I. Overview of RedRak Professional Features
Here is an overview of several of the most popular and useful RedRak Professional features. For detailed step-by-step instructions, simply click the button for online help and search for key words.
Complete set-up and configuration without a monitor or keyboard.
Fully configure and control RedRak on hardware which has a network connection but no monitor or keyboard. This can be done through any client station which has an HTML browser running (any PC, Mac, or Network Computer already up on your network).
Console support without a network (direct attachment of monitor and keyboard)
Configure RedRak on a stand-alone machine without a network. The console option works with any monitor or keyboard attached to your server hardware.
Load over existing Red Hat® Linux 5.2 systems
For already installed Red Hat® systems with the same operating system kernel version as RedRak, your user and machine configurations can be migrated to RedRak.
Enabling features in pre-installed Red Hat® Linux 5.2 systems
After loading over already installed Linux systems, the network administrator can determine which RedRak features they want to enable. Network administrators may have some "subtle" tweak that they would like to preserve and this feature allows for that possibility. The RedRak Web configuration interface allows for direct editing of all system configuration files as well as updates through the higher level RedRak administration GUIs.
Online help
When you need help, click on the button in the top-right corner of the RedRak interface. You can locate needed information many ways, including using a powerful search engine.
Online tutorial
This is a brief overview of the RedRak interface designed to get you started on the software.
Command line interface for experienced users
Experienced Unix users can always access the command line. The command line option allows you to add new software and applications to your system.
User override via command line of any GUI operation
Since experienced Unix users may have certain preferences for their configurations, RedRak allows any GUI operation to be overridden through the command line. The user has the ability to directly manipulate the files that RedRak normally manages.
Heterogeneous clients
RedRak supports heterogeneous systems consisting of Macintosh, Windows 95/98, Windows NT, and Unix clients, making it a valuable tool in all normal business environments.
Built-in packet filter firewall
The RedRak firewall restricts access between your internal network and external networks (such as the Internet).
Simplified firewall configuration with common rules and exceptions
Firewalls are configured with specific access rules. RedRak has pre-configured common rules and common exceptions to those rules that help you select the type of traffic to block. Experienced users can create a custom firewall or modify the common rules and exceptions.
Network Address Translation (NAT)
Network address translation hides your internal IP addresses from the outside world. All external traffic appears to be coming from the IP address of the machine with NAT, making it much harder for hackers to get to your internal machines
Firewalls on all interface connections
Firewalls can be defined for each individual interface for optimum network security. Although usually applied to Ethernet devices, RedRak allows firewalls to be applied to modems and HDLC devices. The firewalls can all be independent of each other with distinctly separate rules.
Set up your RedRak for Internet routing
This function allows you to customize the routing of network traffic through RedRak. A router "knows" the structure of your network and is able to direct traffic between machines.
Support for multiple network interfaces
Network interfaces allow you to connect RedRak to a network. Supported interfaces include Ethernet, routers, serial devices such as modems, and high-speed connections such as T1, T3, ADSL, HDLC, and cable modems.
Ability to dial-out on demand from network
Set up a dial-up connection to connect your RedRak server to another network with a modem or serial connection.
Ability to connect to Internet using any external device
RedRak allows you to use any external device such as analog modems, cable modems, and DSL modems, as well as CSU/DSU driver for the T1 interface to access the Internet.
Ability to accept dial-in connections
In addition to dialing out, you can use a dial-in connection to allow an outside network or individual to connect to your network.
Internet Web server
Internet Web servers are accessible globally.
Intranet Web server
Intranet Web servers are only accessible to people inside domains served by RedRak.
Perl and CGI support
The Web server delivers Perl and CGI scripts.
Allow users to create their own Web pages
All user Web page URLs begin with the same information and end with user name.
Create/Edit/Delete Web site configurations
Configure and manage multiple Web sites from one RedRak server.
Control access to a Web site
Allow or deny access to Web sites on RedRak to a group of users, domains, IP addresses, or a RedRak machine group.
Create/Edit/Delete MIME Types
A MIME type associates a data file with a program application that can view that file. RedRak helps you easily create, edit, or delete MIME types.
Optional SSL security
In the U.S you can install a Secure Sockets Layer (SSL) software package onto RedRak if you upgrade to a secure Web server.
Front Page extension support for Web publishing
RedRak supports Front Page extensions.
IMAP mail server
Allows a user to read and download only messages of interest, and leave the rest on the server until later.
POP mail server
Requires that users who are reading their mail download all of their messages to their local computer.
Add or delete email aliases
Easily add or delete email aliases. An alias allows you to redirect email from a unique alias to one or more email accounts. For example, mail sent to "administrator" alias could be redirected to your email alias.
Block unwanted mail (spam)
Block the reception of unwanted mail from specified domains, host names, or email addresses.
Supports authenticated FTP
Authenticated FTP requires the user to have an account and a password on RedRak in order to make the connection. The user can access only those parts of the file system they have permission to read.
Use anonymous FTP
Allows an anonymous user to access only what you want them to access.
Supports FTP site message
The message option provides two messages. Either a "Welcome" message appears when FTP users connect to your server to welcome them, or a "Too Many Users" message appears when the number of users currently trying to connect exceeds the specified limit.
Internal news server
An internal news server only receives and transmits news within domains served by RedRak.
External news server
An external news server receives and transmits news from external news feed servers.
Add/Delete news groups
Specify which news groups you would like to make available on RedRak.
Control access to news groups
Allow or deny specified domains or IP addresses access to the RedRak news server
Send Mail to/from a news group
Send news group postings to or from an email address or local alias.
Public (external) discussion groups
Similar to a bulletin board, using HTML and a web browser rather than the newsreader to view entries. It is part of the Front Page Extensions package.
Authenticated discussion groups (private and public)
Members-only discussion groups. User must be a member in order to participate.
Heterogeneous client environment
The RedRak FileServer allows you to share files, disks and CD-ROMs across Unix, Windows and Macintosh clients.
Volume management
A volume is a finite-sized, named storage area existing on one or more hard disks. Volumes can be one of several types normal, Raid 0 (mirror), Raid 1 (stripe), RAID-5, and noncontiguous. A normal volume uses one contiguous area on one disk. A stripe is a way of storing files across more than one disk. A mirror duplicates the same information on two or more disks. A RAID-5 array duplicates data on "n" disks over "n+1" disks. The redundancy in mirrors and RAID-5 arrays allows reconstruction of the data on a failed disk in the array without any data loss. A noncontiguous volume contains two or more noncontiguous areas across one or more disks. RedRak volume management allows you to create, modify and reconfigure volumes.
Quota management
RedRak allows you to set up quotas on volumes. For example, you can create a volume of 1 GB (gigabyte) with 100 MB (megabyte) quota, so that no one user takes up more than 100 MB of space on that volume. Quotas can be assigned on a user or group bases, or by service, such as email or Web. You can send users warnings when quota limits are reached, or even set "soft limits" to warn users that they have seven days to delete files or to have their quotas increased.
RAID is supported
Users have the option of choosing Linear (no RAID), Striping (RAID 0), Mirroring (RAID 1) or RAID 5.
Selectable file sharing
Allows you to share Windows files only to Windows clients, Macintosh files to only Macintosh clients and/or Unix files to only Unix clients.
Access rules
The point and click interface helps you quickly define the access rules for the owner, the group users and the general users of any file. You have the option to restrict access to the file only to certain machines in the network.
Sharing removable media
RedRak allows you to share removable media such as floppy disks, CD-ROM disks, and Zip and Jazz disks.
Supports local printer
This means the printer is physically plugged into either the serial or parallel port on the back of the server machine. If the printer does not have an Ethernet interface you must connect it locally.
Supports remote printer
This refers to any printer on your Local Area Network (LAN) not directly connected to RedRak.
Cross platform printing
The print server allows sharing of the printer across Unix, Windows and Macintosh clients.
A domain name server is a computer program that maintains a table for translating host names (such as frontdesk.localdomain.com) to IP addresses (such as 133.25.25.71) and IP address to host names. Anytime you send an email or surf the Web, this translation is used. DNS server features include:
Server option
This refers to the online help the server provides for any computer making a DNS request. The computer making the request is known as client.
Client option
This is what RedRak does to look up names that it needs. In this case RedRak is the client, the originator of the request.
Specifying DNS names and IP addresses
RedRak allows you to specify the host names/domain names by which your server is known on the Internet, on an AppleTalk network, and within a Windows work group.
Managing DNS domains
You can set up and maintain DNS domains that your RedRak serves. The first domain is created at initial set up. Other domains and subdomains can be added at any time.
The Dynamic Host Control Protocol (DHCP) centralizes the process of setting up and identifying network clients in the RedRak server itself. As the DHCP server, RedRak holds the identity (i.e. TCP/IP address) of all machines on your network. DHCP server features include:
Static IP address assignment
You provide the IP address for a machine. It is only for this machine and cannot be assigned to any other machines.
Dynamic IP address assignment
DHCP server leases an IP address to the machine from an assigned range of IP addresses. These addresses cannot be the same as static assignments.
RedRak as a DHCP Client
RedRak can be configured to act as a DHCP client on a network which assigns IP addresses dynamically. This is typically how you connect to a cable modem network.
RedRak can function as an LDAP server. This means that people can search for users and the personal information that you make available, such as name, address, email address, etc.
Security
You can control access to the LDAP server by specifying who can search the LDAP server.
You can set the RedRak clock to synchronize with other RedRak, Unix, or Windows machines on the network. This RedRak is then called the Network Time Protocol (NTP) server. The NTP server helps improve accuracy. You can allow or disallow other machines to use this RedRak as a time synchronization source.
RedRak can function as a remote X-application server that allows you to run an application on the RedRak host but have it display on a remote computer. This requires that the remote computer be capable of displaying an X window application and that the remote computer allows the RedRak to display the application.
Backup and restore server
You can backup data from and restore data to the RedRak server.
Backup and restore client machines
You can backup data from and restore data to client machines in the domains maintained by the RedRak server. The client machines must support TAR (Unix), CIFS (Windows), or FTP (all client types) access.
Restore to any machine on the Network
You can restore data to the machine from which it was backed up, to the RedRak server, or to a new machine that did not originally hold the data.
Scheduled backups
There are two ways to perform backups: immediate one time backups or scheduled backups. Scheduled backups can be used to back up on a regular cycle or at a future date and time.
Support for full and differential backups
A full backup will back up all the specified directories. A differential backup will back up any data that changed in the specified directories since the last full backup.
Levels of software compression
Software compression compresses the data being backed up so that it takes up less space on the backup media. A higher compression has the advantage of taking up less space on the backup media, but has the disadvantage of requiring more time to run or restore the backup. RedRak allows you to choose the level of software compression best suited to your needs.
Configure and manage users
RedRak allows you to assign defaults and privileges for all users on your network. A user is someone who needs to access the resources controlled by RedRak. Users and their options can be easily added, edited or deleted.
Configure and manage user groups
A group is a convenient way for one name to refer to a list of users. Users can become members of up to 16 groups.
User defaults allow for easy creation of new users
Create default settings to apply to new users. Default settings include: enabling the account, setting administrator access, providing space on the file system, letting users log on to the Unix shell, enabling dial-in (if supported), allowing the posting of Web pages, and enabling email.
User groups for file sharing and mailing lists
For a set of users who should need to read a particular set of files (e.g., financial records), you can put them into a group called "finance," and give that group special privileges to read files which pertain to financial records.
Email options for forwarding and aliasing per user
RedRak allows you to forward the email of any user. Account aliasing lets you specify additional names for each user other than their logon name. This is especially handy if you have more than one domain in your network.
Enable/disable user functions
Several functions such as dial-in, mail, etc., can be enabled or disabled on a per user basis. This allows you more control over network resources.
Password policies to force users to choose better passwords
A password can be required to access mail, news, Web pages, or a Unix shell. You can specify the criteria for legal user passwords, such as password length and character content, in order to implement good security policies. A special "crack" dictionary, listing commonly guessed passwords is available to validate the acceptability of individual passwords.
Intelligent "user deletion page" transfers files/email
When a user is removed from your network, you can specify where the files on their personal directories and their (incoming and stored) email should be transferred.
Support for multiple network interfaces
Network interfaces allow you to connect RedRak to a network. Supported interfaces include Ethernet, routers, serial devices such as modems, and high-speed connections such as T1, T3, ADSL, HDLC, and cable modems.
Ability to dial-out on demand from network
You can set up a dial-up connection to allow you to connect your RedRak server to another network with a modem or serial connection.
Ability to connect to Internet using any external device
RedRak allows you to use any external device such as analog modems, cable modems, and DSL modems, as well as CSU/DSU driver for the T1 interface to access the Internet.
Ability to accept dial-in connections
In addition to dialing out, you can use a dial-in connection to allow an outside network or individual to connect to your network.
Browser-based server management for administrators and users
All RedRak functions and features are accessible through a Web browser.
Access control and authentication of Telnet and dial-in users
Control Telnet and dial-in permissions on a per user basis.
Access control of volumes at user, group, and machine level
Control file and volume access permissions at the user, group, and machine level.
Multiple administrator levels
There are three levels of users in RedRak: network administrators, local administrators, and regular users. The network administrator has more system permissions than other users.
Secure server login through Web page (with optional SSL)
Only authenticated users of the network can access the RedRak pages.
Automatic maintenance software
When System Check is run it determines how your system is functioning: if problems are found RedRak suggests solutions. The online help lists all possible system check messages. System Check should be run before a commit is performed to ensure that you will not loose anything. If you are experiencing systems problems, the system check will diagnose, suggest fixes and take you to the pages where you can make the appropriate fixes.
Migration tools (move user and machine information from an old network)
If you select the "install over" option, the migration tools will be used after RedRak Install is complete to configure most user and machine information saved from your prior installation. NOTE: because of encryption, it is not possible to migrate passwords.
Choose conditions which will cause an alert
RedRak comes with a predefined set of alert conditions from which you can choose those that apply to your situation.
Specify who receives alert notifications
Specify who is to be notified in case of a particular alert condition.
Choose how the alert notifications will be sent
Choose to send the alert notification in any or all of three ways: email, a Windows message pop-up (Windows machine only), or a red bar appearing at the top of the RedRak interface. Through the email alerts interface, alerts can be sent to many PCS phone and pager systems so you are always notified of problems.
The System Check is a tool that can be run in two ways: on a pre-committed system, or on a committed system when there is a problem as a result of a commit. Running the System Check on a committed system is a more thorough check than the one performed on a pre-committed system. The following information is displayed in the System Check Report:
Severity
Three severity levels can be displayed, and the report prioritized by severity. They are Fatal (subsystem will not function), Error (subsystem performance will be affected) or Warning (for your information)
System
Describes the subsystem in which the error has occurred.
Message
Description of the error.
Fix
What to do to fix the problem.
Actions
Allows you to fix each problem shown in the problem report by clicking the "action" icon.
The traffic monitor tracks incoming traffic to your site and outgoing traffic (user visits) to external Internet sites including Web sites, FTP, Telnet, Mail, etc. The traffic monitor features include:
Ability to monitor network traffic by user, destination and machine
Monitor the traffic in two ways: who hits which sites or which sites are hit by whom. The first option reports the user name, machine from which the sites were hit, how often, and when. The second option reports each site/URL visited, which machines hit the site, how often and when.
Graphical representation of network traffic
Obtain a graphic view of the hit distribution which tells you when the hits occurred.
Ability to connect to destination URLs during traffic monitoring
While traffic monitoring is in progress you can connect to destination URLs.
Ability to exclude sites from the report
You have the option to exclude sites from the report. For example, you can exclude sites required to do the job.
Current Users Report
This report shows who is currently logged into RedRak.
Users Report
Gives an overview of user characteristics such as full name, primary group, email aliases, whether dial-in enabled, etc.
Machines Report
Gives an overview of information listed for all machines such as machine name, domain name, IP address, etc.
System Log Reports
These reports categorize and log RedRak messages on various subjects, including security/authorization, backup, and mail.
Web Server Access (Usage) Report
This report measures which Web sites on the RedRak have been visited by outside resources.
Mail Log Report
This report shows the number of emails that a person has sent or received. Also use this report to determine other email information, such as who a user is sending email to or receiving email from, the size of the email, when it was sent or received, and if a piece of email has been sent to more than one person. This report can not only be used in checking mail traffic but also controlling spam (unwanted mass email).
Backups Report
This report summarizes the information contained in the backup log such as the machine that was backed up, directories and subdirectories backed up, the size of the data backed up etc.
Volumes Report
The volumes report summarizes information about the volumes attached to your RedRak such as Name, Size (MB), Capacity, and Description.
Network Report
The Network report summarizes information about your network, and is organized in four tabs: General, DNS, Router, and Interfaces.
News Report
This report shows News group usage and Unwanted News group data for the previous day.
Check your system configurations, binaries, and applications against the RedRak standard configuration
The repair system allows you to interactively reinstall parts or all of your installation and configuration quickly to get back up after any system upset because of hardware, software, or virus failure.
Check your RedRak disk for errors
Use this if your RedRak will not boot or reboot. Disks are automatically repaired if needed.
Reboot
Use this to conveniently reboot your machine.
Restore a backup of an old RedRak configuration
Use this to restore an old RedRak configuration.
Reset system password
Use this if the administrator has lost the system password.
Reconstruct
Use this to repair a damaged mirror of the System Volume.
Personal page for each user
The Personal page of the RedRak Software provides a way for both system administrators and users to quickly locate personal information, such as their personal Web pages.
Personal hotlinks
All users can create and edit their own personal "hotlinks", customizable bookmarks, which can include your favorite Web links as well as your most-often used RedRak functions (mail addresses, applications to be launched, URLs). Each user only sees the base level of hotlinks in their own personal directory.
Global hotlinks
System administrators create and edit these hotlinks for all users to view and use.
Files management
This list takes you to each of the file paths available to you through the interface. System administrators can access root, which gives access to the entire file system. The file manager can view and launch applications on clients through the client's browser based on file MIME type (this is the extension on the Windows operating system). The files manager supports direct editing of text files and upload of files from the client browser to the RedRak file system.
Supports concept of "machines"
The concept of machines is used to manage devices on your network. Machines have properties such as IP and MAC addresses, who is responsible for them, aliases, groups, and domains.
Machines can be grouped together
You can create and edit groups of machines. Groups are a convenient way to have one name refer to a list of machines. For example, if there are machines that are important to back up, you might want to put them into a group called "backup", and give that group special privileges or you might want to group together machines that have Internet access, or those belonging to a particular department.
Server transfers setup information to other servers (master/slave mode)
Each network has one master, but it can have many slaves. Slaves can be set up to handle specific processing functions such as file sharing or back ups. Configuration information, such as password policies, can be passed from master to slaves. Other set up information can be passed from slaves to the master.
New packages or Red Hat® Package Managers (RPMs) can be added to your server
RedRak can organize and make packages available to users. A package is a set of files that either comprise a Unix application or provide support for an application (e.g., "libraries")
Set up a default FTP location for package downloads
RedRak allows you to choose your favorite location into which to pull
down new packages.