Previous Page Index Next Page Microsoft Home Page

Return to Start Page



iiGoing Live

iThis section contains procedures for cutting over ILS from preproduction to full production. It details the setup, configuration, and testing issues that you must address in order to "go live." When this last milestone is completed, ILS should be fully available to your users.

iThe cutover process involves reconfiguring parts of your system to make ILS available to your target audience. This can include reconfiguring routers, setting up a firewall, and reconfiguring the access rights on your ILS installation. You may also want to increase available RAM.

Before You Begin

To accomplish the cutover process, it helps to have a detailed understanding of the operation of routers and firewalls. Also, before making the service generally available to your users, make sure that you have tested your ILS installation using the testing procedures described earlier in this chapter. Before continuing, define the group of users you expect to use ILS. Identify the critical nodes (firewalls, domain name servers, routers, and so on) in the network path between your users and ILS. These nodes must all be configured to allow client access to ILS.

iiiiiiii

Reconfiguring for Live Service

Use the following procedures to reconfigure your test installation for live service.

To ensure that the service can be found using DNS

  1. Open your DNS address mapping table by following the manufacturer’s instructions.
  2. Add an entry that maps the ILS computer name to its IP address.

For more information, see your DNS documentation.

To ensure that ILS packets can pass through the firewall

For more information, see the documentation for your firewall.

To reconfigure ILS security settings

  1. In Windows Internet Service Manager, open the LDAP properties dialog box.ii
  2. Click the Service tab.
  3. Specify which authentication mechanisms ILS should allow:

Note   iiiiThe Basic (No Encryption) item is provided with the overall LDAP service, but does not govern settings in ILS-only installations.


ii

Confirming That Cutover Was Successful

To confirm that the cutover process was successful, it is important to have access to a computer with the same status as your intended user base. For example, if your ILS users all sit outside the company firewall, you will need access to a computer that also sits outside the company firewall. Having secured this computer, use it to run through some of the same tests that you used to verify the ILS installation. For information about the verification tests, see "Testing Your Installation" earlier in this chapter.

iiiiiiiii

Troubleshooting the Cutover Process

If you find that your intended users cannot access ILS directory information, check connections between the various computer setups using the ping utility. For information about the ping utility, see the Windows NT Server documentation.

Previous Page Index Next Page Microsoft Home Page

Return to Start Page


© 1996-1997 Microsoft Corporation. All rights reserved.