Mitel SME Server V5 with ServiceLink manuel d'utilisation

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133

Aller à la page of

Un bon manuel d’utilisation

Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation Mitel SME Server V5 with ServiceLink. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel Mitel SME Server V5 with ServiceLink ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.

Qu'est ce que le manuel d’utilisation?

Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation Mitel SME Server V5 with ServiceLink décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.

Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.

Donc, ce qui devrait contenir le manuel parfait?

Tout d'abord, le manuel d’utilisation Mitel SME Server V5 with ServiceLink devrait contenir:
- informations sur les caractéristiques techniques du dispositif Mitel SME Server V5 with ServiceLink
- nom du fabricant et année de fabrication Mitel SME Server V5 with ServiceLink
- instructions d'utilisation, de réglage et d’entretien de l'équipement Mitel SME Server V5 with ServiceLink
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes

Pourquoi nous ne lisons pas les manuels d’utilisation?

Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage Mitel SME Server V5 with ServiceLink ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles Mitel SME Server V5 with ServiceLink et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service Mitel en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées Mitel SME Server V5 with ServiceLink, comme c’est le cas pour la version papier.

Pourquoi lire le manuel d’utilisation?

Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif Mitel SME Server V5 with ServiceLink, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.

Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation Mitel SME Server V5 with ServiceLink. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.

Table des matières du manuel d’utilisation

  • Page 1

    SME Server V5 with ServiceLink User Manual Mitel Netw orks Corporation[...]

  • Page 2

    SME Ser ver V5 with Ser viceLink: User Manual by Mitel Networks Corporation Published August 2001 Copyright © 2001 by Mitel Networks Corporation Permission is granted to copy , distribute and/or modify this document under the terms of the GNU Free Documentation License, V ersion 1.1 or any later version published by the Free Software F oundation; [...]

  • Page 3

    T able of Contents 1. W elcome to y our SME Server V5 with ServiceLink .......................................................................................................................6 1.1. About This Guide ........................................................................................................................................[...]

  • Page 4

    8.3. IMAP versus POP3 e-mail ....................................................................................................................................................55 8.4. Configuring Y our E-mail Application ...............................................................................................................................[...]

  • Page 5

    16.1. i-bay Directories..................................................................................................................................................................99 16.2. Accessing the i-bays . .....................................................................................................................................[...]

  • Page 6

    Chapter 1. W elcome to your SME Server V5 with Ser viceLink Congratulations on choosing the SME Server V5 with ServiceLink as your communications server! Companies all ov er the world are using the Internet to communicate more effectiv ely and efficiently to a broader audience. The SME Server V5 with ServiceLink is founded upon state of the art te[...]

  • Page 7

    Chapter 1. W elcome to your SME Server V5 with ServiceLink • Nov ember 1999 - e-smith server and gateway user’ s manual for version 3.1 published in print form by e-smith, inc. Primary author Kim Morrison using StarOffice 5.1. 1.1.3. Endor sements This is the official documentation for SME Server V5 with ServiceLink and is endorsed by Mitel N[...]

  • Page 8

    Chapter 1. W elcome to your SME Server V5 with ServiceLink 1.4.1. ServiceLink W ith the release of SME Server V5 with ServiceLink, Mitel Networks Corporation is also introducing ServiceLink , a suite of network-deli vered services that extend the functionality of the server . These include: • 24x7 Alerts and Reporting - Provides round-the-clock m[...]

  • Page 9

    Chapter 2. The role of the SME Ser ver V5 Y our SME Server V5 with ServiceLink manages your connection to the Internet by routing Internet data packets to and from your network (which allows all the computers on your network to share a single Internet connection) and by providing security for your network, minimizing the risk of intrusions. When on[...]

  • Page 10

    Chapter 2. The role of the SME Server V5 More About Ethernets Appendix A: Intr oduction to the Ethernet Local Area Network (LAN) , briefly explains ethernets, ethernet components and typical ethernet configuration. 10[...]

  • Page 11

    Chapter 3. ServiceLink W ith SME Server V5 with ServiceLink, Mitel Networks Corporation has introduced a suite of integrated network services - ServiceLink - that extend and enhance the functionality of your server . ServiceLink maximizes the security , performance and reliability of your server through real-time interaction with the Mitel Networks[...]

  • Page 12

    Chapter 3. ServiceLink • Guaranteed E-mail This service provides a backup e-mail service if a server becomes unreachable and cannot receiv e mail. The most common reason for this is a temporary failure of the Internet connection provided by your ISP . With ServiceLink, mail that cannot be delivered to your server will be stored at the NOC. Simult[...]

  • Page 13

    Chapter 3. ServiceLink the network; it uses that key to encrypt data intended for that server . A private key on the receiving server is then used to decrypt the data. One of the dif ficulties in setting up a VPN is securely exchanging the k eys required to set up the VPN. ServiceLink simplifies and automates this process via a trusted central ex[...]

  • Page 14

    Chapter 4. Y our Internet Service Provider (ISP) Y our ISP is your connection to the Internet - it routes Internet data pack ets to and from your server . It also provides other essential services. This section of the user’ s guide re vie ws what ISPs offer and what the implications are in choosing among the v arious options av ailable to you. Wh[...]

  • Page 15

    Chapter 4. Y our Internet Service Pro vider (ISP) 4.2.1. Static versus dynamic IP addressing A static IP address nev er changes. It is permanently assigned to your server by your ISP . Note: Static IP addressing is prefer able to dynamic IP addressing because it makes it easier for users on the Inter net to connect to your services. Dynamic IP addr[...]

  • Page 16

    Chapter 4. Y our Internet Service Pro vider (ISP) corporate service that you receiv e a routable, static IP address. In fact, usually you will be allocated a block of routable, static IP addresses for your corporation - you will need only one for your server . Information provided to you by your ISP: • static IP address (or block of addresses fro[...]

  • Page 17

    Chapter 4. Y our Internet Service Pro vider (ISP) Note: In the tables belo w , please keep the f ollowing inf ormation in mind: 1. ISPs often supply the items mar ked * to your server by DHCP . 2. Some ISPs bloc k outgoing HTTP connections, f orcing you to use their pro xy ser ver . This interf eres in a few minor w a ys with your serv er (e.g., th[...]

  • Page 18

    Chapter 4. Y our Internet Service Pro vider (ISP) • DNS service account name • DNS service password Order services from: Service List B 3. Y ou receiv e a routable, dynamically assigned IP address and you elect not to use a dynamic DNS service OR your IP address is non-routable. Information provided to you by your ISP: • IP address of cablemo[...]

  • Page 19

    Chapter 4. Y our Internet Service Pro vider (ISP) • your ISP is able to accept the "ETRN command". (This command is used by the serv er to retriev e the mail held by the ISP’ s secondary mail server .) Information provided to you by your ISP: • static IP address • dialup access number • dialup account name • dialup account pas[...]

  • Page 20

    Chapter 4. Y our Internet Service Pro vider (ISP) 4.4.2. Service List B Services to order from ISP: • secondary mail server (optional) • Internet ne ws server (optional) Services From Dynamic DNS Service • domain name (depending on the service purchased, your dynamic DNS service may restrict what your domain name can be) • publication of DN[...]

  • Page 21

    Chapter 4. Y our Internet Service Pro vider (ISP) Some Important Notes on Service List D (Multidr op Mail) Service list D is applied to configurations where the publication of DNS records is not practical either because your IP address changes frequently or because it is non-routable. Because there is no published address receiving incoming networ[...]

  • Page 22

    Chapter 4. Y our Internet Service Pro vider (ISP) DNS: Publication of DNS Mail (MX) Records The publication of DNS mail (MX) records is the method used to inform Domain Name Services worldwide that all e-mail to your domain ("yourdomain.xxx") should be delivered to your e-mail server ("mail.yourdomain.xxx"). ETRN ETRN is a comma[...]

  • Page 23

    Chapter 5. Hard ware Requirements of the SME Ser ver V5 with Ser viceLink Host Computer The hardware requirements of the SME Server V5 with ServiceLink are modest compared with other server software av ailable today . Ho we ver , because of its critical role in your of fice, selecting an appropriate host computer is important. The hardw are requir[...]

  • Page 24

    Chapter 5. Hardwar e Requirements of the SME Server V5 with ServiceLink Host Computer T able 5-2. Hardwar e Requirements f or a Category 1 Server Architecture PCI-based Pentium-class processor Processor speed 90 MHz (or better) Minimum RAM 32 MB (64 MB recommended) Hard driv e IDE or SCSI - at least 1 GB SCSI adapter SCSI adapter must appear on the[...]

  • Page 25

    Chapter 5. Hardwar e Requirements of the SME Server V5 with ServiceLink Host Computer CD-R OM driv e A T API or SCSI Floppy dri ve any Monitor any Graphics card any Mouse none required Sound card none required 5.3. Hard ware Requirements f or a Categor y 3 Server T able 5-5. Definition of a Category 3 Server # of Users Up to 40 Usage Heavy (hea vy[...]

  • Page 26

    Chapter 5. Hardwar e Requirements of the SME Server V5 with ServiceLink Host Computer 5.4. Hard ware Requirements f or a Categor y 4 Server T able 5-7. Definition of a Category 4 Server # of Users Up to 500 Usage Heavy T able 5-8. Hardwar e Requirements of a Category 4 Serv er Architecture PCI-based Pentium-class processor Processor speed 700 MHz [...]

  • Page 27

    Chapter 5. Hardwar e Requirements of the SME Server V5 with ServiceLink Host Computer If you need more information about how to install an Ethernet adapter, please visit our HOWT O document on "Installing an Ethernet Adapter in 11 Steps" found online at http://www .e-smith.org/docs/ho wto/nicinstall-howto .html Be aware that y our Mitel N[...]

  • Page 28

    Chapter 5. Hardwar e Requirements of the SME Server V5 with ServiceLink Host Computer • HP J2585A, J2585B, J2970, J2973 • IBM EtherJet PCI 10/100 adapter (i82557) • Intel 82556, 82557, 82865 • Intel PCI EtherExpress Pro 10+, Pro100+, Pro100B • Kingston EtherX KNE100TX, KNE110TX, KNE120TX, KNE20T , KNE30T , KNT40T , KNECB4TX • Lite-ON LN[...]

  • Page 29

    Chapter 5. Hardwar e Requirements of the SME Server V5 with ServiceLink Host Computer • W inbond 89C940 5.6. Suppor ted SCSI Adapters If the computer you plan to use for your server has a SCSI hard disk, your SCSI adapter must be supported by Red Hat Linux 7.1. PLEASE NO TE: Only PCI SCSI adapters are supported by the SME Server V5 with ServiceLi[...]

  • Page 30

    Chapter 5. Hardwar e Requirements of the SME Server V5 with ServiceLink Host Computer • Initio Corp INI-940, INI-950, INI-9100/9100W , 360P • Intel 80960RP • Mylex (BusLogic) FlashPoint Series, MultMaster 01/10 • Symbios 53c1510, 53c8xx • Q Logic QLA10160, 1080, 1240, 1280, 2100, 2200 12160 5.7. Suppor ted T ape Drives If you intend to us[...]

  • Page 31

    Chapter 5. Hardwar e Requirements of the SME Server V5 with ServiceLink Host Computer 31[...]

  • Page 32

    Chapter 6. Installing And Configuring Y our SME Ser ver V5 with Ser viceLink Software 6.1. Licensing T erms and Conditions In installing the SME Server V5 with ServiceLink softw are, you are agreeing to the open source licensing terms and conditions associated with it. Y ou can read these terms and conditions in the introduction to this manual und[...]

  • Page 33

    Chapter 6. Installing And Configuring Y our SME Server V5 with ServiceLink Software Lev el 5 (disk striping with par ity) because of the poor perf or mance and reliability of softw are implementations of RAID5. If you are seeking RAID5 suppor t, Mitel Netw or ks Cor poration recommends you consider one of the many hardware implementations which wi[...]

  • Page 34

    Chapter 6. Installing And Configuring Y our SME Server V5 with ServiceLink Softwar e 6.4. Installing the Software Note: If you are configuring your system with RAID1 suppor t, notice that your step 4 below will be slightly different. If you skipped the pre vious section on RAID , it would be advisable to read it bef ore proceeding. Step 1: Insert[...]

  • Page 35

    Chapter 6. Installing And Configuring Y our SME Server V5 with ServiceLink Software • operation mode - you must select whether your serv er will operate in server and gate way mode or server-only mode. • configuration for the external network/Internet - you must configure your serv er so that it can communicate with your ISP either by a dedi[...]

  • Page 36

    Chapter 6. Installing And Configuring Y our SME Server V5 with ServiceLink Softwar e 6.7. Configuring Y our System Name and Domain Name As sho wn belo w , your next step is to enter the primary domain name that will be associated with your SME Server V5 with ServiceLink. (Y ou can later configure other virtual domains that work with the server .[...]

  • Page 37

    Chapter 6. Installing And Configuring Y our SME Server V5 with ServiceLink Software A computer needs a special software program, called an "ethernet driver", to use an ethernet adapter . Which ethernet driver is required depends on which ethernet adapter is installed on your computer . Y ou will first need to select the appropriate dri [...]

  • Page 38

    Chapter 6. Installing And Configuring Y our SME Server V5 with ServiceLink Softwar e If you ha ve no reason to prefer one set of IP addresses o ver another f or your local netw ork, your serv er will prompt y ou with default parameters that are probably appropriate in your situation. Tip: If you are installing servers at multiple sites within your[...]

  • Page 39

    Chapter 6. Installing And Configuring Y our SME Server V5 with ServiceLink Software 6.9.1. Option 1: Ser ver and gatewa y mode In server and gate way mode, your server provides services (such as e-mail, web services, file and print sharing) to your network and also acts as a gate way between your internal network and the outside w orld. The fact [...]

  • Page 40

    Chapter 6. Installing And Configuring Y our SME Server V5 with ServiceLink Softwar e 6.9.3. Option 3: Ser ver -only mode Server-only mode is appropriate if you do not wish to use the gateway capabilities of your server . In this configuration, your server connects only to the local network and does not connect directly to the outside world (altho[...]

  • Page 41

    Chapter 6. Installing And Configuring Y our SME Server V5 with ServiceLink Software The next step after selecting a connection type is to enter the specific parameters representing that connection. 6.11. Server and Gate way Mode - Dedicated Ho w you configure your server’ s external interface depends on whether you are using a dedicated connec[...]

  • Page 42

    Chapter 6. Installing And Configuring Y our SME Server V5 with ServiceLink Softwar e 6.11.2. Assigning Y our Ethernet Adapters to Netw ork Connection T o communicate successfully , your server needs to kno w which ethernet adapter connects it to the internal network and which adapter connects it to the external network/Internet. Y our server will [...]

  • Page 43

    Chapter 6. Installing And Configuring Y our SME Server V5 with ServiceLink Software Y our server must kno w three additional things to communicate on the Internet: • its own unique IP address so that Internet data packets can reach it. • a subnet mask (also called a netmask) which looks like an IP address and allows other computers to infer yo[...]

  • Page 44

    Chapter 6. Installing And Configuring Y our SME Server V5 with ServiceLink Softwar e If you ha ve a static IP address and y our ISP does not offer DHCP or PPPoE , then your ISP will give you the static IP address, subnet mask (or netmask), and the gate way IP address of the de vice that your serv er should connect to in order to communicate with t[...]

  • Page 45

    Chapter 6. Installing And Configuring Y our SME Server V5 with ServiceLink Software • modem initialization screen - most users can simply leave this blank, but with some particular modems, additional information may need to be entered here • the dialup access phone number • username • password • connection policy This last item may be of[...]

  • Page 46

    Chapter 6. Installing And Configuring Y our SME Server V5 with ServiceLink Softwar e There are two separate timeout v alues configured by each choice. One value is the length of time since the last HTTP (web) packet went through the server . The other is a more general timeout for any other types of packets. The difference is there because it is [...]

  • Page 47

    Chapter 6. Installing And Configuring Y our SME Server V5 with ServiceLink Software If y ou hav e fewer than 180 machines on y our local network and no r eason to prefer one range of IP addr esses o ver another , y ou can simply accept the defaults for these screens. If the defaults are not appropriate to your situation, you may need a bit of back[...]

  • Page 48

    Chapter 6. Installing And Configuring Y our SME Server V5 with ServiceLink Softwar e assigned the IP address of "192.168.1.1" then the lowest possible number in the DHCP range should be "2". W e recommend that y ou leav e a small pool of IP addresses that can be manually assigned: Some of the computers (or devices such as netw [...]

  • Page 49

    Chapter 6. Installing And Configuring Y our SME Server V5 with ServiceLink Software Contact e-mail address: Finally , you will hav e the option of pro viding a contact e-mail address and name. If you would like to be notified of security updates or ne w versions of software, we strongly encourage you to pro vide at least your e-mail address. As t[...]

  • Page 50

    Chapter 7. The Ser ver Console When installation is complete and if you set server console mode to "auto", the opening screen of the SME Serv er V5 with ServiceLink server console will appear: If you set the server console mode to "login", you will be gi ven a login prompt. After you enter the user name "admin" and you[...]

  • Page 51

    Chapter 7. The Server Console 7.1. Using the T ext-based Br owser For Option 6, Access server manag er with text-mode br owser , the server uses a text-based browser called lynx to allow you to access the web-based server manager from the serv er console. Navigation is primarily with the arro w ke ys - up and down to mo ve through the page, right a[...]

  • Page 52

    Chapter 8. Configuring the Computers on Y our Network 8.1. What Order to do Things For ef ficiency , we recommend you configure your desktop computers in the following order: Step 1: First, configure one of your desktop computers to w ork with TCP/IP (using the information in this chapter). Step 2: With TCP/IP up and running on one of your comp[...]

  • Page 53

    Chapter 8. Configuring the Computers on Y our Network Item Description What to enter enable DHCP service See section belo w In W indows, enable "Obtain an IP address service automatically". In Apple, select "DHCP server". Note: We str ongly recommend that you configure all clients machines using DHCP rather than manually using[...]

  • Page 54

    Chapter 8. Configuring the Computers on Y our Network Only One DHCP Server It is imperative that no other DHCP server is on your network. If a former DHCP server configured your computers, you should remov e that DHCP server from your netw ork. Leave DHCP enabled, and reboot each computer . Ne w IP addresses, netmasks, gate way IP addresses and D[...]

  • Page 55

    Chapter 8. Configuring the Computers on Y our Network After configuring the TCP/IP parameters, you may need to reboot your desktop computer to implement the configuration changes. (For e xample, most W indo ws systems need to be rebooted after the TCP/IP configuration has been changed.) Once the settings take effect, your computer will be conne[...]

  • Page 56

    Chapter 8. Configuring the Computers on Y our Network Benefits of POP3 Drawbacks of POP3 Even when you are not connected to your network, you have access to the e-mail stored on your desktop. POP3 was not originally intended to support users accessing and managing their e-mail from remote systems. Because your e-mail is stored on your desktop, se[...]

  • Page 57

    Chapter 8. Configuring the Computers on Y our Network dedicated to the incoming e-mail server . Disable POP3 protocol: T o disable the POP3 protocol for outgoing mail, click the POP3 checkbox "of f". The images belo w sho w you the sequence in Netscape. First you choose Pr efer ences from the Edit menu and click on Mail Servers as sho wn[...]

  • Page 58

    Chapter 8. Configuring the Computers on Y our Network explores this issue). If you decided that you do want to use proxy serv ers 1 , you will need to enter the IP address or domain name of the proxy server (i.e. your server) into the configuration screens of your web bro wser . The port number you will need to enter to connect to the e-smith pro[...]

  • Page 59

    Chapter 8. Configuring the Computers on Y our Network Y ou will need to enter the following information: • Enter the name you wish to give your compan y directory - any name will do. • The LD AP server is the name of your web server , in the form www .yourdomain.xxx. • The Server Root information can be found on the "Directory" scr[...]

  • Page 60

    Chapter 9. On-going Administration Using the ser ver manager The server manager is a simple control panel that allows you to administer your network. Using the server manager , you perform such tasks as adding or deleting e-mail addresses, setting the system date and time, and creating a starter web page. The server manager is accessed through a we[...]

  • Page 61

    Chapter 9. On-going Administration Using the server manager In the next four chapters, we’ ll explain each of the administrati ve functions in the order in which they appear in the frame running do wn the left side of the screen. The links are grouped together under four headings: Security , Configuration, Collaboration and Miscellaneous. Note: [...]

  • Page 62

    Chapter 10. Security 10.1. P assw ord This screen lets you change your system password at any time. T o do so, type the ne w password in the first field. V erify the new password by entering it in the second field. (Y our password can be any combination of printable characters, including upper- and lo wer-case letters, numbers, and punctuation m[...]

  • Page 63

    Chapter 10. Security Each of these remote access methods is described below . 10.2.1. ssh If you need to connect directly to your server and login from a remote system belonging to you, we str ongly encourage you to use ssh instead of telnet. In addition to UNIX and Linux systems, ssh client software is no w also av ailable for Windo ws and Macinto[...]

  • Page 64

    Chapter 10. Security ssh (secure shell) ssh (secure shell) provides a secure, encrypted way to login to a remote machine across a network or to copy files from a local machine to a serv er . Many people do not realize that man y programs such as telnet and ftp transmit your passw ord in plain, unencrypted text across your network or the Internet. [...]

  • Page 65

    Chapter 10. Security 10.2.2. PPTP The P oint-to-P oint T unnelling Pr otocol (PPTP) is used to create client-to-server V irtual Priv ate Networks (VPNs) and was dev eloped by the PPTP Forum, an industry group which included Microsoft and several other companies. A VPN is a priv ate network of computers that uses the public Internet to connect some [...]

  • Page 66

    Chapter 10. Security 10.2.3. FTP Another way to upload or do wnload files to and from your server is to enable a protocol called FTP , or "file transfer protocol". This screen enables you to set your policy for FTP . Note that allo wing liberal FTP access to your server does reduce your security . Y ou hav e two options that you can set[...]

  • Page 67

    Chapter 10. Security If your compan y only has one network that is being serviced by the server , you do not need to add any information here. Some adv anced users may wish to extend privile ges to more than one network of computers. If you would like your server to identify one or more additional networks for those privile ges, you will be ask ed [...]

  • Page 68

    Chapter 11. Configuration 11.1. Set date and time Accessing this section allo ws you to set the system date and time either manually or using a network time serv er. Pull-do wn menus for month and time zone ensure accurate entry . The serv er manager will reset the time automatically during daylight sa vings time. There are worldwide time zones wi[...]

  • Page 69

    Chapter 11. Configur ation W arning After you start using a network time ser v er , you should NOT set the time or date manually . If you do so , the network time synchronization will no longer function. This screen in the server manager allo ws you to configure your server to connect regularly to a time serv er and synchronize the clock on the s[...]

  • Page 70

    Chapter 11. Configur ation W arning If you hav e a Windows NT server or Windows 2000 server on your network that is functioning as a netw or k server , you should most likely answ er "no" because that other ser ver will act as the domain master . If you do configure your system to be the domain master, a special Windo ws share called NE[...]

  • Page 71

    Chapter 11. Configur ation In this section of the server manager , you specify the default directory information for ne w accounts - the user’ s department, compan y , street address, city and phone number . Each time you create an e-mail account, the fields will contain the information entered here as the default. If you wish, you can change t[...]

  • Page 72

    Chapter 11. Configur ation The next two fields can be left blank if your printer is on a local port. If it’ s a network printer, you will likely already hav e assigned it an IP address. Enter that information where requested. The next field asks for your network printer name. Use the default setting, "Raw", if you have no specific r[...]

  • Page 73

    Chapter 11. Configur ation 11.5. Hostnames and addresses When you installed your SME Server V5 with ServiceLink, you were asked to provide a name for your system. That name and se veral other "standard" names are automatically configured in your system’ s host table during the installation process. This host table is consulted as part[...]

  • Page 74

    Chapter 11. Configur ation Y ou would first change the location to "Remote" and then enter the IP address of your ISP’ s serv er in the field marked "Global IP". 11.5.1. Creating New Hostnames Creating ne w hostnames simply inv olves selecting one of the links at the top of the Hostnames and addresses panel and filling out[...]

  • Page 75

    Chapter 11. Configur ation Remote hosts: As mentioned in the example earlier , you might want to point a hostname such as "www" to a remote system. While "www" is created by default, you can create other names such as "home", "research", or any other appropriate name. In the form, you simply enter the hostna[...]

  • Page 76

    Chapter 11. Configur ation Y our choice of e-mail retriev al mode will depend on the arrangements you made with your Internet service provider: • If y ou hav e a dedicated connection , set E-mail retriev al mode to "Standard". • If y ou arranged "ETRN" support with your ISP , choose that setting and then scroll do wn to the[...]

  • Page 77

    Chapter 11. Configur ation e very 15 minutes during standard of fice hours and ev ery hour outside normal of fice hours on weekdays or on week ends. The fields allow you to customize those settings. Finally , if you ha ve "multidrop" mail service you need to select the sort method used by the serv er to decide which user each message [...]

  • Page 78

    Chapter 11. Configur ation • Internet pro vider’ s SMTP server: Normally the server will send outgoing messages directly to their intended destination. If, ho wever , you have an unreliable connection or are using a residential Internet service, it may be advisable to route e-mail via your provider’ s SMTP server . In that case, you should e[...]

  • Page 79

    Chapter 11. Configur ation 79[...]

  • Page 80

    Chapter 12. Collaboration 12.1. User Accounts User accounts should be set up for each person in your organization. A user account includes separate, password-protected e-mail and file storage areas. If this is the first time you are setting up user accounts for your organization, you will need to establish what your naming con vention will be. Le[...]

  • Page 81

    Chapter 12. Collaboration 12.1.1. Disabling User Accounts There may be times when you do not wish to delete a user account but instead merely want to disable it. For instance, when an employee lea ves the compan y , you may want to immediately remo ve their access to the serv er, b ut still keep their files or e-mail address activ e until the info[...]

  • Page 82

    Chapter 12. Collaboration W arning When you create a group , you are required to assign at least one user to that group . If y ou fail to do so , the group will not be created and you will receive an error message. After you add (or remov e) a user account from a group, the user must log out and log back in for those changes to take effect. Until t[...]

  • Page 83

    Chapter 12. Collaboration As noted on the screen belo w , there are some restrictions on the text content of the names. Pseudon yms can be linked to existing user or group accounts. In the example sho wn, a pseudonym for webmaster is being set to point to ffr og . 12.4. Information Ba ys The i-bay (information bay) feature of the SME Server V5 with[...]

  • Page 84

    Chapter 12. Collaboration 12.5. Vir tual Domains When you are supporting multiple domains on a single serv er, each domain being serv ed is referred to as a virtual domain . (The strict definition of virtual domain is when a single IP address is shared between multiple domains.) When you create a virtual domain using this section of the server man[...]

  • Page 85

    Chapter 13. Ser viceLink Until you sign up for ServiceLink and your server is registered, all of the panels in this section of the server manager will not be functional. In order to subscribe to ServiceLink, visit http://www .e-smith.com/servicelink/ and find a partner near you. The Mitel Networks Corporation partner will interact with the Mitel N[...]

  • Page 86

    Chapter 13. ServiceLink As the image sho ws, if there is an issue with any of your services, it will appear in red italics and you can follo w a link to determine the problem. Note also that the expiration of your ServiceLink subscription appears. 13.2. Virus Protection As soon as you are subscribed to ServiceLink and the V irus Protection service [...]

  • Page 87

    Chapter 13. ServiceLink T o vie w the quarantined messages, we recommend you login to webmail as the "admin" user . Y ou will be then able to view the messages without any code being executed. ( Do not open the attachments as doing so can infect your system. ) Note: Administrators with Linux e xper ience can also use ssh to the server and[...]

  • Page 88

    Chapter 13. ServiceLink The top part of the panel allo ws you to configure a service domain that is available to you after ServiceLink activ ation. This domain takes the form of your domain .e-smith.net and allo ws you to immediately start receiving e-mail and connecting to your server using that domain. If you wish to change the service domain na[...]

  • Page 89

    Chapter 13. ServiceLink From a user perspecti ve, the major difference will be that when you open up (on W indows) your "Network Neighborhood" or "My Network Places", you will no w see the servers at the other locations on your VPN. Note that when you establish a VPN using ServiceLink, one SME Server is designated to act as the [...]

  • Page 90

    Chapter 14. Administration 14.1. Blades Blades are a ne w feature in SME Server V5 with ServiceLink which allo w you to easily install or remove software modules via the server manager . Using this feature will allow easy customization of your server . Y ou can choose the options required for your particular needs without having to add unnecessary [...]

  • Page 91

    Chapter 14. Administration the web panel sho wn belo w . Y ou hav e four actions you can perform, each of which is described in the following sections. 14.2.1. Backup T o Desktop The first type of backup allo ws you to sav e a snapshot of your serv er configuration onto your desktop computer . This will save all user accounts, user directories, i[...]

  • Page 92

    Chapter 14. Administration 14.2.3. V erify Desktop Bac kup File This option allo ws you to v erify that the backup to disk was completed successfully . In rare cases we hav e found that users ran out of disk space on their client PC while doing the backup to desktop. This options allows you to verify whether or not the backup did in fact complete s[...]

  • Page 93

    Chapter 14. Administration W arning Note that this restore procedure only restores user data and configuration information. It does not restore system files. If you e xper ienced a serious system crash, you should first re-install the SME Ser ver V5 with Ser viceLink softw are and then perform a restore from tape. 1 14.3. Reinstallation Disk Usi[...]

  • Page 94

    Chapter 14. Administration Note that this reinstallation disk serves a differ ent purpose than the "emer gency boot disk" you created as part of the original software installation process. The emergenc y boot disk allows you to boot your serv er if you are unable to boot from the hard disk for some reason. For instance, this could occur d[...]

  • Page 95

    Chapter 14. Administration 14.5. View Log Files This panel allo ws you to vie w the system log files on you server . As sho wn in the image belo w , you select the log file that you want to vie w and press the "V iew Log File" b utton. Without an y filter options, you will see the entire log file. Y ou will probably find the log fil[...]

  • Page 96

    Chapter 15. Miscellaneous 15.1. Online manual This link will take you directly from the server manager to the online manual available at http://www .e-smith.org/docs/manual/. Note that you must be connected to the Internet to read the online manual. 15.2. Create Star ter Web Site If you already hav e a customized web site, you should not use this s[...]

  • Page 97

    Chapter 15. Miscellaneous 15.3. Suppor t and Licensing This section allows you to re vie w the support and licensing terms attached to your SME Server V5 with ServiceLink. It also provides contact information for Mitel Networks Corporation and our Authorized Partners. 15.4. Other Administration Notes Accessing administrative areas of y our server v[...]

  • Page 98

    Chapter 16. Information Bays (i-ba ys) Information bays, or i-bays, are a unique feature built into your SME Server V5 with ServiceLink. i-bays are a po werful, simple, flexible mechanism for creating distinct information-sharing sites. The network administrator can define sev eral characteristics for each ne w i-bay they create: • write access[...]

  • Page 99

    Chapter 16. Information Bays (i-bays) 16.1. i-bay Directories Each i-bay has three directories - html , files and cgi-bin . (The cgi-bin directory is set aside to hold cgi scripts used for that i-bay’ s web page. CGI scripts are tools used in advanced web-site creation and do not need to be discussed here.) • the files directory: This director[...]

  • Page 100

    Chapter 16. Information Bays (i-bays) • accessing an i-bay via Windows file sharing and AppleT alk: T o access the i-bay using Windo ws file sharing or AppleT alk, simply na vigate to the serv er ov er your netw ork browser (in Windo ws, this would be via "Network Neighborhood") and select the i-bay you want to enter from those appear[...]

  • Page 101

    Chapter 16. Information Bays (i-bays) • Brief description: This text will appear in various administrativ e screens and can be a useful reminder of the i-bay content. • Group: Ownership of the i-bay content is assigned to an e xisting group. The group o wnership plays a role in the ne xt setting for user access. • User access: Y ou need to de[...]

  • Page 102

    Chapter 16. Information Bays (i-bays) TPV has chosen a naming con vention for i-bays that customers can easily remember - first initial, last name. Because it contains important customer information, only the site administrator can save files into this i-bay . T o prev ent others from accessing the customer’ s i-bay , a password is required to [...]

  • Page 103

    Chapter 16. Information Bays (i-bays) example, at midnight tonight he can access his i-bay to sho w his spouse the design used for his in vitations! 16.5. An i-bay Used as a Shared Netw ork Drive Having a shared network dri ve can be very helpful as a way of storing and sharing documents company-wide. TPV uses an i-bay for a compan y-wide network d[...]

  • Page 104

    Chapter 16. Information Bays (i-bays) As you can see in this example, The Pagan V egan has several files in this directory for company use. Providing a centralized location for company documents (such as expense report templates) ensures that everyone al ways has access to these documents and uses the most up-to-date version. 16.6. An i-ba y Used [...]

  • Page 105

    Chapter 16. Information Bays (i-bays) want the intranet to be created by a particular staf f member and "check ed in" by the administrator (write access "administrator only"). The intranet is, of course, vie wable only from the internal netw ork. No password is required. T o access the intranet, TPV emplo yees use their web brow[...]

  • Page 106

    Chapter 16. Information Bays (i-bays) Here’ s how the process works: • Each week, Mr . Samson updates his online order sheet to include only produce that will be ripe and ready for the ne xt delivery date. He sav es it in ".html" format and e-mails it to The Pagan V egan’ s administrator . • Upon receiving the e-mail, TPV’ s adm[...]

  • Page 107

    Chapter 16. Information Bays (i-bays) • On the day of deliv ery , Samson’ s shipping staff accesses the i-bay ov er the Internet, prints out TPV’ s order from the samfarms i-bay , and fills it. 16.8. An i-bay Used as Y our Customer Download Site When customers hire The Pagan V egan to plan ev ents, they need to revie w a great deal of inform[...]

  • Page 108

    Chapter 16. Information Bays (i-bays) TPV set the i-bay for Administrator-only write access, vie wable ov er the entire Internet, with no password required. A customer accesses the site using the FTP client in their web bro wser to login as the i-bay user name by entering the URL ftp://menus@ftp.tofu-dog.com . This is what the customer sees: When t[...]

  • Page 109

    Chapter 17. User File Storage on the SME Ser ver V5 with Ser viceLink When you create a user account on your serv er, this not only creates an e-mail account b ut also a file directory for that user . This directory is set aside for files that the user would like to store on the server hard drive. It can only be accessed by the user . T o access [...]

  • Page 110

    Chapter 17. User File Stor age on the SME Server V5 with ServiceLink Note that for users who are on a W indows network, the user must be logged onto the netw ork with the name and password associated with the server user account. T o do so, open the "Start" menu. • Select "Shut down". • Select "Close all programs and lo[...]

  • Page 111

    Chapter 17. User File Stor age on the SME Server V5 with ServiceLink Note: AppleT alk will work without TCP/IP , but will be slow er than AppleT alk o v er TCP/IP . The next step is to choose a serv er to connect to via AppleT alk. Click on the Chooser icon in your Apple Menu to bring up a list of file servers to connect to. Double clicking on the[...]

  • Page 112

    Chapter 17. User File Stor age on the SME Server V5 with ServiceLink Use your server user name and password to connect. This screen will pop up only once, as the information typed in will be used for e very subsequent login. This includes clicking on the Chooser, your server , and then other volumes to mount them as well. Y our desktop should now h[...]

  • Page 113

    Chapter 18. W ebmail If you wish, you can configure your SME Server V5 with ServiceLink so that users can access their e-mail via a web interface. Once webmail is enabled, users will be able to access their e-mail from the local network or an ywhere in the world via the Internet using any standard web bro wser (provided it supports Javascript and [...]

  • Page 114

    Chapter 18. W ebmail 18.2. Starting Webmail T o use webmail, a user first needs a v alid user account and password on your server . Next, the user opens up a web bro wser and points it to your server using an address resembling the following URL: https://www.tofu-dog .com/webmail/ The https in the URL indicates this connection uses SSL encryption [...]

  • Page 115

    Chapter 18. W ebmail Let’ s take a quick tour of the Inbox window . In the top left corner is a pop-up menu that shows the list of your av ailable mail folders. In your first webmail session, the only folder choice will be INBO X . As soon as you send an e-mail message, a folder called sent-mail will be created and available in the menu. Y ou ca[...]

  • Page 116

    Chapter 18. W ebmail 18.6. Composing Messages T o compose a new message, click on Compose in the menu on the left. Y ou should see a screen similar to that belo w . At the top of the compose screen, your av ailable options include the ability to spell-check the message in your language of choice, or to cancel, save a draft or send the message. If y[...]

  • Page 117

    Chapter 18. W ebmail • Reply only to the sender . • Reply to all of the original recipients. • Forward the message to someone else. • Bounce the message to another person (similar to "Forw ard" but without pro viding you the opportunity to comment). 1 • Sav e As - sav e the message to a text file. By clicking on the Reply butto[...]

  • Page 118

    Chapter 18. W ebmail T o do so, check the box ne xt to each message you wish to delete. After that, press the Delete text b utton directly abov e or below the list of messages on the left side. Y ou will now see a trash icon next to the checkbox and a line through the messages. As an example, in the image abo ve, our user (ffrog) wants to delete th[...]

  • Page 119

    Chapter 18. W ebmail In either case, you will find yourself viewing a window that looks like the one below . If this is the first time you have entered the Contacts windo w , you will not see anything next to the "Select" button. Normally , though, you will see a pop-up menu with all of your contacts in it (as seen in the window abo ve [...]

  • Page 120

    Chapter 18. W ebmail compare the text against the directory . The default is to search for entries where the name is the text you enter , which requires an exact match. Y ou may find it more useful to search for entries where the name contains the search text. A search with "contains" will find names where the search text appears some w[...]

  • Page 121

    Chapter 18. W ebmail Y ou hav e four preferences you can configure: • Signature - Y ou may include any text that you wish to appear by default at the bottom of your e-mail messages. Once configured, it will always appear at the bottom of a Compose or Reply window when you enter that window . Y ou can, howe ver , delete it for a specific messag[...]

  • Page 122

    Chapter 19. Additional Software In the process of de veloping the SME Server V5 with ServiceLink, we found it necessary to include some additional open source software. While Mitel Networks Corporation does not provide direct technical support for this additional software, its availability on the server may be of benefit to adv anced users. W arni[...]

  • Page 123

    Appendix A. Introduction to the Ethernet Local Area Network (LAN) A local area netw ork (LAN) is the system of wires and other hardw are that connects the computers within your of fice and allows them to communicate with one another . An ethernet LAN is the most common type. Ethernet refers both to a kind of connection and to a protocol for how In[...]

  • Page 124

    Appendix B. Dynamic DNS Ser vices If your IP address is assigned dynamically , you may find it helpful to use a dynamic DNS service. A dynamic DNS service provides you with an automated way to notify them whenev er your IP address changes so that they can immediately publish new DNS records for your domain. W ithout dynamic DNS, you would ha ve to[...]

  • Page 125

    Appendix C. Pro xy Ser vers The server comes with a proxy serv er called Squid which can proxy the web (HTTP), FTP and Gopher protocols. Proxy servers temporarily store information from the Internet on the hard dri ve of the server , allowing other users to access it directly from that hard dri ve. For e xample, when an employee visits a web page, [...]

  • Page 126

    Appendix D . T echnical Suppor t If you are a Mitel Networks Corporation subscriber and are having technical difficulty , please contact your local Mitel Networks Corporation Authorized Partner for support. If you purchased your subscription directly from Mitel Networks Corporation, please call +1-613-592-2122 (in the United States and Canada, cal[...]

  • Page 127

    Appendix E. Ser viceLink End User License Agreement The following are the terms and conditions for use of the March Networks ServiceLink services including associated softw are products (collectiv ely referred to as the "ServiceLink Services"), from Mitel Networks. Please read them carefully . BY CHECKING THE "I ACCEPT" BO X, YO[...]

  • Page 128

    Appendix E. ServiceLink End User License Agreement Authorized Integrator without your prior consent (e xcept as required by subpoena, search w arrant or other legal process or as a result of the assignment or transfer of this Agreement by Mitel Networks). 8. LIMIT A TION OF LIABILITY - Mitel Networks and/or its respecti ve suppliers may make improv[...]

  • Page 129

    Appendix E. ServiceLink End User License Agreement Services shall remain with Mitel Networks, or its suppliers and licensors. Y ou will not infringe, and will take appropriate steps for the protection of such rights. Y ou will not remo ve, obscure or alter an y notice of patent, cop yright, mask work, trademark, trade secret or other proprietary ri[...]

  • Page 130

    Appendix E. ServiceLink End User License Agreement that is do wnloaded to enable the subscription and use of the ServiceLink Service; and any and all copies, modifications, upgrades, enhancements and new releases thereof made or acquired by you. "Subscription Period" begins on the initial date that you connect to the ServiceLink Service [...]

  • Page 131

    Appendix F . GNU General Public License TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICA TION 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", belo w , refers to any such program[...]

  • Page 132

    Appendix F . GNU General Public License a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, b) Accompany it with a written of fer, valid for at least three years, to give an y third party , for a c[...]

  • Page 133

    Appendix F . GNU General Public License through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a conseque[...]