Rhel6 Dp Guide 1
User Manual:
Open the PDF directly: View PDF
Page Count: 445 [warning: Documents this large are best viewed by clicking the View PDF Link!]
- Table of Contents
- PART I. BASIC SYSTEM CONFIGURATION
- CHAPTER 1. KEYBOARD CONFIGURATION
- CHAPTER 2. DATE AND TIME CONFIGURATION
- CHAPTER 3. MANAGING USERS AND GROUPS
- CHAPTER 4. GAINING PRIVILEGES
- CHAPTER 5. CONSOLE ACCESS
- PART II. SUBSCRIPTION AND SUPPORT
- CHAPTER 6. REGISTERING THE SYSTEM AND MANAGING SUBSCRIPTIONS
- CHAPTER 7. ACCESSING SUPPORT USING THE RED HAT SUPPORT TOOL
- 7.1. INSTALLING THE RED HAT SUPPORT TOOL
- 7.2. REGISTERING THE RED HAT SUPPORT TOOL USING THE COMMAND LINE
- 7.3. USING THE RED HAT SUPPORT TOOL IN INTERACTIVE SHELL MODE
- 7.4. CONFIGURING THE RED HAT SUPPORT TOOL
- 7.5. OPENING AND UPDATING SUPPORT CASES USING INTERACTIVE MODE
- 7.6. VIEWING SUPPORT CASES ON THE COMMAND LINE
- 7.7. ADDITIONAL RESOURCES
- PART III. INSTALLING AND MANAGING SOFTWARE
- CHAPTER 8. YUM
- 8.1. CHECKING FOR AND UPDATING PACKAGES
- 8.2. PACKAGES AND PACKAGE GROUPS
- 8.3. WORKING WITH TRANSACTION HISTORY
- 8.4. CONFIGURING YUM AND YUM REPOSITORIES
- 8.4.1. Setting [main] Options
- 8.4.2. Setting [repository] Options
- 8.4.3. Using Yum Variables
- 8.4.4. Viewing the Current Configuration
- 8.4.5. Adding, Enabling, and Disabling a Yum Repository
- 8.4.6. Creating a Yum Repository
- 8.4.7. Working with Yum Cache
- 8.4.8. Adding the Optional and Supplementary Repositories
- 8.5. YUM PLUG-INS
- 8.6. ADDITIONAL RESOURCES
- CHAPTER 9. PACKAGEKIT
- PART IV. NETWORKING
- CHAPTER 10. NETWORKMANAGER
- 10.1. THE NETWORKMANAGER DAEMON
- 10.2. INTERACTING WITH NETWORKMANAGER
- 10.3. ESTABLISHING CONNECTIONS
- 10.3.1. Establishing a Wired (Ethernet) Connection
- 10.3.2. Establishing a Wireless Connection
- Quickly Connecting to an Available Access Point
- Connecting to a Hidden Wireless Network
- Editing a Connection, or Creating a Completely New One
- Configuring the Connection Name, Auto-Connect Behavior, and Availability Settings
- Configuring the Wireless Tab
- Saving Your New (or Modified) Connection and Making Further Configurations
- 10.3.3. Establishing a Mobile Broadband Connection
- 10.3.4. Establishing a VPN Connection
- 10.3.5. Establishing a DSL Connection
- 10.3.6. Establishing a Bond Connection
- 10.3.7. Establishing a VLAN Connection
- 10.3.8. Establishing an IP-over-InfiniBand (IPoIB) Connection
- 10.3.9. Configuring Connection Settings
- CHAPTER 11. NETWORK INTERFACES
- 11.1. NETWORK CONFIGURATION FILES
- 11.2. INTERFACE CONFIGURATION FILES
- 11.2.1. Ethernet Interfaces
- 11.2.2. Specific ifcfg Options for Linux on System z
- 11.2.3. Required ifcfg Options for Linux on System z
- 11.2.4. Channel Bonding Interfaces
- 11.2.5. Configuring a VLAN over a Bond
- 11.2.6. Network Bridge
- 11.2.7. Setting Up 802.1Q VLAN Tagging
- 11.2.8. Alias and Clone Files
- 11.2.9. Dialup Interfaces
- 11.2.10. Other Interfaces
- 11.3. INTERFACE CONTROL SCRIPTS
- 11.4. STATIC ROUTES AND THE DEFAULT GATEWAY
- 11.5. CONFIGURING STATIC ROUTES IN IFCFG FILES
- 11.6. CONFIGURING IPV6 TOKENIZED INTERFACE IDENTIFIERS
- 11.7. NETWORK FUNCTION FILES
- 11.8. ETHTOOL
- 11.9. CONFIGURING NETCONSOLE
- 11.10. ADDITIONAL RESOURCES
- PART V. INFRASTRUCTURE SERVICES
- CHAPTER 12. SERVICES AND DAEMONS
- CHAPTER 13. CONFIGURING AUTHENTICATION
- 13.1. CONFIGURING SYSTEM AUTHENTICATION
- 13.1.1. Launching the Authentication Configuration Tool UI
- 13.1.2. Selecting the Identity Store for Authentication
- 13.1.3. Configuring Alternative Authentication Features
- 13.1.4. Configuring Authentication from the Command Line
- 13.1.4.1. Tips for Using authconfig
- 13.1.4.2. Configuring LDAP User Stores
- 13.1.4.3. Configuring NIS User Stores
- 13.1.4.4. Configuring Winbind User Stores
- 13.1.4.5. Configuring Kerberos Authentication
- 13.1.4.6. Configuring Local Authentication Settings
- 13.1.4.7. Configuring Fingerprint Authentication
- 13.1.4.8. Configuring Smart Card Authentication
- 13.1.4.9. Managing Kickstart and Configuration Files
- 13.1.5. Using Custom Home Directories
- 13.2. USING AND CACHING CREDENTIALS WITH SSSD
- 13.2.1. About SSSD
- 13.2.2. Setting up the sssd.conf File
- 13.2.3. Starting and Stopping SSSD
- 13.2.4. SSSD and System Services
- 13.2.5. Configuring Services: NSS
- 13.2.6. Configuring Services: PAM
- 13.2.7. Configuring Services: autofs
- 13.2.8. Configuring Services: sudo
- 13.2.9. Configuring Services: OpenSSH and Cached Keys
- 13.2.10. SSSD and Identity Providers (Domains)
- 13.2.11. Creating Domains: LDAP
- 13.2.12. Creating Domains: Identity Management (IdM)
- 13.2.13. Creating Domains: Active Directory
- 13.2.14. Configuring Domains: Active Directory as an LDAP Provider (Alternative)
- 13.2.15. Domain Options: Setting Username Formats
- 13.2.16. Domain Options: Enabling Offline Authentication
- 13.2.17. Domain Options: Setting Password Expirations
- 13.2.18. Domain Options: Using DNS Service Discovery
- 13.2.19. Domain Options: Using IP Addresses in Certificate Subject Names (LDAP Only)
- 13.2.20. Creating Domains: Proxy
- 13.2.21. Creating Domains: Kerberos Authentication
- 13.2.22. Creating Domains: Access Control
- 13.2.23. Creating Domains: Primary Server and Backup Servers
- 13.2.24. Installing SSSD Utilities
- 13.2.25. SSSD and UID and GID Numbers
- 13.2.26. Creating Local System Users
- 13.2.27. Seeding Users into the SSSD Cache During Kickstart
- 13.2.28. Managing the SSSD Cache
- 13.2.29. Downgrading SSSD
- 13.2.30. Using NSCD with SSSD
- 13.2.31. Troubleshooting SSSD
- 13.1. CONFIGURING SYSTEM AUTHENTICATION
- CHAPTER 14. OPENSSH
- 14.1. THE SSH PROTOCOL
- 14.2. CONFIGURING OPENSSH
- 14.3. USING OPENSSH CERTIFICATE AUTHENTICATION
- 14.3.1. Introduction to SSH Certificates
- 14.3.2. Support for SSH Certificates
- 14.3.3. Creating SSH CA Certificate Signing Keys
- 14.3.4. Distributing and Trusting SSH CA Public Keys
- 14.3.5. Creating SSH Certificates
- 14.3.6. Signing an SSH Certificate Using a PKCS#11 Token
- 14.3.7. Viewing an SSH CA Certificate
- 14.3.8. Revoking an SSH CA Certificate
- 14.4. OPENSSH CLIENTS
- 14.5. MORE THAN A SECURE SHELL
- 14.6. ADDITIONAL RESOURCES
- CHAPTER 15. TIGERVNC
- PART VI. SERVERS
- CHAPTER 16. DHCP SERVERS
- CHAPTER 17. DNS SERVERS
- CHAPTER 18. WEB SERVERS
- 18.1. THE APACHE HTTP SERVER
- 18.1.1. New Features
- 18.1.2. Notable Changes
- 18.1.3. Updating the Configuration
- 18.1.4. Running the httpd Service
- 18.1.5. Editing the Configuration Files
- 18.1.6. Working with Modules
- 18.1.7. Setting Up Virtual Hosts
- 18.1.8. Setting Up an SSL Server
- 18.1.9. Enabling the mod_ssl Module
- 18.1.10. Enabling the mod_nss Module
- 18.1.11. Using an Existing Key and Certificate
- 18.1.12. Generating a New Key and Certificate
- 18.1.13. Configure the Firewall for HTTP and HTTPS Using the Command Line
- 18.1.14. Additional Resources
- 18.1. THE APACHE HTTP SERVER
- CHAPTER 19. MAIL SERVERS