Mercer County Community College Division of Business and Technology NET 250 COURSE DESCRIPTION: This course introduces students to basic NetWare network administration, including connecting to the network, login and file security, login scripts and printing. Text (s): Reference Division Booklist Prerequisites: NET101 & NET106 (295) or A+ Certification, & NET104 (283) or Network + Certification Credits: 3 Lecture Hours: 2 Studio/Lab Hours: 2 Food and Drink are strictly prohibited in classrooms as per Health and Safety Laws. Students may not bring in chemicals of any kind without the appropriate MSD sheets. Course Coordinator: Jeff Weichert Latest Review: Fall 2003
I. EVALUATION Final grades are determined by a weighted average of midterm and final examinations, quizzes, laboratory assignments, homework assignments, class participation, and attendance. Your final grade in the course will be based on the following: Class attendance and participation 10% Homework assignments 15% Laboratory assignments 15% Quizzes 20% Midterm examination 20% Final examination 20% 100% II. GENERAL OBJECTIVES 1. Students will be able to describe a NetWare network. 2. Students will be able to set up and manage NetWare Resources. 3. Students will be able to set up and manage network printing. 4. Students will be able to administer NetWare file systems and security. 5. Students will be able to install NetWare. 6. Students will learn about other NetWare topics, including login scripts, application management, and workstation management. 2
NET 250 - Course Outline Section 1: Introduction to NetWare and NDS A Network and its Components What NetWare Is The Responsibilities of a Network Administrator The Resources and Services You Administer Novell Directory Services, the Directory, and NDS Objects Composition of the Directory Types of Objects The NDS Tree Structure The Role of NDS The Benefits of NDS Using NetWare Administrator to Browse the NDS Tree Understanding the EMA Organization Viewing and Browsing the NDS Tree How the NDS Tree Affects Resource Access Object Name Attributes Understanding Context Object-Naming Rules Section 2: Using a Workstation Understanding Workstation Communication with the Network The Workstation Hardware and its Function The Workstation Software and its Function The Novell Client Software The Workstation Operating System Workstation Applications The Workstation Model: Dataflow Between Workstation Hardware and Software Installing the Novell Client Software Configuration Options for Novell Client and Windows The Login Procedure Login Concepts The Login Process Browsing Network Resources Viewing NDS Objects Additional Novell Client Browsing Features Installing and Configuring a Browser Browser Clients and Operating Systems Java and the Browser Installing the Netscape Navigator Browser 3
NET 250 - Section 3: Setting Up and Managing Network Access for Users The Function of a User Object Creating and Modifying User Accounts Using NetWare Administrator Creating a User Account The Template Object The Admin Object Modifying User Accounts Creating User Objects Using ConsoleOne Creating User Objects using UIMPORT Control File: Import Control Parameters Executing UIMPORT Types of Network Security Provided by NetWare Establishing Login Security User Account Restrictions Intruder Detection Authentication Section 4: Printing with Novell Distributed Print Services Network Printing with NDPS NDPS Components and their Functions The Printer Agent The NDPS Manager Gateways NDPS Broker NDPS Printer Types Public Access Printers Controlled Access Printers Configuring the Network for NDPS Creating and Loading an NDPS Manager Assigning Printer Agents to the NDPS Manager Configuring Workstations to Print to NDPS Printers Configuring NDS to Download Printer Drivers Manually Configuring a Workstation Managing NDPS Printing Managing Printer Access Managing Print Jobs 4
NET 250 - Section 5: Managing the File System Introduction Understanding the File System Components Understanding Basic File System Management Skills Managing the File System with the FILER and NetWare Administrator Utilities File Management Using NetWare Administrator File Management Using FILER Viewing File System Information Using NetWare Administrator and Windows Viewing Volume Information with NetWare Administrator Viewing Directory Information with NetWare Administrator Viewing File Information with NetWare Administrator Viewing File System Information in Windows Accessing the File System Mapping Network Drives with Windows Selecting Utilities for Managing the Directory Structure Selecting Utilities for Managing Files Copying Files Salvaging Deleted Files Purging Deleted Files Managing Volume Space View Volume Space Usage Information Listing Files by Access Date, Owner, and Size Restricting Space Usage Changing File or Directory Ownership Setting File Compression Block Sub-allocation Managing Data Migration Section 6: Managing File System Security How File System Security Works Directory and File Rights Trustees NDS Objects as Trustees Inheritance Blocking Inherited Rights Effective Rights Planning File System Rights Planning Rights from the Top Down Planning Trustee Assignments Based on Group Rights Planning File and Directory Attribute Security 5
NET 250 - Section 7: Creating and Managing Login Scripts The Types of Login Scripts and How They Interrelate Container Login Script Profile Login Script User Login Script Default Login Script Designing Login Script Systems Suggested Contents for Each Type of Login Script Using the MAP command in Login Scripts Mapping Drives to Volumes Mapping Drives to Directories Mapping Network Search Drives Mapping a Drive to a Directory Map Object Creating, Executing, and Debugging Login Scripts Login Script Commands and Identifier Variables Container Login Script Example Profile Login Script Example User Login Script Example Using the Login Utility to Edit Login Scripts Script Page Variables Window Section 8: Managing NDS Security NDS Security Similarities and Differences of File System and NDS Security Controlling Access to NDS Objects Object Trustees Object Rights Property Rights All Property Rights Versus Selected Property Rights Determining Rights Granted to NDS Objects Blocking Inherited Rights Making New Trustee Assignments Blocking Rights with an Inherited Rights Filter (IRF) Determining Effective Rights Rights Guidelines for Implementing NDS Security Troubleshooting NDS Security Using NetWare Administrator Users Who Have Unauthorized Access Users Who Can t Access a Resource 6
NET 250 - Section 9: Distributing and Managing Network Applications with Z.E.N. works The Benefits of Using Application Launcher Network Administrator Benefits User Benefits The Components of Application Launcher Application Launcher Snap-In SnAppShot Application Launcher Window Application Explorer Distributing Applications Using Application Launcher and SnAppShot Creating Application Objects Creating an Application Object Template with SnAppShot Associating Application Objects Making Application Launcher Window and Application Explorer Available Managing Applications with Application Launcher Setting Up an Application s Identification Setting Up and Application s Environment Filtering Applications Setting Up Distribution Schedules Setting Up Load Balancing and Fault Tolerance Section 10: Managing Workstations in an NDS Environment with Z.E.N. works Introduction to Z.E.N. works Z.E.N. works Policy Packages and Policies Types of Z.E.N. works Policy Package Objects Types of Z.E.N. works Policies NDS Design Considerations for Z.E.N. works Registering and Importing Workstations Methods of Registering Workstations Verifying Workstation Registration Importing Workstations The Z.E.N. works Maintenance Schedule Using Policies to Configure the Desktop Environment Customizing Desktop Applications Customizing the Windows User Interface Establishing and Using Remote control Access to Workstations Verify NDS Rights Requirements Verify the Client Requirements Establishing Remote Control Security Parameters Connecting to the Target Workstation Controlling the Target Workstation Ending a Remote control Session Setting Up and Using the Help Requester Application Verify Rights Requirements Verify Software Requirements Distributing Help Requester with Application Launcher Configuring the Help Desk Policy Using the Help Requester to Report Workstation Problems 7
NET 250 - Section 11: Managing Resources in a Multi-context Environment How the Tree Structure Affects Network Administration NDS Planning Guidelines Providing Access to Resources Setting the User s Current Context at Login Accessing an Object Regardless of Current Context Creating Shortcuts to Accessing and Managing Resources Creating an Alias to an Object Creating an Application or Directory Map Object for File System Resources in Another context Creating Group Objects with Global Membership Guidelines for Setting Up Resources in a Multi-context Environment Actions and Rights Needed to Grant Access Creating Login Scripts That Identify Resources in Other Contexts Section 12: Installing NetWare Understanding NetWare The NetWare Kernel The Server Console NetWare Loadable Modules Performing a Basic NetWare Server Installation Preparing for the Installation Running the Installation Program Providing Information for the Text Screens Completing the Installation Installing Novell Licensing Service Installing NLS on a NetWare Server Installing Licenses on a NetWare Server Managing NetWare User Licenses License Service Provider Object License Container Objects License Certificate Objects Assigning Licenses to Users Installing Additional Licenses 8
Classroom Conduct Statement It is the student s responsibility to attend all classes. If a student misses a class meeting for any reason, he/she is responsible for all content that is covered, for announcements made, and for acquiring any materials that may have been distributed in class. It is expected that students be on time for all classes. Students who walk into class after it has begun are expected to choose seats close to where they entered the room so that they do not disrupt the class meeting. Students are expected to follow ordinary rules of courtesy during the class sessions. Engaging in private, side conversations during class time is distracting to other students and to the instructor. Leaving class early without having informed the instructor prior to class is not appropriate. Unless there is an emergency, leaving class and returning while the class is in session is not acceptable behavior. Disruptive behavior of any type, including sharpening pencils during class while someone is speaking, is not appropriate. The college welcomes all students into an environment that creates a sense of community of pride and respect; we are here to work cooperatively and to learn together. Academic Integrity Statement A student who knowingly represents work of others as his/her own, uses or obtains unauthorized assistance in the execution of any academic work, or gives fraudulent assistance to another student is guilty of cheating. The penalty for violating the honor code is severe. (See Student Handbook.) Any student violating the honor code is subject to receive a failing grade for the course and will be reported to the Office of Student Affairs. If a student is unclear about whether a particular situation may constitute an honor code violation, the student should meet with the instructor to discuss the situation. It is permissible to assist classmates in general discussions of computing techniques; general advice and interaction are encouraged. Each person, however, must develop his or her own solutions to the assigned homework and laboratory exercises. Students may not "work together" on graded assignments. Such collaboration constitutes cheating, unless it is a group assignment. A student may not use or copy (by any means) another's work (or portions of it) and represent it as his/her own. 9