
Security Considerations
14
no
vd
ocx
(E
NU)
9 Decem
ber
200
5
123
14
Security Considerations
This section provides information on how to use the utilities included in the Novell
®
Server
Consolidation and Migration Toolkit in the most secure way possible.
•
Section 14.1, “General Security Guidelines,” on page 123
•
Section 14.2, “Server Consolidation Utility Security,” on page 123
•
Section 14.3, “Migration Wizard Security,” on page 123
14.1 General Security Guidelines
Access to network resources in general, and servers in particular, should be governed by the security
guidelines outlined in “
Security
” in the
Novell OES Planning and Implementation Guide
.
When using either the Server Consolidation Utility or the NetWare Migration Wizard, data between
the source and destination servers is sent over a plain-text tunnel. In a secure environment, the
source server, destination server, and client workstation should be attached to the same physical
network segment with no connectivity outside of the internal network.
14.2 Server Consolidation Utility Security
Standard security algorithms and well-established obfuscation methods are used in the Novell
Server Consolidation Utility to protect the privacy of administrator passwords.
In a secure environment, you should not use the server-based processing feature. The XML script
that is generated contains the administrator passwords in obfuscated form. Although the passwords
are not written to the file in clear text, a knowledgeable hacker could derive the passwords from the
obfuscated versions. For more information, see
Section 6.12, “Server-Based Processing,” on
page 60
.
14.3 Migration Wizard Security
Standard security algorithms and well established obfuscation methods are used in the NetWare
®
Migration Wizard to protect the privacy of administrator passwords.
In a secure environment, you should use the diskette method to copy NICI keys from the source
server to the destination server, instead of copying the keys over the wire. For more information, see
Step 5 on page 102
.
Содержание Server Consolidation and Migration Toolkit 1.1
Страница 4: ......
Страница 10: ...10 Novell Server Consolidation and Migration Toolkit Administration Guide...
Страница 12: ...12 Novell Server Consolidation and Migration Toolkit Administration Guide...
Страница 26: ...26 Novell Server Consolidation and Migration Toolkit Administration Guide...
Страница 30: ...30 Novell Server Consolidation and Migration Toolkit Administration Guide...
Страница 34: ...34 Novell Server Consolidation and Migration Toolkit Administration Guide...
Страница 72: ...72 Novell Server Consolidation and Migration Toolkit Administration Guide...
Страница 88: ...88 Novell Server Consolidation and Migration Toolkit Administration Guide...
Страница 90: ...90 Novell Server Consolidation and Migration Toolkit Administration Guide...
Страница 94: ...94 Novell Server Consolidation and Migration Toolkit Administration Guide...
Страница 116: ...116 Novell Server Consolidation and Migration Toolkit Administration Guide...
Страница 122: ...122 Novell Server Consolidation and Migration Toolkit Administration Guide...
Страница 124: ...124 Novell Server Consolidation and Migration Toolkit Administration Guide...