Book Image

Red Hat Enterprise Linux 8 Essentials

By : Neil Smyth
1 (1)
Book Image

Red Hat Enterprise Linux 8 Essentials

1 (1)
By: Neil Smyth

Overview of this book

Red Hat Enterprise Linux 8 is one of the most secure and dependable operating systems available. For this reason, the ambitious system or network engineer will find a working knowledge of Red Hat Enterprise 8 to be an invaluable advantage in their respective fields. This book, now updated for RHEL 8.1, begins with a history of Red Enterprise Linux and its installation. You will be virtually perform remote system administration tasks with cockpit web interface and write shell scripts to maintain server-based systems without desktop installation. Then, you will set up a firewall system using a secure shell and enable remote access to Gnome desktop environment with virtual network computing (VNC). You’ll share files between the Red Hat Enterprise Linux 8 (RHEL 8) and Windows System using Samba client and NFS. You will also run multiple guest operating systems using virtualization and Linux containers, and host websites using RHEL 8 by installing an Apache web server. Finally, you will create logical disks using logical volume management and implement swap space to maintain the performance of a RHEL 8 system. By the end of this book, you will be armed with the skills and knowledge to install the RHEL 8 operating system and use it expertly.
Table of Contents (32 chapters)
32
Index

12.4 Working with Connection Profiles

So far we have explored the use of connections without explaining how a connection is configured. The configuration of a connection is referred to as a connection profile and is stored in a file located in the /etc/sysconfig/network-scripts directory, the contents of which might read as follows:

# ls /etc/sysconfig/network-scripts

ifcfg-zoneone ifcfg-eno1 ifdown-ppp

ifcfg-zonethree ifcfg-zonetwo ifup-ppp keys-zonethree

keys-zoneone keys-zonetwo

Each of the files prefixed with ifcg- is an interface configuration file containing the connection profile for the corresponding connection while the key- files contain the passwords for the Wi-Fi connections.

Consider, for example, the contents of the ifcfg-eno1 file:

TYPE=Ethernet

PROXY_METHOD=none

BROWSER_ONLY=no

DEFROUTE=yes

IPV4_FAILURE_FATAL=no

NAME=eno1

UUID=99d40009-6bb1-4182-baad-a103941c90ff

DEVICE=eno1

ONBOOT=yes

BOOTPROTO...