mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
1925 lines
69 KiB
Text
1925 lines
69 KiB
Text
![]() |
==Phrack Inc.==
|
||
|
|
||
|
Volume Three, Issue Thirty-five, File 8 of 13
|
||
|
|
||
|
|
||
|
+=========================================================================+
|
||
|
|
||
|
|
||
|
A Beginners Guide to Novell Netware 386
|
||
|
|
||
|
|
||
|
|
||
|
Brought to you by:
|
||
|
|
||
|
|
||
|
|
||
|
The Butler
|
||
|
|
||
|
|
||
|
+=========================================================================+
|
||
|
|
||
|
As most of you know NOVELL is the most popular PC network software around,with
|
||
|
that being the case I decided to put together a little file on just what you
|
||
|
can do with a NOVELL network.
|
||
|
|
||
|
* The information in this file is primarily for NOVELL NETWARE 386 networks!!!
|
||
|
If you have NOVELL NETWARE 286 some of this information may not be correct.
|
||
|
|
||
|
When the word "Network" is mentioned in this file I am referring to a PC-based
|
||
|
network or LAN (Local Area Network).
|
||
|
|
||
|
If you are not familiar with the concept of a "Network" I would suggest you
|
||
|
first get acquainted with it by either picking up a good book or if you have
|
||
|
access to one, go exploring.
|
||
|
|
||
|
This file is for those who have some experience with networks and or the
|
||
|
concept of a network.
|
||
|
|
||
|
(----------------------------------------------------------------------------)
|
||
|
|
||
|
Variations in Setups:
|
||
|
|
||
|
Every network is setup differently is some way. Even within the same company
|
||
|
two different networks may be setup different. The differences may be slight
|
||
|
or major and can consist of everything from menus to naming conventions.
|
||
|
|
||
|
Companies that install networks as a business are inconsistent with their
|
||
|
setups also because every network technician does things differently and every
|
||
|
customer wants things to be a certain way.
|
||
|
|
||
|
Keep this idea in mind when exploring different networks because most likely
|
||
|
the setup will be different from network to network.
|
||
|
|
||
|
(----------------------------------------------------------------------------)
|
||
|
|
||
|
Terminology:
|
||
|
|
||
|
Bindery-- A database that contains definitions of entities such as users
|
||
|
groups, and workgroups. The bindery is comprised of three
|
||
|
components: objects, properties, and property data sets.
|
||
|
|
||
|
Console-- The monitor and keyboard at which you actually control fileserver
|
||
|
activity.
|
||
|
|
||
|
File Server-- The Computer that the Network software, applications, and some
|
||
|
data reside on. (Usually a very powerful one, i.e. Compaq 486
|
||
|
with 1 gigabyte of storage).
|
||
|
|
||
|
Groups-- A means of dealing with users collectively rather than individually.
|
||
|
i.e. Word Processing, Accounting.
|
||
|
|
||
|
LAN-- Local Area Network
|
||
|
|
||
|
Login Script-- Similar to autoexec.bat, contains commands that initialize
|
||
|
environmental variables, map network drives, and control the
|
||
|
user's program execution.
|
||
|
|
||
|
Netware-- Novell's Network Operating System.
|
||
|
|
||
|
Netwire-- Novell's on-line information service, accessible via Compuserve.
|
||
|
|
||
|
Network-- A group of computers that can communicate with each other.
|
||
|
|
||
|
NIC-- Network Interface Card
|
||
|
|
||
|
Novell-- Software Manufacturer
|
||
|
|
||
|
Objects-- any physical or logical entities, including users, user groups,
|
||
|
workgroups, file servers, print servers, or any other entity that
|
||
|
has been given a name.
|
||
|
|
||
|
Print Server-- A computer dedicated to controlling all jobs for a specified
|
||
|
printer.
|
||
|
|
||
|
Properties-- the characteristics of each bindery object. Passwords, account
|
||
|
restrictions, account balances, internetwork addresses, list of
|
||
|
authorized clients, and group members are all properties.
|
||
|
|
||
|
Property Data Sets-- the values assigned to an entity's bindery properties.
|
||
|
|
||
|
Rights-- Rights control which directories and files a user or group can
|
||
|
access and what the user or group is allowed to do with those
|
||
|
directories and files.
|
||
|
|
||
|
User-- Any person allowed to work on the network.
|
||
|
|
||
|
WAN-- Wide Area Network
|
||
|
|
||
|
Workstation-- Any usable computer connected to a network.
|
||
|
|
||
|
(----------------------------------------------------------------------------)
|
||
|
|
||
|
Netware Environment:
|
||
|
|
||
|
The SYS:SYSTEM directory is used for system administration and contains
|
||
|
operating system files, NetWare utilities, and programs reserved for
|
||
|
SUPERVISOR.
|
||
|
|
||
|
The SYS:PUBLIC directory is used for general access and contains NetWare
|
||
|
utilities and programs for regular network users.
|
||
|
|
||
|
The SYS:LOGIN directory contains the programs necessary for logging in.
|
||
|
|
||
|
The SYS:MAIL directory is used by NetWare-compatible mail programs. This
|
||
|
directory also has and ID number subdirectory for each user that contains
|
||
|
the user login script and print job configurations.
|
||
|
|
||
|
(----------------------------------------------------------------------------)
|
||
|
|
||
|
Breaches in Security:
|
||
|
|
||
|
Set Allow Unencrypted Passwords=on/off.
|
||
|
|
||
|
Enter this command from the "CONSOLE".
|
||
|
|
||
|
By changing this command you will disable the encryption scheme which will
|
||
|
then allow you to sniff passwords from the cables between workstations and
|
||
|
servers.
|
||
|
|
||
|
By default Netware comes with usernames GUEST and SUPERVISOR that have no
|
||
|
passwords.
|
||
|
|
||
|
Also try names like TAPE, BACKUP, SERVER, REMOTE, CONNECT, NOVELL, etc... If
|
||
|
you have access to an existing account use SYSCON to get a list of all the user
|
||
|
names, most likely there will be one or two accounts that don't have passwords.
|
||
|
|
||
|
Also on some of these accounts that do not have passwords, part of their logon
|
||
|
process is the execution of a batch file that executes the individual software
|
||
|
i.e. backup. A batch file is a batch file so if its not disabled do the old
|
||
|
CTRL-C to break out of the batch file and roam around. Some accounts like the
|
||
|
backup account must have supervisor rights so that everything can be backed up.
|
||
|
So if you can break out of one of these you can roam the whole Network.
|
||
|
|
||
|
There are also a few neat little programs out there in cyberspace that will
|
||
|
make your task of getting access a little easier:
|
||
|
|
||
|
1. THIEFNOV.ZIP ===> THIEFNOV is a TSR that will capture usernames
|
||
|
and passwords from a workstation on Novell
|
||
|
Networks. The Thief works by hiding in a user's
|
||
|
autoexec.bat file, and executing every time
|
||
|
someone tries to login to the network. The Thief
|
||
|
captures their username and password and saves
|
||
|
them in a hidden file in the root directory of
|
||
|
their C: drive.
|
||
|
|
||
|
2. TEMPSUP.ZIP ====> TEMPSUP is a utility that will create a user for
|
||
|
you to play with. TEMPSUP comes with two
|
||
|
programs, an executable and a NLM module. The
|
||
|
executable can be run by any user with access to
|
||
|
DOS but only gives you the rights of that user.
|
||
|
But, the NLM module can be loaded at the Console
|
||
|
and will give you Supervisor Rights to the whole
|
||
|
Network. The syntax is "Tempsup_username to be
|
||
|
created" i.e. f:> tempsup hacker <return>.
|
||
|
|
||
|
3. NETCRACK.ZIP ===> NETCRACK is a brute force hacking program
|
||
|
designed for Novell. NETCRACK can be run with
|
||
|
out login in to the network but by just loading
|
||
|
ipx and netx. NETCRACK starts with AAA and goes
|
||
|
from there trying to guess the password for any
|
||
|
user. The syntax is "netcrack_username <return>.
|
||
|
|
||
|
|
||
|
These are the only programs I know of made especially for Novell and I have
|
||
|
personally tried them all out with excellent results.
|
||
|
|
||
|
If you do get access to a Novell Network and you are not sure what to do, then
|
||
|
go to the F:\PUBLIC directory and type HELP. Novell comes with an online help
|
||
|
system that uses FOLIO Infobases. The HELP system is very easy to navigate
|
||
|
through and is better that the actual Novell Manuals. You can even download
|
||
|
the programs NFOLIO.COM & NFOLIO.EXE and the infobases *.NFO to your local PC
|
||
|
to examine further.
|
||
|
|
||
|
If you are using the brute force hacking method Novell will stop you dead in
|
||
|
your tracks if the Intruder Detection/Lockout option has been enabled because
|
||
|
after 3 unsuccessful login attempts the account is locked until a supervisor
|
||
|
resets it.
|
||
|
|
||
|
Intruder Detection/Lockout options are as follows:
|
||
|
|
||
|
Detect Intruders: Yes/No
|
||
|
Intruder Detection Threshold
|
||
|
Incorrect Login Attempts: #
|
||
|
Bad Login Count Retention Time: # Days # Hours # Minutes
|
||
|
|
||
|
Lock Account After Detection: Yes/No
|
||
|
Length of Account Lockout: # Days # Hours # Minutes
|
||
|
|
||
|
|
||
|
The following restrictions are optional for every user account:
|
||
|
|
||
|
Account Disabled: Yes/No
|
||
|
Account Has Expiration Date: Yes/No
|
||
|
Date Account Expires:
|
||
|
Limit Concurrent Connections: Yes/No
|
||
|
Maximum Connections:
|
||
|
Allow User To Change Password Yes/No
|
||
|
Require Password: Yes/No
|
||
|
Minimum Password Length:
|
||
|
Force Periodic Password Changes: Yes/No
|
||
|
Days Between Forced Changes:
|
||
|
Date Password Expires:
|
||
|
Limit Grace Logins: Yes/No
|
||
|
Grace Logins Allowed:
|
||
|
Remaining Grace Logins:
|
||
|
Require Unique Passwords: Yes/No
|
||
|
|
||
|
|
||
|
Novell can also be setup so that users can only logon during certain hours,
|
||
|
i.e. 8 a.m. - 5 p.m. Monday thru Friday.
|
||
|
|
||
|
Trustee Assignments grant rights to specific users (or groups) that allow
|
||
|
them to use a file or directory in particular ways (i.e., only for reading)
|
||
|
The network supervisor can select the appropriate rights to assign to users
|
||
|
or groups in each directory or file.
|
||
|
|
||
|
A trustee assignment automatically grants users the right to see to the root of
|
||
|
a directory. However, the users can't see any of the subdirectories unless
|
||
|
they also have been granted rights in the subdirectories.
|
||
|
|
||
|
Inherited Rights Masks are given to each file and directory when they are
|
||
|
created. The default Inherited Rights Mask includes all rights. But this does
|
||
|
not mean that users have all rights; users can only use rights that they been
|
||
|
granted in trustee assignments.
|
||
|
|
||
|
If the Inherited Rights Mask is modified for a file or subdirectory below the
|
||
|
original trustee assignment, the only rights the user can "inherit" for the
|
||
|
file or subdirectory are rights that are allowed by the Inherited Rights Mask.
|
||
|
For example, if a user is granted Read right with a directory trustee
|
||
|
assignment, the right to read files in a subdirectory could be revoked by
|
||
|
having the Read right removed from the subdirectory's Inherited Rights Mask.
|
||
|
|
||
|
Both trustee assignments and Inherited Rights Masks use the same eight trustee
|
||
|
rights to control access to directories and file.
|
||
|
|
||
|
S -- Supervisory
|
||
|
|
||
|
Supervisory right grants all rights to the directory or file. At the
|
||
|
directory level, this right grants all rights to the directory and to
|
||
|
any files, subdirectories, or subdirectory files in that directory.
|
||
|
The Supervisory right overrides any restrictions placed on subdirs or
|
||
|
files with Inherited Rights Masks. Users who have the Supervisory
|
||
|
right in a directory can grant other users Supervisory rights to the
|
||
|
directory, its files, and subdirectories.
|
||
|
|
||
|
Once the Supervisory right has been granted, it can be revoked only
|
||
|
from the directory is was granted to. It cannot be revoked in a
|
||
|
file or subdirectory.
|
||
|
|
||
|
R -- Read
|
||
|
|
||
|
Read right allows users to open and read files. At the directory
|
||
|
level this right allows users to open files in a directory and read
|
||
|
the contents or run the program. At the file level, this right allows
|
||
|
users to open and read the file (even when the right has been revoked
|
||
|
at the directory level).
|
||
|
|
||
|
W -- Write
|
||
|
|
||
|
Write right allows users to write to files. At the directory level,
|
||
|
this right allows users to open and write to (modify the contents of)
|
||
|
file in the directory. At the file level, this right allows users
|
||
|
to open and write to the file (even if the right has been revoked at
|
||
|
the directory level).
|
||
|
|
||
|
C -- Create
|
||
|
|
||
|
Create right allows users to create directories and files. At the
|
||
|
directory level, this right allows users to create files and
|
||
|
subdirectories in the directory. At the file level, this right
|
||
|
allows users to salvage a file after it has been deleted.
|
||
|
|
||
|
E -- Erase
|
||
|
|
||
|
Erase right allows users to delete directories and files. At the
|
||
|
directory level, this right allows users to delete a directory as well
|
||
|
as any files, subdirectories, and subdirectory files in that
|
||
|
directory. At the file level, this right allows users to delete the
|
||
|
file (even when the right has been revoked at the directory level).
|
||
|
|
||
|
M -- Modify
|
||
|
|
||
|
Modify right allows users to change directory and file attribute sand
|
||
|
to rename subdirectories and files. At the directory level, this right
|
||
|
allows users to change the attributes of and rename any file, subdir,
|
||
|
or subdirectory file in that directory. At the file level, this right
|
||
|
allows users to change the file's attributes or to rename the file
|
||
|
(even when the right has been revoked at the directory level).
|
||
|
|
||
|
F -- File Scan
|
||
|
|
||
|
File Scan right allows users to see files. At the directory level,
|
||
|
this right allows users to see files and subdirectories in a
|
||
|
directory. At the file level, this right allows users to see the file
|
||
|
(even when the right has been revoked at the directory level).
|
||
|
|
||
|
A -- Access Control
|
||
|
|
||
|
Access Control right allows users to modify trustee assignments and
|
||
|
Inherited Rights Masks.
|
||
|
|
||
|
(----------------------------------------------------------------------------)
|
||
|
|
||
|
As a network user, you should be familiar with the operation of the personal
|
||
|
computer you are using. If you have an IBM PC-type workstation, you should
|
||
|
also be familiar with basic Disk Operating System (DOS) commands.
|
||
|
|
||
|
User Basics is divided into the following ten sections. The first section
|
||
|
explains basic networking concepts and gives an overview of how a NetWare
|
||
|
network operates.
|
||
|
|
||
|
The second section introduces the NetWare menu and command line utilities and
|
||
|
explains how to use them.
|
||
|
|
||
|
The next seven sections explain some basic network tasks:
|
||
|
|
||
|
o Booting up
|
||
|
o Logging in and out
|
||
|
o Creating your login script
|
||
|
o Mapping your drives
|
||
|
o Sending messages
|
||
|
o Managing files and directories
|
||
|
o Printing
|
||
|
|
||
|
Some basic troubleshooting hints are covered under "What If ..." at the end of
|
||
|
each of these modules and are also listed in the index.
|
||
|
|
||
|
The last section lists some common error messages and how to respond to them.
|
||
|
|
||
|
This booklet does not explain how to perform every network task or how to use
|
||
|
every available network command. For complete explanations of all network
|
||
|
tasks and commands, see NetWare v3.11 Utilities Reference.
|
||
|
|
||
|
INTRODUCTION TO NETWARE
|
||
|
|
||
|
If your personal computer is part of a NetWare network, it is connected to
|
||
|
other computers and peripherals. You can share files and resources and
|
||
|
communicate with others in your workgroup, thus increasing productivity.
|
||
|
|
||
|
This introduction answers the following questions about using a NetWare
|
||
|
network:
|
||
|
|
||
|
o What is a NetWare network?
|
||
|
o How does a network operate?
|
||
|
o How are files stored on a network?
|
||
|
o Who can use the network?
|
||
|
o How is information protected on a network?
|
||
|
|
||
|
WHAT IS A NETWARE NETWORK?
|
||
|
|
||
|
A NetWare network is a group of computers (such as IBM PCs or Macintoshes)
|
||
|
that are linked together so they can communicate and share resources.
|
||
|
|
||
|
Network users, each working on a different personal computer, can communicate
|
||
|
with each other via the network. They can also share network resources (hard
|
||
|
disks on the file server, data, applications, and printers) and use any service
|
||
|
the network provides (for example, access to a mainframe system).
|
||
|
|
||
|
HOW DOES A NETWORK OPERATE?
|
||
|
|
||
|
To understand how a network operates, you must know about the principal
|
||
|
components of a network: the file server, the workstations, and the software
|
||
|
that runs on each----NetWare and operating systems like DOS, OS/2, VMS, UNIX,
|
||
|
and the Macintosh operating system.
|
||
|
|
||
|
Beyond these basic components, a NetWare network can incorporate mainframe
|
||
|
computers, backup devices, modem pools, and different types of servers (such as
|
||
|
file servers, print servers, or archive servers).
|
||
|
|
||
|
The Network Workstations and DOS
|
||
|
|
||
|
Workstations are the personal computers on which network users do their work.
|
||
|
Workstations are used much like non-networked personal computers. The only
|
||
|
difference is that they can access files from more than just the local drives.
|
||
|
Each workstation processes its own files and uses its own copy of DOS.
|
||
|
|
||
|
The Network File Server and NetWare
|
||
|
|
||
|
The file server is a personal computer that uses the NetWare operating system
|
||
|
to control the network. The file server coordinates all of the workstations
|
||
|
and regulates the way they share network resources. It regulates who can
|
||
|
access which files, who can make changes to data, and who can use the printer
|
||
|
first.
|
||
|
|
||
|
All network files are stored on a hard disk in or attached to the file server,
|
||
|
instead of on diskettes or hard disks in individual workstations.
|
||
|
|
||
|
The NetWare Workstation
|
||
|
|
||
|
Workstations use two pieces of software to communicate with the file server,
|
||
|
the shell and a protocol. The shell must be loaded into each workstation
|
||
|
before that workstation can function on the network.
|
||
|
|
||
|
The NetWare shell, either NET3 or NET4 (depending on whether you are using DOS
|
||
|
3.x or 4.x), directs workstation requests to DOS or NetWare. When a
|
||
|
workstation makes a request (asks to do a task), the shell decides if it is a
|
||
|
workstation task (to be directed to DOS) or a network task (to be directed to
|
||
|
NetWare). If the request is a workstation task (such as using the DOS DIR
|
||
|
command to list the files in a local directory), DOS should handle the request.
|
||
|
If the request is a network task (such as printing a job on a network printer),
|
||
|
NetWare should handle the request. The shell sends the request to the
|
||
|
appropriate operating system, somewhat like a railroad track switcher sends
|
||
|
trains to the proper destination.
|
||
|
|
||
|
The workstation shell uses another file, IPX.COM, to send network messages to
|
||
|
the file server and, in some cases, directly to other network stations. This
|
||
|
IPX protocol is the language the workstation uses to communicate with the file
|
||
|
server.
|
||
|
|
||
|
HOW ARE FILES STORED ON A NETWORK?
|
||
|
|
||
|
All network information is stored on the file server's hard disk. The system
|
||
|
for storing that information is called the "directory structure."
|
||
|
|
||
|
The NetWare directory structure, or storage system, is organized into
|
||
|
|
||
|
o File servers, which contain one or more
|
||
|
o Volumes, which can span several hard disks and are divided into
|
||
|
o Directories, which can contain other directories (subdirectories) and
|
||
|
o Files.
|
||
|
|
||
|
A directory structure can be compared to a filing cabinet system.
|
||
|
|
||
|
o The file server corresponds to the filing cabinet.
|
||
|
|
||
|
o The volumes correspond to the filing cabinet drawers. Each file server
|
||
|
has at least one volume, the SYS volume, which is created when the server
|
||
|
is installed. In NetWare v3.11, however, one volume can span several
|
||
|
hard disks.
|
||
|
|
||
|
o The directories correspond to the hanging folders within the filing
|
||
|
cabinet drawers. You can create and delete directories to suit your
|
||
|
organizational needs, much as you insert hanging folders into, and remove
|
||
|
them from, a filing cabinet.
|
||
|
|
||
|
o Directories can contain other directories, which are sometimes referred
|
||
|
to as "subdirectories. These directories within a directory then
|
||
|
correspond to the manila folders inside the hanging folders. They divide
|
||
|
directories into smaller units, just as manila folders divide hanging
|
||
|
folders into smaller units.
|
||
|
|
||
|
o And finally, directories contain actual files, just as manila folders
|
||
|
contain individual documents. A file might be a letter or a list of
|
||
|
addresses. When you save information in a file, you give the file a
|
||
|
unique name so you can retrieve it later.
|
||
|
|
||
|
WHO CAN USE THE NETWORK?
|
||
|
|
||
|
Before being able to work on the network, a person must be designated as a
|
||
|
network user. Network users can be assigned four levels of responsibility on
|
||
|
the network.
|
||
|
|
||
|
o Regular network users
|
||
|
|
||
|
o Operators (file server console operators, print queue operators, print
|
||
|
server operators)
|
||
|
|
||
|
o Managers (workgroup managers, user account managers)
|
||
|
|
||
|
o Network supervisors
|
||
|
|
||
|
Regular network users are the people who work on the network. They can run
|
||
|
applications and work with files according to the rights assigned to them.
|
||
|
|
||
|
Operators are regular network users who have been assigned additional
|
||
|
privileges. For example, a file server console operator is a network user
|
||
|
who is given specific rights to use the FCONSOLE utility.
|
||
|
|
||
|
Managers are users who have been given responsibility for creating and/or
|
||
|
managing other users. Workgroup managers can create and manage users; user
|
||
|
account managers can manage, but not create, users. Managers function as
|
||
|
supervisors over a particular group, but they do not have supervisor
|
||
|
equivalence.
|
||
|
|
||
|
Network supervisors are responsible for the smooth operation of the whole
|
||
|
network. Network supervisors maintain the system, restructuring and updating
|
||
|
it as needed. Supervisors may also teach regular network users how to use the
|
||
|
network.
|
||
|
|
||
|
HOW IS INFORMATION PROTECTED ON A NETWORK?
|
||
|
|
||
|
All information on a NetWare network is stored in a central location---the file
|
||
|
server's hard disk. However, all users should not be able to access all
|
||
|
information (such as payroll files). In addition, users should not always be
|
||
|
able to access the same data file at the same time; otherwise, they may
|
||
|
overwrite each other's work.
|
||
|
|
||
|
To prevent problems like these, NetWare provides an extensive security system
|
||
|
to protect the data on the network.
|
||
|
|
||
|
NetWare security consists of a combination of the following:
|
||
|
|
||
|
o Login security
|
||
|
|
||
|
Login security includes creating usernames and passwords and imposing
|
||
|
station, time, and account restrictions on users.
|
||
|
|
||
|
o Trustee rights (privileges) assigned to users
|
||
|
|
||
|
Trustee rights control which directories and files a user can access and
|
||
|
what the user is allowed to do with those directories and files, such as
|
||
|
creating, reading, erasing, or writing to them.
|
||
|
|
||
|
o Attributes assigned to directories and files
|
||
|
|
||
|
Directory and file attributes determine whether that directory or file
|
||
|
can be deleted, copied, viewed, or written to. Among other things, they
|
||
|
also mark a file as shareable or non-shareable.
|
||
|
|
||
|
These three levels of security work together to protect the network from
|
||
|
unauthorized access.
|
||
|
|
||
|
REVIEW
|
||
|
|
||
|
This introduction explained the following:
|
||
|
|
||
|
o A NetWare network links personal computers so users can communicate and
|
||
|
share resources.
|
||
|
|
||
|
o A NetWare network consists of two or more workstations and at least one
|
||
|
file server.
|
||
|
|
||
|
Workstations are personal computers on which network users do their work.
|
||
|
Workstations run their own native operating system (for example, DOS) and
|
||
|
process their own files. They can access files, applications, and
|
||
|
resources through the file server.
|
||
|
|
||
|
File servers are personal computers that use the NetWare operating system
|
||
|
to coordinate all network activities.
|
||
|
|
||
|
o Workstations and the file server communicate via the NetWare shell, which
|
||
|
must be loaded into each workstation (just as DOS must be loaded into
|
||
|
each workstation). NET3 or NET4 (the NetWare shells corresponding to DOS
|
||
|
3.x or 4.x) sends workstation requests to the proper operating system
|
||
|
(file server or workstation) for processing.
|
||
|
|
||
|
o The shell uses a protocol, such as IPX, to send messages to the
|
||
|
appropriate network station.
|
||
|
|
||
|
o Information is stored on the file server in a directory structure that is
|
||
|
made up of volumes, directories, and files.
|
||
|
|
||
|
o There are four types of network users: regular network users, network
|
||
|
operators, network managers, and network supervisors. The type of user
|
||
|
you are is determined by your responsibilities.
|
||
|
|
||
|
o NetWare's extensive security system prevents users from corrupting data
|
||
|
in network files and prevents unauthorized users from accessing
|
||
|
restricted files.
|
||
|
|
||
|
WHAT ARE MENU AND COMMAND LINE UTILITIES?
|
||
|
|
||
|
You use NetWare utilities to perform network tasks. There are two types of
|
||
|
utilities: menu utilities and command line utilities. Menu utilities let you
|
||
|
perform network tasks by choosing options from menus. Command line utilities
|
||
|
let you perform tasks by typing commands at the DOS command line. This section
|
||
|
explains how to execute both types of NetWare utilities.
|
||
|
|
||
|
WORK WITH MENU UTILITIES
|
||
|
|
||
|
Access a Menu Utility
|
||
|
|
||
|
To access a menu utility, such as FILER, type the utility's name
|
||
|
at the DOS prompt and press <Enter>. The utility's main menu
|
||
|
is displayed along with a screen header showing the following:
|
||
|
|
||
|
o The utility's full name
|
||
|
o The current date and time
|
||
|
o The directory path leading up to your current directory (some utilities)
|
||
|
o Your username on your file server (some utilities)
|
||
|
o Your connection number (some utilities)
|
||
|
|
||
|
Exit a Menu Utility
|
||
|
|
||
|
There are two ways to exit a menu utility:
|
||
|
|
||
|
o Press <Escape> until an exit confirmation box appears. Then highlight
|
||
|
"Yes" and press <Enter>.
|
||
|
|
||
|
o Press the Exit key (usually <Alt><F10>). Do not press the Exit key to exit
|
||
|
a menu utility if you have made changes within the utility; if you do, the
|
||
|
changes are not saved. Exiting via the Escape key saves your changes.
|
||
|
|
||
|
Additional Information
|
||
|
|
||
|
Once you have accessed a menu utility and the main menu is displayed, you are
|
||
|
ready to work. Menu utilities use certain keys to perform special functions.
|
||
|
The utilities also have certain standard components. The keys, wildcards, and
|
||
|
components are described below.
|
||
|
|
||
|
F1 (Help) Key. Displays help screens.
|
||
|
If you press the help screen once, a help screen that applies to the task
|
||
|
you are currently working on appears. The help screen describes all the
|
||
|
options on the screen. To get help on a specific option, highlight the
|
||
|
option and press <Enter>.
|
||
|
|
||
|
If you press the Help key twice, your computer's function key assignments
|
||
|
are listed. There are three screens containing function key assignments.
|
||
|
Press the <PageDown> key to see subsequent screens.
|
||
|
|
||
|
F5 (Mark) Key. Allows you to mark multiple items in a list so you can add or
|
||
|
delete several items at once.
|
||
|
|
||
|
Esc (Escape) Key. Has three functions:
|
||
|
|
||
|
1) If you are on a menu screen, pressing <Escape> allows you to return to
|
||
|
a previous menu.
|
||
|
|
||
|
2) If you are at the main menu, pressing <Escape> causes an exit
|
||
|
confirmation box to appear. By highlighting "Yes" and pressing
|
||
|
<Enter>, you exit the menu utility and return to the menu or command
|
||
|
line prompt.
|
||
|
|
||
|
3) If you are performing a process, pressing <Escape> allows you to
|
||
|
continue.
|
||
|
|
||
|
Wildcard characters (* and ?). DOS and NetWare recognize these as universal
|
||
|
replacements for any other character or set of characters. Wildcards can be
|
||
|
used to search for groups of volumes, directories, or files, or they can be
|
||
|
used to search for a particular file when you are unsure of its complete
|
||
|
name.
|
||
|
|
||
|
An asterisk (*) in a filename indicates that any character can occupy that
|
||
|
position and all remaining positions in the filename. For example, in the
|
||
|
FILER utility, to copy all subdirectory's files with the extension .EXE to
|
||
|
another directory, type "*.EXE" in the menu's entry box and press <Enter>.
|
||
|
|
||
|
In contrast, a question mark (?) in a filename indicates that any character can
|
||
|
occupy that position, and that position only. So, if you were to type
|
||
|
"ACCOUNT?.NEW", you would copy files like ACCOUNT1.NEW, ACCOUNT2.NEW, and so
|
||
|
on.
|
||
|
|
||
|
NetWare's use of wildcard characters differs from DOS's in one respect. For
|
||
|
example, to represent all files in a directory, DOS expects you to type "*.*",
|
||
|
whereas NetWare only needs one asterisk (*).
|
||
|
|
||
|
For more information about wildcard characters (global filename characters),
|
||
|
see your DOS manual.
|
||
|
|
||
|
Components. When you first access a menu utility, the main menu is displayed.
|
||
|
Menus contain options you can choose from. Options can be selected one of two
|
||
|
ways:
|
||
|
|
||
|
o You can use the arrow keys to highlight the option you want. Then press
|
||
|
<Enter>.
|
||
|
|
||
|
o You can type the first letter of an option to highlight that option. If
|
||
|
more than one option in the menu starts with the same letter(s), type
|
||
|
enough additional letters to distinguish one option from the others. (For
|
||
|
example, if both "Search" and "Select" were options, you would have to type
|
||
|
"Sel" to highlight "Select.") Once the option you want is highlighted,
|
||
|
press <Enter>.
|
||
|
|
||
|
When you select an option from the main menu, additional menus and displays
|
||
|
appear on the screen. These displays include lists, entry boxes, insets,
|
||
|
forms, and confirmation boxes. Each type of screen display is explained
|
||
|
below.
|
||
|
|
||
|
Lists Lists are similar to menus, and items in the lists can be
|
||
|
selected the same way menu options are. However, you can
|
||
|
also add to and delete items from some lists. Lists may
|
||
|
have more than one column, and they may extend below the
|
||
|
screen display. Press the Down-arrow key to see additional
|
||
|
items. Pressing <Ctrl><PageDown> takes you to the bottom
|
||
|
of the list. Pressing <Ctrl><PageUp> takes you to the top
|
||
|
of the list.
|
||
|
|
||
|
Entry boxes Entry boxes are boxes in which you can get information,
|
||
|
such as a username or pathname. The Delete, Backspace, and
|
||
|
arrow keys work in these boxes.
|
||
|
|
||
|
Insets Insets display information that cannot be edited (except by
|
||
|
the network supervisor). Regular users cannot add to or
|
||
|
delete from the information in this window.
|
||
|
|
||
|
Forms Forms are windows that contain fields. You can move around
|
||
|
in a form using the arrow keys or the Enter key. (When you
|
||
|
press <Enter>, the cursor moves to the next field in the
|
||
|
form.) You can change the information in the field by
|
||
|
highlighting the field and pressing <Enter>.
|
||
|
|
||
|
What you do next depends on the type of field. Some fields
|
||
|
allow you to type in information; others display menu items
|
||
|
to select.
|
||
|
|
||
|
Confirmation boxes Confirmation boxes are displayed whenever you exit a menu
|
||
|
utility or whenever you create or delete items (such as
|
||
|
directories or files). You can either confirm or cancel
|
||
|
the action by selecting "Yes" or "No" and pressing <Enter>.
|
||
|
|
||
|
WORK WITH COMMAND LINE UTILITIES
|
||
|
|
||
|
Command Format
|
||
|
|
||
|
The command format displays the appropriate syntax for command line utilities.
|
||
|
Command line utilities are typed in at the DOS prompt.
|
||
|
|
||
|
The following are examples of the command formats for the NPRINT and the TLIST
|
||
|
utilities:
|
||
|
|
||
|
NPRINT path [option...] <Enter>
|
||
|
|
||
|
TLIST [path [USERS | GROUPS]] <Enter>
|
||
|
|
||
|
Conventions
|
||
|
|
||
|
The conventions for these example command formats are explained below:
|
||
|
|
||
|
NPRINT Words that appear in all capital letters must be spelled exactly as
|
||
|
shown. Although they appear in capital letters, they can be typed
|
||
|
in either upper or lower case.
|
||
|
|
||
|
path Words that appear in lower case are variables. They should be
|
||
|
replaced with the information pertinent to your task. In this
|
||
|
case, "path" would be replaced with the path leading to and
|
||
|
including the file you want to indicate, and you would replace
|
||
|
"option" with any NPRINT options you want to specify.
|
||
|
|
||
|
[ ] Square brackets indicate that the enclosed item is optional: you
|
||
|
can enter a command with or without the enclosed item. In this
|
||
|
case, "option" is optional.
|
||
|
|
||
|
.... Ellipses indicate that more than one option can be used with the
|
||
|
command. In this case, more than one NPRINT option can be entered
|
||
|
in the command.
|
||
|
|
||
|
<Enter> The angle brackets indicate that you should press the key whose
|
||
|
name appears between them.
|
||
|
|
||
|
Always press <Enter> after typing the command format for
|
||
|
command
|
||
|
line utilities.
|
||
|
|
||
|
[[ ]] Nested square brackets indicate that all enclosed items are
|
||
|
optional. However, if you use the item(s) within the innermost
|
||
|
brackets, you must also use the item(s) within the outer brackets.
|
||
|
|
||
|
| A vertical bar or "pipe" means "either, or." You can use either
|
||
|
the item to the left of the vertical bar or the item to the right,
|
||
|
but not both.
|
||
|
|
||
|
Wildcard Characters
|
||
|
|
||
|
DOS and NetWare recognize wildcard characters (* and ?) as universal
|
||
|
replacements for any other character or set of characters. Wildcards can be
|
||
|
used to search for groups of volumes, directories, or files, or to search for a
|
||
|
particular file when you are unsure of its complete name.
|
||
|
|
||
|
An asterisk (*) in a filename indicates that any character can occupy that
|
||
|
position and all remaining positions in the filename. For example, to search
|
||
|
for all filenames with the extension .EXE in your default directory, type "NDIR
|
||
|
*.EXE" and press <Enter> to display the list.
|
||
|
|
||
|
In contrast, a question mark (?) in a filename indicates that any character can
|
||
|
occupy that position, and that position only. So, if you were to type "NDIR
|
||
|
*.?", you would see a list of all files in your default directory with a
|
||
|
single-character extension or no extension at all.
|
||
|
|
||
|
NetWare's use of wildcard characters differs from DOS's in one respect. For
|
||
|
example, to represent all files in a directory, DOS expects you to type "*.*",
|
||
|
whereas NetWare only needs one asterisk (*).
|
||
|
|
||
|
For more information about wildcard characters (global filename characters),
|
||
|
see your DOS manual.
|
||
|
|
||
|
GET HELP IN NETWARE
|
||
|
|
||
|
Use the NetWare HELP utility to view on-line information about NetWare
|
||
|
utilities, NetWare system messages, and NetWare concepts. NetWare HELP allows
|
||
|
you to search for and retrieve information from infobases (information
|
||
|
databases). To access HELP, type
|
||
|
|
||
|
HELP <Enter>
|
||
|
|
||
|
Press <Enter> again to bring up the main menu. For more information on how to
|
||
|
use NetWare HELP, press the Tab key until you get to "How to use this
|
||
|
reference." Then press <Enter>.
|
||
|
|
||
|
BOOT UP
|
||
|
|
||
|
To "boot up" your workstation means to turn on your computer, load DOS, and
|
||
|
then load the workstation shell. You accomplish all of this with a boot
|
||
|
diskette, or you can put the necessary boot files on your workstation's hard
|
||
|
disk. These boot files start up the workstation operating system, load the
|
||
|
NetWare shell, and gain access to the network.
|
||
|
|
||
|
Create Boot Diskettes
|
||
|
|
||
|
1. Format a blank diskette as a boot diskette, using the DOS FORMAT command.
|
||
|
Insert a diskette into drive A and type
|
||
|
|
||
|
Format a: /s <Enter>
|
||
|
|
||
|
Follow the screen prompts.
|
||
|
|
||
|
2. Copy IPX.COM and the shell file (NETx.COM) onto the boot diskette or to the
|
||
|
root directory of your workstation's hard disk.
|
||
|
|
||
|
If your workstation uses DOS 3.x, use NET3.COM.
|
||
|
|
||
|
If your workstation uses DOS 4.x, use NET4.COM.
|
||
|
|
||
|
3. Copy these following additional boot files to the boot diskette or your
|
||
|
hard disk, if needed. Your network supervisor can provide you with these
|
||
|
files:
|
||
|
|
||
|
AUTOEXEC.BAT
|
||
|
CONFIG.SYS
|
||
|
SHELL.CFG
|
||
|
|
||
|
See also "Boot files" in NetWare v3.11 Concepts and Appendix A in NetWare
|
||
|
v3.11 Installation.
|
||
|
|
||
|
4. Label the boot diskette.
|
||
|
|
||
|
Create an AUTOEXEC.BAT File
|
||
|
|
||
|
You can create an AUTOEXEC.BAT file that automatically loads the shell file
|
||
|
each time you boot the workstation. This AUTOEXEC.BAT file can also set your
|
||
|
workstation to the first network drive (F), connect you (user MARIA) to a file
|
||
|
server (WONDER), and set your DOS prompt to show your current directory (PROMPT
|
||
|
$P$G).
|
||
|
|
||
|
Follow these steps to create your AUTOEXEC.BAT file:
|
||
|
|
||
|
1. Insert your boot diskette into drive A and change to drive A. If you plan
|
||
|
to boot from your hard disk, change to your hard disk drive (C or D).
|
||
|
|
||
|
2. If you are using DOS 4.x, type
|
||
|
|
||
|
COPY CON AUTOEXEC.BAT <Enter>
|
||
|
IPX <Enter>
|
||
|
NET4 <Enter>
|
||
|
F: <Enter>
|
||
|
LOGIN WONDER/MARIA <Enter>
|
||
|
PROMPT $P$G <Enter>
|
||
|
<Ctrl>Z <Enter>
|
||
|
|
||
|
If you are using DOS 3.x, replace NET4 with NET3.
|
||
|
|
||
|
LOGIN/LOGOUT
|
||
|
|
||
|
When you log in to a network, you establish a connection between your
|
||
|
workstation and the file server. When you log out, you terminate that
|
||
|
connection.
|
||
|
|
||
|
To log in to the network, you must type in a unique password. If there were no
|
||
|
password, other unauthorized users could easily get to your files and use them
|
||
|
for their purposes.
|
||
|
|
||
|
Log In to Your Network
|
||
|
|
||
|
To log in to your default server, type
|
||
|
|
||
|
LOGIN servername/username <Enter>
|
||
|
|
||
|
Replace servername with the name of the file server you want to log in to.
|
||
|
Replace username with your login name and (if applicable) type your password
|
||
|
when you are prompted for it.
|
||
|
|
||
|
Log Out of Your Network
|
||
|
|
||
|
To log out of your default server, type
|
||
|
|
||
|
LOGOUT <Enter>
|
||
|
|
||
|
To log out of a file server you are attached to, type
|
||
|
|
||
|
LOGOUT servername <Enter>
|
||
|
|
||
|
Attach to Another File Server
|
||
|
|
||
|
Attach to another file server if you want to do the following:
|
||
|
|
||
|
o Send messages to users on that file server
|
||
|
|
||
|
o Map a drive to that file server
|
||
|
|
||
|
o Copy a directory to that file server
|
||
|
|
||
|
To access another file server while remaining logged in to your default file
|
||
|
server, type
|
||
|
|
||
|
ATTACH servername/username <Enter>
|
||
|
|
||
|
Replace servername with the name of the server you want to attach to. Replace
|
||
|
username with the username you have been assigned to use on that file server.
|
||
|
|
||
|
Create or Change a Password
|
||
|
|
||
|
1. To create or change a password on your default server, type
|
||
|
|
||
|
SETPASS <Enter>
|
||
|
|
||
|
The following prompt appears on the screen:
|
||
|
|
||
|
Enter your old password:
|
||
|
|
||
|
2. If you are changing a password, enter the old password. If you are
|
||
|
creating a new password, press <Enter>. The following prompt appears on
|
||
|
your screen:
|
||
|
|
||
|
Enter your new password:
|
||
|
|
||
|
3. Enter the password you want. The following prompt appears:
|
||
|
|
||
|
Retype your new password:
|
||
|
|
||
|
4. Enter the new password again. The following message appears on your
|
||
|
screen:
|
||
|
|
||
|
Your password has been changed.
|
||
|
|
||
|
View Who You Are on Your Network
|
||
|
|
||
|
Type
|
||
|
|
||
|
WHOAMI <Enter>
|
||
|
|
||
|
Information similar to the following is displayed:
|
||
|
|
||
|
You are user FRANK attached to server MKTG, connection 1
|
||
|
Server MKTG is running NetWare v3.11.
|
||
|
Login time: Wednesday October 2, 1991 8:05 am
|
||
|
|
||
|
You are user GUEST attached to server ACCT, connection 7
|
||
|
Server ACCT is running NetWare v3.11.
|
||
|
Login time: Wednesday, October 2, 1991 8:05 am
|
||
|
|
||
|
|
||
|
This screen display indicates that you are attached to both file servers MKTG
|
||
|
and ACCT. Your username on MKTG is FRANK, and your username on ACCT is GUEST.
|
||
|
|
||
|
View File Servers on Your Network
|
||
|
|
||
|
Type
|
||
|
|
||
|
SLIST <Enter>
|
||
|
|
||
|
Information similar to the following appears:
|
||
|
|
||
|
Known NetWare File Servers Network Node Address
|
||
|
-------------------------- ------- ------------
|
||
|
RECORDS [CED88] [2608C234732]
|
||
|
SALES [CED87] [2608C217651]
|
||
|
MFG [CED86] [2608C293185]
|
||
|
|
||
|
View Current Users on Your File Server
|
||
|
|
||
|
You must be attached to a file server before you can view the list of users for
|
||
|
that file server.
|
||
|
|
||
|
Type
|
||
|
|
||
|
USERLIST <Enter>
|
||
|
|
||
|
Information similar to the following appears:
|
||
|
|
||
|
User Information for Server BLOOM
|
||
|
Connection User Name Login Time
|
||
|
---------- --------- ------------------
|
||
|
1 JOE 4-17-1991 8:05 am
|
||
|
2 *CORRINE 4-17-1991 11:20 am
|
||
|
3 PAULO 4-17-1991 7:58 am
|
||
|
4 GUS 4-17-1991 6:01 pm
|
||
|
|
||
|
An asterisk (*) appears next to your username.
|
||
|
|
||
|
What If ...
|
||
|
|
||
|
.... I can't log in?
|
||
|
|
||
|
o Your password may have expired or you may have run out of grace logins.
|
||
|
|
||
|
Your supervisor or manager has to unlock your account.
|
||
|
|
||
|
o You haven't changed to the network login drive (F).
|
||
|
|
||
|
o The LOGIN.EXE file is missing.
|
||
|
|
||
|
o Your shell may be outdated. Type
|
||
|
|
||
|
NVER <Enter>
|
||
|
|
||
|
Report the version number to your supervisor.
|
||
|
|
||
|
o Your network board may not be seated correctly.
|
||
|
|
||
|
o Your file server may be down. Type
|
||
|
|
||
|
SLIST <Enter>
|
||
|
|
||
|
If your file server is listed, log in by typing
|
||
|
|
||
|
LOGIN servername/username <Enter>
|
||
|
|
||
|
o You may be restricted from logging in during certain times. Ask the
|
||
|
network supervisor.
|
||
|
|
||
|
.... My screen is frozen?
|
||
|
|
||
|
o Your supervisor should run the MONITOR utility and clear your connection.
|
||
|
This saves the work you were doing. Then complete one of the two following
|
||
|
tasks:
|
||
|
|
||
|
o To warm boot, press <CTRL><ALT><DEL> simultaneously.
|
||
|
|
||
|
o To cold boot, turn the computer OFF, wait 15 seconds, and then turn it
|
||
|
ON again.
|
||
|
|
||
|
o Your network cable may not be connected or terminated properly. Notify
|
||
|
your supervisor.
|
||
|
|
||
|
o Your node (or station) address may be in conflict with another workstation.
|
||
|
See if new workstations have been added to your network.
|
||
|
|
||
|
o You may have the wrong IPX configuration. Ask your supervisor.
|
||
|
|
||
|
o You may have received a message while in graphics mode. Disable messages
|
||
|
before entering graphics mode by typing
|
||
|
|
||
|
CASTOFF <Enter>
|
||
|
|
||
|
CREATE YOUR LOGIN SCRIPT
|
||
|
|
||
|
Your login script is a program that automatically sets up your workstation's
|
||
|
environment each time you log in. It performs tasks such as mapping network
|
||
|
drives for you, automatically executing programs and starting applications, and
|
||
|
attaching you to different file servers.
|
||
|
|
||
|
This section introduces some basic login script commands.
|
||
|
|
||
|
To access your login script, follow these steps:
|
||
|
|
||
|
1. Type
|
||
|
|
||
|
SYSCON <Enter>
|
||
|
|
||
|
2. Select "User Information" from the main menu.
|
||
|
|
||
|
3. Select your user name from the list of users that appears.
|
||
|
|
||
|
4. Select "Login Script."
|
||
|
|
||
|
5. Enter the commands you need in your login script. Some common commands are
|
||
|
listed under "Common Login Script Commands" below.
|
||
|
|
||
|
6. Exit and save the login script by pressing <Escape> and answering "Yes" in
|
||
|
the confirmation box.
|
||
|
|
||
|
7. To execute your new login script, you must first log out of the network,
|
||
|
and then log in again.
|
||
|
|
||
|
Common Login Script Commands
|
||
|
|
||
|
The commands below can be used in your login script. Each command is followed
|
||
|
by its purpose and an example of how to use it.
|
||
|
|
||
|
MAP INS16:= Inserts the drive as the next available search drive.
|
||
|
|
||
|
MAP INS16:=pd3\sys:jan
|
||
|
|
||
|
MAP drive:= Maps the specified drive to the given directory.
|
||
|
|
||
|
MAP G:=pd3\sys:home\jan
|
||
|
|
||
|
MAP *n:= Maps the next available drive to the given directory.
|
||
|
|
||
|
MAP *1:=pd3\sys:home\jan
|
||
|
|
||
|
# Runs an executable file (a file with an .EXE or .COM
|
||
|
extension).
|
||
|
|
||
|
#SYSCON
|
||
|
|
||
|
REMARK These three commands allow you to insert explanatory text in
|
||
|
* the login script. They will not appear on your screen.
|
||
|
;
|
||
|
REMARK Be sure to update the PROJECTS file.
|
||
|
|
||
|
* Check for new mail.
|
||
|
|
||
|
; Assign OS-dependent Search mappings.
|
||
|
|
||
|
ATTACH Allows you to attach to other file servers while remaining
|
||
|
logged in to your current file server.
|
||
|
|
||
|
ATTACH pd3\jan
|
||
|
|
||
|
SET Allows you to set DOS variables.
|
||
|
|
||
|
SET wp="/u-jlw/"
|
||
|
|
||
|
SET usr="jwilson"
|
||
|
|
||
|
IF...THEN Executes certain commands, if a specified condition exists.
|
||
|
|
||
|
IF DAY_OF_WEEK="Monday" THEN WRITE "AARGH..."
|
||
|
|
||
|
What If ...
|
||
|
|
||
|
.... My login script doesn't execute all the way?
|
||
|
|
||
|
o You may have inserted an EXIT command to a batch file in the middle of your
|
||
|
login script. Anything after the EXIT command is ignored. Move the EXIT
|
||
|
command to the end of your login script.
|
||
|
|
||
|
o An IF...THEN clause in your login script may be incomplete or incorrect.
|
||
|
Check the proper command format in Appendix A of NetWare v3.11
|
||
|
Installation.
|
||
|
|
||
|
.... I am unable to map a drive to another file server?
|
||
|
|
||
|
The file server you want to map a drive to may be down. To check whether the
|
||
|
file server is up, type
|
||
|
|
||
|
SLIST <Enter>
|
||
|
|
||
|
.... I add some mapped drives to my login script and some I wanted are gone?
|
||
|
|
||
|
The system login script executes before the user login script. You can
|
||
|
overwrite the mapped drives in the system login script with those in your user
|
||
|
login script. Instead of using the command "map drive:=", use the command "map
|
||
|
ins 16:=" or "map *1:=". (Remember: You can have only 26 drive mappings.)
|
||
|
|
||
|
VIEW OR CREATE YOUR MAPPED DRIVES
|
||
|
|
||
|
Mapped drives point to particular locations in the directory structure. In
|
||
|
NetWare, there are three type of drives: local drives, network drives, and
|
||
|
search drives. Local drives are physically attached to a workstation. Network
|
||
|
drives allow users to access particular locations in the directory structure.
|
||
|
Search drives allow users to execute program files (such as applications or
|
||
|
utilities) that are in a directory other than the user's current directory.
|
||
|
For more information, see "Drive mappings" in NetWare v3.11 Concepts.
|
||
|
|
||
|
This section tells you how to do the following:
|
||
|
|
||
|
o View all mappings
|
||
|
o Map network drives
|
||
|
o Map search drives
|
||
|
|
||
|
View All Mapped Drives
|
||
|
|
||
|
Type
|
||
|
|
||
|
MAP <Enter>
|
||
|
|
||
|
You see information similar to the following:
|
||
|
|
||
|
DRIVE A: maps to a local drive
|
||
|
DRIVE B: maps to a local drive
|
||
|
|
||
|
DRIVE F:= COUNT/SYS: /HOME/KAREN
|
||
|
DRIVE G:= COUNT/SYS: /
|
||
|
DRIVE H:= COUNT/ACCT: /ACCDATA
|
||
|
|
||
|
-------
|
||
|
|
||
|
SEARCH1:=Z: [COUNT/SYS: /PUBLIC]
|
||
|
SEARCH2:=Y: [COUNT/SYS: /PUBLIC/WP]
|
||
|
SEARCH3:=X: [COUNT/ACCT: /ACCREC]
|
||
|
|
||
|
Map Network Drives
|
||
|
|
||
|
Suppose you want to map a network drive to a directory in which you have files.
|
||
|
To see what network drive letters are available, type
|
||
|
|
||
|
MAP <Enter>
|
||
|
|
||
|
Choose a drive letter that is not being used, such as J. Type
|
||
|
|
||
|
MAP J:= path <Enter>
|
||
|
|
||
|
Replace path with the directory path (including the file server name and the
|
||
|
volume name) leading to the directory to which you want to map network drive J.
|
||
|
|
||
|
For example, suppose your username is MARIA and you want to map drive J to your
|
||
|
home directory, which is on file server COUNT in volume SYS. Type
|
||
|
|
||
|
MAP J:= COUNT/SYS:HOME/MARIA <Enter>
|
||
|
|
||
|
MAP SEARCH DRIVES
|
||
|
|
||
|
Suppose your search drives appear as follows:
|
||
|
|
||
|
SEARCH1:=Z: [COUNT/SYS: /PUBLIC]
|
||
|
SEARCH2:=Y: [COUNT/SYS: /PUBLIC/WP]
|
||
|
|
||
|
The next available search drive is SEARCH3 (S3). To map a
|
||
|
search drive to directory ACCREC on volume ACCT, type
|
||
|
|
||
|
MAP S3:=COUNT/ACCT:ACCREC <Enter>
|
||
|
|
||
|
When you type MAP again, the new search drive appears:
|
||
|
|
||
|
SEARCH1:=Z: [COUNT/SYS: /PUBLIC]
|
||
|
SEARCH2:=Y: [COUNT/SYS: /PUBLIC/WP]
|
||
|
SEARCH3:=X: [COUNT/ACCT: /ACCREC]
|
||
|
|
||
|
What if ...
|
||
|
|
||
|
.... I just mapped a drive and then rebooted, and now the mapped drive is gone?
|
||
|
|
||
|
Did you map the drive in your login script? Drives mapped at the command line
|
||
|
are temporary----they are deleted when you log out of your file server or turn
|
||
|
off your workstation. If you want the mapping to be permanent, you must enter
|
||
|
it in your login script.
|
||
|
|
||
|
.... The system won't accept my mapped drives?
|
||
|
|
||
|
o You may not have rights to the directory you want to map to. Change to
|
||
|
that directory and type
|
||
|
|
||
|
RIGHTS <Enter>
|
||
|
|
||
|
If your rights aren't sufficient, see your supervisor.
|
||
|
|
||
|
o You may have used the wrong command format.
|
||
|
|
||
|
|
||
|
.... I just viewed my mapped drives and some of them seem to be incorrect?
|
||
|
|
||
|
Did you use the DOS CD command to change your default directory? Changing
|
||
|
directories changes your mapping.
|
||
|
|
||
|
.... My search drives are in reverse order?
|
||
|
|
||
|
Search drives are numbered, but their associated drive letters begin in reverse
|
||
|
alphabetical order. For example, the first search drive (Search 1 or S1)
|
||
|
appears as network drive Z, the second one appears as network drive Y, and so
|
||
|
on. However, in your login script, they should appear in normal alphabetical
|
||
|
order.
|
||
|
|
||
|
SEND MESSAGES TO OTHER USERS
|
||
|
|
||
|
You can communicate with other users on your network by
|
||
|
sending messages from your workstation command line.
|
||
|
|
||
|
This section explains how to do the following:
|
||
|
|
||
|
o Send a message to one or more users
|
||
|
o Send a message to all workstations
|
||
|
o Block/allow messages from other workstations
|
||
|
|
||
|
Send a Message to One or More Users
|
||
|
|
||
|
Suppose you want to send the following message to users CINDY and ERIC:
|
||
|
"Meeting at 1:30 today." Also suppose that CINDY and ERIC are logged in to
|
||
|
your default server. Type
|
||
|
|
||
|
SEND "MEETING AT 1:30 TODAY" CINDY, ERIC <Enter>
|
||
|
|
||
|
A confirmation message appears, telling you that the message was sent.
|
||
|
|
||
|
If CINDY is logged in to another file server called SALES, attach to that file
|
||
|
server and type
|
||
|
|
||
|
SEND "MEETING AT 1:30 TODAY" SALES/CINDY <Enter>
|
||
|
|
||
|
Send a Message to All Workstations
|
||
|
|
||
|
Suppose you want to send the following message to all workstations: "Paychecks
|
||
|
are here." Type
|
||
|
|
||
|
SEND "PAYCHECKS ARE HERE." EVERYONE <Enter>
|
||
|
|
||
|
A confirmation message appears listing all the users to whom the message was
|
||
|
sent.
|
||
|
|
||
|
If you want to send a message to everyone on another file server, you must be
|
||
|
attached to that file server and specify the name of the file server in the
|
||
|
command.
|
||
|
|
||
|
|
||
|
Block/Allow Messages from Other Workstations
|
||
|
|
||
|
If you do not want to receive messages sent to you from any network stations,
|
||
|
type
|
||
|
|
||
|
CASTOFF <Enter>
|
||
|
|
||
|
The following message appears on your screen:
|
||
|
|
||
|
Broadcasts from other stations will now be rejected.
|
||
|
|
||
|
To allow your workstation to again receive messages from other network users,
|
||
|
type
|
||
|
|
||
|
CASTON <Enter>
|
||
|
|
||
|
The following message appears on your screen:
|
||
|
|
||
|
Broadcast messages from the console and other stations will now be
|
||
|
accepted.
|
||
|
|
||
|
What If ...
|
||
|
|
||
|
.... I am unable to send a message to a user?
|
||
|
|
||
|
o Is the user logged in? Type
|
||
|
|
||
|
USERLIST <Enter>
|
||
|
|
||
|
o Is your message buffer full? You can only receive up to two messages. You
|
||
|
must clear these messages from your screen (by pressing <Ctrl><Enter>)
|
||
|
before you can receive others.
|
||
|
|
||
|
o Did you type the SEND command properly?
|
||
|
|
||
|
.... I am unable to send messages to users on another file server?
|
||
|
|
||
|
o Did you attach to that file server?
|
||
|
o Is the user logged in? Type
|
||
|
|
||
|
USERLIST <Enter>
|
||
|
|
||
|
o Did you type the SEND command properly?
|
||
|
|
||
|
|
||
|
MANAGE FILES AND DIRECTORIES
|
||
|
|
||
|
You can manage your files and directories in a variety of ways. You can copy,
|
||
|
delete, rename, view, write to, share, and print them. NetWare uses a system
|
||
|
of file and directory rights and attributes to make sure that only authorized
|
||
|
network users can access and handle network data.
|
||
|
|
||
|
Attributes are assigned to files and directories. They override rights, which
|
||
|
are assigned to users. For example, suppose you have the right to rename files
|
||
|
(the Modify right). However, the file you want to copy is flagged with the
|
||
|
Rename Inhibit attribute. This prevents you from renaming it, even though you
|
||
|
have the right to do so.
|
||
|
|
||
|
For more information, see "Attributes" and "Rights" in NetWare v3.11 Concepts.
|
||
|
|
||
|
Know Your Rights
|
||
|
|
||
|
To view your rights in your default directory, type
|
||
|
|
||
|
RIGHTS <Enter>
|
||
|
|
||
|
If your effective rights include all rights, the following information appears:
|
||
|
|
||
|
SERVER1\SYS:PUBLIC\UTIL
|
||
|
Your effective rights for this directory are [SRWCEMFA]
|
||
|
You have Supervisor Rights to Directory. (S)
|
||
|
*May Read from File. (R)
|
||
|
*May Write to File. (W)
|
||
|
May Create Subdirectories and Files. (C)
|
||
|
May Erase Directory. (E)
|
||
|
May Modify Directory. (M)
|
||
|
May Scan for Files. (F)
|
||
|
May Change Access Control. (A)
|
||
|
|
||
|
*Has no effect in directory.
|
||
|
|
||
|
Entries in Directory May Inherit [SRWCEMFA] rights. You have ALL RIGHTS to
|
||
|
Directory Entry.
|
||
|
|
||
|
Copy a File to Another Network Directory
|
||
|
|
||
|
Suppose you want to copy a file called ACC.DAT from your default directory (for
|
||
|
example, F) to the SALEPROG directory in volume SYS on the file server SALES.
|
||
|
First, make sure you have a drive (for example, G) mapped to SALEPROG as
|
||
|
follows:
|
||
|
|
||
|
G:=SALES/SYS:SALEPROG
|
||
|
|
||
|
To copy ACC.DAT from your default directory to the SALEPROG directory, type
|
||
|
|
||
|
NCOPY F:ACC.DAT TO G: <Enter>
|
||
|
|
||
|
Suppose you want to copy a file called ACC.DAT from the SALEPROG directory in
|
||
|
volume SYS on the file server SALES to your default directory. Also suppose
|
||
|
drive G is mapped to SALEPROG as G:=SALES/SYS:SALEPROG. Type
|
||
|
|
||
|
NCOPY G:ACC.DAT F: <Enter>
|
||
|
|
||
|
Copy All of a Directory's Files to Another Directory
|
||
|
|
||
|
1. Type
|
||
|
|
||
|
FILER <Enter>
|
||
|
|
||
|
and select "Directory Contents" from the "Available Topics" menu.
|
||
|
|
||
|
2. Select the directory you want to copy from the "Directory Contents" window.
|
||
|
The "Subdirectory Options" window appears.
|
||
|
|
||
|
3. Select "Copy Subdirectory's Files." The "Copy Subdirectory To:" window
|
||
|
appears.
|
||
|
|
||
|
4. To copy subdirectory files, complete one of the following:
|
||
|
|
||
|
o Copy to a subdirectory in your current directory. Type the name of the
|
||
|
directory; then press <Enter>.
|
||
|
|
||
|
You can also use <Insert> to bring up the "File Servers/Local Drives"
|
||
|
window, from which you can select your directory path by selecting file
|
||
|
server, volume, and directory options.
|
||
|
|
||
|
After you select your directory path, press <Escape> to bring your
|
||
|
cursor back to the "Copy subdirectory To:" window. Then press <Enter>
|
||
|
to copy your subdirectory's files.
|
||
|
|
||
|
o Copy to a directory on another volume on your file server. Type in the
|
||
|
name of the volume and directory; then press <Enter>.
|
||
|
|
||
|
You can also use <Insert> to bring up the "File Servers/Local Drives"
|
||
|
window, from which you can select your directory path by selecting file
|
||
|
server, volume, and directory options.
|
||
|
|
||
|
o Copy to a directory to another file server. You must be attached to
|
||
|
the file server you want to copy files to. Type in the name of the
|
||
|
file server, volume, and directory; then press <Enter>.
|
||
|
|
||
|
Delete a File
|
||
|
|
||
|
1. Type
|
||
|
|
||
|
FILER <Enter>
|
||
|
|
||
|
2. Select "Directory Contents" from the "Available Topics" menu.
|
||
|
|
||
|
3. Highlight the file you want to delete from the "Directory Contents" window
|
||
|
and^S press <Delete>. Answer "Yes" in the confirmation box.
|
||
|
|
||
|
To delete more than one file, use the Mark key (<F5>) to highlight multiple
|
||
|
files; then press <Delete>. Answer "Yes" in the confirmation box.
|
||
|
|
||
|
Salvage a File You Just Deleted
|
||
|
|
||
|
1. Type
|
||
|
|
||
|
SALVAGE <Enter>
|
||
|
|
||
|
2. Select "View/Recover Deleted Files" from the "Main Menu Options"window.
|
||
|
To change to another volume, you must select the directory path from the
|
||
|
"Select Current Directory" option in the main menu.
|
||
|
|
||
|
Note: If you have too many salvageable files to fit on the screen, you will
|
||
|
see the heading "Inc^Qomplete." Scroll through the list to see the
|
||
|
entire list, or use the Mark Pattern key <F6> to mark the file pattern.
|
||
|
Then exit the list and reenter it.
|
||
|
|
||
|
3. To salvage files using wildcards or to salvage a specific file, type the
|
||
|
information in the "Erased File Name Pattern To Match" window.
|
||
|
|
||
|
To view all salvageable files, press <Enter>.
|
||
|
|
||
|
4. To salvage a file, complete one of the following:
|
||
|
|
||
|
o Salvage a single file. Select the file you want to salvage. Select
|
||
|
"Yes" from the "Recover This File" box.
|
||
|
|
||
|
o Salvage multiple files. Use the Mark key (<F5>) to select multiple
|
||
|
files. Select "Yes" from the confirmation box.
|
||
|
|
||
|
o Salvage multiple files using wildcards. To match a filename pattern or
|
||
|
extension, press the Mark Pattern key (<F6>) and type the pattern you
|
||
|
want to match.
|
||
|
|
||
|
Once you match the pattern of the files you want to salvage, press
|
||
|
<Enter> and select "Yes" from the "Recover ALL marked files?"
|
||
|
confirmation box.
|
||
|
|
||
|
5. Press <Escape> to exit SALVAGE.
|
||
|
|
||
|
Find a Lost File
|
||
|
|
||
|
Suppose you don't remember the location of a file. The file is called
|
||
|
FUTURE.DAT. You think it may be in the PROGRAMS directory, and drive G is
|
||
|
mapped to that directory.
|
||
|
|
||
|
To find the location of the lost file, type
|
||
|
|
||
|
NDIR G: FUTURE.DAT <Enter>
|
||
|
|
||
|
If you don't know which directory the file is in, change directories back to
|
||
|
the volume level. Then type
|
||
|
|
||
|
NDIR filename sub <Enter>
|
||
|
|
||
|
The NDIR utility searches all those directories you have rights to on the
|
||
|
volume for the file.
|
||
|
|
||
|
Rename a Directory
|
||
|
|
||
|
Suppose you want to change the name of the ACCT directory to PROGRAMS. Also
|
||
|
suppose drive G is mapped to ACCT in volume SYS on file server RECORDS as
|
||
|
follows:
|
||
|
|
||
|
Drive G: = RECORDS/SYS:ACCT
|
||
|
|
||
|
To rename the directory, type
|
||
|
|
||
|
RENDIR G: PROGRAMS <Enter>
|
||
|
|
||
|
Note: You must be attached to a file server before you can change the name of
|
||
|
a directory on that file server.
|
||
|
|
||
|
You must also have the Modify right in the directory to rename
|
||
|
subdirectories in that directory.
|
||
|
|
||
|
Drive mappings in login scripts (if they exist) must be changed to
|
||
|
reflect the new name of the directory.
|
||
|
|
||
|
What If ...
|
||
|
|
||
|
.... I can't copy?
|
||
|
|
||
|
o You may not have sufficient rights. Type
|
||
|
|
||
|
RIGHTS <Enter>
|
||
|
|
||
|
You must have the Create right to copy files into a directory.
|
||
|
|
||
|
o The file may be flagged "non-shareable" and may be in use. Type
|
||
|
|
||
|
FLAG filename <Enter>
|
||
|
|
||
|
If it is flagged "non-shareable," try again at a later time, when the file
|
||
|
is not in use.
|
||
|
|
||
|
|
||
|
.... I can't see a directory?
|
||
|
|
||
|
o You may not have enough rights to that directory. Type
|
||
|
|
||
|
RIGHTS <Enter>
|
||
|
|
||
|
o The directory attribute may be set to "Hidden" or "System." Type
|
||
|
|
||
|
FLAG filename <Enter>
|
||
|
|
||
|
o The directory may have set disk space limitations. To view the directory
|
||
|
restrictions, type
|
||
|
|
||
|
DSPACE <Enter>
|
||
|
|
||
|
o The directory may have been deleted. Ask your supervisor.
|
||
|
|
||
|
PRINTING
|
||
|
|
||
|
Printing from a network workstation is similar to printing from a stand alone
|
||
|
workstation. When you send a print job to a network printer, however, the job
|
||
|
is routed first through the file server and then delivered to the printer by
|
||
|
the print server.
|
||
|
|
||
|
When a print job leaves the workstation, it is stored temporarily in a print
|
||
|
queue on the file server. This queue, which is a subdirectory on the file
|
||
|
server, stores the print job until the print server can deliver it to the
|
||
|
printer. When the printer is ready to service the job, the print server moves
|
||
|
it from the queue to the printer.
|
||
|
|
||
|
Permanently Set Up Workstation Printing
|
||
|
|
||
|
If you want to print from a non-NetWare-compatible application or from the
|
||
|
screen, you need to route print files from your local printer port (LPT1) to a
|
||
|
file server queue.
|
||
|
|
||
|
1. Enter the SYSCON utility.
|
||
|
|
||
|
2. Select "User Information" from SYSCON's main menu.
|
||
|
|
||
|
3. Select your username.
|
||
|
|
||
|
4. Select "Login Script."
|
||
|
|
||
|
5. Insert the following command into the login script:
|
||
|
|
||
|
#CAPTURE Q=queuename TI=5
|
||
|
|
||
|
6. Exit SYSCON, saving changes when prompted.
|
||
|
|
||
|
7. Log back in to or reboot your workstation to allow the CAPTURE command to
|
||
|
take effect.
|
||
|
|
||
|
Print Screens Using CAPTURE
|
||
|
|
||
|
Before you start printing screens using CAPTURE, you need to set the CAPTURE
|
||
|
parameters in your login script. See "Permanently Set Up Workstation Printing"
|
||
|
on the previous page. Also, your supervisor needs to set up a default queue.
|
||
|
|
||
|
1. At the command line, type
|
||
|
|
||
|
CAPTURE <Enter>
|
||
|
|
||
|
You can include any of the CAPTURE options except Show. Some of the most
|
||
|
common CAPTURE options are the following:
|
||
|
|
||
|
L=n
|
||
|
Indicates which of your workstation's LPT ports (local parallel
|
||
|
printing ports) to capture. Replace "n" with 1, 2, or 3. Default:
|
||
|
|
||
|
^S^Q L=LPT1
|
||
|
|
||
|
Q=queuename
|
||
|
Indicates the queue the print job should be sent to. If multiple
|
||
|
queues are mapped to a printer, you must include this option. Replace
|
||
|
"queuename" with the name of the queue.
|
||
|
|
||
|
TI=n
|
||
|
Indicates the number of seconds between the last time the application
|
||
|
writes to the file and the time it releases the file to the queue.
|
||
|
Include this option if you want to print from an application without
|
||
|
exiting the application. Replace "n" with a number of seconds
|
||
|
(1-1000). Default: TI=O (Timeout disabled)
|
||
|
|
||
|
2. Access the application containing the screen you want to print.
|
||
|
|
||
|
3. Press <Shift><Print Screen>.
|
||
|
|
||
|
4. If you want to print more screens, repeat steps 2 and 3.
|
||
|
|
||
|
5. When you have selected the screens you want printed, return to the DOS
|
||
|
prompt and type
|
||
|
|
||
|
ENDCAP <Enter>
|
||
|
|
||
|
ENDCAP sends your print job to the default print queue of your default file
|
||
|
server, and then the job is printed. ENDCAP also ends the capture of your
|
||
|
LPT port.
|
||
|
|
||
|
Note: Your workstation might hang if you press the <Shift><Print Screen> keys
|
||
|
when none of your LPT ports are captured and no local printers are
|
||
|
attached to your workstation. To prevent this, ask your supervisor to
|
||
|
include the following line in the SHELL.DFG file on your workstation
|
||
|
boot disk.
|
||
|
|
||
|
LOCAL PRINTERS = 0
|
||
|
|
||
|
List the Jobs in a Queue
|
||
|
|
||
|
A queue is a special directory where print files are stored while waiting for
|
||
|
printer services. To see which jobs are waiting in a queue to be printed,
|
||
|
complete the following steps:
|
||
|
|
||
|
1. Type
|
||
|
|
||
|
PCONSOLE <Enter>
|
||
|
|
||
|
2. Select your file server (if other than your current file server).
|
||
|
|
||
|
3. Select "Print Queue Information" from the "Available Options" menu.
|
||
|
|
||
|
4. Select the print queue whose print job you want to view. If you don't know
|
||
|
the name of the print queue, ask your supervisor.
|
||
|
|
||
|
5. Select "Current Print Job Entries" from the "Print Queue Information" list.
|
||
|
The print job entries are displayed.
|
||
|
|
||
|
Delete Your Print Job from a Queue
|
||
|
|
||
|
You can cancel your print job by deleting it from the print queue (even after
|
||
|
the job has started printing). You can delete a print job only if you are the
|
||
|
owner of the job or if you are the print queue operator.
|
||
|
|
||
|
To delete your print job, complete the following steps:
|
||
|
|
||
|
1. Type
|
||
|
|
||
|
PCONSOLE <Enter>
|
||
|
|
||
|
2. Select "Print Queue Information" from the "Available Options" menu.
|
||
|
|
||
|
3. Select the print queue whose entries you want to view. The "Print Queue
|
||
|
Information" list is displayed.
|
||
|
|
||
|
4. Select "Current Print Job Entries."
|
||
|
|
||
|
5. Highlight the print job entry and press <Delete>.
|
||
|
|
||
|
6. Select "Yes" at the confirmation box.
|
||
|
|
||
|
What If...
|
||
|
|
||
|
.... I send commands to print a screen, but it doesn't print?
|
||
|
|
||
|
Did you include the CAPTURE command in your login script? See a previous
|
||
|
section called "Permanently Set Up Workstation Printing."
|
||
|
|
||
|
.... The application I'm using says that the print job was sent, but it doesn't
|
||
|
print out?
|
||
|
|
||
|
o Did you use CAPTURE to redirect output to a print queue first?
|
||
|
|
||
|
o Are the LPT ports captured? Type
|
||
|
|
||
|
CAPTURE SH <Enter>
|
||
|
|
||
|
o Check PCONSOLE and find the appropriate queue. If the queue has a long
|
||
|
list of jobs and none are marked "active," see your print server operator.
|
||
|
If your job isn't in the queue, the application is not set up properly;
|
||
|
check with the applications expert.
|
||
|
|
||
|
COMMON ERROR MESSAGES
|
||
|
|
||
|
Error messages point to a software or hardware error that doesn't allow further
|
||
|
processing. An explanation of the nature of the message and a recommended
|
||
|
course of action follow each message listed below.
|
||
|
|
||
|
"Access denied"
|
||
|
|
||
|
Explanation 1
|
||
|
|
||
|
This message indicates one of the following:
|
||
|
|
||
|
o You entered your username, your password, or both incorrectly.
|
||
|
o You tried to log in to a file server on which you are not defined as a
|
||
|
user.
|
||
|
|
||
|
Action 1
|
||
|
|
||
|
Try to log in again and make sure you type the username and password correctly.
|
||
|
Make sure you are logging in to a file server on which you are defined as a
|
||
|
user or as a member of a group. You can log in to most file servers as GUEST
|
||
|
because user GUEST seldom requires a password.
|
||
|
|
||
|
Explanation 2
|
||
|
|
||
|
You tried to copy, delete, rename, or modify the file attributes of a file for
|
||
|
which you lack rights.
|
||
|
|
||
|
Action 2
|
||
|
|
||
|
Find out about your rights to this file by typing
|
||
|
|
||
|
RIGHTS filename <Enter>
|
||
|
|
||
|
or by asking your supervisor.
|
||
|
|
||
|
|
||
|
|
||
|
"A File Server could not be found"
|
||
|
|
||
|
Explanation
|
||
|
|
||
|
The shell tried to build a connection with the network, but no file server
|
||
|
responded to the request in the given time limit.
|
||
|
|
||
|
Action
|
||
|
|
||
|
Check the cable connection and make sure at least one active file server exists
|
||
|
on the network. Also ask your supervisor to make sure the IPX file and the
|
||
|
network board have the same configuration.
|
||
|
|
||
|
|
||
|
"Message NOT sent to <servername>/<username> (station number)"
|
||
|
|
||
|
Explanation
|
||
|
|
||
|
If a number of messages have been sent to the user or group and have not been
|
||
|
cleared, either of the following may be true:
|
||
|
|
||
|
o The workstation's buffer for incoming messages may be full.
|
||
|
|
||
|
o The message was not sent to the user or group because the user or group
|
||
|
used the CASTOFF utility.
|
||
|
|
||
|
Action
|
||
|
|
||
|
Send the message later, or try another method of communication.
|
||
|
|
||
|
|
||
|
"Network Error <cause> during <operation>. File = <drive>:<filename> Abort,
|
||
|
Retry or Fail?" (or "Abort, Retry?")
|
||
|
|
||
|
Explanation 1
|
||
|
|
||
|
The shell called a function call or a DOS interrupt, but the specified
|
||
|
operation could not be performed. The <drive>:<filename> specify the drive and
|
||
|
filename on which the error condition occurred.
|
||
|
|
||
|
Action 1
|
||
|
|
||
|
Press the R key to retry the operation and, if necessary, repeat this several
|
||
|
times. If the problem persists, ask your supervisor or look up the specific
|
||
|
message in NetWare v3.11 System Messages.
|
||
|
|
||
|
Explanation 2
|
||
|
|
||
|
Your file server may be down.
|
||
|
|
||
|
Action 2
|
||
|
|
||
|
Press the A key to abort the operation, and then try to connect to the file
|
||
|
server again. If this attempt fails, contact your supervisor.
|
||
|
|
||
|
"Password has expired"
|
||
|
|
||
|
Explanation
|
||
|
|
||
|
This message indicates your password has expired.
|
||
|
|
||
|
The network supervisor can require users to periodically change their passwords
|
||
|
on the file server to protect the file server from access by unauthorized
|
||
|
persons. The network supervisor can also assign a number of grace logins
|
||
|
during which users can still use their old passwords (after they have expired)
|
||
|
before having to create new passwords.
|
||
|
|
||
|
Action
|
||
|
|
||
|
Use the SETPASS command to change your password. If you use the old password
|
||
|
during your remaining grace logins, be sure to change it before you run out of
|
||
|
grace logins, or else your network supervisor has to change it for you.
|
||
|
|
||
|
"Password has expired and grace period has also expired."
|
||
|
|
||
|
Explanation
|
||
|
|
||
|
This message indicates that your user account is locked because your password
|
||
|
has expired and you have used all your grace logins.
|
||
|
|
||
|
After your password expires, you may have a number of grace logins during which
|
||
|
you can still use your old password. If you do not change your password before
|
||
|
your grace logins are used, you are denied access.
|
||
|
|
||
|
Action
|
||
|
|
||
|
Since you have run out of grace logins, you cannot access your account until
|
||
|
your network supervisor or manager assigns you a new password.
|
||
|
|
||
|
"Server <servername> not found"
|
||
|
|
||
|
Explanation
|
||
|
|
||
|
This message indicates that you tried to attach to the file server
|
||
|
<servername>, but the file server did not respond for one of the following
|
||
|
reasons:
|
||
|
|
||
|
o You mistyped the name of the file server.
|
||
|
o You specified a file server not cabled to your network.
|
||
|
o You specified a file server that is down for system maintenance.
|
||
|
|
||
|
Action
|
||
|
|
||
|
o Type the file server name correctly.
|
||
|
|
||
|
o Use the SLIST command to list all the available file servers.
|
||
|
|
||
|
o If the file server is down for maintenance, try the command later when the
|
||
|
file server has been brought back up.
|
||
|
|
||
|
If you still have problems, ask your network supervisor for help.
|
||
|
|
||
|
"Unable to attach to server <servername>"
|
||
|
|
||
|
Explanation
|
||
|
|
||
|
This message indicates one of the following:
|
||
|
|
||
|
o You mistyped the name of the file server.
|
||
|
o You specified a file server not cabled to your network.
|
||
|
o You specified a file server that is down for system maintenance.
|
||
|
|
||
|
Action
|
||
|
|
||
|
o Type the file server name correctly.
|
||
|
|
||
|
o Use the SLIST command to list all available file servers.
|
||
|
|
||
|
o If the file server is down for maintenance, try the command later when the
|
||
|
file server has been brought back up.
|
||
|
|
||
|
If you still have problems, ask your network supervisor for help.
|
||
|
|
||
|
"User <fileserver>/<username> not found"
|
||
|
|
||
|
Explanation
|
||
|
|
||
|
This message indicates that you either specified a user who does not exist on
|
||
|
<fileserver> or mistyped the user's name.
|
||
|
|
||
|
Action
|
||
|
|
||
|
o Make sure you have typed the user's name correctly.
|
||
|
|
||
|
o If you are not certain which users are established on the file server, use
|
||
|
the SYSCON utility to view the list of network users.
|
||
|
|
||
|
o You can also use the USERLIST command to view a list of currently attached
|
||
|
users.
|
||
|
|
||
|
(----------------------------------------------------------------------------)
|
||
|
|
||
|
One of the most useful tools that any Novell Network user can have is access to
|
||
|
Netwire on Compuserve. Netwire is a forum that contains messages, files, and
|
||
|
access to Novell product information firsthand. You can submit questions to
|
||
|
Novell technicians and hundreds of other Novell users. A must for any Netware
|
||
|
user.
|
||
|
|
||
|
Another handy tool for those that do have access is the SALVAGE program.
|
||
|
SALVAGE will let you undelete files throughout the system unless the directory
|
||
|
is marked to be purged. PURGE is nice too because it will allow you to
|
||
|
completely erase any files you created or copied. To use purge and or salvage
|
||
|
make sure you are mapped to the public directory and execute them from any DOS
|
||
|
prompt.
|
||
|
|
||
|
(----------------------------------------------------------------------------)
|
||
|
|
||
|
As far as dialing up a Novell Network the means are unlimited. Some have very
|
||
|
tight security systems that only let users with certain hardware dial-in and
|
||
|
others limit the usernames that are allowed dial-in access.
|
||
|
______________________________________________________________________________
|