Red Hat Enterprise Linux 3

Reference Guide

ISBN: N/A
Table of Contents
Introduction
1. Changes To This Manual
2. Finding Appropriate Documentation
2.1. Documentation For First-Time Linux Users
2.2. For the More Experienced
2.3. Documentation for Linux Gurus
3. Document Conventions
4. Using the Mouse
5. Copying and Pasting Text With X
6. More to Come
6.1. We Need Feedback!
7. Sign Up for Support
I. System Reference
1. Boot Process, Init, and Shutdown
1.1. The Boot Process
1.2. A Detailed Look at the Boot Process
1.3. Running Additional Programs at Boot Time
1.4. SysV Init Runlevels
1.5. Shutting Down
2. Boot Loaders
2.1. Boot Loaders and System Architecture
2.2. GRUB
2.3. Installing GRUB
2.4. GRUB Terminology
2.5. GRUB Interfaces
2.6. GRUB Commands
2.7. GRUB Menu Configuration File
2.8. LILO
2.9. The LILO Configuration File
2.10. Changing Runlevels at Boot Time
2.11. Additional Resources
3. File System Structure
3.1. Why Share a Common Structure?
3.2. Overview of File System Hierarchy Standard (FHS)
3.3. Special File Locations Under Red Hat Enterprise Linux
4. The sysconfig Directory
4.1. Files in the /etc/sysconfig/ Directory
4.2. Directories in the /etc/sysconfig/ Directory
4.3. Additional Resources
5. The proc File System
5.1. A Virtual File System
5.2. Top-level Files within the proc File System
5.3. Directories within /proc/
5.4. Using the sysctl Command
5.5. Additional Resources
6. Users and Groups
6.1. User and Group Management Tools
6.2. Standard Users
6.3. Standard Groups
6.4. User Private Groups
6.5. Shadow Passwords
6.6. Additional Resources
7. The X Window System
7.1. XFree86
7.2. Desktop Environments and Window Managers
7.3. XFree86 Server Configuration Files
7.4. Fonts
7.5. Runlevels and XFree86
7.6. Additional Resources
II. Network Services Reference
8. Network Interfaces
8.1. Network Configuration Files
8.2. Interface Configuration Files
8.3. Interface Control Scripts
8.4. Network Function Files
8.5. Additional Resources
9. Network File System (NFS)
9.1. How It Works
9.2. Starting and Stopping NFS
9.3. NFS Server Configuration
9.4. NFS Client Configuration Files
9.5. Securing NFS
9.6. Additional Resources
10. Apache HTTP Server
10.1. Apache HTTP Server 2.0
10.2. Migrating Apache HTTP Server 1.3 Configuration Files
10.3. After Installation
10.4. Starting and Stopping httpd
10.5. Configuration Directives in httpd.conf
10.6. Default Modules
10.7. Adding Modules
10.8. Virtual Hosts
10.9. Additional Resources
11. FTP
11.1. The File Transport Protocol
11.2. FTP Servers
11.3. Files Installed with vsftpd
11.4. Starting and Stopping vsftpd
11.5. vsftpd Configuration Options
11.6. Additional Resources
12. Email
12.1. Email Protocols
12.2. Email Program Classifications
12.3. Mail Transport Agents
12.4. Mail Delivery Agents
12.5. Mail User Agents
12.6. Additional Resources
13. Berkeley Internet Name Domain (BIND)
13.1. Introduction to DNS
13.2. /etc/named.conf
13.3. Zone Files
13.4. Using rndc
13.5. Advanced Features of BIND
13.6. Common Mistakes to Avoid
13.7. Additional Resources
14. Lightweight Directory Access Protocol (LDAP)
14.1. Why Use LDAP?
14.2. LDAP Terminology
14.3. OpenLDAP Daemons and Utilities
14.4. OpenLDAP Configuration Files
14.5. The /etc/openldap/schema/ Directory
14.6. OpenLDAP Setup Overview
14.7. Configuring a System to Authenticate Using OpenLDAP
14.8. Migrating Directories from Earlier Releases
14.9. Additional Resources
III. Security Reference
15. Pluggable Authentication Modules (PAM)
15.1. Advantages of PAM
15.2. PAM Configuration Files
15.3. PAM Configuration File Format
15.4. Sample PAM Configuration Files
15.5. Creating PAM Modules
15.6. PAM and Administrative Credential Caching
15.7. PAM and Device Ownership
15.8. Additional Resources
16. TCP Wrappers and xinetd
16.1. TCP Wrappers
16.2. TCP Wrappers Configuration Files
16.3. xinetd
16.4. xinetd Configuration Files
16.5. Additional Resources
17. iptables
17.1. Packet Filtering
17.2. Differences between iptables and ipchains
17.3. Options Used within iptables Commands
17.4. Saving iptables Rules
17.5. iptables Control Scripts
17.6. ip6tables and IPv6
17.7. Additional Resources
18. Kerberos
18.1. What is Kerberos?
18.2. Kerberos Terminology
18.3. How Kerberos Works
18.4. Kerberos and PAM
18.5. Configuring a Kerberos 5 Server
18.6. Configuring a Kerberos 5 Client
18.7. Additional Resources
19. SSH Protocol
19.1. Features of SSH
19.2. SSH Protocol Versions
19.3. Event Sequence of an SSH Connection
19.4. OpenSSH Configuration Files
19.5. More Than a Secure Shell
19.6. Requiring SSH for Remote Connections
19.7. Additional Resources
IV. Appendixes
A. General Parameters and Modules
A.1. Specifying Module Parameters
A.2. SCSI parameters
A.3. Ethernet Parameters
Index
Colophon