Acknowledgments |
|
xxv | |
Preface |
|
xxvii | |
Introduction |
|
xxxviii | |
1 Prepare for Red Hat Hands-on Certifications |
|
1 | (54) |
|
|
4 | (3) |
|
|
5 | (1) |
|
|
5 | (1) |
|
|
6 | (1) |
|
If You're Studying "Just" for the RHCSA Exam |
|
|
6 | (1) |
|
|
6 | (1) |
|
Basic Hardware Requirements |
|
|
7 | (4) |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
Get Red Hat Enterprise Linux |
|
|
11 | (2) |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
13 | (1) |
|
Installation Requirements |
|
|
13 | (5) |
|
You Won't Start from Scratch |
|
|
14 | (1) |
|
The Advantages of Network Installation |
|
|
14 | (1) |
|
Red Hat and Virtual Machines |
|
|
15 | (1) |
|
Virtual and Physical Systems |
|
|
15 | (1) |
|
A Pre-installed Environment for Practice Labs |
|
|
15 | (1) |
|
|
16 | (2) |
|
|
18 | (18) |
|
|
18 | (1) |
|
CD/DVD or Boot USB Starts Installation |
|
|
19 | (1) |
|
|
20 | (5) |
|
The Installation Perspective on Partitions |
|
|
25 | (3) |
|
Partition Creation Exercise |
|
|
28 | (4) |
|
Exercise 1-1: Partitioning During Installation |
|
|
30 | (2) |
|
Wow, Look at All That Software! |
|
|
32 | (2) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
36 | (3) |
|
Initial Setup and Firstboot |
|
|
37 | (1) |
|
Default Security Settings |
|
|
37 | (1) |
|
Special Setup Options for Virtual Machines |
|
|
38 | (1) |
|
Configure Default File Sharing Services |
|
|
39 | (9) |
|
Mount and Copy the Installation DVD |
|
|
40 | (1) |
|
Set Up a Default Configuration Apache Server |
|
|
40 | (3) |
|
Exercise 1-2: Configure Apache as an Installation Server |
|
|
42 | (1) |
|
Share Copied Files via FTP Server |
|
|
43 | (2) |
|
|
45 | (1) |
|
|
46 | (2) |
|
|
48 | (7) |
|
|
49 | (3) |
|
|
52 | (1) |
|
|
53 | (2) |
2 Virtual Machines and Automated Installations |
|
55 | (60) |
|
Configure KVM for Red Hat |
|
|
56 | (12) |
|
|
57 | (1) |
|
If You Have to Install KVM |
|
|
58 | (1) |
|
|
59 | (1) |
|
Configure the Virtual Machine Manager |
|
|
60 | (1) |
|
Configuration by Hypervisor |
|
|
61 | (1) |
|
Virtual Networks on a Hypervisor |
|
|
62 | (6) |
|
Exercise 2-1: Create a Second Virtual Network |
|
|
63 | (5) |
|
Configure a Virtual Machine on KVM |
|
|
68 | (12) |
|
Configure a Virtual Machine on KVM |
|
|
68 | (7) |
|
Exercise 2-2: Add Virtual Hard Drives |
|
|
73 | (2) |
|
|
75 | (1) |
|
Control Virtual Machines from the Command Line |
|
|
76 | (4) |
|
Automated Installation Options |
|
|
80 | (15) |
|
|
81 | (1) |
|
Set Up Local Access to Kickstart |
|
|
81 | (2) |
|
Set Up Network Access to Kickstart |
|
|
83 | (1) |
|
|
83 | (7) |
|
Exercise 2-3: Create and Use a Sample Kickstart File |
|
|
89 | (1) |
|
The Kickstart Configurator |
|
|
90 | (5) |
|
Administration with the Secure Shell and Secure Copy |
|
|
95 | (3) |
|
|
95 | (1) |
|
|
96 | (1) |
|
More SSH Command-Line Tools |
|
|
97 | (1) |
|
Graphical Secure Shell Access |
|
|
97 | (1) |
|
Consider Adding These Command-Line Tools |
|
|
98 | (9) |
|
Checking Ports with telnet |
|
|
99 | (1) |
|
|
100 | (1) |
|
Configure an E-mail Client |
|
|
100 | (2) |
|
The Use of Text and Graphical Browsers |
|
|
102 | (1) |
|
Using lftp to Access URLs |
|
|
103 | (2) |
|
|
105 | (1) |
|
|
105 | (2) |
|
|
107 | (8) |
|
|
108 | (2) |
|
|
110 | (1) |
|
|
111 | (4) |
3 Fundamental Command-Line Skills |
|
115 | (60) |
|
|
118 | (4) |
|
|
119 | (1) |
|
|
119 | (1) |
|
|
120 | (1) |
|
Differences Between Regular and Administrative Users |
|
|
121 | (1) |
|
Text Streams and Command Redirection |
|
|
121 | (1) |
|
Standard Command-Line Tools |
|
|
122 | (9) |
|
File and Directory Concepts |
|
|
123 | (3) |
|
|
126 | (1) |
|
|
127 | (3) |
|
|
130 | (1) |
|
|
130 | (1) |
|
The Management of Text Files |
|
|
131 | (11) |
|
Commands to Read Text Streams |
|
|
132 | (2) |
|
Commands to Process Text Streams |
|
|
134 | (3) |
|
Edit Text Files at the Console |
|
|
137 | (4) |
|
Exercise 3-1: Using vi to Create a New User |
|
|
139 | (2) |
|
|
141 | (1) |
|
Edit Text Files in the GUI |
|
|
141 | (1) |
|
Local Online Documentation |
|
|
142 | (4) |
|
|
142 | (1) |
|
|
143 | (2) |
|
|
145 | (1) |
|
Detailed Documentation in /usr/share/doc |
|
|
146 | (1) |
|
|
146 | (8) |
|
|
146 | (1) |
|
|
147 | (1) |
|
|
148 | (6) |
|
Network Configuration and Troubleshooting |
|
|
154 | (16) |
|
Network Configuration Files |
|
|
155 | (3) |
|
Network Configuration Tools |
|
|
158 | (6) |
|
Exercise 3-2: Configure a Network Card |
|
|
161 | (3) |
|
Configure Name Resolution |
|
|
164 | (1) |
|
Hostname Configuration Files |
|
|
165 | (1) |
|
Hostname Configuration Options |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
168 | (2) |
|
|
170 | (5) |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
173 | (2) |
4 RHCSA-Level Security Options |
|
175 | (66) |
|
|
178 | (8) |
|
File Permissions and Ownership |
|
|
178 | (3) |
|
Commands to Change Permissions and Ownership |
|
|
181 | (3) |
|
Basic User and Group Concepts |
|
|
184 | (2) |
|
Access Control Lists and More |
|
|
186 | (9) |
|
|
186 | (1) |
|
Make a Filesystem ACL Friendly |
|
|
187 | (1) |
|
|
188 | (2) |
|
Configure a Directory for ACLs |
|
|
190 | (1) |
|
|
191 | (1) |
|
|
192 | (1) |
|
Exercise 4-1: Use ACLs to Deny a User |
|
|
192 | (1) |
|
|
193 | (2) |
|
|
195 | (12) |
|
|
196 | (1) |
|
|
196 | (2) |
|
Keep That Firewall in Operation |
|
|
198 | (1) |
|
|
199 | (2) |
|
|
201 | (6) |
|
Exercise 4-2: Adjust Firewall Settings |
|
|
206 | (1) |
|
Securing SSH with Key-Based Authentication |
|
|
207 | (6) |
|
SSH Configuration Commands |
|
|
208 | (1) |
|
SSH Client Configuration Files |
|
|
208 | (1) |
|
Basic Encrypted Communication |
|
|
209 | (1) |
|
Set Up a Private/Public Pair for Key-Based Authentication |
|
|
210 | (3) |
|
A Security-Enhanced Linux Primer |
|
|
213 | (21) |
|
Basic Features of SELinux |
|
|
213 | (1) |
|
|
213 | (2) |
|
SELinux Configuration at the Command Line |
|
|
215 | (1) |
|
Configure Basic SELinux Settings |
|
|
215 | (1) |
|
Configure Regular Users for SELinux |
|
|
216 | (2) |
|
Manage SELinux Boolean Settings |
|
|
218 | (1) |
|
List and Identify SELinux File Contexts |
|
|
219 | (1) |
|
Restore SELinux File Contexts |
|
|
220 | (2) |
|
Identify SELinux Process Contexts |
|
|
222 | (1) |
|
Diagnose and Address SELinux Policy Violations |
|
|
223 | (2) |
|
The GUI SELinux Administration Tool |
|
|
225 | (4) |
|
The SELinux Troubleshoot Browser |
|
|
229 | (3) |
|
Exercise 4-3: Test a SELinux User Type |
|
|
230 | (2) |
|
|
232 | (1) |
|
|
232 | (2) |
|
|
234 | (7) |
|
|
236 | (1) |
|
|
236 | (2) |
|
|
238 | (3) |
5 The Boot Process |
|
241 | (44) |
|
|
243 | (2) |
|
Basic System Configuration |
|
|
243 | (1) |
|
|
244 | (1) |
|
Access to Linux Bootloaders |
|
|
244 | (1) |
|
|
245 | (14) |
|
GRUB, the GRand Unified Bootloader |
|
|
246 | (4) |
|
Exercise 5-1: Boot into a Different Target |
|
|
248 | (1) |
|
Exercise 5-2: Recover the Root Password |
|
|
249 | (1) |
|
Modify the System Bootloader |
|
|
250 | (3) |
|
|
253 | (1) |
|
|
253 | (3) |
|
Exercise 5-3: Using the GRUB 2 Command Line |
|
|
255 | (1) |
|
|
256 | (1) |
|
An Option for Booting from GRUB 2: Rescue Mode |
|
|
256 | (3) |
|
|
259 | (11) |
|
Kernels and the Initial RAM Disk |
|
|
260 | (1) |
|
The First Process, Targets, and Units |
|
|
261 | (2) |
|
|
263 | (1) |
|
Reboot and Shut Down a System Normally |
|
|
264 | (1) |
|
systemd Replaces Upstart and SysVinit |
|
|
264 | (3) |
|
|
267 | (3) |
|
Virtual Terminals and Login Screens |
|
|
270 | (1) |
|
|
270 | (4) |
|
|
271 | (1) |
|
The Innards of systemd Units |
|
|
271 | (2) |
|
|
273 | (1) |
|
|
274 | (5) |
|
|
275 | (1) |
|
Sync the Time with chronyd |
|
|
276 | (1) |
|
|
276 | (1) |
|
|
277 | (1) |
|
|
278 | (1) |
|
|
279 | (6) |
|
|
281 | (1) |
|
|
281 | (1) |
|
|
282 | (3) |
6 Linux Filesystem Administration |
|
285 | (58) |
|
Storage Management and Partitions |
|
|
287 | (18) |
|
|
287 | (1) |
|
|
288 | (8) |
|
|
296 | (1) |
|
|
297 | (1) |
|
Using parted: Starting, Getting Help, and Quitting |
|
|
298 | (4) |
|
|
302 | (3) |
|
Exercise 6-1: Work with fdisk and parted |
|
|
304 | (1) |
|
|
305 | (5) |
|
Standard Formatting Filesystems |
|
|
306 | (1) |
|
|
307 | (1) |
|
Filesystem Format Commands |
|
|
307 | (1) |
|
|
308 | (1) |
|
Filesystem Check Commands |
|
|
309 | (1) |
|
Exercise 6-2: Format, Check, and Mount Different Filesystems |
|
|
309 | (1) |
|
Basic Linux Filesystems and Directories |
|
|
310 | (3) |
|
Separate Linux Filesystems |
|
|
310 | (2) |
|
Directories That Can Be Mounted Separately |
|
|
312 | (1) |
|
Logical Volume Management (LVM) |
|
|
313 | (7) |
|
|
313 | (1) |
|
|
314 | (1) |
|
|
314 | (1) |
|
|
315 | (1) |
|
Make Use of a Logical Volume |
|
|
315 | (1) |
|
|
315 | (3) |
|
|
318 | (1) |
|
|
319 | (1) |
|
|
320 | (8) |
|
|
320 | (2) |
|
Universally Unique Identifiers in /etc/fstab |
|
|
322 | (1) |
|
|
323 | (1) |
|
More Filesystem Mount Options |
|
|
324 | (1) |
|
|
325 | (1) |
|
Add Your Own Filesystems to /etc/fstab |
|
|
325 | (1) |
|
Removable Media and /etc/fstab |
|
|
326 | (1) |
|
|
327 | (1) |
|
|
328 | (8) |
|
Mounting via the Automounter |
|
|
328 | (6) |
|
Exercise 6-3: Configure the Automounter |
|
|
332 | (2) |
|
|
334 | (1) |
|
|
334 | (2) |
|
|
336 | (7) |
|
|
337 | (1) |
|
|
338 | (1) |
|
|
339 | (4) |
7 Package Management |
|
343 | (52) |
|
The Red Hat Package Manager |
|
|
344 | (9) |
|
|
345 | (1) |
|
What Is the RPM Database? |
|
|
345 | (1) |
|
|
346 | (1) |
|
|
347 | (1) |
|
|
348 | (1) |
|
Install RPMs from Remote Systems |
|
|
349 | (1) |
|
RPM Installation Security |
|
|
350 | (1) |
|
Special RPM Procedures with the Kernel |
|
|
350 | (3) |
|
|
353 | (4) |
|
|
353 | (1) |
|
|
354 | (1) |
|
|
355 | (2) |
|
Dependencies and the yum Command |
|
|
357 | (22) |
|
An Example of Dependency Hell |
|
|
357 | (2) |
|
Relief from Dependency Hell |
|
|
359 | (1) |
|
|
360 | (1) |
|
The Basic yum Configuration File: yum.conf |
|
|
361 | (1) |
|
Configuration Files in the /etc/yum/pluginconf.d Directory |
|
|
362 | (1) |
|
Configuration Files in the /etc/yum.repos.d Directory |
|
|
363 | (2) |
|
Create Your Own /etc/yum.repos.d Configuration File |
|
|
365 | (4) |
|
Exercise 7-1: Create a yum Repository from the RHEL 7 DVD |
|
|
368 | (1) |
|
|
369 | (1) |
|
|
370 | (1) |
|
|
371 | (1) |
|
|
372 | (1) |
|
Updates and Security Fixes |
|
|
373 | (1) |
|
|
373 | (3) |
|
|
376 | (3) |
|
More Package Management Tools |
|
|
379 | (8) |
|
The GNOME Software Update Tool |
|
|
380 | (1) |
|
|
381 | (1) |
|
|
381 | (2) |
|
Exercise 7-2: Installing More with yum and the GNOME Software Tool |
|
|
382 | (1) |
|
Red Hat Subscription Manager |
|
|
383 | (2) |
|
|
385 | (1) |
|
|
386 | (1) |
|
|
387 | (8) |
|
|
389 | (1) |
|
|
389 | (2) |
|
|
391 | (4) |
8 User Administration |
|
395 | (48) |
|
|
397 | (14) |
|
|
397 | (1) |
|
The Shadow Password Suite |
|
|
398 | (5) |
|
|
403 | (4) |
|
Exercise 8-1: Add a User with the Red Hat User Manager |
|
|
406 | (1) |
|
Exercise 8-2: Real and Fake Shells |
|
|
407 | (1) |
|
|
407 | (2) |
|
More User and Group Management Commands |
|
|
409 | (2) |
|
|
411 | (5) |
|
The Ability to Log In as root |
|
|
411 | (2) |
|
Exercise 8-3: Limit root Logins |
|
|
412 | (1) |
|
|
413 | (1) |
|
The Proper Use of the su Command |
|
|
413 | (1) |
|
|
414 | (1) |
|
The Proper Use of the sg Command |
|
|
414 | (1) |
|
Custom Administrators with the sudo Command |
|
|
415 | (1) |
|
Other Administrative Users |
|
|
416 | (1) |
|
User and Shell Configuration |
|
|
416 | (5) |
|
Home Directories and /etc/skel |
|
|
417 | (3) |
|
Exercise 8-4: Another Way to Secure a System |
|
|
419 | (1) |
|
Shell Configuration Files in User Home Directories |
|
|
420 | (1) |
|
Login, Logout, and User Switching |
|
|
420 | (1) |
|
Users and Network Authentication |
|
|
421 | (11) |
|
LDAP Client Configuration |
|
|
423 | (2) |
|
The Name Service Switch File |
|
|
425 | (1) |
|
The System Security Service Daemon |
|
|
425 | (1) |
|
Red Hat Network Authentication Tools |
|
|
426 | (6) |
|
|
432 | (5) |
|
Standard and Red Hat Groups |
|
|
432 | (1) |
|
|
432 | (3) |
|
Exercise 8-5: Control Group Ownership with the SGID Bit |
|
|
433 | (2) |
|
|
435 | (1) |
|
|
436 | (1) |
|
|
437 | (6) |
|
|
439 | (1) |
|
|
439 | (1) |
|
|
440 | (3) |
9 RHCSA-Level System Administration Tasks |
|
443 | (36) |
|
Elementary System Administration Commands |
|
|
444 | (10) |
|
System Resource Management Commands |
|
|
445 | (9) |
|
|
454 | (10) |
|
Automate System Administration: cron and at |
|
|
456 | (1) |
|
The System crontab and Components |
|
|
456 | (2) |
|
|
458 | (1) |
|
|
459 | (1) |
|
Setting Up cron for Users |
|
|
460 | (1) |
|
Exercise 9-1: Create a cron Job |
|
|
461 | (1) |
|
Running a Job with the at System |
|
|
461 | (1) |
|
|
462 | (2) |
|
|
464 | (8) |
|
System Log Configuration File |
|
|
464 | (1) |
|
|
465 | (1) |
|
|
466 | (2) |
|
|
468 | (1) |
|
Exercise 9-2: Learn the Log Files |
|
|
468 | (1) |
|
View systemd Journal Log Entries |
|
|
468 | (3) |
|
|
471 | (1) |
|
|
471 | (1) |
|
|
472 | (7) |
|
|
474 | (1) |
|
|
474 | (1) |
|
|
475 | (4) |
10 A Security Primer |
|
479 | (58) |
|
The Layers of Linux Security |
|
|
480 | (7) |
|
|
481 | (1) |
|
Best Defenses with Security Updates |
|
|
481 | (1) |
|
Service-Specific Security |
|
|
482 | (2) |
|
|
484 | (1) |
|
|
484 | (1) |
|
|
485 | (1) |
|
Recommendations from the U.S. National Security Agency |
|
|
485 | (1) |
|
|
486 | (1) |
|
Firewalls and Network Address Translation |
|
|
487 | (21) |
|
|
488 | (1) |
|
The Structure of firewalld |
|
|
489 | (9) |
|
Exercise 10-1: Configure Rich Rules |
|
|
496 | (2) |
|
Further Recommendations from the NSA |
|
|
498 | (1) |
|
Make Sure That firewalld Is Running |
|
|
499 | (1) |
|
|
500 | (1) |
|
|
501 | (1) |
|
The Red Hat Firewall Configuration Tool |
|
|
502 | (6) |
|
|
508 | (4) |
|
Is a Service Protected by TCP Wrappers? |
|
|
508 | (1) |
|
TCP Wrappers Configuration Files |
|
|
509 | (3) |
|
Exercise 10-2: Configure TCP Wrappers |
|
|
511 | (1) |
|
Pluggable Authentication Modules |
|
|
512 | (10) |
|
|
512 | (1) |
|
|
513 | (2) |
|
|
515 | (4) |
|
Exercise 10-3: Configure PAM to Limit root Access |
|
|
519 | (1) |
|
PAM and User-Based Security |
|
|
519 | (3) |
|
Exercise 10-4: Use PAM to Limit User Access |
|
|
521 | (1) |
|
Secure Files and More with GPG2 |
|
|
522 | (7) |
|
|
522 | (1) |
|
Current GPG2 Configuration |
|
|
523 | (1) |
|
|
523 | (1) |
|
|
523 | (2) |
|
Use a GPG2 Key to Encrypt a File |
|
|
525 | (2) |
|
|
527 | (1) |
|
|
527 | (2) |
|
|
529 | (8) |
|
|
531 | (1) |
|
|
531 | (1) |
|
|
532 | (5) |
11 System Services and SELinux |
|
537 | (42) |
|
Red Hat System Configuration |
|
|
539 | (2) |
|
|
539 | (1) |
|
|
539 | (1) |
|
Bigger Picture Configuration Process |
|
|
540 | (1) |
|
Available Configuration Tools |
|
|
540 | (1) |
|
|
541 | (11) |
|
Options in the SELinux Booleans Directory |
|
|
542 | (1) |
|
Service Categories of SELinux Booleans |
|
|
543 | (1) |
|
Boolean Configuration with the SELinux Management Tool |
|
|
543 | (1) |
|
|
544 | (4) |
|
|
548 | (2) |
|
|
550 | (2) |
|
Exercise 11-1: Configure a New Directory with Appropriate SELinux Contexts |
|
|
550 | (2) |
|
|
552 | (10) |
|
SSH Server Configuration Files |
|
|
552 | (1) |
|
|
553 | (7) |
|
Exercise 11-2: Run an SSH Server on a Nonstandard Port |
|
|
560 | (1) |
|
User-Based Security for SSH |
|
|
560 | (1) |
|
Host-Based Security for SSH |
|
|
561 | (1) |
|
A Security and Configuration Checklist |
|
|
562 | (11) |
|
Installation of Server Services |
|
|
562 | (4) |
|
|
566 | (1) |
|
Make Sure the Service Survives a Reboot |
|
|
566 | (1) |
|
Review Access Through Layers of Security |
|
|
566 | (5) |
|
Exercise 11-3: Practice Troubleshooting Network Connectivity Issues |
|
|
568 | (1) |
|
Exercise 11-4: Review the Different Effects of firewalld and TCP Wrappers |
|
|
569 | (2) |
|
|
571 | (1) |
|
|
572 | (1) |
|
|
573 | (6) |
|
|
574 | (1) |
|
|
575 | (1) |
|
|
576 | (3) |
12 RHCE Administrative Tasks |
|
579 | (52) |
|
Automate System Maintenance |
|
|
581 | (9) |
|
Standard Administrative Scripts |
|
|
581 | (2) |
|
|
583 | (1) |
|
|
584 | (6) |
|
Exercise 12-1: Create a Script |
|
|
588 | (2) |
|
Set Up System Utilization Reports |
|
|
590 | (5) |
|
System Utilization Commands |
|
|
591 | (1) |
|
The System Activity Report Tool |
|
|
591 | (1) |
|
Collect System Status into Logs |
|
|
592 | (1) |
|
Prepare a System Status Report |
|
|
593 | (2) |
|
Kernel Run-time Parameters |
|
|
595 | (3) |
|
How sysctl Works with /etc/sysctl.conf |
|
|
595 | (1) |
|
Settings in the /etc/sysctl.conf File |
|
|
596 | (2) |
|
Exercise 12-2: Disable Responses to the ping Command |
|
|
597 | (1) |
|
|
598 | (4) |
|
Configure a Default Route |
|
|
598 | (1) |
|
|
599 | (3) |
|
Exercise 12-3: Practice with Static Routes |
|
|
600 | (2) |
|
|
602 | (4) |
|
|
602 | (2) |
|
|
604 | (1) |
|
|
604 | (2) |
|
Network Interface Bonding and Teaming |
|
|
606 | (7) |
|
Configure Interface Bonding |
|
|
608 | (4) |
|
Exercise 12-4: Test Bonding Failover |
|
|
611 | (1) |
|
Configure Interface Teaming |
|
|
612 | (1) |
|
Authentication with Kerberos |
|
|
613 | (10) |
|
|
613 | (1) |
|
Prerequisites for Kerberos Servers and Clients |
|
|
614 | (3) |
|
Exercise 12-5: Install a Kerberos KDC |
|
|
615 | (2) |
|
|
617 | (4) |
|
Exercise 12-6: Configure Kerberos Authentication |
|
|
620 | (1) |
|
|
621 | (1) |
|
|
622 | (1) |
|
|
623 | (8) |
|
|
625 | (1) |
|
|
625 | (1) |
|
|
626 | (5) |
13 Network Services: DNS, SMTP, iSCSI, and NTP |
|
631 | (48) |
|
An Introduction to Domain Name Services |
|
|
633 | (1) |
|
|
633 | (1) |
|
Different Types of DNS Servers |
|
|
634 | (1) |
|
Minimal DNS Server Configurations |
|
|
634 | (11) |
|
|
634 | (2) |
|
A BIND Caching-Only Name Server |
|
|
636 | (5) |
|
Unbound as a Caching-Only Name Server |
|
|
641 | (1) |
|
DNS Client Troubleshooting |
|
|
642 | (3) |
|
Exercise 13-1: Set Up Your Own BIND DNS Server |
|
|
644 | (1) |
|
Exercise 13-2: Set Up Your Own Unbound DNS Server |
|
|
645 | (1) |
|
A Variety of E-Mail Agents |
|
|
645 | (5) |
|
Definitions and Protocols |
|
|
646 | (1) |
|
Relevant Mail Server Packages |
|
|
646 | (1) |
|
Use the alternatives Command to Select an E-Mail System |
|
|
647 | (1) |
|
|
648 | (1) |
|
|
649 | (1) |
|
|
649 | (1) |
|
|
649 | (1) |
|
Exercise 13-3: Create Users Just for E-Mail |
|
|
649 | (1) |
|
The Configuration of Postfix |
|
|
650 | (10) |
|
|
650 | (3) |
|
The main.cf Configuration File |
|
|
653 | (3) |
|
The /etc/aliases Configuration File |
|
|
656 | (1) |
|
Test the Current Postfix Configuration |
|
|
657 | (1) |
|
Configure Postfix Authentication |
|
|
658 | (1) |
|
Configure Postfix as an SMTP Server for a Domain |
|
|
659 | (1) |
|
Configure Postfix as a Null Client |
|
|
659 | (1) |
|
iSCSI Targets and Initiators |
|
|
660 | (6) |
|
|
661 | (4) |
|
Connect to Remote iSCSI Storage |
|
|
665 | (1) |
|
|
666 | (6) |
|
The NTP Server Configuration File |
|
|
666 | (3) |
|
|
669 | (1) |
|
|
670 | (2) |
|
|
672 | (7) |
|
|
673 | (1) |
|
|
674 | (1) |
|
|
675 | (4) |
14 The Apache Web Server |
|
679 | (54) |
|
|
681 | (8) |
|
|
681 | (1) |
|
|
681 | (1) |
|
|
681 | (3) |
|
Exercise 14-1: Install the Apache Server |
|
|
683 | (1) |
|
The Apache Configuration Files |
|
|
684 | (1) |
|
Analyze the Default Apache Configuration |
|
|
685 | (1) |
|
The Main Apache Configuration File |
|
|
686 | (1) |
|
Basic Apache Configuration for a Simple Web Server |
|
|
686 | (2) |
|
|
688 | (1) |
|
Standard Apache Security Configuration |
|
|
689 | (11) |
|
|
689 | (1) |
|
|
690 | (2) |
|
|
692 | (1) |
|
|
692 | (6) |
|
Exercise 14-2: The Apache Welcome and the noindex.html Story |
|
|
697 | (1) |
|
Exercise 14-3: Create a List of Files |
|
|
698 | (1) |
|
|
698 | (1) |
|
|
699 | (1) |
|
Specialized Apache Directories |
|
|
700 | (6) |
|
Control Through the .htaccess File |
|
|
701 | (1) |
|
Password-Protected Access |
|
|
701 | (1) |
|
|
702 | (2) |
|
Group-Managed Directories |
|
|
704 | (2) |
|
Exercise 14-4: Password Protection for a Web Directory |
|
|
705 | (1) |
|
Regular and Secure Virtual Hosts |
|
|
706 | (13) |
|
The Standard Virtual Host |
|
|
707 | (3) |
|
|
710 | (3) |
|
Create a New TLS Certificate |
|
|
713 | (4) |
|
|
717 | (1) |
|
|
717 | (1) |
|
|
718 | (1) |
|
Exercise 14-5: Set Up a Virtual Web Server |
|
|
718 | (1) |
|
Deploy a Basic CGI Application |
|
|
719 | (6) |
|
Apache Configuration Changes for CGI Files |
|
|
720 | (1) |
|
Set Up a Simple CGI Script in Perl |
|
|
721 | (1) |
|
|
721 | (1) |
|
|
722 | (1) |
|
|
723 | (2) |
|
|
725 | (8) |
|
|
726 | (1) |
|
|
727 | (1) |
|
|
728 | (5) |
15 The Samba File Server |
|
733 | (40) |
|
|
734 | (23) |
|
|
735 | (1) |
|
|
735 | (2) |
|
Ports, Firewalls, and Samba |
|
|
737 | (1) |
|
Configure SELinux Booleans for Samba |
|
|
738 | (1) |
|
Configure SELinux File Contexts for Samba |
|
|
738 | (2) |
|
|
740 | (1) |
|
Samba Server Global Configuration |
|
|
740 | (8) |
|
|
748 | (4) |
|
|
752 | (1) |
|
|
753 | (1) |
|
|
754 | (1) |
|
Test Changes to /etc/samba/smb.conf |
|
|
755 | (2) |
|
Exercise 15-1: Configure a Samba Home Directory Share |
|
|
756 | (1) |
|
|
757 | (4) |
|
|
757 | (1) |
|
|
758 | (1) |
|
|
759 | (2) |
|
Exercise 15-2: Configuring a Samba Share for Group Collaboration |
|
|
759 | (2) |
|
|
761 | (1) |
|
|
761 | (4) |
|
Samba Problem Identification |
|
|
761 | (1) |
|
|
762 | (2) |
|
|
764 | (1) |
|
|
764 | (1) |
|
|
765 | (8) |
|
|
767 | (1) |
|
|
767 | (1) |
|
|
768 | (5) |
16 NFS Secured with Kerberos |
|
773 | (34) |
|
The Network File System (NFS) Server |
|
|
774 | (16) |
|
|
775 | (1) |
|
|
775 | (1) |
|
Basic NFS Server Configuration |
|
|
776 | (2) |
|
Configure NFS for Basic Operation |
|
|
778 | (3) |
|
Fixed Ports in /etc/sysconfig/nfs |
|
|
781 | (1) |
|
Make NFS Work with SELinux |
|
|
782 | (3) |
|
Quirks and Limitations of NFS |
|
|
785 | (2) |
|
|
787 | (1) |
|
|
787 | (1) |
|
Options for Host-Based Security |
|
|
788 | (1) |
|
Options for User-Based Security |
|
|
788 | (2) |
|
|
788 | (2) |
|
|
790 | (2) |
|
|
790 | (1) |
|
Configure NFS in /etc/fstab |
|
|
791 | (1) |
|
|
791 | (1) |
|
|
792 | (1) |
|
|
792 | (8) |
|
Kerberos-Enabled NFS Services |
|
|
793 | (1) |
|
Configure NFS Exports with Kerberos |
|
|
794 | (1) |
|
Configure NFS Clients with Kerberos |
|
|
795 | (3) |
|
Exercise 16-2: Prepare a System for NFS Secured with Kerberos |
|
|
795 | (1) |
|
Exercise 16-3: Configure a Kerberos-Enabled NFS Share |
|
|
796 | (2) |
|
|
798 | (1) |
|
|
799 | (1) |
|
|
800 | (7) |
|
|
801 | (1) |
|
|
802 | (1) |
|
|
803 | (4) |
17 The MariaDB Server |
|
807 | (36) |
|
|
808 | (7) |
|
|
809 | (2) |
|
|
811 | (2) |
|
Exercise 17-1: Install and Secure MariaDB |
|
|
812 | (1) |
|
Run MariaDB on a Nonstandard TCP Port |
|
|
813 | (2) |
|
Exercise 17-2: Run MariaDB on a Nonstandard TCP Port |
|
|
813 | (2) |
|
|
815 | (4) |
|
|
815 | (1) |
|
|
816 | (1) |
|
|
817 | (2) |
|
Exercise 17-3: Create a Table |
|
|
818 | (1) |
|
|
819 | (7) |
|
|
820 | (1) |
|
|
821 | (1) |
|
|
822 | (1) |
|
|
822 | (4) |
|
Exercise 17-4: Practice with Simple SQL Queries |
|
|
823 | (3) |
|
|
826 | (5) |
|
|
827 | (1) |
|
|
827 | (4) |
|
Exercise 17-5: Practice MariaDB User's Permissions |
|
|
830 | (1) |
|
Database Backup and Recovery |
|
|
831 | (5) |
|
Back Up and Restore with mysqldump |
|
|
831 | (2) |
|
Back Up with a Dump of the Data to a Text File |
|
|
833 | (1) |
|
|
834 | (1) |
|
|
834 | (2) |
|
|
836 | (7) |
|
|
837 | (1) |
|
|
838 | (1) |
|
|
839 | (4) |
A Prepare a System for the Sample Exams |
|
843 | (4) |
|
Basic Sample Exam System Requirements |
|
|
843 | (3) |
|
Additional Sample Exam System Requirements for the RHCE |
|
|
846 | (1) |
B Sample Exam 1: RHCSA |
|
847 | (4) |
|
RHCSA Sample Exam 1 Discussion |
|
|
849 | (2) |
C Sample Exam 2: RHCSA |
|
851 | (4) |
|
RHCSA Sample Exam 2 Discussion |
|
|
853 | (2) |
D Sample Exam 3: RHCE Sample Exam 1 |
|
855 | (6) |
|
RHCE Sample Exam 1 Discussion |
|
|
857 | (4) |
E Sample Exam 4: RHCE Sample Exam 2 |
|
861 | (4) |
|
RHCE Sample Exam 2 Discussion |
|
|
863 | (2) |
F About the DVD |
|
865 | (2) |
|
|
865 | (1) |
|
|
866 | (1) |
|
|
866 | (1) |
Glossary |
|
867 | (16) |
Index |
|
883 | |