Red Hat NETSCAPE MANAGEMENT SYSTEM 4.5 - CUSTOMIZATION GUIDE Installationsanleitung Seite 1

Stöbern Sie online oder laden Sie Installationsanleitung nach Software-Handbücher Red Hat NETSCAPE MANAGEMENT SYSTEM 4.5 - CUSTOMIZATION GUIDE herunter. Red Hat NETSCAPE MANAGEMENT SYSTEM 4.5 - CUSTOMIZATION GUIDE Installation guide Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 268
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - Customization Guide

Red Hat Linux 7.3The Official Red Hat LinuxCustomization Guide

Seite 2

x IntroductionNetwork ConfigurationThis chapter has been written to discussed the revised Red Hat Network Administra-tion Tool. It is now more task-ori

Seite 3

100 Chapter 9. OpenSSH2. Change the permissions of your .ssh directory using the command chmod 755~/.ssh.3. Copy the contents of ~/.ssh/id_dsa.pub to

Seite 4

Chapter 9. OpenSSH 101Accept the default file location (~/.ssh/identity). Enter a passphrase different fromyour account password. Confirm the passphrase

Seite 5 - Table of Contents

102 Chapter 9. OpenSSHbe prompted for both. From this point on, you should not be prompted for a passwordby ssh, scp, or sftp.9.3.4.5. Configuring ssh-

Seite 6

Chapter 10.Network File System (NFS)Network File System (NFS) is a way to share files between machines on a network as if thefiles were located on the c

Seite 7

104 Chapter 10. Network File System (NFS)10.2.2. Mounting NFS Filesystems using autofsA third option for mounting an NFS share is the use of autofs. A

Seite 8

Chapter 10. Network File System (NFS) 10510.3. Exporting NFS FilesystemsThe /etc/exports file controls what filesystems the NFS server exports. Its form

Seite 9 - Introduction

106 Chapter 10. Network File System (NFS)/sbin/chkconfig --level 345 nfs onYou can also use ntsysv or serviceconf to configure which services start at

Seite 10 - 2. Document Conventions

Chapter 11.SambaSamba uses the SMB protocol to share files and printers across a network connection. Oper-ating systems that support this protocol incl

Seite 11

108 Chapter 11. Samba11.2.1. Samba PasswordsIn Red Hat Linux 7.3 encrypted passwords are enabled by default because it is more secure. Ifencrypted pas

Seite 12 - Mail backupfiles mail reports

Chapter 11. Samba 109the password he uses to log in to the Red Hat Linux system as well as the password he mustprovide to connect to a Samba share are

Seite 13 - 3. More to Come

Introduction xicommandLinux commands (and other operating system commands, when used) are representedthis way. This style should indicate to you that

Seite 14 - 4. Sign Up for Support

110 Chapter 11. SambaIf the SMB share you are connecting to requires a user name and password combination, youmust specify them in the Location: bar u

Seite 15

Chapter 12.Dynamic Host Configuration Protocol (DHCP)Dynamic Host Configuration Protocol (DHCP) is network protocol for automatically assign-ing TCP/IP

Seite 16

112 Chapter 12. Dynamic Host Configuration Protocol (DHCP)ImportantIf you change the configuration file, the changes will not take effect until you resta

Seite 17 - Kickstart Installations

Chapter 12. Dynamic Host Configuration Protocol (DHCP) 113Example 12-3. Group Declarationgroup {option routers 192.168.1.254;option subnet-mask 255.255

Seite 18 - 1.4. Kickstart Options

114 Chapter 12. Dynamic Host Configuration Protocol (DHCP)Example 12-5. Static IP Address using DHCPhost apex {option host-name "apex.example.com&

Seite 19 - 1.4.2. auth

Chapter 12. Dynamic Host Configuration Protocol (DHCP) 115To start the DHCP service, use the command /sbin/service dhcpd start. To stop theDHCP server,

Seite 20

116 Chapter 12. Dynamic Host Configuration Protocol (DHCP)Table 12-1. DHCP Relay Agent OptionsArgument Description-i Names of the network interfaces to

Seite 21 - 1.4.3. bootloader

Chapter 12. Dynamic Host Configuration Protocol (DHCP) 11712.4. Additional ResourcesFor configuration options not covered here, please refer to the foll

Seite 22 - 1.4.4. clearpart

118 Chapter 12. Dynamic Host Configuration Protocol (DHCP)

Seite 23 - 1.4.8. firewall

Chapter 13.Apache ConfigurationThe Apache Configuration Tool allows you to configure the /etc/httpd/conf/httpd.confconfiguration file for your Apache Web s

Seite 24 - 1.4.10. Installation Methods

xii Introductiontop level of a menu on a GUI screen or windowWhen you see a word in this style, it indicates that the word is the top level of a pull-

Seite 25 - • --partition

120 Chapter 13. Apache ConfigurationFigure 13-1. Basic SettingsEnter a fully qualified domain name that you have the right to use in the Server Name tex

Seite 26 - 1.4.13. lang

Chapter 13. Apache Configuration 121Figure 13-2. Available AddressesTipIf you set Apache to listen to a port under 1024, you must be root to start it.

Seite 27 - 1.4.15. lilo

122 Chapter 13. Apache ConfigurationFigure 13-3. Site ConfigurationThe entries listed in the Directory Page Search List define the DirectoryIndex directi

Seite 28 - 1.4.17. mouse

Chapter 13. Apache Configuration 123ServerAdmin directive. Refer to Section 13.3.1.1 for information about configuring theServerAdmin directive.• Show f

Seite 29 - 1.4.18. network

124 Chapter 13. Apache ConfigurationUse the Log Level menu to set how verbose the error messages in the error logs will be. Itcan be set (from least ve

Seite 30 - 1.4.19. part

Chapter 13. Apache Configuration 125Figure 13-5. Environment VariablesUse the Set for CGI Scripts section to set an environment variable that is passed

Seite 31

126 Chapter 13. Apache ConfigurationFigure 13-6. DirectoriesClick the Edit button in the top right-hand corner to configure the Default Directory Op-tio

Seite 32 - 1.4.20. raid

Chapter 13. Apache Configuration 127• Full IP address — Allow access to a specific IP address.• A subnet — Such as 192.168.1.0/255.255.255.0• A network

Seite 33 - 1.4.23. skipx

128 Chapter 13. Apache ConfigurationFigure 13-8. Virtual Hostshttp://www.apache.org/docs/vhosts/ and the Apache documentation on your machineprovides m

Seite 34 - 1.4.27. xconfig

Chapter 13. Apache Configuration 129Figure 13-9. Default Virtual Hosts13.3.1.1.2. IP based Virtual HostIf you choose IP based Virtual Host, Figure 13-1

Seite 35 - %packages — Package Selection

Introduction xiiiAdditionally, we use several different strategies to draw your attention to certain pieces ofinformation. In order of how critical th

Seite 36

130 Chapter 13. Apache ConfigurationFigure 13-10. IP Based Virtual Hosts13.3.1.1.3. Name based Virtual HostIf you choose Name based Virtual Host, Figur

Seite 37 - %post section

Chapter 13. Apache Configuration 131Figure 13-11. Name Based Virtual Hosts13.3.1.2. SSLNoteYou can not use name based virtual hosts with SSL, because t

Seite 38 - # add another nameserver

132 Chapter 13. Apache ConfigurationFigure 13-12. SSL Support13.3.1.3. Additional Virtual Host OptionsThe Site Configuration, Environment Variables, and

Seite 39 - • On a network

Chapter 13. Apache Configuration 133Figure 13-13. Server ConfigurationThe Lock File value corresponds to the LockFile directive. This directive sets the

Seite 40

134 Chapter 13. Apache ConfigurationThe Group value corresponds to the Group directive. The Group directive is similar to theUser directive. Group sets

Seite 41

Chapter 13. Apache Configuration 135request has been served, before it closes the connection. Once a request has been received,the Connection Timeout v

Seite 42

136 Chapter 13. Apache Configuration13.7. Additional ResourcesTo learn more about Apache, refer to the following resources.13.7.1. Installed Documentat

Seite 43 - Kickstart Configurator

Chapter 14.Apache Secure Server Configuration14.1. IntroductionThis chapter provides basic information on an Apache server with the mod_ssl securitymod

Seite 44 - 2.2. Boot Loader Options

138 Chapter 14. Apache Secure Server Configurationapache-develThe apache-devel package contains the Apache include files, header files and the APXSutilit

Seite 45 - 2.3. Installation Method

Chapter 14. Apache Secure Server Configuration 139and protocols (such as POP, IMAP and LDAP) without requiring any changes to thedaemon’s code.Table 14

Seite 46 - 2.4. Partition Information

xiv Introduction3.1. Send in Your FeedbackIf you spot a typo in the Official Red Hat Linux Customization Guide, or if you have thought ofa way to make

Seite 47 - 2.4.1. Creating Partitions

140 Chapter 14. Apache Secure Server ConfigurationA secure server uses a certificate to identify itself to Web browsers. You can generate yourown certifi

Seite 48 - 2.5. Network Configuration

Chapter 14. Apache Secure Server Configuration 141mv /etc/httpd/conf/httpsd.crt /etc/httpd/conf/ssl.crt/server.crtThen start your secure Web server wit

Seite 49 - 2.6. Authentication

142 Chapter 14. Apache Secure Server ConfigurationTo see a list of CAs, click on the Security button on your Navigator toolbar or on thepadlock icon at

Seite 50 - 2.8. X Configuration

Chapter 14. Apache Secure Server Configuration 143/usr/bin/openssl genrsa 1024 > /etc/httpd/conf/ssl.key/server.keyto create your key. Then use this

Seite 51 - 2.8.2. Video Card

144 Chapter 14. Apache Secure Server ConfigurationType in the password that you chose when you were generating your key. Your system willdisplay some i

Seite 52 - 2.8.3. Monitor

Chapter 14. Apache Secure Server Configuration 145• Do not use either of the extra attributes (A challenge password and An optional com-pany name). To

Seite 53 - 2.9. Package Selection

146 Chapter 14. Apache Secure Server ConfigurationAfter you provide the correct information, a self-signed certificate will be created and placedin /etc

Seite 54 - 2.10. Pre-Installation Script

Chapter 14. Apache Secure Server Configuration 147Figure 14-1. The Default Home Page14.10. Accessing Your Secure ServerTo access your secure server, us

Seite 55 - 2.11.1. Chroot Environment

148 Chapter 14. Apache Secure Server ConfigurationNoteSome of the example URLs used in this manual may need to be changed, depending upon whetheryou ar

Seite 56 - 2.12. Saving the File

Chapter 15.BIND ConfigurationThis chapter assumes that you have a basic understanding of BIND and DNS; it does notattempt to explain the concepts of BI

Seite 57

Installation-Related Reference

Seite 58

150 Chapter 15. BIND ConfigurationFigure 15-1. bindconfThe BIND Configuration Tool configures the default zone directory to be /var/named. Allzone files s

Seite 59 - Rescue Mode

Chapter 15. BIND Configuration 151the configuration changes. It can also be incremented manually by clicking the Set buttonnext to the Serial Number val

Seite 60 - 3.2. Booting Rescue Mode

152 Chapter 15. BIND Configuration/etc/named.conf configuration file, write all the individual zone files in the /var/nameddirectory, and have the daemon

Seite 61 - mdu mzip traceroute

Chapter 15. BIND Configuration 153Figure 15-3. Adding a Reverse Master ZoneThe configuration shown in Figure 15-3 creates the following entry in /etc/na

Seite 62 - /dev/hdXX initrd=

154 Chapter 15. BIND Configuration/etc/named.conf configuration file, write all the individual zone files in the /var/nameddirectory, and have the daemon

Seite 63 - Chapter 4

Chapter 16.Mail Transport Agent (MTA) ConfigurationA Mail Transport Agent (MTA) is essential for sending email from a Red Hat Linux system.The Mail Use

Seite 64 - 4.3.2. Software RAID

156 Chapter 16. Mail Transport Agent (MTA) ConfigurationIf you selected Postfix, you must make sure the sendmail service is stopped and the postfixservi

Seite 65

System Configuration

Seite 67 - Software RAID Configuration

Chapter 17.Console AccessWhen normal (non-root) users log into a computer locally, they are given two types of specialpermissions:1. They can run cert

Seite 69

160 Chapter 17. Console Accessshutdown of the system will continue; if not, an error message will be written to the systemconsole instead.For more inf

Seite 70

Chapter 17. Console Access 16117.5. Making Files Accessible From the ConsoleIn /etc/security/console.perms, there is a section with lines like:floppy

Seite 71 - Network-Related References

162 Chapter 17. Console Accesscp /etc/pam.d/halt /etc/pam.d/fooNow, when you run /usr/bin/foo, it will call consolehelper, which will authenticate the

Seite 72

Chapter 18.Time and Date ConfigurationRed Hat Linux no longer includes timetool. The dateconfig utility has replaced timetool.The dateconfig application

Seite 73 - Network Configuration

164 Chapter 18. Time and Date ConfigurationFigure 18-1. Time and Date PropertiesTo change the date, use the arrows to the left and right of the month t

Seite 74

Chapter 18. Time and Date Configuration 165For more information on NTP, read the NTP documentation available in the/usr/share/doc/ntp-version-number di

Seite 75

166 Chapter 18. Time and Date Configuration

Seite 76

Chapter 19.User and Group ConfigurationUser Manager allows you to view, modify, add, and delete local users and groups.To use User Manager, you must be

Seite 77

168 Chapter 19. User and Group ConfigurationTipThe longer the user’s password, the more difficult it is for someone else to guess it and log in to theus

Seite 78

Chapter 19. User and Group Configuration 169Figure 19-3. User PropertiesThe User Properties window is divided into tabbed pages:• User Data — Basic use

Seite 79

Chapter 1.Kickstart Installations1.1. What are Kickstart Installations?Many system administrators would prefer to use an automated installation method

Seite 80

170 Chapter 19. User and Group Configuration19.4. Modifying Group PropertiesTo view the properties of an existing group, select the group from the grou

Seite 81

Chapter 20.Gathering System InformationBefore you learn how to configure your system, you should learn how to gather essentialsystem information. For e

Seite 82

172 Chapter 20. Gathering System InformationTable 20-1. Interactive top commandsCommand Description[Space] Immediately refresh the display[h] Display

Seite 83 - 6.9. Managing Hosts

Chapter 20. Gathering System Information 17320.2. Memory UsageThe free command displays the total amount of physical memory and swap space for thesyst

Seite 84 - 6.10. Managing DNS Settings

174 Chapter 20. Gathering System Information20.3. FilesystemsThe df command reports the system’s disk space usage. If you type the command df at ashel

Seite 85

Chapter 20. Gathering System Information 175the last line in the list. If you do not want to see all the subdirectories, use the commanddu -hs to see

Seite 86

176 Chapter 20. Gathering System Informationnetwork devices, pointing devices, system devices, and video cards. Click on the categoryname in the left

Seite 87 - Basic Firewall Configuration

Chapter 20. Gathering System Information 177• df manual page — Type man df to learn more about the df command and its many op-tions.• du manual page —

Seite 88 - 7.2. Local Hosts

178 Chapter 20. Gathering System Information

Seite 89 - 7.4. Configuring Services

Chapter 21.Printer ConfigurationThe printconf application allows users to configure a printer in Red Hat Linux. It helpsmaintain the /etc/printcap config

Seite 90 - 7.5. Activating the Firewall

18 Chapter 1. Kickstart Installations1.3. Creating the Kickstart FileThe kickstart file is a simple text file, containing a list of items, each identifie

Seite 91 - Chapter 8

180 Chapter 21. Printer ConfigurationFigure 21-1. printconfFive types of print queues can be configured with printconf:• Local Printer — a printer attac

Seite 92 - 8.2. TCP Wrappers

Chapter 21. Printer Configuration 18121.1. Adding a Local PrinterTo add a local printer such as one attached to the parallel port or USB port of your c

Seite 93 - 8.3. Serviceconf

182 Chapter 21. Printer Configurationdevice and click OK to add it to the printer device list. A printer device attached to theparallel port is usually

Seite 94 - 8.4. ntsysv

Chapter 21. Printer Configuration 183Figure 21-5. Adding a Remote PrinterText fields for the following options appears as shown in Figure 21-6:• Server

Seite 95 - 8.6. Additional Resources

184 Chapter 21. Printer ConfigurationImportantThe remote machine must be configured to allow the local machine to print on the desired queue.As root, cr

Seite 96 - 8.6.2. Useful Websites

Chapter 21. Printer Configuration 185• Workgroup — The name of the workgroup on the machine running Samba.Click the Translate \n => \r\n button to t

Seite 97 - Chapter 9

186 Chapter 21. Printer ConfigurationFigure 21-9. Adding an NCP PrinterText fields for the following options appear below the Queue Type menu as shown i

Seite 98 - 9.3.2. Using the scp Command

Chapter 21. Printer Configuration 18721.5. Adding a JetDirect PrinterTo add a JetDirect printer, click the New button in the main printconf window. The

Seite 99 - 9.3.4. Generating Key Pairs

188 Chapter 21. Printer ConfigurationFigure 21-12. Choosing a Print ServerThe next step is to select the type of printer that is connected to the JetDi

Seite 100

Chapter 21. Printer Configuration 189Figure 21-13. Selecting a Print DriverAs shown in Figure 21-14, the print driver processes the data that you want

Seite 101

Chapter 1. Kickstart Installations 191.4.1. autostepautostep (optional)Similar to interactive except it goes to the next screen for you. It is used mo

Seite 102 - 9.4. Additional Resources

190 Chapter 21. Printer ConfigurationClick the Apply button in the main window to save your changes to the /etc/printcapconfiguration file and restart th

Seite 103 - Network File System (NFS)

Chapter 21. Printer Configuration 191Figure 21-16. Editing a Printer21.8.1. Names and AliasesIf you want to rename a printer, change the value of Queue

Seite 104 - /sbin/service autofs status

192 Chapter 21. Printer Configuration21.8.4. Driver OptionsThe Driver Options tab displays advanced printer options. Options vary for each printdriver.

Seite 105

Chapter 21. Printer Configuration 193Your configuration is saved to the file settings.xml.If you save this file, you can restore your printer settings. Th

Seite 106 - 10.4. Additional Resources

194 Chapter 21. Printer Configuration• Support for IPP (next generation network printing protocol)• Autodetection of network printers• Web interface co

Seite 107 - Chapter 11

Chapter 21. Printer Configuration 19521.11.2. CUPS Configuration InterfaceAfter starting the cups daemon, open a Web browser and connect to the URLhttp:

Seite 108 - 11.2.1. Samba Passwords

196 Chapter 21. Printer Configuration21.12.2. Useful Websites• http://www.linuxprinting.org — GNU/Linux Printing contains a large amount informa-tion a

Seite 109

Chapter 22.Automated TasksIn Linux, tasks can be configured to run automatically within a specified period of time,on a specified date, or when the syste

Seite 110 - 11.4. Additional Resources

198 Chapter 22. Automated Tasks• minute — any integer from 0 to 59• hour — any integer from 0 to 23• day — any integer from 1 to 31 (must be a valid d

Seite 111 - Chapter 12

Chapter 22. Automated Tasks 19922.1.2. Controlling Access to CronThe /etc/cron.allow and /etc/cron.deny files are used to restrict access to cron. Thef

Seite 113 - -5; # Eastern Standard Time

20 Chapter 1. Kickstart Installations--enableldaptlsUse TLS (Transport Layer Security) lookups. This option allows LDAP to send en-crypted usernames a

Seite 114 - 12.2.2. Lease Database

200 Chapter 22. Automated TasksAfter the task is completed, Anacron records the date in a timestamp file in the/var/spool/anacron directory. Only the d

Seite 115 - 12.2.4. DHCP Relay Agent

Chapter 22. Automated Tasks 201• teatime — Specifies 4:00PM.• month-name day year format — For example, January 15 2002 specifies the 15th day ofJanuary

Seite 116 - ONBOOT=yes

202 Chapter 22. Automated Tasks22.3.4. Additional Command Line OptionsAdditional command line options for at and batch include:Table 22-1. at and batc

Seite 117 - 12.4. Additional Resources

Chapter 22. Automated Tasks 203• anacrontab man page — brief overview of the anacron configuration file.• /usr/share/doc/anacron- version /README descri

Seite 118

204 Chapter 22. Automated Tasks

Seite 119 - Apache Configuration

Chapter 23.Upgrading the KernelThe Red Hat Linux kernel is custom built by the Red Hat kernel team to ensure its integrityand compatibility with suppo

Seite 120

206 Chapter 23. Upgrading the Kernel/sbin/mkbootdisk kernelversionTipRefer to the man page for mkbootdisk for more options.Reboot your machine with th

Seite 121 - 13.2. Default Settings

Chapter 23. Upgrading the Kernel 20723.3. Downloading the Upgraded KernelThere are several ways to determine if there is an updated kernel available f

Seite 122

208 Chapter 23. Upgrading the KernelIf you plan to upgrade the kernel-source, kernel-docs, or kernel-utils packages, youprobably do not need to keep t

Seite 123 - 13.2.2. Logging

Chapter 23. Upgrading the Kernel 209To configure GRUB to boot the new kernel by default, change the value of the defaultvariable to the title section n

Seite 124 - 13.2.3. Environment Variables

Chapter 1. Kickstart Installations 21--enablesmbauthEnables authentication of users against an SMB server (typically a Samba orWindows server). SMB au

Seite 125 - 13.2.4. Directories

210 Chapter 23. Upgrading the Kernel

Seite 126 - DirectoryIndex (such

Chapter 24.Kernel ModulesThe Linux kernel has a modular design. At boot time, only a minimal resident kernel isloaded into memory. Thereafter, wheneve

Seite 127 - 13.3. Virtual Hosts Settings

212 Chapter 24. Kernel Modulessunrpc 61328 1 (autoclean) [nfs lockd]autofs 11264 4 (autoclean)3c59x 25344 1 (autoclean)ipchains 38976 0 (unused)ide-sc

Seite 128 - 13.3.1.1. General Options

Chapter 24. Kernel Modules 213• modprobe man page — description and list of command line options.• rmmod man page — description and list of command li

Seite 129

214 Chapter 24. Kernel Modules

Seite 130 - NameVir

Package Management

Seite 132 - 13.4. Server Settings

Chapter 25.Package Management with RPMThe Red Hat Package Manager (RPM) is an open packaging system, available for anyone touse, which runs on Red Hat

Seite 133

218 Chapter 25. Package Management with RPMSystem VerificationAnother powerful feature is the ability to verify packages. If you are worried that youde

Seite 134 - 13.5. Performance Tuning

Chapter 25. Package Management with RPM 219As you can see, RPM prints out the name of the package and then prints a succession ofhash marks as the pac

Seite 135 - 13.6. Saving Your Settings

22 Chapter 1. Kickstart Installations--linearIf using LILO, use the linear LILO option; this is only for backwards compatibility(and linear is now use

Seite 136 - 13.7. Additional Resources

220 Chapter 25. Package Management with RPMfailed dependencies:bar is needed by foo-1.0-1#To handle this error you should install the requested packag

Seite 137 - Chapter 14

Chapter 25. Package Management with RPM 221This message means that your changes to the configuration file may not be "forward com-patible" wit

Seite 138

222 Chapter 25. Package Management with RPM#NoteNotice that we used the package name foo. To query a package, you will need to replace foo withthe act

Seite 139

Chapter 25. Package Management with RPM 223• To verify an installed package against an RPM package file:rpm -Vp foo-1.0-1.i386.rpmThis command can be u

Seite 140

224 Chapter 25. Package Management with RPM25.3.1. Importing KeysWhen you import a public key, you add that key to your keyring (a file in which public

Seite 141 - 14.5. Types of Certificates

Chapter 25. Package Management with RPM 22525.4. Impressing Your Friends with RPMRPM is a useful tool for both managing your system and diagnosing and

Seite 142 - 14.6. Generating a Key

226 Chapter 25. Package Management with RPM/usr/man/man1/tac.1.gz/usr/man/man1/tail.1.gz/usr/man/man1/tr.1.gz/usr/man/man1/tsort.1.gz/usr/man/man1/une

Seite 143

Chapter 25. Package Management with RPM 227/usr/share/man/man8/pnpprobe.8.gz/usr/share/man/man8/sndconfig.8.gz/usr/share/sndconfig/sample.au/usr/share

Seite 144

228 Chapter 25. Package Management with RPM

Seite 145

Chapter 26.Gnome-RPMIf you do not want to use the command-line version of RPM, you can use Gnome-RPM, agraphical interface for Red Hat Package Manager

Seite 146 - 14.9. Testing Your Certificate

Chapter 1. Kickstart Installations 231.4.5. devicedevice (optional)On most PCI systems, the installation program will autoprobe for Ethernet and SCSIc

Seite 147

230 Chapter 26. Gnome-RPMmay make these operations easier to perform. Gnome-RPM can display packages in a vari-ety of different ways. Refer to Section

Seite 148 - 14.11. Additional Resources

Chapter 26. Gnome-RPM 231Figure 26-1. Main Gnome-RPM Window26.2. The Package DisplayEach folder icon in the tree view at left represents a group of pa

Seite 149 - BIND Configuration

232 Chapter 26. Gnome-RPMFigure 26-2. Selecting Packages in Gnome-RPMYou can select and unselect multiple packages, in more than one folder in the tre

Seite 150 - /var/named

Chapter 26. Gnome-RPM 233Figure 26-3. The Install WindowClick on the Add button. By default, if your CD-ROM is mounted with a Red Hat Linux CD-ROM, Gn

Seite 151 - /etc/named.conf:

234 Chapter 26. Gnome-RPM26.4. ConfigurationGnome-RPM offers a wide selection of choices for installing and uninstalling packages, doc-umentation and o

Seite 152 - /var/named directory

Chapter 26. Gnome-RPM 235option can be useful when two packages include files that are named the same but containdifferent contents.• Allow upgrade to

Seite 153

236 Chapter 26. Gnome-RPMTo change this path, type the full path to the RPMs you would like to work with. Choosingthe Apply or OK buttons will save th

Seite 154 - 15.3. Adding a Slave Zone

Chapter 26. Gnome-RPM 237CautionPackages not produced by Red Hat are not supported by Red Hat because Red Hat can not verifythe integrity of these pac

Seite 155 - Chapter 16

238 Chapter 26. Gnome-RPMFigure 26-8. Distribution Settings in PreferencesIn Distribution Settings, you can set the options for choosing the most appr

Seite 156 - /sbin/service sendmail start

Chapter 26. Gnome-RPM 239Figure 26-9. Query WindowThe name of the package is centered at the top of the box. Below, the box is divided into twocolumns

Seite 157 - System Configuration

24 Chapter 1. Kickstart Installationsfirewall [--high | --medium | --disabled] [--trust device ] [--dhcp] [--ssh] [--telnet] [--smtp] [--http] [--ftp]

Seite 158

240 Chapter 26. Gnome-RPMFigure 26-10. Verify WindowAs the package is being checked, you will see the progress in the Verify window. If thereare any p

Seite 159 - Console Access

Chapter 26. Gnome-RPM 241Once you have begun to uninstall packages, Gnome-RPM asks for confirmation, showinga window like the one in Figure 26-11. All

Seite 161

Chapter 27.Red Hat NetworkRed Hat Network is an Internet solution for managing a Red Hat Linux system or a networkof Red Hat Linux systems. All Securi

Seite 162 - 17.7. The floppy Group

244 Chapter 27. Red Hat Network

Seite 165 - 18.2. Time Zone Configuration

Appendix A.Building a Custom KernelMany people new to Linux often ask, "Why should I build my own kernel?" Given the ad-vances that have bee

Seite 166

248 Appendix A. Building a Custom Kernelwill remove any configuration files along with the remains of any previous builds thatmay be scattered around th

Seite 167 - User and Group Configuration

Appendix A. Building a Custom Kernel 249look similar to EXTRAVERSION = -0.1.21-jul2001). This will allow you to have theold working kernel and the new

Seite 168

Chapter 1. Kickstart Installations 25nfsInstall from the NFS server specified.• --server serverServer from which to install (hostname or IP).• --dir di

Seite 169 - 19.3. Adding a New Group

250 Appendix A. Building a Custom KernelA.3.1. GRUBIf you selected GRUB as your boot loader, modify /boot/grub/grub.conf. The defaultGRUB configuration

Seite 170

Appendix A. Building a Custom Kernel 251A.3.2. LILOTo configure LILO to boot the new kernel, you need to update the /etc/lilo.conf file andrun the comma

Seite 171 - Gathering System Information

252 Appendix A. Building a Custom KernelBoot image: /boot/vmlinuz-2.4.18-0.12-jul2001Added linux-oldWriting boot sector.Be sure the messages contains

Seite 172

Appendix B.Getting Started with Gnu Privacy GuardB.1. An Introduction to GnuPGHave you ever wondered if your email can be read during its transmission

Seite 173 - 20.2. Memory Usage

254 Appendix B. Getting Started with Gnu Privacy GuardB.2. Generating a KeypairTo begin using GnuPG, you must first generate a new keypair: a public ke

Seite 174 - 20.3. Filesystems

Appendix B. Getting Started with Gnu Privacy Guard 255disks) during the prime generation; this gives the random numbergenerator a better chance to gai

Seite 175 - 20.4. Hardware

256 Appendix B. Getting Started with Gnu Privacy Guard1024-bit DSA key, ID 823D25A9, created 2000-04-26ASCII armored output forced.Revocation certific

Seite 176 - 20.5. Additional Resources

Appendix B. Getting Started with Gnu Privacy Guard 257B.4.1. Exporting to a KeyserverIf you are only writing to a few correspondents, you can export y

Seite 177 - /proc directory

258 Appendix B. Getting Started with Gnu Privacy Guard• From your browser, go to Keyserver.Net (http://www.keyserver.net) and select the optionto add

Seite 178

Appendix B. Getting Started with Gnu Privacy Guard 259B.5. Importing a Public KeyThe other end of key exchange — importing other people’s public keys

Seite 179 - Printer Configuration

26 Chapter 1. Kickstart Installations1.4.11. interactiveinteractive (optional)Uses the information provided in the kickstart file during the installati

Seite 180

260 Appendix B. Getting Started with Gnu Privacy GuardB.7.1. Installed Documentation• man gpg and info gpg — Quick Reference of GnuPG commands and opt

Seite 181 - 21.1. Adding a Local Printer

IndexSymbols/etc/auto.master, 104/etc/fstab, 103/etc/hosts.lpd, ??/etc/httpd/conf/httpd.conf, 119/etc/printcap, 179/etc/printcap.local, 179/etc/syscon

Seite 182

262configuration file, 197example crontabs, 198user-defined tasks, 198crontab, 197CtrlAltDelshutdown, disabling, 159Ddate configuration, 163decryptionwith

Seite 183

263Hhardwareviewing, 175Hardware Browser, 175Hardware RAID(See RAID)hwbrowser, 175Iinformationabout your system, 171initrd, 249insmod, 212installation

Seite 184

264MMail Transport Agent(See MTA)Maximum RPM, 227memory usage, 173modem connection(See network configuration)modprobe, 212modules.conf, 211monitoring fi

Seite 185

265command line options, 192creating an alias, 191CUPS printing system, 193configuration interface, 195default printer, 190delete existing printer, 190

Seite 186

266SSamba, 107additional resources, 110configuration, 107smb.conf, 107encrypted passwords, 108pam_smbpass, 108reasons for using, 107shareconnecting to,

Seite 187

XxDSL connection(See network configuration)xinetd, 92

Seite 189

Chapter 1. Kickstart Installations 271.4.14. langsupportlangsupport (required)Sets the language(s) to install on the system. The same language codes u

Seite 190 - 21.7. Printing a Test Page

28 Chapter 1. Kickstart Installations--location=Specifies where the LILO boot record is written. Valid values are the following:mbr (the default) or pa

Seite 191 - 21.8.3. Driver

Chapter 1. Kickstart Installations 291.4.18. networknetwork (optional)Configures network information for the system. If the kickstart installation does

Seite 192 - 21.8.4. Driver Options

Red Hat Linux 7.3: The Official Red Hat Linux Customization GuideCopyright © 2002 by Red Hat, Inc.Red Hat, Inc.1801 Varsity DriveRaleigh NC 27606-2072

Seite 193

30 Chapter 1. Kickstart InstallationsThe static method requires that you enter all the required networking information in thekickstart file. As the nam

Seite 194 - /sbin/service lpd start

Chapter 1. Kickstart Installations 31swap --recommendedThe minimum size of the automatically-generated swap partition will be no smallerthan the amoun

Seite 195 - 21.12. Additional Resources

32 Chapter 1. Kickstart Installations--startSpecifies the starting cylinder for the partition. It requires that a drive be specifiedwith --ondisk or ond

Seite 196 - 21.12.2. Useful Websites

Chapter 1. Kickstart Installations 33--noformatDo not format the RAID array.The following example shows how to create a RAID level 1 partition for /,

Seite 197 - Chapter 22

34 Chapter 1. Kickstart Installations1.4.24. texttext (optional)Perform the kickstart installation in text mode. Kickstart installations are performed

Seite 198

Chapter 1. Kickstart Installations 35--monitor monUse monitor mon ; this monitor name should be from the list of monitors inXconfigurator. This is igno

Seite 199 - 22.2. Anacron

36 Chapter 1. Kickstart InstallationsUse the %packages --resolvedeps1to install the listed packages and automatically resolvepackage dependencies.Use

Seite 200 - 22.3. At and Batch

Chapter 1. Kickstart Installations 37@ GNOME@ KDE@ Server@ Everything1.4.30. %pre — Pre-Installation Configuration SectionYou can add commands to run o

Seite 201 - 22.3.3. Viewing Pending Jobs

38 Chapter 1. Kickstart Installations# add comment to /etc/motdecho "Kickstart-installed Red Hat Linux ‘/bin/date‘" /etc/motd# add another n

Seite 202 - 22.4. Additional Resources

Chapter 1. Kickstart Installations 391.5. Where to Put A Kickstart FileA kickstart file must be placed in one of two locations:• On a boot disk• On a n

Seite 204

40 Chapter 1. Kickstart Installationsip-addr -kickstartThe ip-addr section of the filename should be replaced with the client’s IP address indotted dec

Seite 205 - Upgrading the Kernel

Chapter 1. Kickstart Installations 41ks=hd: device / fileThe installation program will mount the filesystem on device (which must be vfator ext2), and

Seite 206

42 Chapter 1. Kickstart Installations

Seite 207 - 23.4. Performing the Upgrade

Chapter 2.Kickstart ConfiguratorKickstart Configurator allows you to create a kickstart file using a graphical user interface,so that you do not have to

Seite 208 - 23.5.1. GRUB

44 Chapter 2. Kickstart ConfiguratorIf you have a two-button button mouse, you can emulate a three-button mouse by selectingEmulate 3 Buttons. If this

Seite 209 - 23.5.2. LILO

Chapter 2. Kickstart Configurator 45If you choose to install a boot loader, you must also choose which boot loader to install(GRUB or LILO) and where t

Seite 210

46 Chapter 2. Kickstart Configuratorthe fully-qualified domain name or IP address of the NFS server. For the NFS directory,enter the name of the NFS dir

Seite 211 - Kernel Modules

Chapter 2. Kickstart Configurator 47You can initialize the disk label to the default for the architecture of the system (msdos forx86 and gpt for Itani

Seite 212 - 24.2. Additional Resources

48 Chapter 2. Kickstart Configurator2.5. Network ConfigurationFigure 2-6. Network ConfigurationThere are three network configuration options: DHCP, Static

Seite 213

Chapter 2. Kickstart Configurator 492.6. AuthenticationFigure 2-7. AuthenticationIn the Authentication section, select whether to use shadow passwords

Seite 214

Table of ContentsIntroduction ...

Seite 215 - Package Management

50 Chapter 2. Kickstart Configurator2.7. Firewall ConfigurationFigure 2-8. Firewall ConfigurationThe Firewall Configuration window is identical to the scr

Seite 216

Chapter 2. Kickstart Configurator 512.8.1. GeneralFigure 2-9. X Configuration - GeneralThe first step in configuring X is to choose the default color dept

Seite 217 - Package Management with RPM

52 Chapter 2. Kickstart ConfiguratorFigure 2-10. X Configuration - Video Card2.8.3. MonitorAfter configuring the video card, click on the Monitor tab sho

Seite 218 - 25.2. Using RPM

Chapter 2. Kickstart Configurator 53Figure 2-11. X Configuration - Monitor2.9. Package SelectionFigure 2-12. Package SelectionThe Package Selection wind

Seite 219 - 25.2.2.2. Conflicting Files

54 Chapter 2. Kickstart Configurator2.10. Pre-Installation ScriptFigure 2-13. Pre-Installation ScriptYou can add commands to run on the system immediat

Seite 220 - 25.2.4. Upgrading

Chapter 2. Kickstart Configurator 552.11. Post-Installation ScriptFigure 2-14. Post-Installation ScriptYou can also add commands to execute on the syst

Seite 221 - 25.2.6. Querying

56 Chapter 2. Kickstart Configuratorecho "Hackers will be punished!" > /mnt/sysimage/etc/motd2.11.2. Use an InterpreterIf you want to spec

Seite 222 - 25.2.7. Verifying

Chapter 2. Kickstart Configurator 57Figure 2-15. Confirm OptionsIf you are happy with your choices, click the Save File button within the dialog box. A

Seite 223

58 Chapter 2. Kickstart Configurator

Seite 224 - 25.3.3. More about GnuPG

Chapter 3.Rescue ModeWhen things go wrong, there are ways to fix problems. However, these methods require thatyou understand the system well. This chap

Seite 225

7.4. Configuring Services ... 897.5. Activating the Firewall...

Seite 226

60 Chapter 3. Rescue ModeIn these situations, you may be unable to boot Red Hat Linux. If you can get into rescuemode, you might be able to resolve th

Seite 227 - 25.5. Additional Resources

Chapter 3. Rescue Mode 61mount -t ext3 /dev/hda5 /fooIn the above command, /foo is a directory that you have created and /dev/hda5 is thepartition you

Seite 228

62 Chapter 3. Rescue Mode5. Back at the GRUB screen, type b to boot into single user mode.If you are using LILO, specify one of these options at the L

Seite 229 - Gnome-RPM

Chapter 4.Redundant Array of Independent Disks (RAID)4.1. What is RAID?The basic idea behind RAID is to combine multiple small, inexpensive disk drive

Seite 230 - 26.1. Starting Gnome-RPM

64 Chapter 4. Redundant Array of Independent Disks (RAID)add them to the RAID controller’s configuration, and the operating system never knows thediffe

Seite 231 - 26.2. The Package Display

Chapter 4. Redundant Array of Independent Disks (RAID) 65high cost.2The storage capacity of the level 1 array is equal to the capacity of one of themi

Seite 232 - 26.3. Installing New Packages

66 Chapter 4. Redundant Array of Independent Disks (RAID)

Seite 233

Chapter 5.Software RAID ConfigurationRead Chapter 4 first to learn about RAID, the differences between Hardware and SoftwareRAID, and the differences be

Seite 234 - 26.4. Configuration

68 Chapter 5. Software RAID Configuration• For Allowable Drives, select the drive on which RAID will be created. If you have multi-ple drives, all driv

Seite 235 - Obsoletes header from

Chapter 5. Software RAID Configuration 69• Select which partitions will go into this RAID array and click OK.• A spare partition can be specified for RA

Seite 236

III. System Configuration... 15717. Console Ac

Seite 237

70 Chapter 5. Software RAID Configuration

Seite 238 - 26.5. Package Manipulation

Network-Related References

Seite 240 - 26.5.3. Uninstalling Packages

Chapter 6.Network ConfigurationTo communicate with other computers, computers need a network connection. This is ac-complished by having the operating

Seite 241 - 26.5.3.1. Upgrading Packages

74 Chapter 6. Network ConfigurationThis chapter will discuss each of these steps for each type of network connection.6.2. Establishing an Ethernet Conn

Seite 242 - 242 Chapter 26. Gnome-RPM

Chapter 6. Network Configuration 75After configuring the Ethernet device, it appears in the device list as shown in Figure 6-2.Figure 6-2. Ethernet Devi

Seite 243 - Red Hat Network

76 Chapter 6. Network ConfigurationFigure 6-3. ISDN Settings5. If your ISP is in the pre-configured list, select it. Otherwise, enter the required infor

Seite 244

Chapter 6. Network Configuration 776.4. Establishing a Modem ConnectionA modem can be used to configure an Internet connection over an active phone line

Seite 245 - Appendixes

78 Chapter 6. Network ConfigurationFigure 6-6. Modem DeviceBe sure to click Apply to save the changes.After adding the modem device, you can edit its c

Seite 246

Chapter 6. Network Configuration 79Figure 6-7. xDSL Settings5. If the Select Ethernet Adapter window appears, select the manufacturer and modelof the E

Seite 247 - Building a Custom Kernel

IV. Package Management...21525. Package Manag

Seite 248

80 Chapter 6. Network Configuration6.6. Establishing a Token Ring ConnectionA token ring network is a network in which all the computers are connected

Seite 249 - A.2. Making an initrd Image

Chapter 6. Network Configuration 81Figure 6-10. Token Ring DeviceBe sure to click Apply to save the changes.After adding the device, you can edit its c

Seite 250 - A.3.1. GRUB

82 Chapter 6. Network Configuration6.8. Establishing a Wireless ConnectionWireless Ethernet devices are becoming increasingly popular. The configuration

Seite 251 - A.3.2. LILO

Chapter 6. Network Configuration 83After configuring the wireless device, it appears in the device list as shown in Figure 6-13.Figure 6-13. Wireless De

Seite 252 - A.5. Additional Resources

84 Chapter 6. Network ConfigurationFigure 6-14. Hosts ConfigurationTipTo change lookup order, edit the /etc/host.conf file. The line order hosts, bind sp

Seite 253 - Appendix B

Chapter 6. Network Configuration 85NoteThe name servers section does not configure the system to be a name server.If the DNS server names are retrieved

Seite 254 - B.2. Generating a Keypair

86 Chapter 6. Network Configuration

Seite 255 - --gen-revoke option:

Chapter 7.Basic Firewall ConfigurationJust as a firewall in a building attempts to prevent a fire from spreading, a computer fire-wall attempts to prevent

Seite 256 - ASCII armored output forced

88 Chapter 7. Basic Firewall Configuration7.1. BasicFigure 7-1. BasicAfter starting the program, choose the appropriate security level for your system:

Seite 257

Chapter 7. Basic Firewall Configuration 89Figure 7-2. Local Hosts7.3. DHCPIf you are using DHCP to activate any Ethernet interfaces on the system, you

Seite 258 - BEGIN PGP to END

IntroductionWelcome to the Official Red Hat Linux Customization Guide.The Official Red Hat Linux Customization Guide contains information on how to cust

Seite 259 - B.7. Additional Resources

90 Chapter 7. Basic Firewall Configuration• Web Server — Choose this option if you want people to connect to a Web server such asApache running on your

Seite 260 - B.7.3. Related Books

Chapter 8.Controlling Access to ServicesMaintaining security on your Red Hat Linux system is extremely important. One way tomanage security on your sy

Seite 261 - (See network connection)

92 Chapter 8. Controlling Access to Services• 0 — Halt• 1 — Single-user mode• 2 — Not used (user-definable)• 3 — Full multi-user mode• 4 — Not used (us

Seite 262

Chapter 8. Controlling Access to Services 93will take effect. For a list of network services controlled by xinetd list of the contents of the/etc/xine

Seite 263

94 Chapter 8. Controlling Access to ServicesTo start, stop, or restart a service immediately, select the service and choose the action fromthe Actions

Seite 264

Chapter 8. Controlling Access to Services 95WarningChanges do not take effect immediately after using ntsysv. You must stop or start the individualser

Seite 265

96 Chapter 8. Controlling Access to Services8.6.1. Installed Documentation• man ntsysv — The ntsysv man page.• man chkconfig — The chkconfig man page.

Seite 266

Chapter 9.OpenSSHOpenSSH is a free, open source implementation of the SSH (Secure SHell) protocols. It re-places telnet, ftp, rlogin, rsh, and rcp wit

Seite 267 - (See network configuration)

98 Chapter 9. OpenSSHssh penguin.example.netThe first time you ssh to a remote machine, you will see a message similar to the following:The authenticit

Seite 268

Chapter 9. OpenSSH 999.3.3. Using the sftp CommandThe sftp utility can be used to open a secure, interactive FTP session. It is similar toftp except t

Kommentare zu diesen Handbüchern

Keine Kommentare