Red Hat Linux Fedora For Dummies [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Red Hat Linux Fedora For Dummies [Electronic resources] - نسخه متنی

Jon Hall

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
توضیحات
افزودن یادداشت جدید








Chapter 7 for network configuration instructions.


If you pick up from the end of the preceding section, the Network Configuration window appears. Follow these steps to configure your system for a network:





If you’re connecting to a network that uses the Dynamic Host Configu-ration Protocol (DHCP), you don’t have to do anything more to configure your network connection. Click the Next button and skip to Step 8.


Tip You may need to consult with your LAN’s administrator to find out whether the LAN (Local Area Network) uses DHCP. If you constructed your own LAN and don’t know whether you’re running DHCP, you’re not. Go to Chapter 15 to find out how to install and configure a DHCP server.





Click the Edit button and the Edit interface subwindow opens.





Click the Configure using DHCP button and enter your IP address and netmask..


The following list briefly explains IP addresses and netmasks:





IP address: This address is the numeric network address of your Red Hat Linux computer and is the address by which your computer is known on your local network and — in many cases — the Internet. If you haven’t registered your private network’s address space with InterNIC (the organization in charge of distributing IP addresses), you can use the public address space that goes from 192.168.1.1 to 192.168.254.254.


If you’re connecting to an existing LAN, consult its administrator to get an IP address that isn’t already being used. You have to keep track of unused IP addresses if you’re running your own LAN.





Netmask: Private networks based on the Internet Protocol (IP) are divided into subnetworks. The netmask determines how the network is divided. For IP addresses, such as the example in the preceding bullet (192.168.1.1), the most common netmask is 255.255.255.0.







Click the button labeled Manually under the Set the Hostname section of the window. Type your computer’s host name, including the network (domain) name in the text box.


For example, if you want to name your computer cancun and your network name is paunchy.net, you type cancun.paunchy.net.


Tip If you don’t give your computer a name and domain name during the network configuration process, it’s referred to as localhost.local domain. Otherwise, the Welcome screen refers to whatever name you gave it. For example, in the preceding example, you would see Welcome to cancun.paunchy.net.





Enter your gateway and primary DNS (and, optionally, the secondary and tertiary DNS) IP addresses in the appropriate text boxes in the Miscellaneous section, at the bottom of the screen.


This list describes what these parameters do:





Gateway: The gateway is the numeric IP address of the computer that connects your private network to the Internet (or another private network). Red Hat Linux uses the address 192.168.1.254 by default. You can accept this address, but leaving it blank is a better option, unless that address is really your gateway. Chapters 5, 6, and 7 describe how to configure your Linux computer to connect to the Internet via a telephone, broadband (DSL or cable), and existing LAN connections, respectively. If you do that, setting a default route now can interfere with your connection.





Primary DNS: The Internet Protocol uses the Domain Name Service (DNS) system to convert names such as www.redhat.com into numeric IPs. A computer that acts as a DNS server is a name server. We suggest leaving this box blank, however, unless you’re on a private network with a name server or will be connected to the Internet (your ISP supplies a DNS). When you designate a nonexistent name server, many networking programs work very slowly as they wait in vain for the absent server.





Secondary and tertiary DNS: The secondary and tertiary DNS back up the primary DNS server. If your computer can’t find the primary DNS server, it may find the secondary. If not, it should find the tertiary. Best of luck!







If you’re connecting to the Internet directly using a modem (regular dial-up, DSL, or cable), leave the Gateway address blank. Otherwise, if your computer is connected to a LAN with Internet access, enter the Internet gateway’s address in the Gateway text box.


If you’re connecting to someone else’s LAN — if you’re building a Red Hat Linux computer at work, for example — you should obtain this address from your system administrator. If you’re connecting to your own LAN at home, consult yourself because you’re probably the administrator.





When you complete the Network Configuration form, click the Next button to continue.


The Firewall Configuration window opens.


The firewall is turned on by default. You can turn it off if you want, but we recommend leaving it turned on.





Click the Next button.





Red Hat creates for your computer a firewall designed for use by a workstation. The firewall is adequate and provides a reasonable amount of protection. However, we show you how to construct a better — safer and simpler — firewall in Chapter 8.


The next section shows you how to finish the configuration of your Red Hat Linux workstation.







Chapter 7 for network configuration instructions.


If you pick up from the end of the preceding section, the Network Configuration window appears. Follow these steps to configure your system for a network:





If you’re connecting to a network that uses the Dynamic Host Configu-ration Protocol (DHCP), you don’t have to do anything more to configure your network connection. Click the Next button and skip to Step 8.


Tip You may need to consult with your LAN’s administrator to find out whether the LAN (Local Area Network) uses DHCP. If you constructed your own LAN and don’t know whether you’re running DHCP, you’re not. Go to Chapter 15 to find out how to install and configure a DHCP server.





Click the Edit button and the Edit interface subwindow opens.





Click the Configure using DHCP button and enter your IP address and netmask..


The following list briefly explains IP addresses and netmasks:





IP address: This address is the numeric network address of your Red Hat Linux computer and is the address by which your computer is known on your local network and — in many cases — the Internet. If you haven’t registered your private network’s address space with InterNIC (the organization in charge of distributing IP addresses), you can use the public address space that goes from 192.168.1.1 to 192.168.254.254.


If you’re connecting to an existing LAN, consult its administrator to get an IP address that isn’t already being used. You have to keep track of unused IP addresses if you’re running your own LAN.





Netmask: Private networks based on the Internet Protocol (IP) are divided into subnetworks. The netmask determines how the network is divided. For IP addresses, such as the example in the preceding bullet (192.168.1.1), the most common netmask is 255.255.255.0.







Click the button labeled Manually under the Set the Hostname section of the window. Type your computer’s host name, including the network (domain) name in the text box.


For example, if you want to name your computer cancun and your network name is paunchy.net, you type cancun.paunchy.net.


Tip If you don’t give your computer a name and domain name during the network configuration process, it’s referred to as localhost.local domain. Otherwise, the Welcome screen refers to whatever name you gave it. For example, in the preceding example, you would see Welcome to cancun.paunchy.net.





Enter your gateway and primary DNS (and, optionally, the secondary and tertiary DNS) IP addresses in the appropriate text boxes in the Miscellaneous section, at the bottom of the screen.


This list describes what these parameters do:





Gateway: The gateway is the numeric IP address of the computer that connects your private network to the Internet (or another private network). Red Hat Linux uses the address 192.168.1.254 by default. You can accept this address, but leaving it blank is a better option, unless that address is really your gateway. Chapters 5, 6, and 7 describe how to configure your Linux computer to connect to the Internet via a telephone, broadband (DSL or cable), and existing LAN connections, respectively. If you do that, setting a default route now can interfere with your connection.





Primary DNS: The Internet Protocol uses the Domain Name Service (DNS) system to convert names such as www.redhat.com into numeric IPs. A computer that acts as a DNS server is a name server. We suggest leaving this box blank, however, unless you’re on a private network with a name server or will be connected to the Internet (your ISP supplies a DNS). When you designate a nonexistent name server, many networking programs work very slowly as they wait in vain for the absent server.





Secondary and tertiary DNS: The secondary and tertiary DNS back up the primary DNS server. If your computer can’t find the primary DNS server, it may find the secondary. If not, it should find the tertiary. Best of luck!







If you’re connecting to the Internet directly using a modem (regular dial-up, DSL, or cable), leave the Gateway address blank. Otherwise, if your computer is connected to a LAN with Internet access, enter the Internet gateway’s address in the Gateway text box.


If you’re connecting to someone else’s LAN — if you’re building a Red Hat Linux computer at work, for example — you should obtain this address from your system administrator. If you’re connecting to your own LAN at home, consult yourself because you’re probably the administrator.





When you complete the Network Configuration form, click the Next button to continue.


The Firewall Configuration window opens.


The firewall is turned on by default. You can turn it off if you want, but we recommend leaving it turned on.





Click the Next button.





Red Hat creates for your computer a firewall designed for use by a workstation. The firewall is adequate and provides a reasonable amount of protection. However, we show you how to construct a better — safer and simpler — firewall in Chapter 8.


The next section shows you how to finish the configuration of your Red Hat Linux workstation.


/ 194