Your SlideShare is downloading. ×
0
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Guide to Novell NetWare 6.0 Network Administration
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Guide to Novell NetWare 6.0 Network Administration

321

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
321
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
8
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  1. Guide to Novell NetWare 6.0 Network Administration Chapter 14
  2. Chapter 14 - Implementing and Securing Network Services <ul><li>Describe NetWare 6 Internet/intranet services, including Net Services and Web Services components </li></ul><ul><li>Install and configure Novell Web Services components </li></ul>
  3. Chapter 14 - Implementing and Securing Network Services <ul><li>Describe public key cryptography and use the Novell Certificate Authority service to export public and private keys </li></ul><ul><li>Describe internal and external security policies and strategies, including firewalls, virus protection, and defense against denial-of-service attacks </li></ul>
  4. <ul><li>Novell’s Internet/intranet services: </li></ul><ul><ul><li>Help simplify the implementation of business networks by providing a common set of services for accessing data and resources with a variety of workstation and server operating systems </li></ul></ul><ul><ul><li>The Internet service component can be divided into Web Services, which are TCP/IP-based applications that give users access to network data and services though Web sites and FTP servers, and Net Services, which extend the capabilities of standard Web services </li></ul></ul>NetWare 6 Internet Service Components
  5.  
  6. <ul><li>Net Services requests: </li></ul><ul><ul><li>A network can be configured so that requests for Net Services originating at user workstations are sent via the Internet to a firewall running on a server or router; once through the firewall, the request is routed to the appropriate services based on its IP address and port number </li></ul></ul><ul><ul><li>Port numbers are used to transfer information in a data packet to the correct application </li></ul></ul><ul><ul><li>To gain access to NetWare files and resources, Net Services run as applications on Web Services components, such as Apache Web Server </li></ul></ul>NetWare 6 Internet Service Components
  7.  
  8. <ul><li>Apache Web Server: </li></ul><ul><ul><li>Is open-source Web server software and a common platform for implementing Web-based services </li></ul></ul><ul><ul><li>It is installed by default during the NetWare 6 install </li></ul></ul><ul><ul><li>It’s primary purpose is to provide support for Novell Portal Services and Net Services, such as iFolder </li></ul></ul><ul><ul><li>Requires no special configuration </li></ul></ul><ul><li>NetWare 6 ships with the Tomcat Servlet Engine, which is used to run Java-based Web applications </li></ul>NetWare 6 Internet Service Components
  9. <ul><li>Novell Portal Services (NPS) is a portal strategy for delivering the right information to the people authorized to use it </li></ul><ul><ul><li>A portal provides one view into a company’s information and displays this data as Web pages </li></ul></ul><ul><ul><li>With NPS, network administrators can protect and control access to network resources, delivering personalized data to people based on their company roles, locations, and group associations </li></ul></ul><ul><ul><li>NPS consists of a number of Java servlets that run on Apache Web Server </li></ul></ul>NetWare 6 Internet Service Components
  10.  
  11. <ul><li>NetWare Web Search Server: </li></ul><ul><ul><li>Makes network or Internet data searchable in minutes, and it bridges all types of networks </li></ul></ul><ul><li>NetWare Enterprise Web Server: </li></ul><ul><ul><li>Is an HTTP-based service for sending Web pages to browsers on the Internet, or to an intranet </li></ul></ul><ul><li>FTP server: </li></ul><ul><ul><li>Allows for file transferring between Internet hosts </li></ul></ul><ul><li>NetWare Web Manager: </li></ul><ul><ul><li>The portal service for managing Web Services </li></ul></ul>NetWare 6 Internet Service Components
  12. <ul><li>Working with NetWare Enterprise Web Server </li></ul><ul><ul><li>NetWare Enterprise Web Server can be installed during or after NetWare 6 server install, and once installed, NPS displays the NetWare Enterprise Web Server options in the Web Manager window to allow for configuration </li></ul></ul><ul><ul><li>There are many configuration options and settings, but the most common tasks are: starting and stopping Web Services, changing the default path to the content directory, creating virtual Web sites, configuring document preferences, and setting up public and restricted access sites </li></ul></ul>Installing and Configuring Web Services
  13.  
  14.  
  15.  
  16. <ul><li>Working with NetWare FTP Server: </li></ul><ul><ul><li>FTP services require server & client components </li></ul></ul><ul><ul><li>Most Web browsers have a built-in FTP client for accessing FTP servers </li></ul></ul><ul><ul><li>Many dedicated FTP clients enable the operator to enter commands directly from the FTP command prompt; other clients use a graphical environment </li></ul></ul><ul><ul><li>Setting up NetWare FTP Server requires installing the FTP software on the NetWare 6 server and then configuring the software to provide access to the content directories </li></ul></ul>Installing and Configuring Web Services
  17.  
  18. <ul><li>Working with NetWare FTP Server (cont.): </li></ul><ul><ul><li>After FTP Server is up and running, any FTP client can be used to log in to the FTP server and transfer files </li></ul></ul><ul><ul><li>To enable FTP Server logging, enter your server URL and click your server name under the NetWare Enterprise Web Server heading to log in, click the Log Settings link in the left-hand column </li></ul></ul><ul><ul><li>You can configure FTP security by clicking the Security link in the Server Preferences window </li></ul></ul>Installing and Configuring Web Services
  19.  
  20.  
  21. <ul><li>Working with NetWare FTP Server (cont.): </li></ul><ul><ul><li>Additional features of FTP Server include: multiple instances of FTP Server software; FTP access restrictions; intruder detection; remote server access; special Quote Site commands; firewall support; active sessions display; Namespace support; Simple Network Management Protocol (SNMP) error-reporting service; welcome banner and message file support; NetWare Web Manager management; Cluster Services support </li></ul></ul>Installing and Configuring Web Services
  22. <ul><li>Public key cryptography: </li></ul><ul><ul><li>Is a security system that authenticates users and organizations to ensure that they are who they say they are and encrypts data transmissions to prevent information from being intercepted </li></ul></ul><ul><ul><li>Public key cryptography uses mathematically related sets of digital codes called key pairs, which consists of a public and private key that is unique to a person, an application, or an organization </li></ul></ul><ul><ul><li>To create a digital signature, cryptography software mathematically links the data being signed with the sender’s private key </li></ul></ul>Working with Certificate Services
  23.  
  24.  
  25. <ul><li>Public key cryptography: </li></ul><ul><ul><li>The Certificate Authority (CA) service was developed to mediate the exchange of public keys </li></ul></ul><ul><ul><li>In this service, the public key cryptography software running on an entity creates a public and private key pair. To get the public key authorized, an entity must send its public key and other identification data to a CA. The CA validates the owner’s key pair by creating a certificate containing the owner’s public key along with the CA’s digital signature </li></ul></ul>Working with Certificate Services
  26.  
  27. <ul><li>Novell Certificate Server: </li></ul><ul><ul><li>Integrates public key cryptography services into eDirectory and enables administrators to create, issue, and manage user and server certificates </li></ul></ul><ul><ul><li>It helps meet the challenges of public key cryptography in these ways: creating an organizational CA in the eDirectory tree; storing key pairs in the eDirectory tree to provide security; allowing centralized management of public key certificates through ConsoleOne snap-ins; supporting common e-mail clients and browsers </li></ul></ul>Working with Certificate Services
  28. <ul><li>Making Net Services and information available on the Internet exposes the network to potential electronic attacks </li></ul><ul><ul><li>Although public key cryptography secures data through encryption and identifies entities with digital signatures, it does not prevent outside hackers from gaining unauthorized system access </li></ul></ul><ul><ul><li>Common hacker attacks categories: intrusion, social engineering, spoofing, virus attacks, denial-of-service attacks, and information theft </li></ul></ul>Securing Net Services
  29. <ul><li>Internal security involves placing NetWare servers in secure locations and making sure you have adequate password policies </li></ul><ul><ul><li>In addition, consider these network protection precautions: ensure that server rooms are locked at all times; workstations should not be visible from behind the user; keep wiring closets locked and restrict their access; provide extra security by using the console screen saver and SECURE CONSOLE commands; review file system and eDirectory security to ensure that users have only the rights they need to perform their tasks </li></ul></ul>Securing Net Services
  30. <ul><li>How to avoid common internal security violations: </li></ul><ul><ul><li>Ensure passwords are safe and secure, especially the administrator’s - intruder detection helps here </li></ul></ul><ul><ul><li>Ensure that user accounts are not assigned unauthorized rights - a tool such as Novell Advanced Audit Service and tools from BindView Solutions help here </li></ul></ul><ul><ul><li>Ensure that there are no rogue Admin accounts that have the Supervisor right to the eDirectory tree </li></ul></ul>Securing Net Services
  31. <ul><li>Firewall external security: </li></ul><ul><ul><li>Computer firewalls control access between the company’s private network and an untrusted external entity on the internet </li></ul></ul><ul><ul><li>Firewalls consist of software that run on a server and can be configured in the following ways: control the type of traffic permitted between the internal private network and the Internet; keep log files of information about external traffic; provide a central point that all network traffic must pass through; and permit only selected services to access the network </li></ul></ul>Securing Net Services
  32. <ul><li>Protection against virus attacks: </li></ul><ul><ul><li>Viruses are often embedded in other programs or e-mail attachments, and are activated by running the program or opening the e-mail attachment </li></ul></ul><ul><ul><li>Viruses are classified based on how they infect: boot sector viruses attack the boot records or file allocation tables; file viruses attack executable programs; macro viruses attack programs that run macros; stealth viruses disguise themselves to make it difficult for anti-virus software to detect them; worms are independent programs that copy themselves to other computers over a network </li></ul></ul>Securing Net Services
  33. <ul><li>Protection against virus attacks (cont.): </li></ul><ul><ul><li>Virus protection on a network involves: installing a virus protection system; making regular backups; and training users on how to reduce the risk of virus attacks </li></ul></ul><ul><ul><li>Virus removal planning involves these steps: isolate all infected systems and floppy diskettes; locate the clean floppy disk formatted with a boot system created earlier with the anti-virus software; use the boot disk to start and clean all infected computers; restart the system and create a system backup; scan the network drives for infection </li></ul></ul>Securing Net Services
  34. <ul><li>Defense against denial-of-service attacks </li></ul><ul><ul><li>Denial-of-service attacks are usually caused by flooding the server with packets or sending oversized packets to a server, making it crash </li></ul></ul><ul><ul><li>A properly configured firewall and software designed for Net Services security are the best defenses against these attacks </li></ul></ul>Securing Net Services
  35.  
  36. Chapter Summary <ul><li>An essential part of Novell’s strategy for the future is to provide Internet services that enable clients and servers using diverse operating systems to be managed and accessed as one network. To do this, Novell has developed Net Services, which includes iFolder, NetStorage, iManager, iPrint, and iMonitor. Because Net Services is written to run on top of the open-source Apache Web Server, the services can be implemented on other network operating systems, such as Windows 2000/XP, Windows NT and Linux </li></ul>
  37. Chapter Summary <ul><li>NetWare Web Services include Enterprise Web Server and FTP Server, which can be installed and customized to supply information and Web pages to the Internet and local intranet. The NetWare Web Manager portal is used to configure and manage both Enterprise Web Server and FTP Server. Typical Web server management tasks include specifying the primary document directory, creating virtual Web sites, setting document preferences, and specifying public and restricted access to Web content. FTP configuration tasks include setting the default FTP directory, providing anonymous access, and restricting user access to the FTP server </li></ul>
  38. Chapter Summary <ul><li>Using public key cryptography to encrypt data transmission and provide authentication with digital signatures is a vital component of securing information transmission on the Internet . Public key cryptography uses public and private keys to create digital signatures and encrypt and decrypt data transmissions. Clients use the public key to encrypt data, which can be decrypted only by the public key owner’s private key </li></ul><ul><li>Certificate Authorities (CAs) issue public key certificates for verifying that the public key belongs to the entity distributing it </li></ul>
  39. Chapter Summary <ul><li>Internet security involves protecting Web and Net Services from threats such as theft, hacking, and computer viruses. An Internet security plan should include a firewall to isolate the internal network from the outside Internet and implement a virus protection and data recovery plan. Firewalls should be configured to detect denial-of-service attacks, such as the ping of death, SYN packet flooding, oversized UDP packets, teardrop attacks, and land attacks </li></ul>

×