NWCONFIG-X-142: No NetWare partitions are on this CD-ROM device. Source: Explanation: Action: NWCONFIG.NLM A CD-ROM device does not have a NetWare disk partition. The installation program will not show the disk partition table of a CD-ROM device which has no NetWare partition. Select a different device. NWCONFIG-X-144: File name cannot be unpacked. Error: description. Source: Explanation: Action: NWCONFIG.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-147: A NetWare disk partition already exists on this drive. Source: Explanation: Action: NWCONFIG.NLM A physical disk drive can only have one NetWare partition. This message appears when attempting to create a NetWare disk partition on a disk that already has one. If a new NetWare disk partition must be created, delete the existing NetWare disk partition. This destroys the data on the current NetWare disk partition.
-
Manual 99a July 17, 2001 38 154: No accessible drives have NetWare partitions. Proceeding to locate NSS volumes. Source: Explanation: Action: NWCONFIG.NLM The installation program cannot find a NetWare disk partition. If no disk partitions have been created, make one. 156: Volume name already exists. Try another name. Source: Explanation: Action: NWCONFIG.NLM A volume name was entered that is already defined on the server. Use a unique volume name. NWCONFIG-X-157: Volume name cannot be created.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-160: Warning: Adjacent disk segments do not line up. Source: Explanation: Action: NWCONFIG.NLM An internal system error has occurred. Try again. If the problem persists, contact a Novell support provider. NWCONFIG-X-161: Volume name is currently mounted and cannot be deleted. Source: Explanation: Action: NWCONFIG.NLM A volume must be unmounted before it can be deleted. Dismount the volume; then delete the volume.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-166: THIS NETWARE DISK PARTITION IS CURRENTLY MIRRORED with other NetWare partitions. You may now choose to remove this partition; however it is recommended that you first unmirror this partition. Source: NWCONFIG.NLM Action: Unmirror the NetWare disk partition. NWCONFIG-X-168: The maximum number of NetWare disk partitions (8) has already been assigned to this mirrored partition group. Source: NWCONFIG.NLM Action: Do not try to mirror more than eight disks.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-172: The selected disk cannot be tested at this time. Insufficient memory is available to begin another test. Source: Explanation: Action: NWCONFIG.NLM Either a previous test is being conducted on the disk, or the server does not have enough memory. Wait until a previous test is completed. If necessary, increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide.
-
Manual 99a July 17, 2001 38 NWCONFIG-X-178: Two volume segments with the same sync value have mismatched data. message Source: Explanation: Action: NWCONFIG.NLM NWCONFIG found multiple instances of the same volume. This probably occurred because two physical disks each contain a volume with the same name. Because each volume on a given server must have a unique name, take one of the physical disks offline. You might have to delete one of the volumes and then bring the disks online simultaneously.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-182: A FAT table length error has occurred on volume name. There should be number FAT blocks, but the FAT table length is number blocks. Source: Explanation: Action: NWCONFIG.NLM Errors have occurred in the volume structure. See Resolving Volume I/O Errors in the Traditional File Services Administration Guide. NWCONFIG-X-183: The volume cannot be locked at this time because another process is using it. Perhaps a surface test is being performed.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-187: Warning: The name of volume old_name was changed to both new_name and second_new_name. Source: Explanation: Action: NWCONFIG.NLM An internal system error has occurred. Contact a Novell support provider. NWCONFIG-X-188: Warning: The name of volume old_name was changed to new_name and the name of volume old_name was changed to new_name. Source: Explanation: Action: NWCONFIG.NLM An internal system error has occurred. Try again.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-191: Two or more volume were found which have the same name. (Volume name has multiple definitions for segment number.) This could be due to formerly mirrored volumes being synchronized separately, then brought online together. If this is the case, unload the drivers or take the server down, and then bring the separate disks online one at a time. Rename the redundant volumes as they are brought online, so that there is not a name conflict.
-
Manual 99a July 17, 2001 38 NWCONFIG-X-194: The first segment of volume name, segment number, does not start at block 0. Check to be sure all disk drivers are loaded and configured properly, and that multiple volumes do not have the same name. Source: Explanation: Action: NWCONFIG.NLM An incomplete volume was discovered. One or more segments is missing. Make sure that all segments of the volume are online, all volume names are unique, and all sure disk drivers are configured correctly.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-198: The definition for sync (or instance) number of volume name was removed. Source: NWCONFIG.NLM Explanation: Multiple volumes with the same name were found. One of them was discarded from memory. The data is still intact on disk. Action: Because each volume on a given server must have a unique name, take one of the physical disks offline. You might have to delete one of the volumes and then bring the disks online simultaneously.
-
Manual 99a July 17, 2001 38 NWCONFIG-X-209: The selected disk is no longer valid. Source: Explanation: Action: NWCONFIG.NLM The installation program can no longer access the disk drive. See Disk Errors in the Server Operating System Administration Guide. NWCONFIG-X-210: This volume is not currently mounted. Source: Explanation: Action: NWCONFIG.NLM The program tried to access a volume that was not mounted. Mount the volume and try again.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-214: Drive information could not be read. Source: NWCONFIG.NLM Explanation: An error occurred when the program attempted to read information from a disk drive. Explanation: Make sure that the drive can be accessed. See Disk Errors in the Server Operating System Administration Guide. NWCONFIG-X-214: Hot Fix for the boot partition could not be installed on the drive. Error code: code. Source: Explanation: Action: NWCONFIG.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-220: The partition table on drive number appears to be invalid. It is possible that you have not chosen the correct driver. If valid data does exist on this drive, and you do not want it destroyed, indicate No in the Confirm box that follows this message. Warning: If you indicate Yes to recreating the partition table, all existing partitions (DOS partitions, NetWare partitions, etc.) will be deleted and all existing disk data will be lost.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-228: File name is out of date. (Its version numbers are number and number, the expected values are number and number, respectively.) If you are installing from diskette, insert a diskette containing an updated file; otherwise, update the file and reinstall). Source: Explanation: Action: NWCONFIG.NLM The specified installation script file is out of date. Get a current version of the script file. NWCONFIG-X-230: File copying was cancelled. Source: NWCONFIG.
-
Manual 99a July 17, 2001 38 NWCONFIG-X-234: The name volume_name already exists in the segments list. Source: Explanation: Action: NWCONFIG.NLM The volume name that the segment is being assigned to already exists. Choose a new name. NWCONFIG-X-235: File name cannot be opened. Error: description. Source: Explanation: Action: NWCONFIG.NLM This error could result from inadequate disk space on a NetWare volume or from a corrupted diskette.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-240: Volume name cannot be locked because another process is using it. Volume configuration cannot proceed. Source: Explanation: Action: NWCONFIG.NLM Another process or NLM is using the volume. Wait to see if the process releases the device then retry the action. If there is a disk device error, unload NLM programs (except device drivers) that might be using the disk and dismount volumes from the disk.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-245: An error occurred during parsing of file name on disk disk_description, line number, at or near word or symbol name. Error description: description Source: Explanation: Action: NWCONFIG.NLM A syntax error was encountered while reading the above file. If you are writing the script or description file, follow the specifications for creating the file. If you are not creating the file, contact a Novell support provider.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-249: NLM_name did not finish unloading in the time allowed (number seconds). Control will be switched to the system console screen, where you may either see it finish or enter information to finish loading it. Source: NWCONFIG.NLM Explanation: The specified NLM did not unload in the time allotted. You might have to enter information to complete the unload process.
-
Manual 99a July 17, 2001 38 NWCONFIG-X-257: The volume label on this diskette (description) matches the volume label of one of the installation diskettes. Change the volume label on the diskette. Source: Explanation: Action: NWCONFIG.NLM The volume label on your diskette is the same as a volume label on one of the NetWare installation diskettes. Change the volume label on your diskette. NWCONFIG-X-258: This diskette cannot be written to. Source: Explanation: Action: NWCONFIG.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-262: No installation file (*.IPS or PINSTALL.NLM) could be found at path path. Source: NWCONFIG.NLM Explanation: The necessary product installation files are not locatable in the specified path. Action: Specify a new path that points to the directory containing PINSTALL.NLM or a file with the extension IPS. If you are loading the file from a diskette, insert the installation diskette containing this file.
-
Manual 99a July 17, 2001 38 NWCONFIG-X-267: Directory path path either is invalid or does not contain the desired file (name). Source: Explanation: Action: NWCONFIG.NLM The specified path does not exist, does not contain the file, or contains invalid characters. Enter a valid path. NWCONFIG-X-268: The specified directory path is invalid. Press F3 (or F4 if applicable) and enter a new path. Source: Explanation: Action: NWCONFIG.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-272: One or more partitions on drive number are inconsistent with the driver geometries (number heads, number sectors, and number cylinders) that NetWare is using. You may continue and edit the partitions anyway, although this inconsistency could create problems later on. Source: Explanation: Action: NWCONFIG.NLM The size of the partition is not an even multiple of the number of heads, sectors, and cylinders on the drive.
-
Manual 99a July 17, 2001 38 NWCONFIG-X-277: Driver name is loaded multiple times (re-entrantly). All instances of the driver will be unloaded if you confirm Yes in the menu following this message. Source: Explanation: Action: NWCONFIG.NLM Unloading this driver might affect multiple devices that the driver controls. For instance, a LAN driver might control multiple network boards, or a disk driver might control multiple disks.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-283: The command line string for driver name was too long and could not be generated. Source: Explanation: Action: NWCONFIG.NLM NWCONFIG has a limited buffer for generating a command line to use when loading driver files. The parameters you desire require a command line longer than NWCONFIG can generate. Load the driver from the system console, providing the parameters by hand. NWCONFIG-X-284: A value must be entered for parameter name.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-288: A recoverable initialization problem occurred with parameter value. You may continue anyway. Source: NWCONFIG.NLM Explanation: The value supplied for a parameter caused a problem, but NWCONFIG was able to recover from the error. Action: None. This message is for information only. NWCONFIG was able to recover from the error. NWCONFIG-X-289: Value value is not in the list of acceptable values. Source: Explanation: Action: NWCONFIG.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-298: Driver name on line number has no FRAME= parameter. All new Ethernet drivers that have no frame specified will now default to Ethernet 802.2 frame type, whereas they previously used 802.3. Specify a frame parameter for this driver. Source: NWCONFIG.NLM Action: If you want a frame type different from the default, you will need to specify it later.
-
Manual 99a July 17, 2001 38 NWCONFIG-X-304: A physical device or partition in the set you selected is no longer valid. Source: Explanation: Action: NWCONFIG.NLM The device might have been powered off or in some other way made invisible to NWCONFIG. Correct the problem and retry the operation. NWCONFIG-X-305: Driver name was successfully loaded but not bound to any protocol stacks. Press Enter to continue. Source: NWCONFIG.
-
Manual Action: 99a 38 July 17, 2001 If the path points to a diskette drive, make sure that you are using the correct diskette and that you have inserted it properly into the diskette drive. Otherwise, specify the correct path to locate these files. NWCONFIG-X-309: No LAN driver files (*.LAN) were found at this path. Source: Explanation: Action: NWCONFIG.NLM The indicated files were not found at this location.
-
Manual 99a July 17, 2001 38 NWCONFIG-X-314: The limit for maximum number of segments per volume (name) has been reached for all volumes. This segment cannot be added to any of them. Source: Explanation: Action: NWCONFIG.NLM You might create a new volume using this segment, but you might not add it to any existing volume. Proceed as appropriate for your situation.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-319: NWCONFIG cannot get the root directory entry for volume name. Source: Explanation: Action: NWCONFIG.NLM The root directory (/) was not readable. See Resolving Volume I/O Errors in the Traditional File Services Administration Guide. NWCONFIG-X-320: The bindery upgrade failed. Some of the bindery objects will have to be created and/or trustee rights changed manually later using Novell eDirectory workstation utilities. Source: Explanation: Action: NWCONFIG.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-323: This option invoked NLM name, which cannot be loaded remotely. Install this product from the server console. Source: Explanation: Action: NWCONFIG.NLM The product installation script for this product has tried to load an NLM. However, NLM programs cannot be loaded remotely.‘ The existing product installation script will not work remotely. You will have to install this product at the server console. NWCONFIG-X-324: The context you specified is incomplete.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-327: Context name could not be created. Verify that the context path is entered correctly and that object name has supervisor rights on the parent of the new context in eDirectory. Also, if you entered the context name manually, make sure it follows all the proper containment and syntax rules for a valid full context specification. Source: Explanation: Action: NWCONFIG.NLM NWCONFIG could not determine the reason that the context could not be created.
-
Manual 99a July 17, 2001 38 NWCONFIG-X-334: Enter a new name for object name. Source: Explanation: Action: NWCONFIG.NLM You entered an invalid Novell eDirectory object name. Enter a valid object name. NWCONFIG-X-335: An object with name name already exists. Choose a different name. Source: Explanation: Action: NWCONFIG.NLM You attempted to assign an object name that already has been assigned to a Novell eDirectory object. Choose a new object name.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-340: There are users logged into this server. Remove all user connections and try to install Novell eDirectory again. Source: Explanation: Action: NWCONFIG.NLM You cannot install Novell eDirectory while users are logged in to the server. Clear the users’ connections and retry the operation. NWCONFIG-X-341: A console command (command) did not finish executing in the time allowed (number seconds).
-
Manual Action: 99a July 17, 2001 38 Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. If the server has at least 500 KB of free memory, contact a Novell support provider. NWCONFIG-X-346: A tree or server with the same name (name) already exists. Choose a different name. Source: Explanation: Action: NWCONFIG.NLM Another Novell eDirectory tree exists on the network with the same name.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-350: The total space required by files that will be copied (number MB; number bytes) is larger than the free space available on the system volume (number MB; number bytes). Because some files may be overwritten and replaced, you may have sufficient space, but that cannot be determined at this point.
-
Manual Action: 99a July 17, 2001 38 See Resolving Volume I/O Errors in the Traditional File Services Administration Guide. For information on the specific error code, search the Error Codes online documentation (http://www.novell.com/documentation/ lg/nwec/docui/index.htm). NWCONFIG-X-355: The network number must be non-zero. Enter a different number. Source: Explanation: Action: NWCONFIG.NLM You entered a zero for the network address. Enter a nonzero number.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-359: Novell eDirectory has previously been installed on this server. Do NOT reinstall unless absolutely necessary. eDirectory is a database of information distributed across multiple servers. If you reinstall, and if this server contains the only replica of a partition that has links to other subordinate partitions, all subordinate partition information on OTHER servers will become invalid.
-
Manual 99a July 17, 2001 38 NWCONFIG-X-365: The Directory ID cannot be removed from volume name. Source: Explanation: Action: NWCONFIG.NLM An internal error occurred which prevented clearing of an ID field on the volume. Perhaps the volume is read-only. Contact a Novell support provider. NWCONFIG-X-366: A virtual device does not have a mirror set that can be displayed or modified. Source: Explanation: Action: NWCONFIG.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-394: No LAN drivers are currently loaded. Installation from a remote server requires access to the network. A LAN driver must be loaded and bound to a protocol stack on this server. Source: Explanation: Action: NWCONFIG.NLM A network connection is required to install from a remote server. Without a LAN driver being loaded and bound to a protocol, a network connection cannot be created. Load a LAN driver and bind it to a protocol.
-
Manual 99a July 17, 2001 38 NWCONFIG-X-405: No disk drivers were found by this program; it could not complete auto mirroring. Source: Explanation: Action: NWCONFIG.NLM The disk driver has been unloaded, or a major internal error has occurred. Backup and reload disk drivers. If the problem persists, contact a Novell support provider. NWCONFIG-X-406: This program could not find the other IO engine; it could not complete auto mirroring. Source: NWCONFIG.
-
Manual Action: 99a 38 July 17, 2001 Verify that the correct disk driver is loaded. Try installing again. If the problem persists, contact a Novell support provider. NWCONFIG-X-410: This program was unable to get redirection information; it could not complete auto mirroring. Source: Explanation: Action: NWCONFIG.NLM This program is no longer able to see the hard disk. Verify that the correct disk driver is loaded. Try installing again. If the problem persists, contact a Novell support provider.
-
Manual 99a July 17, 2001 38 NWCONFIG-X-414: This program could not find any NetWare partitions on the new computer; it did not complete auto mirroring. Source: Explanation: Action: NWCONFIG.NLM This program is no longer able to see the hard disk. Verify that the correct disk driver is loaded. Try installing again. If the problem persists, contact a Novell support provider. NWCONFIG-X-415: Both computers do not have the same number of NetWare partitions. This program did not complete auto mirroring.
-
Manual Action: 99a 38 July 17, 2001 Verify that you are doing what you want done. Back up any needed data from the new server's NetWare volume; then go to the Create Partition screen and delete and re-create the offending partition. NWCONFIG-X-419: The original server's NetWare partition is orphaned, cloned or non-operational. This program did not complete auto mirroring. Source: Explanation: Action: NWCONFIG.NLM There is a problem reading the original server's NetWare partition.
-
Manual 99a July 17, 2001 38 NWCONFIG-X-423: The original server computer's NetWare partition is larger than the new computer's partition; it did not complete auto mirroring. Source: Explanation: Action: NWCONFIG.NLM The original server's NetWare partition is larger than the allowed maximum difference for mirroring. You can either shrink the original server's partition or increase the new computer's partition. NWCONFIG-X-425: Warning: You do not have a disk driver loaded.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-428: Warning: You do not have LAN drivers loaded on both server computers. You need to load the proper LAN drivers to complete the installation. Source: Explanation: Action: NWCONFIG.NLM The server communicates with the network card through a LAN driver. Installation could continue, but communication with other servers will not exist until a LAN driver is loaded. Load the correct LAN driver on both computers.
-
Manual 99a 38 July 17, 2001 the server to see the network, and the shared LAN driver allows the client to see the network. Action: Load the correct sharing LAN driver. There is a line in the CONFIG.SYS file that loads the corresponding sharing driver on the client (TOKENSHR, TOKENLNK, or LANSHARE). NWCONFIG-X-434: Some NetWare disk partitions already exist. NWCONFIG will delete them (including the files, user data, etc.) and create new ones if you confirm Yes in the box that follows this message.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-438: Some NetWare disk partitions already exist on the new server computer. NWCONFIG will delete them (including the files, user data, etc.) and create new ones if you confirm Yes in the box that follows this message. Only NetWare (not DOS or other) partitions on the new computer will be deleted if you confirm Yes. WARNING: To preserve the data on existing NetWare partitions on the new computer, confirm No. Source: Explanation: Action: NWCONFIG.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-451: Warning: A file that is being installed would downgrade existing file name to an older version. Currently installed software that uses this file may not work correctly if you allow it to be overwritten. It probably should not be overwritten. However, in the confirm box that follows, you may continue and overwrite this file anyway, if you wish to. Source: Explanation: Action: NWCONFIG.NLM An existing file on the server is about to be overwritten.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-456: A complete Novell eDirectory user distinguished name is required for an eDirectory login. Expanding names with trailing periods is not allowed here because there is no previous name context established before the eDirectory login. Source: Explanation: Action: NWCONFIG.NLM Expanding names with trailing periods can only been done within an established context. If no context has been defined, the full distinguished name must be entered.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-461: Warning: This server cannot currently contact other servers that must be notified before removing Novell eDirectory from this server. You should make sure all servers in this eDirectory tree are up and visible from the network. Source: NWCONFIG.NLM Explanation: When you remove Novell eDirectory, all the servers containing replica information need to be informed of the change. If these others servers are not informed, their databases could be corrupted.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-465: Warning: The root (main) partition for Novell eDirectory tree name exists only on this server. If you continue, all objects in this eDirectory tree will be destroyed; all servers in this tree must be reinstalled, and all current user accounts, print queues, etc. will be deleted. Do NOT confirm yes in the box that follows unless this is what you want. Source: NWCONFIG.
-
Manual 99a July 17, 2001 38 NWCONFIG-X-469: The organization name must have at least 1 character. Source: Explanation: NWCONFIG.NLM This message is for information only. NWCONFIG-X-471: User Admin for organization name could not be authenticated. Verify that you have the correct password. Source: Explanation: Action: NWCONFIG.NLM The correct password for the Admin user in the given organization is required for authentication. Enter the correct password for the Admin user.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-479: Warning: An attempt to open configuration file AUTOEXEC.NCF failed. This may be due to volume SYS: being dismounted or inaccessible. You may still configure drivers, but later you will have to manually add the LOAD commands to the configuration file if you want the driver LOAD operations to remain after the server reboots. Source: NWCONFIG.NLM Explanation: Due to an internal error, the load commands will not be automatically inserted into the AUTOEXEC.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-482: This server is a single reference time source. If there is another directory-enabled server in this eDirectory tree, before you continue to remove eDirectory you should: 1) Press Alt+Esc and enter Set Timesync Type = Secondary at the console prompt. 2) Go to another directory-enabled server in this eDirectory tree, a server that has the time set correctly, and enter Set Timesync Type = Single at the console prompt.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-484: Warning: NWCONFIG has detected that no disk mirroring has been configured. This is allowable, but not recommended, because disk mirroring is an important part of full mirrored-server fault tolerance. Source: Explanation: Action: NWCONFIG.NLM Disk mirroring is an important part of full mirrored-server fault tolerance. Before continuing with NWCONFIG, establish disk mirroring. NWCONFIG-X-485: Warning: Some problems still exist with disk mirroring.
-
Manual 99a July 17, 2001 38 NWCONFIG-X-490: NWCONFIG.NLM could not move the old pre-4.1 NDS container audit file name to the root of the SYS: volume. Old audit information will not be available for the corresponding container. Source: NWCONFIG.NLM Action: If old audit information is necessary, contact a Novell support provider. NWCONFIG-X-491: A NetWare boot partition should be created on at least one of the devices so that NWCONFIG.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-503: The installation NLM failed to set the correct creation date and time of the language configuration file LCONFIG.SYS. Source: NWCONFIG.NLM Action: None. This message is for information only. NWCONFIG-X-504: Bindery files have been upgraded previously on this server. In the screen that follows, you may elect to re-upgrade if you desire.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-524: NWCONFIG.NLM could not import from NWPA certain functions that are required for device scanning. Autodiscovery of CDMs is not possible. Choose a CDM by selecting the Select Additional or Modify Selected Disk/LAN drivers option. Source: NWCONFIG.NLM Explanation: When you tried to load device drivers, NetWare could discover the adapter, but could not discover CDMs.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-527: NWCONFIG.NLM could not register with NWPA.NLM an inquiry function that is required for device scanning. Autodiscovery of CDMs is not possible. Choose a CDM by selecting the Load an Additional Driver option. Source: Explanation: Action: NWCONFIG.NLM For some reason, NWCONFIG was unable to search for hardware and load drivers automatically. Try unloading and reloading NWCONFIG. If the problem still occurs, contact Novell Technical Support.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-540: The file server name, internal IPX net number, or key pair of the Server object you wish to restore is different from one that previously existed. The restoration cannot proceed. Source: NWCONFIG.NLM Explanation: The Server object to be restored must be identical to one that existed before. Action: Make sure that the file server name, internal IPX net number, and key pair are the same as those of the previous server object.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-546: The attempt to redirect server references failed, error code number. Source: Explanation: Action: NWCONFIG.NLM The attempt to move a master replica failed. Run DSREPAIR on the server you tried to move the replica to. Delete and reinstall Novell eDirectory. NWCONFIG-X-547: The attempt to restore server references failed, error code number. Source: Explanation: Action: NWCONFIG.
-
Manual 99a July 17, 2001 38 NWCONFIG-X-549: Warning: An attempt to open configuration file AUTOEXEC.NCF failed. Error code: number. You may still configure PSMs, but later you will have to manually add the LOAD commands to the configuration file if you want the driver LOAD operations to remain after the server reboots. Source: Explanation: Action: NWCONFIG.NLM The AUTOEXEC.NCF file could not be opened. It might be corrupted or it might have been accidentally deleted. To view the AUTOEXEC.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-555: Index for saveData out of range in Mirror DeleteAction(). Source: Explanation: Action: NWCONFIG.NLM If you tried to delete a partition from a mirrored group, one of the disks in the group is offline. You can still delete the partition from the mirrored group. NWCONFIG-X-557: This volume is not a legitimate SYS: volume. If you are renaming a volume back to SYS:, make certain that you name the correct volume back to SYS:.
-
Manual 99a July 17, 2001 38 NWCONFIG-X-580: Internal Error: No IPX/SPX symbols available. Source: Explanation: Action: NWCONFIG.NLM The IPXSPX NLM is not in SYS:SYSTEM. It was probably not loaded. Try loading IPXSPX.NLM manually into SYS:SYSTEM. If the file has been deleted, copy it from the NetWare installation CD. NWCONFIG-X-581: The installation program was unable to modify Novell eDirectory information. The error code returned was number. Source: Explanation: Action: NWCONFIG.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-586: Failed to initialize NWI.NLM. Source: Explanation: Action: NWCONFIG.NLM NWI NLM drives modules used to preinstall servers with NetWare. The NWI module could not be started, possibly due to low memory. Provide more memory. Contact the server vendor if problem continues. NWCONFIG-X-587: Failed to load SLP.NLM, probably because it is not in the search path. Source: Explanation: Action: NWCONFIG.
-
Manual Action: 99a 38 July 17, 2001 If your NetWare 6 server already has an eDirectory database, no action is necessary. If NWCONFIG could not upgrade an earlier version of the eDirectory database, try running DSREPAIR on the existing database, then try upgrading the database again. If this fails to solve the problem, contact Novell Technical Services. NWCONFIG-X-594: No device was found with at least number free which is the minimum required for the SYS: volume.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-601, 602: API failed with code number. Source: NWCONFIG.NLM Explanation: A Media Manager call failed. There might be a hardware or driver problem, or there might be an inconsistency between the partition table and the disk geometry. Action: Make sure drives are on line and drivers loaded. Look for disk or driver problems. Try setting the server parameter Ignore Disk Geometry to On. (Load MONITOR.NLM and select Server Parameters > Disk > Ignore Disk Geometry.
-
Manual 99a 38 July 17, 2001 NWCONFIG-X-608: The attempt to authenticate to server name by user name failed. Error: number Source: NWCONFIG.NLM Explanation: The specified server might not be in the tree, the user might not have used the correct password, or a LAN problem could prevent authentication. Action: Make sure the server is in the tree and the password is correct.
-
Manual 99a 38 July 17, 2001 Error getting partition information. Source: Explanation: Action: NWCONFIG.NLM NWCONFIG tried to get partition information, but received an error. There might be a drive or controller problem. Troubleshoot the drive and controller. Error occurred while retrieving partition table. Source: Explanation: Action: NWCONFIG.NLM Media Manager was queried for partition information and returned an error. There might be a problem with the drive or controller.
-
Manual 99a July 17, 2001 38 Error file name: original size number, new size number. Source: Explanation: Action: NWCONFIG.NLM An error occurred when the system tried to copy NetWare files over existing NetWare files. Try to copy the files again. Error file name, offset number: original number, new number. Source: Explanation: Action: NWCONFIG.NLM An error occurred when the system tried to copy NetWare files over existing NetWare files. Try to copy the files again.
-
Manual 444 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a July 17, 2001 38 NWPA Messages The following includes messages from NWPA.NLM. NWPA-X-004: The CDM driver deactivated device name due to a device failure. Source: Explanation: Action: NWPA.NLM The device specified in name was deactivated by the .cdm driver because the device failed. The device is probably going bad or has already gone bad. Try reactivating the device using monitor.nlm. If this does not work, try a power-on reset.
-
Manual 446 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a July 17, 2001 38 NWSNUT Messages The following includes messages from NWSNUT.NLM. NWSNUT-X-9: CreatePortal was unable to create a portal. Source: Possible Cause: Action: NWSNUT.NLM The server does not have enough available memory. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. NWSNUT-X-10: ComputePortalPosition was called with height=number, and width=number. Source: NWSNUT.
-
Manual 99a 38 July 17, 2001 NWSNUT-X-13: AlignChangedList could not find element name in the current list. Source: NWSNUT.NLM Possible Cause: This is an error within the calling NLM program. The values passed to this NUT call were incorrect. Action: Retry the operation. If the problem persists, contact the vendor of the NLM program. NWSNUT-X-14: GetListIndex could not find element name in the current list. Source: NWSNUT.NLM Possible Cause: This is an error within the calling NLM program.
-
Manual 99a July 17, 2001 38 NWSNUT-X-20: EditPortalString returned an error of code. Source: Possible Cause: Action: NWSNUT.NLM This is an internal system error. Retry the operation. If the problem persists, contact the vendor that supplied the software. For information about a specific error code, search the Error Codes online documentation (http://www.novell.com/documentation/lg/ nwec/docui/index.htm). NWSNUT-X-23: AppendToList failed to add an entry to the current list.
-
Manual 99a 38 July 17, 2001 NWSNUT-X-27: The number must be between number and number. Source: NWSNUT.NLM Possible Cause: This is an error within the calling NLM program. The values passed to this NUT call were incorrect. Action: Retry the operation. If the problem persists, contact the vendor of the NLM program. NWSNUT-X-28: The number must be between number and number. Source: NWSNUT.NLM Explanation: This is an error within the calling NLM program.
-
Manual Action: 99a July 17, 2001 38 If you are a developer, review the documentation for this function and modify the program accordingly. NWSNUT-X-38: Function function_name returned an error code of number. Source: Possible Cause: Action: NWSNUT.NLM This is an internal system error. Retry the operation. If the problem persists, contact the vendor that supplied the software.
-
Manual 99a 38 July 17, 2001 NWSNUT-X-42: The maximum number of arguments (number) in SelectFromMessages was exceeded. Source: Possible Cause: NWSNUT.NLM This is an error within the calling NLM program. The values passed to this NUT call were incorrect. Action: If purchased software displays this error, contact the supplier of the software. Action: If you are a developer, review the documentation for this function and modify the program accordingly.
-
Manual 99a 38 July 17, 2001 NWSNUT-X-47: This NLM contains no messages. Source: NWSNUT.NLM Possible Cause: The calling NLM passed a NULL to NUT for the messageTable parameter. However, the calling NLM did not have any messages linked into it. This must be done with the messages parameter to NLMLINKP or NLMLINKR. Action: The calling NLM program must pass a valid message table pointer, or it must have messages linked in properly.
-
Manual 454 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a July 17, 2001 38 NWTAPE Messages The following includes messages from NWTAPE.CDM. NWTAPE.CDM: WARNING! Driver has not been tested with device_name. The driver has bound to the device to provide Generic support. Contact the device manufacturer for a full-functioned driver. Source: Explanation: Action: NWTAPE.CDM This driver has not been tested and certified by Novell. Contact the manufacturer to get a driver that fully supports the device and that has been tested by Novell.
-
Manual Action: 99a 38 July 17, 2001 Refer to the documentation that came with the device to see if the device can be made SCSI-2 compliant by setting the appropriate jumpers. If not, replace the device with one that is SCSI-2 compliant. NWTAPE.CDM: ERROR! Device name errored attempting to execute a command command. Source: Explanation: Action: NWTAPE.CDM There are problems with the hardware device that prevented it from executing either a read or a write. Repair or replace the device. NWTAPE.
-
Manual 99a 38 July 17, 2001 Novell Certificate Server Messages The following includes messages from PKI.NLM. NOVELL CERTIFICATE SERVER-X-1: PKI.NLM could not initialize cryptographic services, or cryptographic services are not available Source: Possible Cause: PKI.NLM The server does not have a valid server base license. A Master License Agreement (MLA) is not sufficient to enable NICI.
-
Manual 99a 38 July 17, 2001 NOVELL CERTIFICATE SERVER-X-3: PKI.NLM could not get country and code page identifiers. Source: PKI.NLM Possible Cause: The Unicode* tables that the server was configured to use (when the server was installed) have become corrupted or have been deleted. Possible Cause: Read errors occurred on the Unicode file. Possible Cause: The Unicode file specified by the code page does not exist.
-
Manual 99a 38 July 17, 2001 Possible Cause: The Unicode file specified by the code page does not exist. Possible Cause: The internal contents of the Unicode translation file have become corrupted or are invalid. Action: Ensure that the files in the SYS:LOGIN\NLS directory are those from the NetWare® installation and that they are not corrupted. The file that could not be read from this directory is _UNI.001 or UNI_.
-
Manual 99a 38 July 17, 2001 NOVELL CERTIFICATE SERVER-X-6: PKI.NLM could not create an NDS context. Source: Possible Cause: Action: PKI.NLM The NetWare® operating system does not have enough resources (most likely memory) to create an Novell eDirctory® context. Do one or more of the following until the problem is resolved: Add memory to the server. Unload any unnecessary NLMTM programs. If possible, reconfigure the server's SET parameters to provide more memory to the server, then reload PKI.NLM.
-
Manual Action: 99a 38 July 17, 2001 Resolve the specific problem indicated by the preceding Novell Certificate Server error message, then reload PKI.NLM. If it is necessary to call Novell Technical Support, please be ready to report the entire text of the preceding error message, including any numbers appearing after the text of the PKI error message.
-
Manual 462 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a 38 July 17, 2001 Policy Manager Messages The following includes messages from POLIMGR.NLM. POLICY MANAGER-(X-1): Unable to get a resource tag for the policy manager. There may be a memory problem. Source: Explanation: Action: POLIMGR.NLM The operating system is unable to allocate a resource tag. Reboot the server. POLICY MANAGER-(X-2): Unable to get the memory resource tag for the policy manager. There may be a memory problem. Source: Explanation: Action: POLIMGR.
-
Manual 99a 38 July 17, 2001 POLICY MANAGER-(X-4): Unable to get an AES event tag for the policy manager. There may be a memory problem. Source: Explanation: Action: POLIMGR.NLM There is a problem in registering for an event. Reboot the server or add more memory to the server. POLICY MANAGER-(X-5): Unable to register policy manager function. Source: Explanation: Action: POLIMGR.NLM The license service is unable to register with the server operating system. Reboot the server.
-
Manual 99a 38 July 17, 2001 POLICY MANAGER-(X-9): License validation failed due to lack of memory. Source: Possible Cause: Action: POLIMGR.NLM The server is low on memory. Unload an NLM or add more memory. POLICY MANAGER-(X-10): License validation failed due to lack of memory. Source: Possible Cause: Action: POLIMGR.NLM The server is low on memory. Unload an NLM or add more memory. POLICY MANAGER-(X-11): Connection license certificate is not valid. Source: Possible Cause: Action: POLIMGR.
-
Manual 99a 38 July 17, 2001 POLICY MANAGER-(X-13): Unable to get a connection license. The Challenge Check Response failed on server servername. Source: Explanation: Possible Cause: Action: Possible Cause: Action: POLIMGR.NLM The server doesn't have enough resources to check the challenge. The operating system might have failed. Reboot the server. The server doesn't have enough memory. Add more memory. POLICY MANAGER-(X-15): Unable to obtain a network connection license. Operation will continue.
-
Manual Possible Cause: Action: 99a 38 July 17, 2001 If the activation key is not embedded (and you had to enter the key manually), you might have incorrectly entered one or more characters. Reinstall the license or get an envelope that has the correct activation key. POLICY MANAGER-(X-19): Unable to get a connection license. Source: Explanation: Action: POLIMGR.NLM A licensing error occurred while getting a connection license. Verify NLS functionality by using NLSTRACE.
-
Manual 99a 38 July 17, 2001 POLICY MANAGER-(X-26): The server base license or the activation key for the server base license, requested for server servername, is corrupt. Please remove and reinstall the server base license(s). Source: Explanation: Possible Cause: Action: POLIMGR.NLM The activation key for the license certificate is invalid. If the activation key is not embedded (and you had to enter the key manually), you might have incorrectly entered one or more characters.
-
Manual Possible Cause: Action: 99a 38 July 17, 2001 The operating system failed. Check the operating system. POLICY MANAGER-(X-30): Server base license certificate used to get a license for the server servername is not valid. Source: Explanation: Possible Cause: Action: POLIMGR.NLM The digital signature on the server base license certificate is corrupted or invalid. SERVER.EXE does not match the license certificate for a server base license. You might have a beta version of SERVER.
-
Manual 99a 38 July 17, 2001 POLICY MANAGER-(X-32): Unable to get a server base license for server servername due to the Check Response failure. Source: Explanation: Possible Cause: POLIMGR.NLM Check Response failed while requesting a server base license. The license certificate is corrupted or an incorrect version. Action: Reinstall the certificate. Action: Get and install the correct certificate. Possible Cause: Action: SERVER.EXE does not match the license certificate.
-
Manual Possible Cause: Action: 99a 38 July 17, 2001 The operating system failed. Verify operating system functionality. POLICY MANAGER-(X-47): Unable to allocate memory for the policy manger procedures on server servername. The network administrator needs to investigate this problem. Source: Explanation: Action: POLIMGR.NLM A memory problem has occurred. Unload an NLM or add more memory. POLICY MANAGER-(X-49): Unable to get a connection license.
-
Manual 99a 38 July 17, 2001 POLICY MANAGER-(X-85): Unable to register a Server Down notify event for the policy manager. Source: Explanation: Action: POLIMGR.NLM NLS is unable to register for an OS event. Reboot the server. POLICY MANAGER-(X-89): Server servername was unable to obtain a valid server base license. Source: Explanation: Action: POLIMGR.NLM The server base license is corrupted. Reinstall the server base license.
-
Manual 99a 38 July 17, 2001 POLICY MANAGER-(X-99): Unable to request a connection license because there is no connection license policy name. The server base license for server servername probably has not been installed yet. Source: Explanation: Possible Cause: Action: Possible Cause: Action: Possible Cause: Action: POLIMGR.NLM The server has not obtained a server base license. The server base license is not installed. Install the license. The license certificate is corrupted. Reinstall the license.
-
Manual 99a 38 July 17, 2001 POLICY MANAGER-(X-A): Unable to alloc serverBaseLicMutex. Source: Possible Cause: Action: POLIMGR.NLM NLS is unable to request Mutex from the server operating system. Reboot the server.
-
Manual 99a July 17, 2001 38 PSERVER Messages The following includes messages from PSERVER.NLM. PSERVER-X-2: Insufficient memory is available to initialize client communications. Source: Possible Cause: Action: PSERVER.NLM The server running PSERVER does not have enough available memory to run the print server. Increase the memory available at the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide.
-
Manual 99a 38 July 17, 2001 PSERVER-X-8: The program cannot initialize the kernel. Source: Possible Cause: Action: PSERVER.NLM The print server might not have enough available memory to initialize. Increase the memory available at the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. PSERVER-X-9: The program cannot create a console process. Source: Possible Cause: Action: PSERVER.
-
Manual 99a July 17, 2001 38 PSERVER-X-18: There is insufficient memory for the print server to add an additional printer. Source: Possible Cause: Action: PSERVER.NLM The print server does not have enough available memory for another printer. Increase the memory available at the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. PSERVER-X-19: The program cannot create client service processes. Source: Possible Cause: Action: PSERVER.
-
Manual 99a 38 July 17, 2001 PSERVER-X-64: Insufficient memory is available to create the main menu. The print server console will be disabled. Source: Possible Cause: Action: PSERVER.NLM The print server might not have enough available memory to initialize. Increase the memory available at the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. PSERVER-X-79: The program cannot create the server status form. Source: Possible Cause: Action: PSERVER.
-
Manual 99a July 17, 2001 38 PSERVER-X-89: The print server is already attached to too many NetWare servers and cannot attach to NetWare server name. Source: PSERVER.NLM Possible Cause: A print server queue can be serviced by up to 25 print servers. Twenty-five servers are already attached and servicing this queue. Action: If the print server needs to service this queue, detach one of the other print servers from the queue. PSERVER-X-90: NetWare server name is unknown at this time.
-
Manual 99a 38 July 17, 2001 PSERVER-X-93: NetWare server name does not respond. Source: Possible Cause: Action: PSERVER.NLM The specified server is down. No action can be taken until the server is up and running again. PSERVER-X-94: You cannot attach to NetWare server name at this time. Source: Possible Cause: Action: PSERVER.NLM A network error prevented the print server from attaching to the specified server. Try again. If the problem persists, contact a Novell support provider.
-
Manual 99a 38 July 17, 2001 To delete the print server, run PCONSOLE, select Print Server Information, and delete the print server from the list. Then re-create the print server. To delete accounting, run NetWare Administrator and select Accounting, then select Accounting Servers. Delete all servers from the list. Press and answer Yes to the prompt to remove accounting. Then reinstall accounting. PSERVER-X-97: Account on NetWare server name was disabled because of intruder detection.
-
Manual 99a 38 July 17, 2001 PSERVER-X-100: Login was attempted at an unauthorized time. The supervisor on NetWare server name has limited the times when the print server can log in. Source: Explanation: Action: PSERVER.NLM Specific time periods have been established when you can use the print server. You cannot use the print server until the next authorized time period. Give the user a list of authorized time periods. PSERVER-X-101: Login was attempted from an unauthorized station.
-
Manual 99a July 17, 2001 38 PSERVER-X-105: The print server's password on NetWare server name has expired. Please change it. Source: Possible Cause: Action: PSERVER.NLM The password for logging in to the print server must be changed periodically. The time period for using the current password expired. If you are an authorized print server operator or network supervisor, change the password. PSERVER-X-106: Access to NetWare server name denied.
-
Manual 99a 38 July 17, 2001 PSERVER-X-111: Insufficient memory is available for the buffer for printer number, name. The printer was not initialized. Requested buffer size was number KB. Source: PSERVER.NLM Action: Increase the memory available at the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. PSERVER-X-112: Insufficient memory is available to initialize printer number, name. Source: Possible Cause: PSERVER.
-
Manual 99a 38 July 17, 2001 PSERVER-X-115: The program cannot create the printer driver process for printer number, name. The printer is not initialized. Source: Explanation: Action: PSERVER.NLM The print server might not have enough available memory to initialize. Increase the memory available at the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. PSERVER-X-123: Network printer communications are not initialized. Network printers cannot be installed.
-
Manual 99a 38 July 17, 2001 PSERVER-X-128: Print queue name was not added to the list of queues to be serviced by printer number, name, because it was already in the list. Source: Explanation: Action: PSERVER.NLM Two queues in the list of queues to be serviced have the same name. Delete the duplicate queue named in the list. PSERVER-X-129: Print queue name cannot be serviced by printer number, name, because a print queue operator has disabled print servers from attaching to the print queue.
-
Manual 99a 38 July 17, 2001 PSERVER-X-133: Insufficient memory is available to add queue name to printer number, name. The queue will not be serviced by this printer. Source: Possible Cause: Action: PSERVER.NLM The print server might not have enough available memory to initialize. Increase the memory available at the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. PSERVER-X-137: Insufficient memory is available to create a printer list.
-
Manual 99a 38 July 17, 2001 PSERVER-X-174: The program cannot create network printer communications processes. Source: Possible Cause: Action: PSERVER.NLM The print server might not have enough available memory to initialize. Increase the memory available at the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. PSERVER-X-176: Insufficient memory is available to get an IPX socket resource tag for print server communication.
-
Manual 99a July 17, 2001 38 PSERVER-X-182: Insufficient memory is available to get an interrupt resource tag for the print server. Source: Possible Cause: Action: PSERVER.NLM The print server might not have enough available memory to initialize. Increase the memory available at the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. PSERVER-X-183: An error occurred during attempt to write to the audit file name. The entry was not logged.
-
Manual 99a 38 July 17, 2001 PSERVER-X-186: Insufficient memory is available to get an AES event resource tag. Source: Possible Cause: Action: PSERVER.NLM The print server might not have enough available memory to initialize. Increase the memory available at the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. PSERVER-X-190: Insufficient memory is available to add a new print queue. Source: PSERVER.
-
Manual 99a July 17, 2001 38 PSERVER-X-217: The print server could not get a Directory Services context handle. Error code: code. Source: Explanation: Action: PSERVER.NLM eDirectory returned an error to PSERVER during an attempt to establish a context handle. For information about the error code displayed, search the Error Codes online documentation (http://www.novell.com/documentation/lg/nwec/docui/ index.htm). PSERVER-X-224: The program cannot initialize the notification process.
-
Manual 99a 38 July 17, 2001 PSERVER-X-242: An error (code) occurred during attempt to add object name to the notification list. This object will not be notified of printer errors for printer number, name. Source: PSERVER.NLM Action: For information about the error code displayed, search the Error Codes online documentation (http://www.novell.com/documentation/lg/nwec/docui/ index.htm). PSERVER-X-247: Attempt to add printer name as printer number failed. A printer already exists with that number.
-
Manual Possible Cause: Action: 99a July 17, 2001 38 The directory where the print server configuration file is located has been deleted. Verify that the directory exists and that the print server has sufficient rights to write to the directory and file. PSERVER-X-275: The print server encountered an error (code) while attempting to set a Directory Services context handle. Source: PSERVER.
-
Manual 99a 38 July 17, 2001 PSERVER-X-279: The print server encountered an error (code) while attempting to access the directory. Source: PSERVER.NLM Action: For information about the error code displayed, search the Error Codes online documentation (http://www.novell.com/documentation/lg/nwec/docui/ index.htm). PSERVER-X-280: The print server was unable to build a list of objects in the directory. An unexpected Directory Services error occurred while attempting to read the directory.
-
Manual 99a July 17, 2001 38 RConsoleJ Messages This section explains the following error messages you might encounter using the Remote Console utility (RConsoleJ) and the actions to take: “Cannot Connect to...” on page 495 “Connected to a proxy at...” on page 495 “Connection failed” on page 495 “Not a proxy at...” on page 496 “Unknown host” on page 496 Cannot Connect to... Possible Cause: RConsoleJ cannot connect to the target or the proxy server indicated in this message.
-
Manual 99a 38 July 17, 2001 Not a proxy at... Possible Cause: Action: The server, whose IP address or the DNS name was entered in the Proxy Address field, is not functioning as a proxy server. Ensure that RCONPRXY.NLM on the server is using the required port. Unknown host Possible Cause: Action: Possible Cause: Action: The IP or IPX address, or the DNS or server name of the target server, was not found. Enter a valid server name and try again. The server might be down. Restart the server.
-
Manual 99a July 17, 2001 38 RCONAG6 Messages The following includes messages from RCONAG6.NLM. RCONAG6:ERROR /dev/nspx Cannot open transport endpoint Source: RCONAG6.NLM Possible Cause: The SPXS NLM was probably not loaded on a NetWare 3 or NetWare 4 target server prior to loading RCONAG6. Action: Load the SPXS NLM on your NetWare 3 or NetWare 4 target server prior to loading RCONAG6.
-
Manual 498 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a 38 July 17, 2001 RCONPRXY Messages The following includes messages from RCONPRXY.NLM. RCONPRXY: ERROR Cannot connect the Agent transport endpoint. Source: Possible Cause: Action: RCONPRXY.NLM The RCONAG6 on the target server is not listening on the address specified in the message. Verify the port number being used by RCONAG6 on the target server. RCONPRXY: ERROR Cannot get IP nor IPX address for `SERVER'. Source: Possible Cause: Action: RCONPRXY.
-
Manual 99a 38 July 17, 2001 RCONPRXY: ERROR Listener Cannot bind transport endpoint. Source: Possible Cause: Action: RCONPRXY.NLM The TCP listening port specified is probably being used by another application. When loading RCONPRXY, specify a listening port that is not being used by another application.
-
Manual 99a July 17, 2001 38 REQUESTR Messages The following includes messages from REQUESTR.NLM. REQUESTR-X-001: All NCPs will retry number times if needed. Source: Possible Cause: Action: REQUESTR.NLM The module REQUESTR.NLM has been loaded with a command line switch that resets the number of retries to the number indicated in the message. This is an informational message. REQUESTR-X-002: No protocol support available. Applications requiring communications and communications protocols will fail.
-
Manual 99a 38 July 17, 2001 REQUESTR-X-1001:Notice: No IPX or SPX protocol primitives presently available. Source: Possible Cause: Action: REQUESTR.NLM The IPX/SPX protocol has not been loaded. This is an informational message. REQUESTR-X-1002: Notice: No UDP or TCP/IP protocol primitives presently available. . Source: Possible Cause: Action: REQUESTR.NLM The UDP and TCP/IP protocols have not been loaded. This is an informational message.
-
Manual 99a July 17, 2001 38 RIGHTS Messages The following includes messages from RIGHTS.EXE. RIGHTS-X-125: You must have Access rights in order to modify rights. Source: RIGHTS.EXE Explanation: The user does not have the appropriate rights to change user rights in the specified path. Action: If appropriate, grant the user the Access Control right in the desired path. RIGHTS-X-130: There is insufficient memory for this utility to execute properly. Source: RIGHTS.
-
Manual 99a 38 July 17, 2001 RIGHTS-X-250: An error prevented the trustee from being added. Source: RIGHTS.EXE Explanation: RIGHTS failed to add the rights or trustee. The bindery or Novell Directory Services file may be corrupted, the user may not have a valid connection to the server, or an internal program error may have occurred. Action: Make sure the user is connected to the server and the server is operating. Restart RIGHTS and try again.
-
Manual 99a 38 July 17, 2001 RIGHTS-X-550: The system was unable to get the rights. Error code: code. Source: Explanation: Action: RIGHTS.EXE The rights requested did not execute successfully. The bindery or Novell Directory Services file may be corrupted, the user may not have a valid connection to the server, or an internal program error may have occurred. Make sure the user is connected to the server and the server is operating. Restart RIGHTS and try again.
-
Manual 99a 38 July 17, 2001 RIGHTS-X-675: This utility was unable to get the connection information. Source: Explanation: Action: RIGHTS.EXE RIGHTS could not get the connection information. The bindery or Novell Directory Services file may be corrupted, the user may not have a valid connection to the server, or an internal program error may have occurred. Make sure the user is connected to the server and the server is operating. Restart RIGHTS and try again.
-
Manual 99a 38 July 17, 2001 RIGHTS-X-727: RIGHTS was unable to get the servername. Source: Explanation: Action: RIGHTS.EXE RIGHTS could not get the name of the server. The bindery or Novell Directory Services file may be corrupted, the user may not have a valid connection to the server, or an internal program error may have occurred. Make sure the user is connected to the server and the server is operating. Restart RIGHTS and try again. If the problem persists, contact a Novell support provider.
-
Manual 99a 38 July 17, 2001 RIGHTS-X-800: An error occurred attempting to get directory information for file filename. Error code: code. Source: Explanation: Action: RIGHTS.EXE RIGHTS could not get the directory information for the filename displayed in the message. For information about a specific error code, search the Error Codes online documentation (http://www.novell.com/documentation/lg/nwec/docui/ index.htm). RIGHTS-X-825: Open is only valid with NetWare 2.x.
-
Manual 99a July 17, 2001 38 RIGHTS-X-909: You are not mapped to the specified drive. Source: RIGHTS.EXE Action: See message “909: You are not mapped to the specified drive.” on page 777 RIGHTS-X-910: This utility was unable to parse the specified path. Source: RIGHTS.EXE Action: See message “910: This utility was unable to parse the specified path.” on page 777 RIGHTS-X-911: This utility works on directories only for NetWare v2.15. Source: RIGHTS.
-
Manual 99a 38 July 17, 2001 RIGHTS-X-925: This utility is not supported on Personal NetWare servers. Use the Personal NetWare utilities. Source: RIGHTS.EXE Action: Use the equivalent Personal NetWare utility. RIGHTS-X-970: The attempt to open the Unicode table files failed. Source: RIGHTS.EXE Action: See message “970: The attempt to open the Unicode table files failed.” on page 781 RIGHTS-X-971: The workstation does not have enough memory to load the Unicode table files. Source: RIGHTS.
-
Manual 99a July 17, 2001 38 RIGHTS-X-975: The Unicode table files cannot be opened because there are already too many open files. Close some files or modify your CONFIG.SYS file. Source: RIGHTS.EXE Action: See message “975: The Unicode table files cannot be opened because there are already too many open files. Close some files or modify your CONFIG.SYS file.” on page 783 RIGHTS-X-998: The message file found (utility_name.MSG) is an incorrect version. The correct version is number.
-
Manual 512 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a 38 July 17, 2001 Runtime Libraries Messages The following includes messages from CLIB.NLM, FPSM.NLM, NIT.NLM, NLMLIB.NLM, LIB0.NLM, REQUESTR.NLM, and THREADS.NLM. Novell Runtime Libraries-X-001: Name (number) cannot be loaded until FPSM.NLM(number) is updated! Source: Novell Runtime Libraries Possible Cause: The Runtime Libraries and fpsm.nlm have different internal version numbers. Action: Make sure that the runtime libraries (CLIB.NLM, FPSM.NLM, NIT.NLM, NLMLIB.NLM, LIB0.NLM, REQUESTR.
-
Manual 99a 38 July 17, 2001 Novell Runtime Libraries-X-003: Name (number) cannot be loaded until Threads.NLM(number) is updated! Source: Possible Cause: Action: Novell Runtime Libraries The Runtime Libraries and threads.nlm have different internal version numbers. Make sure that the runtime libraries (CLIB.NLM, FPSM.NLM, NIT.NLM, NLMLIB.NLM, LIB0.NLM, REQUESTR.NLM, and THREADS.NLM) are all the same version. These NLM programs are usually distributed as a set.
-
Manual 99a 38 July 17, 2001 Novell Runtime Libraries-X-006: Name (number) cannot be loaded until NIT.NLM(number) is updated! Source: Possible Cause: Action: Novell Runtime Libraries The Runtime Libraries and nit.nlm have different internal version numbers. Make sure that the runtime libraries (CLIB.NLM, FPSM.NLM, NIT.NLM, NLMLIB.NLM, LIB0.NLM, REQUESTR.NLM, and THREADS.NLM) are all the same version. These NLM programs are usually distributed as a set.
-
Manual 99a 38 July 17, 2001 Novell Runtime Libraries-X-012: Name failed to allocate an internal mutex or semaphore: (name). There may not be enough server memory or server memory may be corrupted. Source: Possible Cause: Action: Novell Runtime Libraries The library was unable to allocate memory for the resource. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide.
-
Manual 99a 38 July 17, 2001 SBCON Messages These messages are generated by the SBackup Console (SBCON) module. SBCON-X-7: Screen allocation error Source: Possible Cause: Action: SBCON.NLM There is not enough memory on the server. Unload SBCON.NLM and QMAN.NLM Reduce the transfer buffer size in the configuration file, SYS:\ETC\SMS\SBACKUP.CFG, then reload QMAN.NLM and SBCON.NLM again. If the problem persists, upgrade the server memory and try again.
-
Manual 99a 38 July 17, 2001 SBCON-X-23: No services are available. Source: Possible Cause: Action: SBCON.NLM The workstation TSAs have not been registered to the TSAProxy. 1. Make sure the workstation TSA is running. 2. Set the preferred server through the TSA interface and submit the registration. 3. Retry the operation. If the problem persists, contact your Novell support provider. SBCON-X-27: The specified user does not exist. Source: Possible Cause: Action: SBCON.
-
Manual 99a July 17, 2001 38 SBCON-X-36: Error listing the resource Source: Possible Cause: Action: SBCON.NLM For workstation TSAs, none of the drives have been exported. Export some of the drives using the TSA interface. Retry the operation. If the problem persists, contact your Novell support provider. SBCON-X-41: Error creating the portal Source: Possible Cause: Action: SBCON.NLM The maximum number of windows has been created. Close some of the windows and try again.
-
Manual 99a 38 July 17, 2001 SBCON-X-58: Error inserting into list. Source: Possible Cause: Action: SBCON.NLM There was an error scanning the data set. Try connecting to the TSA again, then select the data set. SBCON-X-60: No TSAs are available on the selected server. Source: Possible Cause: Action: SBCON.NLM No TSAs have been loaded. Load the appropriate TSA (TSA600.NLM, TSANDS.NLM, TSADOSP.NLM, or GWTSA.NLM). Retry the operation. If the problem persists, contact your Novell support provider.
-
Manual 99a 38 July 17, 2001 SBCON-X-84: An invalid message number is generated. Source: Possible Cause: Action: SBCON.NLM The nutlib.msg file is the wrong version. Obtain the latest nutlib.msg from Novell for the appropriate local language and install it in the Sys:\system\nls\language\ directory. SBCON-X-100: Error error_number occurred during the engine's attempt to open directory name. Source: Possible Cause: Action: SBCON.NLM The permissions were not sufficient to browse the directory.
-
Manual 99a 38 July 17, 2001 SBCON-X-175: Scheduling not enabled Source: Possible Cause: SBCON.NLM The scheduling information for the job is corrupted or it is wrong. Perhaps other applications have tried to submit a job to the job queue. Action: Make sure the job queue is being used by Enhanced SBACKUP only. Action: If the job file is corrupted, enter the scheduling information again, but unexpected results might occur. Action: Delete the job and try again.
-
Manual 99a July 17, 2001 38 SBCON-X-197: No connection is available to SMSDI. Source: Possible Cause: Action: SBCON.NLM The SMSDI.NLM module is not loaded. Load SMSDI.NLM at the console prompt. SBCON-X-198: No device and media are found with the given name. Source: Possible Cause: Action: Possible Cause: Action: Possible Cause: Action: Possible Cause: Action: SBCON.NLM The device driver for the tape device/host adapter is not loaded. Load the correct device driver.
-
Manual 99a 38 July 17, 2001 SBCON-X-201: No device is reserved. Source: Possible Cause: Action: SBCON.NLM None of the devices is available for use. Free a device and retry the operation. If the problem persists, contact a Novell support provider. SBCON-X-202: The device cannot be reserved. Source: Possible Cause: Action: SBCON.NLM The device is in use by another application. Check if you have opened the device on the client interface or if another job is running. Retry the operation.
-
Manual 99a July 17, 2001 38 SBCON-X-206: Destination slot is not empty. Source: Possible Cause: Action: SBCON.NLM You tried to move media into a slot that was not empty. Move the media into a slot that is empty. See the media list to determine which slots are empty. SBCON-X-207: The media in the device is being used. Source: Possible Cause: Action: SBCON.NLM Another job is running on the same media you are trying to access. Wait for the job to complete before running another job. Retry the operation.
-
Manual 99a 38 July 17, 2001 SBCON-X-211: The media cannot be reserved. Source: SBCON.NLM Possible Cause: All the media are busy or no medium is present. The media is being used by another job. Action: Wait for the medium to be released by the application or insert a new medium in a device. Close the other application and try again. SBCON-X-212: The media sequence is null. Source: Possible Cause: Action: SBCON.NLM The server is out of memory. Unload SBCON.NLM and QMAN.
-
Manual 99a July 17, 2001 38 SBCON-X-221: The media name is invalid. Source: Possible Cause: Action: SBCON.NLM The media name in the job file is not the same as the media loaded when the job began. Locate the correct media and insert it into the device. Retry the operation. SBCON-X-224: The source slot is not reserved. Source: Possible Cause: Action: SBCON.NLM The backup or restore source is missing. No medium exists in the location where the medium needs to be moved.
-
Manual 99a 38 July 17, 2001 SBCON-X-306: An error occurred while connecting to the TSA. Source: SBCON.NLM Possible Cause: The TSA is not loaded or there may be another problem with the TSA. Possible Cause: Enhanced SBACKUP could not connect to the TSA. Action: Load the TSA. If the TSA is loaded, unload and reload the TSA and SMDR. Retry the operation. SBCON-X-307: No Backup/Restore Target Services were found on this server. Source: Possible Cause: SBCON.
-
Manual 99a July 17, 2001 38 SBCON-X-318: QManager: Error executing job name: error_number Source: Possible Cause: Action: SBCON.NLM An error occurred while executing the job. See the activity log, Sys:system\tsa\log\activity.log, for the cause of the failure. SBCON-X-319: QManager: Job name was found to be deleted unexpectedly! Source: Possible Cause: Action: SBCON.NLM You deleted a job while it was active. Enhanced SBACKUP does not allow you to delete an active job.
-
Manual 99a 38 July 17, 2001 SBCON-X-429: No media is present. Source: Possible Cause: Action: SBCON.NLM No media is present in the device. Insert the medium and retry the operation. SBCON-X-453: CRCs do not match Source: Possible Cause: Action: SBCON.NLM The medium may be corrupted. Replace the media and retry the operation. If the problem persists, contact a Novell support provider. SBCON-X-454: Could not get the CRC FID Source: Possible Cause: Action: SBCON.NLM The medium may be corrupted.
-
Manual Action: 99a July 17, 2001 38 Create the directory if it has been deleted. If the file is open, close the application that is using the file. Make sure the activity file is not marked as Read Only. Retry the operation. SBCON-X-468: No error files exist in this directory. Source: Possible Cause: Action: SBCON.NLM The session and error file were deleted. Create the session and error files. SBCON-X-469: No log files exist in this directory. Source: Possible Cause: Action: SBCON.
-
Manual 99a 38 July 17, 2001 SBCON-X-494: Verification failed Source: Possible Cause: Action: SBCON.NLM The medium is corrupted. Replace the media and retry the operation. SBCON-X-495: Verification error Source: Possible Cause: Action: SBCON.NLM The medium is corrupted. Replace the media and retry the operation. SBCON-X-509: Errors occurred in This Session: Source: Possible Cause: Action: SBCON.NLM The error log file reported the errors that occurred in this session.
-
Manual 99a July 17, 2001 38 SBCON-X-522: An error occurred in the restore job. Source: Possible Cause: Action: SBCON.NLM The restore job could not be completed. Check the activity log file in Sys:system\tsa\log\activity.log for the error. SBCON-X-525: No media is present. Source: Possible Cause: Action: SBCON.NLM Some of the slots are empty in the Autoloader. This message is for information only. SBCON-X-528: Could not execute the job: job_name Source: Possible Cause: SBCON.
-
Manual 99a 38 July 17, 2001 Action: Check that the device is on, contains a media, and the device drivers are loaded. Action: Load SMSDI.NLM after loading the device drivers. SBCON-X-540: Could not create session file: filename. Error code Source: Possible Cause: Action: Possible Cause: SBCON.NLM The session file was already open. None required. The user does not have rights to the directory. Action: Make sure the directory rights are correct.
-
Manual 99a July 17, 2001 38 SERVER Messages The following includes messages from SERVER.EXE. SERVER-X-6: Invalid screen ID passed to screen manager. Module: name. Code offset in module: offset. Source: Explanation: Possible Cause: Action: SERVER.EXE An NLM (the module named in the message) tried to print to a nonexistent screen. The NLM is probably an outdated version or is corrupted. Replace the NLM with an updated or uncorrupted copy. SERVER-X-83: Stack overflow detected by kernel.
-
Manual Action: 99a 38 July 17, 2001 Check disks to make sure they are functioning correctly. If the disk system is functioning, then contact the NLM vendor. SERVER-X-113: Error reading MT unsafe API list in NLM's XDC data. Source: SERVER.EXE Explanation: There was an error reading part of an NLM. The NLM might be corrupted or there might be a disk problem. Action: Check disks to make sure they are functioning correctly. If the disk system is functioning, then contact the NLM vendor.
-
Manual 99a 38 July 17, 2001 SERVER-X-202: Detected user thread hogging the CPU. Source: SERVER.EXE Explanation: A thread running in a protected address space has not relinquished the CPU, causing the address space to fault. Action: How the server responds to the fault depends on whether the Memory Protection Fault Cleanup parameter is set to On or Off and whether the address space is restartable. See Memory Parameters and Managing Server Memory in the Server Operating System Administration Guide.
-
Manual 99a 38 July 17, 2001 resources that were tracked. Resource tracking provides statistical information about how many resources are being used. It also protects the file server from loadable modules that try to use more than their share of resources and forces them to relinquish all their resources when unloaded. The old API calls work; however, they are slower than the new API calls. Action: Contact the vendor of the NLM for an updated version.
-
Manual 99a 38 July 17, 2001 SERVER-X-508: Invalid resource tag passed to RegisterHardwareOptions. Source: SERVER.EXE Explanation: An NLM was trying to register hardware that it needed to use. The server detected that the resource tag passed as a parameter to the RegisterHardwareOptions routine was not valid. The hardware was not registered, and the server returned an error to the NLM. The NLM will not be able to perform properly.
-
Manual 99a 38 July 17, 2001 SERVER-X-518: RemoveHardwareOptions called with invalid pointer. Source: Explanation: Possible Cause: Action: SERVER.EXE When a LAN or disk driver tried to unload, it called the RemoveHardwareOptions function with an invalid pointer. This error probably indicates an outdated driver. Update the offending LAN or disk driver with a newer version. If the problem persists, contact a Novell support provider.
-
Manual 99a July 17, 2001 38 SERVER-X-587: CreateProcess called with stack size too small. Source: Explanation: Possible Cause: Action: SERVER.EXE The system tried to load an NLM that allocated an inadequate amount of stack space for itself. The NLM is outdated or corrupted. Try reloading the NLM from its original media and try again. If the problem persists, contact the vendor for an updated version of the NLM. SERVER-X-588: CreateProcess could not allocate a process control block. Source: SERVER.
-
Manual 99a 38 July 17, 2001 SERVER-X-618: Invalid startup command: string. Source: Explanation: Action: SERVER.EXE A command other than LOAD or SET was issued from within a startup.ncf file. Edit the startup.ncf and delete any commands other than LOAD or SET. For more information, see Using Server Batch Files in the Server Operating System Administration Guide. SERVER-X-701: Api_name was called with work to do already enqueued. Source: Explanation: Action: SERVER.
-
Manual Action: 99a 38 July 17, 2001 Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. If memory is not the problem, try running VREPAIR; then restart the system. Warning: If you delete the volume, all data will be destroyed. You will have to restore the data from a backup. If the problem persists, make sure a volume backup exists. Delete the volume, re-create it using NWCONFIG, and restore the data from the backup.
-
Manual Possible Cause: Action: 99a 38 July 17, 2001 An internal program error occurred in the NLM. If the problem does not appear to be memory related, contact a Novell support provider and provide an accurate account of the circumstances that led to the error so the support provider can re-create the problem and find a solution. SERVER-X-817: Swap-in failed (error_code, hexadecimal_error_code). This may cause a program to terminate unexpectedly. Source: SERVER.
-
Manual 99a 38 July 17, 2001 SERVER-X-831: Process_name Process did not relinquish control frequently. Module: name. Code offset in module: offset. Source: SERVER.EXE Explanation: Normally, NLM programs relinquish control of certain resources when a higher priority request comes in or when a certain process is completed. This message indicates that the NLM is not relinquishing control when it should, preventing higher priority processes from executing.
-
Manual Action: 99a 38 July 17, 2001 Check the spelling of the path name; make sure the path begins with a volume name or a DOS drive letter. SERVER-X-882: Insufficient memory to add search path. Source: Explanation: Action: SERVER.EXE The SEARCH ADD command was used, but the server cannot allocate memory to expand the search path mapping. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide.
-
Manual 99a July 17, 2001 38 SERVER-X-918: LOADER cannot find public symbol: API_name for module name. Source: Explanation: Action: SERVER.EXE The loader could not find the module's public symbol name in the Public Symbol table. Complete one of the following: If you are a user, see the documentation for the NLM. Another module must be loaded before this module. If you are a developer, verify the spelling of the symbol. Make sure the module that defined this symbol made it public.
-
Manual 99a 38 July 17, 2001 SERVER-X-982: Insufficient memory for Command Process Resource tags. Source: Possible Cause: Action: SERVER.EXE The server is low on contiguous memory. Add more memory or unload unnecessary NLM programs. SERVER-X-983: Error allocating semaphores for Command Line Services Source: Possible Cause: Action: SERVER.EXE Server is extremely low on memory. Add more memory. SERVER-X-992: Command file processor unable to allocate work buffer. Source: Possible Cause: Action: SERVER.
-
Manual 99a July 17, 2001 38 SERVER-X-1002: The preferred language message file for this NLM is out of sync with the NLM; the default language will be used. Source: Explanation: Possible Cause: Action: SERVER.EXE The language message file contains a different number of messages than the NLM header file specifies. The NLM and the message file are probably not the same version; one has probably been updated but the other has not Use message and NLM files that are the same version.
-
Manual 99a 38 July 17, 2001 SERVER-X-1134: Invalid load file format. Source: Explanation: Possible Cause: Action: SERVER.EXE The description text field of an NLM was invalid. This field should contain text (about the NLM) that is greater than zero and less than 128 characters long. The NLM in this case did not meet these criteria. This problem is due to manufacturer error, NLM corruption, or disk malfunction. Reload the NLM from the master CD-ROM or diskette.
-
Manual 99a 38 July 17, 2001 SERVER-X-1155: Node number configuration is NOT supported and was ignored. Source: Explanation: SERVER.EXE This is an informational message indicating that you specified a node number for a driver that does not allow you to specify a node number. SERVER-X-1159: Repeated send retries number ignored. Source: Explanation: SERVER.EXE This is an informational message given when a driver is loaded and the number of send retries is repeated. The repeated number was ignored.
-
Manual 99a 38 July 17, 2001 SERVER-X-1229: Unsupported frame type setting ignored. Source: Explanation: Possible Cause: Action: SERVER.EXE A specified frame type was ignored when the LAN driver was loaded. The LAN driver might not support the frame type or the frame type might already be loaded. If necessary, replace the driver with one that does support the specified frame type. SERVER-X-1278: QueueEventReport failed to allocate memory. Source: Explanation: Action: SERVER.
-
Manual 99a 38 July 17, 2001 SERVER-X-1310: Filename is not a packed NLM. Source: Possible Cause: Action: SERVER.EXE This file might not be an NLM at all. Make sure that the file the server is loading is really an NLM. Possible Cause: The user is trying to load a file as an NLM that is not packed as NLM programs should be. Action: If the server is still having problems, replace the problem NLM with a copy of the original.
-
Manual 99a 38 July 17, 2001 SERVER-X-1318: Read past end of read buffer. Source: Explanation: Possible Cause: Action: SERVER.EXE While an NLM was being loaded, a read error occurred. The system did not recognize the end-of-file marker. Try to reload the original NLM. If the original NLM file is corrupted, contact the vendor of the NLM. SERVER-X-1319: Error number reading source file. Source: Severity: Explanation: Possible Cause: Action: Possible Cause: Action: SERVER.
-
Manual 99a July 17, 2001 38 SERVER-X-1345: FreeObject detected corrupt preceeding redzone for object number. Source: Explanation: Action: SERVER.EXE Memory might be corrupted. Replace memory or contact your support provider. SERVER-X-1346: FreeObject detected object number is already free. Source: Explanation: Action: SERVER.EXE There is probably an internal programming error in the NLM. Contact the NLM vendor.
-
Manual 99a 38 July 17, 2001 SERVER-X-1401: Invalid resource tag passed to ParseDriverParameters. Source: Possible Cause: Action: SERVER.EXE An NLM tried to register a driver parameter, but the module did not create a resource tag for the process. Contact the vendor for an updated version of the NLM. SERVER-X-1512: Invalid load file format. Source: Explanation: Possible Cause: Action: SERVER.EXE When you tried to load a module, the server did not recognize the module as an NLM.
-
Manual 99a July 17, 2001 38 SERVER-X-1534: Device name deactivated by driver due to device failure. Source: Explanation: Action: SERVER.EXE This is a hardware error that usually generates other messages. Look for other messages for additional information about the problem. See Disk Errors in the Server Operating System Administration Guide. SERVER-X-1535: Device name deactivated due to user request. Source: Explanation: SERVER.
-
Manual 99a 38 July 17, 2001 SERVER-X-1542: Module name is a NIOS only NLM. Source: Explanation: Action: SERVER.EXE This NLM cannot be run on a server; it must be run on a client. Run the NLM on a client workstation; or choose a different NLM to load on the server. SERVER-X-1543: Could not redirect block number on device number. Source: Possible Cause: SERVER.
-
Manual 99a July 17, 2001 38 SERVER-X-1547: Error reading load file. Source: Severity: Explanation: Possible Cause: Action: SERVER.EXE Warning The operating system tried to load an NLM, but the process failed. Internal errors relating to the NLM occurred. The NLM is corrupted. Load a new copy of the NLM from the master diskette. Possible Cause: Physical disk errors in the loading process occurred. The disk system is faulty.
-
Manual 99a 38 July 17, 2001 SERVER-X-1550: Load file defines a public variable that has already been defined. Source: Explanation: Action: SERVER.EXE While the system was loading an NLM, it found that one or more of the module's public variables had been defined previously. An NLM cannot use a previously defined public variable, because system integrity could be compromised. This error is not fatal. The NLM will continue to load until all previously defined symbols have been listed to screen.
-
Manual 99a 38 July 17, 2001 SERVER-X-1555: Address space name is not an unloadable address space. Source: Explanation: Action: SERVER.EXE You attempted to unload an address space that was autoloaded by an NLM, such as JAVA, and is required for the NLM to function. Such address spaces cannot be unloaded manually. Unload the NLM; this will automatically unload the associated address space. SERVER-X-1563: Redirection table inconsistencies on device number cannot be corrected.
-
Manual 99a 38 July 17, 2001 SERVER-X-1600: Address space name is not an unloadable address space. Source: Explanation: SERVER.EXE See “SERVER-X-1555: Address space name is not an unloadable address space.” on page 561. SERVER-X-1601: Invalid Address Space State (number). Source: Explanation: Action: SERVER.EXE You tried to load a module into an address space that had been shut down because it faulted or experienced a cleanup failure. Although the address space was shut down, it was not deleted.
-
Manual 99a July 17, 2001 38 SERVER-X-1631: Error number: getting information for name volume. Explanation: See “SERVER-X-1587: Error number: getting information for name volume.” on page 561. SERVER-X-1633: Error number: deleting swap file on volume name. Source: Explanation: Possible Cause: Action: SERVER.EXE When you delete a swap file, any data in the file must be moved to another swap file. In this case, the data could not be moved.
-
Manual 99a 38 July 17, 2001 SERVER-X-1666: Expected slot number missing or invalid. Source: Explanation: Possible Cause: Action: SERVER.EXE You did not specify a slot number when loading a driver. The card for which you are loading the drive requires a slot number. Reload the driver, specifying the slot number for the card. SERVER-X-1682: I/O port number is NOT supported and was ignored. Source: Explanation: Possible Cause: Action: SERVER.
-
Manual 99a July 17, 2001 38 SERVER-X-1692: Memory address is ALREADY in use. Source: Explanation: Action: SERVER.EXE Another driver has already registered this memory address. Choose a different memory address or try loading the driver without specifying a memory address, so NetWare can choose the address. SERVER-X-1693: Memory range number to number is ALREADY in use. Source: Explanation: SERVER.EXE See “SERVER-X-1691: Memory range number to number is ALREADY in use.” on page 564.
-
Manual 99a 38 July 17, 2001 SERVER-X-1886: Unable to load SYSCALLS.NLM for memory protected execution. Source: Explanation: Possible Cause: Action: SERVER.EXE The SYSCALLS module could not be loaded. The console probably displays a message providing more information. The module might be missing or there might be problems initializing the module. Refer to the console messages for more information. SERVER-X-1899: Unable to unload module name (error number).
-
Manual 99a 38 July 17, 2001 SERVER-X-1936: Processed an NCP with a bad subfunction length, Station number (NCP number number). Source: SERVER.EXE Explanation: An NCP packet received from a client program had an invalid subfunction length, so the sub-function lengths did not add up to a valid IPX length. Possible Cause: The client program might be an outdated version or it might be corrupted. Action: Replace the offending client program with updated or uncorrupted software.
-
Manual 99a 38 July 17, 2001 SERVER-X-2004: Unable to locate MM.NLM (Media Manager) in the startup area. Source: Explanation: Action: SERVER.EXE The Media Manager is not in the server startup (boot) directory. If the Media Manager has been moved to another location, move it back to the startup directory. Otherwise, copy the Media Manager NLM from the original NetWare CD-ROM. SERVER-X-2052: Set_parameter action FAILED Source: SERVER.
-
Manual 99a July 17, 2001 38 SERVER-X-2206: FreeMovableCacheMemory found an invalid memory list. Source: Explanation: Action: SERVER.EXE Memory might be corrupted. Replace memory or contact your support provider. SERVER-X-2207: Insufficient memory to set up first load search path entry. Source: Explanation: SERVER.EXE See message “SERVER-X-872: Insufficient memory to set up first load search path entry.” on page 545. SERVER-X-2212: Unable to create address space with default name.
-
Manual 99a 38 July 17, 2001 SERVER-X-2302, 2303: FreeMovableCacheMemory found an invalid memory list. Source: Explanation: Action: SERVER.EXE Memory might be corrupted. Replace memory or contact your support provider. SERVER-X-2323: Cache memory allocator exceeded minimum cache buffer limit. Source: Explanation: Possible Cause: Action: SERVER.
-
Manual 99a July 17, 2001 38 SERVER-X-2327: The MM.NLM (Media manager) Failed to Initialize. Press any key to retry loading operation. Source: Explanation: Action: SERVER.EXE For some reason the Media Manager could not be started. The server console might display additional messages explaining the source of the problem. Refer to the server console. SERVER-X-2347: Unable to allocate memory for displaying commands. Source: Possible Cause: Action: SERVER.EXE The server is very low on memory.
-
Manual Action: 99a 38 July 17, 2001 If the Supervisor's account is still locked, you might have to run BINDFIX to locate errors and inconsistencies that might be causing problems in the bindery. SERVER-X-2509: The server name has NOT been set. Source: Explanation: Action: SERVER.EXE No file server name was specified for the SET FILE SERVER NAME command. Re-execute the command and include a valid file server name. SERVER-X-2513: Protect command has an invalid file name. Source: SERVER.
-
Manual 99a July 17, 2001 38 SERVER-X-2586: Missing message to BROADCAST. Broadcast was NOT sent. Source: Explanation: Possible Cause: Action: SERVER.EXE The BROADCAST command was not executed. No message was specified for the BROADCAST command. Re-execute the command and include a message. SERVER-X-2587: Broadcast was NOT sent. Source: Explanation: Action: SERVER.EXE The BROADCAST message was not sent, possibly because an invalid connection number was specified.
-
Manual 99a 38 July 17, 2001 SERVER-X-2600: Unable to read load file header. Source: Explanation: Possible Cause: Action: SERVER.EXE The server tried to read the NLM header but received an error. The NLM was not loaded. The NLM may be corrupted. Replace the NLM with an uncorrupted version, if possible. Contact the NLM vendor. SERVER-X-2601: Unable to read version information. Source: Explanation: Possible Cause: Action: SERVER.
-
Manual 99a 38 July 17, 2001 SERVER-X-2713: Module did not release 1 resource. Module: module Resource: resource Description: description Source: SERVER.EXE Possible Cause: An NLM failed to release an allocated resource when it was unloaded. In many cases, the NLM reclaims the resource. Unreleased resources are not available for system use if the operating system cannot recover them. This can cause memory allocation errors.
-
Manual 99a 38 July 17, 2001 SERVER-X-2973: Warning: extra input ignored (value). Source: Explanation: Action: SERVER.EXE Extra input was included when the SET command was executed. Make sure the SET parameter was executed with the correct values. Reexecute the SET command if necessary. SERVER-X-2994: Unable to allocate memory for new language name. Source: Possible Cause: Action: SERVER.EXE The operating system was unable to allocate memory for a new language name because it is out of memory.
-
Manual 99a July 17, 2001 38 SERVER-X-3332: Removed address space because of memory protection violation. Address space: name Reason: reason Running Thread: thread EIP: instruction pointer Source: SERVER.EXE Explanation: An NLM faulted ina protected address space. The address space was deleted and its resources returned to the system. Action: A core dump of the protected address space has been written to Sys. Review the core dump to help determine the source of the abend in the protected space.
-
Manual 99a 38 July 17, 2001 SERVER-X-3480: Unable to open file name; NLM not loaded. Source: Explanation: SERVER.EXE The NLM could not be opened or could not be found. Possible Cause: The file might not have been loaded, might have been deleted, or you might be specifying the wrong file or path name. Action: Make sure the NLM is loaded and that you have specified the path and file name correctly; then try again. If a NetWare module is missing, you can copy the file from the NetWare CD-ROM.
-
Manual 99a July 17, 2001 38 SERVER-X-3513: INVALID FORMAT. Source: Explanation: SERVER.EXE See message “SERVER-X-721: INVALID FORMAT.” on page 543. SERVER-X-3549: Unable to open the license file (name). string. Source: Explanation: Action: SERVER.EXE When an attempt was made to get the license document found in the file indicated, the license file could not be opened for some reason. Try reinstalling the license file using NWCONFIG. If the problem persists, contact a Novell support provider.
-
Manual 99a 38 July 17, 2001 SERVER-X-3555: Unable to get a File Size for the license file (name). string. Source: Explanation: Action: SERVER.EXE The license file size cannot be obtained. The validation process has failed and the license will not be loaded. No connections can be granted by the server. Contact a Novell support provider. SERVER-X-3557: Unable to read in the license document from the file (name). string. Source: Explanation: Action: SERVER.
-
Manual 99a July 17, 2001 38 SERVER-X-3806: Name: failed trying to rename SYS$LOG.ERR, file was deleted instead. Source: SERVER.EXE Explanation: When the sys$log.err file reached it's maximum size, it should have been renamed. The file was deleted instead, and a new sys$log.err file was created. Possible Cause: Something prevented renaming the file. For example, the file may have been open when the server tried to rename it. Action: No action is necessary. SERVER-X-3912: Invalid load file format.
-
Manual 99a 38 July 17, 2001 SERVER-X-4098: Unable to load module messages in preferred language # number; the default language #number will be used. Source: Possible Cause: Action: SERVER.EXE While loading an NLM program, the operating system was not able to find the message files for the preferred language. Instead, the operating system is using the default language message files. Enter LANGUAGE LIST at the server console prompt to see a list of languages and their numbers.
-
Manual 99a July 17, 2001 38 SERVER-X-4102: Error allocating memory for help file. Source: Possible Cause: Action: SERVER.EXE The server probably does not have enough memory to load the help file. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. If memory is not the problem, try running VREPAIR; then restart the system. Warning: If you delete the volume, all data will be destroyed.
-
Manual 99a 38 July 17, 2001 SERVER-X-4106: Swap-out failed (error_code; hexadecimal_error_code; error_code) This may have been caused by dismounting a volume being used for virtual memory swapping even though there was insufficient memory to hold all of the swap data. Source: SERVER.EXE Explanation: This message appears if a volume containing a swap file was dismounted, even though there was no other swap file to store the data and not enough memory to store the data.
-
Manual 99a July 17, 2001 38 SERVER-X-4796: ERROR MPKStubs not inserted for Externalpublics due to NVMAlloc error number. Source: Explanation: Action: SERVER.EXE The server is low on memory. Increase server memory or unload unneeded modules. SERVER-X-4797: ERROR MPKStubs not inserted for Externalpublics due to Alloc Error. Source: Explanation: Action: SERVER.EXE The server is low on memory. Increase server memory or unload unneeded modules.
-
Manual 99a 38 July 17, 2001 SERVER-X-4848: Error: Initializing swap file on volume name. Source: Possible Cause: Action: SERVER.EXE The disk where the volume resides is probably running out of space. Removed unneeded files to free disk space or replace the disk with a larger one. SERVER-X-4851: Error: Initializing swap file information on Sys: volume. Source: Possible Cause: Action: SERVER.EXE The disk where the volume resides is probably running out of space.
-
Manual 99a July 17, 2001 38 SERVER-X-5595: WARNING: number lost interrupt(s) detected on interrupt number. Lost interrupt alerts occur when there are no interrupt request bits set in the corresponding interrupt controller hardware when the processor acknowledges the interrupt. Source: Possible Cause: Action: SERVER.EXE A LAN card is probably failing. Note the interrupt number, then execute the CONFIG command at the server console prompt to see a list of installed LAN cards and their interrupts.
-
Manual 588 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a 38 July 17, 2001 SMDR Messages These messages are generated by the Storage Management Data Requester (SMDR) Module. SMDR-X-1: An internal error has occurred. An external SMDR requested a connection that cannot be opened. Source: SMDR.NLM Possible Cause: An internal error has occurred in the program. The underlying transport was unable to complete the connection transaction due to a network disruption or failure in the protocol driver (for example, SPXS.NLM, etc.).
-
Manual 99a 38 July 17, 2001 SMDR-X-4: An internal error has occurred. The SMDR was unable to allocate a listening socket. The SMDR will unload. Source: Possible Cause: Action: SMDR.NLM The server does not have enough available memory. The SMDR listens for remote SMDRs requesting local access, and uses a listening socket with the underlying transport. If no sockets are available, the SMDR cannot recognize connection requests. Increase the memory available to the server.
-
Manual 99a July 17, 2001 38 SMDR-X-8: An internal error has occurred. One or more of the parameters is null or invalid. Source: Possible Cause: Action: SMDR.NLM An internal error has occurred in the program. An SMS resource user (SBACKUP, for example) passed corrupted data to an SMS routine. There might be a bug in the program. Report the error to the vendor of the SMS compliant software. SMDR-X-9: The server is unable to allocate sufficient memory. Source: SMDR.
-
Manual 99a 38 July 17, 2001 SMDR-X-13: The SMDR received an encrypted password it could not decode. Source: Possible Cause: Action: SMDR.NLM When SMS resource users (such as SBACKUP) try to connect to remote SMS resources (TSAs or SDIs, for example), the password is encrypted and packed into an SMSP datagram. If the data is corrupted before it is sent, during transmission, or after it is received, the decryption routine will not recognize the data, and the connect attempt will fail. Try to reconnect.
-
Manual 99a 38 July 17, 2001 SMDR-X-17: An external SMDR failed to respond to the connection request. Source: SMDR.NLM Possible Cause: An invalid SMDR name was typed, or one was typed that is outside the SAP advertising scope and is therefore invisible. Visible SMDRs can remain visible somewhat longer than they are available. When SMDR is unloaded, it can still be visible to other servers for a short time.
-
Manual 99a 38 July 17, 2001 Possible Cause: This error message indicates that the workstation is available only on a protocol not supported by that SMDR, causing the redirection attempt to fail. Action: Replace the SMDR with one that supports the needed protocols and retry the operation. If the problem persists, contact a Novell support provider. SMDR-X-21: The maximum number of connections allowed through the SMDR (64) has been exceeded. Source: Possible Cause: Action: SMDR.
-
Manual 99a July 17, 2001 38 SMDR-X-25: An internal error has occurred. The SIDF data type is corrupted on overflow. Source: Possible Cause: Action: SMDR.NLM Corrupted data exists in the file or in the tape format. Retry the operation. If the problem persists, contact a Novell support provider. SMDR-X-26: An internal error has occurred. The SIDF data type is corrupted on underflow. Source: Possible Cause: Action: SMDR.NLM Corrupted data exists in the file or in the tape format. Retry the operation.
-
Manual 99a 38 July 17, 2001 SMDR-X-53: The server is unable to allocate sufficient memory. Source: Possible Cause: Action: SMDR.NLM There is not enough memory to run the operation. Increase the memory in the server. Retry the operation. If the problem persists, contact a Novell support provider. SMDR-X-54: The server is unable to allocate memory-shared memory space. Source: Possible Cause: Action: SMDR.NLM SMDR 5.0 uses shared memory for IPC. The server was not able to allocate enough space.
-
Manual 99a 38 July 17, 2001 SMDR-X-58: An internal error has occurred. The service requested is invalid. Source: Possible Cause: Action: SMDR.NLM This is an internal error that occurs when the service name or the service responder name is invalid. Report the error to the vendor of the SMS-compliant software. SMDR-X-59: An internal error has occurred. The internal structure used to maintain context is corrupted. Source: Possible Cause: Action: SMDR.NLM Corrupted data exists in the file.
-
Manual 99a 38 July 17, 2001 SMDR-X-63: An internal error has occurred. The service registered is not valid. Source: Possible Cause: Action: SMDR.NLM Services can be registered with the SMDR using the interface. The services must be present in an SMS-compliant format; otherwise, the error is reported to the screen. Report the error to the vendor of the SMS-compliant service provider. SMDR-X-64: An internal error has occurred. One or more data structures are corrupted.
-
Manual 99a 38 July 17, 2001 SMDR-X-68: Unassigned error has occurred. Source: Possible Cause: Action: SMDR.NLM This error code is not used in the current version of the SMDR. Not applicable. SMDR-X-69: An internal error has occurred. The command issued to the listener is invalid. Source: Possible Cause: Action: SMDR.NLM An unknown command has been sent to the SMDR listener. Check the commands that can be sent to the SMDR listeners. Retry the operation.
-
Manual 99a 38 July 17, 2001 SMDR-X-73: An internal error has occurred. The transport underlying SMS has failed. Source: SMDR.NLM Possible Cause: Either the connection to a remote host was lost, or there was a problem in the TLI interface of the server. Action: Reconnect to the remote server and retry the operation. If the problem persists, contact a Novell support provider. SMDR-X-74: An internal error has occurred. No protocols are available for communication. Source: SMDR.
-
Manual 99a 38 July 17, 2001 SMDR-X-77: An internal error has occurred. Reading an object from NDS or a file failed. Source: SMDR.NLM Possible Cause: A connection to the remote host was lost abruptly while reading or retrieving data from it. Action: Retry the operation. If the problem persists, contact a Novell support provider. SMDR-X-78: An internal error has occurred. Could not write an object to NDS or write to a stream. Source: SMDR.
-
Manual 99a 38 July 17, 2001 SMDR-X-82: An internal error has occurred. The stream handle is invalid. Source: Possible Cause: Action: SMDR.NLM The handle to the stream is invalid. The server may be overloaded. Retry the operation. If the problem persists, contact a Novell support provider. SMDR-X-83: An internal error has occurred. The internal buffer overflowed. Source: SMDR.NLM Possible Cause: An internal error occurred when the buffer overflowed.
-
Manual 99a July 17, 2001 38 SMDR-X-87: An attempt was made to register an entry that already exists. Source: Possible Cause: Action: SMDR.NLM A duplication of entries was attempted. This is for information only. None required. SMDR-X-88: An internal error has occurred. The required entry in the registry is not active or is being removed. Source: Possible Cause: Action: SMDR.NLM SMDR maintains a list of internal tables (shared data structures) of protocols, services, requesters, responders, etc.
-
Manual 99a 38 July 17, 2001 SMDR-X-92: An internal error has occurred. Could not connect to the specified endpoint. Source: SMDR.NLM Possible Cause: The specified remote SMDR could not be connected to. The problem could be heavy network traffic, or an incorrect server configuration. Action: Check the network connection and server configuration. Retry the operation. If the problem persists, contact a Novell support provider. SMDR-X-93: The connection to the remote host is lost.
-
Manual 99a July 17, 2001 38 SMDR-X-97: An internal error has occurred. The requested module could not be loaded. Source: Possible Cause: Action: SMDR.NLM SMDR dynamically loads the services, protocols, requesters, and responders as specified in its internal tables. These tables are configurable. The specified entry might not be present in the table to load, or it might not be present on the server at the specified location. Restart the SMDR and retry the operation.
-
Manual 99a 38 July 17, 2001 SMDR-X-101: An internal error has occurred. The underlying transport of SMS would not connect to the remote host. Source: Possible Cause: Action: SMDR.NLM There was an error binding to the remote host. Check the network configuration and the server load. Retry the operation. If the problem persists, contact a Novell support provider. SMDR-X-102: An internal error has occurred. The bindery to search the targets could not be read. Source: Possible Cause: Action: SMDR.
-
Manual Action: 99a 38 July 17, 2001 Restart and retry the operation. Check the encryter service or if the service is internal to the SMDR. If the problem persists, contact a Novell support provider. SMDR-X-106: An internal error has occurred. The Directory Services Application Programming Interfaces (DSAPIs) could not be imported. Load the NLM that exports the directory services APIs. Source: Possible Cause: Action: SMDR.NLM SMDR uses Novell eDirectory for name resolution with DSAPI.
-
Manual 99a 38 July 17, 2001 SMDR-X-110: An internal error has occurred. The transport layer's events could not be polled. Source: Possible Cause: Action: SMDR.NLM An internal error has occurred. This error is no longer used. None required. SMDR-X-111: An internal error has occurred. A symbol could not be dynamically bound. The symbol may be incorrect. Source: Possible Cause: Action: SMDR.NLM An error occurred when trying to bind a symbol. Check that the required modules are installed.
-
Manual 99a 38 July 17, 2001 SMSDI Messages These messages are generated by the SMS Storage Device Interface (SMSDI) module. SMSDI-X-256: An attempt was made to read or write when that access was not granted. Source: Possible Cause: Action: SMSDI.NLM Access has been denied because another application has reserved the requested device or medium. Before proceeding with the read or write operation, select a medium or device to which the user has access and make sure that access was granted.
-
Manual 99a 38 July 17, 2001 SMSDI-X-259: A media error was encountered, but was corrected by the driver. Source: Possible Cause: Action: SMSDI.NLM The read or write operation was successful, but the device had to use its error correction feature to recover the data. Replace the device or medium as soon as possible. SMSDI-X-260: The deviceHandle passed is invalid. Source: Possible Cause: Action: SMSDI.NLM The selected device is no longer valid or has changed. Try selecting the device again.
-
Manual 99a July 17, 2001 38 SMSDI-X-264: Early warning was detected on the media. Source: Explanation: SMSDI.NLM The medium has reached the early warning. This is dealt with by the engine. This message is for information only. SMSDI-X-265: The end of media was detected. Source: Possible Cause: Action: SMSDI.NLM The requested session was not found. Request another session or insert another medium. SMSDI-X-266: The medium has been unexpectedly changed since it was last identified. Source: SMSDI.
-
Manual 99a 38 July 17, 2001 SMSDI-X-269: An invalid message number was passed to SMSDI. Source: Possible Cause: Action: SMSDI.NLM An internal error occurred in the program that Enhanced SBACKUP was unable to handle. Write down the number of any Enhanced SBACKUP messages that are displayed with this message. Diagnose and correct the problem from the information in the Enhanced SBACKUP message if possible. Try again. If the problem persists, contact a Novell support provider.
-
Manual 99a July 17, 2001 38 SMSDI-X-273: An invalid destination location was specified. Source: Explanation: Possible Cause: Action: SMSDI.NLM The medium was not written to correctly. An internal error occurred in the program that Enhanced SBACKUP was unable to handle. Try again. If the problem persists, contact a Novell support provider. SMSDI-X-274: Data from media is valid but error correction had to be used to read. Source: Explanation: Action: SMSDI.
-
Manual 99a 38 July 17, 2001 SMSDI-X-278: While getting the list of media available, a change in the available media has occurred. Start listing the media from the beginning. Source: Possible Cause: Action: SMSDI.NLM A device was added or deleted while Enhanced SBACKUP was getting the list of devices. Select the Storage Device Administration menu again to rescan the devices. SMSDI-X-279: A file mark was encountered while reading media.
-
Manual 99a 38 July 17, 2001 SMSDI-X-282: The medium exists but is not available (for example, already subjugated by another application in a non-sharing mode). Source: Possible Cause: Action: SMSDI.NLM The requested medium has been reserved by another application. Select another medium, or find the application that has reserved the medium and free it from that application. SMSDI-X-283: The medium does not exist. Source: Explanation: Action: SMSDI.NLM The requested medium no longer exists.
-
Manual 99a 38 July 17, 2001 SMSDI-X-287: No more connections available for Alert Routines. Source: Possible Cause: Action: SMSDI.NLM An internal error occurred in the program that Enhanced SBACKUP was unable to handle. Try again. If the problem persists, contact a Novell support provider. SMSDI-X-288: No memory is available for any size block. Source: Possible Cause: Action: SMSDI.NLM The server does not have enough available memory. Increase the memory available to the server.
-
Manual 99a July 17, 2001 38 SMSDI-X-292: The request for non-share subjugation failed because the device or medium is already subjugated in share mode by another SMS application or an attempt to perform an operation on a shared medium or device which requires nonshare mode. Source: Possible Cause: Action: SMSDI.NLM In NetWare 6, this message will appear only if an internal error has occurred in the program. Try again. If the problem persists, contact a Novell support provider.
-
Manual 99a 38 July 17, 2001 SMSDI-X-296: The position requested was not located on the media. Source: Explanation: Possible Cause: Action: SMSDI.NLM The medium was not written to correctly. An internal error occurred in the program that Enhanced SBACKUP was unable to handle. Try again. If the problem persists, contact a Novell support provider.
-
Manual 99a July 17, 2001 38 SMSDI-X-300: The transfer buffer passed was not large enough to hold the entire transfer buffer from the media. SMSDI returned as much of the transfer buffer as would fit. Source: Possible Cause: Action: SMSDI.NLM An internal error has occurred in the program. Try again. If the problem persists, contact a Novell support provider. SMSDI-X-301: One or more of the requested transfer requests was not able to be canceled. SMSDI will complete those requests normally.
-
Manual 99a 38 July 17, 2001 SMSDI-X-305: The device driver or device itself returned an error. Source: Possible Cause: Action: SMSDI.NLM The device or the medium failed. Make sure the device is running and functioning properly. Check the medium. Try again. If the problem persists, contact a Novell support provider. SMSDI-X-306: An I/O function was successfully aborted. Source: Possible Cause: Action: SMSDI.NLM An internal error occurred that Enhanced SBACKUP could not handle. Try again.
-
Manual 99a July 17, 2001 38 SMSDI-X-310: The medium is write protected. Source: Possible Cause: Action: SMSDI.NLM The write protect switch on the medium is set. Use another medium or remove the write-protection from the currently selected medium. SMSDI-X-311: The device driver or device itself returned an unknown error. Source: Possible Cause: Action: SMSDI.NLM An unknown error occurred in the device driver or the device itself. Make sure the device is functioning properly.
-
Manual 99a 38 July 17, 2001 SMSDI-X-316: The sector size is not valid. Source: Possible Cause: Action: SMSDI.NLM SMS cannot support the sector size of the currently selected medium. Select a new medium. SMSDI-X-317: The medium was written in old media format and is therefore not appendable. Source: Possible Cause: Action: SMSDI.NLM The NetWare 6 version or later versions of Enhanced SBACKUP cannot append to NetWare 3.11 media. Back up to NetWare 6 or later media.
-
Manual 99a 38 July 17, 2001 SMSDI-X-321: The specific info change requested for the object is not changeable. Source: Explanation: SMSDI.NLM The application tried to change a parameter for a device or medium that the device or medium does not allow to be changed. This message is for information only. SMSDI-X-323: The magazine does not exist. Source: Possible Cause: Action: SMSDI.NLM The requested magazine no longer exists. Select another device under the Storage Device Administration menu.
-
Manual 99a 38 July 17, 2001 SMSDI-X-327: Cannot append to media written with SBACKUP version 3.11. Source: Possible Cause: Action: SMSDI.NLM While SMSDI will read Enhanced SBACKUP for NetWare 3.11 media, it will not write the NetWare 3.11 media format. Therefore, it will not append a NetWare 6.x or later session onto media that was written using NetWare 3.11 SBACKUP. Use another medium to write the requested session. SMSDI-X-328: The device is either not active or is offline. Source: SMSDI.
-
Manual 99a 38 July 17, 2001 SMSDI-X-332: Attempted to open a session for writing or write data while not at end of media. Source: Possible Cause: Action: SMSDI.NLM The engine (such as Enhanced SBACKUP) has not placed the media at the end. Media can only be appended to. Contact the third-party engine developer, or contact a Novell support provider. SMSDI-X-333: The transfer buffers have been received out of order. Source: Possible Cause: Action: SMSDI.
-
Manual Possible Cause: Action: 99a 38 July 17, 2001 An attempt to open a write session has been issued on media that already has a session open for writing. Open sessions for reading exclude all other open attempts. Wait until the currently open session finishes and retry the operation. SMSDI-X-337: NWSMSDSessionOpenForWriting excludes all further session open with different transfer buffer sizes. Source: Possible Cause: Action: SMSDI.
-
Manual 99a 38 July 17, 2001 SPXS Messages The following includes messages from SPXS.NLM. SPX-X-5: There is insufficient memory for allocation. Source: Explanation: Possible Cause: Action: SPXS.NLM SPXII was unable to allocate the requested amount of memory for the Protocol ID table or the board registration table. The server does not have enough available memory. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide.
-
Manual 99a 38 July 17, 2001 SPX-X-9: There is no LAN board registered with LSL. Source: Explanation: Action: SPXS.NLM An attempt was made to load SPXS before loading a network board. The operating system must have a board registered with the LSL with a valid IPX and SPX frame type to initialize SPXS. Load a network board. Then load SPXS again. SPX-X-10: The name device cannot be loaded by STREAMS. Source: Explanation: Possible Cause: Action: Possible Cause: Action: SPXS.
-
Manual 99a 38 July 17, 2001 SPX-X-16: SPXS requires STREAMS version version to operate correctly; initialization unable to complete. Please load correct version of STREAMS.NLM before attempting to reload SPXS. Source: Possible Cause: Action: SPXS.NLM The server is not using the correct version of stream.nlm. Get a current version of stream.
-
Manual 630 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a July 17, 2001 38 STREAMS Messages The following includes messages from STREAMS.NLM. STREAMS-X-6: The routine timeout could not allocate number bytes of memory. This may cause applications to lock up waiting for a timer event that will never happen. Source: Explanation: Possible Cause: Action: STREAMS.NLM The function could not allocate the requested number of bytes for the timer structure. Applications waiting for timer events might hang when these events do not occur.
-
Manual 99a 38 July 17, 2001 STREAMS-X-16: An invalid streamtab pointer was used for protocol device name; device cannot be installed. Source: Explanation: Possible Cause: Action: STREAMS.NLM A called function could not install the device. A pointer to the streamtab is invalid. If you have access to developer documentation, consult it for the proper streamtab pointer format. If the problem persists, contact a Novell support provider or the application developer.
-
Manual 99a July 17, 2001 38 STREAMS-X-28: Unable to allocate a queue within the sth_ipush function; module not added to stream. Source: Explanation: Possible Cause: Action: STREAMS.NLM The sth_ipush function could not allocate a queue, so the new module was not added to the stream. The server does not have enough available memory. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide.
-
Manual 99a 38 July 17, 2001 STREAMS-X-88: An undetermined cleanup error occurred with device name; unloading will continue. Source: Explanation: Possible Cause: Action: STREAMS.NLM The unloading procedure for the device will continue. The exact cause of this error is unknown. No further action is required. STREAMS-X-89: An undetermined cleanup error occurred with module name; unloading will continue. Source: Explanation: Possible Cause: Action: STREAMS.
-
Manual 99a July 17, 2001 38 STREAMS-X-95: Unable to locate signal structure in sig table list Source: Explanation: Possible Cause: Action: STREAMS.NLM The signal will be lost and the application might hang. A function was unable to locate the signal structure from within the sig table list. If the problem persists, contact a Novell support provider or the application developer. STREAMS-X-113: An undetermined initialization error occurred with device name; STREAMS cannot load successfully.
-
Manual 99a 38 July 17, 2001 STREAMS-X-116: An undetermined cleanup error occurred with module name; unloading will continue. Source: Explanation: Possible Cause: Action: STREAMS.NLM The unloading procedure for the device will continue. The exact cause of this error is unknown. No further action is required. STREAMS-X-120: Attempted to send a signal to an NLM not initialized for signals; signal ignored. Source: Explanation: Action: STREAMS.
-
Manual 99a July 17, 2001 38 TEXTUTIL-utility_name The messages listed in this section might be initiated by one or more text or print utilities. The specific utility name is shown in the prefix to the message when displayed on the screen. 10: The system could not load overlay file name_RUN.OVL. Source: utility name in message prefix prefix Possible Cause: This problem could mean the file is missing or not in the proper search path. Action: Make sure the directory where the .
-
Manual Possible Cause: Action: 99a 38 July 17, 2001 An internal problem occurred in the program. If the error persists, contact a Novell support provider. 17: The system could not create a new portal because the portal control block table is full. Source: Possible Cause: Action: utility name in message prefix Too many screens are active at one time. This is a program logic error. Contact a Novell support provider. 18: The system could not allocate additional memory.
-
Manual 99a July 17, 2001 38 21: An End_Of_File error was returned while attempting to read file name. The read request was for number bytes. Source: Possible Cause: Action: Possible Cause: Action: Possible Cause: Action: utility name in message prefix The user does not have access rights to the file. Make sure the file is flagged properly. A file is corrupted. If the user has a corrupted file, replace it, if possible. A hardware failure occurred.
-
Manual 99a 38 July 17, 2001 24: The system could not push a list onto the stack because the list stack is already full. Source: Possible Cause: Action: utility name in message prefix To initialize a new list, the old list must be pushed onto the stack. The program could not accommodate the request as described. Too many lists are active in the program at one time. This is a program logic error. Contact a Novell support provider.
-
Manual Possible Cause: Action: 99a July 17, 2001 38 A hardware failure occurred. Find out if other users and workstations are experiencing the same problem. If so, contact a Novell support provider. If the problem persists and is isolated to this workstation, check the hardware and cabling. 30: File name could not be closed. Source: Possible Cause: Action: Possible Cause: Action: Possible Cause: Action: utility name in message prefix The user does not have access rights to the file.
-
Manual Possible Cause: Action: 99a 38 July 17, 2001 A hardware failure occurred. Find out if other users and workstations are experiencing the same problem. If so, contact a Novell support provider. If the problem persists and is isolated to this workstation, check the hardware and cabling. 33: The first element of the list could not be obtained because the list is empty. Source: Possible Cause: Action: utility name in message prefix The program expected an active list and there was none.
-
Manual 99a 38 July 17, 2001 38: The bindery is locked. Normally the bindery is only locked if the supervisor is backing up volume SYS:. No information can be obtained until the supervisor unlocks the bindery. Source: Explanation: Action: utility name in message prefix This is a temporary inconvenience. Wait a few minutes and try again. 39: Server name does not respond. Source: Possible Cause: Action: Possible Cause: Action: utility name in message prefix The user is not attached to the server.
-
Manual 99a 38 July 17, 2001 43: You are already attached to server name. Source: Explanation: utility name in message prefix This is a status message indicating that user tried to attach to a server the user is already attached to. 65: The system could not write the information to bindery object name property name. Source: Possible Cause: Action: utility name in message prefix An internal system error probably has occurred. Restart the workstation.
-
Manual 99a July 17, 2001 38 76: The system could not change the file attributes of file name. The mode was number. Source: Possible Cause: Action: utility name in message prefix An internal system error probably has occurred. Restart the workstation. If the problem persists, contact a Novell support provider. 79: The procedure EditText failed because the default text was longer than the maximum length allowed.
-
Manual 99a 38 July 17, 2001 88: Dynamic message number number could not be set because no dynamic message pointer for that number exists. Source: Possible Cause: Action: utility name in message prefix A bad parameter was passed to the call. This is an internal program logic error. Contact a Novell support provider. 90: The name of the server at connection slot number could not be obtained. Source: Possible Cause: Action: utility name in message prefix An internal system error probably has occurred.
-
Manual 99a 38 July 17, 2001 95: The text is too long to fit in the current portal. Source: Possible Cause: Action: utility name in message prefix This is probably an internal program logic error, though it could be caused by message expansion from translation. Contact a Novell support provider. 96: No portal is currently selected to display the text. Source: Possible Cause: Action: utility name in message prefix The program expected an active portal when there was none. This is a program logic error.
-
Manual 99a 38 July 17, 2001 110: The overlay file name_RUN.OVL is the wrong version for this utility. Source: Possible Cause: Action: utility name in message prefix An outdated version of the Help file is in the search path. Replace the outdated file with a current version. 114: The system called GetError, but the specified procedure has been deleted.
-
Manual 99a July 17, 2001 38 183: File name could not be found. Source: Possible Cause: Action: utility name in message prefix The user specified an invalid filename, or an internal system error occurred. Try again using a valid filename. If the problem persists, contact a Novell support provider. 187: The system called PushHelpContext to push context number number onto the stack, but the help context stack is already full.
-
Manual 99a 38 July 17, 2001 197: Connection information could not be obtained about connection number number. Source: Possible Cause: Action: utility name in message prefix An internal system error probably has occurred. Restart the workstation. If the problem persists, contact a Novell support provider. 198: The palette stack is full. Source: Possible Cause: Action: utility name in message prefix Too many calls were made to the PushPalette() function without making any calls to PopPalette().
-
Manual 99a July 17, 2001 38 205: Directory name cannot be deleted because the directory is currently being used by another station. Source: utility name in message prefix Possible Cause: The user cannot delete this directory while another workstation is using it. Action: Wait until the directory is free; then try again. You might want to check to make sure you should delete the directory. 207: The object password could not be changed.
-
Manual 99a 38 July 17, 2001 212: The specified drive is invalid. Source: utility name in message prefix Possible Cause: The specified drive is invalid. Action: Make sure that the user specifies a valid drive. 213: The specified directory cannot be found. Source: Possible Cause: Action: Possible Cause: Action: utility name in message prefix The user specified an invalid directory name. Make sure the directory name is valid. Then try again. An internal system error has occurred.
-
Manual 99a July 17, 2001 38 218: The system could not get the directory trustee paths and the access level of object ID value on volume number. Source: Possible Cause: Action: utility name in message prefix An internal system error probably has occurred. Restart the workstation. If the problem persists, contact a Novell support provider. 219: The specified drive handle is invalid. Source: Possible Cause: Action: utility name in message prefix An internal system error probably has occurred.
-
Manual 99a 38 July 17, 2001 224: You do not have rights to create the directory name. Source: Explanation: Action: utility name in message prefix NetWare's rights security system controls which directories, subdirectories, and files a user can access and what the user is allowed to do with them. Obtain the necessary rights to complete this task. 225: Directory name already exists.
-
Manual 99a July 17, 2001 38 233: The specified volume cannot be found. Source: Possible Cause: Action: Possible Cause: Action: utility name in message prefix The user specified an invalid path. Make sure the volume exists and is on the path the user specified. If so, restart the workstation. An internal system error occurred. If the problem persists, contact a Novell support provider. 234: The DOS environment could not be found.
-
Manual 99a 38 July 17, 2001 238: The new environment is larger than the maximum size available. The new variable is string. Source: Explanation: utility name in message prefix This is a status message indicating that the user specified an environment size that was too large. The program has assigned a size within the acceptable range. 239: Specified server in path path cannot be found. Source: Possible Cause: Action: utility name in message prefix The user typed the path or server name incorrectly.
-
Manual Action: 99a July 17, 2001 38 Restart the workstation. If the problem persists, contact a Novell support provider. 245: Additional memory cannot be allocated for the extra element name in the current list. Source: Possible Cause: Action: utility name in message prefix The workstation does not have sufficient memory to add additional objects to the list. Increase the memory available to the workstation. See “Resolving Workstation Memory Problems” on page 787.
-
Manual 99a 38 July 17, 2001 253: An error occurred while file name was being copied to file name. Number bytes of the requested number bytes were copied. Source: Possible Cause: Action: utility name in message prefix An internal system error probably has occurred. Restart the workstation. If the problem persists, contact a Novell support provider. 256: File name could not be renamed to name because the specified path does not exist.
-
Manual 99a July 17, 2001 38 260: File name could not be renamed to name because the new file name is illegal. Source: Possible Cause: Action: utility name in message prefix The user tried to give the file a name reserved by DOS or one that contains control characters (such as * and ?). Give the file a valid name. 261: File name could not be renamed to name because this station has no file rename privileges in the specified directory.
-
Manual 99a 38 July 17, 2001 322: The system could not unlink file name because the specified path was not found. Source: Possible Cause: Action: utility name in message prefix An internal system error has occurred. Restart the workstation. If the problem persists, contact a Novell support provider. 323: The system could not unlink file name because access was denied.
-
Manual 99a July 17, 2001 38 339: File name could not be created because access was denied. Source: Explanation: Action: utility name in message prefix NetWare's rights security system controls which directories, subdirectories, and files a user can access and what the user is allowed to do with them. Obtain the necessary rights to complete this task. 340: File name could not be opened because the specified files could not be found.
-
Manual 99a 38 July 17, 2001 344: File name could not be opened because the specified access code is invalid. Source: Possible Cause: Action: utility name in message prefix The user specified an invalid access code. Use a valid access code. 345: File name could not be read because access was denied. The read request was for number bytes.
-
Manual 99a July 17, 2001 38 349: The system could not write to file name because access was denied. The write request was for number bytes. Source: Explanation: Action: utility name in message prefix NetWare's rights security system controls which directories, subdirectories, and files a user can access and what the user is allowed to do with them. Obtain the necessary rights to complete this task. 350: The system could not write to file name because the specified file handle was invalid.
-
Manual 99a 38 July 17, 2001 415: File pattern path_string cannot be erased because some of the files in the directory are currently being used by another station. Source: Possible Cause: Action: utility name in message prefix The user cannot delete files that are being used by another user. Wait until all the files are closed; then try again. 416: The server does not have enough memory to complete the request.
-
Manual 99a 38 July 17, 2001 533: The Unicode files cannot be found. Source: utility name in message prefix Action: See message “973: The Unicode table files cannot be found in the NLS directory or in the search path. Code page: number Country: number .” on page 782 541: The specified volume does not exist. Source: Possible Cause: Action: utility name in message prefix The user specified an invalid volume name. Try again, using a valid volume name.
-
Manual 99a 38 July 17, 2001 563: The system was not able to retrieve a count of volume objects in the current context. Source: Possible Cause: Action: utility name in message prefix An internal error prevented the program from getting the volume information. Restart the utility and try again. If the problem persists, contact a Novell support provider. 564: The system was not able to read the name of a volume object in the current context.
-
Manual 99a July 17, 2001 38 567: The system was not able to get a connection number to access volume object name. Source: utility name in message prefix Possible Cause: The database is corrupted, the search drive is incorrect, or the workstation has a connection problem. Action: If the database is in the proper search path and is a current version, try replacing it with a backup. Make sure the workstation is connected to the network. Try again.
-
Manual 99a 38 July 17, 2001 575: The system could not create a portal in which to display information area text. Source: Possible Cause: Action: utility name in message prefix This error could indicate lack of workstation memory or an internal problem in the program. Increase the memory available to the workstation. See “Resolving Workstation Memory Problems” on page 787. 576: An incorrect version of the system help file SYS$HELP.HEP was found. The correct version is version.
-
Manual 99a 38 July 17, 2001 577: The message file found utility_name.MSG is an incorrect version. The correct version is version. See your network supervisor for assistance. Source: utility name in message prefix Action: See message “998: The message file found (utility_name.MSG) is an incorrect version. The correct version is number. See your network supervisor for assistance.” on page 783 578: The help file found (name.HEP) is an incorrect version. The correct version is version.
-
Manual 99a July 17, 2001 38 588: The system was unable to parse the specified path. Source: Possible Cause: Action: utility name in message prefix The program could not find the directory path because the user specified a directory path that does not exist or mistyped the directory path. Use the FILER utility to examine the directory. Type the directory path correctly.
-
Manual 99a 38 July 17, 2001 592: Directory_name is part of the current tree. Source: Possible Cause: Action: utility name in message prefix The user tried to add a directory name to the tree, but a directory with that name is already in the tree. If the user is trying to add a directory that is already in the tree, no action is necessary. Otherwise, assign a different name to the directory the user wants to add. 593: The system could not read the network address for directory_name.
-
Manual 672 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a 38 July 17, 2001 THREADS Messages The following includes messages from THREADS.NLM. THREADS-X-018: THREADS is unable to set up its branch table. There may not be enough server memory, or server memory may be corrupted. Source: Explanation: Possible Cause: Action: THREADS.NLM The THREADS.NLM program failed to set up its operating system branch tables. The THREADS.NLM program cannot load at this time due to memory constraints. Increase the memory available to the server.
-
Manual 99a 38 July 17, 2001 THREADS-X-029: A non-CLIB NLM called abort(), PCB=value. Source: Possible Cause: Action: THREADS.NLM This NLM program made an invalid call. Use a different version of this NLM program. To get a different version, contact the vendor of this NLM program, or contact a Novell support provider. THREADS-X-030: A non-CLIB NLM called abort(). Source: Possible Cause: Action: THREADS.NLM This NLM program made an invalid call. Use a different version of this NLM program.
-
Manual 99a July 17, 2001 38 THREADS-X-037: The thread was blocked for an unknown reason (block number) during an attempt to destroy the thread (thread value). Source: Possible Cause: Action: THREADS.NLM This is an internal system error. Use a different version of this NLM program. To get a different version, contact the vendor of this NLM program, or contact a Novell support provider. THREADS-X-038: An invalid thread group (value, NLMID value) passed to _DestroyThreadGroup.
-
Manual 99a 38 July 17, 2001 THREADS-X-044: A bad parameter (action_code number) was passed to ExitThread(), PCB=value. Source: Possible Cause: Action: THREADS.NLM This NLM program's file has an invalid format. Use a different version of this NLM program. To get a different version, contact the vendor of this NLM program, or contact a Novell support provider. THREADS-X-046: The NLM header cannot be read. An internal system error has occurred. Source: Possible Cause: Action: THREADS.
-
Manual 99a 38 July 17, 2001 THREADS-X-051: THREADS failed to allocate the NLM Control structure memory. An internal system error has occurred. Source: Explanation: Possible Cause: Action: THREADS.NLM A call to Alloc() failed. This NLM program cannot be loaded at this time due to memory constraints. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. THREADS-X-052: THREADS failed to allocate the command line memory.
-
Manual 99a 38 July 17, 2001 THREADS-X-055: THREADS failed to allocate the NonMovableCache memory resource tag. An internal system error has occurred. Source: Explanation: Possible Cause: Action: THREADS.NLM A call to AllocResourceTag() failed. This NLM program cannot be loaded at this time due to memory constraints. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide.
-
Manual 99a 38 July 17, 2001 THREADS-X-059: THREADS failed to allocate the Streams resource tag. An internal system error has occurred. Source: Explanation: Possible Cause: Action: THREADS.NLM A call to AllocResourceTag() failed. This NLM program cannot be loaded at this time due to memory constraints. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. THREADS-X-060: THREADS failed to allocate the Task resource tag.
-
Manual 99a 38 July 17, 2001 THREADS-X-063: An invalid thread name was encountered in the NLM header. Thread name too long. Source: Possible Cause: Action: THREADS.NLM This NLM program has an invalid format. Use a different version of this NLM program. To get a different version, contact the vendor of this NLM program, or contact a Novell support provider. THREADS-X-064: THREADS failed to allocate memory for `argv.' An internal system error has occurred.
-
Manual 99a 38 July 17, 2001 THREADS-X-066: Internal NLM startup error. Source: Possible Cause: Action: THREADS.NLM An NLM could not be loaded because it lacks a required resource, such as memory or a resource tag. Try loading the NLM again. If you cannot load it successfully, make sure the server has enough available memory. THREADS-X-067: Threads failed to allocate the Connection tasks. An internal system error has occurred. Source: Explanation: Possible Cause: Action: THREADS.
-
Manual 99a 38 July 17, 2001 THREADS-X-071: This NLM failed to allocate memory for the handle table. There may not be enough server memory, or server memory may be corrupted. Source: Possible Cause: Action: THREADS.NLM The THREADS.NLM program cannot load at this time due to memory constraints. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. THREADS-X-076: nlm failed to close handle number.
-
Manual Possible Cause: Action: 99a 38 July 17, 2001 This NLM program cannot be loaded at this time due to memory constraints. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. THREADS-X-121: Threads failed to register an event for the NLM's screen. Source: Possible Cause: Action: THREADS.NLM THREADS.NLM was unable to allocate memory for the thread group. Increase the memory available to the server.
-
Manual 684 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a July 17, 2001 38 TIMESYNC Messages The following includes messages from TIMESYNC.NLM. TIMESYNC-X-48: Cannot initialize time synchronization. Source: Explanation: Possible Cause: Action: TIMESYNC.NLM Time synchronization cannot be initialized. The server does not have enough memory available. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. TIMESYNC-X-49: Cannot start time synchronization.
-
Manual 99a 38 July 17, 2001 TIMESYNC-X-53: Cannot allocate alloc tag. Source: Explanation: Possible Cause: Action: TIMESYNC.NLM Time synchronization cannot be initialized The server does not have enough memory available. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. TIMESYNC-X-55: Cannot allocate NCP resource tag. Source: Explanation: Possible Cause: Action: TIMESYNC.
-
Manual 99a July 17, 2001 38 TIMESYNC-X-60: Cannot parse load command line arguments. Source: Explanation: Possible Cause: TIMESYNC.NLM One of the following probably accounts for this error: The syntax in the command line is invalid possibly due to typos or use of illegal characters. Action: Make sure the syntax in your command line is valid. Possible Cause: The server does not have enough memory available. Action: Increase the memory available to the server.
-
Manual 99a 38 July 17, 2001 TIMESYNC-X-65: Couldn't create main process. Source: Possible Cause: Action: TIMESYNC.NLM The server does not have enough memory available. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. TIMESYNC-X-72: Time synchronization has been lost after number successful polling loops. Source: Explanation: Action: TIMESYNC.NLM Time synchronization was lost for some unexplained reason.
-
Manual 99a July 17, 2001 38 TIMESYNC-X-92: Primary, reference and single servers should not follow a secondary server. This server polled: server_name. The time exchange was ignored. Source: Possible Cause: Action: TIMESYNC.NLM A Time Source List was configurated incorrectly. A Single Reference, Primary, or Reference server was instructed to synchronize to a Secondary server. This error only results from a custom configuration. It cannot occur when SAP is used.
-
Manual 99a 38 July 17, 2001 TIMESYNC-X-137: SINGLE servers are incompatible with REFERENCE and PRIMARY servers and should not follow secondary servers. This server polled: server_name. The time exchange was ignored! Source: TIMESYNC.NLM Explanation: A Single Reference server should not exist in an environment that includes a Reference or Primary server. Action: Check the Time Source List in the TIMESYNC.CFG file for both the named server and the server reporting the error.
-
Manual 99a 38 July 17, 2001 TLI Messages Transport Level Interface (TLI) is a UNIX-based interface that provides basic end-to-end data transfer support needed by software applications and higher level protocols. It hides the topology and characteristics of the underlying network from users. It defines a set of services common to different protocol suites so that data can be ported across a variety of transport providers.
-
Manual 99a 38 July 17, 2001 4: Incorrect transport address format. Source: Possible Cause: Action: TLI library The application has called a function by passing an address that contains an incorrect format or illegal information. If you have access to developer documentation, look up the platform-specific restrictions and options for the underlying protocol being used. Otherwise, contact the developer or vendor of the application. 5: Illegal amount of data.
-
Manual 99a 38 July 17, 2001 9: Incorrect sequence number. Source: Possible Cause: Action: TLI library The sequence number specified did not match the sequence number expected when the connection was being established or rejected. Contact the developer or vendor of the application. 10: Buffer size insufficient. Source: Possible Cause: Action: TLI library A function has been called with a buffer of insufficient size to return protocol information.
-
Manual 99a 38 July 17, 2001 14: No data is available. Source: Possible Cause: Action: TLI library The function has been called on an endpoint where no data is available. Contact the developer or vendor of the application. 15: No orderly release indication is available. Source: Possible Cause: Action: TLI library A t_rcvrel function has been called when no orderly release indication has arrived from the other endpoint. Contact the developer or vendor of the application.
-
Manual 99a 38 July 17, 2001 20: No unitdata error indication is available. Source: Possible Cause: Action: TLI library An error function was used by the application when no error condition existed. Contact the developer or vendor of the application. 21: No disconnect indication is available. Source: Possible Cause: Action: TLI library No disconnect indication currently exists on the specified transport endpoint. Contact the developer or vendor of the application.
-
Manual 99a 38 July 17, 2001 57: Unable to Register TLI with CLIB; TLI cannot load successfully. Source: Severity: Action: TLI library This is a fatal error. Contact a Novell support provider. 62: The internal consistency check on the TLI error message table has determined that the table is not large enough to hold all TLI error messages; TLI cannot load successfully. Source: Severity: Action: TLI library This is a fatal error. Contact a Novell support provider.
-
Manual 99a 38 July 17, 2001 TRXNET-DOS Messages The following includes messages from TRXNET-DOS.LAN. 001: The LSL is not loaded. Source: TRXNET-DOS.LAN Action: See “001: The LSL is not loaded.” on page 757 002: The LSL has no room for a board using frame type. Source: TRXNET-DOS.LAN Action: See “002: The LSL has no room for a board using frame type.” on page 757 003: Could not find TRXNET MLID to unload. Source: TRXNET-DOS.LAN Action: See “003: Could not find TRXNET MLID to unload.
-
Manual 99a 38 July 17, 2001 006: The adapter did not initialize. TRXNET did not load. Source: TRXNET-DOS.LAN Action: See “006: The adapter did not initialize. TRXNET did not load.” on page 758 007: You need another MLID section heading in the NET.CFG file in order to load the MLID again. Source: TRXNET-DOS.LAN Action: See “007: You need another MLID section heading in the NET.CFG file in order to load the MLID again.” on page 759 008: A NET.CFG is required to load the MLID again.
-
Manual 99a 38 July 17, 2001 014: This version of the LSL is not supported. Source: TRXNET-DOS.LAN Action: See “014: This version of the LSL is not supported.” on page 760 015: The frame type is already active for frame type. Source: TRXNET-DOS.LAN Action: See “015: The frame type is already active for frame type.” on page 760 016: The node address was incorrectly specified in the NET.CFG file. Source: TRXNET-DOS.LAN Action: See “016: The node address was incorrectly specified in the NET.
-
Manual 99a 38 July 17, 2001 050: [Microchannel] The board cannot be found. Source: TRXNET-DOS.LAN Action: See “050: [Microchannel] The board cannot be found.” on page 762 054: The board did not respond to the initialization command. Source: TRXNET-DOS.LAN Action: See “054: The board did not respond to the initialization command.” on page 763 065: Board cannot be found at slot/IO port. (Please check SLOT and PORT values in the NET.CFG.) Source: TRXNET-DOS.
-
Manual 99a July 17, 2001 38 TSA600 Messages The TSA6OO messages include messages from the NetWare 3.12, 3.2, 4.0, 4.1, 4.11, and 5.0 releases that are still being used. TSA6OO-X-1: The bindery cannot be opened. Error code: code. Source: Explanation: Action: TSA6OO.NLM After backup or restore, the bindery must be opened; however, it cannot be opened. Make sure the user has Supervisor or equivalent user access rights. Make sure the correct volume is in use. Make sure volume Sys is mounted.
-
Manual 99a 38 July 17, 2001 TSA6OO-X-3: The bindery cannot be closed because you are not a Supervisor. Source: Explanation: Action: TSA6OO.NLM Before backup or restore, the bindery must be closed; however, it cannot be closed. Make sure the user has Supervisor or equivalent user access rights. TSA6OO-X-10: The data stream format for name is incorrect. Error code: code. Source: Explanation: Possible Cause: Action: TSA6OO.NLM The media cannot be read. The backup device has a problem.
-
Manual 99a 38 July 17, 2001 TSA6OO-X-43: Error code getting name space specific information size for data_set_name in the name_space name space. Source: Explanation: Action: TSA6OO.NLM The program could not read the name-space-specific information for the file or directory. Do the following: 1. Make sure the indicated name space type is valid and supported on the target volume. 2. Make sure the data set name is valid for the specified name space. 3.
-
Manual 99a 38 July 17, 2001 Action: Make sure the data set name is valid for the specified name space. Make sure that name space support NLM programs are loaded. Action: Make sure the user has appropriate user access rights. For information about a specific error code, search the Error Codes online documentation (http:// www.novell.com/documentation/lg/nwec/docui/index.htm). TSA6OO-X-47: The original access date for file name cannot be reset. The access date will be changed to today's date.
-
Manual 99a July 17, 2001 38 TSA6OO-X-51: Invalid data (no data stream trailer) was found for data_stream_name. Source: Explanation: Possible Cause: Action: TSA6OO.NLM TSA6OO received an unexpected data sequence from the SMS engine (a missing data stream trailer). End of data stream is assumed. The media or storage device is malfunctioning. Make sure the media and storage devices are operating properly. TSA6OO-X-52: Invalid data (an unexpected directory trailer) was found.
-
Manual 99a 38 July 17, 2001 TSA6OO-X-55: File name cannot be created. Error code: code. Source: Explanation: TSA6OO.NLM The requested file cannot be created. Action: Make sure the filename is valid for the requested name space. Action: Make sure the user has appropriate user access rights. Verify the number of currently open files. Action: Make sure a valid path (including volume name) is specified. Action: Make sure the volume has enough disk space.
-
Manual 99a July 17, 2001 38 TSA6OO-X-59: An internal error has occurred. This program cannot get the field for field_name. Error code: code. Source: TSA6OO.NLM Explanation: TSA6OO encountered an error while attempting to read the next data field to process. Action: Contact a Novell support provider. For information about a specific error code, search the Error Codes online documentation (http://www.novell.com/ documentation/lg/nwec/docui/index.htm).
-
Manual 99a 38 July 17, 2001 TSA6OO-X-62: Corrupted data was found after data_set_name. Source: Explanation: TSA6OO.NLM The program still has data for the file or directory after a valid trailer record was processed because the file did not restore well. Action: Try restoring the file again. If the error continues, the data set might be corrupted. Action: Make sure the media and storage devices are operating properly. TSA6OO-X-63: The data set type is invalid. Source: Explanation: Action: TSA6OO.
-
Manual 99a July 17, 2001 38 TSA6OO-X-67: An invalid path was specified. The volume does not exist: name. Source: Explanation: TSA6OO.NLM The specified path contains a nonexistent volume. Action: Make sure the volume name is correct and that it includes a colon after the volume name. Action: Make sure the user has appropriate user access rights. TSA6OO-X-68: The program cannot set directory characteristics for directory_name. Source: Explanation: TSA6OO.
-
Manual Action: 99a 38 July 17, 2001 If Macintosh information is desired, do one of the following: Stop the restore, enable Macintosh support for the target volume, and load Macintosh name space support modules. Restore to a volume in which Macintosh name space is supported. TSA6OO-X-71: Beginning and ending FIDs for data_set_name do not match. Source: Explanation: Possible Cause: Action: TSA6OO.NLM The closing FID for the file or directory does not match the opening FID.
-
Manual 99a 38 July 17, 2001 TSA6OO-X-74: An internal error has occurred. Some trustees may not be restored for data_set_name. Source: Explanation: Action: TSA6OO.NLM Trustee information expected next in the data stream was not found. Make sure the correct trustees were restored for the data set. If not, correct the trustee list as necessary. TSA6OO-X-75: Trustee name was not restored for data_set_name, because the trustee IDs are different. Source: Possible Cause: Action: TSA6OO.
-
Manual 99a 38 July 17, 2001 TSA6OO-X-78: An internal error has occurred. Volume restrictions cannot be found for data_set_name. Source: Explanation: TSA6OO.NLM TSA6OO expected Volume Restrictions to be next in the data stream, but did not find them. Processing will continue. Action: At the end of the restore session, verify the volume restrictions are correct. Action: Make sure that the user is using a valid volume name and has proper access rights.
-
Manual 99a 38 July 17, 2001 TSA6OO-X-88: The NFS name space is not supported. This information will not be restored. Source: Explanation: Action: TSA6OO.NLM This file or directory contains information specific to NFS that will not be restored. If NFS information is required, restore to a volume with NFS support or load NFS support on the selected volume. If the NFS information is not needed, continue the restore session. TSA6OO-X-89: The full paths data set format is invalid. Error code: code.
-
Manual 99a 38 July 17, 2001 TSA6OO-X-92: Error code occurred while the program was scanning for extended attributes for data_set_name. Source: Explanation: TSA6OO.NLM An error occurred when the program attempted to read the extended attributes (EA) for the indicated file or directory. The extended attributes will not be backed up for this data set. Action: Make sure the user is using a valid data set name. Action: Make sure the user has appropriate user access rights.
-
Manual 99a July 17, 2001 38 TSA6OO-X-95: An NFS hard link collision occurred while restoring data_set_name. The hard links cannot be restored. Source: Explanation: Action: TSA6OO.NLM NFS hard links for the file or directory conflict with existing hard links. The restore session cannot be completed. Exit and try the operation again. TSA6OO-X-96: An error occurred while the program attempted to restore namespace-specific information for data_set_name in the data_set_name name space. Error code: code.
-
Manual 99a 38 July 17, 2001 TSA6OO-X-110: This program cannot delete existing extended attributes for data_set_name. Error code: code. Source: Explanation: TSA6OO.NLM The program cannot delete the extended attributes for the indicated data set. Action: Make sure the user has appropriate user access rights. Action: Make sure the file is not in exclusive use by another process. After the restore session, check the integrity of the extended attributes and correct or change them if necessary.
-
Manual 99a July 17, 2001 38 TSA6OO-X-152: code is currently in use. Unloading now may result in an ABEND! Source: Possible Cause: Action: TSA6OO.NLM An active connection exists between this program and another application. This program cannot be loaded now. Close all active applications and try unloading this program. For information about a specific error code, search the Error Codes online documentation (http://www.novell.com/documentation/lg/nwec/docui/index.htm).
-
Manual 99a 38 July 17, 2001 TSA6OO-X-179: Trustee name was not restored for object, because no NDS name is available for this ID. Source: Explanation: TSA6OO.NLM This is a informational message that indicates that the trustee name no longer exists in eDirectory because it was either removed or deleted; it cannot be restored. TSA6OO-X-180: The file filename contains invalid characters. The file was skipped. The file name is a hexidecimal representation of the string.
-
Manual 99a July 17, 2001 38 TSA6OO-X-259: This program cannot allocate a directory handle. Source: Explanation: TSA6OO.NLM The program could not allocate a directory handle. Action: Make sure the user has specified a valid directory path for the desired name space. Action: Make sure the user has appropriate user access rights. TSA6OO-X-260: The bindery cannot be closed. Source: Explanation: TSA6OO.NLM The bindery cannot be closed. Action: Make sure the user has Supervisor rights to the server.
-
Manual 99a 38 July 17, 2001 TSA6OO-X-264: The data set was excluded by the selection list. Source: Explanation: Action: TSA6OO.NLM The specified file or directory was excluded by the selection criteria. Change the selection criteria in SBACKUP. TSA6OO-X-265: This file is flagged Execute Only and cannot be opened. Source: TSA6OO.NLM Explanation: The specified file cannot be opened for read or write because its attribute is set to Execute Only.
-
Manual 99a July 17, 2001 38 TSA6OO-X-270: This program cannot delete a data set. Source: Explanation: TSA6OO.NLM The specified data set could not be deleted. Action: Make sure a valid data set name was specified. Action: Make sure the user has appropriate user access rights. Action: Make sure the file is not in exclusive use by another process. TSA6OO-X-271: The program was processing a record or subrecord and did not find the Header field. Source: Explanation: Action: TSA6OO.
-
Manual 99a 38 July 17, 2001 TSA6OO-X-275: This program cannot get the entry index. Source: Explanation: TSA6OO.NLM The program could not get an entry index for the requested file or directory. Action: Make sure a valid data set name for the name space was specified. Action: Make sure name space is supported on the volume. Action: Make sure the user has appropriate user access rights. TSA6OO-X-276: This program cannot get the name space entry name. Source: Explanation: TSA6OO.
-
Manual 99a July 17, 2001 38 Action: Make sure a valid volume name was specified. Action: Make sure the volume is mounted. Make sure the user has appropriate user access rights. TSA6OO-X-280: An invalid connection handle was passed. Source: Explanation: Action: TSA6OO.NLM Your connection might no longer be valid. Make sure the workstation is connected to the network. TSA6OO-X-281: Invalid data set data was found. Source: Explanation: Action: TSA6OO.NLM The data set is corrupted.
-
Manual 99a 38 July 17, 2001 TSA6OO-X-285: The handle tag is invalid or the pointer is null. Source: Explanation: TSA6OO.NLM This handle is not valid. This message is for information only. TSA6OO-X-286: Message number is invalid. Source: Explanation: TSA6OO.NLM An invalid message number was detected. This message is for information only. TSA6OO-X-287: The name space type does not exist or is invalid. Source: Explanation: Action: TSA6OO.NLM An invalid name space type was specified.
-
Manual 99a July 17, 2001 38 TSA6OO-X-291: An invalid path was used. Source: Explanation: TSA6OO.NLM The path is invalid for the specified name space. Action: Make sure the path is valid for the specified name space. Action: Make sure the user has appropriate user access rights. TSA6OO-X-292: The scan type is out of range (less than 0 or greater than 31). Source: TSA6OO.NLM Explanation: An invalid scan type was specified. Action: Correct the scan type and try again.
-
Manual 99a 38 July 17, 2001 TSA6OO-X-297: This logout attempt cannot be completed. Source: Explanation: Action: TSA6OO.NLM The logout attempt failed. Make sure no work is in progress; then try again. TSA6OO-X-298: The name space path has not been updated. Source: Explanation: Action: TSA6OO.NLM A valid path was not found in the path list for the selected name space. Make sure a valid DOS path exists; then try again. TSA6OO-X-300: The connection is invalid or does not exist.
-
Manual 99a July 17, 2001 38 TSA6OO-X-305: No such property exists. Source: Explanation: Action: TSA6OO.NLM An invalid property was specified. Make sure the property you want is valid; then try again. TSA6OO-X-306: A data stream cannot be opened. Source: Explanation: TSA6OO.NLM The program cannot open the specified data stream. Action: Make sure that you are using a valid data stream name and the data stream exists. Action: Make sure the user has appropriate user access rights.
-
Manual 99a 38 July 17, 2001 TSA6OO-X-310: Either the server is out of memory or memory allocation failed. Source: TSA6OO.NLM Action: Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. TSA6OO-X-311: A UINT64 value has overflowed. Source: Explanation: Possible Cause: Action: TSA6OO.NLM A number overflow has occurred. The number is too large for the UINT64 type variable. Invalid or corrupted data exists.
-
Manual 99a July 17, 2001 38 TSA6OO-X-315: The program's attempt to scan failed, probably because an invalid path was specified. Source: Explanation: Action: TSA6OO.NLM An invalid path was specified. Specify a valid path for the requested name space. Make sure the user has appropriate user access rights. TSA6OO-X-316: The program cannot scan file entry information. Source: TSA6OO.NLM Explanation: File scan failed. Action: Specify a valid filename for the requested name space.
-
Manual 99a 38 July 17, 2001 TSA6OO-X-320: This scan type is not used. Source: Explanation: Action: TSA6OO.NLM An invalid or unused scan type was specified. Specify a valid scan type and try again. TSA6OO-X-321: This selection type is not used. Source: Explanation: Action: TSA6OO.NLM An invalid or unused selection type was specified. Specify a valid scan type and try again. TSA6OO-X-322: The program cannot set file information. Source: Explanation: TSA6OO.NLM The program cannot set file information.
-
Manual 99a July 17, 2001 38 TSA6OO-X-326: The requested function is not supported by this TSA. Source: Explanation: Action: TSA6OO.NLM The requested function is not supported on the selected TSA (Target Service Agent). Request a valid function, or select another TSA that supports the requested function. TSA6OO-X-328: The program cannot write extended attribute (value). Source: Explanation: TSA6OO.NLM The program could not write the extended attributes.
-
Manual 99a 38 July 17, 2001 TSA6OO-X-332: All available connections to TSA are in use. Source: TSA6OO.NLM Explanation: The TSA has reached its maximum limit for servicing the connection. Action: Wait for a connection to be released by another application. Retry the operation. TSA6OO-X-333: An attempt was made to put compressed data on a non-compressed volume. Source: Explanation: Action: TSA6OO.NLM The target server does not support compression on a volume.
-
Manual 99a 38 July 17, 2001 TSANDS Messages These messages are generated by the TSANDS module. TSANDS-X-256: Access has been denied. An invalid username or authentication was used. Source: Possible Cause: Action: TSANDS.NLM An invalid authentication occurred. Make sure the username and password are correct. Try again. TSANDS-X-257: This program cannot get the Directory object name. Source: Possible Cause: Action: TSANDS.NLM The object name specified is not a valid or known name. Verify the name.
-
Manual 99a 38 July 17, 2001 TSANDS-X-259: This program cannot allocate a directory handle. Source: Explanation: Action: TSANDS.NLM The program could not allocate a directory handle. Make sure a valid path for the desired name space type is specified. Make sure the user has appropriate user access rights. TSANDS-X-261: This program cannot create a directory entry. Source: Explanation: Action: TSANDS.NLM The program could not create the specified directory entry.
-
Manual 99a July 17, 2001 38 TSANDS-X-270: This program cannot delete a data set. Source: Explanation: Action: TSANDS.NLM The specified data set could not be deleted. Make sure a valid data set name for the name space type is specified. Make sure the user has appropriate user access rights. Make sure the file is not in exclusive use by another process. TSANDS-X-272: The program was processing a record or subrecord and did not find the Trailer field. Source: Explanation: Action: TSANDS.
-
Manual Action: 99a 38 July 17, 2001 Make sure the name space type is supported on the specified volume. Make sure a valid data set name for the name space type is specified. Make sure the user has appropriate user access rights. TSANDS-X-277: This program cannot get the name space size information. Source: Explanation: Action: TSANDS.NLM TSANDS could not read the name space information size. Make sure the name space type is supported on the specified volume.
-
Manual 99a July 17, 2001 38 TSANDS-X-282: The data set handle is invalid. Source: Possible Cause: Action: TSANDS.NLM The data set does not exist. Verify the data set exists. TSANDS-X-283: The data set name is invalid. Source: Explanation: Action: TSANDS.NLM An invalid data set (file or directory) name was specified. Make sure a valid data set name for the name space type is specified. TSANDS-X-284: An invalid data stream was found for data_set_name, data set type type.
-
Manual 99a 38 July 17, 2001 TSANDS-X-288: The object ID or name that was backed up does not match the current object ID or name. Source: Explanation: Action: TSANDS.NLM The object ID or name for the restore does not match the object ID or name for the backup. Restore is probably being performed on a different server than the server that was used for the backup. This results in an object on both servers with a different ID. None. This message is for information only.
-
Manual 99a July 17, 2001 38 TSANDS-X-294: The selection type is out of range (less than 0 or greater than 31). Source: TSANDS.NLM Explanation: An invalid selection type was specified. Action: Correct the selection type and try again. TSANDS-X-295: The sequence number is invalid. Source: TSANDS.NLM Explanation: An invalid sequence number was specified. Action: Correct the sequence number and try again. TSANDS-X-296: This login attempt has been denied. Source: Explanation: Action: TSANDS.
-
Manual 99a 38 July 17, 2001 TSANDS-X-303: Either no more entries are in the list or the name space type does not exist. Source: Explanation: TSANDS.NLM This informational message is recorded in the error log file. TSANDS-X-304: You do not have the Search right on client service. Source: Possible Cause: Action: TSANDS.NLM TSANDS could not scan the client file system because of a rights violation. Try one or more of the following: Change to another server or volume where you have the Search right.
-
Manual 99a 38 July 17, 2001 TSANDS-X-308: The Open option is not used. Source: Explanation: Action: TSANDS.NLM The Open option mode type string is not being used. This message is for information only. However, you may want to add the mode type string (for example, NO_DATA_STREAMS_STR). TSANDS-X-309: A file or directory cannot be restored. You are out of disk space. Source: Explanation: Action: TSANDS.NLM The restore session cannot continue until more disk space is added.
-
Manual 99a 38 July 17, 2001 TSANDS-X-313: A file cannot be read. Source: Possible Cause: Action: TSANDS.NLM The file is corrupted. Try the operation again. If the problem persists, contact a Novell support provider. TSANDS-X-314: Either no resource name can be found or all resource names have been found. Source: Explanation: Action: TSANDS.NLM The Scan Target Service Resource function has found all resources, or no resources were found.
-
Manual 99a July 17, 2001 38 TSANDS-X-319: The program cannot scan for trustees. Source: Explanation: Action: TSANDS.NLM TSANDS could not scan for a trustee list. Make sure the user has appropriate user access rights. Make sure that your entry index is valid. Try again. TSANDS-X-320: This scan type is not used. Source: Explanation: Action: TSANDS.NLM An invalid or unused scan type was specified. Specify a valid scan type. Try again. TSANDS-X-321: This selection type is not used.
-
Manual 99a 38 July 17, 2001 TSANDS-X-325: An invalid or inactive TSA was specified. Source: Explanation: Action: TSANDS.NLM The TSA (Target Service Agent) that was specified cannot be found. Make sure the TSA you want is valid and active. If the TSA is not loaded, load it and try again. TSANDS-X-326: The requested function is not supported by this TSA. Source: Explanation: Action: TSANDS.NLM The requested function is not supported on the selected TSA (Target Service Agent).
-
Manual 99a 38 July 17, 2001 TSANDS-X-330: An error occurred while the program attempted to write to a file. Source: Possible Cause: Action: Possible Cause: Action: TSANDS.NLM The server does not have enough disk space. Increase the available disk space on the volume. See Resolving Server Disk Space Problems in the Server Operating System Administration Guide. The file is corrupted. Check the contents of the file for corruption.
-
Manual 746 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a 38 July 17, 2001 TUI Messages The following includes messages from TUI.NLM. TUI-X-6: Caller uses NUT version hexidecimal_number, but TUI uses version hexidecimal_number. Source: TUI.NLM Possible Cause: A utility requesting TUI services is expecting a level of NUT services different from that provided by TUI.NLM. TUI will continue, but all required services might not be available. Action: If no further errors occur, no action is required. However, you should upgrade the TUI.NLM, NWSNUT.
-
Manual 99a 38 July 17, 2001 Operating System Administration Guide. Reload the utility when more memory is available.
-
Manual 99a July 17, 2001 38 VREPAIR Messages The following includes messages from VREPAIR.NLM. VREPAIR-X-10: Unable to get resource tags. Source: Possible Cause: Action: VREPAIR.NLM The server does not have enough memory available. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. VREPAIR-X-11: Unable to open VREPAIR status screen. Source: Possible Cause: Action: VREPAIR.
-
Manual 99a 38 July 17, 2001 VREPAIR-X-208: Error writing to error log file name. Message: message not written to file. Error log file closed. Source: Possible Cause: Action: VREPAIR.NLM The log file's disk media has failed (for example, removing the floppy diskette) or run out of space. If you want a log file, then stop VREPAIR using the F1 option, fix the media problem, and then run VREPAIR again. VREPAIR will continue to repair the volume if you do nothing.
-
Manual 99a July 17, 2001 38 VREPAIR-X-304: Unable to allocate memory to record needed FAT entry correction. Try using the Save Changes Immediately option. Source: Possible Cause: Action: VREPAIR.NLM The server does not have enough memory available. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. VREPAIR-X-305: Unable to allocate memory to record needed FAT entry correction. Source: Possible Cause: Action: VREPAIR.
-
Manual 99a 38 July 17, 2001 VREPAIR-X-442: Unable to allocate memory to record needed directory entry correction. Source: Possible Cause: Action: VREPAIR.NLM The server does not have enough memory available. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. VREPAIR-X-444: Unable to allocate memory to record needed directory entry correction. Try using the Write Changes Immediately To Disk option.
-
Manual 99a 38 July 17, 2001 VREPAIR-X-713: More than 999,999 new file names have been generated. Source: VREPAIR.NLM Action: See message “VREPAIR-X-677: More than 999,999 new directory names have been generated.” on page 752 VREPAIR-X-766: Unable to read directory entry number which was previously read. Source: VREPAIR.NLM Possible Cause: Volume data that VREPAIR previously read is not available because a major hardware failure occurred.
-
Manual 99a 38 July 17, 2001 VREPAIR-X-771: Trustee entry was not found in file trustee chain as expected. Source: VREPAIR.NLM Possible Cause: Volume data that VREPAIR previously read is not available because a major hardware failure occurred. Action: Try to get the disk hardware back in working condition. See Disk Errors in the Server Operating System Administration Guide. Then run VREPAIR again. VREPAIR-X-810: The name space list for entry number could not be corrected.
-
Manual 99a 38 July 17, 2001 VREPAIR-X-845: More than 999,999 new MAC names have been generated. Source: VREPAIR.NLM Explanation: During the process of volume repair, VREPAIR sometimes needs to generate a new unique name for files and directories that have invalid or conflicting names. This error occurs when VREPAIR has run out of unique names for use during volume repair. The problem occurs only when the volume is badly damaged.
-
Manual 756 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a 38 July 17, 2001 Shared Messages for LAN Drivers The following includes Shared Messages for LAN Drivers. 001: The LSL is not loaded. Source: Explanation: Action: TRXNET-DOS.LAN Before loading the driver, the Link Support Layer (LSL) must be loaded. Load the LSL. Then load the driver, using the syntax in the following example: C:\NWCLIENT\LSL C:\NWCLIENT\TRXNET 002: The LSL has no room for a board using frame type. Source: Explanation: Action: TRXNET-DOS.
-
Manual 99a 38 July 17, 2001 003: Could not find TRXNET MLID to unload. Source: Explanation: TRXNET-DOS.LAN This is an informational message indicating that the TRXNET driver is not loaded. 004: A TSR is loaded above the TRXNET MLID. Source: Explanation: Action: TRXNET-DOS.LAN Another TSR (terminate-and-stay-resident) program was loaded after the TRXNET driver.
-
Manual 99a 38 July 17, 2001 007: You need another MLID section heading in the NET.CFG file in order to load the MLID again. Source: TRXNET-DOS.LAN Explanation: The driver cannot be loaded consecutively unless you edit the configuration parameters and add a section heading for each instance in the NET.CFG file. Action: Unload the TRXNET driver. Edit/create the NET.CFG file and add a Link Driver section heading for each time the driver is to be loaded; then reload the driver. 008: A NET.
-
Manual Action: 99a 38 July 17, 2001 Correct the protocol entry in the NET.CFG file. The proper syntax for the protocol keyword is as follows: PROTOCOL TRXNE hex_protocol_ID frame_type 013: The MLID could not register Protocol ID number for protocol stack name for frame type type. Source: Explanation: Action: TRXNET-DOS.LAN The Link Support Layer (LSL) is configured with resources for a set number of Protocol Identifiers. (The default is 4.) This number has been exceeded. Edit the NET.
-
Manual 99a 38 July 17, 2001 016: The node address was incorrectly specified in the NET.CFG file. Source: Explanation: Action: TRXNET-DOS.LAN The node address override in the NET.CFG file is too long. Edit the NET.CFG file and correct the node address. The node address must be less than or equal to 12 hex digits. 017: An invalid keyword was specified in NET.CFG on line number. Source: Explanation: Action: TRXNET-DOS.LAN The key word on the line indicated was not recognized. Edit the NET.
-
Manual 99a 38 July 17, 2001 026: On a NetWare 3.11 server, you must load LSLENH.NLM before you load MSM31X.NLM. Source: NE1000-NW.LAN, NE2-NW.LAN, NE2000-NW.LAN, NE3200-NW.LAN Possible Cause: The Link Support Layer (LSL) and Media Support Module (MSM) have been loaded on a NetWare 3.11 server. An attempt was made to load LSLENH.NLM. The computer cannot load LSLENH.NLM after the MSM has been loaded. (LSLENH.NLM adds enhancement to the LSL.) Action: Unload MSM31X.NLM; then load LSLENH.NLM.
-
Manual Action: 99a 38 July 17, 2001 Do one of the following: Make sure the network board is properly seated into a slot. Insert the network board into a slot, and run the Reference diskette to install it. 051: Board RAM failed the memory test. Source: Possible Cause: Action: NE1000-NW.LAN, NE2-NW.LAN, NE2000-NW.LAN, NE3200-NW.LAN The memory test on the network board's internal static RAM failed. Make sure the I/O port settings on the network board match the I/O port settings in the AUTOEXEC.
-
Manual 99a 38 July 17, 2001 066-Adapter 1: The cable might be disconnected on the board. Source: Possible Cause: Action: NE1000-NW.LAN, NE2-NW.LAN, NE2000-NW.LAN The cable is disconnected, or heavy traffic on the wire is delaying a packet from being sent. If the problem persists, check the cable, or consider adding more networks to decrease LAN traffic. 067: The group bit in the node address override was cleared. Source: Explanation: NE1000-NW.LAN, NE2-NW.LAN, NE2000-NW.LAN, NE3200-NW.
-
Manual 99a 38 July 17, 2001 073: Unable to allocate memory. Source: Possible Cause: Action: NE1000-NW.LAN, NE2-NW.LAN, NE2000-NW.LAN, NE3200-NW.LAN The server does not have enough available memory. NetWare cannot allocate memory for the LAN driver. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. 074: The hardware interrupt cannot be set. Source: Possible Cause: Action: NE1000-NW.LAN, NE2-NW.LAN, NE2000-NW.
-
Manual 99a 38 July 17, 2001 077: The event notification routine cannot be registered. Source: Possible Cause: Action: NE1000-NW.LAN, NE2-NW.LAN, NE2000-NW.LAN, NE3200-NW.LAN The server does not have enough available memory. NetWare cannot allocate memory for internal structures related to event notification. Increase the memory available to the server. See Freeing Server Memory Temporarily in the Server Operating System Administration Guide. 079: The MLID did not initialize MSMTxFreeCount.
-
Manual 99a 38 July 17, 2001 092: Cannot schedule AES without an HSM routine. Source: Possible Cause: Action: NE1000-NW.LAN, NE2-NW.LAN, NE2000-NW.LAN, NE3200-NW.LAN The LAN driver is outdated or corrupted. Obtain a new .LAN file. 093: Cannot schedule interrupt time call back without an HSM routine. Source: Possible Cause: Action: NE1000-NW.LAN, NE2-NW.LAN, NE2000-NW.LAN, NE3200-NW.LAN The LAN driver is outdated or corrupted. Obtain a new .LAN file.
-
Manual Action: 99a 38 July 17, 2001 Replace the network board with one that works. For information about a specific error code, search the Error Codes online documentation (http:// www.novell.com/documentation/lg/nwec/docui/index.htm). 223: The board must be placed in a 16-bit slot. Source: Explanation: Action: NE2000-NW.LAN The network board was placed in an 8-bit slot. Move the network board to a 16-bit slot. 224: This board is configured as an NE1000. Source: Explanation: Action: NE2000-NW.
-
Manual 99a 38 July 17, 2001 237: The adapter is beaconing. Source: Explanation: Action: CNTR2000.LAN The ring has detected a network board that is trying to access the network with an incorrect data rate. Find out which network board in the ring is set at an incorrect data rate, and correct it. 239: The cable is disconnected at the board. Source: Explanation: Action: CNTR2000.LAN The cable is disconnected from the network board. Securely fasten the cable to the network board.
-
Manual 99a 38 July 17, 2001 242: The Remove MAC Frame process shut down the adapter. Source: Explanation: Action: CNTR2000.LAN The network board removed itself from the ring as requested by another network board. Replace the network board with one that works. A transmit timed out. The cable might be disconnected from the board. Source: Explanation: Action: CNE2.LAN, CNE2000.LAN, CNE2_32..LAN The transmission process timed out.
-
Manual 99a 38 July 17, 2001 Also, refer to the manufacturer's instructions for configuring the network board. If the board still does not respond, replace it with one that works. The board did not respond to the initialization command. Source: Explanation: Action: CNEAMD.LAN, CNE2.LAN, CNE2000.LAN The LAN driver cannot get the network board to initialize. This could be due to improper configuration or faulty hardware.
-
Manual 99a 38 July 17, 2001 The board's IRQ cannot be found. Source: Explanation: Action: CNEAMD.LAN The interrupt setting is incorrect or is not available. Make sure the interrupt setting on the network board matches the setting in the configuration file. Also, refer to the manufacturer's instructions for configuring the network board. If the board still does not respond, replace it with one that works. The board's memory failed the memory test. Source: Explanation: Action: CNE2.LAN, CNE2000.
-
Manual 99a 38 July 17, 2001 The driver was unable to schedule periodic AES callbacks. Source: Explanation: Action: CNE2.LAN, CNE2000.LAN The LAN driver was unable to schedule an asynchronous event on a periodic basis. Contact a Novell support provider. Unable to allocate memory. Source: Explanation: Action: CNEAMD.LAN The client workstation or NetWare server might not have enough available memory. NetWare cannot allocate memory for the LAN driver.
-
Manual 774 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 99a 38 July 17, 2001 Common Workstation Utilities Error Messages The following error messages are common to most workstation utilities: 901: You are not attached to the specified server. Source: Possible Cause: FLAG.EXE, PURGE.EXE, RIGHTS.EXE The user tried to execute a command on a server other than the default server to which the user was not attached. Action: Specify a path to the utility on the appropriate server.
-
Manual 99a 38 July 17, 2001 906: The Unicode files cannot be found. Source: CAPTURE.EXE, CX.EXE Explanation: The Unicode files for the current language code page and country cannot be found. Action: Verify that the Unicode files for the current code page and country are located in the SYS:PUBLIC\NLS directory. 907: This utility cannot open the translation table SCHEMA.XLT.
-
Manual 99a 38 July 17, 2001 909: You are not mapped to the specified drive. Source: Possible Cause: Action: FLAG.EXE, PURGE.EXE, RIGHTS.EXE The user specified a local hard disk or a network drive that has not been defined. View the workstation's network drive mappings. If necessary, map a drive to the directory, and then try the command again. 910: This utility was unable to parse the specified path. Source: Explanation: FLAG.EXE, RIGHTS.EXE The program could not find the directory path.
-
Manual 99a 38 July 17, 2001 913: The specified directory cannot be found. Source: Possible Cause: Action: Possible Cause: Action: FLAG.EXE, RIGHTS.EXE The user specified an invalid directory name. Type the directory name correctly. The directory is not part of the path. Make sure that the directory is part of the path 914: The specified file or directory cannot be found. Source: Possible Cause: Action: Possible Cause: Action: FLAG.EXE, RIGHTS.
-
Manual 99a 38 July 17, 2001 918: This utility was unable to get connection information. Error code: code. Source: Explanation: Action: LOGIN.EXE, LOGOUT.EXE For some unexpected reason, this utility was unable to obtain information about a particular server. Issue the command again from a different drive. For information about a specific error code, search the Error Codes online documentation (http:// www.novell.com/documentation/lg/nwec/docui/index.htm).
-
Manual 99a 38 July 17, 2001 922: Intruder detection lockout has disabled this account. Source: Explanation: Possible Cause: Action: CAPTURE.EXE, LOGIN.EXE, MAP.EXE, SETPASS.EXE A user has tried to log in to the account without supplying the correct password within the allowed number of login attempts. The user cannot use the account until it is reopened by the network supervisor.
-
Manual 99a 38 July 17, 2001 970: The attempt to open the Unicode table files failed. Source: Explanation: Possible Cause: Action: CX.EXE, FLAG.EXE, LOGIN.EXE, LOGOUT.EXE, MAP.EXE, PURGE.EXE, RIGHTS.EXE, SETPASS.EXE The Unicode table files could not be opened for an unknown reason. The cause of the error is probably other than those listed in messages 971 through 975. Try the following: Close files you do not need to have open at the present time. Free up memory on the workstation.
-
Manual 99a 38 July 17, 2001 973: The Unicode table files cannot be found in the NLS directory or in the search path. Code page: number Country: number . Source: Explanation: CX.EXE, FLAG.EXE, LOGIN.EXE, LOGOUT.EXE, MAP.EXE, PURGE.EXE, RIGHTS.EXE, SETPASS.EXE The file extension shown in parentheses represents the country code the workstation is using, which is set in CONFIG.SYS. For example, *.001 is US English. The country code might be different from the one shown here.
-
Manual 99a 38 July 17, 2001 974: The Unicode table files are corrupt. Source: Possible Cause: Action: CX.EXE, FLAG.EXE, LOGIN.EXE, LOGOUT.EXE, MAP.EXE, PURGE.EXE, RIGHTS.EXE, SETPASS.EXE The Unicode files are not the correct version or they are corrupt. Replace the Unicode files with a current, uncorrupted copy of the files. 975: The Unicode table files cannot be opened because there are already too many open files. Close some files or modify your CONFIG.SYS file. Source: CX.EXE, FLAG.EXE, LOGIN.
-
Manual 99a 38 July 17, 2001 names which specify a language (for example, ENGLISH or FRENCH). The files are searched for in a child directory of the NLS directory as specified by the NWLANGUAGE variable. The NLS directory in this instance is itself a child directory of the load directory. (The load directory contains the current utility's .EXE file.) The load directory (the directory containing the current utility's .EXE file). This is normally the PUBLIC directory.
-
Manual 99a 38 July 17, 2001 The directories found under the child NLS subdirectory of the load directory. The directories found under the sibling NLS subdirectory of the load directory. Action: Find a current version of the message file. Then, copy it to a directory that is mapped to an existing search drive, or map a search drive to the directory containing the file.
-
Manual 786 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001
-
Manual 2 99a 38 July 17, 2001 Troubleshooting the Workstation This section provides troubleshooting suggestions for typical Novell® client (workstation) problems, including ways to resolve workstation memory problems. Resolving Workstation Memory Problems DOS and Window 3.x Workstations To increase the amount of available conventional memory, do one or more of the following: Close any unnecessary applications. Unload any unneeded TSR (terminate-and-stay-resident) programs (DOS/Windows only).
-
Manual 99a 38 July 17, 2001 Reduce the extended memory used by certain programs. Reduce the EMS memory allocated. Unload any unneeded NLM programs that use extended memory. Reduce the size of the Novell Client network cache. Adjust the Max Cache Size setting. For more information on adjusting this setting, see the applicable Novell Client Help file, Windows 95 or DOS/Windows. Reduce the size of the local disk cache (such as SMARTDRV.EXE). Install more memory in the workstation.
-
Manual A 99a July 17, 2001 38 Novell Trademarks Access Manager is a registered trademark of Novell, Inc. in the United States and other countries. Advanced NetWare is a trademark of Novell, Inc. AlarmPro is a registered trademark of Novell, Inc. in the United States and other countries. AppNotes is a registered trademark of Novell, Inc. in the United States and other countries. AppTester is a registered trademark of Novell, Inc. in the United States and other countries.
-
Manual 99a 38 July 17, 2001 CBASIC is a registered trademark of Novell, Inc. in the United States and other countries. CBASIC Compiler is a trademark of Novell, Inc. CBASIC-16 is a trademark of Novell, Inc. CBASIC-86 is a trademark of Novell, Inc. Certified Directory Engineer and CDN are service marks of Novell, Inc. Certified Internet Architect is a service mark of Novell, Inc. Certified Internet Business Strategist is a service mark of Novell, Inc.
-
Manual 99a July 17, 2001 38 Concurrent CP/M-86 is a trademark of Novell, Inc. Concurrent DOS is a registered trademark of Novell, Inc. in the United States and other countries. Concurrent DOS 386 is a trademark of Novell, Inc. Concurrent DOS CP/M-86 is a registered trademark of Novell, Inc. in the United States and other countries. Concurrent DOS XM is a trademark of Novell, Inc. Concurrent OS is a registered trademark of Novell, Inc. in the United States and other countries.
-
Manual 99a 38 July 17, 2001 DataClub DSM is a trademark of Novell, Inc. DDE/Net is a trademark of Novell, Inc. DDT is a trademark of Novell, Inc. DDT-68K is a trademark of Novell, Inc. DDT-86 is a trademark of Novell, Inc. Dedicated to Serve All LANKind is a registered service mark of Novell, Inc. in the United States and other countries. definitelyme is a service mark of Novell, Inc. DENIM is a service mark of Novell, Inc. DESPOOL is a trademark of Novell, Inc.
-
Manual 99a July 17, 2001 38 Enterprise Perspectives is a trademark of Novell, Inc. Entry Denied is a trademark of Novell, Inc. Envoy is a registered trademark of Novell, Inc. in the United States and other countries. EtherPort is a registered trademark of Novell, Inc. in the United States and other countries. EtherPort II is a trademark of Novell, Inc. EtherPort IIL is a trademark of Novell, Inc. EtherPort SE is a trademark of Novell, Inc. EtherPort SE/30 is a trademark of Novell, Inc.
-
Manual 99a 38 July 17, 2001 Fluent is a registered trademark of Novell, Inc. in the United States and other countries. Fluentlink is a registered trademark of Novell, Inc. in the United States and other countries. Fluentstreams is a registered trademark of Novell, Inc. in the United States and other countries. Full Service Directory is a trademark of Novell, Inc. Global MHS is a trademark of Novell, Inc. Global Network Operations Center and GNOC are service marks of Novell, Inc.
-
Manual 99a 38 July 17, 2001 instantme is a trademark of Novell, Inc. Instructional Workbench is a registered trademark of Novell, Inc. in the United States and other countries. IntelliMouse is a trademark of Novell, Inc. interNetWare is a trademark of Novell, Inc. interNetWire is a registered service mark of Novell, Inc. in the United States and other countries. Internetwork Packet Exchange and IPX are trademarks of Novell, Inc. IPX/SPX is a trademark of Novell, Inc.
-
Manual 99a 38 July 17, 2001 Link Support Layer and LSL are trademarks of Novell, Inc. LogicSource is a trademark of Novell, Inc. LX is a trademark of Novell, Inc. MacIPX is a registered trademark of Novell, Inc. in the United States and other countries. MagicSoft is a trademark of Novell, Inc. ManageWise is a registered trademark of Novell, Inc. in the United States and other countries. ManageWise Agent is a trademark of Novell, Inc. Master CNE is a trademark and MCNE is a service mark of Novell, Inc.
-
Manual 99a 38 July 17, 2001 NDebug is a trademark of Novell, Inc. NDS Admin is a trademark of Novell, Inc. NDS Administrator is a trademark of Novell, Inc. NDS Manager is a trademark of Novell, Inc. NE/2 is a trademark of Novell, Inc. NE/2-32 is a trademark of Novell, Inc. NE/2T is a trademark of Novell, Inc. NE1000 is a trademark of Novell, Inc. NE1500T is a trademark of Novell, Inc. NE2000 is a trademark of Novell, Inc. NE2000T is a trademark of Novell, Inc. NE2100 is a trademark of Novell, Inc.
-
Manual 99a 38 July 17, 2001 NetWare 3270 LAN Workstation is a trademark of Novell, Inc. NetWare 386 is a trademark of Novell, Inc. NetWare 5250 Gateway is a trademark of Novell, Inc. NetWare 5250 LAN Workstation is a trademark of Novell, Inc. NetWare Access Server is a trademark of Novell, Inc. NetWare Access Services is a trademark of Novell, Inc. NetWare Application Manager is a trademark of Novell, Inc. NetWare Application Notes is a trademark of Novell, Inc.
-
Manual 99a July 17, 2001 38 NetWare Export is a trademark of Novell, Inc. NetWare Express is a registered service mark of Novell, Inc. in the United States and other countries. NetWare FleX/IP is a trademark of Novell, Inc. NetWare Global Messaging and NGM are trademarks of Novell, Inc. NetWare Global MHS is a trademark of Novell, Inc. NetWare HostPrint is a registered trademark of Novell, Inc. in the United States. NetWare Hub Services is a trademark of Novell, Inc.
-
Manual 99a 38 July 17, 2001 NetWare Message Handling Service and NetWare MHS are trademarks of Novell, Inc. NetWare MHS is a registered trademark of Novell, Inc. in the United States and other countries. NetWare MHS Mailslots is a registered trademark of Novell, Inc. in the United States and other countries. NetWare Mirrored Server Link and NMSL are trademarks of Novell, Inc. NetWare Mobile is a trademark of Novell, Inc. NetWare Mobile IPX is a trademark of Novell, Inc.
-
Manual 99a July 17, 2001 38 NetWare Telephony Services is a trademark of Novell, Inc. NetWare Token-Ring Source Routing Drivers is a trademark of Novell, Inc. NetWare Tools is a trademark of Novell, Inc. NetWare UAM is a trademark of Novell, Inc. NetWare Update is a trademark of Novell, Inc. NetWare Update/Upgrade is a trademark of Novell, Inc. NetWare Upgrade is a trademark of Novell, Inc. NetWare User Authentication Method is a trademark of Novell, Inc.
-
Manual 99a 38 July 17, 2001 Novell Alliance Partners Program is a collective mark of Novell, Inc. Novell Application Launcher is a trademark of Novell, Inc. Novell AppWorld is a trademark of Novell, Inc. Novell Authorized CNE is a trademark and service mark of Novell, Inc. Novell Authorized Education Center and NAEC are service marks of Novell, Inc. Novell Authorized Partner is a service mark of Novell, Inc. Novell Authorized Reseller is a service mark of Novell, Inc.
-
Manual 99a July 17, 2001 38 Novell ElectroText is a trademark of Novell, Inc. Novell Embedded Systems Technology is a registered trademark of Novell, Inc. in the United States and other countries and NEST is a trademark of Novell, Inc. Novell Enterprise Print Services is a trademark of Novell, Inc. Novell Gold Authorized Reseller is a service mark of Novell, Inc. Novell Gold Partner is a service mark of Novell, Inc. Novell HostPublisher is a trademark of Novell, Inc.
-
Manual 99a 38 July 17, 2001 Novell Press Logo (Novell Network Symbol) is a registered trademark of Novell, Inc. in the United States and other countries. Novell Press Logo (Open Book) is a registered trademark of Novell, Inc. in the United States and other countries. Novell Press Logo (teeth logo) is a registered trademark of Novell, Inc. in the United States and other countries. Novell Remote Program Load is a trademark of Novell, Inc. Novell Replication Services is a trademark of Novell, Inc.
-
Manual 99a July 17, 2001 38 OnLAN/LAP is a registered trademark of Novell, Inc. in the United States and other countries. OnLAN/MAC is a trademark of Novell, Inc. OnLAN/PC is a registered trademark of Novell, Inc. in the United States and other countries. Open Data-Link Interface and ODI are trademarks of Novell, Inc. Open Look is a registered trademark of Novell, Inc. in the United States and other countries. Open Networking Platform and ONP are registered trademarks of Novell, Inc.
-
Manual 99a 38 July 17, 2001 Portable NetWare is a trademark of Novell, Inc. Portable Operating System Extensions and POSE are trademarks of Novell, Inc. Power Bar is a trademark of Novell, Inc. Preferred Service is a service mark of Novell, Inc. Premium Service is a service mark of Novell, Inc. Presentation Master is a registered trademark of Novell, Inc. in the United States and other countries. Presentation Team is a trademark of Novell, Inc. Print Managing Agent is a trademark of Novell, Inc.
-
Manual 99a July 17, 2001 38 ScreenPlay is a trademark of Novell, Inc. Script Director is a registered trademark of Novell, Inc. in the United States and other countries. Serius is a registered trademark of Serius Corporation, a wholly owned subsidiary of Novell, Inc. Serius (Design) is a registered trademark of Serius Corporation, a wholly owned subsidiary of Novell, Inc. Serius Business is a registered trademark of Serius Corporation, a wholly owned subsidiary of Novell, Inc.
-
Manual 99a 38 July 17, 2001 Storage Management Services and SMS are trademarks of Novell, Inc. SuperSearch is a trademark of Novell, Inc. System V is a trademark of Novell, Inc. TCPort is a trademark of Novell, Inc. Technical Support Alliance and TSA are collective marks of Novell, Inc. The Fastest Way to Find the Right Word is a registered trademark of Novell, Inc. in the United States and other countries. The Human Device Logo (BrainShare Logo) is a registered trademark of Novell, Inc.
-
Manual 99a 38 July 17, 2001 Web Lessons is a trademark of Novell, Inc. Whenever is a trademark of Novell, Inc. WKSH is a trademark of Novell, Inc. Writer’s Workbench is a registered trademark of Novell, Inc. in the United States and other countries. X-WIN is a trademark of Novell, Inc. XREF is a trademark of Novell, Inc. XWIN is a trademark of Novell, Inc. Yes, It Runs with NetWare (logo) is a trademark of Novell, Inc. Yes, NetWare Tested and Approved (logo) is a trademark of Novell, Inc.
-
Manual 810 System Messages System Messages 103-000150-001 August 29, 2001 Novell Confidential 99a 38 July 17, 2001