Red Hat Linux 7.2

The Official Red Hat Linux Customization Guide

Red Hat, Inc.
2600 Meridian Parkway
Durham, NC 27713
Phone: +1 919 547 0012
Phone: 888 733 4281
Fax: +1 919 547 0024
PO Box 13588
Research Triangle Park, NC 27709



This manual is dedicated to Carole Williams, a valuable contributor to the Red Hat documentation team. Carole, we wish you all the best in your future endeavors. We miss your wisdom, superior editing skills, ability to write humor into just about any topic, and jokes that made each day a joy to work with you. Every time we eat a piece of chocolate we will think of you!

Table of Contents
Document Conventions
More to Come
Send in Your Feedback
Sign Up for Support
I. Installation-Related Reference
1. Kickstart Installations
What are Kickstart Installations?
How Do You Perform a Kickstart Installation?
Starting a Kickstart Installation
The Kickstart File
Kickstart Options
2. Kickstart Configurator
Basic Configuration
Boot Loader Options
Installation Method
Partition Information
Network Configuration
Firewall Configuration
X Configuration
Package Selection
Pre-Installation Script
Post-Installation Script
Saving the File
3. Rescue Mode
What is Rescue Mode?
4. Redundant Array of Independent Disks (RAID)
What is RAID?
Who Should Use RAID?
Hardware RAID versus Software RAID
RAID Levels and Linear Support
5. Software RAID Configuration
II. Network-Related References
6. Network Configuration
Adding Network Hardware
Adding a Device
Managing DNS Settings
7. Basic Firewall Configuration
Local Hosts
Configuring Services
Activating the Firewall
8. Controlling Access to Services
TCP Wrappers
Additional Resources
9. OpenSSH
Why Use OpenSSH?
Configuring an OpenSSH Server
Configuring an OpenSSH Client
Additional Resources
10. Network File System (NFS)
Why Use NFS?
Mounting NFS Filesystems
Exporting NFS Filesystems
Additional Resources
11. Samba
Why Use Samba?
Configuring Samba
Connecting to a Samba Share
Using Samba with Windows NT 4.0 and Windows 2000
Additional Resources
12. Dynamic Host Configuration Protocol (DHCP)
Why Use DHCP?
Configuring a DHCP Server
Configuring a DHCP Client
Additional Resources
13. Kerberos
Configuring a Kerberos 5 Server
Configuring a Kerberos 5 Client
Additional Resources
14. Apache Configuration
Basic Settings
Default Settings
Virtual Hosts Settings
Server Settings
Performance Tuning
Saving Your Settings
Additional Resources
15. Apache Secure Server Configuration
An Overview of Security-Related Packages
An Overview of Certificates and Security
Using Pre-Existing Keys and Certificates
Types of Certificates
Generating a Key
Generating a Certificate Request to Send to a CA
Creating a Self-Signed Certificate
Testing Your Certificate
Accessing Your Secure Server
Additional Resources
16. BIND Configuration
Adding a Forward Master Zone
Adding a Reverse Master Zone
Adding a Slave Zone
III. System Configuration
17. Console Access
Disabling Shutdown Via Ctrl-Alt-Del
Disabling Console Program Access
Disabling All Console Access
Defining the Console
Making Files Accessible From the Console
Enabling Console Access for Other Applications
The floppy Group
18. Time and Date Configuration
Time and Date Properties
Time Zone Configuration
19. User and Group Configuration
Adding a New User
Modifying User Properties
Adding a New Group
Modifying Group Properties
20. Gathering System Information
System Processes
Memory Usage
Additional Resources
21. Printer Configuration
Adding a Local Printer
Adding a Remote UNIX Printer
Adding a Samba (SMB) Printer
Adding a Novell NetWare (NCP) Printer
Adding a JetDirect Printer
Selecting the Print Driver and Finishing
Printing a Test Page
Modifying Existing Printers
Saving the Configuration File
Managing Your Print Jobs
Additional Resources
22. Automated Tasks
Configuring a Cron Task
Additional Resources
23. Ugrading the Kernel
The 2.4 Kernel
Preparing to Upgrade
Downloading the Upgraded Kernel
Performing the Upgrade
Configuring the Boot Loader
Additional Resources
24. Kernel Modules
Kernel Module Utilities
Additional Resources
IV. Package Management
25. Package Management with RPM
RPM Design Goals
Using RPM
Checking a Package's Signature
Impressing Your Friends with RPM
Additional Resources
26. Gnome-RPM
Starting Gnome-RPM
The Package Display
Installing New Packages
Package Manipulation
27. Red Hat Network
V. Appendixes
A. Building a Custom Kernel
Building a Modularized Kernel
Making an initrd Image
Configuring the Boot Loader
Building a Monolithic Kernel
B. Getting Started with Gnu Privacy Guard
An Introduction to GnuPG
Generating a Keypair
Generating a Revocation Certificate
Exporting your Public Key
Importing a Public Key
What Are Digital Signatures?
Additional Resources