Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

L2 lotus help


Published on

Complete guide to IBM Lotus Domino 8.5 Administration. Useful to Admins and for

Published in: Technology
  • Be the first to comment

  • Be the first to like this

L2 lotus help

  1. 1. Databases are not replicating between two servers (one server has 100 documents and other has 90)To identify the replication issue1. Replica id2. Replication history in database properties (it shows the last successful replication)3. Log.nsf or replication logs4. Connections documents5. Database ACL - server rights for replication.6. Check sufficient disk space7. Document and field level access (this is useful when document count mismatches)8. Monitoring result *statrep.nsf)9. " Jobschduled.njf " this file used for scheduled replication and can be corrupt.Configuring Domino to send and receive mail over SMTPSetting up a Domino server as an SMTP server consists of enabling two separate tasks: a listener task and arouting task. Enabling the SMTP Listener allows a server to receive mail over SMTP. Enabling SMTP routing letsthe Domino Router send mail to other servers using SMTP. You enable SMTP routing to destinations within thelocal Internet domain separately from SMTP routing to external destinations. Its also possible to enable SMTProuting on a server without enabling the Listener task, and vice-versa. For example, to support POP3 and IMAPclients, which use SMTP to send mail, you must have at least one internal server running the SMTP Listener task.However, the server does not have to use SMTP when transferring messages it receives over SMTP to the nexthop on the routing path. After the server has accepted a message over SMTP, it can use Notes routing to transferthe message to other servers. By default, Domino uses Notes routing only and is not configured for SMTP routing.To have Domino use SMTP to send and receive mail, do the following:Prepare your system for sending messages to the Internet by testing your Internet connection and verif ying thatDNS is set up properlyEnable the SMTP Listener task in the Server document of server you want to receive mail over SMTPEnable SMTP routing within the local Internet domain so that servers can send mail over SMTPEnable SMTP to be used to send messages outside the local Internet domain.Specify the relay host, if any, to be used when sending mail outside the local Internet domain.Configure a relay host for SMTP servers that do not have direct access to the Internet.Set up inbound and outbound mail restrictions to protect against misuse of the mail infrastructure.To allow POP3 or IMAP users who connect to Domino from an external network to send mail to external Internetdomains, specify exceptions to inbound relay enforcement for authenticated users.If you intend to allow users to access mail from POP3 or IMAP mail clients, you must install and enable theseaccess protocols on users mail servers. By default, Domino supports only Notes client access.Transaction logging:-Transactional logs are binary file where transactions are written. The transactional log file has a .txn file extensionand 64 MB in size. Transaction logging captures all the changes made to a database and writes them to atransaction log. The logged transactions are then written to disk. Transaction logging is available for Dominoservers running release 5 or later. Database changes are sent to a transaction log and then written later to thetarget database. (i.e.: committed to disk)Transaction logging offers benefits for the following system activities:Backup throughput is increased because transaction logs back up quicker than normal databases.Disaster recovery is more complete since data stored in the transaction log can be supplemented to the fullsystem recovery and so the data is not lostDatabase views are stored in the log file so database views may not need to be rebuilt.Types:-1) Linear - 4 GB space. Same2) Circular - can use more than 4 GB space.3) ArchivedDBIID:-Database Instance ID and it is assigned at the First time transaction loggings occur. 1
  2. 2. Type of roles in names.nsf (public address book).Group creator.Group modifier.Net creator.Net modifier.Policy creator.Policy modifier.Policy reader.Server creator.Server modifier.User creator.User modifier.Like author access with user creator role for registering the person, without editor access you can do the samework. So this is the combination of role and access level.Domino maintenance task on 5 filesAdmin4.nsf, Names.nsf, certlog.nsf, catalog.nsf, log.nsfnfixup -F names.nsfnupdall -R names.nsfncompact -B names.nsfReplication:-Pull-Pull (both server included)—Bi-directional.Pull – Push (default)-only source server included—Bi-directional.Pull only –only source server ---Uni directional.Push only –only source server included --Uni directional.Command: - Push server name [database name]Replication issues an NSF search request against the source replica and it returns several pieces of informationincluding a list of OIDs of all the documents that have been created or modified since the last replication.OID: - is a combination of three components.UNID:-unique 16 byte identifier that never changes.Sequence No: - indicates how many times the document has been modified.Time Stamps: - indicates the last time the document was modified.Notes can keep databases synchronized through replication, which can occur between two Domino servers orbetween Notes workstations and a Domino server. Domino system administrators manage several replicationtasks on the Domino server as a part of their job. Notes client user replicates databases to the Notes client thatwill be used when disconnected from the server.Database Replicas and CopiesYou can make two types of copies from a database: an ordinary copy and a replica copy. In an ordinary copy, theoriginal database remains intact and the copy of it reflects the moment in time when the copy is made. From thatpoint forward, the two databases (the original and the copy) are distinct from one another; changes to each aremade independently of one another and will never be shared between the two. Replica databases, on the otherhand, can share changes made to them. A replica copy is made of an original database and maintains arelationship with the original database; these are referred to as replica copies. Between two replica databases,the replication process operates at the document level. During replication, Notes compares one database toanother, determines any incremental changes by checking which documents are new, which have been modified,and which have been deleted in each, and then it sends and receives document additions, updates, and deletionsbetween the databases. When document updates are sent (or received), Notes only copies data from fieldswhose values have changed. All documents are not copied each time a change is made; only incrementalchanges are transferred. This is called field-level replication, and it makes Notes replication efficient and fast. 2
  3. 3. Replication operates within the security model of Notes and Domino. If, as a user of a database, you only havethe ability to read documents in a server-based replica, you will only be able to receive new and updated datafrom the server to your local replica. Any changes made on your end cannot go to the server because you haveonly read-access privileges.Streaming replication: - It allows the replicator task to send multiple changes in one request and to replicatesmaller document first. It used when replication type is PULL-PULL or PULL only.Replication between two servers require connection document on either server where as mail routing requiresconnection document on both servers.Replica id:-a unique number that is generated when a database is first created. When you make a replica of thedatabases the replica inherits the replica id. Author access required for replication.Benefits of replication –1. Security2. Reduced communication cost3. Improved performance4. Can replicate subset of data5. Replication on the basis of ACLIn server documentsserver task -> maximum execution time, increase it if Agent is stops in the middleDSTSpecifies that a server or a workstation observes daylight savings time. Belongs to Uncategorized UsageDST=value (Default 1)0 - Do not observe daylight savings time1 - Observe daylight savings timeWhen you select this option, the created/modified time for documents created or modified from the first Sunday inApril through the last Sunday in October are time-stamped one hour later than the servers system time. Thisoption lets you adjust for daylight savings time without changing the actual system time.On a workstation, Daylight savings time field is in the Basics tab in the advanced tab in the Location document; ona server, Daylight savings time field is in the Server document.Show server command:- 3
  4. 4. Tell router config all:-Using the Configuration Document to implement outbound SMTP failoverYou must configure the Lotus Domino server for outbound SMTP failover. In the Configuration Document -->Router/SMTP panel --> Basics panel "Relay host for messages leaving the local internet domain," contain multiplehostnames/IP addresses - Use a semi-colon to separate hostname entries or IP addresses to achieve failover.Example:;host2.acme.comResult: The router will attempt an SMTP transfer to If is down or notresponding, the routers will failover to as observed below:09/13/2006 11:01:46 AM Router: No messages transferred to; ( via SMTP: The server is not responding. The server may be down or you may be experiencingnetwork problems. Contact your system administrator if this problem persists.09/13/2006 11:01:46 AM SMTPClient: Attempting to Connect: Host, Port 25, SSL Port 0,Connecting Domain vec.lotus.com09/13/2006 11:01:46 AM SMTPClient: Connection successfulA Domino server is configured to send SMTP messages outside the local Internet domain via a Send mail relayserver. A secondary Send mail server is set up to provide failover in the event the primary relay is down. Creatinga failover SMTP Connection document that references the secondary Send mail host does not appear to work.When the primary relay host is unresponsive, the dynamic cost is set to "1," and the message is queued inMAIL.BOX, pending the next scheduled retry interval.One method used for failover is entering a Fully Qualified Host Name (FQHN) in the "Relay host for messagesleaving the local internet domain" field (in the Configuration documents Routing/SMTP, and Basics tabs), andconfiguring DNS so that there are two IP addresses mapped to this FQHN.Domino SMTP outbound failover utilizes MX records in DNS. In the environment described above, set the "SMTPMTA relay host" field in an SMTP Connection documents Basics tab to the FQHN of the relay server (such asSMTP.ACME.COM). Then create multiple MX records for this host in DNS, and manipulate their preferences inDNS to configure failover functionality. 4
  5. 5. SMTP server problem: - mails were getting stuck in the server. Around 10000 mails at gateway server.Just SMTP quit, and load it again.Routing cost: - Notes routing assigns a routing cost to each connection and uses these costs to select the mostefficient way to route mail from one server to another. The Router computes and stores information about thesecosts in its routing tables. If there is more than one possible route for mail to travel between the source server andthe destination server for the message, the Router uses routing cost information in the tables to calculate theleast-cost route for the message. The Router uses information in Server, Domain, and Connection documents tocreate the routing tables. A LAN connection has low cost; a dialup modem connection has high cost. By default,each LAN Connection has a cost of 1, while each dialup modem connection has a cost of 5.Note – Do not edit/change routing cost if servers are in same NNNHow the Router chooses a route:It calculates and selects the least-cost route. If the least-cost route fails -- for example, if there is no answer or ifthe network times out – the Router increases the cost of the initial route by 1. For example, if a LAN connectionbetween Server A and Server B initially has a cost of 1 but the connection fails during an attempted transfer, theRouter increases the cost of that LAN connection between Server A and Server B to 2. The next time the Routertries to transfer mail between servers; it again looks for the least-cost route between those servers. If there is analternate route that is equal in cost and requires fewer hops, the Router selects that alternate route. For example,if there are two paths between Server A and Server B, Each with a total cost of 4, the Router examines thenumber of hops in each path. If one route requires three hops but the other requires only two hops, the Routeruses the path that requires two hops because the costs are equal.There are two servers (A & B) in a cluster. If one server goes down, then all the users will be routed to otherserver B. When the first server comes up then how you will pass these users on first server.Set stat config restricted = 0 for disableSet stat config restricted = 1 for enableSet stat config restricted = 2 for permanently enable.How many ways you can change the notes.ini?1. By configuration documents (configuration settings>>Notes.ini settings.) 2. Set config command (setconfiguration parameters)How can we schedule the compact task on server?By program documentsHow you will see the program documents on console?Show schedule- it will show the replication and mail routing configuration document + replication topology.How to make a group not to be shown to a particular user or user could not type the name of the group at the TOfield in the new memo?Remove the user name from the reader field of the group. Change document properties and remove the personname from the reader field. 5
  6. 6. Whenever a particular user attempts to authenticate with the server, they receive the following warning:"Warning: The public key for <user name> found in the directory names.nsf on server <server name> does notmatch the one used during authentication."Cause the public key in the users ID file does not match up with the public key in the users Person Document inthe Domino Directory. You can copy the public key from the ID file and paste it into the "Notes Certified PublicKey" field on the CertificatesNotes Certificates tab of the Person document.To copy a Certified Public Key from a Notes ID file using the Notes client, perform the following steps from theAdmin client:1. From the Domino Administrator, click the Configuration tab.2. From the Tools pane, click Certification - ID properties.3. Select and open the ID file to be examined, enter the password (Person ID, Server ID or Certificate ID).4. From the ID Properties window, select Your Identity, then select Your Certificates.5. Select the Other Actions button and select Mail / Copy Certificates (Public Key)6. Click the Copy Certificate button. (Remote user selects Mail Certificate. It copies the entire public key to theclipboard.)7. Paste the public key into the associated Person document in the People view of the admin client.Have the end user select the following options to mail the administrator a copy of their public key:File -> Security -> User Security -> Your identity -> Your Certificates -> Other Actions -> Mail, copy certificate(public key). -> Mail Certificate -> fill out "To" -> SendCalendar and SchedulingThe calendar and scheduling features allow users to check the free time of other users, schedule meetings withthem, and reserve resources. (Calconn task), and the Free Time system (a combination of Sched, Calconn, andnnotes tasks).When you install Domino on a server (any server except a directory server), the Sched and Calconntasks are automatically added to the server’s NOTES.INI file. When you start the server for the first time, theSchedule Manager creates a Free Time database (BUSYTIME.NSF for non-clustered mail servers andCLUBUSY.NSF for clustered mail servers). task used are calconn (this used to connect to other server to retrievefree time info) and sched (this is used for connecting and retrieving free time info from local server, - both tasksrequired and compulsory for proper functioning, busytime.nsf database created automatically when first time youload scheduler task, in case of cluster busytime.nsf converts to clubusy.nsf. Each server contains a database thatincludes scheduling information for all users who use that server as their mail server. This database is namedBUSYTIME.NSF and is known as the Free Time database. Every server in the cluster contains a replica of thisdatabase. When you add a server to the cluster, the Schedule Manager deletes the BUSYTIME.NSF database onthat server and creates the CLUBUSY.NSF database, which then replicates with the other servers in the cluster.Double room booking problem:-Shutdown server, delete busytime.nsf,Tell Calcon q, sche…Then make a new copyMails are coming from server in the server name only, why these mails come on server, (senders andrecipient’s name only of server name)?This is because of event generator, and mail sent by server ids.What is administration server, can you make one more admin server? If main admin server goes down then howwould you make other server as admin server? Where can we do these settings?Setting multiple administration servers, called extended administration servers, for the Domino Directory toprovide for less centralized, more regional, directory management.Complete these instructions to set up an extended administration server.1. From the Domino Administrator, click the Files tab and then open the Domino Directory (NAMES.NSF).2. Choose Files - Database - Access Control.3. Click Advanced and select Enable Extended Access.4. Click Basics and click Extended Access.5. In the Names list, select the namespace (an organization or one or more organizational units) for which you are 6
  7. 7. assigning an administration server.6. Select the server that you are designating as an administration server.7. Choose one of these "Access applies to" settings:This entry only -- to assign the selected administration server to the selected namespace only. Namespaces thatare subordinate to the selected namespace are not affected by this selection.This entry and all descendants -- to assign the selected administration server to the selected namespace and toall subordinate namespaces. 8. In the Access field, in the Allow column, click Administer.9. Click OK.10. Click Yes.What will happen if you change replication settings from 90 days to 30days, deletions stubs will delete after10days 30/3=10daysRemove documents not modified in the last x days: The number of days specified here, known as the purgeinterval, controls when Domino purges deletion stubs from a database. Deletion stubs are markers that remainfrom deleted documents so that Domino knows to delete documents in other replicas of the database. Becausedeletion stubs take up disk space, Domino regularly removes deletion stubs that are at least as old as the valuespecified. It checks for deletion stubs that require removal at 1/3 of the purge interval. For example, assuming thedefault value, 90 days, when a user opens a database, Domino checks if it has been at least 30 days since itremoved deletion stubs, and if so it removes any deletion stubs that are at least 90 days old. The Updall task,which runs by default at 2:00 AM, also removes deletion stubs. You can shorten the purge interval, if you want,but be sure to replicate more frequently than the purge interval; otherwise, deleted documents can be replicatedback to the replica. Optionally, you can select the check box to remove documents in the replica that haven’tchanged within the purge interval. If you select the check box, when Domino removes deletion stubs it alsoremoves documents that haven’t changed within the specified number of days. These documents are purged,meaning no deletion stubs remain for the documents, so the documents aren’t deleted in other replicas. The ″OnlyReplicate Incoming Documents Saved or Modified After: date″ setting prevents the purged documents fromreappearing through replication.Clustering requirementsAll servers in a cluster must run one of the following: the Lotus Domino 6 Enterprise server, the Lotus Domino 6Utility server, the Domino Release 5 or Domino Release 4.62 Enterprise server, or the Domino Release 4.6 orDomino Release 4.5 Advanced Services server.All servers in a cluster must be connected using a high-speed local area network (LAN) or a high-speed wide areanetwork (WAN). You can also set up a private LAN for cluster traffic.All servers in a cluster must use TCP/IP and be on the same Notes named networkAll servers in a cluster must be in the same Domino domain and share a common Domino Directory.You must specify an administration server for the Domino Directory in the domain that contains the cluster. If youdo not specify an administration server, the Administration Process cannot change cluster membership. Theadministration server does not have to be a member of a cluster.Each server in the cluster must have a hierarchical server ID. If any servers have flat IDs, you must convert themto hierarchical IDs to use them in a cluster. A server can be a member of only one cluster at a time. Each servermust have adequate disk space to function as a cluster member. Because clusters usually require more databasereplicas, servers in clusters require more disk space than unclustered servers. Each server must have adequateprocessing power and memory capacity. In general, clustered servers require more computer power thanunclustered servers.clusta4.ntf--A Cluster Analysis database contains documents that record the results of Cluster Analysis tests. Bydefault, Domino writes the analysis results to the Cluster Analysis database on the ServerNumber of cluster members -- Checks the number of servers in the clusterConsistent domain membership -- Checks that all servers are members of the same domainConsistent protocols -- Checks those servers are running consistent protocolsRequired server tasks -- Checks that the required cluster tasks are runningDatabase Replicas exist within cluster -- Checks databases for replicas in the clusterConsistent ACLs -- Checks that access control lists are consistent among replicas 7
  8. 8. Disabled Replication -- Checks databases for disabled cluster replicationConsistent replication formulas -- Checks for inconsistent replication formulas among replicasCluster local workstation file—cluster.ncfWhen a user tries to send a message after the user’s mail server has become unavailable if a user is composinga message when the mail server becomes unavailable, the user can still send the message. The delivery failsover to another cluster server, where Notes deposits the message in the outgoing mailbox. Saving the messagedoesn’t fail over; however, this message is not saved in the Sent folder.Planning a cluster also includes the following: termining the number and placement of replicas in a cluster hether to use fault recovery in a clusterAfter the cluster is up and running, you can further balance the workload by setting a maximum number of usersfor each server and setting the availability threshold.For a mail file in cluster, put one line for mail cluster failover Notes.ini settings line: - Mailclusterfailover=1Components of cluster:-1. Cluster manager.2. Cluster database directory: - contains database name, server path, and replica id.3. Cluster database directory manager: - it replicates information of add or delete of database.4. Cluster administrator: - when you add a server in a cluster, administrator starts the cluster tasks. (cldbdir,clrepl)5. Cluster replicator (clrepl)A Domino cluster is a group of two or more servers that provides users with constant access to data, balances theworkload between servers, improves server performance, and maintains performance when you increase the sizeof your enterprise. The servers in a cluster contain replicas of databases that you want to be readily available tousers at all times. If a user tries to access a database on a cluster server that is not available, Domino opens areplica of that database on a different cluster server, if a replica is available. Domino continuously synchronizesdatabases so that whichever replica a user opens, the information is always the same. IBM Lotus Notes clientscan access all Domino cluster servers. HTTP clients (Internet browsers) can access only Domino Web servers ina Domino cluster.Problems that may occur can be related to authentication, database replication, or failover in the event of a serveroutage. When troubleshooting clustering problem, follow these steps.1. Make sure that the Cluster Replicator task is running on all of the servers in the cluster.2. Ensure that the database exists on all servers in the cluster and that the replica IDs are same.3. Check the log files to see if errors are occurring related to the replication task. Check to see if there is anexcessive amount of replication requests queued that may hit at a server performance issue.4. Examine the cluster Database Directory and make sure that the databases are enabled for replication.5. Make sure there is only one copy of the database on each cluster.6. Verify that the ACLs in the database are set correctly to allow servers to communicate. The User Type forservers must be set to server or server group.7. Check the server documents on all servers in the cluster and make sure that each server is assigned a valid,unique IP address and that all IP addresses related to the cluster Manager are defined properly.8. Verify that all servers in the cluster are running.NSD: - notes system diagnostics NSD file normally generated when server gets crashed. In R5 it was RIP file. Itis simple text file that has a lot of information about the server crash.Three things you have to keep in mind: 8
  9. 9. When was the server crash?What made it to crash?What was running at the time of server crash?1) Is the domino reporting any error messages to the console or log file?2) What is exact syntax of error message.3) Where is the error message being generated in domino or client.4) When did this problem first appear.5) Have you implemented any changes before the problem started appearing?NOTES.INI settings --- to troubleshoot performance and crash issues.Debug_threadid =1 log each process and thread id for each server operation.Debug_show_timeout =1 turns on semaphore timeout messages to the console, and creates a semaphore textfile called semdebug.txt.Debug_capture_timeout =10 time stamps each semaphore timeout message.Console_log_enabled=1 enables domino console logging.Fault recovery for server crashes: - when the server crashes, it shuts itself down and then restarts automatically,without any administrator interventions. Sends “Mail fault notifications” mails to admin.FATAL_THREAD_FAILURE:-Failure: - shows the downtime info of server.Fatal – what made a server crash?Thread: - info about the tasks running at the server crash or by which task server got crashedOpen NSD, search Panic key wordFor example if server crashed due to server. exeYou will find like FATAL THREAD 11/51 [ nSERVER:0cd0: 2148]Where 0cd0 is process id and 2148 is physical IDAfter that search for TLS Mapping databasessystem informationor environmental informationstack info helps to see the problem at that timemem check helps to diagnose memory infoopen NSD file in notepad and search for "fatal" string ("panic" on UNIX platform in vi editor)In this case we found [nServer:0cd0:2148]. We know for sure that server crashed on nserver which is serverthread itself, try to identify something more i.e., the database which has caused the crash.We now have to find out corresponding virtual thread.Now you have to search for "TLS Mapping" in nsd file. In notepad press F3 key 3 times to go to following text inNSD (This is called process table)Look for the line that has process id and Physical thread like below :-[ nSERVER:0cd0: 2148] [ nSERVER:0cd0: 128] [ nSERVER:0cd0: 17]In this case the virtual thread id is 128Now go back to the top of the NSD and then search for the string "open databases" in nsd file.(This is called open database table)Look for the process id that we found earlier and the Virtual Thread id i.e., 0cd0 and 128 like below:-G:LotusDominoDatamail1.boxBy: [ nSERVER:0cd0: 128] DBH= 740, User=CN=GKR011N/OU=KR/O=GilletteFrom the above text we have identified that server crashed on mail1.boxIf server is not getting up then there are four databases we can check:-admin4log.nsfnames.nsfmail.boxBecause every time the server starts it checks these files if any of these is corrupt then the server will not start. Ifthe server is still not started then delete the entire tasks from notes.ini and start the server. And load the tasksmanually one by one. 9
  10. 10. If an agent is not running for a database then how can you find it? How and when it was stopped?Tell amgr scehThe agent manager log activity. -- Log agent managerHow can you hide the documents, if design replace is happening?4th security tab in properties of document- Who CAN READ THIS DOCUMENT- all Readers and above option.Remove others, so that others will not be able to read the mails.How to find roaming and non roaming profiles in the address book---field Roaming User="0" for normal without roaming profilesfield Roaming User="1" fully enabled roaming for the usersfield Roaming User="2" in progress roaming for the users.How to create directory catalog & directory assistance:-Create a new database just go to file>> database>>> newCreate a database choosing dircat5.ntf template.Then go to create configuration after opening that file.Include the directory names. E.g. Names1.nsf, names2.nsf etc.Then choose the fields also for making it more compact.Directory Assistance: with DA50.ntfThe Directory Assistance database is used to configure the Directory Assistance feature. If your organizationincludes multiple domains, you can set up directory assistance to enable users to browse and select names fromPublic Directories outside of their domain, for example when they address mail, define database access controllists (ACL), or complete a NAMES field in documents. When users send mail to recipients in another domain,directory assistance also allows Notes to resolve the names before sending the memo.Create the Directory Assistance database from the DA50.NTF template. In the Directory Assistance database youdefine naming rules that associate naming hierarchies with each domain--this allows Notes to search only PublicDirectories of domains associated with those naming hierarchies when resolving the name of a recipient fromanother domain. You also use the Directory Assistance database to point to one or more strategically-locatedreplicas of each domains Public Directory. You then create a replica of the Directory Assistance database on allservers in each domain.What is LDAP?Lightweight Directory Access Protocol. it is referred as X.500, It is a organizes directory entries in a hierarchicalname space capable of supporting large amounts of information and specifies that communication between thedirectory client and the directory server uses the directory access protocol(DAP). However as an application layer,the DAP requires the entire OSI protocol stack to operate. For supporting OSI protocol stack requires moreresources. There LDAP desired. LDAP requires the lighter weight and more popular TCP/IP protocol stack thanOSI protocol stack. So LDAP is communication protocol, which defines the transport and format of messagesused by a client to access data. LDAP doesn’t define the directory service itself. LDAP uses TCP/IP to allowclients to access directory information. it can be used by the browser clients to retrieve addresses. it will return thenames in SMTP form rather than notes form. LDAP directories can be implemented in many different ways. IBMimplements cross platform LDAP directories using db2 and lotus domino.Notes.ini file you can modify by these ways:-Direct changes into the notes.ini file.Through configuration documents on notes.ini settings tabAssigning Notes.INI settings through user policiesNotes.ini settings/ Parameters:-SERVER_MAXUSERS – for how many users can use a database, and how many users can access the server 10
  11. 11. SERVER_RESTRICTED -How mail work in lotus notes:- setting up and configuring mail routing :-By default NRPC (notes remote procedure call) to transfer mail between servers. A user creates a mail in the maildatabase. When the user sends a workstation task called MAILER transfers the messages to MAIL.BOXdatabase on user’s server. The router task polls MAIL.BOX and asks two questions about the messages waitingto be routed.1. Where this message should be delivered- to which recipients on which servers?2. How this message should be delivered- which route and connections should be used?The location of the recipient’s mail database determines how the message is dispatched by the router. Arecipient’s mail database can be stored in any of the following locations.ON the same server as the sender’s mail database.On a different server in the same DNN.On the portsON a server in a different DNN within the local domino domain.On a server in an external Domino Domain.When user sends a mail NRPC (Notes protocols) to deposit the message into the MAIL.BOX database on theusers Domino mail server. The Router finds the message in MAIL.BOX and determines where to send themessage for each recipient. The Router checks its routing table to calculate the next "hop" for the message on thepath to its recipients and determines the appropriate protocol -- either SMTP or Notes routing -- to transfer themessage. Using SMTP routing, the Router connects to the destination server -- the recipients mail server, a relayhost, a smart host, or one of the servers in the recipients Internet domain --and transfers the message. UsingNotes routing, the Router moves the message to the MAIL.BOX database on the server that is the next hop in thepath to the recipients mail server. The Router on that server transfers the message to the next hop, until themessage is deposited in the MAIL.BOX database on the recipients home server. The Router on the recipientsserver finds the Message (in MAIL.BOX on a Domino server) and delivers it to the recipients mail file.Enforcing a consistent ACL:-You can ensure that an ACL remains identical on all database replicas on servers by selecting the enforce aconsistent access control list setting on the advance tab of ACL.Mail routing troubleshooting:Request delivery failure report from the userMail traceCheck domino directory and ensure routing is enabledVerify connection documents are configured properlyMake sure is not corruptedCheck the disk space of the serverExamine the log to see if the error is occurringRun tell router show to determine the mail is backed up on the server and last error message logged.Incorrect recipient nameMail Routing issues: 11
  12. 12. Step1: Get a copy of delivery failure report from the senderStep 2: Send a mail trace to that addressStep 3: Mail routing topology mapsMail routing topology maps are useful to track mail routing problems between servers.From the Domino Administrator, click the Messaging - Mail tab. Choose one:Mail routing topology by connectionsMail routing topology by named networksUndelivered mailFrom the Domino Administrator, click the Messaging - Mail tab, then select Mail routing status. You can alsocheck for undelivered mail in the mail routing events view in the log file (LOG.NSF).What are the conditions for DNN?Constant linkSame protocolSame domino directoryWhat are the parameters you can set in notes.ini?A) Server tasksB) TimeC) Data folder informationWhat is ODS? Which console command you use to upgrade the ODS version?On Disk Structure, Compact –r commandHow will you convert the entire mail file in to an ntf file?Load convert –R mail*.nsf templatename.ntfHow to check the connectivity between 2 servers in different domain?Trace command and it works in the same domain and different domain provided you are able to resolve the Ip ofthe server and other server allows port 1352 access. Or else ping or telnet to port 25What is home server?The server which is specified as your mail server in your Person DocumentWhat is the role of firewall in lotus?Restricting access to ports such as SMTP, HTTP, NRPC etc., also used to reverse proxy the serverWhat is NAT?It means Network Address Translation.What is the registration server?A server which registers new users, server, OU and Organization and initially stores these document in theDomino directory until the next replication occurs.What is the administration server?An Administration server controls how the Administration process does its work. It stores the requested work inthe administration request database and then processes them accordingly to their status. By default first server inthe domino domain is the Admin server for the Domino directory which maintains its ACL, performs deletion,name change and replicate to the other server in the DNN.How will you access the admin client, if you forgot the administrator password?By using server idAccess Control List (ACL):- 12
  13. 13. Manager Access:-delete database, encrypt, modify, and performance task by lower access levelsDesigner: - create full text index search. Modify [fields, forms, views, public agents].Editor:-create, edit, read documents (editor can change other person documents also) (own documents and otherperson’s documents).Author:-create edit, read (own document).Reader:-read documents, but cannot create or edit document.Depositor:-create documentsNo access: - none.User type in the ACL:-1. Unspecified.2. Person3. Server4. Mixed group.5. Person group6. Server group.MTC – Mail tracker collector task read special mail tracker log files produced by router.MTSTORE.NSF—Mail tracker store database.Reports.NSF—Reports database to generate and store mail usage reports.Program documents—to run tasks at scheduled intervals.Server types:-1. Domino utility server –provide application services only.2. Domino messaging server—that provides messaging services.3. Domino enterprise server – Provides both messaging and application services.Lotus recommends that passwords of the certifier ids be at least of nine characters.Connection document; - contains the settings to schedule replication between servers & mail routing. – used for encryption -- for decryptionTo run an agent (out of office) minimum rights for user is Editor in R6, with author access on admin4.NSF.(Because user default rights on admin4.NSF is author access). agent is designer,as well as ACL rights to create lotus script/java agents on server. access: - for ACL changes Access: - For design changes. Access: - For document changes. : - CTRL+SHIFT+F9 To rebuild or update all the views if UPDALL task fails.XACL - can restrict or refine a users access to the database, but it can’t be used to increase the ACL levelPass thru server: -An intermediate server that helps a client /workstation to connect with group of servers.Domino uses id file to identify users and to control access to servers. Id file contains:-1. Owner’s name2. A permanent license number3. At least one note certificate from a certifier id. (an electronic stamp added to a user id or server id ).4. Private Key. 13
  14. 14. 5. Internet certificates (optional for client only).6. One or more encrypted key created and distributed by users to allow other users to encrypt and decrypt fieldsin a document.7, a password if the owner of the id creates one8. Issued and expiry details.9. Id file can store up to eight passwords through id properties.Types of administrator:-1. Full access administrator.2. Administrator.3. Database administrator.4. Full remote control administrator.5. View only administrator.6. System administrator.7. Restricted system administrator.Roaming user: - for roaming user three files are required1. Names.NSF2. Bookmark.NSF3. Journal.NSFBy default server task1. Database server—n service.2. Admin process –nadminp3. Schedule manager ---nsched4. Agent manager---namgr5. Router [mail router] ----nrouter.6. Calendar connector---ncalcon.7. Replicators’---database replicator—nreplica.8. Directory indexer—ntfrs.exe.9. Indexer –update process—n update10. Event monitor – neventDifference between view and folder:-View: - views display specific documents with similar criteria in database.E.g. mail database has sent view it displays documents that you sent.Folders:-folder displays documents. Folders let you organize and display documents as you wantTypes of event generators: - 6 types (DDMSTT)1. Database:-to monitor ACL changes, replication unused space, user inactivity.2. Domino server3. Mail4. Statistics; - monitor free space5. Task status: - for all tasks – adminp, agent manager6. TCP server.Replication conflicts and save conflicts: -A replication conflict occurs when two or more users edit the same document and save the changes in thedifferent replicas between replications.A save conflict occur when two or more users open and edit the same document at the same time on the sameserver, even they are editing the different fields.What are different types of administrators?Full access administrator -- gets all rights and privileges of all administration access levels listed. 14
  15. 15. Administrator-gets all rights and privileges of database administrator and full-console administrator (but notsystem administrator).Full console administrator—gets rights and privileges of view-only console administrator (but not systemadministrator)System administrator -- gets rights and privileges of restricted system administratorIf user forgot his password how will recover the password?If you have recovery information set up for your user ID on your server the recovery password is randomlygenerated and unique to each recoverable ID file and administrator, when you first log in to Notes and thePassword dialog box appears, do not enter your password. Just click OK. Click "Recover Password" in the"Wrong password" dialog box. Select the user ID file to recover in the "Choose ID File to Recover" dialog box.Enter the password(s) given to you by your administrator(s) in the "Enter Passwords" dialog box, and repeat untilyou have entered all of the passwords, and you are prompted to enter a new password for your user ID. Enter anew password for your ID, and confirm the password when prompted.What are the basic router commands?Tell Router Delivery Stats-- it will Shows you Router delivery statistics.Tell Router COMPACT--COMPACTs MAIL.BOX and cleans up open Router queues. You can use this commandto COMPACT MAIL.BOX at any time. If more than one MAIL.BOX is configured for the server, each MAIL.BOXdatabase will be compacted in sequence. By default, MAIL.BOX is automatically compacted at 4 AM.Tell Router Show Queues--Shows mail held in transfer queue in the server and mail held in the delivery queueTell Router Exit or Tell Router Quit--Stops the Router task on a server.Tell Router Update Config--Updates the servers routing tables to immediately modify how messages are routed.This removes the 5 minute delay before a Router configuration change takes effectWhat is a parameter of notes.ini?There are a number of parameters in Lotus Dominos notes.ini configuration file that affect.For example, these are the server task entries in notes.ini:Server Tasks=Update, Replica, Router, AMgr, AdminP, CalConn, SchedServerTasksAt1=Catalog, DesignServerTasksAt2=UPDALLServerTasksAt3=Object Info -FullServerTasksAt5=StatlogWhat is ECL and can we implement the ECL from server side.An ECL is used to set up workstation data security. It lets you control which formulas and scripts created byanother user can run on your workstation. Workstation ECL is updated/Implemented from Server Admins ECL bycreating a Security policy document.Types of policies : 1.Organizational 2. ExplicitOne group which is already exists, if we want to deploy the explicit policy on them what is the step.Select group-Tools pane-assign policy. (An Explicit policy always overrides the Organizational policy.)How we take the lotus server backup?Backup files: All ID files (Servers/Users), All Database (Data folder->NSF+NTF)What is the administration process?The Admin process is a program which automates many routine administrative tasks such as Name managementtask (Rename/delete user and group), Mail file management task (Delete/Move mail file, ACL changes, enablingagents), and Replica management task (Create/Move/Delete replicas).How do administration process works in background?Adminp works in background with the help of different components like AdminP server Task (Starts by default onall server starts), Administrator client (Domino/Web) (Different Tools), Domino Directory (It provides set of 15
  16. 16. instructions with AdminP For instance, when a user is renamed, the certificate information is changed. This isstored in a Person document in the Domino Directory. When the renaming process is in progress, this is indicatedin the Person document under the Change Request field), Certification Logs Database (Certlog.NSF databasecreated when server installed it works assigning new certificates), Admin4.NSF and administrator.I have a staff member who keeps getting an error every time she opens mail "error message: The public key thatis being used does not match the one that was certified."The error message comes when the public key of the user id file is different than the one in PAB. Hence go to file-tools –user id-more options and copy your public key to the PAB.What if a gets corrupted? How will you solve it without shutting down the domino server?When a gets corrupted, usually we can stop the router and then work with fixup and COMPACTcommands, still if the problem persists, we need to stop the server and take the backup of the and deleteit from the original destination and then start the server. A new will be created.Encryption works for the mail security.Encrypted mails not going – may be because of the antivirus or firewall.A replica stub is an empty replica that has not yet been populated with documents. When you select File ->Replication -> New Replica, or if you use the Admin client to create a replica, a replica stub is createdDomino & windows clustering. Active and passive clustering.Can you have an Apache server handle Domino URLs on a different box?This one-liner in your Apache httpd.conf file allows you to run both the Apache Web server and Domino on thesame system - and have all your requests (be it for html or nsfs) received on port 80.The Apache server should run on port 80, and the Domino server on some other port (10080 in this codeexample)#Redirect all nsfs to Domino HTTP Server on port 10080RedirectMatch /(.*).(nsf)(.*) http://localhost:10080/$1.$2$3The Notes ID is required to install the full client and to access the servers. It is one of the security features ofLotus Notes. Use a Java program to add and delete certificates from a Notes ID file, as well as cross certify aSAFE.ID with a given certifier. Lotus uses a proprietary PKIX architecture for the Notes.ID filesFrom the Domino Administrator, click the Configuration tab.2. From the Tools pane, click Registration - Server.3. From the Domino Administrator, do one of the following:To use the CA process, click Server, and then select a server that has the Domino Directory that contains theCertificate Authority records and the copy of the Administration Requests database (ADMIN4.NSF) that will beupdated with the request for the new certificate. Then click "Use the CA Process," select a CA-configured certifierfrom the list, and click OK.To provide the certifier ID, select the registration server. Then click "Certifier ID" and locate the certifier ID file.Click OK, enter the password for the certifier ID, and click OK.To recover from loss of or damage to, an ID file, recommend to your users that they keep backup copies of theirID files in a secure place -- for example, on a disk stored in a locked area. Losing or damaging an ID file orforgetting a password has serious consequences. Without an ID, users cannot access servers or read messagesand other data that they encrypted with the lost ID. To prevent problems that occur when users lose or damage IDfiles or forgets passwords, set up Domino to recover ID files.You can only use the ID recovery process to recover user ID files. You cannot recover certifier ID files. Ideally,you should designate several administrators who will act as a group to recover IDs and passwords. Although youcan designate a single administrator to manage ID recovery, you should consider having two or moreadministrators work together to recover ID files. Designating a group of administrators helps to prevent a breachof security by one administrator who has access to all ID files. When you designate a group of administrators, you 16
  17. 17. can specify that only a subset of them be present during the actual ID recovery. For example, if you designate fiveadministrators for ID recovery but require only three administrators to unlock the ID file, any three of the five canunlock the ID file. Designating a group of administrators and requiring only a subset also prevents problems thatoccur if one administrator is unavailable or leaves the company. Before you can recover ID files, an administratorwho has access to the certifier ID file must specify recovery information, and the ID files themselves must bemade recoverable. There are three ways to do this:At registration, administrators create the ID file with a certifier ID that contains recovery information.Administrators export recovery information from the certifier ID file and have the user accept it.(Only for Domino 6 servers and higher) Administrators change recovery information using a Domino 7Administrator client. Subsequently, recovery information is added automatically to users Notes IDs when usersauthenticate to their home server.Domino stores ID recovery information in the certifier ID file. The information stored includes the names ofadministrators who are allowed to recover IDs, the address of the mail or mail-in database where users send anencrypted backup copy of their ID files, and the number of administrators required to unlock an ID file. The mail ormail-in database contains documents that store attachments of the encrypted backup ID files. These files areencrypted using a random key and cannot be used with Notes until they are recovered.An encrypted backup copy of the ID file is required to recover a lost or corrupted ID file. Recovering an ID file forwhich the password has been forgotten is a bit easier. If the original ID file contains recovery information,administrators can recover the ID file, even if an encrypted backup ID file doesnt exist.You can set up ID recovery for user IDs at any time. If you do so before you register users, ID recoveryinformation is automatically added to user IDs the first time that users authenticate with their home servers. If youset up ID recovery information after you have registered Notes users, recovery information is automatically addedto the user IDs the next time users authenticate with their home servers. For each administrator, the users ID file contains a recovery password that is randomly generated and encryptedwith the administrators public key. The password is unique for each administrator and user.In Domino 7, you can select the number of characters, or password length, for recovery passwords, which helpsdetermine password strength, or likelihood to be compromised. A password length that is less than 16 iscalculated using both alphanumeric characters and hexadecimals. Sixteen-character length passwords aregenerated using hexadecimals only. While password strength is important, as a strong password is less likely tobe compromised, so is usability. A long and complex password can be difficult to use, so administrators also havethe ability to choose a shorter password length.In addition, administrators can now configure a custom message to help walk users through ID recovery.To recover an ID, users and administrators do the following:1. A user contacts each designated administrator to obtain the administrators recovery password.2. The administrator obtains the recovery password by decrypting the recovery password stored in the users IDfile using the administrators private key.3. The administrator then gives the recovery password to the user.4. The user repeats Steps 1 through 3 until the minimum number of administrators to unlock the ID file is reached.5. After the file is unlocked, the user must enter a new password to secure the ID file.The same ID file can be recovered again using the same recovery passwords. However, you should urge users torefresh the recovery information and create a new backup by re-accepting the recovery information after theyrecover their ID files.When users acquire a new public key, accept a name change, or accept or create a document encryption key,Domino automatically sends updated encrypted backup ID files to the centralized database. In the case of aserver-based certificate authority, the recovery database will be updated once the user has connected to theserver. Recertifying a user does not generate an encrypted copy of the ID file to be sent to the recovery database,as a users Person Document already contains the updated public key.If a user has been renamed by or moved to a different certifier that contains recovery information that is older thanthat of the users previous certifier, the new certifiers recovery information will not be accepted into the users IDfile. Before using the new certifier, its recovery information must be updated so that it is more recent than theprevious certifiers recovery information. To do this, the administrator should modify the new certifiers recoveryinformation in some way and save it. This updates the recovery information for that certifier with a new timestamp, 17
  18. 18. and ensures that users who are subsequently renamed with or moved to the updated certifier will have the correctrecovery information propagated to their user IDs. The administrator can then undo the change, if desired.To help prevent unauthorized users from recovering IDs without the authorized users knowledge, make sure thatpassword verification is enabled for users and servers. If password verification is enabled, the authorized user isaware of the change because the user cannot access servers using the legitimate ID. When the unauthorizeduser recovered the ID file, that user was forced to make a password change.As an extra precaution, after recovering IDs, ask users to re-accept the recovery information and then change thepublic key on their ID files. Re-accepting recovery information changes recovery password information in the IDfile. As of Domino 6, re-accepting recovery information happens automatically when the user accesses adatabase on the home server. Changing the public key changes the public and private keys stored in the ID file.ID recovery loggingImportant information about client ID recovery activities is automatically logged to the local log.nsf file so that thisinformation is available to administrators for troubleshooting purposes.The following ID recovery information will be logged locally.Date and time when recovery information is accepted into the ID fileInstances when recovery information is rejected or fails to be accepted in the ID file.Events that require a new backup to be mailed to the ID recovery databaseEmailing the recovery ID to the recovery database (successes and failures)Which task is used for delivering the mails to non domino directories?Directory assistanceNotes securityUser Authentication: This is a process in which Notes client and domino server use to validate each other when aclient tries to access the domino serverServer Security: This controls the access the domino server, server access is controlled by a server access list onthe domino serverDatabase Security: This controls the access to the database on the domino serverWhat is stored in a Notes ID?The Owners name - A user ID File may also contain one alternative nameA Permanent license number- This number indicates that the owner is legal and specifies whether the owner hasa North American or International license to run Domino or Notes.At least one Notes certificate from the certifier ID - which is a Digital signature added to a user ID or Server ID.This generates from the private key of the certifier ID.A Private key- Notes uses private key to sign messages sent by the owner of the private key and to decryptmessages sent to its owner.Internet certificates (optional) - An Internet certificate is used to secure SSL connections and encrypt and signS/MIME mail messages.One or more secret encryption keys (optional) - Encryption keys are created and distributed by users to allowother users to encrypt and decrypt fields in a document.Difference between North American and international certifiersAll Notes IDs contain two public/private key pairs. Prior to 5.0.4, key lengths were restricted for the purposes ofencrypting data, but not for authentication or signing. Anything over 512-bit RSA key and 56-bit symmetric keywas considered strong encryption and was not allowed for export by the U.S. Government. Customers wererequired to order and choose among kits of different cryptographic strengths. With the relaxation of USgovernment regulations on the export of cryptography, the Domino server and the Domino Administrator, DominoDesigner, and Lotus Notes client products have consolidated all previous encryption strengths -- North American,International, and France -- into one strong encryption level resulting in a single "Global" release of the products.The Global release adopts the encryption characteristics previously known as North American. Strong encryptionin Global products can be used worldwide, except in countries whose import laws prohibit it, or except in thosecountries to which the export of goods and services is prohibited by the U.S. government. Customers are nolonger required to order Notes software according to cryptographic strength. 18
  19. 19. Global Domain Doc, Foreign domain doc, Foreign SMTP Domino DocDomains are defined by creating Domain documents. Multiple documents types are available based on therequirements needed to route mail. The Following types of documents are available.Adjacent domain document- this document is used to route mail between servers that are not in the same Notesnamed network.Nonadjacent domain document- This document serves three functions:Supplies next-hop routing information to route mailProhibits mail from routing to the domainProvides Calendar server synchronization between two domainsForeign Domain Document-This document is used for connections between external applications. A typicalapplication used is a fax or pager gateway.Foreign SMTP Domain Document-This document is used to route Internet mail when the server does not haveexplicit DNS access.Global Domain document- this document is used to route mail to Internet domains. Configuration informationregarding message conversion rules are defined in the document.Replication Types:Four Different types of replication exist. The type you choose affects the direction of replication as well as whichof the servers performs the work of the replication.Pull Pull: Replication is bidirectional, whereby the source server initiates replication and pulls documents from thetarget server. The source server then signals the target servers Replica task to pull documents in the oppositedirection. Both servers are involved in the replication.Pull Push (Default): Replication is bidirectional, whereby the source servers replica task performs all of the work,pushing and pulling documents to and from the target server. The target servers Replica task is never engaged.Pull Only: Replication is one-way, whereby the source server pulls documents from the target.Push Only: Replication is one-way, whereby the source server pushes documents to the target.Router types in connection docThere are four options in the router type:Pull: This type of router can route in one direction, pulls from source server.Push: This type of router can route in one direction, Pushes from the source server.Pull Push: This Type of router can trigger two-way routing; router on the originating server pushes mail to thedestination server and then triggers the destination server to route mail back again.Push Wait: This Type of router can trigger two-way routing; the source server first pushes to the target server andthen waits to receive a connection from the target. (Used in servers with dialup connections.)Partitioned servers advantages and explanationIn partition server Environment, all Partitions share the same domino program directory and each partition has itsown Domino data directory & notes.iniUsing Domino server partitioning, you can run multiple instances of the Domino server on a single computer. Bydoing so, you reduce hardware expenses and minimize the number of computers to administer because, insteadof purchasing multiple small computers to run Domino servers that might not take advantage of the resourcesavailable to them, you can purchase a single, more powerful computer and run multiple instances of the Dominoserver on that single machine.On a Domino partitioned server, all partitions share the same Domino program directory, and thus share one setof Domino executable files. However, each partition has its own Domino data directory and NOTES.INI file; thuseach has its own copy of the Domino Directory and other administrative databases. 19
  20. 20. If one partition shuts down, the others continue to run. If a partition encounters a fatal error, Dominos faultrecovery feature restarts only that partition, not the entire computer.Partitioned servers can provide the scalability you need while also providing security. As your system grows, youcan migrate users from a partition to a separate server. A partitioned server can also be a member of a cluster ifyou require high availability of databases. Security for a partitioned server is the same as for a single server.When you set up a partitioned server, you must run the same version of Domino on each partition. However, if theserver runs on UNIX®, there is an alternative means to run multiple instances of Domino on the server: on UNIX,you can run different versions of Domino on a single computer, each version with its own program directory. Youcan even run multiple instances of each version by installing it as a Domino partitioned server.Web server: Realm doc, Web site doc, Web agents, SSO, Gzip etcWeb Server: A Domino server is considered to be a web server when it is running the HTTP task. the HTTP taskcan be started automatically by adding it to the Server Tasks= line in the servers Notes.ini file, or by issuing theLoad HTTP Command at the server console.Sign, encryption, public key, private key conceptsFor all types of encryption except network port encryption, Domino uses public and private keys so that dataencrypted by one of the keys can be decrypted only by the other. The public and private keys are mathematicallyrelated and uniquely identify the user. Both are stored in the ID file. Within the ID file, the public key is stored in acertificate, but the private key is stored separately from the certificate. The certificate containing the public key isalso stored in the Domino Directory, and available to other users.Domino uses two types of public and private keys -- Notes and Internet. You use the Notes public key to encryptfields, documents, databases, and messages sent to other Notes users, while the Notes private key is used fordecryption. Similarly, you use the Internet public key for S/MIME encryption and the Internet private key forS/MIME decryption. For both Notes and Internet key pairs, electronic signatures are created with private keys andverified with public keys. When you register a user, Domino automatically creates a Notes certificate, whichcontains the users public keys, and adds it to the ID file and the Domino Directory. The private key is created andstored in the ID file. You can also create Internet public and private keys after user registration. Domino storesInternet certificates, which contain public keys, in the ID file and also in the Domino Directory. The Internet privatekey is stored in the ID file, separately from the certificate. To create Notes public and private keys, Domino usesthe dual-key RSA Cryptosystem and the RC2 and RC4 algorithms for encryption. To create the Internet publickey, Domino uses the x.509 certificate format, which is an industry-standard format that many applications,including Domino, understand. Both the Notes client and Domino server support 1024-bit RSA key and 128-bitsymmetric key for S/MIME and SSL. The Notes proprietary protocols use a 630-bit key for key exchange, and a64-bit symmetric key.ACL levels and privilegesEvery database includes an access control list (ACL), which Notes uses to determine the level of access usersand servers have to a database. Levels assigned to users determine the tasks that users can perform on adatabase. Levels assigned to servers determine what information within the database the servers can replicate.Only someone with Manager Access can modify the ACL. The Designer and Manager of the database cancoordinate to create one or more roles to refine access to particular views, forms, sections, or fields of adatabase. ACLs apply only to databases stored on servers, not databases stored locally. If you make a change toa local database and replicate the database up to the server, replication honors the level of access you have inthe ACL on the server. For example, if you have Reader access to a database on a server and you add newdocuments to your local replica of the database, your new documents will not get added to the database whenyou replicate the local replica up to the server again. Reader access does not allow you to create new documents.However, it is possible for database designers to enforce a consistent ACL across all replicas of a database, soeven local databases would honor the ACL.Access levels for a databaseAccess level Allows users to Assign toManager Delete the database Two people who are responsible for the Encrypt the database database. If one person is absent, the 20
  21. 21. Modify replication settings other can manage the database. Modify the database ACL Perform all tasks allowed by lower access levelsDesigner Create a full-text search index A database designer and/or the person Modify all database design elements (fields, responsible for future design updates. forms, views, public agents, the database icon, Using This Database document, and About This Database document) Perform all tasks allowed by lower access levelsEditor Create documents Any user allowed to create and edit Edit all documents, including those created by documents in a database. others Read all documents unless there is a Readers field in the form (you cant edit a document if you cant read it)Author Create documents Users who need to contribute documentsNote Author access, Edit the documents where there is an Authors to a default, does not field in the document and the user is specified in When possible, use Author access ratherinclude the access the Authors field than Editor access to reduce Replicationlevel option "Create Read all documents unless there is a Readers or Save Conflicts.documents." When field in the formyou assign Authoraccess to a user orserver, you must alsospecify the "Createdocuments" accesslevel privilege.Reader Read documents Users who only need to read documentsNote Reader access in a database, but not create or editlets you read all documents.documents unlessthere is a Readersfield in the form. Thenyou can read adocument only if yourname is listed in theReaders field on theform.Depositor Create documents Users who only need to contribute documents, but who do not need to read or edit their own or other users documents. For example, use Depositor access for a ballot box application.No Access None, with the exception of options to "Read Terminated users, who do not need public documents" and "Write public access to the database, or users who documents" have access on a special basis. Also, users who do not need access but are part of a group that does have access. Should be assigned as the default access to prevent most users from accessing a confidential database. 21
  22. 22. Additional privileges in the access control listOptional privilege When to select/deselect itCreate documents Select this option for all users with Author access. Deselect this option to prevent Authors from adding any more documents. They can continue to read and edit documents theyve already created.Delete documents Deselect this option if you dont want a user to delete documents, no matter what the access level. Authors can delete only documents they create. If the document contains an Authors field, Authors can delete documents only if their name, a group, or a role that contains their name appears in the Authors field.Create private agents A user can run agents that perform tasks allowed by the users assigned access level in the ACL only. Private agents on server databases take up disk space and processing time on the server, so you may want to deselect this option to prevent users from creating private agents. Note Whether or not a user can run agents depends on the access set by the Domino administrator in the Agents Restrictions section of the Server document in the Domino Directory. If you select "Create LotusScript/Java agents" for a name in the ACL, the Server document controls whether or not the user can run the agent on the server.Create personal folders/views Personal folders and views created on a server are more secure than those created locally, and they are available on multiple servers. Administrative agents can operate only on folders and views stored on a server. Deselect this option to prevent users from creating folders and views on a server, which saves disk space on the server. They can still create folders and views locally.Create shared folders/views Deselect this option to maintain tighter control over database design. Otherwise, a user assigned this privilege can create folders and views that are visible to others.Create Lotus Script/Java agents Lotus Script and Java agents on server databases can take up significant server processing time, so you may want to restrict which users can run them. Note Whether or not a user can run agents depends on the access set by the Domino administrator in the Agents Restrictions section of the Server document in the Domino Directory. If you select "Create Lotus Script/Java agents" for a name in the ACL, the Server document controls whether or not the user can run the agent on the server.Read public documents Select this option to allow users to read documents or see views and folders designated as "Available to Public Access users," an option in the Security tab of the Forms, Views, and Folders Properties dialog boxes. This option lets you give users with No Access or Depositor access the ability to view specific documents, forms, views, and folders without giving them Reader access. In addition, documents that you want available to public access users must contain a field called $PublicAccess. The $PublicAccess field should be a text field, and its value should be equal to one. For information about how this privilege applies to mail templates and for information on creating forms, views, and agents, see Lotus Domino Designer 6 Help.Write public documents Select this option to allow users to create and modify documents with forms designated as "Available to Public Access users" in the Security tab of the Form Properties dialog box. This option lets you give users create and edit access to specific documents without giving them Author access, or an 22
  23. 23. equivalent role, and gives users access to create documents from any form in a database.Replicate or copy documents Select this privilege to allow users to replicate or copy the database, or documents from the database, locally or to the clipboard.How to troubleshoot the Partitioning problemsOnly one server can be running per partition. If an error occurs stating that a partition is already in use, verify thata server process is not already running on the server. A server reboot may be required to correct this issue.Verify that the server is running in the event that users are receiving an error that the server is unreachable.If a port-mapping server is sharing the same network card as the destination server, make sure that the server isrunning.Verify that information in the notes.ini file related to port-mapping is set up correctly.Verify that all the information related to the communications set up for the server is correct in the DominoDirectory.What is Update, Updall, Fixup, Compact?UpdateThe Purpose of Update is to update a databases view indexes. Update runs automatically when the server isstarted and continues to run while the server is up. Update waits about 15 minutes before processing thedatabase so that all changes in the database are finished processing. When the views are updated, it thensearches the domain for databases set for immediate or scheduled hourly index update. When Update finds acorrupted view or Full-text index, it rebuilds the full-text index and solves the issue.Update (a, b, c) Where:a -- Number of documents to be updated. If a is not specified, one document is updated.b -- New size of the summary item "Subject" (optional; default is ""). If b is not specified, the length of thesummary data is a uniform random number between 1 and 100 bytes.c -- Length of non-summary item "Body" (optional; defaults to ""). If c is not specified, the length of the non-summary data is a uniform random number between 100 and 300 bytes.UpdallUpdall is used to rebuild corrupted views and full-text index searches, as Update does, and has various optionsthat can be defined when launched by using a software switch. Updall is executed by default at 2:00 a.m. and,unlike Update, can be run manually. Deletion stubs are removed, and views that havent been used for 45 daysare deleted unless they are protected by the database designer. Setting the parameterDefault_Index_Lifetime_Days in the Notes.ini file enables an administrator to determine when Updall removedunused views.Load updall SALES.NSF -FYou can specify multiple options -- for example:Load updall -F –M Option in Task - Start tool Command-line Description option Index all databases Database path "Only this database" updates only the specified Index only this database or database. To update a database in the Domino folder data folder, enter the file name, for example, SALES.NSF. To update databases in a folder within the data folder, specify the database path relative to the data folder, for example, DOCREADME.NSF. "Index all databases" (or no database path) updates all databases on the server. 23
  24. 24. Update this view only database -T view Updates a specific view in a database. Use, for title example, with -R to solve corruption problems.Updall - Update options Option in Task - Start tool Command-line Description optionUpdate: All built views -V Updates built views and does not update full-text indexes.Update: Full text indexes -F Updates full-text indexes and does not update views.Update: Full text indexes: -H Updates full-text indexes assigned "Immediate" asOnly those with frequency an update frequency.set to: ImmediateUpdate: Full text indexes: -M Updates full-text indexes assigned "Immediate" orOnly those with frequency "Hourly" as an update frequency.set to: Immediate or HourlyUpdate: Full text indexes: -L Updates full-text indexes assigned "Immediate,"Only those with frequency "Hourly," or "Daily" as an update frequency.set to: Immediate or Hourlyor DailyUpdall - Rebuild optionsOption in Task - Start tool Command-line Description optionRebuild: Full-text indexes -X Rebuilds full-text indexes and does not rebuildonly views. Use to rebuild full-text indexes that are corrupted.Rebuild: All used views -R Rebuilds all used views. Using this option is resource-intensive, so use it as a last resort to solve corruption problems with a specific database.Rebuild: Full-text indexes database -C Rebuilds unused views and a full-text index in aand additionally: All unused database. Requires you to specify a database.viewsUpdall - Search Site options Option in Task - Start tool Command-line option DescriptionUpdate database -A Incrementally updates search-site databaseconfigurations: Incremental configurations for search site databases. Update database -B Does a full update of search-site database configurations: Full configurations for search site databases.FixupFixup is used to repair database that were open when a server failure occurred. Fixup runs automatically whenthe server starts, but it can also be run from the Domino Console, when necessary. Databases are checked fordata errors generated when a write command to the database was issued and a failure occurred causing acorruption in the database. When Fixup is running on a database, user access is denied until the job completes.Fixup should be run if Updall does not fix the database errors. 24
  25. 25. Fixup options in Fixup tool and Command-line equivalent DescriptionTask - Start toolFixup all databases Database path "Fixup only this database or folder" runs Fixup only this database or Fixup only on a specified database or all folder databases in a specified folder. To run Fixup on a database in the Domino data folder, enter the file name, for example SALES.NSF. To run Fixup on a database or databases in folders within the data folder, enter the path relative to the data folder. For example, to run Fixup on all databases in the DATASALES folder, specify SALES. "Fixup all databases" or no command line database path runs Fixup on all databases on the server. Note To specify databases or folders to run on using the Fixup tool select the database(s) or folder(s).Report all processed databases -L Reports to the log file every databaseto log file that Fixup opens and checks for corruption. Without this argument, Fixup logs only actual problems encountered.Scan only since last fixup -I When you run Fixup on a specific database, Fixup checks only documents modified since Fixup last ran. Without this option, Fixup checks all documents.Scan all documents -F When you run Fixup on all databases, Fixup checks all documents in the databases. Without this option, Fixup checks only documents modified since it last ran. Note To specify this option using the Fixup tool; deselect "Scan only since last fixup."Perform quick fixup -Q Checks documents more quickly but less thoroughly. Without this option, Fixup checks documents thoroughly.Exclude views (faster) -V Prevents Fixup from running on views. This option reduces the time it takes Fixup to run. Use if view corruption isnt a problem.Dont purge corrupted -N Prevents Fixup from purging corrupteddocuments documents so that the next time Fixup runs or the next time a user opens the database, Fixup must check the database again. Use this option to salvage data in documents if the corruption is minor or if there are no replicas of the database.Optimize user unread lists -U Reverts ID tables in a database to the previous release format. Dont select 25
  26. 26. this option unless Customer Support recommends doing so.Fixup transaction-logged -J Runs on databases that are enabled fordatabases transaction logging. Without this option, Fixup generally doesnt run on logged databases. If you are using a certified backup utility, its important that you schedule a full backup of the database as soon after Fixup finishes as possible.Fixup open databases -O If you run Fixup on open databases, Fixup takes the databases offline to perform the fixup. This is the default if you run Fixup and specify a database name. Without this option, when you do not specify database names, Fixup does not run on open databases.Dont fixup open databases -Z Applies only to running Fixup on a single database. When a database isnt taken offline and is in use, then Fixup is not run. This is the default when Fixup is run on multiple databases.Verify only -C Verifies the integrity of the database and reports errors. Does not modify the database (for example, does not purge corrupted documents).Fixup subdirectories -Y Runs Fixup on databases in subfolders (subdirectories).Dont fixup subdirectories -y Does not run Fixup on databases in subfolders (subdirectories).CompactCompact can be used to recover space in a database after documents are deleted. Deleting documents from aDomino database does not actually decrease the size of the database. A deletion stub is created and thedocument is removed permanently when compact is run, and the size of the DB is then reduced. Three types ofcompacting are available.In-place compacting with space recoveryIn-place compacting with space recovery and reduction in file sizeCopy-style compactingIn-place compacting with space recoveryUnused space is recovered, but the physical size of the DB remains the same. Unlike with Update and Updall,access to the DB is not denied while the compact task is running. When Compact is launched without switches orwith a -b switch, in-place compacting with space recovery is the type of compacting used. The DBIID, or databaseinstance ID used to identify the database, remains the same. In-place compacting is used for databases that havethe system configured to run transaction logging.In-place compacting with space recovery and reduction in file sizeThis style of compacting reduces the file size of databases as well as recovers unused space in databases. Thisstyle of compacting is somewhat slower than in-place compacting with space recovery only. This style ofcompacting assigns new DBIIDs to databases, so if you use it on logged databases and you use a certified 26
  27. 27. backup utility, perform full backups of the databases shortly after compacting is complete. This style ofcompacting allows users and servers to continue to access and edit databases during compacting.When you run Compact without specifying options, Domino uses this style of compacting on databases that arentenabled for transaction logging. Domino also uses this style of compacting when you use the -B option. Tooptimize disk space, its recommended that you run Compact using the -B optionCopy-style compactingA Copy is created, and when the compact is complete, the original database is deleted. Because of this, thereneeds to be sufficient disk space available to make the copy of the database, or any error will occur and thecompact will not work. During this type of compacting, a new database is created and a new DBIID is assigned.Because a new database is actually being created, this option locks out all users and servers from editing thedatabase. Access using this version of compact for read only can be enabled if the -L switch is used at the time itis run. Compact should be run on all databases at the least weekly, if possible, but it should be run at a minimum ofonce a month using the format compact -B to minimize the amount of disk space. If Fixup does not correct adatabase problem, running compact with the switch of -c can attempt to correct the problem. Characteristics In place, space In place, space Copy-style recovery recovery with file size reduction Databases that use it when Logged databases Unlogged databases Databases with pending compact runs without with no pending with no pending structural changes options structural changes structural changes Databases you can use it Current release Current release Current release (need -c) on Relative speed Fastest Medium Slowest Users can read databases Yes Yes No (unless -L option during compacting used) Users can edit databases Yes Yes No during compacting Reduction in file size No Yes Yes Extra disk space required No No YesCompact options Compact - Basics Option Command-line equivalent Description Compact only this database or database path To compact a database in the Domino folder Specify any additional data folder, enter the file name, for (To specify databases to options after the database example SALES.NSF. To compact compact using the Files tab, path. databases in a folder within the data select the databases in the files folder, specify the database path relative pane.) to the data folder. For example, to compact all databases in the folder DATASALES, specify SALES. If you choose "Compact all databases" (or dont specify a database path at the command line) Compact compacts all databases in the data folder and in folders within the data folder.Compact - Options Option Command-line equivalent Description 27