| ==Phrack Inc.== |
|
|
| Volume Three, Issue Thirty-five, File 8 of 13 |
|
|
| |
| +=========================================================================+ |
| |
| |
| A Beginners Guide to Novell Netware 386 |
| |
| |
| |
| Brought to you by: |
| |
| |
| |
| The Butler |
| |
| |
| +=========================================================================+ |
|
|
| As most of you know NOVELL is the most popular PC network software around,with |
| that being the case I decided to put together a little file on just what you |
| can do with a NOVELL network. |
|
|
| * The information in this file is primarily for NOVELL NETWARE 386 networks!!! |
| If you have NOVELL NETWARE 286 some of this information may not be correct. |
|
|
| When the word "Network" is mentioned in this file I am referring to a PC-based |
| network or LAN (Local Area Network). |
|
|
| If you are not familiar with the concept of a "Network" I would suggest you |
| first get acquainted with it by either picking up a good book or if you have |
| access to one, go exploring. |
|
|
| This file is for those who have some experience with networks and or the |
| concept of a network. |
|
|
| (----------------------------------------------------------------------------) |
|
|
| Variations in Setups: |
|
|
| Every network is setup differently is some way. Even within the same company |
| two different networks may be setup different. The differences may be slight |
| or major and can consist of everything from menus to naming conventions. |
|
|
| Companies that install networks as a business are inconsistent with their |
| setups also because every network technician does things differently and every |
| customer wants things to be a certain way. |
|
|
| Keep this idea in mind when exploring different networks because most likely |
| the setup will be different from network to network. |
|
|
| (----------------------------------------------------------------------------) |
|
|
| Terminology: |
|
|
| Bindery-- A database that contains definitions of entities such as users |
| groups, and workgroups. The bindery is comprised of three |
| components: objects, properties, and property data sets. |
|
|
| Console-- The monitor and keyboard at which you actually control fileserver |
| activity. |
|
|
| File Server-- The Computer that the Network software, applications, and some |
| data reside on. (Usually a very powerful one, i.e. Compaq 486 |
| with 1 gigabyte of storage). |
|
|
| Groups-- A means of dealing with users collectively rather than individually. |
| i.e. Word Processing, Accounting. |
|
|
| LAN-- Local Area Network |
|
|
| Login Script-- Similar to autoexec.bat, contains commands that initialize |
| environmental variables, map network drives, and control the |
| user's program execution. |
|
|
| Netware-- Novell's Network Operating System. |
|
|
| Netwire-- Novell's on-line information service, accessible via Compuserve. |
|
|
| Network-- A group of computers that can communicate with each other. |
|
|
| NIC-- Network Interface Card |
|
|
| Novell-- Software Manufacturer |
|
|
| Objects-- any physical or logical entities, including users, user groups, |
| workgroups, file servers, print servers, or any other entity that |
| has been given a name. |
|
|
| Print Server-- A computer dedicated to controlling all jobs for a specified |
| printer. |
|
|
| Properties-- the characteristics of each bindery object. Passwords, account |
| restrictions, account balances, internetwork addresses, list of |
| authorized clients, and group members are all properties. |
|
|
| Property Data Sets-- the values assigned to an entity's bindery properties. |
|
|
| Rights-- Rights control which directories and files a user or group can |
| access and what the user or group is allowed to do with those |
| directories and files. |
|
|
| User-- Any person allowed to work on the network. |
|
|
| WAN-- Wide Area Network |
|
|
| Workstation-- Any usable computer connected to a network. |
|
|
| (----------------------------------------------------------------------------) |
|
|
| Netware Environment: |
|
|
| The SYS:SYSTEM directory is used for system administration and contains |
| operating system files, NetWare utilities, and programs reserved for |
| SUPERVISOR. |
|
|
| The SYS:PUBLIC directory is used for general access and contains NetWare |
| utilities and programs for regular network users. |
|
|
| The SYS:LOGIN directory contains the programs necessary for logging in. |
|
|
| The SYS:MAIL directory is used by NetWare-compatible mail programs. This |
| directory also has and ID number subdirectory for each user that contains |
| the user login script and print job configurations. |
|
|
| (----------------------------------------------------------------------------) |
|
|
| Breaches in Security: |
|
|
| Set Allow Unencrypted Passwords=on/off. |
|
|
| Enter this command from the "CONSOLE". |
|
|
| By changing this command you will disable the encryption scheme which will |
| then allow you to sniff passwords from the cables between workstations and |
| servers. |
|
|
| By default Netware comes with usernames GUEST and SUPERVISOR that have no |
| passwords. |
|
|
| Also try names like TAPE, BACKUP, SERVER, REMOTE, CONNECT, NOVELL, etc... If |
| you have access to an existing account use SYSCON to get a list of all the user |
| names, most likely there will be one or two accounts that don't have passwords. |
|
|
| Also on some of these accounts that do not have passwords, part of their logon |
| process is the execution of a batch file that executes the individual software |
| i.e. backup. A batch file is a batch file so if its not disabled do the old |
| CTRL-C to break out of the batch file and roam around. Some accounts like the |
| backup account must have supervisor rights so that everything can be backed up. |
| So if you can break out of one of these you can roam the whole Network. |
|
|
| There are also a few neat little programs out there in cyberspace that will |
| make your task of getting access a little easier: |
|
|
| 1. THIEFNOV.ZIP ===> THIEFNOV is a TSR that will capture usernames |
| and passwords from a workstation on Novell |
| Networks. The Thief works by hiding in a user's |
| autoexec.bat file, and executing every time |
| someone tries to login to the network. The Thief |
| captures their username and password and saves |
| them in a hidden file in the root directory of |
| their C: drive. |
|
|
| 2. TEMPSUP.ZIP ====> TEMPSUP is a utility that will create a user for |
| you to play with. TEMPSUP comes with two |
| programs, an executable and a NLM module. The |
| executable can be run by any user with access to |
| DOS but only gives you the rights of that user. |
| But, the NLM module can be loaded at the Console |
| and will give you Supervisor Rights to the whole |
| Network. The syntax is "Tempsup_username to be |
| created" i.e. f:> tempsup hacker <return>. |
|
|
| 3. NETCRACK.ZIP ===> NETCRACK is a brute force hacking program |
| designed for Novell. NETCRACK can be run with |
| out login in to the network but by just loading |
| ipx and netx. NETCRACK starts with AAA and goes |
| from there trying to guess the password for any |
| user. The syntax is "netcrack_username <return>. |
|
|
|
|
| These are the only programs I know of made especially for Novell and I have |
| personally tried them all out with excellent results. |
|
|
| If you do get access to a Novell Network and you are not sure what to do, then |
| go to the F:\PUBLIC directory and type HELP. Novell comes with an online help |
| system that uses FOLIO Infobases. The HELP system is very easy to navigate |
| through and is better that the actual Novell Manuals. You can even download |
| the programs NFOLIO.COM & NFOLIO.EXE and the infobases *.NFO to your local PC |
| to examine further. |
|
|
| If you are using the brute force hacking method Novell will stop you dead in |
| your tracks if the Intruder Detection/Lockout option has been enabled because |
| after 3 unsuccessful login attempts the account is locked until a supervisor |
| resets it. |
|
|
| Intruder Detection/Lockout options are as follows: |
|
|
| Detect Intruders: Yes/No |
| Intruder Detection Threshold |
| Incorrect Login Attempts: # |
| Bad Login Count Retention Time: # Days # Hours # Minutes |
|
|
| Lock Account After Detection: Yes/No |
| Length of Account Lockout: # Days # Hours # Minutes |
|
|
|
|
| The following restrictions are optional for every user account: |
|
|
| Account Disabled: Yes/No |
| Account Has Expiration Date: Yes/No |
| Date Account Expires: |
| Limit Concurrent Connections: Yes/No |
| Maximum Connections: |
| Allow User To Change Password Yes/No |
| Require Password: Yes/No |
| Minimum Password Length: |
| Force Periodic Password Changes: Yes/No |
| Days Between Forced Changes: |
| Date Password Expires: |
| Limit Grace Logins: Yes/No |
| Grace Logins Allowed: |
| Remaining Grace Logins: |
| Require Unique Passwords: Yes/No |
|
|
|
|
| Novell can also be setup so that users can only logon during certain hours, |
| i.e. 8 a.m. - 5 p.m. Monday thru Friday. |
|
|
| Trustee Assignments grant rights to specific users (or groups) that allow |
| them to use a file or directory in particular ways (i.e., only for reading) |
| The network supervisor can select the appropriate rights to assign to users |
| or groups in each directory or file. |
|
|
| A trustee assignment automatically grants users the right to see to the root of |
| a directory. However, the users can't see any of the subdirectories unless |
| they also have been granted rights in the subdirectories. |
|
|
| Inherited Rights Masks are given to each file and directory when they are |
| created. The default Inherited Rights Mask includes all rights. But this does |
| not mean that users have all rights; users can only use rights that they been |
| granted in trustee assignments. |
|
|
| If the Inherited Rights Mask is modified for a file or subdirectory below the |
| original trustee assignment, the only rights the user can "inherit" for the |
| file or subdirectory are rights that are allowed by the Inherited Rights Mask. |
| For example, if a user is granted Read right with a directory trustee |
| assignment, the right to read files in a subdirectory could be revoked by |
| having the Read right removed from the subdirectory's Inherited Rights Mask. |
|
|
| Both trustee assignments and Inherited Rights Masks use the same eight trustee |
| rights to control access to directories and file. |
|
|
| S -- Supervisory |
|
|
| Supervisory right grants all rights to the directory or file. At the |
| directory level, this right grants all rights to the directory and to |
| any files, subdirectories, or subdirectory files in that directory. |
| The Supervisory right overrides any restrictions placed on subdirs or |
| files with Inherited Rights Masks. Users who have the Supervisory |
| right in a directory can grant other users Supervisory rights to the |
| directory, its files, and subdirectories. |
|
|
| Once the Supervisory right has been granted, it can be revoked only |
| from the directory is was granted to. It cannot be revoked in a |
| file or subdirectory. |
|
|
| R -- Read |
|
|
| Read right allows users to open and read files. At the directory |
| level this right allows users to open files in a directory and read |
| the contents or run the program. At the file level, this right allows |
| users to open and read the file (even when the right has been revoked |
| at the directory level). |
|
|
| W -- Write |
|
|
| Write right allows users to write to files. At the directory level, |
| this right allows users to open and write to (modify the contents of) |
| file in the directory. At the file level, this right allows users |
| to open and write to the file (even if the right has been revoked at |
| the directory level). |
|
|
| C -- Create |
|
|
| Create right allows users to create directories and files. At the |
| directory level, this right allows users to create files and |
| subdirectories in the directory. At the file level, this right |
| allows users to salvage a file after it has been deleted. |
|
|
| E -- Erase |
|
|
| Erase right allows users to delete directories and files. At the |
| directory level, this right allows users to delete a directory as well |
| as any files, subdirectories, and subdirectory files in that |
| directory. At the file level, this right allows users to delete the |
| file (even when the right has been revoked at the directory level). |
|
|
| M -- Modify |
|
|
| Modify right allows users to change directory and file attribute sand |
| to rename subdirectories and files. At the directory level, this right |
| allows users to change the attributes of and rename any file, subdir, |
| or subdirectory file in that directory. At the file level, this right |
| allows users to change the file's attributes or to rename the file |
| (even when the right has been revoked at the directory level). |
|
|
| F -- File Scan |
|
|
| File Scan right allows users to see files. At the directory level, |
| this right allows users to see files and subdirectories in a |
| directory. At the file level, this right allows users to see the file |
| (even when the right has been revoked at the directory level). |
|
|
| A -- Access Control |
|
|
| Access Control right allows users to modify trustee assignments and |
| Inherited Rights Masks. |
|
|
| (----------------------------------------------------------------------------) |
|
|
| As a network user, you should be familiar with the operation of the personal |
| computer you are using. If you have an IBM PC-type workstation, you should |
| also be familiar with basic Disk Operating System (DOS) commands. |
|
|
| User Basics is divided into the following ten sections. The first section |
| explains basic networking concepts and gives an overview of how a NetWare |
| network operates. |
|
|
| The second section introduces the NetWare menu and command line utilities and |
| explains how to use them. |
|
|
| The next seven sections explain some basic network tasks: |
|
|
| o Booting up |
| o Logging in and out |
| o Creating your login script |
| o Mapping your drives |
| o Sending messages |
| o Managing files and directories |
| o Printing |
|
|
| Some basic troubleshooting hints are covered under "What If ..." at the end of |
| each of these modules and are also listed in the index. |
|
|
| The last section lists some common error messages and how to respond to them. |
|
|
| This booklet does not explain how to perform every network task or how to use |
| every available network command. For complete explanations of all network |
| tasks and commands, see NetWare v3.11 Utilities Reference. |
|
|
| INTRODUCTION TO NETWARE |
|
|
| If your personal computer is part of a NetWare network, it is connected to |
| other computers and peripherals. You can share files and resources and |
| communicate with others in your workgroup, thus increasing productivity. |
|
|
| This introduction answers the following questions about using a NetWare |
| network: |
|
|
| o What is a NetWare network? |
| o How does a network operate? |
| o How are files stored on a network? |
| o Who can use the network? |
| o How is information protected on a network? |
|
|
| WHAT IS A NETWARE NETWORK? |
|
|
| A NetWare network is a group of computers (such as IBM PCs or Macintoshes) |
| that are linked together so they can communicate and share resources. |
|
|
| Network users, each working on a different personal computer, can communicate |
| with each other via the network. They can also share network resources (hard |
| disks on the file server, data, applications, and printers) and use any service |
| the network provides (for example, access to a mainframe system). |
|
|
| HOW DOES A NETWORK OPERATE? |
|
|
| To understand how a network operates, you must know about the principal |
| components of a network: the file server, the workstations, and the software |
| that runs on each----NetWare and operating systems like DOS, OS/2, VMS, UNIX, |
| and the Macintosh operating system. |
|
|
| Beyond these basic components, a NetWare network can incorporate mainframe |
| computers, backup devices, modem pools, and different types of servers (such as |
| file servers, print servers, or archive servers). |
|
|
| The Network Workstations and DOS |
|
|
| Workstations are the personal computers on which network users do their work. |
| Workstations are used much like non-networked personal computers. The only |
| difference is that they can access files from more than just the local drives. |
| Each workstation processes its own files and uses its own copy of DOS. |
|
|
| The Network File Server and NetWare |
|
|
| The file server is a personal computer that uses the NetWare operating system |
| to control the network. The file server coordinates all of the workstations |
| and regulates the way they share network resources. It regulates who can |
| access which files, who can make changes to data, and who can use the printer |
| first. |
|
|
| All network files are stored on a hard disk in or attached to the file server, |
| instead of on diskettes or hard disks in individual workstations. |
|
|
| The NetWare Workstation |
|
|
| Workstations use two pieces of software to communicate with the file server, |
| the shell and a protocol. The shell must be loaded into each workstation |
| before that workstation can function on the network. |
|
|
| The NetWare shell, either NET3 or NET4 (depending on whether you are using DOS |
| 3.x or 4.x), directs workstation requests to DOS or NetWare. When a |
| workstation makes a request (asks to do a task), the shell decides if it is a |
| workstation task (to be directed to DOS) or a network task (to be directed to |
| NetWare). If the request is a workstation task (such as using the DOS DIR |
| command to list the files in a local directory), DOS should handle the request. |
| If the request is a network task (such as printing a job on a network printer), |
| NetWare should handle the request. The shell sends the request to the |
| appropriate operating system, somewhat like a railroad track switcher sends |
| trains to the proper destination. |
|
|
| The workstation shell uses another file, IPX.COM, to send network messages to |
| the file server and, in some cases, directly to other network stations. This |
| IPX protocol is the language the workstation uses to communicate with the file |
| server. |
|
|
| HOW ARE FILES STORED ON A NETWORK? |
|
|
| All network information is stored on the file server's hard disk. The system |
| for storing that information is called the "directory structure." |
|
|
| The NetWare directory structure, or storage system, is organized into |
|
|
| o File servers, which contain one or more |
| o Volumes, which can span several hard disks and are divided into |
| o Directories, which can contain other directories (subdirectories) and |
| o Files. |
|
|
| A directory structure can be compared to a filing cabinet system. |
|
|
| o The file server corresponds to the filing cabinet. |
|
|
| o The volumes correspond to the filing cabinet drawers. Each file server |
| has at least one volume, the SYS volume, which is created when the server |
| is installed. In NetWare v3.11, however, one volume can span several |
| hard disks. |
|
|
| o The directories correspond to the hanging folders within the filing |
| cabinet drawers. You can create and delete directories to suit your |
| organizational needs, much as you insert hanging folders into, and remove |
| them from, a filing cabinet. |
|
|
| o Directories can contain other directories, which are sometimes referred |
| to as "subdirectories. These directories within a directory then |
| correspond to the manila folders inside the hanging folders. They divide |
| directories into smaller units, just as manila folders divide hanging |
| folders into smaller units. |
|
|
| o And finally, directories contain actual files, just as manila folders |
| contain individual documents. A file might be a letter or a list of |
| addresses. When you save information in a file, you give the file a |
| unique name so you can retrieve it later. |
|
|
| WHO CAN USE THE NETWORK? |
|
|
| Before being able to work on the network, a person must be designated as a |
| network user. Network users can be assigned four levels of responsibility on |
| the network. |
|
|
| o Regular network users |
|
|
| o Operators (file server console operators, print queue operators, print |
| server operators) |
|
|
| o Managers (workgroup managers, user account managers) |
|
|
| o Network supervisors |
|
|
| Regular network users are the people who work on the network. They can run |
| applications and work with files according to the rights assigned to them. |
|
|
| Operators are regular network users who have been assigned additional |
| privileges. For example, a file server console operator is a network user |
| who is given specific rights to use the FCONSOLE utility. |
|
|
| Managers are users who have been given responsibility for creating and/or |
| managing other users. Workgroup managers can create and manage users; user |
| account managers can manage, but not create, users. Managers function as |
| supervisors over a particular group, but they do not have supervisor |
| equivalence. |
|
|
| Network supervisors are responsible for the smooth operation of the whole |
| network. Network supervisors maintain the system, restructuring and updating |
| it as needed. Supervisors may also teach regular network users how to use the |
| network. |
|
|
| HOW IS INFORMATION PROTECTED ON A NETWORK? |
|
|
| All information on a NetWare network is stored in a central location---the file |
| server's hard disk. However, all users should not be able to access all |
| information (such as payroll files). In addition, users should not always be |
| able to access the same data file at the same time; otherwise, they may |
| overwrite each other's work. |
|
|
| To prevent problems like these, NetWare provides an extensive security system |
| to protect the data on the network. |
|
|
| NetWare security consists of a combination of the following: |
|
|
| o Login security |
|
|
| Login security includes creating usernames and passwords and imposing |
| station, time, and account restrictions on users. |
|
|
| o Trustee rights (privileges) assigned to users |
|
|
| Trustee rights control which directories and files a user can access and |
| what the user is allowed to do with those directories and files, such as |
| creating, reading, erasing, or writing to them. |
|
|
| o Attributes assigned to directories and files |
|
|
| Directory and file attributes determine whether that directory or file |
| can be deleted, copied, viewed, or written to. Among other things, they |
| also mark a file as shareable or non-shareable. |
|
|
| These three levels of security work together to protect the network from |
| unauthorized access. |
|
|
| REVIEW |
|
|
| This introduction explained the following: |
|
|
| o A NetWare network links personal computers so users can communicate and |
| share resources. |
|
|
| o A NetWare network consists of two or more workstations and at least one |
| file server. |
|
|
| Workstations are personal computers on which network users do their work. |
| Workstations run their own native operating system (for example, DOS) and |
| process their own files. They can access files, applications, and |
| resources through the file server. |
|
|
| File servers are personal computers that use the NetWare operating system |
| to coordinate all network activities. |
|
|
| o Workstations and the file server communicate via the NetWare shell, which |
| must be loaded into each workstation (just as DOS must be loaded into |
| each workstation). NET3 or NET4 (the NetWare shells corresponding to DOS |
| 3.x or 4.x) sends workstation requests to the proper operating system |
| (file server or workstation) for processing. |
|
|
| o The shell uses a protocol, such as IPX, to send messages to the |
| appropriate network station. |
|
|
| o Information is stored on the file server in a directory structure that is |
| made up of volumes, directories, and files. |
|
|
| o There are four types of network users: regular network users, network |
| operators, network managers, and network supervisors. The type of user |
| you are is determined by your responsibilities. |
|
|
| o NetWare's extensive security system prevents users from corrupting data |
| in network files and prevents unauthorized users from accessing |
| restricted files. |
|
|
| WHAT ARE MENU AND COMMAND LINE UTILITIES? |
|
|
| You use NetWare utilities to perform network tasks. There are two types of |
| utilities: menu utilities and command line utilities. Menu utilities let you |
| perform network tasks by choosing options from menus. Command line utilities |
| let you perform tasks by typing commands at the DOS command line. This section |
| explains how to execute both types of NetWare utilities. |
|
|
| WORK WITH MENU UTILITIES |
|
|
| Access a Menu Utility |
|
|
| To access a menu utility, such as FILER, type the utility's name |
| at the DOS prompt and press <Enter>. The utility's main menu |
| is displayed along with a screen header showing the following: |
|
|
| o The utility's full name |
| o The current date and time |
| o The directory path leading up to your current directory (some utilities) |
| o Your username on your file server (some utilities) |
| o Your connection number (some utilities) |
|
|
| Exit a Menu Utility |
|
|
| There are two ways to exit a menu utility: |
|
|
| o Press <Escape> until an exit confirmation box appears. Then highlight |
| "Yes" and press <Enter>. |
|
|
| o Press the Exit key (usually <Alt><F10>). Do not press the Exit key to exit |
| a menu utility if you have made changes within the utility; if you do, the |
| changes are not saved. Exiting via the Escape key saves your changes. |
|
|
| Additional Information |
|
|
| Once you have accessed a menu utility and the main menu is displayed, you are |
| ready to work. Menu utilities use certain keys to perform special functions. |
| The utilities also have certain standard components. The keys, wildcards, and |
| components are described below. |
|
|
| F1 (Help) Key. Displays help screens. |
| If you press the help screen once, a help screen that applies to the task |
| you are currently working on appears. The help screen describes all the |
| options on the screen. To get help on a specific option, highlight the |
| option and press <Enter>. |
|
|
| If you press the Help key twice, your computer's function key assignments |
| are listed. There are three screens containing function key assignments. |
| Press the <PageDown> key to see subsequent screens. |
|
|
| F5 (Mark) Key. Allows you to mark multiple items in a list so you can add or |
| delete several items at once. |
|
|
| Esc (Escape) Key. Has three functions: |
|
|
| 1) If you are on a menu screen, pressing <Escape> allows you to return to |
| a previous menu. |
|
|
| 2) If you are at the main menu, pressing <Escape> causes an exit |
| confirmation box to appear. By highlighting "Yes" and pressing |
| <Enter>, you exit the menu utility and return to the menu or command |
| line prompt. |
|
|
| 3) If you are performing a process, pressing <Escape> allows you to |
| continue. |
|
|
| Wildcard characters (* and ?). DOS and NetWare recognize these as universal |
| replacements for any other character or set of characters. Wildcards can be |
| used to search for groups of volumes, directories, or files, or they can be |
| used to search for a particular file when you are unsure of its complete |
| name. |
|
|
| An asterisk (*) in a filename indicates that any character can occupy that |
| position and all remaining positions in the filename. For example, in the |
| FILER utility, to copy all subdirectory's files with the extension .EXE to |
| another directory, type "*.EXE" in the menu's entry box and press <Enter>. |
|
|
| In contrast, a question mark (?) in a filename indicates that any character can |
| occupy that position, and that position only. So, if you were to type |
| "ACCOUNT?.NEW", you would copy files like ACCOUNT1.NEW, ACCOUNT2.NEW, and so |
| on. |
|
|
| NetWare's use of wildcard characters differs from DOS's in one respect. For |
| example, to represent all files in a directory, DOS expects you to type "*.*", |
| whereas NetWare only needs one asterisk (*). |
|
|
| For more information about wildcard characters (global filename characters), |
| see your DOS manual. |
|
|
| Components. When you first access a menu utility, the main menu is displayed. |
| Menus contain options you can choose from. Options can be selected one of two |
| ways: |
|
|
| o You can use the arrow keys to highlight the option you want. Then press |
| <Enter>. |
|
|
| o You can type the first letter of an option to highlight that option. If |
| more than one option in the menu starts with the same letter(s), type |
| enough additional letters to distinguish one option from the others. (For |
| example, if both "Search" and "Select" were options, you would have to type |
| "Sel" to highlight "Select.") Once the option you want is highlighted, |
| press <Enter>. |
|
|
| When you select an option from the main menu, additional menus and displays |
| appear on the screen. These displays include lists, entry boxes, insets, |
| forms, and confirmation boxes. Each type of screen display is explained |
| below. |
|
|
| Lists Lists are similar to menus, and items in the lists can be |
| selected the same way menu options are. However, you can |
| also add to and delete items from some lists. Lists may |
| have more than one column, and they may extend below the |
| screen display. Press the Down-arrow key to see additional |
| items. Pressing <Ctrl><PageDown> takes you to the bottom |
| of the list. Pressing <Ctrl><PageUp> takes you to the top |
| of the list. |
|
|
| Entry boxes Entry boxes are boxes in which you can get information, |
| such as a username or pathname. The Delete, Backspace, and |
| arrow keys work in these boxes. |
|
|
| Insets Insets display information that cannot be edited (except by |
| the network supervisor). Regular users cannot add to or |
| delete from the information in this window. |
|
|
| Forms Forms are windows that contain fields. You can move around |
| in a form using the arrow keys or the Enter key. (When you |
| press <Enter>, the cursor moves to the next field in the |
| form.) You can change the information in the field by |
| highlighting the field and pressing <Enter>. |
|
|
| What you do next depends on the type of field. Some fields |
| allow you to type in information; others display menu items |
| to select. |
|
|
| Confirmation boxes Confirmation boxes are displayed whenever you exit a menu |
| utility or whenever you create or delete items (such as |
| directories or files). You can either confirm or cancel |
| the action by selecting "Yes" or "No" and pressing <Enter>. |
|
|
| WORK WITH COMMAND LINE UTILITIES |
|
|
| Command Format |
|
|
| The command format displays the appropriate syntax for command line utilities. |
| Command line utilities are typed in at the DOS prompt. |
|
|
| The following are examples of the command formats for the NPRINT and the TLIST |
| utilities: |
|
|
| NPRINT path [option...] <Enter> |
|
|
| TLIST [path [USERS | GROUPS]] <Enter> |
|
|
| Conventions |
|
|
| The conventions for these example command formats are explained below: |
|
|
| NPRINT Words that appear in all capital letters must be spelled exactly as |
| shown. Although they appear in capital letters, they can be typed |
| in either upper or lower case. |
|
|
| path Words that appear in lower case are variables. They should be |
| replaced with the information pertinent to your task. In this |
| case, "path" would be replaced with the path leading to and |
| including the file you want to indicate, and you would replace |
| "option" with any NPRINT options you want to specify. |
|
|
| [ ] Square brackets indicate that the enclosed item is optional: you |
| can enter a command with or without the enclosed item. In this |
| case, "option" is optional. |
|
|
| .... Ellipses indicate that more than one option can be used with the |
| command. In this case, more than one NPRINT option can be entered |
| in the command. |
|
|
| <Enter> The angle brackets indicate that you should press the key whose |
| name appears between them. |
|
|
| Always press <Enter> after typing the command format for |
| command |
| line utilities. |
|
|
| [[ ]] Nested square brackets indicate that all enclosed items are |
| optional. However, if you use the item(s) within the innermost |
| brackets, you must also use the item(s) within the outer brackets. |
|
|
| | A vertical bar or "pipe" means "either, or." You can use either |
| the item to the left of the vertical bar or the item to the right, |
| but not both. |
|
|
| Wildcard Characters |
|
|
| DOS and NetWare recognize wildcard characters (* and ?) as universal |
| replacements for any other character or set of characters. Wildcards can be |
| used to search for groups of volumes, directories, or files, or to search for a |
| particular file when you are unsure of its complete name. |
|
|
| An asterisk (*) in a filename indicates that any character can occupy that |
| position and all remaining positions in the filename. For example, to search |
| for all filenames with the extension .EXE in your default directory, type "NDIR |
| *.EXE" and press <Enter> to display the list. |
|
|
| In contrast, a question mark (?) in a filename indicates that any character can |
| occupy that position, and that position only. So, if you were to type "NDIR |
| *.?", you would see a list of all files in your default directory with a |
| single-character extension or no extension at all. |
|
|
| NetWare's use of wildcard characters differs from DOS's in one respect. For |
| example, to represent all files in a directory, DOS expects you to type "*.*", |
| whereas NetWare only needs one asterisk (*). |
|
|
| For more information about wildcard characters (global filename characters), |
| see your DOS manual. |
|
|
| GET HELP IN NETWARE |
|
|
| Use the NetWare HELP utility to view on-line information about NetWare |
| utilities, NetWare system messages, and NetWare concepts. NetWare HELP allows |
| you to search for and retrieve information from infobases (information |
| databases). To access HELP, type |
|
|
| HELP <Enter> |
|
|
| Press <Enter> again to bring up the main menu. For more information on how to |
| use NetWare HELP, press the Tab key until you get to "How to use this |
| reference." Then press <Enter>. |
|
|
| BOOT UP |
|
|
| To "boot up" your workstation means to turn on your computer, load DOS, and |
| then load the workstation shell. You accomplish all of this with a boot |
| diskette, or you can put the necessary boot files on your workstation's hard |
| disk. These boot files start up the workstation operating system, load the |
| NetWare shell, and gain access to the network. |
|
|
| Create Boot Diskettes |
|
|
| 1. Format a blank diskette as a boot diskette, using the DOS FORMAT command. |
| Insert a diskette into drive A and type |
|
|
| Format a: /s <Enter> |
|
|
| Follow the screen prompts. |
|
|
| 2. Copy IPX.COM and the shell file (NETx.COM) onto the boot diskette or to the |
| root directory of your workstation's hard disk. |
|
|
| If your workstation uses DOS 3.x, use NET3.COM. |
|
|
| If your workstation uses DOS 4.x, use NET4.COM. |
|
|
| 3. Copy these following additional boot files to the boot diskette or your |
| hard disk, if needed. Your network supervisor can provide you with these |
| files: |
|
|
| AUTOEXEC.BAT |
| CONFIG.SYS |
| SHELL.CFG |
|
|
| See also "Boot files" in NetWare v3.11 Concepts and Appendix A in NetWare |
| v3.11 Installation. |
|
|
| 4. Label the boot diskette. |
|
|
| Create an AUTOEXEC.BAT File |
|
|
| You can create an AUTOEXEC.BAT file that automatically loads the shell file |
| each time you boot the workstation. This AUTOEXEC.BAT file can also set your |
| workstation to the first network drive (F), connect you (user MARIA) to a file |
| server (WONDER), and set your DOS prompt to show your current directory (PROMPT |
| $P$G). |
|
|
| Follow these steps to create your AUTOEXEC.BAT file: |
|
|
| 1. Insert your boot diskette into drive A and change to drive A. If you plan |
| to boot from your hard disk, change to your hard disk drive (C or D). |
|
|
| 2. If you are using DOS 4.x, type |
|
|
| COPY CON AUTOEXEC.BAT <Enter> |
| IPX <Enter> |
| NET4 <Enter> |
| F: <Enter> |
| LOGIN WONDER/MARIA <Enter> |
| PROMPT $P$G <Enter> |
| <Ctrl>Z <Enter> |
|
|
| If you are using DOS 3.x, replace NET4 with NET3. |
|
|
| LOGIN/LOGOUT |
|
|
| When you log in to a network, you establish a connection between your |
| workstation and the file server. When you log out, you terminate that |
| connection. |
|
|
| To log in to the network, you must type in a unique password. If there were no |
| password, other unauthorized users could easily get to your files and use them |
| for their purposes. |
|
|
| Log In to Your Network |
|
|
| To log in to your default server, type |
|
|
| LOGIN servername/username <Enter> |
|
|
| Replace servername with the name of the file server you want to log in to. |
| Replace username with your login name and (if applicable) type your password |
| when you are prompted for it. |
|
|
| Log Out of Your Network |
|
|
| To log out of your default server, type |
|
|
| LOGOUT <Enter> |
|
|
| To log out of a file server you are attached to, type |
|
|
| LOGOUT servername <Enter> |
|
|
| Attach to Another File Server |
|
|
| Attach to another file server if you want to do the following: |
|
|
| o Send messages to users on that file server |
|
|
| o Map a drive to that file server |
|
|
| o Copy a directory to that file server |
|
|
| To access another file server while remaining logged in to your default file |
| server, type |
|
|
| ATTACH servername/username <Enter> |
|
|
| Replace servername with the name of the server you want to attach to. Replace |
| username with the username you have been assigned to use on that file server. |
|
|
| Create or Change a Password |
|
|
| 1. To create or change a password on your default server, type |
|
|
| SETPASS <Enter> |
|
|
| The following prompt appears on the screen: |
|
|
| Enter your old password: |
|
|
| 2. If you are changing a password, enter the old password. If you are |
| creating a new password, press <Enter>. The following prompt appears on |
| your screen: |
|
|
| Enter your new password: |
|
|
| 3. Enter the password you want. The following prompt appears: |
|
|
| Retype your new password: |
|
|
| 4. Enter the new password again. The following message appears on your |
| screen: |
|
|
| Your password has been changed. |
|
|
| View Who You Are on Your Network |
|
|
| Type |
|
|
| WHOAMI <Enter> |
|
|
| Information similar to the following is displayed: |
|
|
| You are user FRANK attached to server MKTG, connection 1 |
| Server MKTG is running NetWare v3.11. |
| Login time: Wednesday October 2, 1991 8:05 am |
|
|
| You are user GUEST attached to server ACCT, connection 7 |
| Server ACCT is running NetWare v3.11. |
| Login time: Wednesday, October 2, 1991 8:05 am |
|
|
|
|
| This screen display indicates that you are attached to both file servers MKTG |
| and ACCT. Your username on MKTG is FRANK, and your username on ACCT is GUEST. |
|
|
| View File Servers on Your Network |
|
|
| Type |
|
|
| SLIST <Enter> |
|
|
| Information similar to the following appears: |
|
|
| Known NetWare File Servers Network Node Address |
| -------------------------- ------- ------------ |
| RECORDS [CED88] [2608C234732] |
| SALES [CED87] [2608C217651] |
| MFG [CED86] [2608C293185] |
|
|
| View Current Users on Your File Server |
|
|
| You must be attached to a file server before you can view the list of users for |
| that file server. |
|
|
| Type |
|
|
| USERLIST <Enter> |
|
|
| Information similar to the following appears: |
|
|
| User Information for Server BLOOM |
| Connection User Name Login Time |
| ---------- --------- ------------------ |
| 1 JOE 4-17-1991 8:05 am |
| 2 *CORRINE 4-17-1991 11:20 am |
| 3 PAULO 4-17-1991 7:58 am |
| 4 GUS 4-17-1991 6:01 pm |
|
|
| An asterisk (*) appears next to your username. |
|
|
| What If ... |
|
|
| .... I can't log in? |
|
|
| o Your password may have expired or you may have run out of grace logins. |
|
|
| Your supervisor or manager has to unlock your account. |
|
|
| o You haven't changed to the network login drive (F). |
|
|
| o The LOGIN.EXE file is missing. |
|
|
| o Your shell may be outdated. Type |
|
|
| NVER <Enter> |
|
|
| Report the version number to your supervisor. |
|
|
| o Your network board may not be seated correctly. |
|
|
| o Your file server may be down. Type |
|
|
| SLIST <Enter> |
|
|
| If your file server is listed, log in by typing |
|
|
| LOGIN servername/username <Enter> |
|
|
| o You may be restricted from logging in during certain times. Ask the |
| network supervisor. |
|
|
| .... My screen is frozen? |
|
|
| o Your supervisor should run the MONITOR utility and clear your connection. |
| This saves the work you were doing. Then complete one of the two following |
| tasks: |
|
|
| o To warm boot, press <CTRL><ALT><DEL> simultaneously. |
|
|
| o To cold boot, turn the computer OFF, wait 15 seconds, and then turn it |
| ON again. |
|
|
| o Your network cable may not be connected or terminated properly. Notify |
| your supervisor. |
|
|
| o Your node (or station) address may be in conflict with another workstation. |
| See if new workstations have been added to your network. |
|
|
| o You may have the wrong IPX configuration. Ask your supervisor. |
|
|
| o You may have received a message while in graphics mode. Disable messages |
| before entering graphics mode by typing |
|
|
| CASTOFF <Enter> |
|
|
| CREATE YOUR LOGIN SCRIPT |
|
|
| Your login script is a program that automatically sets up your workstation's |
| environment each time you log in. It performs tasks such as mapping network |
| drives for you, automatically executing programs and starting applications, and |
| attaching you to different file servers. |
|
|
| This section introduces some basic login script commands. |
|
|
| To access your login script, follow these steps: |
|
|
| 1. Type |
|
|
| SYSCON <Enter> |
|
|
| 2. Select "User Information" from the main menu. |
|
|
| 3. Select your user name from the list of users that appears. |
|
|
| 4. Select "Login Script." |
|
|
| 5. Enter the commands you need in your login script. Some common commands are |
| listed under "Common Login Script Commands" below. |
|
|
| 6. Exit and save the login script by pressing <Escape> and answering "Yes" in |
| the confirmation box. |
|
|
| 7. To execute your new login script, you must first log out of the network, |
| and then log in again. |
|
|
| Common Login Script Commands |
|
|
| The commands below can be used in your login script. Each command is followed |
| by its purpose and an example of how to use it. |
|
|
| MAP INS16:= Inserts the drive as the next available search drive. |
|
|
| MAP INS16:=pd3\sys:jan |
|
|
| MAP drive:= Maps the specified drive to the given directory. |
|
|
| MAP G:=pd3\sys:home\jan |
|
|
| MAP *n:= Maps the next available drive to the given directory. |
|
|
| MAP *1:=pd3\sys:home\jan |
|
|
| # Runs an executable file (a file with an .EXE or .COM |
| extension). |
|
|
| #SYSCON |
|
|
| REMARK These three commands allow you to insert explanatory text in |
| * the login script. They will not appear on your screen. |
| ; |
| REMARK Be sure to update the PROJECTS file. |
|
|
| * Check for new mail. |
|
|
| ; Assign OS-dependent Search mappings. |
|
|
| ATTACH Allows you to attach to other file servers while remaining |
| logged in to your current file server. |
|
|
| ATTACH pd3\jan |
|
|
| SET Allows you to set DOS variables. |
|
|
| SET wp="/u-jlw/" |
|
|
| SET usr="jwilson" |
|
|
| IF...THEN Executes certain commands, if a specified condition exists. |
|
|
| IF DAY_OF_WEEK="Monday" THEN WRITE "AARGH..." |
|
|
| What If ... |
|
|
| .... My login script doesn't execute all the way? |
|
|
| o You may have inserted an EXIT command to a batch file in the middle of your |
| login script. Anything after the EXIT command is ignored. Move the EXIT |
| command to the end of your login script. |
|
|
| o An IF...THEN clause in your login script may be incomplete or incorrect. |
| Check the proper command format in Appendix A of NetWare v3.11 |
| Installation. |
|
|
| .... I am unable to map a drive to another file server? |
|
|
| The file server you want to map a drive to may be down. To check whether the |
| file server is up, type |
|
|
| SLIST <Enter> |
|
|
| .... I add some mapped drives to my login script and some I wanted are gone? |
|
|
| The system login script executes before the user login script. You can |
| overwrite the mapped drives in the system login script with those in your user |
| login script. Instead of using the command "map drive:=", use the command "map |
| ins 16:=" or "map *1:=". (Remember: You can have only 26 drive mappings.) |
|
|
| VIEW OR CREATE YOUR MAPPED DRIVES |
|
|
| Mapped drives point to particular locations in the directory structure. In |
| NetWare, there are three type of drives: local drives, network drives, and |
| search drives. Local drives are physically attached to a workstation. Network |
| drives allow users to access particular locations in the directory structure. |
| Search drives allow users to execute program files (such as applications or |
| utilities) that are in a directory other than the user's current directory. |
| For more information, see "Drive mappings" in NetWare v3.11 Concepts. |
|
|
| This section tells you how to do the following: |
|
|
| o View all mappings |
| o Map network drives |
| o Map search drives |
|
|
| View All Mapped Drives |
|
|
| Type |
|
|
| MAP <Enter> |
|
|
| You see information similar to the following: |
|
|
| DRIVE A: maps to a local drive |
| DRIVE B: maps to a local drive |
|
|
| DRIVE F:= COUNT/SYS: /HOME/KAREN |
| DRIVE G:= COUNT/SYS: / |
| DRIVE H:= COUNT/ACCT: /ACCDATA |
|
|
| ------- |
|
|
| SEARCH1:=Z: [COUNT/SYS: /PUBLIC] |
| SEARCH2:=Y: [COUNT/SYS: /PUBLIC/WP] |
| SEARCH3:=X: [COUNT/ACCT: /ACCREC] |
|
|
| Map Network Drives |
|
|
| Suppose you want to map a network drive to a directory in which you have files. |
| To see what network drive letters are available, type |
|
|
| MAP <Enter> |
|
|
| Choose a drive letter that is not being used, such as J. Type |
|
|
| MAP J:= path <Enter> |
|
|
| Replace path with the directory path (including the file server name and the |
| volume name) leading to the directory to which you want to map network drive J. |
|
|
| For example, suppose your username is MARIA and you want to map drive J to your |
| home directory, which is on file server COUNT in volume SYS. Type |
|
|
| MAP J:= COUNT/SYS:HOME/MARIA <Enter> |
|
|
| MAP SEARCH DRIVES |
|
|
| Suppose your search drives appear as follows: |
|
|
| SEARCH1:=Z: [COUNT/SYS: /PUBLIC] |
| SEARCH2:=Y: [COUNT/SYS: /PUBLIC/WP] |
|
|
| The next available search drive is SEARCH3 (S3). To map a |
| search drive to directory ACCREC on volume ACCT, type |
|
|
| MAP S3:=COUNT/ACCT:ACCREC <Enter> |
|
|
| When you type MAP again, the new search drive appears: |
|
|
| SEARCH1:=Z: [COUNT/SYS: /PUBLIC] |
| SEARCH2:=Y: [COUNT/SYS: /PUBLIC/WP] |
| SEARCH3:=X: [COUNT/ACCT: /ACCREC] |
|
|
| What if ... |
|
|
| .... I just mapped a drive and then rebooted, and now the mapped drive is gone? |
|
|
| Did you map the drive in your login script? Drives mapped at the command line |
| are temporary----they are deleted when you log out of your file server or turn |
| off your workstation. If you want the mapping to be permanent, you must enter |
| it in your login script. |
|
|
| .... The system won't accept my mapped drives? |
|
|
| o You may not have rights to the directory you want to map to. Change to |
| that directory and type |
|
|
| RIGHTS <Enter> |
|
|
| If your rights aren't sufficient, see your supervisor. |
|
|
| o You may have used the wrong command format. |
|
|
|
|
| .... I just viewed my mapped drives and some of them seem to be incorrect? |
|
|
| Did you use the DOS CD command to change your default directory? Changing |
| directories changes your mapping. |
|
|
| .... My search drives are in reverse order? |
|
|
| Search drives are numbered, but their associated drive letters begin in reverse |
| alphabetical order. For example, the first search drive (Search 1 or S1) |
| appears as network drive Z, the second one appears as network drive Y, and so |
| on. However, in your login script, they should appear in normal alphabetical |
| order. |
|
|
| SEND MESSAGES TO OTHER USERS |
|
|
| You can communicate with other users on your network by |
| sending messages from your workstation command line. |
|
|
| This section explains how to do the following: |
|
|
| o Send a message to one or more users |
| o Send a message to all workstations |
| o Block/allow messages from other workstations |
|
|
| Send a Message to One or More Users |
|
|
| Suppose you want to send the following message to users CINDY and ERIC: |
| "Meeting at 1:30 today." Also suppose that CINDY and ERIC are logged in to |
| your default server. Type |
|
|
| SEND "MEETING AT 1:30 TODAY" CINDY, ERIC <Enter> |
|
|
| A confirmation message appears, telling you that the message was sent. |
|
|
| If CINDY is logged in to another file server called SALES, attach to that file |
| server and type |
|
|
| SEND "MEETING AT 1:30 TODAY" SALES/CINDY <Enter> |
|
|
| Send a Message to All Workstations |
|
|
| Suppose you want to send the following message to all workstations: "Paychecks |
| are here." Type |
|
|
| SEND "PAYCHECKS ARE HERE." EVERYONE <Enter> |
|
|
| A confirmation message appears listing all the users to whom the message was |
| sent. |
|
|
| If you want to send a message to everyone on another file server, you must be |
| attached to that file server and specify the name of the file server in the |
| command. |
|
|
|
|
| Block/Allow Messages from Other Workstations |
|
|
| If you do not want to receive messages sent to you from any network stations, |
| type |
|
|
| CASTOFF <Enter> |
|
|
| The following message appears on your screen: |
|
|
| Broadcasts from other stations will now be rejected. |
|
|
| To allow your workstation to again receive messages from other network users, |
| type |
|
|
| CASTON <Enter> |
|
|
| The following message appears on your screen: |
|
|
| Broadcast messages from the console and other stations will now be |
| accepted. |
|
|
| What If ... |
|
|
| .... I am unable to send a message to a user? |
|
|
| o Is the user logged in? Type |
|
|
| USERLIST <Enter> |
|
|
| o Is your message buffer full? You can only receive up to two messages. You |
| must clear these messages from your screen (by pressing <Ctrl><Enter>) |
| before you can receive others. |
|
|
| o Did you type the SEND command properly? |
|
|
| .... I am unable to send messages to users on another file server? |
|
|
| o Did you attach to that file server? |
| o Is the user logged in? Type |
|
|
| USERLIST <Enter> |
|
|
| o Did you type the SEND command properly? |
|
|
|
|
| MANAGE FILES AND DIRECTORIES |
|
|
| You can manage your files and directories in a variety of ways. You can copy, |
| delete, rename, view, write to, share, and print them. NetWare uses a system |
| of file and directory rights and attributes to make sure that only authorized |
| network users can access and handle network data. |
|
|
| Attributes are assigned to files and directories. They override rights, which |
| are assigned to users. For example, suppose you have the right to rename files |
| (the Modify right). However, the file you want to copy is flagged with the |
| Rename Inhibit attribute. This prevents you from renaming it, even though you |
| have the right to do so. |
|
|
| For more information, see "Attributes" and "Rights" in NetWare v3.11 Concepts. |
|
|
| Know Your Rights |
|
|
| To view your rights in your default directory, type |
|
|
| RIGHTS <Enter> |
|
|
| If your effective rights include all rights, the following information appears: |
|
|
| SERVER1\SYS:PUBLIC\UTIL |
| Your effective rights for this directory are [SRWCEMFA] |
| You have Supervisor Rights to Directory. (S) |
| *May Read from File. (R) |
| *May Write to File. (W) |
| May Create Subdirectories and Files. (C) |
| May Erase Directory. (E) |
| May Modify Directory. (M) |
| May Scan for Files. (F) |
| May Change Access Control. (A) |
|
|
| *Has no effect in directory. |
|
|
| Entries in Directory May Inherit [SRWCEMFA] rights. You have ALL RIGHTS to |
| Directory Entry. |
|
|
| Copy a File to Another Network Directory |
|
|
| Suppose you want to copy a file called ACC.DAT from your default directory (for |
| example, F) to the SALEPROG directory in volume SYS on the file server SALES. |
| First, make sure you have a drive (for example, G) mapped to SALEPROG as |
| follows: |
|
|
| G:=SALES/SYS:SALEPROG |
|
|
| To copy ACC.DAT from your default directory to the SALEPROG directory, type |
|
|
| NCOPY F:ACC.DAT TO G: <Enter> |
|
|
| Suppose you want to copy a file called ACC.DAT from the SALEPROG directory in |
| volume SYS on the file server SALES to your default directory. Also suppose |
| drive G is mapped to SALEPROG as G:=SALES/SYS:SALEPROG. Type |
|
|
| NCOPY G:ACC.DAT F: <Enter> |
|
|
| Copy All of a Directory's Files to Another Directory |
|
|
| 1. Type |
|
|
| FILER <Enter> |
|
|
| and select "Directory Contents" from the "Available Topics" menu. |
|
|
| 2. Select the directory you want to copy from the "Directory Contents" window. |
| The "Subdirectory Options" window appears. |
|
|
| 3. Select "Copy Subdirectory's Files." The "Copy Subdirectory To:" window |
| appears. |
|
|
| 4. To copy subdirectory files, complete one of the following: |
|
|
| o Copy to a subdirectory in your current directory. Type the name of the |
| directory; then press <Enter>. |
|
|
| You can also use <Insert> to bring up the "File Servers/Local Drives" |
| window, from which you can select your directory path by selecting file |
| server, volume, and directory options. |
|
|
| After you select your directory path, press <Escape> to bring your |
| cursor back to the "Copy subdirectory To:" window. Then press <Enter> |
| to copy your subdirectory's files. |
|
|
| o Copy to a directory on another volume on your file server. Type in the |
| name of the volume and directory; then press <Enter>. |
|
|
| You can also use <Insert> to bring up the "File Servers/Local Drives" |
| window, from which you can select your directory path by selecting file |
| server, volume, and directory options. |
|
|
| o Copy to a directory to another file server. You must be attached to |
| the file server you want to copy files to. Type in the name of the |
| file server, volume, and directory; then press <Enter>. |
|
|
| Delete a File |
|
|
| 1. Type |
|
|
| FILER <Enter> |
|
|
| 2. Select "Directory Contents" from the "Available Topics" menu. |
|
|
| 3. Highlight the file you want to delete from the "Directory Contents" window |
| and^S press <Delete>. Answer "Yes" in the confirmation box. |
|
|
| To delete more than one file, use the Mark key (<F5>) to highlight multiple |
| files; then press <Delete>. Answer "Yes" in the confirmation box. |
|
|
| Salvage a File You Just Deleted |
|
|
| 1. Type |
|
|
| SALVAGE <Enter> |
|
|
| 2. Select "View/Recover Deleted Files" from the "Main Menu Options"window. |
| To change to another volume, you must select the directory path from the |
| "Select Current Directory" option in the main menu. |
|
|
| Note: If you have too many salvageable files to fit on the screen, you will |
| see the heading "Inc^Qomplete." Scroll through the list to see the |
| entire list, or use the Mark Pattern key <F6> to mark the file pattern. |
| Then exit the list and reenter it. |
|
|
| 3. To salvage files using wildcards or to salvage a specific file, type the |
| information in the "Erased File Name Pattern To Match" window. |
|
|
| To view all salvageable files, press <Enter>. |
|
|
| 4. To salvage a file, complete one of the following: |
|
|
| o Salvage a single file. Select the file you want to salvage. Select |
| "Yes" from the "Recover This File" box. |
|
|
| o Salvage multiple files. Use the Mark key (<F5>) to select multiple |
| files. Select "Yes" from the confirmation box. |
|
|
| o Salvage multiple files using wildcards. To match a filename pattern or |
| extension, press the Mark Pattern key (<F6>) and type the pattern you |
| want to match. |
|
|
| Once you match the pattern of the files you want to salvage, press |
| <Enter> and select "Yes" from the "Recover ALL marked files?" |
| confirmation box. |
|
|
| 5. Press <Escape> to exit SALVAGE. |
|
|
| Find a Lost File |
|
|
| Suppose you don't remember the location of a file. The file is called |
| FUTURE.DAT. You think it may be in the PROGRAMS directory, and drive G is |
| mapped to that directory. |
|
|
| To find the location of the lost file, type |
|
|
| NDIR G: FUTURE.DAT <Enter> |
|
|
| If you don't know which directory the file is in, change directories back to |
| the volume level. Then type |
|
|
| NDIR filename sub <Enter> |
|
|
| The NDIR utility searches all those directories you have rights to on the |
| volume for the file. |
|
|
| Rename a Directory |
|
|
| Suppose you want to change the name of the ACCT directory to PROGRAMS. Also |
| suppose drive G is mapped to ACCT in volume SYS on file server RECORDS as |
| follows: |
|
|
| Drive G: = RECORDS/SYS:ACCT |
|
|
| To rename the directory, type |
|
|
| RENDIR G: PROGRAMS <Enter> |
|
|
| Note: You must be attached to a file server before you can change the name of |
| a directory on that file server. |
|
|
| You must also have the Modify right in the directory to rename |
| subdirectories in that directory. |
|
|
| Drive mappings in login scripts (if they exist) must be changed to |
| reflect the new name of the directory. |
|
|
| What If ... |
|
|
| .... I can't copy? |
|
|
| o You may not have sufficient rights. Type |
|
|
| RIGHTS <Enter> |
|
|
| You must have the Create right to copy files into a directory. |
|
|
| o The file may be flagged "non-shareable" and may be in use. Type |
|
|
| FLAG filename <Enter> |
|
|
| If it is flagged "non-shareable," try again at a later time, when the file |
| is not in use. |
|
|
|
|
| .... I can't see a directory? |
|
|
| o You may not have enough rights to that directory. Type |
|
|
| RIGHTS <Enter> |
|
|
| o The directory attribute may be set to "Hidden" or "System." Type |
|
|
| FLAG filename <Enter> |
|
|
| o The directory may have set disk space limitations. To view the directory |
| restrictions, type |
|
|
| DSPACE <Enter> |
|
|
| o The directory may have been deleted. Ask your supervisor. |
|
|
| PRINTING |
|
|
| Printing from a network workstation is similar to printing from a stand alone |
| workstation. When you send a print job to a network printer, however, the job |
| is routed first through the file server and then delivered to the printer by |
| the print server. |
|
|
| When a print job leaves the workstation, it is stored temporarily in a print |
| queue on the file server. This queue, which is a subdirectory on the file |
| server, stores the print job until the print server can deliver it to the |
| printer. When the printer is ready to service the job, the print server moves |
| it from the queue to the printer. |
|
|
| Permanently Set Up Workstation Printing |
|
|
| If you want to print from a non-NetWare-compatible application or from the |
| screen, you need to route print files from your local printer port (LPT1) to a |
| file server queue. |
|
|
| 1. Enter the SYSCON utility. |
|
|
| 2. Select "User Information" from SYSCON's main menu. |
|
|
| 3. Select your username. |
|
|
| 4. Select "Login Script." |
|
|
| 5. Insert the following command into the login script: |
|
|
| #CAPTURE Q=queuename TI=5 |
|
|
| 6. Exit SYSCON, saving changes when prompted. |
|
|
| 7. Log back in to or reboot your workstation to allow the CAPTURE command to |
| take effect. |
|
|
| Print Screens Using CAPTURE |
|
|
| Before you start printing screens using CAPTURE, you need to set the CAPTURE |
| parameters in your login script. See "Permanently Set Up Workstation Printing" |
| on the previous page. Also, your supervisor needs to set up a default queue. |
|
|
| 1. At the command line, type |
|
|
| CAPTURE <Enter> |
|
|
| You can include any of the CAPTURE options except Show. Some of the most |
| common CAPTURE options are the following: |
|
|
| L=n |
| Indicates which of your workstation's LPT ports (local parallel |
| printing ports) to capture. Replace "n" with 1, 2, or 3. Default: |
|
|
| ^S^Q L=LPT1 |
|
|
| Q=queuename |
| Indicates the queue the print job should be sent to. If multiple |
| queues are mapped to a printer, you must include this option. Replace |
| "queuename" with the name of the queue. |
|
|
| TI=n |
| Indicates the number of seconds between the last time the application |
| writes to the file and the time it releases the file to the queue. |
| Include this option if you want to print from an application without |
| exiting the application. Replace "n" with a number of seconds |
| (1-1000). Default: TI=O (Timeout disabled) |
|
|
| 2. Access the application containing the screen you want to print. |
|
|
| 3. Press <Shift><Print Screen>. |
|
|
| 4. If you want to print more screens, repeat steps 2 and 3. |
|
|
| 5. When you have selected the screens you want printed, return to the DOS |
| prompt and type |
|
|
| ENDCAP <Enter> |
|
|
| ENDCAP sends your print job to the default print queue of your default file |
| server, and then the job is printed. ENDCAP also ends the capture of your |
| LPT port. |
|
|
| Note: Your workstation might hang if you press the <Shift><Print Screen> keys |
| when none of your LPT ports are captured and no local printers are |
| attached to your workstation. To prevent this, ask your supervisor to |
| include the following line in the SHELL.DFG file on your workstation |
| boot disk. |
|
|
| LOCAL PRINTERS = 0 |
|
|
| List the Jobs in a Queue |
|
|
| A queue is a special directory where print files are stored while waiting for |
| printer services. To see which jobs are waiting in a queue to be printed, |
| complete the following steps: |
|
|
| 1. Type |
|
|
| PCONSOLE <Enter> |
|
|
| 2. Select your file server (if other than your current file server). |
|
|
| 3. Select "Print Queue Information" from the "Available Options" menu. |
|
|
| 4. Select the print queue whose print job you want to view. If you don't know |
| the name of the print queue, ask your supervisor. |
|
|
| 5. Select "Current Print Job Entries" from the "Print Queue Information" list. |
| The print job entries are displayed. |
|
|
| Delete Your Print Job from a Queue |
|
|
| You can cancel your print job by deleting it from the print queue (even after |
| the job has started printing). You can delete a print job only if you are the |
| owner of the job or if you are the print queue operator. |
|
|
| To delete your print job, complete the following steps: |
|
|
| 1. Type |
|
|
| PCONSOLE <Enter> |
|
|
| 2. Select "Print Queue Information" from the "Available Options" menu. |
|
|
| 3. Select the print queue whose entries you want to view. The "Print Queue |
| Information" list is displayed. |
|
|
| 4. Select "Current Print Job Entries." |
|
|
| 5. Highlight the print job entry and press <Delete>. |
|
|
| 6. Select "Yes" at the confirmation box. |
|
|
| What If... |
|
|
| .... I send commands to print a screen, but it doesn't print? |
|
|
| Did you include the CAPTURE command in your login script? See a previous |
| section called "Permanently Set Up Workstation Printing." |
|
|
| .... The application I'm using says that the print job was sent, but it doesn't |
| print out? |
|
|
| o Did you use CAPTURE to redirect output to a print queue first? |
|
|
| o Are the LPT ports captured? Type |
|
|
| CAPTURE SH <Enter> |
|
|
| o Check PCONSOLE and find the appropriate queue. If the queue has a long |
| list of jobs and none are marked "active," see your print server operator. |
| If your job isn't in the queue, the application is not set up properly; |
| check with the applications expert. |
|
|
| COMMON ERROR MESSAGES |
|
|
| Error messages point to a software or hardware error that doesn't allow further |
| processing. An explanation of the nature of the message and a recommended |
| course of action follow each message listed below. |
|
|
| "Access denied" |
|
|
| Explanation 1 |
|
|
| This message indicates one of the following: |
|
|
| o You entered your username, your password, or both incorrectly. |
| o You tried to log in to a file server on which you are not defined as a |
| user. |
|
|
| Action 1 |
|
|
| Try to log in again and make sure you type the username and password correctly. |
| Make sure you are logging in to a file server on which you are defined as a |
| user or as a member of a group. You can log in to most file servers as GUEST |
| because user GUEST seldom requires a password. |
|
|
| Explanation 2 |
|
|
| You tried to copy, delete, rename, or modify the file attributes of a file for |
| which you lack rights. |
|
|
| Action 2 |
|
|
| Find out about your rights to this file by typing |
|
|
| RIGHTS filename <Enter> |
|
|
| or by asking your supervisor. |
|
|
|
|
|
|
| "A File Server could not be found" |
|
|
| Explanation |
|
|
| The shell tried to build a connection with the network, but no file server |
| responded to the request in the given time limit. |
|
|
| Action |
|
|
| Check the cable connection and make sure at least one active file server exists |
| on the network. Also ask your supervisor to make sure the IPX file and the |
| network board have the same configuration. |
|
|
|
|
| "Message NOT sent to <servername>/<username> (station number)" |
|
|
| Explanation |
|
|
| If a number of messages have been sent to the user or group and have not been |
| cleared, either of the following may be true: |
|
|
| o The workstation's buffer for incoming messages may be full. |
|
|
| o The message was not sent to the user or group because the user or group |
| used the CASTOFF utility. |
|
|
| Action |
|
|
| Send the message later, or try another method of communication. |
|
|
|
|
| "Network Error <cause> during <operation>. File = <drive>:<filename> Abort, |
| Retry or Fail?" (or "Abort, Retry?") |
|
|
| Explanation 1 |
|
|
| The shell called a function call or a DOS interrupt, but the specified |
| operation could not be performed. The <drive>:<filename> specify the drive and |
| filename on which the error condition occurred. |
|
|
| Action 1 |
|
|
| Press the R key to retry the operation and, if necessary, repeat this several |
| times. If the problem persists, ask your supervisor or look up the specific |
| message in NetWare v3.11 System Messages. |
|
|
| Explanation 2 |
|
|
| Your file server may be down. |
|
|
| Action 2 |
|
|
| Press the A key to abort the operation, and then try to connect to the file |
| server again. If this attempt fails, contact your supervisor. |
|
|
| "Password has expired" |
|
|
| Explanation |
|
|
| This message indicates your password has expired. |
|
|
| The network supervisor can require users to periodically change their passwords |
| on the file server to protect the file server from access by unauthorized |
| persons. The network supervisor can also assign a number of grace logins |
| during which users can still use their old passwords (after they have expired) |
| before having to create new passwords. |
|
|
| Action |
|
|
| Use the SETPASS command to change your password. If you use the old password |
| during your remaining grace logins, be sure to change it before you run out of |
| grace logins, or else your network supervisor has to change it for you. |
|
|
| "Password has expired and grace period has also expired." |
|
|
| Explanation |
|
|
| This message indicates that your user account is locked because your password |
| has expired and you have used all your grace logins. |
|
|
| After your password expires, you may have a number of grace logins during which |
| you can still use your old password. If you do not change your password before |
| your grace logins are used, you are denied access. |
|
|
| Action |
|
|
| Since you have run out of grace logins, you cannot access your account until |
| your network supervisor or manager assigns you a new password. |
|
|
| "Server <servername> not found" |
|
|
| Explanation |
|
|
| This message indicates that you tried to attach to the file server |
| <servername>, but the file server did not respond for one of the following |
| reasons: |
|
|
| o You mistyped the name of the file server. |
| o You specified a file server not cabled to your network. |
| o You specified a file server that is down for system maintenance. |
|
|
| Action |
|
|
| o Type the file server name correctly. |
|
|
| o Use the SLIST command to list all the available file servers. |
|
|
| o If the file server is down for maintenance, try the command later when the |
| file server has been brought back up. |
|
|
| If you still have problems, ask your network supervisor for help. |
|
|
| "Unable to attach to server <servername>" |
|
|
| Explanation |
|
|
| This message indicates one of the following: |
|
|
| o You mistyped the name of the file server. |
| o You specified a file server not cabled to your network. |
| o You specified a file server that is down for system maintenance. |
|
|
| Action |
|
|
| o Type the file server name correctly. |
|
|
| o Use the SLIST command to list all available file servers. |
|
|
| o If the file server is down for maintenance, try the command later when the |
| file server has been brought back up. |
|
|
| If you still have problems, ask your network supervisor for help. |
|
|
| "User <fileserver>/<username> not found" |
|
|
| Explanation |
|
|
| This message indicates that you either specified a user who does not exist on |
| <fileserver> or mistyped the user's name. |
|
|
| Action |
|
|
| o Make sure you have typed the user's name correctly. |
|
|
| o If you are not certain which users are established on the file server, use |
| the SYSCON utility to view the list of network users. |
|
|
| o You can also use the USERLIST command to view a list of currently attached |
| users. |
|
|
| (----------------------------------------------------------------------------) |
|
|
| One of the most useful tools that any Novell Network user can have is access to |
| Netwire on Compuserve. Netwire is a forum that contains messages, files, and |
| access to Novell product information firsthand. You can submit questions to |
| Novell technicians and hundreds of other Novell users. A must for any Netware |
| user. |
|
|
| Another handy tool for those that do have access is the SALVAGE program. |
| SALVAGE will let you undelete files throughout the system unless the directory |
| is marked to be purged. PURGE is nice too because it will allow you to |
| completely erase any files you created or copied. To use purge and or salvage |
| make sure you are mapped to the public directory and execute them from any DOS |
| prompt. |
|
|
| (----------------------------------------------------------------------------) |
|
|
| As far as dialing up a Novell Network the means are unlimited. Some have very |
| tight security systems that only let users with certain hardware dial-in and |
| others limit the usernames that are allowed dial-in access. |
| ______________________________________________________________________________ |
|
|