Follow Techotopia on Twitter

On-line Guides
All Guides
eBook Store
iOS / Android
Linux for Beginners
Office Productivity
Linux Installation
Linux Security
Linux Utilities
Linux Virtualization
Linux Kernel
System/Network Admin
Programming
Scripting Languages
Development Tools
Web Development
GUI Toolkits/Desktop
Databases
Mail Systems
openSolaris
Eclipse Documentation
Techotopia.com
Virtuatopia.com
Answertopia.com

How To Guides
Virtualization
General System Admin
Linux Security
Linux Filesystems
Web Servers
Graphics & Desktop
PC Hardware
Windows
Problem Solutions
Privacy Policy

  




 

 

Red Hat Enterprise Linux 9 Essentials Book now available.

Purchase a copy of Red Hat Enterprise Linux 9 (RHEL 9) Essentials

Red Hat Enterprise Linux 9 Essentials Print and eBook (PDF) editions contain 34 chapters and 298 pages

Preview Book

Part VI. Advanced Installation and Deployment

The Red Hat Enterprise Linux Installation Guide discusses the installation of Red Hat Enterprise Linux and some basic post-installation troubleshooting. However, advanced installation options are also covered in this manual. This part provides instructions for kickstart (an automated installation technique)and all related tools. Use this part in conjunction with the first part of the Red Hat Enterprise Linux Installation Guide to perform any of these advanced installation tasks.

Table of Contents

28. Disk Encryption Guide
28.1. What is block device encryption?
28.2. Encrypting block devices using dm-crypt/LUKS
28.2.1. Overview of LUKS
28.2.2. How will I access the encrypted devices after installation? (System Startup)
28.2.3. Choosing a Good Passphrase
28.3. Creating Encrypted Block Devices in Anaconda
28.3.1. What Kinds of Block Devices Can Be Encrypted?
28.3.2. Limitations of Anaconda's Block Device Encryption Support
28.4. Creating Encrypted Block Devices on the Installed System After Installation
28.4.1. Create the block devices
28.4.2. Optional: Fill the device with random data
28.4.3. Format the device as a dm-crypt/LUKS encrypted device
28.4.4. Create a mapping to allow access to the device's decrypted contents
28.4.5. Create filesystems on the mapped device, or continue to build complex storage structures using the mapped device
28.4.6. Add the mapping information to /etc/crypttab
28.4.7. Add an entry to /etc/fstab
28.5. Common Post-Installation Tasks
28.5.1. Set a randomly generated key as an additional way to access an encrypted block device
28.5.2. Add a new passphrase to an existing device
28.5.3. Remove a passphrase or key from a device
29. Installing Through VNC
29.1. VNC Viewer
29.2. VNC Modes in Anaconda
29.2.1. Direct Mode
29.2.2. Connect Mode
29.3. Installation Using VNC
29.3.1. Installation Example
29.3.2. Kickstart Considerations
29.3.3. Firewall Considerations
29.4. References
30. Kickstart Installations
30.1. What are Kickstart Installations?
30.2. How Do You Perform a Kickstart Installation?
30.3. Creating the Kickstart File
30.4. Kickstart Options
30.4.1. Advanced Partitioning Example
30.5. Package Selection
30.6. Pre-installation Script
30.6.1. Example
30.7. Post-installation Script
30.7.1. Examples
30.8. Making the Kickstart File Available
30.8.1. Creating Kickstart Boot Media
30.8.2. Making the Kickstart File Available on the Network
30.9. Making the Installation Tree Available
30.10. Starting a Kickstart Installation
31. Kickstart Configurator
31.1. Basic Configuration
31.2. Installation Method
31.3. Boot Loader Options
31.4. Partition Information
31.4.1. Creating Partitions
31.5. Network Configuration
31.6. Authentication
31.7. Firewall Configuration
31.7.1. SELinux Configuration
31.8. Display Configuration
31.8.1. General
31.8.2. Video Card
31.8.3. Monitor
31.9. Package Selection
31.10. Pre-Installation Script
31.11. Post-Installation Script
31.11.1. Chroot Environment
31.11.2. Use an Interpreter
31.12. Saving the File
32. Boot Process, Init, and Shutdown
32.1. The Boot Process
32.2. A Detailed Look at the Boot Process
32.2.1. The BIOS
32.2.2. The Boot Loader
32.2.3. The Kernel
32.2.4. The /sbin/init Program
32.3. Running Additional Programs at Boot Time
32.4. SysV Init Runlevels
32.4.1. Runlevels
32.4.2. Runlevel Utilities
32.5. Shutting Down
33. PXE Network Installations
33.1. Setting up the Network Server
33.2. PXE Boot Configuration
33.2.1. Command Line Configuration
33.3. Adding PXE Hosts
33.3.1. Command Line Configuration
33.4. TFTPD
33.4.1. Starting the tftp Server
33.5. Configuring the DHCP Server
33.6. Adding a Custom Boot Message
33.7. Performing the PXE Installation

 
 
  Published under the terms of the GNU General Public License Design by Interspire