Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more ➡
Standard view
Full view
of .
Add note
Save to My Library
Sync to mobile
Look up keyword or section
Like this

Table Of Contents

1. Changes To This Manual
2. Architecture-specific Information
3. Document Conventions
4. Activate Your Subscription
• Provide a Red Hat login
4.1. Provide a Red Hat Login
4.3. Connect Your System
5. Using the Mouse
6. Copying and Pasting Text With X
7. More to Come
I. Installation-Related Information
Kickstart Installations
1.1. What are Kickstart Installations?
1.2. How Do You Perform a Kickstart Installation?
1.3. Creating the Kickstart File
1.4. Kickstart Options
1.5. Package Selection
1.6. Pre-installation Script
1.7. Post-installation Script
1.8. Making the Kickstart File Available
1.9. Making the Installation Tree Available
1.10. Starting a Kickstart Installation
Kickstart Configurator
2.1. Basic Configuration
2.3. Boot Loader Options
2.7. Firewall Configuration
2.8. Display Configuration
2.9. Package Selection
2.12. Saving the File
PXE Network Installations
3.1. Setting up the Network Server
3.2. PXE Boot Configuration
3.2.1. Command Line Configuration
3.3. Adding PXE Hosts
3.3.1. Command Line Configuration
3.5. Configuring the DHCP Server
3.6. Adding a Custom Boot Message
3.7. Performing the PXE Installation
Diskless Environments
4.1. Start the tftp Server
4.3. Configuring the NFS Server
4.4. Finish Configuring the Diskless Environment
4.5. Adding Hosts
4.6. Booting the Hosts
Basic System Recovery
5.1. Common Problems
6.3. Converting to an ext3 File System
Logical Volume Manager (LVM)
7.1. What is LVM?
7.2. What is LVM2?
7.3. Additional Resources
LVM Configuration
8.1. Automatic Partitioning
8.2. Manual LVM Partitioning
Redundant Array of Independent Disks (RAID)
9.1. What is RAID?
9.2. Who Should Use RAID?
9.3. Hardware RAID versus Software RAID
9.4. RAID Levels and Linear Support
Software RAID Configuration
10.1. Creating the RAID Partitions
10.2. Creating the RAID Devices and Mount Points
11.1. What is Swap Space?
11.2. Adding Swap Space
11.3. Removing Swap Space
11.4. Moving Swap Space
Managing Disk Storage
12.1. Standard Partitions using parted
13.1. Configuring Disk Quotas
13.2. Managing Disk Quotas
13.3. Additional Resources
Access Control Lists
14.1. Mounting File Systems
14.2. Setting Access ACLs
14.4. Retrieving ACLs
14.5. Archiving File Systems With ACLs
14.6. Compatibility with Older Systems
14.7. Additional Resources
III. Package Management
Package Management with RPM
15.1. RPM Design Goals
15.2. Using RPM
15.3. Checking a Package’s Signature
15.4. Impressing Your Friends with RPM
15.5. Additional Resources
Package Management Tool
16.2. Removing Packages
IV. Network-Related Configuration
Network Configuration
18.1. Overview
18.2. Establishing an Ethernet Connection
18.4. Establishing a Modem Connection
18.5. Establishing an xDSL Connection
18.6. Establishing a Token Ring Connection
18.8. Managing DNS Settings
18.9. Managing Hosts
18.10. Working with Profiles
18.11. Device Aliases
18.12. Establishing an IPsec Connection
18.12.3. Testing the IPsec Connection
18.13. Saving and Restoring the Network Configuration
Basic Firewall Configuration
19.1. Security Level Configuration Tool
Figure 19-1. Security Level Configuration Tool
19.2. Activating the iptables Service
Controlling Access to Services
20.1. Runlevels
20.2. TCP Wrappers
20.3. Services Configuration Tool
20.4. ntsysv
20.5. chkconfig
20.6. Additional Resources
21.1. Why Use OpenSSH?
21.2. Configuring an OpenSSH Server
21.4. Additional Resources
Network File System (NFS)
22.1. Why Use NFS?
22.2. Mounting NFS File Systems
22.3. Exporting NFS File Systems
23.2. Configuring a Samba Server
23.2.2. Command Line Configuration
23.3. Connecting to a Samba Share
23.4. Additional Resources
24.3. Configuring a DHCP Client
24.4. Additional Resources
Apache HTTP Server Configuration
25.2. Default Settings
25.5. Performance Tuning
25.7. Additional Resources
Apache HTTP Secure Server Configuration
26.1. Introduction
26.2. An Overview of Security-Related Packages
26.3. An Overview of Certificates and Security
26.4. Using Pre-Existing Keys and Certificates
26.6. Generating a Key
26.7. Generating a Certificate Request to Send to a CA
26.8. Creating a Self-Signed Certificate
26.9. Testing The Certificate
26.10. Accessing The Server
26.11. Additional Resources
Authentication Configuration
27.1. User Information
27.2. Authentication
27.3. Command Line Version
V. System Configuration
28.1. Disabling Shutdown Via [Ctrl]-[Alt]-[Del]
28.3. Defining the Console
28.4. Making Files Accessible From the Console
28.5. Enabling Console Access for Other Applications
28.6. The floppy Group
Date and Time Configuration
29.1. Time and Date Properties
29.2. Network Time Protocol (NTP) Properties
Keyboard Configuration
Mouse Configuration
X Window System Configuration
32.1. Display Settings
32.3. Dual Head Display Settings
User and Group Configuration
33.1. Adding a New User
33.2. Modifying User Properties
33.3. Adding a New Group
33.5. Command Line Configuration
33.6. Explaining the Process
33.7. Additional Information
Printer Configuration
34.1. Adding a Local Printer
34.2. Adding an IPP Printer
34.3. Adding a Remote UNIX (LPD) Printer
34.4. Adding a Samba (SMB) Printer
34.6. Adding a JetDirect Printer
34.7. Selecting the Printer Model and Finishing
34.9. Modifying Existing Printers
34.10. Saving the Configuration File
34.12. Managing Print Jobs
34.13. Sharing a Printer
34.14. Additional Resources
35.1. Cron
35.2. At and Batch
35.2.5. Controlling Access to At and Batch
35.3. Additional Resources
36.1. Locating Log Files
36.2. Viewing Log Files
36.4. Examining Log Files
Manually Upgrading the Kernel
37.1. Overview of Kernel Packages
37.2. Preparing to Upgrade
37.3. Downloading the Upgraded Kernel
37.4. Performing the Upgrade
37.5. Verifying the Initial RAM Disk Image
37.6. Verifying the Boot Loader
38.1. Kernel Module Utilities
38.2. Persistent Module Loading
38.3. Additional Resources
Mail Transport Agent (MTA) Configuration
VI. System Monitoring
Gathering System Information
40.1. System Processes
40.2. Memory Usage
40.3. File Systems
41.1. Overview of Tools
41.2. Configuring OProfile
41.2.3. Separating Kernel and User-space Profiles
41.3. Starting and Stopping OProfile
41.4. Saving Data
41.5. Analyzing the Data
41.6. Understanding /dev/oprofile/
41.7. Example Usage
41.8. Graphical Interface
41.9. Additional Resources
0 of .
Results for:
No results containing your search query
P. 1


Ratings: (0)|Views: 2,514|Likes:
Published by Zainub Hyder

More info:

Published by: Zainub Hyder on Jan 31, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See More
See less





You're Reading a Free Preview
Pages 8 to 73 are not shown in this preview.
You're Reading a Free Preview
Pages 81 to 109 are not shown in this preview.
You're Reading a Free Preview
Pages 117 to 189 are not shown in this preview.
You're Reading a Free Preview
Pages 197 to 203 are not shown in this preview.
You're Reading a Free Preview
Pages 211 to 352 are not shown in this preview.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->