iThis section contains procedures for cutting over ILS from preproduction to full production. It details the setup, configuration, and testing issues that you must address in order to "go live." When this last milestone is completed, ILS should be fully available to your users.
iThe cutover process involves reconfiguring parts of your system to make ILS available to your target audience. This can include reconfiguring routers, setting up a firewall, and reconfiguring the access rights on your ILS installation. You may also want to increase available RAM.
To accomplish the cutover process, it helps to have a detailed understanding of the operation of routers and firewalls. Also, before making the service generally available to your users, make sure that you have tested your ILS installation using the testing procedures described earlier in this chapter. Before continuing, define the group of users you expect to use ILS. Identify the critical nodes (firewalls, domain name servers, routers, and so on) in the network path between your users and ILS. These nodes must all be configured to allow client access to ILS.
Use the following procedures to reconfigure your test installation for live service.
To ensure that the service can be found using DNS
For more information, see your DNS documentation.
To ensure that ILS packets can pass through the firewall
For more information, see the documentation for your firewall.
To reconfigure ILS security settings
Note iiiiThe Basic (No Encryption) item is provided with the overall LDAP service, but does not govern settings in ILS-only installations.
To confirm that the cutover process was successful, it is important to have access to a computer with the same status as your intended user base. For example, if your ILS users all sit outside the company firewall, you will need access to a computer that also sits outside the company firewall. Having secured this computer, use it to run through some of the same tests that you used to verify the ILS installation. For information about the verification tests, see "Testing Your Installation" earlier in this chapter.
If you find that your intended users cannot access ILS directory information, check connections between the various computer setups using the ping utility. For information about the ping utility, see the Windows NT Server documentation.