Red Hat ENTERPRISE LINUX 4 System Administration Manual page 6

Hide thumbs Also See for ENTERPRISE LINUX 4:
Table of Contents

Advertisement

System Administration Guide
15.1. RPM Design Goals ......................................................................................... 131
15.2. Using RPM ..................................................................................................... 132
15.2.1. Finding RPM Packages ........................................................................ 132
15.2.2. Installing .............................................................................................. 132
15.2.3. Uninstalling .......................................................................................... 134
15.2.4. Upgrading ............................................................................................ 135
15.2.5. Freshening .......................................................................................... 136
15.2.6. Querying .............................................................................................. 136
15.2.7. Verifying .............................................................................................. 137
15.3. Checking a Package's Signature ..................................................................... 138
15.3.1. Importing Keys ..................................................................................... 138
15.3.2. Verifying Signature of Packages ........................................................... 139
15.4. Impressing Your Friends with RPM .................................................................. 139
15.5. Additional Resources ...................................................................................... 141
15.5.1. Installed Documentation ....................................................................... 141
15.5.2. Useful Websites ................................................................................... 141
15.5.3. Related Books ..................................................................................... 141
17.1. Overview ........................................................................................................ 150
17.2. Establishing an Ethernet Connection ................................................................ 151
17.3. Establishing an ISDN Connection .................................................................... 154
17.4. Establishing a Modem Connection ................................................................... 155
17.5. Establishing an xDSL Connection .................................................................... 157
17.6. Establishing a Token Ring Connection ............................................................. 160
17.7. Establishing a Wireless Connection ................................................................. 163
17.8. Managing DNS Settings .................................................................................. 165
17.9. Managing Hosts .............................................................................................. 166
17.10. Working with Profiles .................................................................................... 168
17.11. Device Aliases .............................................................................................. 171
17.12. Saving and Restoring the Network Configuration ............................................. 173
18.1. Netfilter and IPTables ..................................................................................... 176
18.1.1. IPTables Overview ............................................................................... 176
18.2. Basic Firewall Configuration ............................................................................ 176
18.2.1. Security Level Configuration Tool ...................................................... 177
18.2.2. Enabling and Disabling the Firewall ....................................................... 178
18.2.3. Trusted Services .................................................................................. 178
18.2.4. Other Ports .......................................................................................... 179
18.2.5. Saving the Settings .............................................................................. 179
18.2.6. Activating the IPTables Service ............................................................. 179
18.3. Using IPTables ............................................................................................... 180
18.3.1. IPTables Command Syntax .................................................................. 180
18.3.2. Basic Firewall Policies .......................................................................... 180
18.3.3. Saving and Restoring IPTables Rules ................................................... 181
18.4. Common IPTables Filtering ............................................................................. 181
18.5. FORWARD and NAT Rules ................................................................................ 182
vi
143
147
149
175

Advertisement

Table of Contents
loading

Table of Contents