Opengear User Manual

Total Page:16

File Type:pdf, Size:1020Kb

Opengear User Manual User Manual ACM5000 & ACM5500 Management Gateways IM4200 Infrastructure Managers CM4100 Console Servers SD4000 Secure Device Servers Rev: 4.8 th April 9 2013 Data Center and Remote Site Management - User Manual 1 Safety Please take care to follow the safety precautions below when installing and operating the console server: - Do not remove the metal covers. There are no operator serviceable components inside. Opening or removing the cover may expose you to dangerous voltage which may cause fire or electric shock. Refer all service to Opengear qualified personnel - To avoid electric shock the power cord protective grounding conductor must be connected through to ground. - Always pull on the plug, not the cable, when disconnecting the power cord from the socket. Do not connect or disconnect the console server during an electrical storm. Also it is recommended you use a surge suppressor or UPS to protect the equipment from transients. FCC Warning Statement This device complies with Part 15 of the FCC rules. Operation of this device is subject to the following conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference that may cause undesired operation. Proper back-up systems and necessary safety devices should be utilized to protect against injury, death or property damage due to system failure. Such protection is the responsibility of the user. This console server device is not approved for use as a life-support or medical system. Any changes or modifications made to this console server device without the explicit approval or consent of Opengear will void Opengear of any liability or responsibility of injury or loss caused by any malfunction. This equipment is for indoor use and all the communication wirings are limited to inside of the building. Publishing history Date Revision Update details Jan 2010 3.8.4 SD4001 product Mar 2010 3.8.5 ACM5004-G, fixed Failover details and added DDNS June 2010 3.9 V3.1 (shadow password, deg F, SNMP, SMS gateway) and ACM5004-I Aug 2010 3.9.1 V3.2 (OpenVPN, Zenoss, config commit, Call Home) Dec 2010 4.0 V3.3 (Firewall router, Web Terminal, SNMP updates) June 2011 4.1 V3.4 (GPS support, SNMP traffic monitoring and IPv6, 32 port models, SMS over cellular) Oct 2011 4.2 V3.5 (Auto-Response) Nov 2011 4.3 V3.5.2 (PPTP, GRE, Groups, FTP server, multiple dial-in, pmshell). Add IM4216-34 Feb 2012 4.4 V3.5.2u3 (Kerberos, Cisco RJ in SD4000, Add ACM5500, Remove KCS) April 2012 4.5 V3.5.2u14 (Cellular redial) July 2012 4.6 V3.5.3 (SMS ARM, simple key, Services page) and SD4001 Rev-01, EoL CM4001/4008 Dec 2012 4.7 V3.6 (Authenticated NTP), ACM5504-5-G-W-I release and EoL IM4004-5 April 2013 4.8 V3.7 4G LTE support Copyright ©Opengear Inc. 2013. All Rights Reserved. Information in this document is subject to change without notice and does not represent a commitment on the part of Opengear. Opengear provides this document “as is,” without warranty of any kind, expressed or implied, including, but not limited to, the implied warranties of fitness or merchantability for a particular purpose. Opengear may make improvements and/or changes in this manual or in the product(s) and/or the program(s) described in this manual at any time. This product could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes may be incorporated in new editions of the publication. Data Center and Remote Site Management - User Manual 3 Table of Contents TABLE OF CONTENTS THIS MANUAL 12 INSTALLATION 16 2.1 Models 16 2.1.1 IM4208-2, IM4216-2, IM4232-2, IM4248-2 and IM4216-34 kit components 17 2.1.2 CM4116, CM4132 and CM4148 kit components 18 2.1.3 SD4002 kit components 18 2.1.4 SD4001 kit components 19 2.1.5 ACM5000 kit components 19 2.1.6 ACM5500 kit components 20 2.2 Power Connection 20 2.2.1 All IM4200-DAC models 20 2.2.2 All CM4100-SAC models 21 2.2.3 SD4002 and SD4001 power 21 2.2.4 All ACM5000 models 21 2.2.5 All ACM5500 models 22 2.2.6 IM4216-34-DDC, IM4208-2-DDC, IM4216-2-DDC, IM4232-2-DDC and IM4248-2-DDC power 22 2.3 Network Connection 23 2.4 Serial Port Connection 24 2.4.1 Opengear Classic RJ45 pinout (option –X0) 25 2.4.2 Cisco Rolled (Cyclades) RJ45 pinout (option -X1) 25 2.4.3 Cisco RJ45 pinout (option -X2) 25 2.5 USB Port Connection 26 2.6 Fitting Cellular SIM and Antennas 26 2.6.1 ACM5004-G models 27 2.6.2 ACM5500-G models 27 2.6.3 ACM5500-L models 28 2.6.4 IM4200-G models 29 2.6.5 External USB cellular modems 29 2.7 Digital I/O and Environmental Sensors 29 SYSTEM CONFIGURATION 30 3.1 Management Console Connection 30 3.1.1 Connected computer set up 30 3.1.2 Browser connection 31 3.2 Administrator Set up 32 3.2.1 Change default root System Password 32 3.2.2 Set up a new Administrator 33 3.2.3 Name the System 33 3.3 Network Configuration 34 3.3.1 IPv6 configuration 35 3.3.2 Dynamic DNS (DDNS) configuration 35 3.4 Services and Service Access 37 3.5 Communications Software 40 3.5.1 SDT Connector 40 3.5.2 PuTTY 41 3.5.3 SSHTerm 42 3.6 Management Network Configuration 42 3.6.1 Enable the Management LAN 42 3.6.2 Configure the DHCP server 44 3.6.3 Select Failover or broadband OOB 45 3.6.4 Aggregating the network ports 46 3.6.5 Wi-Fi Wireless LAN 47 3.6.7 Static routes 50 SERIAL PORT, HOST, DEVICE & USER CONFIGURATION 52 4 Data Center and Remote Site Management - User Manual User Manual 4.1 Configure Serial Ports 52 4.1.1 Common Settings 53 4.1.2 Console Server Mode 54 4.1.3 SDT Mode 58 4.1.4 Device (RPC, UPS, EMD) Mode 58 4.1.5 Terminal Server Mode 59 4.1.6 Serial Bridging Mode 59 4.1.7 Syslog 60 4.1.8 NMEA Streaming 60 4.1.9 Cisco USB console connection 61 4.2 Add/ Edit Users 62 4.2.1 Set up new Group 64 4.2.2 Set up new Users 64 4.3 Authentication 66 4.4 Network Hosts 66 4.5 Trusted Networks 68 4.6 Serial Port Cascading 69 4.6.1 Automatically generate and upload SSH keys 69 4.6.2 Manually generate and upload SSH keys 71 4.6.3 Configure the slaves and their serial ports 72 4.6.4 Managing the slaves 73 4.7 Serial Port Redirection (PortShare) 73 4.8 Managed Devices 74 4.9 IPsec VPN 76 4.9.1 Enable the VPN gateway 77 4.10 OpenVPN 78 4.10.1 Enable the OpenVPN 79 4.10.2 Configure as Server or Client 80 4.10.3 Windows OpenVPN Client and Server set up 83 4.11 PPTP VPN 87 4.11.1 Enable the PPTP VPN server 87 4.11.2 Add a PPTP user 89 4.11.3 Set up a remote PPTP client 89 4.12 Call Home 91 4.12.1 Set up Call Home candidate 91 4.12.2 Accept Call Home candidate as Managed Console Server on CMS 92 4.12.3 Calling Home to a generic central SSH server 94 FIREWALL, FAILOVER & OOB ACCESS 96 5.1 Dialup Modem Connection 96 5.2 OOB Dial-In Access 96 5.2.1 Configure Dial-In PPP 96 5.2.2 Using SDT Connector client 99 5.2.3 Set up Windows XP/ 2003/Vista/7 client 99 5.2.4 Set up earlier Windows clients 99 5.2.5 Set up Linux clients 100 5.3 Dial-Out Access 100 5.3.1 Always-on dial-out 100 5.3.2 Failover dial-out 101 5.4 OOB Broadband Ethernet Access 103 5.5 Broadband Ethernet Failover 104 5.6 Cellular Modem Connection 105 5.6.1 Connecting to a GSM HSUPA/UMTS carrier network 106 5.6.2 Connecting to a CDMA EV-DO carrier network 107 5.6.3 Connecting to a 4G LTE carrier network 109 5.6.4 Verifying the cellular connection 110 Data Center and Remote Site Management - User Manual 5 Table of Contents 5.6.5 Cellular modem watchdog 111 5.7 Cellular Operation 111 5.7.1 OOB access set up 112 5.7.2 Cellular failover setup 112 5.7.3 Cellular routing 114 5.7.4 Cellular CSD dial-in setup 114 5.8 Firewall & Forwarding 115 5.8.1 Configuring network forwarding and IP masquerading 116 5.8.2 Configuring client devices 118 5.8.3 Port / Protocol forwarding 120 5.8.4 Firewall rules 121 SSH TUNNELS & SDT CONNECTOR 124 6.1 Configuring for SSH Tunneling to Hosts 125 6.2 SDT Connector Client Configuration 125 6.2.1 SDT Connector client installation 125 6.2.2 Configuring a new gateway in the SDT Connector client 126 6.2.3 Auto-configure SDT Connector client with the user’s access privileges 128 6.2.4 Make an SDT connection through the gateway to a host 128 6.2.5 Manually adding hosts to the SDT Connector gateway 129 6.2.6 Manually adding new services to the new hosts 130 6.2.7 Adding a client program to be started for the new service 132 6.2.8 Dial in configuration 133 6.3 SDT Connector to Management Console 134 6.4 SDT Connector - telnet or SSH connect to serially attached devices 135 6.5 Using SDT Connector for out-of-band connection to the gateway 136 6.6 Importing (and exporting) preferences 137 6.7 SDT Connector Public Key Authentication 138 6.8 Setting up SDT for Remote Desktop access 138 6.8.1 Enable Remote Desktop on the target Windows computer to be accessed 138 6.8.2 Configure the Remote Desktop Connection client 140 6.9 SDT SSH Tunnel for VNC 142 6.9.1 Install and configure the VNC Server on the computer to be accessed 142 6.9.2 Install, configure and connect the VNC Viewer 144 6.10 Using SDT to IP connect to hosts that are serially attached to the gateway 145 6.10.1 Establish a PPP connection between the host COM port and console server 146 6.10.2 Set up SDT Serial Ports on console server 148 6.10.3 Set up SDT Connector to ssh port forward over the console server Serial Port 149 6.11 SSH Tunneling using other SSH clients (e.g.
Recommended publications
  • Cisco Telepresence Codec SX20 API Reference Guide
    Cisco TelePresence SX20 Codec API Reference Guide Software version TC6.1 April 2013 Application Programmer Interface (API) Reference Guide Cisco TelePresence SX20 Codec D14949.03 SX20 Codec API Reference Guide TC6.1, April 2013. 1 Copyright © 2013 Cisco Systems, Inc. All rights reserved. Cisco TelePresence SX20 Codec API Reference Guide What’s in this guide? Table of Contents Introduction Using HTTP ....................................................................... 20 Getting status and configurations ................................. 20 TA - ToC - Hidden About this guide .................................................................. 4 The top menu bar and the entries in the Table of Sending commands and configurations ........................ 20 text anchor User documentation ........................................................ 4 Contents are all hyperlinks, just click on them to Using HTTP POST ......................................................... 20 go to the topic. About the API Feedback from codec over HTTP ......................................21 Registering for feedback ................................................21 API fundamentals ................................................................ 9 Translating from terminal mode to XML ......................... 22 We recommend you visit our web site regularly for Connecting to the API ..................................................... 9 updated versions of the user documentation. Go to: Password ........................................................................
    [Show full text]
  • Systems Programming II
    Systems Programming II Iqbal Mohomed CSC 209 – Summer 2004 Week 7 Motivation for Signals • When a program forks into 2 or more processes, rarely do they execute independently of each other • The processes usually require some form of synchronization, and this is typically handled using signals. Job control is another important use • Data usually needs to be passed between processes also, and this is typically handled using pipes and sockets, which we will discuss shortly • Signals are usually generated by – Machine interrupts – The program itself, other programs, or the user (i.e. from the keyboard) Introduction to Signals • When a C program receives a signal, control is immediately passed to a function called a signal handler • The signal handler function can execute some C statements and exit in three different ways: – Return control to the place in the program which was executing when the signal occurred – Return control to some other point in the program – Terminate the program by calling the exit (or _exit) function signal() • A default action is provided for each kind of signal, such as terminate, stop or ignore • For nearly all signal types, the default action can be changed using the signal() function. The exceptions are SIGKILL and SIGSTOP. The handler is defined as follows: – typedef void (*sighandler_t)(int); • To change the handler: – sighandler_t signal(int signum, sighandler_t handler); More on signal() • For each process, the OS maintains a table of actions that should be performed for each kind of signal. The signal() function changes the table entry for the signal named as the first argument to the value provided as the second argument.
    [Show full text]
  • Unix System Programming Overview Outline What Is a Signal? Signal
    Overview Last Week: ● How to program UNIX processes (Chapters 7-9) ● fork() and exec() Unix System Programming This Week, and next week: ● UNIX inter-process communication mechanisms: signals, Signals » (next week) pipes and FIFOs. ● How to program with UNIX signals (Chapter 10) » http://en.wikipedia.org/wiki/Unix_signal ● Non-local jumps (Chapter 7) ● Focus on the sigaction() function Maria Hybinette, UGA 1 Maria Hybinette, UGA 2 Outline What is a Signal? ● A signal is an asynchronous event which is ● What is a UNIX signal? delivered to a process (instantiated by a small message) ● Signal types ● Asynchronous means that the event can occur ● Generating signals at any time (e.g., posting at a bulletin board ) ● Responding to a signal » may be unrelated to the execution of the process ● Common uses of a signal – e.g., user types Ctrl-C, or the modem hangs (SIGINT) ● Implementing a read() time-out – e.g,, user types Ctrl-Z (SIGTSTP) ● Sent from kernel (e.g. detects divide by zero ● Non-local jumps setjmp()/longjmp() (SIGFPE) or could be at the request of another ● POSIX signals process to send to another) ● Interrupted system calls ● Only information that a signal carries is its ● System calls inside handlers unique ID and that it arrived Maria Hybinette, UGA 3 Maria Hybinette, UGA 4 Signal Types (31 in POSIX) Signal Sources terminal memory ID Name Description Default Action driver management shell command 2 SIGINT Interrupt from keyboard (^C) terminate Ctr-C SIGINT SIGHUP 3 SIGQUIT Quit from keyboard (^\) terminate & core SIGSEGV 9 SIGKILL
    [Show full text]
  • POSIX Signals
    CSE 410: Systems Programming POSIX Signals Ethan Blanton Department of Computer Science and Engineering University at Buffalo Introduction Signals Blocking Concurrency Sending Signals Summary References POSIX Signals POSIX signals are another form of interprocess communication. They are also a way to create concurrency in programs. For these two reasons, they are rather complicated and subtle! Signals provide a simple message passing mechanism. © 2018 Ethan Blanton / CSE 410: Systems Programming Introduction Signals Blocking Concurrency Sending Signals Summary References Signals as Messages POSIX signals are asynchronous messages. Asynchronous means that their reception can occur at any time.1 The message is the reception of the signal itself. Each signal has a number, which is a small integer. POSIX signals carry no other data. 1Almost. We’ll see how to control it later. © 2018 Ethan Blanton / CSE 410: Systems Programming Introduction Signals Blocking Concurrency Sending Signals Summary References Signal Types There are two basic types of POSIX signals: Reliable signals Real-time signals Real-time signals are much more complicated. In particular, they can carry data. We will discuss only reliable signals in this lecture. © 2018 Ethan Blanton / CSE 410: Systems Programming Introduction Signals Blocking Concurrency Sending Signals Summary References Asynchronous Reception From the point of view of the application: Signals can be blocked or ignored Enabled signals may be received between any two processor instructions A received signal can run a user-defined function called a signal handler This means that enabled signals and program code must very carefully manipulate shared or global data! © 2018 Ethan Blanton / CSE 410: Systems Programming Introduction Signals Blocking Concurrency Sending Signals Summary References Signals POSIX defines a number of signals by name and number.
    [Show full text]
  • The Linux Command Line
    The Linux Command Line Fifth Internet Edition William Shotts A LinuxCommand.org Book Copyright ©2008-2019, William E. Shotts, Jr. This work is licensed under the Creative Commons Attribution-Noncommercial-No De- rivative Works 3.0 United States License. To view a copy of this license, visit the link above or send a letter to Creative Commons, PO Box 1866, Mountain View, CA 94042. A version of this book is also available in printed form, published by No Starch Press. Copies may be purchased wherever fine books are sold. No Starch Press also offers elec- tronic formats for popular e-readers. They can be reached at: https://www.nostarch.com. Linux® is the registered trademark of Linus Torvalds. All other trademarks belong to their respective owners. This book is part of the LinuxCommand.org project, a site for Linux education and advo- cacy devoted to helping users of legacy operating systems migrate into the future. You may contact the LinuxCommand.org project at http://linuxcommand.org. Release History Version Date Description 19.01A January 28, 2019 Fifth Internet Edition (Corrected TOC) 19.01 January 17, 2019 Fifth Internet Edition. 17.10 October 19, 2017 Fourth Internet Edition. 16.07 July 28, 2016 Third Internet Edition. 13.07 July 6, 2013 Second Internet Edition. 09.12 December 14, 2009 First Internet Edition. Table of Contents Introduction....................................................................................................xvi Why Use the Command Line?......................................................................................xvi
    [Show full text]
  • Blue Coat SGOS Command Line Interface Reference, Version 4.2.3
    Blue Coat® Systems ProxySG™ Command Line Interface Reference Version SGOS 4.2.3 Blue Coat ProxySG Command Line Interface Reference Contact Information Blue Coat Systems Inc. 420 North Mary Ave Sunnyvale, CA 94085-4121 http://www.bluecoat.com/support/contact.html [email protected] http://www.bluecoat.com For concerns or feedback about the documentation: [email protected] Copyright© 1999-2006 Blue Coat Systems, Inc. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled, disassembled, published or distributed, in whole or in part, or translated to any electronic medium or other means without the written consent of Blue Coat Systems, Inc. All right, title and interest in and to the Software and documentation are and shall remain the exclusive property of Blue Coat Systems, Inc. and its licensors. ProxySG™, ProxyAV™, CacheOS™, SGOS™, Spyware Interceptor™, Scope™, RA Connector™, RA Manager™, Remote Access™ are trademarks of Blue Coat Systems, Inc. and CacheFlow®, Blue Coat®, Accelerating The Internet®, WinProxy®, AccessNow®, Ositis®, Powering Internet Management®, The Ultimate Internet Sharing Solution®, Permeo®, Permeo Technologies, Inc.®, and the Permeo logo are registered trademarks of Blue Coat Systems, Inc. All other trademarks contained in this document and in the Software are the property of their respective owners. BLUE COAT SYSTEMS, INC. DISCLAIMS ALL WARRANTIES, CONDITIONS OR OTHER TERMS, EXPRESS OR IMPLIED, STATUTORY OR OTHERWISE, ON SOFTWARE AND DOCUMENTATION FURNISHED HEREUNDER INCLUDING WITHOUT LIMITATION THE WARRANTIES OF DESIGN, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL BLUE COAT SYSTEMS, INC., ITS SUPPLIERS OR ITS LICENSORS BE LIABLE FOR ANY DAMAGES, WHETHER ARISING IN TORT, CONTRACT OR ANY OTHER LEGAL THEORY EVEN IF BLUE COAT SYSTEMS, INC.
    [Show full text]
  • LAB MANUAL for Computer Network
    LAB MANUAL for Computer Network CSE-310 F Computer Network Lab L T P - - 3 Class Work : 25 Marks Exam : 25 MARKS Total : 50 Marks This course provides students with hands on training regarding the design, troubleshooting, modeling and evaluation of computer networks. In this course, students are going to experiment in a real test-bed networking environment, and learn about network design and troubleshooting topics and tools such as: network addressing, Address Resolution Protocol (ARP), basic troubleshooting tools (e.g. ping, ICMP), IP routing (e,g, RIP), route discovery (e.g. traceroute), TCP and UDP, IP fragmentation and many others. Student will also be introduced to the network modeling and simulation, and they will have the opportunity to build some simple networking models using the tool and perform simulations that will help them evaluate their design approaches and expected network performance. S.No Experiment 1 Study of different types of Network cables and Practically implement the cross-wired cable and straight through cable using clamping tool. 2 Study of Network Devices in Detail. 3 Study of network IP. 4 Connect the computers in Local Area Network. 5 Study of basic network command and Network configuration commands. 6 Configure a Network topology using packet tracer software. 7 Configure a Network topology using packet tracer software. 8 Configure a Network using Distance Vector Routing protocol. 9 Configure Network using Link State Vector Routing protocol. Hardware and Software Requirement Hardware Requirement RJ-45 connector, Climping Tool, Twisted pair Cable Software Requirement Command Prompt And Packet Tracer. EXPERIMENT-1 Aim: Study of different types of Network cables and Practically implement the cross-wired cable and straight through cable using clamping tool.
    [Show full text]
  • Setting up Horizon 7 for Linux Desktops
    Setting Up Horizon 7 for Linux Desktops SEP 2019 VMware Horizon 7 7.10 Setting Up Horizon 7 for Linux Desktops You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit your feedback to [email protected] VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com © Copyright 2016-2019 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 2 Contents Setting Up Horizon 7 for Linux Desktops 6 1 Features and System Requirements 7 Features of Horizon Linux Desktops 7 Overview of Configuration Steps for Horizon 7 for Linux Desktops 13 System Requirements For Horizon 7 for Linux 14 Virtual Machine Settings for 2D Graphics 23 Configuring Session Collaboration on Linux Desktops 23 2 Preparing a Linux Virtual Machine for Desktop Deployment 26 Create a Virtual Machine and Install Linux 26 Prepare a Linux Machine for Remote Desktop Deployment 27 Install Dependency Packages for Horizon Agent 29 3 Setting Up Active Directory Integration for Linux Desktops 31 Integrating Linux with Active Directory 31 Use the OpenLDAP Server Pass-Through Authentication 32 Set Up SSSD LDAP Authentication Against the Microsoft Active Directory 32 Use the Winbind Domain Join Solution 32 Configure PowerBroker Identity Services Open (PBISO) Authentication 33 Configure the Samba Offline Domain Join 34 Use the Realmd Join Solution for RHEL 8 36 Setting Up Single Sign-On 37 Setting Up Smart Card Redirection 38 Integrate a RHEL 8 Desktop
    [Show full text]
  • Programming Project #2 Due: Thursday, May 13Th, 2004, 11:59 Pm
    CS155: Computer Security Spring 2004 Programming Project #2 Due: Thursday, May 13th, 2004, 11:59 pm 1 Introduction 1.1 Summary In this project, you will write Josh, the journaling operator shell. Josh is a setuid-root shell that allows users to undertake a subset of root’s capabilities. Your starting point is OSH, a minimal shell developed by Gunnar Ritter. You may work alone, or in pairs. You should not collaborate with others outside your group. You will use the Boxes system again. Remember to test your Josh in a closedbox. This as- signment specification is quite long, but much of it is intended to clarify points of confusion raised by previous years’ students. Please be sure to read it carefully before beginning to code. 1.2 The Problem As discussed in class, the classical Unix permissions model does not manage privilege delegation effectively. To perform routine administrative tasks (such as cleaning out the /tmp directory), one must possess the root password, and can therefore perform other, undesirable actions (such as reading users’ mail). This limitation manifests itself most acutely in large Unix installations, where there are typically many administrators tasked with various duties. Finer granularity of access is required for such systems, along with the ability to correctly log the important events for post-attack analysis. Various systems have been devised to overcome this limitation, and allow unprivileged users to un- dertake some subset of root’s capabilities. A commonly-used example is Sudo (http://www.sudo.ws/). We will take an approach more like that taken by OSH, the Operator Shell by Michael Neuman.
    [Show full text]
  • Fedora 14 User Guide
    Fedora 14 User Guide Using Fedora 14 for common desktop computing tasks Fedora Documentation Project User Guide Fedora 14 User Guide Using Fedora 14 for common desktop computing tasks Edition 1.0 Author Fedora Documentation Project [email protected] Copyright © 2010 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. For guidelines on the permitted uses of the Fedora trademarks, refer to https://fedoraproject.org/wiki/ Legal:Trademark_guidelines. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. Java® is a registered trademark of Oracle and/or its affiliates. XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
    [Show full text]
  • Ubuntu® 1.4Inux Bible
    Ubuntu® 1.4inux Bible William von Hagen 111c10,ITENNIAL. 18072 @WILEY 2007 •ICIOATENNIAl. Wiley Publishing, Inc. Acknowledgments xxi Introduction xxiii Part 1: Getting Started with Ubuntu Linux Chapter 1: The Ubuntu Linux Project 3 Background 4 Why Use Linux 4 What Is a Linux Distribution? 5 Introducing Ubuntu Linux 6 The Ubuntu Manifesto 7 Ubuntu Linux Release Schedule 8 Ubuntu Update and Maintenance Commitments 9 Ubuntu and the Debian Project 9 Why Choose Ubuntu? 10 Installation Requirements 11 Supported System Types 12 Hardware Requirements 12 Time Requirements 12 Ubuntu CDs 13 Support for Ubuntu Linux 14 Community Support and Information 14 Documentation 17 Commercial Support for Ubuntu Linux 18 Getting More Information About Ubuntu 19 Summary 20 Chapter 2: Installing Ubuntu 21 Getting a 64-bit or PPC Desktop CD 22 Booting the Desktop CD 22 Installing Ubuntu Linux from the Desktop CD 24 Booting Ubuntu Linux 33 Booting Ubuntu Linux an Dual-Boot Systems 33 The First Time You Boot Ubuntu Linux 34 Test-Driving Ubuntu Linux 34 Expioring the Desktop CD's Examples Folder 34 Accessing Your Hard Drive from the Desktop CD 36 Using Desktop CD Persistence 41 Copying Files to Other Machines Over a Network 43 Installing Windows Programs from the Desktop CD 43 Summary 45 ix Contents Chapter 3: Installing Ubuntu on Special-Purpose Systems 47 Overview of Dual-Boot Systems 48 Your Computer's Boot Process 48 Configuring a System for Dual-Booting 49 Repartitioning an Existing Disk 49 Getting a Different Install CD 58 Booting from a Server or Altemate
    [Show full text]
  • The Linux Command Line
    The Linux Command Line Second Internet Edition William E. Shotts, Jr. A LinuxCommand.org Book Copyright ©2008-2013, William E. Shotts, Jr. This work is licensed under the Creative Commons Attribution-Noncommercial-No De- rivative Works 3.0 United States License. To view a copy of this license, visit the link above or send a letter to Creative Commons, 171 Second Street, Suite 300, San Fran- cisco, California, 94105, USA. Linux® is the registered trademark of Linus Torvalds. All other trademarks belong to their respective owners. This book is part of the LinuxCommand.org project, a site for Linux education and advo- cacy devoted to helping users of legacy operating systems migrate into the future. You may contact the LinuxCommand.org project at http://linuxcommand.org. This book is also available in printed form, published by No Starch Press and may be purchased wherever fine books are sold. No Starch Press also offers this book in elec- tronic formats for most popular e-readers: http://nostarch.com/tlcl.htm Release History Version Date Description 13.07 July 6, 2013 Second Internet Edition. 09.12 December 14, 2009 First Internet Edition. 09.11 November 19, 2009 Fourth draft with almost all reviewer feedback incorporated and edited through chapter 37. 09.10 October 3, 2009 Third draft with revised table formatting, partial application of reviewers feedback and edited through chapter 18. 09.08 August 12, 2009 Second draft incorporating the first editing pass. 09.07 July 18, 2009 Completed first draft. Table of Contents Introduction....................................................................................................xvi
    [Show full text]