Professional Documents
Culture Documents
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
45.
46.
47.
48. What kind information can be viewed through Show Server command
49. What is the command to view the current version of the domino
50. What is the command to replicate a database
51. What is the command to restart the router
52. What is the use of Fixup command
53. What is the use of Updall command
54. What is the difference between updall and update command
55. What is the difference between New Copy and New Replica
56. What is the advantage of Clustering and what all components are involved in domino clustering
57. What is cluster manager
58. What is the use of shared mails
Answers
1.
Ans:-1. Both users and Domino administrators can track mail. Users can track only messages that they
themselves sent. Administrators can track mail sent by any user.
When you configure mail tracking, you can specify which types of information Domino records. For example,
you can specify that Domino not record message-tracking information for certain users, or you can choose not
to record the subject line of messages sent by specific users.
The Mail Tracker Collector task (MTC) reads special mail tracker log files (MTC files) produced by the Router
and copies certain messaging information from them to the MailTracker Store database (MTSTORE.NSF). The
MailTracker Store database is created automatically when you enable mail tracking on the server. When an
administrator or user searches for a particular message, either a message tracking request or a mail report,
Domino searches the MailTracker Store database to find the information.
Note The Mail Tracker Collector differs from the Statistics Collector (Collect task), which is responsible for
gathering statistical information about servers.
Delivery Status
Meaning
Delivered
The message was delivered to a mailbox on the server. The mail file status indicates
whether the message was read, unread, or deleted. If the mail file status is not read,
unread, or deleted, it appears as unknown.
Delivery failed
The server attempted to deliver the message to a mail file but was unsuccessful. The
recipient may not exist, or the server's disk may be full.
In queue
Transferred
The Router successfully sent the message to the server identified in the next hop field.
Transfer failed
The Router attempted to transfer the message to another server and failed.
Group expanded
The message was addressed to a group, and the group was expanded on this server.
Unknown
Make sure you already have a Configuration Settings document for the server(s) to be
configured.
2.
From the Domino Administrator, click the Configuration tab, and expand the Messaging
section.
3.
Click Configurations.
4.
Select the Configuration Settings document for the mail server or servers you want to
administer, and click Edit Configuration.
5.
6.
Description
Indicates the number of mailboxes (MAIL.BOX databases) on
Number of mailboxes
servers that uses this Configuration Settings document. If
this field is blank, one mailbox is used. Configure a
maximum of ten mailboxes.
7.
Ans:-3. To stop the delivery of mail to mail files that are over their quota is available.
To enable this 'Obey Database Quotas during Message Delivery' feature in Domino 6.x, do the following:
1. Open the Domino Directory.
2. Select Servers, Configurations, Router/SMTP, Restrictions and Controls, Delivery Controls.
3. Choose the appropriate option for "Over quota enforcement".
Using a mail client, a user creates and addresses a mail message to a recipient.
2.
3.
Uses Notes protocols to deposit the message into the MAIL.BOX database on the user's
Domino mail server.
Uses SMTP to send the message to the user's Domino mail server, which must be
running the SMTP listener task. The SMTP listener task deposits the message into
MAIL.BOX (Lotus Notes, IMAP clients, POP3 clients).
Uses HTTP to send the message to the user's Domino mail server, which must be
running the HTTP task. The HTTP task deposits the message into MAIL.BOX (Web clients).
4.
The Router finds the message in MAIL.BOX and determines where to send the message for
each recipient. The Router checks its routing table to calculate the next "hop" for the
message on the path to its recipients and determines the appropriate protocol -- either SMTP
or Notes routing -- to transfer the message.
Using SMTP routing, the Router connects to the destination server -- the recipient's mail
server, a relay host, a smart host, or one of the servers in the recipient's Internet domain
-- and transfers the message.
Using Notes routing, the Router moves the message to the MAIL.BOX database on the
server that is the next hop in the path to the recipient's mail server. The Router on that
server transfers the message to the next hop, until the message is deposited in the
MAIL.BOX database on the recipient's home server.
5.
The Router on the recipient's server finds the message (in MAIL.BOX on a Domino server) and
delivers it to the recipient's mail file.
6.
Using a mail client, the user retrieves the message from the mail file. Depending on the type
of mail client, one of the following protocols is used: Notes remote procedure calls, IMAP,
POP3, or HTTP.
What is NNN
Ans:-6. The Domino Server Setup program automatically places all servers that are in a Domino domain and
that run the same network protocol in the same Notes named network (NNN). In the Server document, the setup
program assigns each NNN a default name in the format portname network.
After you complete the Server Setup program, rename the NNN for each network port in the Server document.
It is useful if the name reflects both the location of the network and its protocol. For example, if your company
has a TCP/IP network and has LANs in Boston and San Francisco, change the name of the NNN in Boston to
"TCPIP Boston network," and change the name of the NNN in San Francisco to "TCPIP SF network."
Caution Domino assumes that all servers in a NNN have a continuous LAN or WAN connection. If this is not
the case, serious delays in mail routing between servers can occur. Be careful not to include servers with only
dialup connections in an NNN.
Physical security
Physically securing servers and databases is equally as important as
preventing unauthorized user and server access. It is the first line of
defense against unauthorized or malicious users, by preventing them
from having direct access to your Domino servers. Therefore, we
strongly recommend that you locate all Domino servers in a ventilated,
secure area, such as a locked room. If servers are not physically secure,
unauthorized users might circumvent security features for example,
ACL settings and access applications directly on the server, use the
operating system to copy or delete files, or physically damage the server
hardware itself.
Physical network security concerns should also include disaster planning
and recovery.
Security
Network security
The goal for securing your network is to prevent unauthorized users
from gaining access to servers, users, and data. Physical network security
is beyond the scope of this book, but you must set it up before you set up
Notes and Domino connection security. Physical network security is
established through the use of devices such as filtering routers,
firewalls, and proxy servers that enable network connections for
various network services (such as LDAP, POP3, FTP, and STMP) that
you want to provide for your users. Network connection security access
is also controlled using these devices, as you can define what connections
can be accessed, and who is authorized to used them.
Properly configured, these devices prevent unauthorized users from:
Breaking through into the network and accessing the server via the
operating system and its native services (such as file sharing).
Impersonating an authorized Notes user
Eavesdropping on the network to collect data
Server security
The Domino server is the most critical resource to secure and is the first
level of security that Domino enforces after a user or server gains access
to the server on the network. You can specify which users and servers
have access to the server and restrict activities on the server for
example, you can restrict who can create new replicas and use passthru
connections.
Application security
Once users and servers gain access to a Domino server, you can use the
database access control list (ACL) to restrict access that specific users and
servers have to individual Domino applications on the server. In
addition, to provide data privacy, encrypt the database with an ID so
unauthorized users cannot access a locally stored copy of the database,
sign or encrypt mail messages users send and receive, and sign the
database or template to protect workstations from formulas.
Application design element security
Although users may have access to an application, they may not have
access to specific design elements in the application for example,
forms, views, and folders. When designing a Domino application, an
application developer can use access lists and special fields to restrict
access to specific design elements.
Workstation data security
Notes users may keep and use important applications and information
on their workstations. This information can be protected through the use
of an execution control lists (ECL), which defines the access that active
content from other users has to the user workstation.
"Active content" includes anything that can be run on a user workstation, including formulas; scripts; agents;
design elements in databases and templates; documents with stored forms, actions, buttons, hot spots; as well as
malicious code (such as viruses and so-called "Trojan horses").
There are two kinds of ECLs: the Administration ECL, which resides in the Domino Directory (NAMES.NSF),
and the workstation ECL, which is stored in the user's Personal Address Book (NAMES.NSF). The
Administration ECL is the template for all workstation ECLs. The workstation ECL is created when the Notes
client is first installed. The Setup program copies the administration ECL from the Domino Directory to the
Notes client to create the workstation ECL.
When active content runs on a user workstation and attempts a potentially harmful action -- for example,
programmatically sending mail -- the following occurs:
1. Notes verifies that the active content is signed and looks up the signer of the code in the workstation ECL.
2. Notes checks the signer's ECL settings to determine whether the action is allowed.
3. One of the following occurs:
a.
b.
If the signer of the code is listed in the workstation ECL and the appropriate setting
is enabled, the active content runs.
If the active content attempts an action that is not enabled for the signer, or if the
signer is not listed in the ECL, Notes generates an Execution Security Alert (ESA),
which specifies the attempted action, the signer's name, and the ECL setting that is
not enabled.
More Info -- to display a dialog box that provides information about the design type,
design name, Notes ID, signature status, and parent database of the code that caused
the ESA.
For example, locally scheduled agents, as well as manual agents, can generate ESAs. Click
"More Info" to get information about the agent that generated the alert.
Note The administration ECL has a setting that prevents users from changing their workstation ECLs. If this
setting is enabled, then the user's option to trust the signer is disabled.
2. From the Domino Administrator, select the People & Groups tab, and then open the Settings view.
3. Click "Add Settings," and then choose Security.
Action
Name
Enter a name that identifies the users (and, if you are a service provider, the
hosted organization) that use these settings.
Description
Action
No
Yes -- to allow users to use the same password to log in to both Notes
and the Internet.
Choose one:
No (default)
Note Internet password expiration settings are recognized only by the HTTP protocol. This means that Internet
passwords can be used with other Internet protocols (such as LDAP or POP3) indefinitely.
Caution Do not enable password expiration if users use Smartcards to log in to Domino servers.
7. If you enabled password expiration, complete these fields. Otherwise, go on to Step 9:
Field
Action
Enter the number of days a password can be in effect before it must be changed.
Enter the number of days users have to change an expired password before being
locked out.
Password history (Notes only) Enter the number of expired passwords to store. Storing passwords prevents
users from reusing old passwords.
8. Choose one of the following to specify Password Quality Settings for IDs:
Required password quality -- and then choose the quality level required when users
create passwords.
Use length instead -- and then enter a number from 0 to 16 to require that users
create passwords of a specific length.
Action
Admin ECL
The default administration ECL is the default value for this field.
Choose one:
Update Mode
New -- to create a new administration ECL. Enter the name of the new
ECL and choose options in the Workstation Security: Execution Control
List dialog box. The name of the new ECL appears in this field.
Choose one:
Refresh -- to update workstation ECLs with changes made to the
Administration ECL. If a setting appears in both the administration and
workstation ECL, the administration ECL setting overrides the
workstation ECL setting.
Update Frequency
Choose one:
Once Daily -- to update the workstation ECL when the client
authenticates with the home server and either it has been a day since the
last ECL update or the administration ECL has changed.
When Admin ECL Changes -- to update the workstation ECL when the
client authenticates with the home server and the administration ECL
has changed since the last update.
11 What is HTTPS
Ans:-11. HTTPS (Hypertext Transfer Protocol over Secure Socket Layer, or HTTP over SSL) is a Web
protocol developed by Netscape and built into its browser that encrypts and decrypts user page
requests as well as the pages that are returned by the Web server. HTTPS is the use of Netscape's
Secure Socket Layer (SSL) as a sublayer under its regular HTTP application layering.
Ans:-12&13. Before you request a certificate from a CA, you must create a key ring file to store the
certificates. A key ring file is a binary file that is password-protected and stored on the
server's hard drive. When you create a server key ring file (.KYR), Domino generates an
unsigned server certificate and automatically includes several trusted root certificates. The
unsigned server certificate is not valid until it is signed by a certifier. Domino also creates a stash
file (.STH) using the same name as the key ring file, but with the file extension .STH. Domino uses
the stash file to store the key ring file password for unattended access to the server key ring file.
2.
From the Notes client, open the Server Certificate Admin application on the server for which
you want to enable SSL.
3.
4.
Field
Key Ring File
Name
Key Ring
Password
Action
Enter the key ring file name. The default is KEYFILE.KYR.
It's helpful to use the extension .KYR to keep key ring file
names consistent.
Note the server's key ring file name appears in any
Internet Site documents that you have configured, or, if
Internet Site documents are not being used, on the Ports Internet Ports tab of the Server document. If you specified
a name other than the default, you need to edit the name
where it appears - in the Internet Site documents or in the
Server document.
Enter the password for the key ring.
Key Size
Specify the key size Domino uses when creating the public
and private key pairs. The larger the size, the stronger the
encryption.
Common name
Organizational
Unit
City or Locality
Organization
State or Province Enter the full name of the state or province in which the
certifier organization resides.
Enter the two-character abbreviation of country in which
Country
organization resides
5.
6.
After you read the information about the key ring file and distinguished name, click OK.
Notes creates the key ring file and stash (.STH) file and places them in the Notes data
directory on the client machine used to create the key ring.
7.
Copy the key ring file and stash (.STH) file to the Domino data directory on the server.
Caution You must ensure that the key ring password in the stash file is protected. The key
ring file password is altered in the stash file so that it cannot be recognized by a casual
observer, but it is not encrypted. You should not allow unauthorized persons access to either
the stash file or the key ring file. In the normal course of operation, only the server itself
should have access to those files; however, administrators may also need permission to
remove or replace the files. As with all server resources, managing proper file permissions
and protections is vital to the security of the system.
8.
Notes and the sender has access to the recipient's public key, the sender can encrypt the mail message. The
recipient's public key can be stored in the Domino Directory, in an LDAP directory to which the sender has
access, or in the sender's Personal Address Book.
Notes users can also use S/MIME to encrypt mail sent to recipients who use mail applications that support
S/MIME. Senders must have the recipient's public key in order to encrypt the message for S/MIME. The
recipient's public key is stored in an Internet certificate in either a Domino Directory or LDAP directory to
which the sender has access or in the sender's Personal Address Book. The sender must also have a crosscertificate that indicates to Notes that the recipient's public key can be trusted
Use the Certificate expiration view to determine which certifiers need to be recertified. Access this
view from Files - Certlog.nsf - By Expiration date. All certifiers are listed by expiration date.
Note To recertify a user ID using a certifier other than the certifier used to create the user ID, see
"Moving a user name in the name hierarchy" in this chapter.
To recertify a user ID
Follow these steps to use the Administration Process to recertify a hierarchical ID that is about to
expire.
1.
2.
From the Domino Administrator, click the People & Groups tab.
3.
4.
5.
Action
Do one of these:
Field
Server
6.
Field
New certificate expiration date
Only renew certificates that will
expire before
Edit or inspect each entry before
submitting request
7.
Action
(Optional) Specify a certifier ID
expiration date other than the default
two years from the current date.
(Optional) Enter a date to recertify
only a subset of selected user IDs,
according to their current expiration
dates.
(Optional) Select the option to edit or
inspect each entry before submitting
the request if you want to view each
certificate before it is renewed.
If you selected the option to view each entry prior to its being submitted, the Recertify
Person dialog box appears with non-modifiable information in the primary and common name
fields. Review the information that displays, then select one of the following:
OK - to submit the name change.
Skip - if you are recertifying more than one user ID and you want to continue to the next
without submitting a recertification for the current name.
Cancel Remaining Entries - to cancel this recertification, as well as those for any other
names you selected and have not yet submitted.
8.
When the Processing Statistics dialog box appears, review the information to verify that all
name changes have succeeded. Click OK. If any fail, check the Certifier Log (certlog.nsf) to
determine the reason for the failure.
Ans:-20. Replication is the process of synchronizing documents from the same databases on
different workstations or servers over time. Replication enables exchanging modifications between
special copies of databases called replicas .
Term
Definition
Replicator
Replica ID
Note: A database copy does not share the same replica ID as the original
database. Only database replicas share the same replica ID.
Unique Notes
Identification
Number (UNID)
Replication History A list of dates and times when two servers or a server and workstation
successfully replicated. The Replicator uses Replication History to determine
which documents are new, changed, or deleted since the last time the two
databases replicated.
The following table describes how information in databases is kept updated on all servers during
replication.
Server-to-server replication process
Stage
Description
The replicator compares its list of databases with the called server's list of databases to
determine which databases they have in common.
Working on one database at a time, the initiating server builds a list of ACL, design, and
document modifications that have occurred since the last time these two servers replicated.
The Replicator pulls (reads and writes) ACL and design and document changes, based on
permissions set in each server, database, and document.
Upon completion of replication with the first database, the Replicator updates the replication
history for that database and moves on to the next database in common. It repeats Stages
2 and 3.
When the initiating server has replicated all databases in common with the called server,
the Replicator will tag the called server's replicator to repeat the same process in the other
direction.
Workstation-to-server replication works differently since the workstation software does not have a
Replicator. In workstation-to-server replication, it is the workstation software itself that reads changed
documents from the database on the server and writes those changes to the local replica. The
workstation also pushes its changed documents to the database on the server. The server's
Replicator is not involved in workstation-to-server replication. As with server-to-server replication, the
ACL, design, and document changes are distributed based on server, database, and document
settings.
Ans:-21. During configuration, Notes creates a Connection document for your home server. Connection
documents reside in your Personal Address Book and store information Notes needs to access a server, such as
the server's full Domino name, Internet address, or telephone number. One server may have multiple
Connection documents if you access it in multiple ways, for example over the LAN at work and using a dialup
modem from home
Ans:-22 & 23.Yes
Ans:-24.Create Replica
Ans:-25. Following are several common reasons that replication fails:
No changes have been made. Replication occurs only when there are changes to replicate.
The database is not scheduled to replicate. See the topic on scheduling replication.
Replication is temporarily disabled for the database you're using. To enable replication, choose File Replication - Settings, click Other, and deselect "Temporarily disable replication."
The replica IDs of the two databases you want to replicate are not the same. (Databases with different
replica IDs cannot replicate.) Examine the replica ID for each database and make sure they match. If
the replica IDs don't match, create a new replica and then clear the replication history on any other
replicas to ensure that the next replication is a full replication.
The access control list on one of the replicas may have changed since the replicas were created so that
you no longer have the same access level to both replicas.
The destination server is out of hard disk space.
You replicate at a Notes Direct Dialup or Network Dialup location, and you see "Skipping replication
due to previous call failure" on the Replicator page. Check to see that your phone connection has not
been lost.
Ans:-26. When Domino receives an inbound SMTP message, it attempts to determine whether the message is
for a local recipient. When the Domino Directory does not include a Global Domain document, Domino accepts
only messages addressed to users in the same Internet domain as the server, as indicated in the Fully-qualified
Internet host name that appears in the Server document.
But if the Domino Directory includes a Global domain document, Domino can receive mail for multiple
Internet domains. To determine whether to accept a message, Domino compares the domain part to the local
primary Internet domain listed in the Global domain document. If it does not find a match in this field, it
examines the secondary Internet domains -- the "alternate Internet domain aliases" -- listed in that document.
The role of Global domain documents in determining whether to accept inbound SMTP
mail
If the Domino Directory contains multiple Global domain documents, Domino uses a similar process to
determine whether a recipient is local: it first checks the primary Internet domain in each Global Domain
document, and then, if it still hasn't found a match, it continues by checking the alternate Internet domains. If
the domain in the address does not match any of the domain entries in any Global domain document, the
message is considered an attempt to relay, and Domino rejects the message.
Inbound address lookup when the Domino Directory contains multiple Global Domain
documents
After Domino accepts a message, the Router attempts to match the recipient's Internet address to an entry in the
Domino Directory. When looking up the recipient in the Domino Directory, if the domain suffix in the address
matches an alternate Internet domain aliases defined in a Global Domain document, and no Person document
includes this address, the Router performs a secondary lookup. In this secondary lookup, the Router pairs the
local part of the address with the domain suffix of the primary Internet domain specified in the Global domain
document.
For example, a server receives a message for craig_bowker@acmewest.com. The Router searches all of the
Person documents in the Domino Directory for this Internet address, but cannot find a match. However, in the
Domino Directory, there is a Global domain document that includes the domain suffix acmewest.com as an
alternate Internet domain alias. In this same Global Domain document, the primary Internet domain is
acme.com. After the primary lookup fails, Domino performs a secondary lookup, using the address
craig_bowker@acme.com. Domino performs secondary lookups only if the Router is configured to perform
fullname, or fullname, then local part lookups.
In cases where the Domino Directory contains multiple Global domain documents, and a secondary lookup is
required, when replacing the domain suffix in the original address with the domain suffix of the primary
Internet domain, the Router only considers Global domain documents that list the alternate Internet domain
alias. That is, Domino always replaces the domain suffix from within a given document; it never replaces an
alternate domain listed in one document with a primary domain from another document.
To prevent the Router from using domain aliases when looking up addresses, do not include alternate Internet
domain aliases in a Global domain document. Instead, create multiple Global Domain documents, each
specifying a different primary Internet domain.
Enter
Ans:-27. To set up a server to receive SMTP-routed messages, you must enable the SMTP Listener. Then the
server can "listen" for SMTP traffic over the TCP/IP port (usually port 25) and receive SMTP messages in the
MAIL.BOX database(s).
Enabling the SMTP listener causes the server SMTP task to start up automatically every time the server starts.
Disabling the SMTP listener prevents the SMTP task from starting up when the server starts.
Note Do not add SMTP as a task to the task list in the NOTES.INI file or this feature will not work.
Enter
The server's complete combined host name and domain name, including the top-level
domain. For example, smtp.acme.com; smtp is the host name; acme is the secondlevel domain; and .com is the top level domain.
In the absence of a Global Domain document, the Router uses the entry in this field to
determine the local Internet domain. Typically, the fully qualified host name is added
to the Server document during server setup or by the Administration process
(AdminP). A routing loop can result if this field does not contain a valid entry.
Choose one:
Enabled to turn on the Listener so that the server can receive messages
routed via SMTP routing
Disabled (default) to prevent the server from receiving messages routed via
SMTP routing
Refer to "Reconfiguring the SMTP port" for more information about modifying the default SMTP port
settings.
Ans:-28. Non-adjacent domains are Domino domains that are not directly connected, but have an intermediary
domain, adjacent to both of them in common. For example, domain A and domain B are adjacent and have
Connection documents defining the route between them. Similarly, domain B, in turn, is adjacent to domain C
and mutual Connection documents exist between them; and domains C and D are likewise adjacent to each
other and linked by Connection documents. Domain B is thus adjacent to domain A on one side, and domain C
on the other; and domain C is adjacent to B and D, respectively. If no direct connection exists between A and C,
these two domains are considered to be non-adjacent domains. Similarly if there is no direct connection
between B and D, these two domains are also non-adjacent.
Because there is no direct connection between two non-adjacent domains, you cannot define the routing path
between them in a Connection document. Connection documents can only be used between two directlyconnected, adjacent domains. However, users in non-adjacent domains can send mail to each other by routing it
through the intermediary domain.
One way to do this is to use explicit addressing -- telling the Router how to reach the destination domain
through the intermediary domain by placing the entire routing path in the address field. For example, if Kathy
Burke in domain A wants to send a message to Robin Rutherford in the non-adjacent domain C, she addresses
the message by way of domain B, as follows:
Robin Rutherford@C@B
In processing the message, the Router on the domain A mail server looks only at the last part of the address, and
uses the Connection document to determine the route to domain B. The domain B server then uses the
Connection document in its Domino Directory to transfer the message to domain C.
Although the use of explicit addressing is an effective method for directing mail to non-adjacent domains,
because it relies on a complete knowledge of the inter-domain routing topology, it's also not a very practical
solution. This information is not readily available to a typical user. To simplify routing and addressing to nonadjacent domains, you can create a Non-adjacent domain document in the Domino Directory to define the path
between the non-adjacent domains.
Specifies a routing path to the non-adjacent domain by supplying next-hop domain information
Restricts mail from other domains from routing to the non-adjacent domain
Defines the Calendar server used to enable free time lookups between two non-adjacent domains.
Non-adjacent domain documents are only required to specify routing restrictions to a non-adjacent domain.
However, to simplify addressing on messages destined for a non-adjacent domain, it's useful to have a Nonadjacent domain document for that domain. Without a Non-adjacent domain document in the Directory, the
Router has no defined routing path to the non-adjacent domain. The Router can transfer a message to the nonadjacent domain if the recipient address uses explicit path routing
(User@AdjacentDomain@NonAdjacentDomain), but cannot transfer a message with a simple domain address
(User@NonAdjacentDomain). When explicit addressing is used the Router uses the Connection documents
between domains to calculate the path to the next-hop domain.
But when a Non-adjacent domain document is available, the Router obtains intermediary domain information
from that document. This eliminates the need for users sending mail to a non-adjacent domain to use complex,
explicit addressing. Thus, if domain A has a Non-adjacent domain document for domain C, when Kathy Burke
in domain A sends mail to Robin Rutherford in domain C, she uses the address Robin Rutherford@C (rather
than Robin Rutherford@C@B). Because the Router finds the intermediate domain information in the Nonadjacent domain document, the message is transferred successfully to domain C by way of domain B.
Enter
Domain type
The name of the non-adjacent Domino domain you want to route mail to.
The name of the intermediary Domino domain through which you want to route mail
for the destination domain. The current domain must have a Connection document to
this domain.
Also, the Domino Directory in the intermediary domain must have a Connection
document to the destination domain.
Domain description
5. Click the Restrictions tab, complete one or both of these fields, and then save the document:
Field
Enter
Enter the names of Domino domains adjacent to the current domain that are allowed to
route mail to this non-adjacent domain.
Leave this field blank to allow any domain to route mail through the local domain to
the non-adjacent domain.
Deny mail from domains Enter the names of Domino domains adjacent to the current domain that are not
allowed to route mail to this non-adjacent domain.
Leave this field blank to allow any domain to route mail through the local domain to
the non-adjacent domain.
Note You cannot use wildcards in the Restrictions fields. You must enter explicit domain names.
6. Create a Connection document to specify how servers in the current domain connect to the intermediary
adjacent domain.
Note Since, by definition, all servers in a domain use the same Domino Directory, only one Non-adjacent
domain document is required for each non-adjacent domain. You do not have to create a separate document for
each server.
Ans:-29. This process allows you to customize the type of information you want to collect and store
in the Mail Tracking Store database (MTSTORE.NSF). For example, you can exclude certain users'
mail from being collected, or you can restrict messages from being tracked by message subject.
1.
Make sure you already have a Configuration Settings document for the server(s) to be
configured.
2.
From the Domino Administrator, click the Configuration tab and expand the Messaging
section.
3.
Click Configurations.
4.
Select the Configuration Settings document for the mail server or servers you want to
administer, and click Edit Configuration.
5.
In the Configuration Settings document, click the Router/SMTP - Message Tracking tab.
6.
Field
Message tracking
Enter
Choose one:
Enabled to log message-handling activity
information in the Mail Tracking Store database.
Disabled (default) to not log any message-handling
information.
The names of users and/or groups whose messages
will not be logged and, therefore, cannot be tracked.
This field applies only to messages sent by the
specified person or group.
For example, to prevent administrators from tracking
messages sent by the Manager of Human Resources,
enter the manager's name in this field.
If you leave this field blank (default), authorized
administrators can track messages for all users and
groups on all servers that are enabled for mail
tracking.
Message tracking
collection interval
Allowed to track
messages
Allowed to track
subjects
If disk storage space is a concern, use database replication settings to control how many days'
worth of information the Mail Tracking Store database retains. The number of days restricts how far
back in time messages can be tracked, so choose a value that balances tracking needs and
available disk storage.
Ans:-30. A passthru server is a Domino server that connects to other Domino servers when a direct connection
can not be made. For example, if the server you are calling over a phone line does not have a modem, the
passthru server's modem can answer your call and connect to the server.
A passthru server can:
Connect to multiple servers with a single phone call (if you use a phone line and either a Notes Direct
Dialup or Network Dialup connection to access Notes from outside your organization)
Connect to servers behind a firewall at your organization (if you use cable or DSL to access Notes
from outside your organization)
Connect to servers on your LAN that use a different network protocol (for example, NETBIOS instead
of TCP/IP) from your computer, if the passthru server runs both protocols
Connect (hop) to other passthru servers as necessary until reaching a target server
A hunt group is a bank of phone lines that you can access using a single phone number. The phone lines that
make up this hunt group can be attached to several passthru servers. When you call a server, the hunt group
decides which phone line should take the call, connects to a passthru server, and finally connects to your
intended destination server. Large organizations with many passthru servers may use hunt groups to more
efficiently balance the load on servers.
For more information, ask your Domino administrator whether your organization uses passthru or hunt group
servers, and which Connection documents you need to take advantage of them.
Tip If your organization has at least one passthru server, specify it as your default server in your current
Location document. Create other passthru or Connection documents on the advice of your administrator.
For information on replicating using a passthru server, see To replicate with a selected server and To create a
call entry.
To create a new Connection document, click the "New" button and choose "Server
Connection."
To edit an existing Connection document, select the server and click the "Edit
Connection" button.
Ans:-32. Compact B (In-place with file size reduction):- Uses in-place compacting, recovers
unused space and reduces file size, unless there's a pending structural change in which case copystyle compacting occurs. If you use transaction logging, do full database backups after compacting
completes.
Compact C (Copy-style):- Uses copy-style compacting. Use this option, for example, to solve
database corruption problems.
Ans:-34.Refer Answer:-4.
Ans:-35.SMTP Listener Task
Ans:-36&37. The Administration Process is a program that automates many routine administrative tasks. For
example, if you delete a user, the Administration Process locates that user's name in the Domino Directory and
removes it, locates and removes the user's name from ACLs, and makes any other necessary deletions for that
user. If you want to delete all replicas of a database, the Administration Process finds the replicas on servers in
the domain and provides an interface for deleting them.
Name management tasks, such as rename person, rename group, delete person,
delete group, delete server name, recertify users, and store Internet certificate.
Mail file management tasks, such as delete mail file and move mail file.
Server document-management tasks, such as store CPU count, store platform, and
place network protocol information in Server document.
Roaming user management, such as roaming user setup, move roaming users to other
servers, upgrade a nonroaming user to roaming status, and downgrade roaming user
to nonroaming status.
User mail file management tasks, such as performing Access Control List (ACL)
changes and enabling agents. For example, the "Out of Office" agent is enabled and
disabled by Notes client users.
Person document management tasks, such as storing the user's Notes version and
client platform information.
Replica management tasks, such as create replica, move replica, or delete all replicas
of a database.
Administration servers
Administration servers control how the Administration Process does its work. You specify an administration
server for the Domino Directory and for specific databases. By default, the first Lotus Domino server you set up
in a domain is the administration server for the Domino Directory. The administration server for the Domino
Directory maintains the Domino Directory's ACL, performs deletion and name change operations in that
Domino Directory, and these changes are replicated to other servers in the domain. If you have multiple
directories in your domain -- not replicas of other domain's directories, but more than one of your own -- you
can specify an administration server for each of the directories in your domain. Do not specify an administration
server in your domain for a replica of another domain's Domino Directory.
All databases need an administration server to manage name changes and deletions that apply to the database -for example, changes to the ACL, Readers and Authors fields, or Names fields. If a database has replicas, you
assign an administration server to only one replica. Then the Administration Process makes all changes to that
replica, and replication for that database carries out the changes in all other replicas.
You can also set up one or more extended administration servers to distribute across multiple servers the
processing of administration requests that modify the Domino Directory.
Requests. The CA requests can be removed from the view or resubmitted for processing in the same manner as
the Administration Process Requests.
Ans:-40.
Directory Assistance
Directory assistance is a feature a server can use to look up information in a directory other than a
local primary Domino Directory (NAMES.NSF). You can configure directory assistance to use a
particular directory for any of these services:
Client authentication
Group lookups for database authorization
Notes mail addressing
LDAP service searches or referrals
You can set up directory assistance for a remote LDAP directory or a Domino directory. A remote
LDAP directory can be any remote LDAP-compliant directory, either one on a foreign LDAP directory
server or one on a Domino server that runs the LDAP service.
A Domino directory is a directory created from the PUBNAMES.NTF template and accessed via
NAMELookup calls. Servers can use directory assistance to do lookups in either local or remote
replicas of a Domino directory. A Domino directory configured for directory assistance can be a
secondary Domino Directory, an Extended Directory Catalog, or a primary Domino Directory.
A secondary Domino Directory is any Domino Directory that is not a server's primary Domino
Directory. A secondary Domino Directory can be a directory associated with another Domino
domain. A secondary Domino Directory can also be a Domino Directory created manually from the
PUBNAMES.NTF template that is not associated with a Domino Domain, used, for example, to store
and track Web user information.
An Extended Directory Catalog contains documents aggregated from multiple secondary Domino
Directories. A server must use directory assistance to look up information in an Extended Directory
Catalog, unless you integrate the Extended Directory Catalog directly into the primary Domino
Directory.
The primary Domino Directory is the directory a server searches first that describes the Domino
domain of the server. You can set up directory assistance for a primary Domino Directory, usually
to specify which replicas of primary Domino Directories that servers with Configuration Directories
can use.
Directory Catalogs
A directory catalog is an optional directory database that typically contains information aggregated
from multiple Domino Directories. Clients and servers can use a directory catalog to look up mail
addresses and other information about the people, groups, mail-in databases, and resources
throughout an organization, regardless of the number of Domino domains and Domino Directories
the organization uses. A directory catalog includes the type of information that is important for
directory services, and excludes other types of information that are part of a Domino Directory, for
example Domino configuration information, such as information in Connection documents.
You use a directory catalog in conjunction with, rather than instead of, the primary Domino
Directory and the Personal Address Book. A server searches its primary Domino Directory, and a
Notes client searches its Personal Address Book, before searching a directory catalog.
There are two types of directory catalogs: condensed Directory Catalogs and Extended Directory
Catalogs. Condensed Directory Catalogs use a unique design based on the DIRCAT5.NTF template
that enables them to be extremely small. Condensed Directory Catalogs are designed for use on
Notes clients. A condensed Directory Catalog on a Notes client is also known as a Mobile Directory
Catalog.
Extended Directory Catalogs use the same design as the Domino Directory, which is based on the
PUBNAMES.NTF. They are larger than condensed Directory Catalogs, but are the recommended
directory catalog for server use because they allow faster and more flexible directory lookups.
Servers can use a directory catalog for mail addressing, for processing LDAP service operations, to
look up client authentication credentials, and to look up the members of groups in database ACLs
when authorizing users' database access.
Ans:-41.Calcon
Ans:-42&43.Refer Answer 40
Ans:-46. The Agent Manager ( Amgr) is an internal Domino task responsible for the execution of various Domino
agents. Although agents are highly convenient, they are also very powerful and must be tracked. Agent Manager
debugging provides a more granular level of auditing than Agent Manager logging does. By enabling Agent
Manager debugging, a more in-depth audit trail of Agent execution will be recorded.
The Agent Manager debugging process will also report information on database activity in some cases. This will
include the creation of new documents, the modification of existing documents, and new mail delivery.
Rather than being reported to a database, Agent Manager debugging information is reported to the console only by
default. Administrators have the option to report debugging information to a text file by setting the "Debug_Outfile"
console variable.
It is recommended that certain Agent Manager debugging options be enabled. These options include:
'c': Debug control information.
'e': Agent Manager event information.
'l': Loading information.
'm': Memory manager information
's': Scheduling information
Ans:-47. In addition to the possibility that there are errors in the agent code, an agent may fail to
run properly because the agent has insufficient access or because the agent is not set to run on
the given server.
1.
Insufficient access in the database ACL can prevent an agent from running properly. For
example, a user may design an agent that copies selected documents from database A to
database B. If the user -- and by extension, the agent -- doesn't have Author access in the
ACL of database B, the agent runs, but it is not allowed to copy the documents. To determine
if this problem exists, examine the Agent Log for access errors after the agent runs
unsuccessfully.
2.
If an agent won't run on a particular server, check the Agent Restrictions on the Security tab
of the Server document. This section contains the "Run personal agents," "Run restricted
LotusScript/Java agents," and "Run unrestricted LotusScript/Java agents" fields that specify
who has access to run agents on the server. Although a user who has the appropriate access
in the database ACL may be able to create an agent on the server, without the appropriate
access in the Server document, the user can't run the agent.
You should also check the Server Access section on the Security tab of the Server document.
This section contains the "Only allow server access to users listed in this Directory," "Access
server," and "Not access server" fields, which allow and deny access to the server. Because
an agent inherits the access privileges of the person who creates it, the agent can't run on a
server for which its creator does not have access.
3.
Scheduling conflicts may prevent an agent from running. In the Server document, click the
Server Tasks - Agent Manager tab and check the "Daytime Parameters Start time/End time"
and "Nighttime Parameters Start time/End time" fields. Any time not specified in these fields
represents downtime; if a user creates a scheduled agent and specifies that it run during the
server's Agent Manager downtime, the agent will not run. Compare these fields in the Server
document to the time the agent is scheduled to run. If a conflict exists, change the Agent
Manager schedule on the server, or ask the user to reschedule the agent.
4.
If a LotusScript or Java agent terminates before completing its tasks, check the "Max
LotusScript/Java execution time" fields in the Server document. If a complex agent requires
more time than is scheduled, the Agent Manager terminates the agent before completion.
Ask the user to reschedule the agent to run at night, when the default maximum execution time is
longer; or increase the value of the "Max LotusScript/Java execution time" field in the Server
document, as needed. If neither of these solutions is practical, ask the user to rewrite the agent as
several smaller agents.
Ans:-48. Shows server status information including the server name, data directory on the server, time
elapsed since server startup, transaction statistics, and the status of shared, pending, and dead mail.
Ans:-49.Show Server
Ans:-50. Replicate servername [databasename]
Description: Forces replication between two servers (the server where you enter this command and the
server you specify). Use the server's full hierarchical name. If the server name is more than one word,
enclose the entire name in quotes. To force replication of a particular database that the servers have in
common, specify the database name after the server name. The initiating server (where you're currently
working) first pulls changes from the other server, and then gives the other server the opportunity to pull
changes from it. You can use this command to distribute changes quickly or to troubleshoot a replication or
communication problem.
needed:
load fixup [database] -F
When fixup runs against multiple
enabled. If this
When used without specifying the database to check, logs every database
suspected of being corrupted. The default is to log only when a database
problem is found and needs to be corrected.
load fixup [database] -N
Changes the way that fixup operates when a corrupted document within a
database is encountered. When this parameter is specified, any corrupted
documents found are not deleted. A typical use of this is to allow documents
to be copied to another database before fixup deletes them in an effort to
retrieve documents from a corrupted database.
load fixup [database] -Q
Instructs fixup to be less thorough in its checking for corrupted documents in
the database.
load fixup [database] -U
Changes unread document lists to the older R4 format. (Lotus recommends
that you do this only when requested by Lotus Support.)
load fixup [database] -V
Specifies to not check views for corruption.
Maintains changed views and full text indices as the data changes within the Domino
database.
load updall [database] -A
Performs an incremental update of an R4 site search database.
Ans:-53.
UPDALL will refresh the full-test indexes on all databases, UPDATE only refreshes those which are set to
immediate or hourly
UPDALL will purge deletion stubs
UPDALL can be run manually with options
UPDALL will delete unused view indexes
from the server console. PATH is the pathname to the database or databases you want refreshed. Options
include
There are loads of other options, which restrict the actions depending on database refresh settings.
Ans:-56. A Domino cluster is a group of two or more servers that provides users with constant
access to data, balances the workload between servers, improves server performance, and
maintains performance when you increase the size of your enterprise. The servers in a cluster
contain replicas of databases that you want to be
readily available to users at all times. If a user tries to access a database on a cluster server that is
not available, Domino opens a replica of that database on a different cluster server, if a replica is
available. Domino continuously synchronizes databases so that whichever replica a user opens, the
information is always the same.
IBM Lotus Notes clients can access all Domino cluster servers. HTTP clients (Internet browsers)
can access only Domino Web servers in a Domino cluster.
Workload balancing
When users try to access databases on heavily used servers, Domino can redirect the user
requests to other cluster servers that aren't as busy so that the workload is evenly
distributed across the cluster. Workload balancing of cluster servers helps your system
achieve optimum performance, which leads to faster data access.
Scalability
As the number of users you support increases, you can easily add servers to a cluster to keep
server performance high. You can also create multiple database replicas to maximize data
availability, and you can move users to other servers or clusters as you plan for future
growth. As your enterprise grows, you can distribute user accounts across clusters and
balance the additional workload to optimize system performance within a cluster.
Data synchronization
A key to effective clustering is setting up replicas on two or more cluster servers so that
users have access to data when a server is down or is being used heavily. Cluster replication
ensures that all changes, whether to databases or to the cluster membership itself, are
immediately passed to other databases or servers in the cluster. Thus, databases are
continuously synchronized to provide high availability of information.
Analysis tools
Using the cluster analysis tools, as well as the log file, the Monitoring Configuration and
Monitoring Results databases, and the server monitor, you can analyze cluster activity and
make any changes necessary to improve performance.
Ease of changing operating systems, hardware, or versions of Domino
When you want to change your hardware, operating system, or Domino release, you can
mark the clustered server as RESTRICTED so that requests to access a database on the
server fail over to other cluster servers that contain replicas. This lets you make changes
without interrupting the productivity of your users.
Data backup and disaster planning
You can set up a cluster server as a backup server to protect crucial data. You can prevent
users from accessing the server, but cluster replication keeps the server updated at all times.
You can even do this over a WAN so that the backup is in a different geographical location.
Easy administration
You can create a cluster with a few keystrokes. You can also add servers to a cluster, remove
servers from a cluster, and move servers between clusters with a few keystrokes. In addition,
you can drag and drop databases into a cluster and specify which cluster servers should
receive replicas. You can also create multiple mail replicas and roaming file replicas for users
when you register them, and you can monitor all the servers in a cluster simultaneously.
Use of any hardware and operating system that Domino supports
You can set up a cluster using the same hardware you use for your Domino servers. You do
not need to use special hardware to create a Domino cluster. In addition, the cluster can
contain servers that use any operating system that Domino supports.
There are several components that work together to make clustering function correctly. These
include:
The Cluster Manager
The Cluster Database Directory
The Cluster Database Directory Manager
The Cluster Database Directory Manager on each server creates the Cluster Database Directory
and keeps it up-to-date with the most current database information. When you first add a server to
a cluster, the Cluster Database Directory Manager creates the Cluster Database Directory on that
server. When you add a database to a clustered server, the Cluster Database Directory Manager
creates a document in the Cluster Database Directory that contains information about the new
database. When you delete a database from a clustered
server, the Cluster Database Directory Manager deletes this document from the Cluster Database
Directory. The Cluster Database Directory Manager also tracks the status of each database, such
as databases marked "Out of Service" or "Pending Delete."
When there is a change to the Cluster Database Directory, the Cluster Replicator immediately
replicates that change to the Cluster Database Directory on each server in the cluster. This ensures
that each cluster member has up-to-date information about the databases in the cluster.
Ans:-58. By default, the Domino mail system employs a message-based model for mail storage,
delivering a separate and complete copy of every document to each recipient's mail file. When a
message is small or is addressed to only a few recipients, creating multiple copies of a message
does not consume much additional disk space. But when a large message is broadcast to
thousands of users on a single server, creating a separate copy of the message for each recipient
can consume several gigabytes of disk space.
To use disk space more efficiently, you can set up shared mail on each mail server after you set up
the Domino mail system. Shared mail, sometimes referred to as the Single Copy Object Store
(SCOS), offers an alternative to message-based mail, allowing servers to store a single copy of
messages received by multiple recipients in a special central database, or object store. Every
server using shared mail contains one or more of these object stores, or shared mail databases, to
hold all shared messages. After you enable shared mail on a server, all mail databases on the
server automatically use the shared mail database to store the content of new messages, unless
you explicitly exclude a database from using shared mail. You do not need to configure each user's
mail file individually for shared mail use.
When shared mail is enabled and an incoming message is addressed to multiple local recipients,
the Router divides the message into a message header and message body. The header includes
the message's To, cc, bcc, Subject, and From fields. The body includes the text and other content,
as well as any file attachments. The Router then writes the message body to a shared mail
database and the message header to each recipient's mail file. The message body stored in the
shared mail database contains an object store link, which identifies all of the mail files linked to
that message. Similarly, the corresponding message headers stored in each recipient's mail file
each contain a pointer to the object store that contains the message body.
To keep shared mail databases small, Domino automatically purges the shared portion of a
message from the shared mail database after all recipients delete the message from their mail
files. Domino purges the shared portion of these obsolete messages immediately; you do not have
to wait for a task to run before a message can be removed.
To improve efficiency and support encryption, Domino excludes certain messages from the object
store. Users always receive messages smaller than one kilobyte (1 KB) as complete messages. This
guarantees that message pointers in a mail file never exceed the size of the message body in the
shared mail database. In addition, users always receive complete messages if instructions in their
Person documents specify to encrypt incoming mail.
Using a shared mail database is completely transparent to users. When a recipient opens a
message, the link between the mail file and the shared mail database causes the message to
appear in its entirety. Users can delete, reply to, change the view or folder, edit, save, resend, and
perform all the same tasks on a mail message stored in a shared mail database as they would with
the same message stored in their own mail files. If a users edit and save, or encrypt and save a
message, the complete message is then stored in their personal mail file, with no effect on how the
original message appears to other users.
Shared mail works for all messages, regardless of the mail client used to compose the message.
That means that users who use a POP3, IMAP, or Notes mail client and who have a mail file on the
Domino mail server can all use shared mail. However, shared mail is not used if the various
recipients have different format preferences for incoming mail. For example, if a message is sent to
four users, half of whom have Notes rich text format specified as their format preference, and half
whose format preference is set to MIME, all of the users receive the complete message.
The Router on a server receives a mail message addressed to two or more recipients whose
mail files are on that server.
The Router splits the incoming message into two parts: the header and the content. The
header consists of the message's To, cc, bcc, Subject, and From fields. The content contains
the body of the message, along with any file attachments.
Note If the combined size of a message and its attachments is 1KB or less, Domino delivers
the complete message to the recipient's mail file and does not use the object store.
3.
The Router stores a copy of the header in each recipient's mail file and stores a single copy of
the content in the shared mail database.
4.
When a recipient opens the message, the header activates a link to the message content,
which is stored in the shared mail database. The message appears as though the entire
message is stored in the recipient's mail file.
5.
If the recipient deletes a shared message, Domino deletes only the header in the recipient's
mail file. The content is not affected because it is stored in the shared mail database.
6.
After all of the recipients delete the message header from their mail files, Domino
automatically purges the obsolete message, including the content in the shared mail
database.
If a user edits and saves a received message, Domino stores the revised message in the user's
mail file in its entirety and deletes links between the user's mail file and the message body in the
shared mail database.
From the Domino Administrator, click the Configuration tab and then expand the Server
section.
2.
Select the Server document to be edited and then click Edit Server.
3.
4.
Enable or disable the use of shared mail by completing the following field:
Field name
Shared Mail
Enter
Choose one:
None - The server does not use shared mail.
Delivery - The server uses shared mail for messages
delivered to multiple local recipients.
Transfer and delivery - The server always uses shared mail.
5.
For each shared mail directory you want to create, complete the following fields and then
click Save & Close:
Field name
Directory
Enter
The full path to the shared mail directory. For example:
C:\LOTUS\DOMINO\DATA\SHAREDMAIL
If the directory you specify does not exist, Domino creates it
for you.
Number of files
Maximum
directory size
Delivery status
Availability
6.
To put the new configuration into effect, restart the server or enter the following command at
the server console:
ShowSCOS
Whats is bookmark.nsf
roles
Whats is ods version open disk structure 41,43
Whats is dhcp
Whats is dns
Whats is flat system
Whats is wins
Whats is biz
Whats is ntbackup
Whats is location and connection
Whats is dnn
Whats is mail.box
user create and resetting password
names.nsf----group added ---you are not authorised to
Difference between nsf and ntf
printer configure
Difference between location and connection document
in laptop user getting mails in all document not in inbox
ntfs fat 32 dhcp dns