Changes

Jump to navigation Jump to search
Added warning, note and tip boxes
Line 2: Line 2:  
The following sections explain in detail the process of installing the SME Server software.
 
The following sections explain in detail the process of installing the SME Server software.
   −
{| cellspacing="0" border="1"
+
{{DrawBoxWarning|content=The computer on which you install this software will be totally dedicated to being your SME Server. The hard drive of this computer will be erased and re-written with the Linux operating system - dramatically enhancing the reliability of your server over other operating systems. However, this means that while this computer is acting as your server, you cannot use it for any other purpose.||
|'''Warning'''
+
}}
|The computer on which you install this software will be totally dedicated to being your SME Server. The hard drive of this computer will be erased and re-written with the Linux operating system - dramatically enhancing the reliability of your server over other operating systems. However, this means that while this computer is acting as your server, you cannot use it for any other purpose.||
  −
|}
     −
{| cellspacing="0" border="1"
+
{{DrawBoxNote|content=If you have previously installed and configured a server and are reinstalling the software, please be aware that you should use the procedure described in section 5.3. Upgrading From A Previous Version in order to preserve your existing configuration and data. Simply performing a new installation will erase all previously existing user accounts, user directories, i-bay contents and web site and configuration parameters. If you have not already done so, you may wish to back up the contents of your server onto one of your desktop computers. You can do so easily by selecting "Backup or restore" from the server manager, as explained in chapter 10.1.||
|'''Note'''
+
}}
|If you have previously installed and configured a server and are reinstalling the software, please be aware that you should use the procedure described in section 5.3. Upgrading From A Previous Version in order to preserve your existing configuration and data. Simply performing a new installation will erase all previously existing user accounts, user directories, i-bay contents and web site and configuration parameters. If you have not already done so, you may wish to back up the contents of your server onto one of your desktop computers. You can do so easily by selecting "Backup or restore" from the server manager, as explained in chapter 10.1.||
  −
|}
      
====5.1. Licensing Terms and Conditions====
 
====5.1. Licensing Terms and Conditions====
Line 23: Line 19:  
The SME Server comes by default with RAID1 disk mirroring if you install one or two drives.  The server is configured to accept one drive and will function properly.  You can verify the RAID1 status from the console. --server manager.--  If you later wish to add a second drive, just add it and instruct the server via the console. --server manager.-- to create the mirror.  It will take some time to build so do it during scheduled maintenance.  They can be either SCSI or IDE drives.  
 
The SME Server comes by default with RAID1 disk mirroring if you install one or two drives.  The server is configured to accept one drive and will function properly.  You can verify the RAID1 status from the console. --server manager.--  If you later wish to add a second drive, just add it and instruct the server via the console. --server manager.-- to create the mirror.  It will take some time to build so do it during scheduled maintenance.  They can be either SCSI or IDE drives.  
   −
{| cellspacing="0" border="1"
+
{{DrawBoxNote|content=The SME Server supports many levels of software implementations of RAID.  The number of drives you install will dictate how the server will automatically configure itself.  Note: All disks must be of the same size.
|'''Note'''
  −
|The SME Server supports many levels of software implementations of RAID.  The number of drives you install will dictate how the server will automatically configure itself.  Note: All disks must be of the same size.
   
   
 
   
 
  * Automated installation as RAID
 
  * Automated installation as RAID
Line 33: Line 27:  
  * 6+ disks: RAID6
 
  * 6+ disks: RAID6
 
<br />
 
<br />
--SME Server supports a software implementation of RAID Level 1, known as disk mirroring.-- It does not support RAID Level 0 (disk striping), as that does not provide any protection of your data whatsoever. --It does not support RAID Level 5 (disk striping with parity) because of the poor performance and reliability of software implementations of RAID5. If you are seeking RAID5 support, Contribs.org recommends you consider one of the many hardware implementations which will provide both protection and performance.--||
+
--SME Server supports a software implementation of RAID Level 1, known as disk mirroring.-- It does not support RAID Level 0 (disk striping), as that does not provide any protection of your data whatsoever. --It does not support RAID Level 5 (disk striping with parity) because of the poor performance and reliability of software implementations of RAID5. If you are seeking RAID5 support, Contribs.org recommends you consider one of the many hardware implementations which will provide both protection and performance.
|}
+
}}
    
=====5.2.2. Hardware Mirroring=====
 
=====5.2.2. Hardware Mirroring=====
Line 41: Line 35:  
If you are going to use hardware mirroring, you should NOT choose Install - Dual hard disk with software RAID-1 mirroring during the installation process described in section 5.4. Installing the Software. (Doing so will enable software mirroring.) Instead, you should do a regular installation of the software.
 
If you are going to use hardware mirroring, you should NOT choose Install - Dual hard disk with software RAID-1 mirroring during the installation process described in section 5.4. Installing the Software. (Doing so will enable software mirroring.) Instead, you should do a regular installation of the software.
   −
{| cellspacing="0" border="1"
+
{{DrawBoxNote|content=Using one of the supported hardware RAID controllers, you will be able to upgrade from an earlier version of the SME Server to version 6.x using the standard upgrade process detailed in section 5.3. Upgrading From A Previous Version. You should back up all your data and test carefully after installation.}}
|'''Note'''
  −
|Using one of the supported hardware RAID controllers, you will be able to upgrade from an earlier version of the SME Server to version 6.x using the standard upgrade process detailed in section 5.3. Upgrading From A Previous Version. You should back up all your data and test carefully after installation.||
  −
|}
      
====5.3. Upgrading From A Previous Version====
 
====5.3. Upgrading From A Previous Version====
Line 52: Line 43:  
Also see the related [[/howto/UpgradeTo7 Upgrade Howto]] if you are restoring to a new server.
 
Also see the related [[/howto/UpgradeTo7 Upgrade Howto]] if you are restoring to a new server.
   −
{| cellspacing="0" border="1"
+
{{DrawBoxWarning|content=It is not possible to use the Upgrade option to add software mirroring (RAID1) to an existing server.<br />
|'''Warning'''
  −
|It is not possible to use the Upgrade option to add software mirroring (RAID1) to an existing server.<br />
   
<br />
 
<br />
 
If you previously installed software mirroring with a previous version of the software, you should be able to upgrade without any problems. However, if you want to upgrade a previous version of the software that was not installed with software mirroring to use software mirroring (RAID1) support, you should:<br />
 
If you previously installed software mirroring with a previous version of the software, you should be able to upgrade without any problems. However, if you want to upgrade a previous version of the software that was not installed with software mirroring to use software mirroring (RAID1) support, you should:<br />
Line 61: Line 50:  
   2. perform a fresh install selecting the software mirroring option<br />
 
   2. perform a fresh install selecting the software mirroring option<br />
 
   3. restore the backup through the server manager<br />
 
   3. restore the backup through the server manager<br />
|}
+
}}
    
====5.4. Installing the Software====
 
====5.4. Installing the Software====
{| cellspacing="0" border="1"
+
{{DrawBoxNote|content=If you are configuring your system with RAID1 support, notice that your step 4 below will be slightly different. If you skipped section 5.2 RAID1 Support (Disk Mirroring), it would be advisable to read it before proceeding.||
|'''Note'''
+
}}
|If you are configuring your system with RAID1 support, notice that your step 4 below will be slightly different. If you skipped section 5.2 RAID1 Support (Disk Mirroring), it would be advisable to read it before proceeding.||
  −
|}
      
'''Step 1''': Insert the CD-ROM media.  
 
'''Step 1''': Insert the CD-ROM media.  
Line 86: Line 73:       −
{| cellspacing="0" border="1"
+
{{DrawBoxWarning|content=The installation process formats and erases all attached hard drives . If you have multiple hard drives, be sure to back them up prior to starting the installation process.}}
|'''Warning'''
  −
|The installation process formats and erases all attached hard drives . If you have multiple hard drives, be sure to back them up prior to starting the installation process.||
  −
|}
        Line 102: Line 86:  
[[Image:019.png]]
 
[[Image:019.png]]
   −
{| cellspacing="0" border="1"
+
{{DrawBoxWarning|content=The installation (or upgrade) process rewrites the boot sector on your hard drive. This may cause machines with BIOS boot sector virus detection to not boot unattended. This detection should be disabled in your system's BIOS.}}
|'''Warning'''
  −
|The installation (or upgrade) process rewrites the boot sector on your hard drive. This may cause machines with BIOS boot sector virus detection to not boot unattended. This detection should be disabled in your system's BIOS.||
  −
|}
      
====5.5. Configuring your SME Server====
 
====5.5. Configuring your SME Server====
Line 122: Line 103:  
As you select a given configuration parameter, you will be presented only with the screens necessary for your given configuration. Each screen will provide you with a simple, detailed explanation of the required information.
 
As you select a given configuration parameter, you will be presented only with the screens necessary for your given configuration. Each screen will provide you with a simple, detailed explanation of the required information.
   −
{| cellspacing="0" border="1"
+
{{DrawBoxNote|content=As you move through the configuration screens, you will notice that there is a "Keep" option which will allow you to keep the choices you may have made previously. Obviously, when you are configuring your system for the first time, many of these choices will not have been made, but if you later go back to re-configure the system, this option can save time.}}
|'''Note'''
  −
|As you move through the configuration screens, you will notice that there is a "Keep" option which will allow you to keep the choices you may have made previously. Obviously, when you are configuring your system for the first time, many of these choices will not have been made, but if you later go back to re-configure the system, this option can save time.||
  −
|}
      
====5.6. Setting Your Administrator Password====
 
====5.6. Setting Your Administrator Password====
Line 136: Line 114:  
After you enter the password once, you will be asked to type it again to confirm that the password was recorded correctly. The password will also be examined to determine how strong it is from a security point-of-view. If it is found to be weak (for instance, a dictionary word), you will see an additional screen asking if you really want to use this password. You will have the option to go back and change to a stronger password or to continue using the weaker password.
 
After you enter the password once, you will be asked to type it again to confirm that the password was recorded correctly. The password will also be examined to determine how strong it is from a security point-of-view. If it is found to be weak (for instance, a dictionary word), you will see an additional screen asking if you really want to use this password. You will have the option to go back and change to a stronger password or to continue using the weaker password.
   −
{| cellspacing="0" border="1"
+
{{DrawBoxWarning|content=You can use any ASCII printable characters in the administrator password. As this password gives someone total control over your server, you should choose a password that cannot be guessed easily. A good password should contain mixed upper- and lower-case letters, numbers and punctuation, yet also be easy to remember. An example might be "IwmSMES!" as in "I want my SME Server!" (Please don't use this example as your password!)}}
|'''Note'''
  −
|You can use any ASCII printable characters in the administrator password. As this password gives someone total control over your server, you should choose a password that cannot be guessed easily. A good password should contain mixed upper- and lower-case letters, numbers and punctuation, yet also be easy to remember. An example might be "IwmSMES!" as in "I want my SME Server!" (Please don't use this example as your password!)||
  −
|}
      
====5.7. Configuring Your System Name and Domain Name====
 
====5.7. Configuring Your System Name and Domain Name====
Line 148: Line 123:  
Next you need to provide a name for your server. You should think carefully about this as changing it later may create additional work. (For instance, Windows client computers may be mapping drives to your server using its name. Those clients would need to remap the drive using the new name.)
 
Next you need to provide a name for your server. You should think carefully about this as changing it later may create additional work. (For instance, Windows client computers may be mapping drives to your server using its name. Those clients would need to remap the drive using the new name.)
   −
{| cellspacing="0" border="1"
+
{{DrawBoxTip|content=You should make the system name as unique as possible in case you someday decide to link your server to another server using an IPSEC VPN. When you do, each server will need a unique name. Using some type of theme, such as location names, may be an effective way to ensure unique names.}}
|'''Tip'''
  −
|You should make the system name as unique as possible in case you someday decide to link your server to another server using an IPSEC VPN. When you do, each server will need a unique name. Using some type of theme, such as location names, may be an effective way to ensure unique names.||
  −
|}
      
[[Image:Select_system_name.png]]
 
[[Image:Select_system_name.png]]
Line 177: Line 149:  
If you have no reason to prefer one set of IP addresses over another for your local network, your server will prompt you with default parameters that are probably appropriate in your situation.
 
If you have no reason to prefer one set of IP addresses over another for your local network, your server will prompt you with default parameters that are probably appropriate in your situation.
   −
{| cellspacing="0" border="1"
+
{{DrawBoxTip|content=If you are installing servers at multiple sites within your organization, you may find it useful for later troubleshooting to use different network addresses for each site. Additionally, if you ever want to establish an IPSEC VPN between the servers, each server will need to use a different range of IP addresses. Even if you are not planning to use a VPN right now, it would be safest to use unique network addresses for each location.}}
|'''Tip'''
  −
|If you are installing servers at multiple sites within your organization, you may find it useful for later troubleshooting to use different network addresses for each site. Additionally, if you ever want to establish an IPSEC VPN between the servers, each server will need to use a different range of IP addresses. Even if you are not planning to use a VPN right now, it would be safest to use unique network addresses for each location.||
  −
|}
      
If, however, you are operating your server in "server-only" mode and there are already servers on your network, you will need to obtain an unused IP address for your local network.
 
If, however, you are operating your server in "server-only" mode and there are already servers on your network, you will need to obtain an unused IP address for your local network.
Line 213: Line 182:  
Server-only mode is appropriate if you do not wish to use the gateway capabilities of your server. In this configuration, your server connects only to the local network and does not connect directly to the outside world (although it may connect indirectly through your firewall or another server).
 
Server-only mode is appropriate if you do not wish to use the gateway capabilities of your server. In this configuration, your server connects only to the local network and does not connect directly to the outside world (although it may connect indirectly through your firewall or another server).
   −
{| cellspacing="0" border="1"
+
{{DrawBoxWarning|content=Because the server "trusts" the local network to be secure in server-only mode, it must be behind a firewall of some type. Under no conditions should it be directly connected to the Internet.}}
|'''Warning'''
  −
|Because the server "trusts" the local network to be secure in server-only mode, it must be behind a firewall of some type. Under no conditions should it be directly connected to the Internet.||
  −
|}
      
Your network will resemble the image below:
 
Your network will resemble the image below:
Line 248: Line 214:  
[[Image:Select_ethernet_card_assignment.png]]
 
[[Image:Select_ethernet_card_assignment.png]]
   −
{| cellspacing="0" border="1"
+
{{DrawBoxTip|content=If you are using two different network interface cards, you will see which driver is associated with eth0 and which is associated with eth1. This information can help you determine which card is eth0 and which is eth1. If you have two cards that use the identical driver you will see a screen such as the one above where the actual driver is not listed.}}
|'''Tip'''
  −
|If you are using two different network interface cards, you will see which driver is associated with eth0 and which is associated with eth1. This information can help you determine which card is eth0 and which is eth1. If you have two cards that use the identical driver you will see a screen such as the one above where the actual driver is not listed.||
  −
|}
      
=====5.11.3. Configuring Your External Interface=====
 
=====5.11.3. Configuring Your External Interface=====
Line 275: Line 238:  
If you have a static IP address and your ISP does not offer DHCP or PPPoE, then your ISP will give you the static IP address, subnet mask (or netmask), and the gateway IP address of the device that your server should connect to in order to communicate with the Internet. Assuming you have this information on hand, you can go ahead and select Option 4. Successive screens will prompt you to enter each parameter.
 
If you have a static IP address and your ISP does not offer DHCP or PPPoE, then your ISP will give you the static IP address, subnet mask (or netmask), and the gateway IP address of the device that your server should connect to in order to communicate with the Internet. Assuming you have this information on hand, you can go ahead and select Option 4. Successive screens will prompt you to enter each parameter.
   −
{| cellspacing="0" border="1"
+
{{DrawBoxTip|content=What is PPPoE?<br />
|'''Tip'''
+
PPPoE is the Point-to-Point Protocol over Ethernet . Essentially, it is an implementation of the popular PPP protocol used for dialup connections - only configured to run over an Ethernet connection. Many ISPs that provide ADSL connections use PPPoE as the method of connecting their customers to the Internet over ADSL.}}
|What is PPPoE?<br />
  −
PPPoE is the Point-to-Point Protocol over Ethernet . Essentially, it is an implementation of the popular PPP protocol used for dialup connections - only configured to run over an Ethernet connection. Many ISPs that provide ADSL connections use PPPoE as the method of connecting their customers to the Internet over ADSL.||
  −
|}
      
=====5.11.4. Configuring Dynamic DNS=====
 
=====5.11.4. Configuring Dynamic DNS=====
Line 299: Line 259:  
This last item may be of special interest. As shown in the screen below, you can configure what type of policy you wish to have in place during typical work hours. If you are in a small office and wish to share your phone line between your computer and phone or fax, you may wish to minimize the time you are online. This is also true if your ISP charges a fee on a per-minute basis. On the other hand, if you have a separate phone line or unlimited time with your ISP, you might want to have long connection times or a continuous connection.
 
This last item may be of special interest. As shown in the screen below, you can configure what type of policy you wish to have in place during typical work hours. If you are in a small office and wish to share your phone line between your computer and phone or fax, you may wish to minimize the time you are online. This is also true if your ISP charges a fee on a per-minute basis. On the other hand, if you have a separate phone line or unlimited time with your ISP, you might want to have long connection times or a continuous connection.
   −
{| cellspacing="0" border="1"
+
{{DrawBoxWarning|content=If you are using a dial-on-demand link to your ISP, please be aware that you can incur very steep phone charges due to dialup connection attempts to the ISP. We are aware of at least one case in which a failed modem link at the ISP resulted in several thousand connection attempts over a couple of days - and a hefty phone bill. If your telephone carrier charges you per-call or per-minute fees, we suggest that you contact your ISP and ask whether it is willing to assume responsibility if a failure at their end results in a large phone bill.}}
|'''Warning'''
  −
|If you are using a dial-on-demand link to your ISP, please be aware that you can incur very steep phone charges due to dialup connection attempts to the ISP. We are aware of at least one case in which a failed modem link at the ISP resulted in several thousand connection attempts over a couple of days - and a hefty phone bill. If your telephone carrier charges you per-call or per-minute fees, we suggest that you contact your ISP and ask whether it is willing to assume responsibility if a failure at their end results in a large phone bill.||
  −
|}
      
After configuring this policy for "work" hours, you can then configure the policy for time outside of office hours and additionally for the weekend. Notice that you do have the choice of never, which would allow you to restrict your system from connecting on weekends or during off-hours.
 
After configuring this policy for "work" hours, you can then configure the policy for time outside of office hours and additionally for the weekend. Notice that you do have the choice of never, which would allow you to restrict your system from connecting on weekends or during off-hours.

Navigation menu