Muutke küpsiste eelistusi

RHCSA/RHCE Red Hat Linux Certification Study Guide (Exams EX200 & EX300) 6th edition [Raamat]

  • Formaat: Book, 1072 pages, kõrgus x laius x paksus: 231x185x51 mm, kaal: 1731 g, 200 Illustrations
  • Sari: Certification Press
  • Ilmumisaeg: 16-Aug-2011
  • Kirjastus: McGraw-Hill Professional
  • ISBN-10: 0071765654
  • ISBN-13: 9780071765657
Teised raamatud teemal:
  • Raamat
  • Hind: 72,19 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Book, 1072 pages, kõrgus x laius x paksus: 231x185x51 mm, kaal: 1731 g, 200 Illustrations
  • Sari: Certification Press
  • Ilmumisaeg: 16-Aug-2011
  • Kirjastus: McGraw-Hill Professional
  • ISBN-10: 0071765654
  • ISBN-13: 9780071765657
Teised raamatud teemal:

Fully revised to cover the Red Hat Certified Engineer exam revision based on Red Hat Enterprise Linux 6

Updated for the release of Red Hat Enterprise Linux 6 and the related Red Hat Certified Engineer certification exam revision, RHCE Red Hat Certified Engineer Linux Study Guide, Sixth Edition provides complete coverage of all official exam objectives and the revised format for the RHCE exam. The RHCE exam revises twice annually and the latest exam update has removed multiple-choice questions from the exam completely, moving to a solely lab-based testing format. This integrated study system is based on proven pedagogy. Special elements reinforce and teach practical skills while preparing you for this difficult, hands-on exam.

Each chapter includes step-by-step exercises, exam watch and on-the-job elements, chapter drills, and self tests. Self-test sections include simulated lab questions that mimic the look and feel of the actual exam. The study guide also includes two complete practice lab exams available on the CD-ROM. All practice exam lab questions receive detailed explanations as to why the answer is the correct answer.

RHCE Red Hat Certified Engineer Linux Study Guide, Sixth Edition

  • Offers proven lab-based exam preparation for RHCE; plus coverage of the RHCT exam objectives
  • Provides complete coverage of all exam objectives and performance-based requirements related to the exam, including difficult lab-based questions
  • Includes two complete RHCE practice exams—purchased separately, practice exams can cost more than $50; each exam features hands-on lab exams

Covers all exam objectives:
Red Hat Exam Prerequisites; Installation on Real and Virtual Systems; A RHCT View of the Boot Process; Linux Filesystem Administration; Package Management; Local User Administration; RHCT Level System Administration; The X Window and RHCT Level Troubleshooting; A Security Primer; GRUB, System Services, Network Authentication, and Encryption; Apache and Squid; Network File Sharing Services; The Network Configuration Services: DNS, DHCP, and NTP; Electronic Mail; RHCE Troubleshooting

About the Contributors v
Acknowledgments xxix
Preface xxxi
Introduction xliii
1 Prepare for Red Hat Hands-on Certifications
1(68)
The RHCSA and RHCE Exams
5(3)
The Exam Experience
5(1)
The RHCSA Exam
6(1)
The RHCE Exam
7(1)
If You're Studying "Just" for the RHCSA Exam
7(1)
Evolving Requirements
7(1)
Basic Hardware Requirements
8(5)
Hardware Compatibility
8(1)
Architectures
9(1)
RAM Requirements
10(1)
Hard Drive Options
11(1)
Networking
12(1)
Virtual Machine Options
12(1)
Get Red Hat Enterprise Linux
13(3)
Purchase a Subscription
14(1)
Get an Evaluation Copy
14(1)
Third-Party Rebuilds
14(1)
Check the Download
15(1)
Installation Requirements
16(4)
You Won't Start from Scratch
17(1)
The Advantages of Network Installation
17(1)
Red Hat and Virtual Machines
17(1)
Virtual and Physical Systems
18(1)
A Pre-installed Environment for Practice Labs
18(1)
System Roles
19(1)
Installation Options
20(27)
Boot Media
21(1)
CD/DVD or Boot USB Starts Installation
22(1)
Basic Installation Steps
23(8)
The Installation Perspective on Partitions
31(4)
Partition Creation Exercises
35(2)
Exercise 1-1 Partitioning During Installation
37(2)
Configure the Bootloader
39(1)
Wow, Look at All That Software!
40(2)
Baseline Packages
42(1)
Package Groups
43(2)
On Reboot
45(2)
System Setup Options
47(4)
The First Boot Process
47(3)
Default Security Settings
50(1)
Special Setup Options for Virtual Machines
51(1)
Configure Default File Sharing Services
51(10)
Mount and Copy the Installation DVD
52(1)
Set Up a Default Configuration Apache Server
53(2)
Exercise 1-2 Configure Apache as an Installation Server
55(1)
Share Copied Files via FTP Server
56(3)
Two-Minute Drill
59(2)
Q&A Self Test
61(8)
Lab Questions
62(3)
Self Test Answers
65(1)
Lab Answers
66(3)
2 Virtual Machines and Automated Installations
69(66)
Configure KVM for Red Hat
70(12)
Why Virtual Machines
72(1)
If You Have to Install KVM
72(2)
The Right KVM Modules
74(1)
Configure the Virtual Machine Manager
75(3)
Exercise 2-1 Create a Second Virtual Network
78(4)
Configure a Virtual Machine on KVM
82(14)
Configure a Virtual Machine on KVM
83(5)
Exercise 2-2 Add Virtual Hard Drives
88(2)
KVM Configuration Files
90(1)
Control Virtual Machines from the Command Line
90(6)
Automated Installation Options
96(16)
Kickstart Concepts
97(1)
Set Up Local Access to Kickstart
97(2)
Set Up Network Access to Kickstart
99(1)
Sample Kickstart File
100(5)
Exercise 2-3 Create and Use a Sample Kickstart File
105(2)
The Kickstart Configurator
107(5)
Administration with the Secure Shell
112(4)
Configure an SSH Client
112(1)
Command Line Access
113(1)
More SSH Command Line Tools
114(1)
Graphical Secure Shell Access
115(1)
Consider Adding These Command Line Tools
116(10)
Checking Ports with telnet
116(1)
Checking Ports with nmap
117(1)
Configure an E-Mail Client
118(1)
The Use of Text and Graphical Browsers
119(2)
Using lftp to Access URLs
121(3)
Two-Minute Drill
124(2)
Q&A Self Test
126(9)
Lab Questions
127(3)
Self Test Answers
130(1)
Lab Answers
131(4)
3 Fundamental Command Line Skills
135(66)
Shells
139(4)
Other Shells
139(1)
Terminal Consoles
140(1)
GUI Shell Interfaces
140(1)
Differences Between Regular and Administrative Users
141(1)
Text Streams and Command Redirection
142(1)
Standard Command Line Tools
143(9)
File and Directory Concepts
144(2)
File Lists and Is
146(1)
File Creation Commands
147(4)
Wildcards
151(1)
File Searches
151(1)
The Management of Text Files
152(11)
Commands to Read Text Streams
153(2)
Commands to Process Text Streams
155(2)
Edit Text Files at the Console
157(2)
Exercise 3-1 Using vi to Create a New User
159(3)
If You Don't Like vi
162(1)
Edit Text Files in the GUI
163(1)
Local Online Documentation
163(5)
When You Need Help
164(1)
A Variety of man Pages
165(2)
The info Manuals
167(1)
Detailed Documentation in /usr/share/doc
167(1)
A Networking Primer
168(9)
IP Version 4 Numbers and Address Classes
168(1)
Basic IP Version 6 Addressing
169(1)
How to Define a Network with IP Addresses
170(1)
Tools, Commands, and Gateways
171(6)
Network Configuration and Troubleshooting
177(18)
Network Configuration Files
177(4)
Network Configuration Tools
181(2)
Exercise 3-2 Configure a Network Card
183(4)
Hostname Configuration Files
187(2)
Hostname Configuration Options
189(1)
The Network Manager Applet
189(3)
Two-Minute Drill
192(3)
Q&A Self Test
195(6)
Lab Questions
196(1)
Self Test Answers
197(1)
Lab Answers
198(3)
4 RHCSA-Level Security Options
201(62)
Basic File Permissions
204(8)
File Permissions and Ownership
204(2)
Basic User and Group Concepts
206(1)
The umask
207(1)
Commands to Change Permissions and Ownership
208(3)
Special File Attributes
211(1)
Access Control Lists and More
212(9)
Every File Already Has an ACL
212(1)
Make a Filesystem ACL Friendly
213(1)
Manage ACLs on a File
213(3)
Configure a Directory for ACLs
216(1)
Special Restrictions with ACLs
217(1)
ACLs and Masks
218(1)
Exercise 4-1 Use ACLs to Deny a User
218(1)
NFS Shares and ACLs
219(2)
Basic Firewall Control
221(14)
Standard Ports
222(1)
A Focus on iptables
223(2)
Keep That Firewall in Operation
225(1)
The Default RHEL 6 Firewall
225(3)
The Firewall Configuration Tools
228(6)
Exercise 4-2 Adjust Firewall Settings
234(1)
A Security-Enhanced Linux Primer
235(21)
Basic Features of SELinux
235(1)
SELinux Status
235(2)
SELinux Configuration at the Command Line
237(1)
Configure Basic SELinux Settings
237(1)
Configure Regular Users for SELinux
238(2)
Manage SELinux Boolean Settings
240(1)
List and Identify SELinux File Contexts
241(1)
Restore SELinux File Contexts
242(1)
Identify SELinux Process Contexts
242(1)
Diagnose and Address SELinux Policy Violations
243(3)
The GUI SELinux Management Tool
246(5)
The SELinux Troubleshoot Browser
251(1)
Exercise 4-3 Test an SELinux User Type
252(2)
Two-Minute Drill
254(2)
Q&A Self Test
256(7)
Lab Questions
257(1)
Self Test Answers
258(1)
Lab Answers
259(4)
5 The Boot Process
263(68)
The BIOS and the UEFI
265(3)
Basic System Configuration
265(1)
Startup Menus
266(1)
Access to Linux Bootloaders
267(1)
Bootloaders and GRUB
268(17)
GRUB, the GRand Unified Bootloader
269(1)
Boot into Different Runlevels
269(2)
Exercise 5-1 Boot into a Different Runlevel
271(1)
Modify the System Bootloader
272(3)
More Options
275(1)
GRUB Security and Password Protection
276(1)
How to Update GRUB
276(1)
Effects of GRUB Errors
277(1)
The GRUB Command Line
278(1)
Exercise 5-2 Using the GRUB Command Line
279(1)
Create Your Own GRUB Configuration File
280(1)
An Option to Booting from GRUB: Rescue Mode
281(4)
Between GRUB and Login
285(9)
Kernels and the Initial RAM Disk
285(2)
The First Process, Runlevels, and Services
287(1)
Switch Between Runlevels
288(1)
Reboot and Shut Down a System Normally
288(1)
Upstart Replaces SysVInit
289(1)
Upstart Configuration Files
290(3)
Terminals and Login Screens
293(1)
Control by Runlevel
294(6)
Functionality by Runlevel
294(2)
The Innards of Runlevel Scripts
296(1)
Service Configuration from the Command Line
296(2)
The Text Console Service Configuration Tool
298(1)
The GUI Service Configuration Tool
299(1)
Network Configuration
300(15)
Network Configuration Commands
301(5)
Network Configuration Files
306(1)
The /etc/sysconfig/network-scripts Files
307(1)
Red Hat Configuration Tools
308(2)
Exercise 5-3 Modify Network Interfaces with the Network Connections Tool
310(2)
Configure Name Resolution
312(1)
Exercise 5-4 Revise Network Interfaces on a Cloned System
313(2)
Time Synchronization
315(6)
An NTP Client
316(1)
Date/Time Properties
316(3)
Two-Minute Drill
319(2)
Q&A Self Test
321(10)
Lab Questions
322(1)
Self Test Answers
323(1)
Lab Answers
324(7)
6 Linux Filesystem Administration
331(78)
Storage Management and Partitions
333(18)
Current System State
334(1)
The fdisk Utility
335(7)
The parted Utility
342(6)
Graphical Options
348(2)
Exercise 6-1 Work with fdisk and parted
350(1)
Filesystem Formats
351(7)
Standard Formatting Filesystems
352(1)
Journaling Filesystems
352(2)
Filesystem Format Commands
354(1)
Swap Volumes
355(1)
Filesystem Check Commands
355(1)
Filesystem Conversions
356(1)
Exercise 6-2 Format, Check, and Mount Different Filesystem
357(1)
Basic Linux Filesystems and Directories
358(3)
Separate Linux Filesystems
358(1)
Directories That Can Be Mounted Separately
359(2)
Logical Volume Management (LVM)
361(14)
Definitions in LVM
361(1)
Create a Physical Volume
362(1)
Create a Volume Group
362(1)
Create a Logical Volume
363(1)
Make Use of a Logical Volume
363(1)
More LVM Commands
363(4)
Remove a Logical Volume
367(1)
Resize Logical Volumes
367(1)
The GUI Logical Volume Management Tool
368(7)
Volume Encryption with the Linux Unified Key Setup
375(6)
Passwords, Passphrases, and More
375(1)
Encryption During Installation
376(1)
Prepare and Initialize Encryption
377(1)
Prepare the New Filesystem
378(1)
Create the New Filesystem
378(3)
Filesystem Management
381(9)
The /etc/fstab File
382(2)
Universally Unique Identifiers in/etc/fstab
384(1)
The mount Command
384(2)
More Filesystem Mount Options
386(1)
Virtual Filesystems
387(1)
Add Your Own Filesystems to/etc/fstab
387(1)
Removable Media and/etc/fstab
388(1)
Networked Filesystems
389(1)
The Automounter
390(11)
Mounting via the Automounter
390(6)
Exercise 6-3 Configure the Automounter
396(3)
Two-Minute Drill
399(2)
Q&A Self Test
401(8)
Lab Questions
403(1)
Self Test Answers
404(1)
Lab Answers
405(4)
7 Package Management
409(56)
The Red Hat Package Manager
411(9)
What Is a Package?
411(1)
What Is a Red Hat Package?
412(1)
What Is a Repository?
412(1)
Install an RPM Package
413(2)
Uninstall an RPM Package
415(1)
Install RPMs from Remote Systems
415(1)
RPM Installation Security
416(2)
Special RPM Procedures with the Kernel
418(2)
More RPM Commands
420(4)
Package Queries
421(1)
Package Signatures
421(1)
File Verification
422(2)
Different Databases of Installed Packages
424(1)
Dependencies and the yum Command
424(23)
An Example of Dependency Hell
424(2)
Relief from Dependency Hell
426(1)
Basic yum Configuration
427(1)
The Basic yum Configuration File: yum.conf
428(2)
Configuration Files in the /etc/yum/pluginconf.d Directory
430(1)
Configuration Files in the /etc/yum.repos.d Directory
431(3)
Create Your Own /etc/yum.repos.d Configuration File
434(3)
Exercise 7-1 Create a yum Repository from the RHEL 6 DVD
437(1)
Third-Party Repositories
438(1)
Basic yum Commands
439(1)
Installation Mode
439(2)
Security and yum
441(1)
Updates and Security Fixes
442(1)
Package Groups and yum
442(2)
More yum Commands
444(3)
More Package Management Tools
447(11)
The GNOME Software Update Tool
448(1)
Automated Updates
448(2)
GNOME Add/Remove Software Tool
450(1)
Exercise 7-2 Installing More with yum and the
451(1)
Software Tool
451(2)
The Red Hat Network
453(3)
Two-Minute Drill
456(2)
Q&A Self Test
458(7)
Lab Questions
459(1)
Self Test Answers
460(1)
Lab Answers
461(4)
8 User Administration
465(50)
User Account Management
467(16)
Different Kinds of Users
467(1)
The Shadow Password Suite
468(5)
Command Line Tools
473(3)
Exercise 8-1 Add a User with the Red Hat User Manager
476(2)
Exercise 8-2 Real and Fake Shells
478(1)
Delete a User
478(1)
Modify an Account
479(1)
More User and Group Management Commands
480(3)
Administrative Control
483(5)
The Ability to Log In as root
483(1)
Exercise 8-3 Limit root Logins
483(1)
The Ability to Log In
484(1)
The Proper Use of the su Command
485(1)
Limit Access to su
486(1)
The Proper Use of the sg Command
486(1)
Custom Administrators with the sudo Command
486(2)
Other Administrative Users
488(1)
User and Shell Configuration
488(5)
Home Directories and /etc/skel
489(1)
/etc/bashrc
490(1)
/etc/profile and /etc/profile.d
490(1)
/etc/profile.d
491(1)
Exercise 8-4 Another Way to Secure a System
491(1)
Shell Configuration Files in User Home Directories
492(1)
Login, Logout, and User Switching
492(1)
Users and Network Authentication
493(7)
LDAP Client Configuration
494(2)
The Name Service Switch File
496(1)
Red Hat Network Authentication Tools
497(3)
Special Groups
500(8)
Standard and Red Hat Groups
501(1)
Shared Directories
501(1)
Exercise 8-5 Control Group Ownership with the SGID Bit
502(4)
Two-Minute Drill
506(2)
Q&A Self Test
508(7)
Lah Questions
509(1)
Self Test Answers
510(1)
Lah Answers
511(4)
9 RHCSA-Level System Administration Tasks
515(48)
Configure Access with VNC
517(10)
Install and Configure a TigerVNC Server
518(1)
The GNOME-Based vino Server
519(2)
Install and Configure a VNC Client
521(2)
Firewall Options
523(1)
Confirm Access to a VNC Server
524(1)
Route Through a Secure Shell
525(1)
More VNC Configuration
526(1)
A User VNC Configuration File
526(1)
Elementary System Administration Commands
527(12)
System Resource Management Commands
527(9)
Archives and Compression
536(2)
Control Services Through Daemons
538(1)
Automate System Administration: cron and at
539(9)
The System crontab and Components
539(3)
Hourly cron Jobs
542(1)
Regular Anacron Jobs
543(1)
Setting Up cron for Users
544(1)
Exercise 9-1 Create a cron Job
545(1)
Running a Job with the ar System
545(1)
Secure cron and at
546(2)
Local Log File Analysis
548(9)
System Log Configuration File
548(2)
Log File Management
550(1)
A Variety of Log Files
551(1)
Service Specific Logs
552(1)
Exercise 9-2 Learn the Log Files
552(3)
Two-Minute Drill
555(2)
Q&A Self Test
557(6)
Lab Questions
558(1)
Self Test Answers
559(1)
Lab Answers
560(3)
10 A Security Primer
563(66)
The Layers of Linux Security
564(9)
Bastion Systems
565(1)
Best Defenses with Security Updates
566(1)
Service-Specific Security
567(2)
Host-Based Security
569(1)
User-Based Security
569(1)
Console Security
570(1)
Recommendations from the U.S. National Security Agency
570(1)
The PolicyKit
571(2)
Firewalls and Network Address Translation
573(18)
Definitions
573(1)
The Structure of the iptables Command
574(3)
The Default Firewall
577(1)
Recommendations from the NSA
577(3)
Make Sure the Firewall Is Running
580(1)
IP Masquerading
580(2)
IP Forwarding
582(1)
The Red Hat Firewall Configuration Tool
583(8)
The Extended Internet Super-Server
591(5)
Generic xinetd Configuration
592(1)
Service-Specific xinetd Configuration
593(2)
Exercise 10-1 Configure xinetd
595(1)
TCP Wrappers
596(4)
Is a Service Protected by TCP Wrappers?
596(1)
TCP Wrappers Configuration Files
597(2)
Exercise 10-2 Configure TCP Wrappers
599(1)
Pluggable Authentication Modules
600(11)
Configuration Files
601(1)
Control Flags
602(2)
The Format of a PAM File
604(4)
Exercise 10-3 Configure PAM
608(1)
PAM and User-Based Security
608(2)
Exercise 10-4 Use PAM to Limit User Access
610(1)
Secure Files and More with GPG2
611(9)
GPG2 Commands
612(1)
Current GPG2 Configuration
612(1)
GPG2 Encryption Options
613(1)
Generate a GPG2 Key
613(3)
Use a GPG2 Key to Secure a File
616(2)
Two-Minute Drill
618(2)
Q&A Self Test
620(9)
Lab Questions
622(1)
Self Test Answers
623(1)
Lab Answers
624(5)
11 System Services and SELinux
629(52)
Red Hat System Configuration
631(6)
Service Management
631(1)
System Services
632(3)
Bigger Picture Configuration Process
635(1)
Available Configuration Tools
635(2)
Security-Enhanced Linux
637(11)
Options in the SELinux Booleans Directory
637(2)
Service Categories of SELinux Booleans
639(1)
Boolean Configuration with the SELinux Management Tool
639(1)
Boolean Settings
640(5)
SELinux File Contexts
645(2)
Exercise 11-1 Configure a New Directory with Appropriate SELinux Contexts
647(1)
The Secure Shell Server
648(15)
SSH Configuration Commands
648(1)
SSH Configuration Files
649(1)
Basic Encrypted Communication
650(2)
Set Up a Private/Public Pair for Key-Based Authentication
652(2)
Configure an SSH Server
654(8)
User-Based Security for SSH
662(1)
Host-Based Security for SSH
662(1)
A Security and Configuration Checklist
663(13)
Installation of Server Services
663(4)
Basic Configuration
667(1)
Make Sure the Service Survives a Reboot
667(1)
Review Access Through Layers of Security
668(3)
Exercise 11-2 Review the Different Effects of iptables and TCP Wrappers
671(3)
Two-Minute Drill
674(2)
Q&A SelfTest
676(5)
Lab Questions
677(1)
Self Test Answers
678(1)
Lab Answers
679(2)
12 RHCE Administrative Tasks
681(46)
Automate System Maintenance
683(6)
Standard Administrative Scripts
683(2)
Script Commands
685(2)
Create Your Own Administrative Scripts
687(1)
Exercise 12-1 Create a Script
688(1)
Kernel Run-Time Parameters
689(3)
How sysctl Works with /etc/sysctl.conf
689(1)
Settings in the/etc/sysctl.conf File
690(1)
Exercise 12-2 Disable Responses to the ping Command
691(1)
Create an RPM Package
692(12)
Source RPMs
693(1)
The Directory Structure of an RPM Source
694(2)
Create Custom Source Code
696(1)
One More Prep Package
697(1)
Create Your Own spec File
698(4)
Build Your Own RPM
702(1)
The Built RPMs
703(1)
Special Network Options
704(15)
Configure Special IP Routes
704(4)
Set Up a Kerberos Client
708(4)
Connect to Remote iSCSl Storage
712(5)
Two-Minute Drill
717(2)
Q&A Self Test
719(8)
Lab Questions
720(1)
Self Test Answers
721(1)
Lab Answers
722(5)
13 Electronic Mail Servers
727(42)
A Variety of E-Mail Agents
729(7)
Definitions and Protocols
729(1)
Relevant Mail Server Packages
730(1)
Use alternatives to Select an E-Mail System
731(1)
General User Security
732(1)
Mail Logging
733(1)
Common Security Issues
734(1)
Testing an E-Mail Server
735(1)
Exercise 13-1 Create Users Just for E-Mail
735(1)
The Configuration of Postfix
736(11)
Configuration Files
736(4)
The main.cf Configuration File
740(3)
The /etc/aliases Configuration File
743(1)
The master.cf Configuration File
744(1)
Test the Current Postfix Configuration
744(1)
Configure Postfix Authentication
745(1)
Configure Incoming E-Mail
746(1)
Configure a Relay Through a Smart Host
746(1)
Exercise 13-2 Switch Services
747(1)
The Other SMTP Service: sendmail
747(14)
The Basics of sendmail
748(1)
Configuration Files
749(1)
The sendmail.mc Macro File
750(5)
The submit.mc Macro File
755(1)
Configure sendmail to Accept E-Mail from Other Systems
756(1)
Configure sendmail to Relay E-Mail to a Smart Host
757(1)
Configure User-and Host-Based sendmail Security
757(1)
Test the Current sendmail Configuration
757(3)
Two-Minute Drill
760(1)
Q&A Self Test
761(8)
Lab Questions
762(1)
Self Test Answers
763(1)
Lab Answers
764(5)
14 The Apache Web Server
769(62)
The Apache Web Server
771(11)
Apache 2.2
771(1)
The LAMP Stack
772(1)
Installation
772(1)
Exercise 14-1 Install the Apache Server
773(2)
The Apache Configuration Files
775(1)
Analyze the Default Apache Configuration
775(1)
The Main Apache Configuration File
776(3)
Basic Apache Configuration for a Simple Web Server
779(1)
Apache Log Files
780(2)
Standard Apache Security Configuration
782(12)
Ports and Firewalls
782(1)
Apache and SELinux
782(3)
Module Management
785(2)
Security Within Apache
787(3)
Exercise 14-2 The Apache Welcome and the noindex.html Story
790(1)
Exercise 14-3 Create a List of Files
791(1)
Host-Based Security
792(1)
User-Based Security
793(1)
Specialized Apache Directories
794(7)
Control Through the htaccess File
795(1)
Password-Protected Access
795(1)
Home Directory Access
796(2)
Group-Managed Directories
798(2)
Exercise 14-4 Password Protection for a Web Directory
800(1)
Regular and Secure Virtual Hosts
801(14)
The Standard Virtual Host
802(3)
Secure Virtual Hosts
805(3)
Create a New SSL Certificate
808(3)
Test Pages
811(1)
Syntax Checkers
812(1)
Apache Troubleshooting
813(1)
Exercise 14-5 Set Up a Virtual Web Server
814(1)
Deploy a Basic CGI Application
815(8)
Apache Configuration Changes for CGI Files
816(1)
Set Up a Simple CGI Script
817(1)
Connections to a Web Site
818(3)
Two-Minute Drill
821(2)
Q&A Self Test
823(8)
Lab Questions
824(1)
Self Test Answers
825(1)
Lab Answers
826(5)
15 The Samba File Server
831(52)
Samba Services
833(34)
Install Samba Services
834(1)
Some Samba Background
834(1)
Ports, Firewalls, and Samba
835(1)
Configure SELinux Booleans for Samba
836(1)
Configure SELinux File Types for Samba
837(1)
Samba Daemons
838(1)
Samba Server Global Configuration
838(9)
Shared Samba Directories
847(4)
Let Samba Join a Domain
851(1)
The Samba User Database
852(1)
Create a Public Share
853(1)
Exercise 15-1 Configure a Samba Home Directory Share
854(2)
The Samba Web Administration Tool
856(6)
Test Changes to /etc/samba/smb.conf
862(1)
Review User- and Host-Based Samba Security
863(2)
Review Basic Samba Shares
865(1)
Exercise 15-2 Configuring Samba with Shares
865(2)
Samba as a Client
867(2)
Command Line Tools
867(1)
Mount Options
868(1)
Automated Samba Mounts
868(1)
Samba Troubleshooting
869(5)
Samba Problem Identification
869(1)
Local Log File Checks
870(1)
Enable Remote Access
871(2)
Two-Minute Drill
873(1)
Q&A Self Test
874(9)
Lab Questions
875(1)
Self Test Answers
876(1)
Lab Answers
877(6)
16 More File-Sharing Services
883(48)
The Network File System (NFS) Server
885(20)
NFS Options for RHEL 6
885(1)
Basic NFS Installation
886(1)
Basic NFS Server Configuration
887(3)
Configure NFS for Basic Operation
890(2)
Special Requirements for /home Directories
892(1)
Fixed Ports in /etc/sysconfig/nfs
893(3)
Make NFS Work with SELinux
896(2)
Quirks and Limitations of NFS
898(2)
Performance Tips
900(1)
NFS Security Directives
901(2)
Options for Host-Based Security
903(1)
Options for User-Based Security
903(1)
Exercise 16-1 NFS
903(2)
Test an NFS Client
905(3)
NFS Mount Options
905(1)
Configure NFS in /etc/fstab
906(1)
Diskless Clients
907(1)
Soft Mounting
907(1)
Current NFS Status
908(1)
The Very Secure FTP Server
908(15)
Basic vsFTP Configuration
909(1)
The Main vsFTP Configuration File
909(5)
Other vsFTP Configuration Files
914(1)
Configure SELinux Support for vsFTP
915(1)
Ports, Firewalls, and vsFTP
916(1)
Exercise 16-2 Configure a Basic vsFTP Server
917(1)
Anonymous-Only Download Configuration
918(3)
Two-Minute Drill
921(2)
Q&A Self Test
923(8)
Lab Questions
924(1)
Self Test Answers
925(1)
Lab Answers
926(5)
17 Administrative Services: DNS, FTP, and Logging
931(36)
Basic Domain Service Organization
933(2)
Basic Parameters
934(1)
DNS Package Options
934(1)
Different Types of DNS Servers
935(1)
Minimal DNS Server Configurations
935(9)
BIND Configuration Files
935(2)
A Caching-Only Name Server
937(2)
Starting named
939(1)
A Forwarding Name Server
940(1)
Forwarding from a Caching-Only Name Server
941(1)
BIND Troubleshooting Commands
942(1)
Exercise 17-1 Set Up Your Own DNS Server
943(1)
Set Up System Utilization Reports
944(5)
System Utilization Commands
944(1)
The System Status Service
945(1)
Collect System Status into Logs
946(1)
Prepare a System Status Report
947(2)
Configure a System Logging Server
949(4)
System Logging Modules
949(1)
Enable Logging Clients
950(1)
Configure Logging Servers
950(1)
Configure Logging Clients
951(1)
Limit Access to Specified Systems
952(1)
The Network Time Server Service
953(7)
The NTP Server Configuration File
953(2)
Security Limits on NTP
955(3)
Two-Minute Drill
958(2)
Q&A Self Test
960(7)
Lab Questions
961(1)
Self Test Answers
962(1)
Lab Answers
963(4)
A Prepare a System for the Sample Exams
967(6)
Basic Sample Exam System Requirements
968(3)
Additional Sample Exam System Requirements for the RHCE
971(2)
B Sample Exam I: RHCSA
973(4)
RHCSA Sample Exam 1 Discussion
975(2)
C Sample Exam 2: RHCSA
977(4)
RHCSA Sample Exam 2 Discussion
979(2)
D Sample Exam 3: RHCE Sample Exam 1
981(4)
RHCE Sample Exam 1 Discussion
983(2)
E Sample Exam 4: RHCE Sample Exam 2
985(6)
RHCE Sample Exam 2 Discussion
987(4)
F About the CD
991(4)
System Requirements
992(1)
Electronic Book
992(1)
Technical Support
993(2)
Index 995
Michael Jang, (RHCE, LPIC-2, UCP, Linux+, MCP), author of the popular RHCE Red Hat Certified Engineer Linux Study Guide (Exam RH302) and about 20 other professional technology titles, is currently a full-time writer, specializing in operating systems and networks. His experience with computers goes back to the days of jumbled punch cards. He has written other books on Linux certification, including LPIC-1 in Depth, Mike Meyers Linux+ Certification Passport, and Sair GNU/Linux Installation and Configuration Exam Cram. His other Linux books include Linux Annoyances for Geeks, Linux Patch Management, and Mastering Fedora Core Linux 5. He has also written or contributed to books on Microsoft operating systems, including MCSE Guide to Microsoft Windows 98 and Mastering Windows XP Professional, Second Edition.