Groupwise Webaccess 97 Planning Groupwise Webaccess

Total Page:16

File Type:pdf, Size:1020Kb

Groupwise Webaccess 97 Planning Groupwise Webaccess Installation May 11, 2001 Novell Confidential Manual Rev 99a30 4 December 00 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc. makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes. This product may require export authorization from the U.S. Department of Commerce prior to exporting from the U.S. or Canada. Copyright © 1993-2001 Novell, Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express written consent of the publisher. U.S. Patent Nos. 4,555,775; 4,580,218; 5,412,772; 5,701,459; 5,717,912; 5,760,772; 5,870,739; 5,873,079; 5,884,304; 5,903,755; 5,913,209; 5,924,096; 5,946,467; 5,963,938; 6,081,804; 6,138,170; 6,167,393; D393,457 and Patents Pending. Novell, Inc. 1800 South Novell Place Provo, UT 84606 U.S.A. www.novell.com Installation April 2001 104-001381-001 Online Documentation: To access the online documentation for this and other Novell products, and to get updates, see www.novell.com/documentation. Installation 104-001381-001 May 11, 2001 Novell Confidential Manual Rev 99a30 4 December 00 Novell Trademarks ConsoleOne is a trademark of Novell, Inc. GroupWise is a registered trademark of Novell, Inc., in the United States and other countries. IPX is a trademark of Novell, Inc. ManageWise is a registered trademark of Novell, Inc., in the United States and other countries. NDS is a registered trademark of Novell, Inc., in the United States and other countries. NetWare is a registered trademark of Novell, Inc., in the United States and other countries. NetWare Cluster Services is a trademark of Novell, Inc. NLM is a trademark of Novell, Inc. Novell is a registered trademark of Novell, Inc., in the United States and other countries. Novell Certificate Server is a trademark of Novell, Inc. Novell Client is a trademark of Novell, Inc. Novell Directory Services is a trademark of Novell, Inc. Novell Support Connection is a registered trademark of Novell, Inc., in the United States and other countries. Novell Technical Services is a service mark of Novell, Inc. Third-Party Trademarks All third-party trademarks are the property of their respective owners. Installation 104-001381-001 May 11, 2001 Novell Confidential Manual Rev 99a30 4 December 00 Installation 104-001381-001 May 11, 2001 Novell Confidential Manual Rev 99a30 4 December 00 Contents About this Guide 11 Trademark Conventions . 11 Additional Documentation . 11 Part I Installation 1 Installing a Basic GroupWise System 15 Planning Your Basic GroupWise System . 16 Determining Installation Locations . 16 Planning Your Domain . 21 Planning Your Post Office . 27 Planning Your GroupWise Agents . 31 Sample GroupWise Configurations. 36 Summary of Requirements for a Basic GroupWise System . 38 Setting Up Your Basic GroupWise System . 41 Starting the GroupWise Installation Advisor . 42 Installing the GroupWise Software . 44 Providing System Information . 46 Creating the System . 48 Installing and Starting the GroupWise Agents . 50 Setting Up and Running the Client on Your Workstation . 62 Assigning GroupWise Accounts to Additional Users . 63 Setting Up Users' Workstations to Run the Client . 65 Other Things You Can Do . 65 Basic GroupWise System Worksheet . 67 2 Installing GroupWise Internet Agent 75 Overview . 75 GroupWise Internet Agent Features . 76 Ways to Use the GroupWise Internet Agent . 80 Preparing to Install the Internet Agent . 80 GroupWise System Prerequisites . 81 Information for the Internet Service Provider . 81 Performance Considerations . 82 Setting Up the Internet Agent for Windows NT/2000. 83 Meeting System Requirements . 84 Installing the NT/2000 Internet Agent Software . 84 Setting Up Internet Services . 87 Assigning a Postmaster . 87 Setting Up DNS Integration. 87 Starting the NT/2000 Internet Agent . 89 Contents 5 Installation 104-001381-001 May 11, 2001 Novell Confidential Manual Rev 99a30 4 December 00 Setting Up the Internet Agent NLM . 89 Meeting System Requirements . 89 Testing TCP/IP Functionality . 90 Installing the Internet Agent NLM Software . 91 Setting Up Internet Services . 93 Assigning a Postmaster . 93 Setting Up DNS Integration . 94 Verifying the HOSTS File . 95 Starting the Internet Agent NLM . 96 3 Installing GroupWise WebAccess 97 Planning GroupWise WebAccess . 98 GroupWise WebAccess Component Overview . 98 Deciding Where to Install the GroupWise WebAccess Components . 99 Determining the WebAccess Agent’s Configuration . 105 Determining the WebAccess and WebPublisher Applications’ Configuration . 110 Setting Up GroupWise WebAccess . 113 Establishing File System Rights and NDS Access Rights . 113 Shutting Down the Web Server and GroupWise Components . 114 Installing GroupWise WebAccess . 115 Starting GroupWise WebAccess. 117 Testing GroupWise WebAccess . 118 Testing GroupWise WebPublisher. 119 Other Things You Can Do . 119 GroupWise WebAccess Installation Worksheet . 120 WebAccess Agent and WebAccess/WebPublisher Applications . 120 WebAccess Agent . 121 WebAccess/WebPublisher Applications . 123 4 Installing GroupWise Monitor 125 Planning GroupWise Monitor . 125 GroupWise Monitor Overview . 126 Deciding Where to Install GroupWise Monitor . 127 Specifying Network Addresses . 128 Configuring GroupWise Monitor . 129 Locating Agents to Monitor . 129 Selecting the Web Server’s Default Web Page . 130 Selecting the Default Language . 130 Setting Up GroupWise Monitor . 130 Preparing to Install GroupWise Monitor . 131 Installing GroupWise Monitor . 131 Using GroupWise Monitor . 132 GroupWise Monitor Worksheet . 134 6 Installation Installation 104-001381-001 May 11, 2001 Novell Confidential Manual Rev 99a30 4 December 00 5 Installing GroupWise Agents 137 Selecting New Agent Locations and Platforms. 137 Agent Location . 137 Agent Platform . 139 Configuring New Agent Objects in NDS . 139 Installing the NLM Agents . 140 Planning the NLM Agents . 140 Setting Up the NLM Agents. 147 Installing the NT/2000 Agents . 150 Planning the NT/2000 Agents . 151 Setting Up the NT/2000 Agents . 156 Uninstalling the Agents. 158 Agent Planning Worksheets . 159 NLM Agent Worksheet . ..
Recommended publications
  • SMTP (Simple Mail Transfer Protocol)
    P1: JsY JWBS001A-60.tex WL041/Bidgoli WL041-Bidgoli.cls May 12, 2005 3:27 Char Count= 0 SMTP (Simple Mail Transfer Protocol) Vladimir V. Riabov, Rivier College Introduction 1 SMTP Security Issues 12 SMTP Fundamentals 1 SMTP Vulnerabilities 12 SMTP Model and Protocol 2 SMTP Server Buffer Overflow Vulnerability 15 User Agent 4 Mail Relaying SMTP Vulnerability 15 Sending e-Mail 4 Mail Relaying SMTP Vulnerability in Microsoft Mail Header Format 4 Windows 2000 15 Receiving e-Mail 4 Encapsulated SMTP Address Vulnerability 15 The SMTP Destination Address 4 Malformed Request Denial of Service 16 Delayed Delivery 4 Extended Verb Request Handling Flaw 16 Aliases 5 Reverse DNS Response Buffer Overflow 16 Mail Transfer Agent 5 Firewall SMTP Filtering Vulnerability 16 SMTP Mail Transaction Flow 5 Spoofing 16 SMTP Commands 6 Bounce Attack 16 Mail Service Types 6 Restricting Access to an Outgoing Mail SMTP Service Extensions 8 Server 17 SMTP Responses 8 Mail Encryption 17 SMTP Server 8 Bastille Hardening System 17 On-Demand Mail Relay 8 POP and IMAP Vulnerabilities 17 Multipurpose Internet Mail Extensions Standards, Organizations, and (MIME) 8 Associations 18 MIME-Version 10 Internet Assigned Numbers Authority 18 Content-Type 10 Internet Engineering Task Force Working Content-Transfer-Encoding 10 Groups 18 Content-Id 11 Internet Mail Consortium 18 Content-Description 11 Mitre Corporation 18 Security Scheme for MIME 11 Conclusion 18 Mail Transmission Types 11 Glossary 18 Mail Access Modes 11 Cross References 19 Mail Access Protocols 11 References 19 POP3 11 Further Reading 22 IMAP4 12 INTRODUCTION and IMAP4), SMTP software, vulnerability and security issues, standards, associations, and organizations.
    [Show full text]
  • Understanding Post Office Protocol (POP3)
    Understanding Post Office Protocol (POP3) Author: Conrad Chung, 2BrightSparks Introduction Most Internet users with email accounts would have used some form of “client” software (Outlook, Thunderbird etc.) to access and manage their email at one point or another. To retrieve emails, these email clients may require the configuration of Post Office Protocol (or POP3) before messages can be downloaded from the server. This article will help readers understand what POP3 is and how it works. What is Post Office Protocol? The Post Office Protocol (POP3) is an Internet standard protocol used by local email software clients to retrieve emails from a remote mail server over a TCP/IP connection. Since the first version was created in 1984, the Post Office Protocol (currently at Version 3) has since became one of the most popular protocols and is used by virtually every email client to date. Its popularity lies in the protocol’s simplicity to configure, operate and maintain. Email servers hosted by Internet service providers also use POP3 to receive and hold emails intended for their subscribers. Periodically, these subscribers will use email client software to check their mailbox on the remote server and download any emails addressed to them. Once the email client has downloaded the emails, they are usually deleted from the server, although some email clients allow users to specify that mails be copied or saved on the server for a period of time. Email clients generally use the well-known TCP port 110 to connect to a POP3 server. If encrypted communication is supported on the POP3 server, users can optionally choose to connect either by using the STLS command after the protocol initiation stage or by using POP3S, which can use the Transport Layer Security (TLS) or Secure Sockets Layer (SSL) on TCP port 995 to connect to the server.
    [Show full text]
  • What Is the Difference Between Email Protocols
    What Is The Difference Between Email Protocols Interactions between email servers and users are governed by email protocols. The most common incoming email protocols are POP, and IMAP. Most email applications/programs support one or more of these. This article is to help users understand and choose which protocol should be selected for each user’s situation. Outgoing Incoming POP (Post Office Protocol): IMAP (Internet Message Access Protocol): SSL (Secure Socket Layer): Differences Between POP and IMAP Backups / Email Loss Outgoing SMTP (Simple Mail Transfer Protocol) is the protocol used in sending (outgoing) emails. SMTP is the protocol always used for sending (outgoing) emails. Incoming POP (Post Office Protocol) and IMAP (Internet Message Access Protocol) are two different protocols that do the same thing differently. They are both used in receiving emails from a mail server and can both are available for standard and secure (?) connections. POP (Post Office Protocol): POP is an email accessing protocol used to download emails from a mail server. Applications like Outlook and Outlook Express using POP will download all emails from the server to the user’s computer, and then delete them on the server. Generally POP server uses port 110 to listen to the POP requests or securely using SSL (Secure Socket Layer) (?) POP uses port number 995. The POP protocol assumes that there is only one client/computer that will be connecting to the mailbox. Even though there is an option in most mail applications to leave the copies of the emails in the server, it is not generally used due to various reasons.
    [Show full text]
  • Ii Jacobs Rp316
    !II JACOBS RP316 RACIBORZ FLOOD RESERVOIR Public Disclosure Authorized Resettlement Action Plan Public Disclosure Authorized DRAFT Public Disclosure Authorized Public Disclosure Authorized March 2005 JACOBS Document control sheet Form IP180/B Client: PCU Project: Odra Flood Mitigation Job No: J24201A Title: Draft Resettlement Action Plan Prepared by Reviewed by Approved by ORIGINAL0 NAME NAME NAME P Devitt L J S Attewill see list of authors H Fiedler-Krukowicz J Loch | DATfE SIGNATURE SIGNATURE SIGNATURE REVISION NAME NAME NAME DATE SIGNATURE SIGNATURE SIGNATURE REVISION NAME NAME NAME DATE SIGNATURE SIGNATURE SIGNATURE REVISION NAME NAME NAME DATE SIGNATURE SIGNATURE SIGNATURE This report, and infonnabon or advice which it contains, is provided by JacobsGIBB Ltd solely for internal use and reliance by its Cient in performance of JacobsGIBB Ltd's duties and liabilities under its contract with the Client Any advice, opinions, or recomrnendatons within this report should be read and retied upon only in the context of the report as a whole. The advice and opinions in this report are based upon the information nmadeavailable to JacobsGIBB Ltd at the date of this report and on current UK standards, codes, technology and constnuction practices as at the date of this report. Folloving final delvery of this report to the Client, JacobsGIBB Ltd will have no further obligations or duty to advise She Client on any mafters, including developrrient affecting the information or advice provided in ths report This report has been prepared by JacobsGIBB Ltd in their professional capaaty as Consuhing Engineers The contents of the report do not, in any way, purport to include any mranner of legal advice or opinion This report is prepared in accordance wrth the terms and conditions of JacobsGIBB Ltd's contract with the Client.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Migrationsleitfaden
    Migrationsleitfaden Leitfaden für die Migration der Basissoftwarekomponenten auf Server- und Arbeitsplatz-Systemen Version 1.0 – Juli 2003 Schriftenreihe der KBSt ISSN 0179-7263 Band 57 Juli 2003 Schriftenreihe der KBSt Band 57 ISSN 0179 - 7263 Nachdruck, auch auszugsweise, ist genehmigungspflichtig Dieser Band wurde erstellt von der KBSt im Bundesministeri- um des Innern in Zusammenarbeit mit dem Bundesamt für Sicherheit in der Informationstechnik (BSI), dem Bundesver- waltungsamt (BVA) und der C_sar Consulting, solutions and results AG Redaktion: C_sar AG, Berlin Interessenten erhalten die derzeit lieferbaren Veröffentlichungen der KBSt und weiterführende Informationen zu den Dokumenten bei Bundesministerium des Innern Referat IT 2 (KBSt) 11014 Berlin Tel.: +49 (0) 1888 681 - 2312 Fax.: +49 (0) 1888 681 - 523121 Homepage der KBSt: http://www.kbst.bund.de 1Frau Monika Pfeiffer (mailto: [email protected]) Migrationsleitfaden Leitfaden für die Migration der Basissoftwarekomponenten auf Server- und Arbeitsplatz-Systemen Version 1.0 Juli 2003 Herausgegeben vom Bundesministerium des Innern INHALTSVERZEICHNIS 1 Einleitung ........................................................................ 8 1.1 Über das Vorhaben 8 1.2 Über diesen Leitfaden 9 1.3 Hinweise zur Benutzung des Leitfadens 10 1.4 Hinweise an die Entscheider 12 1.4.1 Grundsätzliche Empfehlungen 12 1.4.2 Fortführende und ablösende Migration 13 1.4.3 Migrationswege 14 1.4.4 Vergleichbarkeit von Alternativen 14 1.4.5 Künftige Schwerpunte 15 1.4.6 Wirtschaftlichkeit 16
    [Show full text]
  • [MS-STANOPOP3]: Outlook Post Office Protocol Version 3 (POP3) Standards Compliance
    [MS-STANOPOP3]: Outlook Post Office Protocol Version 3 (POP3) Standards Compliance Intellectual Property Rights Notice for Open Specifications Documentation . Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages, standards as well as overviews of the interaction among each of these technologies. Copyrights. This documentation is covered by Microsoft copyrights. Regardless of any other terms that are contained in the terms of use for the Microsoft website that hosts this documentation, you may make copies of it in order to develop implementations of the technologies described in the Open Specifications and may distribute portions of it in your implementations using these technologies or your documentation as necessary to properly document the implementation. You may also distribute in your implementation, with or without modification, any schema, IDL’s, or code samples that are included in the documentation. This permission also applies to any documents that are referenced in the Open Specifications. No Trade Secrets. Microsoft does not claim any trade secret rights in this documentation. Patents. Microsoft has patents that may cover your implementations of the technologies described in the Open Specifications. Neither this notice nor Microsoft's delivery of the documentation grants any licenses under those or any other Microsoft patents. However, a given Open Specification may be covered by Microsoft's Open Specification Promise (available here: http://www.microsoft.com/interop/osp) or the Community Promise (available here: http://www.microsoft.com/interop/cp/default.mspx). If you would prefer a written license, or if the technologies described in the Open Specifications are not covered by the Open Specifications Promise or Community Promise, as applicable, patent licenses are available by contacting [email protected].
    [Show full text]
  • NBG6515 User's Guide
    NBG6515 AC750 Dual-Band Wireless Gigabit Router Version 1.00 Edition 1, 01/2016 Quick Start Guide User’s Guide Default Details LAN IP Address - Router Mode http://192.168.1.1 (Default mode) - AP/Repeater http://192.168.1.2 Mode www.zyxel.com User Name admin Password 1234 2.4G SSID ZyXEL + Last 6 digits of the 2.4G MAC address (ZyXEL734916) 5G SSID ZyXEL+ Last 6 digits of the 5G MAC address + .speed (ZyXEL734917.speed) Pre-shared Key Serial number + Random key Copyright © 2016 ZyXEL Communications Corporation IMPORTANT! READ CAREFULLY BEFORE USE. KEEP THIS GUIDE FOR FUTURE REFERENCE. Screenshots and graphics in this book may differ slightly from your product due to differences in your product firmware or your computer operating system. Every effort has been made to ensure that the information in this manual is accurate. Related Documentation •Quick Start Guide The Quick Start Guide shows how to connect the NBG and access the Web Configurator. Note: It is recommended you use the Web Configurator to configure the NBG. •More Information Go to support.zyxel.com to find other information on the NBG. NBG6515 User’s Guide 2 Contents Overview Contents Overview User’s Guide ....................................................................................................................................... 11 Getting to Know Your NBG .....................................................................................................................12 Connection Wizard ..................................................................................................................................17
    [Show full text]
  • Groupwise Internet Agent
    GroupWise Internet Agent April 7, 2000 Novell Confidential Manual Rev 99a24 8 February 00 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc. makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes. This product may require export authorization from the U.S. Department of Commerce prior to exporting from the U.S. or Canada. Copyright © 1993-1999 Novell, Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express written consent of the publisher. U.S. Patent Nos. 4,555,775; 4,580,218; 5,412,772; 5,701,459; 5,717,912; 5,760,772; 5,870,739; 5,873,079; 5,884,304; 5,903,755; 5,913,209; 5,924,096; 5,946,467; D393,457 and U.S. Patents Pending. Novell, Inc. 122 East 1700 South Provo, UT 84606 U.S.A. www.novell.com GroupWise Internet Agent February 2000 104-001304-001 Online Documentation: To access the online documentation for this and other Novell products, and to get updates, see www.novell.com/documentation.
    [Show full text]
  • System I: Poczta Elektroniczna
    System i Poczta elektroniczna Wersja 6 wydanie 1 System i Poczta elektroniczna Wersja 6 wydanie 1 Uwaga Przed skorzystaniem z tych informacji oraz z produktu, którego dotyczą, należy przeczytać informacje zawarte w sekcji “Uwagi”, na stronie 55. To wydanie dotyczy systemu operacyjnego IBM i5/OS (numer produktu 5761-SS1) wersja 6, wydanie 1, modyfikacja 0, a także wszystkich kolejnych wydań i modyfikacji, chyba że w nowych wydaniach zostanie określone inaczej. Wersja ta nie działa na wszystkich modelach komputerów z procesorem RISC ani na modelach z procesorem CISC. © Copyright International Business Machines Corporation 1998, 2008. Wszelkie prawa zastrzeżone. Spis treści Poczta elektroniczna . .1 Zabezpieczanie poczty elektronicznej . .24 Wysyłanie poczty elektronicznej przez router lub || Co nowego w wersji V6R1 . .1 zaporę firewall . .24 Plik PDF z informacjami na temat poczty elektronicznej . .2 Wymagania wstępne dla routera poczty Koncepcje poczty elektronicznej . .2 elektronicznej . .25 Protokół SMTP w systemie i5/OS . .3 Uwierzytelnianie lokalnej i przekazywanej poczty Serwer POP w systemie i5/OS . .4 | elektronicznej . .25 Scenariusze: poczta elektroniczna . .4 | Śledzenie nadawcy poczty elektronicznej . .26 Scenariusz: wysyłanie i odbieranie poczty elektronicznej | Ograniczanie przekazywania wiadomości . .27 lokalnie . .4 Akceptowanie wiadomości przekazywanych od | Scenariusz: konfigurowanie funkcji API klientów POP . .28 || QtmsCreateSendEmail do używania standardu S/MIME .7 Równoczesne korzystanie z funkcji ograniczenia Planowanie korzystania z poczty elektronicznej . .10 przekazywania i ograniczenia połączeń . .29 Kontrolowanie dostępu do poczty elektronicznej . .10 Ograniczanie połączeń . .29 Kontrola dostępu do serwera SMTP . .11 Filtrowanie poczty elektronicznej w celu zapobiegania Kontrola dostępu do serwera POP . .11 rozprzestrzenianiu się wirusów . .30 Blokowanie dostępu do poczty elektronicznej . .12 Wysyłanie i pobieranie poczty elektronicznej . .30 Blokowanie dostępu za pomocą protokołu SMTP 12 Konfigurowanie klientów poczty POP .
    [Show full text]
  • Vmware Zimbra Collaboration Server Administrator's
    VMware Zimbra Collaboration Server Administrator’s Guide Release 7.1 Open Source Edition May 2011 Legal Notices Copyright ©2005-2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed at http://www.vmware.com/go/patents. VMware and Zimbra are registered trademarks or trademarks of VMware, Inc. in the United states and/ or other jurisdiction. All other marks and names mentioned herein may be trademarks of their respective companies. VMware, Inc. 3401 Hillview Avenue Palo Alto, California 94304 USA www.zimbra.com ZCS 7.1 Rev 2 for 7.1.2 July 2011 Table of Contents 1 Introduction . 9 Intended Audience . 9 Available Documentation . 9 Support for Recommended Third-Party Components . 10 Support and Contact Information . 10 2 Product Overview . 11 Core Functionality . 11 Zimbra Components . 13 System Architecture . 13 Zimbra Packages . 15 Zimbra System Directory Tree . 17 Example of a Typical Multi-Server Configuration . 19 3 Zimbra Mailbox Server . 23 Incoming Mail Routing . 23 Disk Layout . 23 Message Store . 24 Data Store. 24 Index Store . 24 Log . 25 4 Zimbra Directory Service. 27 Directory Services Overview . 27 LDAP Hierarchy . 28 Zimbra Schema . 29 Account Authentication . 30 Internal Authentication Mechanism. 30 External LDAP and External Active Directory Authentication Mechanism 30 Custom Authentication - zimbraCustomAuth . 31 Kerberos5 Authentication Mechanism . 33 Zimbra Objects . 33 Company Directory/GAL . 36 Flushing LDAP Cache . 38 Themes and Locales . 38 Accounts, COS, Domains, and Servers . 38 Global Configuration . 39 5 Zimbra MTA. 41 Zimbra MTA Deployment . 41 Postfix Configuration Files .
    [Show full text]
  • Guidelines on Electronic Mail Security
    Special Publication 800-45 Version 2 Guidelines on Electronic Mail Security Recommendations of the National Institute of Standards and Technology Miles Tracy Wayne Jansen Karen Scarfone Jason Butterfield NIST Special Publication 800-45 Guidelines on Electronic Mail Security Version 2 Recommendations of the National Institute of Standards and Technology Miles Tracy, Wayne Jansen, Karen Scarfone, and Jason Butterfield C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 February 2007 U .S. Department of Commerce Carlos M. Gutierrez, Secretary Technology Administration Robert C. Cresanti, Under Secretary of Commerce for Technology National Institute of Standards and Technology William Jeffrey, Director Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Special Publication 800-series reports on ITL’s research, guidance, and outreach efforts in computer security, and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Special Publication 800-45 Version 2 Natl. Inst. Stand. Technol. Spec. Publ. 800-45 Version 2, 139 pages (Feb.
    [Show full text]