Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010068008 | QA76.76.O63 C644 2004 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
* Updated to cover Red Hat Linux Enterprise Workstation with the latest on advanced Linux kernel features, the Tux Web server, the latest Apache 2.x Web server, and the expanded suite of custom configuration tools
* Starts with network planning and Red Hat installation and configuration, then progresses to optimizing network and Internet services and monitoring and maintaining the network
* Examines the basics of Red Hat Linux security and offers trouble-shooting and problem-solving advice
* Includes important new chapters that focus on optimizing standard network services, such as file and print services, and Internet-related servers, such as the Apache Web server
Copyright © 2004 by Red Hat, Inc. Material from Chapters 4-6, 8-10, 17 and 21 may be distributed only subject to the terms and conditions set forth in the Open Publication License, V1.0 or later (the latest version is presently available at http://www.opencontent.org/openpub/).
Author Notes
Terry Collings is Instructional Technologist at Muhlenberg College in Allentown, Pennsylvania
Kurt Wall manages the Content Group for TimeSys Corporation in Pittsburgh
Table of Contents
Preface | p. ix |
Acknowledgments | p. xiii |
Part I System and Network Administration Defined | |
Chapter 1 Duties of the System Administrator | p. 3 |
The Linux System Administrator | p. 3 |
Installing and Configuring Servers | p. 5 |
Installing and Configuring Application Software | p. 6 |
Creating and Maintaining User Accounts | p. 7 |
Backing Up and Restoring Files | p. 7 |
Monitoring and Tuning Performance | p. 9 |
Configuring a Secure System | p. 10 |
Using Tools to Monitor Security | p. 11 |
Summary | p. 12 |
Chapter 2 Planning the Network | p. 13 |
Deciding What Kind of Network You Need | p. 13 |
Planning and Implementing Security | p. 21 |
Planning for Recovery from Disasters | p. 23 |
Writing It Down--Good Records Can Save Your Job | p. 27 |
Summary | p. 28 |
Chapter 3 Standard Installation | p. 29 |
Exploring Your PC's Components | p. 29 |
Checking for Supported Hardware | p. 33 |
Creating the Red Hat Boot Disk | p. 34 |
Starting the Installation | p. 35 |
Starting the Hard Disk | p. 39 |
Configuring the Installation | p. 47 |
Selecting the Package Groups to Install | p. 58 |
Creating a Boot Disk | p. 61 |
Configuring the X Window System | p. 62 |
Summary | p. 65 |
Chapter 4 Kickstart Installation | p. 67 |
Configuring the Kickstart File (ks.cfg) | p. 67 |
Configuring Kickstart Using the Graphical Interface | p. 77 |
Summary | p. 92 |
Chapter 5 System Startup and Shutdown | p. 95 |
Understanding the Boot Process | p. 95 |
Using GRUB | p. 102 |
Running Programs at Boot Time | p. 110 |
Init Runlevels | p. 112 |
Shutting Down the System | p. 113 |
Summary | p. 114 |
Chapter 6 The File System Explained | p. 115 |
Understanding the File System Structure | p. 115 |
Special File Locations | p. 118 |
Working with Linux-Supported File Systems | p. 118 |
Memory and Virtual File Systems | p. 124 |
Directories in /proc/ | p. 143 |
Using sysctl | p. 164 |
Linux Disk Management | p. 165 |
What Is RAID? | p. 167 |
Summary | p. 171 |
Chapter 7 Red Hat System Configuration Files | p. 173 |
Examining the System Configuration Files | p. 174 |
The /etc/sysconfig/ Directory | p. 184 |
Examining the Network Configuration Files | p. 197 |
Managing the init Scripts | p. 206 |
Summary | p. 211 |
Part II Network Services | |
Chapter 8 X Servers and Clients | p. 215 |
The Power of X | p. 215 |
XFree86 | p. 216 |
Desktop Environments and Window Managers | p. 222 |
Fonts | p. 226 |
Additional Resources | p. 229 |
Summary | p. 230 |
Chapter 9 Printer Configuration | p. 231 |
Printer Configuration Tool | p. 231 |
Command-Line Configuration | p. 245 |
Managing Your Print Jobs | p. 246 |
Additional Resources | p. 248 |
Summary | p. 249 |
Chapter 10 TCP/IP Networking | p. 251 |
TCP/IP Explained | p. 251 |
Understanding Network Classes | p. 253 |
Setting Up a Network Interface Card (NIC) | p. 255 |
Understanding Subnetting | p. 260 |
Classless InterDomain Routing (CIDR) | p. 266 |
Gateways and Routers | p. 268 |
Configuring Dynamic Host Configuration Protocol (DHCP) | p. 270 |
Configuring the Network Using the Network Configuration Tool | p. 276 |
Summary | p. 284 |
Chapter 11 The Network File System | p. 285 |
NFS Overview | p. 285 |
Planning an NFS Installation | p. 288 |
Configuring an NFS Server | p. 291 |
Configuring an NFS Client | p. 309 |
Using Automount Services | p. 312 |
Examining NFS Security | p. 316 |
Summary | p. 318 |
Chapter 12 The Network Information System | p. 319 |
Understanding NIS | p. 319 |
Planning an NIS Installation | p. 321 |
Configuring an NIS Server | p. 324 |
Configuring an NIS Client | p. 334 |
Strengthening NIS Security | p. 344 |
Summary | p. 344 |
Chapter 13 Connecting to Microsoft and Novell Networks | p. 345 |
Connecting to Microsoft Networks | p. 345 |
Connecting to Novell Networks | p. 354 |
Summary | p. 356 |
Chapter 14 Connecting to Apple Networks | p. 357 |
Understanding AppleTalk | p. 357 |
Installing the AppleTalk Software | p. 358 |
Configuring the Appletalk Daemons | p. 361 |
Configuring Red Hat as an AppleTalk Client | p. 368 |
Summary | p. 371 |
Chapter 15 Optimizing Network Services | p. 373 |
Optimizing the X Window System | p. 373 |
Optimizing NFS | p. 375 |
Optimizing NIS | p. 379 |
Optimizing Samba Networking | p. 380 |
Summary | p. 380 |
Part III Internet Services | |
Chapter 16 What Are Internet Services? | p. 383 |
Secure Services | p. 384 |
Less Secure Services | p. 386 |
Using Your Linux Machine as a Server | p. 388 |
xinetd | p. 389 |
xinetd vs. Stand-Alone | p. 392 |
Linux Firewall Packages | p. 394 |
Summary | p. 396 |
Chapter 17 Lightweight Directory Access Protocol (LDAP) | p. 397 |
Why Use LDAP? | p. 398 |
OpenLDAP Daemons and Utilities | p. 399 |
LDAP Terminology | p. 401 |
OpenLDAP Configuration Files | p. 402 |
OpenLDAP Setup Overview | p. 405 |
Configuring Your System to Authenticate Using OpenLDAP | p. 405 |
Additional Resources | p. 408 |
Summary | p. 408 |
Chapter 18 BIND: The Domain Name System (DNS) | p. 409 |
Understanding DNS | p. 409 |
Installing the Software | p. 412 |
Understanding Types of Domain Servers | p. 413 |
Examining Server Configuration Files | p. 414 |
Configuring a Caching Server | p. 430 |
Configuring a Slave Server | p. 431 |
Configuring a Master Server | p. 432 |
Using DNS Tools | p. 433 |
Summary | p. 436 |
Chapter 19 Configuring Mail Services | p. 437 |
E-Mail Explained | p. 437 |
Introducing SMTP | p. 439 |
Configuring Sendmail | p. 441 |
Configuring Postfix | p. 446 |
Configuring the E-Mail Client | p. 452 |
Maintaining E-Mail Security | p. 460 |
Summary | p. 462 |
Chapter 20 Configuring FTP Services | p. 463 |
vsftp | p. 463 |
Installing vsftpd | p. 465 |
Configuring vsftpd | p. 468 |
Advanced FTP Server Configuration | p. 475 |
Summary | p. 476 |
Chapter 21 Configuring Web Services | p. 477 |
Introducing Apache | p. 477 |
How Web Servers Work | p. 481 |
Installing and Configuring Apache | p. 482 |
Using the Apache Configuration Tool | p. 502 |
Implementing SSI | p. 518 |
Implementing CGI | p. 521 |
Creating a Secure Server with SSL | p. 523 |
Summary | p. 534 |
Chapter 22 Optimizing Internet Services | p. 535 |
Optimizing LDAP Services | p. 535 |
Optimizing DNS Services | p. 536 |
Optimizing Mail Services | p. 540 |
Optimizing FTP Services | p. 542 |
Optimizing Web Services | p. 543 |
Summary | p. 545 |
Part IV System Maintenance | |
Chapter 23 Using the Red Hat Network | p. 549 |
Registering Your System with the Red Hat Network | p. 550 |
Configuring the Red Hat Update Agent | p. 553 |
Using the Red Hat Update Agent | p. 556 |
Using the Red Hat Network Alert Icon | p. 559 |
Using the Red Hat Network via the Internet | p. 561 |
Summary | p. 567 |
Chapter 24 Upgrading and Customizing the Kernel | p. 569 |
Should You Upgrade to a New Kernel? | p. 569 |
Obtaining Upgraded Kernel RPMs | p. 576 |
Installing Kernel Source Code from the Internet | p. 578 |
Building a Customized Kernel | p. 585 |
Configuring the Boot Loader | p. 615 |
Summary | p. 617 |
Chapter 25 Configuring the System at the Command Line | p. 619 |
System Administration at the Command Line | p. 619 |
Administering Users and Groups | p. 621 |
Managing Processes | p. 629 |
Maintaining the File System | p. 635 |
Tracking and Controlling System Usage | p. 647 |
Timekeeping | p. 648 |
Automating System Maintenance | p. 655 |
Summary | p. 694 |
Chapter 26 Administering Users and Groups | p. 695 |
Understanding the Root Account | p. 695 |
Implementing Sudo | p. 696 |
Working with Users and Groups | p. 702 |
Using File System Quotas | p. 726 |
Summary | p. 733 |
Chapter 27 Installing and Upgrading Software Packages | p. 735 |
Using the Red Hat Package Manager | p. 735 |
Checking Software Versions | p. 751 |
Obtaining Newer Software | p. 754 |
Installing Software | p. 759 |
Summary | p. 769 |
Chapter 28 Backing Up and Restoring the File System | p. 771 |
Creating a Backup Plan | p. 771 |
Choosing Media for Backups | p. 772 |
Understanding Backup Methods | p. 773 |
Tape Rotation | p. 775 |
Using Backup Tools | p. 775 |
Summary | p. 796 |
Part V System Security and Problem Solving | |
Chapter 29 Security Basics | p. 799 |
Introducing Basic Security Principles | p. 799 |
Developing a Security Policy | p. 805 |
A Disaster Recovery Case Study | p. 813 |
Finding Security-Related Resources | p. 815 |
Summary | p. 817 |
Chapter 30 Implementing Local Security | p. 819 |
Exploring the Nature of Physical Security | p. 820 |
Maintaining User and Password Security | p. 829 |
Summary | p. 838 |
Chapter 31 Implementing Network Security | p. 839 |
Limiting Network Services | p. 839 |
Firewall Theory | p. 849 |
Firewalls and iptables | p. 862 |
Summary | p. 873 |
Chapter 32 Detecting and Preventing Intrusions | p. 875 |
Using Tripwire | p. 875 |
Using LogWatch | p. 890 |
Detecting Intrusions with ipchains | p. 893 |
Detecting Intrusions with iptables | p. 895 |
Summary | p. 896 |
Chapter 33 Troubleshooting and Problem Solving | p. 897 |
Solving Installation Problems | p. 898 |
Solving File System Problems | p. 902 |
Solving Networking Problems | p. 905 |
Solving NFS Problems | p. 909 |
Solving Boot Problems | p. 912 |
Solving Miscellaneous Problems | p. 915 |
Summary | p. 917 |
Appendix What's on the CD-ROM? | p. 919 |
Index | p. 921 |
GNU General Public License | p. 971 |