Jump To Close Expand all Collapse all Table of contents Deployment Guide Introduction Expand section "Introduction" Collapse section "Introduction" 1. Document Conventions 2. Send in Your Feedback I. File Systems Expand section "I. File Systems" Collapse section "I. File Systems" 1. File System Structure Expand section "1. File System Structure" Collapse section "1. File System Structure" 1.1. Why Share a Common Structure? 1.2. Overview of File System Hierarchy Standard (FHS) Expand section "1.2. Overview of File System Hierarchy Standard (FHS)" Collapse section "1.2. Overview of File System Hierarchy Standard (FHS)" 1.2.1. FHS Organization Expand section "1.2.1. FHS Organization" Collapse section "1.2.1. FHS Organization" 1.2.1.1. The /boot/ Directory 1.2.1.2. The /dev/ Directory 1.2.1.3. The /etc/ Directory 1.2.1.4. The /lib/ Directory 1.2.1.5. The /media/ Directory 1.2.1.6. The /mnt/ Directory 1.2.1.7. The /opt/ Directory 1.2.1.8. The /proc/ Directory 1.2.1.9. The /sbin/ Directory 1.2.1.10. The /srv/ Directory 1.2.1.11. The /sys/ Directory 1.2.1.12. The /usr/ Directory 1.2.1.13. The /usr/local/ Directory 1.2.1.14. The /var/ Directory 1.3. Special File Locations Under Red Hat Enterprise Linux 2. Using the mount Command Expand section "2. Using the mount Command" Collapse section "2. Using the mount Command" 2.1. Listing Currently Mounted File Systems 2.2. Mounting a File System Expand section "2.2. Mounting a File System" Collapse section "2.2. Mounting a File System" 2.2.1. Specifying the File System Type 2.2.2. Specifying the Mount Options 2.2.3. Sharing Mounts 2.2.4. Moving a Mount Point 2.3. Unmounting a File System 2.4. Additional Resources Expand section "2.4. Additional Resources" Collapse section "2.4. Additional Resources" 2.4.1. Installed Documentation 2.4.2. Useful Websites 3. The ext3 File System Expand section "3. The ext3 File System" Collapse section "3. The ext3 File System" 3.1. Features of ext3 3.2. Creating an ext3 File System 3.3. Converting to an ext3 File System 3.4. Reverting to an ext2 File System 4. The ext4 File System Expand section "4. The ext4 File System" Collapse section "4. The ext4 File System" 4.1. Features of ext4 4.2. Managing an ext4 File System 4.3. Creating an ext4 File System 4.4. Mounting an ext4 File System 4.5. Resizing an ext4 File System 5. The proc File System Expand section "5. The proc File System" Collapse section "5. The proc File System" 5.1. A Virtual File System Expand section "5.1. A Virtual File System" Collapse section "5.1. A Virtual File System" 5.1.1. Viewing Virtual Files 5.1.2. Changing Virtual Files 5.1.3. Restricting Access to Process Directories 5.2. Top-level Files within the proc File System Expand section "5.2. Top-level Files within the proc File System" Collapse section "5.2. Top-level Files within the proc File System" 5.2.1. /proc/apm 5.2.2. /proc/buddyinfo 5.2.3. /proc/cmdline 5.2.4. /proc/cpuinfo 5.2.5. /proc/crypto 5.2.6. /proc/devices 5.2.7. /proc/dma 5.2.8. /proc/execdomains 5.2.9. /proc/fb 5.2.10. /proc/filesystems 5.2.11. /proc/interrupts 5.2.12. /proc/iomem 5.2.13. /proc/ioports 5.2.14. /proc/kcore 5.2.15. /proc/kmsg 5.2.16. /proc/loadavg 5.2.17. /proc/locks 5.2.18. /proc/mdstat 5.2.19. /proc/meminfo 5.2.20. /proc/misc 5.2.21. /proc/modules 5.2.22. /proc/mounts 5.2.23. /proc/mtrr 5.2.24. /proc/partitions 5.2.25. /proc/pci 5.2.26. /proc/slabinfo 5.2.27. /proc/stat 5.2.28. /proc/swaps 5.2.29. /proc/sysrq-trigger 5.2.30. /proc/uptime 5.2.31. /proc/version 5.3. Directories within /proc/ Expand section "5.3. Directories within /proc/ " Collapse section "5.3. Directories within /proc/ " 5.3.1. Process Directories Expand section "5.3.1. Process Directories" Collapse section "5.3.1. Process Directories" 5.3.1.1. /proc/self/ 5.3.2. /proc/bus/ 5.3.3. /proc/driver/ 5.3.4. /proc/fs 5.3.5. /proc/ide/ Expand section "5.3.5. /proc/ide/ " Collapse section "5.3.5. /proc/ide/ " 5.3.5.1. Device Directories 5.3.6. /proc/irq/ 5.3.7. /proc/net/ 5.3.8. /proc/scsi/ 5.3.9. /proc/sys/ Expand section "5.3.9. /proc/sys/ " Collapse section "5.3.9. /proc/sys/ " 5.3.9.1. /proc/sys/dev/ 5.3.9.2. /proc/sys/fs/ 5.3.9.3. /proc/sys/kernel/ 5.3.9.4. /proc/sys/net/ 5.3.9.5. /proc/sys/vm/ 5.3.10. /proc/sysvipc/ 5.3.11. /proc/tty/ 5.3.12. /proc/<PID>/ 5.4. Using the sysctl Command 5.5. Additional Resources Expand section "5.5. Additional Resources" Collapse section "5.5. Additional Resources" 5.5.1. Installed Documentation 5.5.2. Useful Websites 6. Redundant Array of Independent Disks (RAID) Expand section "6. Redundant Array of Independent Disks (RAID)" Collapse section "6. Redundant Array of Independent Disks (RAID)" 6.1. What is RAID? Expand section "6.1. What is RAID?" Collapse section "6.1. What is RAID?" 6.1.1. Who Should Use RAID? 6.1.2. Hardware RAID versus Software RAID 6.1.3. RAID Levels and Linear Support 6.2. Configuring Software RAID Expand section "6.2. Configuring Software RAID" Collapse section "6.2. Configuring Software RAID" 6.2.1. Creating the RAID Partitions 6.2.2. Creating the RAID Devices and Mount Points 6.3. Managing Software RAID Expand section "6.3. Managing Software RAID" Collapse section "6.3. Managing Software RAID" 6.3.1. Reviewing RAID Configuration 6.3.2. Creating a New RAID Device 6.3.3. Replacing a Faulty Device 6.3.4. Extending a RAID Device 6.3.5. Removing a RAID Device 6.3.6. Preserving the Configuration 6.4. Additional Resources Expand section "6.4. Additional Resources" Collapse section "6.4. Additional Resources" 6.4.1. Installed Documentation 7. Swap Space Expand section "7. Swap Space" Collapse section "7. Swap Space" 7.1. What is Swap Space? 7.2. Adding Swap Space Expand section "7.2. Adding Swap Space" Collapse section "7.2. Adding Swap Space" 7.2.1. Extending Swap on an LVM2 Logical Volume 7.2.2. Creating an LVM2 Logical Volume for Swap 7.2.3. Creating a Swap File 7.3. Removing Swap Space Expand section "7.3. Removing Swap Space" Collapse section "7.3. Removing Swap Space" 7.3.1. Reducing Swap on an LVM2 Logical Volume 7.3.2. Removing an LVM2 Logical Volume for Swap 7.3.3. Removing a Swap File 7.4. Moving Swap Space 8. Managing Disk Storage Expand section "8. Managing Disk Storage" Collapse section "8. Managing Disk Storage" 8.1. Standard Partitions using parted Expand section "8.1. Standard Partitions using parted" Collapse section "8.1. Standard Partitions using parted" 8.1.1. Viewing the Partition Table 8.1.2. Creating a Partition Expand section "8.1.2. Creating a Partition" Collapse section "8.1.2. Creating a Partition" 8.1.2.1. Making the Partition 8.1.2.2. Formatting the Partition 8.1.2.3. Labeling the Partition 8.1.2.4. Creating the Mount Point 8.1.2.5. Add to /etc/fstab 8.1.3. Removing a Partition 8.1.4. Resizing a Partition 8.2. LVM Partition Management 9. Implementing Disk Quotas Expand section "9. Implementing Disk Quotas" Collapse section "9. Implementing Disk Quotas" 9.1. Configuring Disk Quotas Expand section "9.1. Configuring Disk Quotas" Collapse section "9.1. Configuring Disk Quotas" 9.1.1. Enabling Quotas 9.1.2. Remounting the File Systems 9.1.3. Creating the Quota Database Files 9.1.4. Assigning Quotas per User 9.1.5. Assigning Quotas per Group 9.1.6. Setting the Grace Period for Soft Limits 9.2. Managing Disk Quotas Expand section "9.2. Managing Disk Quotas" Collapse section "9.2. Managing Disk Quotas" 9.2.1. Enabling and Disabling 9.2.2. Reporting on Disk Quotas 9.2.3. Keeping Quotas Accurate 9.3. Additional Resources Expand section "9.3. Additional Resources" Collapse section "9.3. Additional Resources" 9.3.1. Installed Documentation 9.3.2. Related Books 10. Access Control Lists Expand section "10. Access Control Lists" Collapse section "10. Access Control Lists" 10.1. Mounting File Systems Expand section "10.1. Mounting File Systems" Collapse section "10.1. Mounting File Systems" 10.1.1. NFS 10.2. Setting Access ACLs 10.3. Setting Default ACLs 10.4. Retrieving ACLs 10.5. Archiving File Systems With ACLs 10.6. Compatibility with Older Systems 10.7. Additional Resources Expand section "10.7. Additional Resources" Collapse section "10.7. Additional Resources" 10.7.1. Installed Documentation 10.7.2. Useful Websites 11. LVM (Logical Volume Manager) Expand section "11. LVM (Logical Volume Manager)" Collapse section "11. LVM (Logical Volume Manager)" 11.1. What is LVM? Expand section "11.1. What is LVM?" Collapse section "11.1. What is LVM?" 11.1.1. What is LVM2? 11.2. LVM Configuration 11.3. Automatic Partitioning 11.4. Manual LVM Partitioning Expand section "11.4. Manual LVM Partitioning" Collapse section "11.4. Manual LVM Partitioning" 11.4.1. Creating the /boot Partition 11.4.2. Creating the LVM Physical Volumes 11.4.3. Creating the LVM Volume Groups 11.4.4. Creating the LVM Logical Volumes 11.5. Using the LVM utility system-config-lvm Expand section "11.5. Using the LVM utility system-config-lvm" Collapse section "11.5. Using the LVM utility system-config-lvm" 11.5.1. Utilizing uninitialized entities 11.5.2. Adding Unallocated Volumes to a volume group 11.5.3. Migrating extents 11.5.4. Adding a new hard disk using LVM 11.5.5. Adding a new volume group 11.5.6. Extending a volume group 11.5.7. Editing a Logical Volume 11.6. Additional Resources Expand section "11.6. Additional Resources" Collapse section "11.6. Additional Resources" 11.6.1. Installed Documentation 11.6.2. Useful Websites II. Package Management Expand section "II. Package Management" Collapse section "II. Package Management" 12. Package Management with RPM Expand section "12. Package Management with RPM" Collapse section "12. Package Management with RPM" 12.1. RPM Design Goals 12.2. Using RPM Expand section "12.2. Using RPM" Collapse section "12.2. Using RPM" 12.2.1. Finding RPM Packages 12.2.2. Installing Expand section "12.2.2. Installing" Collapse section "12.2.2. Installing" 12.2.2.1. Package Already Installed 12.2.2.2. Conflicting Files 12.2.2.3. Unresolved Dependency 12.2.3. Uninstalling 12.2.4. Upgrading 12.2.5. Freshening 12.2.6. Querying 12.2.7. Verifying 12.3. Checking a Package's Signature Expand section "12.3. Checking a Package's Signature" Collapse section "12.3. Checking a Package's Signature" 12.3.1. Importing Keys 12.3.2. Verifying Signature of Packages 12.4. Practical and Common Examples of RPM Usage 12.5. Additional Resources Expand section "12.5. Additional Resources" Collapse section "12.5. Additional Resources" 12.5.1. Installed Documentation 12.5.2. Useful Websites 12.5.3. Related Books 13. Package Management Tool Expand section "13. Package Management Tool" Collapse section "13. Package Management Tool" 13.1. Listing and Analyzing Packages 13.2. Installing and Removing Packages 14. YUM (Yellowdog Updater Modified) Expand section "14. YUM (Yellowdog Updater Modified)" Collapse section "14. YUM (Yellowdog Updater Modified)" 14.1. Setting Up a Yum Repository 14.2. yum Commands 14.3. yum Options 14.4. Configuring yum Expand section "14.4. Configuring yum " Collapse section "14.4. Configuring yum " 14.4.1. [main] Options 14.4.2. [repository] Options 14.5. Upgrading the System Off-line with ISO and Yum 14.6. Useful yum Variables 15. Registering a System and Managing Subscriptions Expand section "15. Registering a System and Managing Subscriptions" Collapse section "15. Registering a System and Managing Subscriptions" 15.1. Using Red Hat Subscription Manager Tools Expand section "15.1. Using Red Hat Subscription Manager Tools" Collapse section "15.1. Using Red Hat Subscription Manager Tools" 15.1.1. Launching the Red Hat Subscription Manager GUI 15.1.2. Running the subscription-manager Command-Line Tool 15.2. Registering and Unregistering a System Expand section "15.2. Registering and Unregistering a System" Collapse section "15.2. Registering and Unregistering a System" 15.2.1. Registering from the GUI 15.2.2. Registering from the Command Line 15.2.3. Unregistering 15.3. Attaching and Removing Subscriptions Expand section "15.3. Attaching and Removing Subscriptions" Collapse section "15.3. Attaching and Removing Subscriptions" 15.3.1. Attaching and Removing Subscriptions through the GUI Expand section "15.3.1. Attaching and Removing Subscriptions through the GUI" Collapse section "15.3.1. Attaching and Removing Subscriptions through the GUI" 15.3.1.1. Attaching a Subscription 15.3.1.2. Removing Subscriptions 15.3.2. Attaching and Removing Subscriptions through the Command Line Expand section "15.3.2. Attaching and Removing Subscriptions through the Command Line" Collapse section "15.3.2. Attaching and Removing Subscriptions through the Command Line" 15.3.2.1. Attaching Subscriptions 15.3.2.2. Removing Subscriptions from the Command Line 15.4. Redeeming Vendor Subscriptions Expand section "15.4. Redeeming Vendor Subscriptions" Collapse section "15.4. Redeeming Vendor Subscriptions" 15.4.1. Redeeming Subscriptions through the GUI 15.4.2. Redeeming Subscriptions through the Command Line 15.5. Attaching Subscriptions from a Subscription Asset Manager Activation Key 15.6. Setting Preferences for Systems Expand section "15.6. Setting Preferences for Systems" Collapse section "15.6. Setting Preferences for Systems" 15.6.1. Setting Preferences in the UI 15.6.2. Setting Service Levels Through the Command Line 15.6.3. Setting a Preferred Operating System Release Version in the Command Line 15.6.4. Removing a Preference 15.7. Managing Subscription Expiration and Notifications III. Network-Related Configuration Expand section "III. Network-Related Configuration" Collapse section "III. Network-Related Configuration" 16. Network Interfaces Expand section "16. Network Interfaces" Collapse section "16. Network Interfaces" 16.1. Network Configuration Files 16.2. Interface Configuration Files Expand section "16.2. Interface Configuration Files" Collapse section "16.2. Interface Configuration Files" 16.2.1. Ethernet Interfaces 16.2.2. IPsec Interfaces 16.2.3. Channel Bonding Interfaces 16.2.4. Alias and Clone Files 16.2.5. Dialup Interfaces 16.2.6. Other Interfaces 16.3. Interface Control Scripts 16.4. Static Routes and the Default Gateway 16.5. Configuring Static Routes in ifcfg files Expand section "16.5. Configuring Static Routes in ifcfg files" Collapse section "16.5. Configuring Static Routes in ifcfg files" 16.5.1. Static Routes Using the IP Command Arguments Format 16.5.2. Network/Netmask Directives Format 16.6. Network Function Files 16.7. Additional Resources Expand section "16.7. Additional Resources" Collapse section "16.7. Additional Resources" 16.7.1. Installed Documentation 17. Network Configuration Expand section "17. Network Configuration" Collapse section "17. Network Configuration" 17.1. Overview 17.2. Establishing an Ethernet Connection 17.3. Establishing an ISDN Connection 17.4. Establishing a Modem Connection 17.5. Establishing an xDSL Connection 17.6. Establishing a Token Ring Connection 17.7. Establishing a Wireless Connection 17.8. Managing DNS Settings 17.9. Managing Hosts 17.10. Working with Profiles 17.11. Device Aliases 17.12. Saving and Restoring the Network Configuration 18. Controlling Access to Services Expand section "18. Controlling Access to Services" Collapse section "18. Controlling Access to Services" 18.1. Runlevels 18.2. TCP Wrappers Expand section "18.2. TCP Wrappers" Collapse section "18.2. TCP Wrappers" 18.2.1. xinetd 18.3. Services Configuration Tool 18.4. ntsysv 18.5. chkconfig 18.6. Additional Resources Expand section "18.6. Additional Resources" Collapse section "18.6. Additional Resources" 18.6.1. Installed Documentation 18.6.2. Useful Websites 19. Berkeley Internet Name Domain (BIND) Expand section "19. Berkeley Internet Name Domain (BIND)" Collapse section "19. Berkeley Internet Name Domain (BIND)" 19.1. Introduction to DNS Expand section "19.1. Introduction to DNS" Collapse section "19.1. Introduction to DNS" 19.1.1. Nameserver Zones 19.1.2. Nameserver Types 19.1.3. BIND as a Nameserver 19.2. /etc/named.conf Expand section "19.2. /etc/named.conf " Collapse section "19.2. /etc/named.conf " 19.2.1. Common Statement Types Expand section "19.2.1. Common Statement Types" Collapse section "19.2.1. Common Statement Types" 19.2.1.1. acl Statement 19.2.1.2. include Statement 19.2.1.3. options Statement 19.2.1.4. zone Statement 19.2.1.5. Sample zone Statements 19.2.2. Other Statement Types 19.2.3. Comment Tags 19.3. Zone Files Expand section "19.3. Zone Files" Collapse section "19.3. Zone Files" 19.3.1. Zone File Directives 19.3.2. Zone File Resource Records 19.3.3. Example Zone File 19.3.4. Reverse Name Resolution Zone Files 19.4. Using rndc Expand section "19.4. Using rndc " Collapse section "19.4. Using rndc " 19.4.1. Configuring /etc/named.conf Expand section "19.4.1. Configuring /etc/named.conf " Collapse section "19.4.1. Configuring /etc/named.conf " 19.4.1.1. Firewall Blocking Communication 19.4.2. Configuring /etc/rndc.conf 19.4.3. Command Line Options 19.5. Advanced Features of BIND Expand section "19.5. Advanced Features of BIND" Collapse section "19.5. Advanced Features of BIND" 19.5.1. DNS Protocol Enhancements 19.5.2. Multiple Views 19.5.3. Security 19.5.4. IP version 6 19.6. Common Mistakes to Avoid 19.7. Additional Resources Expand section "19.7. Additional Resources" Collapse section "19.7. Additional Resources" 19.7.1. Installed Documentation 19.7.2. Useful Websites 19.7.3. Related Books 20. OpenSSH Expand section "20. OpenSSH" Collapse section "20. OpenSSH" 20.1. Features of SSH Expand section "20.1. Features of SSH" Collapse section "20.1. Features of SSH" 20.1.1. Why Use SSH? 20.2. SSH Protocol Versions 20.3. Event Sequence of an SSH Connection Expand section "20.3. Event Sequence of an SSH Connection" Collapse section "20.3. Event Sequence of an SSH Connection" 20.3.1. Transport Layer 20.3.2. Authentication 20.3.3. Channels 20.4. Configuring an OpenSSH Server Expand section "20.4. Configuring an OpenSSH Server" Collapse section "20.4. Configuring an OpenSSH Server" 20.4.1. Requiring SSH for Remote Connections 20.5. OpenSSH Configuration Files 20.6. Configuring an OpenSSH Client Expand section "20.6. Configuring an OpenSSH Client" Collapse section "20.6. Configuring an OpenSSH Client" 20.6.1. Using the ssh Command 20.6.2. Using the scp Command 20.6.3. Using the sftp Command 20.7. More Than a Secure Shell Expand section "20.7. More Than a Secure Shell" Collapse section "20.7. More Than a Secure Shell" 20.7.1. X11 Forwarding 20.7.2. Port Forwarding 20.7.3. Generating Key Pairs Expand section "20.7.3. Generating Key Pairs" Collapse section "20.7.3. Generating Key Pairs" 20.7.3.1. Generating an RSA Key Pair for Version 2 20.7.3.2. Generating a DSA Key Pair for Version 2 20.7.3.3. Generating an RSA Key Pair for Version 1.3 and 1.5 20.7.3.4. Configuring ssh-agent with a GUI 20.7.3.5. Configuring ssh-agent 20.8. Additional Resources Expand section "20.8. Additional Resources" Collapse section "20.8. Additional Resources" 20.8.1. Installed Documentation 20.8.2. Useful Websites 21. Network File System (NFS) Expand section "21. Network File System (NFS)" Collapse section "21. Network File System (NFS)" 21.1. How It Works Expand section "21.1. How It Works" Collapse section "21.1. How It Works" 21.1.1. Required Services 21.2. NFS Client Configuration Expand section "21.2. NFS Client Configuration" Collapse section "21.2. NFS Client Configuration" 21.2.1. Mounting NFS File Systems using /etc/fstab 21.3. autofs Expand section "21.3. autofs" Collapse section "21.3. autofs" 21.3.1. What's new in autofs version 5? 21.3.2. autofs Configuration 21.3.3. autofs Common Tasks Expand section "21.3.3. autofs Common Tasks" Collapse section "21.3.3. autofs Common Tasks" 21.3.3.1. Overriding or augmenting site configuration files 21.3.3.2. Using LDAP to Store Automounter Maps 21.3.3.3. Adapting Autofs v4 Maps To Autofs v5 21.4. Common NFS Mount Options 21.5. Starting and Stopping NFS 21.6. NFS Server Configuration Expand section "21.6. NFS Server Configuration" Collapse section "21.6. NFS Server Configuration" 21.6.1. Exporting or Sharing NFS File Systems 21.6.2. Command Line Configuration 21.6.3. Running NFS Behind a Firewall 21.6.4. Hostname Formats 21.7. The /etc/exports Configuration File Expand section "21.7. The /etc/exports Configuration File" Collapse section "21.7. The /etc/exports Configuration File" 21.7.1. The exportfs Command Expand section "21.7.1. The exportfs Command" Collapse section "21.7.1. The exportfs Command" 21.7.1.1. Using exportfs with NFSv4 21.8. Securing NFS Expand section "21.8. Securing NFS" Collapse section "21.8. Securing NFS" 21.8.1. Host Access Expand section "21.8.1. Host Access" Collapse section "21.8.1. Host Access" 21.8.1.1. Using NFSv2 or NFSv3 21.8.1.2. Using NFSv4 21.8.2. File Permissions 21.9. NFS and portmap Expand section "21.9. NFS and portmap" Collapse section "21.9. NFS and portmap" 21.9.1. Troubleshooting NFS and portmap 21.10. Using NFS over TCP 21.11. Additional Resources Expand section "21.11. Additional Resources" Collapse section "21.11. Additional Resources" 21.11.1. Installed Documentation 21.11.2. Useful Websites 21.11.3. Related Books 22. Samba Expand section "22. Samba" Collapse section "22. Samba" 22.1. Introduction to Samba Expand section "22.1. Introduction to Samba" Collapse section "22.1. Introduction to Samba" 22.1.1. Samba Features 22.2. Samba Daemons and Related Services Expand section "22.2. Samba Daemons and Related Services" Collapse section "22.2. Samba Daemons and Related Services" 22.2.1. Samba Daemons 22.3. Connecting to a Samba Share Expand section "22.3. Connecting to a Samba Share" Collapse section "22.3. Connecting to a Samba Share" 22.3.1. Command Line 22.3.2. Mounting the Share 22.4. Configuring a Samba Server Expand section "22.4. Configuring a Samba Server" Collapse section "22.4. Configuring a Samba Server" 22.4.1. Graphical Configuration Expand section "22.4.1. Graphical Configuration" Collapse section "22.4.1. Graphical Configuration" 22.4.1.1. Configuring Server Settings 22.4.1.2. Managing Samba Users 22.4.1.3. Adding a Share 22.4.2. Command Line Configuration 22.4.3. Encrypted Passwords 22.5. Starting and Stopping Samba 22.6. Samba Server Types and the smb.conf File Expand section "22.6. Samba Server Types and the smb.conf File" Collapse section "22.6. Samba Server Types and the smb.conf File" 22.6.1. Stand-alone Server Expand section "22.6.1. Stand-alone Server" Collapse section "22.6.1. Stand-alone Server" 22.6.1.1. Anonymous Read-Only 22.6.1.2. Anonymous Read/Write 22.6.1.3. Anonymous Print Server 22.6.1.4. Secure Read/Write File and Print Server 22.6.2. Domain Member Server Expand section "22.6.2. Domain Member Server" Collapse section "22.6.2. Domain Member Server" 22.6.2.1. Active Directory Domain Member Server 22.6.2.2. Windows NT4-based Domain Member Server 22.6.3. Domain Controller Expand section "22.6.3. Domain Controller" Collapse section "22.6.3. Domain Controller" 22.6.3.1. Primary Domain Controller (PDC) using tdbsam 22.6.3.2. Primary Domain Controller (PDC) with Active Directory 22.7. Samba Security Modes Expand section "22.7. Samba Security Modes" Collapse section "22.7. Samba Security Modes" 22.7.1. User-Level Security Expand section "22.7.1. User-Level Security" Collapse section "22.7.1. User-Level Security" 22.7.1.1. Domain Security Mode (User-Level Security) 22.7.1.2. Active Directory Security Mode (User-Level Security) 22.7.1.3. Server Security Mode (User-Level Security) 22.7.2. Share-Level Security 22.8. Samba Account Information Databases 22.9. Samba Network Browsing Expand section "22.9. Samba Network Browsing" Collapse section "22.9. Samba Network Browsing" 22.9.1. Domain Browsing 22.9.2. WINS (Windows Internetworking Name Server) 22.10. Samba with CUPS Printing Support Expand section "22.10. Samba with CUPS Printing Support" Collapse section "22.10. Samba with CUPS Printing Support" 22.10.1. Simple smb.conf Settings 22.11. Samba Distribution Programs 22.12. Additional Resources Expand section "22.12. Additional Resources" Collapse section "22.12. Additional Resources" 22.12.1. Installed Documentation 22.12.2. Related Books 22.12.3. Useful Websites 23. Dynamic Host Configuration Protocol (DHCP) Expand section "23. Dynamic Host Configuration Protocol (DHCP)" Collapse section "23. Dynamic Host Configuration Protocol (DHCP)" 23.1. Why Use DHCP? 23.2. Configuring a DHCP Server Expand section "23.2. Configuring a DHCP Server" Collapse section "23.2. Configuring a DHCP Server" 23.2.1. Configuration File 23.2.2. Lease Database 23.2.3. Starting and Stopping the Server 23.2.4. DHCP Relay Agent 23.3. Configuring a DHCP Client 23.4. Configuring a Multihomed DHCP Server Expand section "23.4. Configuring a Multihomed DHCP Server" Collapse section "23.4. Configuring a Multihomed DHCP Server" 23.4.1. Host Configuration 23.5. Additional Resources Expand section "23.5. Additional Resources" Collapse section "23.5. Additional Resources" 23.5.1. Installed Documentation 24. Migrating from MySQL 5.0 to MySQL 5.5 Expand section "24. Migrating from MySQL 5.0 to MySQL 5.5" Collapse section "24. Migrating from MySQL 5.0 to MySQL 5.5" 24.1. Upgrading from MySQL 5.0 to MySQL 5.5 25. Apache HTTP Server Expand section "25. Apache HTTP Server" Collapse section "25. Apache HTTP Server" 25.1. Apache HTTP Server 2.2 Expand section "25.1. Apache HTTP Server 2.2" Collapse section "25.1. Apache HTTP Server 2.2" 25.1.1. Features of Apache HTTP Server 2.2 25.2. Migrating Apache HTTP Server Configuration Files Expand section "25.2. Migrating Apache HTTP Server Configuration Files" Collapse section "25.2. Migrating Apache HTTP Server Configuration Files" 25.2.1. Migrating Apache HTTP Server 2.0 Configuration Files 25.2.2. Migrating Apache HTTP Server 1.3 Configuration Files to 2.0 Expand section "25.2.2. Migrating Apache HTTP Server 1.3 Configuration Files to 2.0" Collapse section "25.2.2. Migrating Apache HTTP Server 1.3 Configuration Files to 2.0" 25.2.2.1. Global Environment Configuration Expand section "25.2.2.1. Global Environment Configuration" Collapse section "25.2.2.1. Global Environment Configuration" 25.2.2.1.1. Interface and Port Binding 25.2.2.1.2. Server-Pool Size Regulation 25.2.2.1.3. Dynamic Shared Object (DSO) Support 25.2.2.1.4. Other Global Environment Changes 25.2.2.2. Main Server Configuration Expand section "25.2.2.2. Main Server Configuration" Collapse section "25.2.2.2. Main Server Configuration" 25.2.2.2.1. UserDir Mapping 25.2.2.2.2. Logging 25.2.2.2.3. Directory Indexing 25.2.2.2.4. Content Negotiation 25.2.2.2.5. Error Documents 25.2.2.3. Virtual Host Configuration 25.2.2.4. Modules and Apache HTTP Server 2.0 Expand section "25.2.2.4. Modules and Apache HTTP Server 2.0" Collapse section "25.2.2.4. Modules and Apache HTTP Server 2.0" 25.2.2.4.1. The suexec Module 25.2.2.4.2. The mod_ssl Module 25.2.2.4.3. The mod_proxy Module 25.2.2.4.4. The mod_include Module 25.2.2.4.5. The mod_auth_dbm and mod_auth_db Modules 25.2.2.4.6. The mod_perl Module 25.2.2.4.7. The mod_python Module 25.2.2.4.8. PHP 25.2.2.4.9. The mod_authz_ldap Module 25.3. Starting and Stopping httpd 25.4. Apache HTTP Server Configuration Expand section "25.4. Apache HTTP Server Configuration" Collapse section "25.4. Apache HTTP Server Configuration" 25.4.1. Basic Settings 25.4.2. Default Settings Expand section "25.4.2. Default Settings" Collapse section "25.4.2. Default Settings" 25.4.2.1. Site Configuration 25.4.2.2. SSL Support 25.4.2.3. Logging 25.4.2.4. Environment Variables 25.4.2.5. Directories 25.5. Configuration Directives in httpd.conf Expand section "25.5. Configuration Directives in httpd.conf" Collapse section "25.5. Configuration Directives in httpd.conf" 25.5.1. General Configuration Tips 25.5.2. Configuration Directives for SSL 25.5.3. MPM Specific Server-Pool Directives 25.6. Adding Modules 25.7. Virtual Hosts Expand section "25.7. Virtual Hosts" Collapse section "25.7. Virtual Hosts" 25.7.1. Setting Up Virtual Hosts 25.8. Apache HTTP Secure Server Configuration Expand section "25.8. Apache HTTP Secure Server Configuration" Collapse section "25.8. Apache HTTP Secure Server Configuration" 25.8.1. An Overview of Security-Related Packages 25.8.2. An Overview of Certificates and Security 25.8.3. Using Pre-Existing Keys and Certificates 25.8.4. Types of Certificates 25.8.5. Generating a Key 25.8.6. How to configure the server to use the new key 25.9. Additional Resources Expand section "25.9. Additional Resources" Collapse section "25.9. Additional Resources" 25.9.1. Useful Websites 26. FTP Expand section "26. FTP" Collapse section "26. FTP" 26.1. The File Transfer Protocol Expand section "26.1. The File Transfer Protocol" Collapse section "26.1. The File Transfer Protocol" 26.1.1. Multiple Ports, Multiple Modes 26.2. FTP Servers Expand section "26.2. FTP Servers" Collapse section "26.2. FTP Servers" 26.2.1. vsftpd 26.2.2. Files Installed with vsftpd 26.2.3. Starting and Stopping vsftpd Expand section "26.2.3. Starting and Stopping vsftpd" Collapse section "26.2.3. Starting and Stopping vsftpd" 26.2.3.1. Starting Multiple Copies of vsftpd 26.2.4. Encrypting vsftpd Connections Using TLS 26.2.5. vsftpd Configuration Options Expand section "26.2.5. vsftpd Configuration Options" Collapse section "26.2.5. vsftpd Configuration Options" 26.2.5.1. Daemon Options 26.2.5.2. Log In Options and Access Controls 26.2.5.3. Anonymous User Options 26.2.5.4. Local User Options 26.2.5.5. Directory Options 26.2.5.6. File Transfer Options 26.2.5.7. Logging Options 26.2.5.8. Network Options 26.2.6. Additional Resources Expand section "26.2.6. Additional Resources" Collapse section "26.2.6. Additional Resources" 26.2.6.1. Installed Documentation 26.2.6.2. Useful Websites 27. Email Expand section "27. Email" Collapse section "27. Email" 27.1. Email Protocols Expand section "27.1. Email Protocols" Collapse section "27.1. Email Protocols" 27.1.1. Mail Transport Protocols Expand section "27.1.1. Mail Transport Protocols" Collapse section "27.1.1. Mail Transport Protocols" 27.1.1.1. SMTP 27.1.2. Mail Access Protocols Expand section "27.1.2. Mail Access Protocols" Collapse section "27.1.2. Mail Access Protocols" 27.1.2.1. POP 27.1.2.2. IMAP 27.1.2.3. Dovecot 27.2. Email Program Classifications Expand section "27.2. Email Program Classifications" Collapse section "27.2. Email Program Classifications" 27.2.1. Mail Transport Agent 27.2.2. Mail Delivery Agent 27.2.3. Mail User Agent 27.3. Mail Transport Agents Expand section "27.3. Mail Transport Agents" Collapse section "27.3. Mail Transport Agents" 27.3.1. Sendmail Expand section "27.3.1. Sendmail" Collapse section "27.3.1. Sendmail" 27.3.1.1. Purpose and Limitations 27.3.1.2. The Default Sendmail Installation 27.3.1.3. Common Sendmail Configuration Changes 27.3.1.4. Masquerading 27.3.1.5. Stopping Spam 27.3.1.6. Using Sendmail with LDAP 27.3.2. Postfix Expand section "27.3.2. Postfix" Collapse section "27.3.2. Postfix" 27.3.2.1. The Default Postfix Installation 27.3.2.2. Basic Postfix Configuration 27.3.3. Fetchmail Expand section "27.3.3. Fetchmail" Collapse section "27.3.3. Fetchmail" 27.3.3.1. Fetchmail Configuration Options 27.3.3.2. Global Options 27.3.3.3. Server Options 27.3.3.4. User Options 27.3.3.5. Fetchmail Command Options 27.3.3.6. Informational or Debugging Options 27.3.3.7. Special Options 27.4. Mail Transport Agent (MTA) Configuration 27.5. Mail Delivery Agents Expand section "27.5. Mail Delivery Agents" Collapse section "27.5. Mail Delivery Agents" 27.5.1. Procmail Configuration 27.5.2. Procmail Recipes Expand section "27.5.2. Procmail Recipes" Collapse section "27.5.2. Procmail Recipes" 27.5.2.1. Delivering vs. Non-Delivering Recipes 27.5.2.2. Flags 27.5.2.3. Specifying a Local Lockfile 27.5.2.4. Special Conditions and Actions 27.5.2.5. Recipe Examples 27.5.2.6. Spam Filters 27.6. Mail User Agents Expand section "27.6. Mail User Agents" Collapse section "27.6. Mail User Agents" 27.6.1. Securing Communication Expand section "27.6.1. Securing Communication" Collapse section "27.6.1. Securing Communication" 27.6.1.1. Secure Email Clients 27.6.1.2. Securing Email Client Communications 27.7. Additional Resources Expand section "27.7. Additional Resources" Collapse section "27.7. Additional Resources" 27.7.1. Installed Documentation 27.7.2. Useful Websites 27.7.3. Related Books 28. Lightweight Directory Access Protocol (LDAP) Expand section "28. Lightweight Directory Access Protocol (LDAP)" Collapse section "28. Lightweight Directory Access Protocol (LDAP)" 28.1. Why Use LDAP? Expand section "28.1. Why Use LDAP?" Collapse section "28.1. Why Use LDAP?" 28.1.1. OpenLDAP Features 28.2. LDAP Terminology 28.3. OpenLDAP Daemons and Utilities Expand section "28.3. OpenLDAP Daemons and Utilities" Collapse section "28.3. OpenLDAP Daemons and Utilities" 28.3.1. NSS, PAM, and LDAP 28.3.2. PHP4, LDAP, and the Apache HTTP Server 28.3.3. LDAP Client Applications 28.4. OpenLDAP Configuration Files 28.5. The /etc/openldap/schema/ Directory 28.6. OpenLDAP Setup Overview Expand section "28.6. OpenLDAP Setup Overview" Collapse section "28.6. OpenLDAP Setup Overview" 28.6.1. Editing /etc/openldap/slapd.conf 28.7. Configuring a System to Authenticate Using OpenLDAP Expand section "28.7. Configuring a System to Authenticate Using OpenLDAP" Collapse section "28.7. Configuring a System to Authenticate Using OpenLDAP" 28.7.1. PAM and LDAP 28.7.2. Migrating Old Authentication Information to LDAP Format 28.8. Migrating Directories from Earlier Releases 28.9. Additional Resources Expand section "28.9. Additional Resources" Collapse section "28.9. Additional Resources" 28.9.1. Installed Documentation 28.9.2. Useful Websites 28.9.3. Related Books 29. Authentication Configuration Expand section "29. Authentication Configuration" Collapse section "29. Authentication Configuration" 29.1. User Information 29.2. Authentication 29.3. Options 29.4. Command Line Version 30. Using and Caching Credentials with SSSD Expand section "30. Using and Caching Credentials with SSSD" Collapse section "30. Using and Caching Credentials with SSSD" 30.1. About the sssd.conf File 30.2. Starting and Stopping SSSD 30.3. Configuring SSSD to Work with System Services Expand section "30.3. Configuring SSSD to Work with System Services" Collapse section "30.3. Configuring SSSD to Work with System Services" 30.3.1. Configuring NSS Services Expand section "30.3.1. Configuring NSS Services" Collapse section "30.3.1. Configuring NSS Services" 30.3.1.1. About NSS Service Maps and SSSD 30.3.1.2. Configuring NSS Services to Use SSSD 30.3.1.3. Configuring SSSD to Work with NSS 30.3.2. Configuring the PAM Service 30.4. Creating Domains Expand section "30.4. Creating Domains" Collapse section "30.4. Creating Domains" 30.4.1. General Rules and Options for Configuring a Domain 30.4.2. Configuring an LDAP Domain Expand section "30.4.2. Configuring an LDAP Domain" Collapse section "30.4.2. Configuring an LDAP Domain" 30.4.2.1. Parameters for Configuring an LDAP Domain 30.4.2.2. LDAP Domain Example 30.4.2.3. Active Directory Domain Example 30.4.2.4. Using IP Addresses in Certificate Subject Names 30.4.3. Configuring Kerberos Authentication with a Domain 30.4.4. Configuring a Proxy Domain 30.5. Configuring Access Control for SSSD Domains Expand section "30.5. Configuring Access Control for SSSD Domains" Collapse section "30.5. Configuring Access Control for SSSD Domains" 30.5.1. Using the Simple Access Provider 30.5.2. Using the LDAP Access Filter 30.6. Configuring Domain Failover Expand section "30.6. Configuring Domain Failover" Collapse section "30.6. Configuring Domain Failover" 30.6.1. Configuring Failover 30.6.2. Using SRV Records with Failover 30.7. Deleting Domain Cache Files 30.8. Using NSCD with SSSD 30.9. Troubleshooting SSSD Expand section "30.9. Troubleshooting SSSD" Collapse section "30.9. Troubleshooting SSSD" 30.9.1. Checking SSSD Log Files 30.9.2. Problems with SSSD Configuration IV. System Configuration Expand section "IV. System Configuration" Collapse section "IV. System Configuration" 31. Console Access Expand section "31. Console Access" Collapse section "31. Console Access" 31.1. Disabling Shutdown Via Ctrl+Alt+Del 31.2. Disabling Console Program Access 31.3. Defining the Console 31.4. Making Files Accessible From the Console 31.5. Enabling Console Access for Other Applications 31.6. The floppy Group 32. The sysconfig Directory Expand section "32. The sysconfig Directory" Collapse section "32. The sysconfig Directory" 32.1. Files in the /etc/sysconfig/ Directory Expand section "32.1. Files in the /etc/sysconfig/ Directory" Collapse section "32.1. Files in the /etc/sysconfig/ Directory" 32.1.1. /etc/sysconfig/amd 32.1.2. /etc/sysconfig/apmd 32.1.3. /etc/sysconfig/arpwatch 32.1.4. /etc/sysconfig/authconfig 32.1.5. /etc/sysconfig/autofs 32.1.6. /etc/sysconfig/clock 32.1.7. /etc/sysconfig/desktop 32.1.8. /etc/sysconfig/dhcpd 32.1.9. /etc/sysconfig/exim 32.1.10. /etc/sysconfig/firstboot 32.1.11. /etc/sysconfig/gpm 32.1.12. /etc/sysconfig/hwconf 32.1.13. /etc/sysconfig/i18n 32.1.14. /etc/sysconfig/init 32.1.15. /etc/sysconfig/ip6tables-config 32.1.16. /etc/sysconfig/iptables-config 32.1.17. /etc/sysconfig/irda 32.1.18. /etc/sysconfig/kernel Expand section "32.1.18. /etc/sysconfig/kernel" Collapse section "32.1.18. /etc/sysconfig/kernel" 32.1.18.1. Keeping an old kernel version as the default 32.1.18.2. Setting a kernel debugger as the default kernel 32.1.19. /etc/sysconfig/keyboard 32.1.20. /etc/sysconfig/kudzu 32.1.21. /etc/sysconfig/named 32.1.22. /etc/sysconfig/network 32.1.23. /etc/sysconfig/nfs 32.1.24. /etc/sysconfig/ntpd 32.1.25. /etc/sysconfig/radvd 32.1.26. /etc/sysconfig/samba 32.1.27. /etc/sysconfig/selinux 32.1.28. /etc/sysconfig/sendmail 32.1.29. /etc/sysconfig/spamassassin 32.1.30. /etc/sysconfig/squid 32.1.31. /etc/sysconfig/system-config-securitylevel 32.1.32. /etc/sysconfig/system-config-selinux 32.1.33. /etc/sysconfig/system-config-users 32.1.34. /etc/sysconfig/system-logviewer 32.1.35. /etc/sysconfig/tux 32.1.36. /etc/sysconfig/vncservers 32.1.37. /etc/sysconfig/xinetd 32.2. Directories in the /etc/sysconfig/ Directory 32.3. Additional Resources Expand section "32.3. Additional Resources" Collapse section "32.3. Additional Resources" 32.3.1. Installed Documentation 33. Date and Time Configuration Expand section "33. Date and Time Configuration" Collapse section "33. Date and Time Configuration" 33.1. Time and Date Properties 33.2. Network Time Protocol (NTP) Properties 33.3. Time Zone Configuration 34. Keyboard Configuration 35. The X Window System Expand section "35. The X Window System" Collapse section "35. The X Window System" 35.1. The X11R7.1 Release 35.2. Desktop Environments and Window Managers Expand section "35.2. Desktop Environments and Window Managers" Collapse section "35.2. Desktop Environments and Window Managers" 35.2.1. Desktop Environments 35.2.2. Window Managers 35.3. X Server Configuration Files Expand section "35.3. X Server Configuration Files" Collapse section "35.3. X Server Configuration Files" 35.3.1. xorg.conf Expand section "35.3.1. xorg.conf" Collapse section "35.3.1. xorg.conf" 35.3.1.1. The Structure 35.3.1.2. ServerFlags 35.3.1.3. ServerLayout 35.3.1.4. Files 35.3.1.5. Module 35.3.1.6. InputDevice 35.3.1.7. Monitor 35.3.1.8. Device 35.3.1.9. Screen 35.3.1.10. DRI 35.4. Fonts Expand section "35.4. Fonts" Collapse section "35.4. Fonts" 35.4.1. Fontconfig Expand section "35.4.1. Fontconfig" Collapse section "35.4.1. Fontconfig" 35.4.1.1. Adding Fonts to Fontconfig 35.4.2. Core X Font System Expand section "35.4.2. Core X Font System" Collapse section "35.4.2. Core X Font System" 35.4.2.1. xfs Configuration 35.4.2.2. Adding Fonts to xfs 35.5. Runlevels and X Expand section "35.5. Runlevels and X" Collapse section "35.5. Runlevels and X" 35.5.1. Runlevel 3 35.5.2. Runlevel 5 35.6. Additional Resources Expand section "35.6. Additional Resources" Collapse section "35.6. Additional Resources" 35.6.1. Installed Documentation 35.6.2. Useful Websites 36. X Window System Configuration Expand section "36. X Window System Configuration" Collapse section "36. X Window System Configuration" 36.1. Display Settings 36.2. Display Hardware Settings 36.3. Dual Head Display Settings 37. Users and Groups Expand section "37. Users and Groups" Collapse section "37. Users and Groups" 37.1. User and Group Configuration Expand section "37.1. User and Group Configuration" Collapse section "37.1. User and Group Configuration" 37.1.1. Adding a New User 37.1.2. Modifying User Properties 37.1.3. Adding a New Group 37.1.4. Modifying Group Properties 37.2. User and Group Management Tools Expand section "37.2. User and Group Management Tools" Collapse section "37.2. User and Group Management Tools" 37.2.1. Command Line Configuration 37.2.2. Adding a User 37.2.3. Adding a Group 37.2.4. Password Aging 37.2.5. Explaining the Process 37.3. Standard Users 37.4. Standard Groups 37.5. User Private Groups Expand section "37.5. User Private Groups" Collapse section "37.5. User Private Groups" 37.5.1. Group Directories 37.6. Shadow Passwords 37.7. Additional Resources Expand section "37.7. Additional Resources" Collapse section "37.7. Additional Resources" 37.7.1. Installed Documentation 38. Printer Configuration Expand section "38. Printer Configuration" Collapse section "38. Printer Configuration" 38.1. Adding a Local Printer 38.2. Adding an IPP Printer 38.3. Adding a Samba (SMB) Printer 38.4. Adding a JetDirect Printer 38.5. Selecting the Printer Model and Finishing Expand section "38.5. Selecting the Printer Model and Finishing" Collapse section "38.5. Selecting the Printer Model and Finishing" 38.5.1. Confirming Printer Configuration 38.6. Printing a Test Page 38.7. Modifying Existing Printers Expand section "38.7. Modifying Existing Printers" Collapse section "38.7. Modifying Existing Printers" 38.7.1. The Settings Tab 38.7.2. The Policies Tab 38.7.3. The Access Control Tab 38.7.4. The Printer and Job OptionsTab 38.8. Managing Print Jobs 38.9. Additional Resources Expand section "38.9. Additional Resources" Collapse section "38.9. Additional Resources" 38.9.1. Installed Documentation 38.9.2. Useful Websites 39. Automated Tasks Expand section "39. Automated Tasks" Collapse section "39. Automated Tasks" 39.1. Cron Expand section "39.1. Cron" Collapse section "39.1. Cron" 39.1.1. Configuring Cron Jobs 39.1.2. Controlling Access to Cron 39.1.3. Starting and Stopping the Service 39.2. At and Batch Expand section "39.2. At and Batch" Collapse section "39.2. At and Batch" 39.2.1. Configuring At Jobs 39.2.2. Configuring Batch Jobs 39.2.3. Viewing Pending Jobs 39.2.4. Additional Command Line Options 39.2.5. Controlling Access to At and Batch 39.2.6. Starting and Stopping the Service 39.3. Additional Resources Expand section "39.3. Additional Resources" Collapse section "39.3. Additional Resources" 39.3.1. Installed Documentation 40. Log Files Expand section "40. Log Files" Collapse section "40. Log Files" 40.1. Locating Log Files 40.2. Viewing Log Files 40.3. Adding a Log File 40.4. Monitoring Log Files V. System Monitoring Expand section "V. System Monitoring" Collapse section "V. System Monitoring" 41. SystemTap Expand section "41. SystemTap" Collapse section "41. SystemTap" 41.1. Introduction 41.2. Implementation 41.3. Using SystemTap Expand section "41.3. Using SystemTap" Collapse section "41.3. Using SystemTap" 41.3.1. Tracing Expand section "41.3.1. Tracing " Collapse section "41.3.1. Tracing " 41.3.1.1. Where to Probe 41.3.1.2. What to Print 42. Gathering System Information Expand section "42. Gathering System Information" Collapse section "42. Gathering System Information" 42.1. System Processes 42.2. Memory Usage 42.3. File Systems 42.4. Hardware 42.5. Additional Resources Expand section "42.5. Additional Resources" Collapse section "42.5. Additional Resources" 42.5.1. Installed Documentation 43. OProfile Expand section "43. OProfile" Collapse section "43. OProfile" 43.1. Overview of Tools 43.2. Configuring OProfile Expand section "43.2. Configuring OProfile" Collapse section "43.2. Configuring OProfile" 43.2.1. Specifying the Kernel 43.2.2. Setting Events to Monitor Expand section "43.2.2. Setting Events to Monitor" Collapse section "43.2.2. Setting Events to Monitor" 43.2.2.1. Sampling Rate 43.2.2.2. Unit Masks 43.2.3. Separating Kernel and User-space Profiles 43.3. Starting and Stopping OProfile 43.4. Saving Data 43.5. Analyzing the Data Expand section "43.5. Analyzing the Data" Collapse section "43.5. Analyzing the Data" 43.5.1. Using opreport 43.5.2. Using opreport on a Single Executable 43.5.3. Getting more detailed output on the modules 43.5.4. Using opannotate 43.6. Understanding /dev/oprofile/ 43.7. Example Usage 43.8. Graphical Interface 43.9. Additional Resources Expand section "43.9. Additional Resources" Collapse section "43.9. Additional Resources" 43.9.1. Installed Docs 43.9.2. Useful Websites VI. Kernel and Driver Configuration Expand section "VI. Kernel and Driver Configuration" Collapse section "VI. Kernel and Driver Configuration" 44. Manually Upgrading the Kernel Expand section "44. Manually Upgrading the Kernel" Collapse section "44. Manually Upgrading the Kernel" 44.1. Overview of Kernel Packages 44.2. Preparing to Upgrade 44.3. Downloading the Upgraded Kernel 44.4. Performing the Upgrade 44.5. Verifying the Initial RAM Disk Image 44.6. Verifying the Boot Loader Expand section "44.6. Verifying the Boot Loader" Collapse section "44.6. Verifying the Boot Loader" 44.6.1. x86 Systems Expand section "44.6.1. x86 Systems" Collapse section "44.6.1. x86 Systems" 44.6.1.1. GRUB 44.6.2. Itanium Systems 44.6.3. IBM S/390 and IBM System z Systems 44.6.4. IBM eServer iSeries Systems 44.6.5. IBM eServer pSeries Systems 45. General Parameters and Modules Expand section "45. General Parameters and Modules" Collapse section "45. General Parameters and Modules" 45.1. Kernel Module Utilities 45.2. Persistent Module Loading 45.3. Specifying Module Parameters 45.4. Storage parameters 45.5. Ethernet Parameters Expand section "45.5. Ethernet Parameters" Collapse section "45.5. Ethernet Parameters" 45.5.1. The Channel Bonding Module Expand section "45.5.1. The Channel Bonding Module" Collapse section "45.5.1. The Channel Bonding Module" 45.5.1.1. bonding Module Directives 45.6. Additional Resources Expand section "45.6. Additional Resources" Collapse section "45.6. Additional Resources" 45.6.1. Installed Documentation 45.6.2. Useful Websites 46. The kdump Crash Recovery Service Expand section "46. The kdump Crash Recovery Service" Collapse section "46. The kdump Crash Recovery Service" 46.1. Installing the kdump Service 46.2. Configuring the kdump Service Expand section "46.2. Configuring the kdump Service" Collapse section "46.2. Configuring the kdump Service" 46.2.1. Configuring kdump at First Boot Expand section "46.2.1. Configuring kdump at First Boot" Collapse section "46.2.1. Configuring kdump at First Boot" 46.2.1.1. Enabling the Service 46.2.1.2. Configuring the Memory Usage 46.2.2. Using the Kernel Dump Configuration Utility Expand section "46.2.2. Using the Kernel Dump Configuration Utility" Collapse section "46.2.2. Using the Kernel Dump Configuration Utility" 46.2.2.1. Enabling the Service 46.2.2.2. Configuring the Memory Usage 46.2.2.3. Configuring the Target Type 46.2.2.4. Configuring the Core Collector 46.2.2.5. Changing the Default Action 46.2.3. Configuring kdump on the Command Line Expand section "46.2.3. Configuring kdump on the Command Line" Collapse section "46.2.3. Configuring kdump on the Command Line" 46.2.3.1. Configuring the Memory Usage 46.2.3.2. Configuring the Target Type 46.2.3.3. Configuring the Core Collector 46.2.3.4. Changing the Default Action 46.2.3.5. Enabling the Service 46.2.4. Testing the Configuration 46.3. Analyzing the Core Dump Expand section "46.3. Analyzing the Core Dump" Collapse section "46.3. Analyzing the Core Dump" 46.3.1. Displaying the Message Buffer 46.3.2. Displaying a Backtrace 46.3.3. Displaying a Process Status 46.3.4. Displaying Virtual Memory Information 46.3.5. Displaying Open Files 46.4. Additional Resources Expand section "46.4. Additional Resources" Collapse section "46.4. Additional Resources" 46.4.1. Installed Documentation 46.4.2. Useful Websites VII. Security And Authentication Expand section "VII. Security And Authentication" Collapse section "VII. Security And Authentication" 47. Security Overview Expand section "47. Security Overview" Collapse section "47. Security Overview" 47.1. Introduction to Security Expand section "47.1. Introduction to Security" Collapse section "47.1. Introduction to Security" 47.1.1. What is Computer Security? Expand section "47.1.1. What is Computer Security?" Collapse section "47.1.1. What is Computer Security?" 47.1.1.1. How did Computer Security Come about? 47.1.1.2. Security Today 47.1.1.3. Standardizing Security 47.1.2. Security Controls Expand section "47.1.2. Security Controls" Collapse section "47.1.2. Security Controls" 47.1.2.1. Physical Controls 47.1.2.2. Technical Controls 47.1.2.3. Administrative Controls 47.1.3. Conclusion 47.2. Vulnerability Assessment Expand section "47.2. Vulnerability Assessment" Collapse section "47.2. Vulnerability Assessment" 47.2.1. Thinking Like the Enemy 47.2.2. Defining Assessment and Testing Expand section "47.2.2. Defining Assessment and Testing" Collapse section "47.2.2. Defining Assessment and Testing" 47.2.2.1. Establishing a Methodology 47.2.3. Evaluating the Tools Expand section "47.2.3. Evaluating the Tools" Collapse section "47.2.3. Evaluating the Tools" 47.2.3.1. Scanning Hosts with Nmap Expand section "47.2.3.1. Scanning Hosts with Nmap" Collapse section "47.2.3.1. Scanning Hosts with Nmap" 47.2.3.1.1. Using Nmap 47.2.3.2. Nessus 47.2.3.3. Nikto 47.2.3.4. VLAD the Scanner 47.2.3.5. Anticipating Your Future Needs 47.3. Attackers and Vulnerabilities Expand section "47.3. Attackers and Vulnerabilities" Collapse section "47.3. Attackers and Vulnerabilities" 47.3.1. A Quick History of Hackers Expand section "47.3.1. A Quick History of Hackers" Collapse section "47.3.1. A Quick History of Hackers" 47.3.1.1. Shades of Gray 47.3.2. Threats to Network Security Expand section "47.3.2. Threats to Network Security" Collapse section "47.3.2. Threats to Network Security" 47.3.2.1. Insecure Architectures Expand section "47.3.2.1. Insecure Architectures" Collapse section "47.3.2.1. Insecure Architectures" 47.3.2.1.1. Broadcast Networks 47.3.2.1.2. Centralized Servers 47.3.3. Threats to Server Security Expand section "47.3.3. Threats to Server Security" Collapse section "47.3.3. Threats to Server Security" 47.3.3.1. Unused Services and Open Ports 47.3.3.2. Unpatched Services 47.3.3.3. Inattentive Administration 47.3.3.4. Inherently Insecure Services 47.3.4. Threats to Workstation and Home PC Security Expand section "47.3.4. Threats to Workstation and Home PC Security" Collapse section "47.3.4. Threats to Workstation and Home PC Security" 47.3.4.1. Bad Passwords 47.3.4.2. Vulnerable Client Applications 47.4. Common Exploits and Attacks 47.5. Security Updates Expand section "47.5. Security Updates" Collapse section "47.5. Security Updates" 47.5.1. Updating Packages Expand section "47.5.1. Updating Packages" Collapse section "47.5.1. Updating Packages" 47.5.1.1. Using Automatic Updates with RHN Classic 47.5.1.2. Using the Red Hat Errata Website 47.5.1.3. Verifying Signed Packages 47.5.1.4. Installing Signed Packages 47.5.1.5. Applying the Changes 48. Securing Your Network Expand section "48. Securing Your Network" Collapse section "48. Securing Your Network" 48.1. Workstation Security Expand section "48.1. Workstation Security" Collapse section "48.1. Workstation Security" 48.1.1. Evaluating Workstation Security 48.1.2. BIOS and Boot Loader Security Expand section "48.1.2. BIOS and Boot Loader Security" Collapse section "48.1.2. BIOS and Boot Loader Security" 48.1.2.1. BIOS Passwords Expand section "48.1.2.1. BIOS Passwords" Collapse section "48.1.2.1. BIOS Passwords" 48.1.2.1.1. Securing Non-x86 Platforms 48.1.2.2. Boot Loader Passwords Expand section "48.1.2.2. Boot Loader Passwords" Collapse section "48.1.2.2. Boot Loader Passwords" 48.1.2.2.1. Password Protecting GRUB 48.1.3. Password Security Expand section "48.1.3. Password Security" Collapse section "48.1.3. Password Security" 48.1.3.1. Creating Strong Passwords Expand section "48.1.3.1. Creating Strong Passwords" Collapse section "48.1.3.1. Creating Strong Passwords" 48.1.3.1.1. Secure Password Creation Methodology 48.1.3.2. Creating User Passwords Within an Organization Expand section "48.1.3.2. Creating User Passwords Within an Organization" Collapse section "48.1.3.2. Creating User Passwords Within an Organization" 48.1.3.2.1. Forcing Strong Passwords 48.1.3.2.2. Password Aging 48.1.4. Administrative Controls Expand section "48.1.4. Administrative Controls" Collapse section "48.1.4. Administrative Controls" 48.1.4.1. Allowing Root Access 48.1.4.2. Disallowing Root Access 48.1.4.3. Limiting Root Access Expand section "48.1.4.3. Limiting Root Access" Collapse section "48.1.4.3. Limiting Root Access" 48.1.4.3.1. The su Command 48.1.4.3.2. The sudo Command 48.1.5. Available Network Services Expand section "48.1.5. Available Network Services" Collapse section "48.1.5. Available Network Services" 48.1.5.1. Risks To Services 48.1.5.2. Identifying and Configuring Services 48.1.5.3. Insecure Services 48.1.6. Personal Firewalls 48.1.7. Security Enhanced Communication Tools 48.2. Server Security Expand section "48.2. Server Security" Collapse section "48.2. Server Security" 48.2.1. Securing Services With TCP Wrappers and xinetd Expand section "48.2.1. Securing Services With TCP Wrappers and xinetd" Collapse section "48.2.1. Securing Services With TCP Wrappers and xinetd" 48.2.1.1. Enhancing Security With TCP Wrappers Expand section "48.2.1.1. Enhancing Security With TCP Wrappers" Collapse section "48.2.1.1. Enhancing Security With TCP Wrappers" 48.2.1.1.1. TCP Wrappers and Connection Banners 48.2.1.1.2. TCP Wrappers and Attack Warnings 48.2.1.1.3. TCP Wrappers and Enhanced Logging 48.2.1.2. Enhancing Security With xinetd Expand section "48.2.1.2. Enhancing Security With xinetd" Collapse section "48.2.1.2. Enhancing Security With xinetd" 48.2.1.2.1. Setting a Trap 48.2.1.2.2. Controlling Server Resources 48.2.2. Securing Portmap Expand section "48.2.2. Securing Portmap" Collapse section "48.2.2. Securing Portmap" 48.2.2.1. Protect portmap With TCP Wrappers 48.2.2.2. Protect portmap With iptables 48.2.3. Securing NIS Expand section "48.2.3. Securing NIS" Collapse section "48.2.3. Securing NIS" 48.2.3.1. Carefully Plan the Network 48.2.3.2. Use a Password-like NIS Domain Name and Hostname 48.2.3.3. Edit the /var/yp/securenets File 48.2.3.4. Assign Static Ports and Use iptables Rules 48.2.3.5. Use Kerberos Authentication 48.2.4. Securing NFS Expand section "48.2.4. Securing NFS" Collapse section "48.2.4. Securing NFS" 48.2.4.1. Carefully Plan the Network 48.2.4.2. Beware of Syntax Errors 48.2.4.3. Do Not Use the no_root_squash Option 48.2.5. Securing the Apache HTTP Server Expand section "48.2.5. Securing the Apache HTTP Server" Collapse section "48.2.5. Securing the Apache HTTP Server" 48.2.5.1. FollowSymLinks 48.2.5.2. The Indexes Directive 48.2.5.3. The UserDir Directive 48.2.5.4. Do Not Remove the IncludesNoExec Directive 48.2.5.5. Restrict Permissions for Executable Directories 48.2.6. Securing FTP Expand section "48.2.6. Securing FTP" Collapse section "48.2.6. Securing FTP" 48.2.6.1. FTP Greeting Banner 48.2.6.2. Anonymous Access Expand section "48.2.6.2. Anonymous Access" Collapse section "48.2.6.2. Anonymous Access" 48.2.6.2.1. Anonymous Upload 48.2.6.3. User Accounts Expand section "48.2.6.3. User Accounts" Collapse section "48.2.6.3. User Accounts" 48.2.6.3.1. Restricting User Accounts 48.2.6.4. Use TCP Wrappers To Control Access 48.2.7. Securing Sendmail Expand section "48.2.7. Securing Sendmail" Collapse section "48.2.7. Securing Sendmail" 48.2.7.1. Limiting a Denial of Service Attack 48.2.7.2. NFS and Sendmail 48.2.7.3. Mail-only Users 48.2.8. Verifying Which Ports Are Listening 48.3. Single Sign-on (SSO) Expand section "48.3. Single Sign-on (SSO)" Collapse section "48.3. Single Sign-on (SSO)" 48.3.1. Introduction Expand section "48.3.1. Introduction" Collapse section "48.3.1. Introduction" 48.3.1.1. Supported Applications 48.3.1.2. Supported Authentication Mechanisms 48.3.1.3. Supported Smart Cards 48.3.1.4. Advantages of Red Hat Enterprise Linux Single Sign-on 48.3.2. Getting Started with your new Smart Card Expand section "48.3.2. Getting Started with your new Smart Card" Collapse section "48.3.2. Getting Started with your new Smart Card" 48.3.2.1. Troubleshooting 48.3.3. How Smart Card Enrollment Works 48.3.4. How Smart Card Login Works 48.3.5. Configuring Firefox to use Kerberos for SSO Expand section "48.3.5. Configuring Firefox to use Kerberos for SSO" Collapse section "48.3.5. Configuring Firefox to use Kerberos for SSO" 48.3.5.1. Troubleshooting 48.4. Pluggable Authentication Modules (PAM) Expand section "48.4. Pluggable Authentication Modules (PAM)" Collapse section "48.4. Pluggable Authentication Modules (PAM)" 48.4.1. Advantages of PAM 48.4.2. PAM Configuration Files Expand section "48.4.2. PAM Configuration Files" Collapse section "48.4.2. PAM Configuration Files" 48.4.2.1. PAM Service Files 48.4.3. PAM Configuration File Format Expand section "48.4.3. PAM Configuration File Format" Collapse section "48.4.3. PAM Configuration File Format" 48.4.3.1. Module Interface Expand section "48.4.3.1. Module Interface" Collapse section "48.4.3.1. Module Interface" 48.4.3.1.1. Stacking Module Interfaces 48.4.3.2. Control Flag 48.4.3.3. Module Name 48.4.3.4. Module Arguments 48.4.4. Sample PAM Configuration Files 48.4.5. Creating PAM Modules 48.4.6. PAM and Administrative Credential Caching Expand section "48.4.6. PAM and Administrative Credential Caching" Collapse section "48.4.6. PAM and Administrative Credential Caching" 48.4.6.1. Removing the Timestamp File 48.4.6.2. Common pam_timestamp Directives 48.4.7. PAM and Device Ownership Expand section "48.4.7. PAM and Device Ownership" Collapse section "48.4.7. PAM and Device Ownership" 48.4.7.1. Device Ownership 48.4.7.2. Application Access 48.4.8. Additional Resources Expand section "48.4.8. Additional Resources" Collapse section "48.4.8. Additional Resources" 48.4.8.1. Installed Documentation 48.4.8.2. Useful Websites 48.5. TCP Wrappers and xinetd Expand section "48.5. TCP Wrappers and xinetd" Collapse section "48.5. TCP Wrappers and xinetd" 48.5.1. TCP Wrappers Expand section "48.5.1. TCP Wrappers" Collapse section "48.5.1. TCP Wrappers" 48.5.1.1. Advantages of TCP Wrappers 48.5.2. TCP Wrappers Configuration Files Expand section "48.5.2. TCP Wrappers Configuration Files" Collapse section "48.5.2. TCP Wrappers Configuration Files" 48.5.2.1. Formatting Access Rules Expand section "48.5.2.1. Formatting Access Rules" Collapse section "48.5.2.1. Formatting Access Rules" 48.5.2.1.1. Wildcards 48.5.2.1.2. Patterns 48.5.2.1.3. Portmap and TCP Wrappers 48.5.2.1.4. Operators 48.5.2.2. Option Fields Expand section "48.5.2.2. Option Fields" Collapse section "48.5.2.2. Option Fields" 48.5.2.2.1. Logging 48.5.2.2.2. Access Control 48.5.2.2.3. Shell Commands 48.5.2.2.4. Expansions 48.5.3. xinetd 48.5.4. xinetd Configuration Files Expand section "48.5.4. xinetd Configuration Files" Collapse section "48.5.4. xinetd Configuration Files" 48.5.4.1. The /etc/xinetd.conf File 48.5.4.2. The /etc/xinetd.d/ Directory 48.5.4.3. Altering xinetd Configuration Files Expand section "48.5.4.3. Altering xinetd Configuration Files" Collapse section "48.5.4.3. Altering xinetd Configuration Files" 48.5.4.3.1. Logging Options 48.5.4.3.2. Access Control Options 48.5.4.3.3. Binding and Redirection Options 48.5.4.3.4. Resource Management Options 48.5.5. Additional Resources Expand section "48.5.5. Additional Resources" Collapse section "48.5.5. Additional Resources" 48.5.5.1. Installed Documentation 48.5.5.2. Useful Websites 48.5.5.3. Related Books 48.6. Kerberos Expand section "48.6. Kerberos" Collapse section "48.6. Kerberos" 48.6.1. What is Kerberos? Expand section "48.6.1. What is Kerberos?" Collapse section "48.6.1. What is Kerberos?" 48.6.1.1. Advantages of Kerberos 48.6.1.2. Disadvantages of Kerberos 48.6.2. Kerberos Terminology 48.6.3. How Kerberos Works 48.6.4. Kerberos and PAM 48.6.5. Configuring a Kerberos 5 Server 48.6.6. Configuring a Kerberos 5 Client 48.6.7. Domain-to-Realm Mapping 48.6.8. Setting Up Secondary KDCs 48.6.9. Setting Up Cross Realm Authentication 48.6.10. Additional Resources Expand section "48.6.10. Additional Resources" Collapse section "48.6.10. Additional Resources" 48.6.10.1. Installed Documentation 48.6.10.2. Useful Websites 48.7. Virtual Private Networks (VPNs) Expand section "48.7. Virtual Private Networks (VPNs)" Collapse section "48.7. Virtual Private Networks (VPNs)" 48.7.1. How Does a VPN Work? 48.7.2. VPNs and Red Hat Enterprise Linux 48.7.3. IPsec 48.7.4. Creating an IPsec Connection 48.7.5. IPsec Installation 48.7.6. IPsec Host-to-Host Configuration Expand section "48.7.6. IPsec Host-to-Host Configuration" Collapse section "48.7.6. IPsec Host-to-Host Configuration" 48.7.6.1. Host-to-Host Connection 48.7.6.2. Manual IPsec Host-to-Host Configuration Expand section "48.7.6.2. Manual IPsec Host-to-Host Configuration" Collapse section "48.7.6.2. Manual IPsec Host-to-Host Configuration" 48.7.6.2.1. The Racoon Configuration File 48.7.7. IPsec Network-to-Network Configuration Expand section "48.7.7. IPsec Network-to-Network Configuration" Collapse section "48.7.7. IPsec Network-to-Network Configuration" 48.7.7.1. Network-to-Network (VPN) Connection 48.7.7.2. Manual IPsec Network-to-Network Configuration 48.7.8. Starting and Stopping an IPsec Connection 48.8. Firewalls Expand section "48.8. Firewalls" Collapse section "48.8. Firewalls" 48.8.1. Netfilter and IPTables Expand section "48.8.1. Netfilter and IPTables" Collapse section "48.8.1. Netfilter and IPTables" 48.8.1.1. IPTables Overview 48.8.2. Basic Firewall Configuration Expand section "48.8.2. Basic Firewall Configuration" Collapse section "48.8.2. Basic Firewall Configuration" 48.8.2.1. Security Level Configuration Tool 48.8.2.2. Enabling and Disabling the Firewall 48.8.2.3. Trusted Services 48.8.2.4. Other Ports 48.8.2.5. Saving the Settings 48.8.2.6. Activating the IPTables Service 48.8.3. Using IPTables Expand section "48.8.3. Using IPTables" Collapse section "48.8.3. Using IPTables" 48.8.3.1. IPTables Command Syntax 48.8.3.2. Basic Firewall Policies 48.8.3.3. Saving and Restoring IPTables Rules 48.8.4. Common IPTables Filtering 48.8.5. FORWARD and NAT Rules Expand section "48.8.5. FORWARD and NAT Rules" Collapse section "48.8.5. FORWARD and NAT Rules" 48.8.5.1. Postrouting and IP Masquerading 48.8.5.2. Prerouting 48.8.5.3. DMZs and IPTables 48.8.6. Malicious Software and Spoofed IP Addresses 48.8.7. IPTables and Connection Tracking 48.8.8. IPv6 48.8.9. Additional Resources Expand section "48.8.9. Additional Resources" Collapse section "48.8.9. Additional Resources" 48.8.9.1. Installed Documentation 48.8.9.2. Useful Websites 48.8.9.3. Related Documentation 48.9. IPTables Expand section "48.9. IPTables" Collapse section "48.9. IPTables" 48.9.1. Packet Filtering 48.9.2. Differences Between IPTables and IPChains 48.9.3. Command Options for IPTables Expand section "48.9.3. Command Options for IPTables" Collapse section "48.9.3. Command Options for IPTables" 48.9.3.1. Structure of IPTables Command Options 48.9.3.2. Command Options 48.9.3.3. IPTables Parameter Options 48.9.3.4. IPTables Match Options Expand section "48.9.3.4. IPTables Match Options" Collapse section "48.9.3.4. IPTables Match Options" 48.9.3.4.1. TCP Protocol 48.9.3.4.2. UDP Protocol 48.9.3.4.3. ICMP Protocol 48.9.3.4.4. Additional Match Option Modules 48.9.3.5. Target Options 48.9.3.6. Listing Options 48.9.4. Saving IPTables Rules 48.9.5. IPTables Control Scripts Expand section "48.9.5. IPTables Control Scripts" Collapse section "48.9.5. IPTables Control Scripts" 48.9.5.1. IPTables Control Scripts Configuration File 48.9.6. IPTables and IPv6 48.9.7. Additional Resources Expand section "48.9.7. Additional Resources" Collapse section "48.9.7. Additional Resources" 48.9.7.1. Installed Documentation 48.9.7.2. Useful Websites 49. Security and SELinux Expand section "49. Security and SELinux" Collapse section "49. Security and SELinux" 49.1. Access Control Mechanisms (ACMs) Expand section "49.1. Access Control Mechanisms (ACMs)" Collapse section "49.1. Access Control Mechanisms (ACMs)" 49.1.1. Discretionary Access Control (DAC) 49.1.2. Access Control Lists (ACLs) 49.1.3. Mandatory Access Control (MAC) 49.1.4. Role-based Access Control (RBAC) 49.1.5. Multi-Level Security (MLS) 49.1.6. Multi-Category Security (MCS) 49.2. Introduction to SELinux Expand section "49.2. Introduction to SELinux" Collapse section "49.2. Introduction to SELinux" 49.2.1. SELinux Overview 49.2.2. Files Related to SELinux Expand section "49.2.2. Files Related to SELinux" Collapse section "49.2.2. Files Related to SELinux" 49.2.2.1. The SELinux Pseudo-File System 49.2.2.2. SELinux Configuration Files Expand section "49.2.2.2. SELinux Configuration Files" Collapse section "49.2.2.2. SELinux Configuration Files" 49.2.2.2.1. The /etc/sysconfig/selinux Configuration File 49.2.2.2.2. The /etc/selinux/ Directory 49.2.2.3. SELinux Utilities 49.2.3. Additional Resources Expand section "49.2.3. Additional Resources" Collapse section "49.2.3. Additional Resources" 49.2.3.1. Installed Documentation 49.2.3.2. Useful Websites 49.3. Brief Background and History of SELinux 49.4. Multi-Category Security (MCS) Expand section "49.4. Multi-Category Security (MCS)" Collapse section "49.4. Multi-Category Security (MCS)" 49.4.1. Introduction Expand section "49.4.1. Introduction" Collapse section "49.4.1. Introduction" 49.4.1.1. What is Multi-Category Security? 49.4.2. Applications for Multi-Category Security 49.4.3. SELinux Security Contexts 49.5. Getting Started with Multi-Category Security (MCS) Expand section "49.5. Getting Started with Multi-Category Security (MCS)" Collapse section "49.5. Getting Started with Multi-Category Security (MCS)" 49.5.1. Introduction 49.5.2. Comparing SELinux and Standard Linux User Identities 49.5.3. Configuring Categories 49.5.4. Assigning Categories to Users 49.5.5. Assigning Categories to Files 49.6. Multi-Level Security (MLS) Expand section "49.6. Multi-Level Security (MLS)" Collapse section "49.6. Multi-Level Security (MLS)" 49.6.1. Why Multi-Level? Expand section "49.6.1. Why Multi-Level?" Collapse section "49.6.1. Why Multi-Level?" 49.6.1.1. The Bell-La Padula Model (BLP) 49.6.1.2. MLS and System Privileges 49.6.2. Security Levels, Objects and Subjects 49.6.3. MLS Policy 49.6.4. Enabling MLS in SELinux 49.6.5. LSPP Certification 49.7. SELinux Policy Overview Expand section "49.7. SELinux Policy Overview" Collapse section "49.7. SELinux Policy Overview" 49.7.1. What is the SELinux Policy? Expand section "49.7.1. What is the SELinux Policy?" Collapse section "49.7.1. What is the SELinux Policy?" 49.7.1.1. SELinux Types Expand section "49.7.1.1. SELinux Types" Collapse section "49.7.1.1. SELinux Types" 49.7.1.1.1. Using Policy Rules to Define Type Access 49.7.1.2. SELinux and Mandatory Access Control 49.7.2. Where is the Policy? Expand section "49.7.2. Where is the Policy?" Collapse section "49.7.2. Where is the Policy?" 49.7.2.1. Binary Tree Files 49.7.2.2. Source Tree Files 49.7.3. The Role of Policy in the Boot Process 49.7.4. Object Classes and Permissions 49.8. Targeted Policy Overview Expand section "49.8. Targeted Policy Overview" Collapse section "49.8. Targeted Policy Overview" 49.8.1. What is the Targeted Policy? 49.8.2. Files and Directories of the Targeted Policy 49.8.3. Understanding the Users and Roles in the Targeted Policy 50. Working With SELinux Expand section "50. Working With SELinux" Collapse section "50. Working With SELinux" 50.1. End User Control of SELinux Expand section "50.1. End User Control of SELinux" Collapse section "50.1. End User Control of SELinux" 50.1.1. Moving and Copying Files 50.1.2. Checking the Security Context of a Process, User, or File Object 50.1.3. Relabeling a File or Directory 50.1.4. Creating Archives That Retain Security Contexts 50.2. Administrator Control of SELinux Expand section "50.2. Administrator Control of SELinux" Collapse section "50.2. Administrator Control of SELinux" 50.2.1. Viewing the Status of SELinux 50.2.2. Relabeling a File System 50.2.3. Managing NFS Home Directories 50.2.4. Granting Access to a Directory or a Tree 50.2.5. Backing Up and Restoring the System 50.2.6. Enabling or Disabling Enforcement 50.2.7. Enable or Disable SELinux 50.2.8. Changing the Policy 50.2.9. Specifying the Security Context of Entire File Systems 50.2.10. Changing the Security Category of a File or User 50.2.11. Running a Command in a Specific Security Context 50.2.12. Useful Commands for Scripts 50.2.13. Changing to a Different Role 50.2.14. When to Reboot 50.3. Analyst Control of SELinux Expand section "50.3. Analyst Control of SELinux" Collapse section "50.3. Analyst Control of SELinux" 50.3.1. Enabling Kernel Auditing 50.3.2. Dumping and Viewing Logs 51. Customizing SELinux Policy Expand section "51. Customizing SELinux Policy" Collapse section "51. Customizing SELinux Policy" 51.1. Introduction Expand section "51.1. Introduction" Collapse section "51.1. Introduction" 51.1.1. Modular Policy Expand section "51.1.1. Modular Policy" Collapse section "51.1.1. Modular Policy" 51.1.1.1. Listing Policy Modules 51.2. Building a Local Policy Module Expand section "51.2. Building a Local Policy Module" Collapse section "51.2. Building a Local Policy Module" 51.2.1. Using audit2allow to Build a Local Policy Module 51.2.2. Analyzing the Type Enforcement (TE) File 51.2.3. Loading the Policy Package 52. References VIII. Red Hat Training And Certification Expand section "VIII. Red Hat Training And Certification" Collapse section "VIII. Red Hat Training And Certification" 53. Red Hat Training and Certification Expand section "53. Red Hat Training and Certification " Collapse section "53. Red Hat Training and Certification " 53.1. Three Ways to Train 53.2. Microsoft Certified Professional Resource Center 54. Certification Tracks Expand section "54. Certification Tracks" Collapse section "54. Certification Tracks" 54.1. Free Pre-assessment tests 55. RH033: Red Hat Linux Essentials Expand section "55. RH033: Red Hat Linux Essentials" Collapse section "55. RH033: Red Hat Linux Essentials" 55.1. Course Description Expand section "55.1. Course Description" Collapse section "55.1. Course Description" 55.1.1. Prerequisites 55.1.2. Goal 55.1.3. Audience 55.1.4. Course Objectives 55.1.5. Follow-on Courses 56. RH035: Red Hat Linux Essentials for Windows Professionals Expand section "56. RH035: Red Hat Linux Essentials for Windows Professionals" Collapse section "56. RH035: Red Hat Linux Essentials for Windows Professionals" 56.1. Course Description Expand section "56.1. Course Description" Collapse section "56.1. Course Description" 56.1.1. Prerequisites 56.1.2. Goal 56.1.3. Audience 56.1.4. Course Objectives 56.1.5. Follow-on Courses 57. RH133: Red Hat Linux System Administration and Red Hat Certified Technician (RHCT) Certification Expand section "57. RH133: Red Hat Linux System Administration and Red Hat Certified Technician (RHCT) Certification" Collapse section "57. RH133: Red Hat Linux System Administration and Red Hat Certified Technician (RHCT) Certification" 57.1. Course Description Expand section "57.1. Course Description" Collapse section "57.1. Course Description" 57.1.1. Prerequisites 57.1.2. Goal 57.1.3. Audience 57.1.4. Course Objectives 57.1.5. Follow-on Courses 58. RH202 RHCT EXAM - The fastest growing credential in all of Linux. Expand section "58. RH202 RHCT EXAM - The fastest growing credential in all of Linux." Collapse section "58. RH202 RHCT EXAM - The fastest growing credential in all of Linux." 58.1. Course Description Expand section "58.1. Course Description" Collapse section "58.1. Course Description" 58.1.1. Prerequisites 59. RH253 Red Hat Linux Networking and Security Administration Expand section "59. RH253 Red Hat Linux Networking and Security Administration" Collapse section "59. RH253 Red Hat Linux Networking and Security Administration" 59.1. Course Description Expand section "59.1. Course Description" Collapse section "59.1. Course Description" 59.1.1. Prerequisites 59.1.2. Goal 59.1.3. Audience 59.1.4. Course Objectives 59.1.5. Follow-on Courses 60. RH300: RHCE Rapid track course (and RHCE exam) Expand section "60. RH300: RHCE Rapid track course (and RHCE exam)" Collapse section "60. RH300: RHCE Rapid track course (and RHCE exam)" 60.1. Course Description Expand section "60.1. Course Description" Collapse section "60.1. Course Description" 60.1.1. Prerequisites 60.1.2. Goal 60.1.3. Audience 60.1.4. Course Objectives 60.1.5. Follow-on Courses 61. RH302 RHCE EXAM Expand section "61. RH302 RHCE EXAM" Collapse section "61. RH302 RHCE EXAM" 61.1. Course Description Expand section "61.1. Course Description" Collapse section "61.1. Course Description" 61.1.1. Prerequisites 61.1.2. Content 62. RHS333: RED HAT enterprise security: network services Expand section "62. RHS333: RED HAT enterprise security: network services" Collapse section "62. RHS333: RED HAT enterprise security: network services" 62.1. Course Description Expand section "62.1. Course Description" Collapse section "62.1. Course Description" 62.1.1. Prerequisites 62.1.2. Goal 62.1.3. Audience 62.1.4. Course Objectives 62.1.5. Follow-on Courses 63. RH401: Red Hat Enterprise Deployment and systems management Expand section "63. RH401: Red Hat Enterprise Deployment and systems management" Collapse section "63. RH401: Red Hat Enterprise Deployment and systems management" 63.1. Course Description Expand section "63.1. Course Description" Collapse section "63.1. Course Description" 63.1.1. Prerequisites 63.1.2. Goal 63.1.3. Audience 63.1.4. Course Objectives 63.1.5. Follow-on Courses 64. RH423: Red Hat Enterprise Directory services and authentication Expand section "64. RH423: Red Hat Enterprise Directory services and authentication" Collapse section "64. RH423: Red Hat Enterprise Directory services and authentication" 64.1. Course Description Expand section "64.1. Course Description" Collapse section "64.1. Course Description" 64.1.1. Prerequisites 64.1.2. Goal 64.1.3. Audience 64.1.4. Course Objectives 64.1.5. Follow-on Courses 65. SELinux Courses Expand section "65. SELinux Courses" Collapse section "65. SELinux Courses" 65.1. RHS427: Introduction to SELinux and Red Hat Targeted Policy Expand section "65.1. RHS427: Introduction to SELinux and Red Hat Targeted Policy" Collapse section "65.1. RHS427: Introduction to SELinux and Red Hat Targeted Policy" 65.1.1. Audience 65.1.2. Course Summary 65.2. RHS429: Red Hat Enterprise SELinux Policy Administration 66. RH436: Red Hat Enterprise storage management Expand section "66. RH436: Red Hat Enterprise storage management" Collapse section "66. RH436: Red Hat Enterprise storage management" 66.1. Course Description Expand section "66.1. Course Description" Collapse section "66.1. Course Description" 66.1.1. Prerequisites 66.1.2. Goal 66.1.3. Audience 66.1.4. Course Objectives 66.1.5. Follow-on Courses 67. RH442: Red Hat Enterprise system monitoring and performance tuning Expand section "67. RH442: Red Hat Enterprise system monitoring and performance tuning" Collapse section "67. RH442: Red Hat Enterprise system monitoring and performance tuning" 67.1. Course Description Expand section "67.1. Course Description" Collapse section "67.1. Course Description" 67.1.1. Prerequisites 67.1.2. Goal 67.1.3. Audience 67.1.4. Course Objectives 67.1.5. Follow-on Courses 68. Red Hat Enterprise Linux Developer Courses Expand section "68. Red Hat Enterprise Linux Developer Courses" Collapse section "68. Red Hat Enterprise Linux Developer Courses" 68.1. RHD143: Red Hat Linux Programming Essentials 68.2. RHD221 Red Hat Linux Device Drivers 68.3. RHD236 Red Hat Linux Kernel Internals 68.4. RHD256 Red Hat Linux Application Development and Porting 69. JBoss Courses Expand section "69. JBoss Courses" Collapse section "69. JBoss Courses" 69.1. RHD161 JBoss and EJB3 for Java Expand section "69.1. RHD161 JBoss and EJB3 for Java" Collapse section "69.1. RHD161 JBoss and EJB3 for Java" 69.1.1. Prerequisites 69.2. RHD163 JBoss for Web Developers Expand section "69.2. RHD163 JBoss for Web Developers " Collapse section "69.2. RHD163 JBoss for Web Developers " 69.2.1. Prerequisites 69.3. RHD167: JBOSS - HIBERNATE ESSENTIALS Expand section "69.3. RHD167: JBOSS - HIBERNATE ESSENTIALS" Collapse section "69.3. RHD167: JBOSS - HIBERNATE ESSENTIALS" 69.3.1. Prerequisites 69.3.2. Course Summary 69.4. RHD267: JBOSS - ADVANCED HIBERNATE Expand section "69.4. RHD267: JBOSS - ADVANCED HIBERNATE" Collapse section "69.4. RHD267: JBOSS - ADVANCED HIBERNATE" 69.4.1. Prerequisites 69.5. RHD261:JBOSS for advanced J2EE developers Expand section "69.5. RHD261:JBOSS for advanced J2EE developers" Collapse section "69.5. RHD261:JBOSS for advanced J2EE developers" 69.5.1. Prerequisites 69.6. RH336: JBOSS for Administrators Expand section "69.6. RH336: JBOSS for Administrators" Collapse section "69.6. RH336: JBOSS for Administrators" 69.6.1. Prerequisites 69.6.2. Course Summary 69.7. RHD439: JBoss Clustering Expand section "69.7. RHD439: JBoss Clustering" Collapse section "69.7. RHD439: JBoss Clustering" 69.7.1. Prerequisites 69.8. RHD449: JBoss jBPM Expand section "69.8. RHD449: JBoss jBPM " Collapse section "69.8. RHD449: JBoss jBPM " 69.8.1. Description 69.8.2. Prerequisites 69.9. RHD451 JBoss Rules Expand section "69.9. RHD451 JBoss Rules" Collapse section "69.9. RHD451 JBoss Rules" 69.9.1. Prerequisites A. Revision History B. Colophon Legal Notice Settings Close Language: 日本語 Español Deutsch 繁體中文 Português 한국어 Français English Language: 日本語 Español Deutsch 繁體中文 Português 한국어 Français English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: 日本語 Español Deutsch 繁體中文 Português 한국어 Français English Language: 日本語 Español Deutsch 繁體中文 Português 한국어 Français English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Red Hat Training A Red Hat training course is available for Red Hat Enterprise Linux 25.2.2.2.2. Logging The following logging directives have been removed: AgentLog RefererLog RefererIgnore However, agent and referrer logs are still available using the CustomLog and LogFormat directives. For more on this topic, refer to the following documentation on the Apache Software Foundation's website: http://httpd.apache.org/docs-2.0/mod/mod_log_config.html#customlog http://httpd.apache.org/docs-2.0/mod/mod_log_config.html#logformat Previous Next