Ref: 99960021
Title: 3+Share Version 1.4 Addendum to the 3+ Admin Guide
Date: 08-01-88

Copyright 3Com Corporation, 1991.  All rights reserved.


3+Share Version 1.4
Addendum to the 3+ Administrator's Guide

Copyright c 3Com Corporation, 1988.  All rights reserved.
3Com Corporation
3165 Kifer Road
Santa Clara, CA 95052-8145

Published August, 1988

Copyright Statement
No part of this manual may be reproduced in any form or by any means
or used to make any derivative work (such as translation,
transformation or adaptation) without permission from 3Com Corporation
by the United States Copyright Act of 1976, as amended.

Changes are made periodically to the information herein; these changes
will be incorporated in new editions of this publication.  Contents
are property of 3Com Corporation.  All rights reserved.

3Com Corporation provides this user guide without warranty of any
kind, either implied or expressed, including, but not limited to, the
implied warranties of merchantability and fitness for a particular
purpose.  3Com may make improvements or changes in the product(s)
and/or the program(s) described in this manual at any time.

Trademarks
3Com, 3+, 3+Share, and 3Server386 are all registered trademarks of
3Com Corporation.  3Server3 is a trademark of 3Com Corporation.

Recognition
Manual by Maria Cherem and Nancy Newlin with special thanks to the 3+
version 1.4a product team.  Editing by Beth Dorrell.

This manual was produced in-house using 3+ for Macintosh (3Com),
Microsoft Word, and MacDraw (Apple) software with the Apple
LaserWriter Plus on a Macintosh netstation.

[Sysop's note: converted to ASCII for Ask3Com.  Some figures may have been
deleted.]


.H1;Welcome
This addendum to the 3+ Administrator's Guide explains the
installation and setup procedure and suggested implementation of the
new security features included in 3+Share version 1.4a.  You should be
familiar with 3+ services before you use the procedures in the
following pages.

Throughout the following pages you are referred to other 3Com
documentation which you must use in order to complete the installation
and setup.  The guides that are referenced are listed in the following
table.

Guide Necessary information

3+ Installation and Setup Guide Installing 3+ services and setting up
your 3+network. 3+Administrator's Guide General overview of
administrator guidelines such as naming conventions for network users.
LinkPlus Optimizer Installation Setting up the LinkPlus Optimizer.
Guide 3Server3 and 3Server386 Quick Setting up the 3Server386.
Installation Guide  3+ Network Tuning Guide Tuning a 3+ network. 3+
Messages Guide Checking error messages

.H1;Installing on a PC Server
This chapter explains how to install 3+Share version 1.4a on a PC
server.  If you want to install on a 3S/400 or 3S/401, refer to
Chapter 2.  Once you complete the installation on your server you can
proceed to Chapter 3 for information on the setup process.

.BR;Installation Tasks
.BR;Perform the following installation tasks in this order:

.BR;1. Install 3+Share version 1.3.1.
.BR;2. Modify the Admin user.
.BR;3. Install 3+Share version 1.4a.
.BR;4. Create 3+Share version 1.4a netstation startup diskettes.
.BR;5. Create 3+Share version 1.4a LinkPlus Optimizer startup diskettes.
.BR;6. Create 3+Share version 1.4a Start volumes.

NOTE:  If you have not already installed your hardware, use the
documentation that came with your hardware to set it up.  The
following procedures assume that your hardware is installed and ready
to use.

.BR;Task 1:  Install 3+Share Version 1.3.1
.BR;Your network hardware should be installed and operational before you
install your 3+services.

1  Select the PC server on which you will be installing 3+ services.

2. Complete all the procedures in Chapter 13, Installing 3+ on a PC
Server, of the 3+ Installation and Setup Guide  beginning with step 3
on page 13-2.

These procedures describe how you install 3+ and set up a standard
network configuration.  Refer to the 3+ Network Tuning Guide to modify
the configuration.

.BR;Task 2:  Modify the Admin User
.BR;Now you must modify the pre-installed admin user on your network.  The
admin user allows you to log in and out of the network and allows you
to add users to your network.

1. Complete the procedure in the section titled Modifying the Admin
User, pages 9-1 through 9-5, in the 3+ Installation and Setup Guide.

NOTE:  Be sure to assign the name Admin for the user's home directory
as suggested in step 11.

.BR;Task 3:  Install 3+Share Version 1.4 a
.BR;Now you are ready to install 3+Share version 1.4a.

1. Restart your server.

The server menu displays.

2. Type 5 to select the Exit to DOS option.

3. Insert the 3+Share Version 1.4 a Installation #1 diskette into disk
drive A:.

4. From the DOS prompt type:

   A:

5. Then type:

   install

The installation program prompts you for the 3+Share Version 1.4a
Installation #2 diskette.  After installation is complete, you are
returned to the DOS prompt.

6. Restart the server.

The server menu displays.

7. Type 1 to select the Start up as a Dedicated Server option .

NOTE: 3+Share version 1.4a requires more memory than 3+Share version
1.3.  You may encounter memory limitation errors on bootup, after
installing 3+Share version 1.4a.  Refer to the 3+Network Tuning Guide
to adjust server parameters and free up more memory.

.BR;Task 4:  Create 3+Share Version 1.4a Netstation Startup Diskettes
.BR;Now that 3+Share version 1.4a is installed, you must create netstation
startup diskettes for your users.

1. Start up a netstation with the 3+Share Version 1.4a Netstation
Startup diskette in drive A:.

A screen with a list of available network adapters is displayed.

2. Select the appropriate adapter for your netstation.

3. Follow steps 2-11, pages 10-4 through 10-8 of the 3+ Installation
and Setup Guide.

In step 11, type N for No when the system asks you if you want to
create a START.BAT file.

4. Follow steps 12 and 13 on page 10-8 to make a copy of the
netstation startup diskette for each user.

This startup diskette allows the user to log in from any netstation.

.BR;Task 5:  Create 3+Share Version 1.4a LinkPlus Optimizer Startup
Diskettes
.BR;If you have a LinkPlus Optimizer adapter you must complete the
following procedure.  If you do not, go on to task 6.  This procedure
creates a special startup diskette that increases the amount of
available memory.

NOTE: You must have a netstation with two diskette drives to perform
this procedure.

1. Use the DOS DISKCOPY command to copy the LinkPlus Optimizer
diskette that came with your LinkPlus Optimizer board.

Label the diskette LinkPlus Optimizer 1.4a Master.

2. Insert the 3+Share Version 1.4a Installation #1 diskette into drive
   A:.

3. Insert your LinkPlus Optimizer 1.4a Master diskette into drive B:.

4. At the A> prompt type:

   lpomod

5. Follow the procedure except step 6 on pages 5-10 of the LinkPlus
Optimizer Installation Guide using your new LinkPlus Optimizer 1.4a
Master diskette for step 3 of that procedure.


NOTE: We recommend that you increase the eth -b parameters as
specified in step 7 of the procedure in the LinkPlus Optimizer
Installation Guide.

Task 6:  Create 3+Share Version 1.4a Start Volumes
The following procedure creates 3+Share version 1.4a compatible Start
volumes on your PC server.

NOTE: You must have a netstation with two diskette drives to perform
this procedure.

1. Use the DOS DISKCOPY command to copy your 3+Start 1.3.1
Installation/Workstation diskette.

Label the diskette 3+Start 1.4a Installation/Workstation.

2. Insert the 3+Share Version 1.4a Installation #1 diskette into drive
A:.

3. Insert the 3+Start 1.4a Installation/Workstation diskette into
drive B:.

4. From the A> prompt type:

   startmod

5. Insert your 3+Share Version 1.4a Netstation Startup diskette into
drive A:.

6. Press [Ctrl]+[Alt]+[Del] to boot the netstation.

A screen with a list of available network adapters is displayed.

7. Select the adapter appropriate for your netstation.

8. Follow the procedure on pages 12-17 through 12-24, "Reinstalling
Start," in Chapter 12 of the 3+Installation and Setup Guide using the
3+Start 1.4a Installation/Workstation diskette in step 1 of that
procedureo.

This completes the basic installation process.  To set up the 3+Name
service and create and customize the necessary profile files, go on to
chapter 3.

.H1;Installing on 3Server386

This chapter explains how to install 3+Share version 1.4a on
3Server386.  If you want to install on a PC server, refer to Chapter
1.  Once you complete the installation on your server you can proceed
to Chapter 3 for information on the setup process.

.BR;Installation Tasks
.BR;Perform the following installation tasks in this order:
.BR;
.BR;1. Install 3+Share version 1.3.1.
.BR;2. Modify the admin user.
.BR;3. Establish a connection to the server.
.BR;4. Install 3+Share version 1.4a.
.BR;5. Create 3+Share version 1.4a netstation startup diskettes.
.BR;6. Create 3+Share Version 1.4a LinkPlus Optimizer startup diskettes.
.BR;7. Create 3+Share version 1.4a Start volumes.

NOTE:  If you have not already installed your hardware, use the
documentation that came with your hardware to set it up.  The
following procedures assume that your hardware is installed and ready
to use.

.BR;Task 1:  Install 3+Share Version 1.3.1
.BR;Your network hardware should be installed and operational before you
install your 3+services.

1  Select the 3Server386 on which you will be installing 3+ services.

2. Complete all the procedures in the 3Server3 and 3Server386 Quick
Installation Guide.

These procedures describe how you install 3+ and set up a standard
network configuration.  Refer to the 3+ Network Tuning Guide to modify
the configuration.

.BR;Task 2:  Modify the Admin User
.BR;Now you must modify the pre-installed admin user on your network.  The
admin user allows you to log in and out of the network and allows you
to add users to your network.

1. Complete the procedure in the section titled Modifying the Admin
User, pages 9-1 through 9-5, in the 3+ Installation and Setup Guide.

NOTE:  Be sure to assign the name Admin for the user's home directory
as suggested in step 11.

.BR;Task 3:  Establish a Connection to the Server
.BR;The next procedure you must perform is to establish a connection to
the server using the 3C program.

1. For a 3Server386, set the server's MODE switch in maintenance
(middle) position and the BOOT switch to 1 (for Ethernet) or 2 (for
token ring).

For details on server settings, see the 3Server386 Guide.

2. Turn on or reset the server.

After executing the diagnostic tests, the server displays a message
similar to the following:
Address 335445

The number is the server's Ethernet address.  The number above is only
an example.  Your number will be different.

3. Start your netstation using the 3+Share Version 1.4a Netstation
Startup diskette.

4. Insert the System Software #1 diskette into drive A:.

5. At the A> prompt, type:

   3C START

The netstation displays a prompt similar to the following:

Start request from: 02608Cxxxxxx
OK (Y/N)

where xxxxxx is a server's network address.

6. Check this number against the network number on the LCD of the
server.

7. If they match, type Y for yes.

If they do not match, type N for no and wait for the netstation to
display a new network number.  Continue to respond with N until the
numbers on the netstation and server match, and then type Y.

Typing Y begins the server startup process.  The message

Start in progress...

is displayed, followed by a list of the 3+ drivers as they are loaded.
When the server starts successfully, the active-console prompt is
displayed on your screen:

A>>

Task 4:  Install 3+Share Version 1.4a
Now you are ready to install 3+Share version 1.4a using the two
installation diskettes.

1. Insert the 3+Share Version 1.4a Installation #1 diskette into drive
A:.

2. From the A>> prompt, type:

install

The installation program prompts you for the 3+Share Version 1.4a
Installation #2 diskette.  After installation is complete, you are
returned to the DOS prompt.

3. Restart the server by turning the thumbwheel switch to 0 (zero) and
pressing the reset button.

4. Turn the server mode switch to the Attention (leftmost position).

Task 5:  Create 3+Share Version 1.4a Netstation Startup Diskettes
Now that 3+Share version 1.4a is installed, you must create netstation
startup diskettes for your users.

1. Start up a netstation with the 3+Share Version 1.4a Netstation
Startup diskette in drive A:.

A screen with a list of available network adapters is displayed.

2. Select the appropriate adapter for your netstation.

3. Follow steps 2-11, pages 10-4 through 10-8 of the 3+ Installation
and Setup Guide.

In step 11, type N for No when the system asks you if you want to
create a START.BAT file.

4. Follow steps 12 and 13 on page 10-8 to make a copy of the
netstation startup diskette for each user.

This startup diskette allows the user to log in from any netstation.

Task 6:  Create 3+Share Version 1.4a LinkPlus Optimizer Startup
Diskettes If you have a LinkPlus Optimizer adapter you must complete
the following procedure.  If you do not, go on to task 7.  This
procedure creates a special startup diskette that increases the amount
of available memory.

NOTE: You must have a netstation with two diskette drives to perform
this procedure.

1. Use the DOS DISKCOPY command to copy the LinkPlus Optimizer
diskette that came with your LinkPlus Optimizer board.

Label the diskette LinkPlus Optimizer 1.4a Master.

2. Insert the 3+Share Version 1.4a Installation #1 diskette into drive
A:.

3. Insert your LinkPlus Optimizer 1.4a Master diskette into drive B:.

4. At the A> prompt type:

   lpomod

5. Follow the procedure except step 6 on pages 5-10 of the LinkPlus
Optimizer Installation Guide using your new LinkPlus Optimizer 1.4a
Master diskette for step 3.


NOTE: We recommend that you increase the eth -b parameters as
specified in step 7 of the procedure in the LinkPlus Optimizer
Installation Guide.

Task 7: Create  3+Share Version 1.4a Start Volumes
The following procedure creates 3+Share version 1.4a compatible Start
volumes on your PC server.

NOTE: You must have a netstation with two diskette drives to perform
this procedure.

1. Use the DOS DISKCOPY command to copy your 3+Start 1.3.1
Installation/Workstation diskette.

Label the diskette 3+Start 1.4a Installation/Workstation.

2. Insert the 3+Share Version 1.4a Installation #1 diskette into drive
A:.

3. Insert the 3+Start 1.4a Installation /Workstationdiskette into
drive B:

4. From the A> prompt type:

   startmod

5. Insert your 3+Share Version 1.4a Netstation Startup  diskette into
drive A:.

6. Press [Ctrl]+[Alt]+[Del] to boot the netstation.

A screen with a list of available network adapters is displayed.

7. Select the appropriate adapter for your netstation.

8. Login as Admin.

9. From the A> prompt type:

3f link e: \\servername\startdir?

10. Type:

    e:

11. View the listing of start volumes.

    3s dir

12. Delete all the start volumes from the 3S directory by typing the
following for each existing start volume:

    3s del start volume name

13. Follow the procedure on pages 12-17 through 12-24, "Reinstalling
Start," in Chapter 12 of the 3+Installation and Setup Guide, using the
3+Start 1.4a Installation/Workstation diskette in step 1 of that
procedure.

This completes the basic installation process.  To set up the 3+Name
service and create and customize the necessary profile files, go on to
chapter 3 - Setting Up User Access.

.H1;Setting Up User Access
After you complete the hardware and software installation pertinent to
your server, you are ready to create the files that control user
access to the system.  The tasks in this process are:

.BR;1. Configure the Name service.
.BR;2. Create domains and organizations.
.BR;3. Add a user.
.BR;4. Create the user's login profile.
.BR;5. Add information to the user's login profile.
.BR;6. Create the user's sharename profile.

.BR;Task 1:  Configure the Name Service
.BR;The Name service manages names for the network.  After you have
installed your 3+ services, you need to configure the Name service for
your network.  Follow the instructions in Chapter 6: Configuring the
Name Service, of the 3+ Installation and Setup Guide.

.BR;Task 2:  Create Domains and Organizations
.BR;Next you must create the domains and organizations in the Name
service.

1. Start the netstation with a netstation startup diskette.

2. From the DOS prompt log in as Admin by typing:

   LOGIN ADMIN

3. Link the APPS directory to drive D: by typing:

   3F LINK D: \\SYS\APPS

The APPS directory contains the 3+ utility programs such as 3+Menus.
The directory comes installed on the server.

4. Make drive D: the current drive by typing:

   D:

5. Type the following path command:

   SET PATH=D:\;D:\MENUS?

This command allows DOS to find the 3+ files in the APPS directory,
which is linked to drive D:.  The DOS and MENU files are located under
the DOS and MENUS subdirectories.

You are now logged in as Admin and you can begin to create users by
starting 3+Menus.

6. Start 3+Menus by typing:

   MENUS

7. Select Network Administration from the Main Menu and press
[Return].

The Network Administration menu is displayed.

8. Select Domain, Organization, and Server Names from the Network
Administration Menu.

9. Add the domain and server names to your Name service.

For a description of domain and server names, refer to Chapter 2, page
2-7 in Volume 1 of the 3+ Administrator's Guide.

10. Press [Esc] to return to the Network Administration Menu.


.BR;Task 3:  Add  a User
.BR;Now you are ready to add a user to the network by specifying some
basic information.

NOTE:  Make sure that you add domains and organizations to the 3+ Name
service before you add users whose profiles will reference these
resources.

1. Select User and Alias Names/Profiles and press [Return].

2. Select Add, Modify, or Delete Users/Profiles and press [Return].

You see the Add, Modify, Delete a User/Profile form with the function
keys as shown in Figure 1-3.

Figure 3-1. The Add, Modify, Delete a User/Profile Form

Table 3-1.  User Profile Form Function Keys
 Function Key  Result
 F1 Help Accesses on-line help.
 F2 Save User Saves the user information just added or modified.
 F3  Del User Deletes an existing user.
 F4  Remote N. S. Accesses a remote 3+ Name service.  Refer to
 Appendix C for information.
 F5 Edit Login  Creates a new login profile, or edits an existing
 login profile.
 F6 Del Login Deletes an existing login profile.
 F8 Edit Shrnam Creates a new sharename profile, or edits an existing
 sharename profile.
 F9 Del Shrnam Deletes an existing sharename profile.
 F10 Done Returns to User and Alias Names/Profiles menu.

3. Type a valid three-part user name on the User Name line and press
[Return].

You must type a user name before you can move on to the rest of the
fields. Use the [Backspace] key to correct any typing mistakes.  For
further information about three-part user names refer to Chapter 3 of
the 3+ Administrator's Guide.

4. Type the appropriate information into each field and press [Return]
after each one.

You can also press [Return] to bypass any fields that are not
applicable.  If you need to return to the User Name field, press
[Home].

NOTE:  The parameters you see will depend on your system
configuration.  Press [Return] to skip over a parameter.

5. Press [F2]-Save to add the user to the 3+ Name service.

The user information is added to the Name service, and the cursor
returns to the first field of the form.  You can now create the user's
login profile.

Task 4:  Create the User's Login Profile
You must create a login profile for each user so that the user can log
into the network and access appropriate resources.  The login profile
also automates network startup and access commands in place of batch
files on the netstation startup diskette.  In addition, a user login
profile allows you to control the user's access to the network without
the user having knowledge of the security setup.  By controlling user
access through login profiles, you have centralized administration and
access control of the network, reducing your administrative effort and
enhancing network security.

1. Press [F5]-Edit Login.

A blank login profile editor screen is displayed as in Figure 3-2
below.  The use of each editing function key at the bottom of the
screen is described in Table 3-2.

Figure 3-2.  The Login Profile Editor Screen

Table 3-2.  Profile Editor Function Keys

Function Key Description/Action
 F1-Help Accesses the on-line help file.
 F3-DelW Deletes the word on the cursor.
 F4-Del2 Deletes text from the cursor position to the end of the line.
 F5-DelL Deletes the line where the cursor is located.
 F6-Mark Marks text to be printed, moved, copied or deleted.  When you
 have marked a block of text, the function keys F4, F7, F8, F9, and
 F10 are displayed.
 F4-Print Prints the marked text.  If text is not marked, prints to
 the end of the profile.
 F7-Copy Copies marked text to the current cursor position.
 F8-Move Moves marked text to the current cursor position.
 F9-Del Press once to begin the deletion, again to execute the
 deletion.
 F10-Stop Cancels the marked operation.
 F10-Done Exits the profile editor.  You are asked if you want to save
 the file, and   are returned to the Create, Modify, Delete a
 User/Profile screen.

.BR;Task 5:  Add Information to the User's Login Profile
.BR;Now that you have a blank user login profile screen, you're ready to
enter login profile information for the user.  Figure 3-3 shows a
sample login profile and identifies its components.  What you enter
depends upon the preconfigured network environment (links,
applications, and so forth) and the security you prefer for the
users on your network.  The sample in Figure 3-3 is one you might use
to tightly control access to network resources.  Read Chapter 4:
Security Planning for detailed information.  The commands are also
explained in detail in Chapter 4.

Figure 3-3.  A Sample Login Profile

The example shown above asks the user for pertinent passwords, links
all the sharenames, and sets up all the path information.
The .LINKOFF command, for example, keeps the user from linking to any
network resources other than the ones specified in the login profile.
Note the use of comment lines with the echo command.
Comments for each link are helpful to let the user know which
sharename passwords they are being prompted for.

The combination of security commands in both the user login and
sharename profiles are related and together provide the security
profile for the user. They are discussed in detail in Chapter 4:
Security Planning.  You should study these combinations and decide
which ones are applicable to your situation in order to make the
most effective use of 3+ security.

1. Type the user's login profile.

Use the editing keys to make any corrections you need to make.

If you do not know exactly how you want to set up the security at this
time, you should type at least the following information:

 .PASSWORD=password you want for your user profiles   (max. 8
 characters)
 .LINKON

This allows the user to log in and link to the sharenames you created,
and gives you control over the login profile.

NOTE: Be sure to specify each sharename as a valid three-part name.

2. Press [F10]-Done twice to save the file.

You are returned to the Add, Modify, Delete a User/Profile form.

Task 6:  Create the User 's Sharename Profile
A user sharename profile contains a list of the sharenames the user
can access on the network.  The contents of the user's login and
sharename profiles, together, establish the user's access to the
network resources.  It is important that these two files be
complimentary and coordinated.  For detailed information on the
commands available for login and sharename profiles, refer to Chapter
4:Security Planning.

1. Press [F8]-Edit Sharename from the Add, Modify, Delete a
User/Profile form.

The screen, except for its title, is exactly the same as the Login
Profile Editor screen.  The same keys are available for editing.

2. Type the sharename profile.

If you do not know exactly how you want to set up the security at this
time, you should type at least the following information:

 .PASSWORD=password you want for the sharename profiles   (max. 8
characters)

This allows you to control access to the sharename profile file.

NOTE: Be sure to specify each sharename as a valid three-part name.

Chapter 4: Security Planning
The commands and other security features in this software release
allow you to specify to which network resources a user may have
access.  You exercise this control using the user login and sharename
profiles as well as group profiles.

Each time the user logs into the network, the Login program checks the
user's login profile to execute the 3F LINK and other commands.  The
3F program checks the sharename in each 3F LINK command against the
user's sharename profile.

If the sharename and appropriate access rights (PASS1) are found in
the sharename profile, the link is automatically completed.  If they
are not found, the user is prompted for a sharename password at the
time the 3F LINK is executed.

If the sharename profile contains the .EXCL command, the user can
access only those sharenames in the sharename profile.  Therefore,
every sharename in the login profile must have a corresponding entry
in the sharename profile.

You can further limit access by using passwords to protect the
sharenames.  Sharename passwords are described in detail later in this
chapter.

If the user is part of a work group that needs additional links and
access to sharenames, you can add references in the user's login
profile to group login and sharename profiles.  Group profiles are
described later in this chapter.

.BR;Security Commands
.BR;Security commands allow you to control the user's access through the
login and sharename profiles.

When you type these commands into a login or sharename profile file
you may use either upper or lower-case characters or a combination of
both.  For clarity, all the following information and examples show
the commands in uppercase characters.  Be su
re to precede each security command with a . (period), as shown in the
information below.

.BR;The .CALL Command
.BR;The .CALL command invokes a group login profile.

Format

 .CALL name

Parameter
name The name of the group login profile you want to invoke.  The
maximum length is 8 characters.

Profile Used In
Login only

Example
This command line invokes a group login profile named team1.

 .CALL team1

Notes
After the group profile is invoked, the next line in the user's login
profile after the .CALL command is executed.

The .EXEC Command
The .EXEC command executes a program with a maximum amount of
available memory by removing the login program and login profile from
memory.

Format
 .EXEC program

.BR;Parameter
.BR;program The name of the program you want to execute.
.BR;
.BR;Profile Used In
.BR;Login only
.BR;
.BR;General Requirements
.BR;Place as the last command in the login profile.

Example

 3f link D: \\sys\apps
 3f link E:
 D:
 .EXEC MENUS

.BR;Notes
.BR;When you place the .EXEC command before a program name, the DOS prompt
is redisplayed when the user exits the program.

If you do not put .EXEC before an application name (which is not
required), the login program remains resident.  This prevents the user
from exiting to DOS using [Ctrl]+C or [Ctrl]+[Break] and automatically
executes subsequent commands in the login profile file.

.BR;The .EXCLUSIVE Command
.BR;The .EXCLUSIVE command controls the user access to only those
sharenames listed in the sharename profile.

.BR;Format
.BR;.EXCL
.BR;.EXCLUSIVE

.BR;Profile Used In
.BR;Sharename only

.BR;General Requirements
.BR;Place after the .PASSWORD command

.BR;Examples
.BR;Example 1: The user can link to these sharenames and any others for
which they have the password.

 .PASS=ONE
 \\ap:c21:met\apps
 \\sp:c21:met\apps


Example 2: The users can only link to these sharenames.

 .PASS=ONE
 .EXCL
 \\ap:c21:met\apps
 \\sp:c21:met\apps


.BR;The .INCLUDE Command
.BR;The .INCLUDE command invokes a group sharename profile, which
specifies other sharenames the user can access.

Format
 .INCLUDE name

.BR;Parameter
.BR;name The name of the group sharename profile you want to call.  The
maximum length is 8 characters.

Profile Used In
 Sharename only

Example
The following example points to a group sharename profile called
revteam.

 .INCLUDE revteam

.BR;Notes
.BR;After the group sharename is checked, the next line in the user's
sharename profile is checked, if no sharename match has been found.

.BR;The .LINK Command
.BR;The .LINK command controls user access to the 3F LINK command from the
DOS prompt after login.

Format
 .LINKON
 .LINKOFF

.BR;Description
.BR;LINKON Permits the user to link to network resources they have the
rights to access.  Place this in the login profile before any links
because the default is LINKOFF.

LINKOFF Prevents the user from linking to any network resources
regardless of the contents of the sharename profile or the sharename
password they know.  The user can view the current links, but if they
unlink a sharenames they cannot re-link it.

Profile Used In
 Login only

General Requirements
 - Place .LINKON before 3F and 3P commands
 - Place .LINKOFF after 3F and 3P commands

Example

 .PASS=ONE
 .LINKON
 3f link D: \\sys\apps
 3f link E:
 .LINKOFF

.BR;Notes
.BR;The default is LINKOFF.

.BR;The .PASSWORD Command
.BR;The .PASS command forces the admin user to enter the appropriate
password to access either the user login or sharename files.  Since
you know this password and your users presumably do not, the users
cannot view or alter their login or sharename profiles even if they
gain access to the admin capability.

Format
 .PASSWORD=text
 .PASS=text

.BR;Parameter
.BR;text The password text.  See requirements below.

Profile Used In Login and Sharename

General Requirements
 - Must be the first line in the file
 - Minimum text length=1 character
 - Maximum text length=8 characters
 - Password text is case dependent

Suggestions for Use
 - Use the same password for all profile files
 - Write the password down!  There is no way to determine the password
   if you lose it!

Example
 .PASSWORD=cent21


.BR;Security Scenarios
.BR;To assist you in deciding which commands you need in each profile,
review the three scenarios below.  Each scenario gives an example of a
security setup you may want to implement in the user's login and
sharename profiles.

.BR;Minimal Security
.BR;Even if a user does not need to have access controlled, you must
create a login and sharename profile for every user.  At the minimum
you should allow the user to link to all network resources.  Notice in
the following example that there is no password on either file, so
that any user with admin capability can access and change the file.
With this security configuration, you control user access by having a
password for each network resource.

.BR;Basic Access Control
.BR;This is the basic profile for a user.  Since it is brief, it minimizes
your setup time, allowing users to access specified resources.  This
login profile controls access by preventing intentional or accidental
access to other resources.

.BR;Maximum Access Control
.BR;In this scenario, the login profile permits the user to access basic
network resources, while the sharename profile controls access to
other network resources as listed in the profile.

.BR;Modifying the User's Environment in the Login Profile
.BR;Any environment commands in the login profile, such as PATH and SET,
temporarily override the same commands in the user's AUTOEXEC.BAT
file.  When the last command in the login profile is executed, the
environment returns to its previous setting.

.BR;Sharename Passwords
.BR;Whenever you assign a sharename to a basic system resource, such as a
directory using 3F or menus, you can assign it a password with the
/PASS parameter.  This is the system password.

3+Share version 1.4a provides two password parameters that you can
place in the user's sharename profile: PASS1 and PASS2.

PASS1, when defined in the sharename profile, must always be
equivalent to the system password assigned to the sharename when it
was originally created.  If not, the user will never be able to link
to the sharename and will receive the message ***Bad
password.

When defined in the sharename profile, PASS2 overrides the PASS1
parameter and the user is prompted to enter the PASS2 password in
order to access the sharename.  The PASS2 parameter is available
whether or not you define PASS1.  If you do not choose
to define PASS1 when defining PASS2, remember that PASS1 must equal
the system password.  The advantage to using PASS2 is that you can
force each user to type a unique password to get to the same
sharename.

Below are some examples of using how combinations of the system,
PASS1, and PASS2 parameters work.

In example 1, the user is not prompted for a password and the 3F LINK
occurs automatically.

Example 1

The next example uses the same basic information as example 1 with the
addition of a PASS2 in the sharename profile.  In this case, the user
is prompted for the password and must type apps to complete the link
to the sharename.  If the user presses [Return] or types the password
incorrectly, he will receive the message ***Incorrect password.  Note
that to set this up properly the system and PASS1 passwords must
match.  In this case, there is neither a system or PASS1 password.

Example 2

The other choice for additional security is to add a password to the
sharename and use various combinations of PASS1 and PASS2.  The
following example shows a sharename with a system password, but
without a password in the sharename profile.  In this case, the user
is prompted for and must type the system password, apps, in order to
complete the link.

Example 3

In the next example, a password has been added in the sharename
profile that exactly matches the system password.  The user is not
prompted for a password because the two passwords match, and the link
occurs automatically.

Example 4

The final example shows a sharename profile with both PASS1 and PASS2.
In this case, the user must supply the password applicat in order to
complete the link and not receive an ***Incorrect password error
message.

Example 5

Group Profiles

As an administrator you can create a "group version" of the login and
sharename profiles discussed in Chapter 3.  This allows you to have a
profile that is the same for all people in a group such as a work team
or department.  Thus, all members of the group or department who need
to be linked to and have access to the same network resources can use
a common profile.  When a project ends,department members change, or
you need to move users from one project to another, it is easy to
modify the user's profile to remove the group login and sharename
profile references.

The user has access to a group login profile when the name of the
profile is preceded by the .CALL command in the user's login profile.
(See the preceding discussion of the .CALL command.)  Because you
control the user's access to the login profile,
you also control access to the group login profile.  No other
administrator can view the profile without knowing the password.

You may also want to give the user access to a group sharename profile
by placing the name of that profile after the .INCLUDE command in the
user's sharename profile.

NOTE: The group profiles referred to in the user's profiles must be
located on the same server as the user's home directory.  Therefore,
in a large network where users have their home directories on several
different servers, you must remember to create the same group profiles
for them on the server where their home directories are located.

Creating a Group Login Profile
While the content of a group login profile resembles that of a user
login profile as described in Chapter 3, the procedure for creating
one is quite different.

NOTE:  Make sure you do not put information into a group login profile
that is already located in the user login profile.  For example, the
user only needs to link to the same directory once, and so forth.

1. Select User and Alias Names/Profiles from the Network
Administration menu and press [Return].

You see the User and Alias Names/Profiles menu.

2. Select Add/Mod/Del Group Login Profile and press [Return].

You see the Add, Modify, Delete Group Login/Sharename Profiles form.
The cursor is located on the Server Name line.

Figure 4-1.  The Group Login Profile Form.

3. Type the name of the server on which the profile should exist and
press [Return].

The user's home directory must be on the same server as the group
login profile.

4. Type an eight-character name for the profile and press [Return].

5. Type a password for the profile and press [Return].

A password can be a maximum of eight characters long.

6. Press [F5]-Edit Login.

The Login Profile Editor screen is displayed along with the password
you specified in step 5.

7. Type the group login profile information.

8. Press [F10]-Done twice to save the profile and return to the Add,
Modify, Delete Group Login/Sharename Profiles form.

Creating a Group Sharename Profile
A group sharename profile contains the names of sharenames the group
members can access.

1. Select User and Alias Names/Profiles from the Network
Administration menu and press [Return].

You see the User and Alias Names/Profiles menu.

2. Select Add/Mod/Del Group Sharename Profile and press [Return].

You see the Add, Modify, Delete Group Login/Sharename Profiles form.
The cursor is located on the Server Name line.

Figure 5-1 shows the Add, Modify, Delete Group Login/Sharename
Profiles form.  This is the same form you use to specify a group login
profile.  Since you reached it from the Add/Mod/Del Group Sharename
Profile menu selection this time, you will be creating a group
sharename profile.

3. Type the name of the server on which the sharename profile should
exist and press [Return].

The user's home directory and profiles must be on the same server as
the group login profile.

4. Type an eight-character name for the profile and press [Return].

5. Type a password for the profile and press [Return].

6. Press [F8]-Edit Shrnam.

The Sharename Profile Editor screen is displayed along with the
password you specified in step 5.

7. Type the group sharename profile information.

8. Press [F10]-Done twice to save the profile and return to the Add,
Modify, Delete Group Login/Sharename Profiles form.

.H1;Changing Profiles
After you have set up the profiles for users on your network, you may
need to make some changes.

Modifying User Information
At some point, you may need to change the information for a network
user as your network needs change.  You can modify users and their
profiles from the Network Administration window.

1. Select User and Alias Names/Profiles and press [Return].

You see the User and Alias Names/Profiles menu.

2. Select Add, Modify, or Delete Users/Profiles and press [Return].

You see the Add, Modify, Delete a User/Profile form.  The cursor is
located in the User Name field.

3. Type the name of the user whose information you want to modify.

The current information about the user is displayed.

NOTE:  You must type a user name.  If you type a name that displays
no user information, and you know the name exists, check the spelling
of the user name.

4. Type your changes.

5. Press [F2]-Save User to save your changes.

The cursor returns to the User Name field.

6. Press [F10]-Done to return to the User and Alias Names/Profiles
menu.

Modifying a User's Login Profile
At some point, as your network needs change, you may want to change
the login profile you created for a network user.  You edit a user
login profile in the same way as you add information to  a login
profile as discussed in Chapter 1.

1. Select User and Alias Names/Profiles and press [Return].

You see the User and Alias Names/Profiles menu.

2. Select Add, Modify, or Delete Users/Profiles and press [Return].

You see the Add, Modify, Delete a User/Profile form.  The cursor is
located in the User Name field.

3. Type the name of the user whose login profile you want to change
and press [Return].

You must type a valid user name in to edit the user's login profile.

4. Press [F5]-Edit Login.

If the profile is protected by a password you are asked for the
password before you can proceed.  The user's current login profile is
displayed.

5. Use the editing keys at the bottom of the screen to make the
necessary changes.

6. When you are finished, press [F10]-Done twice to save the file.

You are returned to the Add, Modify, or Delete a User/Profile form.

Modifying a User's Sharename Profile
As your network needs change, you may need to change the information
you originally placed in the user's sharename profile.  You edit a
user sharename profile the same way as you add information to a
sharename profile.

1. Select User and Alias Names/Profiles and press [Return].

You see the User and Alias Names/Profiles menu.

2. Select Add, Modify, or Delete Users/Profiles and press [Return].

You see the Add, Modify, Delete a User/Profile form.  The cursor is
located in the User Name field.

3. Type the name of the user whose sharename profile you want to
change and press [Return].

The user information is displayed.

4. Press [F8]-Edit Shrnam.

If the sharename profile is protected by a password you are asked for
the password before you can proceed.  The user's current sharename
profile is displayed.

5. Use the editing keys at the bottom of the screen to make the
necessary changes.

6. When you are finished, press [F10]-Done twice to save the file.

You are returned to the Add, Modify, or Delete a User/Profile form.

.BR;ting a User's Login Profile
.BR; you delete a user from the network, you must first delete the
user's login profile.

1. Select User and Alias Names/Profiles and press [Return].

 You see the User and Alias Names/Profiles menu.

2. Select Add, Modify, or Delete Users/Profiles and press [Return].

You see the Add, Modify, or Delete a User/Profile form.  The cursor
is located in the User Name field.

3. Type the name of the user whose login profile you want to delete.

4. Press [F6]-Del Login.

If the login profile is protected by a password you are asked for the
password before you can proceed.  The following message is displayed:

 CONFIRM DELETION (Y/N) N

5. Type Y to confirm the deletion, N to cancel.

If you type Y, you receive the status message:

Access list deleted.  Press any key to continue

Pressing N cancels the deletion.

You are returned to the User Name field on the Add, Modify, Delete a
User/Profile form.

.BR;Deleting a User's Sharename Profile
.BR;When you delete a user from the network, you also need to delete the
user's sharename profile.  Be sure to delete the user's login profile
as well.

1. Select User and Alias Names/Profiles and press [Return].

You see the User and Alias Names/Profiles menu.

2. Select Add, Modify, or Delete Users/Profiles and press [Return].

You see the Add, Modify, or Delete a User/Profile form.  The cursor
is located in the User Name field.

3. Type the name of the user whose sharename profile you want to
delete.

4. Press [F9]-Del Shrnam.

If the sharename profile is protected by a password you are asked for
the password before you can proceed.  You see the message:

CONFIRM DELETION (Y/N) N

5. Type Y to confirm the deletion, N to cancel.

If you type Y, you receive the status message:

Access list deleted.  Press any key to continue

Pressing N cancels the deletion.

You are returned to the User Name field on the Add, Modify, Delete a
User/Profile form.

.BR;ting a User
.BR;At some point you may want to remove a user from the network.  You
must delete the user's login and sharename profiles before you delete
the user.


NOTE: If you want to delete the user's home directory you must make
sure that it is empty before you proceed with this procedure.

1. Select User and Alias Names/Profiles and press [Return].

You see the User and Alias Names/Profiles menu.

2. Select Add, Modify, or Delete Users/Profiles and press [Return].

You see the Add, Modify, Delete a User/Profile form.  The cursor is
located on the User Name field.

3. Type the name of the user you want to delete and press [Return].

The user name and information is displayed.

NOTE:  You must type a valid user name.  If you type a name that
displays no user information, and you know the name exists, check the
spelling of the user name.

4. Press [F3]-Del User.

This starts the deletion process for the user name you just typed and
the following message is displayed.

CONFIRM DELETION (Y/N) N

5. Type Y to confirm the deletion.

If you type Y, you receive the status message:

Access list deleted.  Press any key to continue

Pressing N cancels the deletion.

You are returned to the User Name field on the Add, Modify, Delete a
User/Profile form.

.H1;Appendix A:  Error Messages

Error messages code numbers correspond to the error categories listed
in this appendix.  When an error code is displayed on your screen,
cross reference it to the text explanation in this appendix.  Look up
the text message in one of the guides listed below.  You will need to
refer to the following guides for complete information and recovery
action for these error codes:

 - NetBIOS Programmer's Reference Guide for 40XX error codes.

 - 3+ Messages Guide  for 3+Name service 10XXX error codes.

 - 3+ Messages Guide  for 3+Share 138XX error codes.

 - MS DOS Technical Reference Manual  version 3.01 or greater for MS-
DOS 18XXX error codes.

The following error messages are specific to 3+Share version 1.4a and
are not documented in the guides listed above.

Access denied.

Meaning: A sharename profile does not exist for the user.

Action: Create a sharename profile for the user, even if you do not put
anything in it.

Bad password.

Meaning: The system password for a sharename is not equivalent to PASS1
parameter in the user's sharename profile.

Action: Change the PASS1 parameter for a sharename in the user's
sharename profile to be equivalent to the system password for the
sharename.

Incorrect password.

Meaning: The user is either entering an incorrect password for the
sharename or the user name does not exist in the Name service.

Action: Give the user the correct password or add the user to the Name
service.

Login:error - User has no login profile!

Meaning: The user does not have a login profile.

Action:: Create a login profile for the user.

Problem initializing access control module.

Meaning: Not enough processes.

Action: Adjust the device=Pro.sys line in your CONFIG.SYS file.  Syntax
is: Device=Pro.sys A B C.  A represents the total number of processes.
Increase "A" by an increment of five.

Problem initializing heartbeat listener module.

Meaning: Not enough memory.

Action: Adjust the device=Pro.sys line in your CONFIG.SYS file.  Syntax
is: Device=Pro.sys A B C.  A represents the total number of processes.
Increase "A" by an increment of five.

3Share access process:  IDP New client failed.

Meaning: Not enough memory.

Action: Adjust the device=Pro.sys line in your CONFIG.SYS file.  Syntax
is: Device=Pro.sys A B C.  A represents the total number of processes.
Increase "A" by an increment of five.

Share server access mgr not responding

Meaning: The client machine, most likely a LinkPlus Optimizer, does not
have enough Ethernet buffers to run this application.

Action: Increase the Ethernet buffers (eth -b) on the netstation.

NetBIOS Error Codes
These are the numerical equivalents of the NetBIOS error codes.  Next
to the number is a text explanation.  Use the NetBIOS Programmer's
Reference Guide to find the meaning and suggested corrective measure.

4096 Command accepted/completed

4097 Illegal buffer length

4099 Invalid command code

4101 Command timed-out

4102 Message incomplete

4104 Illegal local session number

4105 No resource available

4106 Session Closed

4107 Command cancelled

4109 Duplicate in local name table

4110 Name table full

4111 Name de-registered, but active

4113 Local session table full

4114 Session open rejected

4115 Illegal name number

4116 Cannot find name/no answer

4117 Name not found, no (value found in NCB_CMD_CPLT field - valid
only for no-wait options) or (00H Command accepted/completed)

4118 Name in user on remote adapter

4119 Name deleted

4120 Session ended abnormally

4121 Name conflict detected

4122 Incompatible remote device

4129 Interface busy

4130 Too many commands outstanding

4131 Invalid number in NCB_LANA_NUM

4132 Command was not cancelled

4233 Reserved name specified

4134 Command not valid to cancel

4136 Locator not responding

Name Service Error Codes
These are the numerical equivalents of the 3+ Name service error
codes.  Next to the number is a text explanation.  Use the 3+ Messages
Guide to find the meaning and suggested corrective measure.

10241 Operating System

10242 No such organization

10243 No such domain

10244 Object does not exist

10245 Domain of object is foreign: long net

10246 Name alias, object not exist: CH_NAME alias_obj

10247 Name alias, domain of object is foreign: long net, CH_NAME
alias_obj

10248 Name alias, domain or org not exist: CH_NAME alias_obj

10249 Name alias, object alias: CH_NAME alias_obj

10250 Data base bad

10251 Name index bad

10252 Property index bad

10253 Object already exists

10254 Not enough space for object

10255 Object not alias

10256 Property does not exist

10257 Property not defined

10258 Property item not property

10259 Property not group property

10260 Property value invalid

10261 Primary property already exists (and trying to add primary)

10262 Primary property does not exist (and trying to add property)

10263 Object already has property (on add)

10264 Object already has max number of properties

10265 Object does not have property

10266 Object does not have enough space for property

10267 Property create (modify) and type is different

10268 Illegal property definition

10269 Property in use (on remove)

10270 Property is special

10271 Already have max number of properties

10272 Not enough space to create property

10273 Item is already a member (on add)

10274 Not enough space for member

10275 Item is not a member

10276 Invalid credentials

10277 Invalid verifier

10278 Does not have capability

10279 Inappropriate credentials

10280 Domain already exists (on create)

10281 Max number of domains already exist

10282 Invalid domain type

10283 Not enough resources (on create)

10284 Domain does not exist (on remove)

10285 Illegal org name

10286 Illegal dom name

10287 Illegal obj name

10288 CH too busy for request

10289 Must use courier

10290 Some other type of error

10291 Reject call

10292 Block not data block

10293 Words not is block

10294 Total maximum reached

10295 Object count will exceed max count

10296 Count too large

10297 Source index greater than dest

10298 Source index less than dest

10299 Domain ID not valid

10300 Domain version number not valid

10301 Domain free space ptr not valid

10302 Domain header block and/or size invalid

10303 Domain has duplicate name definition

10304 Domain has invalid status

10305 Domain has modified flag on

3+Share Error Codes

These error messages are generated by 3+File, 3+Print, and 3+Name, the
services in 3+Share.

13825 Bad value for type

13826 End of list

13827 Bad user name pattern

13828 Bad session id

13829 Bad network address

13830 Not server

13831 Bad drive number

13832 Max users on server

13833 Not enough space on server

13834 User already exists

13835 Home dir already exists

13836 Bad user name

13837 Bad home dir name

13838 User does not exist

13839 User had resources

13840 Home dir not empty

13841 User has session in progress

13842 Bad object access type

13843 Bad name type

13844 Shortname already in use

13845 Bad path name

13846 Bad printer name

13847 Bad password

13848 User does not have share access

13849 Path (or printer) already shared

13850 User not owner

13851 Shortname not found

13852 Object in use

13853 Object is a home directory

13854 Bad object name pattern

13855 Printer name not found

13856 User not on server

13857 Bad value

13858 Bad queue entry id

13859 Bad form type

13860 Internal server error

13861 Bad object name

13862 File is in intercept (file being spooled)

13863 Queue is empty

13864 Max shares already done on server


DOS Error Codes

These are the numerical equivalents of the MS-DOS error codes.  Next
to the number is a text explanation.  Use the MS-DOS Technical
Reference Manual to find the meaning and suggested corrective measure.

18433 Invalid function number

18434 File not found

18435 Path not found

18436 Too many files open (no handles left)

18437 Access denied

18438 Invalid handle

18439 Memory control blocks destroyed

18440 Insufficient memory

18441 Invalid memory block address

18442 Invalid environment

18443 Invalid format

18444 Invalid access code

18445 Invalid data

18446 Reserved

18447 Invalid drive was specified

18448 Attempt to remove the current directory

18449 Not same device

18450 No more files

18451 Attempt to write on write-protected diskette

18452 Unknown unit

18453 Drive not ready

18454 Unknown command

18455 Data error (CRC)

18456 Bad request structure length

18457 Seek error

18458 Unknown media type

18459 Sector not found

18460 Printer out of paper

18461 Write fault

18462 Read fault

18463 General failure

18464 Sharing violation

18465 Lock violation

18466 Invalid disk change

18467 FCB unavailable

18468 Sharing buffer overflow

18482 Network request not supported

18483 Remote computer not listening

18484 Duplicate name on network

18485 Network name not found

18486 Network busy

18487 Network device no longer exists

18488 Net BIOS command limit exceeded

18489 Network adapter hardware error

18490 Incorrect response from network

18491 Unexpected network error

18492 Incompatible remote adapter

18493 Print queue full

18494 Not enough space for print file

18495 Print file was deleted

18496 Network name was deleted

18497 Access denied

18498 Network device type incorrect

18499 Network name not found

18500 Network name limit exceeded

18501 Net BIOS session limit exceeded

18502 Temporarily paused

18503 Network request not accepted

18504 Print or disk redirection is paused

18512 File exists

18513 Reserved

18514 Cannot make directory entry

18515 Fail on INT 24

18516 Too many redirections

18517 Duplicate redirection

18518 Invalid password

18519 Invalid parameter

18520 Network device fault

.H1;Appendix B:  Remote Name Service

This appendix describes the special release of 3+Menus and the 3NR
program version 1.4a.  The 3+Menus service has a remote network
function which allows you to administer a remote network as if it was
a local network.  The 3NR program allows you to u
se the 3N commands in a remote network as if it was a local network.

You can use the 3+Menus remote function and the 3NR command if:

 - You have installed a network with 3+Route (or some type of router),
   a Bridge Connection or 3+NetConnect.

 - You are currently an administrator on a local network and have a
   need to be an administrator on a remote network.

 - Both the local and remote networks have been set up correctly in
   the associated Name service.

This version of the 3NR software is compatible with the 1.4 server
version of 3+Share.

Setting Up Networks for Remote Administration
You must set up both the local and remote 3+Name service to reflect
identical admin information before you can begin to use 3NR.

1. From 3+ Menus, assign a password to the Admin user.

We recommend you use a password that is fairly simple, since your
Admin user name and password must be added to all remote networks.

2. Add the name of the remote domain(s) to your local 3+ Name Service.

Include the names of any domains you would like to administer
remotely.  For example, (domains in boldface):

Servername:HQ:Organization

Servername:NY:Organization

3. Add the Admin user to each remote domain.

Each remote domain 3+ Name service must have your admin user with the
password you assigned.

.BR;Administering Remote Networks
.BR;After you have set up your networks for remote administration, you can
administer the remote network.

1. Select Network Administration from the Main Menu and press
[Return].

You see the Network Administration Menu.

2. Select User and Alias Names/Profiles and press [Return].

You see the User and Alias Names/Profiles menu.

3. Select Add, Modify, or Delete Users/Profiles and press [Return].

You see the Add, Modify, Delete a User/Profile form.  The cursor is
located in the User Name field.

4. Press [F4]-Remote Name Service.

You are prompted for a remote domain and organization name.

5. Type the remote domain and organization name in the fields and
press [Return].

You see Remote Name Service in the upper right corner of the Add,
Modify, Delete a User/Profile form.

You can now remotely administer the remote 3+Name service as if it was
the local network as described in chapter 3.  Pressing the [F4] key
repeatedly allows you to go between the specified remote domains and
the local domain.

.BR;Administering a Remote Network with the 3NR Command
.BR;The 3NR program is installed in the APPS directory when you install
3+Share version 1.4a.  This feature allows you to use the 3N commands
in a remote network as if it was a local network.

To access the 3N command on the remote server type:

  3NR remote domain

For example:

  3NR NY

You see a message confirming the name of the domain you are accessing.
You can now administer the remote 3+Name service as if it was on the
local network.  Note that the Add and Delete User functions are no
longer allowed in 3N.  Therefore, if you want to do this remotely you
must use 3+Menus.

.H1;Appendix C:  Moving Users to a Different Server
When you want to move users from one server to another, the user's
profiles must be moved to the new location of the user's home
directory.  To do this without re-typing the profiles, use the
following procedure.  Remember that the user's home directory and
profiles must reside on the same server.

1. Create a new home directory for each user with the same name as
their present home directory.

2. Copy the profiles from the present server's \3PLUS\3PROFILES
directory to the same directory on the new server.

3. Copy group profiles that are referenced by the user profiles from
the present server to the new server.

These profiles are also in the \3PLUS\3PROFILES directory.

4. Delete user profiles from the present server.

5. Delete group profiles from the present server IF they are not
referenced by any user profiles remaining on the present server.

.H1;Appendix D: Maximum PC Server Configuration
Installing 3+ version 1.4a allows the following 3+ services to fit on
a Honeywell 386 PC with 1Mb of on-board memory and a 3Com EMS
installed:

 3+Share version 1.4a
 3+Name version 1.3.1
 Locator version 1.3.1
 3+Mail (unlimited users) version 1.3.1
 3+Monitor version 1.3
 3+Start version 1.3
 3+Route version 1.3.1

The configuration possibilities for LPT1 and COM1 and COM2 are:

Configuration 1
 LPT1 configured
 COM1 and COM2 configured with 2400 baud modems using default
 parameters

Configuration 2
 LPT1 configured
 COM1 configured with 9600 baud modem
 3+Route receive buffers set to 8
 All other parameters set at default

To allow these services to fit, modifications were made in the 3+
version 1.3.1 installation for the version 1.4a installation.  These
are:

The Login library driver is no longer loaded on a dedicated server.
If you want to start your PC as a netstation, use a 3+Share Version
1.4a Netstation Startup diskette.

3Com EMS has been configured to work with a monochrome monitor in
order to allow for maximum continguous high DOS memory availability
(144Kb) for 3+ services.

3+Route, if installed, is now loaded into high memory with CIOSYS
and Locator.  If you experience high DOS memory limitations for
3+Route parameter modifications, here are some possible solutions:

If you do not need the Locator, disable it with 3INS

Decrease your Locator Names and Nodes parameters as necessary using
3OPT

Run the Locator on a netstation

Adjust the CIOSYS parameters to allow for only what is necessary.
