rhel 7

148
Copyright © 2014 Red Hat, Inc. RH134-RHEL7-en-1-20140610 Comprehensive, hands-on training that solves real-world problems Red Hat System Administration II

Upload: gyan1

Post on 22-Dec-2015

33 views

Category:

Documents


0 download

DESCRIPTION

rhel7

TRANSCRIPT

Page 1: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Comprehensive, hands-on training that solves real-world problems

Red Hat System Administration II

Page 2: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

DAY ONE

Kickstart

RegularExpressions

Vim

DAY TWO

ProcessPriorities

cron and at

ACLs

SELinux

DAY ONE DAY THREE

Partitions andFilesystems

Logical Volumes

Access NFS

DAY FOUR

BootTroubleshooting

Access SMB

Firewalls

ComprehensiveReview

Network Users

Introduction

Page 3: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Introduction

● Welcome to Class

● Course Objectives and Structure

● Orientation to Classroom Network

● Internationalization

DAY ONE

Kickstart

RegularExpressions

Vim

cron and at

Introduction

Page 4: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Welcome to Class

Page 5: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Course Objectives and Structure

Page 6: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

DAY ONE

Kickstart

RegularExpressions

Vim

DAY TWO

ProcessPriorities

cron and at

ACLs

SELinux

DAY ONE DAY THREE

Partitions andFilesystems

Logical Volumes

Access NFS

DAY FOUR

BootTroubleshooting

Access SMB

Firewalls

ComprehensiveReview

Network Users

Introduction

Page 7: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Orientation to Classroom Network

Page 8: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Internationalization

Page 9: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter 1:Automating Installation with Kickstart

● Defining the Anaconda Kickstart System

● Deploying a New Virtual System with Kickstart

Kickstart

DAY ONE

RegularExpressions

Vim

cron and at

Introduction

Page 10: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

To automate the installation of Red Hat Enterprise Linux systems with Kickstart.

Goal:

Page 11: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

● Explain Kickstart concepts and architecture.● Create a Kickstart configuration file.

Objectives:

Page 12: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Defining the Anaconda Kickstart System

Page 13: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Kickstart File Syntax and Modification

Page 14: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Deploying a New Virtual Systemwith Kickstart

Page 15: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Page 16: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Page 17: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Installing a System Using Kickstart

Page 18: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter Test:Automating Installation

with Kickstart

Page 19: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter 2:Using Regular Expressions with grep

● Regular Expression Fundamentals

● Matching Text with grep

● Using grep with Logs

DAY ONE

Kickstart

RegularExpressions

Vim

cron and at

Introduction

Page 20: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

To write regular expressions using grep to isolate or locate content in text files.

Goal:

Page 21: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

● Create regular expressions to match text patterns● Use grep to locate content in files

Objectives:

Page 22: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Regular Expressions Fundamentals

Page 23: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Quiz:Match the Regular Expression

Page 24: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Matching Text with grep

Page 25: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Using grep with Logs

Page 26: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Lab:Using Regular Expressions with grep

Page 27: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter 3:Creating and Editing Text Files with vim

● The vim Text Editor

● Basic vim Workflow

● Editing with vim

DAY ONE

Kickstart

RegularExpressions

Vim

cron and at

Introduction

Page 28: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

To introduce the vim text editor.

Goal:

Page 29: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

● Explain the three main modes of vim.● Open, edit, and save text files.● Use editor shortcuts.

Objectives:

Page 30: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

The vim Text Editor

Page 31: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:vim Modes

Page 32: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Basic vim Workflow

Page 33: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Page 34: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Basic vim Workflow

Page 35: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Editing with vim

Page 36: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Edit a File with vim

Page 37: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Lab:Edit a System File with vim

Page 38: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter 4:Scheduling Future Linux Tasks

● Scheduling One-Time Tasks with at

● Scheduling Recurring Jobs with cron

● Scheduling System cron Jobs

● Managing Temporary Files

DAY ONE

Kickstart

RegularExpressions

Vim

cron and at

Introduction

Page 39: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

To schedule tasks to automatically execute in the future.

Goal:

Page 40: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

● Schedule one-time tasks with at.● Schedule recurring jobs with cron.● Schedule recurring system jobs.

Objectives:

Page 41: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Scheduling One-Time Tasks with at

Page 42: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Scheduling One-Time Tasks with at

Page 43: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Scheduling Recurring Jobs with cron

Page 44: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Scheduling Recurring Jobs with cron

Page 45: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Scheduling System cron Jobs

Page 46: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Managing Temporary Files

Page 47: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Managing Temporary Files

Page 48: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter Test:Scheduling Future Linux Tasks

Page 49: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter 5:Managing Priority of Linux Processes

● Process Priorities and "nice" Concepts

● Using nice and renice to Influence Process Priority

Process Priorities

DAY TWO

ACLs

SELinux

Network Users

Page 50: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

To influence the relative priorities at which Linux processes run.

Goal:

Page 51: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

● Describe nice levels.● Set nice levels on new and existing processes.

Objectives:

Page 52: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Process Priority and "nice" Concepts

Page 53: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Page 54: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Quiz:Process Priority and "nice" Concepts

Page 55: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Using nice and renice toInfluence Process Priority

Page 56: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Discovering Process Priorities

Page 57: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Lab:Managing Priority of Linux Processes

Page 58: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter 6:Controlling Access to Files with Access Control Lists

● POSIX Access Control Lists (ACLs)

● Securing Files with ACLs

Process Priorities

DAY TWO

ACLs

SELinux

Network Users

Page 59: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

To manage file security using POSIX access control lists (ACLs).

Goal:

Page 60: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

● Describe POSIX access control lists.● Manage POSIX access control lists.

Objectives:

Page 61: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

POSIX Access Control Lists (ACLs)

Page 62: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Quiz:Interpret ACLs

Page 63: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Securing Files with ACLs

Page 64: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Using ACLs to Grant and

Limit Access

Page 65: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Lab:Controlling Access to Files with Access

Control Lists (ACLs)

Page 66: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter 7:Managing SELinux Security

● Enabling and Monitoring SELinux

● Changing SELinux Modes

● Changing SELinux Contexts

● Changing SELinux Booleans

● Troubleshooting SELinux

Process Priorities

DAY TWO

ACLs

SELinux

Network Users

Page 67: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

To manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network servicecompromise.

Goal:

Page 68: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

● Explain the basics of SELinux permissions.● Change SELinux modes with setenforce.● Change file contexts with semanage and restorecon.● Manage SELinux booleans with setsebool.● Examine logs and use sealert to troubleshoot SELinux

violations.

Objectives:

Page 69: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Enabling and Monitoring Security EnhancedLinux (SELinux)

Page 70: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Page 71: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Page 72: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Page 73: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Quiz:SELinux Concepts

Page 74: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Changing SELinux Modes

Page 75: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Changing SELinux Modes

Page 76: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Changing SELinux Contexts

Page 77: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Changing SELinux Contexts

Page 78: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Changing SELinux Booleans

Page 79: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Changing SELinux Booleans

Page 80: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Troubleshooting SELinux

Page 81: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Troubleshooting SELinux

Page 82: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Lab:Managing SELinux Security

Page 83: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter 8:Connecting to Network-defined Users and Groups

● Using Identity Management Services

Process Priorities

DAY TWO

ACLs

SELinux

Network Users

Page 84: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

To configure systems to use central identity management services.

Goal:

Page 85: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

●Use centralized identity management services.

Objective:

Page 86: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Using Identity Management Services

Page 87: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Page 88: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Connecting to a Central LDAP and

Kerberos Server

Page 89: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Lab:Connecting to Network-defined

Users and Groups

Page 90: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter 9:Adding Disks, Partitions, and Filesystems to a Linux System

● Adding Partitions, Filesystems, and Persistent Mounts

● Adding and Enabling Swap Space

Partitions andFilesystems

DAY THREE

Logical Volumes

Access NFS

Access SMB

Page 91: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

To create and manage disks, partitions, and filesystems from the command line.

Goal:

Page 92: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

● Manage simple partitions and filesystems.● Manage swap space.

Objectives:

Page 93: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Adding Partition, Filesystem,and Persistent Mount

Page 94: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Adding Partition, Filesystem,

Persistent Mount

Page 95: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Managing Swap Space

Page 96: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Adding and Enabling Swap Space

Page 97: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Lab:Adding Filesystem, Swap,

and Persistent Mount

Page 98: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter 10:Managing Logical Volume Management Storage

● Logical Volume Management Concepts

● Managing Logical Volumes

● Extending Logical Volumes

Partitions andFilesystems

DAY THREE

Logical Volumes

Access NFS

Access SMB

Page 99: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

To manage logical volumes from the command line.

Goal:

Page 100: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

● Describe logical volume management components and concepts.

● Manage logical volumes.● Extend logical volumes.

Objectives:

Page 101: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Logical Volume Management Concepts

Page 102: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Page 103: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Quiz:Logical Volume

Management Concepts

Page 104: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Managing Logical Volumes

Page 105: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Adding a Logical Volume

Page 106: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Extending Logical Volumes

Page 107: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Extending a Logical Volume

Page 108: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Lab:Managing Logical Volume Management

(LVM) Storage

Page 109: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter 11:Accessing Network Storage with Network File System (NFS)

● Mounting Network Storage with NFS

● Automounting Network Storage with NFS

Partitions andFilesystems

DAY THREE

Logical Volumes

Access NFS

Access SMB

Page 110: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

To use autofs and the command line to mount and unmount network storage with NFS.

Goal:

Page 111: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

● Mount, access and unmount network storage with NFS● Automount and access network storage with NFS

Objectives:

Page 112: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Mounting Network Storage with NFS

Page 113: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Mounting and Unmounting NFS

Page 114: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Automounting Network Storage with NFS

Page 115: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Automounting NFS

Page 116: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Lab:Accessing Network Storage with Network

File System (NFS)

Page 117: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter 12:Accessing Network Storage with SMB

● Accessing Network Storage with SMB

Partitions andFilesystems

DAY THREE

Logical Volumes

Access NFS

Access SMB

Page 118: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

To use autofs and the command line to mount and unmount SMB file systems.

Goal:

Page 119: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

● Mount, automount, and unmount SMB file systems.

Objective:

Page 120: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Accessing Network Storage with SMB

Page 121: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Mounting a SMB File System

Page 122: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Lab:Accessing Network Storage with SMB

Page 123: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter 13:Controlling and Troubleshooting the Red Hat Enterprise Linux Boot Process

● The Red Hat Enterprise Linux Boot Process

● Repairing Common Boot Issues

● Repairing File System Issues at Boot

● Repairing Boot Loader Issues

BootTroubleshooting

DAY FOUR

Firewalls

ComprehensiveReview

Page 124: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

To troubleshoot the Red Hat Enterprise Linux boot process.

Goal:

Page 125: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

● Describe the Red Hat Enterprise Linux boot process.● Repair common boot issues.● Repair file system issues at boot.● Repair bootloader problems.

Objectives:

Page 126: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

The Red Hat Enterprise Linux Boot Process

Page 127: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Selecting a Boot Target

Page 128: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Repairing Common Boot Issues

Page 129: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Repairing Common Boot Issues

Page 130: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Resetting a Lost root Password

Page 131: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Repairing File System Issues at Boot

Page 132: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Repairing Boot Problems

Page 133: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Repairing Boot Loader Issues

Page 134: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Repairing a Boot Loader Problem

Page 135: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Lab:Controlling and Troubleshooting the Red

Hat Enterprise Linux Boot Process

Page 136: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter 14:Limiting Network Communication with firewalld

● Limiting Network Communication

BootTroubleshooting

DAY FOUR

Firewalls

ComprehensiveReview

Page 137: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

To configure a basic firewall.

Goal:

Page 138: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

● Configure a basic firewall using firewalld, firewallconfig, and firewall-cmd.

Objective:

Page 139: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Limiting Network Communication

Page 140: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Page 141: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Practice:Limiting Network Communication

Page 142: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Lab:Limiting Network Communication

Page 143: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Chapter 15:Comprehensive Review

● Red Hat System Administration II Comprehensive Review

BootTroubleshooting

DAY FOUR

Firewalls

ComprehensiveReview

Page 144: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

To practice and demonstrate knowledge and skills learned in Red Hat System Administration II.

Goal:

Page 145: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

● Review course chapters to reinforce knowledge and skills.

Objective:

Page 146: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Red Hat System Administration II Comprehensive Review

Page 147: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610

Comprehensive Review of System Administration II

Page 148: rhel 7

Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610