- ホーム
- > 洋書
- > 英文書
- > Computer / Operating Systems
Full Description
Master every topic on Red Hat's new RHCSA (TM) and RHCE (R) exams.Assess your knowledge and focus your learning. Get the practical workplace knowledge you need!Start-to-finish RHCSA (TM) and RHCE (R) preparation from leading Linux system administrator, IT trainer, and certification expert Damian Tommasino!Master every RHCSA (TM) and RHCE (R) topic!Red Hat Enterprise Linux 6 local and network installation System services, runlevels, and bootup Disks, partitions, and file systems, including LUKS encryption Networking Package management User administration Logging, monitoring, and automation Kernel updates and tuning Security, including SELinux, firewalls, and policies Remote access, including SSH Apache, Squid, DNS, DHCP, NTP, and email NFS and Samba Client and network troubleshooting KVM virtualizationTest your knowledge, build your confidence, and succeed!22 hands-on RHCSA (TM) and RHCE (R) Labs, each with multiple real-world tasks Downloadable troubleshooting scripts Practical tutorials and real-world tips Exam tips Red Hat Enterprise Linux 6 Command Quick Reference Exclusive Red Hat exam prep advice and task lists Two full length lab-based practice examsDamian Tommasino (RHCE, RHCSA, MCSA, CCNA, CCENT, MCP, Security+, Network+, A+) is a Linux system administrator at TradeCard and CEO of Modular Learning Inc., an online IT training company. He blogs on Red Hat, Linux, and security at Security Nut (http://secnut.blogspot.com), and actively contributes to the popular IT exam certification forums at techexams.net.
Contents
Preface xviIntroduction 3Chapter 1 Installation 29Starting the Installation 29An Older Install with RHEL5 33The Firstboot Process 37Verifying the Installation 40Summary 41Review Questions 42Answers to Review Questions 42Chapter 2 System Initialization 47The Boot Process 47Working with GRUB 51The Config File 52The GRUB Command Line 54Runlevels 55Runlevel Utilities 56Rescue and Recovery Runlevels 59Service Management 59The Upstart Conversion 64Summary 66Review Questions 66Answers to Review Questions 67Chapter 3 Disks and Partitioning 71Basic Partitions 71Creating a Partition 75Making a Swap Partition 81Deleting a Partition 83Logical Volume Manager 85Creating an LVM Partition 89Adjusting the Size of LVM Partitions 93Migrating Data 96Deleting an LVM Partition 99Setting Up RAID 101Creating a RAID Array 102What to Do When a Disk Fails 105Deleting a RAID Array 108Summary 109Review Questions 109Answers to Review Questions 109Chapter 4 File Systems and Such 113File System Setup 113Creating a File System 114Creating a Swap 116Mounting a File System 119Extra File System Commands 125Encryption with LUKS 128Creating Encrypted Partitions 129Mounting LUKS at Boot 132Managing File System Quotas 132Setting Up Quotas 132Enabling Quotas 134Quota Usage Reports 137File System Security 137Setting Up ACLs 138GnuPG 141Using AutoFS 141Summary 144Review Questions 144Answers to Review Questions 145Chapter 5 Networking 149Setting Up Networking 149Static IP Addresses 151Routing 155Creating Static Routes 156Troubleshooting Network Connections 156Networking Utilities 157Network Monitoring and Analysis 159Advanced Networking 160Ethernet Bonding 160Client DNS Troubleshooting 161Summary 164Review Questions 165Answers to Review Questions 165Chapter 6 Package Management 169Working with RPM 169Installing and Removing Packages 170Querying and Verifying Packages 172Doing It Again with Yum 177Installing and Removing Packages 178Searching for Packages 182Configuring Additional Repositories 183Making Your Own RPM 184Creating an RPM 185Creating Your Own Repository 188Adding Your Custom Packages 190The Red Hat Network 190Registering Your System 191Summary 191Review Questions 192Answers to Review Questions 192Chapter 7 User Administration 195Users and Groups 195Users 196Passwords 199The Password File 200The Shadow File 201Groups 204The Group File 204Switching Accounts 206User Account Initialization 207User-Specific Files 207Global User Configuration 208Group Collaboration 209Network User Authentication 211Summary 215Review Questions 215Answers to Review Questions 216Chapter 8 Network Installs 221Kickstart Server Setup 221Firewall and SELinux Configuration 224Mastering Kickstart Config Files 225Post Install 227Advanced Partitioning 227Automating Kickstart 228TFTP Server 229PXE Boot 232Firewall and SELinux Configuration 233Other Network Installs 234Summary 235Review Questions 235Answers to Review Questions 236Chapter 9 System Logging, Monitoring, and Automation 239Working with Syslog 239The Config File 241Log Rotation 243Centralized Logging 244Centralized Logging (The RHEL5 Way) 246User Login Events 247Monitoring System Performance 248Automation with cron and at 252Creating cron Jobs 254Single Jobs with at 258Summary 261Review Questions 261Answers to Review Questions 262Chapter 10 The Kernel 265Kernel Basics 265Updating the Kernel 268Tuning the Kernel with /proc/sys 272Summary 274Review Questions 275Answers to Review Questions 275Chapter 11 SELinux 277Understanding SELinux 277Configuring SELinux 279File Contexts 279Service and Boolean Options 283SELinux Troubleshooting 286Policy Violations 286Summary 287Review Questions 287Answers to Review Questions 288Chapter 12 System Security 291Security Through TCP Wrappers 291Firewall Rules Using iptables 293Configuring iptables 294Troubleshooting Firewall Rules 299Working with NAT 300Pluggable Authentication Module 301Securing Access 301PAM Troubleshooting 303Managing Password Policies 304Summary 305Review Questions 305Answers to the Review Questions 306Chapter 13 Remote Access 309Secure SHell (SSH) 309Configuring SSH 310Firewall and SELinux Configuration 313SSH Security 314Troubleshooting SSH 315SSH Security Revisited 315Public/Private Keys 316Port Forwarding 317VNC Servers 318Connecting Clients 320Summary 321Review Questions 321Answers to Review Questions 321Chapter 14 Web Services 325The Apache Web Server 325Installing Apache 325Configuring the Web Server 326Firewall and SELinux Configuration 329Troubleshooting Apache 332Apache Security 334Host-Based Security 334User-Based Security 336Setting Up HTTPS 339CGI Applications 341Virtual Hosts 342Squid Web Proxy 343Installing Squid 344Configuring the Proxy 344Firewall and SELinux Configuration 345Web Proxy Security 346Summary 347Review Questions 347Answers to Review Questions 348Chapter 15 NFS 351Network File Systems 351Installing an NFS Server 352Configuring NFS 353Firewall and SELinux Configuration 358NFS Security 360Troubleshooting NFS 361Connecting Clients 364Summary 366Review Questions 366Answers to Review Questions 366Chapter 16 Samba 369Samba 369Configuring Samba 370Samba Security 377Samba Clients 377Summary 379Review Questions 380Answers to Review Questions 380Chapter 17 FTP 383File Transfer Protocol 383Installing an FTP Server 384Configuring vsftp 384Firewall and SELinux Configuration 386FTP Security 388Troubleshooting FTP 389Summary 390Review Questions 390Answers to Review Questions 391Chapter 18 DNS 393Setting Up BIND 393Firewall and SELinux Configuration 394Configuring a DNS Server 396Master Server 397Slave Server 401Caching-Only Server 404Forwarding-Only Server 406DNS Utilities and Troubleshooting 406BIND Security 412Summary 417Review Questions 417Answers to Review Questions 418Chapter 19 Network Services 421Xinetd: The Master Service 421Dynamic Host Configuration Protocol 426Installing a DHCP Server 426Configuring the DHCP Server 427Security Configuration 431Troubleshooting DHCP 432Network Time Protocol 433Installing a Time Server 434Configuring NTP 434Firewall and SELinux Configuration 436NTP Security 437Troubleshooting NTP 438Summary 439Review Questions 439Answers to Review Questions 439Chapter 20 Email Services 443Email Service Overview 443SMTP with Postfix 443Configuring Postfix 445Firewall and SELinux Configuration 449Postfix Security 450Alias Mapping 451Receiving Mail with Dovecot 452Configuring Dovecot 452Firewall and SELinux Configuration 453Dovecot Security 454Testing the Mail Server 456Summary 458Review Questions 459Answers to Review Questions 459Chapter 21 Troubleshooting 463Boot Issues 463I Lost My Root User Password 463Password Change Not Available in Single-User Mode 464The MBR Is Corrupt 464The Partition or Root File System Can't Be Found 465Troubleshooting File Systems 466The System Complains About a File System Label 466The Superblock Has Become Corrupt 466Users Can't Create Files in Their Home Directories 467Miscellaneous 468I Can't Remote into My System 468I Can't Access Service X 468When I Start a Service, It Tells Me "Cannot Bind to Address" 469I Get the Error Message "No Route to Host" 469My Ping to Another Host Has Failed 470Summary 470Chapter 22 Virtualization with KVM 473Working with Virtual Machines 473Setting Up the Physical Host 473Installing a Virtual Client 474Managing a Virtual Client 477Monitoring Virtual Resources 479Summary 480Review Questions 480Answers to Review Questions 481Lab Exam 1 483Lab Exam 2 485Index 486TOC, 9780321767950, 3/15/2011



