List of Figures
Chapter 1: Introduction to Linux Troubleshooting
-
Figure 1-1: Choose between GNOME and KDE desktops, based on the X Window System.
-
Figure 1-2: Advanced network server software once in Red Hat Linux is included in Fedora.
-
Figure 1-3: Software development tools are spread across more than 100 software packages in Fedora.
-
Figure 1-4: Linux Toys and other hobbyist applications will run on Fedora Core.
Chapter 2: Troubleshooting Installation
-
Figure 2-1: When configuring a mouse during installation, select the manufacturer and model number when possible.
-
Figure 2-2: If your monitor isn't listed on the Monitor Configuration screen, choose a generic CRT or LCD display option.
-
Figure 2-3: Fedora detects an earlier Fedora or Red Hat Linux installation and gives you the option of upgrading.
Chapter 4: Securing and Automating Desktop and Server Installs
-
Figure 4-1: The redhat-config-kickstart GUI config tool makes a ks.cfg file for automating Fedora Core or Red Hat Enterprise network-based OS installs.
-
Figure 4-2: The Fedora Core CD/floppy/PXE boot/install screen.
Chapter 5: Preparing for Backups and Migration
-
Figure 5-1: Example of using full and incremental backups together.
-
Figure 5-2: Example of using full and differential backups together.
-
Figure 5-3: Using sequential levels to achieve incremental backups.
-
Figure 5-4: A Linux server/machine running a backup client talking to a centralized backup SAN via high-speed fibre channel.
Chapter 6: Troubleshooting Tools
-
Figure 6-1: Konsole (top) and GNOME Terminal (bottom) windows provide shell access on a Linux desktop.
-
Figure 6-2: Before you can run GUI administration tools, you are prompted to enter the root password.
-
Figure 6-3: Use top to sort processes by CPU, memory, or other system usage.
-
Figure 6-4: Select capture options and display network protocol data in the Ethereal window.
Chapter 7: X Troubleshooting: Video, Mouse, and Keyboard
-
Figure 7-1: Choose basic settings for your video card and monitor.
-
Figure 7-2: Adjust video settings with xvidtune.
Chapter 9: File System, Disk, and Power Troubleshooting
-
Figure 9-1: Set whether CDs are automatically mounted upon insertion.
-
Figure 9-2: Watch your battery charge from an icon in the GNOME panel.
Chapter 10: Detecting and Responding to Intrusions
-
Figure 10-1: The Red Hat System Logs tool simplifies log file monitoring.
Chapter 11: Firewall Troubleshooting
-
Figure 11-1: A single-homed stand-alone server can use an iptables-based firewall config or TCP wrappers to control incoming service requests, but not all services can be controlled with TCP wrappers by default.
-
Figure 11-2: Dual-homed or network firewalls are designed to protect entire networks of machines, not services running on the same server. These firewalls should only be using iptables.
-
Figure 11-3: Incoming client requests pass through levels of security on a system. iptables is the most secure outer level of defense or access control.
-
Figure 11-4: Red Hat Linux offers a graphical tool to configure iptables.
-
Figure 11-5: The most commonly used iptables for simple firewalls, called "filter." iptables is composed of multiple sets of tables of chains, and these chains have ordered sets of rules.
-
Figure 11-6: In a NAT routing firewall configuration, iptables forms a boundary between networks.
Chapter 12: Troubleshooting BIND9 and DNS
-
Figure 12-1: DNS is managed through a set of servers organized in an inverted tree structure.
-
Figure 13-1: During boot-up, kudzu finds a supported Multitech modem with a 4Lucent Venus chipset.
-
Figure 13-2: Here kudzu finds a nonsupported Motorola winmodem.
Chapter 14: Printer Troubleshooting
-
Figure 14-1: Use the Printer Configuration window to define the printers you can use.
-
Figure 14-2: Learn about the printers on your system on the Printer/Driver Notes screen.
-
Figure 14-3: View current driver options from the Driver Options tab.
-
Figure 14-4: Use the Printer Configuration tool to set up a new printer.
-
Figure 14-5: Begin the printer configuration wizard in the Add A New Print Queue window.
-
Figure 14-6: Select the appropriate queue type for this printer.
-
Figure 14-7: Once you've selected a queue type, provide specific information about your print server.
-
Figure 14-8: Identify your particular printer in the drop-down menu.
-
Figure 14-9: Once the printer appears in the main Printer Configuration window, it is ready to go.
-
Figure 14-10: You can configure a printer through the CUPS web tool.
-
Figure 14-11: Provide the details of the new printer on the Add New Printer page.
-
Figure 14-12: Choose the appropriate protocol used by your printer.
-
Figure 14-13: Define the printer with a URI that describes its specifications.
-
Figure 14-14: If the printer appears in the list, it has been configured properly.
-
Figure 15-1: Use the Samba configuration tool for a quick start under Red Hat Linux or Fedora Core.
-
Figure 15-2: Use SWAT to work with Samba through your web browser.
-
Figure 15-3: Define your new share in SWAT's Shares window.
-
Figure 15-4: On the Share Parameters page, define the permissions for the new share.
-
Figure 15-5: SWAT's Wizard tool can walk you through a simple Samba configuration.
-
Figure 16-1: Use the NFS Server Configuration window to share directories.
Chapter 19: E-Mail Server Troubleshooting
-
Figure 19-1: It's easy to manage the alternatives system with a point-and-click graphical interface.
-
Figure 19-2: The text-based alternatives interface is a happy medium between command line and GUI.
-
Figure 19-3: The chkconfig graphical interface helps you to manage services on various runlevels.
-
Figure 19-4: The ntsysv tool is a text-based interface for the chkconfig tool.