Red Hat Enterprise Linux 4

System Administration Guide

ISBN: N/A
Table of Contents
Introduction
1. Changes To This Manual
2. Architecture-specific Information
3. Document Conventions
4. Activate Your Subscription
4.1. Provide a Red Hat Login
4.2. Provide Your Subscription Number
4.3. Connect Your System
5. Using the Mouse
6. Copying and Pasting Text With X
7. More to Come
7.1. Send in Your Feedback
I. Installation-Related Information
1. Kickstart Installations
1.1. What are Kickstart Installations?
1.2. How Do You Perform a Kickstart Installation?
1.3. Creating the Kickstart File
1.4. Kickstart Options
1.5. Package Selection
1.6. Pre-installation Script
1.7. Post-installation Script
1.8. Making the Kickstart File Available
1.9. Making the Installation Tree Available
1.10. Starting a Kickstart Installation
2. Kickstart Configurator
2.1. Basic Configuration
2.2. Installation Method
2.3. Boot Loader Options
2.4. Partition Information
2.5. Network Configuration
2.6. Authentication
2.7. Firewall Configuration
2.8. Display Configuration
2.9. Package Selection
2.10. Pre-Installation Script
2.11. Post-Installation Script
2.12. Saving the File
3. PXE Network Installations
3.1. Setting up the Network Server
3.2. PXE Boot Configuration
3.3. Adding PXE Hosts
3.4. Starting the tftp Server
3.5. Configuring the DHCP Server
3.6. Adding a Custom Boot Message
3.7. Performing the PXE Installation
4. Diskless Environments
4.1. Start the tftp Server
4.2. Configuring the DHCP Server
4.3. Configuring the NFS Server
4.4. Finish Configuring the Diskless Environment
4.5. Adding Hosts
4.6. Booting the Hosts
II. File Systems
5. The ext3 File System
5.1. Features of ext3
5.2. Creating an ext3 File System
5.3. Converting to an ext3 File System
5.4. Reverting to an ext2 File System
6. Access Control Lists
6.1. Mounting File Systems
6.2. Setting Access ACLs
6.3. Setting Default ACLs
6.4. Retrieving ACLs
6.5. Archiving File Systems With ACLs
6.6. Compatibility with Older Systems
6.7. Additional Resources
III. Package Management
7. Package Management with RPM
7.1. RPM Design Goals
7.2. Using RPM
7.3. Checking a Package's Signature
7.4. Impressing Your Friends with RPM
7.5. Additional Resources
8. Package Management Tool
8.1. Installing Packages
8.2. Removing Packages
9. Red Hat Network
IV. Network-Related Configuration
10. Network Configuration
10.1. Overview
10.2. Establishing an Ethernet Connection
10.3. Establishing an ISDN Connection
10.4. Establishing a Modem Connection
10.5. Establishing an xDSL Connection
10.6. Establishing a Token Ring Connection
10.7. Establishing a Wireless Connection
10.8. Managing DNS Settings
10.9. Managing Hosts
10.10. Working with Profiles
10.11. Device Aliases
10.12. Establishing an IPsec Connection
10.13. Saving and Restoring the Network Configuration
11. Basic Firewall Configuration
11.1. Security Level Configuration Tool
11.2. Activating the iptables Service
12. Controlling Access to Services
12.1. Runlevels
12.2. TCP Wrappers
12.3. Services Configuration Tool
12.4. ntsysv
12.5. chkconfig
12.6. Additional Resources
13. OpenSSH
13.1. Why Use OpenSSH?
13.2. Configuring an OpenSSH Server
13.3. Configuring an OpenSSH Client
13.4. Additional Resources
14. Network File System (NFS)
14.1. Why Use NFS?
14.2. Mounting NFS File Systems
14.3. Exporting NFS File Systems
14.4. Additional Resources
15. Samba
15.1. Why Use Samba?
15.2. Configuring a Samba Server
15.3. Connecting to a Samba Share
15.4. Additional Resources
16. Dynamic Host Configuration Protocol (DHCP)
16.1. Why Use DHCP?
16.2. Configuring a DHCP Server
16.3. Configuring a DHCP Client
16.4. Additional Resources
17. Apache HTTP Server Configuration
17.1. Basic Settings
17.2. Default Settings
17.3. Virtual Hosts Settings
17.4. Server Settings
17.5. Performance Tuning
17.6. Saving Your Settings
17.7. Additional Resources
18. Apache HTTP Secure Server Configuration
18.1. Introduction
18.2. An Overview of Security-Related Packages
18.3. An Overview of Certificates and Security
18.4. Using Pre-Existing Keys and Certificates
18.5. Types of Certificates
18.6. Generating a Key
18.7. Generating a Certificate Request to Send to a CA
18.8. Creating a Self-Signed Certificate
18.9. Testing The Certificate
18.10. Accessing The Server
18.11. Additional Resources
19. Authentication Configuration
19.1. User Information
19.2. Authentication
19.3. Command Line Version
V. System Configuration
20. Console Access
20.1. Disabling Shutdown Via [Ctrl]-[Alt]-[Del]
20.2. Disabling Console Program Access
20.3. Defining the Console
20.4. Making Files Accessible From the Console
20.5. Enabling Console Access for Other Applications
20.6. The floppy Group
21. Date and Time Configuration
21.1. Time and Date Properties
21.2. Network Time Protocol (NTP) Properties
21.3. Time Zone Configuration
22. Keyboard Configuration
23. Mouse Configuration
24. X Window System Configuration
24.1. Display Settings
24.2. Display Hardware Settings
24.3. Dual Head Display Settings
25. User and Group Configuration
25.1. Adding a New User
25.2. Modifying User Properties
25.3. Adding a New Group
25.4. Modifying Group Properties
25.5. Command Line Configuration
25.6. Explaining the Process
25.7. Additional Information
26. Printer Configuration
26.1. Adding a Local Printer
26.2. Adding an IPP Printer
26.3. Adding a Remote UNIX (LPD) Printer
26.4. Adding a Samba (SMB) Printer
26.5. Adding a Novell NetWare (NCP) Printer
26.6. Adding a JetDirect Printer
26.7. Selecting the Printer Model and Finishing
26.8. Printing a Test Page
26.9. Modifying Existing Printers
26.10. Saving the Configuration File
26.11. Command Line Configuration
26.12. Managing Print Jobs
26.13. Sharing a Printer
26.14. Additional Resources
27. Automated Tasks
27.1. Cron
27.2. At and Batch
27.3. Additional Resources
28. Log Files
28.1. Locating Log Files
28.2. Viewing Log Files
28.3. Adding a Log File
28.4. Examining Log Files
29. Manually Upgrading the Kernel
29.1. Overview of Kernel Packages
29.2. Preparing to Upgrade
29.3. Downloading the Upgraded Kernel
29.4. Performing the Upgrade
29.5. Verifying the Initial RAM Disk Image
29.6. Verifying the Boot Loader
30. Kernel Modules
30.1. Kernel Module Utilities
30.2. Persistent Module Loading
30.3. Additional Resources
31. Mail Transport Agent (MTA) Configuration
VI. System Monitoring
32. Gathering System Information
32.1. System Processes
32.2. Memory Usage
32.3. File Systems
32.4. Hardware
32.5. Additional Resources
33. OProfile
33.1. Overview of Tools
33.2. Configuring OProfile
33.3. Starting and Stopping OProfile
33.4. Saving Data
33.5. Analyzing the Data
33.6. Understanding /dev/oprofile/
33.7. Example Usage
33.8. Graphical Interface
33.9. Additional Resources
Index
Colophon