Back to Contents Page

Advanced Features

Dell™ PowerVault™ 715N NAS Appliance System Administrator's Guide

  Installing Multilanguage User Interface
(MUI) Support

  Installing and Configuring Support for Other Languages

  Network Adapter Teaming

  Services for UNIX

  File Server for Macintosh

  Services for NetWare

  Microsoft Directory Synchronization Services

  Using Secured Socket Layers

  SNMP Considerations

  Using Console Redirection

  Defragmenting a Volume Containing Persistent Images


This section includes descriptions of advanced features that cannot be performed from the Dell™ PowerVault™ NAS Manager menus. The following topics are discussed:

To perform the procedures in this section, you must use the Terminal Services Advanced Client. To access the Terminal Services Advanced Client, perform the following steps.

NOTE: To use the NAS Manager, you must be logged in as administrator. The NAS Manager default administrator user name is administrator and the default password is powervault.
  1. From the NAS Manager, click Maintenance.

  2. Click Terminal Services.

  3. Log on as administrator.


Installing Multilanguage User Interface
(MUI) Support

NOTE: Installing the MUI for your language automatically installs the appropriate language locale.

The PowerVault 715N NAS appliance allows you to change languages for its Microsoft Windows® Powered operating system's user interface. The MUI allows the PowerVault 715N to display Windows Powered operating systems menus, dialogs, and help files in multiple languages. The supported MUI languages are simplified Chinese, traditional Chinese, Dutch, English, French, German, Italian, Japanese, Korean, Spanish, and Swedish. You must install a language MUI from the Multilingual Support CD before it is available for use on the system. When you receive a PowerVault 715N NAS appliance from Dell, the root directory of the C: hard drive contains a localization directory, which contains all of the files included in the Multilingual Support CD. If you have performed the reinstallation procedure, this directory does not exist, and you must install a language MUI from the Multilingual Support CD.

NOTE: Installing and configuring the operating system MUI does not affect the language used by the NAS Manager.
  1. In Windows Explorer on a remote system, right-click the CD drive, and then click Sharing. In Sharing tab on the Compact Disk Properties page, click the radio button next to Share this folder to share the CD drive, and then insert the Multilingual Support CD that came with the PowerVault 715N into your remote system CD drive.

  2. From the remote system, connect to the NAS Manager.

  3. On the NAS Manager primary menu, click the Maintenance tab, and then click Terminal Services to create a Terminal Services Advanced Client session with the appliance.

  4. Log on to the system as an administrator.

  5. Close the PowerVault Advanced Administration Menu by clicking Exit.

  6. Double-click My Appliance on the NAS desktop.

  7. If this is a new system from Dell, perform the following procedure, and then go to step 9. Otherwise, go to step 8.

    1. Double-click Local Disk C: to open the root directory.

    1. Double-click the Localization directory.

    2. Double-click the muisetup.exe file to configure the language.

  8. If you performed the reinstallation procedure on your system, perform the following procedure.

    1. In Windows Explorer on a remote client system, right-click the CD drive, and then click Sharing.

    1. In Sharing tab on the Compact Disk Properties page, click the radio button next to Share this folder to share the CD drive, and then insert the Multilingual Support CD that came with your NAS appliance into your remote client system CD drive.

    2. Map a network drive to the CD share, but do not select Reconnect at logon.

    3. Browse to the mapped drive, and then double-click the CD to launch the Multilingual Support CD's Web interface.

    4. Click the Install Multilanguage User Interface (MUI) Support link to launch the Multilanguage File Installation installer program.

  9. In the installer window, select the languages to be installed. Next, from the menu, set the default MUI language.

  10. Click OK to perform the installation.

  11. At an Insert Disk window appears, you must perform the following steps:

    1. Click OK.

    1. In the Files needed window, click Browse, browse to the i386 directory on the Multilingual Support CD or the C:\localization directory (if it exists), and then click Open.

    2. If the Insert Disk window, click OK to allow the operating system to find the required files for installation.

  12. Disconnect the mapped network drive from the CD share that you mapped in step 8c.

  13. After the installation is complete and you have disconnected the network drive, you must reboot your system.

After a MUI language has been installed, you can apply it to any user by performing the following steps:

  1. From the remote system, connect to the NAS Manager.

  2. On the NAS Manager primary menu, click the Maintenance tab.

  3. Click Terminal Services to create a Terminal Services Advanced Client session with the NAS appliance.

  4. Log on to the system as an administrator.

  5. On the Advanced Administration Menu, click System Management, and then click Set Regional Options to launch the Regional Options control panel.

  6. On the General tab, select the MUI language from the Your locale (location) drop-down menu, and then click Apply.

  7. Log off and log on to the system again for the new language MUI to take effect.


Installing and Configuring Support for Other Languages

NOTE: Only install additional language locales if your preferred language is not available with MUI support or you need additional locale support.

The Windows Powered operating system that comes installed in the PowerVault 715N can be configured to support the ability to read and write documents in a number of languages. To install the software required to support a specific language, perform the following steps:

  1. In Windows Explorer on a remote system, right-click the CD drive, and then click Sharing. In Sharing tab on the Compact Disk Properties page, click the radio button next to Share this folder to share the CD drive, and then insert the Multilingual Support CD that came with the PowerVault 715N into your remote system CD drive.

  2. From the remote system, connect to the NAS Manager.

  3. On the NAS Manager primary menu, click the Maintenance tab, and then click Terminal Services to create a Terminal Services Advanced Client session with the NAS appliance.

  4. Log on to the system as administrator.

  5. Close the Advanced Administration Menu by clicking Exit.

  6. Double-click My Appliance on the NAS desktop.

  7. If this is a new system from Dell, perform the following procedure, and then go to step 9. Otherwise, go to step 8.

    1. Double-click Control Panel.

    1. Double-click Regional Options.

  8. If you performed the reinstallation procedure on your system, perform the following procedure.

    1. In Windows Explorer on a remote client system, right-click the CD drive, and then click Sharing.

    1. In Sharing tab on the Compact Disk Properties page, click the radio button next to Share this folder to share the CD drive, and then insert the Multilingual Support CD that came with your NAS appliance into your remote client system CD drive.

    2. Map a network drive to the CD share, but do not select Reconnect at logon.

    3. Browse to the mapped drive, and then double-click the Multilingual Support CD to launch the Multilingual Support CD's Web interface.

    4. Click the Install Language Locales Not Supported by MUI link to launch the Regional Options control panel.

  9. From the Language Settings for the System panel, select the languages to be configured.

  10. Set the default language for the system by clicking Select default..., and then selecting the appropriate language from the menu. Click OK.

  11. Click Apply to complete the operation.

  12. If an Insert Disk window appears, you must perform the following steps:

    1. Click OK.

    1. In the Files needed window, click Browse, browse to the i386 directory on the Multilingual Support CD or the C:\localization directory (if it exists), and then click Open.

    2. Click Open, and then click OK from the Insert Disk window to allow the operating system to find the required files for installation.

  13. After the installation is complete, if applicable, disconnect the mapped network drive from the CD share that you mapped in step 7b.

  14. Reboot your system.

NOTE: For more information, see the Microsoft Windows Powered operating system's online help.

Network Adapter Teaming

Network adapter teaming allows the system to use the combined throughput of multiple network ports in parallel to increase performance or to provide fault tolerance. Network adapter teaming on your NAS appliance supports the following technologies:

Adaptive Load Balancing

ALB is a simple and efficient method for increasing the NAS appliance's network transmission throughput. The ALB software continuously analyzes transmission loading on each adapter and balances the load across the teamed ports as needed. Adapter teams configured for ALB also provide the benefits of adapter fault tolerance. To use ALB, the Ethernet ports on the NAS appliance must be linked to the same Ethernet switch.

Adapter Fault Tolerance

AFT provides the safety of an additional backup link between the appliance and the hub or switch. If a hub, switch port, cable, or Ethernet port fails, you can maintain uninterrupted network performance. AFT is implemented with a primary adapter and a backup, or secondary, adapter. If the link to the primary adapter fails, the link to the secondary adapter automatically takes over.

Link Aggregation

Link aggregation is a performance technology developed by Intel and others to increase your system's network throughput. Unlike ALB, link aggregation can be configured to increase both transmission and reception channels between your system and switch. Link aggregation works only with compatible Intel switches. To use link aggregation, the Ethernet ports of the NAS appliance must be linked to the same Intel Ethernet switch.

Fast EtherChannel

FEC is a performance technology developed by Cisco Systems to increase your system's network throughput. Unlike ALB, FEC can be configured to increase both transmission and reception channels between your appliance and switch. FEC works only with compatible Cisco switches. To use FEC, the Ethernet ports of the NAS appliance must be linked to the same Cisco FEC-compatible switch.

IEEE 802.3ad

IEEE 802.3ad is a performance technology standard that increases your system's network throughput. It is similar to the FEC standard developed by Cisco. However, whereas FEC works only with FEC-compatible Cisco switches, IEEE 802.3ad works with switches that support IEEE 802.3ad. To use IEEE 802.3ad, the Ethernet ports of the NAS appliance must be linked to the same IEEE 802.3ad switch.

Creating Network Teams

Create network teams through the Network Teaming utility, Intel PROSet II. To access the Network Teaming utility from the NAS Manager, perform the following steps:

  1. On the NAS Manager primary menu, click Maintenance.

  2. Click Terminal Services.

  3. Log on to the Terminal Services session as administrator.

  4. Under Administrative Tools on the Advanced Administration Menu, click Intel Network Teaming.

The Network Teaming utility, Intel PROSet II, displays.

  1. Click Action, click Add to Team, and then click Create New Team....

The Teaming Wizard displays.

  1. Select the type of team to create, and then click Next.

The types of team include Adapter Fault Tolerance, Adaptive Load Balancing, Fast EtherChannel*/Link Aggregation, and IEEE 802.3ad.

  1. Select the adapters to include with this team, and then click Next.

  2. Verify the team contains the appropriate members, and then click Finish.

  3. If the team needs to be modified, click Back.

Removing Network Teams

Remove network teams through the Network Teaming utility, Intel PROSet II. To access the Network Teaming utility from the NAS Manager, perform the following steps:

  1. On the NAS Manager primary menu, click Maintenance.

  2. Click Terminal Services.

  3. Log on to the Terminal Services session as administrator.

  4. Under Administrative Tools on the Advanced Administration Menu, click Intel Network Teaming.

The Network Teaming utility, Intel PROSet II, displays.

  1. In the tree view, click the team to remove.

  2. Click Action, and then click Remove.

Removing an Adapter From a Network Team

Remove an adapter from a network team through the Network Teaming utility, Intel PROSet II. To access the Network Teaming utility from the NAS Manager, perform the following steps:

  1. On the NAS Manager primary menu, click Maintenance.

  2. Click Terminal Services.

  3. Log on to the Terminal Services session as administrator.

  4. Under Administrative Tools on the Advanced Administration Menu, click Intel Network Teaming.

The Network Teaming utility, Intel PROSet II, displays.

  1. In the tree view, click the adapter to remove.

  2. Click Action, and then click Remove.

Changing the Network Team Mode

Change the network team mode through the Network Teaming utility, Intel PROSet II. To access the Network Teaming utility from the NAS Manager, perform the following steps:

  1. On the NAS Manager primary menu, click Maintenance.

  2. Click Terminal Services.

  3. Log on to the Terminal Services session as administrator.

  4. Under Administrative Tools on the Advanced Administration Menu, click Intel Network Teaming.

The Network Teaming utility, Intel PROSet II, displays.

  1. In the tree view, click the team to modify.

  2. Click Action, and then click Change Team Mode.

  3. In the Teaming Wizard, select the type of team to create, and then click Next.

The types of team include Fault Tolerance, Load Balancing, Fast EtherChannel*/Link Aggregation, and IEEE 802.3ad.

  1. Click OK to close.


Services for UNIX

Services for UNIX (SFU) provides the tools needed to integrate UNIX and Windows networks by leveraging existing UNIX network resource and expertise. SFU includes more than 60 of the most common UNIX command line utilities to provide a familiar environment for UNIX users and administrators.

Server for NFS allows you to leverage your existing UNIX network resources for UNIX clients.

SFU provides important tools to enhance and simplify the administration of your network.

Server for Network File System (NFS)

SFU provides a robust Server for NFS that can be used to provide disk resources from your systems running Windows NT and Windows 2000 to any system on your network that supports NFS. To administer Server for NFS, set the following options from the SFU MMC console:

UNIX Utilities

Table 6-1 lists UNIX utilities provided with SFU.

Table 6-1. Categories of UNIX Utilities

Category

Utility

File and directory utilities

basename, cp, diff, dirname, dos2unix, find, ln, ls, mkdir, mount, mv, paste, pwd, rm, rmdir, sdiff, split, tee, touch, uniq, uudecode, uuencode, umount

Text utilities

cat, cut, grep, egrep, fgrep, head, more, printf, sed, sort, tail, tr, vi, wc

Programming utilities

perl, od, sh, strings

Security utilities

chmod, chown, su

Process and general utilities

cron, crontab, date, du, kill, nice, printenv, ps, rcmd, renice, sleep, atr, top, uname, wait, which, xargs

Telnet Server

The telnet server works optimally for most installations. It accepts logins from a variety of clients, including the telnet clients shipped with Windows 2000, Windows NT, Windows 95, and Windows 98, as well as a variety of character mode terminal clients from virtually any operating system. In addition, it can be configured to meet specific site requirements such as improving security, simplifying logins, and supporting stream or console mode.

Authentication

The SFU telnet server supports Windows NT LAN Manager (NTLM) for authentication of client logins. NTLM allows users to be automatically authenticated to the telnet server based on their Windows NT login. This makes using telnet completely transparent to users, while ensuring that clear text passwords do not pass over the network. NTLM must be supported on the client side of the login as well, however.

When users are logged in to a system that is using NTLM login, they are restricted to local drives on that system. If they need to map network resources, they can do so by explicitly mapping with full credentials.

Administration

The telnet server is administered using the SFU MMC snap-in or the tnadmin program.

The options available are:

Services for UNIX MMC Console

SFU UNIX includes a single MMC for managing all of SFU. The MMC provides a cohesive management interface that allows you to administer all systems on the network from any console. Further, since SFU supports the Windows Management Interface (WMI), management can be scripted from the command line.

ActiveState ActivePerl 5.6

SFU includes ActiveState's ActivePerl 5.6, a full-featured port of Perl 5.6 and Perl Script to Windows Powered operating systems. Among other improvements, ActivePerl 5.6 includes support for fork() emulation at the interpreter level, improving the portability of scripts and modules. ActivePerl also provides full support for the Windows Script Host, making ActivePerl an excellent tool for system administration tasks.

User Name Mapping

User Name Mapping provides mapping of names between the UNIX and Windows environments. You can perform User Name Mapping either from SFU or by clicking NFS on the Services page of the NAS Manager.

With User Name Mapping, you can create simple maps between Windows Powered user accounts and corresponding UNIX accounts. You can also use the Advanced Map feature to map accounts with dissimilar names. Given that UNIX user names are case-sensitive, while Windows Powered operating system names are not, the use of User Name Mapping can greatly simplify maintaining and managing accounts in the two environments. User Name Mapping uses Network Information Service (NIS) or local Personal Computer Network File System (PCNFS) user and group files to authenticate users. Also, User Name Mapping supports bidirectional one-to-many mapping, allowing you to map a single UNIX or Windows Powered operating system account to multiple accounts in the other environment. For example, you can map more than one administrative account in a Windows Powered operating system to the UNIX root account.

In SFU, the Username Mapping Service and NT Authentication Service can be installed from the NAS appliance's share, DomainUtils.

To create User and Group Name Maps, access the SFU Administration window by performing the following steps:

  1. From the NAS Manager, click Maintenance.

  2. Click Terminal Services.

  3. Log on to Terminal Services as administrator.

  4. Close the Advanced Administration Menu.

  5. Click the Start button and point to Programs—> Administrative Tools—> Windows Services for UNIX.

  6. Click Services for UNIX Administration.

The SFU Administration Console displays.

  1. Click User Name Mapping.

The User Name Mapping on Local Computer window displays. You can use this window to define your user maps.

Configuration

To configure the type of server to be used to access UNIX user and group names, perform the following steps:

  1. On the User Name Mapping on local computer page primary menu, click Configuration.

  2. Click either NIS or PCNFS to select the server type.

  3. If the server type is PCNFS, specify the location and file name of the UNIX password file and UNIX group file.

NOTE: The UNIX password file and group file formats must conform to the UNIX standard for these files.
  1. Specify the refresh interval for synchronizing user and group information with the mapping service.

  2. Click Apply to save the configuration.

Defining Maps

To define simple maps in SFU, select the Simple Maps check box, and then perform the following steps:

  1. Specify the Windows Domain. If the server is configured as PCNFS, go to step 4.

  2. Specify the NIS Domain.

  3. Optionally, specify the NIS Server.

  4. Click Apply to create the maps.

If you are defining advanced maps, you create user and group maps individually. In the NAS Manager, select Show User Maps or Show Group Maps. To create advanced maps in SFU, deselect the Simple Maps check box and perform the following steps:

  1. Specify the Windows Domain. If the server is configured as PCNFS, go to step 4.

  2. Specify the NIS Domain.

  3. Optionally, specify the NIS Server.

  4. Create User Map or Group Map entries.

  5. Click List Windows Users or List Windows Groups.

  6. Click List UNIX Users or List UNIX Groups.

This action refreshes your UNIX and Windows users and groups selection.

  1. Create map entries by selecting a Windows user/group and a UNIX user (UID)/group (GID) from the list and clicking Add.

  2. Click Apply to create the maps.

Map Maintenance

You can maintain your maps from the User Name Mapping tree of the SFU window. Map maintenance allows you to save currently defined maps and to restore saved maps.

To back up the currently defined maps, perform the following steps:

  1. From the SFU window, click User Name Mapping.

  2. Click Map Maintenance.

  3. Specify a name and location of a file in which to back up the maps.

  4. Click Backup.

To restore the previously backed up set of maps, perform the following steps:

  1. From the SFU window, click User Name Mapping.

  2. Click Map Maintenance.

  3. Specify the name and location of the file that contains the saved maps.

  4. Click Restore.

Basic Scenarios

For UNIX and Windows NT Username Mapping, an NIS Server must already exist in the UNIX environment or a UNIX user and group file must exist on the PowerVault NAS appliance. Username Mapping associates UNIX users and groups to Windows NT users and groups. You can use two types of maps, simple and advanced. Simple maps define a one-to-one relationship between same name users and groups. Advanced maps define a relationship between dissimilar names and groups.

Workgroup

In the Workgroup scenario, you configure Username Mapping locally on the PowerVault 715N system. All maps are contained on this system.

Domain

In the Domain scenario, you configure Username Mapping on the domain controller. The Username Mapping Service and the NT Authentication Service must be installed on the Domain Controller. If multiple Domain Controllers are present, NT Authentication Service must be installed on each Domain Controller.


File Server for Macintosh

File Server for Macintosh (FSM) provides the tools needed to integrate Macintosh and Windows networks by leveraging existing Macintosh network resource and expertise.

Microsoft UAM Volume

A user authentication map (UAM) is a software program that prompts users for an account name and password before they log on to a server. The Macintosh Chooser has a standard UAM built in, which uses the clear-text password or Apple's RandNum Exchange method of security.

Microsoft Authentication offers an additional level of security because the password is used as a key to encrypt a random number. If the system administrator has determined that encryption is an important security measure, you might be asked to use Microsoft Authentication in addition to Microsoft UAM authentication.

Requirements

To use Microsoft UAM 5.01, you must have a Macintosh client running AppleShare Client 3.8 or newer or the Mac operating system (OS) 8.5 or newer operating system. If you do not meet the minimum requirements, the Microsoft UAM Installer installs the old Microsoft UAM 1.0 module. If you upgrade your system software, you need to re-run the Microsoft UAM Installer.

Installing User Authentication

Log on to the Microsoft UAM Volume on the system to access the MS UAM file, and then drag this file to the AppleShare Folder in your System folder.

To access the Microsoft Authentication files on the system, perform the following steps:

  1. Click Chooser on the Macintosh Apple menu.

  2. Double-click the AppleShare icon, and then click the AppleTalk zone in which the system with Services for Macintosh resides.

Ask your system administrator if you are not sure of the zone.

  1. Select the system from the list of file servers, and click OK.

  2. Click Registered User or Guest, and then click OK.

  3. Select the Microsoft UAM Volume, and then click OK.

  4. Close the Chooser dialog box.

To install the authentication files on the Macintosh workstation, perform the following steps:

  1. Double-click the Microsoft UAM Volume on the Macintosh desktop.

  2. Double-click the Microsoft UAM Installer file on the Microsoft UAM volume.

  3. Click Continue in the Installer Welcome screen.

The installer reports whether the installation succeeded.

If the installation succeeded, Macintosh users of this workstation are offered Microsoft Authentication when they connect to the system.

Adapter Bindings

FSM can bind to only one network adapter. By default, it is bound to the embedded 10/100TX Network Adapter. To change the binding in systems with multiple network adapters, the AppleTalk Protocol Properties for the network adapter to be used by AppleTalk must be modified to accept inbound connections.

AppleTalk Protocol Adapter Binding

To modify the AppleTalk protocol adapter binding for Filers with multiple network adapters, perform the following steps from the NAS Manager:

  1. On the NAS Manager primary menu, click Maintenance.

  2. Click Interfaces.

  3. Click the radio button next to the adapter you want to use for the AppleTalk protocol.

  4. On the Tasks menu, click AppleTalk.

  5. Click the check box next to Enable inbound AppleTalk connections on this adapter.

  6. Optionally, if you use AppleTalk zones, select the appropriate zone in the drop-down box.

  7. Click OK.


Services for NetWare

Services for NetWare (SFN) are compatible with Novell NetWare Bindery service for authentication and file access using the internetwork packet exchange/sequenced packet exchange (IPX/SPX) network protocol.

Configuring the NWLink IPX/SPX Compatible Protocol

To configure this protocol, you need the internal network number, the frame type, and the network number.

Internal Network Number

Internal network numbers are used for internal routing and are generally only needed for servers. You should not need to change this option on your system.

Frame Type and Network Number

Frame types define the packet formats that are used by different networks. It is important that all systems in a network have the same frame type, so that they can communicate with the rest of the network.

When you are configuring your system, it attempts to automatically detect the frame type for the client. In most cases, this is successful. However, occasionally the automatic detection feature selects an inappropriate frame type, usually because more than one frame type exists on the network. If this happens, you should manually set the frame type to match the one specified on your NetWare server. Note that if more than one frame type exists, select the one that is detected first. For example, if frame type Ethernet 802.2 and Ethernet 802.3 are bound to the same segment, then configure frame type Ethernet 802.2. The order of detection is Ethernet 802.2, Ethernet 802.3, Ethernet II, and then Ethernet SNAP.


Microsoft Directory Synchronization Services

Microsoft Directory Synchronization Services (MSDSS) allows you to synchronize a wide variety of data stored in the Active Directory service with Novell Directory Service (NDS) and NetWare 3.x binderies.

MSDSS is a highly flexible service that helps Novell users:

MSDSS supports two-way synchronization with NDS and one-way synchronization with NetWare 3.x binderies to provide a complete directory interoperability solution. MSDSS also supports password synchronization and provides a directory migration service.

MSDSS allows NetWare users to deploy Active Directory without having to replace existing directories or bear the cost of managing two separate directories. As a result, users have the flexibility to:

MSDSS is easy to use and makes synchronization and Active Directory setup easy through its management interface. It is fully featured to allow users a choice of management, synchronization, and migration options.

MSDSS supports all major NetWare platforms and most Novell directories and binderies, and it includes support for IPX/SPX and TCP/IP network protocols.

Windows 2000 MSDSS Domain Controller

To implement MSDSS, you must install the Windows 2000 Server operating system and the MSDSS software (available on the Microsoft Services for NetWare Version 5 CD) on at least one system. In Windows 2000, when you promote a system running Windows 2000 Server to an Active Directory server, it becomes a domain controller. You use this domain controller to configure Active Directory, install MSDSS, and then import information from the existing NetWare environment.

The larger the environment, the more new servers you need. If you are planning to have more than one domain, then you need new hardware for the first domain controller in each domain.

You must also install Novell Client Access software on the MSDSS server or servers. MSDSS uses Novell Client Access to authenticate and to access NDS. While accessing NDS, it authenticates, but does not use a license. MSDSS also uses Novell Client Access to map one directory's contents to another, taking into account the fact that the object classes in Novell's NDS or bindery directories are different from Active Directory object classes. Novell Client Access is also required to use File Migration utility to migrate files.

You can install Novell Client Access in four modes: IP only, IPX only, IP and IPX combined, and IP with IPX Compatibility Mode. Most NetWare environments still use IPX today. MSDSS works in all the modes because it uses Novell Client Access to access the lower layers.

If you are migrating NDS, you can import the user and group information from one NDS server to the MSDSS server because you have one user database per tree. You can then migrate the file system. Remember that each Novell server has its own file system, which is not replicated to other servers (whereas NDS is replicated to other servers). After the files are migrated, you can uninstall NDS from the server to provide more space for the Windows 2000 Server operating system.

Outline of the Deployment Procedure

The next two sections describe the procedures for implementing MSDSS in a smaller (local area network [LAN] only) or larger (wide area network [WAN]) network. You need to adapt the guidelines to suit your environment and goals.

Small Environment

A small company with a LAN-based and uncomplicated network is often a likely candidate for a quick migration. After doing all the preparations described in the above section, perform the following steps (adjusted, if necessary, to your situation):

  1. Back up your NetWare system and user data.

  2. Install and configure a Windows 2000 domain controller (see the documentation that comes with your operating system software).

  3. Install the Novell Client for Windows 2000 from the Novell website
    (http://www.novell.com/download/).

  4. Replace services or applications that require NDS with software that is compatible with Active Directory. (Remove NDS applications before you begin using MSDSS, except for ZENworks, which can be replaced by IntelliMirror at any time.)

  5. Install MSDSS from the system DomainUtils share.

NOTE: To access MSDSS software, map a network drive to \\<Dellxxxxxxx>\DomainUtils, where <Dellxxxxxxx> is the name of the PowerVault 715N system.
  1. Log on to the NDS tree or bindery server as administrator.

  2. Log on to the appropriate Windows 2000 domain as a member of the Domain Admins group.

  3. On the MSDSS server, open the Help files, and then print out the procedures "To perform a one-time migration" and "To migrate files."

  4. Click the Start button, and then point to Programs—> Administrative Tools—> Directory Synchronization to start MSDSS.

  5. Follow the instructions as described in the Help printout, "To perform a one-time migration." The prompts guide you through the following steps:

    1. Right-click MSDSS in the console tree, and then click New Session to start the New Session Wizard.

    1. Specify whether objects are to be copied from NDS or Bindery.

    2. Click Migration.

    3. If you plan to migrate files as well as directory objects, click the Migrate Files check box.

You must also run the File Migration utility.

    1. Specify the path to the Active Directory container into which you want to copy items.

    2. Accept the default domain controller in which to store the migration log.

    3. Specify the NDS Container or Bindery Container from which to copy items.

    4. Provide the name and password of the Novell administrative account.

    5. On the Initial Reverse Synchronization page, specify Password Options (such as Set passwords to the user name.)

When you are performing a migration, this page does not include the option to actually perform an initial reverse synchronization, but it is the page where you specify which password option you want to use.

    1. Set synchronization mode to default object mapping or to custom object mapping.

    2. If you select custom object mapping, you are prompted to manually establish one-to-one relationships between pairs of objects.

    3. Click Finish.

After the user accounts are migrated, you can migrate the file system (migrating the users before the files allow you to migrate file-system permissions). Follow the instructions as described in the Help printout, "To migrate files." The prompts guide you through the following steps:

The NDS Modify right converts, by default, to Read because it does not have an equivalent NFTS right. You might want to click the Write check box to allow
read/write access.

If the NDS or Bindery volume you selected in the source tree indicates Unavailable, then you are not currently logged on to that tree or Bindery server. Log on, and then press <F5> after reselecting the volume to view the directories within the displayed volume.

The utility scans all source volumes and counts and displays the number of directories and files in each. It ensures that proper access has been given to each source volume, directory, and file. If any errors occur, the utility displays them respectively under NetWare scan logs and Windows scan logs. You can select a number of acceptable errors; if this number is exceeded, the process aborts, allowing you to return to previous steps to correct the errors.

Manually migrate (or use third-party utilities to migrate) object security permissions and system accounts, printer objects, application objects, and other objects that MSDSS does not migrate from Bindery or NDS to Active Directory. (MSDSS migrates NetWare user accounts, groups, and distribution lists for Bindery and NDS, and, for NDS only, MSDSS also migrates NDS organizational units and organizations.)

  1. Upgrade your NetWare server(s) to the Windows 2000 Server or Professional operating system.

  2. On each Windows desktop in your NetWare network, uninstall Novell Client Access.

You must configure the desktops to join the Windows 2000 domain.

  1. Optionally, upgrade NetWare clients (workstations) to the Windows 2000 Professional operating system.

  2. Configure all client systems (both Windows and non-Windows), to join the Windows 2000 domain.

Be sure the users know how to handle their password the first time they log on (for possible password options, see "MSDSS Password Management" in "MSDSS Deployment: Understanding Synchronization and Migration)" at http://www.microsoft.com.

Medium-Sized or Large Environment

An organization large enough to have WAN links probably selects to synchronize its networks temporarily while performing a gradual migration over time (up to 3 months for a large network), or it prefers to use synchronization to establish a mixed Novell/Windows 2000 network on a long-term basis. If you plan a staged migration, one-way synchronization is often the appropriate choice.

After doing all the preparation described above, perform the following steps (adjusted, if necessary, to your situation):

  1. Back up your NetWare user and system data.

  2. Install and configure a Windows 2000 domain controller (see the documentation that comes with your operating system software).

  3. Install the Novell Client for Windows 2000 from the Novell website
    http://www.novell.com/download/.

  4. Install MSDSS from the PowerVault 715N system DomainUtils share.

NOTE: To access MSDSS software, map a network drive to \\<Dellxxxxxxx>\DomainUtils, where <Dellxxxxxxx> is the name of the PowerVault 715N system.
  1. Log on to the NDS tree or Bindery server with administrative credentials.

  2. Log on to the appropriate Windows 2000 domain as a member of the Domain Admins group.

  3. On the MSDSS server, open the Help files, and then print out the steps (briefly summarized below) for "To perform a one-way synchronization" or "To perform a two-way synchronization."

  4. Click the Start button, point to Programs—> Administrative Tools—> Directory Synchronization to start MSDSS, and then allow the prompts to guide you through the following tasks:

    1. Start the New Session Wizard (right-click MSDSS in the console tree).

    1. Select Novell Bindery or Novell Directory Services (NDS) for one-way synchronization; or select Novell Directory Services (NDS) for two-way synchronization.

    2. Select One-way synchronization (from Active Directory to NDS or Bindery) or select Two-way synchronization (from Active Directory to NDS and back).

    3. Specify the path to the Active Directory container into which you want to copy items.

    4. Accept the default domain controller in which to store the session database.

    5. Specify the NDS Container or Bindery Container from which to copy items.

    6. Provide the name and password of the Novell administrative account.

    7. On the Initial Reverse Synchronization page, select Perform an initial reverse synchronization.

    8. Still on the Initial Reverse Synchronization page, specify Password Options (such as Set passwords to the user name).

    9. On the Object Mapping Scheme page, click Default (to accept the default mapping for each source and target directory pair), or (for NDS only) click Custom, and then click Object Mapping Table (to specify objects for which you want to establish a one-to-one relationship, regardless of the object location in either directory tree). (MSDSS does not support custom object mapping for Bindery.)

    10. Still on the Object Mapping Scheme page, click Filters if you want to configure a filter for this synchronization session.

    11. On the Session Name page, accept the default session name or specify a new name.

    12. Click Finish.

  5. If you selected one-way synchronization, you should now perform all user, group, and NDS organizational unit container (OU) object management from Active Directory. If you established two-way synchronization, you can now manage user, group, and OU objects from either Active Directory or NDS.

  6. If you plan long-term coexistence between Active Directory and NetWare, you are now finished, unless you want to migrate a subset of users, systems, and/or files. If you plan to continue by migrating in stages from NetWare to Active Directory, perform the following tasks in the time-frame that is convenient for you:

For more information, see the Novell website at http://support.novell.com/servlet/Knowledgebase and the Windows 2000 website at http://www.microsoft.com/windows2000.


Using Secured Socket Layers

This section explains how secured socket layers (SSL) are used in the NAS appliance. It also explains how to use your own certificate, if you have one, and how to regenerate your certificate.

Introduction to SSL Certificates

Certificates contain information that is used to establish system identities over a network. This identification process is called authentication. Although authentication is similar to conventional forms of identification, certificates enable Web servers and users to authenticate each other before establishing a connection to create more secure communications. Certificates also contain encryption values, or keys, that are used in establishing a Secure Sockets Layer (SSL) connection between the client and server. Information, such as a credit card number, sent over this connection is encrypted so that it cannot be intercepted and used by unauthorized parties.

Two types of certificates are used in SSL. Each type has its own format and purpose. Client certificates contain personal information about the clients requesting access to your site, which allows you to positively identify them before allowing them access to the site. Server certificates contain information about the server, which allows the client to positively identify the server before sharing sensitive information.

Server Certificates

To activate your Web server's SSL 3.0 security features, you must obtain and install a valid server certificate. Server certificates are digital identifications containing information about your Web server and the organization sponsoring the server's Web content. A server certificate enables users to authenticate your server, check the validity of Web content, and establish a secure connection. The server certificate also contains a public key, which is used in creating a secure connection between the client and server.

The success of a server certificate as a means of identification depends on whether the user trusts the validity of information contained in the certificate. For example, a user logging on to your company's website might be hesitant to provide credit card information, despite having viewed the contents of your company's server certificate. This might be especially true if your company is new and not well known.

For this reason, certificates are sometimes issued and endorsed by a mutually trusted, third-party organization, called a certification authority (CA). The certification authority's primary responsibility is confirming the identity of those seeking a certificate, thus ensuring the validity of the identification information contained in the certificate.

Alternatively, depending on your organization's relationship with its website users, you can issue your own server certificates. For example, in the case of a large corporate intranet handling employee payroll and benefits information, corporate management might decide to maintain a certificate server, and assume responsibility for validating identification information and issuing server certificates. For more information, see "Obtaining a Server Certificate From a Certification Authority."

PowerVault 715N Certificate

By default, the PowerVault 715N has a self-generated and self-signed certificate. The configured SSL port is 1279.

NOTE: For non-SSL communication, use port 1278. This port is not a secure port and all text is sent in plain text over the network.

Using a Custom Certificate

If a CA is present in the network, the administrator can choose to change the default PowerVault 715N certificate. The administrator must use the wizards to first request a certificate, and then apply it to the appliance.

Obtaining a Server Certificate From a Certification Authority

NOTE: If you are replacing your current server certificate, the Internet Information Services (IIS) continues to use the old certificate until the new request has been completed.

Find a certification authority that provides services that meet your business needs, and then request a server certificate.

NOTE: For the latest list of certification authorities supporting IIS, see the Microsoft Security website. In the By Category list, select Certification Authority Services.

To obtain a server certificate, perform the following steps:

  1. On the PowerVault NAS Manager primary menu, click Maintenance.

  2. On the Maintenance page, click Terminal Services.

  3. Log on to a Terminal Services Advanced Client session.

  4. In the Advanced Administration Menu, click System Management, and then from the list, click Internet Information Services.

  5. Navigate to and right-click the Administration site section, and then select Properties.

  6. Under Secure Communications on the Directory Security property sheet, click Server Certificate to access the Web Server Certificate Wizard.

  7. Use the Web Server Certificate Wizard to create a certificate request.

  8. Send the certificate request to the certification authority.

The CA processes the request and sends you the certificate.

NOTE: Some certification authorities require you to prove your identity before processing your request or issuing you a certificate.
  1. Use the Web Server Certificate Wizard to install your certificate.

For more information about SSL, see the Internet Information Services online help.


SNMP Considerations

Your NAS appliance uses the simple network management protocol (SNMP). The NAS Manager provides a method for configuring the community and agent properties.

Configuring SNMP Community Properties

  1. On the NAS Manager primary menu, click Maintenance.

  2. Click Terminal Services.

  3. Log in to the Terminal Services session.

  4. Click the Advanced Administration Tool icon to access the Advanced Administration Menu.

  5. From the Advanced Administration Menu, select System Management, and click Computer Management.

  6. From the Computer Management console tree, click Services and Applications.

  7. Click Services.

  8. In the details pane, right-click SNMP Service.

  9. From the Action menu, click Properties.

  10. From the Security tab, click Send authentication trap.

Select this option if you want a trap message sent when authentication fails.

  1. Select Accepted community names, and click Add.

  2. Select Community Rights, and select a permission level for this host to process SNMP requests from the selected community.

  3. To view a description of a dialog box item, right-click the item, and then click What's This?

  4. In Community Name, type a case-sensitive community name, and then click Add.

  5. In SNMP Service Properties, specify whether to accept SNMP packets from a host:

NOTE: You can make changes to an entry by clicking the entry, and then clicking Edit. You can delete a selected entry by clicking Remove.
NOTE: If you remove all the community names, including the default name Public, SNMP does not respond to any community names presented. You can add additional community and host names as necessary.
NOTE: If you change existing SNMP settings, your changes take effect immediately. You do not need to restart the SNMP service for your settings to take effect. If you are configuring SNMP for the first time, you must restart SNMP before the settings take effect.

Configuring SNMP Agent Properties

  1. On the NAS Manager primary menu, click Maintenance.

  2. Click Terminal Services.

  3. Log in to the Terminal Services session.

  4. Click Advanced Administration Menu.

  5. At the Advanced Administration Menu, select System Management, and click Computer Management.

  6. Click Services and Applications.

  7. Click Services.

  8. In the details pane, right-click SNMP Service.

  9. From the Action menu, click Properties.

  10. Select the Agent tab, then select Contact, and type the name of the user or system administrator.

  11. Select Location, and then type the physical location of the system or the contact.

  12. In the Service panel, select the appropriate check boxes for this system, and then click OK.

  13. To view a description of a dialog box item, right-click the item, and then click What's This?

NOTE: If you change existing SNMP settings, your changes take effect immediately. You do not need to restart the SNMP service for your settings to take effect. If you are configuring SNMP for the first time, you must restart SNMP before the settings take effect.

Using Console Redirection

Console redirection allows you to maintain a NAS appliance from a client system by re-directing keyboard input and text output through the serial port. Graphic output is not redirected. This section describes the simplest connection possible: connecting to a system with a null modem cable.

Minimum Hardware and Connection Requirements

To use console redirection, you must have the following ports:

NOTE: Console Redirection is enabled by default in the NAS appliance BIOS.

Setting Up Console Redirection

To set up console redirection to manage your NAS appliance, perform the following steps:

  1. Using a null-modem serial cable, connect the client system to the NAS appliance.

  2. Turn on the client system and set up a Hyperterminal connection.

    1. Click the Start button and point to Programs—>Accessories—>Hyperterminal
      —>Hyperterminal
      .

    1. Select 115200 for the Bits per second, 8 for Data Bits, None for Parity, 1 for Stop Bits, and Xon\Xoff for Flow control.

  3. Restart the NAS appliance.

You can now use your client system to manage your NAS appliance. If you need to configure your BIOS settings, see "Entering the BIOS Setup Utility" in your User's Guide.

Navigating With Console Redirection

Because of ANSI limitations, not all keys can be used with console redirection. Table 6-2 shows keystroke combinations used for the version of Windows on your client system.

Table 6-2. Console Redirection Keys

Normal Keys (As They Appear on the Keyboard)

Keys Used for Windows 2000 Prior to Service Pack 2

Keys Used for All Other Windows Operating Systems

Home

<Esc><h>

<Esc><h>

End

<Esc><k>

<Esc><k>

Insert

<Esc><+>

<Esc><+>

Delete

<Esc><->

<Esc><->

Page Up

< Esc><?>

<Page Up>

Page Down

<Esc></>

<Page Down>

F1

<Esc><1>

<F1>

F2

<Esc><2>

<F2>

F3

<Esc><3>

<F3>

F4

<Esc><4>

<F4>

F5

<Esc><5>

<Esc><5>

F6

<Esc><6>

<Esc><6>

F7

<Esc><7>

<Esc><7>

F8

<Esc><8>

<Esc><8>

F9

<Esc><9>

<Esc><9>

F10

<Esc><0>

<Esc><0>

F11

<Esc><!>

<Esc><!>

F12

<Esc><@>

<Esc><@>

Up arrow

<Esc><w>

Up arrow

Right arrow

<Esc><a>

Right arrow

Left arrow

<Esc><d>

Left arrow

Down arrow

<Esc><x>

Down arrow

<Ctrl><Alt><Delete>

<Esc><Shift><r> <Esc><r> <Esc><Shift><r>

OR

<Esc><Shift><b>

<Esc><Shift><r> <Esc><r> <Esc><Shift><r>

OR

<Esc><Shift><b>


Defragmenting a Volume Containing Persistent Images

NOTICE: Defragmenting a volume containing persistent images without using the following procedure can delete your persistent images and degrade your system performance.
NOTE: If you do not have persistent images on your volume, this procedure does not apply.
NOTE: To defragment a volume, you must delete all persistent images on that volume.

To defragment a volume containing persistent images, perform the following steps:

  1. On the NAS Manager primary menu, click Disks.

  2. Click ActiveArchive.

  3. Click Schedules.

  4. Select a scheduled persistent image, and then click Delete.

  5. Repeat until all scheduled persistent images are deleted.

  6. Click Back.

  7. Click Persistent Images.

  8. Select a persistent image, and then click Delete.

  9. Repeat until all persistent images are deleted.

  10. Click Maintenance.

  11. Click Terminal Services.

  12. Log on to the system.

  13. Click Exit to close the Advanced Administration Menu.

  14. Double-click My Appliance.

  15. Right-click the drive you are going to defragment.

  16. Click Properties.

  17. Click Tools.

  18. Click Defragment Now.

The Defragmentation window displays.

  1. Click Defragment.

You are notified when defragmentation is complete.

  1. Exit Terminal Services Client.

  2. Reschedule your persistent images for this volume.


Back to Contents Page