Specifications
Table Of Contents
- IBM PC Server and Novell NetWare Integration Guide
- Abstract
- Contents
- Figures
- Tables
- Special Notices
- Preface
- Chapter 1. IBM PC Server Technologies
- Processors
- Clock Rate
- External Interfaces
- Processor Types
- Multiprocessing
- Memory
- Caches
- Memory Interleaving
- Dual Path Buses
- SynchroStream Technology
- Memory Error Detection and Correction
- Standard (Parity) Memory
- Error Correcting Code (ECC)
- Error Correcting Code- Parity Memory (ECC- P)
- ECC on SIMMs (EOS) Memory
- Performance Impact
- Memory Options and Speed
- Bus Architectures
- ISA Bus
- EISA Bus
- Micro Channel Bus
- PCI Bus
- Disk Subsystem
- Hard Disk Interfaces
- SCSI Technology
- SCSI Adapters
- Hard Disk Drives
- RAID Technology
- RAID Classifications
- Recommendations
- LAN Subsystem
- Shared RAM Adapters
- Bus Master Adapters
- PeerMaster Technology
- Security Features
- Tamper- Evident Cover
- Secure I/ O Cables
- Passwords
- Secure Removable Media
- Selectable Drive Startup
- Unattended Start Mode
- Systems Management
- DMI
- SNMP
- NetFinity
- SystemView
- Fault Tolerance
- NetWare SFT III
- Uninterruptible Power Supply (UPS)
- APC PowerChute
- Chapter 2. IBM PC Server Family Overview
- Chapter 3. Hardware Configuration
- The Setup Program
- Main Menu
- Advanced Menu
- Security
- EISA Configuration Utility
- SCSI Select Utility Program
- System Programs
- Starting From the System Partition
- Starting From the Reference Diskette
- Main Menu Options
- Backup/ Restore System Programs Menu
- Set Configuration Menu
- Set Features Menu
- Test the Computer
- More Utilities Menu
- Advanced Diagnostic Program
- RAID Controller Utility
- Drive Information
- Formatting the Disks
- Defining a Hot- Spare Disk
- Creating a Disk Array
- Defining Logical Drives
- Setting the Write Policy
- Initializing the Array
- Backup/ Restoring the Configuration
- Chapter 4. Novell NetWare Installation
- ServerGuide Overview
- Starting ServerGuide
- Installing NetWare 4.1 with ServerGuide
- Installing NetWare 3.12 with Diskettes
- Hardware Requirements
- Software Requirements
- Information Requested at Time of Installation
- Installation Files
- Installation Procedure
- Installing NetWare 4.1 with the Original CD- ROM
- Hardware Requirements
- Software Requirements
- Installation Procedure
- NetFinity Services for NetWare
- System Requirements
- Installing NetFinity Services for NetWare
- The RAID Administration for NetWare Utility
- Installing the Utility
- Hard Disk Failure Simulation
- Simulating with a Hot Spare Drive
- Simulating without a Hot Spare Drive
- Chapter 5. Performance Tuning
- Appendix A. EISA Configuration File
- Appendix B. Hardware Compatibility, Device Driver, and Software Patch Information
- Appendix C. Configuring DOS CD-ROM Support
- List of Abbreviations
- Index
- Special Characters C
- Numerics
- A
- B
- D
- E
- F
- H
- M
- I
- N
- K
- L
- O
- P
- S
- Q
- R
- T
- U
- V
- W
- Z
- ITSO Technical Bulletin Evaluation RED000

•
Attaching more than four Ethernet 10Base-2 segments to the server
•
Providing switching between 10Base-T and 10Base-2 segments
•
Conserving server slots
An add-on to NetFinity provides an advanced Ethernet subsystem management
tool. Parameters such as packets/second or total throughput can be monitored
for each port, for traffic within an adapter, or for traffic between adapters.
By using NetFinity, you can graphically view the data, monitor for predefined
thresholds, and optionally generate SNMP alerts.
1.8 Security Features
This section discusses some technologies used in IBM PC Servers to comply
with the United States Department of Defense (DoD) security requirements.
Security features in the IBM PC Server line vary by model and all models do not
have all the security features described here. Check the User′s Handbook that
is shipped with the system, to see what features your system contains.
DoD requirements have been very influential in defining security standards used
on computer system (both hardware and software) implementations around the
world. The source for these requirements is the
Department of Defense, Trusted
Computer System Evaluation Criteria, DoD 5200.28 STD
, dated 12/85. The
essence of the requirements is contained in the Assurance section, Requirement
6: a “trusted mechanism must be continuously protected against tampering
and/or unauthorized changes...”. The National Computer Security Center
(NCSC) evaluates computer system security products with respect to the criteria
defined by the U.S. Department of Defense.
There are seven computer system security product classifications in the DoD
requirements: A1, B3, B2, B1, C2, C1, and D. The requirements for these
classifications fall into four basic groups: security policy, accountability,
assurance, and documentation. Several criteria, which vary by security
classification, are specified in each of these groups. Currently, A1 is the highest
classification, followed by B3, B2, and so on. The C2 classification satisfies most
of the security requirements for personal computing environments.
LogicLock:
On the IBM MCA PC Servers, IBM implements a collection of
security features referred to as the LogicLock security system. LogicLock is
designed to be hardware compliant with the C2 security classification. It goes
far beyond basic PC security systems in its design to protect data against
unauthorized access.
LogicLock security features include:
•
Tamper-evident switches
•
Optional secure I/O cables
•
Privileged-access password
•
Optional secure removable media
•
Selectable drive startup
•
Unattended start mode
34 NetWare Integration Guide