Red Hat NETSCAPE MANAGEMENT SYSTEM 4.5 - CUSTOMIZATION GUIDE Guida di Installazione

Navigare online o scaricare Guida di Installazione per Manuali per software Red Hat NETSCAPE MANAGEMENT SYSTEM 4.5 - CUSTOMIZATION GUIDE. Red Hat NETSCAPE MANAGEMENT SYSTEM 4.5 - CUSTOMIZATION GUIDE Installation guide Manuale Utente

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 268
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti

Sommario

Pagina 1 - Customization Guide

Red Hat Linux 7.3The Official Red Hat LinuxCustomization Guide

Pagina 2

x IntroductionNetwork ConfigurationThis chapter has been written to discussed the revised Red Hat Network Administra-tion Tool. It is now more task-ori

Pagina 3

100 Chapter 9. OpenSSH2. Change the permissions of your .ssh directory using the command chmod 755~/.ssh.3. Copy the contents of ~/.ssh/id_dsa.pub to

Pagina 4

Chapter 9. OpenSSH 101Accept the default file location (~/.ssh/identity). Enter a passphrase different fromyour account password. Confirm the passphrase

Pagina 5 - Table of Contents

102 Chapter 9. OpenSSHbe prompted for both. From this point on, you should not be prompted for a passwordby ssh, scp, or sftp.9.3.4.5. Configuring ssh-

Pagina 6

Chapter 10.Network File System (NFS)Network File System (NFS) is a way to share files between machines on a network as if thefiles were located on the c

Pagina 7

104 Chapter 10. Network File System (NFS)10.2.2. Mounting NFS Filesystems using autofsA third option for mounting an NFS share is the use of autofs. A

Pagina 8

Chapter 10. Network File System (NFS) 10510.3. Exporting NFS FilesystemsThe /etc/exports file controls what filesystems the NFS server exports. Its form

Pagina 9 - Introduction

106 Chapter 10. Network File System (NFS)/sbin/chkconfig --level 345 nfs onYou can also use ntsysv or serviceconf to configure which services start at

Pagina 10 - 2. Document Conventions

Chapter 11.SambaSamba uses the SMB protocol to share files and printers across a network connection. Oper-ating systems that support this protocol incl

Pagina 11

108 Chapter 11. Samba11.2.1. Samba PasswordsIn Red Hat Linux 7.3 encrypted passwords are enabled by default because it is more secure. Ifencrypted pas

Pagina 12 - Mail backupfiles mail reports

Chapter 11. Samba 109the password he uses to log in to the Red Hat Linux system as well as the password he mustprovide to connect to a Samba share are

Pagina 13 - 3. More to Come

Introduction xicommandLinux commands (and other operating system commands, when used) are representedthis way. This style should indicate to you that

Pagina 14 - 4. Sign Up for Support

110 Chapter 11. SambaIf the SMB share you are connecting to requires a user name and password combination, youmust specify them in the Location: bar u

Pagina 15

Chapter 12.Dynamic Host Configuration Protocol (DHCP)Dynamic Host Configuration Protocol (DHCP) is network protocol for automatically assign-ing TCP/IP

Pagina 16

112 Chapter 12. Dynamic Host Configuration Protocol (DHCP)ImportantIf you change the configuration file, the changes will not take effect until you resta

Pagina 17 - Kickstart Installations

Chapter 12. Dynamic Host Configuration Protocol (DHCP) 113Example 12-3. Group Declarationgroup {option routers 192.168.1.254;option subnet-mask 255.255

Pagina 18 - 1.4. Kickstart Options

114 Chapter 12. Dynamic Host Configuration Protocol (DHCP)Example 12-5. Static IP Address using DHCPhost apex {option host-name "apex.example.com&

Pagina 19 - 1.4.2. auth

Chapter 12. Dynamic Host Configuration Protocol (DHCP) 115To start the DHCP service, use the command /sbin/service dhcpd start. To stop theDHCP server,

Pagina 20

116 Chapter 12. Dynamic Host Configuration Protocol (DHCP)Table 12-1. DHCP Relay Agent OptionsArgument Description-i Names of the network interfaces to

Pagina 21 - 1.4.3. bootloader

Chapter 12. Dynamic Host Configuration Protocol (DHCP) 11712.4. Additional ResourcesFor configuration options not covered here, please refer to the foll

Pagina 22 - 1.4.4. clearpart

118 Chapter 12. Dynamic Host Configuration Protocol (DHCP)

Pagina 23 - 1.4.8. firewall

Chapter 13.Apache ConfigurationThe Apache Configuration Tool allows you to configure the /etc/httpd/conf/httpd.confconfiguration file for your Apache Web s

Pagina 24 - 1.4.10. Installation Methods

xii Introductiontop level of a menu on a GUI screen or windowWhen you see a word in this style, it indicates that the word is the top level of a pull-

Pagina 25 - • --partition

120 Chapter 13. Apache ConfigurationFigure 13-1. Basic SettingsEnter a fully qualified domain name that you have the right to use in the Server Name tex

Pagina 26 - 1.4.13. lang

Chapter 13. Apache Configuration 121Figure 13-2. Available AddressesTipIf you set Apache to listen to a port under 1024, you must be root to start it.

Pagina 27 - 1.4.15. lilo

122 Chapter 13. Apache ConfigurationFigure 13-3. Site ConfigurationThe entries listed in the Directory Page Search List define the DirectoryIndex directi

Pagina 28 - 1.4.17. mouse

Chapter 13. Apache Configuration 123ServerAdmin directive. Refer to Section 13.3.1.1 for information about configuring theServerAdmin directive.• Show f

Pagina 29 - 1.4.18. network

124 Chapter 13. Apache ConfigurationUse the Log Level menu to set how verbose the error messages in the error logs will be. Itcan be set (from least ve

Pagina 30 - 1.4.19. part

Chapter 13. Apache Configuration 125Figure 13-5. Environment VariablesUse the Set for CGI Scripts section to set an environment variable that is passed

Pagina 31

126 Chapter 13. Apache ConfigurationFigure 13-6. DirectoriesClick the Edit button in the top right-hand corner to configure the Default Directory Op-tio

Pagina 32 - 1.4.20. raid

Chapter 13. Apache Configuration 127• Full IP address — Allow access to a specific IP address.• A subnet — Such as 192.168.1.0/255.255.255.0• A network

Pagina 33 - 1.4.23. skipx

128 Chapter 13. Apache ConfigurationFigure 13-8. Virtual Hostshttp://www.apache.org/docs/vhosts/ and the Apache documentation on your machineprovides m

Pagina 34 - 1.4.27. xconfig

Chapter 13. Apache Configuration 129Figure 13-9. Default Virtual Hosts13.3.1.1.2. IP based Virtual HostIf you choose IP based Virtual Host, Figure 13-1

Pagina 35 - %packages — Package Selection

Introduction xiiiAdditionally, we use several different strategies to draw your attention to certain pieces ofinformation. In order of how critical th

Pagina 36

130 Chapter 13. Apache ConfigurationFigure 13-10. IP Based Virtual Hosts13.3.1.1.3. Name based Virtual HostIf you choose Name based Virtual Host, Figur

Pagina 37 - %post section

Chapter 13. Apache Configuration 131Figure 13-11. Name Based Virtual Hosts13.3.1.2. SSLNoteYou can not use name based virtual hosts with SSL, because t

Pagina 38 - # add another nameserver

132 Chapter 13. Apache ConfigurationFigure 13-12. SSL Support13.3.1.3. Additional Virtual Host OptionsThe Site Configuration, Environment Variables, and

Pagina 39 - • On a network

Chapter 13. Apache Configuration 133Figure 13-13. Server ConfigurationThe Lock File value corresponds to the LockFile directive. This directive sets the

Pagina 40

134 Chapter 13. Apache ConfigurationThe Group value corresponds to the Group directive. The Group directive is similar to theUser directive. Group sets

Pagina 41

Chapter 13. Apache Configuration 135request has been served, before it closes the connection. Once a request has been received,the Connection Timeout v

Pagina 42

136 Chapter 13. Apache Configuration13.7. Additional ResourcesTo learn more about Apache, refer to the following resources.13.7.1. Installed Documentat

Pagina 43 - Kickstart Configurator

Chapter 14.Apache Secure Server Configuration14.1. IntroductionThis chapter provides basic information on an Apache server with the mod_ssl securitymod

Pagina 44 - 2.2. Boot Loader Options

138 Chapter 14. Apache Secure Server Configurationapache-develThe apache-devel package contains the Apache include files, header files and the APXSutilit

Pagina 45 - 2.3. Installation Method

Chapter 14. Apache Secure Server Configuration 139and protocols (such as POP, IMAP and LDAP) without requiring any changes to thedaemon’s code.Table 14

Pagina 46 - 2.4. Partition Information

xiv Introduction3.1. Send in Your FeedbackIf you spot a typo in the Official Red Hat Linux Customization Guide, or if you have thought ofa way to make

Pagina 47 - 2.4.1. Creating Partitions

140 Chapter 14. Apache Secure Server ConfigurationA secure server uses a certificate to identify itself to Web browsers. You can generate yourown certifi

Pagina 48 - 2.5. Network Configuration

Chapter 14. Apache Secure Server Configuration 141mv /etc/httpd/conf/httpsd.crt /etc/httpd/conf/ssl.crt/server.crtThen start your secure Web server wit

Pagina 49 - 2.6. Authentication

142 Chapter 14. Apache Secure Server ConfigurationTo see a list of CAs, click on the Security button on your Navigator toolbar or on thepadlock icon at

Pagina 50 - 2.8. X Configuration

Chapter 14. Apache Secure Server Configuration 143/usr/bin/openssl genrsa 1024 > /etc/httpd/conf/ssl.key/server.keyto create your key. Then use this

Pagina 51 - 2.8.2. Video Card

144 Chapter 14. Apache Secure Server ConfigurationType in the password that you chose when you were generating your key. Your system willdisplay some i

Pagina 52 - 2.8.3. Monitor

Chapter 14. Apache Secure Server Configuration 145• Do not use either of the extra attributes (A challenge password and An optional com-pany name). To

Pagina 53 - 2.9. Package Selection

146 Chapter 14. Apache Secure Server ConfigurationAfter you provide the correct information, a self-signed certificate will be created and placedin /etc

Pagina 54 - 2.10. Pre-Installation Script

Chapter 14. Apache Secure Server Configuration 147Figure 14-1. The Default Home Page14.10. Accessing Your Secure ServerTo access your secure server, us

Pagina 55 - 2.11.1. Chroot Environment

148 Chapter 14. Apache Secure Server ConfigurationNoteSome of the example URLs used in this manual may need to be changed, depending upon whetheryou ar

Pagina 56 - 2.12. Saving the File

Chapter 15.BIND ConfigurationThis chapter assumes that you have a basic understanding of BIND and DNS; it does notattempt to explain the concepts of BI

Pagina 57

Installation-Related Reference

Pagina 58

150 Chapter 15. BIND ConfigurationFigure 15-1. bindconfThe BIND Configuration Tool configures the default zone directory to be /var/named. Allzone files s

Pagina 59 - Rescue Mode

Chapter 15. BIND Configuration 151the configuration changes. It can also be incremented manually by clicking the Set buttonnext to the Serial Number val

Pagina 60 - 3.2. Booting Rescue Mode

152 Chapter 15. BIND Configuration/etc/named.conf configuration file, write all the individual zone files in the /var/nameddirectory, and have the daemon

Pagina 61 - mdu mzip traceroute

Chapter 15. BIND Configuration 153Figure 15-3. Adding a Reverse Master ZoneThe configuration shown in Figure 15-3 creates the following entry in /etc/na

Pagina 62 - /dev/hdXX initrd=

154 Chapter 15. BIND Configuration/etc/named.conf configuration file, write all the individual zone files in the /var/nameddirectory, and have the daemon

Pagina 63 - Chapter 4

Chapter 16.Mail Transport Agent (MTA) ConfigurationA Mail Transport Agent (MTA) is essential for sending email from a Red Hat Linux system.The Mail Use

Pagina 64 - 4.3.2. Software RAID

156 Chapter 16. Mail Transport Agent (MTA) ConfigurationIf you selected Postfix, you must make sure the sendmail service is stopped and the postfixservi

Pagina 65

System Configuration

Pagina 67 - Software RAID Configuration

Chapter 17.Console AccessWhen normal (non-root) users log into a computer locally, they are given two types of specialpermissions:1. They can run cert

Pagina 69

160 Chapter 17. Console Accessshutdown of the system will continue; if not, an error message will be written to the systemconsole instead.For more inf

Pagina 70

Chapter 17. Console Access 16117.5. Making Files Accessible From the ConsoleIn /etc/security/console.perms, there is a section with lines like:floppy

Pagina 71 - Network-Related References

162 Chapter 17. Console Accesscp /etc/pam.d/halt /etc/pam.d/fooNow, when you run /usr/bin/foo, it will call consolehelper, which will authenticate the

Pagina 72

Chapter 18.Time and Date ConfigurationRed Hat Linux no longer includes timetool. The dateconfig utility has replaced timetool.The dateconfig application

Pagina 73 - Network Configuration

164 Chapter 18. Time and Date ConfigurationFigure 18-1. Time and Date PropertiesTo change the date, use the arrows to the left and right of the month t

Pagina 74

Chapter 18. Time and Date Configuration 165For more information on NTP, read the NTP documentation available in the/usr/share/doc/ntp-version-number di

Pagina 75

166 Chapter 18. Time and Date Configuration

Pagina 76

Chapter 19.User and Group ConfigurationUser Manager allows you to view, modify, add, and delete local users and groups.To use User Manager, you must be

Pagina 77

168 Chapter 19. User and Group ConfigurationTipThe longer the user’s password, the more difficult it is for someone else to guess it and log in to theus

Pagina 78

Chapter 19. User and Group Configuration 169Figure 19-3. User PropertiesThe User Properties window is divided into tabbed pages:• User Data — Basic use

Pagina 79

Chapter 1.Kickstart Installations1.1. What are Kickstart Installations?Many system administrators would prefer to use an automated installation method

Pagina 80

170 Chapter 19. User and Group Configuration19.4. Modifying Group PropertiesTo view the properties of an existing group, select the group from the grou

Pagina 81

Chapter 20.Gathering System InformationBefore you learn how to configure your system, you should learn how to gather essentialsystem information. For e

Pagina 82

172 Chapter 20. Gathering System InformationTable 20-1. Interactive top commandsCommand Description[Space] Immediately refresh the display[h] Display

Pagina 83 - 6.9. Managing Hosts

Chapter 20. Gathering System Information 17320.2. Memory UsageThe free command displays the total amount of physical memory and swap space for thesyst

Pagina 84 - 6.10. Managing DNS Settings

174 Chapter 20. Gathering System Information20.3. FilesystemsThe df command reports the system’s disk space usage. If you type the command df at ashel

Pagina 85

Chapter 20. Gathering System Information 175the last line in the list. If you do not want to see all the subdirectories, use the commanddu -hs to see

Pagina 86

176 Chapter 20. Gathering System Informationnetwork devices, pointing devices, system devices, and video cards. Click on the categoryname in the left

Pagina 87 - Basic Firewall Configuration

Chapter 20. Gathering System Information 177• df manual page — Type man df to learn more about the df command and its many op-tions.• du manual page —

Pagina 88 - 7.2. Local Hosts

178 Chapter 20. Gathering System Information

Pagina 89 - 7.4. Configuring Services

Chapter 21.Printer ConfigurationThe printconf application allows users to configure a printer in Red Hat Linux. It helpsmaintain the /etc/printcap config

Pagina 90 - 7.5. Activating the Firewall

18 Chapter 1. Kickstart Installations1.3. Creating the Kickstart FileThe kickstart file is a simple text file, containing a list of items, each identifie

Pagina 91 - Chapter 8

180 Chapter 21. Printer ConfigurationFigure 21-1. printconfFive types of print queues can be configured with printconf:• Local Printer — a printer attac

Pagina 92 - 8.2. TCP Wrappers

Chapter 21. Printer Configuration 18121.1. Adding a Local PrinterTo add a local printer such as one attached to the parallel port or USB port of your c

Pagina 93 - 8.3. Serviceconf

182 Chapter 21. Printer Configurationdevice and click OK to add it to the printer device list. A printer device attached to theparallel port is usually

Pagina 94 - 8.4. ntsysv

Chapter 21. Printer Configuration 183Figure 21-5. Adding a Remote PrinterText fields for the following options appears as shown in Figure 21-6:• Server

Pagina 95 - 8.6. Additional Resources

184 Chapter 21. Printer ConfigurationImportantThe remote machine must be configured to allow the local machine to print on the desired queue.As root, cr

Pagina 96 - 8.6.2. Useful Websites

Chapter 21. Printer Configuration 185• Workgroup — The name of the workgroup on the machine running Samba.Click the Translate \n => \r\n button to t

Pagina 97 - Chapter 9

186 Chapter 21. Printer ConfigurationFigure 21-9. Adding an NCP PrinterText fields for the following options appear below the Queue Type menu as shown i

Pagina 98 - 9.3.2. Using the scp Command

Chapter 21. Printer Configuration 18721.5. Adding a JetDirect PrinterTo add a JetDirect printer, click the New button in the main printconf window. The

Pagina 99 - 9.3.4. Generating Key Pairs

188 Chapter 21. Printer ConfigurationFigure 21-12. Choosing a Print ServerThe next step is to select the type of printer that is connected to the JetDi

Pagina 100

Chapter 21. Printer Configuration 189Figure 21-13. Selecting a Print DriverAs shown in Figure 21-14, the print driver processes the data that you want

Pagina 101

Chapter 1. Kickstart Installations 191.4.1. autostepautostep (optional)Similar to interactive except it goes to the next screen for you. It is used mo

Pagina 102 - 9.4. Additional Resources

190 Chapter 21. Printer ConfigurationClick the Apply button in the main window to save your changes to the /etc/printcapconfiguration file and restart th

Pagina 103 - Network File System (NFS)

Chapter 21. Printer Configuration 191Figure 21-16. Editing a Printer21.8.1. Names and AliasesIf you want to rename a printer, change the value of Queue

Pagina 104 - /sbin/service autofs status

192 Chapter 21. Printer Configuration21.8.4. Driver OptionsThe Driver Options tab displays advanced printer options. Options vary for each printdriver.

Pagina 105

Chapter 21. Printer Configuration 193Your configuration is saved to the file settings.xml.If you save this file, you can restore your printer settings. Th

Pagina 106 - 10.4. Additional Resources

194 Chapter 21. Printer Configuration• Support for IPP (next generation network printing protocol)• Autodetection of network printers• Web interface co

Pagina 107 - Chapter 11

Chapter 21. Printer Configuration 19521.11.2. CUPS Configuration InterfaceAfter starting the cups daemon, open a Web browser and connect to the URLhttp:

Pagina 108 - 11.2.1. Samba Passwords

196 Chapter 21. Printer Configuration21.12.2. Useful Websites• http://www.linuxprinting.org — GNU/Linux Printing contains a large amount informa-tion a

Pagina 109

Chapter 22.Automated TasksIn Linux, tasks can be configured to run automatically within a specified period of time,on a specified date, or when the syste

Pagina 110 - 11.4. Additional Resources

198 Chapter 22. Automated Tasks• minute — any integer from 0 to 59• hour — any integer from 0 to 23• day — any integer from 1 to 31 (must be a valid d

Pagina 111 - Chapter 12

Chapter 22. Automated Tasks 19922.1.2. Controlling Access to CronThe /etc/cron.allow and /etc/cron.deny files are used to restrict access to cron. Thef

Pagina 113 - -5; # Eastern Standard Time

20 Chapter 1. Kickstart Installations--enableldaptlsUse TLS (Transport Layer Security) lookups. This option allows LDAP to send en-crypted usernames a

Pagina 114 - 12.2.2. Lease Database

200 Chapter 22. Automated TasksAfter the task is completed, Anacron records the date in a timestamp file in the/var/spool/anacron directory. Only the d

Pagina 115 - 12.2.4. DHCP Relay Agent

Chapter 22. Automated Tasks 201• teatime — Specifies 4:00PM.• month-name day year format — For example, January 15 2002 specifies the 15th day ofJanuary

Pagina 116 - ONBOOT=yes

202 Chapter 22. Automated Tasks22.3.4. Additional Command Line OptionsAdditional command line options for at and batch include:Table 22-1. at and batc

Pagina 117 - 12.4. Additional Resources

Chapter 22. Automated Tasks 203• anacrontab man page — brief overview of the anacron configuration file.• /usr/share/doc/anacron- version /README descri

Pagina 118

204 Chapter 22. Automated Tasks

Pagina 119 - Apache Configuration

Chapter 23.Upgrading the KernelThe Red Hat Linux kernel is custom built by the Red Hat kernel team to ensure its integrityand compatibility with suppo

Pagina 120

206 Chapter 23. Upgrading the Kernel/sbin/mkbootdisk kernelversionTipRefer to the man page for mkbootdisk for more options.Reboot your machine with th

Pagina 121 - 13.2. Default Settings

Chapter 23. Upgrading the Kernel 20723.3. Downloading the Upgraded KernelThere are several ways to determine if there is an updated kernel available f

Pagina 122

208 Chapter 23. Upgrading the KernelIf you plan to upgrade the kernel-source, kernel-docs, or kernel-utils packages, youprobably do not need to keep t

Pagina 123 - 13.2.2. Logging

Chapter 23. Upgrading the Kernel 209To configure GRUB to boot the new kernel by default, change the value of the defaultvariable to the title section n

Pagina 124 - 13.2.3. Environment Variables

Chapter 1. Kickstart Installations 21--enablesmbauthEnables authentication of users against an SMB server (typically a Samba orWindows server). SMB au

Pagina 125 - 13.2.4. Directories

210 Chapter 23. Upgrading the Kernel

Pagina 126 - DirectoryIndex (such

Chapter 24.Kernel ModulesThe Linux kernel has a modular design. At boot time, only a minimal resident kernel isloaded into memory. Thereafter, wheneve

Pagina 127 - 13.3. Virtual Hosts Settings

212 Chapter 24. Kernel Modulessunrpc 61328 1 (autoclean) [nfs lockd]autofs 11264 4 (autoclean)3c59x 25344 1 (autoclean)ipchains 38976 0 (unused)ide-sc

Pagina 128 - 13.3.1.1. General Options

Chapter 24. Kernel Modules 213• modprobe man page — description and list of command line options.• rmmod man page — description and list of command li

Pagina 129

214 Chapter 24. Kernel Modules

Pagina 130 - NameVir

Package Management

Pagina 132 - 13.4. Server Settings

Chapter 25.Package Management with RPMThe Red Hat Package Manager (RPM) is an open packaging system, available for anyone touse, which runs on Red Hat

Pagina 133

218 Chapter 25. Package Management with RPMSystem VerificationAnother powerful feature is the ability to verify packages. If you are worried that youde

Pagina 134 - 13.5. Performance Tuning

Chapter 25. Package Management with RPM 219As you can see, RPM prints out the name of the package and then prints a succession ofhash marks as the pac

Pagina 135 - 13.6. Saving Your Settings

22 Chapter 1. Kickstart Installations--linearIf using LILO, use the linear LILO option; this is only for backwards compatibility(and linear is now use

Pagina 136 - 13.7. Additional Resources

220 Chapter 25. Package Management with RPMfailed dependencies:bar is needed by foo-1.0-1#To handle this error you should install the requested packag

Pagina 137 - Chapter 14

Chapter 25. Package Management with RPM 221This message means that your changes to the configuration file may not be "forward com-patible" wit

Pagina 138

222 Chapter 25. Package Management with RPM#NoteNotice that we used the package name foo. To query a package, you will need to replace foo withthe act

Pagina 139

Chapter 25. Package Management with RPM 223• To verify an installed package against an RPM package file:rpm -Vp foo-1.0-1.i386.rpmThis command can be u

Pagina 140

224 Chapter 25. Package Management with RPM25.3.1. Importing KeysWhen you import a public key, you add that key to your keyring (a file in which public

Pagina 141 - 14.5. Types of Certificates

Chapter 25. Package Management with RPM 22525.4. Impressing Your Friends with RPMRPM is a useful tool for both managing your system and diagnosing and

Pagina 142 - 14.6. Generating a Key

226 Chapter 25. Package Management with RPM/usr/man/man1/tac.1.gz/usr/man/man1/tail.1.gz/usr/man/man1/tr.1.gz/usr/man/man1/tsort.1.gz/usr/man/man1/une

Pagina 143

Chapter 25. Package Management with RPM 227/usr/share/man/man8/pnpprobe.8.gz/usr/share/man/man8/sndconfig.8.gz/usr/share/sndconfig/sample.au/usr/share

Pagina 144

228 Chapter 25. Package Management with RPM

Pagina 145

Chapter 26.Gnome-RPMIf you do not want to use the command-line version of RPM, you can use Gnome-RPM, agraphical interface for Red Hat Package Manager

Pagina 146 - 14.9. Testing Your Certificate

Chapter 1. Kickstart Installations 231.4.5. devicedevice (optional)On most PCI systems, the installation program will autoprobe for Ethernet and SCSIc

Pagina 147

230 Chapter 26. Gnome-RPMmay make these operations easier to perform. Gnome-RPM can display packages in a vari-ety of different ways. Refer to Section

Pagina 148 - 14.11. Additional Resources

Chapter 26. Gnome-RPM 231Figure 26-1. Main Gnome-RPM Window26.2. The Package DisplayEach folder icon in the tree view at left represents a group of pa

Pagina 149 - BIND Configuration

232 Chapter 26. Gnome-RPMFigure 26-2. Selecting Packages in Gnome-RPMYou can select and unselect multiple packages, in more than one folder in the tre

Pagina 150 - /var/named

Chapter 26. Gnome-RPM 233Figure 26-3. The Install WindowClick on the Add button. By default, if your CD-ROM is mounted with a Red Hat Linux CD-ROM, Gn

Pagina 151 - /etc/named.conf:

234 Chapter 26. Gnome-RPM26.4. ConfigurationGnome-RPM offers a wide selection of choices for installing and uninstalling packages, doc-umentation and o

Pagina 152 - /var/named directory

Chapter 26. Gnome-RPM 235option can be useful when two packages include files that are named the same but containdifferent contents.• Allow upgrade to

Pagina 153

236 Chapter 26. Gnome-RPMTo change this path, type the full path to the RPMs you would like to work with. Choosingthe Apply or OK buttons will save th

Pagina 154 - 15.3. Adding a Slave Zone

Chapter 26. Gnome-RPM 237CautionPackages not produced by Red Hat are not supported by Red Hat because Red Hat can not verifythe integrity of these pac

Pagina 155 - Chapter 16

238 Chapter 26. Gnome-RPMFigure 26-8. Distribution Settings in PreferencesIn Distribution Settings, you can set the options for choosing the most appr

Pagina 156 - /sbin/service sendmail start

Chapter 26. Gnome-RPM 239Figure 26-9. Query WindowThe name of the package is centered at the top of the box. Below, the box is divided into twocolumns

Pagina 157 - System Configuration

24 Chapter 1. Kickstart Installationsfirewall [--high | --medium | --disabled] [--trust device ] [--dhcp] [--ssh] [--telnet] [--smtp] [--http] [--ftp]

Pagina 158

240 Chapter 26. Gnome-RPMFigure 26-10. Verify WindowAs the package is being checked, you will see the progress in the Verify window. If thereare any p

Pagina 159 - Console Access

Chapter 26. Gnome-RPM 241Once you have begun to uninstall packages, Gnome-RPM asks for confirmation, showinga window like the one in Figure 26-11. All

Pagina 161

Chapter 27.Red Hat NetworkRed Hat Network is an Internet solution for managing a Red Hat Linux system or a networkof Red Hat Linux systems. All Securi

Pagina 162 - 17.7. The floppy Group

244 Chapter 27. Red Hat Network

Pagina 165 - 18.2. Time Zone Configuration

Appendix A.Building a Custom KernelMany people new to Linux often ask, "Why should I build my own kernel?" Given the ad-vances that have bee

Pagina 166

248 Appendix A. Building a Custom Kernelwill remove any configuration files along with the remains of any previous builds thatmay be scattered around th

Pagina 167 - User and Group Configuration

Appendix A. Building a Custom Kernel 249look similar to EXTRAVERSION = -0.1.21-jul2001). This will allow you to have theold working kernel and the new

Pagina 168

Chapter 1. Kickstart Installations 25nfsInstall from the NFS server specified.• --server serverServer from which to install (hostname or IP).• --dir di

Pagina 169 - 19.3. Adding a New Group

250 Appendix A. Building a Custom KernelA.3.1. GRUBIf you selected GRUB as your boot loader, modify /boot/grub/grub.conf. The defaultGRUB configuration

Pagina 170

Appendix A. Building a Custom Kernel 251A.3.2. LILOTo configure LILO to boot the new kernel, you need to update the /etc/lilo.conf file andrun the comma

Pagina 171 - Gathering System Information

252 Appendix A. Building a Custom KernelBoot image: /boot/vmlinuz-2.4.18-0.12-jul2001Added linux-oldWriting boot sector.Be sure the messages contains

Pagina 172

Appendix B.Getting Started with Gnu Privacy GuardB.1. An Introduction to GnuPGHave you ever wondered if your email can be read during its transmission

Pagina 173 - 20.2. Memory Usage

254 Appendix B. Getting Started with Gnu Privacy GuardB.2. Generating a KeypairTo begin using GnuPG, you must first generate a new keypair: a public ke

Pagina 174 - 20.3. Filesystems

Appendix B. Getting Started with Gnu Privacy Guard 255disks) during the prime generation; this gives the random numbergenerator a better chance to gai

Pagina 175 - 20.4. Hardware

256 Appendix B. Getting Started with Gnu Privacy Guard1024-bit DSA key, ID 823D25A9, created 2000-04-26ASCII armored output forced.Revocation certific

Pagina 176 - 20.5. Additional Resources

Appendix B. Getting Started with Gnu Privacy Guard 257B.4.1. Exporting to a KeyserverIf you are only writing to a few correspondents, you can export y

Pagina 177 - /proc directory

258 Appendix B. Getting Started with Gnu Privacy Guard• From your browser, go to Keyserver.Net (http://www.keyserver.net) and select the optionto add

Pagina 178

Appendix B. Getting Started with Gnu Privacy Guard 259B.5. Importing a Public KeyThe other end of key exchange — importing other people’s public keys

Pagina 179 - Printer Configuration

26 Chapter 1. Kickstart Installations1.4.11. interactiveinteractive (optional)Uses the information provided in the kickstart file during the installati

Pagina 180

260 Appendix B. Getting Started with Gnu Privacy GuardB.7.1. Installed Documentation• man gpg and info gpg — Quick Reference of GnuPG commands and opt

Pagina 181 - 21.1. Adding a Local Printer

IndexSymbols/etc/auto.master, 104/etc/fstab, 103/etc/hosts.lpd, ??/etc/httpd/conf/httpd.conf, 119/etc/printcap, 179/etc/printcap.local, 179/etc/syscon

Pagina 182

262configuration file, 197example crontabs, 198user-defined tasks, 198crontab, 197CtrlAltDelshutdown, disabling, 159Ddate configuration, 163decryptionwith

Pagina 183

263Hhardwareviewing, 175Hardware Browser, 175Hardware RAID(See RAID)hwbrowser, 175Iinformationabout your system, 171initrd, 249insmod, 212installation

Pagina 184

264MMail Transport Agent(See MTA)Maximum RPM, 227memory usage, 173modem connection(See network configuration)modprobe, 212modules.conf, 211monitoring fi

Pagina 185

265command line options, 192creating an alias, 191CUPS printing system, 193configuration interface, 195default printer, 190delete existing printer, 190

Pagina 186

266SSamba, 107additional resources, 110configuration, 107smb.conf, 107encrypted passwords, 108pam_smbpass, 108reasons for using, 107shareconnecting to,

Pagina 187

XxDSL connection(See network configuration)xinetd, 92

Pagina 189

Chapter 1. Kickstart Installations 271.4.14. langsupportlangsupport (required)Sets the language(s) to install on the system. The same language codes u

Pagina 190 - 21.7. Printing a Test Page

28 Chapter 1. Kickstart Installations--location=Specifies where the LILO boot record is written. Valid values are the following:mbr (the default) or pa

Pagina 191 - 21.8.3. Driver

Chapter 1. Kickstart Installations 291.4.18. networknetwork (optional)Configures network information for the system. If the kickstart installation does

Pagina 192 - 21.8.4. Driver Options

Red Hat Linux 7.3: The Official Red Hat Linux Customization GuideCopyright © 2002 by Red Hat, Inc.Red Hat, Inc.1801 Varsity DriveRaleigh NC 27606-2072

Pagina 193

30 Chapter 1. Kickstart InstallationsThe static method requires that you enter all the required networking information in thekickstart file. As the nam

Pagina 194 - /sbin/service lpd start

Chapter 1. Kickstart Installations 31swap --recommendedThe minimum size of the automatically-generated swap partition will be no smallerthan the amoun

Pagina 195 - 21.12. Additional Resources

32 Chapter 1. Kickstart Installations--startSpecifies the starting cylinder for the partition. It requires that a drive be specifiedwith --ondisk or ond

Pagina 196 - 21.12.2. Useful Websites

Chapter 1. Kickstart Installations 33--noformatDo not format the RAID array.The following example shows how to create a RAID level 1 partition for /,

Pagina 197 - Chapter 22

34 Chapter 1. Kickstart Installations1.4.24. texttext (optional)Perform the kickstart installation in text mode. Kickstart installations are performed

Pagina 198

Chapter 1. Kickstart Installations 35--monitor monUse monitor mon ; this monitor name should be from the list of monitors inXconfigurator. This is igno

Pagina 199 - 22.2. Anacron

36 Chapter 1. Kickstart InstallationsUse the %packages --resolvedeps1to install the listed packages and automatically resolvepackage dependencies.Use

Pagina 200 - 22.3. At and Batch

Chapter 1. Kickstart Installations 37@ GNOME@ KDE@ Server@ Everything1.4.30. %pre — Pre-Installation Configuration SectionYou can add commands to run o

Pagina 201 - 22.3.3. Viewing Pending Jobs

38 Chapter 1. Kickstart Installations# add comment to /etc/motdecho "Kickstart-installed Red Hat Linux ‘/bin/date‘" /etc/motd# add another n

Pagina 202 - 22.4. Additional Resources

Chapter 1. Kickstart Installations 391.5. Where to Put A Kickstart FileA kickstart file must be placed in one of two locations:• On a boot disk• On a n

Pagina 204

40 Chapter 1. Kickstart Installationsip-addr -kickstartThe ip-addr section of the filename should be replaced with the client’s IP address indotted dec

Pagina 205 - Upgrading the Kernel

Chapter 1. Kickstart Installations 41ks=hd: device / fileThe installation program will mount the filesystem on device (which must be vfator ext2), and

Pagina 206

42 Chapter 1. Kickstart Installations

Pagina 207 - 23.4. Performing the Upgrade

Chapter 2.Kickstart ConfiguratorKickstart Configurator allows you to create a kickstart file using a graphical user interface,so that you do not have to

Pagina 208 - 23.5.1. GRUB

44 Chapter 2. Kickstart ConfiguratorIf you have a two-button button mouse, you can emulate a three-button mouse by selectingEmulate 3 Buttons. If this

Pagina 209 - 23.5.2. LILO

Chapter 2. Kickstart Configurator 45If you choose to install a boot loader, you must also choose which boot loader to install(GRUB or LILO) and where t

Pagina 210

46 Chapter 2. Kickstart Configuratorthe fully-qualified domain name or IP address of the NFS server. For the NFS directory,enter the name of the NFS dir

Pagina 211 - Kernel Modules

Chapter 2. Kickstart Configurator 47You can initialize the disk label to the default for the architecture of the system (msdos forx86 and gpt for Itani

Pagina 212 - 24.2. Additional Resources

48 Chapter 2. Kickstart Configurator2.5. Network ConfigurationFigure 2-6. Network ConfigurationThere are three network configuration options: DHCP, Static

Pagina 213

Chapter 2. Kickstart Configurator 492.6. AuthenticationFigure 2-7. AuthenticationIn the Authentication section, select whether to use shadow passwords

Pagina 214

Table of ContentsIntroduction ...

Pagina 215 - Package Management

50 Chapter 2. Kickstart Configurator2.7. Firewall ConfigurationFigure 2-8. Firewall ConfigurationThe Firewall Configuration window is identical to the scr

Pagina 216

Chapter 2. Kickstart Configurator 512.8.1. GeneralFigure 2-9. X Configuration - GeneralThe first step in configuring X is to choose the default color dept

Pagina 217 - Package Management with RPM

52 Chapter 2. Kickstart ConfiguratorFigure 2-10. X Configuration - Video Card2.8.3. MonitorAfter configuring the video card, click on the Monitor tab sho

Pagina 218 - 25.2. Using RPM

Chapter 2. Kickstart Configurator 53Figure 2-11. X Configuration - Monitor2.9. Package SelectionFigure 2-12. Package SelectionThe Package Selection wind

Pagina 219 - 25.2.2.2. Conflicting Files

54 Chapter 2. Kickstart Configurator2.10. Pre-Installation ScriptFigure 2-13. Pre-Installation ScriptYou can add commands to run on the system immediat

Pagina 220 - 25.2.4. Upgrading

Chapter 2. Kickstart Configurator 552.11. Post-Installation ScriptFigure 2-14. Post-Installation ScriptYou can also add commands to execute on the syst

Pagina 221 - 25.2.6. Querying

56 Chapter 2. Kickstart Configuratorecho "Hackers will be punished!" > /mnt/sysimage/etc/motd2.11.2. Use an InterpreterIf you want to spec

Pagina 222 - 25.2.7. Verifying

Chapter 2. Kickstart Configurator 57Figure 2-15. Confirm OptionsIf you are happy with your choices, click the Save File button within the dialog box. A

Pagina 223

58 Chapter 2. Kickstart Configurator

Pagina 224 - 25.3.3. More about GnuPG

Chapter 3.Rescue ModeWhen things go wrong, there are ways to fix problems. However, these methods require thatyou understand the system well. This chap

Pagina 225

7.4. Configuring Services ... 897.5. Activating the Firewall...

Pagina 226

60 Chapter 3. Rescue ModeIn these situations, you may be unable to boot Red Hat Linux. If you can get into rescuemode, you might be able to resolve th

Pagina 227 - 25.5. Additional Resources

Chapter 3. Rescue Mode 61mount -t ext3 /dev/hda5 /fooIn the above command, /foo is a directory that you have created and /dev/hda5 is thepartition you

Pagina 228

62 Chapter 3. Rescue Mode5. Back at the GRUB screen, type b to boot into single user mode.If you are using LILO, specify one of these options at the L

Pagina 229 - Gnome-RPM

Chapter 4.Redundant Array of Independent Disks (RAID)4.1. What is RAID?The basic idea behind RAID is to combine multiple small, inexpensive disk drive

Pagina 230 - 26.1. Starting Gnome-RPM

64 Chapter 4. Redundant Array of Independent Disks (RAID)add them to the RAID controller’s configuration, and the operating system never knows thediffe

Pagina 231 - 26.2. The Package Display

Chapter 4. Redundant Array of Independent Disks (RAID) 65high cost.2The storage capacity of the level 1 array is equal to the capacity of one of themi

Pagina 232 - 26.3. Installing New Packages

66 Chapter 4. Redundant Array of Independent Disks (RAID)

Pagina 233

Chapter 5.Software RAID ConfigurationRead Chapter 4 first to learn about RAID, the differences between Hardware and SoftwareRAID, and the differences be

Pagina 234 - 26.4. Configuration

68 Chapter 5. Software RAID Configuration• For Allowable Drives, select the drive on which RAID will be created. If you have multi-ple drives, all driv

Pagina 235 - Obsoletes header from

Chapter 5. Software RAID Configuration 69• Select which partitions will go into this RAID array and click OK.• A spare partition can be specified for RA

Pagina 236

III. System Configuration... 15717. Console Ac

Pagina 237

70 Chapter 5. Software RAID Configuration

Pagina 240 - 26.5.3. Uninstalling Packages

Chapter 6.Network ConfigurationTo communicate with other computers, computers need a network connection. This is ac-complished by having the operating

Pagina 241 - 26.5.3.1. Upgrading Packages

74 Chapter 6. Network ConfigurationThis chapter will discuss each of these steps for each type of network connection.6.2. Establishing an Ethernet Conn

Pagina 242 - 242 Chapter 26. Gnome-RPM

Chapter 6. Network Configuration 75After configuring the Ethernet device, it appears in the device list as shown in Figure 6-2.Figure 6-2. Ethernet Devi

Pagina 243 - Red Hat Network

76 Chapter 6. Network ConfigurationFigure 6-3. ISDN Settings5. If your ISP is in the pre-configured list, select it. Otherwise, enter the required infor

Pagina 244

Chapter 6. Network Configuration 776.4. Establishing a Modem ConnectionA modem can be used to configure an Internet connection over an active phone line

Pagina 245 - Appendixes

78 Chapter 6. Network ConfigurationFigure 6-6. Modem DeviceBe sure to click Apply to save the changes.After adding the modem device, you can edit its c

Pagina 246

Chapter 6. Network Configuration 79Figure 6-7. xDSL Settings5. If the Select Ethernet Adapter window appears, select the manufacturer and modelof the E

Pagina 247 - Building a Custom Kernel

IV. Package Management...21525. Package Manag

Pagina 248

80 Chapter 6. Network Configuration6.6. Establishing a Token Ring ConnectionA token ring network is a network in which all the computers are connected

Pagina 249 - A.2. Making an initrd Image

Chapter 6. Network Configuration 81Figure 6-10. Token Ring DeviceBe sure to click Apply to save the changes.After adding the device, you can edit its c

Pagina 250 - A.3.1. GRUB

82 Chapter 6. Network Configuration6.8. Establishing a Wireless ConnectionWireless Ethernet devices are becoming increasingly popular. The configuration

Pagina 251 - A.3.2. LILO

Chapter 6. Network Configuration 83After configuring the wireless device, it appears in the device list as shown in Figure 6-13.Figure 6-13. Wireless De

Pagina 252 - A.5. Additional Resources

84 Chapter 6. Network ConfigurationFigure 6-14. Hosts ConfigurationTipTo change lookup order, edit the /etc/host.conf file. The line order hosts, bind sp

Pagina 253 - Appendix B

Chapter 6. Network Configuration 85NoteThe name servers section does not configure the system to be a name server.If the DNS server names are retrieved

Pagina 254 - B.2. Generating a Keypair

86 Chapter 6. Network Configuration

Pagina 255 - --gen-revoke option:

Chapter 7.Basic Firewall ConfigurationJust as a firewall in a building attempts to prevent a fire from spreading, a computer fire-wall attempts to prevent

Pagina 256 - ASCII armored output forced

88 Chapter 7. Basic Firewall Configuration7.1. BasicFigure 7-1. BasicAfter starting the program, choose the appropriate security level for your system:

Pagina 257

Chapter 7. Basic Firewall Configuration 89Figure 7-2. Local Hosts7.3. DHCPIf you are using DHCP to activate any Ethernet interfaces on the system, you

Pagina 258 - BEGIN PGP to END

IntroductionWelcome to the Official Red Hat Linux Customization Guide.The Official Red Hat Linux Customization Guide contains information on how to cust

Pagina 259 - B.7. Additional Resources

90 Chapter 7. Basic Firewall Configuration• Web Server — Choose this option if you want people to connect to a Web server such asApache running on your

Pagina 260 - B.7.3. Related Books

Chapter 8.Controlling Access to ServicesMaintaining security on your Red Hat Linux system is extremely important. One way tomanage security on your sy

Pagina 261 - (See network connection)

92 Chapter 8. Controlling Access to Services• 0 — Halt• 1 — Single-user mode• 2 — Not used (user-definable)• 3 — Full multi-user mode• 4 — Not used (us

Pagina 262

Chapter 8. Controlling Access to Services 93will take effect. For a list of network services controlled by xinetd list of the contents of the/etc/xine

Pagina 263

94 Chapter 8. Controlling Access to ServicesTo start, stop, or restart a service immediately, select the service and choose the action fromthe Actions

Pagina 264

Chapter 8. Controlling Access to Services 95WarningChanges do not take effect immediately after using ntsysv. You must stop or start the individualser

Pagina 265

96 Chapter 8. Controlling Access to Services8.6.1. Installed Documentation• man ntsysv — The ntsysv man page.• man chkconfig — The chkconfig man page.

Pagina 266

Chapter 9.OpenSSHOpenSSH is a free, open source implementation of the SSH (Secure SHell) protocols. It re-places telnet, ftp, rlogin, rsh, and rcp wit

Pagina 267 - (See network configuration)

98 Chapter 9. OpenSSHssh penguin.example.netThe first time you ssh to a remote machine, you will see a message similar to the following:The authenticit

Pagina 268

Chapter 9. OpenSSH 999.3.3. Using the sftp CommandThe sftp utility can be used to open a secure, interactive FTP session. It is similar toftp except t

Commenti su questo manuale

Nessun commento