22
Figure 2-11. Editing a Network Device
Note
Do not use the numbers as seen in this sample configuration. These values will not work for your own
network configuration. If you are not sure what values to enter, contact your network administrator for
assistance.
If you have a hostname (fully qualified domain name) for the network device, you can choose to have
DHCP (Dynamic Host Configuration Protocol) automatically detect it or you can manually enter the
hostname in the field provided.
Finally, if you entered the IP and Netmask information manually, you may also enter the Gateway
address and the Primary, Secondary, and Tertiary DNS addresses.
Tip
Even if your computer is not part of a network, you can enter a hostname for your system. If you do
not take this opportunity to enter a name, your system will be known as
Tip
To change your network configuration after you have completed the installation, use the Network
Administration Tool.
Type the
redhat-config-network
tion Tool. If you are not root, it prompts you for the root password to continue.
2.14. Firewall Configuration
Red Hat Enterprise Linux offers firewall protection for enhanced system security. A firewall exists
between your computer and the network, and determines which resources on your computer remote
users on the network can access. A properly configured firewall can greatly increase the security of
your system.
Chapter 2. Installing Red Hat Enterprise Linux
command in a shell prompt to launch the Network Administra-
.
localhost
Need help?
Do you have a question about the ENTERPRISE LINUX 3 - INSTALLATION GUIDE FOR IBM S-390 AND IBM ESERVER ZSERIES and is the answer not in the manual?
Questions and answers