Cindy,
Saying Bordermanager will kill the server seems a little extreme. I have installed it with both NetWare 4 and NetWare 5.0 and it didn't kill anything. At some point in the installation it will tell you that it is going to turn on standard filtering. This default option basically shuts down all communication between your network and the Internet. The assumption is that you are then safe. You would then open ports and urls that you wish people to be able to use connecting to computers on the Internet. If you, at that point, tell the install not to turn on standard filtering, the Bordermanager install will block nothing, allowing communication to continue between your network and the Internet as if the Bordermanager were not there. You can then turn on Bordermanager features one at a time denying access to the things you wish.
I believe that Bordermanager comes with a runtime licence for NetWare. I would strongly suggest that you dedicate a separate computer to running Bordermanager. This way you can set up the border manager between a single computer (or a spare hub) and your existing network, check everything out, and only place it between the Internet and the rest of your network after it has been tested. Also, optimizing a NetWare server to be a proxy cache requires very different settings than you would use to optimize it for file and print service.
Craig Lyndes
S. Burlington School District
>>> [log in to unmask] 06/14/01 10:38AM >>>
Good morning,
I've got Bordermanager sitting here in a box. My intention is to install it
on our primary file server which is running Netware 5.1. Our reasoning is
to use Cyber Patrol and possibly centralized caching. I just heard that
installing Bordermanager on this server may kill it. I'd appreciate any
experience or suggestions you have to share.
Thanks,
Cindy O'Hara
St. Albans Town Educational Center
This e-mail may contain information protected under the Family Educational Rights and Privacy Act. If this e-mail contains student information and you are not entitled to access such information under FERPA, federal regulations require that you destroy this e-mail without reviewing it and you may not forward it to anyone.
|