Red Hat NETSCAPE MANAGEMENT SYSTEM 4.5 - CUSTOMIZATION GUIDE Przewodnik Instalacji Strona 1

Przeglądaj online lub pobierz Przewodnik Instalacji dla Podręczniki do oprogramowania Red Hat NETSCAPE MANAGEMENT SYSTEM 4.5 - CUSTOMIZATION GUIDE. Red Hat NETSCAPE MANAGEMENT SYSTEM 4.5 - CUSTOMIZATION GUIDE Installation guide Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 268
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów

Podsumowanie treści

Strona 1 - Customization Guide

Red Hat Linux 7.3The Official Red Hat LinuxCustomization Guide

Strona 2

x IntroductionNetwork ConfigurationThis chapter has been written to discussed the revised Red Hat Network Administra-tion Tool. It is now more task-ori

Strona 3

100 Chapter 9. OpenSSH2. Change the permissions of your .ssh directory using the command chmod 755~/.ssh.3. Copy the contents of ~/.ssh/id_dsa.pub to

Strona 4

Chapter 9. OpenSSH 101Accept the default file location (~/.ssh/identity). Enter a passphrase different fromyour account password. Confirm the passphrase

Strona 5 - Table of Contents

102 Chapter 9. OpenSSHbe prompted for both. From this point on, you should not be prompted for a passwordby ssh, scp, or sftp.9.3.4.5. Configuring ssh-

Strona 6

Chapter 10.Network File System (NFS)Network File System (NFS) is a way to share files between machines on a network as if thefiles were located on the c

Strona 7

104 Chapter 10. Network File System (NFS)10.2.2. Mounting NFS Filesystems using autofsA third option for mounting an NFS share is the use of autofs. A

Strona 8

Chapter 10. Network File System (NFS) 10510.3. Exporting NFS FilesystemsThe /etc/exports file controls what filesystems the NFS server exports. Its form

Strona 9 - Introduction

106 Chapter 10. Network File System (NFS)/sbin/chkconfig --level 345 nfs onYou can also use ntsysv or serviceconf to configure which services start at

Strona 10 - 2. Document Conventions

Chapter 11.SambaSamba uses the SMB protocol to share files and printers across a network connection. Oper-ating systems that support this protocol incl

Strona 11

108 Chapter 11. Samba11.2.1. Samba PasswordsIn Red Hat Linux 7.3 encrypted passwords are enabled by default because it is more secure. Ifencrypted pas

Strona 12 - Mail backupfiles mail reports

Chapter 11. Samba 109the password he uses to log in to the Red Hat Linux system as well as the password he mustprovide to connect to a Samba share are

Strona 13 - 3. More to Come

Introduction xicommandLinux commands (and other operating system commands, when used) are representedthis way. This style should indicate to you that

Strona 14 - 4. Sign Up for Support

110 Chapter 11. SambaIf the SMB share you are connecting to requires a user name and password combination, youmust specify them in the Location: bar u

Strona 15

Chapter 12.Dynamic Host Configuration Protocol (DHCP)Dynamic Host Configuration Protocol (DHCP) is network protocol for automatically assign-ing TCP/IP

Strona 16

112 Chapter 12. Dynamic Host Configuration Protocol (DHCP)ImportantIf you change the configuration file, the changes will not take effect until you resta

Strona 17 - Kickstart Installations

Chapter 12. Dynamic Host Configuration Protocol (DHCP) 113Example 12-3. Group Declarationgroup {option routers 192.168.1.254;option subnet-mask 255.255

Strona 18 - 1.4. Kickstart Options

114 Chapter 12. Dynamic Host Configuration Protocol (DHCP)Example 12-5. Static IP Address using DHCPhost apex {option host-name "apex.example.com&

Strona 19 - 1.4.2. auth

Chapter 12. Dynamic Host Configuration Protocol (DHCP) 115To start the DHCP service, use the command /sbin/service dhcpd start. To stop theDHCP server,

Strona 20

116 Chapter 12. Dynamic Host Configuration Protocol (DHCP)Table 12-1. DHCP Relay Agent OptionsArgument Description-i Names of the network interfaces to

Strona 21 - 1.4.3. bootloader

Chapter 12. Dynamic Host Configuration Protocol (DHCP) 11712.4. Additional ResourcesFor configuration options not covered here, please refer to the foll

Strona 22 - 1.4.4. clearpart

118 Chapter 12. Dynamic Host Configuration Protocol (DHCP)

Strona 23 - 1.4.8. firewall

Chapter 13.Apache ConfigurationThe Apache Configuration Tool allows you to configure the /etc/httpd/conf/httpd.confconfiguration file for your Apache Web s

Strona 24 - 1.4.10. Installation Methods

xii Introductiontop level of a menu on a GUI screen or windowWhen you see a word in this style, it indicates that the word is the top level of a pull-

Strona 25 - • --partition

120 Chapter 13. Apache ConfigurationFigure 13-1. Basic SettingsEnter a fully qualified domain name that you have the right to use in the Server Name tex

Strona 26 - 1.4.13. lang

Chapter 13. Apache Configuration 121Figure 13-2. Available AddressesTipIf you set Apache to listen to a port under 1024, you must be root to start it.

Strona 27 - 1.4.15. lilo

122 Chapter 13. Apache ConfigurationFigure 13-3. Site ConfigurationThe entries listed in the Directory Page Search List define the DirectoryIndex directi

Strona 28 - 1.4.17. mouse

Chapter 13. Apache Configuration 123ServerAdmin directive. Refer to Section 13.3.1.1 for information about configuring theServerAdmin directive.• Show f

Strona 29 - 1.4.18. network

124 Chapter 13. Apache ConfigurationUse the Log Level menu to set how verbose the error messages in the error logs will be. Itcan be set (from least ve

Strona 30 - 1.4.19. part

Chapter 13. Apache Configuration 125Figure 13-5. Environment VariablesUse the Set for CGI Scripts section to set an environment variable that is passed

Strona 31

126 Chapter 13. Apache ConfigurationFigure 13-6. DirectoriesClick the Edit button in the top right-hand corner to configure the Default Directory Op-tio

Strona 32 - 1.4.20. raid

Chapter 13. Apache Configuration 127• Full IP address — Allow access to a specific IP address.• A subnet — Such as 192.168.1.0/255.255.255.0• A network

Strona 33 - 1.4.23. skipx

128 Chapter 13. Apache ConfigurationFigure 13-8. Virtual Hostshttp://www.apache.org/docs/vhosts/ and the Apache documentation on your machineprovides m

Strona 34 - 1.4.27. xconfig

Chapter 13. Apache Configuration 129Figure 13-9. Default Virtual Hosts13.3.1.1.2. IP based Virtual HostIf you choose IP based Virtual Host, Figure 13-1

Strona 35 - %packages — Package Selection

Introduction xiiiAdditionally, we use several different strategies to draw your attention to certain pieces ofinformation. In order of how critical th

Strona 36

130 Chapter 13. Apache ConfigurationFigure 13-10. IP Based Virtual Hosts13.3.1.1.3. Name based Virtual HostIf you choose Name based Virtual Host, Figur

Strona 37 - %post section

Chapter 13. Apache Configuration 131Figure 13-11. Name Based Virtual Hosts13.3.1.2. SSLNoteYou can not use name based virtual hosts with SSL, because t

Strona 38 - # add another nameserver

132 Chapter 13. Apache ConfigurationFigure 13-12. SSL Support13.3.1.3. Additional Virtual Host OptionsThe Site Configuration, Environment Variables, and

Strona 39 - • On a network

Chapter 13. Apache Configuration 133Figure 13-13. Server ConfigurationThe Lock File value corresponds to the LockFile directive. This directive sets the

Strona 40

134 Chapter 13. Apache ConfigurationThe Group value corresponds to the Group directive. The Group directive is similar to theUser directive. Group sets

Strona 41

Chapter 13. Apache Configuration 135request has been served, before it closes the connection. Once a request has been received,the Connection Timeout v

Strona 42

136 Chapter 13. Apache Configuration13.7. Additional ResourcesTo learn more about Apache, refer to the following resources.13.7.1. Installed Documentat

Strona 43 - Kickstart Configurator

Chapter 14.Apache Secure Server Configuration14.1. IntroductionThis chapter provides basic information on an Apache server with the mod_ssl securitymod

Strona 44 - 2.2. Boot Loader Options

138 Chapter 14. Apache Secure Server Configurationapache-develThe apache-devel package contains the Apache include files, header files and the APXSutilit

Strona 45 - 2.3. Installation Method

Chapter 14. Apache Secure Server Configuration 139and protocols (such as POP, IMAP and LDAP) without requiring any changes to thedaemon’s code.Table 14

Strona 46 - 2.4. Partition Information

xiv Introduction3.1. Send in Your FeedbackIf you spot a typo in the Official Red Hat Linux Customization Guide, or if you have thought ofa way to make

Strona 47 - 2.4.1. Creating Partitions

140 Chapter 14. Apache Secure Server ConfigurationA secure server uses a certificate to identify itself to Web browsers. You can generate yourown certifi

Strona 48 - 2.5. Network Configuration

Chapter 14. Apache Secure Server Configuration 141mv /etc/httpd/conf/httpsd.crt /etc/httpd/conf/ssl.crt/server.crtThen start your secure Web server wit

Strona 49 - 2.6. Authentication

142 Chapter 14. Apache Secure Server ConfigurationTo see a list of CAs, click on the Security button on your Navigator toolbar or on thepadlock icon at

Strona 50 - 2.8. X Configuration

Chapter 14. Apache Secure Server Configuration 143/usr/bin/openssl genrsa 1024 > /etc/httpd/conf/ssl.key/server.keyto create your key. Then use this

Strona 51 - 2.8.2. Video Card

144 Chapter 14. Apache Secure Server ConfigurationType in the password that you chose when you were generating your key. Your system willdisplay some i

Strona 52 - 2.8.3. Monitor

Chapter 14. Apache Secure Server Configuration 145• Do not use either of the extra attributes (A challenge password and An optional com-pany name). To

Strona 53 - 2.9. Package Selection

146 Chapter 14. Apache Secure Server ConfigurationAfter you provide the correct information, a self-signed certificate will be created and placedin /etc

Strona 54 - 2.10. Pre-Installation Script

Chapter 14. Apache Secure Server Configuration 147Figure 14-1. The Default Home Page14.10. Accessing Your Secure ServerTo access your secure server, us

Strona 55 - 2.11.1. Chroot Environment

148 Chapter 14. Apache Secure Server ConfigurationNoteSome of the example URLs used in this manual may need to be changed, depending upon whetheryou ar

Strona 56 - 2.12. Saving the File

Chapter 15.BIND ConfigurationThis chapter assumes that you have a basic understanding of BIND and DNS; it does notattempt to explain the concepts of BI

Strona 57

Installation-Related Reference

Strona 58

150 Chapter 15. BIND ConfigurationFigure 15-1. bindconfThe BIND Configuration Tool configures the default zone directory to be /var/named. Allzone files s

Strona 59 - Rescue Mode

Chapter 15. BIND Configuration 151the configuration changes. It can also be incremented manually by clicking the Set buttonnext to the Serial Number val

Strona 60 - 3.2. Booting Rescue Mode

152 Chapter 15. BIND Configuration/etc/named.conf configuration file, write all the individual zone files in the /var/nameddirectory, and have the daemon

Strona 61 - mdu mzip traceroute

Chapter 15. BIND Configuration 153Figure 15-3. Adding a Reverse Master ZoneThe configuration shown in Figure 15-3 creates the following entry in /etc/na

Strona 62 - /dev/hdXX initrd=

154 Chapter 15. BIND Configuration/etc/named.conf configuration file, write all the individual zone files in the /var/nameddirectory, and have the daemon

Strona 63 - Chapter 4

Chapter 16.Mail Transport Agent (MTA) ConfigurationA Mail Transport Agent (MTA) is essential for sending email from a Red Hat Linux system.The Mail Use

Strona 64 - 4.3.2. Software RAID

156 Chapter 16. Mail Transport Agent (MTA) ConfigurationIf you selected Postfix, you must make sure the sendmail service is stopped and the postfixservi

Strona 65

System Configuration

Strona 67 - Software RAID Configuration

Chapter 17.Console AccessWhen normal (non-root) users log into a computer locally, they are given two types of specialpermissions:1. They can run cert

Strona 69

160 Chapter 17. Console Accessshutdown of the system will continue; if not, an error message will be written to the systemconsole instead.For more inf

Strona 70

Chapter 17. Console Access 16117.5. Making Files Accessible From the ConsoleIn /etc/security/console.perms, there is a section with lines like:floppy

Strona 71 - Network-Related References

162 Chapter 17. Console Accesscp /etc/pam.d/halt /etc/pam.d/fooNow, when you run /usr/bin/foo, it will call consolehelper, which will authenticate the

Strona 72

Chapter 18.Time and Date ConfigurationRed Hat Linux no longer includes timetool. The dateconfig utility has replaced timetool.The dateconfig application

Strona 73 - Network Configuration

164 Chapter 18. Time and Date ConfigurationFigure 18-1. Time and Date PropertiesTo change the date, use the arrows to the left and right of the month t

Strona 74

Chapter 18. Time and Date Configuration 165For more information on NTP, read the NTP documentation available in the/usr/share/doc/ntp-version-number di

Strona 75

166 Chapter 18. Time and Date Configuration

Strona 76

Chapter 19.User and Group ConfigurationUser Manager allows you to view, modify, add, and delete local users and groups.To use User Manager, you must be

Strona 77

168 Chapter 19. User and Group ConfigurationTipThe longer the user’s password, the more difficult it is for someone else to guess it and log in to theus

Strona 78

Chapter 19. User and Group Configuration 169Figure 19-3. User PropertiesThe User Properties window is divided into tabbed pages:• User Data — Basic use

Strona 79

Chapter 1.Kickstart Installations1.1. What are Kickstart Installations?Many system administrators would prefer to use an automated installation method

Strona 80

170 Chapter 19. User and Group Configuration19.4. Modifying Group PropertiesTo view the properties of an existing group, select the group from the grou

Strona 81

Chapter 20.Gathering System InformationBefore you learn how to configure your system, you should learn how to gather essentialsystem information. For e

Strona 82

172 Chapter 20. Gathering System InformationTable 20-1. Interactive top commandsCommand Description[Space] Immediately refresh the display[h] Display

Strona 83 - 6.9. Managing Hosts

Chapter 20. Gathering System Information 17320.2. Memory UsageThe free command displays the total amount of physical memory and swap space for thesyst

Strona 84 - 6.10. Managing DNS Settings

174 Chapter 20. Gathering System Information20.3. FilesystemsThe df command reports the system’s disk space usage. If you type the command df at ashel

Strona 85

Chapter 20. Gathering System Information 175the last line in the list. If you do not want to see all the subdirectories, use the commanddu -hs to see

Strona 86

176 Chapter 20. Gathering System Informationnetwork devices, pointing devices, system devices, and video cards. Click on the categoryname in the left

Strona 87 - Basic Firewall Configuration

Chapter 20. Gathering System Information 177• df manual page — Type man df to learn more about the df command and its many op-tions.• du manual page —

Strona 88 - 7.2. Local Hosts

178 Chapter 20. Gathering System Information

Strona 89 - 7.4. Configuring Services

Chapter 21.Printer ConfigurationThe printconf application allows users to configure a printer in Red Hat Linux. It helpsmaintain the /etc/printcap config

Strona 90 - 7.5. Activating the Firewall

18 Chapter 1. Kickstart Installations1.3. Creating the Kickstart FileThe kickstart file is a simple text file, containing a list of items, each identifie

Strona 91 - Chapter 8

180 Chapter 21. Printer ConfigurationFigure 21-1. printconfFive types of print queues can be configured with printconf:• Local Printer — a printer attac

Strona 92 - 8.2. TCP Wrappers

Chapter 21. Printer Configuration 18121.1. Adding a Local PrinterTo add a local printer such as one attached to the parallel port or USB port of your c

Strona 93 - 8.3. Serviceconf

182 Chapter 21. Printer Configurationdevice and click OK to add it to the printer device list. A printer device attached to theparallel port is usually

Strona 94 - 8.4. ntsysv

Chapter 21. Printer Configuration 183Figure 21-5. Adding a Remote PrinterText fields for the following options appears as shown in Figure 21-6:• Server

Strona 95 - 8.6. Additional Resources

184 Chapter 21. Printer ConfigurationImportantThe remote machine must be configured to allow the local machine to print on the desired queue.As root, cr

Strona 96 - 8.6.2. Useful Websites

Chapter 21. Printer Configuration 185• Workgroup — The name of the workgroup on the machine running Samba.Click the Translate \n => \r\n button to t

Strona 97 - Chapter 9

186 Chapter 21. Printer ConfigurationFigure 21-9. Adding an NCP PrinterText fields for the following options appear below the Queue Type menu as shown i

Strona 98 - 9.3.2. Using the scp Command

Chapter 21. Printer Configuration 18721.5. Adding a JetDirect PrinterTo add a JetDirect printer, click the New button in the main printconf window. The

Strona 99 - 9.3.4. Generating Key Pairs

188 Chapter 21. Printer ConfigurationFigure 21-12. Choosing a Print ServerThe next step is to select the type of printer that is connected to the JetDi

Strona 100

Chapter 21. Printer Configuration 189Figure 21-13. Selecting a Print DriverAs shown in Figure 21-14, the print driver processes the data that you want

Strona 101

Chapter 1. Kickstart Installations 191.4.1. autostepautostep (optional)Similar to interactive except it goes to the next screen for you. It is used mo

Strona 102 - 9.4. Additional Resources

190 Chapter 21. Printer ConfigurationClick the Apply button in the main window to save your changes to the /etc/printcapconfiguration file and restart th

Strona 103 - Network File System (NFS)

Chapter 21. Printer Configuration 191Figure 21-16. Editing a Printer21.8.1. Names and AliasesIf you want to rename a printer, change the value of Queue

Strona 104 - /sbin/service autofs status

192 Chapter 21. Printer Configuration21.8.4. Driver OptionsThe Driver Options tab displays advanced printer options. Options vary for each printdriver.

Strona 105

Chapter 21. Printer Configuration 193Your configuration is saved to the file settings.xml.If you save this file, you can restore your printer settings. Th

Strona 106 - 10.4. Additional Resources

194 Chapter 21. Printer Configuration• Support for IPP (next generation network printing protocol)• Autodetection of network printers• Web interface co

Strona 107 - Chapter 11

Chapter 21. Printer Configuration 19521.11.2. CUPS Configuration InterfaceAfter starting the cups daemon, open a Web browser and connect to the URLhttp:

Strona 108 - 11.2.1. Samba Passwords

196 Chapter 21. Printer Configuration21.12.2. Useful Websites• http://www.linuxprinting.org — GNU/Linux Printing contains a large amount informa-tion a

Strona 109

Chapter 22.Automated TasksIn Linux, tasks can be configured to run automatically within a specified period of time,on a specified date, or when the syste

Strona 110 - 11.4. Additional Resources

198 Chapter 22. Automated Tasks• minute — any integer from 0 to 59• hour — any integer from 0 to 23• day — any integer from 1 to 31 (must be a valid d

Strona 111 - Chapter 12

Chapter 22. Automated Tasks 19922.1.2. Controlling Access to CronThe /etc/cron.allow and /etc/cron.deny files are used to restrict access to cron. Thef

Strona 113 - -5; # Eastern Standard Time

20 Chapter 1. Kickstart Installations--enableldaptlsUse TLS (Transport Layer Security) lookups. This option allows LDAP to send en-crypted usernames a

Strona 114 - 12.2.2. Lease Database

200 Chapter 22. Automated TasksAfter the task is completed, Anacron records the date in a timestamp file in the/var/spool/anacron directory. Only the d

Strona 115 - 12.2.4. DHCP Relay Agent

Chapter 22. Automated Tasks 201• teatime — Specifies 4:00PM.• month-name day year format — For example, January 15 2002 specifies the 15th day ofJanuary

Strona 116 - ONBOOT=yes

202 Chapter 22. Automated Tasks22.3.4. Additional Command Line OptionsAdditional command line options for at and batch include:Table 22-1. at and batc

Strona 117 - 12.4. Additional Resources

Chapter 22. Automated Tasks 203• anacrontab man page — brief overview of the anacron configuration file.• /usr/share/doc/anacron- version /README descri

Strona 118

204 Chapter 22. Automated Tasks

Strona 119 - Apache Configuration

Chapter 23.Upgrading the KernelThe Red Hat Linux kernel is custom built by the Red Hat kernel team to ensure its integrityand compatibility with suppo

Strona 120

206 Chapter 23. Upgrading the Kernel/sbin/mkbootdisk kernelversionTipRefer to the man page for mkbootdisk for more options.Reboot your machine with th

Strona 121 - 13.2. Default Settings

Chapter 23. Upgrading the Kernel 20723.3. Downloading the Upgraded KernelThere are several ways to determine if there is an updated kernel available f

Strona 122

208 Chapter 23. Upgrading the KernelIf you plan to upgrade the kernel-source, kernel-docs, or kernel-utils packages, youprobably do not need to keep t

Strona 123 - 13.2.2. Logging

Chapter 23. Upgrading the Kernel 209To configure GRUB to boot the new kernel by default, change the value of the defaultvariable to the title section n

Strona 124 - 13.2.3. Environment Variables

Chapter 1. Kickstart Installations 21--enablesmbauthEnables authentication of users against an SMB server (typically a Samba orWindows server). SMB au

Strona 125 - 13.2.4. Directories

210 Chapter 23. Upgrading the Kernel

Strona 126 - DirectoryIndex (such

Chapter 24.Kernel ModulesThe Linux kernel has a modular design. At boot time, only a minimal resident kernel isloaded into memory. Thereafter, wheneve

Strona 127 - 13.3. Virtual Hosts Settings

212 Chapter 24. Kernel Modulessunrpc 61328 1 (autoclean) [nfs lockd]autofs 11264 4 (autoclean)3c59x 25344 1 (autoclean)ipchains 38976 0 (unused)ide-sc

Strona 128 - 13.3.1.1. General Options

Chapter 24. Kernel Modules 213• modprobe man page — description and list of command line options.• rmmod man page — description and list of command li

Strona 129

214 Chapter 24. Kernel Modules

Strona 130 - NameVir

Package Management

Strona 132 - 13.4. Server Settings

Chapter 25.Package Management with RPMThe Red Hat Package Manager (RPM) is an open packaging system, available for anyone touse, which runs on Red Hat

Strona 133

218 Chapter 25. Package Management with RPMSystem VerificationAnother powerful feature is the ability to verify packages. If you are worried that youde

Strona 134 - 13.5. Performance Tuning

Chapter 25. Package Management with RPM 219As you can see, RPM prints out the name of the package and then prints a succession ofhash marks as the pac

Strona 135 - 13.6. Saving Your Settings

22 Chapter 1. Kickstart Installations--linearIf using LILO, use the linear LILO option; this is only for backwards compatibility(and linear is now use

Strona 136 - 13.7. Additional Resources

220 Chapter 25. Package Management with RPMfailed dependencies:bar is needed by foo-1.0-1#To handle this error you should install the requested packag

Strona 137 - Chapter 14

Chapter 25. Package Management with RPM 221This message means that your changes to the configuration file may not be "forward com-patible" wit

Strona 138

222 Chapter 25. Package Management with RPM#NoteNotice that we used the package name foo. To query a package, you will need to replace foo withthe act

Strona 139

Chapter 25. Package Management with RPM 223• To verify an installed package against an RPM package file:rpm -Vp foo-1.0-1.i386.rpmThis command can be u

Strona 140

224 Chapter 25. Package Management with RPM25.3.1. Importing KeysWhen you import a public key, you add that key to your keyring (a file in which public

Strona 141 - 14.5. Types of Certificates

Chapter 25. Package Management with RPM 22525.4. Impressing Your Friends with RPMRPM is a useful tool for both managing your system and diagnosing and

Strona 142 - 14.6. Generating a Key

226 Chapter 25. Package Management with RPM/usr/man/man1/tac.1.gz/usr/man/man1/tail.1.gz/usr/man/man1/tr.1.gz/usr/man/man1/tsort.1.gz/usr/man/man1/une

Strona 143

Chapter 25. Package Management with RPM 227/usr/share/man/man8/pnpprobe.8.gz/usr/share/man/man8/sndconfig.8.gz/usr/share/sndconfig/sample.au/usr/share

Strona 144

228 Chapter 25. Package Management with RPM

Strona 145

Chapter 26.Gnome-RPMIf you do not want to use the command-line version of RPM, you can use Gnome-RPM, agraphical interface for Red Hat Package Manager

Strona 146 - 14.9. Testing Your Certificate

Chapter 1. Kickstart Installations 231.4.5. devicedevice (optional)On most PCI systems, the installation program will autoprobe for Ethernet and SCSIc

Strona 147

230 Chapter 26. Gnome-RPMmay make these operations easier to perform. Gnome-RPM can display packages in a vari-ety of different ways. Refer to Section

Strona 148 - 14.11. Additional Resources

Chapter 26. Gnome-RPM 231Figure 26-1. Main Gnome-RPM Window26.2. The Package DisplayEach folder icon in the tree view at left represents a group of pa

Strona 149 - BIND Configuration

232 Chapter 26. Gnome-RPMFigure 26-2. Selecting Packages in Gnome-RPMYou can select and unselect multiple packages, in more than one folder in the tre

Strona 150 - /var/named

Chapter 26. Gnome-RPM 233Figure 26-3. The Install WindowClick on the Add button. By default, if your CD-ROM is mounted with a Red Hat Linux CD-ROM, Gn

Strona 151 - /etc/named.conf:

234 Chapter 26. Gnome-RPM26.4. ConfigurationGnome-RPM offers a wide selection of choices for installing and uninstalling packages, doc-umentation and o

Strona 152 - /var/named directory

Chapter 26. Gnome-RPM 235option can be useful when two packages include files that are named the same but containdifferent contents.• Allow upgrade to

Strona 153

236 Chapter 26. Gnome-RPMTo change this path, type the full path to the RPMs you would like to work with. Choosingthe Apply or OK buttons will save th

Strona 154 - 15.3. Adding a Slave Zone

Chapter 26. Gnome-RPM 237CautionPackages not produced by Red Hat are not supported by Red Hat because Red Hat can not verifythe integrity of these pac

Strona 155 - Chapter 16

238 Chapter 26. Gnome-RPMFigure 26-8. Distribution Settings in PreferencesIn Distribution Settings, you can set the options for choosing the most appr

Strona 156 - /sbin/service sendmail start

Chapter 26. Gnome-RPM 239Figure 26-9. Query WindowThe name of the package is centered at the top of the box. Below, the box is divided into twocolumns

Strona 157 - System Configuration

24 Chapter 1. Kickstart Installationsfirewall [--high | --medium | --disabled] [--trust device ] [--dhcp] [--ssh] [--telnet] [--smtp] [--http] [--ftp]

Strona 158

240 Chapter 26. Gnome-RPMFigure 26-10. Verify WindowAs the package is being checked, you will see the progress in the Verify window. If thereare any p

Strona 159 - Console Access

Chapter 26. Gnome-RPM 241Once you have begun to uninstall packages, Gnome-RPM asks for confirmation, showinga window like the one in Figure 26-11. All

Strona 161

Chapter 27.Red Hat NetworkRed Hat Network is an Internet solution for managing a Red Hat Linux system or a networkof Red Hat Linux systems. All Securi

Strona 162 - 17.7. The floppy Group

244 Chapter 27. Red Hat Network

Strona 165 - 18.2. Time Zone Configuration

Appendix A.Building a Custom KernelMany people new to Linux often ask, "Why should I build my own kernel?" Given the ad-vances that have bee

Strona 166

248 Appendix A. Building a Custom Kernelwill remove any configuration files along with the remains of any previous builds thatmay be scattered around th

Strona 167 - User and Group Configuration

Appendix A. Building a Custom Kernel 249look similar to EXTRAVERSION = -0.1.21-jul2001). This will allow you to have theold working kernel and the new

Strona 168

Chapter 1. Kickstart Installations 25nfsInstall from the NFS server specified.• --server serverServer from which to install (hostname or IP).• --dir di

Strona 169 - 19.3. Adding a New Group

250 Appendix A. Building a Custom KernelA.3.1. GRUBIf you selected GRUB as your boot loader, modify /boot/grub/grub.conf. The defaultGRUB configuration

Strona 170

Appendix A. Building a Custom Kernel 251A.3.2. LILOTo configure LILO to boot the new kernel, you need to update the /etc/lilo.conf file andrun the comma

Strona 171 - Gathering System Information

252 Appendix A. Building a Custom KernelBoot image: /boot/vmlinuz-2.4.18-0.12-jul2001Added linux-oldWriting boot sector.Be sure the messages contains

Strona 172

Appendix B.Getting Started with Gnu Privacy GuardB.1. An Introduction to GnuPGHave you ever wondered if your email can be read during its transmission

Strona 173 - 20.2. Memory Usage

254 Appendix B. Getting Started with Gnu Privacy GuardB.2. Generating a KeypairTo begin using GnuPG, you must first generate a new keypair: a public ke

Strona 174 - 20.3. Filesystems

Appendix B. Getting Started with Gnu Privacy Guard 255disks) during the prime generation; this gives the random numbergenerator a better chance to gai

Strona 175 - 20.4. Hardware

256 Appendix B. Getting Started with Gnu Privacy Guard1024-bit DSA key, ID 823D25A9, created 2000-04-26ASCII armored output forced.Revocation certific

Strona 176 - 20.5. Additional Resources

Appendix B. Getting Started with Gnu Privacy Guard 257B.4.1. Exporting to a KeyserverIf you are only writing to a few correspondents, you can export y

Strona 177 - /proc directory

258 Appendix B. Getting Started with Gnu Privacy Guard• From your browser, go to Keyserver.Net (http://www.keyserver.net) and select the optionto add

Strona 178

Appendix B. Getting Started with Gnu Privacy Guard 259B.5. Importing a Public KeyThe other end of key exchange — importing other people’s public keys

Strona 179 - Printer Configuration

26 Chapter 1. Kickstart Installations1.4.11. interactiveinteractive (optional)Uses the information provided in the kickstart file during the installati

Strona 180

260 Appendix B. Getting Started with Gnu Privacy GuardB.7.1. Installed Documentation• man gpg and info gpg — Quick Reference of GnuPG commands and opt

Strona 181 - 21.1. Adding a Local Printer

IndexSymbols/etc/auto.master, 104/etc/fstab, 103/etc/hosts.lpd, ??/etc/httpd/conf/httpd.conf, 119/etc/printcap, 179/etc/printcap.local, 179/etc/syscon

Strona 182

262configuration file, 197example crontabs, 198user-defined tasks, 198crontab, 197CtrlAltDelshutdown, disabling, 159Ddate configuration, 163decryptionwith

Strona 183

263Hhardwareviewing, 175Hardware Browser, 175Hardware RAID(See RAID)hwbrowser, 175Iinformationabout your system, 171initrd, 249insmod, 212installation

Strona 184

264MMail Transport Agent(See MTA)Maximum RPM, 227memory usage, 173modem connection(See network configuration)modprobe, 212modules.conf, 211monitoring fi

Strona 185

265command line options, 192creating an alias, 191CUPS printing system, 193configuration interface, 195default printer, 190delete existing printer, 190

Strona 186

266SSamba, 107additional resources, 110configuration, 107smb.conf, 107encrypted passwords, 108pam_smbpass, 108reasons for using, 107shareconnecting to,

Strona 187

XxDSL connection(See network configuration)xinetd, 92

Strona 189

Chapter 1. Kickstart Installations 271.4.14. langsupportlangsupport (required)Sets the language(s) to install on the system. The same language codes u

Strona 190 - 21.7. Printing a Test Page

28 Chapter 1. Kickstart Installations--location=Specifies where the LILO boot record is written. Valid values are the following:mbr (the default) or pa

Strona 191 - 21.8.3. Driver

Chapter 1. Kickstart Installations 291.4.18. networknetwork (optional)Configures network information for the system. If the kickstart installation does

Strona 192 - 21.8.4. Driver Options

Red Hat Linux 7.3: The Official Red Hat Linux Customization GuideCopyright © 2002 by Red Hat, Inc.Red Hat, Inc.1801 Varsity DriveRaleigh NC 27606-2072

Strona 193

30 Chapter 1. Kickstart InstallationsThe static method requires that you enter all the required networking information in thekickstart file. As the nam

Strona 194 - /sbin/service lpd start

Chapter 1. Kickstart Installations 31swap --recommendedThe minimum size of the automatically-generated swap partition will be no smallerthan the amoun

Strona 195 - 21.12. Additional Resources

32 Chapter 1. Kickstart Installations--startSpecifies the starting cylinder for the partition. It requires that a drive be specifiedwith --ondisk or ond

Strona 196 - 21.12.2. Useful Websites

Chapter 1. Kickstart Installations 33--noformatDo not format the RAID array.The following example shows how to create a RAID level 1 partition for /,

Strona 197 - Chapter 22

34 Chapter 1. Kickstart Installations1.4.24. texttext (optional)Perform the kickstart installation in text mode. Kickstart installations are performed

Strona 198

Chapter 1. Kickstart Installations 35--monitor monUse monitor mon ; this monitor name should be from the list of monitors inXconfigurator. This is igno

Strona 199 - 22.2. Anacron

36 Chapter 1. Kickstart InstallationsUse the %packages --resolvedeps1to install the listed packages and automatically resolvepackage dependencies.Use

Strona 200 - 22.3. At and Batch

Chapter 1. Kickstart Installations 37@ GNOME@ KDE@ Server@ Everything1.4.30. %pre — Pre-Installation Configuration SectionYou can add commands to run o

Strona 201 - 22.3.3. Viewing Pending Jobs

38 Chapter 1. Kickstart Installations# add comment to /etc/motdecho "Kickstart-installed Red Hat Linux ‘/bin/date‘" /etc/motd# add another n

Strona 202 - 22.4. Additional Resources

Chapter 1. Kickstart Installations 391.5. Where to Put A Kickstart FileA kickstart file must be placed in one of two locations:• On a boot disk• On a n

Strona 204

40 Chapter 1. Kickstart Installationsip-addr -kickstartThe ip-addr section of the filename should be replaced with the client’s IP address indotted dec

Strona 205 - Upgrading the Kernel

Chapter 1. Kickstart Installations 41ks=hd: device / fileThe installation program will mount the filesystem on device (which must be vfator ext2), and

Strona 206

42 Chapter 1. Kickstart Installations

Strona 207 - 23.4. Performing the Upgrade

Chapter 2.Kickstart ConfiguratorKickstart Configurator allows you to create a kickstart file using a graphical user interface,so that you do not have to

Strona 208 - 23.5.1. GRUB

44 Chapter 2. Kickstart ConfiguratorIf you have a two-button button mouse, you can emulate a three-button mouse by selectingEmulate 3 Buttons. If this

Strona 209 - 23.5.2. LILO

Chapter 2. Kickstart Configurator 45If you choose to install a boot loader, you must also choose which boot loader to install(GRUB or LILO) and where t

Strona 210

46 Chapter 2. Kickstart Configuratorthe fully-qualified domain name or IP address of the NFS server. For the NFS directory,enter the name of the NFS dir

Strona 211 - Kernel Modules

Chapter 2. Kickstart Configurator 47You can initialize the disk label to the default for the architecture of the system (msdos forx86 and gpt for Itani

Strona 212 - 24.2. Additional Resources

48 Chapter 2. Kickstart Configurator2.5. Network ConfigurationFigure 2-6. Network ConfigurationThere are three network configuration options: DHCP, Static

Strona 213

Chapter 2. Kickstart Configurator 492.6. AuthenticationFigure 2-7. AuthenticationIn the Authentication section, select whether to use shadow passwords

Strona 214

Table of ContentsIntroduction ...

Strona 215 - Package Management

50 Chapter 2. Kickstart Configurator2.7. Firewall ConfigurationFigure 2-8. Firewall ConfigurationThe Firewall Configuration window is identical to the scr

Strona 216

Chapter 2. Kickstart Configurator 512.8.1. GeneralFigure 2-9. X Configuration - GeneralThe first step in configuring X is to choose the default color dept

Strona 217 - Package Management with RPM

52 Chapter 2. Kickstart ConfiguratorFigure 2-10. X Configuration - Video Card2.8.3. MonitorAfter configuring the video card, click on the Monitor tab sho

Strona 218 - 25.2. Using RPM

Chapter 2. Kickstart Configurator 53Figure 2-11. X Configuration - Monitor2.9. Package SelectionFigure 2-12. Package SelectionThe Package Selection wind

Strona 219 - 25.2.2.2. Conflicting Files

54 Chapter 2. Kickstart Configurator2.10. Pre-Installation ScriptFigure 2-13. Pre-Installation ScriptYou can add commands to run on the system immediat

Strona 220 - 25.2.4. Upgrading

Chapter 2. Kickstart Configurator 552.11. Post-Installation ScriptFigure 2-14. Post-Installation ScriptYou can also add commands to execute on the syst

Strona 221 - 25.2.6. Querying

56 Chapter 2. Kickstart Configuratorecho "Hackers will be punished!" > /mnt/sysimage/etc/motd2.11.2. Use an InterpreterIf you want to spec

Strona 222 - 25.2.7. Verifying

Chapter 2. Kickstart Configurator 57Figure 2-15. Confirm OptionsIf you are happy with your choices, click the Save File button within the dialog box. A

Strona 223

58 Chapter 2. Kickstart Configurator

Strona 224 - 25.3.3. More about GnuPG

Chapter 3.Rescue ModeWhen things go wrong, there are ways to fix problems. However, these methods require thatyou understand the system well. This chap

Strona 225

7.4. Configuring Services ... 897.5. Activating the Firewall...

Strona 226

60 Chapter 3. Rescue ModeIn these situations, you may be unable to boot Red Hat Linux. If you can get into rescuemode, you might be able to resolve th

Strona 227 - 25.5. Additional Resources

Chapter 3. Rescue Mode 61mount -t ext3 /dev/hda5 /fooIn the above command, /foo is a directory that you have created and /dev/hda5 is thepartition you

Strona 228

62 Chapter 3. Rescue Mode5. Back at the GRUB screen, type b to boot into single user mode.If you are using LILO, specify one of these options at the L

Strona 229 - Gnome-RPM

Chapter 4.Redundant Array of Independent Disks (RAID)4.1. What is RAID?The basic idea behind RAID is to combine multiple small, inexpensive disk drive

Strona 230 - 26.1. Starting Gnome-RPM

64 Chapter 4. Redundant Array of Independent Disks (RAID)add them to the RAID controller’s configuration, and the operating system never knows thediffe

Strona 231 - 26.2. The Package Display

Chapter 4. Redundant Array of Independent Disks (RAID) 65high cost.2The storage capacity of the level 1 array is equal to the capacity of one of themi

Strona 232 - 26.3. Installing New Packages

66 Chapter 4. Redundant Array of Independent Disks (RAID)

Strona 233

Chapter 5.Software RAID ConfigurationRead Chapter 4 first to learn about RAID, the differences between Hardware and SoftwareRAID, and the differences be

Strona 234 - 26.4. Configuration

68 Chapter 5. Software RAID Configuration• For Allowable Drives, select the drive on which RAID will be created. If you have multi-ple drives, all driv

Strona 235 - Obsoletes header from

Chapter 5. Software RAID Configuration 69• Select which partitions will go into this RAID array and click OK.• A spare partition can be specified for RA

Strona 236

III. System Configuration... 15717. Console Ac

Strona 237

70 Chapter 5. Software RAID Configuration

Strona 240 - 26.5.3. Uninstalling Packages

Chapter 6.Network ConfigurationTo communicate with other computers, computers need a network connection. This is ac-complished by having the operating

Strona 241 - 26.5.3.1. Upgrading Packages

74 Chapter 6. Network ConfigurationThis chapter will discuss each of these steps for each type of network connection.6.2. Establishing an Ethernet Conn

Strona 242 - 242 Chapter 26. Gnome-RPM

Chapter 6. Network Configuration 75After configuring the Ethernet device, it appears in the device list as shown in Figure 6-2.Figure 6-2. Ethernet Devi

Strona 243 - Red Hat Network

76 Chapter 6. Network ConfigurationFigure 6-3. ISDN Settings5. If your ISP is in the pre-configured list, select it. Otherwise, enter the required infor

Strona 244

Chapter 6. Network Configuration 776.4. Establishing a Modem ConnectionA modem can be used to configure an Internet connection over an active phone line

Strona 245 - Appendixes

78 Chapter 6. Network ConfigurationFigure 6-6. Modem DeviceBe sure to click Apply to save the changes.After adding the modem device, you can edit its c

Strona 246

Chapter 6. Network Configuration 79Figure 6-7. xDSL Settings5. If the Select Ethernet Adapter window appears, select the manufacturer and modelof the E

Strona 247 - Building a Custom Kernel

IV. Package Management...21525. Package Manag

Strona 248

80 Chapter 6. Network Configuration6.6. Establishing a Token Ring ConnectionA token ring network is a network in which all the computers are connected

Strona 249 - A.2. Making an initrd Image

Chapter 6. Network Configuration 81Figure 6-10. Token Ring DeviceBe sure to click Apply to save the changes.After adding the device, you can edit its c

Strona 250 - A.3.1. GRUB

82 Chapter 6. Network Configuration6.8. Establishing a Wireless ConnectionWireless Ethernet devices are becoming increasingly popular. The configuration

Strona 251 - A.3.2. LILO

Chapter 6. Network Configuration 83After configuring the wireless device, it appears in the device list as shown in Figure 6-13.Figure 6-13. Wireless De

Strona 252 - A.5. Additional Resources

84 Chapter 6. Network ConfigurationFigure 6-14. Hosts ConfigurationTipTo change lookup order, edit the /etc/host.conf file. The line order hosts, bind sp

Strona 253 - Appendix B

Chapter 6. Network Configuration 85NoteThe name servers section does not configure the system to be a name server.If the DNS server names are retrieved

Strona 254 - B.2. Generating a Keypair

86 Chapter 6. Network Configuration

Strona 255 - --gen-revoke option:

Chapter 7.Basic Firewall ConfigurationJust as a firewall in a building attempts to prevent a fire from spreading, a computer fire-wall attempts to prevent

Strona 256 - ASCII armored output forced

88 Chapter 7. Basic Firewall Configuration7.1. BasicFigure 7-1. BasicAfter starting the program, choose the appropriate security level for your system:

Strona 257

Chapter 7. Basic Firewall Configuration 89Figure 7-2. Local Hosts7.3. DHCPIf you are using DHCP to activate any Ethernet interfaces on the system, you

Strona 258 - BEGIN PGP to END

IntroductionWelcome to the Official Red Hat Linux Customization Guide.The Official Red Hat Linux Customization Guide contains information on how to cust

Strona 259 - B.7. Additional Resources

90 Chapter 7. Basic Firewall Configuration• Web Server — Choose this option if you want people to connect to a Web server such asApache running on your

Strona 260 - B.7.3. Related Books

Chapter 8.Controlling Access to ServicesMaintaining security on your Red Hat Linux system is extremely important. One way tomanage security on your sy

Strona 261 - (See network connection)

92 Chapter 8. Controlling Access to Services• 0 — Halt• 1 — Single-user mode• 2 — Not used (user-definable)• 3 — Full multi-user mode• 4 — Not used (us

Strona 262

Chapter 8. Controlling Access to Services 93will take effect. For a list of network services controlled by xinetd list of the contents of the/etc/xine

Strona 263

94 Chapter 8. Controlling Access to ServicesTo start, stop, or restart a service immediately, select the service and choose the action fromthe Actions

Strona 264

Chapter 8. Controlling Access to Services 95WarningChanges do not take effect immediately after using ntsysv. You must stop or start the individualser

Strona 265

96 Chapter 8. Controlling Access to Services8.6.1. Installed Documentation• man ntsysv — The ntsysv man page.• man chkconfig — The chkconfig man page.

Strona 266

Chapter 9.OpenSSHOpenSSH is a free, open source implementation of the SSH (Secure SHell) protocols. It re-places telnet, ftp, rlogin, rsh, and rcp wit

Strona 267 - (See network configuration)

98 Chapter 9. OpenSSHssh penguin.example.netThe first time you ssh to a remote machine, you will see a message similar to the following:The authenticit

Strona 268

Chapter 9. OpenSSH 999.3.3. Using the sftp CommandThe sftp utility can be used to open a secure, interactive FTP session. It is similar toftp except t

Komentarze do niniejszej Instrukcji

Brak uwag