The 7 Things I Know About Cyber Security After 25 Years | April 2024
Cl221
1. Migrating Novell ® Open Enterprise Server from NetWare ® to Linux Chris Beckett and Volkmar Ruzicka Technical Consultant / Technical Consultant NDS8 / NetAgents [email_address] / [email_address]
182. /var used for variable length files, generally log files, but other data may also be pathed here, such as the ZENworks ® Configuration Management Content Repository
232. Linux has it's own local database of users, much like Windows in some respects
233. Linux native services such as FTP, rlogin, SSH etc assume the presence of a local user, or configured authentication source such as LDAP, NIS etc.
234. LUM allows eDirectory ™ users to access Linux servers using their current eDirectory username and login credentials
265. Can apply policies to both Novell Storage Services ™ (NSS) and NCP ™ volumes
266. Decide on how you want to manage your data before you think about how you want to configure DST policies
267. Use the inventory functionality available to you to find out what is on your NSS volumes before you decide on your DST policies
268. Don't forget a Novell Client™ is installed on the OES2 Linux server, so don't be afraid to use that to check if your policies are working, you don't need a Windows client as such
273. Remember to catalogue all of your apps, including GroupWise ® , ZENworks ® , Novell Identity Manager etc. Will they run on Linux? Third party products, GWAVA, anti-virus etc.
294. Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.
Notes de l'éditeur
Unique nameing SDIDIAG Imanger Plugin PKI
Bonding (Laver 2) vs. Netware Teaming (Layer 3) Be aware of spanning tree algorithms
After about 1 hour !!
LUM Config: - Convert lower -> Converts users to lower case for Linux box if in Edir some ore upper and some are lower - persistent search disable - user cache only if eg. Backup software does not query into edir for the owner of files - preferred servers
/dnsnames for iPrint to convert used IP addresses of printers do dns names -> Problem after migration to OES2 the workstations still want to print to the ipp://10.10.10.10 address !! - disable quota in nss /noquota... for the migration (100MB quota on directory -> but 10GB already in there -> so you can't migrate due to the quota limit if parameter not used)