- •About the Author
- •Credits
- •How This Book Is Organized
- •Part I: Linux Basics
- •Part II: Installation
- •Part III: Configuration
- •Part IV: Administration
- •Part V: Maintaining the Linux System
- •How Each Chapter Is Structured
- •How to Use This Book
- •Conventions Used in This Book
- •What is Linux?
- •The origin of UNIX
- •Who started Linux?
- •Understanding Open Source
- •Understanding Closed Source
- •Understanding Artistic License
- •Is Freeware really free?
- •Is Shareware never free?
- •A comparison and contrast of licensing methods
- •The Growth of Linux
- •Linux on a Personal Computer
- •Graphical installation
- •Hardware detection
- •Graphical user interface
- •Linux limitations on the PC
- •Linux succeeds on the PC
- •Linux on workstations
- •Linux on servers
- •Summary
- •Assessment Questions
- •Scenarios
- •Answers to Chapter Questions
- •Assessment Questions
- •Scenarios
- •Linux Kernel
- •Kernel versions
- •Kernel availability
- •Linux Distributions
- •Beehive
- •BlueCat
- •Caldera OpenLinux
- •Debian
- •Corel
- •DragonLinux
- •Elfstone
- •Gentoo
- •Hard Hat Linux
- •KRUD
- •LinuxPPC
- •Mandrake
- •Phat Linux
- •Slackware
- •StormLinux
- •SuSE
- •TurboLinux
- •Yellow Dog Linux
- •Mini and Specialty Distributions
- •Astaro
- •KYZO
- •FlightLinux
- •NetMAX
- •Packages and Packaging Solutions
- •Red Hat Package Manager
- •Debian Package Management System
- •Tarball
- •Linux Resources
- •Summary
- •Assessment Questions
- •Scenarios
- •Lab Exercises
- •Answers to Chapter Questions
- •Assessment Questions
- •Scenarios
- •Linux In the Real World
- •Word Processing
- •Spreadsheets and databases
- •Web browsing
- •File transfer
- •More, more, and more applications
- •The Server and DNS
- •A Linux Web server
- •Linux e-mail server
- •File servers
- •Proxy, news, and search servers
- •FTP servers
- •Firewalls
- •Determining Linux Roles and Services
- •Comparing Linux with other operating systems
- •Hardware compatibility
- •Summary
- •Assessment Questions
- •Scenarios
- •Answers to Chapter Questions
- •Assessment Questions
- •Scenarios
- •Installing Linux
- •Final Preparations for Installation
- •Verification
- •Package selection
- •Final hardware verification
- •Pre-installation partitioning planning
- •Installing Linux
- •Text or GUI installation
- •Basic setup of Linux
- •Selecting the machine type
- •Partitioning the hard disk drive
- •Installing a boot manager
- •Creating the Boot Diskette
- •Networking
- •Additional installation information
- •Accounts and passwords
- •Additional packages to install
- •GUI installation
- •Obtaining video card information
- •Configuring the X windows system
- •Selecting the windows manager or desktop environment
- •Summary
- •Assessment Questions
- •Scenarios
- •Lab Exercises
- •Answers to Chapter Questions
- •Chapter Pre-test
- •Answers to Assessment Questions
- •Scenarios
- •Alternative to the GUI Installation
- •Command Line installation
- •Install the Linux system
- •Network installations of Linux
- •Review of a Linux Installation
- •Installation media
- •Initial selections
- •Installation type or class
- •Disk partitioning and formatting
- •Installing LILO
- •Network configuration
- •User accounts
- •Authentication methods
- •Package selection and installation
- •A Dual-Boot Installation of Linux
- •Linux with Microsoft Windows
- •Linux with Microsoft Windows NT and 2000
- •Linux and Solaris
- •Linux and other operating systems
- •Installing Additional Software with gzip and tar
- •Installing Additional Software with RPM
- •Removing software with RPM
- •Upgrading software with RPM
- •Query the RPM software
- •Verify the RPM software
- •Verify the package files
- •Upgrading the Kernel
- •Upgrading a Linux Kernel
- •System Log Files
- •The Final Test of the Installation
- •Summary
- •Assessment Questions
- •Scenarios
- •Lab Exercises
- •Answers to Chapter Questions
- •Chapter Pre-test
- •Assessment Questions
- •Scenarios
- •What is the X Window System?
- •The X Window System
- •X Client and Server communications
- •X Window Manager
- •Configuring X Window Systems
- •Custom X Window System Programs
- •Manual Configuration of the X Window System
- •Documentation
- •Summary
- •Assessment Questions
- •Scenarios
- •Lab Exercises
- •Answers to Chapter Questions
- •Chapter Pre-test
- •Assessment Questions
- •Scenarios
- •Basic Network Services
- •TCP/IP Protocol Suite
- •Connection protocols needed
- •Other network protocols
- •Configuring Basic Network Services
- •Host name
- •IP addressing
- •DHCP
- •Netmask
- •Hardware resources
- •Routing and gateways
- •PPP, SLIP and PLIP connections
- •Server Tasks with
- •IP aliases for virtual hosts
- •Apache Web Server
- •Samba File Server
- •Home directories
- •Disk shares
- •Configuring Client Services
- •SMB/CIFS
- •NIS client configuration
- •NFS client configuration
- •Configuring Internet Services
- •Web browser
- •POP and SMTP
- •TFTP
- •SNMP
- •Remote Access
- •Rlogin
- •Telnet
- •OpenSSH
- •Documentation
- •Summary
- •Assessment Questions
- •Scenarios
- •Lab Exercises
- •Answers to Chapter Questions
- •Chapter Pre-test
- •Assessment Questions
- •Scenarios
- •Adding Hardware
- •Memory
- •Swap
- •Adding a hard drive
- •Video and monitor
- •Printers
- •Configuration files
- •Setting environment variables
- •BASH
- •Documentation
- •Summary
- •Assessment Questions
- •Scenarios
- •Lab Exercises
- •Answers to Chapter Questions
- •Chapter Pre-test
- •Assessment Questions
- •Scenarios
- •Basic User and Group Administration
- •What are users and groups?
- •Creating users
- •Change user information
- •Deleting users
- •Creating groups
- •Getting Around Linux
- •Navigating Linux
- •Common file and directory commands
- •Setting File and Directory Permissions
- •Mounting and Managing File Systems
- •Mount
- •Umount
- •Mounted file systems
- •Summary
- •Assessment Questions
- •Scenarios
- •Lab Exercises
- •Answers to Chapter Questions
- •Chapter Pre-test
- •Assessment Questions
- •Scenarios
- •Multi-User Environment
- •The creation of Virtual Consoles
- •The Linux Terminal Server Project
- •Configurations for remote systems
- •Monitoring remote connections
- •Common Shell Commands
- •Basic shell scripts
- •Caution using root access
- •Navigating the GUI interface
- •Summary
- •Assessment Questions
- •Scenarios
- •Lab Exercises
- •Answers to Chapter Questions
- •Chapter Pre-test
- •Assessment Questions
- •Scenarios
- •Linux Runlevels
- •init
- •Shutting down Linux
- •Managing Linux Services
- •Configuring Linux Printing
- •lpd daemon
- •/etc/printcap
- •Printing management
- •Using the vi Editor
- •vi operation modes
- •Editing text files
- •Using the
- •Summary
- •Assessment Questions
- •Scenarios
- •Lab Exercises
- •Answers to Chapter Questions
- •Chapter Pre-test
- •Assessment Questions
- •Scenarios
- •Disk and File System Management
- •Repairing Partitions
- •System Automation and Scheduling
- •cron
- •Core Dumps
- •Analyzing core dumps
- •GNU Debugger
- •Managing Networking Interfaces
- •Installing System Packages and Patches
- •Compressed archive
- •Debian Package Installer
- •Slackware Package Installation
- •Summary
- •Assessment Questions
- •Scenarios
- •Lab Exercises
- •Answers to Chapter Questions
- •Chapter Pre-test
- •Assessment Questions
- •Scenarios
- •Linux Processes
- •Core services versus non-critical services
- •Process administration
- •Process control
- •Monitoring Log Files
- •Maintaining Documentation
- •Summary
- •Assessment Questions
- •Scenarios
- •Lab Exercises
- •Answers to Chapter Questions
- •Chapter Pre-test
- •Assessment Questions
- •Scenarios
- •Linux Security
- •Securing the Environment
- •Location
- •Environment
- •System Security
- •System/user files
- •Permissions
- •Log auditing
- •Backups
- •Linux Security Best Practices
- •Network security
- •Firewall
- •System security
- •Securing a Web server
- •Securing an FTP server
- •FTP program version
- •FTP configuration files
- •Process security
- •Summary
- •Assessment Questions
- •Scenarios
- •Lab Exercises
- •Answers to Chapter Questions
- •Chapter Pre-test
- •Assessment Questions
- •Scenarios
- •Disaster Recovery Planning
- •Types of data
- •Frequency and Scheduling
- •Storage and media types
- •Recovering data
- •Offsite storage
- •Linux Backup Tools and Commands
- •Third party tools
- •Tape devices
- •Summary
- •Assessment Questions
- •Scenarios
- •Lab Exercises
- •Answers to Chapter Questions
- •Chapter Pre-test
- •Assessment Questions
- •Scenarios
- •Identifying the Problem
- •Methodology and Best Practices
- •Troubleshooting Resources
- •Documentation resources
- •Internet resources
- •System Log Files
- •Tools for Log Files
- •Output to another file
- •Locating files
- •Process Configuration and Management
- •Stopping, Starting, and Restarting Processes
- •Configuration Files
- •Summary
- •Assessment Questions
- •Scenarios
- •Lab Exercises
- •Answers to Chapter Questions
- •Chapter Pre-test
- •Assessment Questions
- •Scenarios
- •Examining the Startup Process
- •Boot process steps
- •Analyzing Boot Process Errors
- •Common Boot Problems
- •Using System Status Tools
- •File System Check
- •System Resource Commands
- •Using the System Boot Disk
- •Types of boot disks
- •Creating a boot disk
- •Creating a rescue/utility disk
- •Summary
- •Assessment Questions
- •Scenarios
- •Lab Exercises
- •Answers to Chapter Questions
- •Chapter Pre-test
- •Assessment Questions
- •Scenarios
- •Common User Problems
- •Login problems
- •File and directory permissions
- •Printing problems
- •Mail problems
- •Software Package Problems
- •Package dependencies
- •Software and version conflicts
- •Backup and Restore Errors
- •Backup hardware
- •Backup software
- •File restore errors
- •Application Failures
- •Log files
- •Process and daemon errors
- •Web server errors
- •Telnet
- •Mail services
- •Basic Networking Troubleshooting
- •Networking connectivity
- •Network hardware problems
- •Summary
- •Assessment Questions
- •Scenarios
- •Lab Exercises
- •Answers to Chapter Questions
- •Chapter Pre-test
- •Assessment Questions
- •Scenarios
- •Mainboard Components
- •BIOS
- •System memory
- •System Resources
- •I/O addresses
- •Direct memory access
- •Laptop Considerations
- •PCMCIA
- •Linux Peripheral Configuration
- •Installing and Configuring SCSI Devices
- •SCSI definitions
- •SCSI technologies
- •SCSI cabling and termination
- •SCSI device configuration
- •Linux SCSI devices
- •ATA/IDE Devices
- •IDE drive configuration
- •Linux ATA/IDE Drive configuration
- •Linux Support for Other Devices
- •IEEE 1394 (Firewire)
- •Summary
- •Assessment Questions
- •Scenarios
- •Answers to Chapter Questions
- •Chapter Pre-test
- •Assessment Questions
- •Scenarios
- •What’s on the CD-ROM
- •System Requirements
- •Using the CD with Microsoft Windows
- •Using the CD with Linux
- •Microsoft Windows applications
- •Linux applications
- •Troubleshooting
- •Sample Exam
- •Exam Questions
- •Exam Answers
- •Taking a CompTIA Exam
- •How to register for an exam
- •What to expect at the testing center
- •Your exam results
- •If you don’t receive a passing score
- •About the Linux + Exam
- •Preparing for the Linux+ Exam
- •For More Information
- •Preamble
- •No Warranty
- •Glossary
- •Index
Chapter 7 Study Guide 257
Lab Exercises
Lab 7-1 Configuring Networking
The objective for this hands-on lab is to gain experience in configuring Linux networking. You should be able to use any distribution of Linux for this installation exercise.
1.Login as the root user
2.Start the linuxconf or netconfig program
3.Use the program to configure network services
4.Save the settings
5.Test the configuration using ifconfig -a and accessing a network
Answers to Chapter Questions
Chapter Pre-test
1.Transmission Control Protocol and Internet Protocol (TCP/IP) suite is the default protocol of the Internet, and all Linux systems.
2.Domain Name System is the naming system of the Internet; Windows Internet Naming Service is the Microsoft naming service; Network Information System is used in UNIX and is often called Yellow Pages; and Dynamic Host Configuration Protocol is used to assign IP addressing and can be used with all of the other services.
3.SMB/CIFS (System Message Block) and NFS (Network File System) are both protocols that allow network access of file systems.
4.Point-to-Point Protocol is a connection method used to create serial connections.
5.HyperText Transfer Protocol, Post Office Protocol, Simple Mail Transfer Protocol and Simple Network Management Protocol are used with TCP/IP to provide network services.
6.File Transfer Protocol and Trivial File Transfer Protocol are used to transfer files.
7.Telnet, rlogin, and SSH are the most common methods of remote access.
8.Gateways are usually routes to other networks and netmask defines the network scope.
258 Chapter 7 Study Guide
9.TCP/IP is the standard protocol of the Internet.
10.POP3 and IMAP are the standard Internet e-mail client protocols. SMTP is usually a server side protocol.
Assessment Questions
1.A. TCP is a connection-oriented protocol. For review, see the “TCP/IP Protocol Suite” section.
2.B. PPP is most often used to create serial point-to-point connections. For review, see the “Point-to-Point Protocol” section.
3.C. NIS and NFS use the RCP TCP/IP protocol. NIS is a similar service to DNS, DHCP is not used to provide NIS or NFS, and NIS is also known as Yellow Pages. For review, see the “Other network protocols” section.
4.D. The programs used for network configuration are linuxconf and netconfig. The others are not standard programs for network configuration. For review, see the “Configuring Basic Network Services” section.
5.B. The host name is most often used to provide the Fully Qualified Domain Name. The others are not naming systems. For review, see the “Host name” section.
6.C. IP addresses are 32-bit numbers. The others are not correct. For review, see the “IP addressing” section.
7.D. IP addresses are controlled by IANA; however, most clients receive IP addresses from ISPs. DHCP and DNS use IP addressing but are not assigning authorities. For review, see the “IP addressing” section.
8.A. The DHCP service is used to automatically assign IP addresses to clients. It does not provide the other services. For review, see the “DHCP” section.
9.C. When attempting to connect to a Web site, the major service used is DNS. DHCP is for IP addressing and NIS and WINS are normally used for LAN or Intranet naming. For review, see the “DNS” section.
10.A. A subnet mask identifies the class subnetting for that particular IP address. For review, see the “IP addressing” section.
11.A and D. PPP is preferred because it provides secure password authentication, error detection, and both synchronous and asynchronous communications. For review, see the “Point-to-Point Protocol” and “Serial Line Internet Protocol” sections.
12.B. NFS uses the NIS system. The others are not normally used for NFS sharing. For review, see the “NFS” section.
13.D. The Apache Web server is the most common Web server in use today. For review, see the “Apache Web Server” section.
Chapter 7 Study Guide 259
14.D. Samba is used to support the Microsoft SMB/CIFS systems. Samba is not used to support NFS, IPX or DHCP. For review, see the “Samba File Server” section.
15.A. The most common location of the Samba client files is /usr/local/ samba/bin/ or /usr/samba/bin/ directory. For review, see the “SMB/CIFS” section.
16.B. The command used to display the NIS password database is ypcat passwd.byname. The others do not provide the information. For review, see the “NIS client configuration” section.
17.A and C. FTP and TFTP are used to download files from a remote server. Telnet is used for remote access and SNMP is used for management. For review, see the “FTP” and “TFTP” sections.
18.D. The insmod command is used to load a module into the kernel. For review, see the “Hardware resources” section.
19.A, B, and D. To provide remote access Linux uses rlogin, Telnet, and SSH. For review, see the “Remote Access” Section.
20.D. SSH provides the best security of all the programs listed. For review, see the “OpenSSH” section.
Scenarios
1.The sales manager is wise to be worried about what services are started automatically. By default, the inetd daemon starts the ftpd, rlogind, rexecd, rshd, talkd, telnetd, and uucpd daemons, which can create many security holes. Editing inetd.conf can be done to stop these services from automatically being started.
2.Linux can replace most of the services that a Microsoft Windows NT server can provide with the Samba service.
User Environment
Settings
EXAM OBJECTIVES
3.3 Set environment variables (e.g., PATH, DISPLAY, TERM)
3.7 Identify when swap space needs to be increased
3.8 Add and configure printers
3.9 Install and configure add-in hardware (e.g., monitors, modems, network interfaces, scanners)
3.10 Reconfigure boot loader (e.g., LILO)
3.11 Identify the purpose and characteristics of configuration files (e.g., BASH, inittab, fstab, /etc/*)
3.12 Edit basic configuration files (e.g., BASH files, inittab, fstab)
3.14 Document the installation of the operating system, including configuration
C 8H A P T E R
262 Part III Configuration
CHAPTER PRE-TEST
1.What is the purpose of PATH?
2.What is the purpose of TERM?
3.Can the swap file be reconfigured?
4.Where is the inittab file located?
5.Where is the fstab file located?
6.What is a basic editor?
7.Can users have different shells on the same system?
8.What is BASH?
9.What should be done before editing any system configuration file?
10.What is the main reason to use a shell?
Answers to these questions can be found at the end of the chapter.