Download presentation
Presentation is loading. Please wait.
Published bySybil Wiggins Modified over 9 years ago
1
www.novell.com Using Novell iChain ® 2 to Deliver Internal Network Access without a VPN Brian Six Technical Account Manager Novell, Inc. bsix@novell.com John Shafer Systems Engineer Novell, Inc. jshafer@novell.com
2
Vision…one Net A world where networks of all types—corporate and public, intranets, extranets, and the Internet—work together as one Net and securely connect employees, customers, suppliers, and partners across organizational boundaries Mission To solve complex business and technical challenges with Net business solutions that enable people, processes, and systems to work together and our customers to profit from the opportunities of a networked world
4
Agenda Describe Novell iChain ® Components and requirements Installation tips iChain’s purpose in life Configuration examples Demonstration
5
Description iChain utilizes the world’s most scalable and widely used directory with the world’s fastest caching system Providing access control, security, and web Single Sign-On (SSO) to your web servers, pages, files, and applications
6
iChain Uses—Before iChain Server
7
iChain Uses—Access Management Manage users and groups Manage security—X.509 Manage Access Control Lists (ACL) Server
8
iChain Uses (cont.) Web server server Web server iChain authentication iChain proxy LDAP Web server Web app
9
iChain Components iChain proxy server Device which actually provides the security, access control, and caching iChain authorization server Device that performs user authentication [if required] on behalf of the proxy server
10
System Requirements: Proxy Server iChain proxy server Intel Pentium 3 processor or higher RAM 256 MB configurations support up to 18 GB storage 512 MB configurations support up to 32 GB storage 1 GB configurations support up to 64 GB storage 2 GB configurations support up to 128 GB storage 4 GB configurations support up to 256 GB storage
11
System Requirements: Proxy Server (cont.) iChain proxy server Intel PRO/100 Desktop Adapter Intel PRO/1000 F Server Adapter Ultra-2 and Ultra-3 Adaptec SCSI controllers (integrated or host adapter) FYI—SMP is not supported, so save your money (Optional) three or more LAN adapters Public, private, DMZ
12
System Requirements: Proxy Server (cont.) Tested hardware http://www.novell.com/products/iChain/hardware.pdf Note: iChain 2 no longer requires an approved appliance Any server class hardware that supports Novell NetWare ® 5.1 and above will work
13
System Requirements: Authorization Server iChain authorization server Novell eDirectory™ 8.5 or later NetWare 5.1 with Support Pack 1 Print server FTP server Enterprise web server Web search IBM WebSphere* application server Windows NT* 4.0 Support Pack 4 Not loaded
14
iChain Proxy Server Installation Tips Imaging process may not start correctly You may receive an error message that the system you are trying to image isn’t a “Valid ICS Box” If you see this message, type BLAST at the command prompt to begin the process
15
iChain Proxy Server Installation Tips Loading system services …………………………………. ~40 Dots - Get into Debug – ALT & SHIFT + SHIFT & ESC -At the Debug prompt type c AppScreenLock -Type 00 -Type. -At the Debug prompt, type c [DICSScreen]+28 -Type 00 -Type.
16
iChain Auth Server Installation Make sure there is a RW replica on the server Extend eDirectory schema Install snap-ins into Novell ConsoleOne ® Note: Be sure to allow for clear-text passwords in the LDAP group object before you begin the install For security reasons, you may want to consider a separate tree for authentication and to utilize the eDirectory-to-eDirectory Novell DirXML™ connector
17
iChain Configuration Examples
18
iChain—Summary Centralized entry and control points Strong authentication options Single point of administration and tools Web SSO Other iChain sessions IO220 TUT254 BUS227, 228, 350
19
wiN big one Net solutions lab Access and Security table visit the in the to obtain an entry form
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.