Linux Lab 2016
Linux Lab 2016
FOR RHEL
6.4
LINUX
REFERENCE
GUIDE Page
http://www.kerneltraining.com/
Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is
implied.
Name:
Batch: MORNING / AFTERNOON / EVENING
Our Address:
Page i
http://www.kerneltraining.com/
Dedicated to:
My parents,
and to my students
P a g e ii
http://www.kerneltraining.com/
Musabuddin Syed is a highly acclaimed trainer, author and solutions provider. He regularly trains students both
in-class and online at KernelSphere Technologies.
I would like to thank Mr. Vinod Kumar (Rahul) and Ms. Jyoti Singh (MD Kernel Tech), for giving me the opportunity
to compile this book on Linux.
I would especially like to thank my Mentor Mr. Vinod Kumar (Rahul) for all his support, guidance, supervision and
patience in making of this book.
I would also like to extend my thanks to the entire dedicated KernelSphere team for their support and suggestions
in making of this book.
Musabuddin Syed
Though we have taken utmost efforts to present you this book error free, but still it may contain some errors or
mistakes. Students are encouraged to bring, if there are any mistakes or errors in this document to our notice.
So that it may be rectified in the next edition of this document.
This document provides the brief information on every topic and lab practices. The students are advice to make
full use of the lab sessions, taking help of the Lab Assistants available. Please, feel free to ask your doubts to our
faculties.
“Suppressing your doubts is Hindering your growth”.
We urge you to work hard and make use of the facilities we are providing to you, because there is no substitute
for hard work. We wish you all the best for your future.
“God gives every bird its food, but He does not throw it into its nest” J.G. Holland
P a g e iii
http://www.kerneltraining.com/
Table of Contents
Introduction to KernelSphere ………………………………………………………………………………………… vi-ix
Introduction to Linux ……………………………………………………………………………………………………… 01-10
Basic Commands ……………………………………………………………………………………………………………. 11-35
RHEL 6.4 Basic Graphical Installation …………………………………………………………………………….. 36-52
Managing File Systems and Partitions …………………………………………………………………………... 53-74
Logical Volume Management (LVM) ……………………………………………………………………………… 75-97
User and Group Administration ……………………………………………………………………………………. 98-120
Network Configuration and Troubleshooting……………………………………………………………….. 121-146
Managing SELinux (Basics) ……………………………………………………………………………………………. 147-156
Booting Procedure and Kernel Parameters …………………………………………………………………... 157-177
Job Automation ……………………………………………………………………………………………………………. 178-187
Administrating Remote System ……………………………………………………………………………………. 188-199
Enhanced User Security with SUDO ……………………………………………………………………………… 200-209
Software Management ………………………………………………………………………………………………… 210-232
Backup and Restore (tar and gzip) ……………………………………………………………………………….. 233-236
Manage Installed Services ……………………………………………………………………………………………. 237-240
Managing Processes …………………………………………………………………………………………………….. 241-252
FTP (File Transfer Protocol) Server ……………………………………………………………………………….. 253-266
NFS (Network File System) Server ………………………………………………………………………………… 267-276
Samba Server ……………………………………………………………………………………………………………….. 277-285
DNS (Domain Name System) Server ……………………………………………………………………………… 286-298
Web Server (Apache) ……………………………………………………………………………………………………. 299-311
Squid Proxy Server ……………………………………………………………………………………………………….. 312-319
DHCP Server …………………………………………………………………………………………………………………. 320-325
Mail Server ……………………………………………………………………………..……………………………………. 326-330
Configuring Firewall through iptables …………………………………………………………………………… 331-334
Kickstart and Network Installations ………………………………………………………………………………. 335-351
P a g e iv
http://www.kerneltraining.com/
L E A R N B Y Y O UR S E L F T OP I C S
( A DDI T I ON A L ) :
Installation of Oracle Database 11g ………………………………………………………………………………. 353-361
Implementing Nagios Core on RHEL 6.4…………………………………………………………………………. 362-366
Creating filesystem using Parted……………………………………………………………………………………. 367-371
Well Known Port Numbers ……………………………………………………………………………………………. 372-385
Page v
http://www.kerneltraining.com/
KernelSphere Technologies imparts knowledge transfer through expertise to the aspiring candidates of the
ever challenging IT world. Kernel Technologies established as a training institute with the motive of
providing the advanced technology required for job aspirants has now with immense hard work, dedication
became very successful in trainings as well as imparting solutions.
We follow the Industry Standard Practices, implement ITIL at KernelSphere Technologies. A candidate at Kernel
Technologies is exposed to real time environment with our REAL TIME REPLICA MODEL DATA CENTER, the ever
challenging real time issues are taught with expertise.
At KernelSphere Technologies, a candidate will learn this well-designed wonderful LINUX Operating System used
by innumerous clients across the globe. As they say: Perfect practice makes perfect. Learn to master LINUX from
the experts. You can be rest assured that you are at one of the best places to master this Operating System when
you learn it from Kernel Technologies.
A visit to KernelSphere Technologies will surely enlighten you; you will hear a lot of successful stories, see the
successful mails of our students who got placed in MNCs, you can visit the datacenter at the Kernel
Technologies; check out the IBM POWER machines; feel how the work is done in real time.
We are also:
P a g e vi
http://www.kerneltraining.com/
K E R N E L S P H E R E T E C HN O L O GI E S
D ATA C ENTER
KERNESPHERE TECHNOLOGIES HAS THE STATE-OF-THE-ART DATA
CENTER LOCATED AT ITS HEAD OFFICE IN HYDERABAD.
SWITCHES
STORAGE
VMAX SE
NETAPP 2240
IBM V7000
IBM DS 5000
P a g e vii
http://www.kerneltraining.com/
RAC SERVERS
NAGIOS AND
OTRS
MONITORING
SYSTSMS
P a g e viii
http://www.kerneltraining.com/
CAREER - VIRTUALIZATION
• MCITP
• VMware vSPHERE 5.1
• CITRIX
• CLOUD COMPUTING
CAREER - STORAGE
• EMC VNX/CLARIION
• NETAPP
• IBM DATA STORAGE
CAREER - ORACLE
• DBA
• RAC
• EXADATA
• VIRTUALIZATION
• AIX
• LINUX
• LINUX CLUSTER
• LPAR/VIO
• HACMP
• SHELL SCRIPTING
P a g e ix
http://www.kerneltraining.com/
0 PAGE
http://www.kerneltraining.com/
1 PAGE
http://www.kerneltraining.com/
HISTORY OF UNIX
Bell Labs’ Ken Thompson developed UNIX in 1969 so he could play games on a scavenged DEC
PDP-7. With the help of Dennis Ritchie, the inventor of the “C” programing language, Ken
rewrote UNIX entirely in “C” so that it could be used on different computers. In 1974, the OS
was licensed to universities for educational purposes. Over the years, hundreds of people
added and improved upon the system, and it spread into the commercial world. Dozens of
different UNIX “flavors” appeared, each with unique qualities, yet still having enough
similarities to the original AT&T version. All of the “flavors” were based on either AT&T’s
System V or Berkeley System Distribution (BSD) UNIX, or a hybrid of both.
During the late 1980’s there were several of commercial implementations of UNIX:
Apple Computer’s A/UX
AT&T’s System V Release 3
Digital Equipment Corporation’s Ultrix and OSF/1 (renamed to DEC UNIX)
Hewlett Packard’s HP-UX
IBM’s AIX
Lynx’s Real-Time UNIX
NeXT’s NeXTStep
Santa Cruz Operation’s SCO UNIX
Silicon Graphics’ IRIX
SUN Microsystems’ SUN OS and Solaris and dozens more.
The Open Standards Foundation is a UNIX industry organization designed to keep the various
UNIX flavors working together. They created operating systems guidelines called POSIX to
encourage inter-operability of applications from one flavor of UNIX to another. Portability of
applications to different gave UNIX a distinct advantage over its mainframe competition.
2 PAGE
http://www.kerneltraining.com/
Then came the GUIs. Apple’s Macintosh operating system and Microsoft’s Windows operating
environment simplified computing tasks, and made computers more appealing to a larger
number of users. UNIX wizards enjoyed the power of the command line interface, but
acknowledged the difficult learning curve for new users. The Athena Project at MIT developed
the X Windows Graphical User Interface for UNIX computers. Also known as the X11
environment, corporations developed their own “flavors” of the UNIX GUIs based on X11.
Eventually, a GUI standard called Motif was generally accepted by the corporations and
academia.
During the late 1990’s Microsoft’s Windows NT operating system started encroaching into
traditional UNIX businesses such as banking and high-end graphics. Although not as reliable as
UNIX, NT became popular because of the lower learning curve and its similarities to Windows
95 and 98. Many traditional
UNIX companies, such as DEC and Silicon Graphics abandoned their OS for NT. Others, such as
SUN, focused their efforts on niche markets, such as the Internet.
UNIX PRINCIPLES
Everything is a file:- UNIX system have many powerful utilities designed to create and
manipulate files. The UNIX security model is based around the security of files. By treating
everything as a file, you can secure access to hardware in the same way as you secure access to
a document.
Configuration data stored in text: - Storing configuration in text allows an administrator to
move a configuration from one machine to another easily, provide the ability to roll back a
system configuration to a particular date and time.
Small, Single-Purpose Programs: - UNIX provides many utilities.
Avoid captive user interfaces:-
Ability to chain programs together to perform complex tasks:- A core design feature of UNIX is
that output of one program can be the input for another. This gives the user the flexibility to
combine many small programs together to perform a larger, more complex task.
3 PAGE
http://www.kerneltraining.com/
WHY LINUX?
Fresh implementation of UNIX APIs
Open source development model
Supports wide variety of hardware
Supports many networking protocols and Configurations
Fully supported
Linux is a UNIX like OS: Linux is a similar to UNIX as the various UNIX versions are to each other.
Multi-User and Multi-tasking: Linux is a multi-user and multi-tasking operating system. That
means that more than one person can be logged on to the same Linux computer at the same
time. The same user could even be logged into their account from two or more terminals at the
same time; Linux is also Multi-Tasking. A user can have more than one program executing at the
same time.
Wide hardware support: Red Hat Linux support most pieces modern x86 compatible PC
hardware.
Fully Supported: Red Hat Linux is a fully supported distribution Red Hat Inc. provides many
support programs for the smallest to the largest companies.
4 PAGE
http://www.kerneltraining.com/
ARCHITECTURE OF UNIX
A kernel is the central part of an operating system. It manages the tasks of the computer and
the hardware - most notably memory and CPU time.
A computer user never interacts directly with the kernel. It runs behind the scenes and cannot
be seen, except for the text logs that it prints.
The architecture of UNIX can be divided into three levels of functionality. The lowest level is the
kernel, which schedules tasks, manages resources, and controls security. The next level is the
shell, which acts as the user interface, interpreting user commands and starting applications.
The highest level is utilities, which provides utility functions. In other words it is the USER level,
as user is the one who operates those utilities.
5 PAGE
http://www.kerneltraining.com/
KERNEL:
GNU is pronounced 'GNU's Not Unix' was a project conceived by Richard Stallman in 1983 in
response to the increasing tendency of software companies to copyright their software under
terms that prohibited sharing.
GNU's purpose: to develop a wholly free system.
Both the kernel and the software are freely available under licensing that is sometimes called
"copyleft" (as opposed to copyright). Where traditional copyright was meant to restrict usage
and ownership of a copyrighted item to as few people as possible, inhibiting development and
growth, GNU/Linux is different. It is released under terms designed to ensure that as many
people as possible are allowed to receive, use, share, and modify the software. This license is
called the GPL (GNU Public License).
Linux
Linux
GNU Operating
Kernel
System
6 PAGE
http://www.kerneltraining.com/
7 PAGE
http://www.kerneltraining.com/
FILESYSTEM HIERARCHY
Linux uses single rooted, inverted tree like file system hierarchy
/
It is parent directory for all other directories It is called as ROOT directory. It is represented by
forward slash (/) C:\ of windows
/root
It is home directory for root user (super user) It provides working environment for root user
/root is similar to c:\documents and settings\administrator
/home
It is home directory for other users. It provide working environment for other users (other than
root)
/home is similar to c:\documents and settings\username
/boot
It contains bootable files for Linux, like vmlinuz (kernel)..... ntoskrnl Initrd (INITial Ram Disk) and
GRUB (GRand Unified Boot loader).... boot.ini, ntldr
8 PAGE
http://www.kerneltraining.com/
/etc
It contains all configuration files like /etc/passwd - User info, /etc/resolv.conf -Preferred DNS,
/etc/dhcpd.conf - DHCP server
/etc is similar to c:\windows\system32\drivers\
/usr
By default soft wares are installed in /usr directory (UNIX Sharable Resources)
/usr is similar to C:\Program Files
/opt
It is optional directory for /usr. It contains third party softwares
/opt is similar to c:\Program FIles
/bin
It contains commands used by all users (Binary files)
/sbin
It contains commands used by only Super User (root) (Super user's binary files)
/dev
It contains device files, like /dev/had - for hard drives, /dev/cd rom - for cd drives
/dev similar to device manager of Windows
/proc
It contain process files, the contents are not permanent, they keep changing It is also called as
Virtual Directory. Its file contain useful information used by OS like
/proc/meminfo ... information of RAM/SWAP
/proc/cpuinfo ... information of CPU
/var
It contains variable data like mails, log files
/mnt
It is default mount point for any partition. It is empty by default
/media
It contains all of removable media like CD-ROM, pen drive
/lib
It contains library files which are used by OS. Library files in Linux are SO (shared object) files
/lib is similar to .dll files of windows
9 PAGE
http://www.kerneltraining.com/
SHELL:
RHEL comes with a shell called as BASH
BASH = Bourne Again SHell
Bash is a shell written as a free replacement to the standard Bourne Shell (/bin/sh) originally
written by Steve Bourne for UNIX systems.
It has all of the features of the original Bourne Shell, plus additions that make it easier to
program with and use from the command line.
Since it is Free Software, it has been adopted as the default shell on most Linux systems.
10 P A G E
http://www.kerneltraining.com/
11 P A G E
http://www.kerneltraining.com/
Creating a Directory:
#mkdir <dir name>
#mkdir ktdir
#mkdir –p KernelTech/{Linux/{advlinux,linuxclstr},Aix/{hacmp,lpar},Storage/{san,netapp}}
12 P A G E
http://www.kerneltraining.com/
13 P A G E
http://www.kerneltraining.com/
14 P A G E
http://www.kerneltraining.com/
Renaming a File :
#mv <old name> <new name>
#mv ktfile kernelfile
Renaming a Directory:
The procedure and command for renaming the directory is exactly same as renaming a file.
#mv <old name> <new name>
#mv ktdir kerneldir
Removing a File:
#rm filename or #rm –f filename (without prompting)
15 P A G E
http://www.kerneltraining.com/
Without prompting:
16 P A G E
http://www.kerneltraining.com/
VIM EDITOR
This is command mode editor for files. Other editors in Linux are emacs, gedit.
vi editor is most popular
It has 3 modes:
1 Command Mode
2 Insert mode (edit mode)
3 extended command mode
Note: When you open the vim editor, it will be in the command mode by default.
17 P A G E
http://www.kerneltraining.com/
Command Mode:
18 P A G E
http://www.kerneltraining.com/
Types of Files:
Symbol Type of File
- Normal file
d Directory
l Link file (shortcut)
b Block file (Harddisk, Floppy disk)
19 P A G E
http://www.kerneltraining.com/
SYMBOLIC LINK:
20 P A G E
http://www.kerneltraining.com/
Examples of Grep:
Let us pick the information about root from the file /etc/passwd (/etc/passwd contains
information about all the users present in the system)
#grep root /etc/passwd
To avoid case sensitivity of the word (i.e. the word may be uppercase of lowercase) use -i
#grep –i kernel ktfile (lets grep the word kernel whether upper of lower case in the file ktfile)
21 P A G E
http://www.kerneltraining.com/
FILTER COMMANDS:
Filter commands are used to filter the output so that the required things can easily be
picked up. The commands which are used to filter the output are
o #less
o #more
o #head
o #tail
o #sort
o #cut
o #sed
22 P A G E
http://www.kerneltraining.com/
less:-
The less command is used to see the output line wise or page wise.
Ex: less /etc/passwd
more:-
more is exactly same like less
Ex: #more /etc/passwd
Note: -press Enter key to scroll down line by line (or)
Use d to go to next page
Use / to search for a word in the file
Use v to go vi mode where you can edit the file and once you save it you will back to more
command
head:
It is used to display the top 10 lines of the file.
Ex:# head /etc/passwd
23 P A G E
http://www.kerneltraining.com/
tail:
It is used to display the last 10 lines of the file
#tail /etc/passwd
24 P A G E
http://www.kerneltraining.com/
Sort:
It is used to sort the output in numeric or alphabetic order
#sort filename
25 P A G E
http://www.kerneltraining.com/
cut command:
The cut command is used to pick the given expression (in columns) and display the output.
# cut -d -f filename (where d stands for delimiter ex. : , “ “ etc and f stands for field)
26 P A G E
http://www.kerneltraining.com/
sed command:
sed stands for stream editor, which is used to search a word in the file and replace it with the
word required to be in the output
Note: it will only modify the output, but there will be no change in the original file.
27 P A G E
http://www.kerneltraining.com/
I/O REDIRECTION:
Redirection is a process where we can copy the output of any command(s), file(s) into a new
file. There are two ways of redirecting the output into a file.
Using > or >> filename after the command, and
Using tee command
Note: if the given name of the file is not available a new file will be created automatically. If the
file already exists then it will overwrite contents of that file.
28 P A G E
http://www.kerneltraining.com/
The above options of redirections will not display any output, but directly save the output in a
file. Using tee command will not only redirect the output to new file but it will also display the
output.
Note: if the given name of the file (newfile) is not available a new file will be created
automatically. If the file already exists then it will overwrite contents of the file.
#cat ktfile tee ktf1
Find command:
find command is used to find the files or directory’s path, it is exactly like the find option in
windows where you can search for a file.
29 P A G E
http://www.kerneltraining.com/
Option Usage
-name For searching a file with its name
-inum For searching a file with particular inode number
-type For searching a particular type of file
-user For files whose owner is a particular user
-group For files belonging to particular group
30 P A G E
http://www.kerneltraining.com/
FILE PERMISSIONS:
Permissions are applied on three levels:-
Owner or User level
Group level
Others level
31 P A G E
http://www.kerneltraining.com/
32 P A G E
http://www.kerneltraining.com/
Likewise you can add or remove permissions from any file for anyone (user group or other)
#chmod u+x ktfile (Adding execute permission to user only)
#chmod go-wx ktfile (Removing write and execute permissions from group and other)
#chmod go+wx ktfile (Adding write and execute permissions from group and other)
#chmod go=r ktfile (Giving only read permission to group and other)
33 P A G E
http://www.kerneltraining.com/
UMASK:
When we create any file using touch, cat or vi commands they get created with default file
permissions as stored in umask (User file creation mask).umask is a 4 digit octal number which
tells Unix which of the three permissions are to be denied rather than granted. Umask will
decide that what should be the default permissions for a file and directory when it is created.
The default umask value is 0022
#umask
Calculation of default permissions for file and directory, basing upon the umask value
34 P A G E
http://www.kerneltraining.com/
Note: For a file by default it cannot have the execute permission, so the maximum full
permission for a file at the time of creation can be 666 (i.e. 777 -111 = 666), whereas a directory
can have full permissions i.e. 777
The Modified default Permission for a file will be 666-002=664 i.e. rw,rw,r, and for the
directory it will be 777-002=775 i.e. rwx,rwx,r-x.
Note: Create a file and a directory and check for the default permissions.
These were the few things amongst the basics; keep working to furnish your basics. After All,
“if the foundation is good then only the building can stand still”
35 P A G E
http://www.kerneltraining.com/
HARD DISK 20 GB 15 GB 40 GB 20 GB
/ (root) 8 to 10 GB 15 to 20 GB
36 P A G E
http://www.kerneltraining.com/
Move the cursor to Install or upgrade an existing system and press Enter
To test the media select OK, to skip the testing move cursor to Skip and press enter
37 P A G E
http://www.kerneltraining.com/
38 P A G E
http://www.kerneltraining.com/
Select the keyboard type as required usually U.S English, click Next to continue
Select the type of storage for the Computer. Click Next to continue
39 P A G E
http://www.kerneltraining.com/
Assign a hostname to the system, if wish to give ip address click on Configure Network, else
Click Next to continue
40 P A G E
http://www.kerneltraining.com/
Select the nearest city in your Time Zone and Click on Next to continue
41 P A G E
http://www.kerneltraining.com/
Select the type of partitioning you want, to create your own partitions with custom sizes,
select Create Custom Layout and click on Next to continue
Click on the Free space, then click on Create to create your own partitions
42 P A G E
http://www.kerneltraining.com/
Select / from Mount Point Box, give the size you wish for it and click on OK to create it.
43 P A G E
http://www.kerneltraining.com/
Select the Free space again and click on Create to create another partition. Also Check the
box beside Standard Partition, Click on Create to continue
Select /boot from Mount Point Box, give the size 200 MB for it and click on OK to create it.
Repeat the same steps and create swap space
This time select swap from File System Type, give the size required and click on OK
44 P A G E
http://www.kerneltraining.com/
45 P A G E
http://www.kerneltraining.com/
Click on Write changes to disk to continue, if wish make changes click on Go back.
To change the name of boot loader select Edit and assign new name to it.
To assign password to boot loader check the box beside Use boot loader password and assign a
password to it.
To keep all as default, just click on Next button to continue.
46 P A G E
http://www.kerneltraining.com/
47 P A G E
http://www.kerneltraining.com/
When above prompt is displayed, remove the CD/DVD from the drive and click on Reboot to
reboot the system.
48 P A G E
http://www.kerneltraining.com/
Check No, I prefer to register at a later time. to skip the registration and click on Forward.
49 P A G E
http://www.kerneltraining.com/
50 P A G E
http://www.kerneltraining.com/
Give a name to create a user and assign it a password. Click on Forward to continue.
51 P A G E
http://www.kerneltraining.com/
52 P A G E
http://www.kerneltraining.com/
WHAT IS A PARTITION?
Partitioning is a means to divide a single hard drive into many logical drives. A partition is a
contiguous set of blocks on a drive that are treated as an independent disk. A partition table is
an index that relates sections of the hard drive to partitions.
53 P A G E
http://www.kerneltraining.com/
On the disk where O/S is installed, will have the first partition as MBR.
MBR is a Master Boot Record, which contains two important utilities, IPL (Initial
Program Loader) and PTI (Partition Table information)
IPL is responsible for booting the operating the system, because it contains the boot
loader.
In earlier versions of Linux i.e. up to RHEL 4, the default boot loader was LILO (Linux
Loader). But, since RHEL5 onwards it has been changed to GRub (Grand Unified Boot
loader), which is far more superior to LILO.
The PTI (Partition Table information) is the information about the number of partitions
on the disk, sizes of the partition and types of partitions.
DISK IDENTIFICATION:
Different type of disks will be having different initials in Linux
IDE drive will be shown as /dev/hda
SCSI drive will be shown as /dev/sda
Virtual drive will be shown as /dev/vda
54 P A G E
http://www.kerneltraining.com/
FILE SYSTEM:
It is method of storing the data in an organized fashion on the disk. Every partition on
the disk except MBR and Extended partition should be assigned with some file system
in order to make them store the data. File system is applied on the partition by
formatting it with a particular type of file system.
4. Maximum File size can Maximum File Size can be Maximum File Size can be
be from 16 GB to 2 TB from 16 GB to 2 TB from 16 GB to 16 TB
5. Maximum ext2 file Maximum ext3 file system Maximum ext4 file system
system size can be size can be from 2 TB to size is 1 EB (Exabyte). 1 EB =
from 2 TB to 32 TB 32 TB 1024 PB (Petabyte). 1 PB =
1024 TB (Terabyte).
6. Cannot convert ext file You can convert an ext2 All previous ext file systems
system to ext2. file system to ext3 file can easily be converted into
system directly (without ext4 file system. You can
backup/restore). also mount an existing ext3
f/s as ext4 f/s (without
having to upgrade it).
MOUNTING:-
Attaching a directory to the file system in order to access the partition and its file
system is known as mounting.
55 P A G E
http://www.kerneltraining.com/
The mount point is the directory (usually an empty one) in the currently accessible file
system to which an additional file system is mounted.
The /mnt directory exists by default on all Unix-like systems. It, or usually its
subdirectories (such as /mnt/floppy and /mnt/usb), are intended specifically for use as
mount points for removable media such as CDROMs, USB key drives and floppy disks.
LAB WORK:-
56 P A G E
http://www.kerneltraining.com/
Note: Observe in the above picture that the device name is /dev/sda .
Partition Administration using fdisk
To enter into disk utility, the syntax is
#fdisk <disk name>
#fdisk /dev/sda
57 P A G E
http://www.kerneltraining.com/
58 P A G E
http://www.kerneltraining.com/
Deleting a partition:
Let’s delete the partition we’ve created above i.e. /dev/sda7
59 P A G E
http://www.kerneltraining.com/
Use d to delete a partition and specify the device name, in our case it is 7.
#partprobe /dev/sda
Or
#partx –a /dev/sda
Or
#kpartx /dev/sda
60 P A G E
http://www.kerneltraining.com/
Likewise you can format the different partitions with different file systems like
#mkfs.ext3 /dev/sda8
#mkfs.vfat /dev/sda9
Note: Even after formatting the partition we cannot add the data into the partition. In order to
add the data in the partition it is required to be mounted.
Mounting a partition:
Mounting is a procedure where we attach a directory to the file system. There are two types of
mounting which will be used in Linux or any UNIX.
61 P A G E
http://www.kerneltraining.com/
Temporary Mounting
Permanent Mounting
Temporary Mounting
In a temporary mount point we will create a directory and mount it, but this mount point will
last only till the system is up, once it is rebooted the mounting will be lost.
Syntax:
#mount <device name> <directory name (mount point)>
#mount /dev/sda7 /kernel
Now we have successfully mounted the partition we can access it and can store the data
To add the data access the mount point
#cd /kernel
Add the data and exit the directory
Unmounting a partition:
#umount <mount point directory>
#umount /kernel
62 P A G E
http://www.kerneltraining.com/
Permanent Mounting:
Permanent mounting procedure is exactly same like temp mounting, but here we will update
the /etc/fstab file with the mounting details, so that it will be mounted even after the system is
reboot.
Steps To make a permanent mount point:
Make a directory or use an existing directory
Add entry in /etc/fstab file
Use mount –a command to check it is mounting. (mount –a will mount all the entry
placed in /etc/fstab)
Here we will be using our existing /kernel directory as mount point which is created previously.
#vim /etc/fstab
Device Name Mount Point Type of FS Mount options Dumping Check Sequence
#mount –a
63 P A G E
http://www.kerneltraining.com/
You can now access the directory and add, delete or modify the contents and can also unmount
the file system at any point
Sometimes a directory reflects error while unmouting, the possible causes for it are
You are in the same directory and trying to unmount it. Check with pwd command
Some users are present in the directory and using the contents in it.
Check with fuser –cu /dev/sda7
Check for the files which are open with lsof /dev/sda7
Kill the open connections using fuser –ck /kernel/hello where hello is the file which is
open.
Now you can use umount command to unmount the file system.
64 P A G E
http://www.kerneltraining.com/
Syntax:
#e2label <partition name> <label> To check the label
#e2label /dev/sda7 ktdisk #e2label /dev/sda7
To list all the mounted partition along with their labels, use mount –l command
Mounting a /dev/sda7 partition with its label ktdisk, verify it with mount command
As we know that to make a permanent mount point, an entry has to be made in /etc/fstab
file.
#vim /etc/fstab
65 P A G E
http://www.kerneltraining.com/
Now use mount –a command and verify it with mount command whether it is mounted or
not.
#vim /etc/fstab
Now mount it with mount –a command and verify it with mount command
66 P A G E
http://www.kerneltraining.com/
Swap space is compulsory to be created at the time of installation. But, additional swap spaces
can be created and deleted at any point of time, when it is required. Sometimes we need to
increase the swap space, so we create additional swap spaces which will be added to the
existing swap space to increase the size.
67 P A G E
http://www.kerneltraining.com/
Create a normal partition using fdisk and change hex code to make it swap partition.
The hex code for SWAP is 82. (To change the use t in fdisk and list all the hex code use l)
Update the partition table using partx –a command
68 P A G E
http://www.kerneltraining.com/
69 P A G E
http://www.kerneltraining.com/
70 P A G E
http://www.kerneltraining.com/
71 P A G E
http://www.kerneltraining.com/
#vim /etc/fstab
#vim /etc/crypttab
72 P A G E
http://www.kerneltraining.com/
7. Unmount the partition, and close the partition i.e. encrypt it back
# umount /dev/mapper/ktpart
#cryptsetup luksClose /dev/mapper/ktpart
#mount –a (To check encryption is working)
When you assign the label of the partition in the /etc/crypttab, the system will be
halted at the time of boot and will ask you to enter the passphrase of that particular
partition so that the partition can be decrypt and mounted.
Either you should type the passphrase to continue or can ignore it by using ctrl+c to
continue booting without decrypting and mounting the partition.
In order to make the O/S to take the passphrase automatically and unlock the partition,
we can save the passphrase in a file, so that it can take the passphrase and mount it and
boot it normally without halting.
73 P A G E
http://www.kerneltraining.com/
Change the permission of the file (600), and add the path of the file in /etc/crypttab
Note: The permission of the file is changed so that groups and others may not be able to view
and modify the contents of the file.
After making the above changes, restart the system and check whether it is halting to ask you
passphrase or booting continuously. It will not ask any passphrase for sure.
74 P A G E
http://www.kerneltraining.com/
The Linux Logical Volume Manager (LVM) is a mechanism to virtualize the disks. It can create
"virtual" disk partitions out of one or more physical hard drives, allowing you to grow, shrink, or
move those partitions from drive to drive as your needs change. It also allows you to create
larger partitions than you could achieve with a single drive. Traditional uses of LVM have
included databases and company file servers, but even home users may want large partitions
for music or video collections, or for storing online backups. LVM can also be convenient ways
to gain redundancy without sacrificing flexibility.
A typical example for the need of LVM can be, assuming that we are having a disk of size 2GB
and we start adding the data in the form of a single file, eventually it grows to the size of 2GB.
In this case the possibility is, you go for another disk which is larger than 2GB, let’s say 4GB. But
what if the file again grows more than 4GB? How far you will be migrating file from one disk to
another so on and so forth? It requires a down time as well which is not possible in real time, so
to avoid these circumstances we implement LVM and store data in LV’s whose size can be easily
increased whenever required without a downtime.
75 P A G E
http://www.kerneltraining.com/
Above picture shows the structure of LVM. LVM consists of Physical Volumes, Volume Group,
Logical Volumes and finally file systems. The Physical partitions are known as Physical Extents
(PE), and the logical partitions are known as logical Extents (LE)
Components of LVM in Linux:
Physical Volumes (PV)
Physical Extent (PE)
Volume Group (VG)
Logical Volume (LV)
Logical Extent (LE)
76 P A G E
http://www.kerneltraining.com/
LAB WORK:-
77 P A G E
http://www.kerneltraining.com/
The above command will list all the PVs in the system, if you want to see the details only for
a particular PV, then use
#pvdisplay <partition name> i.e. #pvdisplay /dev/sda7
78 P A G E
http://www.kerneltraining.com/
To check all the VGs detail you can also use the command
#vgdisplay
It will list out all the VGs in the system in detail.
Once we are ready with a Volume Group then it’s the time to create a Logical Volume LV
The syntax for creating an LV is
#lvcreate –L <size of LV> -n <name for LV> <VG name> i.e
#lvcreate –L 300M –n ktlv ktvg (To create a LV of 200MB)
79 P A G E
http://www.kerneltraining.com/
Note: The output for only lvdisplay command is very lengthy to show, it is recommended
that you run the command on the system and check it out. The syntax is given above.
80 P A G E
http://www.kerneltraining.com/
Mounting:
Mounting an LV is exactly same like a normal partition, again the path for mounting will be
/dev/vg/lv
Create a directory over which the LV should be mounted.
#mount </dev/vgname/lvname> /directory name
#mount /dev/ktvg/ktlv /ktdir
Verify the mounting with mount command
Make it a permanent mount by making an entry in /etc/fstab
#vim /etc/fstab
81 P A G E
http://www.kerneltraining.com/
82 P A G E
http://www.kerneltraining.com/
Verify it by df –h
83 P A G E
http://www.kerneltraining.com/
84 P A G E
http://www.kerneltraining.com/
Finally reduce the size of the LV using lvreduce command. It will prompt you about
the change type y to continue with reduction.
Mount the LV and run the command df-h, to verify the change in the size of LV
#mount –a ( if an entry is passed in /etc/fstab use this command)
#df –h
There might be a situation where the PV might be failing and it is required to be replaced, in
such case, we need to migrate or move the data from such PV to the other and isolate the
PV.
Migrate PV:
The Steps to migrate the PV are
Access the mount point of failing PV and check the data in it,
Verify the size of the PV by pvs command or pvdisplay command.
Unmount the file system on that PV.
Add new PV, which should be of the same size or higher than that of the
replacing PV to the volume group.
Migrate the PVs contents to the new PV using following command
85 P A G E
http://www.kerneltraining.com/
Access the mount point of the failing PV and check the data in it,
−
Verify the size of the PV by pvs command or pvdisplay command.
Add new PV which should be of the same size or higher than that of the replacing PV
to the volume group.
In our case the size of the failing PV is around 500MB, so we need to add a PV
whose size is at least 500MB or more
I have created another partition from fdisk i.e. /dev/sda7 with the size around
500MB
86 P A G E
http://www.kerneltraining.com/
Mount back the LV, access the mount point and verify the data in it.
Deleting/Removing an LV:
To Delete/Remove an LV, first unmount the file system.
Remove the entry from /etc/fstab.
Use the command lvremove i.e.
#lvremove <LV name>
87 P A G E
http://www.kerneltraining.com/
As we was having only one LV and that is now deleted, that’s why it is not showing any LVs
after executing lvdisplay command.
−
If you want you can verify it by using pvs or pvdisplay commands
−
88 P A G E
http://www.kerneltraining.com/
Building anything requires lots of concentration, hard work, and patience, but to demolish
it, it is just a matter of a moment. Isn’t it….!
89 P A G E
http://www.kerneltraining.com/
90 P A G E
http://www.kerneltraining.com/
Okay, now then we know the size of PE is 16, lets calculate how many LE is required to
create an LV of 400 MB.
The formula for calculating no. of LE is
<size of LV required, in MB> divided by Size of PE
400/16 = 25
If the size of LV is to be 2 GB then first we need to convert GB into MB and then calculate
2x1024 / 16 =128.
You can use #bc command to do all the calculations. Use ctrl+d or Ctrl+c to quit the
calculator
So now we got the calculation done and we came to know that 25 LEs are required to create
400MB of LV.
The syntax to create an LV with no. of LE is
#lvcreate –l <no. of LE> -n <name for the LV> <volume group name>
#lvcreate –l 25 –n ktlv2 ktvg2
91 P A G E
http://www.kerneltraining.com/
The only difference in a normal installation and LVM installation is that instead of creating
normal partition we will create a VG and then LVs for all partitions, except /boot and swap.
The advantage of installing Linux using LVM is that, if any of system partition is running out
of space and required more space, in case of normal partitioning it is not possible to
increase the size of a partition once it is created. But, using LVM the space can be
dynamically increased whenever it is required.
Even if there is no space remaining in the disk some space can be borrowed from other
LVMs and can easily be assigned to required system partition to fulfill its need.
LVM provides a greater scalability to the administrator and avoid uncertain down time to
the server.
LVM ensures the possibility of increasing and decreasing the sizes whenever required and
prevents unnecessary loss of time.
Start the installation normally as done previously, but only at the time of partitioning follow
the steps below.
92 P A G E
http://www.kerneltraining.com/
Select the Free space and click on Create, then select LVM Physical Volume and click on
Create to proceed.
93 P A G E
http://www.kerneltraining.com/
Give the maximum possible size to this PV, as all the partition has to be created inside it
only.
Select the created PV, i.e., vda1 and this time check the box beside LVM Volume Group to
create a volume group.
94 P A G E
http://www.kerneltraining.com/
Click on Add button to start adding LVs, Select a mount point and assign a size to it and click
on OK
Repeat the above step and create the following partitions with the given sizes
/usr with 8.5 GB approx
/var with 4.5 GB approx
/opt with 2 GB approx
/, /tmp, /home 2 GB each approx
/opt 3 GB approx
Note: All the sizes listed above are based on the availability of the space. It is no where a
recommended or minimum sizes. The sizes can be based on your requirements. But /usr
required the above given size if it is 64 bit architecture.
95 P A G E
http://www.kerneltraining.com/
Select the Free space under Hard Drives and create /boot with 200 MB and /Swap with
2GB. Make sure that you select Standard Partition this time, instead of LVM.
96 P A G E
http://www.kerneltraining.com/
Verify the sizes and click on Next to continue with the installation. Complete the installation
as usual as we have done previously at the beginning of the course.
Practice the LVM Concept well; as it is the most important part in Linux and in any UNIX
operating system as well.
That sums up the LVM concept in Linux
97 P A G E
http://www.kerneltraining.com/
In Linux/Unix user is one who uses the system. There can be at least one or more than
one users in Linux at a time. Users on a system are identified by a username and a
userid. The username is something that users would normally refer to, but as far as the
operating system is concerned this is referred to using the user id (or uid). The
username is typically a user friendly string, such as your name, whereas the user id is a
number. The words username and userid are often (incorrectly) used interchangeably.
The user id numbers should be unique (one number per user). If you had two usernames
with the same user id, effectively there permissions would be the same and the files
that they create would appear to have been created by the same user. This should not
be allowed and the useradd command will not allow usernames to share the same
userid.
Every user of the system is assigned a unique user ID number ( the UID)
Users name and UID are stored in /etc/passwd
User’s password is stored in /etc/shadow in encrypted form.
Users are assigned a home directory and a program that is run when they login (Usually a
shell)
Users cannot read, write or execute each other’s files without permission.
98 P A G E
http://www.kerneltraining.com/
2. System user
System users are the users created by the softwares or applications. For example if we
install Apache it will create a user apache. These kinds of users are known as system
users.
3. Normal user
Normal users are the users created by root user. They are normal users like Rahul,
Musab etc. Only the root user has the permission to create or remove a user.
There are two important files a user administrator should be aware of.
1. "/etc/passwd"
2. "/etc/shadow"
99 P A G E
http://www.kerneltraining.com/
2. /etc/shadow
root:$1fdsfsgsdfsdkffefje:14757:0:99999:7:::
100 P A G E
http://www.kerneltraining.com/
Observe that the uid, gid, home dir, and shell is assigned automatically.
101 P A G E
http://www.kerneltraining.com/
102 P A G E
http://www.kerneltraining.com/
103 P A G E
http://www.kerneltraining.com/
Observe in both pictures that once the account is unlocked the exclamation is gone.
The password parameters:
For any user we can set the parameters for the password, like min and max password age,
password expiration warnings and a/c expiration date etc.
To view the advanced parameters of the user, use
#chage -l < user name>
#chage -l ktusr
Last password change: When the password was change last time.
Password expires: Password expiry date
Password inactive: After password expiry grace period before the account gets locked.
Account expires: Date on which the account expires.
Minimum number of days b/w password change: once the password is changed, it cannot
be changed until a min period of specified date. [0] means never.
104 P A G E
http://www.kerneltraining.com/
Max number of days b/w password change: After changing the password how long it will
be valid for.
Number of days of warning before password expires: start of warnings to change the
password, no. of days before the password expires.
The second method is for, if you want to change a particular field of password aging policy
105 P A G E
http://www.kerneltraining.com/
Likewise you can use any option listed above and change any particular field in
password aging parameters.
Deleting a User:
To delete a user the syntax used is
#userdel <username> it will only delete the user but home directory will be there. To delete
the user with its home directory use the following command.
#userdel –r < user name >
#userdel –r ktuser2
106 P A G E
http://www.kerneltraining.com/
We’re now done with user administration, let’s see what’s in part-II
GROUPS:
Users are assigned to groups with unique group ID numbers (the GID)
The group name and GID are stored in /etc/group
Each user is given their own private group
They can also be added to their groups to gain additional access
All users in a group can share files that belong to the group
Each user is a member of at least one group, called a primary group. In addition, a user can be a
member of an unlimited number of secondary groups. Group membership can be used to
control the files that a user can read and edit. For example, if two users are working on the
same project you might put them in the same group so they can edit a particular file that other
users cannot access.
A user’s primary group is defined in the /etc/passwd file and Secondary groups are defined
in the /etc/group file.
The primary group is important because files created by this user will inherit that group
affiliation.
107 P A G E
http://www.kerneltraining.com/
#groupadd ktgroup
108 P A G E
http://www.kerneltraining.com/
109 P A G E
http://www.kerneltraining.com/
Adding multiple single or multiple users to the group with various attributes
#gpasswd < option> <arguments> <group name>
Options:
-M For Adding Multiple users to a group
-A for Adding a group Administrator
-a for Adding a single user to a group
-d removing a user from a group
#gpasswd –M <user>,<user>,<user> <group>
#gpasswd –M ktuser2,ktuser3,ktuser4 ktgroup
110 P A G E
http://www.kerneltraining.com/
To add and remove groups use can also use the graphical tool in linux
#system-config-users &
111 P A G E
http://www.kerneltraining.com/
There are three special permissions that can be assigned to a file or directory apart from basic
file permissions (rwx), they are:
1. SUID – SET USER ID
2. SGID – SET GROUP ID
3. STICKY BIT
Permission Symbolic Form Numeric Form Syntax
SETUID s or S 4 #chmod u+s or #chmod 4766
SETGID s or S 2 #chmod g+s or #chmod 2766
STICKY BIT t or T 1 #chmod o+t or chmod 1766
Note: Where s= setuid + execute permission and S= setuid only. Same is for SGID and also for
sticky bit .
Example
By default ping command is having suid, so all users can run that command but if suid is
removed and a normal user wants to user execute it, then it will show 'operation not
permitted'
112 P A G E
http://www.kerneltraining.com/
Note: observe that in the permissions “–rwsr-xr-x” it contains an “s”, which means SUID is
placed.
Let’s remove suid on Ping command and logged in as normal user and check the results
Example
When a directory is created and its group is set to some group. Now if SGID is applied to it, and
the group member creates files and directory inside it, then it will get the same group rather
than getting user’s primary group
Let’s see it practically.
113 P A G E
http://www.kerneltraining.com/
Note: when a file is created by any user it will get the group as primary group of the owner
which is usually owner’s private group with same name.
STICKY BIT
If sticky bit is applied on a file or directory, then only root and owner of that file or directory can
delete it. Even if others are having full permissions they cannot delete the file or directory.
Let see it practically.
114 P A G E
http://www.kerneltraining.com/
write files in that directory, as well as create new files into the directory. Such special
permissions can be given using ACL.
ACL can be applied on ACL enabled partition that means you need to enable ACL while
mounting the partition.
115 P A G E
http://www.kerneltraining.com/
If your partition already exists, then just add an acl after defaults as shown above and use the
following command.
#mount –o remount /dev/sda7
#getfacl /ktdir
Now let’s assign full permission to the directory and then apply acl on it, so that we can analyze
how acl will work.
116 P A G E
http://www.kerneltraining.com/
Okay, now we are ready to apply acl, but first let’s understand the command and option in
details.
The syntax to apply acl is
#setfacl <option> < argument > < file or directory name >
The options are,
-m Modifies an ACL
-x Removes an ACL
-R Recurses into subdirectories
The possible arguments are
u: user
g: group
o: others
Note: Whatever ACL permissions assigned to a user or group or others, it will be treated as
Normal Permissions minus ACL
To assign read and execute permission to a particular user the syntax could be
#setfacl –m u: <username>: <permissions> <file or dir name>
#setfacl –m u:ktuser: rx ktdir
Verify it by using getfacl command
Now login as ktuser and try to create a file inside ktdir, as we have not assigned write
permission to ktuser, though it is having full permissions, still it will not allow ktuser to create a
file inside it.
117 P A G E
http://www.kerneltraining.com/
Observe that when you check for the permissions it is showing a + sign after normal permission,
that indicate that ACL is applied on this directory.
Now you know how to apply acl on any file or directory, let me just give one more examples
which you can broaden your understandings.
Assigning read and execute permission for a user and a group at same time.
#setfacl –m u:ktuser:rx,g:ktgroup:rx /ktdir
118 P A G E
http://www.kerneltraining.com/
Likewise you can explore applying acl to any user, group, or others in many ways.
119 P A G E
http://www.kerneltraining.com/
#setfacl –b /ktdir
As we have removed acl for a group and a user, let’s apply back some acl on ktdir and remove
it using above command
ACL can also be applied to a file in exactly similar way as we did for a directory.
120 P A G E
http://www.kerneltraining.com/
NETWORKING:
It is a connection between two or more machines to communicate with each other.
The basic requirements for Networking are:
Media
Media is the medium via which two different computer’s NIC card will be connected. The best
example for media is Cable. Example RJ 45, CAT 5 etc.
Topology
Topology is the scheme or design in which the computers in the network will be connected to
each other. Example for topology is Bus, Ring, star, mesh, tree topologies. The following
pictures explain it better.
121 P A G E
http://www.kerneltraining.com/
1. Protocol
A network protocol defines rules and conventions for communication between network
devices. Protocols for computer networking all generally use packet switching
techniques to send and receive messages in the form of packets.
Network protocols include mechanisms for devices to identify and make connections
with each other, as well as formatting rules that specify how data is packaged into
messages sent and received. Some protocols also support message acknowledgement
and data compression designed for reliable and/or high-performance network
communication. Hundreds of different computer network protocols have been
developed each designed for specific purposes and environments.
Example for Protocols are TCP/IP (Transmission Control Protocol), UDP (User Datagram
Protocol), HTTP. The most widely and regularly used protocols for transferring data are
TCP and UDP. Let’s analyze some basic differences between TCP/IP and UDP.
TCP/IP UDP
Reliable Non-Reliable
122 P A G E
http://www.kerneltraining.com/
2. IP ADDRESS
An IP address can be thought of as being similar to a phone number. Just as every
person who communicates with a telephone is using a phone with a unique phone
number, every computer that is on the Internet has a unique IP address. Not only on
internet but within an organization every computer is assigned an IP address so that
they can communicate with each other. Basically IP addressing is very deep concept. To
understand the concept of IP address we need to understand some important aspect of
IP Address which is
IP Address Classes
Subnet mask
Gateway
The above concepts in IP Addressing are very important to understand networking clearly.
IP Address Classes
The IP addresses are further broken down into classes. These classes are A, B, C, D, E and their
possible ranges can be seen in Figure below.
Loopback:
A special IP number (127.0.0.1), that is designated for the software loopback interface of a
machine. 127.0.0.0 Through 127.255.255.255 is also reserved for loopback and is used for
internal testing on local machines.
Multicast:
Multicasting allows a single message to be sent to a group of recipients. Emailing,
teleconferencing, are examples of multicasting. It uses the network infrastructure and
standards to send messages.
123 P A G E
http://www.kerneltraining.com/
Subnet Mask:
A subnet mask allows users to identify which part of an IP address is reserved for the network
and which part is available for host use. By looking at the IP address alone, especially now with
classless inter-domain routing, users cannot tell which part of the address is which. Adding the
subnet mask or netmask gives users all the information needed to calculate network and host
portions of the address with ease. In summary, knowing the subnet mask can allow users to
easily calculate whether IP addresses are on the same subnet or not.
A commonly used netmask is a 24-bit netmask as seen below.
Netmask length 8 16 24 --
Gateway:
A gateway is a network point that provides entrance into another network. On the Internet, a
node or stopping point can be either a gateway node or a host (end-point) node. Both the
computers of Internet users and the computers that serve pages to users are host nodes. The
computers that control traffic within your company's network or at your local Internet service
provider (ISP) are gateway nodes.
For example let’s say our network is 192.168. something and we want to send a file to other
computer on 10.10.network, so we need a gateway to communicate between two computers
of different networks.
Some Important configuration files/directories of network configurations
124 P A G E
http://www.kerneltraining.com/
#/etc/sysconfig/network is a file which keeps the information about the hostname assigned to
the system. If you want to change the hostname permanently, you need to change the
hostname in this file.
#/etc/hosts a file which is responsible for resolving hostname into IP locally, in other word it
acts as local DNS if DNS server is not accessible.
#/etc/resolv.conf is a file which keeps the address of DNS server to which the clients will be
accessing to resolve IP to hostname and hostname to IP.
LAB WORK:-
125 P A G E
http://www.kerneltraining.com/
126 P A G E
http://www.kerneltraining.com/
#host <hostname>
#host ktlinux.kt.com
127 P A G E
http://www.kerneltraining.com/
With ip address
#dig –x <ip address>
#dig –x 192.168.10.98
128 P A G E
http://www.kerneltraining.com/
Note: The above change is temporary and will be last only till you are logged in, if you want to
change it permanently edit the /etc/sysconfig/network file and then logout and login to
confirm the change.
#vim /etc/sysconfig/network delete the previous hostname and add the new name.
129 P A G E
http://www.kerneltraining.com/
Note: Once you logout and login again the change will be permanent, observe the highlighted
region above.
130 P A G E
http://www.kerneltraining.com/
Now select the NIC adapter i.e. eth0 and press Enter
131 P A G E
http://www.kerneltraining.com/
Assign the above ip address and other details as per your requirement, move the cursor to “OK”
and press Enter
Move the cursor to “save” to save the changes in device configuration and press Enter.
Once again move the cursor to “Save&Quit” button and press Enter
132 P A G E
http://www.kerneltraining.com/
Finally Move the cursor to “Quit” button and Press Enter to quit the utility.
Now restart the network service and check for the ip address
#service network restart
If the change is not reflected with above service restart, restart the network manager
#service NetworkManager restart (N and M are case sensitive)
The above picture confirms that we have successfully assigned an IP address to a machine.
You can also check the functioning of newly assigned IP address by pinging it from other
machines in the network.
If it is not pinging from outside then check whether the cable is connected properly or
not.
If the server is in the remote location use #mii-tool to check whether the cable is
connected or not
[root@kernellinux]# mii-tool
133 P A G E
http://www.kerneltraining.com/
134 P A G E
http://www.kerneltraining.com/
IP ALIASING:
On a Linux server, one IP address is typically assigned to a NIC (Network Interface Card), i.e.
ethernet card. The IP address assigned to the NIC serves as the primary IP. In a situation where
you'll need multiple IP addresses (that connect to a same network), you may use IP aliasing
feature of the Linux to map multiple IP addresses to a single NIC.
If your server has more than one IP address or is on more than one network interface, you can
use the IP Aliasing function in order to control IP Aliasing on system network interfaces.
Lab Work:-
To create an Alias Ip
Turn off the Network Manager, as NM will not support IP Aliasing.
#service NetworkManager stop
#chkconfig NetworkManager off
135 P A G E
http://www.kerneltraining.com/
Make the changes permanent, else the configuration will be lost If the system is restarted
Navigate to /etc/sysconfig/network-scripts and create a configuration file for alias ip
136 P A G E
http://www.kerneltraining.com/
Reboot the system and check whether the ip address will be activated or not
Using more than one hard drive to achieve better performance and fault tolerance is very
common. Less well known is that it's also possible to aggregate more than one network
interface into a single logical interface. In Linux, this is handled by the bonding driver. Benefits
of doing this are much the same as the benefits of aggregating discs using RAID: if one device
dies, your server carries on working and by using two devices in parallel, performance can be
improved.
The first thing you need is two network interfaces. It's not entirely uncommon for a server to
come with two: one gigabit card on the motherboard and a separate 100 Mb PCI card. You will
need to ensure that the Linux kernel has recognised both interfaces. Running /sbin/ifconfig lists
network interfaces.
Typically, you should see both eth0 and eth1 interfaces. If not, make sure that the modules for
both interfaces have been compiled for your kernel and loaded. You may need to do something
special if both devices use the same driver.
137 P A G E
http://www.kerneltraining.com/
mode=<value>
Allows you to specify the bonding policy. The <value> can be one of:
138 P A G E
http://www.kerneltraining.com/
balance-tlb or 5 — Sets a Transmit Load Balancing (TLB) policy for fault tolerance
and load balancing. The outgoing traffic is distributed according to the current
load on each slave interface. Incoming traffic is received by the current slave. If
the receiving slave fails, another slave takes over the MAC address of the failed
slave.
balance-alb or 6 — Sets an Active Load Balancing (ALB) policy for fault tolerance
and load balancing. Includes transmit and receive load balancing for IPV4 traffic.
Receive load balancing is achieved through ARP negotiation
Lab Work:-
Step 1: Check whether the server is having two Ethernet adapters or not.
Step 2: Make sure that Network Manager is not running, if running stop the services for it and
make it permanent.
139 P A G E
http://www.kerneltraining.com/
miimon=<time_in_milliseconds>
Specifies (in milliseconds) how often MII link monitoring occurs. This is useful if high availability
is required because MII is used to verify that the NIC is active.
To verify that the driver for a particular NIC supports the MII tool, type the following command
as root:
# ethtool <interface_name> grep "Link detected:"
Step 4: Modify the eth0 and eth1 configuration file to make it participant of bond0
140 P A G E
http://www.kerneltraining.com/
Step 6: Restart the network services and check on which adapter ip address is assigned
141 P A G E
http://www.kerneltraining.com/
142 P A G E
http://www.kerneltraining.com/
143 P A G E
http://www.kerneltraining.com/
144 P A G E
http://www.kerneltraining.com/
To set a round-robin policy for fault tolerance and load balancing, the only change will be in the
ifcfg-bond0 file:
145 P A G E
http://www.kerneltraining.com/
146 P A G E
http://www.kerneltraining.com/
147 P A G E
http://www.kerneltraining.com/
cache (AVC), where subject and object permissions are cached. If a decision cannot be
made based on data in the AVC, the request continues to the security server, which
looks up the security context of the application and the file in a matrix. Permission is
then granted or denied, with an avc: denied message detailed in /var/log/messages if
permission is denied. The security context of subjects and objects is applied from the
installed policy, which also provides the information to populate the security server's
matrix.
Modes of SELinux:
148 P A G E
http://www.kerneltraining.com/
There are three modes in which SELinux can be at a time, they are
Enforcing, Permissive and Disabled
Enforcing
Enable and enforce the SELinux security policy on the system, denying access and
logging actions
Permissive
Permissive mode is similar to Debugging Mode. In Permissive Mode, SELinux policies
and rules are applied to subjects and objects, but actions ( for example, Access Control
denials) are not affected. The biggest advantage of Permissive Mode is that log files and
error messages are generated based on the SELinux policy implemented.
Disabled
SELinux is turned off and no warn and log messages will be generated and stored.
Booleans:
Booleans are variables that can either be set as true or false. Booleans enhance the effect of
SELinux policies by letting the system administrator fine tune a policy. A policy may protect
a certain daemon or service by applying various access control rules. In real world scenarios,
a system administrator would not like to implement all the access controls specified in the
policy.
SELinux Policy:
The SELinux Policy is the set of rules that guide the SELinux security engine. It defines types
for file objects and domains for processes. It uses roles to limit the domains that can be
entered, and has user identities to specify the roles that can be attained. In essence, types
and domains are equivalent, the difference being that types apply to objects while domains
apply to processes.
SELinux Context:
Processes and files are labeled with a SELinux context that contains additional information,
such as a SELinux user, role, type, and, optionally, a level.
LAB WORK:-
149 P A G E
http://www.kerneltraining.com/
#sestatus
150 P A G E
http://www.kerneltraining.com/
Observe that the type is admin_home_t, let’s change it to public_content_t, so that it will be
available for all users.
To change the context of a file or directory the syntax is
#chcon –t <argument> <file/dir name>
#chcon –t public_content_t ktfile
To change the context for a directory and its contents, the syntax is
#chcon –R –t <argument > <dir name>
151 P A G E
http://www.kerneltraining.com/
To restore back the same of a directory with its contents, the syntax is
#restorecon –Rv <dir name >
#restorecon –Rv ktdir
152 P A G E
http://www.kerneltraining.com/
Note: For restoring the context of only the dir except its contents do not add “R” in the
command.
153 P A G E
http://www.kerneltraining.com/
154 P A G E
http://www.kerneltraining.com/
Now, edit the configuration file, restart the computer and check the status.
#vim /etc/selinux/config
#init 6 (to reboot the system)
To Enable it back the procedure is exactly same as above, instead of SELINUX=disabled change
it to SELINUX=enforcing or permissive. Don’t forget to restart the system, unless the system is
rebooted the changes will not take effect.
155 P A G E
http://www.kerneltraining.com/
Note1: if grep is not used it will list Booleans for all the services in the system and output will be
very lengthy.
Note2: Booleans can only be checked and changed when SELinux is in enforcing or Permissive
modes; if the SELinux is in disabled mode Booleans cannot be modified.
To change any Boolean just copy the Boolean and give the option (the only possible option
for a Boolean to enable and disable is on/off). The syntax for changing Boolean value is
#setsebool < Boolean > < option (on/off) >
#setsebool allow_ftpd_anon_write on
Verify the change with getsebool command.
Hope you got the SELinux concept cleared by this time. Keep working on it
156 P A G E
http://www.kerneltraining.com/
Press the power button on your system, and after few moments you see the Linux login
prompt.
Have you ever wondered what happens behind the scenes from the time you press the power
button until the Linux login prompt appears?
The following are the 6 high level stages of a typical Linux boot process.
1. BIOS
BIOS stands for Basic Input/Output System
157 P A G E
http://www.kerneltraining.com/
2. MBR
MBR stands for Master Boot Record.
It is located in the 1st sector of the bootable disk. Typically /dev/hda, or /dev/sda
MBR is less than 512 bytes in size. This has three components 1) primary boot loader
info in 1st 446 bytes 2) partition table info in next 64 bytes 3) mbr validation check in
last 2 bytes.
It contains information about GRUB (or LILO in old systems).
So, in simple terms MBR loads and executes the GRUB boot loader.
3. GRUB
GRUB stands for Grand Unified Bootloader.
If you have multiple kernel images installed on your system, you can choose which one
to be executed.
GRUB displays a splash screen, waits for few seconds, if you don’t enter anything, it
loads the default kernel image as specified in the grub configuration file.
GRUB has the knowledge of the filesystem (the older Linux loader LILO didn’t
understand filesystem).
Grub configuration file is /boot/grub/grub.conf (/etc/grub.conf is a link to this). The
following is sample grub.conf
158 P A G E
http://www.kerneltraining.com/
As you notice from the above info, it contains kernel and initrd image.
So, in simple terms GRUB just loads and executes Kernel and initrd images.
4. KERNEL
Mounts the root file system as specified in the “root=” in grub.conf
Kernel executes the /sbin/init program
Since init was the 1st program to be executed by Linux Kernel, it has the process id (PID) of 1.
Do a ‘ps -ef | grep init’ and check the pid.
initrd stands for Initial RAM Disk.
initrd is used by kernel as temporary root file system until kernel is booted and the real
root file system is mounted. It also contains necessary drivers compiled inside, which
helps it to access the hard drive partitions, and other hardware.
5. INIT
1. Looks at the /etc/inittab file to decide the Linux run level.
2. Following are the available run levels
0 – halt
1 – Single user mode
2 – Multiuser, without NFS
3 – Full multiuser mode
4 – unused
5 – X11
159 P A G E
http://www.kerneltraining.com/
6 – reboot
3. Init identifies the default initlevel from /etc/inittab and uses that to load all appropriate
program.
4. Execute ‘grep initdefault /etc/inittab’ on your system to identify the default run level
5. If you want to get into trouble, you can set the default run level to 0 or 6. Since you
know what 0 and 6 means, probably you might not do that.
6. Typically you would set the default run level to either 3 or 5.
6. RUNLEVEL PROGRAMS
When the Linux system is booting up, you might see various services getting started. For
example, it might say “starting sendmail …. OK”. Those are the run level programs,
executed from the run level directory as defined by your run level.
Depending on your default init level setting, the system will execute the programs from
one of the following directories.
Run level 0 – /etc/rc.d/rc0.d/
Run level 1 – /etc/rc.d/rc1.d/
Run level 2 – /etc/rc.d/rc2.d/
Run level 3 – /etc/rc.d/rc3.d/
Run level 4 – /etc/rc.d/rc4.d/
Run level 5 – /etc/rc.d/rc5.d/
Run level 6 – /etc/rc.d/rc6.d/
Please note that there are also symbolic links available for these directory under /etc
directly. So, /etc/rc0.d is linked to /etc/rc.d/rc0.d.
LAB WORK:-
160 P A G E
http://www.kerneltraining.com/
To start the graphical interface when you are in runlevel 3, use the following command
#startx
Change it back to runlevel 5 and reboot the system.
161 P A G E
http://www.kerneltraining.com/
162 P A G E
http://www.kerneltraining.com/
163 P A G E
http://www.kerneltraining.com/
Move the cursor to 2nd line (line of Kernel) and press ‘e’ to edit the kernel parameter
Type “1” after the line to boot in maintenance level and press enter to continue
164 P A G E
http://www.kerneltraining.com/
Now, type “b” to boot it in single user mode. Then you will be in single user mode
Now without being prompted for password you will be logged in the single user mode
To change the password use command #passwd, but as you can see it will not work because
of SELinux.
Check the SELinux mode by using #getenforce command
As we can see that SELinux is in Enforcing mode, change it to Permissive and then try
changing the password
165 P A G E
http://www.kerneltraining.com/
Okay, Now we are successfully changed the password, now just type exit or reboot, to
reboot the system and try the new password for root.
There might be a situation where your boot loader i.e., GRub might got corrupted and you
want to recover it or in other word repair it. Basically the repairing of GRub means
installing a new grub on the existing one from RHEL 6 DVD.
To recover the grub the steps are:
Insert the RHEL 6 DVD and make the system boot from CD/DVD
Boot the system in Rescue installed system Mode.
166 P A G E
http://www.kerneltraining.com/
Select the language with which you want to continue and move cursor on OK, press Enter.
167 P A G E
http://www.kerneltraining.com/
Select the keyboard Type and move cursor to OK and press Enter to continue.
Select Local CD/DVD to make the sytem boot from it. As the system’s bootloader is corrupt.
168 P A G E
http://www.kerneltraining.com/
Move the curor to Continue tab, to mount the ‘root’ from CD/DVD. Press Enter
169 P A G E
http://www.kerneltraining.com/
Observe from above pic, that now your system has been mounted on /mnt/sysimage. It
means where our system root is residing
Move the cursor to OK and press Enter to continue.
170 P A G E
http://www.kerneltraining.com/
Select ‘shell start shell’ and move cursor to OK to start the shell
You can observe that a shell prompt is displayed
171 P A G E
http://www.kerneltraining.com/
Install the grub on the /boot device i.e. /dev/vda2 by using following command
#grub-install <device name>
#grub-install /dev/vda2
If it shows no error reported, that means we have successfully recovered the grub.
172 P A G E
http://www.kerneltraining.com/
LISTING OUT THE MODULES (DRIVERS) AND BLACKLISTING THE USB AND CD-ROM
DRIVER:
To search all the kernel modules in the system using find command
All the kernel modules in the system will be ending with .ko extension, so let’s search it
using find command
#find / -name *.ko
173 P A G E
http://www.kerneltraining.com/
Note:- Observe that all the modules listed are in /lib/modules only. All modules may be
supported or currently loaded modules.
174 P A G E
http://www.kerneltraining.com/
To install/re-install a module
To install a module use the following command
#modprobe <mod name>
#modprobe fat
175 P A G E
http://www.kerneltraining.com/
To disable a USB/CD-ROM drive driver, first check whether a driver is loaded or not
#lsmod grep –i usb
If it is not loaded, connect the USB drive to the system and wait for it to get loaded, then
check it again whether the module is loaded or not
#lsmod grep –i usb
You can navigate through /media/E817….. and verify whether it is correct device or not.
Now as we know the module name just remove the module
#modprobe –r usb_storage
The error showing above is because the drive is mounted, unmount it and try removing module
again
As we have successfully removed the module, now place the module name in
/etc/modprobe.d/blacklist.conf file so that it may not be loaded in future.
#vim /etc/modprobe.d/blacklist.conf
176 P A G E
http://www.kerneltraining.com/
Now again try connecting the drive and check whether the USB is loading or not
Note: - The procedure for black listing CD-ROM is exactly same. Try it yourselves
177 P A G E
http://www.kerneltraining.com/
CRON JOB:
In any operating system, it is possible to create jobs that you want to reoccur. This process,
known as job scheduling, is usually done based on user-defined jobs. For Red Hat or any
other Linux, this process is handled by the cron service or a daemon called crond, which can
be used to schedule tasks (also called jobs). By default, Red Hat comes with a set of
predefined jobs that occur on the system (hourly, daily, weekly, monthly, and with arbitrary
periodicity). As an administrator, however, you can define your own jobs and allow your
users to create them as well.
The importance of the job scheduling is that the critical tasks like taking backups, which the
clients usually wants to be taken in nights, can easily be performed without the
intervention of the administrator by scheduling a cron job. If the cron job is scheduled
carefully than the backup will be taken at any given time of the client and there will be no
need for the administrator to remain back at nights to take the backup.
Crontab format
To assign a job in the Crontab file the format used is the following
178 P A G E
http://www.kerneltraining.com/
Options Explanation
Is treated as ever 5 minutes, hours, days, or months. Replacing the 5 with another
*/5
numerical value will change this option.
2,4,6 Treated as an OR, so if placed in the hours, this could mean at 2, 4, or 6 o-clock.
Treats for any value between 9 and 17. So if placed in day of month this would be
9-17
days 9 through 17. Or if put in hours it would be between 9 and 5.
CRONTAB COMMANDS
Command Explanation
crontab –e Edit your crontab file, or create one if it doesn’t already exist.
crontab –l Display your crontab file.
crontab –r Remove your crontab file.
crontab -u If combined with –e, edit a particular user’s Crontab file and if
combined with –l, display a particular user’s crontab file. If
combined with –r, deletes a particular user’s Crontab file
179 P A G E
http://www.kerneltraining.com/
LAB WORK:-
Setting a job to display the current date for every minute on present console
To set the above job the steps are
Check the console on which you are working by following command
#tty
180 P A G E
http://www.kerneltraining.com/
Wait for a minute and check whether time is displaying or not. Every min time will be
displayed as below.
Schedule a cron job to create a directory “ktdir” under “/root” on “Sunday 22 October at 1:30
AM”
To schedule above job edit the crontab file as shown below and restart the service
#crontab –e
Schedule a job to run the backup script “bkpscript.sh” on every “Saturday 12:30 PM”
In order to schedule above job the steps are.
Check the location of script and also check whether it is having execute permission or not. If
not then add the execute permissions to all user on it.
181 P A G E
http://www.kerneltraining.com/
Schedule a job so that a user “ktuser” should get a mail regarding meeting on 24 th, 29th and
31st October at 2:25 PM.
To set above task edit the crontab in following passion, and restart the service
#crontab –e –u <user name>
#crontab –e –u ktuser
182 P A G E
http://www.kerneltraining.com/
Schedule a job so that a user “ktuser” should get the mail from 15 th to 20th and 25th to 30st
November as a reminder of some session at 2:25 PM
This task is very much similar to the previous one but there is only a small change in format.
#crontab –e –u ktuser
There are still various method you can schedule the cron jobs, Do some R&D on it to find
out more.
183 P A G E
http://www.kerneltraining.com/
If again want to allow them to use cron job facilities just remove their names from
/etc/cron.deny file.
Allow only two users “musab” and “rahul” to use cron jobs out of all the users in the system
Assuming that we have 100 users in our system, putting all 98 names in /etc/cron.deny file
is a time consuming process. Instead of that, we can create one more file /etc/cron.allow,
in which we can assign names of those users who are allowed to use cron jobs.
Remove the /etc/cron.deny file and create /etc/cron.allow, still if both files are existing
cron.allow file will be having precedence over cron.deny file. Just to avoid confusion it is
good to remove cron.deny file
Note: /etc/cron.deny file exists by default, but we need to create /cron.allow file. If your name
is not there in cron.allow file then you will not be allowed to use cron jobs, and as mentioned
above, if both files are existing cron.allow file will be having precedence over cron.deny file. If
neither cron.deny nor cron.allow files exists then only root can use cron jobs.
Now, let’s put those two users “musab” and “rahul” name in /etc/cron.allow file and check
the results.
#vim /etc/cron.allow
184 P A G E
http://www.kerneltraining.com/
Note: To see man pages on cron job use #man 4 crontabs command
AT JOBS
“at” is used to schedule the job for a particular time or interval, in other words it is used
only for one time or only for one interval.
185 P A G E
http://www.kerneltraining.com/
Schedule at job to get a mail at 10.30 AM till three days from now for a meeting
#at 10.30am + 3days
Note: See man pages “man at” for more on at jobs and formats.
To check the list of at jobs
#at –l or #atq
186 P A G E
http://www.kerneltraining.com/
Note: the output will not be in human readable format and also very lengthy.
To remove a job:
check the job id
To remove a job the syntax is
#atrm < job id >
#atrm 17
#atrm 18
All the above are few examples to use cron jobs and at jobs, do some constant R&D’s to know
more about it.
187 P A G E
http://www.kerneltraining.com/
What Is SSH?
There are a couple of ways that you can access a shell (command line) remotely on most
Linux/Unix systems. One of the older ways is to use the telnet program, which is available on
most network capable operating systems. Accessing a shell account through the telnet method
though poses a danger in that everything that you send or receive over that telnet session is
visible in plain text on your local network, and the local network of the machine you are
connecting to. So anyone who can "sniff" the connection in-between can see your username,
password, email that you read, and command that you run. For these reasons you need a more
sophisticated program than telnet to connect to a remote host.
SSH, which is an acronym for Secure SHell, was designed and created to provide the best
security when accessing another computer remotely. Not only does it encrypt the session, it
also provides better authentication facilities.
These two diagrams above show how a telnet session can be viewed by anyone on the network
by using a sniffing program like Ethereal (now called Wireshark) or tcpdump. It is really rather
trivial to do this and so anyone on the network can steal your passwords and other information.
The first diagram shows user jsmith logging in to a remote server through a telnet connection.
He types his username jsmith and password C0lts06! which are viewable by anyone who is
using the same networks that he is using.
The second diagram shows how the data in an encrypted connection like SSH is encrypted on
the network and so cannot be read by anyone who doesn't have the session-negotiated keys,
which is just a fancy way of saying the data is scrambled. The server still can read the
information, but only after negotiating the encrypted session with the client.
188 P A G E
http://www.kerneltraining.com/
LAB WORK:-
Accessing the remote machine using ssh
To access the remote machine using ssh, the syntax is
#ssh <ip address/ host name of remote machine>
Note: hostname can only be used when the hostname is saved in /etc/hosts file or, if
DNS is configured.
#ssh 192.168.10.98
The first time around it will ask you if you wish to add the remote host to a list of known_hosts,
go ahead and say yes.
Enter the password of the remote system correctly, once logged in check hostname and ip
address to confirm login.
To leave the session, just type exit or logout command and you will be back to your own
machine through which you are logged in.
189 P A G E
http://www.kerneltraining.com/
LAB WORK:
190 P A G E
http://www.kerneltraining.com/
It will prompt above to mention the file where these keys shoud be stored, to keep its default
directory just press “Enter”. The default location will be /root/.ssh/ directory
Now it will ask for passphrase, which will be used instead of password. The passphrase will only
be asked once per session. Enter your desired passphrase twice as shown on next page, and
press enter.
Okay now our keys are successfully generated, go to /root/.ssh/ directory and check for the
keys.
#cd /root/.ssh
191 P A G E
http://www.kerneltraining.com/
The id_rsa is a private key and id _rsa.pub is the public key which will be used later to make
password less login.
Enter the password of the client to proceed, check it on client side whether it is copied or not
Move to client system and check whether the key is copied properly or not
To check the key navigate to /root/.ssh/ directory and check for authorzed_keys file which
will hold all the system which are authorized and will not be asked for password..
#cd /root/.ssh/
#cat authorized_keys
192 P A G E
http://www.kerneltraining.com/
Try login to the client machine using SSH, check whether it is asking for password
For logging into client machine the procedure is same as shown earlier. But as we have
assigned a passphrase it will ask us for it. Once you enter a passphrase it will last until you
logged out of server’s session. Let’s see it practically.
#ssh 192.168.10.95
It will prompt for the passphrase as shown below, enter the passphrase and press Enter
Exit the client session and login again. Notice the change
While we logout the client session and re-login again it will not ask us for passphrase
193 P A G E
http://www.kerneltraining.com/
Logout of client session and completely logoff the server, login once again in server and
connect the client using SSH.
As we log off completely from the server then login once again and try to connect the client,
it will prompt for passphrase. Observe it below
Note: if connected to the server via putty, above is complete log out just connect to the server
once again as usual and try connecting to the client, but if connected graphically then go to
System -> logout <username>, select it and click on LOGOUT. Login once more open terminal
and reconnect to client and observe that it will prompt for passphrase.
LAB WORK:
To copy a file using SCP to remote machine from source location
We are having a file ktfile in “/” directory, in the server ktlinux.kt.com who’s IP is
192.168.10.98, and we need to copy the same in other server’s i.e. ktcl5.kt.com with an IP
192.168.10.95, /root directory. Then,
194 P A G E
http://www.kerneltraining.com/
Now log in to destination system and check whether if the file is there.
To copy a file using SCP from a remote machine being in destination’s location
Let’s reverse the previous task, login to ktcl5 machine whose IP is 192.168.10.95, and
transfer a file from ktlinux machine whose IP is 192.168.10.98
Let’s first remove the earlier copied file ktfile, then copy it again from destination’s location.
The syntax for SCP a file from destination location.
#scp <source system’s IP>:/<location of file to be copied> <destination location to copy>
Note: Password will be asked for every transfer if public key is not saved on both locations, in
our case we have already generated and copied the key, hence there is no password prompts.
To copy a directory using SCP to remote machine from source’s location
We are having a directory ktdir in“/” directory, in the server ktlinux.kt.com who’s IP is
192.168.10.98, and we need to copy the same in other server’s i.e. ktcl5.kt.com with an IP
192.168.10.95, /root directory. Then,
The syntax SCP a directory from source’s location, the syntax is
#scp <option> <dir name > <remote hosts IP >:/<location to copy the directory >
#scp -r /ktdir 192.168.10.95:/root/
195 P A G E
http://www.kerneltraining.com/
To copy a directory using SCP from a remote machine being in destination’s location
Let’s reverse the previous task, login to ktcl5 machine who’s IP is 192.168.10.95, and
transfer a directory ktdir from ktlinux machine whose IP is 192.168.10.98
Let’s first remove the earlier copied directory ktdir, then copy it again being in destination’s
location.
The syntax for SCP a file from destination location.
#scp <option> <source system’s IP>:/<location of file to be copied> <destination location to
copy>
#scp –r 192.168.10.98:/ktdir /root/
196 P A G E
http://www.kerneltraining.com/
LAB WORK:-
Copy a directory using SCP, then update it and try rsync with SSH and check if the data is
synced.
As we have already copy a directory earlier using SCP from ktlinux to ktcl5 system, let’ s use
it for rsync.
Update the directory with some files in ktlinux system
Use rsync to sync the directory on ktcl5 machine, with the one in ktlinux machine
The syntax to rsycn a directory is
#rsync <options> <encryption> <source dir> <destination IP>:/<location of destination dir>
#rsync –rv -e ssh /ktdir 192.168.10.95:/root/
197 P A G E
http://www.kerneltraining.com/
Observe that it is only copying the files which are not there in destination’s folder.
Note: If you don’t want to use ssh just remove –e option from above syntax, but the drawback
of it is there will be no encryption
To compress the data and send it in archive mode use -avz instead of -rv in rsync
Update the file ktfile1 in ktlinux, sync it with rsync to ktcl5 and check the file again.
The syntax for syncing a file is
#rsync –avz –e ssh <source file> <destination ip>:/<location of file >
198 P A G E
http://www.kerneltraining.com/
Like this you can use rsync in many ways to transfer the updated file or files/directory to other
system.
199 P A G E
http://www.kerneltraining.com/
SUDO
Sudo stands for either "substitute user do" or "super user do" (depending upon how you
want to look at it). What sudo does is incredibly important and crucial to many Linux
distributions. Effectively, sudo allows a user to run a program as another user (most often
the root user). There are many that think sudo is the best way to achieve "best practice
security" on Linux
Users can login using their username and password and can issue administrative commands
placing sudo in front of the commands, e.g. sudo rpm -Uvh *.rpm , to run the command
which installs and updates programs in Linux (rpm).
The file /etc/sudoers file has the rules that users have to follow when using sudo command.
That means that whatever commands access is provided to any user in /etc/sudoers file,
that user can only run those commands.
Do not edit the /etc/sudoers directly; instead use "visudo" command to edit the sudoers
file. There are two reasons for that- it prevents two users from editing the file at the same
time, and it also provides limited syntax checking. Even if you are the only root user, you
need the syntax checking, so use "visudo".
200 P A G E
http://www.kerneltraining.com/
E.g.: Networking commands for Network user and Admin commands for Admin users etc.
2. Logs of the actions done by users
All commands executed by sudo users will be stored in /var/log/secure file, but still if you want
you can make your own log file by passing an entry in /etc/sudoers file at the bottom as
“Defaults logfile=/var/log/sudo.log” or whatever name you want, to save the logs of what
commands is executed by which sudo user.
This lines means that the user root can execute from ALL terminals, acting as ALL (any)
users, and run ALL (any) command.
So the first part is the user, the second is the terminal from where the user can use
sudo, the third is as which user he may act, and the last one, is which commands he
may run.
The advantage of visudo command , while editing if there are any syntax error it will be
reflected as follows
201 P A G E
http://www.kerneltraining.com/
LAB WORK:-
Allow a user “ktuser” all privileges like root
To assign root privileges to user add a line by using sudoers file as shown below.
#visudo (save the sudoers file as we save a vim file using “wq!”)
Now logged in as ktuser and run admin commands like fdisk –l etc
First try to run fdisk command normally and see what happens.
202 P A G E
http://www.kerneltraining.com/
Note: Only for the first time of the session it will prompt for user’s password to continue, but
for rest of the process it will continue normally as shown below
203 P A G E
http://www.kerneltraining.com/
Allow a user “ktuser2” to run all commands without prompting for his password any time.
To allow run all commands, the syntax we have already seen, but allow him run command’s
without prompting password a small change is to be made,
Now login as that user and check whether password is prompted or not
204 P A G E
http://www.kerneltraining.com/
Note: - The same can be done for groups also, try it!
Login as ktuser and try assigned commands and other commands as well
205 P A G E
http://www.kerneltraining.com/
Allow a group “ ktgroup” to run only network related commands as sudo user
To allow a group run only network commands, first uncomment the following line
Observe that we have just remove ‘#’ before the line to make the line readable. And also
observe that it contains all networking commands.
Just replace “ALL” with “NETWORKIG” from the last field of ktgroup line.
NOTE: - NETWORKING is the name of the command alias where uncommented the line.
206 P A G E
http://www.kerneltraining.com/
Now login as one of the member of ktgroup and try some commands assigned it.
Create a customize commands alias and assign it to ktgroup with network command.
Okay, first we need to create an alias say ”CUSTOM” with some commands and assign it to
ktgroup in addition to NETWORK commands.
Let’s firs get the path of the command need to be in CUSTOM alias
Okay, now let’s create an alias for these commands and assign it to ktgroup
#visudo
What are you waiting for! Assign it to ktgroup and save the file.
Login as one of the users in ktgroup and try newly added commands.
207 P A G E
http://www.kerneltraining.com/
Create a user alias and add some users from different groups and assign some root privileges
This is very much similar to the previous task, instead of command alias we need to
combine some user and give them some alias name which act as one user, but actually
there are some users inside it. Then we can assign some privileges to them
First we need available users and their groups.
#tail /etc/passwd and #tail /etc/gshadow.
From the above query, we can take sai from ktgroup, student and ktuser and can make an
alias user. Search “User Aliases”, under that create your own alias user as shown below.
#visudo
Now, let’s assign some command to this alias user called KTADMIN and save the file.
208 P A G E
http://www.kerneltraining.com/
Now login as one of those users and check the assigned commands for them.
Note: Checkout sudoers file for more option and try it out on your own!!!!
209 P A G E
http://www.kerneltraining.com/
Features:
RPM can verify software packages.
RPM can be served as a powerful search engine to search for software’s.
Components, software’s etc can be upgraded using RPM without having to reinstall
them
Installing, reinstalling can be done with ease using RPM
During updates RPM handles configuration files carefully, so that the customization is
not lost.
LAB WORK:-
210 P A G E
http://www.kerneltraining.com/
One more method of checking the installed package, when you are not sure about the
package name, like whether it starts with capital letter and full name etc.
#rpm –qa grep –i < package name>
#rpm –qa grep –i vsft*
211 P A G E
http://www.kerneltraining.com/
To check whether a package is consistent or not, before installing it. (Testing the installation)
To check the package’s consistency,
Move to the directory where you have kept the rpm package which you wish to install
If the installation status shows 100%, then the package is good or consistent.
But while showing the hash progress if it shows any error, then the package is inconsistent.
To install a package using rpm command and check whether it is installed properly or not.
To install the package first we need to be in the directory of the package
212 P A G E
http://www.kerneltraining.com/
Check the installed package by using it command, finger is used to check user’s details.
#finger <user name>
#finger ktuser
213 P A G E
http://www.kerneltraining.com/
#rpm –qip <package name> (where q is for query, i is for install and p is for package)
#rpm –qip finger-0.17-39-el6.1686.rpm
To see the information or details about the installed package, the syntax is
#rpm –qi < package name >
#rpm –qi vsftpd
214 P A G E
http://www.kerneltraining.com/
#which cat
Okay, so we know the package of mount let’s copy other commands content over mount
command. Let copy date command’s contents over mount command.
#cp /bin/date /bin/mount
Now when you run mount command it will show date, that means it is corrupted.
215 P A G E
http://www.kerneltraining.com/
So, to fix the mount command we need to reinstall its package, let’s install the package and
check whether mount command is fixed or not. Move to the folder where you kept the
packages and install it
#rpm –ivh util-linux-ng 2.17.2-6.el6.i686
It says the package is already install, check by using mount command whether it is working
fine.
Oops…!!! It isn’t fixed yet, now in such to force the installation to be done, the syntax is
#rpm –ivh <package name > - - force
# rpm –ivh util-linux-ng 2.17.2-6.el6.i686 - -force
216 P A G E
http://www.kerneltraining.com/
Okay then we’ve not only installed the package successfully but we have also fixed the
command. Congratulations.
217 P A G E
http://www.kerneltraining.com/
Now run the following command and check for the result.
It is showing that on line 5 in config file, some changes have been made. Isn’t it cool!!!
218 P A G E
http://www.kerneltraining.com/
The Yellow dog Updater Modified (YUM) is a package management application for
computers running Linux operating systems.
Yum is a standard method of managing the installation and removal of software. Several
graphical applications exist to allow users to easily add and remove packages; however,
many are simply friendly interfaces with yum running underneath. These programs present
the user with a list of available software and pass the user's selection on for processing. It is
yum that actually downloads the packages and installs them in the background.
Packages are downloaded from collections called repositories, which may be online, on a
network, and/or on installation media. If one package due to be installed relies on another
being present, this dependency can usually be resolved without the user needing to know
the details. For example, a game being installed may depend on specific software to play its
music. The problem of solving such dependencies can be handled by yum because it knows
about all the other packages that are available in the repository.
Yum will work only from Cantos 5 / Red hat 5 and latest versions of fedora. For Old releases
like RHEL 4 you need to use up2date command to update your rpm based packages.
LAB WORK:-
Configuring a YUM server and adding the info about it in at least one client
219 P A G E
http://www.kerneltraining.com/
If it is not installed, then go to dvd’s mount point and navigate to “Packages” directory and
install it as shown below.
As we know the mount point of dvd is /media/RHEL_6, move to its location and enter into
Packages directory.
Copy entire RHEL6 DVD to “/var/ftp/pub/rhel6” directory, Where rhel6 dir is to be made by
user only it is not a default dir
First make an directory “rhel6” under /var/ftp/pub
#mkdir /var/ftp/pub/rhel6
Now copy the RHEL6 DVD to /var/ftp/pub/rhel6 directory with its default permission
#cp –rvfp /media/RHEL_6.0\I386\Disc\1/* /var/ftp/pub/rhel6
220 P A G E
http://www.kerneltraining.com/
Note:- it will take around 5 minutes copy all the data, based on the DVD
Check the directory after copying is finished.
221 P A G E
http://www.kerneltraining.com/
I guess there’s some explanation requires about the fields we have entered.
[KTREPO] is the short name given to the repository.
name is the complete name for the repository.
baseurl is the location of the dvd dump we have made.
enabled is to enable or disable the repository. The possible value for it is 0 and 1, where 0
means disable and 1 means enabled.
gpgcheck With the gpgcheck option, all packages must be signed, and yum must be able to
verify the signatures on packages from red hat . If gpgcheck=0, there will be no package
signing by red hat and signature verification.
Clean the yum cache and check the package list using yum command
To clear the cache use the following command
#yum clean all
If the configuration is correct, then the following output will be displayed, otherwise there will
be some errors displayed.
Now let’s check whether our repository is functioning properly or not.
#yum list (to list all the packages in repository)
222 P A G E
http://www.kerneltraining.com/
If the above output is displayed then congratulation you have successfully configured the yum
Server
Configure the yum client and check whether yum server is responding to it:
223 P A G E
http://www.kerneltraining.com/
If your output is like this then you have successfully configured a yum client as well. Congrats!!!
Now you can configure as many as clients you want.
In case if yum list command is not listing the package then delete the following file in
/etc/yum.repos.d/ at client side only.
Clean the cache and list the packages, it will certainly solve the problem.
224 P A G E
http://www.kerneltraining.com/
225 P A G E
http://www.kerneltraining.com/
It will prompt you for y/n to continue, type y and continue installing the package
226 P A G E
http://www.kerneltraining.com/
227 P A G E
http://www.kerneltraining.com/
As there are no updates available for it, it is not showing anything to update
228 P A G E
http://www.kerneltraining.com/
229 P A G E
http://www.kerneltraining.com/
Let’s try install package from group called “urdu support”, the syntax is
#yum groupinstall <package name> -y
#yum groupinstall urdu support -y
230 P A G E
http://www.kerneltraining.com/
231 P A G E
http://www.kerneltraining.com/
The software management can be learnt more by using manual pages like man yum and also
man rpm etc.
If nothing works
is yours…!!!
232 P A G E
http://www.kerneltraining.com/
233 P A G E
http://www.kerneltraining.com/
LAB WORK:-
To backup the file using tar
To backup the file using tar the syntax is
#tar –cvf <destination and name to be > < source file>
#tar –cvf /opt/etc.tar /etc
Check the size of tar file by using du –h <file name > command
#du –h /opt/etc.tar
234 P A G E
http://www.kerneltraining.com/
Transfer the file to other system and remove gzip and tar from it and check the size on every
step.
Let’s transfer the file to other computer using scp
#scp /opt/etc.tar.gz 192.168.10.95:/root/
Login to the remote system, remove gzip it and check the size.
To gunzip a file the syntax is
#gunzip <file name>
#gunzip etc.tar.gz
Untar the file and check for the size of the file/directory
To untar a file the syntax is
#tar -xvf <file name>
#tar –xvf etc.tar
235 P A G E
http://www.kerneltraining.com/
236 P A G E
http://www.kerneltraining.com/
Services are programs (called daemons) that once started run continuously in the
background and are ready for input or monitor changes in your computer and respond to
them. For example the Apache server has a daemon called httpd (the d is for daemon) that
listens on port 80 on your computer and when it receives a request for a page it sends the
appropriate data back to the client machine.
Many services are required to run all the time however many can be safely turned of for
both security reasons as running unnecessary services opens more doors into your
computer, but also for performance reasons. It may not make much difference but your
computer should boot slightly faster with less services it has to start on boot.
One of the techniques in every Linux administrator's toolbox to improve security of a box is
to turn off unneeded services.
service - This controls the starting and stopping of services during a session, these
setting are not saved. If you start Apache this way but it is not set to start on boot using
the above method then it will continue to run but on next boot will not start
automatically.
chkconfig - This controls which services are set to start on boot, by their nature these
setting are saved and are applied at next boot. Changing these settings will not start the
service immediately; it will just flag them to be started from the next boot.
237 P A G E
http://www.kerneltraining.com/
LAB WORK:-
Reload the ftp services, may be required after doing some change in config file.
238 P A G E
http://www.kerneltraining.com/
To restart the ftp or any service, required when reload does not work
Note: Where 0 1 2 3 4 5 6 are the run levels in Linux, The output shows that on which run level
the service is available even after reboot.
239 P A G E
http://www.kerneltraining.com/
The same can be done for making service unavailable in a particular run level.
240 P A G E
http://www.kerneltraining.com/
A Linux process is a program running in the Linux system. Depending on Linux distributions,
it's also known as service. In Linux community however, a Linux process is called daemon.
When you start a program or running an application in Linux, you actually execute that
program. A Linux process (a daemon), running in foreground or in the background, uses
memory and CPU resources. That's why we need to manage Linux process. Keeping unused
Linux process running in the system is a waste and also exposes your system to security
threat.
In Linux, every running process or daemon is given an identity number called PID (Process
ID). The process id is unique. We can terminate unused program in the system by stopping
its process id.
In order to manage Linux processes, we need to identify some process information such as
who's responsible for the process, which terminal the process is running from and what
command used to run the process.
Interactive Processes
System Process or Daemon
Automatic or batch
INTERACTIVE PROCESSES
Interactive processes are those processes that are invoked by a user and can interact with the
user. VI is an example of an interactive process. Interactive processes can be classified into
foreground and background processes. The foreground process is the process that you are
currently interacting with, and is using the terminal as its stdin (standard input) and stdout
241 P A G E
http://www.kerneltraining.com/
(standard output). A background process is not interacting with the user and can be in one of
two states - paused or running.
Any process can become a daemon as long as it is run in the background, and does not interact
with the user. A simple example of this can be achieved using the [ls -R] command. This will list
all subdirectories on the computer, and is similar to the [dir /s] command on Windows. This
command can be set to run in the background by typing [ls -R &], and although technically you
have control over the shell prompt, you will be able to do little work as the screen displays the
output of the process that you have running in the background. You will also notice that the
standard pause (ctrl+z) and kill (ctrl+c) commands do little to help you.
AUTOMATIC PROCESSES
Automatic processes are not connected to a terminal. Rather, these are tasks that can be
queued into a spooler area, where they wait to be executed on a FIFO (first-in, first-out) basis.
Such tasks can be executed using one of two criteria:
At certain date and time: done using the “at “command
At times when the total system load is low enough to accept extra jobs: done using the Cron
command. By default, tasks are put in a queue where they wait to be executed until the system
load is lower than 0.8. In large environments, the system administrator may prefer cron job
processing when large amounts of data have to be processed or when tasks demanding a lot of
system resources have to be executed on an already loaded system. Cron job processing is also
used for optimizing system performance.
Parent and Child Process
The Process which starts or creates another process is called parent process and the one
which got created is known as child process.
Every process will be having a parent process except init process.
The init process is the parent of all the process in the system. It is the first process which
gets started by the kernel at the time of booting
The PID of init will be 1.
Only after init process gets started the remaining process are called by it, and hence it is
responsible for all the remaining processes in the system.
242 P A G E
http://www.kerneltraining.com/
LAB WORK:-
To monitor the process using ps command
The ps command gives the running process of the present terminal and present command.
The syntax for ps command is
#ps
To see which process are attached with some terminals (tty) and which are not
#ps –x
243 P A G E
http://www.kerneltraining.com/
Note: The process which are showing “?” are not attached to any tty.
To see which process are running by a particular group
#ps –G <group name> or #pgrep –G <group name>
#ps –G musab or #pgrep –G musab
SIGNALS IN LINUX
Signals are a way of sending simple messages to processes. Most of these messages are
already defined and can be found in <linux/signal.h>. However, signals can only be
processed when the process is in user mode. If a signal has been sent to a process that is in
kernel mode, it is dealt with immediately on returning to user mode.
244 P A G E
http://www.kerneltraining.com/
Every signal has a unique signal name, an abbreviation that begins with SIG (SIGINT for
interrupt signal, for example). Each signal name is a macro which stands for a positive
integer - the signal number for that kind of signal. Your programs should never make
assumptions about the numeric code for a particular kind of signal, but rather refer to them
always by the names defined. This is because the number for a given kind of signal can vary
from system to system, but the meanings of the names are standardized and fairly uniform.
Signals can be generated by the process itself, or they can be sent from one process to
another. A variety of signals can be generated or delivered, and they have many uses for
programmers. (To see a complete list of signals in the Linux® environment, uses the
command kill -l.)
There are total 64 signals in Linux, the list of all the signal can be sen by
#kill –l
245 P A G E
http://www.kerneltraining.com/
246 P A G E
http://www.kerneltraining.com/
Likewise you can use other signals to kill the process like
#kill -15 <pid>
#kill -1 <pid>
247 P A G E
http://www.kerneltraining.com/
When talking about processes priority is all about managing processor time. The Processor
or CPU is like a human juggling multiple tasks at the same time. Sometimes we can have
enough room to take on multiple projects. Sometimes we can only focus on one thing at a
time. Other times something important pops up and we want to devote all of our energy
into solving that problem while putting less important tasks on the back burner.
In Linux we can set guidelines for the CPU to follow when it is looking at all the tasks it has
to do. These guidelines are called niceness or nice value. The Linux niceness scale goes from
-20 to 19. The lower the number the more priority that task gets. If the niceness value is
high number like 19 the task will be set to the lowest priority and the CPU will process it
whenever it gets a chance. The default nice value is zero.
By using this scale we can allocate our CPU resources more appropriately. Lower priority
programs that are not important can be set to a higher nice value, while high priority
programs like daemons and services can be set to receive more of the CPU’s focus. You can
even give a specific user a lower nice value for all of his/her processes so you can limit their
ability to slow down the computer’s core services.
There are two options to reduce/increase value of a process. You can either do it using the
nice command or the renice command.
LAB WORK:-
248 P A G E
http://www.kerneltraining.com/
Log in to other terminal and check the nice value for the above command/ process.
#ps –elf
249 P A G E
http://www.kerneltraining.com/
“02:23:18″ is the current time; “up 1 day” shows how long the system has been up for; “3 user”
how many users are logged in; “load average: 0.01, 0.00, 0.23″ the load average of the system
(1minute, 5 minutes, 15 minutes).
Shows CPU utilization details. “9.5%us” user processes are using 9.5%; “31.2%sy” system
processes are using 31.2%; “27.0%id” percentage of available cpu; “7.6%wa” time CPU is
waiting for IO.
“543948k total” is total memory in the system; “526204K used” is the part of the RAM that
currently contains information; “17744k free” is the part of RAM that contains no information;
“17748K buffers and 129928k cached” is the buffered and cached data for IO.
250 P A G E
http://www.kerneltraining.com/
Field Description
PID Process ID
USER Effective User ID
PR Dynamic priority
NI Nice value, also known as base priority
Virtual Size of the task. This includes the size of process's executable binary,
VIRT
the data area and all the loaded shared libraries.
The size of RAM currently consumed by the task. Swapped out portion of
RES
the task is not included.
Some memory areas could be shared between two or more task, this field
SHR reflects that shared areas. The example of shared area are shared library
and SysV shared memory.
S Task status
The percentage of CPU time dedicated to run the task since the last top's
%CPU
screen update.
%MEM The percentage of RAM currently consumed by the task.
The total CPU time the task has been used since it started. "+" sign means it
TIME+ is displayed with hundredth of a second granularity. By default, TIME/TIME+
doesn't account the CPU time used by the task's dead children.
Command Showing program names
251 P A G E
http://www.kerneltraining.com/
q – quit
r – to renice a process
h - help
To kill the process with PID 21, then press “k” and a prompt will ask you for the PID
number, and enter 21. When asked about singal number give 9 or 15
To renice a process with PID 4, then press “r” and a prompt will ask you for PID enter 4 and
press enter. When prompted for renice value give any value .
Find out more on top command from internet and keep practicing
252 P A G E
http://www.kerneltraining.com/
File Transfer Protocol (FTP) is a standard network protocol used to transfer files from one
host to another host over a TCP-based network, such as the Internet. FTP is built on client-
server architecture and utilizes separate control and data connections between the client
and server. FTP users may authenticate themselves using a clear-text sign-in protocol but
can connect anonymously if the server is configured to allow it.
In Red hat Enterprise Linux. You can access FTP from both the Command Line Interface
mode and GUI mode.
Usually, the FTP server, which stores files to be transferred, uses two ports for the
transferring purpose, one for Commands and the other for sending and receiving Data.
Requests from client computers are received at the port 21 of the server, which is
exclusively reserved for sending Commands; therefore, it is called the Command Port. Once
an incoming request is received, the data requested or uploaded by the client computer is
transferred through a separate port referred to as a Data Port. At this point, depending on
the Active or Passive mode of the FTP connection, the port number used for the Data
Transfer varies.
Security is a major concern with any computer connected to the internet, therefore any
computer connected to the internet should be protected by a Firewall. In order to connect
to certain services, such as FTP, you have to allow those connections in the Firewall, on both
the Client and Server side.
Although a client's computer may not have a firewall enabled, a server should always have
this enabled for maximum security.In order to connect to an FTP server that has a firewall
enabled, you have to connect using a specific connection mode in your FTP program.
253 P A G E
http://www.kerneltraining.com/
There are different connection modes to choose from when connecting to an FTP server,
typically either "Active" or "Passive" mode.
Active FTP connection mode is where Command connection is initiated by the Client, and
the Data connection is initiated by the Server. And as the server actively establishes the
data connection with the Client, this mode is referred to as Active. The Client opens up a
port higher than 1024, and through it connects to the port 21 or the command port of the
Server. Then the Server opens up its port 20 and establishes a data connection to a port
higher than 1024 of the Client. In this mode, Client must set its firewall settings to accept all
the incoming connections that are received at the opened port.
In the Passive FTP connection mode, the server acts entirely passively as the Command
connection and the Data connection are both initiated and established by the Client. In this
mode, Server listens for incoming requests through its port 21 (command port), and when a
request is received for a data connection from the Client (using a high port), Server
randomly opens up one of its High ports. Then Client initiates a data connection between
the opened port of the Server and its own randomly selected port higher than 1024. In this
254 P A G E
http://www.kerneltraining.com/
mode, the Client does not have to change its firewall settings, as it only requires outgoing
connections and the firewall do not block outgoing connections. However, the Server
administrators must make sure that the Server allows incoming connections at all its
opened ports.
The difference between the Active FTP and Passive FTP is based on who initiates the Data
connection between the Server and the Client. If data connection is initiated by the Server, the
FTP connection is active, and if the Client initiates the Data connection, FTP connection is
passive.
Depending on the Active or Passive mode of the connection, port used for Data connection
changes. In an Active FTP, data connection is established between port 20 of the Server and
High Port of the Client. On the other hand, in Passive FTP, data connection is established
between a High port of the Server and a High port of the Client.
When using an Active FTP connection, firewall settings of the Client must be changed to accept
all incoming connection to the Client, while in Passive FTP connection, the Server must allow all
incoming connections to the Server. Most FTP servers prefer the Passive FTP connection due to
security issues.
255 P A G E
http://www.kerneltraining.com/
If you don’t have yum repository created, then installed it using rpm from RHEL 6 DVD
256 P A G E
http://www.kerneltraining.com/
Step4: Make the service enable even after reboot of the system
To make a service enable use the following command
#chkconfig vsftpd on
Step5: Connect from client and access the files and download it
To access the ftp server the client should have “ftp” package installed. If not installed, install
it using rpm, because yum will not work if ftp package is not installed.
Check whether ftp package is installed or not
#rpm –q ftp
To install ftp package either download it from redhat website or install it from RHEL6 DVD
Move to the package folder and installed it.
#rpm –ivh <package name>
257 P A G E
http://www.kerneltraining.com/
Note: when you run ls command you can see that it showing that we are using Passive mode.
258 P A G E
http://www.kerneltraining.com/
Exit the ftp server and check whether the files are there or not
To exit the ftp server either use
#bye or #quit
259 P A G E
http://www.kerneltraining.com/
To connect to the ftp server graphically open web browser like firefox type the ftp server’s ip
address as following
ftp://192.168.10.93
Step1: Create an upload dir in the document root of ftp server i.e., /var/ftp
#mkdir upload
Step2: Change the group to “ftp” and write permission to the “upload” directory
Changing the group of upload to ftp
#chgrp <group name> <directory name>
#chgrp ftp upload
260 P A G E
http://www.kerneltraining.com/
Step3: Log into client machine, access ftp server and try to upload some files
Log into client machine and access the ftp server from the directory in which the files to be
uploaded are there.
261 P A G E
http://www.kerneltraining.com/
“Permission denied” is because the upload permission in the ftp configuration file is not
enabled in the ftp server. So, navigate to the ftp configuration file and change the following
attributes in it.
#vim /etc/vsftpd/vsftpd.conf
Uncomment (remove the #) the following line
262 P A G E
http://www.kerneltraining.com/
Step4: Again login to client system and try again to upload the files into ftp server
If the SELinux is enabled in the ftp server, this error “Could not Create file” will be displayed.
To solve above error log into server and change the following permission
Check the Booleans for ftp using following command
#getsebool –a grep ftp
Add read write permission in context of upload directory using following command
263 P A G E
http://www.kerneltraining.com/
#chcon –t public_content_rw_t
Finally login into client machine, access the ftp server and try uploading the files in it.
Okay now you’ve made an ftp server for uploading files as well
264 P A G E
http://www.kerneltraining.com/
To Allow the root access to ftp server edit the “/etc/vsftpd/user_list” and
“/etc/vsftpd/ftpuser” and just add the comment (#mark) before “root”
#vim /etc/vsftpd/user_list
#vim /etc/vsftpd/ftpuser
265 P A G E
http://www.kerneltraining.com/
Though everything right, but still it is not allowing us to login as root because the home dir is
not able to change. It is again because of SELinux.
To solve the above problem, login to ftp server and change the following Boolean for ftp
266 P A G E
http://www.kerneltraining.com/
NFS stands for Network File System, and is a way to share files between machines as if they
were on your local hard drive. Linux can be both an NFS server and an NFS client, which
means that it can export filesystems to other systems, and mount filesystems exported
from other machines.
For example NFS server could be a Linux system and Unix could be a client. But it can’t be a
window system because window is not NFS compatible. The NFS server exports one or
more directories to the client systems, and the client systems mount one or more of the
shared directories to local directories called mount points. After the share is mounted, all
I/O operations are written back to the server, and all clients notice the change as if it
occurred on the local filesystem.
A manual refresh is not needed because the client accesses the remote filesystem as if it
were local. Because access is granted by IP address, a username and password are not
required. However, there are security risks to consider because the NFS server knows
nothing about the users on the client system.
267 P A G E
http://www.kerneltraining.com/
Package : nfs-utils
Daemons : rpc.nfsd, rpc.mountd, rpc.statd, rpc.lockd, rpc.rquotad
Script : /etc/init.d/nfs
Port number : 2049
Configuration File : /etc/exports
Other imp files : /var/lib/nfs/etab, /var/lib/nfs/rmtab
Workflow of NFS
268 P A G E
http://www.kerneltraining.com/
Step2: Create a directory or create a partition and mount it and make a mount point and add
data to it.
Create a partition, format it and mount it, access the mount point and add data to it
#fdisk /dev/vda
269 P A G E
http://www.kerneltraining.com/
Optional: Change context of the directory to nfs_t if SElinux is enabled using the syntax:
chcon –t nfs_t /ktdir
Step3: Export the directory by editing /etc/exports file and using exportfs command
Edit the /etc/exports file
#vim /etc/exports
Mount Options
Dir name Network range permission sync the disk before command completion
270 P A G E
http://www.kerneltraining.com/
Options:
-a Exports or un-exports all directories
-r Reexport all directories
-u Unexports one or more directories
-v Provides verbose output
271 P A G E
http://www.kerneltraining.com/
Note: stop the iptables services by using #service iptables stop and chkconfig iptables off.
Step2: check and start the NFS services and make it permanent.
#service nfs start
#chkconfig - -list nfs
272 P A G E
http://www.kerneltraining.com/
Step3: Check which directory is exported for this machine using showmount command
To check the exported directories from server the syntax is
#showmount –e <server ip address>
Step5: Add some data to it and check the same is updated on server side.
Note that it is showing permission error because on server side the directory does not have
write permissions neither for group nor for others.
Log into server and add write permission to NFS directory
273 P A G E
http://www.kerneltraining.com/
Now , Again move back to client machine and try uploading some files
All the resources of the server is valuable and needs to be available for usage, when we
mount a NFS directory over client the network resource gets busy, even when the work is
finished the network resource will still be busy as mounting occupy it.
Autofs automatically mounts file systems for you when they are requested. This has a very
handy feature: It's great for handling removable media. Just CD to the right directory, or
execute ls or do anything that sends a request to the mount point: and the daemon mounts
it. After all, it's the kind of job that's beneath the dignity of a human being First; you need to
install the "autofs" package. It should include some appropriate config files. The files you
need is /etc/auto. Master
Step1: Log into client side and check whether autofs is install or not, if not install autofs
Check whether autofs is install or not
#rpm –q autofs
274 P A G E
http://www.kerneltraining.com/
Standby time
Dir to mount NFS auto mount configuration file for this mount point
Step3: Create /etc/auto.ktnfs file and /ktnfs directory if not created earlier
#vim /etc/auto.ktnfs
275 P A G E
http://www.kerneltraining.com/
Step5: log into the given directory in /etc/auto.master i.e. /ktnfs and check that if NFS is
mounted by mount command
Step6: change the directory to the name given in /etc/auto.ktnfs i.e. ktnfs and then auto
mounting will be done.
#cd ktnfs
#mount
Note:-
If you don’t have DNS and you don’t want use IP but want to use hostname instead, update
hostname with its ip in /etc/hosts file and then you can use hostname instead of IP
Okay now finally we’ve done with all NFS activities.
276 P A G E
http://www.kerneltraining.com/
The whole point of networking is to allow computers to easily share information. Sharing
information with other Linux boxes, or any UNIX host, is easy—tools such as FTP and NFS
are readily available and frequently set up easily “out of the box”. Unfortunately, even the
most die-hard Linux fanatic has to admit the operating system most of the PCs in the world
are running is one of the various types of Windows. Unless you use your Linux box in a
particularly isolated environment, you will almost certainly need to exchange information
with machines running Windows. Assuming you're not planning on moving all of your files
using floppy disks, the tool you need is Samba.
Samba is an implementation of a Common Internet File System (CIFS, also known as SMB)
protocol server that can be run on almost every variant of Unix in existence. Microsoft
clients will use this protocol to access files and printers located on your Unix
box just as if it were a native Windows server.
Samba allows linux computers to share files and printers across a network connection. By
using its SMB protocol, your linux box can appear in Windows Network Neighborhood or
My Network Places just like any other windows machine. You can share files this way, as
well as printers. By using samba on my home network, for example, my Windows machines
have access to a printer directly hooked up to my Linux box, and my Linux box has access to
a printer directly hooked up to one of my Windows machines. In addition, everyone can
277 P A G E
http://www.kerneltraining.com/
access everyone else's shared files. You can see how samba can be very useful if you have a
network of both Windows as well as Linux machines.
278 P A G E
http://www.kerneltraining.com/
Step2: Make a directory and assign full permission to it ,which will be shared
#mkdir /ktsamba
#chmod 777 /ktsamba
.
Step3: Check the context of the directory and change it according to samba
#ls –ldZ /ktsamba
#chcon –t samba_share_t /ktsamba
279 P A G E
http://www.kerneltraining.com/
Step4: Create a user or use any existing user who will be allowed to log in as samba user, add
that user to samba user
As we have a existing user “ktuser”, let’s just make it samba user
#smbpasswd –a <username>
#smbpasswd –a ktuser
Give password twice and wait till it add the user
Step5: Go to the configuration file i.e. /etc/samba/smb.conf and make the following changes
Open the /etc/samba/smb.conf and copy the last seven lines shown below and paste it at
the last to edit it.
Once pasted remove “;” mark before it and change it according to following picture
280 P A G E
http://www.kerneltraining.com/
Step5: Test the samba parameters andrestart the service and make it enable after reboot
To test the parameters us the following command
#testparm
281 P A G E
http://www.kerneltraining.com/
#chkconfig smb on
#chkconfig nmb on
282 P A G E
http://www.kerneltraining.com/
It will prompt for user name and passwd, give samba user and passwd and click on OK
Now a window will be opened, start adding some data to it from both sides
283 P A G E
http://www.kerneltraining.com/
Check the share name of that samba server by using following command
#smbclient –L //192.168.10.93
when prompted for passwd just press enter without giving any passwd
284 P A G E
http://www.kerneltraining.com/
That’s it with SAMBA Server and Client configuration; keep working to learn more about it.
285 P A G E
http://www.kerneltraining.com/
The Domain Name System (DNS) is the crucial glue that keeps computer networks in harmony
by converting human-friendly hostnames to the numerical IP addresses computers require to
communicate with each other. DNS is one of the largest and most important distributed
databases the world depends on by serving billions of DNS requests daily for public IP
addresses. Most public DNS servers today are run by larger ISPs and commercial companies but
private DNS servers can also be useful for private home networks.
Like the telephone system, every device attached to the Internet has a unique number, its IP
address. Also like the telephone system there is a directory services to help you find those
numbers called DNS.
If you have someone's name and address you can call a directory services, give them the details
you know and they will (usually) give you the telephone number to call them. Likewise, if you
know a server's host name (maybe http://www.google.co.in/) you can give that name to a DNS
server and it will give you the IP address of that server.
286 P A G E
http://www.kerneltraining.com/
Town: Hyderabad
County: Hyderabad
Country: India
Domain google
Top-level domain In
A database is made up of records and the DNS is a database. Therefore, common resource
record types in the DNS database are:
A - Host's IP address. Address record allowing a computer name to be translated into an
IP address. Each computer must have this record for its IP address to be located. These
names are not assigned for clients that have dynamically assigned IP addresses, but are
a must for locating servers with static IP addresses.
PTR - Host’s domain name, host identified by its IP address
CNAME - Host’s canonical name allows additional names or aliases to be used to locate
a computer.
MX - Host’s or domain’s mail exchanger.
NS - Host’s or domain’s name server(s).
SOA - Indicates authority for the domain (Start of Authority)
TXT - Generic text record
SRV - Service location record
RP - Responsible person
HINFO - Host information record with CPU type and operating system
The package which is used in Linux for performing DNS activity is BIND (Berkeley Internet Name
Domain)
287 P A G E
http://www.kerneltraining.com/
288 P A G E
http://www.kerneltraining.com/
Step2: Update the /etc/hosts file with the server’s ip address, and change the hostname with
fully qualified domain name.
289 P A G E
http://www.kerneltraining.com/
290 P A G E
http://www.kerneltraining.com/
Step5: Navigate to /var/named/ directory and create a forward and reverse zone files.
Navigate to /var/named/ directory and copy the named.localhost file with its permissions as
kt.flz and edit it.
#cd /var/named
#cp –p named.localhost kt.flz
291 P A G E
http://www.kerneltraining.com/
Copy again named.localhost, this time as kt.rlz and edit it as shown below.
#cp –p named.localhost kt.rlz
292 P A G E
http://www.kerneltraining.com/
#vim kt.rlz
293 P A G E
http://www.kerneltraining.com/
Okay now we’ve done with DNS server configuration, check whether it is resolving IP to
hostname and hostname to IP using various commands.
Using dig command to check the DNS resolution
Check with giving hostname of server
#dig <FQDN> of server
#dig ktadm.kt.com
294 P A G E
http://www.kerneltraining.com/
With IP address:
#dig –x 192.168.10.91
295 P A G E
http://www.kerneltraining.com/
296 P A G E
http://www.kerneltraining.com/
Log into client machine and add the DNS server’s information in /etc/resolv.conf file
#vim /etc/resolv.conf
297 P A G E
http://www.kerneltraining.com/
Now check with any of the options used previously like dig, ping, host or nslookup for dns
resolution
Do the same for every client and check it with various commands on every client
Also make sure that hostname should be Fully Qualified Domain Name.
298 P A G E
http://www.kerneltraining.com/
Every Web site sits on a computer known as a Web server. This server is always
connected to the internet. Web servers are computers that deliver (serves up) Web
pages. Every Web server has an IP address and possibly a domain name.
A web server can mean two things - a computer on which a web site is hosted and a
program that runs on such a computer. So the term web server refers to both hardware
and software.
A web server is what makes it possible to be able to access content like web pages or
other data from anywhere as long as it is connected to the internet. The hardware
houses the content, while the software makes the content accessible through the
internet.
The most common use of web servers is to host websites but there are other uses like
data storage or for running enterprise applications. There are also different ways to
request content from a web server. The most common request is the Hypertext Transfer
Protocol (HTTP), but there are also other requests like the Internet Message Access
Protocol (IMAP) or the File Transfer Protocol (FTP).
299 P A G E
http://www.kerneltraining.com/
A simple exchange between the client machine and Web server goes like this:
1. The client's browser dissects the URL in to a number of separate parts, including address,
path name and protocol.
2. A Domain Name Server (DNS) translates the domain name the user has entered in to its IP
address, a numeric combination that represents the site's true address on the Internet (a
domain name is merely a "front" to make site addresses easier to remember).
3. The browser now determines which protocol (the language client machines use to
communicate with servers) should be used. Examples of protocols include FTP, or File Transfer
Protocol, and HTTP, Hypertext Transfer Protocol.
4. The server sends a GET request to the Web server to retrieve the address it has been given.
For example, when a user types http://www.example.com/1.jpg, the browser sends a GET 1.jpg
command to example.com and waits for a response. The server now responds to the browser's
requests. It verifies that the given address exists, finds the necessary files, runs the appropriate
scripts, exchanges cookies if necessary, and returns the results back to the browser. If it cannot
locate the file, the server sends an error message to the client.
5. The browser translates the data it has been given in to HTML and displays the results to the
user.
300 P A G E
http://www.kerneltraining.com/
301 P A G E
http://www.kerneltraining.com/
Copy these lines and paste it at the end of the page, then edit it with your preferences.
Step2: Navigate to the document root folder i.e. /var/www/html/ and create an index.html file
which will be accessed through a web browser
#vim /var/www/html/index.html
Step4: Now open the Firefox web browser and try connecting the web server.
Open Firefox web browser and type the IP Address of the web server
http://192.168.10.99
302 P A G E
http://www.kerneltraining.com/
To open the website from command line use the following command
#curl <IP/HOSTNAME of web server>
#curl 192.168.10.99
Also try
#elinks --dump 192.168.10.95 and check the output
DNS configuration if you don’t want to use IP address.
Open the DNS configuration file and add the canonical name as “www”, so that we can use
our domain as full fledge website.
#vim /var/named/kt.flz
303 P A G E
http://www.kerneltraining.com/
Okay now we are ready just open the web browser like Firefox and this type address as
follows
www.kt.com
Note: This will only work in your DNS range, for others in your network use ip address
Create an index.html
304 P A G E
http://www.kerneltraining.com/
Open the Firefox web browser and type the following url
http://192.168.10.99/vcs
305 P A G E
http://www.kerneltraining.com/
Open the Firefox browser and type the following website address
http://192.168.10.95/kt and it will take you to Kernel Technologies’ website
306 P A G E
http://www.kerneltraining.com/
The default port number for HTTP is 80. However, most web servers can be configured to
operate on almost any port number, provided the port number is not in use by any other
program on the server.
For example, a server may host the website www.example.com. However, if the owner
wishes to operate a second site, and does not have access to the domain name
configuration for their domain name, and/or owns no other IP addresses which could be
used to serve the site from, they could instead use another port number, for example,
www.example.com:81 for port 81, www.example.com:8000 for port 8000, or
www.example.com:8080 for port 8080.
Step3: edit the configuration file i.e. /etc/httpd/conf/httpd.conf add the configuration for port
based hosting in configuration file.
#vim /etc/httpd/conf/httpd.conf
Copy the same 7 lines and paste it at end edit it
307 P A G E
http://www.kerneltraining.com/
Also search for the “Listen 80” by using “/” and paste your port under it
Step4: Restart the service, open web browser and search for your website with port no.
#service httpd restart
Name-based virtual hosts use multiple host names for the same web server IP address.
With web browsers that support HTTP/1.1 (as nearly all now do), upon connecting to a
webserver, the browsers send the hostname from the address that the user typed into their
browser's address bar along with the requested resource itself to the web server. The
server can use the Host header field to determine which web site (or virtual host), as well as
page, to show the user. The browser specifies the address by setting the Host HTTP header
with the host specified by the user. The Host header is required in all HTTP/1.1 requests.
308 P A G E
http://www.kerneltraining.com/
For instance, a server could be receiving requests for two domains, www.example.com and
www.example.net, both of which resolve to the same IP address. For www.example.com,
the server would send the HTML file from the directory /var/www/user/Joe/site/, while
requests for www.example.net would make the server serve pages from
/var/www/user/Mary/site/
Example: A blog server can be hosted using Name base hosting. blog1.example.com and
blog2.example.com
Step1: Make a directory in document root i.e. /var/www/ with some name say “ktname”
#mkdir /var/www/ktname
Step2: Give one more hostname to the server where you want to have name based
webhosting.
Step3: Update the DNS zone configuration files with the new hostname of the web server
#vim /var/named/kt.flz
309 P A G E
http://www.kerneltraining.com/
#vim /var/named/kt.rlz
Copy the same <VirtualHost> 7 lines, paste it at the last of the page and edit it as follows
310 P A G E
http://www.kerneltraining.com/
Step3: Restart the server and open the web page from Firefox
#service httpd restart
311 P A G E
http://www.kerneltraining.com/
A proxy server is one that receives requests intended for another server and that acts on the
behalf of the client (as the client proxy) to obtain the requested service. It is often used when
the client and the server are incompatible for direct connection. For example, the client may be
unable to meet the security authentication requirements of the server but may be required to
access some services. It may also be used for screening purposes to enable the administrator to
control access to undesirable sites. The proxy server may also be used for caching purposes,
which enables faster access to frequently used websites. All the computers connected to the
LAN access the Internet through a single IP address, resulting in improved security simply
because the number of ports exposed is reduced.
312 P A G E
http://www.kerneltraining.com/
Script : /etc/initd/squid
Step2: Edit the configuration file for squid i.e. “/etc/squid/squid.conf”, Add the network range
from where the clients can connect to proxy server.
#vim /etc/squid/squid.conf
313 P A G E
http://www.kerneltraining.com/
Step3: Enter the proxy server ip and port number as shown below
314 P A G E
http://www.kerneltraining.com/
315 P A G E
http://www.kerneltraining.com/
Step2: Check with the browser can you access www.hotmail.com through your browser
Step1: Create a file in /etc/squid with any name and add the phrase of the website, which you
want to block
Step2: Add the same file info in configuration file, i.e., /etc/squid/squid.conf
316 P A G E
http://www.kerneltraining.com/
Step4: Go to client browser and check wether the sites are being blocked
317 P A G E
http://www.kerneltraining.com/
Step3: Go to client’s browser and check whether with default port, i.e: 3128 , whether it is
allowing internet or not.
Step 4: change the port to 8000 and check whether internet is allowed or not.
318 P A G E
http://www.kerneltraining.com/
Note: Squid Proxy is only the basic proxy, to learn more on proxy google for the third party
tools like; Squidguard, Untangle and Smoothwall. There is lot to do with squid, try doing google
and read the /etc/squid/squid.conf for more information.
319 P A G E
http://www.kerneltraining.com/
What is DHCP?
Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server to
automatically assign an IP address to a computer from a defined range of numbers (i.e., a
scope) configured for a given network.
Internet service providers usually use DHCP to help customers join their networks with
minimum setup effort required. Likewise, home network equipment like broadband
routersoffers DHCP support for added convenience in joining home computers to local area
networks (LANs).
320 P A G E
http://www.kerneltraining.com/
When a computer uses a static IP address, it means that the computer is manually configured
to use a specific IP address. One problem with static assignment, which can result from user
error or inattention to detail, occurs when two computers are configured with the same IP
address. This creates a conflict that results in loss of service. Using DHCP to dynamically assign
IP addresses minimizes these conflicts.
321 P A G E
http://www.kerneltraining.com/
Step3: Copy the example file for dhcp configuration over dhcp configuration file, i.e.,
/etc/dhcp/dhcpd.conf
Step4: Open the configuration file and edit it as per the requirement.
322 P A G E
http://www.kerneltraining.com/
Step4: Assign the static IP on the DHCP server by using setup command
323 P A G E
http://www.kerneltraining.com/
Step1: Make the dhcp option enabled in network configuration using #setup command.
Step2: Restart the network services and check the IP address is in dhcp scope.
324 P A G E
http://www.kerneltraining.com/
Make the same changes in all the clients to get the dynamic IP.
325 P A G E
http://www.kerneltraining.com/
Electronic mail is one of the best way to communicate for computer users anywhere in the
world. If i wanted to write an email message to my friend who is sitting somewhere in the
world, i simply open up my outlook-click on compose-type my friends email address in the to
box-mention the subject-draft the message-attach files (if needed)-click on send.That's it. This is
what i do to send an email to my friends.Not only me, all the computer users will do the exact
same thing.But for most of the time i didn't know how the mail flow takes place.How the
transfer takes place and how will it reach the recipient and the intermediate process and so
on....
There are a few new keywords we need to look into......
3. SMTP
Simple Mail Transfer Protocol will transfer the mails between the MTA's
Lets take a deeper look into this with a small example. The below picture will depict how mail
flow takes place between sender and recipient
326 P A G E
http://www.kerneltraining.com/
From the above picture, when the sender clicks on Send in his MUA, the mail will be transferred
to the MTA of the sender which exists in the Mail server of the Sender. The MTA of the sender
will check for the recipients address (MX records-Mail Exchange Records) and if it finds the
recipients address then the mail will be flowed from Senders MTA to Recipient MTA using the
SMTP Via TCP Port 25. Once the Recipients MTA receives the email, it will be transferred to
MUA of recipient. Once the Recipient Clicks on the Send/Receive button then the email will be
once click away from him residing in his inbox.
In addition to the above processes there is another agent called as MDA-Mail delivery agent.
MDA will receive the email from the MTA and will deliver it the the recipients MUA.
327 P A G E
http://www.kerneltraining.com/
Lab work:
Pre-requisite: Make sure DNS is configured
328 P A G E
http://www.kerneltraining.com/
329 P A G E
http://www.kerneltraining.com/
330 P A G E
http://www.kerneltraining.com/
iptables is the userspace command line program used to configure the Linux 2.4.x and later
packet filtering ruleset. It is targeted towards system administrators.
Since Network Address Translation is also configured from the packet filter ruleset, iptables is
used for this, too.
The iptables package also includes ip6tables. ip6tables is used for configuring the IPv6 packet
filter.
Iptables typically manipulates layer 3 (Routing – ipv4/ipv6 – source and/or destination filtering)
and layer 4 (Transport – TCP UDP – source and/or destination port filtering) of the OSI model
DEPENDENCIES
iptables requires a kernel that features the ip_tables packet filter. This includes all 2.4.x and
later kernel releases.
MAIN FEATURES
listing the contents of the packet filter ruleset
331 P A G E
http://www.kerneltraining.com/
THE PACKAGE
The package for iptables is installed by default, let’s query it
In a default install there are three predefined Chains that will take care of the three major
activities:
1. Incoming Traffic,
2. Forwarded Traffic and
3. Outgoing Traffic.
The "policy" is probably the most important thing to take away from the above table. The policy
is the default ruleset for that particular Chain, with a standard install all policies will be
"Accept".
POLICIES
The three common policies are:
1. Accept - This is used to explicitly pass through as long as no target rules apply.
2. Reject - This is used to send back an error packet in response to the matched packet:
otherwise it is equivalent to DROP so it is a terminating TARGET, ending rule traversal.
3. Drop - This policy will halt a connection to a host without any communication unless
there is a target rule that applies.
332 P A G E
http://www.kerneltraining.com/
AVAILABLE OPTIONS
The options that are recognized by iptables can be divided into several different groups:
1. Commands - These options specify a specific action to perform.
2. Parameters - Parameters set rule specifications for the commands used.
3. Other Options - Other options can be specified, as necessary, for commands used.
SIMPLE FIREWALL
Match
Append Network Jump
Insert in chain as
Destination
(1 = Protocol
first)
333 P A G E
http://www.kerneltraining.com/
In this command, we will allow connections only coming from a certain IP subnet using CIDR
notation. In this example we are going to lockdown to any IP address lying in the range of
192.168.10.0 - 192.168.10.255 source
chain
This rule should be run only after you have setup your access rules to allow you to ssh in.
SAVE YOUR RULESET
If your server reboots for any reason or you restart IPTables you will loose your changes. The
rules that you input by hand are stored in volatile memory. Make sure that you save IPtables
rules for any change you want to make permanent:
334 P A G E
http://www.kerneltraining.com/
Kickstart files can be kept on a single server system and read by individual computers during
the installation. This installation method can support the use of a single kickstart file to
install Red Hat Enterprise Linux on multiple machines, making it ideal for network and
system administrators.
Kickstart installations can be performed using a local CD-ROM, a local hard drive, or via NFS,
FTP, or HTTP
To create a kickstart file using GUI, first install the package “system-config-kickstart”
335 P A G E
http://www.kerneltraining.com/
336 P A G E
http://www.kerneltraining.com/
Let’s see each option of kickstart file and create a new kickstart file.
The first option in kickstart is basic configuration, Select the options required as below
Select the language, keyboard layout, Time Zone, assign root password, etc
337 P A G E
http://www.kerneltraining.com/
The second tab is installation Method. For normal installation select CD-ROM
338 P A G E
http://www.kerneltraining.com/
To create partitions layout, click on Add button and follow the screens below
Select the mount points like /, /boot, /opt etc and create some partitions as usual
The layout after the creation of partition will be as follows
339 P A G E
http://www.kerneltraining.com/
340 P A G E
http://www.kerneltraining.com/
After “Authentication” the next tab is “Firewall Configuration”, where we can configure
some firewall settings and SELinux settings.
Note: If Firewall is enabled assign some services which are allowed in it.
“Display Configuration” Tab for selecting display environment of the O/S
The next tab after above is “Package Selection” where you can select various packages that
will be installed with O/S
341 P A G E
http://www.kerneltraining.com/
After Package selection if you want to run any scripts pre and post- installation, you can go
for remaining two tabs, otherwise leave it.
Finally save the kickstart file in ftp’s document root, so that it can be accessible from any
machine in the network
342 P A G E
http://www.kerneltraining.com/
To modify the same, open system-config-kickstart application go to File -> Open and
navigate to the document root of ftp and select the file to be opened.
343 P A G E
http://www.kerneltraining.com/
Type the following information about the kickstart file and its server and also assign some IP
address to the machine to communicate with kickstart server.
# linux ip=192.168.10.95 netmask=255.255.255.0 ks=ftp://192.168.10.95/pub/kt.cfg
After entering above information just press enter to continue with your kickstart
installation. Wait till installation is completed.
344 P A G E
http://www.kerneltraining.com/
NETWORK INSTALLATIONS
Network installations can be performed using following methods.
FTP
NFS
HTTP
As we are trying to install RHEL6 from network still we require a boot media so that at least
we can get the boot screen where we can type our required command.
To get the boot screen we can have a media like CD/DVD or USB drive with boot.iso image
copied in it.
“boot.iso” image will produce a boot screen as follows
345 P A G E
http://www.kerneltraining.com/
For DVD
# cdrecord /root/boot.iso (where “/root/boot.iso” is the path of boot.iso image)
For USB Drive
#dd if=/root/boot.iso of=/dev/sdb1 (where /dev/sdb1 is the address of the USB drive)
After making the boot media, make the system boot with it, press “Esc” to type the
following command to take installation media from network
# boot: linux askmethod
After a while the following prompt will be display where you can select the preferred
language
346 P A G E
http://www.kerneltraining.com/
It is the time now to select the medium from which you want to install the O/S
Select URL for ftp and http, whereas NFS for installing from NFS
Define the network settings, if DHCP is configured in your environment select Dynamic if
not select Manual in iPv4 support
347 P A G E
http://www.kerneltraining.com/
Assign some IP address to your machine so that it can communicate with the server. Make
sure that IP should be in the same range that of the server.
Once the network is configured automatically the following screen will appear, provide the
details of the ftp server as following
348 P A G E
http://www.kerneltraining.com/
Bingo…, we’ve got the installation media from ftp server as follows.
NFS Configuration
Make an entry in /etc/exports to export the RHEL6 media.
Let us say my RHEL6 DVD is dumped in /var/ftp/pub/rhel6 directory
349 P A G E
http://www.kerneltraining.com/
Give the information about the NFS server and directory as following
Restart the services of http and you are done with the server side configuration
Client side setup
Repeat all the steps as done for FTP installation, the only change would be In the URL
address which will as below
350 P A G E
http://www.kerneltraining.com/
In such type of installation we will take the media from network and also use kickstart to
answer all the queries asked during installation.
We can select any method of installation from the list and specify the details regarding the
server.
If using ftp to access the kickstart file save it in document root of ftp
351 P A G E
http://www.kerneltraining.com/
Observe that an automated installation will be perform and the installation media will be taken
from network.
Isn’t it Amazing….!
352 P A G E
http://www.kerneltraining.com/
353 P A G E
http://www.kerneltraining.com/
To install the Oracle software, you must use the Oracle Universal installer.
1. For this installation, you need either the DVDs or a downloaded version of the DVDs. In this
tutorial, you install from the downloaded version. From the directory where the DVD files were
unzipped, open a terminal window and enter the following:
# ./runInstaller
2. The product you want to install is Oracle Database 11g. Make sure the product is selected and
click Next.
354 P A G E
http://www.kerneltraining.com/
2. You will perform a basic installation with a starter database. Enter orcl for the Global Database
Name and oracle for Database Password and Confirm Password. Then, click Next.
355 P A G E
http://www.kerneltraining.com/
3. You need to specify your Inventory directory. The location should be set to
/u01/app/oracle/oraInventory. Accept the default Operating System group name, oinstall.
Then, click Next.
4. The installer now verifies that the system meets all the minimum requirements for installing
and configuring the chosen product. Please correct any reported errors before continuing.
When the check successfully completes, click Next.
356 P A G E
http://www.kerneltraining.com/
5. Oracle Configuration Manager allows you to associate your configuration information with your
Metalink account. You can choose to enable it on this window. Then, click Next.
6. Review the Summary window to verify what is to be installed. Then, click Install.
357 P A G E
http://www.kerneltraining.com/
358 P A G E
http://www.kerneltraining.com/
9. When the database has been created, you can unlock the users you want to use. Click OK.
10. You need to execute orainstRoot.sh and root.sh as the root user.
359 P A G E
http://www.kerneltraining.com/
11. Open a terminal window and enter the following commands. Follow the prompts as instructed.
su -
<rootpassword>
cd /u01/app/oracle/oraInventory
./orainstRoot.sh
cd ../product/11.1.0/db_1
./root.sh
exit
exit
360 P A G E
http://www.kerneltraining.com/
361 P A G E
http://www.kerneltraining.com/
362 P A G E
http://www.kerneltraining.com/
OVERVIEW
Nagios® Core™ is an Open Source system and network monitoring application. It watches hosts
and services that you specify, alerting you when things go bad and when they get better.
Nagios Core was originally designed to run under Linux, although it should work under most
other unices as well.
Some of the many features of Nagios Core include:
Monitoring of network services (SMTP, POP3, HTTP, NNTP, PING, etc.)
Monitoring of host resources (processor load, disk usage, etc.)
Simple plugin design that allows users to easily develop their own service checks
Parallelized service checks
Ability to define network host hierarchy using "parent" hosts, allowing detection of and
distinction between hosts that are down and those that are unreachable
Contact notifications when service or host problems occur and get resolved (via email,
pager, or user-defined method)
Ability to define event handlers to be run during service or host events for proactive
problem resolution
Automatic log file rotation
Support for implementing redundant monitoring hosts
Optional web interface for viewing current network status, notification and problem
history, log file, etc.
SYSTEM REQUIREMENTS
The only requirement of running Nagios Core is a machine running Linux (or UNIX variant) that
has network access and a C compiler installed (if installing from source code).
You are not required to use the CGIs included with Nagios Core. However, if you do decide to
use them, you will need to have the following software installed...
1. A web server (preferrably Apache)
2. Thomas Boutell's gd library version 1.6.3 or higher
PREREQUISITES
Apache
PHP
GCC compiler
GD development libraries
363 P A G E
http://www.kerneltraining.com/
364 P A G E
http://www.kerneltraining.com/
NAGIOS INSTALLATION
Extract the files first
365 P A G E
http://www.kerneltraining.com/
Let us try to connect to our NAGIOS server using the address http://<nagios_serverip>/nagios
366 P A G E
http://www.kerneltraining.com/
367 P A G E
http://www.kerneltraining.com/
Like the fdisk utility, the parted utility also allows users to:
a) View the existing partition table
b) Create a new partition with available free space
c) Change the size of the existing partitions
To start the parted utility, log in as root and execute the command parted /dev/sda (where
/dev/sda is the device name for the drive we need to configure)
Table 1.1 parted commands
2) Copy file system from one partition to another; from and to are
cp from to
the minor numbers of the partitions
5) mkfs minor-num
Create a file system of type file-system-type
file-system-type
6) mkpart part-type
fs-type start-mb Make a partition without creating a new file system
end-mb
7) mkpartfs part-
type fs-type start- Make a partition and create the specified file system
mb end-mb
8) move minor-num
Move the partition
start-mb end-mb
9) name minor-num
Name the partition for Mac and PC98 disklabels only
name
368 P A G E
http://www.kerneltraining.com/
DEMO:
After starting parted, use the command print to view the partition table. A table similar to the
following appears:
369 P A G E
http://www.kerneltraining.com/
The first line contains the disk type, manufacturer, model number and interface, and the
second line displays the disk label type. The remaining output below the fourth line shows the
partition table.
In the partition table, the Minor number is the partition number. For example, the partition
with minor number 1 corresponds to /dev/sda1. The Start and End values are in megabytes.
Valid Type are metadata, free, primary, extended, or logical. The Filesystem is the file system
type, which can be any of the following:
ext2
ext3
fat16
fat32 NOTE:
hfs To select a different device
jfs without having to restart parted,
use the select command followed
linux-swap
by the device name (for example,
ntfs /dev/sda). Doing so allows you to
reiserfs view or configure the partition
hp-ufs table of a device.
sun-ufs
xfs
370 P A G E
http://www.kerneltraining.com/
boot
root
swap
hidden
raid
lvm or lba
CREATING A PARTITION
Start parted, where /dev/sda is the device on which to create the partition:
parted /dev/sda
View the current partition table to determine if there is enough free space:
print
From the partition table, determine the start and end points of the new partition and what
partition type it should be. You can only have four primary partitions (with no extended
partition) on a device. If you need more than four partitions, you can have three primary
partitions, one extended partition, and multiple logical partitions within the extended.
mkpart extended 18.1GB 53.7GB
371 P A G E
http://www.kerneltraining.com/
372 P A G E
http://www.kerneltraining.com/
TABLE LEGEND
Unofficial Port is not registered with IANA for the application Blue
Multiple
Multiple applications are known to use this port. Yellow
use
WELL-KNOWN PORTS
The port numbers in the range from 0 to 1023 are the well-known ports. They are used by
system processes that provide widely used types of network services. On Unix-like operating
systems, a process must execute with superuser privileges to be able to bind a network socket
to an IP address using one of the well-known ports.
373 P A G E
http://www.kerneltraining.com/
Secure Shell (SSH) — used for secure logins, file transfers (scp,
22 TCP UDP Official
sftp) and port forwarding
374 P A G E
http://www.kerneltraining.com/
375 P A G E
http://www.kerneltraining.com/
Official
80 TCP Hypertext Transfer Protocol (HTTP)
[11]
376 P A G E
http://www.kerneltraining.com/
123 UDP Network Time Protocol (NTP)—used for time synchronization Official
377 P A G E
http://www.kerneltraining.com/
162 TCP UDP Simple Network Management Protocol Trap (SNMPTRAP)[18] Official
175 TCP VMNET (IBM z/VM, z/OS & z/VSE - Network Job Entry(NJE)) Official
220 TCP UDP Internet Message Access Protocol (IMAP), version 3 Official
378 P A G E
http://www.kerneltraining.com/
350 TCP UDP MATIP-Type A, Mapping of Airline Traffic over Internet Protocol Official
351 TCP UDP MATIP-Type B, Mapping of Airline Traffic over Internet Protocol Official
399 TCP UDP Digital Equipment Corporation DECnet (Phase V+) over TCP/IP Official
379 P A G E
http://www.kerneltraining.com/
444 TCP UDP SNPP, Simple Network Paging Protocol (RFC 1568) Official
491 TCP GO-Global remote access and application publishing software Unofficial
380 P A G E
http://www.kerneltraining.com/
381 P A G E
http://www.kerneltraining.com/
FileMaker 6.0 (and later) Web Sharing (HTTP Alternate, also see
591 TCP Official
port 80)
623 UDP ASF Remote Management and Control Protocol (ASF-RMCP) Official
636 TCP UDP Lightweight Directory Access Protocol over TLS/SSL (LDAPS) Official
382 P A G E
http://www.kerneltraining.com/
695 TCP IEEE-MMS-SSL (IEEE Media Management System over SSL)[28] Official
383 P A G E
http://www.kerneltraining.com/
384 P A G E
http://www.kerneltraining.com/
904 TCP VMware Server Alternate (if 902 is in use, i.e. SUSE linux) Unofficial
953 TCP UDP Domain Name System (DNS) RNDC Service Unofficial
973 UDP Network File System (protocol) over IPv6 Service Unofficial
989 TCP UDP FTPS Protocol (data): FTP over TLS/SSL Official
990 TCP UDP FTPS Protocol (control): FTP over TLS/SSL Official
385 P A G E
http://www.kerneltraining.com/
993 TCP Internet Message Access Protocol over TLS/SSL (IMAPS) Official
994 TCP UDP Internet Relay Chat over TLS/SSL (IRCS) Official
“People are not lazy. They simply have important goals – that is, goals that do not inspire
them.” - Tony Robbins
“The only place where success comes before work is in the dictionary.” Vidal Sassoon
“Opportunity is missed by most people because it is dressed in overalls and looks like work.”
Thomas Edison
“People often say that motivation doesn’t last. Well, neither does bathing – that’s why we
recommend it daily.” Zig Ziglar
386 P A G E