SUSE Linux Enterprise Desktop

Legal Notice

Contents

About This Guide
1. Feedback
2. Documentation Updates
3. Additional Documentation
4. Documentation Conventions
I. Deployment
1. Planning for SUSE Linux Enterprise Desktop
1.1. Hardware Requirements
1.2. Reasons to Use SUSE Linux Enterprise Desktop
2. Deployment Strategies
2.1. Deploying up to 10 Workstations
2.2. Deploying up to 100 Workstations
2.3. Deploying More than 100 Workstations
3. Installation with YaST
3.1. System Start-Up for Installation
3.2. The Installation Workflow
3.3. The Boot Screen
3.4. Language
3.5. Media Check
3.6. License Agreement
3.7. Installation Mode
3.8. Clock and Time Zone
3.9. Installation Settings
3.10. Performing the Installation
3.11. Configuration of the Installed System
3.12. Graphical Login
4. Remote Installation
4.1. Installation Scenarios for Remote Installation
4.2. Setting Up the Server Holding the Installation Sources
4.3. Preparing the Boot of the Target System
4.4. Booting the Target System for Installation
4.5. Monitoring the Installation Process
5. Automated Installation
5.1. Simple Mass Installation
5.2. Rule-Based Autoinstallation
5.3. For More Information
6. Deploying Customized Preinstallations
6.1. Preparing the Master Machine
6.2. Customizing the Firstboot Installation
6.3. Cloning the Master Installation
6.4. Personalizing the Installation
7. Advanced Disk Setup
7.1. LVM Configuration
7.2. Soft RAID Configuration
8. System Configuration with YaST
8.1. YaST Language
8.2. The YaST Control Center
8.3. Software
8.4. Hardware
8.5. System
8.6. Network Devices
8.7. Network Services
8.8. AppArmor
8.9. Security and Users
8.10. Virtualization
8.11. Miscellaneous
8.12. YaST in Text Mode
8.13. Managing YaST from the Command Line
8.14. Update from the Command Line with rug
8.15. SaX2
8.16. Troubleshooting
8.17. For More Information
9. Updating SUSE Linux Enterprise
9.1. Updating SUSE Linux Enterprise
9.2. Installing Service Packs
9.3. Software Changes from Version 9 to Version 10
II. Administration
10. GNOME Configuration for Administrators
10.1. Using GConf for Defaults
10.2. Customizing Menus
10.3. Installing Themes
10.4. Configuring Fonts
10.5. MIME Types
10.6. Setting Screensavers
10.7. Session Management
10.8. Improving Performance
10.9. Hidden Directories
10.10. Security Note on Configuring SMB Printers
10.11. Disabling GNOME Desktop Features
10.12. Starting Applications Automatically
10.13. Automounting and Managing Media Devices
10.14. Changing Preferred Applications
10.15. Managing Profiles Using Sabayon
10.16. Adding Document Templates
11. KDE Configuration for Administrators
11.1. Managing Profiles Using the KIOSK Admin Tool
11.2. Managing Profiles Manually
12. Active Directory Support
12.1. Integrating Linux and AD Environments
12.2. Background Information for Linux AD Support
12.3. Configuring a Linux Client for Active Directory
12.4. Logging In to an AD Domain
12.5. Changing Passwords
13. Access Control Lists in Linux
13.1. Traditional File Permissions
13.2. Advantages of ACLs
13.3. Definitions
13.4. Handling ACLs
13.5. ACL Support in Applications
13.6. For More Information
14. System Monitoring Utilities
14.1. Debugging
14.2. Files and File Systems
14.3. Hardware Information
14.4. Networking
14.5. The /proc File System
14.6. Processes
14.7. System Information
14.8. User Information
14.9. Time and Date
15. Working with the Shell
15.1. Getting Started with the Bash Shell
15.2. Users and Access Permissions
15.3. Important Linux Commands
15.4. The vi Editor
III. System
16. 32-Bit and 64-Bit Applications in a 64-Bit System Environment
16.1. Runtime Support
16.2. Software Development
16.3. Software Compilation on Biarch Platforms
16.4. Kernel Specifications
17. Booting and Configuring a Linux System
17.1. The Linux Boot Process
17.2. The init Process
17.3. System Configuration via /etc/sysconfig
18. The Boot Loader
18.1. Selecting a Boot Loader
18.2. Booting with GRUB
18.3. Configuring the Boot Loader with YaST
18.4. Uninstalling the Linux Boot Loader
18.5. Creating Boot CDs
18.6. The Graphical SUSE Screen
18.7. Troubleshooting
18.8. For More Information
19. Special System Features
19.1. Information about Special Software Packages
19.2. Virtual Consoles
19.3. Keyboard Mapping
19.4. Language and Country-Specific Settings
20. Printer Operation
20.1. The Workflow of the Printing System
20.2. Methods and Protocols for Connecting Printers
20.3. Installing the Software
20.4. Setting Up a Printer
20.5. Network Printers
20.6. Graphical Printing Interfaces
20.7. Printing from the Command Line
20.8. Special Features in SUSE Linux Enterprise
20.9. Troubleshooting
21. Dynamic Kernel Device Management with udev
21.1. The /dev Directory
21.2. Kernel uevents and udev
21.3. Drivers, Kernel Modules, and Devices
21.4. Booting and Initial Device Setup
21.5. Debugging udev Events
21.6. Influencing Kernel Device Event Handling with udev Rules
21.7. Persistent Device Naming
21.8. The Replaced hotplug Package
21.9. For More Information
22. File Systems in Linux
22.1. Terminology
22.2. Major File Systems in Linux
22.3. Some Other Supported File Systems
22.4. Large File Support in Linux
22.5. For More Information
23. The X Window System
23.1. Manually Configuring the X Window System
23.2. Installing and Configuring Fonts
23.3. For More Information
24. Authentication with PAM
24.1. Structure of a PAM Configuration File
24.2. The PAM Configuration of sshd
24.3. Configuration of PAM Modules
24.4. For More Information
25. Mobile Computing with Linux
25.1. Laptops
25.2. Mobile Hardware
25.3. Cellular Phones and PDAs
25.4. For More Information
26. PCMCIA
26.1. Controlling PCMCIA Cards Using pccardctl
26.2. PCMCIA in Detail
26.3. Troubleshooting
27. System Configuration Profile Management
27.1. Terminology
27.2. Setting Up SCPM
27.3. Configuring SCPM Using a Graphical User Interface
27.4. Configuring SCPM Using the Command Line
27.5. Troubleshooting
27.6. For More Information
28. Power Management
28.1. Power Saving Functions
28.2. APM
28.3. ACPI
28.4. Rest for the Hard Disk
28.5. The powersave Package
28.6. The YaST Power Management Module
29. Wireless Communication
29.1. Wireless LAN
29.2. Bluetooth
29.3. Infrared Data Transmission
29.4. Managing UMTS/3G Network Connections
IV. Services
30. Basic Networking
30.1. IP Addresses and Routing
30.2. IPv6—The Next Generation Internet
30.3. Name Resolution
30.4. Configuring a Network Connection with YaST
30.5. Managing Network Connections with NetworkManager
30.6. Configuring a Network Connection Manually
30.7. smpppd as Dial-up Assistant
31. SLP Services in the Network
31.1. Activating SLP
31.2. SLP Front-Ends in SUSE Linux Enterprise
31.3. Providing Services with SLP
31.4. For More Information
32. Time Synchronization with NTP
32.1. Configuring an NTP Client with YaST
32.2. Configuring xntp in the Network
32.3. Setting Up a Local Reference Clock
33. Using NIS
33.1. Configuring NIS Clients
34. Configuring eDirectory Authentication
34.1. Setting Up Workstations to Use eDirectory Authentication
34.2. Using iManager to Enable Users for eDirectory Authentication
34.3. Turning Off LUM and eDirectory Authentication
35. LDAP—A Directory Service
35.1. LDAP versus NIS
35.2. Structure of an LDAP Directory Tree
35.3. Configuring an LDAP Client with YaST
35.4. Configuring LDAP Users and Groups in YaST
35.5. Browsing the LDAP Directory Tree
35.6. For More Information
36. Samba
36.1. Terminology
36.2. Starting and Stopping Samba
36.3. Configuring a Samba Server
36.4. Configuring Clients
36.5. Samba as Login Server
36.6. For More Information
37. Sharing File Systems with NFS
37.1. Installing the Required Software
37.2. Importing File Systems with YaST
37.3. Importing File Systems Manually
37.4. Exporting File Systems with YaST
37.5. Exporting File Systems Manually
37.6. NFS with Kerberos
37.7. For More Information
38. File Synchronization
38.1. Available Data Synchronization Software
38.2. Determining Factors for Selecting a Program
38.3. Introduction to CVS
38.4. Introduction to rsync
V. Security
39. Masquerading and Firewalls
39.1. Packet Filtering with iptables
39.2. Masquerading Basics
39.3. Firewalling Basics
39.4. SuSEfirewall2
39.5. For More Information
40. SSH: Secure Network Operations
40.1. The OpenSSH Package
40.2. The ssh Program
40.3. scp—Secure Copy
40.4. sftp—Secure File Transfer
40.5. The SSH Daemon (sshd)—Server-Side
40.6. SSH Authentication Mechanisms
40.7. X, Authentication, and Forwarding Mechanisms
41. Network Authentication—Kerberos
41.1. Kerberos Terminology
41.2. How Kerberos Works
41.3. Users' View of Kerberos
41.4. For More Information
42. Encrypting Partitions and Files
42.1. Setting Up an Encrypted File System with YaST
42.2. Using Encrypted Home Directories
42.3. Using vi to Encrypt Single ASCII Text Files
43. Confining Privileges with AppArmor
43.1. Installing Novell AppArmor
43.2. Enabling and Disabling Novell AppArmor
43.3. Getting Started with Profiling Applications
44. Security and Confidentiality
44.1. Local Security and Network Security
44.2. Some General Security Tips and Tricks
44.3. Using the Central Security Reporting Address
VI. Troubleshooting
45. Help and Documentation
45.1. Using the SUSE Help Center
45.2. Man Pages
45.3. Info Pages
45.4. The Linux Documentation Project
45.5. Wikipedia: The Free Online Encyclopedia
45.6. Guides and Books
45.7. Package Documentation
45.8. Usenet
45.9. Standards and Specifications
46. Common Problems and Their Solutions
46.1. Finding and Gathering Information
46.2. Installation Problems
46.3. Boot Problems
46.4. Login Problems
46.5. Network Problems
46.6. Data Problems
Index

List of Figures

3.1. Possible Options for Windows Partitions
3.2. Resizing the Windows Partition
3.3. Installing and Removing Software with the YaST Software Manager
5.1. Editing an AutoYaST Profile with the AutoYaST Front-End
5.2. AutoYaST Rules
7.1. Physical Partitioning versus LVM
7.2. Creating a Volume Group
7.3. Physical Volume Setup
7.4. Logical Volume Management
7.5. Creating Logical Volumes
7.6. RAID Partitions
7.7. File System Settings
8.1. The YaST Control Center
8.2. YaST Package Manager
8.3. Conflict Management of the Package Manager
8.4. YaST Online Update
8.5. Sound Configuration
8.6. The YaST Partitioner
8.7. Adding a PCI ID
8.8. Setting the Language
8.9. Main Window of YaST in Text Mode
8.10. The Software Installation Module
8.11. Card and Monitor Properties
9.1. Service Pack 1 Package Management Update
9.2. Update to Service Pack 2
9.3. Apply SLE10 SP2 Maintenance Stack Update
9.4. Update to Service Pack 1
10.1. Configuration Editor Window
10.2. Alacarte Menu Layout Window
11.1. Configuring the KIOSK Admin Tool
11.2. Adding a Profile
11.3. Setting Up a Profile
11.4. Setting Up Themes
11.5. Assigning Profiles
11.6. The Profile in Use
12.1. Active Directory Authentication Schema
12.2. Determining Windows Domain Membership
12.3. Providing Administrator Credentials
13.1. Minimum ACL: ACL Entries Compared to Permission Bits
13.2. Extended ACL: ACL Entries Compared to Permission Bits
15.1. Example of a Bash Terminal Window
15.2. The ls Command
15.3. The ls -l Command
15.4. Excerpt from a Standard Directory Tree
17.1. System Services (Runlevel)
17.2. System Configuration Using the sysconfig Editor
18.1. Boot Loader Settings
20.1. Printer Configuration Summary
25.1. Integrating a Laptop in a Network
25.2. Monitoring the Battery State with KSysguard
27.1. YaST: Basic SCPM Configuration
27.2. YaST: Configure SCPM Users
27.3. Configuring Resource Groups
28.1. Scheme Selection
28.2. Overview of Existing Schemes
28.3. Configuring a Scheme
28.4. Battery Charge Level
28.5. ACPI Settings
29.1. YaST: Configuring the Wireless Network Card
29.2. YaST Bluetooth Configuration
29.3. UMTSmon Main Window
30.1. Simplified Layer Model for TCP/IP
30.2. TCP/IP Ethernet Packet
30.3. Configuring a Network Card
30.4. Modem Configuration
30.5. ISDN Configuration
30.6. ISDN Interface Configuration
30.7. DSL Configuration
32.1. YaST: Configuring an NTP Client
32.2. YaST: Complex NTP Configuration
33.1. Setting Domain and Address of a NIS Server
34.1. User Authentication Method
35.1. Structure of an LDAP Directory
35.2. YaST: Configuration of the LDAP Client
35.3. YaST: Advanced Configuration
35.4. YaST: Module Configuration
35.5. YaST: Configuration of an Object Template
35.6. YaST: Additional LDAP Settings
35.7. Browsing the LDAP Directory Tree
35.8. Browsing the Entry Data
37.1. NFS Client Configuration with YaST
37.2. NFS Server Configuration Tool
37.3. Configuring an NFS Server with YaST
37.4. Exporting Directories with NFSv4
37.5. Exporting Directories with NFSv2 and v3
39.1. iptables: A Packet's Possible Paths
45.1. The Main Window of the SUSE Help Center
45.2. Configuring the Search Function
45.3. Generating a Search Index
46.1. US Keyboard Layout
46.2. Automatic Repair Mode

List of Tables

2.1. Installing from the SUSE Linux Enterprise Media
2.2. Installing from a Network Server Using SLP
2.3. Installing from a Network Server
2.4. Simple Remote Installation via VNC—Static Network Configuration
2.5. Simple Remote Installation via VNC—Dynamic Network Configuration
2.6. Remote Installation via VNC—PXE Boot and Wake on LAN
2.7. Simple Remote Installation via SSH—Static Network Configuration
2.8. Remote Installation via SSH—Dynamic Network Configuration
2.9. Remote Installation via SSH—PXE Boot and Wake on LAN
2.10. Simple Mass Installation
2.11. Rule-Based Autoinstallation
3.1. Boot Options
4.1. F Keys During Installation
4.2. Installation (Boot) Scenarios Used in This Chapter
9.1. Backup Files
9.2. Commands
9.3. Log Files in /var/log
9.4. Wrapper
9.5. Split Configuration Files in /etc/sysconfig/powersave
10.1. Configuration Sources in the Path File
10.2. Other Configuration Sources
10.3. Schema Keys and Objects
10.4. Preference Key, Schema Key, and Schema Object Examples
10.5. gconftool-2 Options
10.6. Font Preference Keys
10.7. Desktop Entry File Keys
10.8. Directory Entry File Keys
10.9. Menu File Locations
10.10. Theme Index File Keys
10.11. Default Session Information Files
10.12. Performance-related Preferences
10.13. File Manager Performance Preferences
10.14. Hidden Directories Added to Users’ Home Directories
13.1. ACL Entry Types
13.2. Masking Access Permissions
15.1. Overview of a Standard Directory Tree
15.2. Simple Commands of the vi Editor
17.1. Available Runlevels
17.2. Possible init Script Options
19.1. ulimit: Setting Resources for the User
22.1. File System Types in Linux
22.2. Maximum Sizes of File Systems (On-Disk Format)
23.1. Sections in /etc/X11/xorg.conf
23.2. Parameters of fc-list
25.1. Use Cases for NetworkManager
29.1. Overview of Various WLAN Standards
30.1. Several Protocols in the TCP/IP Protocol Family
30.2. Specific Addresses
30.3. Private IP Address Domains
30.4. Various IPv6 Prefixes
30.5. Manual Network Configuration Scripts
30.6. Parameters for /etc/host.conf
30.7. Databases Available via /etc/nsswitch.conf
30.8. Configuration Options for NSS “Databases
30.9. Some Start-Up Scripts for Network Programs
35.1. Commonly Used Object Classes and Attributes
38.1. Features of the File Synchronization Tools: -- = very poor, - = poor or not available, o = medium, + = good, ++ = excellent, x = available
45.1. Man Pages—Categories and Descriptions
46.1. Log Files
46.2. System Information

List of Examples

6.1. Configuring the Proposal Screens
6.2. Configuring the Workflow Section
6.3. Configuring the List of Workflow Components
8.1. /etc/fstab: Partition Data
8.2. Adding Multiple Users
8.3. Removing Multiple Users
8.4. Sample Output of yast lan list
9.1. List with df -h
15.1. Sample Output Showing File Permissions
15.2. Sample Output Showing Directory Permissions
17.1. A Minimal INIT INFO Block
19.1. Entry in /etc/crontab
19.2. /etc/crontab: Remove Time Stamp Files
19.3. Example for /etc/logrotate.conf
19.4. ulimit: Settings in ~/.bashrc
20.1. /etc/modprobe.conf: Interrupt Mode for the First Parallel Port
20.2. Error Message from lpd
20.3. Broadcast from the CUPS Network Server
23.1. Screen Section of the File /etc/X11/xorg.conf
24.1. PAM Configuration for sshd
24.2. Default Configuration for the auth Section
24.3. Default Configuration for the account Section
24.4. Default Configuration for the password Section
24.5. Default Configuration for the session Section
24.6. pam_unix2.conf
24.7. pam_env.conf
24.8. pam_pwcheck.conf
29.1. Output of irdadump
30.1. Writing IP Addresses
30.2. Linking IP Addresses to the Netmask
30.3. Sample IPv6 Address
30.4. IPv6 Address Specifying the Prefix Length
30.5. /etc/resolv.conf
30.6. /etc/hosts
30.7. /etc/networks
30.8. /etc/host.conf
30.9. /etc/nsswitch.conf
30.10. Output of the Command ping
30.11. Output of the ifconfig Command
30.12. Output of the route -n Command
35.1. Excerpt from schema.core
35.2. pam_unix2.conf Adapted to LDAP
35.3. Adaptations in nsswitch.conf
36.1. A CD-ROM Share
36.2. homes Share
36.3. Global Section in smb.conf
36.4. Setting Up a Machine Account
36.5. Automated Setup of a Machine Account
43.1. Output of aa-unconfined