Red Hat Enterprise Linux 4 System Administration Guide

原贴:http://linux.chinaitlab.com/manual/linux/redhat/rhel-sag-en-4/rhel-sag-en-4/

 

Red Hat Enterprise Linux 4

System Administration Guide

ISBN: N/A
Table of Contents Introduction
1. Changes To This Manual 2. Architecture-specific Information 3. Document Conventions 4. Activate Your Subscription
4.1. Provide a Red Hat Login 4.2. Provide Your Subscription Number 4.3. Connect Your System
5. Using the Mouse 6. Copying and Pasting Text With X 7. More to Come
7.1. Send in Your Feedback
I. Installation-Related Information
1. Kickstart Installations
1.1. What are Kickstart Installations? 1.2. How Do You Perform a Kickstart Installation? 1.3. Creating the Kickstart File 1.4. Kickstart Options 1.5. Package Selection 1.6. Pre-installation Script 1.7. Post-installation Script 1.8. Making the Kickstart File Available 1.9. Making the Installation Tree Available 1.10. Starting a Kickstart Installation
2. Kickstart Configurator
2.1. Basic Configuration 2.2. Installation Method 2.3. Boot Loader Options 2.4. Partition Information 2.5. Network Configuration 2.6. Authentication 2.7. Firewall Configuration 2.8. Display Configuration 2.9. Package Selection 2.10. Pre-Installation Script 2.11. Post-Installation Script 2.12. Saving the File
3. PXE Network Installations
3.1. Setting up the Network Server 3.2. PXE Boot Configuration 3.3. Adding PXE Hosts 3.4. Starting the tftp Server 3.5. Configuring the DHCP Server 3.6. Adding a Custom Boot Message 3.7. Performing the PXE Installation
4. Diskless Environments
4.1. Start the tftp Server 4.2. Configuring the DHCP Server 4.3. Configuring the NFS Server 4.4. Finish Configuring the Diskless Environment 4.5. Adding Hosts 4.6. Booting the Hosts
II. File Systems
5. The ext3 File System
5.1. Features of ext3 5.2. Creating an ext3 File System 5.3. Converting to an ext3 File System 5.4. Reverting to an ext2 File System
6. Access Control Lists
6.1. Mounting File Systems 6.2. Setting Access ACLs 6.3. Setting Default ACLs 6.4. Retrieving ACLs 6.5. Archiving File Systems With ACLs 6.6. Compatibility with Older Systems 6.7. Additional Resources
III. Package Management
7. Package Management with RPM
7.1. RPM Design Goals 7.2. Using RPM 7.3. Checking a Package's Signature 7.4. Impressing Your Friends with RPM 7.5. Additional Resources
8. Package Management Tool
8.1. Installing Packages 8.2. Removing Packages
9. Red Hat Network
IV. Network-Related Configuration
10. Network Configuration
10.1. Overview 10.2. Establishing an Ethernet Connection 10.3. Establishing an ISDN Connection 10.4. Establishing a Modem Connection 10.5. Establishing an xDSL Connection 10.6. Establishing a Token Ring Connection 10.7. Establishing a Wireless Connection 10.8. Managing DNS Settings 10.9. Managing Hosts 10.10. Working with Profiles 10.11. Device Aliases 10.12. Establishing an IPsec Connection 10.13. Saving and Restoring the Network Configuration
11. Basic Firewall Configuration
11.1. Security Level Configuration Tool 11.2. Activating the iptables Service
12. Controlling Access to Services
12.1. Runlevels 12.2. TCP Wrappers 12.3. Services Configuration Tool 12.4. ntsysv 12.5. chkconfig 12.6. Additional Resources
13. OpenSSH
13.1. Why Use OpenSSH? 13.2. Configuring an OpenSSH Server 13.3. Configuring an OpenSSH Client 13.4. Additional Resources
14. Network File System (NFS)
14.1. Why Use NFS? 14.2. Mounting NFS File Systems 14.3. Exporting NFS File Systems 14.4. Additional Resources
15. Samba
15.1. Why Use Samba? 15.2. Configuring a Samba Server 15.3. Connecting to a Samba Share 15.4. Additional Resources
16. Dynamic Host Configuration Protocol (DHCP)
16.1. Why Use DHCP? 16.2. Configuring a DHCP Server 16.3. Configuring a DHCP Client 16.4. Additional Resources
17. Apache HTTP Server Configuration
17.1. Basic Settings 17.2. Default Settings 17.3. Virtual Hosts Settings 17.4. Server Settings 17.5. Performance Tuning 17.6. Saving Your Settings 17.7. Additional Resources
18. Apache HTTP Secure Server Configuration
18.1. Introduction 18.2. An Overview of Security-Related Packages 18.3. An Overview of Certificates and Security 18.4. Using Pre-Existing Keys and Certificates 18.5. Types of Certificates 18.6. Generating a Key 18.7. Generating a Certificate Request to Send to a CA 18.8. Creating a Self-Signed Certificate 18.9. Testing The Certificate 18.10. Accessing The Server 18.11. Additional Resources
19. Authentication Configuration
19.1. User Information 19.2. Authentication 19.3. Command Line Version
V. System Configuration
20. Console Access
20.1. Disabling Shutdown Via [Ctrl]- [Alt]- [Del] 20.2. Disabling Console Program Access 20.3. Defining the Console 20.4. Making Files Accessible From the Console 20.5. Enabling Console Access for Other Applications 20.6. The floppy Group
21. Date and Time Configuration
21.1. Time and Date Properties 21.2. Network Time Protocol (NTP) Properties 21.3. Time Zone Configuration
22. Keyboard Configuration 23. Mouse Configuration 24. X Window System Configuration
24.1. Display Settings 24.2. Display Hardware Settings 24.3. Dual Head Display Settings
25. User and Group Configuration
25.1. Adding a New User 25.2. Modifying User Properties 25.3. Adding a New Group 25.4. Modifying Group Properties 25.5. Command Line Configuration 25.6. Explaining the Process 25.7. Additional Information
26. Printer Configuration
26.1. Adding a Local Printer 26.2. Adding an IPP Printer 26.3. Adding a Remote UNIX (LPD) Printer 26.4. Adding a Samba (SMB) Printer 26.5. Adding a Novell NetWare (NCP) Printer 26.6. Adding a JetDirect Printer 26.7. Selecting the Printer Model and Finishing 26.8. Printing a Test Page 26.9. Modifying Existing Printers 26.10. Saving the Configuration File 26.11. Command Line Configuration 26.12. Managing Print Jobs 26.13. Sharing a Printer 26.14. Additional Resources
27. Automated Tasks
27.1. Cron 27.2. At and Batch 27.3. Additional Resources
28. Log Files
28.1. Locating Log Files 28.2. Viewing Log Files 28.3. Adding a Log File 28.4. Examining Log Files
29. Manually Upgrading the Kernel
29.1. Overview of Kernel Packages 29.2. Preparing to Upgrade 29.3. Downloading the Upgraded Kernel 29.4. Performing the Upgrade 29.5. Verifying the Initial RAM Disk Image 29.6. Verifying the Boot Loader
30. Kernel Modules
30.1. Kernel Module Utilities 30.2. Persistent Module Loading 30.3. Additional Resources
31. Mail Transport Agent (MTA) Configuration
VI. System Monitoring
32. Gathering System Information
32.1. System Processes 32.2. Memory Usage 32.3. File Systems 32.4. Hardware 32.5. Additional Resources
33. OProfile
33.1. Overview of Tools 33.2. Configuring OProfile 33.3. Starting and Stopping OProfile 33.4. Saving Data 33.5. Analyzing the Data 33.6. Understanding /dev/oprofile/ 33.7. Example Usage 33.8. Graphical Interface 33.9. Additional Resources
Index Colophon 
  • 0
    点赞
  • 1
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值