Red Hat Linux 7.3The Official Red Hat LinuxCustomization Guide
x IntroductionNetwork ConfigurationThis chapter has been written to discussed the revised Red Hat Network Administra-tion Tool. It is now more task-ori
100 Chapter 9. OpenSSH2. Change the permissions of your .ssh directory using the command chmod 755~/.ssh.3. Copy the contents of ~/.ssh/id_dsa.pub to
Chapter 9. OpenSSH 101Accept the default file location (~/.ssh/identity). Enter a passphrase different fromyour account password. Confirm the passphrase
102 Chapter 9. OpenSSHbe prompted for both. From this point on, you should not be prompted for a passwordby ssh, scp, or sftp.9.3.4.5. Configuring ssh-
Chapter 10.Network File System (NFS)Network File System (NFS) is a way to share files between machines on a network as if thefiles were located on the c
104 Chapter 10. Network File System (NFS)10.2.2. Mounting NFS Filesystems using autofsA third option for mounting an NFS share is the use of autofs. A
Chapter 10. Network File System (NFS) 10510.3. Exporting NFS FilesystemsThe /etc/exports file controls what filesystems the NFS server exports. Its form
106 Chapter 10. Network File System (NFS)/sbin/chkconfig --level 345 nfs onYou can also use ntsysv or serviceconf to configure which services start at
Chapter 11.SambaSamba uses the SMB protocol to share files and printers across a network connection. Oper-ating systems that support this protocol incl
108 Chapter 11. Samba11.2.1. Samba PasswordsIn Red Hat Linux 7.3 encrypted passwords are enabled by default because it is more secure. Ifencrypted pas
Chapter 11. Samba 109the password he uses to log in to the Red Hat Linux system as well as the password he mustprovide to connect to a Samba share are
Introduction xicommandLinux commands (and other operating system commands, when used) are representedthis way. This style should indicate to you that
110 Chapter 11. SambaIf the SMB share you are connecting to requires a user name and password combination, youmust specify them in the Location: bar u
Chapter 12.Dynamic Host Configuration Protocol (DHCP)Dynamic Host Configuration Protocol (DHCP) is network protocol for automatically assign-ing TCP/IP
112 Chapter 12. Dynamic Host Configuration Protocol (DHCP)ImportantIf you change the configuration file, the changes will not take effect until you resta
Chapter 12. Dynamic Host Configuration Protocol (DHCP) 113Example 12-3. Group Declarationgroup {option routers 192.168.1.254;option subnet-mask 255.255
114 Chapter 12. Dynamic Host Configuration Protocol (DHCP)Example 12-5. Static IP Address using DHCPhost apex {option host-name "apex.example.com&
Chapter 12. Dynamic Host Configuration Protocol (DHCP) 115To start the DHCP service, use the command /sbin/service dhcpd start. To stop theDHCP server,
116 Chapter 12. Dynamic Host Configuration Protocol (DHCP)Table 12-1. DHCP Relay Agent OptionsArgument Description-i Names of the network interfaces to
Chapter 12. Dynamic Host Configuration Protocol (DHCP) 11712.4. Additional ResourcesFor configuration options not covered here, please refer to the foll
118 Chapter 12. Dynamic Host Configuration Protocol (DHCP)
Chapter 13.Apache ConfigurationThe Apache Configuration Tool allows you to configure the /etc/httpd/conf/httpd.confconfiguration file for your Apache Web s
xii Introductiontop level of a menu on a GUI screen or windowWhen you see a word in this style, it indicates that the word is the top level of a pull-
120 Chapter 13. Apache ConfigurationFigure 13-1. Basic SettingsEnter a fully qualified domain name that you have the right to use in the Server Name tex
Chapter 13. Apache Configuration 121Figure 13-2. Available AddressesTipIf you set Apache to listen to a port under 1024, you must be root to start it.
122 Chapter 13. Apache ConfigurationFigure 13-3. Site ConfigurationThe entries listed in the Directory Page Search List define the DirectoryIndex directi
Chapter 13. Apache Configuration 123ServerAdmin directive. Refer to Section 13.3.1.1 for information about configuring theServerAdmin directive.• Show f
124 Chapter 13. Apache ConfigurationUse the Log Level menu to set how verbose the error messages in the error logs will be. Itcan be set (from least ve
Chapter 13. Apache Configuration 125Figure 13-5. Environment VariablesUse the Set for CGI Scripts section to set an environment variable that is passed
126 Chapter 13. Apache ConfigurationFigure 13-6. DirectoriesClick the Edit button in the top right-hand corner to configure the Default Directory Op-tio
Chapter 13. Apache Configuration 127• Full IP address — Allow access to a specific IP address.• A subnet — Such as 192.168.1.0/255.255.255.0• A network
128 Chapter 13. Apache ConfigurationFigure 13-8. Virtual Hostshttp://www.apache.org/docs/vhosts/ and the Apache documentation on your machineprovides m
Chapter 13. Apache Configuration 129Figure 13-9. Default Virtual Hosts13.3.1.1.2. IP based Virtual HostIf you choose IP based Virtual Host, Figure 13-1
Introduction xiiiAdditionally, we use several different strategies to draw your attention to certain pieces ofinformation. In order of how critical th
130 Chapter 13. Apache ConfigurationFigure 13-10. IP Based Virtual Hosts13.3.1.1.3. Name based Virtual HostIf you choose Name based Virtual Host, Figur
Chapter 13. Apache Configuration 131Figure 13-11. Name Based Virtual Hosts13.3.1.2. SSLNoteYou can not use name based virtual hosts with SSL, because t
132 Chapter 13. Apache ConfigurationFigure 13-12. SSL Support13.3.1.3. Additional Virtual Host OptionsThe Site Configuration, Environment Variables, and
Chapter 13. Apache Configuration 133Figure 13-13. Server ConfigurationThe Lock File value corresponds to the LockFile directive. This directive sets the
134 Chapter 13. Apache ConfigurationThe Group value corresponds to the Group directive. The Group directive is similar to theUser directive. Group sets
Chapter 13. Apache Configuration 135request has been served, before it closes the connection. Once a request has been received,the Connection Timeout v
136 Chapter 13. Apache Configuration13.7. Additional ResourcesTo learn more about Apache, refer to the following resources.13.7.1. Installed Documentat
Chapter 14.Apache Secure Server Configuration14.1. IntroductionThis chapter provides basic information on an Apache server with the mod_ssl securitymod
138 Chapter 14. Apache Secure Server Configurationapache-develThe apache-devel package contains the Apache include files, header files and the APXSutilit
Chapter 14. Apache Secure Server Configuration 139and protocols (such as POP, IMAP and LDAP) without requiring any changes to thedaemon’s code.Table 14
xiv Introduction3.1. Send in Your FeedbackIf you spot a typo in the Official Red Hat Linux Customization Guide, or if you have thought ofa way to make
140 Chapter 14. Apache Secure Server ConfigurationA secure server uses a certificate to identify itself to Web browsers. You can generate yourown certifi
Chapter 14. Apache Secure Server Configuration 141mv /etc/httpd/conf/httpsd.crt /etc/httpd/conf/ssl.crt/server.crtThen start your secure Web server wit
142 Chapter 14. Apache Secure Server ConfigurationTo see a list of CAs, click on the Security button on your Navigator toolbar or on thepadlock icon at
Chapter 14. Apache Secure Server Configuration 143/usr/bin/openssl genrsa 1024 > /etc/httpd/conf/ssl.key/server.keyto create your key. Then use this
144 Chapter 14. Apache Secure Server ConfigurationType in the password that you chose when you were generating your key. Your system willdisplay some i
Chapter 14. Apache Secure Server Configuration 145• Do not use either of the extra attributes (A challenge password and An optional com-pany name). To
146 Chapter 14. Apache Secure Server ConfigurationAfter you provide the correct information, a self-signed certificate will be created and placedin /etc
Chapter 14. Apache Secure Server Configuration 147Figure 14-1. The Default Home Page14.10. Accessing Your Secure ServerTo access your secure server, us
148 Chapter 14. Apache Secure Server ConfigurationNoteSome of the example URLs used in this manual may need to be changed, depending upon whetheryou ar
Chapter 15.BIND ConfigurationThis chapter assumes that you have a basic understanding of BIND and DNS; it does notattempt to explain the concepts of BI
Installation-Related Reference
150 Chapter 15. BIND ConfigurationFigure 15-1. bindconfThe BIND Configuration Tool configures the default zone directory to be /var/named. Allzone files s
Chapter 15. BIND Configuration 151the configuration changes. It can also be incremented manually by clicking the Set buttonnext to the Serial Number val
152 Chapter 15. BIND Configuration/etc/named.conf configuration file, write all the individual zone files in the /var/nameddirectory, and have the daemon
Chapter 15. BIND Configuration 153Figure 15-3. Adding a Reverse Master ZoneThe configuration shown in Figure 15-3 creates the following entry in /etc/na
154 Chapter 15. BIND Configuration/etc/named.conf configuration file, write all the individual zone files in the /var/nameddirectory, and have the daemon
Chapter 16.Mail Transport Agent (MTA) ConfigurationA Mail Transport Agent (MTA) is essential for sending email from a Red Hat Linux system.The Mail Use
156 Chapter 16. Mail Transport Agent (MTA) ConfigurationIf you selected Postfix, you must make sure the sendmail service is stopped and the postfixservi
System Configuration
Chapter 17.Console AccessWhen normal (non-root) users log into a computer locally, they are given two types of specialpermissions:1. They can run cert
160 Chapter 17. Console Accessshutdown of the system will continue; if not, an error message will be written to the systemconsole instead.For more inf
Chapter 17. Console Access 16117.5. Making Files Accessible From the ConsoleIn /etc/security/console.perms, there is a section with lines like:floppy
162 Chapter 17. Console Accesscp /etc/pam.d/halt /etc/pam.d/fooNow, when you run /usr/bin/foo, it will call consolehelper, which will authenticate the
Chapter 18.Time and Date ConfigurationRed Hat Linux no longer includes timetool. The dateconfig utility has replaced timetool.The dateconfig application
164 Chapter 18. Time and Date ConfigurationFigure 18-1. Time and Date PropertiesTo change the date, use the arrows to the left and right of the month t
Chapter 18. Time and Date Configuration 165For more information on NTP, read the NTP documentation available in the/usr/share/doc/ntp-version-number di
166 Chapter 18. Time and Date Configuration
Chapter 19.User and Group ConfigurationUser Manager allows you to view, modify, add, and delete local users and groups.To use User Manager, you must be
168 Chapter 19. User and Group ConfigurationTipThe longer the user’s password, the more difficult it is for someone else to guess it and log in to theus
Chapter 19. User and Group Configuration 169Figure 19-3. User PropertiesThe User Properties window is divided into tabbed pages:• User Data — Basic use
Chapter 1.Kickstart Installations1.1. What are Kickstart Installations?Many system administrators would prefer to use an automated installation method
170 Chapter 19. User and Group Configuration19.4. Modifying Group PropertiesTo view the properties of an existing group, select the group from the grou
Chapter 20.Gathering System InformationBefore you learn how to configure your system, you should learn how to gather essentialsystem information. For e
172 Chapter 20. Gathering System InformationTable 20-1. Interactive top commandsCommand Description[Space] Immediately refresh the display[h] Display
Chapter 20. Gathering System Information 17320.2. Memory UsageThe free command displays the total amount of physical memory and swap space for thesyst
174 Chapter 20. Gathering System Information20.3. FilesystemsThe df command reports the system’s disk space usage. If you type the command df at ashel
Chapter 20. Gathering System Information 175the last line in the list. If you do not want to see all the subdirectories, use the commanddu -hs to see
176 Chapter 20. Gathering System Informationnetwork devices, pointing devices, system devices, and video cards. Click on the categoryname in the left
Chapter 20. Gathering System Information 177• df manual page — Type man df to learn more about the df command and its many op-tions.• du manual page —
178 Chapter 20. Gathering System Information
Chapter 21.Printer ConfigurationThe printconf application allows users to configure a printer in Red Hat Linux. It helpsmaintain the /etc/printcap config
18 Chapter 1. Kickstart Installations1.3. Creating the Kickstart FileThe kickstart file is a simple text file, containing a list of items, each identifie
180 Chapter 21. Printer ConfigurationFigure 21-1. printconfFive types of print queues can be configured with printconf:• Local Printer — a printer attac
Chapter 21. Printer Configuration 18121.1. Adding a Local PrinterTo add a local printer such as one attached to the parallel port or USB port of your c
182 Chapter 21. Printer Configurationdevice and click OK to add it to the printer device list. A printer device attached to theparallel port is usually
Chapter 21. Printer Configuration 183Figure 21-5. Adding a Remote PrinterText fields for the following options appears as shown in Figure 21-6:• Server
184 Chapter 21. Printer ConfigurationImportantThe remote machine must be configured to allow the local machine to print on the desired queue.As root, cr
Chapter 21. Printer Configuration 185• Workgroup — The name of the workgroup on the machine running Samba.Click the Translate \n => \r\n button to t
186 Chapter 21. Printer ConfigurationFigure 21-9. Adding an NCP PrinterText fields for the following options appear below the Queue Type menu as shown i
Chapter 21. Printer Configuration 18721.5. Adding a JetDirect PrinterTo add a JetDirect printer, click the New button in the main printconf window. The
188 Chapter 21. Printer ConfigurationFigure 21-12. Choosing a Print ServerThe next step is to select the type of printer that is connected to the JetDi
Chapter 21. Printer Configuration 189Figure 21-13. Selecting a Print DriverAs shown in Figure 21-14, the print driver processes the data that you want
Chapter 1. Kickstart Installations 191.4.1. autostepautostep (optional)Similar to interactive except it goes to the next screen for you. It is used mo
190 Chapter 21. Printer ConfigurationClick the Apply button in the main window to save your changes to the /etc/printcapconfiguration file and restart th
Chapter 21. Printer Configuration 191Figure 21-16. Editing a Printer21.8.1. Names and AliasesIf you want to rename a printer, change the value of Queue
192 Chapter 21. Printer Configuration21.8.4. Driver OptionsThe Driver Options tab displays advanced printer options. Options vary for each printdriver.
Chapter 21. Printer Configuration 193Your configuration is saved to the file settings.xml.If you save this file, you can restore your printer settings. Th
194 Chapter 21. Printer Configuration• Support for IPP (next generation network printing protocol)• Autodetection of network printers• Web interface co
Chapter 21. Printer Configuration 19521.11.2. CUPS Configuration InterfaceAfter starting the cups daemon, open a Web browser and connect to the URLhttp:
196 Chapter 21. Printer Configuration21.12.2. Useful Websites• http://www.linuxprinting.org — GNU/Linux Printing contains a large amount informa-tion a
Chapter 22.Automated TasksIn Linux, tasks can be configured to run automatically within a specified period of time,on a specified date, or when the syste
198 Chapter 22. Automated Tasks• minute — any integer from 0 to 59• hour — any integer from 0 to 23• day — any integer from 1 to 31 (must be a valid d
Chapter 22. Automated Tasks 19922.1.2. Controlling Access to CronThe /etc/cron.allow and /etc/cron.deny files are used to restrict access to cron. Thef
20 Chapter 1. Kickstart Installations--enableldaptlsUse TLS (Transport Layer Security) lookups. This option allows LDAP to send en-crypted usernames a
200 Chapter 22. Automated TasksAfter the task is completed, Anacron records the date in a timestamp file in the/var/spool/anacron directory. Only the d
Chapter 22. Automated Tasks 201• teatime — Specifies 4:00PM.• month-name day year format — For example, January 15 2002 specifies the 15th day ofJanuary
202 Chapter 22. Automated Tasks22.3.4. Additional Command Line OptionsAdditional command line options for at and batch include:Table 22-1. at and batc
Chapter 22. Automated Tasks 203• anacrontab man page — brief overview of the anacron configuration file.• /usr/share/doc/anacron- version /README descri
204 Chapter 22. Automated Tasks
Chapter 23.Upgrading the KernelThe Red Hat Linux kernel is custom built by the Red Hat kernel team to ensure its integrityand compatibility with suppo
206 Chapter 23. Upgrading the Kernel/sbin/mkbootdisk kernelversionTipRefer to the man page for mkbootdisk for more options.Reboot your machine with th
Chapter 23. Upgrading the Kernel 20723.3. Downloading the Upgraded KernelThere are several ways to determine if there is an updated kernel available f
208 Chapter 23. Upgrading the KernelIf you plan to upgrade the kernel-source, kernel-docs, or kernel-utils packages, youprobably do not need to keep t
Chapter 23. Upgrading the Kernel 209To configure GRUB to boot the new kernel by default, change the value of the defaultvariable to the title section n
Chapter 1. Kickstart Installations 21--enablesmbauthEnables authentication of users against an SMB server (typically a Samba orWindows server). SMB au
210 Chapter 23. Upgrading the Kernel
Chapter 24.Kernel ModulesThe Linux kernel has a modular design. At boot time, only a minimal resident kernel isloaded into memory. Thereafter, wheneve
212 Chapter 24. Kernel Modulessunrpc 61328 1 (autoclean) [nfs lockd]autofs 11264 4 (autoclean)3c59x 25344 1 (autoclean)ipchains 38976 0 (unused)ide-sc
Chapter 24. Kernel Modules 213• modprobe man page — description and list of command line options.• rmmod man page — description and list of command li
214 Chapter 24. Kernel Modules
Package Management
Chapter 25.Package Management with RPMThe Red Hat Package Manager (RPM) is an open packaging system, available for anyone touse, which runs on Red Hat
218 Chapter 25. Package Management with RPMSystem VerificationAnother powerful feature is the ability to verify packages. If you are worried that youde
Chapter 25. Package Management with RPM 219As you can see, RPM prints out the name of the package and then prints a succession ofhash marks as the pac
22 Chapter 1. Kickstart Installations--linearIf using LILO, use the linear LILO option; this is only for backwards compatibility(and linear is now use
220 Chapter 25. Package Management with RPMfailed dependencies:bar is needed by foo-1.0-1#To handle this error you should install the requested packag
Chapter 25. Package Management with RPM 221This message means that your changes to the configuration file may not be "forward com-patible" wit
222 Chapter 25. Package Management with RPM#NoteNotice that we used the package name foo. To query a package, you will need to replace foo withthe act
Chapter 25. Package Management with RPM 223• To verify an installed package against an RPM package file:rpm -Vp foo-1.0-1.i386.rpmThis command can be u
224 Chapter 25. Package Management with RPM25.3.1. Importing KeysWhen you import a public key, you add that key to your keyring (a file in which public
Chapter 25. Package Management with RPM 22525.4. Impressing Your Friends with RPMRPM is a useful tool for both managing your system and diagnosing and
226 Chapter 25. Package Management with RPM/usr/man/man1/tac.1.gz/usr/man/man1/tail.1.gz/usr/man/man1/tr.1.gz/usr/man/man1/tsort.1.gz/usr/man/man1/une
Chapter 25. Package Management with RPM 227/usr/share/man/man8/pnpprobe.8.gz/usr/share/man/man8/sndconfig.8.gz/usr/share/sndconfig/sample.au/usr/share
228 Chapter 25. Package Management with RPM
Chapter 26.Gnome-RPMIf you do not want to use the command-line version of RPM, you can use Gnome-RPM, agraphical interface for Red Hat Package Manager
Chapter 1. Kickstart Installations 231.4.5. devicedevice (optional)On most PCI systems, the installation program will autoprobe for Ethernet and SCSIc
230 Chapter 26. Gnome-RPMmay make these operations easier to perform. Gnome-RPM can display packages in a vari-ety of different ways. Refer to Section
Chapter 26. Gnome-RPM 231Figure 26-1. Main Gnome-RPM Window26.2. The Package DisplayEach folder icon in the tree view at left represents a group of pa
232 Chapter 26. Gnome-RPMFigure 26-2. Selecting Packages in Gnome-RPMYou can select and unselect multiple packages, in more than one folder in the tre
Chapter 26. Gnome-RPM 233Figure 26-3. The Install WindowClick on the Add button. By default, if your CD-ROM is mounted with a Red Hat Linux CD-ROM, Gn
234 Chapter 26. Gnome-RPM26.4. ConfigurationGnome-RPM offers a wide selection of choices for installing and uninstalling packages, doc-umentation and o
Chapter 26. Gnome-RPM 235option can be useful when two packages include files that are named the same but containdifferent contents.• Allow upgrade to
236 Chapter 26. Gnome-RPMTo change this path, type the full path to the RPMs you would like to work with. Choosingthe Apply or OK buttons will save th
Chapter 26. Gnome-RPM 237CautionPackages not produced by Red Hat are not supported by Red Hat because Red Hat can not verifythe integrity of these pac
238 Chapter 26. Gnome-RPMFigure 26-8. Distribution Settings in PreferencesIn Distribution Settings, you can set the options for choosing the most appr
Chapter 26. Gnome-RPM 239Figure 26-9. Query WindowThe name of the package is centered at the top of the box. Below, the box is divided into twocolumns
24 Chapter 1. Kickstart Installationsfirewall [--high | --medium | --disabled] [--trust device ] [--dhcp] [--ssh] [--telnet] [--smtp] [--http] [--ftp]
240 Chapter 26. Gnome-RPMFigure 26-10. Verify WindowAs the package is being checked, you will see the progress in the Verify window. If thereare any p
Chapter 26. Gnome-RPM 241Once you have begun to uninstall packages, Gnome-RPM asks for confirmation, showinga window like the one in Figure 26-11. All
242 Chapter 26. Gnome-RPM
Chapter 27.Red Hat NetworkRed Hat Network is an Internet solution for managing a Red Hat Linux system or a networkof Red Hat Linux systems. All Securi
244 Chapter 27. Red Hat Network
Appendixes
Appendix A.Building a Custom KernelMany people new to Linux often ask, "Why should I build my own kernel?" Given the ad-vances that have bee
248 Appendix A. Building a Custom Kernelwill remove any configuration files along with the remains of any previous builds thatmay be scattered around th
Appendix A. Building a Custom Kernel 249look similar to EXTRAVERSION = -0.1.21-jul2001). This will allow you to have theold working kernel and the new
Chapter 1. Kickstart Installations 25nfsInstall from the NFS server specified.• --server serverServer from which to install (hostname or IP).• --dir di
250 Appendix A. Building a Custom KernelA.3.1. GRUBIf you selected GRUB as your boot loader, modify /boot/grub/grub.conf. The defaultGRUB configuration
Appendix A. Building a Custom Kernel 251A.3.2. LILOTo configure LILO to boot the new kernel, you need to update the /etc/lilo.conf file andrun the comma
252 Appendix A. Building a Custom KernelBoot image: /boot/vmlinuz-2.4.18-0.12-jul2001Added linux-oldWriting boot sector.Be sure the messages contains
Appendix B.Getting Started with Gnu Privacy GuardB.1. An Introduction to GnuPGHave you ever wondered if your email can be read during its transmission
254 Appendix B. Getting Started with Gnu Privacy GuardB.2. Generating a KeypairTo begin using GnuPG, you must first generate a new keypair: a public ke
Appendix B. Getting Started with Gnu Privacy Guard 255disks) during the prime generation; this gives the random numbergenerator a better chance to gai
256 Appendix B. Getting Started with Gnu Privacy Guard1024-bit DSA key, ID 823D25A9, created 2000-04-26ASCII armored output forced.Revocation certific
Appendix B. Getting Started with Gnu Privacy Guard 257B.4.1. Exporting to a KeyserverIf you are only writing to a few correspondents, you can export y
258 Appendix B. Getting Started with Gnu Privacy Guard• From your browser, go to Keyserver.Net (http://www.keyserver.net) and select the optionto add
Appendix B. Getting Started with Gnu Privacy Guard 259B.5. Importing a Public KeyThe other end of key exchange — importing other people’s public keys
26 Chapter 1. Kickstart Installations1.4.11. interactiveinteractive (optional)Uses the information provided in the kickstart file during the installati
260 Appendix B. Getting Started with Gnu Privacy GuardB.7.1. Installed Documentation• man gpg and info gpg — Quick Reference of GnuPG commands and opt
IndexSymbols/etc/auto.master, 104/etc/fstab, 103/etc/hosts.lpd, ??/etc/httpd/conf/httpd.conf, 119/etc/printcap, 179/etc/printcap.local, 179/etc/syscon
262configuration file, 197example crontabs, 198user-defined tasks, 198crontab, 197CtrlAltDelshutdown, disabling, 159Ddate configuration, 163decryptionwith
263Hhardwareviewing, 175Hardware Browser, 175Hardware RAID(See RAID)hwbrowser, 175Iinformationabout your system, 171initrd, 249insmod, 212installation
264MMail Transport Agent(See MTA)Maximum RPM, 227memory usage, 173modem connection(See network configuration)modprobe, 212modules.conf, 211monitoring fi
265command line options, 192creating an alias, 191CUPS printing system, 193configuration interface, 195default printer, 190delete existing printer, 190
266SSamba, 107additional resources, 110configuration, 107smb.conf, 107encrypted passwords, 108pam_smbpass, 108reasons for using, 107shareconnecting to,
XxDSL connection(See network configuration)xinetd, 92
Chapter 1. Kickstart Installations 271.4.14. langsupportlangsupport (required)Sets the language(s) to install on the system. The same language codes u
28 Chapter 1. Kickstart Installations--location=Specifies where the LILO boot record is written. Valid values are the following:mbr (the default) or pa
Chapter 1. Kickstart Installations 291.4.18. networknetwork (optional)Configures network information for the system. If the kickstart installation does
Red Hat Linux 7.3: The Official Red Hat Linux Customization GuideCopyright © 2002 by Red Hat, Inc.Red Hat, Inc.1801 Varsity DriveRaleigh NC 27606-2072
30 Chapter 1. Kickstart InstallationsThe static method requires that you enter all the required networking information in thekickstart file. As the nam
Chapter 1. Kickstart Installations 31swap --recommendedThe minimum size of the automatically-generated swap partition will be no smallerthan the amoun
32 Chapter 1. Kickstart Installations--startSpecifies the starting cylinder for the partition. It requires that a drive be specifiedwith --ondisk or ond
Chapter 1. Kickstart Installations 33--noformatDo not format the RAID array.The following example shows how to create a RAID level 1 partition for /,
34 Chapter 1. Kickstart Installations1.4.24. texttext (optional)Perform the kickstart installation in text mode. Kickstart installations are performed
Chapter 1. Kickstart Installations 35--monitor monUse monitor mon ; this monitor name should be from the list of monitors inXconfigurator. This is igno
36 Chapter 1. Kickstart InstallationsUse the %packages --resolvedeps1to install the listed packages and automatically resolvepackage dependencies.Use
Chapter 1. Kickstart Installations 37@ GNOME@ KDE@ Server@ Everything1.4.30. %pre — Pre-Installation Configuration SectionYou can add commands to run o
38 Chapter 1. Kickstart Installations# add comment to /etc/motdecho "Kickstart-installed Red Hat Linux ‘/bin/date‘" /etc/motd# add another n
Chapter 1. Kickstart Installations 391.5. Where to Put A Kickstart FileA kickstart file must be placed in one of two locations:• On a boot disk• On a n
40 Chapter 1. Kickstart Installationsip-addr -kickstartThe ip-addr section of the filename should be replaced with the client’s IP address indotted dec
Chapter 1. Kickstart Installations 41ks=hd: device / fileThe installation program will mount the filesystem on device (which must be vfator ext2), and
42 Chapter 1. Kickstart Installations
Chapter 2.Kickstart ConfiguratorKickstart Configurator allows you to create a kickstart file using a graphical user interface,so that you do not have to
44 Chapter 2. Kickstart ConfiguratorIf you have a two-button button mouse, you can emulate a three-button mouse by selectingEmulate 3 Buttons. If this
Chapter 2. Kickstart Configurator 45If you choose to install a boot loader, you must also choose which boot loader to install(GRUB or LILO) and where t
46 Chapter 2. Kickstart Configuratorthe fully-qualified domain name or IP address of the NFS server. For the NFS directory,enter the name of the NFS dir
Chapter 2. Kickstart Configurator 47You can initialize the disk label to the default for the architecture of the system (msdos forx86 and gpt for Itani
48 Chapter 2. Kickstart Configurator2.5. Network ConfigurationFigure 2-6. Network ConfigurationThere are three network configuration options: DHCP, Static
Chapter 2. Kickstart Configurator 492.6. AuthenticationFigure 2-7. AuthenticationIn the Authentication section, select whether to use shadow passwords
Table of ContentsIntroduction ...
50 Chapter 2. Kickstart Configurator2.7. Firewall ConfigurationFigure 2-8. Firewall ConfigurationThe Firewall Configuration window is identical to the scr
Chapter 2. Kickstart Configurator 512.8.1. GeneralFigure 2-9. X Configuration - GeneralThe first step in configuring X is to choose the default color dept
52 Chapter 2. Kickstart ConfiguratorFigure 2-10. X Configuration - Video Card2.8.3. MonitorAfter configuring the video card, click on the Monitor tab sho
Chapter 2. Kickstart Configurator 53Figure 2-11. X Configuration - Monitor2.9. Package SelectionFigure 2-12. Package SelectionThe Package Selection wind
54 Chapter 2. Kickstart Configurator2.10. Pre-Installation ScriptFigure 2-13. Pre-Installation ScriptYou can add commands to run on the system immediat
Chapter 2. Kickstart Configurator 552.11. Post-Installation ScriptFigure 2-14. Post-Installation ScriptYou can also add commands to execute on the syst
56 Chapter 2. Kickstart Configuratorecho "Hackers will be punished!" > /mnt/sysimage/etc/motd2.11.2. Use an InterpreterIf you want to spec
Chapter 2. Kickstart Configurator 57Figure 2-15. Confirm OptionsIf you are happy with your choices, click the Save File button within the dialog box. A
58 Chapter 2. Kickstart Configurator
Chapter 3.Rescue ModeWhen things go wrong, there are ways to fix problems. However, these methods require thatyou understand the system well. This chap
7.4. Configuring Services ... 897.5. Activating the Firewall...
60 Chapter 3. Rescue ModeIn these situations, you may be unable to boot Red Hat Linux. If you can get into rescuemode, you might be able to resolve th
Chapter 3. Rescue Mode 61mount -t ext3 /dev/hda5 /fooIn the above command, /foo is a directory that you have created and /dev/hda5 is thepartition you
62 Chapter 3. Rescue Mode5. Back at the GRUB screen, type b to boot into single user mode.If you are using LILO, specify one of these options at the L
Chapter 4.Redundant Array of Independent Disks (RAID)4.1. What is RAID?The basic idea behind RAID is to combine multiple small, inexpensive disk drive
64 Chapter 4. Redundant Array of Independent Disks (RAID)add them to the RAID controller’s configuration, and the operating system never knows thediffe
Chapter 4. Redundant Array of Independent Disks (RAID) 65high cost.2The storage capacity of the level 1 array is equal to the capacity of one of themi
66 Chapter 4. Redundant Array of Independent Disks (RAID)
Chapter 5.Software RAID ConfigurationRead Chapter 4 first to learn about RAID, the differences between Hardware and SoftwareRAID, and the differences be
68 Chapter 5. Software RAID Configuration• For Allowable Drives, select the drive on which RAID will be created. If you have multi-ple drives, all driv
Chapter 5. Software RAID Configuration 69• Select which partitions will go into this RAID array and click OK.• A spare partition can be specified for RA
III. System Configuration... 15717. Console Ac
70 Chapter 5. Software RAID Configuration
Network-Related References
Chapter 6.Network ConfigurationTo communicate with other computers, computers need a network connection. This is ac-complished by having the operating
74 Chapter 6. Network ConfigurationThis chapter will discuss each of these steps for each type of network connection.6.2. Establishing an Ethernet Conn
Chapter 6. Network Configuration 75After configuring the Ethernet device, it appears in the device list as shown in Figure 6-2.Figure 6-2. Ethernet Devi
76 Chapter 6. Network ConfigurationFigure 6-3. ISDN Settings5. If your ISP is in the pre-configured list, select it. Otherwise, enter the required infor
Chapter 6. Network Configuration 776.4. Establishing a Modem ConnectionA modem can be used to configure an Internet connection over an active phone line
78 Chapter 6. Network ConfigurationFigure 6-6. Modem DeviceBe sure to click Apply to save the changes.After adding the modem device, you can edit its c
Chapter 6. Network Configuration 79Figure 6-7. xDSL Settings5. If the Select Ethernet Adapter window appears, select the manufacturer and modelof the E
IV. Package Management...21525. Package Manag
80 Chapter 6. Network Configuration6.6. Establishing a Token Ring ConnectionA token ring network is a network in which all the computers are connected
Chapter 6. Network Configuration 81Figure 6-10. Token Ring DeviceBe sure to click Apply to save the changes.After adding the device, you can edit its c
82 Chapter 6. Network Configuration6.8. Establishing a Wireless ConnectionWireless Ethernet devices are becoming increasingly popular. The configuration
Chapter 6. Network Configuration 83After configuring the wireless device, it appears in the device list as shown in Figure 6-13.Figure 6-13. Wireless De
84 Chapter 6. Network ConfigurationFigure 6-14. Hosts ConfigurationTipTo change lookup order, edit the /etc/host.conf file. The line order hosts, bind sp
Chapter 6. Network Configuration 85NoteThe name servers section does not configure the system to be a name server.If the DNS server names are retrieved
86 Chapter 6. Network Configuration
Chapter 7.Basic Firewall ConfigurationJust as a firewall in a building attempts to prevent a fire from spreading, a computer fire-wall attempts to prevent
88 Chapter 7. Basic Firewall Configuration7.1. BasicFigure 7-1. BasicAfter starting the program, choose the appropriate security level for your system:
Chapter 7. Basic Firewall Configuration 89Figure 7-2. Local Hosts7.3. DHCPIf you are using DHCP to activate any Ethernet interfaces on the system, you
IntroductionWelcome to the Official Red Hat Linux Customization Guide.The Official Red Hat Linux Customization Guide contains information on how to cust
90 Chapter 7. Basic Firewall Configuration• Web Server — Choose this option if you want people to connect to a Web server such asApache running on your
Chapter 8.Controlling Access to ServicesMaintaining security on your Red Hat Linux system is extremely important. One way tomanage security on your sy
92 Chapter 8. Controlling Access to Services• 0 — Halt• 1 — Single-user mode• 2 — Not used (user-definable)• 3 — Full multi-user mode• 4 — Not used (us
Chapter 8. Controlling Access to Services 93will take effect. For a list of network services controlled by xinetd list of the contents of the/etc/xine
94 Chapter 8. Controlling Access to ServicesTo start, stop, or restart a service immediately, select the service and choose the action fromthe Actions
Chapter 8. Controlling Access to Services 95WarningChanges do not take effect immediately after using ntsysv. You must stop or start the individualser
96 Chapter 8. Controlling Access to Services8.6.1. Installed Documentation• man ntsysv — The ntsysv man page.• man chkconfig — The chkconfig man page.
Chapter 9.OpenSSHOpenSSH is a free, open source implementation of the SSH (Secure SHell) protocols. It re-places telnet, ftp, rlogin, rsh, and rcp wit
98 Chapter 9. OpenSSHssh penguin.example.netThe first time you ssh to a remote machine, you will see a message similar to the following:The authenticit
Chapter 9. OpenSSH 999.3.3. Using the sftp CommandThe sftp utility can be used to open a secure, interactive FTP session. It is similar toftp except t
Commenti su questo manuale