10
Chapter 2. Requirements
in this directory can be downloaded directly from the Proxy. This can be especially
useful for distributing GPG keys or establishing installation trees for kickstarts.
In addition, Red Hat recommends the system running the code not be publicly available.
No users but the system administrators should have shell access to these machines. All
unnecessary services should be disabled. You can use
ntsysv
or
chkconfig
to disable
services.
Finally, you should have the following technical documents in hand for use in roughly this
order:
1.
The RHN Proxy Server Installation Guide
— This guide, which you are now reading,
provides the essential steps necessary to get an RHN Proxy Server up and running.
2.
The RHN Client Configuration Guide
— This guide explains how to configure the
systems to be served by an RHN Proxy Server or RHN Satellite Server. (This will
also likely require referencing
The RHN Reference Guide
, which contains steps for
registering and updating systems.)
3.
The RHN Channel Management Guide
— This guide identifies in great detail the
recommended methods for building custom packages, creating custom channels, and
managing private Errata.
4.
The RHN Reference Guide
— This guide describes how to create RHN accounts, reg-
ister and update systems, and use the RHN website to its utmost potential. This guide
will probably come in handy throughout the installation and configuration process.
Содержание NETWORK PROXY SERVER 4.0 -
Страница 1: ...RHN Proxy Server 4 0 Installation Guide ...
Страница 4: ......
Страница 10: ...6 Chapter 1 Introduction ...
Страница 42: ...38 Appendix A Sample RHN Proxy Server Configuration File ...