Contents
Abstract
In SUSE Linux Enterprise, YaST handles both the installation and configuration of your system. This chapter describes the configuration of system components (hardware), network access, and security settings, and administration of users. Find a short introduction to the text-based YaST interface in Section 8.12, “YaST in Text Mode”. For a description of manual system configuration, see Section 20.3, “System Configuration via /etc/sysconfig”.
Configure the system with YaST using various YaST modules. Depending on the hardware platform and the installed software, there are different ways to access YaST in the installed system.
In KDE or GNOME, start the YaST Control Center from the main menu.
Before YaST starts, you are
prompted to enter the root password, because YaST needs system
administrator permissions to change the system files.
To start YaST from the command line, enter the commands
su (for changing to the user
root) and
yast2. To start the text version, enter
yast instead of yast2. Also use the
command yast to start the program from one of the
virtual consoles.
For hardware platforms that do not support a display device of their own
and for remote administration on other hosts, run YaST remotely.
First, open a console on the host on which to display YaST and enter
the command ssh -X root@<system-to-configure> to
log in to the system to configure as
root and redirect the X server
output to your terminal. Following the successful
SSH login, enter yast2 to
start YaST in graphical mode.
To start YaST in text mode on another system, use ssh root@<system-to-configure> to open the connection. Then start YaST with yast.
To save time, the individual YaST modules can be started
directly. To start
a module, enter yast2
module_name.
View a list of all module names available on your system with
yast2 -l or yast2 --list.
Start the network module, for example, with yast2 lan.
To change the language of YaST, select + in the YaST Control Center. Choose a language, exit the YaST Control Center, log out of the system, then log in again. The next time you start YaST, the new language setting is used. This also changes the language for the entire system.
If you need work in a different language but do not want to change the
system language setting,
run the YaST with the LANG variable set to your
preferred language. Use a long language code in the format
langcode_statecode.
For example, for American English, enter LANG="en_US"
yast2.
This command starts YaST using the specified language. The language is only valid for this YaST session. The language settings of the terminal, other users, and your other sessions remain unchanged.
If you run YaST remotely over SSH, YaST uses the language settings of your local system.
When you start YaST in the graphical mode, the YaST Control Center, as shown in Figure 8.1, “The YaST Control Center”, opens. The left frame contains the available categories. When you click a category, its contents are listed in the right frame. Then select the desired module. For example, if you select and click in the right frame, a configuration dialog opens for the sound card. The configuration of the individual items usually consists of several steps. Press to proceed to the following step.
The left frame of most modules displays the help text, which offers suggestions for configuration and explains the required entries. To get help in modules without a help frame, press F1 or choose . After selecting the desired settings, complete the procedure by pressing on the last page of the configuration dialog. The configuration is then saved.
![]() | YaST Software Management Gtk and Qt Front-Ends |
|---|---|
YaST comes with two front-ends depending on the desktop installed on
your system. By default, the YaST gtk front-end runs on the GNOME desktop,
and the YaST qt front-end on the other desktops. This is defined with
the | |
To install, uninstall, and update software on your machine, use +. This opens a package manager dialog as shown in Figure 8.2, “YaST Package Manager”.
In SUSE® Linux Enterprise, software is available in the form of RPM packages. Normally, a package contains everything needed for a program: the program itself, the configuration files, and all documentation. A list of individual packages is displayed to the right in the individual package window. The content of this list is determined by the currently selected filter. If, for example, the filter is selected, the individual package window displays all packages of the current selection.
In the package manager, each package has a status that determines what to do with the package, such as “Install” or “Delete.” This status is shown by a symbol in a status box at the beginning of the line. Change the status by clicking or selecting the desired status from the menu that opens when the item is right-clicked. Depending on the current situation, some of the possible status flags may not be available for selection. For example, a package that has not yet been installed cannot be set to “Delete.” View the available status flags with +.
The font color used for various packages in the individual package window provides additional information. Installed packages for which a newer version is available on the installation media are displayed in blue. Installed packages whose version numbers are higher than those on the installation media are displayed in red. However, because the version numbering of packages is not always linear, the information may not be perfect, but should be sufficient to indicate problematic packages. If necessary, check the version numbers.
To install packages, select packages for installation and click . Selected packages should have the status icon. The package manager automatically checks the dependencies and selects any other required packages (resolution of dependencies). To view other packages required for installation before clicking , choose + from the main menu. After installing packages, continue working with the package manager by clicking or close it by clicking .
The package manager provides preselected groups for installation. You can select an entire group instead of single packages. To view these groups, use in the left frame.
![]() | List of All Available Packages |
|---|---|
To display all packages on your installation media, use the filter and select at the bottom of the tree. SUSE Linux Enterprise contains a number of packages and it might take some time to display this long list. | |
The filter groups the program packages according to application purpose, such as file or print server. The various groups of the filter are listed with the installed packages preselected.
Click the status box at the beginning of a line to install or uninstall this pattern. Select a status directly by right-clicking the pattern and using the context menu. From the individual package overview to the right, which displays the packages included in the current pattern, select and deselect individual packages.
To find language-specific packages, such as translated texts for the user interface of programs, documentation, and fonts, use the filter. This filter shows a list of all languages supported by SUSE Linux Enterprise. If you select one of these, the right frame shows all packages available for this language. Among these, all packages applying to your current software selection are automatically tagged for installation.
To uninstall a language from your system, select a language from the language list and uncheck the status box at the beginning of a line.
![]() | |
Because language-specific packages may depend on other packages, the package manager may select additional packages for installation. | |
If you want to find only packages from the specific source, use the filter. In the default configuration, this filter shows a list of all packages from the selected source. To restrict the list, use a secondary filter.
To view a list of the all installed packages from the selected installation source, select the filter then select from and deactivate all check boxes except .
The package status in the individual package window can be changed as usual. However, the changed package may no longer meet the search criteria. To remove such packages from the list, update the list with .
A package containing the source files for the program is usually available. The sources are not needed for running the program, but you may want to install the sources to compile a custom version of the program.
To install sources for selected program, mark the check box in the column. If you cannot see a check box, your installation sources do not contain the source of the package.
If you want to install the same packages on several computers, you can save your configuration to file and use it for other systems. To save your package selection, choose + from the menu. To import a prepared selection, use +.
![]() | Hardware Compatibility |
|---|---|
Because this function saves the exact package list, it is only reliable when the hardware is identical on the source and target systems. For more complicated situations, AutoYaST, described in Chapter 5, Automated Installation, may be a better choice. | |
To remove packages, assign the correct status to the packages to remove and click . Selected packages should have the status. If a package required by other installed packages is marked for deletion, the package manager issues an alert with detailed information and alternative solutions.
If you find damaged files that belong to package or you want to reinstall the original version of a package from your installation media, reinstall the package. To reinstall packages, select packages for reinstallation and click . Selected packages should have the status. If any dependency issues arise with installed packages, the package manager issues an alert with detailed information and alternative solutions.
To find a specific package, use the filter. Enter a search string and click . By specifying various search criteria, you can restrict the search to display a few or even only one package. You can also define special search patterns using wild cards and regular expressions in .
![]() | Quick Search |
|---|---|
In addition to the filter, all lists of the package manager feature a quick search. Simply enter a letter to move the cursor to the first package in the list whose name begins with this letter. The cursor must be in the list (by clicking the list). | |
To find a package by name, select , enter the name of the package to find in the search field, and click . To find a package by text in the description, select and , enter a search string, and click .
To search for the package that contains a certain file, enter the name of the file, select , and click . To find all packages that depend on a particular package, select , enter the name of package, and click .
If you are familiar with the package structure of SUSE Linux Enterprise, you can use the filter to find packages by subject. This filter sorts the program packages by subjects, such as applications, development, and hardware, in a tree structure to the left. The more you expand the branches, the more specific the selection is. This means fewer packages are displayed in the individual package window.
After selecting the packages for installation, update, or deletion, view the installation summary with . It shows how packages will be affected when you click . Use the check boxes to the left to filter the packages to view in the individual package window. For example, to check which packages are already installed, deactivate all check boxes except .
The package status in the individual package window can be changed as usual. However, the respective package may no longer meet the search criteria. To remove such packages from the list, update the list with .
Get information about the selected package with the tabs in the bottom right frame. If another version of the package is available, you get information about both versions.
The tab with the description of the selected package is automatically active. To view information about package size, version, installation media, and other technical details, select . Information about provided and required files is in . To view available versions with their installation sources, click .
During the selection of the software, the resource window at the bottom left of the module displays the prospective disk usage of all mounted file systems. The colored bar graph grows with every selection. As long as it remains green, there is sufficient space. The bar color slowly changes to red as you approach the limit of disk space. If you select too many packages for installation, an alert is displayed.
Some packages depend on other packages. This means that the software of the package only works properly if another package is also installed. There are some packages with identical or similar functionality. If these packages use the same system resource, they should not be installed at the same time (package conflict).
When the package manager starts, it examines the system and displays installed packages. When you select to install and remove packages, the package manager can automatically check the dependencies and select any other required packages (resolution of dependencies). If you select or deselect conflicting packages, the package manager indicates this and submits suggestions for solving the problem (resolution of conflicts).
To activate the automatic dependency check, select , located under the information window. With activated, any change of a package status triggers an automatic check. This is a useful feature, because the consistency of the package selection is monitored permanently. However, this process consumes resources and can slow down the package manager. For this reason, the automatic check is not activated by default. Regardless of the state of , a consistency check is performed when you confirm your selection with .
If you click , located under the information window, the package manager checks if the current package selection results in any unresolved package dependencies or conflicts. In the event of unresolved dependencies, the required additional packages are selected automatically. For package conflicts, the package manager opens a dialog that shows the conflict and offers various options for solving the problem.
For example, sendmail and
postfix may not be installed concurrently.
Figure 8.3, “Conflict Management of the Package Manager”
shows the conflict message prompting you to make a decision.
postfix is already installed. Accordingly, you
can refrain from installing sendmail, remove
postfix, or take the risk and ignore the
conflict.
![]() | Handling Package Conflicts |
|---|---|
Unless you are very experienced, follow the suggestions of YaST when handling package conflicts, because otherwise the stability and functionality of your system could be endangered by the existing conflict. | |
The package manager provides functions for quick and easy installation of devel and debug packages. To install all devel packages for your installed system, choose +. To install all debug packages for your installed system, choose +.
Add-on products are extensions for your system. You can install a third party add-on product or a special extension of your SUSE Linux Enterprise, for example, the SDK add-on or a CD with binary drivers. To install a new add-on, use +. You can select various types of product media, like CD, FTP or local directory. You can work also directly with ISO files. To add an add-on as ISO file media, select then choose .
After successfully adding the add-on media, the package manager window appears. If the add-on provides a new pattern, see the new item in the filter. To view the list of all packages from the selected installation source, select the filter and choose the installation source to view. To view packages from a selected add-on by package groups, select the secondary filter .
![]() | Creating Custom Add-On Products |
|---|---|
Create your own add-on products with YaST Add-On Creator. Read about the YaST add-on creator at http://developer.novell.com/wiki/index.php/Creating_Add-On_Media_with_YaST. Find technical background information at http://developer.novell.com/wiki/index.php/Creating_Add-Ons. | |
You can use multiple installation sources of several types. Select them and enable their use for installation or update using +. For example, you can specify SUSE Software Development Kit as an installation source. When started, it displays a list of all previously registered sources. Following a normal installation from CD, only the installation CD is listed. Click to include additional sources in this list. Sources can be CDs, DVDs, or network sources, such as NFS and FTP servers. Even directories on the local hard disk can be selected as the installation medium. See the detailed YaST help text for more details.
All registered sources have an activation status in the first column of the list. Enable or disable individual installation sources by clicking . During the installation of software packages or updates, YaST selects a suitable entry from the list of activated installation sources. When you exit the module with , the current settings are saved and applied to the configuration modules and .
To get technical support and product updates, your system must be registered and activated. If you skipped the registration during installation, register with the help of the module from . This dialog is the same as that described in Section 3.14.4, “Novell Customer Center Configuration”.
Install important updates and improvements with YaST Online Update. The current updates for your SUSE Linux Enterprise are available from the product specific update catalogs containing patches. To add or remove catalogs, use the + module, described in Section 8.3.3, “Selecting the Installation Source”.
![]() | Error on Accessing the Update Catalog |
|---|---|
If you are not able to access the update catalog, this might be due to an expired subscription. Normally, SUSE Linux Enterprise comes with a one or three years subscription, during which you have access to the update catalog. This access will be denied once the subscription ends. In case of an access denial to the update catalog you will see a warning message with a recommendation to visit the Novell Customer Center and check your subscription. The Novell Customer Center is available at http://www.novell.com/center/. | |
To install updates and improvements with YaST, run +. All new patches (except the optional ones) that are currently available for your system are already marked for installation. Clicking automatically installs these patches. After the installation has completed, confirm with . Your system is now up-to-date.
A package is a compressed file in rpm format that contains the files for a particular program.
A patch consists of one or more packages—either full packages or patchrpm or deltarpm packages— and may also introduce dependencies to packages that are not installed yet.
A patchrpm consists only of files that have been updated since it was first released for SUSE Linux Enterprise 10. Its download size is usually considerably smaller than the size of a package.
A deltarpm consists only of the binary diff between two defined versions of a package and therefore, has the smallest download size. Before being installed, the rpm package has to be rebuild on the local machine.
The window consists of five sections. The list of all patches available is on the left. Find the description of the selected patch displayed below the list of patches. The disk usage is displayed at the bottom of the left column. The right column lists the packages included in the selected patch (a patch can consist of several packages) and, below, a detailed description of the selected package.
The patch display lists the available patches for SUSE Linux Enterprise. The patches are
sorted by security relevance. The color of the patch name, as well as a
pop-up window under the mouse cursor, indicate the security status of the
patch: Security (red), Recommended
(blue), or Optional (black). There are three different
views on patches. Use to toggle the
views:
Currently not installed patches that apply to packages installed on your system.
All patches that apply to packages installed on your system.
All patches available for SUSE Linux Enterprise.
A list entry consists of a symbol and the patch name. For a list of
possible symbols, press
Shift+F1. Actions
required by Security and Recommended
patches are automatically preset. These actions are
, , or
. Actions for Optional
patches are not preset—right-click on a patch and choose an action
from the list.
If you install an up-to-date package from a catalog other than the update catalog, the requirements of a patch for this package may be fulfilled with this installation. In this case a check mark is displayed in front of the patch summary. The patch will be visible in the list until you mark it for installation. This will in fact not install the patch (because the package already is up-to-date), but mark the patch as having been installed.
Most patches include updates for several packages. If you want to change actions for single packages, right-click on a package in the package window and choose an action. Once you have marked all patches and packages as desired, proceed with
![]() | Disabling deltarpms |
|---|---|
Since rebuilding rpm packages from deltarpms is a memory and CPU
time consuming task, certain setups or hardware configuration might
require to disable the usage of deltarpms for performance sake. To
disable the use of deltarpms edit the file
| |
Another alternative for updating software is the ZENworks updater applet for KDE and GNOME. The ZENworks updater helps monitor new patches. It also provides a quick update function. For more information, refer to Section 9.2, “Managing Packages with the ZEN Tools”.
YaST also offers the possibility to set up an automatic update. Select +. Configure a or a update. Some patches, such as kernel updates, require user interaction, which would cause the automatic update procedure to stop. Check for the update procedure to proceed automatically. In this case, run a manual from time to install patches that require interaction.
When is checked, the patches are
downloaded at the specified time but not installed. They must be installed
manually. The patches are downloaded to the rug cache directory,
/var/cache/zmd/web, by default. Use the command
rug get-prefs cache-directory to get the current rug
cache directory. For more information about rug, see Section 9.1, “Update from the Command Line with rug”.
![]() | |
On IBM System z systems, the Patch CD update option is not available. | |
The module from the section installs patches from CD, not from an FTP server. The advantage lies in a much faster update with CD. After the patch CD is inserted, all patches on the CD are displayed in the dialog. Select the desired packages for installation from the list of patches. The module issues an error message if no patch CD is present. Insert the patch CD then restart the module.
Update the version of SUSE Linux Enterprise installed on your system with +. During operation, you can only update application software, not the base system. To update the base system, boot the computer from an installation medium, such as CD. When selecting the installation mode in YaST, select .
The procedure for updating the system is similar to a new installation. Initially, YaST examines the system, determines a suitable update strategy, and presents the results in a suggestion dialog. Click or the individual items to change any details.
Set the update method for your system. Two options are available.
To update the entire system to the latest versions of software, select one of the predefined selections. These selections ensure that packages that did not exist previously are also installed.
This option merely updates packages that already exist on the system. No new features are installed.
Additionally, you can use to remove packages that do not exist in the new version. By default, this option is preselected to prevent outdated packages from unnecessarily occupying hard disk space.
Click to start the package manager and select or deselect individual packages for update. Any package conflicts should be resolved with the consistency check. The use of the package manager is covered in detail in Section 8.3.1, “Installing and Removing Software”.
During the update, the configuration files of some packages may be replaced by those of the new version. Because you may have modified some of the files in your current system, the package manager normally makes backup copies of the replaced files. With this dialog, determine the scope of these backups.
![]() | Scope of the Backup |
|---|---|
This backup does not include the software. It only contains configuration files. | |
Primary and other languages currently installed on the system are listed here. Change them by clicking in the displayed configuration or with +. Optionally, adapt the keyboard layout and time zone to the region where the primary language is spoken. Find more about language selection in Section 8.5.15, “Language Selection”.
The system update is a very complex procedure. For each program package, YaST must first check which version is installed on the computer then determine what needs to be done to replace the old version with the new version correctly. YaST also tries to adopt any personal settings of the installed packages.
In most cases, YaST replaces old versions with new ones without problems. A backup of the existing system should be performed prior to updating to ensure that existing configurations are not lost during the update. Conflicts can then be resolved manually after the update has finished.
This YaST module allows you to install packages into a directory specified by you. Select where to place the root directory, how to name directories, and the type of system and software to install. After entering this module, YaST determines the system settings and lists the default directory, installation instructions, and software to install. Edit these settings by clicking . All changes must be confirmed by clicking . After changes have been made, click until informed that the installation is complete. Click to exit the dialog.
If you encounter any problems using the SUSE Linux Enterprise installation media, you can check the CDs or DVDs with +. Media problems are more likely to occur with media you burn yourself. To check that a SUSE Linux Enterprise CD or DVD is error-free, insert the medium into the drive and run this module. Click for YaST to check the MD5 checksum of the medium. This may take several minutes. If any errors are detected, you should not use this medium for installation.
New hardware must first be installed or connected as directed by the vendor. Turn on external devices and start the appropriate YaST module. Most devices are automatically detected by YaST and the technical data is displayed. If the automatic detection fails, YaST offers a list of devices (model, vendor, etc.) from which to select the suitable device. Consult the documentation enclosed with your hardware for more information.
![]() | Model Designations |
|---|---|
If your model is not included in the device list, try a model with a similar designation. However, in some cases the model must match exactly, because similar designations do not always indicate compatibility. | |
Configure an infrared device with +. Click to begin configuration. You can configure and here.
Configure graphics cards and monitors with +. It uses the the SaX2 interface, described in Section 8.14, “SaX2”.
Configure a printer with +. If a printer is properly connected to the system, it should be detected automatically. Find detailed instructions for configuring printers with YaST in Section 23.4, “Setting Up a Printer”.
Normally, the hard disk controller of your system is configured during the installation. If you add controllers, integrate these into the system with +. You can also modify the existing configuration, but this is generally not necessary.
The dialog presents a list of detected hard disk controllers and enables assignment of the suitable kernel module with specific parameters. Use to check if the current settings work before they are saved permanently in the system.
![]() | Configuration of the Hard Disk Controller |
|---|---|
It is advised to test the settings before making them permanent in the system. Incorrect settings can prevent the system from booting. | |
Display detected hardware and technical data using +. Click any node of the tree for more information about a device. This module is especially useful, for example, when submitting a support request for which you need information about your hardware.
Save the hardware information displayed to a file by clicking . Select the desired directory and filename then click to create the file.
Activate and deactivate the DMA mode for your IDE hard disks and your IDE CD and DVD drives in the installed system with +. This module does not have any effect on SCSI devices. DMA modes can substantially increase the performance and data transfer speed in your system.
During installation, the current SUSE Linux Enterprise kernel automatically activates DMA for hard disks but not for CD drives, because default DMA activation for all drives often causes problems with CD drives. Use the DMA module to activate DMA for your drives. If the drive supports the DMA mode without any problems, the data transfer rate of your drive can be increased by activating DMA.
![]() | |
DMA (direct memory access) means that your data can be transferred directly to the RAM, bypassing the processor control. | |
To add a DASD to the installed system, there are two possibilities:
To add a DASD to an installed system, use the YaST DASD module (+). In the first screen, select the disks to make available to your Linux installation and click . Select then leave the dialog with .
Issue the following command:
dasd_configure 0.0.0150 1 0
Replace 0.0.0150 with the actual channel
number to which the
DASD is attached. The last zero of the command line should be
1 if the DASD should be accessed in DIAG mode.
![]() | |
In either case, you must run the commands mkinitrd zipl to make the changes persistent. | |
To add further FCP-attached SCSI devices to the installed system, use
the YaST ZFCP module (+). Select
to add an additional device. Select the
(adapter) from the list and specify
both and .
Finalize the setup by selecting and
. Verify that the device has been added by
checking the output of
cat /proc/scsi/scsi.
![]() | |
To make the changes persistent through a reboot, run the following commands: mkinitrd zipl | |
Configure a joystick connected to the sound card with +. Select your joystick type in the list provided. If your joystick is not listed, select . After selecting your joystick, make sure that it is connected then click to test the functionality. Click and YaST installs the required files. After the window appears, test the joystick by moving it in all directions and pressing all buttons. Each movement should be displayed in the window. If you are satisfied with the settings, click to return to the module and to complete configuration.
If you have a USB device, this configuration is not necessary. Plug in the joystick and start using it.
To configure the keyboard for the console, run YaST in text mode then use +. After clicking the module, the current layout is displayed. To choose another keyboard layout, select the desired layout from the list provided. Test the layout in by pressing keys on the keyboard.
Fine-tune the settings by clicking . Adjust the key repeat rate and delay and configure the start-up state by choosing the desired settings in . For , enter a space-separated list of devices to which to apply the Scroll Lock, Num Lock, and Caps Lock settings. Click to complete the fine-tuning. Finally, after all selections have been made, click for your changes to take effect.
To set up the keyboard for the graphical environment, run the graphical YaST then select . Find information about the graphical configuration in Section 8.14.3, “Keyboard Properties”.
When configuring the mouse for the graphical environment, click to access the SaX2 mouse configuration. Refer to Section 8.14.2, “Mouse Properties” for details.
To configure your mouse for the text environment, use YaST in text mode. After entering text mode and selecting +, use the keyboard arrow keys to choose your mouse from the provided list. Then click to save the settings and exit the module.
Most sound cards are detected automatically and configured with reasonable values during initial installation. To install a card added later or modify settings, use +. It is also possible to switch the sequence of the cards.
If YaST cannot detect your sound card automatically, proceed as follows:
Click to open a dialog in which to select a
sound card vendor and model. Refer to your sound card documentation for
the information required. Find a reference list of sound cards supported
by ALSA with their corresponding sound modules in
/usr/share/doc/packages/alsa/cards.txt and at http://www.alsa-project.org/alsa-doc/. After making your
selection, click .
In , choose the configuration level in the first setup screen:
You are not required to go through any of the further configuration steps and no sound test is performed. The sound card is configured automatically.
Adjust the output volume and play a test sound.
Customize all settings manually.
In this dialog, there is also a shortcut to the joystick configuration. Click and select the joystick type in the following dialog to configure a joystick. Click to continue.
In , test your sound configuration and make adjustments to the volume. You should start at about ten percent to avoid damage to your hearing or the speakers. A test sound should be audible when you click . If you cannot hear anything, increase the volume. Press + to complete the sound configuration.
To change the configuration of a sound card, go to the dialog, select a displayed , and click . Use to remove a sound card completely.
Click to customize one of the following options manually:
Use this dialog for setting the volume.
For playback of MIDI files, check this option.
Click to adjust the sequence of your sound cards. The sound device with index 0 is the default device used by the system and the applications.
The volume and configuration of all sound cards installed are saved when
you click in the YaST sound module. The mixer
settings are saved to the file /etc/asound.conf and the
ALSA configuration data is appended to the end
of the files /etc/modprobe.d/sound and
/etc/sysconfig/hardware.
This group of modules is designed to help you manage your system. All modules in this group are system-related and serve as valuable tools for ensuring that your system runs properly and your data is managed efficiently.
![]() | IBM System z: Continuing |
|---|---|
For IBM System z, continue with Section 8.5.3, “Boot Loader Configuration”. | |
Create a backup of both your
system and data using +. However, the backup
created by the module does not
include the entire system. The system is backed up by saving important
storage areas on your hard disk that may be crucial when trying to
restore a system, such as the partition table or master boot
record (MBR). It can also include the XML configuration acquired
from the installation of the system, which is used for AutoYaST. Data is
backed
up by saving changed files of packages accessible on installation
media, entire packages that are unaccessible (such as online updates),
and files not belonging to packages, such as many of the
configuration files in /etc or the directories
under /home.
With +, restore your system from a backup archive created with . First, specify where the archives are located (removable media, local hard disks, or network file systems). Click to view the description and contents of the individual archives and select what to restore from the archives.
You can also uninstall packages that were added since the last backup and reinstall packages that were deleted since the last backup. These two steps enable you to restore the exact system state at the time of the last backup.
![]() | System Restoration |
|---|---|
Because this module normally installs, replaces, or uninstalls many packages and files, use it only if you have experience with backups. Otherwise you may lose data. | |
To configure booting for systems installed on your computer, use the + module. A detailed description of how to configure the boot loader with YaST is available in Section 21.3, “Configuring the Boot Loader with YaST”.
Find information about Heartbeat and high availability configuration with YaST in Heartbeat Guide.
The logical volume manager (LVM) is a tool for custom partitioning of hard disks with logical drives. Find information about LVM in Section 7.1, “LVM Configuration”.
The enterprise volume management system (EVMS) is, like LVM, a tool for custom partitioning and grouping of hard disks into virtual volumes. It is flexible, extensible, and can be tailored using a plug-in model to individual needs of various volume management systems.
EVMS is compatible with existing memory and volume management systems, like DOS, Linux LVM, GPT (GUID partition table), IBM System z, Macintosh, and BSD partitions. More information is provided at http://evms.sourceforge.net/.
With the expert partitioner, shown in Figure 8.6, “The YaST Partitioner”, manually modify the partitioning of one or several hard disks. Partitions can be added, deleted, resized, and edited. Also access the soft RAID, EVMS, and LVM configuration from this YaST module.
![]() | Repartitioning the Running System |
|---|---|
Although it is possible to repartition your system while it is running, the risk of making a mistake that causes data loss is very high. Try to avoid repartitioning your installed system and always do a complete backup of your data before attempting to do so. | |
![]() | IBM System z: Device Names |
|---|---|
IBM System z recognize only DASD and SCSI hard disks. IDE hard disks
are not supported. This is why these devices appear in the partition table
as | |
All existing or suggested partitions on all connected hard disks are
displayed in the list of the YaST
dialog. Entire hard disks are listed as
devices without numbers, such as /dev/hda or
/dev/sda (or
/dev/dasda). Partitions are
listed as parts of these devices, such as /dev/hda1 or
/dev/sda1 (or
/dev/dasda1, respectively). The size, type,
file system, and mount point of the hard disks and their partitions are also
displayed. The mount point describes where the partition appears in the
Linux file system tree.
If you run the expert dialog during installation, any free hard disk space is also listed and automatically selected. To provide more disk space to SUSE Linux Enterprise®, free the needed space starting from the bottom toward the top of the list (starting from the last partition of a hard disk toward the first). For example, if you have three partitions, you cannot use the second exclusively for SUSE Linux Enterprise and retain the third and first for other operating systems.
![]() | IBM System z: Hard Disks |
|---|---|
On the IBM System z platforms, SUSE Linux Enterprise Server supports SCSI hard disks as well as DASDs (direct access storage devices). While SCSI disks can be partitioned as described below, DASDs can have no more than three partition entries in their partition tables. | |
Every hard disk has a partition table with space for four entries. An entry in the partition table can correspond to a primary partition or an extended partition. Only one extended partition entry is allowed, however.
A primary partition simply consists of a continuous range of cylinders (physical disk areas) assigned to a particular operating system. With primary partitions only, you are limited to four partitions per hard disk, because more do not fit in the partition table. This is why extended partitions are used. Extended partitions are also continuous ranges of disk cylinders, but an extended partition may itself be subdivided into logical partitions. Logical partitions do not require entries in the partition table. In other words, an extended partition is a container for logical partitions.
If you need more than four partitions, create an extended partition as the fourth partition or earlier. This extended partition should span the entire remaining free cylinder range. Then create multiple logical partitions within the extended partition. The maximum number of logical partitions is 15 on SCSI, SATA, and Firewire disks and 63 on (E)IDE disks. It does not matter which types of partitions are used for Linux. Primary and logical partitions both work fine.
![]() | Hard Disks with a GPT Disk Label |
|---|---|
For architectures using the GPT disk label, the number of primary partitions is not restricted. Consequently, there are no logical partitions. | |
To create a partition from scratch, proceed as follows:
Select . If several hard disks are connected, a selection dialog appears in which to select a hard disk for the new partition.
Specify the partition type (primary or extended). Create up to four primary partitions or up to three primary partitions and one extended partition. Within the extended partition, create several logical partitions (see Section 8.5.7.1, “Partition Types”).
Select the file system to use and a mount point. YaST suggests a mount point for each partition created. Refer to Chapter 25, File Systems in Linux for details on the various file systems.
Specify additional file system options if your setup requires them. This is necessary, for example, if you need persistent device names. For details on the available options, refer to Section 8.5.7.3, “Editing a Partition”.
Click + to apply your partitioning setup and leave the partitioning module.
If you created the partition during installation, you are returned to the installation overview screen.
When you create a new partition or modify an existing partition, set various parameters. For new partitions, suitable parameters are set by YaST and usually do not require any modification. To edit your partition setup manually, proceed as follows:
Select the partition.
Click to edit the partition and set the parameters:
Even if you do not want to format the partition at this stage, assign it a file system ID to ensure that the partition is registered correctly. Possible values include , , , , and . For LVM and RAID details, refer to Section 7.1, “LVM Configuration” and Section 7.2, “Soft RAID Configuration”.
Change the file system or format the partition here. Changing the file system or reformatting partitions irreversibly deletes all data from the partition . For details on the various file systems, refer to Chapter 25, File Systems in Linux.
Set various parameters for the selected file system here. The defaults are acceptable for most situations.
If you activate the encryption, all data is written to the hard disk in encrypted form. This increases the security of sensitive data, but slightly reduces the system speed, because the encryption takes some time. More information about the encryption of file systems is provided in Chapter 47, Encrypting Partitions and Files.
Specify various parameters contained in the global file system
administration file (/etc/fstab). The default
settings should suffice for most setups. You can, for example, change
the file system identification from the device name to a volume label.
In the volume label, use all characters except /
and space.
Specify the directory at which the partition should be mounted in the file system tree. Select from various YaST proposals or enter any other name.
Select + to activate the partition.
opens a menu containing the following commands:
Rereads the partitioning from disk. For example, you need this after manual partitioning in the text console.
This completely overwrites the old partition table. For example, this can be helpful if you have problems with unconventional disk labels. Using this method, all data on the hard disk is lost.
The following section comprises a few hints and tips on partitioning that should help you in taking the right decisions while setting up your system.
![]() | Cylinder Numbers |
|---|---|
Note, that different partitioning tools may start counting the
cylinders of a partition with | |
If the partitioning is performed by YaST and other partitions are detected
in the system, these partitions are also added to the
/etc/fstab file
to enable easy access to this data. This file contains all
partitions in the system with their properties, such as the file system,
mount point, and user permissions.
Example 8.1. /etc/fstab: Partition Data¶
/dev/sda1 /data1 auto noauto,user 0 0 /dev/sda5 /data2 auto noauto,user 0 0 /dev/sda6 /data3 auto noauto,user 0 0
The partitions, regardless of whether they are Linux or FAT partitions, are
specified with the options noauto and
user. This allows any user to mount or unmount these
partitions as needed. For security reasons, YaST does not automatically
enter the exec option here, which is needed for executing
programs from the location. However, to run programs from there, you can
enter this option manually.
This measure is necessary if you encounter system messages
such as “bad interpreter” or “Permission denied”.
From the expert partitioner, access the LVM configuration with (see Section 7.1, “LVM Configuration”). However, if a working LVM configuration already exists on your system, it is automatically activated as soon as you enter the LVM configuration for the first time in a session. In this case, any disks containing a partition belonging to an activated volume group cannot be repartitioned because the Linux kernel cannot reread the modified partition table of a hard disk when any partition on this disk is in use. However, if you already have a functioning LVM configuration on your system, physical repartitioning should not be necessary. Instead, change the configuration of the logical volumes.
At the beginning of the physical volumes (PVs), information about the volume
is written to the partition. To reuse such a partition for other non-LVM
purposes, it is advisable to delete the beginning of this volume. For
example, in the VG system and PV
/dev/sda2, do this with the command
dd if=/dev/zero of=/dev/sda2 bs=512
count=1.
![]() | File System for Booting |
|---|---|
The file system used for booting (the root file system or
| |
![]() | IBM System z: Continuing |
|---|---|
For IBM System z, continue with Section 8.5.12, “System Services (Runlevel)”. | |
Each kernel driver contains a list of device IDs of all devices it supports. If a new device is not in any driver's database, the device is treated as unsupported, even if it can be used with an existing driver. With this YaST module from section, you can add PCI IDs. Only advanced users should attempt to use this YaST module.
To add an ID, click and select how to assign it: by selecting a PCI device from a list or by manually entering PCI values. In the first option, select the PCI device from the provided list then enter the driver or directory name. If the directory is left empty, the driver name is used as the directory name. When assigning PCI ID values manually, enter the appropriate data to set up a PCI ID. Click to save your changes.
To edit a PCI ID, select the device driver from the list and click . Edit the information and click to save your changes. To delete an ID, select the driver and click . The ID immediately disappears from the list. When finished, click .
The + module helps you work with saving energy technologies. It is especially important on laptops to extend their operational time. Find detailed information about using this module in Section 28.6, “The YaST Power Management Module”.
Powertweak is a SUSE Linux utility for tweaking your system to peak performance by tuning some kernel and hardware configurations. It should be used only by advanced users. After starting it with +, it detects your system settings and lists them in tree form in the left frame of the module. You can also use to find a configuration variable. Select the option to tweak to display it on the screen along with its directory and settings. To save the settings, click then confirm it by clicking .
Create, manage, and switch among system configurations with +, the YaST system configuration profile management (SCPM) module. This is especially useful for mobile computers that are used in different locations (in different networks) and by different users. Nevertheless, this feature is useful even for stationary machines, because it enables the use of various hardware components or test configurations.
Configure runlevels and the services that start in them with +. For more information about the runlevels in SUSE Linux Enterprise and a description of the YaST runlevel editor, refer to Section 20.2.3, “Configuring System Services (Runlevel) with YaST”.
The directory /etc/sysconfig contains the files
with the most important settings for SUSE Linux Enterprise. Use
+
to modify the values and save them
to the individual configuration files. Generally,
manual editing is not necessary, because the files are automatically
adapted when a package is installed or a service is configured. More
information about /etc/sysconfig
and the YaST sysconfig editor is available in
Section 20.3.1, “Changing the System Configuration Using the YaST sysconfig Editor”.
The time zone is initially set during installation, but you can change it with +. Also use this to change the current system date and time.
To change the time zone, select the region in the left column and the location or time zone in the right column. With , set whether the system clock should use or (Coordinated Universal Time). is often used in Linux systems. Machines with additional operating systems, such as Microsoft Windows, mostly use local time.
Set the current system time and date with . In the dialog that opens, modify the time and date by entering new values or adjusting them with the arrow buttons. Press to save the changes.
The primary and secondary languages for your system are set during installation. However, they can be changed at any time using +. The primary language set in YaST applies to the entire system, including YaST and the desktop environment. This is the language you expect to use most of the time. Secondary languages are languages that are sometimes needed by users for a variety of purposes, such as desktop language or word processing.
Select the main language to use for your system in . To adjust the keyboard or time zone to this setting, enable or .
Set how locale variables are set for the root user with
. Also use to set the
primary language to a
dialect not available in the main list.
These settings are written into the file
/etc/sysconfig/language.
All network devices connected to the system must be initialized before they can be used by a service. The detection and configuration of these devices is done in the module group .
To configure a DSL, ISDN, or network interface or a modem, select the appropriate module from the section. For a device that is detected automatically, select it from the list then click . If your device has not been detected, click and select it manually. To edit an existing device, select it then click . For more detailed information, see Section 30.4, “Configuring a Network Connection with YaST”. For wireless network interfaces, see Chapter 29, Wireless Communication.
![]() | CDMA and GPRS Modems |
|---|---|
You can configure supported CDMA and GPRS modems as regular modems in the YaST modem module. | |
This group contains tools to configure all kinds of services in the network. These include name resolution, user authentication, and file services.
You can configure your mail settings in + if you send your e-mail with sendmail, postfix, or the SMTP server of your provider. You can fetch mail via the fetchmail program, for which you can also enter the details of the POP3 or IMAP server of your provider. Alternatively, use a mail program of your choice, such as KMail or Evolution, to set your access data. In this case, you do not need this module.
To configure your mail with YaST, specify the type of your connection to the Internet in the first dialog. Choose one of the following options:
Select this option if you have a dedicated line to the Internet. Your machine is online permanently, so no dial-up is required. If your system is part of a local network with a central e-mail server, select this option to ensure permanent access to your e-mail messages.
This item is relevant for users who have a computer at home, are not located in a network, and occasionally connect to the Internet.
If you do not have access to the Internet and are not located in a network, you cannot send or receive e-mail.
Activate virus scanning for your incoming and outgoing e-mail with AMaViS by selecting that option. The package is installed automatically as soon as you activate the mail filtering feature. In the following dialogs, specify the outgoing mail server (usually the SMTP server of your provider) and the parameters for incoming mail. Set the diverse POP or IMAP servers for mail reception by various users. Using this dialog, you can also assign aliases, use masquerading, or set up virtual domains. Click to exit the mail configuration.
![]() | LDAP-Based Mail Server Configuration |
|---|---|
The mail server module of SUSE Linux Enterprise only works if the users, groups, and the DNS and DHCP services are managed with LDAP. | |
The mail server module allows configuration of SUSE Linux Enterprise as a mail server. YaST assists with the following steps of the configuration process:
Configures the identification of the local mail server and the maximum size of incoming or outgoing messages and the type of mail transport.
Configures the type of local mail delivery.
Configures special transport routes for mail depending on its target address.
Configures the SPAM protection settings of the mail server. This activates the tool AMaViS. Set up the type and strictness of the SPAM check.
Determines from which networks the mail server cannot be used for sending nonlocal mail.
Configures mail pick-up from external mail accounts over various protocols.
This determines for which domains the mail server should be responsible. At least one master domain must be configured if the server should not run as a null client used exclusively for sending mail without receiving any.
Distinguish among three domain types:
Main or master domain of the local mail server
All users who can receive mail in a master domain can also receive
mail in a local domain. In the case of a message within the local
domain, only the portion before the @ is
evaluated.
Only users with an explicit address within a virtual domain receive mail. Virtual mail addresses are set up in the user management module of YaST.
Many other network modules are available in YaST .
Use this to set up a custom DHCP server in only a few steps. Chapter 34, DHCP provides basic knowledge about the subject and a step-by-step description of the configuration process.
Configuring a DNS server that is responsible for name resolution is recommended for larger networks. You can use for this as described in Section 33.2, “Configuration with YaST”. Chapter 33, The Domain Name System provides background information about DNS.
Use this module to configure the hostname and DNS if these settings were not already made while configuring the network devices. Also use it to change the hostname and domain name. If the provider has been configured correctly for DSL, modem, or ISDN access, the list of name servers contains the entries that were extracted automatically from the provider data. If you are located in a local network, you might receive your hostname via DHCP, in which case you should not modify the name.
To run your own Web server, configure Apache in . Find more information in Chapter 40, The Apache HTTP Server.
When booting and in small networks, you can use
for hostname resolution instead of DNS. The
entries in this module reflect
the data of the file /etc/hosts. For more
information, read
Section 30.7.1.6, “
/etc/hosts
”.
If you have a Kerberos server in your network for network authentication, use . A detailed description of the client configuration with YaST is available in Section 46.6, “Configuring a Kerberos Client with YaST”.
If using LDAP for user authentication in the network, configure the client in . Information about LDAP and a detailed description of the client configuration with YaST are available in Section 36.6, “Configuring an LDAP Client with YaST”.
The LDAP server can keep various data in a central directory and distribute it to all clients in your network. Mostly it is used to store shared contact information but its function is not limited to that. An LDAP server can be used also for authentication. Information about LDAP and a detailed description of the server configuration with YaST are available in Chapter 36, LDAP—A Directory Service.
With NFS client, mount directories provided by NFS server in your own file trees. Use to configure your system to access an NFS server in the network.
With NFS, run a file server that all members of your network can access. This file server can be used to make certain applications, files, and storage space available to users. In , you can configure your host as an NFS server and determine the directories to export for general use by the network users. All users with the appropriate permissions can mount these directories in their own file trees. A description of the YaST module and background information about NFS are provided in Chapter 38, Sharing File Systems with NFS.
If you run NIS server to administer user data on a central place and distribute it to the clients, configure the client here. Detailed information about NIS client and configuration with YaST is available in Section 35.2, “Configuring NIS Clients”.
If you run more than one system, local user administration (using the
files /etc/passwd and
/etc/shadow) is impractical and requires a lot of
maintenance. In this case, administer user data on a
central server and distribute it to the clients from there. NIS
is one option for this. Detailed information
about NIS and its configuration with YaST is available in
Section 35.1.1, “Configuring a NIS Master Server”.
NTP (network time protocol) is a protocol for synchronizing hardware clocks over a network. Information about NTP and instructions for configuring it with YaST are available in Chapter 32, Time Synchronization with NTP.
Configure the network services (such as finger, talk, and ftp) to start when SUSE Linux Enterprise boots using . These services enable external hosts to connect to your computer. Various parameters can be configured for every service. By default, the master service that manages the individual services (inetd or xinetd) is not started.
When this module starts, choose whether to start inetd or xinetd. The selected daemon can be started with a standard selection of services. Alternatively, compose your own selection of services with , , and .
![]() | Configuring Network Services (xinetd) |
|---|---|
The composition and adjustment of network services on a system is a complex procedure that requires a comprehensive understanding of the concept of Linux services. The default settings are usually sufficient. | |
Configure Internet proxy client settings in . Click then enter the desired proxy settings. You can test these settings by clicking . A small window informs you whether your proxy settings work correctly. After your settings have been entered and tested, save them by clicking .
To administer your machine remotely from another machine, use . To maintain your system remotely, use a VNC client, such as krdc, or a Java-enabled browser. Although remote administration using VNC is simple and fast, it is less secure than using SSH, so you should always keep this in mind when using a VNC server. Find detailed information about installing with a VNC client in Section 4.1.1, “Simple Remote Installation via VNC—Static Network Configuration”.
Allow remote administration by selecting in . Selecting disables this function. Click to allow access to your computer. Clicking displays network interfaces with open ports in the firewall. Select the desired interface and click to return to the main dialog. Click to complete the configuration.
The YaST module is highly recommended for configuring VNC on your machine. Although the SaX2 interface also allows you to set remote access properties, it is not a substitute for YaST. It only enables you to configure your X server as a host for VNC sessions.
Use to configure the paths data takes over the network. In most cases, only enter the IP address of the system through which to send all data in . To create more complicated configurations, use .
In a heterogeneous network consisting of Linux and Windows hosts, Samba controls the communication between the two worlds. Information about Samba and the configuration of servers is provided in Chapter 37, Samba.
With service location protocol (SLP), you can configure clients in your network without knowledge of server names and services that these servers provide. Detailed information about SLP servers and configuration with YaST are described in Chapter 31, SLP Services in the Network.
A TFTP server in not an FTP server. While an FTP server uses the File Transfer Protocol (FTP), a TFTP server uses the much simpler Trivial File Transfer Protocol (TFTP) without security features. TFTP servers are usually used to boot diskless workstations, X terminals, and routers. Detailed information about TFTP servers and configuration with YaST are described in Section 4.3.2, “Setting Up a TFTP Server”.
WOL (wake on LAN) refers to the possibility of waking up a computer from standby mode over the network using special packages. It only works with motherboards that support this functionality in their BIOS. WOL configuration with YaST is described in Section 4.3.7, “Wake on LAN”.
In a heterogeneous network consisting of Linux and Windows hosts, Samba controls the communication between the two worlds. With the module, you can configure your computer as member of a Windows domain. Find information about Samba and the configuration of clients in Chapter 37, Samba.
iSCSI technology provides an easy and reasonably inexpensive solution for connecting Linux computers to central storage systems. To configure the server side, use +. Find more information about configuration of iSCSI with YaST in Chapter 12, Mass Storage over IP Networks—iSCSI .
To configure a connection to central storage, use +. Find more information about configuration of iSCSI with YaST in Chapter 12, Mass Storage over IP Networks—iSCSI .
Novell AppArmor is designed to provide easy-to-use application security for both servers and workstations. Novell AppArmor is an access control system that lets you specify which files each program may read, write, and execute. To enable or disable Novell AppArmor on your system, use . Information about Novell AppArmor and a detailed description of the configuration with YaST are available in Novell AppArmor Administration Guide (↑Novell AppArmor Administration Guide).
A basic aspect of Linux is its multiuser capability. Consequently, several users can work independently on the same Linux system. Each user has a user account identified by a login name and a personal password for logging in to the system. All users have their own home directories where personal files and configurations are stored.
Create and edit users with +. It provides an overview of users in the system, including NIS, LDAP, Samba, and Kerberos users if requested. If you are part of an extensive network, click to list all users categorically. You can also customize the filter settings by clicking .
![]() | Applying Configuration Changes without Closing the Module |
|---|---|
Whenever you need to make multiple configuration changes and want to avoid restarting the user and group configuration module for every single one of these changes, use to save your changes without exiting the configuration module. | |
To add a new user, proceed as follows:
Click .
Enter the necessary data for . If you do not need to adjust any more detailed settings for this new user, proceed to Step 5.
To change a user's ID, home directory name, default home, group, group memberships, directory permissions, or login shell, open the tab and change the default values.
To adjust user's password expiration, length, and expiration warnings, use the tab.
Write the user account configuration by clicking .
The new user can immediately log in with the created login name and password.
To delete a user, proceed as follows:
Select the user from the list.
Click .
Determine whether to delete or keep the home directory of the user to delete.
Click to apply your settings.
To change the login configuration, proceed as follows:
Select the user from the list.
Click .
Adjust the settings under , , and .
Save the user account configuration by clicking .
You can create an encrypted home directory as part of the user account creation. To create an encrypted home directory for a user, proceed as follows:
Click .
Enter the required data for .
In the tab, activate .
Apply your settings with .
To create an encrypted home for an existing user, proceed as follows:
Select a user from the list and click .
In the tab, enable .
Enter the password of the selected user.
Apply your settings with .
To disable the encryption of home directories, proceed as follows:
Select a user from the list and click .
In the tab, disable .
Enter the password of the selected user.
Apply your settings with .
For more information about encrypted homes, see Section 47.2, “Using Encrypted Home Directories”.
![]() | Using Auto Login |
|---|---|
Using the auto login feature on any system that can be physically accessed by more than one person is a potential security risk. Any user accessing this system can manipulate the data on it. If your system contains confidential data, do not use the auto login functionality. | |
If you are the only user of your system, you can configure auto login. It automatically logs a user into the system after start. Only one selected user can use the auto login function. Auto login works only with KDM or GDM.
To activate auto login, select the user from the list of users and click +. Then choose and click .
To deactivate this functionality, select the user and click +. Then uncheck and click .
![]() | Allowing Login without a Password |
|---|---|
Using the passwordless login feature on any system that can be physically accessed by more than one person is a potential security risk. Any user accessing this system can manipulate the data on it. If your system contains confidential data, do not use this functionality. | |
Login without a password automatically logs a user into the system after the user enters the username in the login manager. It is available to multiple users on a system and works only with KDM or GDM.
To activate the function, select the user from the list of users and click +. Then choose and click .
To deactivate this function, select the user for whom to disable this functionality from the list of users and click +. Then uncheck and click .
To create a system user that should not be able to log in to the system but under whose identity several system-related tasks should be managed, disable the user login when creating the user account. Proceed as follows:
Click .
Enter the required data for .
Check .
Apply your settings with .
To disable login for an existing user, proceed as follows:
Select the user from the list and click .
Check in .
Apply your settings with .
On any system with multiple users, it is a good idea to enforce at least basic password security policies. Users should change their passwords regularly and use strong passwords that cannot easily be exploited. For information about how to enforce stricter password rules, refer to Section 8.9.3, “Local Security”. To enforce password rotation, create a password expiration policy.
To configure the password expiration policy for a new user, proceed as follows:
Click .
Enter the required data in .
Adjust the values in .
Apply your settings with .
To change the password expiration policy for an existing user, proceed as follows:
Select the user from the list and click .
Adjust the values in .
Apply your settings with .
You can limit the lifetime of any user account by specifying a date
of expiration for this particular account. Specify the in the YYYY-MM-DD format and
leave the user configuration. If no is
given, the user account never expires.
When creating new local users, several defaults settings are used by YaST. You can change these default settings to meet your requirements:
Select +.
Apply your changes to any or all of the following items:
Apply your changes with .
Several other security-related default settings can be changed using the module. Refer to Section 8.9.3, “Local Security” for information.
![]() | |
Changes in password encryption apply only to local users. | |
SUSE Linux Enterprise can use DES, MD5, or Blowfish for password encryption. The default password encryption method is Blowfish. The encryption method is set during installation of the system, as described in Section 3.14.1, “Password for the System Administrator “root””. To change the password encryption method in the installed system, select +.
The user administration method (such as NIS, LDAP, Kerberos, or Samba) is set during installation, as described in Section 3.14.7, “Users”. To change the user authentication method in the installed system, select +. The module provides a configuration overview and the option to configure the client. Advanced client configuration is also possible using this module.
To create and edit groups, select + or click in the user administration module. Both dialogs have the same functionality, allowing you to create, edit, or delete groups.
The module gives an overview of all groups. As in the user management dialog, change filter settings by clicking .
To add a group, click and enter the appropriate data. Select group members from the list by checking the corresponding box. Click to create the group. To edit a group, select the group to edit from the list and click . Make all necessary changes then save them with . To delete a group, simply select it from the list and click .
Click for advanced group management. Find more about these options in Section 8.9.1, “User Management”.
To apply a set of security settings to your entire system, use +. These settings include security for booting, login, passwords, user creation, and file permissions. SUSE Linux Enterprise offers three preconfigured security sets: , , and . Modify the defaults with . To create your own scheme, use .
The detailed or custom settings include:
To have new passwords checked by the system for security before they are accepted, click and . Set the minimum password length for newly created users. Define the period for which the password should be valid and how many days in advance an expiration alert should be issued when the user logs in to the text console.
Set how the key combination Ctrl+Alt+Del should be interpreted by selecting the desired action. Normally, this combination, when entered in the text console, causes the system to reboot. Do not modify this setting unless your machine or server is publicly accessible and you are afraid someone could carry out this action without authorization. If you select , this key combination causes the system to shut down. With , this key combination is ignored.
If you use the KDE login manager (KDM), set permissions for shutting down the system in . Give permission to (the system administrator), , , or . If is selected, the system can only be shut down from the text console.
Typically, following a failed login attempt, there is a waiting
period lasting a few seconds before another login is possible. This
makes it more difficult for password sniffers to log in. Optionally
activate . If you
suspect someone is trying to discover your password, check the entries
in the
system log files in /var/log. To grant other users
access to your graphical login screen over the network, enable
.
Because this access possibility represents a potential security risk,
it is inactive by default.
Every user has a numerical and an alphabetical user ID. The
correlation between these is established using the file
/etc/passwd and should be as unique as possible.
Using the data in this screen, define the range of numbers assigned
to the numerical part of the user ID when a new user is added. A
minimum of 500 is suitable for users. Automatically generated
system users start with 1000. Proceed in the same way with the
group ID settings.
To use predefined file permission settings, select , , or . should be sufficient for most users. The setting is extremely restrictive and can serve as the basic level of operation for custom settings. If you select , remember that some programs might not work correctly or even at all, because users no longer have permission to access certain files.
Also set which user should launch the
updatedb program, if installed.
This program, which automatically runs on a daily basis or after
booting, generates a database (locatedb) in which the location of
each file on your computer is stored. If you select
, any user can find only the paths in the
database that can be seen by any other (unprivileged) user. If
root is selected, all local
files are indexed, because the user
root, as superuser, may
access all directories. Make sure that the options
and
are
deactivated. Only advanced users should consider using these options
because
these settings may pose a significant security risk if used incorrectly.
To have some control over the system even if it crashes, click
.
Click to complete your security configuration.
Certificates are used for communication and can also be found, for example, on company ID cards. To manage them or import a common server certificate, use +. Detailed information about certificates, their technologies, and management with YaST are provided in Chapter 42, Managing X.509 Certification.
SuSEfirewall2 can protect your machine against attacks from the Internet. Configure it with +. Find detailed information about SuSEfirewall2 in Chapter 43, Masquerading and Firewalls.
![]() | Automatic Activation of the Firewall |
|---|---|
YaST automatically starts a firewall with suitable settings on every configured network interface. Start this module only if you want to reconfigure the firewall with custom settings or deactivate it. | |
Virtualization makes it possible to run several operating systems on one physical machine. The hardware for the different systems is provided virtually. Virtualization YaST modules provide configuration for the Xen virtualization system. For more information about this technology, see the virtualization manual on http://www.novell.com/documentation/sles10/index.html..
The following modules are available in the section:
Before you start using Xen, install a kernel with Xen support and related tools. To install them, use +. After installation reboot your system to use the Xen kernel.
After you successfully installed the Xen hypervisor and tools, you can install virtual machines on your virtual server. To install a virtual machine, use +.
The YaST Control Center has several modules that cannot easily be classified into the first six module groups. They can be used for things like viewing log files and installing drivers from a vendor CD.
With +, you can create a customized installation CD from your original installation set. To start creation, click . Use the package manager to select the packages or an AutoYaST control file to use a preconfigured AutoYaST profile for creation.
For network installation, an installation server is required. To configure such a server, use +. Find more information about the configuration of an installation server with YaST in Section 4.2.1, “Setting Up an Installation Server Using YaST”.
The AutoYaST tool is intended for automated installation. In +, prepare profiles for this tool. Find detailed information about automated installation with AutoYaST in Chapter 5, Automated Installation. The information about using the module is in Section 5.1.1, “Creating an AutoYaST Profile”.
+ offers the possibility to collect all system information needed by the support team to find your problem so you can get help to solve it as soon is possible. Regarding your query, select the problem category in the following window. When all information is gathered, attach it to your support request.
The release notes are an important source about installation, update, configuration, and technical issues. The release notes are continuously updated and published through online update. Use + to view the release notes.
View information concerning
the start-up of the computer in +.
This is one of the first places you might want to look when encountering
problems with the system or when troubleshooting.
It shows the boot log
/var/log/boot.msg, which contains the screen
messages displayed when the computer starts.
Viewing the log can help
determine if the computer started properly and if all services and
functions were started correctly.
Use + to view the system log that
keeps track of the operations of your computer in
var/log/messages. Kernel messages,
sorted according to date and time, are also recorded here.
View the status of certain system components using
the box at the top. The following options are possible
from the system log and boot log modules:
This is the general system log file. Here, view kernel messages, users
logging in as root, and other useful information.
This displays processor information, including its type, make, model, and performance.
This shows which DMA channels are currently being used.
This shows which interrupts are in use and how many of each have been in use.
This displays the status of input/output memory.
This shows which I/O ports are in use at the moment.
This displays memory status.
This displays the individual modules.
This displays devices currently mounted.
This shows the partitioning of all hard disks.
This displays the current version of Linux.
This displays all YaST log messages.
This displays information concerning the start-up of the system.
This displays login failures.
This displays all system warnings.
Install device drivers from a Linux driver CD that contains drivers for SUSE Linux Enterprise with +. When installing SUSE Linux Enterprise from scratch, use this YaST module to load the required drivers from the vendor CD after the installation.
This section is intended for system administrators and experts who do not run an X server on their systems and depend on the text-based installation tool. It provides basic information about starting and operating YaST in text mode.
When YaST is started in text mode, the YaST Control Center appears first. See Figure 8.9, “Main Window of YaST in Text Mode”. The main window consists of three areas. The left frame, which is surrounded by a thick white border, features the categories to which the various modules belong. The active category is indicated by a colored background. The right frame, which is surrounded by a thin white border, provides an overview of the modules available in the active category. The bottom frame contains the buttons for and .
When the YaST Control Center is started, the category is selected automatically. Use ↓ and ↑ to change the category. To start a module from the selected category, press →. The module selection now appears with a thick border. Use ↓ and ↑ to select the desired module. Keep the arrow keys pressed to scroll through the list of available modules. When a module is selected, the module title appears with a colored background and a brief description is displayed in the bottom frame.
Press Enter to start the desired module. Various buttons or selection fields in the module contain a letter with a different color (yellow by default). Use Alt-yellow_letter to select a button directly instead of navigating there with Tab. Exit the YaST Control Center by pressing Alt-Q or by selecting and pressing Enter.
The following description of the control elements in the YaST modules assumes that all function keys and Alt key combinations work and are not assigned different global functions. Read Section 8.12.2, “Restriction of Key Combinations” for information about possible exceptions.
Use Tab and Alt-Tab or Shift-Tab to navigate among the buttons and the frames containing selection lists.
Use the arrow keys (↑ and ↓) to navigate among the individual elements in an active frame containing a selection list. If individual entries within a frame exceed its width, use Shift-→ or Shift-← to scroll horizontally to the right and left. Alternatively, use Ctrl-E or Ctrl-A. This combination can also be used if using → or ← would result in changing the active frame or the current selection list, as in the Control Center.
To select buttons with empty square brackets (check boxes) or empty parentheses (radio buttons), press Space or Enter. Alternatively, radio buttons and check boxes can be selected directly with Alt-yellow_letter. In this case, you do not need to confirm with Enter. If you navigate to an item with Tab, press Enter to execute the selected action or activate the respective menu item.
The F keys (F1 to F12) enable quick access to the various buttons. Which function keys are actually mapped to which buttons depends on the active YaST module, because the different modules offer different buttons (Details, Info, Add, Delete, etc.). Use F10 for , , and . Press F1 to access the YaST help, which shows the functions mapped to the individual F keys.
If your window manager uses global Alt combinations, the Alt combinations in YaST might not work. Keys like Alt or Shift can also be occupied by the settings of the terminal.
Alt shortcuts can be executed with Esc instead of Alt. For example, Esc H replaces Alt-H. (First press Esc, then press H.)
If the Alt and Shift combinations are occupied by the window manager or the terminal, use the combinations Ctrl-F (forward) and Ctrl-B (backward) instead.
The F keys are also used for functions. Certain function keys might be occupied by the terminal and may not be available for YaST. However, the Alt key combinations and function keys should always be fully available on a pure text console.
When a task only needs to be done once, the graphical or ncurses interface is usually the best solution. If a task needs to be done repeatedly, it might be easier to use the YaST command line interface. Custom scripts can also use this interface for automating tasks.
View a list of all module names available on your system with
yast -l or yast
--list.
To display the available options of a module, enter yast
module_name help. If
a module does not have a command line mode, a message informs you of this.
To display help for a module's command
options, enter yast module_name
command help.
To set the option value, enter
yast module_name
command
option=value.
Some modules do not support the command line mode because command line tools with the same functionality already exist. The modules concerned and the command line tools available are:
sw_single provides package management and system update functionality. Use rug instead of YaST in your scripts. Refer to Section 9.1, “Update from the Command Line with rug”.
online_update_setup configures automatic updating of your system. This can be configured with cron.
With inst_suse_register, register your SUSE Linux Enterprise. For more information about the registration, see Section 8.3.4, “Registering SUSE Linux Enterprise”.
hwinfo provides information about the hardware of your system. The command hwinfo does the same.
These modules control or configure AppArmor. AppArmor has its own command line tools.
The YaST commands for user management, unlike traditional commands,
considers the configured
authentication method and default user management settings of your system
when creating, modifying, or removing users.
For example, you do not need create home directory or copy
skel files
during or after the user addition. If you enter the username and password,
all other settings are made automatically in accordance with default
configuration. The functionality provided by the command line is the same
as in the graphical interface.
The YaST module users is used for user management. To display the command options, enter yast users help.
To add multiple users, create a /tmp/users.txt
file with a list of users to add. Enter one username per line and use the
following script:
Example 8.2. Adding Multiple Users¶
#!/bin/bash # # adds new user, the password is same as username # for i in `cat /tmp/users.txt`; do yast users add username=$i password=$i done
Similarly to adding, you can delete users defined in
/tmp/users.txt:
Example 8.3. Removing Multiple Users¶
#!/bin/bash # # the home will be not deleted # to delete homes, use option delete_home # for i in `cat /tmp/users.txt`; do yast users delete username=$i done
Network and firewall configuration commands are often wanted in scripts. Use yast lan for network configuration and yast firewall.
To display the YaST network card configuration options, enter yast lan help. To display the YaST firewall card configuration options, enter yast firewall help. The network and firewall configurations with YaST are persistent. After reboot, it is not necessary to execute scripts again.
To display a configuration summary for the network, use yast lan list. The first item in the output of Example 8.4, “Sample Output of yast lan list” is a device ID. To get more information about the configuration of the device, use yast lan show id=<number>. In this example, the correct command is yast lan show id=0.
The command line interface of the YaST firewall configuration
is a fast and easy way to enable or disable services, ports, or protocols.
To display allowed services, ports, and protocols, use
yast firewall services show.
For examples of how to enable a service or port, use
yast firewall services help.
To enable masquerading, enter
yast firewall masquerade enable.
Configure the graphical environment of your system with +. This opens the SUSE Advanced X11 Configuration interface (SaX2), where you can configure devices such as your mouse, keyboard, or display devices. This interface can also accessed from the GNOME main menu with +++ or the KDE main menu with ++.
Adjust the settings for your graphics card and display device in . If you have more than one graphics card installed, each device is shown in a separate dialog reachable by a tab. At the top of the dialog, see the current settings for the selected graphics card and the monitor that is attached to it. If more than one screen can be connected to the card (dual head), the monitor on the primary output is shown. Normally, the card and display device are detected automatically by the system during installation. However, you can tune many parameters manually or even change the display device completely.
![]() | Autodetecting New Display Hardware |
|---|---|
If you change your display hardware after installation, use sax2
-r on the command line to cause SaX2 to detect your
hardware. You must be | |
It is not possible to change the graphics card because only known models are supported and these are detected automatically. However, you can change many options that affect the behavior of the card. Normally, this should not be necessary because the system already has set them up appropriately during installation. If you are an expert and want to tweak some of the options, click next to the graphics card and select the option to change. To assign a value needed to a certain option, enter this value in the dialog that appears after selecting that option. Click to close the options dialog.
To change the current settings for the monitor, click next to the monitor. A new dialog opens in which to adjust various monitor-specific settings. This dialog has several tabs for various aspects of monitor operation. Select the first tab to manually select the vendor and model of the display device in two lists. If your monitor is not listed, you can choose one of the VESA or LCD modes that suit your needs or, if you have a vendor driver disk or CD, click and follow the instructions on the screen to use it. Check to use display power management signaling. , with the geometrical properties of the monitor, and , with the ranges for the horizontal and vertical sync frequencies of your monitor, are normally set up correctly by the system, but you can modify these values manually. After making all adjustments, click to close this dialog.
![]() | Changing Monitor Frequencies |
|---|---|
Although there are safety mechanisms, you should still be very careful when changing the allowed monitor frequencies manually. Incorrect values might destroy your monitor. You should always refer to the monitor's manual before changing frequencies. | |
The resolution and color depth can be chosen directly from two lists in the middle of the dialog. The resolution you select here marks the highest resolution to use. All common resolutions down to 640x480 are also added to the configuration automatically. Depending on the graphical desktop used, you can switch to any of these later without the need for reconfiguration.
If you have a graphics card with two outputs installed in your computer, you can connect two screens to your system. Two screens that are attached to the same graphics card are referred to as dual head. SaX2 automatically detects multiple display devices in the system and prepares the configuration accordingly. To use the dual head mode of a graphics card, check at the bottom of the dialog and click to set the dual head options and the arrangement of the screens in the dual head dialog.
The tabs in the row at the top of the dialog each correspond to a graphics card in your system. Select the card to configure and set its multihead options in the dialog below. In the upper part of the multihead dialog, click to configure the additional screen. The possible options are the same as for the first screen. Choose the resolution to use for this screen from the list. Select one of three possible multihead modes.
In this mode, all monitors display the same contents. The mouse is only visible on the main screen.
All screens combine to form a single large screen. Program windows can be positioned freely on all screens or scaled to a size that fills more than one monitor.
![]() | |
Linux currently does not offer 3D support for Xinerama multihead environments. In this case, SaX2 deactivates the 3D support. | |
The arrangement of the dual head environment describes the sequence of the individual screens. By default, SaX2 configures a standard layout that follows the sequence of the detected screens, arranging all screens in a row from left to right. In the part of the dialog, determine the way the monitors are arranged by selecting one of the sequence buttons. Click to close the dialog.
![]() | Using a Beamer with Laptop Computers |
|---|---|
To connect a beamer to a laptop computer, activate dual head mode. In this case, SaX2 configures the external output with a resolution of 1024x768 and a refresh rate of 60 Hz. These values suit most beamers very well. | |
If you have more than one graphics card installed in your computer, you can connect more than one screen to your system. Two or more screens that are attached to different graphics cards are referred to as multihead. SaX2 automatically detects multiple graphics cards in the system and prepares the configuration accordingly. By default, SaX2 configures a standard layout that follows the sequence of the detected graphics cards, arranging all screens in a row from left to right. The additional tab allows for changing this layout manually. Drag the icons representing the individual screens in the grid and click to close the dialog.
Click in the main window after completing the configuration of your monitor and your graphics card, then test your settings. This ensures that your configuration is suitable for your devices. If the image is not steady, terminate the test immediately by pressing Ctrl+Alt+Backspace and reduce the refresh rate or the resolution and color depth.
![]() | |
Regardless of whether you run a test, all modifications are only activated when you restart the X server. | |
Adjust the settings for your mouse in . If you have more than one mouse with different drivers installed, each driver is shown in a separate tab. Multiple devices operated by the same driver are shown as one mouse. Activate or deactivate the currently selected mouse with the check box at the top of the dialog. Below the check box, see the current settings for that mouse. Normally, the mouse is detected automatically, but you can change it manually if the automatic detection fails. Refer to the documentation for your mouse for a description of the model. Click to select the vendor and model from two lists then click to confirm your selection. In the options part of the dialog, set various options for operating your mouse.
If your mouse has only two buttons, a third button is emulated when you click both buttons simultaneously.
Check this box to use a scroll wheel.
If one of these options is selected, the mouse pointer moves in the opposite direction. For touch pads, this feature is sometimes useful.
If your mouse does not have a scroll wheel but you want to use similar functionality, you can assign an additional button for this. Select the button to use. While pressing this button, any movement of the mouse is translated into scroll wheel commands. This feature is especially useful with trackballs.
When you are satisfied with your settings, click to confirm your changes.
![]() | |
Any changes you make here take effect only after you restart the X server. | |
Use this dialog to adjust the settings for operating your keyboard in the graphical environment. In the upper part of the dialog, select the type, language layout, and variant. Use the test field at the bottom of the dialog to check if special characters are displayed correctly. Select additional layouts and variants to use from the list in the middle. Depending on the type of your desktop, these may be switched in the running system without the need for reconfiguration. After you click , the changes are applied immediately.
Use this dialog to configure a graphics tablet attached to your system. Click the tab to select vendor and model from the lists. Currently, only a limited number of graphics tablets is supported. To activate the tablet, check at the top of the dialog.
In the dialog, configure the connection to
the tablet. SaX2 enables the configuration of graphics tablets connected
to the USB port or the serial port. If your tablet is connected to the serial
port, verify the port. /dev/ttyS0 refers to the first
serial port. /dev/ttyS1 refers to the second. Additional
ports use similar notation. Choose appropriate
from the list and select the suitable
for your needs.
If your graphics tablet supports electronic pens, configure them in . Add eraser and pen and set their properties after clicking .
When you are satisfied with the settings, click to confirm your changes.
Use this dialog to configure touchscreens attached to your system. If you
have
more than one touchscreen installed, each device is shown in a separate
dialog reachable by a tab. To activate the currently selected touchscreen,
check at the top of the
dialog. Select vendor and model from the lists below and set an appropriate
at the bottom.
You can configure touchscreens connected to the USB port
or the serial port. If your touchscreen is connected to the serial port,
verify the port. /dev/ttyS0 refers to the first serial
port. /dev/ttyS1 refers to the second. Additional ports
use similar notation. When you are satisfied with your settings, click
to confirm your changes.
All error messages and alerts are logged in the directory
/var/log/YaST2. The most important file for finding
YaST problems is y2log.
More information about YaST can be found on the following Web sites and directories:
/usr/share/doc/packages/yast2—Local YaST
development documentation
http://www.opensuse.org/YaST_Development—The YaST project page in the openSUSE wiki
http://forge.novell.com/modules/xfmod/project/?yast—Another YaST project page