| About the Author |
|
xxiii | |
| About the Technical Reviewer |
|
xxv | |
| Acknowledgments |
|
xxvii | |
| Introduction |
|
xxix | |
|
PART 1 Getting Familiar with SUSE Linux Enterprise Server |
|
|
|
Installing SUSE Linux Enterprise Server |
|
|
3 | (26) |
|
Meeting the Installation Requirements |
|
|
3 | (1) |
|
Starting the Installation |
|
|
3 | (3) |
|
Preparing the Installation |
|
|
6 | (4) |
|
Selecting What to Install |
|
|
10 | (4) |
|
|
|
14 | (14) |
|
|
|
28 | (1) |
|
Exploring SUSE Linux Enterprise Server |
|
|
29 | (20) |
|
|
|
29 | (3) |
|
Exploring the Linux User Accounts |
|
|
29 | (1) |
|
Working with Virtual Consoles |
|
|
30 | (1) |
|
Getting Administrative Access |
|
|
31 | (1) |
|
Finding Your Way in the File System |
|
|
32 | (8) |
|
Exploring the Default Directories |
|
|
32 | (6) |
|
Performing Essential Tasks in the File System |
|
|
38 | (2) |
|
Working with the GNOME Interface |
|
|
40 | (5) |
|
|
|
40 | (2) |
|
Working with More Applications |
|
|
42 | (3) |
|
Modifying the GNOME Desktop |
|
|
45 | (2) |
|
Adding Items to the Desktop |
|
|
45 | (1) |
|
|
|
46 | (1) |
|
Modifying Other Desktop Items |
|
|
46 | (1) |
|
|
|
47 | (2) |
|
Managing SUSE Linux Enterprise Server with YaST |
|
|
49 | (24) |
|
|
|
49 | (21) |
|
|
|
50 | (1) |
|
|
|
51 | (6) |
|
|
|
57 | (5) |
|
|
|
62 | (1) |
|
|
|
62 | (4) |
|
|
|
66 | (1) |
|
|
|
66 | (4) |
|
|
|
70 | (1) |
|
Working with YaST and Its Configuration Files |
|
|
70 | (1) |
|
Working with YaST Modules |
|
|
71 | (1) |
|
|
|
72 | (1) |
|
Finding Your Way on the Command Line |
|
|
73 | (18) |
|
Working with the Bash Shell |
|
|
73 | (3) |
|
|
|
73 | (1) |
|
Knowing the Important Key Sequences |
|
|
74 | (1) |
|
Working with the Bash History |
|
|
74 | (2) |
|
Performing Basic File System Management Tasks |
|
|
76 | (3) |
|
|
|
76 | (1) |
|
|
|
76 | (2) |
|
Viewing the Content of Text Files |
|
|
78 | (1) |
|
|
|
78 | (1) |
|
Using Piping and Redirection |
|
|
79 | (2) |
|
|
|
79 | (1) |
|
|
|
79 | (2) |
|
|
|
81 | (1) |
|
|
|
82 | (1) |
|
|
|
82 | (1) |
|
|
|
82 | (1) |
|
Cutting, Copying, and Pasting |
|
|
83 | (1) |
|
|
|
83 | (1) |
|
|
|
83 | (4) |
|
|
|
84 | (2) |
|
|
|
86 | (1) |
|
Learning More About Installed Packages |
|
|
86 | (1) |
|
|
|
87 | (4) |
|
PART 2 Administering SUSE Linux Enterprise Server |
|
|
|
Managing Users and Groups |
|
|
91 | (18) |
|
|
|
91 | (4) |
|
Using Commands for User Management |
|
|
91 | (1) |
|
Assigning Users to Groups |
|
|
92 | (1) |
|
|
|
93 | (1) |
|
|
|
93 | (1) |
|
|
|
94 | (1) |
|
Modifying and Deleting User Accounts |
|
|
95 | (1) |
|
Going Behind the Commands: Configuration Files |
|
|
96 | (3) |
|
|
|
96 | (2) |
|
|
|
98 | (1) |
|
|
|
98 | (1) |
|
|
|
99 | (1) |
|
|
|
99 | (1) |
|
|
|
100 | (2) |
|
Using Commands for Group Management |
|
|
101 | (1) |
|
Going Behind the Commands: /etc/group |
|
|
101 | (1) |
|
Managing Authentication: PAM |
|
|
102 | (5) |
|
Creating a Default Policy for Security |
|
|
103 | (1) |
|
|
|
104 | (3) |
|
Managing the User's Shell Environment |
|
|
107 | (1) |
|
Creating Shell Login Scripts |
|
|
107 | (1) |
|
Displaying Messages to Users Logging In |
|
|
108 | (1) |
|
|
|
108 | (1) |
|
Managing Linux Permissions |
|
|
109 | (16) |
|
Granting Read, Write, and Execute: The Three Basic Linux Permissions |
|
|
109 | (3) |
|
Understanding Permissions and the Concept of Ownership |
|
|
110 | (1) |
|
|
|
111 | (1) |
|
Understanding Group Ownership |
|
|
111 | (1) |
|
Working with Advanced Linux Permissions |
|
|
112 | (2) |
|
|
|
114 | (3) |
|
Using chmod to Change Permissions |
|
|
114 | (2) |
|
Using umask to Set Default Permissions |
|
|
116 | (1) |
|
Working with Access Control Lists |
|
|
117 | (3) |
|
Using ACLs to Grant Permissions to More Than One Object |
|
|
118 | (1) |
|
|
|
119 | (1) |
|
|
|
119 | (1) |
|
Understanding ACL Limitations |
|
|
120 | (1) |
|
|
|
120 | (1) |
|
Apply Quota to Allow a Maximum Amount of Files |
|
|
121 | (3) |
|
Installing the Quota Software |
|
|
122 | (1) |
|
Preparing the File System for the Quota |
|
|
122 | (1) |
|
|
|
123 | (1) |
|
Setting the Quota for Users and Groups |
|
|
123 | (1) |
|
Starting the Quota Service |
|
|
124 | (1) |
|
|
|
124 | (1) |
|
Performing Daily File System Management Tasks |
|
|
125 | (14) |
|
|
|
125 | (5) |
|
|
|
125 | (3) |
|
|
|
128 | (1) |
|
Automating Mounts with /etc/fstab |
|
|
128 | (2) |
|
Checking File System Integrity |
|
|
130 | (1) |
|
|
|
130 | (2) |
|
Understanding Why You Want to Use Links |
|
|
131 | (1) |
|
Working with Symbolic Links |
|
|
131 | (1) |
|
|
|
132 | (1) |
|
|
|
132 | (4) |
|
Using tar to Create and Restore Backups |
|
|
132 | (3) |
|
Working with Magnetic Tapes |
|
|
135 | (1) |
|
Using dd to Make a Backup |
|
|
135 | (1) |
|
Using rsync to Synchronize Files |
|
|
136 | (1) |
|
Automating Backups with cron |
|
|
136 | (2) |
|
|
|
138 | (1) |
|
|
|
139 | (26) |
|
|
|
139 | (7) |
|
|
|
139 | (3) |
|
|
|
142 | (1) |
|
|
|
143 | (1) |
|
|
|
144 | (2) |
|
|
|
146 | (13) |
|
Designing a Partition Layout |
|
|
146 | (1) |
|
Creating Traditional Partitions |
|
|
147 | (4) |
|
Working with Logical Volumes |
|
|
151 | (8) |
|
Setting Up a Software RAID |
|
|
159 | (5) |
|
Understanding Your RAID Options |
|
|
160 | (1) |
|
Setting Up RAID 0 from the Command Line |
|
|
160 | (1) |
|
Creating a RAID 5 Array Using YaST |
|
|
161 | (2) |
|
|
|
163 | (1) |
|
|
|
164 | (1) |
|
|
|
165 | (14) |
|
Installing Software with YaST |
|
|
165 | (5) |
|
Installing from the Installation Media |
|
|
165 | (3) |
|
Selecting the Installation Source |
|
|
168 | (2) |
|
Installing Nondefault Software with YaST |
|
|
170 | (1) |
|
|
|
170 | (4) |
|
Compiling Software from Source |
|
|
174 | (1) |
|
|
|
175 | (2) |
|
Following the RPM Naming Convention |
|
|
176 | (1) |
|
Rebuilding the RPM Database |
|
|
176 | (1) |
|
Working with the rpm Command |
|
|
176 | (1) |
|
|
|
177 | (1) |
|
|
|
178 | (1) |
|
Managing the Boot Procedure |
|
|
179 | (24) |
|
Using GRUB and Its Configuration |
|
|
179 | (10) |
|
Working with the GRUB Configuration File |
|
|
180 | (3) |
|
|
|
183 | (6) |
|
Working with the GRUB Boot Menu |
|
|
189 | (1) |
|
Understanding the Kernel and Its initrd |
|
|
189 | (1) |
|
Using Init and /etc/inittab |
|
|
189 | (5) |
|
Working with the Boot Scripts |
|
|
194 | (3) |
|
Manually Tuning the Initial Boot Phase |
|
|
194 | (2) |
|
Using YaST to Tune the Initial Boot Procedure |
|
|
196 | (1) |
|
Including Your Own Services in boot.local |
|
|
197 | (1) |
|
Managing Services Start-Up |
|
|
197 | (5) |
|
Understanding the Concept of Runlevels |
|
|
197 | (1) |
|
Adding Services to a Runlevel Manually |
|
|
198 | (3) |
|
Using YaST to Add Services to a Runlevel |
|
|
201 | (1) |
|
|
|
202 | (1) |
|
|
|
203 | (12) |
|
Understanding the Different Kinds of Processes |
|
|
203 | (1) |
|
Running in the Foreground and Background |
|
|
204 | (1) |
|
Performing Day-to-Day Process Management |
|
|
205 | (7) |
|
|
|
205 | (3) |
|
Using Other Tools to Monitor System Activity |
|
|
208 | (2) |
|
|
|
210 | (1) |
|
|
|
211 | (1) |
|
|
|
212 | (2) |
|
Configuring the cron Service |
|
|
212 | (2) |
|
|
|
214 | (1) |
|
|
|
214 | (1) |
|
|
|
215 | (16) |
|
Reading the Boot Messages |
|
|
215 | (2) |
|
Getting Hardware Information |
|
|
217 | (3) |
|
Browsing the /proc File System |
|
|
217 | (2) |
|
Using YaST Hardware Information |
|
|
219 | (1) |
|
Using the syslog-ng Service |
|
|
220 | (4) |
|
|
|
220 | (1) |
|
Understanding syslog-ng.conf |
|
|
221 | (2) |
|
|
|
223 | (1) |
|
|
|
224 | (3) |
|
|
|
227 | (4) |
|
PART 3 Networking SUSE Linux Enterprise Server |
|
|
|
Connecting to the Network |
|
|
231 | (36) |
|
Configuring the Network Interface with YaST |
|
|
231 | (3) |
|
Adding a Network Card Manually |
|
|
234 | (6) |
|
Configuring the Network Interface from the Command Line |
|
|
240 | (7) |
|
Working with the network Script |
|
|
240 | (1) |
|
Using ifup, ifdown, and Related Tools |
|
|
241 | (1) |
|
|
|
242 | (2) |
|
|
|
244 | (3) |
|
|
|
247 | (2) |
|
|
|
247 | (1) |
|
|
|
248 | (1) |
|
The Neighbor Discovery Protocol |
|
|
248 | (1) |
|
Assigning IPv6 Addresses in SUSE Linux Enterprise Server |
|
|
248 | (1) |
|
|
|
249 | (2) |
|
Setting the Default Route with route |
|
|
249 | (2) |
|
Using the ip Tool to Specify the Default Gateway |
|
|
251 | (1) |
|
Storing Routing Information |
|
|
251 | (1) |
|
Configuring the DNS Resolver |
|
|
251 | (2) |
|
The Role of nsswitch.conf |
|
|
252 | (1) |
|
|
|
252 | (1) |
|
Tuning and Troubleshooting |
|
|
253 | (12) |
|
|
|
253 | (1) |
|
|
|
254 | (1) |
|
Testing Availability of Services |
|
|
255 | (4) |
|
Monitoring the Network Interface |
|
|
259 | (2) |
|
Monitoring Network Traffic |
|
|
261 | (3) |
|
Using the GNOME Network Tools |
|
|
264 | (1) |
|
|
|
265 | (2) |
|
Configuring a CUPS Print Server |
|
|
267 | (18) |
|
Installing a CUPS Printer |
|
|
267 | (3) |
|
|
|
270 | (1) |
|
|
|
271 | (11) |
|
|
|
271 | (6) |
|
Using the Web Interface for CUPS Management |
|
|
277 | (2) |
|
Tuning the CUPS Environment from the Command Line |
|
|
279 | (3) |
|
|
|
282 | (2) |
|
Installing a Linux CUPS Client |
|
|
282 | (1) |
|
Installing Windows As a Client for CUPS |
|
|
283 | (1) |
|
|
|
284 | (1) |
|
Sharing Files with SUSE Linux Enterprise Server |
|
|
285 | (32) |
|
|
|
285 | (9) |
|
|
|
285 | (2) |
|
Configuring an NFS Server |
|
|
287 | (4) |
|
Configuring an NFS Client |
|
|
291 | (3) |
|
Tuning and Monitoring the NFS Server |
|
|
294 | (1) |
|
|
|
294 | (20) |
|
Recognizing Samba Server Possibilities and Impossibilities |
|
|
294 | (1) |
|
Configuring the Samba Server |
|
|
295 | (5) |
|
Integrating CUPS with Samba |
|
|
300 | (2) |
|
Setting Up Samba As a Domain Controller |
|
|
302 | (2) |
|
Configuring Samba with YaST |
|
|
304 | (8) |
|
Implementing Client Access to the Samba Server |
|
|
312 | (2) |
|
|
|
314 | (2) |
|
Configuring the pure-ftpd Server |
|
|
314 | (1) |
|
Starting the pure-ftpd Server |
|
|
315 | (1) |
|
|
|
316 | (1) |
|
Configuring a Mail Server |
|
|
317 | (24) |
|
Understanding How a Mail Solution Works |
|
|
317 | (1) |
|
Configuring the Postfix MTA |
|
|
318 | (15) |
|
Handling Inbound and Outbound Mail |
|
|
318 | (4) |
|
Managing Postfix Components |
|
|
322 | (1) |
|
Configuring the Master Daemon |
|
|
323 | (1) |
|
Configuring Global Settings |
|
|
324 | (4) |
|
Tuning Postfix with Lookup Tables |
|
|
328 | (4) |
|
Using Postfix Management Tools |
|
|
332 | (1) |
|
Receiving E-mail Using IMAP or POP3 |
|
|
333 | (4) |
|
Fetching E-mail Using Cyrus IMAPd |
|
|
333 | (2) |
|
Filtering Incoming E-mail with Procmail |
|
|
335 | (1) |
|
Getting E-mail with POP3 Using Qpopper |
|
|
336 | (1) |
|
Using YaST to Set Up an MTA |
|
|
337 | (3) |
|
|
|
340 | (1) |
|
|
|
341 | (28) |
|
Centralizing Vital Information |
|
|
341 | (1) |
|
Structure of an LDAP Directory |
|
|
342 | (2) |
|
|
|
342 | (1) |
|
OpenLDAP Files and Directories |
|
|
343 | (1) |
|
Installing an OpenLDAP Directory with YaST |
|
|
344 | (10) |
|
Configuring the OpenLDAP Server During Installation |
|
|
344 | (3) |
|
Configuring OpenLDAP on an Operational Server |
|
|
347 | (7) |
|
Setting Up the SUSE Linux Enterprise Server LDAP Client |
|
|
354 | (5) |
|
Tuning LDAP Configuration Files |
|
|
359 | (5) |
|
Configuring the OpenLDAP Server |
|
|
359 | (4) |
|
Configuring the LDAP Client |
|
|
363 | (1) |
|
Adding, Querying, and Modifying Entries in the Directory |
|
|
364 | (3) |
|
|
|
364 | (2) |
|
Adding Entries with Idapadd |
|
|
366 | (1) |
|
Modifying Entries with Idapmodify |
|
|
366 | (1) |
|
Deleting Entries with Idapdelete |
|
|
366 | (1) |
|
Using Idapsearch to Query the Directory |
|
|
366 | (1) |
|
|
|
367 | (2) |
|
|
|
369 | (14) |
|
Understanding How Secure Shell Works |
|
|
369 | (3) |
|
Working with Public/Private Key Pairs |
|
|
370 | (1) |
|
Working with Secure Shell |
|
|
370 | (2) |
|
|
|
372 | (2) |
|
Using Key-Based Authentication |
|
|
374 | (3) |
|
|
|
374 | (1) |
|
Using Public/Private Key-Based Authentication in an SSH Environment |
|
|
375 | (1) |
|
Setting Up SSH for Key-Based Authentication |
|
|
375 | (1) |
|
Caching Keys with ssh-agent |
|
|
376 | (1) |
|
Tunneling Traffic with SSH |
|
|
377 | (2) |
|
|
|
377 | (1) |
|
Using Generic TCP Port Forwarding |
|
|
378 | (1) |
|
Using Other Methods for Remote Access |
|
|
379 | (3) |
|
Using VNC for Remote Access to Graphical Screens |
|
|
379 | (2) |
|
|
|
381 | (1) |
|
Securing VNC Remote Access with SSH |
|
|
381 | (1) |
|
Using screen to Synchronize Remote Sessions |
|
|
382 | (1) |
|
|
|
382 | (1) |
|
|
|
383 | (10) |
|
Configuring xinetd with YaST |
|
|
383 | (3) |
|
|
|
386 | (4) |
|
Managing the xinetd Daemon |
|
|
386 | (1) |
|
|
|
386 | (3) |
|
Tuning the Individual Services |
|
|
389 | (1) |
|
Tuning Access to Services with TCP Wrapper |
|
|
390 | (2) |
|
Working with /etc/hosts.allow and /etc/hosts.deny |
|
|
390 | (2) |
|
Why You Shouldn't Use TCP Wrapper |
|
|
392 | (1) |
|
|
|
392 | (1) |
|
Configuring SUSE Linux Enterprise Server As an NTP Time Server |
|
|
393 | (8) |
|
Understanding NTP Fundamentals |
|
|
393 | (2) |
|
Configuring a Stand-Alone NTP Time Server |
|
|
395 | (1) |
|
|
|
395 | (1) |
|
Pulling or Pushing the Time |
|
|
396 | (1) |
|
|
|
396 | (2) |
|
|
|
396 | (1) |
|
|
|
397 | (1) |
|
|
|
397 | (1) |
|
Configuring an NTP Client |
|
|
398 | (1) |
|
Checking NTP Synchronization Status |
|
|
398 | (2) |
|
|
|
400 | (1) |
|
|
|
401 | (18) |
|
|
|
401 | (2) |
|
|
|
402 | (1) |
|
The Need for a Certificate Authority |
|
|
402 | (1) |
|
|
|
403 | (14) |
|
Creating Certificates and a Certificate Authority with YaST |
|
|
403 | (10) |
|
Other YaST Certificate Authority Management Options |
|
|
413 | (1) |
|
The Common Server Certificate Interface |
|
|
414 | (1) |
|
Managing Certificates from the Command Line |
|
|
414 | (3) |
|
|
|
417 | (2) |
|
Configuring the Apache Web Server |
|
|
419 | (18) |
|
Understanding How a Web Server Works |
|
|
419 | (1) |
|
Installing Apache on SUSE Linux Enterprise Server |
|
|
420 | (4) |
|
Installing the Right Packages |
|
|
420 | (1) |
|
Starting, Stopping, and Testing the Apache Web Server |
|
|
421 | (2) |
|
Exploring the Configuration Files |
|
|
423 | (1) |
|
Understanding the Structure of the Apache Configuration Files |
|
|
423 | (1) |
|
Checking the Configuration |
|
|
424 | (1) |
|
Configuring Apache with YaST |
|
|
424 | (5) |
|
Working with Virtual Hosts |
|
|
429 | (2) |
|
Managing Access to the Web Server |
|
|
431 | (3) |
|
Configuring Host-Based Access Restrictions |
|
|
431 | (1) |
|
Configuring User-Based Access Restrictions |
|
|
432 | (2) |
|
Using OpenSSL for Encrypted Connections |
|
|
434 | (2) |
|
Performance Tuning Your Web Server |
|
|
436 | (1) |
|
|
|
436 | (1) |
|
|
|
437 | (24) |
|
|
|
437 | (5) |
|
Methods of Name Resolving |
|
|
437 | (2) |
|
Organization of the DNS Hierarchy |
|
|
439 | (1) |
|
|
|
440 | (1) |
|
Connecting the Name Servers in the Hierarchy |
|
|
440 | (1) |
|
|
|
441 | (1) |
|
|
|
442 | (15) |
|
Configuring DNS with YaST |
|
|
442 | (11) |
|
Configuring DNS from Its Configuration Files |
|
|
453 | (4) |
|
|
|
457 | (2) |
|
|
|
459 | (2) |
|
Configuring a DHCP Server |
|
|
461 | (18) |
|
Understanding How DHCP Works |
|
|
461 | (1) |
|
Configuring a DHCP Server from YaST |
|
|
462 | (7) |
|
Configuring the DHCP Service Manually |
|
|
469 | (4) |
|
|
|
470 | (1) |
|
The Configuration File /var/lib/dhcp/etc/dhcpd.conf |
|
|
470 | (2) |
|
The Start-up Configuration File /etc/sysconfig/dhcpd |
|
|
472 | (1) |
|
Setting Advanced Configuration Options |
|
|
473 | (4) |
|
|
|
473 | (2) |
|
|
|
475 | (1) |
|
|
|
475 | (2) |
|
|
|
477 | (2) |
|
Configuring the Squid Web Proxy Cache |
|
|
479 | (14) |
|
|
|
479 | (1) |
|
Installing Squid and Performing the Initial Configuration |
|
|
480 | (5) |
|
|
|
481 | (1) |
|
|
|
481 | (1) |
|
Specifying Log Files and Cache Directories |
|
|
482 | (1) |
|
Optimizing Squid Performance |
|
|
483 | (1) |
|
|
|
484 | (1) |
|
|
|
485 | (1) |
|
Securing the Proxy with ACLs |
|
|
485 | (2) |
|
Configuring User Authentication |
|
|
487 | (2) |
|
|
|
489 | (1) |
|
Configuring Squid for SSL Traffic |
|
|
489 | (1) |
|
Configuring Clients for Squid Usage |
|
|
490 | (1) |
|
Using Squid As a Transparent Proxy |
|
|
490 | (1) |
|
|
|
491 | (2) |
|
|
|
493 | (10) |
|
Understanding Kernel Modules |
|
|
493 | (6) |
|
|
|
494 | (1) |
|
|
|
494 | (1) |
|
|
|
494 | (1) |
|
Loading Modules Automatically |
|
|
495 | (1) |
|
Using udev to Load Kernel Modules |
|
|
496 | (3) |
|
Tuning the Kernel Source Files (or Not) |
|
|
499 | (3) |
|
Understanding SUSE Kernel Backgrounds |
|
|
499 | (1) |
|
|
|
500 | (1) |
|
|
|
501 | (1) |
|
|
|
502 | (1) |
|
Introducing Shell Scripting |
|
|
503 | (24) |
|
|
|
503 | (7) |
|
To Script or Not to Script? |
|
|
503 | (1) |
|
|
|
504 | (1) |
|
Basic Elements of a Shell Script |
|
|
504 | (1) |
|
|
|
505 | (2) |
|
Making a Script Interactive |
|
|
507 | (1) |
|
|
|
508 | (1) |
|
|
|
509 | (1) |
|
|
|
510 | (4) |
|
|
|
510 | (1) |
|
|
|
511 | (1) |
|
|
|
511 | (2) |
|
Pattern-Matching Operators |
|
|
513 | (1) |
|
Performing Calculations in Scripts |
|
|
514 | (3) |
|
|
|
517 | (6) |
|
Using if . . . then . . . else |
|
|
518 | (2) |
|
|
|
520 | (2) |
|
|
|
522 | (1) |
|
|
|
522 | (1) |
|
|
|
523 | (1) |
|
|
|
523 | (1) |
|
|
|
524 | (1) |
|
|
|
525 | (2) |
|
Tuning and Optimizing SUSE Linux |
|
|
527 | (16) |
|
|
|
527 | (3) |
|
Optimizing Usage of Swap Space |
|
|
528 | (1) |
|
|
|
529 | (1) |
|
Adding Swap Space on the Fly |
|
|
529 | (1) |
|
Using ulimit to Set Resource Limits |
|
|
530 | (1) |
|
|
|
531 | (7) |
|
Understanding the /proc File System |
|
|
531 | (2) |
|
|
|
533 | (1) |
|
|
|
534 | (3) |
|
Using the Powertweak Utility |
|
|
537 | (1) |
|
|
|
538 | (2) |
|
|
|
540 | (3) |
|
PART 4 Advanced SUSE Linux Enterprise Server Configuration |
|
|
|
Configuring SUSE Linux Enterprise Server 10 for High-Availability Clustering |
|
|
543 | (30) |
|
Introducing Linux Clustering |
|
|
543 | (15) |
|
Designing an HA Cluster Solution |
|
|
544 | (1) |
|
|
|
545 | (13) |
|
Using Heartbeat for High Availability |
|
|
558 | (5) |
|
Editing the Sample Configuration Files |
|
|
559 | (1) |
|
Using Authentication Keys to Ensure Secure Communications |
|
|
559 | (1) |
|
Tuning the Main Configuration File ha.cf on Both Nodes |
|
|
559 | (2) |
|
Creating Shared Resources by Editing the haresources File |
|
|
561 | (2) |
|
Managing the Shared Resource |
|
|
563 | (1) |
|
|
|
564 | (1) |
|
Configuring a Heartbeat 2--Style Cluster with YaST |
|
|
565 | (7) |
|
|
|
565 | (3) |
|
|
|
568 | (4) |
|
|
|
572 | (1) |
|
|
|
572 | (1) |
|
Managing Access with the SUSE Firewall |
|
|
573 | (20) |
|
Before Configuring the Firewall |
|
|
573 | (4) |
|
Configuring the SUSE Firewall with YaST |
|
|
577 | (7) |
|
Tuning Netfilter with iptables |
|
|
584 | (7) |
|
Making Proper Preparations |
|
|
584 | (1) |
|
Netfilter Building Blocks |
|
|
585 | (1) |
|
Using iptables to Create a Firewall |
|
|
586 | (5) |
|
|
|
591 | (2) |
|
Using Xen to Create a Virtual Environment |
|
|
593 | (16) |
|
Working with Xen Virtualization |
|
|
593 | (2) |
|
|
|
594 | (1) |
|
|
|
594 | (1) |
|
|
|
595 | (7) |
|
Preparing for Xen Installation |
|
|
595 | (1) |
|
Installing the Xen Domain-0 |
|
|
595 | (2) |
|
Installing the First Virtual Machine |
|
|
597 | (5) |
|
|
|
602 | (4) |
|
Managing Xen from the Command Line |
|
|
602 | (3) |
|
Managing Virtual Machines from YaST |
|
|
605 | (1) |
|
|
|
606 | (1) |
|
Migrating Virtual Machines |
|
|
607 | (1) |
|
|
|
608 | (1) |
|
Using AppArmor to Secure Applications |
|
|
609 | (12) |
|
Exploring the AppArmor Components |
|
|
609 | (2) |
|
Managing AppArmor Profiles with YaST |
|
|
611 | (7) |
|
|
|
611 | (5) |
|
|
|
616 | (1) |
|
|
|
617 | (1) |
|
Managing AppArmor Profiles from the Command Line |
|
|
618 | (2) |
|
Creating a Profile with genprof |
|
|
618 | (1) |
|
Monitoring AppArmor's Status |
|
|
618 | (2) |
|
|
|
620 | (1) |
|
Configuring Service Location Protocol |
|
|
621 | (10) |
|
Understanding How SLP Works |
|
|
621 | (1) |
|
Configuring an SLP Server |
|
|
622 | (4) |
|
Configuring OpenSLP from YaST |
|
|
622 | (2) |
|
|
|
624 | (2) |
|
|
|
626 | (2) |
|
Browsing Available Services |
|
|
628 | (1) |
|
|
|
629 | (2) |
|
Troubleshooting SUSE Linux Enterprise Server |
|
|
631 | (16) |
|
|
|
631 | (5) |
|
|
|
631 | (3) |
|
Checking Application Availability |
|
|
634 | (1) |
|
|
|
635 | (1) |
|
Troubleshooting from the GRUB Boot Prompt |
|
|
636 | (2) |
|
|
|
638 | (2) |
|
Using the Repair an Installed System Option |
|
|
640 | (5) |
|
|
|
645 | (2) |
|
Creating an Installation Server |
|
|
647 | (16) |
|
Creating an Installation Server |
|
|
648 | (5) |
|
Configuring TFTP for PXE Boot |
|
|
653 | (2) |
|
Installing a Server Automatically with AutoYaST |
|
|
655 | (4) |
|
Performing Remote Installations Using SSH or VNC |
|
|
659 | (2) |
|
Performing a Remote Installation with SSH |
|
|
659 | (1) |
|
|
|
660 | (1) |
|
|
|
661 | (2) |
| Index |
|
663 | |