NetWare 4.11 to 5 Update to NetWare 5 Update - Cramsession
1.Choose an upgrade method and a protocol.

Minimum System Requirements
Pentium processor CD-ROM Drive
64 MB RAM Mouse
(Optional for Java support)
35 MB Free on DOS partition VGA Card
(Optional for Java support)
450 MB free space for SYS volume NIC

Two methods of upgrading:

1.In-place upgrade:install nw 5 on the same machine over existing files 2.Across-the-wire upgrade (migration): Must have an existing NetWare 5 server and NDS tree first. Install the Novell Upgrade Wizard on a workstation, log in to both old and new servers as Admin equivalent, run Upgrade Wizard, and create a new project. Drag and drop users, groups, volumes, printers, and other bindery objects from old server to their new locations in the NDS tree.

Novell Upgrade wizard : Move NW 3.1x bindery, passwords, security rights Choosing a protocol 2 Use the Installation Program to Upgrade a NetWare 4.1x server to NetWare 5.
You should upgrade the server with the Master Replica of [Root] partition first.

1. Preparation for Server Upgrade 2. Performing the upgrade 3. Complete post-upgrade procedures 3 Use the Novell Upgrade Wizard to upgrade a NetWare 3.1x server to NetWare 5.
  1. Install the Novell Upgrade wizard ||\products\upgrdwzd\upgrwzd.exe
  2. Prepare for the migration
  3. Launch the utility || rograms\novell\novell pgrade wizard\novell pgrade wizard
  4. Prepare a project
  5. Move objects from the project window || bindery objects and volume data
  6. Verify that objects and files can be upgraded as specified
  7. From toolbar | click verification select project | verify project
  8. Migrate the server components across the wire
  9. Complete the post-migration steps
Notes
  1. Explain Novell Licensing Services and add an additional license certificate.
Nls helps monitor and control the use of licensed software

Components Tools to install and create license certificates  5 Explain how NetWare 5 uses virtual memory. Commands Use MONITOR.NLM --> Virtual Memory --> Swap Files to view swap statistics.

Disk Thrashing is excessive swapping of pages. The solution to thrashing is to add RAM.  

6 Describe the advantages, disadvantages, and storage concepts of the Novell Storage Services (NSS) file system.

Benefits: Drawbacks: Components 7 Set up Novell Storage Services (NSS) on your server. Use nwconfig.nlm to create NSS volumes.
  1. Load support for Java applications on the NetWare 5 server.
Hardware requirements for Java
64 Mb Ram Vesa
Mouse support Re-detecting mouse and video drivers:
Sys:\java\nwgfx\vesa_rsp.ncf

9. Launch Java programs and applets from the NetWare GUI.

+ «menuitem » Exec command
To run a Java app: JAVA [-options] <Class Path & Filename>
To run an applet: APPLET http://<URL to HTML file with applet tag>

10. Manage NetWare from the server using ConsoleOne.


To run ConsoleOne from a workstation, run SYS:\PUBLIC\MGMT\Console1.exe

ConsoleOne can be used to: Remote server access (requires RCONAG6.NLM on server). Go to My Server, Tools, RConsoleJ. In right pane, enter server's IP address and password, click Connect.

11 Install DNS and DHCP services.
  1. Extend the schema and create default DNS\DHCP objects
  2. Install novell client on adm machine sys:\public\dnsdhcp\setup.exe
  3. Install DNS\DHCP management console and NW adm snap-in files
Three ways to install DNS/DHCP on server:

The workstation software is a Java app called the DNS/DHCP Management Console. To install it, run SYS:\PUBLIC\DNSDHCP\SETUP.EXE.It adds a snap-in to NetWare Administrator and it places an icon on your desktop. The DNS/DHCP Mgmt Console has two tabs: one for DNS, one for DHCP. Be sure to use to correct tab. Wkst 48 mb Ram 8.5 mbDNS/DHCP objects can be viewed in NetWare Administrator, but you must use DNS/DHCP Mgmt Console to create, edit, or delete DNS/DHCP objects.

Configure workstations to use DNS and/or DHCP in the TCP/IP properties of the network control panel.

When the NDS schema is extended to support NDS objects we will see 3 new objects:

12. Configure and start DHCP services.
  1. Assign a NetWare server as DHCP
  2. Configure IP info
  3. Start DHCP : DHCPSRVR

DHCP is a client/server service which provides configuration parameters to Internet hosts. Both servers and clients are hosts.

There are two components to DHCP:
a protocol used to deliver the host-specific configuration parameters from a DHCP server to a host; and an added protocol for assigning network addresses to hosts.

DHCP provides all the necessary name and address information needed to locate hosts on the network.

Relay agents
DHCP requests are broadcasts and therefore are not forwarded by routers. In order for DHCP servers to respond to DHCP requests from remote segments, we must employ a relay agent. A relay agent is software based and runs on a router to forward DHCP requests to a DHCP server. The same agent then forwards responses back to the workstation.Dynamic Host Configuration Protocol (DHCP) provides conf parameters to Internet hosts

BOOTPFWD.NLM is Novell's implementation of a relay agent. BOOTPFWD.NLM must be configured on NetWare servers that route segments that would otherwise not reach the DHCP server. BOOTPFWD.NLM must be configured to forward DHCP requests to your DHCP server.

There are five new DHCP objects after nw is extended
DHCP Server Object
Subnet Object
Subnet Address Range Object
IP address Object
Subnet Pool Object


A DHCP Server Object:The DHCP server object contains a listing of subnet ranges that the DHCP server is servicing as well as server-specific configuration and policy information. Can be created in the container o – ou –c -l

A DHCP subnet object:A DHCP Subnet object represents an IP network address that is assigned to a physical network segment. The Subnet object is a container object holding IP address configuration information that can be assigned to nodes that reside on that particular IP network segment.

A Subnet Address Range objectContains a range of IP addresses available for dynamic address assignment.

An IP Address object:Manually assigns an IP address to a specific machine on the network or excludes the assignment of an IP address on the network.

A Subnet Pool ObjectAllows multiple Subnet objects to service DHCP request for a network segment that has more than 1 IP subnet address configured on it. Create in container objects

13. Import a DHCP database.
DHCP can import DHCP 2.0 or 3.0 file formats.Dns\dhcp management console| Import DHCP db

14. Configure and start DNS services.
  1. Conf DNS services using DNS\DHCP management console
  2. Start DNS services : NAMED
  3. Conf wkst to use DNS
Domain Name Services (DNS) can be up to 255 characters an it is not case sensitiveTranslates host names (such as 'www.cramsession.com') into IP addresses (139.142.34.89).The master name server (a.k.a. primary name server) maintains the database of resource records. Information maintained is called Authoritative db in BIND format

Replica name servers (secondary name server) :maintains a copy of the database from a master name server (through a zone transfer) and is used to provide a faster, more local name server.

DNS resolvers : DNS clients , submits a request for an address to a srv within its default domain.

A DNS Zone ( logical divisions of the Internet) is all or part of a domain for which the server provides DNS services. For example, the novell.com domain can be broken into a zone for support.novell.com and a zone for education.novell.com. Each portion of the domain can have its own DNS server to handle requests within the zone. Each DNS server has a Start of Authority (SOA).

There are four new DNS objects:
DNS Name Server Object
DNS Zone Object
Resource Record Set Object
Resource Record Object

Six types of resource record object (RRs): DNS-Specific NDS Objects: DNS Name Server, DNS Zone, Resource Record, Resource Record Set.

To change a resource record object, you must delete it and recreate it.Designated serversNw srv assign to service a DNS zone objectsTasks 15. Import a DNS database.
Import DNS db from DNS\DHCP management console

16. Explain the services provided by the Netscape FastTrack Server for NetWare.

Web server. Enables users to publish documents on internal corporate networks intranet and on the www Internet

17 Install the Netscape FastTrack Server for NetWare.

Requires long filename namespace on volume that holds website files. (LOAD LONG.NAM & ADD NAME SPACELONG TO <volume name>)

To install, log in from a workstation as Admin-equivalent and run \PRODUCTS\WEBSERV\SETUP.EXE from the NetWare 5 CD. Make note of the Administration Server TCP Port.

Server requires a unique ip address a long name space NW 4.11 64 Mb of RAM , 100 Mb

At the NetWare console, use NSWEB.NCF to load the server and NSWEBDN.NCF to unload the web server. By default, web pages are stored under SYS:\NOVONYX\SUITESPOT\DOCS.

18. Use the Administration Server to configure the Netscape FastTrack Server for NetWare.
Manage the web server through the Netscape Server Administration Page via a web browser. The URL will be HTTP://<SERVER NAME>:<ADMIN TCP PORT>.You have full access to administer all Netscape FastTrack web servers on your network from here.Click the button for the server you want to manage, then you have the following options: To restrict the size of a web directory, use NWADMIN to limit directory size

19. Troubleshoot and tune the Netscape FastTrack Server for NetWare.
  1. Maximum simultaneous requests:nb of active request allowed for the srv at 1 time
  2. Domain name system lookups
  3. Listen-queue size:NB of incoming connections the system will accept for that socket def:100
  4. http persistent connection timeout
  1. Max physical receive packet size : change in startup.ncf, Monitor
  2. Setting max packet receive buffers : max amount of mem allocated to receive incoming packets. Monitor
  1. File sizes
  2. HTML features
20 Describe the purpose and function of NDPS and how it differs from queue-based printing services.Single utility that manages all printing in the NetWare 5 environment.Downloads all necessary drivers to the workstation. Supports TCP/IP. Designed to handle the complexity of network printing.
Queue-Based Print services NDPS
Adm creates PQ, P, Psrv Adm create Printer Agents
Uses capture the prn port Users submit prints jobs to prn
Uni-directional comm Bi-directional comm
Does not accommodate add-ons provides extensible framework for print devices
no p&p Plug and print options available for installing public access prn

21 Explain the four NDPS components and their functions. 22 List the NDPS printer types and explain the difference between public access printers and controlled access printers.Printer Types include; 23 Configure the network for NDPS by creating and configuring the appropriate NDPS objects in NDS. 24 Configure a workstation to print to NDPS printers.

NW client 2.2 25 List the benefits and components of Z.E.N.works and describe the function of each.
Benefits
Adm User
Integrated installation of ZEN works components Send help request
App management and distribution Install run repair distributed apps auto
Desktop conf, managt and maintenance Retain customized desktop conf. profile
Wkst maintenance insing a remote control utility  
Wkst managt via a single wkst obj or group obj  
Scheduler utility  

Components

26. Install Z.E.N.works and the NetWare Client. 27 Describe Z.E.N.works policy packages and explain how policies are used to manage workstations.Collection of NDs ibjects created to maintain wkst objects, help set up parameters for managing wkst, users, groups or containers
Policy Package object Policy package Association
Container Package Container only
Windows 3.1 user Package Users, user groups containers
Win 95 user pack  
Win NT user pack  
Win 3.1 wkst pack Wkst, wkst groups , container
Win 95 wkst pack  
Win NT wkst pack  

Only 1 win 95 user package can be associated with the adminPolicy rights are applied in the order of object then container

28. Explain how to register workstations and import them into NDS using NetWare Administrator.
Wkst must be registered with NDS before they can be imported into the NDS tree and managed as other objects

Run wkst registration agent WSREG32.exe Methods of registering a wkst
  1. Application launcher
  2. Zen works scheduler
  3. Login script
Once registered a log file is created WSREG32.log

Wkst has been used to log in to net once the appear on the list they can be imported
  1. create a user policy package for each wkst platform
  2. conf wkst import policy to create wkst objects > TOOLS > Import wkst
29. Configure desktop environments throughout the network.
Enabling user system policies or computer system policies, take effect as soon as the policy is enable and the scheduled event for the policy appears

30. Distribute applications using the Novell Application Launcher.
31. Manage workstations using the Z.E.N.works Remote Control utility.
  1. run the remote control agent application
  2. Connect to the network using NDS
  3. Be registered in NDS
  4. Have a wkst object in the NDS tree
32. Set up the HelpRequester application so users can report workstations problems.

HELPREQ32 :Conf in user policies

33. Describe transitive synchronization. 34. Describe WAN Traffic Manager and its use to manage synchronization traffic.Wan traffic manager Components 35. Describe Network Time Protocol.
NW 5 server communicates time with other servers using IP. It uses TIMESYNC-loaded auto and NTP (IP standard use to determine time , based on the Internet)-manually loaded.When NTP is loaded IPX server must be set to secondary servers.

36 Configure Network Time Protocol (NTP) to synchronize time in an IP or mixed /IPX environment.


NTP.cfg NTP assumes that the time it gets from an Internet time source is the correct time. The secondary servers changes their time to match the NTp running srv

37. Describe contextless login.

Eliminate the needs for users to supply an NDS context, uses Catalog Services .

38. Set up the network to allow contextless login.
Presuming you have NDS Catalog Services installed, the steps are: 39 Describe NetWare 5 licensing, including license container objects and license certificate objects.Authorize users to use NW to connect to the net. Issues a license when a piece of software request one.Provides features and tools for monitoring and managing license usage on netWhen NW is installed 2 objects are added Types
  1. user license container
  2. server license container
  1. installed into license container objects
  2. contains info about the product: publisher, product name, version, units allow, if additional licensees are available
  3. Admin user is owner by default
40 Manage NetWare user licenses.

41 Describe compatability mode.. With a Migration Agent server on each segment there would be no problems exchanging information sourced from either IPX or IP.The MA (Migration Agent) is supported only at the NetWare server.

The MA is enabled by loading the IPX Compatibility driver (scmd.nlm) with the Migration Agent option. The Migration Agents are then used by the IP systems on the network. If more than one MA is needed, all Migration Agents must be able to access the same IPX networks or be able to exchange IPX network information. Migration Agents exchange IPX network information by invoking the IP Backbone Support feature, which is accomplished by loading the scmd.nlm with the backbone support options.CMD servers are pure IP NetWare servers.

42. Describe the Migration Gateway.

43. Configure and maintain compatibility mode on a NetWare 5 server.

44. Describe Service Location Protocol (SLP)
The Service Location Protocol provides the same function in IP networks as SAP provides in IPX networks. It registers information in a database and allows clients to query the database to find services. There are, however, two principal differences between SAP and SLP:

SLP does not maintain a global database of services. It registers services only in the local area. It discovers services in the local area via multicast requests, which are forwarded using NDS replication from network to network within a site.

SLP assumes that the client is able to locate either services themselves, or a database server representing those services, using these pan-network multicasts.

Through Novell's integration of SLP with NDS, local SLP information is compiled to provide a global representation of all available services on the network. This provides dynamic discovery of services locally and scalability in large networks.

45. Describe Novell's Public Key Infrastructure (PKI).Novell Public Key Infrastructure (PKI) Services enables the use of public key cryptography and public key certificates in an NDS-enabled network. PKI Services allows you to request, manage, and store public key certificates and their associated key pairs in the NDS tree and to establish and manage an NDS tree certificate authority (CA) that is specific to your NDS tree and to your organization.

PKI Services also works with most commercial certificate authorities such as VeriSign and with the major certificate authority software, such as Netscape CA Server. PKI Services optionally generates PKCS #10 formatted certificate signing requests (CSRs) that can be used by commercial or external certificate authorities.

Novell PKI Services consists of a PKI NLM and a snap-in module to NetWare Administrator. A network administrator uses NetWare Administrator as the administration point for PKI Services.

Public key cryptography is the system of using digital codes called "keys" to authenticate senders of messages and encrypt message content.

Public key cryptography differs from conventional cryptography in that two mathematically-related keys (a private key and a public key) are used instead of one common key.

When data is encrypted using the public key, it can only be decrypted using the private key. Conversely, when data is encrypted using the private key, it can only be decrypted using the public key.

For example, if Alice wants to send Bob an encrypted message using public key cryptography, Alice encrypts her message in Bob's public key.

Since only Bob knows his private key, only Bob can decrypt the message. Likewise, Bob can send an encrypted response to Alice by encrypting the response in Alice's public key. Only Alice can decrypt the response because only Alice knows her private key.

Public keys are normally made available in the form of a public key certificate. Public key certificates are certified by a certificate authority (CA). Normally, this process involves some due diligence on the part of the CA to verify that the individual or entity is indeed who they claim tobe.

Through the process of certification, users of a public key infrastructure have some assurance that the public key certificates are valid. The level of assurance depends on the policies and practices of the CA.

Public key cryptography is widely used for authentication and encryption in the computer industry. Novell PKI Services for NDS uses it specifically for public key certificate creation, issuing, and management.

46. Describe Novell International Cryptography Infrastructure (NICI).

47. Configure and maintain PKI.

48. Describe the features and benefits of NetWare 5.

NDS on NW 5
DNS-DHCP integrated with NDS
ZEN works
Console one (Houston)
New B-U utility
IP support as core protocol
Ipx support as core protocol
Compatibility mode
SLP
Migration gateway
Netscape FastTrack srv
LDAP for NDS and ADSI NDS provider
Java srv framework
Oracle8 for NW (5 user)
Multi-processing kernel
Enhanced loader support
Cryptographic services
NSS
NDPS
Hot -plug PCI
Support fot I2O
SAS Scure authentication services c2 certified
PKIS public key infrastucture services CAAudit
New Java install NIS novell installation services
Novell Upgrade wizard


49 Describe the process of migrating to NetWare 5 in an IP only environment.

Thanks very much to Gesty-Rose Kavanaght for contributing this Cramsession