Foreword |
|
xvi | |
About the Authors |
|
xviii | |
About the Technical Reviewer |
|
xix | |
Acknowledgments |
|
xx | |
Introduction |
|
xxi | |
|
Part 1 Getting Started with CentOS |
|
|
|
|
3 | (10) |
|
What Is Enterprise Linux? |
|
|
4 | (3) |
|
|
4 | (1) |
|
Low-Risk Security Updates |
|
|
5 | (1) |
|
|
6 | (1) |
|
Regular Updates and Bug Fixes |
|
|
6 | (1) |
|
|
7 | (1) |
|
Summary of Enterprise Linux's Benefits |
|
|
7 | (1) |
|
|
7 | (4) |
|
|
11 | (2) |
|
|
13 | (32) |
|
|
13 | (1) |
|
|
14 | (4) |
|
|
17 | (1) |
|
|
17 | (1) |
|
Performing a Super-Quick CentOS Install |
|
|
18 | (19) |
|
Setting Other Installation Options |
|
|
37 | (5) |
|
Securely Erasing Your Disks |
|
|
37 | (2) |
|
Creating a Custom Partition Layout |
|
|
39 | (1) |
|
|
40 | (1) |
|
|
41 | (1) |
|
|
42 | (3) |
|
Getting Started with CentOS |
|
|
45 | (16) |
|
|
45 | (6) |
|
Relative and Absolute Paths |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
47 | (1) |
|
|
47 | (1) |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
48 | (1) |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
50 | (1) |
|
|
50 | (1) |
|
|
50 | (1) |
|
|
50 | (1) |
|
Getting Your Hands on a Command Prompt |
|
|
51 | (1) |
|
|
51 | (1) |
|
|
52 | (1) |
|
You're Logged In; Now What? |
|
|
52 | (1) |
|
|
52 | (1) |
|
|
53 | (7) |
|
|
53 | (1) |
|
|
54 | (2) |
|
|
56 | (1) |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
59 | (1) |
|
|
60 | (1) |
|
|
60 | (1) |
|
|
61 | (18) |
|
|
61 | (1) |
|
What Are Yum Repositories? |
|
|
62 | (1) |
|
|
62 | (2) |
|
Official CentOS Repositories |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
64 | (9) |
|
|
65 | (2) |
|
|
67 | (1) |
|
Installing a Group of Packages |
|
|
68 | (2) |
|
|
70 | (3) |
|
Adding a Custom Repository |
|
|
73 | (2) |
|
|
73 | (1) |
|
How to Do It Without an RPM |
|
|
73 | (2) |
|
|
75 | (1) |
|
|
76 | (3) |
|
Part 2 Going into Production |
|
|
|
|
79 | (34) |
|
How Does the Server Work? |
|
|
80 | (2) |
|
A Brief Introduction to SSL |
|
|
81 | (1) |
|
|
82 | (3) |
|
|
82 | (1) |
|
When to Let Someone Else Do It |
|
|
83 | (1) |
|
What Is a Virtual Private Server (VPS)? |
|
|
83 | (1) |
|
|
84 | (1) |
|
|
85 | (6) |
|
|
85 | (3) |
|
Making Sure Apache Starts Each Time the Server Reboots |
|
|
88 | (1) |
|
Starting Up and Testing Apache |
|
|
89 | (2) |
|
|
91 | (4) |
|
|
92 | (1) |
|
|
92 | (1) |
|
|
93 | (1) |
|
|
93 | (1) |
|
Saving the Configuration File |
|
|
93 | (1) |
|
Testing Your New Configuration File |
|
|
94 | (1) |
|
|
94 | (1) |
|
|
95 | (2) |
|
|
95 | (1) |
|
How to Password Protect a Directory |
|
|
95 | (1) |
|
Configuring Password Protection |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
97 | (2) |
|
|
98 | (1) |
|
Enabling Compression in Apache |
|
|
98 | (1) |
|
Why You Don't Compress Everything |
|
|
98 | (1) |
|
Improving Server Performance |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
100 | (1) |
|
|
100 | (4) |
|
Getting Started with Virtual Hosts |
|
|
101 | (2) |
|
Creating Your First Virtual Host |
|
|
103 | (1) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
105 | (1) |
|
Getting Your Shiny New Certificate |
|
|
105 | (6) |
|
Signing Your Own Certificate |
|
|
108 | (1) |
|
What to Do with an Intermediary Certificate |
|
|
109 | (1) |
|
Putting Your New Certificate to Work |
|
|
109 | (1) |
|
Removing the Password Protection from the Key |
|
|
110 | (1) |
|
|
111 | (2) |
|
|
113 | (42) |
|
How Do Mail Servers Work? |
|
|
114 | (4) |
|
Why Run Your Own Mail Server? |
|
|
116 | (1) |
|
|
116 | (1) |
|
When Not to Run Your Own Mail Server |
|
|
117 | (1) |
|
Which Mail Server to Choose |
|
|
117 | (1) |
|
Installing the Mail Server |
|
|
118 | (5) |
|
|
120 | (1) |
|
Making Sure Postfix Starts During Boot |
|
|
121 | (2) |
|
|
123 | (16) |
|
Configuring Your System to Send Mail |
|
|
124 | (8) |
|
Configuring Your System to Receive Mail |
|
|
132 | (1) |
|
Setting Up Users to Receive Mails |
|
|
133 | (3) |
|
Taking a Few Antispam Measures |
|
|
136 | (1) |
|
Receiving Mails for Several Domains |
|
|
137 | (2) |
|
|
139 | (6) |
|
|
139 | (2) |
|
Usernames, Passwords, and Such |
|
|
141 | (4) |
|
|
145 | (7) |
|
Configuring Your Firewall |
|
|
148 | (2) |
|
|
150 | (2) |
|
|
152 | (2) |
|
|
154 | (1) |
|
|
155 | (26) |
|
|
156 | (6) |
|
|
157 | (2) |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
160 | (1) |
|
|
160 | (1) |
|
|
161 | (1) |
|
|
162 | (2) |
|
|
164 | (2) |
|
Primary and Secondary Name Servers |
|
|
164 | (1) |
|
|
165 | (1) |
|
Setting Up a Caching Name Server |
|
|
166 | (9) |
|
Making DNS Available to Other Machines |
|
|
168 | (2) |
|
Configuring BIND to Host Domains |
|
|
170 | (1) |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
175 | (2) |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
178 | (2) |
|
Forgetting to Increment the Serial Number |
|
|
179 | (1) |
|
Forgetting the Dot in the Record |
|
|
179 | (1) |
|
|
180 | (1) |
|
|
181 | (18) |
|
|
181 | (2) |
|
|
183 | (1) |
|
|
183 | (1) |
|
|
184 | (1) |
|
|
184 | (9) |
|
|
184 | (2) |
|
|
186 | (1) |
|
Defining Static IP Addresses |
|
|
187 | (2) |
|
|
189 | (2) |
|
|
191 | (1) |
|
|
191 | (2) |
|
|
193 | (1) |
|
Configuring dhcpd for PXE Boot |
|
|
194 | (1) |
|
DHCP Integration with DNS |
|
|
194 | (3) |
|
|
197 | (2) |
|
|
199 | (20) |
|
Windows Networking Basics |
|
|
199 | (1) |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
200 | (1) |
|
|
200 | (1) |
|
|
200 | (1) |
|
Preparing to Set Up Samba |
|
|
201 | (1) |
|
|
202 | (1) |
|
|
202 | (16) |
|
|
203 | (6) |
|
Minimal Stand-Alone Samba Setup |
|
|
209 | (3) |
|
|
212 | (2) |
|
Extended Stand-Alone Example |
|
|
214 | (1) |
|
|
215 | (3) |
|
|
218 | (1) |
|
Setting Up Virtual Private Networks |
|
|
219 | (34) |
|
What Is a Virtual Private Network? |
|
|
221 | (1) |
|
Using SSH for Virtual Private Networks |
|
|
222 | (6) |
|
Virtual Private Networks with IPSec |
|
|
228 | (7) |
|
|
229 | (1) |
|
|
230 | (5) |
|
|
235 | (14) |
|
|
237 | (3) |
|
Configuring the Server Side |
|
|
240 | (2) |
|
|
242 | (2) |
|
Some Security Considerations |
|
|
244 | (2) |
|
Doing It the Even Easier Way |
|
|
246 | (3) |
|
|
249 | (4) |
|
Part 3 Enterprise Features |
|
|
|
|
253 | (20) |
|
|
253 | (2) |
|
What Can't Core Builds Do? |
|
|
254 | (1) |
|
|
254 | (1) |
|
What Are Kickstart Files? |
|
|
255 | (15) |
|
Anatomy of a Kickstart File |
|
|
255 | (1) |
|
|
256 | (5) |
|
|
261 | (2) |
|
|
263 | (4) |
|
Using a Kickstart File on a Web Server |
|
|
267 | (1) |
|
Dynamically Creating Kickstart Files |
|
|
268 | (2) |
|
Installing CentOS over HTTP |
|
|
270 | (1) |
|
Updating Your Kickstart File to Install CentOS via HTTP |
|
|
271 | (1) |
|
|
271 | (2) |
|
|
273 | (26) |
|
Clustering and High Availability |
|
|
273 | (1) |
|
|
274 | (3) |
|
|
275 | (1) |
|
|
276 | (1) |
|
Service or Virtual IP Address |
|
|
276 | (1) |
|
HA Cluster Suite Components |
|
|
277 | (1) |
|
HA Clustering with CentOS |
|
|
278 | (1) |
|
|
278 | (1) |
|
|
279 | (1) |
|
|
279 | (1) |
|
|
279 | (2) |
|
|
281 | (2) |
|
Building Clusters Using CCS |
|
|
283 | (9) |
|
Creating a Basic Cluster with CCS |
|
|
283 | (5) |
|
Advanced Configurations Using CCS |
|
|
288 | (2) |
|
Advanced Example with CCS |
|
|
290 | (2) |
|
Building Clusters Using HPS |
|
|
292 | (5) |
|
Creating a Basic Cluster with HPS |
|
|
292 | (2) |
|
Advanced Configurations Using HPS |
|
|
294 | (1) |
|
|
295 | (2) |
|
|
297 | (2) |
|
Monitoring Your Network Using Nagios |
|
|
299 | (16) |
|
|
299 | (1) |
|
|
300 | (2) |
|
|
302 | (1) |
|
Nagios Configuration Overview |
|
|
303 | (1) |
|
|
304 | (3) |
|
Basic Nagios Configuration |
|
|
307 | (4) |
|
Contacts and Notifications |
|
|
311 | (1) |
|
Advanced Nagios Configuration |
|
|
312 | (1) |
|
|
313 | (2) |
Index |
|
315 | |