rhel 7
DESCRIPTION
rhel7TRANSCRIPT
![Page 1: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/1.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Comprehensive, hands-on training that solves real-world problems
Red Hat System Administration II
![Page 2: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/2.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
DAY ONE
Kickstart
RegularExpressions
Vim
DAY TWO
ProcessPriorities
cron and at
ACLs
SELinux
DAY ONE DAY THREE
Partitions andFilesystems
Logical Volumes
Access NFS
DAY FOUR
BootTroubleshooting
Access SMB
Firewalls
ComprehensiveReview
Network Users
Introduction
![Page 3: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/3.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Introduction
● Welcome to Class
● Course Objectives and Structure
● Orientation to Classroom Network
● Internationalization
DAY ONE
Kickstart
RegularExpressions
Vim
cron and at
Introduction
![Page 4: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/4.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Welcome to Class
![Page 5: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/5.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Course Objectives and Structure
![Page 6: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/6.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
DAY ONE
Kickstart
RegularExpressions
Vim
DAY TWO
ProcessPriorities
cron and at
ACLs
SELinux
DAY ONE DAY THREE
Partitions andFilesystems
Logical Volumes
Access NFS
DAY FOUR
BootTroubleshooting
Access SMB
Firewalls
ComprehensiveReview
Network Users
Introduction
![Page 7: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/7.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Orientation to Classroom Network
![Page 8: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/8.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Internationalization
![Page 9: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/9.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 1:Automating Installation with Kickstart
● Defining the Anaconda Kickstart System
● Deploying a New Virtual System with Kickstart
Kickstart
DAY ONE
RegularExpressions
Vim
cron and at
Introduction
![Page 10: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/10.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To automate the installation of Red Hat Enterprise Linux systems with Kickstart.
Goal:
![Page 11: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/11.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Explain Kickstart concepts and architecture.● Create a Kickstart configuration file.
Objectives:
![Page 12: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/12.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Defining the Anaconda Kickstart System
![Page 13: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/13.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Kickstart File Syntax and Modification
![Page 14: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/14.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Deploying a New Virtual Systemwith Kickstart
![Page 15: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/15.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
![Page 16: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/16.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
![Page 17: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/17.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Installing a System Using Kickstart
![Page 18: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/18.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter Test:Automating Installation
with Kickstart
![Page 19: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/19.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 2:Using Regular Expressions with grep
● Regular Expression Fundamentals
● Matching Text with grep
● Using grep with Logs
DAY ONE
Kickstart
RegularExpressions
Vim
cron and at
Introduction
![Page 20: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/20.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To write regular expressions using grep to isolate or locate content in text files.
Goal:
![Page 21: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/21.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Create regular expressions to match text patterns● Use grep to locate content in files
Objectives:
![Page 22: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/22.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Regular Expressions Fundamentals
![Page 23: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/23.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Quiz:Match the Regular Expression
![Page 24: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/24.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Matching Text with grep
![Page 25: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/25.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Using grep with Logs
![Page 26: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/26.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Lab:Using Regular Expressions with grep
![Page 27: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/27.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 3:Creating and Editing Text Files with vim
● The vim Text Editor
● Basic vim Workflow
● Editing with vim
DAY ONE
Kickstart
RegularExpressions
Vim
cron and at
Introduction
![Page 28: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/28.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To introduce the vim text editor.
Goal:
![Page 29: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/29.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Explain the three main modes of vim.● Open, edit, and save text files.● Use editor shortcuts.
Objectives:
![Page 30: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/30.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
The vim Text Editor
![Page 31: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/31.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:vim Modes
![Page 32: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/32.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Basic vim Workflow
![Page 33: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/33.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
![Page 34: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/34.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Basic vim Workflow
![Page 35: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/35.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Editing with vim
![Page 36: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/36.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Edit a File with vim
![Page 37: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/37.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Lab:Edit a System File with vim
![Page 38: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/38.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 4:Scheduling Future Linux Tasks
● Scheduling One-Time Tasks with at
● Scheduling Recurring Jobs with cron
● Scheduling System cron Jobs
● Managing Temporary Files
DAY ONE
Kickstart
RegularExpressions
Vim
cron and at
Introduction
![Page 39: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/39.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To schedule tasks to automatically execute in the future.
Goal:
![Page 40: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/40.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Schedule one-time tasks with at.● Schedule recurring jobs with cron.● Schedule recurring system jobs.
Objectives:
![Page 41: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/41.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Scheduling One-Time Tasks with at
![Page 42: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/42.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Scheduling One-Time Tasks with at
![Page 43: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/43.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Scheduling Recurring Jobs with cron
![Page 44: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/44.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Scheduling Recurring Jobs with cron
![Page 45: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/45.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Scheduling System cron Jobs
![Page 46: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/46.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Managing Temporary Files
![Page 47: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/47.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Managing Temporary Files
![Page 48: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/48.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter Test:Scheduling Future Linux Tasks
![Page 49: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/49.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 5:Managing Priority of Linux Processes
● Process Priorities and "nice" Concepts
● Using nice and renice to Influence Process Priority
Process Priorities
DAY TWO
ACLs
SELinux
Network Users
![Page 50: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/50.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To influence the relative priorities at which Linux processes run.
Goal:
![Page 51: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/51.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Describe nice levels.● Set nice levels on new and existing processes.
Objectives:
![Page 52: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/52.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Process Priority and "nice" Concepts
![Page 53: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/53.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
![Page 54: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/54.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Quiz:Process Priority and "nice" Concepts
![Page 55: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/55.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Using nice and renice toInfluence Process Priority
![Page 56: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/56.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Discovering Process Priorities
![Page 57: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/57.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Lab:Managing Priority of Linux Processes
![Page 58: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/58.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 6:Controlling Access to Files with Access Control Lists
● POSIX Access Control Lists (ACLs)
● Securing Files with ACLs
Process Priorities
DAY TWO
ACLs
SELinux
Network Users
![Page 59: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/59.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To manage file security using POSIX access control lists (ACLs).
Goal:
![Page 60: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/60.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Describe POSIX access control lists.● Manage POSIX access control lists.
Objectives:
![Page 61: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/61.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
POSIX Access Control Lists (ACLs)
![Page 62: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/62.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Quiz:Interpret ACLs
![Page 63: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/63.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Securing Files with ACLs
![Page 64: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/64.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Using ACLs to Grant and
Limit Access
![Page 65: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/65.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Lab:Controlling Access to Files with Access
Control Lists (ACLs)
![Page 66: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/66.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 7:Managing SELinux Security
● Enabling and Monitoring SELinux
● Changing SELinux Modes
● Changing SELinux Contexts
● Changing SELinux Booleans
● Troubleshooting SELinux
Process Priorities
DAY TWO
ACLs
SELinux
Network Users
![Page 67: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/67.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network servicecompromise.
Goal:
![Page 68: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/68.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Explain the basics of SELinux permissions.● Change SELinux modes with setenforce.● Change file contexts with semanage and restorecon.● Manage SELinux booleans with setsebool.● Examine logs and use sealert to troubleshoot SELinux
violations.
Objectives:
![Page 69: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/69.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Enabling and Monitoring Security EnhancedLinux (SELinux)
![Page 70: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/70.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
![Page 71: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/71.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
![Page 72: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/72.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
![Page 73: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/73.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Quiz:SELinux Concepts
![Page 74: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/74.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Changing SELinux Modes
![Page 75: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/75.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Changing SELinux Modes
![Page 76: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/76.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Changing SELinux Contexts
![Page 77: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/77.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Changing SELinux Contexts
![Page 78: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/78.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Changing SELinux Booleans
![Page 79: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/79.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Changing SELinux Booleans
![Page 80: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/80.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Troubleshooting SELinux
![Page 81: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/81.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Troubleshooting SELinux
![Page 82: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/82.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Lab:Managing SELinux Security
![Page 83: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/83.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 8:Connecting to Network-defined Users and Groups
● Using Identity Management Services
Process Priorities
DAY TWO
ACLs
SELinux
Network Users
![Page 84: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/84.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To configure systems to use central identity management services.
Goal:
![Page 85: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/85.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
●Use centralized identity management services.
Objective:
![Page 86: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/86.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Using Identity Management Services
![Page 87: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/87.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
![Page 88: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/88.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Connecting to a Central LDAP and
Kerberos Server
![Page 89: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/89.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Lab:Connecting to Network-defined
Users and Groups
![Page 90: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/90.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 9:Adding Disks, Partitions, and Filesystems to a Linux System
● Adding Partitions, Filesystems, and Persistent Mounts
● Adding and Enabling Swap Space
Partitions andFilesystems
DAY THREE
Logical Volumes
Access NFS
Access SMB
![Page 91: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/91.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To create and manage disks, partitions, and filesystems from the command line.
Goal:
![Page 92: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/92.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Manage simple partitions and filesystems.● Manage swap space.
Objectives:
![Page 93: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/93.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Adding Partition, Filesystem,and Persistent Mount
![Page 94: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/94.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Adding Partition, Filesystem,
Persistent Mount
![Page 95: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/95.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Managing Swap Space
![Page 96: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/96.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Adding and Enabling Swap Space
![Page 97: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/97.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Lab:Adding Filesystem, Swap,
and Persistent Mount
![Page 98: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/98.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 10:Managing Logical Volume Management Storage
● Logical Volume Management Concepts
● Managing Logical Volumes
● Extending Logical Volumes
Partitions andFilesystems
DAY THREE
Logical Volumes
Access NFS
Access SMB
![Page 99: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/99.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To manage logical volumes from the command line.
Goal:
![Page 100: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/100.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Describe logical volume management components and concepts.
● Manage logical volumes.● Extend logical volumes.
Objectives:
![Page 101: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/101.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Logical Volume Management Concepts
![Page 102: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/102.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
![Page 103: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/103.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Quiz:Logical Volume
Management Concepts
![Page 104: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/104.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Managing Logical Volumes
![Page 105: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/105.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Adding a Logical Volume
![Page 106: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/106.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Extending Logical Volumes
![Page 107: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/107.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Extending a Logical Volume
![Page 108: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/108.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Lab:Managing Logical Volume Management
(LVM) Storage
![Page 109: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/109.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 11:Accessing Network Storage with Network File System (NFS)
● Mounting Network Storage with NFS
● Automounting Network Storage with NFS
Partitions andFilesystems
DAY THREE
Logical Volumes
Access NFS
Access SMB
![Page 110: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/110.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To use autofs and the command line to mount and unmount network storage with NFS.
Goal:
![Page 111: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/111.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Mount, access and unmount network storage with NFS● Automount and access network storage with NFS
Objectives:
![Page 112: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/112.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Mounting Network Storage with NFS
![Page 113: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/113.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Mounting and Unmounting NFS
![Page 114: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/114.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Automounting Network Storage with NFS
![Page 115: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/115.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Automounting NFS
![Page 116: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/116.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Lab:Accessing Network Storage with Network
File System (NFS)
![Page 117: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/117.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 12:Accessing Network Storage with SMB
● Accessing Network Storage with SMB
Partitions andFilesystems
DAY THREE
Logical Volumes
Access NFS
Access SMB
![Page 118: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/118.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To use autofs and the command line to mount and unmount SMB file systems.
Goal:
![Page 119: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/119.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Mount, automount, and unmount SMB file systems.
Objective:
![Page 120: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/120.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Accessing Network Storage with SMB
![Page 121: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/121.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Mounting a SMB File System
![Page 122: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/122.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Lab:Accessing Network Storage with SMB
![Page 123: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/123.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 13:Controlling and Troubleshooting the Red Hat Enterprise Linux Boot Process
● The Red Hat Enterprise Linux Boot Process
● Repairing Common Boot Issues
● Repairing File System Issues at Boot
● Repairing Boot Loader Issues
BootTroubleshooting
DAY FOUR
Firewalls
ComprehensiveReview
![Page 124: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/124.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To troubleshoot the Red Hat Enterprise Linux boot process.
Goal:
![Page 125: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/125.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Describe the Red Hat Enterprise Linux boot process.● Repair common boot issues.● Repair file system issues at boot.● Repair bootloader problems.
Objectives:
![Page 126: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/126.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
The Red Hat Enterprise Linux Boot Process
![Page 127: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/127.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Selecting a Boot Target
![Page 128: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/128.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Repairing Common Boot Issues
![Page 129: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/129.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Repairing Common Boot Issues
![Page 130: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/130.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Resetting a Lost root Password
![Page 131: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/131.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Repairing File System Issues at Boot
![Page 132: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/132.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Repairing Boot Problems
![Page 133: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/133.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Repairing Boot Loader Issues
![Page 134: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/134.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Repairing a Boot Loader Problem
![Page 135: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/135.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Lab:Controlling and Troubleshooting the Red
Hat Enterprise Linux Boot Process
![Page 136: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/136.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 14:Limiting Network Communication with firewalld
● Limiting Network Communication
BootTroubleshooting
DAY FOUR
Firewalls
ComprehensiveReview
![Page 137: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/137.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To configure a basic firewall.
Goal:
![Page 138: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/138.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Configure a basic firewall using firewalld, firewallconfig, and firewall-cmd.
Objective:
![Page 139: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/139.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Limiting Network Communication
![Page 140: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/140.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
![Page 141: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/141.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Practice:Limiting Network Communication
![Page 142: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/142.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Lab:Limiting Network Communication
![Page 143: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/143.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Chapter 15:Comprehensive Review
● Red Hat System Administration II Comprehensive Review
BootTroubleshooting
DAY FOUR
Firewalls
ComprehensiveReview
![Page 144: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/144.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
To practice and demonstrate knowledge and skills learned in Red Hat System Administration II.
Goal:
![Page 145: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/145.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
● Review course chapters to reinforce knowledge and skills.
Objective:
![Page 146: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/146.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Red Hat System Administration II Comprehensive Review
![Page 147: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/147.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610
Comprehensive Review of System Administration II
![Page 148: rhel 7](https://reader030.vdocuments.us/reader030/viewer/2022033022/55cf8fe3550346703ba0e62c/html5/thumbnails/148.jpg)
Copyright © 2014 Red Hat, Inc.RH134-RHEL7-en-1-20140610