Chapter 8. System Configuration with YaST

Contents

8.1. YaST Language
8.2. The YaST Control Center
8.3. Software
8.4. Hardware
8.5. System
8.6. Network Devices
8.7. Network Services
8.8. AppArmor
8.9. Security and Users
8.10. Virtualization
8.11. Miscellaneous
8.12. YaST in Text Mode
8.13. Managing YaST from the Command Line
8.14. SaX2
8.15. Troubleshooting
8.16. For More Information

Abstract

In SUSE Linux Enterprise, YaST handles both the installation and configuration of your system. This chapter describes the configuration of system components (hardware), network access, and security settings, and administration of users. Find a short introduction to the text-based YaST interface in Section 8.12, “YaST in Text Mode”. For a description of manual system configuration, see Section 20.3, “System Configuration via /etc/sysconfig”.

Configure the system with YaST using various YaST modules. Depending on the hardware platform and the installed software, there are different ways to access YaST in the installed system.

In KDE or GNOME, start the YaST Control Center from the main menu. Before YaST starts, you are prompted to enter the root password, because YaST needs system administrator permissions to change the system files.

To start YaST from the command line, enter the commands su (for changing to the user root) and yast2. To start the text version, enter yast instead of yast2. Also use the command yast to start the program from one of the virtual consoles.

For hardware platforms that do not support a display device of their own and for remote administration on other hosts, run YaST remotely. First, open a console on the host on which to display YaST and enter the command ssh -X root@<system-to-configure> to log in to the system to configure as root and redirect the X server output to your terminal. Following the successful SSH login, enter yast2 to start YaST in graphical mode.

To start YaST in text mode on another system, use ssh root@<system-to-configure> to open the connection. Then start YaST with yast.

To save time, the individual YaST modules can be started directly. To start a module, enter yast2 module_name. View a list of all module names available on your system with yast2 -l or yast2 --list. Start the network module, for example, with yast2 lan.

8.1. YaST Language

To change the language of YaST, select System+Language Selection in the YaST Control Center. Choose a language, exit the YaST Control Center, log out of the system, then log in again. The next time you start YaST, the new language setting is used. This also changes the language for the entire system.

If you need work in a different language but do not want to change the system language setting, run the YaST with the LANG variable set to your preferred language. Use a long language code in the format langcode_statecode. For example, for American English, enter LANG="en_US" yast2.

This command starts YaST using the specified language. The language is only valid for this YaST session. The language settings of the terminal, other users, and your other sessions remain unchanged.

If you run YaST remotely over SSH, YaST uses the language settings of your local system.

8.2. The YaST Control Center

When you start YaST in the graphical mode, the YaST Control Center, as shown in Figure 8.1, “The YaST Control Center”, opens. The left frame contains the available categories. When you click a category, its contents are listed in the right frame. Then select the desired module. For example, if you select Hardware and click Sound in the right frame, a configuration dialog opens for the sound card. The configuration of the individual items usually consists of several steps. Press Next to proceed to the following step.

The left frame of most modules displays the help text, which offers suggestions for configuration and explains the required entries. To get help in modules without a help frame, press F1 or choose Help. After selecting the desired settings, complete the procedure by pressing Accept on the last page of the configuration dialog. The configuration is then saved.

Figure 8.1. The YaST Control Center

The YaST Control Center

[Note]YaST Software Management Gtk and Qt Front-Ends

YaST comes with two front-ends depending on the desktop installed on your system. By default, the YaST gtk front-end runs on the GNOME desktop, and the YaST qt front-end on the other desktops. This is defined with the WANT_UI variable in the /sbin/yast2 script. Feature-wise, the gtk front-end is very similar to the qt front-end described in the manuals. One exception is the gtk software management module, which differs considerably from the qt port.

8.3. Software

8.3.1. Installing and Removing Software

To install, uninstall, and update software on your machine, use Software+Software Management. This opens a package manager dialog as shown in Figure 8.2, “YaST Package Manager”.

Figure 8.2. YaST Package Manager

YaST Package Manager

In SUSE® Linux Enterprise, software is available in the form of RPM packages. Normally, a package contains everything needed for a program: the program itself, the configuration files, and all documentation. A list of individual packages is displayed to the right in the individual package window. The content of this list is determined by the currently selected filter. If, for example, the Patterns filter is selected, the individual package window displays all packages of the current selection.

In the package manager, each package has a status that determines what to do with the package, such as Install or Delete. This status is shown by a symbol in a status box at the beginning of the line. Change the status by clicking or selecting the desired status from the menu that opens when the item is right-clicked. Depending on the current situation, some of the possible status flags may not be available for selection. For example, a package that has not yet been installed cannot be set to Delete. View the available status flags with Help+Symbols.

The font color used for various packages in the individual package window provides additional information. Installed packages for which a newer version is available on the installation media are displayed in blue. Installed packages whose version numbers are higher than those on the installation media are displayed in red. However, because the version numbering of packages is not always linear, the information may not be perfect, but should be sufficient to indicate problematic packages. If necessary, check the version numbers.

8.3.1.1. Installing Packages

To install packages, select packages for installation and click Accept. Selected packages should have the Install status icon. The package manager automatically checks the dependencies and selects any other required packages (resolution of dependencies). To view other packages required for installation before clicking Accept, choose Extras+Show Automatic Package Changes from the main menu. After installing packages, continue working with the package manager by clicking Install More or close it by clicking Finish.

The package manager provides preselected groups for installation. You can select an entire group instead of single packages. To view these groups, use Filter in the left frame.

[Tip]List of All Available Packages

To display all packages on your installation media, use the filter Package Groups and select zzz All at the bottom of the tree. SUSE Linux Enterprise contains a number of packages and it might take some time to display this long list.

8.3.1.2. Installing and Removing Patterns

The Patterns filter groups the program packages according to application purpose, such as file or print server. The various groups of the Patterns filter are listed with the installed packages preselected.

Click the status box at the beginning of a line to install or uninstall this pattern. Select a status directly by right-clicking the pattern and using the context menu. From the individual package overview to the right, which displays the packages included in the current pattern, select and deselect individual packages.

8.3.1.3. Installing and Removing Language Support

To find language-specific packages, such as translated texts for the user interface of programs, documentation, and fonts, use the Languages filter. This filter shows a list of all languages supported by SUSE Linux Enterprise. If you select one of these, the right frame shows all packages available for this language. Among these, all packages applying to your current software selection are automatically tagged for installation.

To uninstall a language from your system, select a language from the language list and uncheck the status box at the beginning of a line.

[Note]

Because language-specific packages may depend on other packages, the package manager may select additional packages for installation.

8.3.1.4. Packages and Installation Sources

If you want to find only packages from the specific source, use the Installation Sources filter. In the default configuration, this filter shows a list of all packages from the selected source. To restrict the list, use a secondary filter.

To view a list of the all installed packages from the selected installation source, select the filter Installation Sources then select Installation Summary from Secondary Filters and deactivate all check boxes except Keep.

The package status in the individual package window can be changed as usual. However, the changed package may no longer meet the search criteria. To remove such packages from the list, update the list with Update List.

8.3.1.5. Installing Source Packages

A package containing the source files for the program is usually available. The sources are not needed for running the program, but you may want to install the sources to compile a custom version of the program.

To install sources for selected program, mark the check box in the Source column. If you cannot see a check box, your installation sources do not contain the source of the package.

8.3.1.6. Saving the Package Selection

If you want to install the same packages on several computers, you can save your configuration to file and use it for other systems. To save your package selection, choose File+Export from the menu. To import a prepared selection, use File+Import.

[Important]Hardware Compatibility

Because this function saves the exact package list, it is only reliable when the hardware is identical on the source and target systems. For more complicated situations, AutoYaST, described in Chapter 5, Automated Installation, may be a better choice.

8.3.1.7. Removing Packages

To remove packages, assign the correct status to the packages to remove and click Accept. Selected packages should have the Delete status. If a package required by other installed packages is marked for deletion, the package manager issues an alert with detailed information and alternative solutions.

8.3.1.8. Reinstalling Packages

If you find damaged files that belong to package or you want to reinstall the original version of a package from your installation media, reinstall the package. To reinstall packages, select packages for reinstallation and click Accept. Selected packages should have the Update status. If any dependency issues arise with installed packages, the package manager issues an alert with detailed information and alternative solutions.

8.3.1.9. Searching for Packages, Applications, and Files

To find a specific package, use the Search filter. Enter a search string and click Search. By specifying various search criteria, you can restrict the search to display a few or even only one package. You can also define special search patterns using wild cards and regular expressions in Search Mode.

[Tip]Quick Search

In addition to the Search filter, all lists of the package manager feature a quick search. Simply enter a letter to move the cursor to the first package in the list whose name begins with this letter. The cursor must be in the list (by clicking the list).

To find a package by name, select Name, enter the name of the package to find in the search field, and click Search. To find a package by text in the description, select Summary and Descriptions, enter a search string, and click Search.

To search for the package that contains a certain file, enter the name of the file, select RPM "Provides", and click Search. To find all packages that depend on a particular package, select RPM "Requires", enter the name of package, and click Search.

If you are familiar with the package structure of SUSE Linux Enterprise, you can use the Package Groups filter to find packages by subject. This filter sorts the program packages by subjects, such as applications, development, and hardware, in a tree structure to the left. The more you expand the branches, the more specific the selection is. This means fewer packages are displayed in the individual package window.

8.3.1.10. Installation Summary

After selecting the packages for installation, update, or deletion, view the installation summary with Installation Summary. It shows how packages will be affected when you click Accept. Use the check boxes to the left to filter the packages to view in the individual package window. For example, to check which packages are already installed, deactivate all check boxes except Keep.

The package status in the individual package window can be changed as usual. However, the respective package may no longer meet the search criteria. To remove such packages from the list, update the list with Update List.

8.3.1.11. Information about Packages

Get information about the selected package with the tabs in the bottom right frame. If another version of the package is available, you get information about both versions.

The Description tab with the description of the selected package is automatically active. To view information about package size, version, installation media, and other technical details, select Technical Data. Information about provided and required files is in Dependencies. To view available versions with their installation sources, click Versions.

8.3.1.12. Disk Usage

During the selection of the software, the resource window at the bottom left of the module displays the prospective disk usage of all mounted file systems. The colored bar graph grows with every selection. As long as it remains green, there is sufficient space. The bar color slowly changes to red as you approach the limit of disk space. If you select too many packages for installation, an alert is displayed.

8.3.1.13. Checking Dependencies

Some packages depend on other packages. This means that the software of the package only works properly if another package is also installed. There are some packages with identical or similar functionality. If these packages use the same system resource, they should not be installed at the same time (package conflict).

When the package manager starts, it examines the system and displays installed packages. When you select to install and remove packages, the package manager can automatically check the dependencies and select any other required packages (resolution of dependencies). If you select or deselect conflicting packages, the package manager indicates this and submits suggestions for solving the problem (resolution of conflicts).

To activate the automatic dependency check, select Autocheck, located under the information window. With Autocheck activated, any change of a package status triggers an automatic check. This is a useful feature, because the consistency of the package selection is monitored permanently. However, this process consumes resources and can slow down the package manager. For this reason, the automatic check is not activated by default. Regardless of the state of Autocheck, a consistency check is performed when you confirm your selection with Accept.

If you click Check, located under the information window, the package manager checks if the current package selection results in any unresolved package dependencies or conflicts. In the event of unresolved dependencies, the required additional packages are selected automatically. For package conflicts, the package manager opens a dialog that shows the conflict and offers various options for solving the problem.

For example, sendmail and postfix may not be installed concurrently. Figure 8.3, “Conflict Management of the Package Manager” shows the conflict message prompting you to make a decision. postfix is already installed. Accordingly, you can refrain from installing sendmail, remove postfix, or take the risk and ignore the conflict.

[Warning]Handling Package Conflicts

Unless you are very experienced, follow the suggestions of YaST when handling package conflicts, because otherwise the stability and functionality of your system could be endangered by the existing conflict.

Figure 8.3. Conflict Management of the Package Manager

Conflict Management of the Package Manager

8.3.1.14. Installing -devel Packages

The package manager provides functions for quick and easy installation of devel and debug packages. To install all devel packages for your installed system, choose Extras+Install All Matching — -devel Packages. To install all debug packages for your installed system, choose Extras+Install All Matching — -debuginfo Packages.

8.3.2. Installing Add-On Products

Add-on products are extensions for your system. You can install a third party add-on product or a special extension of your SUSE Linux Enterprise, for example, the SDK add-on or a CD with binary drivers. To install a new add-on, use Software+Add-On Product. You can select various types of product media, like CD, FTP or local directory. You can work also directly with ISO files. To add an add-on as ISO file media, select Local Directory then choose ISO Images.

After successfully adding the add-on media, the package manager window appears. If the add-on provides a new pattern, see the new item in the Patterns filter. To view the list of all packages from the selected installation source, select the filter Installation Sources and choose the installation source to view. To view packages from a selected add-on by package groups, select the secondary filter Package Groups.

[Tip]Creating Custom Add-On Products

Create your own add-on products with YaST Add-On Creator. Read about the YaST add-on creator at http://developer.novell.com/wiki/index.php/Creating_Add-On_Media_with_YaST. Find technical background information at http://developer.novell.com/wiki/index.php/Creating_Add-Ons.

8.3.3. Selecting the Installation Source

You can use multiple installation sources of several types. Select them and enable their use for installation or update using Software+Installation Source. For example, you can specify SUSE Software Development Kit as an installation source. When started, it displays a list of all previously registered sources. Following a normal installation from CD, only the installation CD is listed. Click Add to include additional sources in this list. Sources can be CDs, DVDs, or network sources, such as NFS and FTP servers. Even directories on the local hard disk can be selected as the installation medium. See the detailed YaST help text for more details.

All registered sources have an activation status in the first column of the list. Enable or disable individual installation sources by clicking Activate or Deactivate. During the installation of software packages or updates, YaST selects a suitable entry from the list of activated installation sources. When you exit the module with Close, the current settings are saved and applied to the configuration modules Software Management and System Update.

8.3.4. Registering SUSE Linux Enterprise

To get technical support and product updates, your system must be registered and activated. If you skipped the registration during installation, register with the help of the Novell Customer Center Configuration module from Software. This dialog is the same as that described in Section 3.14.4, “Novell Customer Center Configuration”.

8.3.5. YaST Online Update

Install important updates and improvements with YaST Online Update. The current updates for your SUSE Linux Enterprise are available from the product specific update catalogs containing patches. To add or remove catalogs, use the Software+Installation Source module, described in Section 8.3.3, “Selecting the Installation Source”.

[Note]Error on Accessing the Update Catalog

If you are not able to access the update catalog, this might be due to an expired subscription. Normally, SUSE Linux Enterprise comes with a one or three years subscription, during which you have access to the update catalog. This access will be denied once the subscription ends.

In case of an access denial to the update catalog you will see a warning message with a recommendation to visit the Novell Customer Center and check your subscription. The Novell Customer Center is available at http://www.novell.com/center/.

To install updates and improvements with YaST, run Software+Online Update. All new patches (except the optional ones) that are currently available for your system are already marked for installation. Clicking Accept automatically installs these patches. After the installation has completed, confirm with Finish. Your system is now up-to-date.

8.3.5.1. Definition of Terms

Package

A package is a compressed file in rpm format that contains the files for a particular program.

Patch

A patch consists of one or more packages—either full packages or patchrpm or deltarpm packages— and may also introduce dependencies to packages that are not installed yet.

patchrpm

A patchrpm consists only of files that have been updated since it was first released for SUSE Linux Enterprise 10. Its download size is usually considerably smaller than the size of a package.

deltarpm

A deltarpm consists only of the binary diff between two defined versions of a package and therefore, has the smallest download size. Before being installed, the rpm package has to be rebuild on the local machine.

8.3.5.2. Installing Patches Manually

The Online Update window consists of five sections. The list of all patches available is on the left. Find the description of the selected patch displayed below the list of patches. The disk usage is displayed at the bottom of the left column. The right column lists the packages included in the selected patch (a patch can consist of several packages) and, below, a detailed description of the selected package.

Figure 8.4. YaST Online Update

YaST Online Update

The patch display lists the available patches for SUSE Linux Enterprise. The patches are sorted by security relevance. The color of the patch name, as well as a pop-up window under the mouse cursor, indicate the security status of the patch: Security (red), Recommended (blue), or Optional (black). There are three different views on patches. Use Show Patch Category to toggle the views:

Installable Patches (default view)

Currently not installed patches that apply to packages installed on your system.

Installable and Installed Patches

All patches that apply to packages installed on your system.

All Patches

All patches available for SUSE Linux Enterprise.

A list entry consists of a symbol and the patch name. For a list of possible symbols, press Shift+F1. Actions required by Security and Recommended patches are automatically preset. These actions are Autoinstall, Autoupdate, or Autodelete. Actions for Optional patches are not preset—right-click on a patch and choose an action from the list.

If you install an up-to-date package from a catalog other than the update catalog, the requirements of a patch for this package may be fulfilled with this installation. In this case a check mark is displayed in front of the patch summary. The patch will be visible in the list until you mark it for installation. This will in fact not install the patch (because the package already is up-to-date), but mark the patch as having been installed.

Most patches include updates for several packages. If you want to change actions for single packages, right-click on a package in the package window and choose an action. Once you have marked all patches and packages as desired, proceed with Accept.

[Tip]Disabling deltarpms

Since rebuilding rpm packages from deltarpms is a memory and CPU time consuming task, certain setups or hardware configuration might require to disable the usage of deltarpms for performance sake. To disable the use of deltarpms edit the file /etc/zypp/zypp.conf and set download.use_deltarpm to false.

Another alternative for updating software is the ZENworks updater applet for KDE and GNOME. The ZENworks updater helps monitor new patches. It also provides a quick update function. For more information, refer to Section 9.2, “Managing Packages with the ZEN Tools”.

8.3.6. Automatic Online Update

YaST also offers the possibility to set up an automatic update. Select Software+Automatic Online Update. Configure a Daily or a Weekly update. Some patches, such as kernel updates, require user interaction, which would cause the automatic update procedure to stop. Check Skip Interactive Patches for the update procedure to proceed automatically. In this case, run a manual Online Update from time to install patches that require interaction.

When Only Download Patches is checked, the patches are downloaded at the specified time but not installed. They must be installed manually. The patches are downloaded to the rug cache directory, /var/cache/zmd/web, by default. Use the command rug get-prefs cache-directory to get the current rug cache directory. For more information about rug, see Section 9.1, “Update from the Command Line with rug”.

8.3.7. Updating from a Patch CD

[Note]

On IBM System z systems, the Patch CD update option is not available.

The Patch CD Update module from the Software section installs patches from CD, not from an FTP server. The advantage lies in a much faster update with CD. After the patch CD is inserted, all patches on the CD are displayed in the dialog. Select the desired packages for installation from the list of patches. The module issues an error message if no patch CD is present. Insert the patch CD then restart the module.

8.3.8. Updating the System

Update the version of SUSE Linux Enterprise installed on your system with Software+System Update. During operation, you can only update application software, not the base system. To update the base system, boot the computer from an installation medium, such as CD. When selecting the installation mode in YaST, select Update.

The procedure for updating the system is similar to a new installation. Initially, YaST examines the system, determines a suitable update strategy, and presents the results in a suggestion dialog. Click Change or the individual items to change any details.

8.3.8.1. Update Options

Set the update method for your system. Two options are available.

Update with Installation of New Software and Features Based on the Selection

To update the entire system to the latest versions of software, select one of the predefined selections. These selections ensure that packages that did not exist previously are also installed.

Only Update Installed Packages

This option merely updates packages that already exist on the system. No new features are installed.

Additionally, you can use Delete Outdated Packages to remove packages that do not exist in the new version. By default, this option is preselected to prevent outdated packages from unnecessarily occupying hard disk space.

8.3.8.2. Packages

Click Packages to start the package manager and select or deselect individual packages for update. Any package conflicts should be resolved with the consistency check. The use of the package manager is covered in detail in Section 8.3.1, “Installing and Removing Software”.

8.3.8.3. Backup

During the update, the configuration files of some packages may be replaced by those of the new version. Because you may have modified some of the files in your current system, the package manager normally makes backup copies of the replaced files. With this dialog, determine the scope of these backups.

[Important]Scope of the Backup

This backup does not include the software. It only contains configuration files.

8.3.8.4. Language

Primary and other languages currently installed on the system are listed here. Change them by clicking Language in the displayed configuration or with Change+Language. Optionally, adapt the keyboard layout and time zone to the region where the primary language is spoken. Find more about language selection in Section 8.5.15, “Language Selection”.

8.3.8.5. Important Information about Updates

The system update is a very complex procedure. For each program package, YaST must first check which version is installed on the computer then determine what needs to be done to replace the old version with the new version correctly. YaST also tries to adopt any personal settings of the installed packages.

In most cases, YaST replaces old versions with new ones without problems. A backup of the existing system should be performed prior to updating to ensure that existing configurations are not lost during the update. Conflicts can then be resolved manually after the update has finished.

8.3.9. Installing into a Directory

This YaST module allows you to install packages into a directory specified by you. Select where to place the root directory, how to name directories, and the type of system and software to install. After entering this module, YaST determines the system settings and lists the default directory, installation instructions, and software to install. Edit these settings by clicking Change. All changes must be confirmed by clicking Accept. After changes have been made, click Next until informed that the installation is complete. Click Finish to exit the dialog.

8.3.10. Checking Media

If you encounter any problems using the SUSE Linux Enterprise installation media, you can check the CDs or DVDs with Software+Media Check. Media problems are more likely to occur with media you burn yourself. To check that a SUSE Linux Enterprise CD or DVD is error-free, insert the medium into the drive and run this module. Click Start for YaST to check the MD5 checksum of the medium. This may take several minutes. If any errors are detected, you should not use this medium for installation.

8.4. Hardware

New hardware must first be installed or connected as directed by the vendor. Turn on external devices and start the appropriate YaST module. Most devices are automatically detected by YaST and the technical data is displayed. If the automatic detection fails, YaST offers a list of devices (model, vendor, etc.) from which to select the suitable device. Consult the documentation enclosed with your hardware for more information.

[Important]Model Designations

If your model is not included in the device list, try a model with a similar designation. However, in some cases the model must match exactly, because similar designations do not always indicate compatibility.

8.4.1. Infrared Device

Configure an infrared device with Hardware+Infrared Device. Click Start IrDa to begin configuration. You can configure Port and Limit Baud Rate here.

8.4.2. Graphics Card and Monitor

Configure graphics cards and monitors with Hardware+Graphics Card and Monitor. It uses the the SaX2 interface, described in Section 8.14, “SaX2”.

8.4.3. Printer

Configure a printer with Hardware+Printer. If a printer is properly connected to the system, it should be detected automatically. Find detailed instructions for configuring printers with YaST in Section 23.4, “Setting Up a Printer”.

8.4.4. Hard Disk Controller

Normally, the hard disk controller of your system is configured during the installation. If you add controllers, integrate these into the system with Hardware+Disk Controller. You can also modify the existing configuration, but this is generally not necessary.

The dialog presents a list of detected hard disk controllers and enables assignment of the suitable kernel module with specific parameters. Use Test Loading of Module to check if the current settings work before they are saved permanently in the system.

[Warning]Configuration of the Hard Disk Controller

It is advised to test the settings before making them permanent in the system. Incorrect settings can prevent the system from booting.

8.4.5. Hardware Information

Display detected hardware and technical data using Hardware+Hardware Information. Click any node of the tree for more information about a device. This module is especially useful, for example, when submitting a support request for which you need information about your hardware.

Save the hardware information displayed to a file by clicking Save to File. Select the desired directory and filename then click Save to create the file.

8.4.6. IDE DMA Mode

Activate and deactivate the DMA mode for your IDE hard disks and your IDE CD and DVD drives in the installed system with Hardware+IDE DMA Mode. This module does not have any effect on SCSI devices. DMA modes can substantially increase the performance and data transfer speed in your system.

During installation, the current SUSE Linux Enterprise kernel automatically activates DMA for hard disks but not for CD drives, because default DMA activation for all drives often causes problems with CD drives. Use the DMA module to activate DMA for your drives. If the drive supports the DMA mode without any problems, the data transfer rate of your drive can be increased by activating DMA.

[Note]

DMA (direct memory access) means that your data can be transferred directly to the RAM, bypassing the processor control.

8.4.7. IBM System z: DASD Devices

To add a DASD to the installed system, there are two possibilities:

YaST

To add a DASD to an installed system, use the YaST DASD module (Hardware+DASD). In the first screen, select the disks to make available to your Linux installation and click Perform Action. Select Activate then leave the dialog with Next.

Command Line

Issue the following command:

dasd_configure 0.0.0150 1 0

Replace 0.0.0150 with the actual channel number to which the DASD is attached. The last zero of the command line should be 1 if the DASD should be accessed in DIAG mode.

[Note]

In either case, you must run the commands

mkinitrd
zipl

to make the changes persistent.

8.4.8. IBM System z: ZFCP

To add further FCP-attached SCSI devices to the installed system, use the YaST ZFCP module (Hardware+ZFCP). Select Add to add an additional device. Select the Channel Number (adapter) from the list and specify both WWPN and FCP-LUN. Finalize the setup by selecting Next and Close. Verify that the device has been added by checking the output of cat /proc/scsi/scsi.

[Note]

To make the changes persistent through a reboot, run the following commands:

mkinitrd
zipl

8.4.9. Joystick

Configure a joystick connected to the sound card with Hardware+Joystick. Select your joystick type in the list provided. If your joystick is not listed, select Generic Analog Joystick. After selecting your joystick, make sure that it is connected then click Test to test the functionality. Click Continue and YaST installs the required files. After the Joystick Test window appears, test the joystick by moving it in all directions and pressing all buttons. Each movement should be displayed in the window. If you are satisfied with the settings, click OK to return to the module and Finish to complete configuration.

If you have a USB device, this configuration is not necessary. Plug in the joystick and start using it.

8.4.10. Keyboard Layout

To configure the keyboard for the console, run YaST in text mode then use Hardware+Keyboard Layout. After clicking the module, the current layout is displayed. To choose another keyboard layout, select the desired layout from the list provided. Test the layout in Test by pressing keys on the keyboard.

Fine-tune the settings by clicking Expert Settings. Adjust the key repeat rate and delay and configure the start-up state by choosing the desired settings in Start-Up States. For Devices to Lock, enter a space-separated list of devices to which to apply the Scroll Lock, Num Lock, and Caps Lock settings. Click OK to complete the fine-tuning. Finally, after all selections have been made, click Accept for your changes to take effect.

To set up the keyboard for the graphical environment, run the graphical YaST then select Keyboard Layout. Find information about the graphical configuration in Section 8.14.3, “Keyboard Properties”.

8.4.11. Mouse Model

When configuring the mouse for the graphical environment, click Mouse Model to access the SaX2 mouse configuration. Refer to Section 8.14.2, “Mouse Properties” for details.

To configure your mouse for the text environment, use YaST in text mode. After entering text mode and selecting Hardware+Mouse Model, use the keyboard arrow keys to choose your mouse from the provided list. Then click Accept to save the settings and exit the module.

8.4.12. Sound

Most sound cards are detected automatically and configured with reasonable values during initial installation. To install a card added later or modify settings, use Hardware+Sound. It is also possible to switch the sequence of the cards.

Figure 8.5. Sound Configuration

Sound Configuration

If YaST cannot detect your sound card automatically, proceed as follows:

  1. Click Add to open a dialog in which to select a sound card vendor and model. Refer to your sound card documentation for the information required. Find a reference list of sound cards supported by ALSA with their corresponding sound modules in /usr/share/doc/packages/alsa/cards.txt and at http://www.alsa-project.org/alsa-doc/. After making your selection, click Next.

  2. In Sound Card Configuration, choose the configuration level in the first setup screen:

    Quick automatic setup

    You are not required to go through any of the further configuration steps and no sound test is performed. The sound card is configured automatically.

    Normal setup

    Adjust the output volume and play a test sound.

    Advanced setup with possibility to change options

    Customize all settings manually.

    In this dialog, there is also a shortcut to the joystick configuration. Click Joystick configuration and select the joystick type in the following dialog to configure a joystick. Click Next to continue.

  3. In Sound Card Volume, test your sound configuration and make adjustments to the volume. You should start at about ten percent to avoid damage to your hearing or the speakers. A test sound should be audible when you click Test. If you cannot hear anything, increase the volume. Press Next+Finish to complete the sound configuration.

To change the configuration of a sound card, go to the Sound Configuration dialog, select a displayed Card Model, and click Edit. Use Delete to remove a sound card completely.

Click Other to customize one of the following options manually:

Volume

Use this dialog for setting the volume.

Start Sequencer

For playback of MIDI files, check this option.

Set as Primary Card

Click Set as Primary Card to adjust the sequence of your sound cards. The sound device with index 0 is the default device used by the system and the applications.

The volume and configuration of all sound cards installed are saved when you click Finish in the YaST sound module. The mixer settings are saved to the file /etc/asound.conf and the ALSA configuration data is appended to the end of the files /etc/modprobe.d/sound and /etc/sysconfig/hardware.

8.5. System

This group of modules is designed to help you manage your system. All modules in this group are system-related and serve as valuable tools for ensuring that your system runs properly and your data is managed efficiently.

[Tip]IBM System z: Continuing

For IBM System z, continue with Section 8.5.3, “Boot Loader Configuration”.

8.5.1. Backup

Create a backup of both your system and data using System+System Backup. However, the backup created by the module does not include the entire system. The system is backed up by saving important storage areas on your hard disk that may be crucial when trying to restore a system, such as the partition table or master boot record (MBR). It can also include the XML configuration acquired from the installation of the system, which is used for AutoYaST. Data is backed up by saving changed files of packages accessible on installation media, entire packages that are unaccessible (such as online updates), and files not belonging to packages, such as many of the configuration files in /etc or the directories under /home.

8.5.2. Restoration

With System+System Restoration, restore your system from a backup archive created with System Backup. First, specify where the archives are located (removable media, local hard disks, or network file systems). Click Next to view the description and contents of the individual archives and select what to restore from the archives.

You can also uninstall packages that were added since the last backup and reinstall packages that were deleted since the last backup. These two steps enable you to restore the exact system state at the time of the last backup.

[Warning]System Restoration

Because this module normally installs, replaces, or uninstalls many packages and files, use it only if you have experience with backups. Otherwise you may lose data.

8.5.3. Boot Loader Configuration

To configure booting for systems installed on your computer, use the System+Boot Loader module. A detailed description of how to configure the boot loader with YaST is available in Section 21.3, “Configuring the Boot Loader with YaST”.

8.5.4. Clustering

Find information about Heartbeat and high availability configuration with YaST in Heartbeat Guide.

8.5.5. LVM

The logical volume manager (LVM) is a tool for custom partitioning of hard disks with logical drives. Find information about LVM in Section 7.1, “LVM Configuration”.

8.5.6. EVMS

The enterprise volume management system (EVMS) is, like LVM, a tool for custom partitioning and grouping of hard disks into virtual volumes. It is flexible, extensible, and can be tailored using a plug-in model to individual needs of various volume management systems.

EVMS is compatible with existing memory and volume management systems, like DOS, Linux LVM, GPT (GUID partition table), IBM System z, Macintosh, and BSD partitions. More information is provided at http://evms.sourceforge.net/.

8.5.7. Using the YaST Partitioner

With the expert partitioner, shown in Figure 8.6, “The YaST Partitioner”, manually modify the partitioning of one or several hard disks. Partitions can be added, deleted, resized, and edited. Also access the soft RAID, EVMS, and LVM configuration from this YaST module.

[Warning]Repartitioning the Running System

Although it is possible to repartition your system while it is running, the risk of making a mistake that causes data loss is very high. Try to avoid repartitioning your installed system and always do a complete backup of your data before attempting to do so.

Figure 8.6. The YaST Partitioner

The YaST Partitioner

[Tip]IBM System z: Device Names

IBM System z recognize only DASD and SCSI hard disks. IDE hard disks are not supported. This is why these devices appear in the partition table as dasda or sda for the first recognized device.

All existing or suggested partitions on all connected hard disks are displayed in the list of the YaST Expert Partitioner dialog. Entire hard disks are listed as devices without numbers, such as /dev/hda or /dev/sda (or /dev/dasda). Partitions are listed as parts of these devices, such as /dev/hda1 or /dev/sda1 (or /dev/dasda1, respectively). The size, type, file system, and mount point of the hard disks and their partitions are also displayed. The mount point describes where the partition appears in the Linux file system tree.

If you run the expert dialog during installation, any free hard disk space is also listed and automatically selected. To provide more disk space to SUSE Linux Enterprise®, free the needed space starting from the bottom toward the top of the list (starting from the last partition of a hard disk toward the first). For example, if you have three partitions, you cannot use the second exclusively for SUSE Linux Enterprise and retain the third and first for other operating systems.

8.5.7.1. Partition Types

[Tip]IBM System z: Hard Disks

On the IBM System z platforms, SUSE Linux Enterprise Server supports SCSI hard disks as well as DASDs (direct access storage devices). While SCSI disks can be partitioned as described below, DASDs can have no more than three partition entries in their partition tables.

Every hard disk has a partition table with space for four entries. An entry in the partition table can correspond to a primary partition or an extended partition. Only one extended partition entry is allowed, however.

A primary partition simply consists of a continuous range of cylinders (physical disk areas) assigned to a particular operating system. With primary partitions only, you are limited to four partitions per hard disk, because more do not fit in the partition table. This is why extended partitions are used. Extended partitions are also continuous ranges of disk cylinders, but an extended partition may itself be subdivided into logical partitions. Logical partitions do not require entries in the partition table. In other words, an extended partition is a container for logical partitions.

If you need more than four partitions, create an extended partition as the fourth partition or earlier. This extended partition should span the entire remaining free cylinder range. Then create multiple logical partitions within the extended partition. The maximum number of logical partitions is 15 on SCSI, SATA, and Firewire disks and 63 on (E)IDE disks. It does not matter which types of partitions are used for Linux. Primary and logical partitions both work fine.

[Tip]Hard Disks with a GPT Disk Label

For architectures using the GPT disk label, the number of primary partitions is not restricted. Consequently, there are no logical partitions.

8.5.7.2. Creating a Partition

To create a partition from scratch, proceed as follows:

  1. Select Create. If several hard disks are connected, a selection dialog appears in which to select a hard disk for the new partition.

  2. Specify the partition type (primary or extended). Create up to four primary partitions or up to three primary partitions and one extended partition. Within the extended partition, create several logical partitions (see Section 8.5.7.1, “Partition Types”).

  3. Select the file system to use and a mount point. YaST suggests a mount point for each partition created. Refer to Chapter 25, File Systems in Linux for details on the various file systems.

  4. Specify additional file system options if your setup requires them. This is necessary, for example, if you need persistent device names. For details on the available options, refer to Section 8.5.7.3, “Editing a Partition”.

  5. Click OK+Apply to apply your partitioning setup and leave the partitioning module.

    If you created the partition during installation, you are returned to the installation overview screen.

8.5.7.3. Editing a Partition

When you create a new partition or modify an existing partition, set various parameters. For new partitions, suitable parameters are set by YaST and usually do not require any modification. To edit your partition setup manually, proceed as follows:

  1. Select the partition.

  2. Click Edit to edit the partition and set the parameters:

    File System ID

    Even if you do not want to format the partition at this stage, assign it a file system ID to ensure that the partition is registered correctly. Possible values include Linux, Linux swap, Linux LVM, Linux EVMS, and Linux RAID. For LVM and RAID details, refer to Section 7.1, “LVM Configuration” and Section 7.2, “Soft RAID Configuration”.

    File System

    Change the file system or format the partition here. Changing the file system or reformatting partitions irreversibly deletes all data from the partition . For details on the various file systems, refer to Chapter 25, File Systems in Linux.

    File System Options

    Set various parameters for the selected file system here. The defaults are acceptable for most situations.

    Encrypt File System

    If you activate the encryption, all data is written to the hard disk in encrypted form. This increases the security of sensitive data, but slightly reduces the system speed, because the encryption takes some time. More information about the encryption of file systems is provided in Chapter 47, Encrypting Partitions and Files.

    Fstab Options

    Specify various parameters contained in the global file system administration file (/etc/fstab). The default settings should suffice for most setups. You can, for example, change the file system identification from the device name to a volume label. In the volume label, use all characters except / and space.

    Mount Point

    Specify the directory at which the partition should be mounted in the file system tree. Select from various YaST proposals or enter any other name.

  3. Select OK+Apply to activate the partition.

8.5.7.4. Expert Options

Expert opens a menu containing the following commands:

Reread Partition Table

Rereads the partitioning from disk. For example, you need this after manual partitioning in the text console.

Delete Partition Table and Disk Label

This completely overwrites the old partition table. For example, this can be helpful if you have problems with unconventional disk labels. Using this method, all data on the hard disk is lost.

8.5.7.5. More Partitioning Tips

The following section comprises a few hints and tips on partitioning that should help you in taking the right decisions while setting up your system.

[Tip]Cylinder Numbers

Note, that different partitioning tools may start counting the cylinders of a partition with 0 or with 1. When calculating the number of cylinders, you should always use the difference between the last and the first cylinder number and add one.

If the partitioning is performed by YaST and other partitions are detected in the system, these partitions are also added to the /etc/fstab file to enable easy access to this data. This file contains all partitions in the system with their properties, such as the file system, mount point, and user permissions.

Example 8.1. /etc/fstab: Partition Data

/dev/sda1    /data1    auto      noauto,user 0 0
/dev/sda5    /data2    auto      noauto,user 0 0 
/dev/sda6    /data3    auto      noauto,user 0 0
   

The partitions, regardless of whether they are Linux or FAT partitions, are specified with the options noauto and user. This allows any user to mount or unmount these partitions as needed. For security reasons, YaST does not automatically enter the exec option here, which is needed for executing programs from the location. However, to run programs from there, you can enter this option manually. This measure is necessary if you encounter system messages such as bad interpreter or Permission denied.

8.5.7.6. Partitioning and LVM

From the expert partitioner, access the LVM configuration with LVM (see Section 7.1, “LVM Configuration”). However, if a working LVM configuration already exists on your system, it is automatically activated as soon as you enter the LVM configuration for the first time in a session. In this case, any disks containing a partition belonging to an activated volume group cannot be repartitioned because the Linux kernel cannot reread the modified partition table of a hard disk when any partition on this disk is in use. However, if you already have a functioning LVM configuration on your system, physical repartitioning should not be necessary. Instead, change the configuration of the logical volumes.

At the beginning of the physical volumes (PVs), information about the volume is written to the partition. To reuse such a partition for other non-LVM purposes, it is advisable to delete the beginning of this volume. For example, in the VG system and PV /dev/sda2, do this with the command dd if=/dev/zero of=/dev/sda2 bs=512 count=1.

[Warning]File System for Booting

The file system used for booting (the root file system or /boot) must not be stored on an LVM logical volume. Instead, store it on a normal physical partition.

8.5.8. PCI Device Drivers

[Tip]IBM System z: Continuing

For IBM System z, continue with Section 8.5.12, “System Services (Runlevel)”.

Each kernel driver contains a list of device IDs of all devices it supports. If a new device is not in any driver's database, the device is treated as unsupported, even if it can be used with an existing driver. With this YaST module from System section, you can add PCI IDs. Only advanced users should attempt to use this YaST module.

Figure 8.7. Adding a PCI ID

Adding a PCI ID

To add an ID, click Add and select how to assign it: by selecting a PCI device from a list or by manually entering PCI values. In the first option, select the PCI device from the provided list then enter the driver or directory name. If the directory is left empty, the driver name is used as the directory name. When assigning PCI ID values manually, enter the appropriate data to set up a PCI ID. Click OK to save your changes.

To edit a PCI ID, select the device driver from the list and click Edit. Edit the information and click OK to save your changes. To delete an ID, select the driver and click Delete. The ID immediately disappears from the list. When finished, click OK.

8.5.9. Power Management

The System+Power Management module helps you work with saving energy technologies. It is especially important on laptops to extend their operational time. Find detailed information about using this module in Section 28.6, “The YaST Power Management Module”.

8.5.10. Powertweak Configuration

Powertweak is a SUSE Linux utility for tweaking your system to peak performance by tuning some kernel and hardware configurations. It should be used only by advanced users. After starting it with System+Powertweak, it detects your system settings and lists them in tree form in the left frame of the module. You can also use Search to find a configuration variable. Select the option to tweak to display it on the screen along with its directory and settings. To save the settings, click Finish then confirm it by clicking OK.

8.5.11. Profile Manager

Create, manage, and switch among system configurations with System+Profile Management, the YaST system configuration profile management (SCPM) module. This is especially useful for mobile computers that are used in different locations (in different networks) and by different users. Nevertheless, this feature is useful even for stationary machines, because it enables the use of various hardware components or test configurations.

8.5.12. System Services (Runlevel)

Configure runlevels and the services that start in them with System+System Services (Runlevel). For more information about the runlevels in SUSE Linux Enterprise and a description of the YaST runlevel editor, refer to Section 20.2.3, “Configuring System Services (Runlevel) with YaST”.

8.5.13. /etc/sysconfig Editor

The directory /etc/sysconfig contains the files with the most important settings for SUSE Linux Enterprise. Use System+/etc/sysconfig Editor to modify the values and save them to the individual configuration files. Generally, manual editing is not necessary, because the files are automatically adapted when a package is installed or a service is configured. More information about /etc/sysconfig and the YaST sysconfig editor is available in Section 20.3.1, “Changing the System Configuration Using the YaST sysconfig Editor”.

8.5.14. Time and Date Configuration

The time zone is initially set during installation, but you can change it with System+Date and Time. Also use this to change the current system date and time.

To change the time zone, select the region in the left column and the location or time zone in the right column. With Hardware Clock Set To, set whether the system clock should use Local Time or UTC (Coordinated Universal Time). UTC is often used in Linux systems. Machines with additional operating systems, such as Microsoft Windows, mostly use local time.

Set the current system time and date with Change. In the dialog that opens, modify the time and date by entering new values or adjusting them with the arrow buttons. Press Apply to save the changes.

8.5.15. Language Selection

The primary and secondary languages for your system are set during installation. However, they can be changed at any time using System+Language. The primary language set in YaST applies to the entire system, including YaST and the desktop environment. This is the language you expect to use most of the time. Secondary languages are languages that are sometimes needed by users for a variety of purposes, such as desktop language or word processing.

Figure 8.8. Setting the Language

Setting the Language

Select the main language to use for your system in Primary Language. To adjust the keyboard or time zone to this setting, enable Adapt Keyboard Layout or Adapt Time Zone.

Set how locale variables are set for the root user with Details. Also use Details to set the primary language to a dialect not available in the main list. These settings are written into the file /etc/sysconfig/language.

8.6. Network Devices

All network devices connected to the system must be initialized before they can be used by a service. The detection and configuration of these devices is done in the module group Network Devices.

8.6.1. DSL, ISDN, Modem, or Network Card

To configure a DSL, ISDN, or network interface or a modem, select the appropriate module from the Network Devices section. For a device that is detected automatically, select it from the list then click Edit. If your device has not been detected, click Add and select it manually. To edit an existing device, select it then click Edit. For more detailed information, see Section 30.4, “Configuring a Network Connection with YaST”. For wireless network interfaces, see Chapter 29, Wireless Communication.

[Tip]CDMA and GPRS Modems

You can configure supported CDMA and GPRS modems as regular modems in the YaST modem module.

8.7. Network Services

This group contains tools to configure all kinds of services in the network. These include name resolution, user authentication, and file services.

8.7.1. Mail Transfer Agent

You can configure your mail settings in Network Services+Mail Transfer Agent if you send your e-mail with sendmail, postfix, or the SMTP server of your provider. You can fetch mail via the fetchmail program, for which you can also enter the details of the POP3 or IMAP server of your provider. Alternatively, use a mail program of your choice, such as KMail or Evolution, to set your access data. In this case, you do not need this module.

To configure your mail with YaST, specify the type of your connection to the Internet in the first dialog. Choose one of the following options:

Permanent

Select this option if you have a dedicated line to the Internet. Your machine is online permanently, so no dial-up is required. If your system is part of a local network with a central e-mail server, select this option to ensure permanent access to your e-mail messages.

Dial-Up

This item is relevant for users who have a computer at home, are not located in a network, and occasionally connect to the Internet.

No Connection

If you do not have access to the Internet and are not located in a network, you cannot send or receive e-mail.

Activate virus scanning for your incoming and outgoing e-mail with AMaViS by selecting that option. The package is installed automatically as soon as you activate the mail filtering feature. In the following dialogs, specify the outgoing mail server (usually the SMTP server of your provider) and the parameters for incoming mail. Set the diverse POP or IMAP servers for mail reception by various users. Using this dialog, you can also assign aliases, use masquerading, or set up virtual domains. Click Finish to exit the mail configuration.

8.7.2. Mail Server

[Important]LDAP-Based Mail Server Configuration

The mail server module of SUSE Linux Enterprise only works if the users, groups, and the DNS and DHCP services are managed with LDAP.

The mail server module allows configuration of SUSE Linux Enterprise as a mail server. YaST assists with the following steps of the configuration process:

Global Settings

Configures the identification of the local mail server and the maximum size of incoming or outgoing messages and the type of mail transport.

Local Delivery

Configures the type of local mail delivery.

Mail Transport

Configures special transport routes for mail depending on its target address.

SPAM Prevention

Configures the SPAM protection settings of the mail server. This activates the tool AMaViS. Set up the type and strictness of the SPAM check.

Mail Server Relaying

Determines from which networks the mail server cannot be used for sending nonlocal mail.

Fetching Mail

Configures mail pick-up from external mail accounts over various protocols.

Mail Server Domains

This determines for which domains the mail server should be responsible. At least one master domain must be configured if the server should not run as a null client used exclusively for sending mail without receiving any.

Distinguish among three domain types:

main

Main or master domain of the local mail server

local

All users who can receive mail in a master domain can also receive mail in a local domain. In the case of a message within the local domain, only the portion before the @ is evaluated.

virtual

Only users with an explicit address within a virtual domain receive mail. Virtual mail addresses are set up in the user management module of YaST.

8.7.3. Other Available Services

Many other network modules are available in YaST Network Services.

DHCP Server

Use this to set up a custom DHCP server in only a few steps. Chapter 34, DHCP provides basic knowledge about the subject and a step-by-step description of the configuration process.

DNS Server

Configuring a DNS server that is responsible for name resolution is recommended for larger networks. You can use DNS Server for this as described in Section 33.2, “Configuration with YaST”. Chapter 33, The Domain Name System provides background information about DNS.

DNS and Hostname

Use this module to configure the hostname and DNS if these settings were not already made while configuring the network devices. Also use it to change the hostname and domain name. If the provider has been configured correctly for DSL, modem, or ISDN access, the list of name servers contains the entries that were extracted automatically from the provider data. If you are located in a local network, you might receive your hostname via DHCP, in which case you should not modify the name.

HTTP Server

To run your own Web server, configure Apache in HTTP Server. Find more information in Chapter 40, The Apache HTTP Server.

Hostnames

When booting and in small networks, you can use Hostnames for hostname resolution instead of DNS. The entries in this module reflect the data of the file /etc/hosts. For more information, read Section 30.7.1.6, “ /etc/hosts.

Kerberos Client

If you have a Kerberos server in your network for network authentication, use Kerberos Client. A detailed description of the client configuration with YaST is available in Section 46.6, “Configuring a Kerberos Client with YaST”.

LDAP Client

If using LDAP for user authentication in the network, configure the client in LDAP Client. Information about LDAP and a detailed description of the client configuration with YaST are available in Section 36.6, “Configuring an LDAP Client with YaST”.

LDAP Server

The LDAP server can keep various data in a central directory and distribute it to all clients in your network. Mostly it is used to store shared contact information but its function is not limited to that. An LDAP server can be used also for authentication. Information about LDAP and a detailed description of the server configuration with YaST are available in Chapter 36, LDAP—A Directory Service.

NFS Client

With NFS client, mount directories provided by NFS server in your own file trees. Use NFS Client to configure your system to access an NFS server in the network.

NFS Server

With NFS, run a file server that all members of your network can access. This file server can be used to make certain applications, files, and storage space available to users. In NFS Server, you can configure your host as an NFS server and determine the directories to export for general use by the network users. All users with the appropriate permissions can mount these directories in their own file trees. A description of the YaST module and background information about NFS are provided in Chapter 38, Sharing File Systems with NFS.

NIS Client

If you run NIS server to administer user data on a central place and distribute it to the clients, configure the client here. Detailed information about NIS client and configuration with YaST is available in Section 35.2, “Configuring NIS Clients”.

NIS Server

If you run more than one system, local user administration (using the files /etc/passwd and /etc/shadow) is impractical and requires a lot of maintenance. In this case, administer user data on a central server and distribute it to the clients from there. NIS is one option for this. Detailed information about NIS and its configuration with YaST is available in Section 35.1.1, “Configuring a NIS Master Server”.

NTP Client

NTP (network time protocol) is a protocol for synchronizing hardware clocks over a network. Information about NTP and instructions for configuring it with YaST are available in Chapter 32, Time Synchronization with NTP.

Network Services (xinetd)

Configure the network services (such as finger, talk, and ftp) to start when SUSE Linux Enterprise boots using Network Services. These services enable external hosts to connect to your computer. Various parameters can be configured for every service. By default, the master service that manages the individual services (inetd or xinetd) is not started.

When this module starts, choose whether to start inetd or xinetd. The selected daemon can be started with a standard selection of services. Alternatively, compose your own selection of services with Add, Delete, and Edit.

[Warning]Configuring Network Services (xinetd)

The composition and adjustment of network services on a system is a complex procedure that requires a comprehensive understanding of the concept of Linux services. The default settings are usually sufficient.

Proxy

Configure Internet proxy client settings in Proxy. Click Enable Proxy then enter the desired proxy settings. You can test these settings by clicking Test Proxy Settings. A small window informs you whether your proxy settings work correctly. After your settings have been entered and tested, save them by clicking Accept.

Remote Administration

To administer your machine remotely from another machine, use Remote Administration. To maintain your system remotely, use a VNC client, such as krdc, or a Java-enabled browser. Although remote administration using VNC is simple and fast, it is less secure than using SSH, so you should always keep this in mind when using a VNC server. Find detailed information about installing with a VNC client in Section 4.1.1, “Simple Remote Installation via VNC—Static Network Configuration”.

Allow remote administration by selecting Allow Remote Administration in Remote Administration Settings. Selecting Do Not Allow Remote Administration disables this function. Click Open Port in Firewall to allow access to your computer. Clicking Firewall Details displays network interfaces with open ports in the firewall. Select the desired interface and click OK to return to the main dialog. Click Accept to complete the configuration.

The YaST Remote Administration module is highly recommended for configuring VNC on your machine. Although the SaX2 interface also allows you to set remote access properties, it is not a substitute for YaST. It only enables you to configure your X server as a host for VNC sessions.

Routing

Use Routing to configure the paths data takes over the network. In most cases, only enter the IP address of the system through which to send all data in Default Gateway. To create more complicated configurations, use Expert Configuration.

Samba Server

In a heterogeneous network consisting of Linux and Windows hosts, Samba controls the communication between the two worlds. Information about Samba and the configuration of servers is provided in Chapter 37, Samba.

SLP Server

With service location protocol (SLP), you can configure clients in your network without knowledge of server names and services that these servers provide. Detailed information about SLP servers and configuration with YaST are described in Chapter 31, SLP Services in the Network.

TFTP Server

A TFTP server in not an FTP server. While an FTP server uses the File Transfer Protocol (FTP), a TFTP server uses the much simpler Trivial File Transfer Protocol (TFTP) without security features. TFTP servers are usually used to boot diskless workstations, X terminals, and routers. Detailed information about TFTP servers and configuration with YaST are described in Section 4.3.2, “Setting Up a TFTP Server”.

WOL

WOL (wake on LAN) refers to the possibility of waking up a computer from standby mode over the network using special packages. It only works with motherboards that support this functionality in their BIOS. WOL configuration with YaST is described in Section 4.3.7, “Wake on LAN”.

Windows Domain Membership

In a heterogeneous network consisting of Linux and Windows hosts, Samba controls the communication between the two worlds. With the Samba Client module, you can configure your computer as member of a Windows domain. Find information about Samba and the configuration of clients in Chapter 37, Samba.

iSCSI Target

iSCSI technology provides an easy and reasonably inexpensive solution for connecting Linux computers to central storage systems. To configure the server side, use Miscellaneous+iSCSI Target. Find more information about configuration of iSCSI with YaST in Chapter 12, Mass Storage over IP Networks—iSCSI .

iSCSI Initiator

To configure a connection to central storage, use Miscellaneous+iSCSI Initiator. Find more information about configuration of iSCSI with YaST in Chapter 12, Mass Storage over IP Networks—iSCSI .

8.8. AppArmor

Novell AppArmor is designed to provide easy-to-use application security for both servers and workstations. Novell AppArmor is an access control system that lets you specify which files each program may read, write, and execute. To enable or disable Novell AppArmor on your system, use AppArmor Control Panel. Information about Novell AppArmor and a detailed description of the configuration with YaST are available in Novell AppArmor Administration Guide (↑Novell AppArmor Administration Guide).

8.9. Security and Users

A basic aspect of Linux is its multiuser capability. Consequently, several users can work independently on the same Linux system. Each user has a user account identified by a login name and a personal password for logging in to the system. All users have their own home directories where personal files and configurations are stored.

8.9.1. User Management

Create and edit users with Security and Users+User Management. It provides an overview of users in the system, including NIS, LDAP, Samba, and Kerberos users if requested. If you are part of an extensive network, click Set Filter to list all users categorically. You can also customize the filter settings by clicking Customize Filter.

[Tip]Applying Configuration Changes without Closing the Module

Whenever you need to make multiple configuration changes and want to avoid restarting the user and group configuration module for every single one of these changes, use Write Changes Now to save your changes without exiting the configuration module.

8.9.1.1. Adding Users

To add a new user, proceed as follows:

  1. Click Add.

  2. Enter the necessary data for User Data. If you do not need to adjust any more detailed settings for this new user, proceed to Step 5.

  3. To change a user's ID, home directory name, default home, group, group memberships, directory permissions, or login shell, open the Details tab and change the default values.

  4. To adjust user's password expiration, length, and expiration warnings, use the Password Settings tab.

  5. Write the user account configuration by clicking Accept.

The new user can immediately log in with the created login name and password.

8.9.1.2. Deleting Users

To delete a user, proceed as follows:

  1. Select the user from the list.

  2. Click Delete.

  3. Determine whether to delete or keep the home directory of the user to delete.

  4. Click Yes to apply your settings.

8.9.1.3. Changing the Login Configuration

To change the login configuration, proceed as follows:

  1. Select the user from the list.

  2. Click Edit.

  3. Adjust the settings under User Data, Details, and Password Settings.

  4. Save the user account configuration by clicking Accept.

8.9.1.4. Managing Encrypted Home Directories

You can create an encrypted home directory as part of the user account creation. To create an encrypted home directory for a user, proceed as follows:

  1. Click Add.

  2. Enter the required data for User Data.

  3. In the Details tab, activate Use Encrypted Home Directory.

  4. Apply your settings with Accept.

To create an encrypted home for an existing user, proceed as follows:

  1. Select a user from the list and click Edit.

  2. In the Details tab, enable Use Encrypted Home Directory.

  3. Enter the password of the selected user.

  4. Apply your settings with Accept.

To disable the encryption of home directories, proceed as follows:

  1. Select a user from the list and click Edit.

  2. In the Details tab, disable Use Encrypted Home Directory.

  3. Enter the password of the selected user.

  4. Apply your settings with Accept.

For more information about encrypted homes, see Section 47.2, “Using Encrypted Home Directories”.

8.9.1.5. Auto Login

[Warning]Using Auto Login

Using the auto login feature on any system that can be physically accessed by more than one person is a potential security risk. Any user accessing this system can manipulate the data on it. If your system contains confidential data, do not use the auto login functionality.

If you are the only user of your system, you can configure auto login. It automatically logs a user into the system after start. Only one selected user can use the auto login function. Auto login works only with KDM or GDM.

To activate auto login, select the user from the list of users and click Expert Options+Login Settings. Then choose Auto Login and click OK.

To deactivate this functionality, select the user and click Expert Options+Login Settings. Then uncheck Auto Login and click OK.

8.9.1.6. Login without a Password

[Warning]Allowing Login without a Password

Using the passwordless login feature on any system that can be physically accessed by more than one person is a potential security risk. Any user accessing this system can manipulate the data on it. If your system contains confidential data, do not use this functionality.

Login without a password automatically logs a user into the system after the user enters the username in the login manager. It is available to multiple users on a system and works only with KDM or GDM.

To activate the function, select the user from the list of users and click Expert Options+Login Settings. Then choose Passwordless Login and click OK.

To deactivate this function, select the user for whom to disable this functionality from the list of users and click Expert Options+Login Settings. Then uncheck Passwordless Login and click OK.

8.9.1.7. Disabling User Login

To create a system user that should not be able to log in to the system but under whose identity several system-related tasks should be managed, disable the user login when creating the user account. Proceed as follows:

  1. Click Add.

  2. Enter the required data for User Data.

  3. Check Disable User Login.

  4. Apply your settings with Accept.

To disable login for an existing user, proceed as follows:

  1. Select the user from the list and click Edit.

  2. Check Disable User Login in User Data.

  3. Apply your settings with Accept.

8.9.1.8. Enforcing Password Policies

On any system with multiple users, it is a good idea to enforce at least basic password security policies. Users should change their passwords regularly and use strong passwords that cannot easily be exploited. For information about how to enforce stricter password rules, refer to Section 8.9.3, “Local Security”. To enforce password rotation, create a password expiration policy.

To configure the password expiration policy for a new user, proceed as follows:

  1. Click Add.

  2. Enter the required data in User Data.

  3. Adjust the values in Password Settings.

  4. Apply your settings with Accept.

To change the password expiration policy for an existing user, proceed as follows:

  1. Select the user from the list and click Edit.

  2. Adjust the values in Password Settings.

  3. Apply your settings with Accept.

You can limit the lifetime of any user account by specifying a date of expiration for this particular account. Specify the Expiration Date in the YYYY-MM-DD format and leave the user configuration. If no Expiration Date is given, the user account never expires.

8.9.1.9. Changing the Default Settings for New Users

When creating new local users, several defaults settings are used by YaST. You can change these default settings to meet your requirements:

  1. Select Expert Options+Defaults for New Users.

  2. Apply your changes to any or all of the following items:

    • Default Group

    • Secondary Groups

    • Default Login Shell

    • Path Prefix for Home Directory

    • Skeleton for Home Directory

    • Umask for Home Directory

    • Default Expiration Date

    • Days after Password Expiration Login is Usable

  3. Apply your changes with Accept.

Several other security-related default settings can be changed using the Local Security module. Refer to Section 8.9.3, “Local Security” for information.

8.9.1.10. Changing the Password Encryption

[Note]

Changes in password encryption apply only to local users.

SUSE Linux Enterprise can use DES, MD5, or Blowfish for password encryption. The default password encryption method is Blowfish. The encryption method is set during installation of the system, as described in Section 3.14.1, “Password for the System Administrator root. To change the password encryption method in the installed system, select Expert Options+Password Encryption.

8.9.1.11. Changing the Authentication and User Sources

The user administration method (such as NIS, LDAP, Kerberos, or Samba) is set during installation, as described in Section 3.14.7, “Users”. To change the user authentication method in the installed system, select Expert Options+Authentication and User Sources. The module provides a configuration overview and the option to configure the client. Advanced client configuration is also possible using this module.

8.9.2. Group Management

To create and edit groups, select Security and Users+Group Management or click Groups in the user administration module. Both dialogs have the same functionality, allowing you to create, edit, or delete groups.

The module gives an overview of all groups. As in the user management dialog, change filter settings by clicking Set Filter.

To add a group, click Add and enter the appropriate data. Select group members from the list by checking the corresponding box. Click Accept to create the group. To edit a group, select the group to edit from the list and click Edit. Make all necessary changes then save them with Accept. To delete a group, simply select it from the list and click Delete.

Click Expert Options for advanced group management. Find more about these options in Section 8.9.1, “User Management”.

8.9.3. Local Security

To apply a set of security settings to your entire system, use Security and Users+Local Security. These settings include security for booting, login, passwords, user creation, and file permissions. SUSE Linux Enterprise offers three preconfigured security sets: Home Workstation, Networked Workstation, and Network Server. Modify the defaults with Details. To create your own scheme, use Custom Settings.

The detailed or custom settings include:

Password Settings

To have new passwords checked by the system for security before they are accepted, click Check New Passwords and Test for Complicated Passwords. Set the minimum password length for newly created users. Define the period for which the password should be valid and how many days in advance an expiration alert should be issued when the user logs in to the text console.

Boot Settings

Set how the key combination Ctrl+Alt+Del should be interpreted by selecting the desired action. Normally, this combination, when entered in the text console, causes the system to reboot. Do not modify this setting unless your machine or server is publicly accessible and you are afraid someone could carry out this action without authorization. If you select Stop, this key combination causes the system to shut down. With Ignore, this key combination is ignored.

If you use the KDE login manager (KDM), set permissions for shutting down the system in Shutdown Behavior of KDM. Give permission to Only root (the system administrator), All Users, Nobody, or Local Users. If Nobody is selected, the system can only be shut down from the text console.

Login Settings

Typically, following a failed login attempt, there is a waiting period lasting a few seconds before another login is possible. This makes it more difficult for password sniffers to log in. Optionally activate Record Successful Login Attempts. If you suspect someone is trying to discover your password, check the entries in the system log files in /var/log. To grant other users access to your graphical login screen over the network, enable Allow Remote Graphical Login. Because this access possibility represents a potential security risk, it is inactive by default.

User Addition

Every user has a numerical and an alphabetical user ID. The correlation between these is established using the file /etc/passwd and should be as unique as possible. Using the data in this screen, define the range of numbers assigned to the numerical part of the user ID when a new user is added. A minimum of 500 is suitable for users. Automatically generated system users start with 1000. Proceed in the same way with the group ID settings.

Miscellaneous Settings

To use predefined file permission settings, select Easy, Secure, or Paranoid. Easy should be sufficient for most users. The setting Paranoid is extremely restrictive and can serve as the basic level of operation for custom settings. If you select Paranoid, remember that some programs might not work correctly or even at all, because users no longer have permission to access certain files.

Also set which user should launch the updatedb program, if installed. This program, which automatically runs on a daily basis or after booting, generates a database (locatedb) in which the location of each file on your computer is stored. If you select Nobody, any user can find only the paths in the database that can be seen by any other (unprivileged) user. If root is selected, all local files are indexed, because the user root, as superuser, may access all directories. Make sure that the options Current Directory in root's Path and Current Directory in Path of Regular Users are deactivated. Only advanced users should consider using these options because these settings may pose a significant security risk if used incorrectly. To have some control over the system even if it crashes, click Enable Magic SysRq Keys.

Click Finish to complete your security configuration.

8.9.4. Certificate Management

Certificates are used for communication and can also be found, for example, on company ID cards. To manage them or import a common server certificate, use Security and Users+CA Management. Detailed information about certificates, their technologies, and management with YaST are provided in Chapter 42, Managing X.509 Certification.

8.9.5. Firewall

SuSEfirewall2 can protect your machine against attacks from the Internet. Configure it with Security and Users+Firewall. Find detailed information about SuSEfirewall2 in Chapter 43, Masquerading and Firewalls.

[Tip]Automatic Activation of the Firewall

YaST automatically starts a firewall with suitable settings on every configured network interface. Start this module only if you want to reconfigure the firewall with custom settings or deactivate it.

8.10. Virtualization

Virtualization makes it possible to run several operating systems on one physical machine. The hardware for the different systems is provided virtually. Virtualization YaST modules provide configuration for the Xen virtualization system. For more information about this technology, see the virtualization manual on http://www.novell.com/documentation/sles10/index.html..

The following modules are available in the Virtualization section:

Installing Hypervisor and Tools

Before you start using Xen, install a kernel with Xen support and related tools. To install them, use Virtualization+Install Hypervisor and Tools. After installation reboot your system to use the Xen kernel.

Creating Virtual Machines

After you successfully installed the Xen hypervisor and tools, you can install virtual machines on your virtual server. To install a virtual machine, use Virtualization+Create Virtual Machines.

8.11. Miscellaneous

The YaST Control Center has several modules that cannot easily be classified into the first six module groups. They can be used for things like viewing log files and installing drivers from a vendor CD.

8.11.1. Custom Installation CD Creation

With Miscellaneous+CD Creator, you can create a customized installation CD from your original installation set. To start creation, click Add. Use the package manager to select the packages or an AutoYaST control file to use a preconfigured AutoYaST profile for creation.

8.11.2. Installation Server Configuration

For network installation, an installation server is required. To configure such a server, use Miscellaneous+Installation Server. Find more information about the configuration of an installation server with YaST in Section 4.2.1, “Setting Up an Installation Server Using YaST”.

8.11.3. Autoinstallation

The AutoYaST tool is intended for automated installation. In Miscellaneous+Autoinstallation, prepare profiles for this tool. Find detailed information about automated installation with AutoYaST in Chapter 5, Automated Installation. The information about using the Autoinstallation module is in Section 5.1.1, “Creating an AutoYaST Profile”.

8.11.4. Support Query

Miscellaneous+Support Query offers the possibility to collect all system information needed by the support team to find your problem so you can get help to solve it as soon is possible. Regarding your query, select the problem category in the following window. When all information is gathered, attach it to your support request.

8.11.5. Release Notes

The release notes are an important source about installation, update, configuration, and technical issues. The release notes are continuously updated and published through online update. Use Miscellaneous+Release Notes to view the release notes.

8.11.6. Start-Up Log

View information concerning the start-up of the computer in Miscellaneous+Start-Up Log. This is one of the first places you might want to look when encountering problems with the system or when troubleshooting. It shows the boot log /var/log/boot.msg, which contains the screen messages displayed when the computer starts. Viewing the log can help determine if the computer started properly and if all services and functions were started correctly.

8.11.7. System Log

Use Miscellaneous+System Log to view the system log that keeps track of the operations of your computer in var/log/messages. Kernel messages, sorted according to date and time, are also recorded here. View the status of certain system components using the box at the top. The following options are possible from the system log and boot log modules:

/var/log/messages

This is the general system log file. Here, view kernel messages, users logging in as root, and other useful information.

/proc/cpuinfo

This displays processor information, including its type, make, model, and performance.

/proc/dma

This shows which DMA channels are currently being used.

/proc/interrupts

This shows which interrupts are in use and how many of each have been in use.

/proc/iomem

This displays the status of input/output memory.

/proc/ioports

This shows which I/O ports are in use at the moment.

/proc/meminfo

This displays memory status.

/proc/modules

This displays the individual modules.

/proc/mounts

This displays devices currently mounted.

/proc/partitions

This shows the partitioning of all hard disks.

/proc/version

This displays the current version of Linux.

/var/log/YaST2/y2log

This displays all YaST log messages.

/var/log/boot.msg

This displays information concerning the start-up of the system.

/var/log/faillog

This displays login failures.

/var/log/warn

This displays all system warnings.

8.11.8. Vendor Driver CD

Install device drivers from a Linux driver CD that contains drivers for SUSE Linux Enterprise with Miscellaneous+Vendor Driver CD. When installing SUSE Linux Enterprise from scratch, use this YaST module to load the required drivers from the vendor CD after the installation.

8.12. YaST in Text Mode

This section is intended for system administrators and experts who do not run an X server on their systems and depend on the text-based installation tool. It provides basic information about starting and operating YaST in text mode.

When YaST is started in text mode, the YaST Control Center appears first. See Figure 8.9, “Main Window of YaST in Text Mode”. The main window consists of three areas. The left frame, which is surrounded by a thick white border, features the categories to which the various modules belong. The active category is indicated by a colored background. The right frame, which is surrounded by a thin white border, provides an overview of the modules available in the active category. The bottom frame contains the buttons for Help and Exit.

Figure 8.9. Main Window of YaST in Text Mode

Main Window of YaST in Text Mode

When the YaST Control Center is started, the category Software is selected automatically. Use and to change the category. To start a module from the selected category, press . The module selection now appears with a thick border. Use and to select the desired module. Keep the arrow keys pressed to scroll through the list of available modules. When a module is selected, the module title appears with a colored background and a brief description is displayed in the bottom frame.

Press Enter to start the desired module. Various buttons or selection fields in the module contain a letter with a different color (yellow by default). Use Alt-yellow_letter to select a button directly instead of navigating there with Tab. Exit the YaST Control Center by pressing Alt-Q or by selecting Quit and pressing Enter.

8.12.1. Navigation in Modules

The following description of the control elements in the YaST modules assumes that all function keys and Alt key combinations work and are not assigned different global functions. Read Section 8.12.2, “Restriction of Key Combinations” for information about possible exceptions.

Navigation among Buttons and Selection Lists

Use Tab and Alt-Tab or Shift-Tab to navigate among the buttons and the frames containing selection lists.

Navigation in Selection Lists

Use the arrow keys ( and ) to navigate among the individual elements in an active frame containing a selection list. If individual entries within a frame exceed its width, use Shift- or Shift- to scroll horizontally to the right and left. Alternatively, use Ctrl-E or Ctrl-A. This combination can also be used if using or would result in changing the active frame or the current selection list, as in the Control Center.

Buttons, Radio Buttons, and Check Boxes

To select buttons with empty square brackets (check boxes) or empty parentheses (radio buttons), press Space or Enter. Alternatively, radio buttons and check boxes can be selected directly with Alt-yellow_letter. In this case, you do not need to confirm with Enter. If you navigate to an item with Tab, press Enter to execute the selected action or activate the respective menu item.

Function Keys

The F keys (F1 to F12) enable quick access to the various buttons. Which function keys are actually mapped to which buttons depends on the active YaST module, because the different modules offer different buttons (Details, Info, Add, Delete, etc.). Use F10 for OK, Next, and Finish. Press F1 to access the YaST help, which shows the functions mapped to the individual F keys.

Figure 8.10. The Software Installation Module

The Software Installation Module

8.12.2. Restriction of Key Combinations

If your window manager uses global Alt combinations, the Alt combinations in YaST might not work. Keys like Alt or Shift can also be occupied by the settings of the terminal.

Replacing Alt with Esc

Alt shortcuts can be executed with Esc instead of Alt. For example, Esc H replaces Alt-H. (First press Esc, then press H.)

Backward and Forward Navigation with Ctrl-F and Ctrl-B

If the Alt and Shift combinations are occupied by the window manager or the terminal, use the combinations Ctrl-F (forward) and Ctrl-B (backward) instead.

Restriction of Function Keys

The F keys are also used for functions. Certain function keys might be occupied by the terminal and may not be available for YaST. However, the Alt key combinations and function keys should always be fully available on a pure text console.

8.13. Managing YaST from the Command Line

When a task only needs to be done once, the graphical or ncurses interface is usually the best solution. If a task needs to be done repeatedly, it might be easier to use the YaST command line interface. Custom scripts can also use this interface for automating tasks.

View a list of all module names available on your system with yast -l or yast --list. To display the available options of a module, enter yast module_name help. If a module does not have a command line mode, a message informs you of this.

To display help for a module's command options, enter yast module_name command help. To set the option value, enter yast module_name command option=value.

Some modules do not support the command line mode because command line tools with the same functionality already exist. The modules concerned and the command line tools available are:

sw_single

sw_single provides package management and system update functionality. Use rug instead of YaST in your scripts. Refer to Section 9.1, “Update from the Command Line with rug”.

online_update_setup

online_update_setup configures automatic updating of your system. This can be configured with cron.

inst_suse_register

With inst_suse_register, register your SUSE Linux Enterprise. For more information about the registration, see Section 8.3.4, “Registering SUSE Linux Enterprise”.

hwinfo

hwinfo provides information about the hardware of your system. The command hwinfo does the same.

GenProf, LogProf, SD_AddProfile, SD_DeleteProfile, SD_EditProfile, SD_Report, and subdomain

These modules control or configure AppArmor. AppArmor has its own command line tools.

8.13.1. Managing Users

The YaST commands for user management, unlike traditional commands, considers the configured authentication method and default user management settings of your system when creating, modifying, or removing users. For example, you do not need create home directory or copy skel files during or after the user addition. If you enter the username and password, all other settings are made automatically in accordance with default configuration. The functionality provided by the command line is the same as in the graphical interface.

The YaST module users is used for user management. To display the command options, enter yast users help.

To add multiple users, create a /tmp/users.txt file with a list of users to add. Enter one username per line and use the following script:

Example 8.2. Adding Multiple Users

  #!/bin/bash
  # 
  # adds new user, the password is same as username
  #
  
  for i in `cat /tmp/users.txt`;
  do
   yast users add username=$i password=$i
  done
 

Similarly to adding, you can delete users defined in /tmp/users.txt:

Example 8.3. Removing Multiple Users

  #!/bin/bash
  #
  # the home will be not deleted
  # to delete homes, use option delete_home
  #
  
  for i in `cat /tmp/users.txt`;
  do
  yast users delete username=$i
  done
 

8.13.2. Configuring the Network and Firewall

Network and firewall configuration commands are often wanted in scripts. Use yast lan for network configuration and yast firewall.

To display the YaST network card configuration options, enter yast lan help. To display the YaST firewall card configuration options, enter yast firewall help. The network and firewall configurations with YaST are persistent. After reboot, it is not necessary to execute scripts again.

To display a configuration summary for the network, use yast lan list. The first item in the output of Example 8.4, “Sample Output of yast lan list is a device ID. To get more information about the configuration of the device, use yast lan show id=<number>. In this example, the correct command is yast lan show id=0.

Example 8.4. Sample Output of yast lan list

   0       Digital DECchip 21142/43, DHCP
  

The command line interface of the YaST firewall configuration is a fast and easy way to enable or disable services, ports, or protocols. To display allowed services, ports, and protocols, use yast firewall services show. For examples of how to enable a service or port, use yast firewall services help. To enable masquerading, enter yast firewall masquerade enable.

8.14. SaX2

Configure the graphical environment of your system with Hardware+Graphics Card and Monitor. This opens the SUSE Advanced X11 Configuration interface (SaX2), where you can configure devices such as your mouse, keyboard, or display devices. This interface can also accessed from the GNOME main menu with Computer+More Applications+System+Sax2 or the KDE main menu with System+Configuration+SaX2.

8.14.1. Card and Monitor Properties

Adjust the settings for your graphics card and display device in Card and Monitor Properties. If you have more than one graphics card installed, each device is shown in a separate dialog reachable by a tab. At the top of the dialog, see the current settings for the selected graphics card and the monitor that is attached to it. If more than one screen can be connected to the card (dual head), the monitor on the primary output is shown. Normally, the card and display device are detected automatically by the system during installation. However, you can tune many parameters manually or even change the display device completely.

Figure 8.11. Card and Monitor Properties

Card and Monitor Properties

[Tip]Autodetecting New Display Hardware

If you change your display hardware after installation, use sax2 -r on the command line to cause SaX2 to detect your hardware. You must be root to run SaX2 from the command line.

8.14.1.1. Graphics Card

It is not possible to change the graphics card because only known models are supported and these are detected automatically. However, you can change many options that affect the behavior of the card. Normally, this should not be necessary because the system already has set them up appropriately during installation. If you are an expert and want to tweak some of the options, click Options next to the graphics card and select the option to change. To assign a value needed to a certain option, enter this value in the dialog that appears after selecting that option. Click OK to close the options dialog.

8.14.1.2. Monitor

To change the current settings for the monitor, click Change next to the monitor. A new dialog opens in which to adjust various monitor-specific settings. This dialog has several tabs for various aspects of monitor operation. Select the first tab to manually select the vendor and model of the display device in two lists. If your monitor is not listed, you can choose one of the VESA or LCD modes that suit your needs or, if you have a vendor driver disk or CD, click Utility Disk and follow the instructions on the screen to use it. Check Activate DPMS to use display power management signaling. Display Size, with the geometrical properties of the monitor, and Sync Frequencies, with the ranges for the horizontal and vertical sync frequencies of your monitor, are normally set up correctly by the system, but you can modify these values manually. After making all adjustments, click OK to close this dialog.

[Warning]Changing Monitor Frequencies

Although there are safety mechanisms, you should still be very careful when changing the allowed monitor frequencies manually. Incorrect values might destroy your monitor. You should always refer to the monitor's manual before changing frequencies.

8.14.1.3. Resolution and Color Depth

The resolution and color depth can be chosen directly from two lists in the middle of the dialog. The resolution you select here marks the highest resolution to use. All common resolutions down to 640x480 are also added to the configuration automatically. Depending on the graphical desktop used, you can switch to any of these later without the need for reconfiguration.

8.14.1.4. Dual Head

If you have a graphics card with two outputs installed in your computer, you can connect two screens to your system. Two screens that are attached to the same graphics card are referred to as dual head. SaX2 automatically detects multiple display devices in the system and prepares the configuration accordingly. To use the dual head mode of a graphics card, check Activate Dual Head Mode at the bottom of the dialog and click Configure to set the dual head options and the arrangement of the screens in the dual head dialog.

The tabs in the row at the top of the dialog each correspond to a graphics card in your system. Select the card to configure and set its multihead options in the dialog below. In the upper part of the multihead dialog, click Change to configure the additional screen. The possible options are the same as for the first screen. Choose the resolution to use for this screen from the list. Select one of three possible multihead modes.

Cloned Multihead

In this mode, all monitors display the same contents. The mouse is only visible on the main screen.

Xinerama Multihead

All screens combine to form a single large screen. Program windows can be positioned freely on all screens or scaled to a size that fills more than one monitor.

[Note]

Linux currently does not offer 3D support for Xinerama multihead environments. In this case, SaX2 deactivates the 3D support.

The arrangement of the dual head environment describes the sequence of the individual screens. By default, SaX2 configures a standard layout that follows the sequence of the detected screens, arranging all screens in a row from left to right. In the Arrangement part of the dialog, determine the way the monitors are arranged by selecting one of the sequence buttons. Click OK to close the dialog.

[Tip]Using a Beamer with Laptop Computers

To connect a beamer to a laptop computer, activate dual head mode. In this case, SaX2 configures the external output with a resolution of 1024x768 and a refresh rate of 60 Hz. These values suit most beamers very well.

8.14.1.5. Multihead

If you have more than one graphics card installed in your computer, you can connect more than one screen to your system. Two or more screens that are attached to different graphics cards are referred to as multihead. SaX2 automatically detects multiple graphics cards in the system and prepares the configuration accordingly. By default, SaX2 configures a standard layout that follows the sequence of the detected graphics cards, arranging all screens in a row from left to right. The additional Arrangement tab allows for changing this layout manually. Drag the icons representing the individual screens in the grid and click OK to close the dialog.

8.14.1.6. Testing the Configuration

Click OK in the main window after completing the configuration of your monitor and your graphics card, then test your settings. This ensures that your configuration is suitable for your devices. If the image is not steady, terminate the test immediately by pressing Ctrl+Alt+Backspace and reduce the refresh rate or the resolution and color depth.

[Note]

Regardless of whether you run a test, all modifications are only activated when you restart the X server.

8.14.2. Mouse Properties

Adjust the settings for your mouse in Mouse Properties. If you have more than one mouse with different drivers installed, each driver is shown in a separate tab. Multiple devices operated by the same driver are shown as one mouse. Activate or deactivate the currently selected mouse with the check box at the top of the dialog. Below the check box, see the current settings for that mouse. Normally, the mouse is detected automatically, but you can change it manually if the automatic detection fails. Refer to the documentation for your mouse for a description of the model. Click Change to select the vendor and model from two lists then click OK to confirm your selection. In the options part of the dialog, set various options for operating your mouse.

Activate 3-Button Emulation

If your mouse has only two buttons, a third button is emulated when you click both buttons simultaneously.

Activate Mouse Wheel

Check this box to use a scroll wheel.

Invert X-Axis and Invert Y-Axis

If one of these options is selected, the mouse pointer moves in the opposite direction. For touch pads, this feature is sometimes useful.

Emulate Wheel with Mouse Button

If your mouse does not have a scroll wheel but you want to use similar functionality, you can assign an additional button for this. Select the button to use. While pressing this button, any movement of the mouse is translated into scroll wheel commands. This feature is especially useful with trackballs.

When you are satisfied with your settings, click OK to confirm your changes.

[Note]

Any changes you make here take effect only after you restart the X server.

8.14.3. Keyboard Properties

Use this dialog to adjust the settings for operating your keyboard in the graphical environment. In the upper part of the dialog, select the type, language layout, and variant. Use the test field at the bottom of the dialog to check if special characters are displayed correctly. Select additional layouts and variants to use from the list in the middle. Depending on the type of your desktop, these may be switched in the running system without the need for reconfiguration. After you click OK, the changes are applied immediately.

8.14.4. Tablet Properties

Use this dialog to configure a graphics tablet attached to your system. Click the Graphics Tablet tab to select vendor and model from the lists. Currently, only a limited number of graphics tablets is supported. To activate the tablet, check Activate This Tablet at the top of the dialog.

In the Port and Mode dialog, configure the connection to the tablet. SaX2 enables the configuration of graphics tablets connected to the USB port or the serial port. If your tablet is connected to the serial port, verify the port. /dev/ttyS0 refers to the first serial port. /dev/ttyS1 refers to the second. Additional ports use similar notation. Choose appropriate Options from the list and select the Primary Tablet Mode suitable for your needs.

If your graphics tablet supports electronic pens, configure them in Electronic Pens. Add eraser and pen and set their properties after clicking Properties.

When you are satisfied with the settings, click OK to confirm your changes.

8.14.5. Touchscreen Properties

Use this dialog to configure touchscreens attached to your system. If you have more than one touchscreen installed, each device is shown in a separate dialog reachable by a tab. To activate the currently selected touchscreen, check Assign a Touchscreen to Display at the top of the dialog. Select vendor and model from the lists below and set an appropriate Connection Port at the bottom. You can configure touchscreens connected to the USB port or the serial port. If your touchscreen is connected to the serial port, verify the port. /dev/ttyS0 refers to the first serial port. /dev/ttyS1 refers to the second. Additional ports use similar notation. When you are satisfied with your settings, click OK to confirm your changes.

8.15. Troubleshooting

All error messages and alerts are logged in the directory /var/log/YaST2. The most important file for finding YaST problems is y2log.

8.16. For More Information

More information about YaST can be found on the following Web sites and directories: