Red Hat Linux 7.3

The Official Red Hat Linux Customization Guide

Table of Contents
Changes to This Manual
Document Conventions
More to Come
Send in Your Feedback
Sign Up for Support
I. Installation-Related Reference
1. Kickstart Installations
What are Kickstart Installations?
How Do You Perform a Kickstart Installation?
Creating the Kickstart File
Kickstart Options
Where to Put A Kickstart File
Starting a Kickstart Installation
2. Kickstart Configurator
Basic Configuration
Boot Loader Options
Installation Method
Partition Information
Network Configuration
Firewall Configuration
X Configuration
Package Selection
Pre-Installation Script
Post-Installation Script
Saving the File
3. Rescue Mode
What is Rescue Mode?
Booting Rescue Mode
Booting Single-User Mode
4. Redundant Array of Independent Disks (RAID)
What is RAID?
Who Should Use RAID?
Hardware RAID versus Software RAID
RAID Levels and Linear Support
5. Software RAID Configuration
II. Network-Related References
6. Network Configuration
Establishing an Ethernet Connection
Establishing an ISDN Connection
Establishing a Modem Connection
Establishing an xDSL Connection
Establishing a Token Ring Connection
Establishing a CIPE Connection
Establishing a Wireless Connection
Managing Hosts
Managing DNS Settings
7. Basic Firewall Configuration
Local Hosts
Configuring Services
Activating the Firewall
8. Controlling Access to Services
TCP Wrappers
Additional Resources
9. OpenSSH
Why Use OpenSSH?
Configuring an OpenSSH Server
Configuring an OpenSSH Client
Additional Resources
10. Network File System (NFS)
Why Use NFS?
Mounting NFS Filesystems
Exporting NFS Filesystems
Additional Resources
11. Samba
Why Use Samba?
Configuring Samba
Connecting to a Samba Share
Additional Resources
12. Dynamic Host Configuration Protocol (DHCP)
Why Use DHCP?
Configuring a DHCP Server
Configuring a DHCP Client
Additional Resources
13. Apache Configuration
Basic Settings
Default Settings
Virtual Hosts Settings
Server Settings
Performance Tuning
Saving Your Settings
Additional Resources
14. Apache Secure Server Configuration
An Overview of Security-Related Packages
An Overview of Certificates and Security
Using Pre-Existing Keys and Certificates
Types of Certificates
Generating a Key
Generating a Certificate Request to Send to a CA
Creating a Self-Signed Certificate
Testing Your Certificate
Accessing Your Secure Server
Additional Resources
15. BIND Configuration
Adding a Forward Master Zone
Adding a Reverse Master Zone
Adding a Slave Zone
16. Mail Transport Agent (MTA) Configuration
III. System Configuration
17. Console Access
Disabling Shutdown Via Ctrl-Alt-Del
Disabling Console Program Access
Disabling All Console Access
Defining the Console
Making Files Accessible From the Console
Enabling Console Access for Other Applications
The floppy Group
18. Time and Date Configuration
Time and Date Properties
Time Zone Configuration
19. User and Group Configuration
Adding a New User
Modifying User Properties
Adding a New Group
Modifying Group Properties
20. Gathering System Information
System Processes
Memory Usage
Additional Resources
21. Printer Configuration
Adding a Local Printer
Adding a Remote UNIX Printer
Adding a Samba (SMB) Printer
Adding a Novell NetWare (NCP) Printer
Adding a JetDirect Printer
Selecting the Print Driver and Finishing
Printing a Test Page
Modifying Existing Printers
Saving the Configuration File
Managing Your Print Jobs
Configuring the CUPS Printing System
Additional Resources
22. Automated Tasks
At and Batch
Additional Resources
23. Upgrading the Kernel
The 2.4 Kernel
Preparing to Upgrade
Downloading the Upgraded Kernel
Performing the Upgrade
Configuring the Boot Loader
24. Kernel Modules
Kernel Module Utilities
Additional Resources
IV. Package Management
25. Package Management with RPM
RPM Design Goals
Using RPM
Checking a Package's Signature
Impressing Your Friends with RPM
Additional Resources
26. Gnome-RPM
Starting Gnome-RPM
The Package Display
Installing New Packages
Package Manipulation
27. Red Hat Network
V. Appendixes
A. Building a Custom Kernel
Building a Modularized Kernel
Making an initrd Image
Configuring the Boot Loader
Building a Monolithic Kernel
Additional Resources
B. Getting Started with Gnu Privacy Guard
An Introduction to GnuPG
Generating a Keypair
Generating a Revocation Certificate
Exporting your Public Key
Importing a Public Key
What Are Digital Signatures?
Additional Resources