Security Considerations; General Security Guidelines; Server Consolidation Utility Security; Migration Wizard Security - Novell SERVER CONSOLIDATION MIGRATION TOOLKIT 1.1 - ADMINISTRATION GUIDE 12-23-2005 Administration Manual

Table of Contents

Advertisement

Security Considerations

1 4
This section provides information on how to use the utilities included in the Novell
Consolidation and Migration Toolkit in the most secure way possible.
Section 14.1, "General Security Guidelines," on page 123
Section 14.2, "Server Consolidation Utility Security," on page 123
Section 14.3, "Migration Wizard Security," on page 123

14.1 General Security Guidelines

Access to network resources in general, and servers in particular, should be governed by the security
guidelines outlined in "Security" in the Novell OES Planning and Implementation Guide.
When using either the Server Consolidation Utility or the NetWare Migration Wizard, data between
the source and destination servers is sent over a plain-text tunnel. In a secure environment, the
source server, destination server, and client workstation should be attached to the same physical
network segment with no connectivity outside of the internal network.

14.2 Server Consolidation Utility Security

Standard security algorithms and well-established obfuscation methods are used in the Novell
Server Consolidation Utility to protect the privacy of administrator passwords.
In a secure environment, you should not use the server-based processing feature. The XML script
that is generated contains the administrator passwords in obfuscated form. Although the passwords
are not written to the file in clear text, a knowledgeable hacker could derive the passwords from the
obfuscated versions. For more information, see
page
60.

14.3 Migration Wizard Security

Standard security algorithms and well established obfuscation methods are used in the NetWare
Migration Wizard to protect the privacy of administrator passwords.
In a secure environment, you should use the diskette method to copy NICI keys from the source
server to the destination server, instead of copying the keys over the wire. For more information, see
Step 5 on page
102.
Section 6.12, "Server-Based Processing," on
14
®
Server
®
Security Considerations
123

Advertisement

Table of Contents
loading

This manual is also suitable for:

Server consolidation and migration toolkit 1.1

Table of Contents