Presentation is loading. Please wait.

Presentation is loading. Please wait.

Using Novell iChain ® 2 to Deliver Internal Network Access without a VPN Brian Six Technical Account Manager Novell, Inc.

Similar presentations


Presentation on theme: "Using Novell iChain ® 2 to Deliver Internal Network Access without a VPN Brian Six Technical Account Manager Novell, Inc."— Presentation transcript:

1 www.novell.com Using Novell iChain ® 2 to Deliver Internal Network Access without a VPN Brian Six Technical Account Manager Novell, Inc. bsix@novell.com John Shafer Systems Engineer Novell, Inc. jshafer@novell.com

2 Vision…one Net A world where networks of all types—corporate and public, intranets, extranets, and the Internet—work together as one Net and securely connect employees, customers, suppliers, and partners across organizational boundaries Mission To solve complex business and technical challenges with Net business solutions that enable people, processes, and systems to work together and our customers to profit from the opportunities of a networked world

3

4 Agenda Describe Novell iChain ® Components and requirements Installation tips iChain’s purpose in life Configuration examples Demonstration

5 Description iChain utilizes the world’s most scalable and widely used directory with the world’s fastest caching system Providing access control, security, and web Single Sign-On (SSO) to your web servers, pages, files, and applications

6 iChain Uses—Before iChain Server

7 iChain Uses—Access Management Manage users and groups Manage security—X.509 Manage Access Control Lists (ACL) Server

8 iChain Uses (cont.) Web server server Web server iChain authentication iChain proxy LDAP Web server Web app

9 iChain Components iChain proxy server  Device which actually provides the security, access control, and caching iChain authorization server  Device that performs user authentication [if required] on behalf of the proxy server

10 System Requirements: Proxy Server iChain proxy server  Intel Pentium 3 processor or higher  RAM 256 MB configurations support up to 18 GB storage 512 MB configurations support up to 32 GB storage 1 GB configurations support up to 64 GB storage 2 GB configurations support up to 128 GB storage 4 GB configurations support up to 256 GB storage

11 System Requirements: Proxy Server (cont.) iChain proxy server Intel PRO/100 Desktop Adapter Intel PRO/1000 F Server Adapter Ultra-2 and Ultra-3 Adaptec SCSI controllers (integrated or host adapter) FYI—SMP is not supported, so save your money (Optional) three or more LAN adapters  Public, private, DMZ

12 System Requirements: Proxy Server (cont.) Tested hardware  http://www.novell.com/products/iChain/hardware.pdf Note: iChain 2 no longer requires an approved appliance  Any server class hardware that supports Novell NetWare ® 5.1 and above will work

13 System Requirements: Authorization Server iChain authorization server Novell eDirectory™ 8.5 or later NetWare 5.1 with Support Pack 1  Print server  FTP server  Enterprise web server  Web search  IBM WebSphere* application server Windows NT* 4.0 Support Pack 4 Not loaded

14 iChain Proxy Server Installation Tips Imaging process may not start correctly  You may receive an error message that the system you are trying to image isn’t a “Valid ICS Box”  If you see this message, type BLAST at the command prompt to begin the process

15 iChain Proxy Server Installation Tips Loading system services …………………………………. ~40 Dots - Get into Debug – ALT & SHIFT + SHIFT & ESC -At the Debug prompt type c AppScreenLock -Type 00 -Type. -At the Debug prompt, type c [DICSScreen]+28 -Type 00 -Type.

16 iChain Auth Server Installation Make sure there is a RW replica on the server Extend eDirectory schema Install snap-ins into Novell ConsoleOne ® Note: Be sure to allow for clear-text passwords in the LDAP group object before you begin the install For security reasons, you may want to consider a separate tree for authentication and to utilize the eDirectory-to-eDirectory Novell DirXML™ connector

17 iChain Configuration Examples

18 iChain—Summary Centralized entry and control points Strong authentication options Single point of administration and tools Web SSO Other iChain sessions  IO220  TUT254  BUS227, 228, 350

19 wiN big one Net solutions lab Access and Security table visit the in the to obtain an entry form

20


Download ppt "Using Novell iChain ® 2 to Deliver Internal Network Access without a VPN Brian Six Technical Account Manager Novell, Inc."

Similar presentations


Ads by Google