Root Password; Network Configuration - Novell LINUX ENTERPRISE SERVER 10 - INSTALLATION AND ADMINISTRATION 04-08-2006 Installation Manual

Table of Contents

Advertisement

3.10.2 root Password

root is the name of the superuser, the administrator of the system. Unlike regular
users, which may or may not have permission to do certain things on the system, root
has unlimited power to do anything: change the system configuration, install programs,
and set up new hardware. If users forget their passwords or have other problems with
the system, root can help. The root account should only be used for system admin-
istration, maintenance, and repair. Logging in as root for daily work is rather risky:
a single mistake could lead to irretrievable loss of many system files.
For verification purposes, the password for root must be entered twice. Do not forget
the root password. Once entered, this password cannot be retrieved.

3.10.3 Network Configuration

TIP: IBM System z: Network Configuration
For the IBM System z platforms, a working network connection is needed at
installation time to connect to the target system, the installation source, and
the YaST terminal controlling the process. The steps to set up the network are
discussed in the network configuration chapter of the Architecture-Specific In-
formation manual (Chapter 2, Preparing for Installation (↑Architecture-Specific
Information)). The IBM System z platforms only support the types of network
interfaces mentioned in that chapter (OSA Token Ring, OSA Ethernet, OSA Gi-
gabit Ethernet, OSA Express Fast Ethernet, Escon, IUCV, OSA Express High-Speed
Token Ring). The YaST dialog simply displays the interface with its settings as
previously configured. Just confirm this dialog to continue.
You can now choose whether to use NetworkManager or the traditional method to
manage all your network devices. NetworkManager is the new tool enabling automatic
connection establishment with minimal user intervention. It is ideal for mobile comput-
ing. Also configure the network devices of your system and make security settings, for
example, for a firewall or proxy. To configure your network hardware at this stage, refer
to
Section 31.4, "Configuring a Network Connection with YaST"
select Skip Configuration and click Next. Network hardware can also be configured
after the system installation has been completed.
58
Installation and Administration
(page 578). Otherwise,

Advertisement

Table of Contents
loading

This manual is also suitable for:

Suse linux enterprise server 10

Table of Contents