home *** CD-ROM | disk | FTP | other *** search
Text File | 1980-01-01 | 72.6 KB | 2,135 lines |
- +============================================================================+
- # #
- # A Beginners Guide to Novell Netware 386 #
- # #
- # August 1991 #
- # #
- # Brought to you by, #
- # #
- # The Butler... #
- +============================================================================+
-
- As most of you know NOVELL is the most popular PC network software around,with
- that being the case I decided to put together a little file on just what you
- can do with a NOVELL network.
-
- * The information in this file is primarily for NOVELL NETWARE 386 networks!!!
- If you have NOVELL NETWARE 286 some of this information may not be correct.
-
- When the word "Network" is mentioned in this file I am referring to a PC-based
- network or LAN (Local Area Network).
-
- If you are not familiar with the concept of a "Network" I would suggest you
- first get acquainted with it by either picking up a good book or if you have
- access to one, go exploring.
-
- This file is for those who have some experience with networks and or the
- concept of a network.
-
- (----------------------------------------------------------------------------)
-
- Variations in Setups:
-
- Every network is setup differently is some way. Even within the same
- company two different networks may be setup different. The differences may be
- slight or major and can consist of everything from menus to naming conventions.
-
- Companies that install networks as a business are inconsistent with their
- setups also because every network technician does things differently and every
- customer wants things to be a certain way.
-
- Keep this idea in mind when exploring different networks because most likely
- the setup will be different from network to network.
-
- (-----------------------------------------------------------------------------)
-
- Terminology:
-
- Bindery-- A database that contains definitions of entities such as users
- groups, and workgroups. The bindery is comprised of three
- components: objects, properties, and property data sets.
-
- Console-- The monitor and keyboard at which you actually control fileserver
- activity.
-
- File Server-- The Computer that the Network software, applications, and some
- data reside on. (Usually a very powerful one, i.e. Compaq 486
- with 1 gigabyte of storage).
-
- Groups-- A means of dealing with users collectively rather than
- individually. i.e. Word Processing, Accounting.
-
- LAN-- Local Area Network
-
- Login Script-- Similar to autoexec.bat, contains commands that initialize
- environmental variables, map network drives, and control the
- user's program execution.
-
- Netware-- Novell's Network Operating System.
-
- Netwire-- Novell's on-line information service, accessible via Compuserve.
-
- Network-- A group of computers that can communicate with each other.
-
- NIC-- Network Interface Card
-
- Novell-- Software Manufacturer
-
- Objects-- any physical or logical entities, including users, user groups,
- workgroups, file servers, print servers, or any other entity that
- has been given a name.
-
- Print Server-- A computer dedicated to controlling all jobs for a specified
- printer.
-
- Properties-- the characteristics of each bindery object. Passwords, account
- restrictions, account balances, internetwork addresses, list of
- authorized clients, and group members are all properties.
-
- Property Data Sets-- the values assigned to an entity's bindery properties.
-
- Rights-- Rights control which directories and files a user or group can
- access and what the user or group is allowed to do with those
- directories and files.
-
- User-- Any person allowed to work on the network.
-
- WAN-- Wide Area Network
-
- Workstation-- Any usable computer connected to a network.
-
- (-----------------------------------------------------------------------------)
-
- Netware Environment:
-
- The Network directory structure is basically set up like the following
- diagram.
-
- Directory ┌──── etc...
- Volume ┌───────────────┼────
- (F: Drive) ├──── └────
- ┌────────────┼────
- │ ├────
- File Server │ └────
- ────────────┤ Files
- │
- │ ┌───────────────
- └────────────┤
- └───────────────
-
- The default setting is:
-
- ┌───── SYSTEM
- SYS───┼───── PUBLIC
- ├───── LOGIN
- └───── MAIL
-
- The SYS:SYSTEM directory is used for system administration and contains
- operating system files, NetWare utilities, and programs reserved for
- SUPERVISOR.
-
- The SYS:PUBLIC directory is used for general access and contains NetWare
- utilities and programs for regular network users.
-
- The SYS:LOGIN directory contains the programs necessary for logging in.
-
- The SYS:MAIL directory is used by NetWare-compatible mail programs. This
- directory also has and ID number subdirectory for each user that contains
- the user login script and print job configurations.
-
- (-----------------------------------------------------------------------------)
- Breaches in Security:
-
-
- : Set Allow Unencrypted Passwords=on/off
-
- Enter this command from the "CONSOLE".
-
- By changing this command you will disable the encryption scheme which will
- then allow you to sniff passwords from the cables between workstations and
- servers.
-
- By default Netware comes with usernames GUEST and SUPERVISOR that have no
- passwords.
-
- Also try names like TAPE, BACKUP, SERVER, REMOTE, CONNECT, NOVELL, etc...
- If you have access to an existing account use SYSCON to get a list of all
- the user names, most likely there will be one or two accounts that don't
- have passwords.
-
- Also on some of these accounts that do not have passwords, part of their
- logon process is the execution of a batch file that executes the individual
- software i.e. backup. A batch file is a batch file so if its not disabled
- do the old CTRL-C to break out of the batch file and roam around. Some
- accounts like the backup account must have supervisor rights so that everything can
- be backed up. So if you can break out of one of these you can roam the whole
- Network.
-
- There are also a few neat little programs out there in cyberspace
- that will make your task of getting access a little easier:
-
- 1. THIEFNOV.ZIP ===> THIEFNOV is a TSR that will capture usernames
- and passwords from a workstation on Novell
- Networks. The Thief works by hiding in a user's
- autoexec.bat file, and executing every time
- someone trys to login to the network. The Thief
- captures their username and password and saves
- them in a hidden file in the root directory of
- their C: drive.
-
- 2. TEMPSUP.ZIP ====> TEMPSUP is a utility that will create a user for
- you to play with. TEMPSUP comes with two
- programs, an executable and a NLM module. The
- executable can be run by any user with access to
- DOS but only gives you the rights of that user.
- But, the NLM module can be loaded at the Console
- and will give you Supervisor Rights to the whole
- Network. The syntax is "Tempsup_username to be
- created" i.e. f:> tempsup hacker <return>.
-
- 3. NETCRACK.ZIP ===> NETCRACK is a brute force hacking program
- designed for Novell. NETCRACK can be run with
- out loggin in to the network but by just loading
- ipx and netx. NETCRACK starts with AAA and goes
- from there trying to guess the password for any
- user. The syntax is "netcrack_username <return>.
-
-
- These are the only programs I know of made especially for Novell and I have
- personally tried them all out with excellent results.
-
- If you do get access to a Novell Network and you are not sure what to do, then
- go to the F:\PUBLIC directory and type HELP. Novell comes with an online help
- system that uses FOLIO Infobases. The HELP system is very easy to navigate
- through and is better that the actual Novell Manuals. You can even download
- the programs NFOLIO.COM & NFOLIO.EXE and the infobases *.NFO to your local PC
- to examine further.
-
- If you are using the brute force hacking method Novell will stop you dead in
- your tracks if the Intruder Detection/Lockout option has been enabled because
- after 3 unsuccessful login attempts the account is locked until a supervisor
- resets it.
-
- Intruder Detection/Lockout options are as follows:
-
- Detect Intruders: Yes/No
- Intruder Detection Threshold
- Incorrect Login Attempts: #
- Bad Login Count Retention Time: # Days # Hours # Minutes
-
- Lock Account After Detection: Yes/No
- Length of Account Lockout: # Days # Hours # Minutes
-
-
- The following restrictions are optional for every user account:
-
- Account Disabled: Yes/No
- Account Has Expiration Date: Yes/No
- Date Account Expires:
- Limit Concurrent Connections: Yes/No
- Maximum Connections:
- Allow User To Change Password Yes/No
- Require Password: Yes/No
- Minimum Password Length:
- Force Periodic Password Changes: Yes/No
- Days Between Forced Changes:
- Date Password Expires:
- Limit Grace Logins: Yes/No
- Grace Logins Allowed:
- Remaining Grace Logins:
- Require Unique Passwords: Yes/No
-
-
- Novell can also be setup so that users can only logon during certain hours,
- i.e. 8 a.m. - 5 p.m. Monday thru Friday.
-
- Trustee Assignments grant rights to specific users (or groups) that allow
- them to use a file or directory in particular ways (i.e., only for reading)
- The network supervisor can select the appropriate rights to assign to users
- or groups in each directory or file.
-
- A trustee assignment automatically grants users the right to see to the root
- of a directory. However, the users can't see any of the subdirectories
- unless they also have been granted rights in the subdirectories.
-
- Inherited Rights Masks are given to each file and directory when they are
- created. The default Inherited Rights Mask includes all rights. But this
- does not mean that users have all rights; users can only use rights that
- they have been granted in trustee assignments.
-
- If the Inherited Rights Mask is modified for a file or subdirectory below
- the original trustee assignment, the only rights the user can "inherit"
- for the file or subdirectory are rights that are allowed by the Inherited
- Rights Mask. For example, if a user is granted Read right with a directory
- trustee assignment, the right to read files in a subdirectory could be
- revoked by having the Read right removed from the subdirectory's
- Inherited Rights Mask.
-
- Both trustee assignments and Inherited Rights Masks use the same eight
- trustee rights to control access to directories and file.
-
- S -- Supervisory
-
- Supervisory right grants all rights to the directory or file. At the
- directory level, this right grants all rights to the directory and to
- any files, subdirectories, or subdirectory files in that directory.
- The Supervisory right overrides any restrictions placed on subdirs or
- files with Inherited Rights Masks. Users who have the Supervisory
- right in a directory can grant other users Supervisory rights to the
- directory, its files, and subdirectories.
-
- Once the Supervisory right has been granted, it can be revoked only
- from the directory is was granted to. It cannot be revoked in a
- file or subdirectory.
-
- R -- Read
-
- Read right allows users to open and read files. At the directory level
- this right allows users to open files in a directory and read the
- contents or run the program. At the file level, this right allows
- users to open and read the file (even when the right has been
- revoked at the directory level).
-
- W -- Write
-
- Write right allows users to write to files. At the directory level,
- this right allows users to open and write to (modify the contents of)
- file in the directory. At the file level, this right allows users
- to open and write to the file (even if the right has been revoked
- at the directory level).
-
- C -- Create
-
- Create right allows users to create directories and files. At the
- directory level, this right allows users to create files and
- subdirectories in the directory. At the file level, this right
- allows users to salvage a file after it has been deleted.
-
- E -- Erase
-
- Erase right allows users to delete directories and files. At the
- directory level, this right allows users to delete a directory as
- well as any files, subdirectories, and subdirectory files in that
- directory. At the file level, this right allows users to delete
- the file (even when the right has been revoked at the directory
- level).
-
- M -- Modify
-
- Modify right allows users to change directory and file attribute sand
- to rename subdirectories and files. At the directory level, this right
- allows users to change the attributes of and rename any file, subdir,
- or subdirectory file in that directory. At the file level, this right
- allows users to change the file's attributes or to rename the file
- (even when the right has been revoked at the directory level).
-
- F -- File Scan
-
- File Scan right allows users to see files. At the directory level,
- this right allows users to see files and subdirectories in a directory.
- At the file level, this right allows users to see the file (even when
- the right has been revoked at the directory level).
-
- A -- Access Control
-
- Access Control right allows users to modify trustee assignments and
- Inherited Rights Masks.
-
-
-
- (-----------------------------------------------------------------------------)
-
- As a network user, you should be familiar with the operation of
- the personal computer you are using. If you have an IBM PC-type
- workstation, you should also be familiar with basic Disk
- Operating System (DOS) commands.
-
- User Basics is divided into the following ten sections.
-
- The first section explains basic networking concepts and gives an
- overview of how a NetWare network operates.
-
- The second section introduces the NetWare menu and command
- line utilities and explains how to use them.
-
- The next seven sections explain some basic network tasks:
-
- ■ Booting up
-
- ■ Logging in and out
-
- ■ Creating your login script
-
- ■ Mapping your drives
-
- ■ Sending messages
-
- ■ Managing files and directories
-
- ■ Printing
-
- Some basic troubleshooting hints are covered under "What If ..."
- at the end of each of these modules and are also listed in the
- index.
-
- The last section lists some common error messages and how to
- respond to them.
-
- This booklet does not explain how to perform every network task
- or how to use every available network command. For complete
- explanations of all network tasks and commands, see NetWare
- v3.11 Utilities Reference.
-
-
- INTRODUCTION TO NETWARE
-
- If your personal computer is part of a NetWare network, it is
- connected to other computers and peripherals. You can share
- files and resources and communicate with others in your
- workgroup, thus increasing productivity.
-
- This introduction answers the following questions about using a
- NetWare network:
-
- ■ What is a NetWare network?
-
- ■ How does a network operate?
-
- ■ How are files stored on a network?
-
- ■ Who can use the network?
-
- ■ How is information protected on a network?
-
- WHAT IS A NETWARE NETWORK?
-
- A NetWare network is a group of computers (such as IBM PCs or
- Macintoshes) that are linked together so they can communicate
- and share resources.
-
- Network users, each working on a different personal computer,
- can communicate with each other via the network. They can also
- share network resources (hard disks on the file server, data,
- applications, and printers) and use any service the network
- provides (for example, access to a mainframe system).
- HOW DOES A NETWORK OPERATE?
-
- To understand how a network operates, you must know about the
- principal components of a network: the file server, the
- workstations, and the software that runs on each----NetWare and
- operating systems like DOS, OS/2, VMS, UNIX, and the
- Macintosh operating system.
-
- Beyond these basic components, a NetWare network can
- incorporate mainframe computers, backup devices, modem pools,
- and different types of servers (such as file servers, print
- servers, or archive servers).
-
- The Network Workstations and DOS
-
- Workstations are the personal computers on which network users
- do their work. Workstations are used much like non-networked
- personal computers. The only difference is that they can access
- files from more than just the local drives. Each workstation
- processes its own files and uses its own copy of DOS.
-
- The Network File Server and NetWare
-
- The file server is a personal computer that uses the NetWare
- operating system to control the network. The file server
- coordinates all of the workstations and regulates the way they
- share network resources. It regulates who can access which files,
- who can make changes to data, and who can use the printer first.
-
- All network files are stored on a hard disk in or attached to the
- file server, instead of on diskettes or hard disks in individual
- workstations.
-
- The NetWare Workstation
-
- Workstations use two pieces of software to communicate with the
- file server, the shell and a protocol. The shell must be loaded
- into each workstation before that workstation can function on the
- network.
-
- The NetWare shell, either NET3 or NET4 (depending on whether
- you are using DOS 3.x or 4.x), directs workstation requests to
- DOS or NetWare. When a workstation makes a request (asks to
- do a task), the shell decides if it is a workstation task (to be
- directed to DOS) or a network task (to be directed to NetWare).
- If the request is a workstation task (such as using the DOS DIR
- command to list the files in a local directory), DOS should handle
- the request. If the request is a network task (such as printing a
- job on a network printer), NetWare should handle the request.
- The shell sends the request to the appropriate operating system,
- somewhat like a railroad track switcher sends trains to the
- proper destination.
-
- The workstation shell uses another file, IPX.COM, to send
- network messages to the file server and, in some cases, directly to
- other network stations. This IPX protocol is the language the
- workstation uses to communicate with the file server.
-
- HOW ARE FILES STORED ON A NETWORK?
-
- All network information is stored on the file server's hard disk.
- The system for storing that information is called the "directory
- structure."
-
- The NetWare directory structure, or storage system, is organized
- into
-
- ■ File servers, which contain one or more
-
- ■ Volumes, which can span several hard disks and are divided
- into
-
- ■ Directories, which can contain other directories
- (subdirectories) and
-
- ■ Files.
-
- A directory structure can be compared to a filing cabinet system.
-
- ■ The file server corresponds to the filing cabinet.
-
- ■ The volumes correspond to the filing cabinet drawers. Each
- file server has at least one volume, the SYS volume, which is
- created when the server is installed. In NetWare v3.11,
- however, one volume can span several hard disks.
-
- ■ The directories correspond to the hanging folders within the
- filing cabinet drawers. You can create and delete directories
- to suit your organizational needs, much as you insert hanging
- folders into, and remove them from, a filing cabinet.
-
- ■ Directories can contain other directories, which are sometimes
- referred to as "subdirectories. These directories within a
- directory then correspond to the manila folders inside the
- hanging folders. They divide directories into smaller units,
- just as manila folders divide hanging folders into smaller
- units.
-
- ■ And finally, directories contain actual files, just as manila
- folders contain individual documents. A file might be a letter
- or a list of addresses. When you save information in a file,
- you give the file a unique name so you can retrieve it later.
-
- WHO CAN USE THE NETWORK?
-
- Before being able to work on the network, a person must be
- designated as a network user. Network users can be assigned
- four levels of responsibility on the network.
-
- ■ Regular network users
-
- ■ Operators (file server console operators, print queue
- operators, print server operators)
-
- ■ Managers (workgroup managers, user account managers)
-
- ■ Network supervisors
-
- Regular network users are the people who work on the network.
- They can run applications and work with files according to the
- rights assigned to them.
-
- Operators are regular network users who have been assigned
- additional privileges. For example, a file server console operator
- is a network user who is given specific rights to use the
- FCONSOLE utility.
-
- Managers are users who have been given responsibility for
- creating and/or managing other users. Workgroup managers can
- create and manage users; user account managers can manage,
- but not create, users. Managers function as supervisors over a
- particular group, but they do not have supervisor equivalence.
-
- Network supervisors are responsible for the smooth operation of
- the whole network. Network supervisors maintain the system,
- restructuring and updating it as needed. Supervisors may also
- teach regular network users how to use the network.
-
- HOW IS INFORMATION PROTECTED ON A NETWORK?
-
- All information on a NetWare network is stored in a central
- location----the file server's hard disk. However, all users should
- not be able to access all information (such as payroll files). In
- addition, users should not always be able to access the same data
- file at the same time; otherwise, they may overwrite each other's
- work.
-
- To prevent problems like these, NetWare provides an extensive
- security system to protect the data on the network.
-
- NetWare security consists of a combination of the following:
-
- ■ Login security
-
- Login security includes creating usernames and passwords
- and imposing station, time, and account restrictions on users.
-
- ■ Trustee rights (privileges) assigned to users
-
- Trustee rights control which directories and files a user can
- access and what the user is allowed to do with those
- directories and files, such as creating, reading, erasing, or
- writing to them.
-
- ■ Attributes assigned to directories and files
-
- Directory and file attributes determine whether that directory
- or file can be deleted, copied, viewed, or written to. Among
- other things, they also mark a file as shareable or non-
- shareable.
-
- These three levels of security work together to protect the network
- from unauthorized access.
-
- REVIEW
-
- This introduction explained the following:
-
- ■ A NetWare network links personal computers so users can
- communicate and share resources.
-
- ■ A NetWare network consists of two or more workstations and
- at least one file server.
-
- Workstations are personal computers on which network users
- do their work. Workstations run their own native operating
- system (for example, DOS) and process their own files. They
- can access files, applications, and resources through the file
- server.
-
- File servers are personal computers that use the NetWare
- operating system to coordinate all network activities.
-
- ■ Workstations and the file server communicate via the
- NetWare shell, which must be loaded into each workstation
- (just as DOS must be loaded into each workstation). NET3 or
- NET4 (the NetWare shells corresponding to DOS 3.x or 4.x)
- sends workstation requests to the proper operating system
- (file server or workstation) for processing.
-
- ■ The shell uses a protocol, such as IPX, to send messages to
- the appropriate network station.
-
- ■ Information is stored on the file server in a directory
- structure that is made up of volumes, directories, and files.
-
- ■ There are four types of network users: regular network
- users, network operators, network managers, and network
- supervisors. The type of user you are is determined by your
- responsibilities.
-
- ■ NetWare's extensive security system prevents users from
- corrupting data in network files and prevents unauthorized
- users from accessing restricted files.
-
-
- WHAT ARE MENU AND COMMAND LINE UTILITIES?
-
- You use NetWare utilities to perform network tasks. There are
- two types of utilities: menu utilities and command line utilities.
- Menu utilities let you perform network tasks by choosing options
- from menus. Command line utilities let you perform tasks by
- typing commands at the DOS command line. This section
- explains how to execute both types of NetWare utilities.
-
- WORK WITH MENU UTILITIES
-
- Access a Menu Utility
-
- To access a menu utility, such as FILER, type the utility's name
- at the DOS prompt and press <Enter>. The utility's main menu
- is displayed along with a screen header showing the following:
-
- ■ The utility's full name
-
- ■ The current date and time
-
- ■ The directory path leading up to your current directory (some
- utilities)
-
- ■ Your username on your file server (some utilities)
-
- ■ Your connection number (some utilities)
-
-
- Exit a Menu Utility
-
- There are two ways to exit a menu utility:
-
- ■ Press <Escape> until an exit confirmation box appears. Then
- highlight "Yes" and press <Enter>.
-
- ■ Press the Exit key (usually <Alt><F10>). Do not press the
- Exit key to exit a menu utility if you have made changes
- within the utility; if you do, the changes are not saved.
- Exiting via the Escape key saves your changes.
-
-
- Additional Information
-
- Once you have accessed a menu utility and the main menu is
- displayed, you are ready to work. Menu utilities use certain keys
- to perform special functions. The utilities also have certain
- standard components. The keys, wildcards, and components are
- described below.
-
- F1 (Help) Key. Displays help screens.
- If you press the help screen once, a help screen that applies to
- the task you are currently working on appears. The help screen
- describes all the options on the screen. To get help on a
- specific option, highlight the option and press <Enter>.
-
- If you press the Help key twice, your computer's function key
- assignments are listed. There are three screens containing
- function key assignments. Press the <PageDown> key to see
- subsequent screens.
-
- F5 (Mark) Key. Allows you to mark multiple items in a list so you
- can add or delete several items at once.
-
- Esc (Escape) Key. Has three functions:
-
- 1) If you are on a menu screen, pressing <Escape> allows you
- to return to a previous menu.
-
- 2) If you are at the main menu, pressing <Escape> causes an
- exit confirmation box to appear. By highlighting "Yes" and
- pressing <Enter>, you exit the menu utility and return to
- the menu or command line prompt.
-
- 3) If you are performing a process, pressing <Escape> allows
- you to continue.
-
- Wildcard characters (* and ?). DOS and NetWare recognize
- these characters as universal replacements for any other
- character or set of characters. Wildcards can be used to search
- for groups of volumes, directories, or files, or they can be used to
- search for a particular file when you are unsure of its complete
- name.
-
- An asterisk (*) in a filename indicates that any character can
- occupy that position and all remaining positions in the filename.
- For example, in the FILER utility, to copy all subdirectory's files
- with the extension .EXE to another directory, type "*.EXE" in the
- menu's entry box and press <Enter>.
-
- In contrast, a question mark (?) in a filename indicates that any
- character can occupy that position, and that position only. So, if
- you were to type "ACCOUNT?.NEW", you would copy files like
- ACCOUNT1.NEW, ACCOUNT2.NEW, and so on.
-
- NetWare's use of wildcard characters differs from DOS's in one
- respect. For example, to represent all files in a directory, DOS
- expects you to type "*.*", whereas NetWare only needs one
- asterisk (*).
-
- For more information about wildcard characters (global filename
- characters), see your DOS manual.
-
- Components. When you first access a menu utility, the main
- menu is displayed. Menus contain options you can choose from.
- Options can be selected one of two ways:
-
- ■ You can use the arrow keys to highlight the option you want.
- Then press <Enter>.
-
- ■ You can type the first letter of an option to highlight that
- option. If more than one option in the menu starts with the
- same letter(s), type enough additional letters to distinguish
- one option from the others. (For example, if both "Search"
- and "Select" were options, you would have to type "Sel" to
- highlight "Select.") Once the option you want is highlighted,
- press <Enter>.
-
- When you select an option from the main menu, additional menus
- and displays appear on the screen. These displays include lists,
- entry boxes, insets, forms, and confirmation boxes. Each type of
- screen display is explained below.
-
- Lists Lists are similar to menus, and items in the
- lists can be selected the same way menu
- options are. However, you can also add to and
- delete items from some lists. Lists may have
- more than one column, and they may extend
- below the screen display. Press the Down-
- arrow key to see additional items. Pressing
- <Ctrl><PageDown> takes you to the bottom of
- the list. Pressing <Ctrl><PageUp> takes you
- to the top of the list.
-
- Entry Entry boxes are boxes in which you can type
- boxes information, such as a username or pathname.
- The Delete, Backspace, and arrow keys work
- in these boxes.
-
- Insets Insets display information that cannot be
- edited (except by the network supervisor).
- Regular users cannot add to or delete from the
- information in this window.
-
- Forms Forms are windows that contain fields. You
- can move around in a form using the arrow
- keys or the Enter key. (When you press
- <Enter>, the cursor moves to the next field in
- the form.) You can change the information in
- the field by highlighting the field and pressing
- <Enter>.
-
- What you do next depends on the type of field.
- Some fields allow you to type in information;
- others display menu items to select.
-
- Confirmation Confirmation boxes are displayed whenever
- boxes you exit a menu utility or whenever you create
- or delete items (such as directories or files).
- You can either confirm or cancel the action by
- selecting "Yes" or "No" and pressing <Enter>.
-
- WORK WITH COMMAND LINE UTILITIES
-
- Command Format
-
- The command format displays the appropriate syntax for
- command line utilities. Command line utilities are typed in at
- the DOS prompt.
-
- The following are examples of the command formats for the
- NPRINT and the TLIST utilities:
-
- NPRINT path [option...] <Enter>
-
- TLIST [path [USERS | GROUPS]] <Enter>
-
-
- Conventions
-
- The conventions for these example command formats are
- explained below:
-
- NPRINT Words that appear in all capital letters must be
- spelled exactly as shown. Although they appear in
- capital letters, they can be typed in either upper or
- lower case.
-
- path Words that appear in lower case are variables. They
- should be replaced with the information pertinent to
- your task. In this case, "path" would be replaced with
- the path leading to and including the file you want to
- indicate, and you would replace "option" with any
- NPRINT options you want to specify.
-
- [ ] Square brackets indicate that the enclosed item is
- optional: you can enter a command with or without
- the enclosed item. In this case, "option" is optional.
-
- ... Ellipses indicate that more than one option can be
- used with the command. In this case, more than one
- NPRINT option can be entered in the command.
-
- <Enter> The angle brackets indicate that you should press the
- key whose name appears between them.
-
- Always press <Enter> after typing the command
- format for command line utilities.
-
- [[ ]] Nested square brackets indicate that all enclosed
- items are optional. However, if you use the item(s)
- within the innermost brackets, you must also use the
- item(s) within the outer brackets.
-
- | A vertical bar means "either, or." You can use either
- the item to the left of the vertical bar or the item to
- the right, but not both.
-
-
- Wildcard Characters
-
- DOS and NetWare recognize wildcard characters (* and ?) as
- universal replacements for any other character or set of
- characters. Wildcards can be used to search for groups of
- volumes, directories, or files, or to search for a particular file
- when you are unsure of its complete name.
-
- An asterisk (*) in a filename indicates that any character can
- occupy that position and all remaining positions in the filename.
- For example, to search for all filenames with the extension .EXE
- in your default directory, type "NDIR *.EXE" and press <Enter>
- to display the list.
-
- In contrast, a question mark (?) in a filename indicates that any
- character can occupy that position, and that position only. So, if
- you were to type "NDIR *.?", you would see a list of all files in
- your default directory with a single-character extension or no
- extension at all.
-
- NetWare's use of wildcard characters differs from DOS's in one
- respect. For example, to represent all files in a directory, DOS
- expects you to type "*.*", whereas NetWare only needs one
- asterisk (*).
-
- For more information about wildcard characters (global filename
- characters), see your DOS manual.
- GET HELP IN NETWARE
-
- Use the NetWare HELP utility to view on-line information about
- NetWare utilities, NetWare system messages, and NetWare
- concepts. NetWare HELP allows you to search for and retrieve
- information from infobases (information databases). To access
- HELP, type
-
- HELP <Enter>
-
- Press <Enter> again to bring up the main menu. For more
- information on how to use NetWare HELP, press the Tab key
- until you get to "How to use this reference." Then press <Enter>.
-
- BOOT UP
-
- To "boot up" your workstation means to turn on your computer,
- load DOS, and then load the workstation shell. You accomplish
- all of this with a boot diskette, or you can put the necessary boot
- files on your workstation's hard disk. These boot files start up
- the workstation operating system, load the NetWare shell, and
- gain access to the network.
-
-
- Create Boot Diskettes
-
- 1. Format a blank diskette as a boot diskette, using the DOS
- FORMAT command. Insert a diskette into drive A and type
-
- Format a: /s <Enter>
-
- Follow the screen prompts.
-
- 2. Copy IPX.COM and the shell file (NETx.COM) onto the boot
- diskette or to the root directory of your workstation's hard
- disk.
-
- If your workstation uses DOS 3.x, use NET3.COM.
-
- If your workstation uses DOS 4.x, use NET4.COM.
-
- 3. Copy these following additional boot files to the boot diskette
- or your hard disk, if needed. Your network supervisor can
- provide you with these files:
-
- AUTOEXEC.BAT
- CONFIG.SYS
- SHELL.CFG
-
- See also "Boot files" in NetWare v3.11 Concepts and Appendix
- A in NetWare v3.11 Installation.
-
- 4. Label the boot diskette.
-
-
- Create an AUTOEXEC.BAT File
-
- You can create an AUTOEXEC.BAT file that automatically loads
- the shell file each time you boot the workstation. This
- AUTOEXEC.BAT file can also set your workstation to the first
- network drive (F), connect you (user MARIA) to a file server
- (WONDER), and set your DOS prompt to show your current
- directory (PROMPT $P$G).
-
- Follow these steps to create your AUTOEXEC.BAT file:
-
- 1. Insert your boot diskette into drive A and change to drive A.
- If you plan to boot from your hard disk, change to your hard
- disk drive (C or D).
-
- 2. If you are using DOS 4.x, type
-
- COPY CON AUTOEXEC.BAT <Enter>
- IPX <Enter>
- NET4 <Enter>
- F: <Enter>
- LOGIN WONDER/MARIA <Enter>
- PROMPT $P$G <Enter>
- <Ctrl>Z <Enter>
-
- If you are using DOS 3.x, replace NET4 with NET3.
-
- LOGIN/LOGOUT
-
- When you log in to a network, you establish a connection between
- your workstation and the file server. When you log out, you
- terminate that connection.
-
- To log in to the network, you must type in a unique password. If
- there were no password, other unauthorized users could easily get
- to your files and use them for their purposes.
-
-
- Log In to Your Network
-
- To log in to your default server, type
-
- LOGIN servername/username <Enter>
-
- Replace servername with the name of the file server you want to
- log in to. Replace username with your login name and (if
- applicable) type your password when you are prompted for it.
-
- Log Out of Your Network
-
- To log out of your default server, type
-
- LOGOUT <Enter>
-
- To log out of a file server you are attached to, type
-
- LOGOUT servername <Enter>
-
-
- Attach to Another File Server
-
- Attach to another file server if you want to do the following:
-
- ■ Send messages to users on that file server
-
- ■ Map a drive to that file server
-
- ■ Copy a directory to that file server
-
- To access another file server while remaining logged in to your
- default file server, type
-
- ATTACH servername/username <Enter>
-
- Replace servername with the name of the server you want to
- attach to. Replace username with the username you have been
- assigned to use on that file server.
-
-
- Create or Change a Password
-
- 1. To create or change a password on your default server, type
-
- SETPASS <Enter>
-
- The following prompt appears on the screen:
-
- Enter your old password:
-
- 2. If you are changing a password, enter the old password. If
- you are creating a new password, press <Enter>. The
- following prompt appears on your screen:
-
- Enter your new password:
-
- 3. Enter the password you want. The following prompt appears:
-
- Retype your new password:
-
- 4. Enter the new password again. The following message
- appears on your screen:
-
- Your password has been changed.
-
-
- View Who You Are on Your Network
-
- Type
-
- WHOAMI <Enter>
-
- Information similar to the following is displayed:
-
- You are user FRANK attached to server MKTG, connection 1
- Server MKTG is running NetWare v3.11.
- Login time: Wednesday October 2, 1991 8:05 am
-
- You are user GUEST attached to server ACCT, connection 7
- Server ACCT is running NetWare v3.11.
- Login time: Wednesday, October 2, 1991 8:05 am
-
- This screen display indicates that you are attached to both file
- servers MKTG and ACCT. Your username on MKTG is FRANK,
- and your username on ACCT is GUEST.
-
-
- View File Servers on Your Network
-
- Type
-
- SLIST <Enter>
-
- Information similar to the following appears:
-
- Known NetWare File Servers Network Node Address
- -------------------------- ------- ------------
- RECORDS [CED88] [2608C234732]
- SALES [CED87] [2608C217651]
- MFG [CED86] [2608C293185]
-
-
- View Current Users on Your File Server
-
- You must be attached to a file server before you can view the list
- of users for that file server.
-
- Type
-
- USERLIST <Enter>
-
- Information similar to the following appears:
-
- User Information for Server BLOOM
- Connection User Name Login Time
- ---------- --------- ------------------
- 1 JOE 4-17-1991 8:05 am
- 2 *CORRINE 4-17-1991 11:20 am
- 3 PAULO 4-17-1991 7:58 am
- 4 GUS 4-17-1991 6:01 pm
-
- An asterisk (*) appears next to your username.
-
-
- What If ...
-
- ... I can't log in?
-
- ■ Your password may have expired or you may have run out of
- grace logins. Your supervisor or manager has to unlock your
- account.
-
- ■ You haven't changed to the network login drive (F).
-
- ■ The LOGIN.EXE file is missing.
-
- ■ Your shell may be outdated. Type
-
- NVER <Enter>
-
- Report the version number to your supervisor.
-
- ■ Your network board may not be seated correctly.
-
- ■ Your file server may be down. Type
-
- SLIST <Enter>
-
- If your file server is listed, log in by typing
-
- LOGIN servername/username <Enter>
-
- ■ You may be restricted from logging in during certain times.
- Ask the network supervisor.
-
-
- ... My screen is frozen?
-
- ■ Your supervisor should run the MONITOR utility and clear
- your connection. This saves the work you were doing. Then
- complete one of the two following tasks:
-
- ■ To warm boot, press <CTRL><ALT><DEL> simultaneously.
-
- ■ To cold boot, turn the computer OFF, wait 15 seconds,
- and then turn it ON again.
-
- ■ Your network cable may not be connected or terminated
- properly. Notify your supervisor.
-
- ■ Your node (or station) address may be in conflict with another
- workstation. See if new workstations have been added to
- your network.
-
- ■ You may have the wrong IPX configuration. Ask your
- supervisor.
-
- ■ You may have received a message while in graphics mode.
- Disable messages before entering graphics mode by typing
-
- CASTOFF <Enter>
-
- CREATE YOUR LOGIN SCRIPT
-
- Your login script is a program that automatically sets up your
- workstation's environment each time you log in. It performs
- tasks such as mapping network drives for you, automatically
- executing programs and starting applications, and attaching you
- to different file servers.
-
- This section introduces some basic login script commands.
-
- To access your login script, follow these steps:
-
- 1. Type
-
- SYSCON <Enter>
-
- 2. Select "User Information" from the main menu.
-
- 3. Select your user name from the list of users that appears.
-
- 4. Select "Login Script."
-
- 5. Enter the commands you need in your login script. Some
- common commands are listed under "Common Login Script
- Commands" below.
-
- 6. Exit and save the login script by pressing <Escape> and
- answering "Yes" in the confirmation box.
-
- 7. To execute your new login script, you must first log out of the
- network, and then log in again.
-
- Common Login Script Commands
-
- The commands below can be used in your login script. Each
- command is followed by its purpose and an example of how
- to use it.
-
- MAP INS16:= Inserts the drive as the next available search
- drive.
-
- MAP INS16:=pd3\sys:jan
-
- MAP drive:= Maps the specified drive to the given directory.
-
- MAP G:=pd3\sys:home\jan
-
- MAP *n:= Maps the next available drive to the given
- directory.
-
- MAP *1:=pd3\sys:home\jan
-
- # Runs an executable file (a file with an .EXE or
- .COM extension).
-
- #SYSCON
-
- REMARK These three commands allow you to insert
- * explanatory text in the login script. They will
- ; not appear on your screen.
-
- REMARK Be sure to update the PROJECTS file.
-
- * Check for new mail.
-
- ; Assign OS-dependent Search mappings.
-
- ATTACH Allows you to attach to other file servers while
- remaining logged in to your current file server.
-
- ATTACH pd3\jan
-
- SET Allows you to set DOS variables.
-
- SET wp="/u-jlw/"
-
- SET usr="jwilson"
-
- IF...THEN Executes certain commands, if a specified condition
- exists.
-
- IF DAY_OF_WEEK="Monday" THEN WRITE "AARGH..."
-
-
-
- What If ...
-
- ... My login script doesn't execute all the way?
-
- ■ You may have inserted an EXIT command to a batch file in
- the middle of your login script. Anything after the EXIT
- command is ignored. Move the EXIT command to the end of
- your login script.
-
- ■ An IF...THEN clause in your login script may be incomplete
- or incorrect. Check the proper command format in Appendix
- A of NetWare v3.11 Installation.
-
-
- ... I am unable to map a drive to another file server?
-
- The file server you want to map a drive to may be down. To
- check whether the file server is up, type
-
- SLIST <Enter>
-
-
- ... I add some mapped drives to my login script and some I
- wanted are gone?
-
- The system login script executes before the user login script. You
- can overwrite the mapped drives in the system login script with
- those in your user login script. Instead of using the command
- "map drive:=", use the command "map ins 16:=" or "map *1:=".
- (Remember: You can have only 26 drive mappings.)
-
-
- VIEW OR CREATE YOUR MAPPED DRIVES
-
- Mapped drives point to particular locations in the directory
- structure. In NetWare, there are three type of drives: local
- drives, network drives, and search drives. Local drives are
- physically attached to a workstation. Network drives allow users
- to access particular locations in the directory structure. Search
- drives allow users to execute program files (such as applications
- or utilities) that are in a directory other than the user's current
- directory. For more information, see "Drive mappings" in
- NetWare v3.11 Concepts.
-
- This section tells you how to do the following:
-
- ■ View all mappings
-
- ■ Map network drives
-
- ■ Map search drives
-
- View All Mapped Drives
-
- Type
-
- MAP <Enter>
-
- You see information similar to the following:
-
- DRIVE A: maps to a local drive
- DRIVE B: maps to a local drive
- DRIVE F:= COUNT/SYS: /HOME/KAREN
- DRIVE G:= COUNT/SYS: /
- DRIVE H:= COUNT/ACCT: /ACCDATA
-
- -------
-
- SEARCH1:=Z: [COUNT/SYS: /PUBLIC]
- SEARCH2:=Y: [COUNT/SYS: /PUBLIC/WP]
- SEARCH3:=X: [COUNT/ACCT: /ACCREC]
-
-
- Map Network Drives
-
- Suppose you want to map a network drive to a directory in which
- you have files. To see what network drive letters are available,
- type
-
- MAP <Enter>
-
- Choose a drive letter that is not being used, such as J. Type
-
- MAP J:= path <Enter>
-
- Replace path with the directory path (including the file server
- name and the volume name) leading to the directory to which you
- want to map network drive J.
-
- For example, suppose your username is MARIA and you want to
- map drive J to your home directory, which is on file server
- COUNT in volume SYS. Type
-
- MAP J:= COUNT/SYS:HOME/MARIA <Enter>
-
-
- MAP SEARCH DRIVES
-
- Suppose your search drives appear as follows:
-
- SEARCH1:=Z: [COUNT/SYS: /PUBLIC]
- SEARCH2:=Y: [COUNT/SYS: /PUBLIC/WP]
-
- The next available search drive is SEARCH3 (S3). To map a
- search drive to directory ACCREC on volume ACCT, type
-
- MAP S3:=COUNT/ACCT:ACCREC <Enter>
-
- When you type MAP again, the new search drive appears:
-
- SEARCH1:=Z: [COUNT/SYS: /PUBLIC]
- SEARCH2:=Y: [COUNT/SYS: /PUBLIC/WP]
- SEARCH3:=X: [COUNT/ACCT: /ACCREC]
-
-
- What if ...
-
- ... I just mapped a drive and then rebooted, and now the
- mapped drive is gone?
-
- Did you map the drive in your login script? Drives mapped at
- the command line are temporary----they are deleted when you log
- out of your file server or turn off your workstation. If you
- want the mapping to be permanent, you must enter it in your
- login script.
-
-
- ... The system won't accept my mapped drives?
-
- ■ You may not have rights to the directory you want to map to.
- Change to that directory and type
-
- RIGHTS <Enter>
-
- If your rights aren't sufficient, see your supervisor.
-
- ■ You may have used the wrong command format.
-
-
- ... I just viewed my mapped drives and some of them seem to
- be incorrect?
-
- Did you use the DOS CD command to change your default
- directory? Changing directories changes your mapping.
-
-
- ... My search drives are in reverse order?
-
- Search drives are numbered, but their associated drive letters
- begin in reverse alphabetical order. For example, the first search
- drive (Search 1 or S1) appears as network drive Z, the second one
- appears as network drive Y, and so on. However, in your login
- script, they should appear in normal alphabetical order.
-
-
- SEND MESSAGES TO OTHER USERS
-
- You can communicate with other users on your network by
- sending messages from your workstation command line.
-
- This section explains how to do the following:
-
- ■ Send a message to one or more users
-
- ■ Send a message to all workstations
-
- ■ Block/allow messages from other workstations
-
-
- Send a Message to One or More Users
-
- Suppose you want to send the following message to users CINDY
- and ERIC: "Meeting at 1:30 today." Also suppose that CINDY
- and ERIC are logged in to your default server. Type
-
- SEND "MEETING AT 1:30 TODAY" CINDY, ERIC <Enter>
-
- A confirmation message appears, telling you that the message
- was sent.
-
- If CINDY is logged in to another file server called SALES, attach
- to that file server and type
-
- SEND "MEETING AT 1:30 TODAY" SALES/CINDY <Enter>
-
-
- Send a Message to All Workstations
-
- Suppose you want to send the following message to all
- workstations: "Paychecks are here." Type
-
- SEND "PAYCHECKS ARE HERE." EVERYONE <Enter>
-
- A confirmation message appears listing all the users to whom the
- message was sent.
-
- If you want to send a message to everyone on another file server,
- you must be attached to that file server and specify the name of
- the file server in the command.
-
- Block/Allow Messages from Other Workstations
-
- If you do not want to receive messages sent to you from any
- network stations, type
-
- CASTOFF <Enter>
-
- The following message appears on your screen:
-
- Broadcasts from other stations will now be rejected.
-
- To allow your workstation to again receive messages from other
- network users, type
-
- CASTON <Enter>
-
- The following message appears on your screen:
-
- Broadcast messages from the console and other stations will
- now be accepted.
-
- What If ...
-
- ... I am unable to send a message to a user?
-
- ■ Is the user logged in? Type
-
- USERLIST <Enter>
-
- ■ Is your message buffer full? You can only receive up to two
- messages. You must clear these messages from your screen
- (by pressing <Ctrl><Enter>) before you can receive others.
-
- ■ Did you type the SEND command properly?
-
-
- ... I am unable to send messages to users on another file server?
-
- ■ Did you attach to that file server?
-
- ■ Is the user logged in? Type
-
- USERLIST <Enter>
-
- ■ Did you type the SEND command properly?
-
- MANAGE FILES AND DIRECTORIES
-
- You can manage your files and directories in a variety of ways.
- You can copy, delete, rename, view, write to, share, and print
- them. NetWare uses a system of file and directory rights and
- attributes to make sure that only authorized network users can
- access and handle network data.
-
- Attributes are assigned to files and directories. They override
- rights, which are assigned to users. For example, suppose you
- have the right to rename files (the Modify right). However, the
- file you want to copy is flagged with the Rename Inhibit
- attribute. This prevents you from renaming it, even though you
- have the right to do so.
-
- For more information, see "Attributes" and "Rights" in NetWare
- v3.11 Concepts.
-
-
- Know Your Rights
-
- To view your rights in your default directory, type
-
- RIGHTS <Enter>
-
- If your effective rights include all rights, the following
- information appears:
-
- SERVER1\SYS:PUBLIC\UTIL
- Your effective rights for this directory are [SRWCEMFA]
- You have Supervisor Rights to Directory. (S)
- *May Read from File. (R)
- *May Write to File. (W)
- May Create Subdirectories and Files. (C)
- May Erase Directory. (E)
- May Modify Directory. (M)
- May Scan for Files. (F)
- May Change Access Control. (A)
-
- *Has no effect in directory.
-
- Entries in Directory May Inherit [SRWCEMFA] rights.
- You have ALL RIGHTS to Directory Entry.
-
-
- Copy a File to Another Network Directory
-
- Suppose you want to copy a file called ACC.DAT from your
- default directory (for example, F) to the SALEPROG directory in
- volume SYS on the file server SALES. First, make sure you have
- a drive (for example, G) mapped to SALEPROG as follows:
-
- G:=SALES/SYS:SALEPROG
-
- To copy ACC.DAT from your default directory to the SALEPROG
- directory, type
-
- NCOPY F:ACC.DAT TO G: <Enter>
-
- Suppose you want to copy a file called ACC.DAT from the
- SALEPROG directory in volume SYS on the file server SALES to
- your default directory. Also suppose drive G is mapped to
- SALEPROG as G:=SALES/SYS:SALEPROG. Type
-
- NCOPY G:ACC.DAT F: <Enter>
-
-
- Copy All of a Directory's Files to Another Directory
-
- 1. Type
-
- FILER <Enter>
-
- and select "Directory Contents" from the "Available Topics"
- menu.
-
- 2. Select the directory you want to copy from the "Directory
- Contents" window. The "Subdirectory Options" window
- appears.
-
- 3. Select "Copy Subdirectory's Files." The "Copy Subdirectory
- To:" window appears.
-
- 4. To copy subdirectory files, complete one of the following:
-
- ■ Copy to a subdirectory in your current directory. Type
- the name of the directory; then press <Enter>.
-
- You can also use <Insert> to bring up the "File
- Servers/Local Drives" window, from which you can select
- your directory path by selecting file server, volume,
- and directory options.
-
- After you select your directory path, press <Escape> to
- bring your cursor back to the "Copy subdirectory To:"
- window. Then press <Enter> to copy your subdirectory's
- files.
-
- ■ Copy to a directory on another volume on your file server.
- Type in the name of the volume and directory; then press
- <Enter>.
-
- You can also use <Insert> to bring up the "File
- Servers/Local Drives" window, from which you can select
- your directory path by selecting file server, volume, and
- directory options.
-
- ■ Copy to a directory on another file server. You must be
- attached to the file server you want to copy files to.
- Type in the name of the file server, volume, and directory;
- then press <Enter>.
-
-
- Delete a File
-
- 1. Type
-
- FILER <Enter>
-
- 2. Select "Directory Contents" from the "Available Topics" menu.
-
- 3. Highlight the file you want to delete from the "Directory
- Contents" window and press <Delete>. Answer "Yes" in the
- confirmation box.
-
- To delete more than one file, use the Mark key (<F5>) to
- highlight multiple files; then press <Delete>. Answer "Yes"
- in the confirmation box.
-
-
- Salvage a File You Just Deleted
-
- 1. Type
-
- SALVAGE <Enter>
-
- 2. Select "View/Recover Deleted Files" from the "Main Menu
- Options" window. To change to another volume, you must
- select the directory path from the "Select Current Directory"
- option in the main menu.
-
- Note: If you have too many salvageable files to fit on the
- screen, you will see the heading "Incomplete." Scroll
- through the list to see the entire list, or use the Mark
- Pattern key <F6> to mark the file pattern. Then exit the
- list and reenter it.
-
- 3. To salvage files using wildcards or to salvage a specific file,
- type the information in the "Erased File Name Pattern To
- Match" window.
-
- To view all salvageable files, press <Enter>.
-
- 4. To salvage a file, complete one of the following:
-
- ■ Salvage a single file. Select the file you want to salvage.
- Select "Yes" from the "Recover This File" box.
-
- ■ Salvage multiple files. Use the Mark key (<F5>) to select
- multiple files. Select "Yes" from the confirmation box.
-
- ■ Salvage multiple files using wildcards. To match a filename
- pattern or extension, press the Mark Pattern key (<F6>)
- and type the pattern you want to match.
-
- Once you match the pattern of the files you want to
- salvage, press <Enter> and select "Yes" from the "Recover
- ALL marked files?" confirmation box.
-
- 5. Press <Escape> to exit SALVAGE.
-
-
- Find a Lost File
-
- Suppose you don't remember the location of a file. The file is
- called FUTURE.DAT. You think it may be in the PROGRAMS
- directory, and drive G is mapped to that directory.
-
- To find the location of the lost file, type
-
- NDIR G: FUTURE.DAT <Enter>
-
- If you don't know which directory the file is in, change directories
- back to the volume level. Then type
-
- NDIR filename sub <Enter>
-
- The NDIR utility searches all those directories you have rights to
- on the volume for the file.
-
-
- Rename a Directory
-
- Suppose you want to change the name of the ACCT directory to
- PROGRAMS. Also suppose drive G is mapped to ACCT in
- volume SYS on file server RECORDS as follows:
-
- Drive G: = RECORDS/SYS:ACCT
-
- To rename the directory, type
-
- RENDIR G: PROGRAMS <Enter>
-
- Note: You must be attached to a file server before you can
- change the name of a directory on that file server.
-
- You must also have the Modify right in the directory
- to rename subdirectories in that directory.
-
- Drive mappings in login scripts (if they exist) must
- be changed to reflect the new name of the directory.
- What If ...
-
- ... I can't copy?
-
- ■ You may not have sufficient rights. Type
-
- RIGHTS <Enter>
-
- You must have the Create right to copy files into a directory.
-
- ■ The file may be flagged "non-shareable" and may be in use.
- Type
-
- FLAG filename <Enter>
-
- If it is flagged "non-shareable," try again at a later time,
- when the file is not in use.
-
-
- ... I can't see a directory?
-
- ■ You may not have enough rights to that directory. Type
-
- RIGHTS <Enter>
-
- ■ The directory attribute may be set to "Hidden" or "System."
- Type
-
- FLAG filename <Enter>
-
- ■ The directory may have set disk space limitations. To view
- the directory restrictions, type
-
- DSPACE <Enter>
-
- ■ The directory may have been deleted. Ask your supervisor.
-
- PRINTING
-
- Printing from a network workstation is similar to printing from a
- standalone workstation. When you send a print job to a network
- printer, however, the job is routed first through the file server
- and then delivered to the printer by the print server.
-
- When a print job leaves the workstation, it is stored temporarily
- in a print queue on the file server. This queue, which is a
- subdirectory on the file server, stores the print job until the print
- server can deliver it to the printer. When the printer is ready to
- service the job, the print server moves it from the queue to the
- printer.
-
-
- Permanently Set Up Workstation Printing
-
- If you want to print from a non-NetWare-compatible application
- or from the screen, you need to route print files from your local
- printer port (LPT1) to a file server queue.
-
- 1. Enter the SYSCON utility.
-
- 2. Select "User Information" from SYSCON's main menu.
-
- 3. Select your username.
-
- 4. Select "Login Script."
-
- 5. Insert the following command into the login script:
-
- #CAPTURE Q=queuename TI=5
-
- 6. Exit SYSCON, saving changes when prompted.
-
- 7. Log back in to or reboot your workstation to allow the
- CAPTURE command to take effect.
-
-
- Print Screens Using CAPTURE
-
- Before you start printing screens using CAPTURE, you need to
- set the CAPTURE parameters in your login script. See
- "Permanently Set Up Workstation Printing" on the previous page.
- Also, your supervisor needs to set up a default queue.
-
- 1. At the command line, type
-
- CAPTURE <Enter>
-
- You can include any of the CAPTURE options except SHow.
- Some of the most common CAPTURE options are the
- following:
-
- L=n
- Indicates which of your workstation's LPT ports (local
- parallel printing ports) to capture. Replace "n" with 1,
- 2, or 3. Default: L=LPT1
-
- Q=queuename
- Indicates the queue the print job should be sent to. If
- multiple queues are mapped to a printer, you must
- include this option. Replace "queuename" with the name of
- the queue.
-
- TI=n
- Indicates the number of seconds between the last time the
- application writes to the file and the time it releases the
- file to the queue. Include this option if you want to print
- from an application without exiting the application.
- Replace "n" with a number of seconds (1-1000). Default:
- TI=O (TImeout disabled)
-
- 2. Access the application containing the screen you want to
- print.
-
- 3. Press <Shift><Print Screen>.
-
- 4. If you want to print more screens, repeat steps 2 and 3.
-
- 5. When you have selected the screens you want printed, return
- to the DOS prompt and type
-
- ENDCAP <Enter>
-
- ENDCAP sends your print job to the default print queue of
- your default file server, and then the job is printed.
- ENDCAP also ends the capture of your LPT port.
-
- Note: Your workstation might hang if you press the
- <Shift><Print Screen> keys when none of your LPT ports
- are captured and no local printers are attached to your
- workstation. To prevent this, ask your supervisor to
- include the following line in the SHELL.DFG file on your
- workstation boot disk.
-
- LOCAL PRINTERS = 0
-
- List the Jobs in a Queue
-
- A queue is a special directory where print files are stored while
- waiting for printer services. To see which jobs are waiting in a
- queue to be printed, complete the following steps:
-
- 1. Type
-
- PCONSOLE <Enter>
-
- 2. Select your file server (if other than your current file server).
-
- 3. Select "Print Queue Information" from the "Available
- Options" menu.
-
- 4. Select the print queue whose print job you want to view. If
- you don't know the name of the print queue, ask your
- supervisor.
-
- 5. Select "Current Print Job Entries" from the "Print Queue
- Information" list. The print job entries are displayed.
-
-
- Delete Your Print Job from a Queue
-
- You can cancel your print job by deleting it from the print queue
- (even after the job has started printing). You can delete a print
- job only if you are the owner of the job or if you are the print
- queue operator.
-
- To delete your print job, complete the following steps:
-
- 1. Type
-
- PCONSOLE <Enter>
-
- 2. Select "Print Queue Information" from the "Available
- Options" menu.
-
- 3. Select the print queue whose entries you want to view. The
- "Print Queue Information" list is displayed.
-
- 4. Select "Current Print Job Entries."
-
- 5. Highlight the print job entry and press <Delete>.
-
- 6. Select "Yes" at the confirmation box.
-
-
- What If...
-
- ... I send commands to print a screen, but it doesn't print?
-
- Did you include the CAPTURE command in your login script?
- See a previous section called "Permanently Set Up Workstation
- Printing."
-
-
- ... The application I'm using says that the print job was
- sent, but it doesn't print out?
-
- ■ Did you use CAPTURE to redirect output to a print queue
- first?
-
- ■ Are the LPT ports captured? Type
-
- CAPTURE SH <Enter>
-
- ■ Check PCONSOLE and find the appropriate queue. If the
- queue has a long list of jobs and none are marked "active,"
- see your print server operator. If your job isn't in the queue,
- the application is not set up properly; check with the
- applications expert.
-
-
- COMMON ERROR MESSAGES
-
- Error messages point to a software or hardware error that doesn't
- allow further processing. An explanation of the nature of the
- message and a recommended course of action follow each message
- listed below.
-
-
- "Access denied"
-
- Explanation 1
-
- This message indicates one of the following:
-
- ■ You entered your username, your password, or both
- incorrectly.
-
- ■ You tried to log in to a file server on which you are not
- defined as a user.
-
- Action 1
-
- Try to log in again and make sure you type the username and
- password correctly. Make sure you are logging in to a file server
- on which you are defined as a user or as a member of a group.
- You can log in to most file servers as GUEST because user
- GUEST seldom requires a password.
-
- Explanation 2
-
- You tried to copy, delete, rename, or modify the file attributes
- of a file for which you lack rights.
-
- Action 2
-
- Find out about your rights to this file by typing
-
- RIGHTS filename <Enter>
-
- or by asking your supervisor.
-
-
- "A File Server could not be found"
-
- Explanation
-
- The shell tried to build a connection with the network, but no file
- server responded to the request in the given time limit.
-
- Action
-
- Check the cable connection and make sure at least one active file
- server exists on the network. Also ask your supervisor to make
- sure the IPX file and the network board have the same
- configuration.
-
- "Message NOT sent to <servername>/<username> (station number)"
-
- Explanation
-
- If a number of messages have been sent to the user or group and
- have not been cleared, either of the following may be true:
-
- ■ The workstation's buffer for incoming messages may be full.
-
- ■ The message was not sent to the user or group because the
- user or group used the CASTOFF utility.
-
- Action
-
- Send the message later, or try another method of communication.
-
- "Network Error <cause> during <operation>. File = <drive>:<filename>
- Abort, Retry or Fail?" (or "Abort, Retry?")
-
- Explanation 1
-
- The shell called a function call or a DOS interrupt, but the
- specified operation could not be performed. The
- <drive>:<filename> specify the drive and filename on which the
- error condition occurred.
-
- Action 1
-
- Press the R key to retry the operation and, if necessary, repeat
- this several times. If the problem persists, ask your supervisor or
- look up the specific message in NetWare v3.11 System Messages.
-
- Explanation 2
-
- Your file server may be down.
-
- Action 2
-
- Press the A key to abort the operation, and then try to connect to
- the file server again. If this attempt fails, contact your
- supervisor.
-
-
- "Password has expired"
-
- Explanation
-
- This message indicates your password has expired.
-
- The network supervisor can require users to periodically change
- their passwords on the file server to protect the file server from
- access by unauthorized persons. The network supervisor can also
- assign a number of grace logins during which users can still use
- their old passwords (after they have expired) before having to
- create new passwords.
-
- Action
-
- Use the SETPASS command to change your password. If you use
- the old password during your remaining grace logins, be sure to
- change it before you run out of grace logins, or else your network
- supervisor has to change it for you.
-
-
- "Password has expired and grace period has also expired."
-
- Explanation
-
- This message indicates that your user account is locked because
- your password has expired and you have used all your grace
- logins.
-
- After your password expires, you may have a number of grace
- logins during which you can still use your old password. If you
- do not change your password before your grace logins are used,
- you are denied access.
-
- Action
-
- Since you have run out of grace logins, you cannot access your
- account until your network supervisor or manager assigns you a
- new password.
-
-
- "Server <servername> not found"
-
- Explanation
-
- This message indicates that you tried to attach to the file server
- <servername>, but the file server did not respond for one of the
- following reasons:
-
- ■ You mistyped the name of the file server.
-
- ■ You specified a file server not cabled to your network.
-
- ■ You specified a file server that is down for system
- maintenance.
-
- Action
-
- ■ Type the file server name correctly.
-
- ■ Use the SLIST command to list all the available file servers.
-
- ■ If the file server is down for maintenance, try the command
- later when the file server has been brought back up.
-
- If you still have problems, ask your network supervisor for help.
-
-
- "Unable to attach to server <servername>"
-
- Explanation
-
- This message indicates one of the following:
-
- ■ You mistyped the name of the file server.
-
- ■ You specified a file server not cabled to your network.
-
- ■ You specified a file server that is down for system
- maintenance.
-
- Action
-
- ■ Type the file server name correctly.
-
- ■ Use the SLIST command to list all available file servers.
-
- ■ If the file server is down for maintenance, try the command
- later when the file server has been brought back up.
-
- If you still have problems, ask your network supervisor for help.
-
-
- "User <fileserver>/<username> not found"
-
- Explanation
-
- This message indicates that you either specified a user who does
- not exist on <fileserver> or mistyped the user's name.
-
- Action
-
- ■ Make sure you have typed the user's name correctly.
-
- ■ If you are not certain which users are established on the file
- server, use the SYSCON utility to view the list of network
- users.
-
- ■ You can also use the USERLIST command to view a list of
- currently attached users.
-
- (----------------------------------------------------------------------------)
-
- One of the most useful tools that any Novell Network user can have is access to
- Netwire on Compuserve. Netwire is a forum that contains messages, files, and
- access to Novell product information firsthand. You can submit questions to
- Novell technicians and hundreds of other Novell users. A must for any Netware
- user.
-
- Another handy tool for those that do have access is the SALVAGE program.
- SALVAGE will let you undelete files throughout the system unless the
- directory is marked to be purged. PURGE is nice too because it will allow you
- to completely erase any files you created or copied. To use purge and or
- salvage make sure you are mapped to the public directory and execute them
- from any DOS prompt.
-
- (----------------------------------------------------------------------------)
-
- As far as dialing up a Novell Network the means are unlimited. Some have very
- tight security systems that only let users with certain hardware dial-in and
- others limit the usernames that are allowed dial-in access.
-