Using Novell iChain ® 2 to Deliver Internal Network Access without a VPN Brian Six Technical Account Manager Novell, Inc.

Slides:



Advertisements
Similar presentations
Novell eDirectory™ Deployment at Hydro Quebec Richard Cabana Enterprise Technology Account Manager Novell Canada Ltd.
Advertisements

Novell iChain ® 2.x Configuration Using the Web Server Accelerator Wizard Cary Andrews Senior Software Engineer Novell, Inc.
Active Directory: Final Solution to Enterprise System Integration
Chapter Nine NetWare-Based Networking. Objectives Identify the advantages of using the NetWare network operating system Describe NetWare’s server hardware.
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System architectures Updated: November 2014.
1 Chapter 1 Introduction to Windows Server Two main goals for Net Admin Make network resources available to users Files, folders, printers, etc.
Understanding Networks I. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Chapter 8: Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks Third Edition.
Module 2: Planning to Install SQL Server. Overview Hardware Installation Considerations SQL Server 2000 Editions Software Installation Considerations.
CHAPTER Introduction to LANs. MODULE Purpose and Use of a Network.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
Securing Your GroupWise ® System Morris Blackham Software Engineer Novell, Inc. Danita Zanrè Senior Consultant Caledonia.
Upgrading to Novell ® SecureLogin 3.5 Rod Tietjen,
Managing Thin Client Technology with DeFrame and OnDemand SM Services Pekka Lindqvist Markku Wallgren
Chapter 9: Novell NetWare
Managing Software Development With Microsoft ® Project 2000 And Team Folders Sam Brooks
Module 1: Installing and Upgrading to Exchange Server 2003.
SUSE Linux Enterprise Desktop Administration Chapter 12 Administer Printing.
Windows 2000 Operating System -- Active Directory Service COSC 516 Yuan YAO 08/29/2000.
Chapter Nine NetWare-Based Networking. Introduction to NetWare In 1983, Novell introduced its NetWare network operating system Versions 3.1 and 3.1—collectively.
Novell iManager Introduction and Overview James Whitchurch Director—Software Engineering Novell, Inc. Karl Ford Engineering.
iChain ® 2.1: Introduction and Overview Lee Howarth Product Manager Novell, Inc.
Upgrading Legacy Novell Directory Services ® to Novell eDirectory ™ 8.6 Rick Killpack WSS Engineer Novell, Inc. Connie.
Beginning Programming with Novell GroupWise ® C3POs John Cox DSE Worldwide Developer Support Novell, Inc.
Building Secure, Flexible and Scalable Environments using LDAP - SANS Orlando Sacha Faust PricewaterhouseCoopers
Introduction to Novell SecureLogin Single Sign-on Bob Bentley Product Manager Novell, Inc. John Clark Development Manager.
Configuring the network server GOUP 3 ® WORKGROUP: Mr. YUSUF Mr. BULHAN Mr. ABSHIR Mr. OSMAN.
Introduction to NDS ® iMonitor Duane Buss Senior Software Engineer Novell, Inc. Tom Doman Senior Software Engineer Novell,
Using Novell GroupWise ® 6 Monitor Duane Kuehne Software Engineer Novell, Inc. Danita Zanre Senior Consultant NSC Sysop,
Keeping Your Business Online with eDirectory ™ Backup and Restore Brian Hawkins Software Engineer Novell, Inc. Roger.
Introduction to Novell GroupWise ® Administrative Object API Glade Monson Software Engineer Novell, Inc.
Understanding Novell DirXML™ Technology
Beginning Programming with the Novell GroupWise® Object API
FSU Metadirectory Project The Issue of Identity Management Executive Overview.
Dave Horne eSolutions Deployment Mgr Novell, Inc. Designing and Managing Novell DirXML ™ Deployments.
Expose the Power of Novell eDirectory ™ Using Novell eGuide: Advanced Configuration and Customization Nathan Jensen Software Engineer Novell,
Integrating Active Directory with eDirectory ™ Using Novell Account Manager Reid Oakes Technical Team Manager Novell, Inc.
Module 1: Introduction to Administering Accounts and Resources.
Creating Custom User Management Plug-ins for iManager Eugene Baron Consultant III Novell, Inc. Adam Ruth Senior Software.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Chapter 9 Lecture 4. NetWare Novell’s network operating system Biggest competitor – Microsoft Windows.
How to Consolidate Novell NetWare ® Servers Derek B. Dobson Product Manager Novell, Inc. Bruce Cutler Senior Engineer.
Web-based Storage Access John Pugh Corp Technology Strategist Novell, Inc. Scott Villinski Corp Technology Strategist
Getting Connected to NGS while on the Road…
Intermediate Programming with GroupWise® C3POs™
Module 1: Introduction to Administering Accounts and Resources
Programming with NetWare® XPlat APIs
Novell Account Management Introduction and Overview
Novell BrainShare 200 Simplifying Workstation Management Using Novell ZENworks® for Desktops Prometheus Martin Buckley Product Manager ZENworks for Desktops.
Creating Novell Portal Services Gadgets: An Architectural Overview
Novell BrainShare 2002 Success in the City: Implementing Novell Solutions at the City of Los Angeles Bob Gillette Information Systems Manager City of Los.
Securing the Net: Web Authentication Using SecureLogin
Novell BorderManager® 3.7: Technical Overview
Upgrading Legacy Novell Directory Services® to Novell eDirectory™ 8.6
Jumpstart Solution: Novell Active Information Portal
Extending the Net: Novell Portal Solutions Overview
An Early Look at MySQL™ on Novell NetWare®
Novell iPrint Deployment Strategies
Novell Government Solutions
Introducing Novell IPv6 Stack
Six Reasons to Get NetWare® 6 over Windows
Introduction to Novell SecureLogin Single Sign-on
It’s one Net for Mac Users Too
Automating Mainframe Authentication Using SecureLogin
Introduction to NDS® iMonitor
Getting Connected to NGS while on the Road…
Novell eDirectory™ Competitive Comparisons
Introduction to Novell GroupWise® Token API
CHAPTER Introduction to LANs
A Network Operating System Edited By Maysoon AlDuwais
Presentation transcript:

Using Novell iChain ® 2 to Deliver Internal Network Access without a VPN Brian Six Technical Account Manager Novell, Inc. John Shafer Systems Engineer Novell, Inc.

Vision…one Net A world where networks of all types—corporate and public, intranets, extranets, and the Internet—work together as one Net and securely connect employees, customers, suppliers, and partners across organizational boundaries Mission To solve complex business and technical challenges with Net business solutions that enable people, processes, and systems to work together and our customers to profit from the opportunities of a networked world

Agenda Describe Novell iChain ® Components and requirements Installation tips iChain’s purpose in life Configuration examples Demonstration

Description iChain utilizes the world’s most scalable and widely used directory with the world’s fastest caching system Providing access control, security, and web Single Sign-On (SSO) to your web servers, pages, files, and applications

iChain Uses—Before iChain Server

iChain Uses—Access Management Manage users and groups Manage security—X.509 Manage Access Control Lists (ACL) Server

iChain Uses (cont.) Web server server Web server iChain authentication iChain proxy LDAP Web server Web app

iChain Components iChain proxy server  Device which actually provides the security, access control, and caching iChain authorization server  Device that performs user authentication [if required] on behalf of the proxy server

System Requirements: Proxy Server iChain proxy server  Intel Pentium 3 processor or higher  RAM 256 MB configurations support up to 18 GB storage 512 MB configurations support up to 32 GB storage 1 GB configurations support up to 64 GB storage 2 GB configurations support up to 128 GB storage 4 GB configurations support up to 256 GB storage

System Requirements: Proxy Server (cont.) iChain proxy server Intel PRO/100 Desktop Adapter Intel PRO/1000 F Server Adapter Ultra-2 and Ultra-3 Adaptec SCSI controllers (integrated or host adapter) FYI—SMP is not supported, so save your money (Optional) three or more LAN adapters  Public, private, DMZ

System Requirements: Proxy Server (cont.) Tested hardware  Note: iChain 2 no longer requires an approved appliance  Any server class hardware that supports Novell NetWare ® 5.1 and above will work

System Requirements: Authorization Server iChain authorization server Novell eDirectory™ 8.5 or later NetWare 5.1 with Support Pack 1  Print server  FTP server  Enterprise web server  Web search  IBM WebSphere* application server Windows NT* 4.0 Support Pack 4 Not loaded

iChain Proxy Server Installation Tips Imaging process may not start correctly  You may receive an error message that the system you are trying to image isn’t a “Valid ICS Box”  If you see this message, type BLAST at the command prompt to begin the process

iChain Proxy Server Installation Tips Loading system services …………………………………. ~40 Dots - Get into Debug – ALT & SHIFT + SHIFT & ESC -At the Debug prompt type c AppScreenLock -Type 00 -Type. -At the Debug prompt, type c [DICSScreen]+28 -Type 00 -Type.

iChain Auth Server Installation Make sure there is a RW replica on the server Extend eDirectory schema Install snap-ins into Novell ConsoleOne ® Note: Be sure to allow for clear-text passwords in the LDAP group object before you begin the install For security reasons, you may want to consider a separate tree for authentication and to utilize the eDirectory-to-eDirectory Novell DirXML™ connector

iChain Configuration Examples

iChain—Summary Centralized entry and control points Strong authentication options Single point of administration and tools Web SSO Other iChain sessions  IO220  TUT254  BUS227, 228, 350

wiN big one Net solutions lab Access and Security table visit the in the to obtain an entry form