Red Hat Enterprise Linux AS (Nahant .8)

The contents of this CD-ROM are Copyright © 1995-2005 Red Hat, Inc. and others. Refer to the individual copyright notices in each source package for distribution terms. The distribution terms of the tools copyrighted by Red Hat, Inc. are as noted in the file EULA.

Red Hat and RPM are trademarks of Red Hat, Inc.


DIRECTORY ORGANIZATION

Red Hat Enterprise Linux is delivered on multiple CD-ROMs consisting of installation CD-ROMs and source code CD-ROMs.

The first installation CD-ROM can be directly booted into the installation on most modern systems, and contains the following directory structure (where /media/cdrom is the mount point of the CD-ROM):

      

/media/cdrom
  |----> RedHat
  |        |----> RPMS         -- binary packages
  |        `----> base         -- information on this release of Red Hat
  |                               Enterprise Linux used by the installation
  |                               process
  |----> images                -- boot and driver disk images
  |----> isolinux              -- Files used for booting from CD
  |----> README                -- this file
  |----> RELEASE-NOTES         -- the latest information about this release
  |                               of Red Hat Enterprise Linux
  `----> RPM-GPG-KEY           -- GPG signature for packages from Red Hat

    

The remaining Installation CD-ROMs are similar to Installation CD-ROM 1, except that only the RedHat subdirectory is present.

The directory layout of each source code CD-ROM is as follows:


/media/cdrom
  |----> SRPMS                 -- source packages
  `----> RPM-GPG-KEY           -- GPG signature for packages from Red Hat

    

If you are setting up an installation tree for NFS, FTP, or HTTP installations, you must copy the RELEASE-NOTES files and all files from the RedHat directory on all operating systems CD-ROMs. On Linux and UNIX systems, the following process will properly configure the target directory on your server (repeat for each CD-ROM):

  1. Insert CD-ROM

  2. mount /media/cdrom

  3. cp -a /media/cdrom/RedHat <target-directory>

  4. cp /media/cdrom/RELEASE-NOTES* <target-directory> (Installation CD 1 only)

  5. umount /media/cdrom

(Where <target-directory> represents the path to the directory to contain the installation tree.)

Note

Do not copy the Extras CD-ROM, or any of the layered product CD-ROMs, as this will overwrite files necessary for Anaconda's proper operation.

These CD-ROMs must be installed after Red Hat Enterprise Linux has been installed.

INSTALLING

Many computers can now automatically boot from CD-ROMs. If you have such a machine (and it is properly configured) you can boot the Red Hat Enterprise Linux Installation CD-ROM 1 directly. After booting, the Red Hat Enterprise Linux installation program will start, and you will be able to install your system from the CD-ROM.

The images/ directory contains the file boot.iso. This file is an ISO image that can be used to boot the Red Hat Enterprise Linux installation program. It is a handy way to start network-based installations. To use boot.iso, your computer must be able to boot from its CD-ROM drive, and its BIOS settings must be configured to do so. You must then burn boot.iso onto a recordable/rewriteable CD-ROM.

Another image file contained in the images/ directory is diskboot.img. This file is designed for use with USB pen drives (or other bootable media with a capacity larger than a diskette drive). Use the dd command to write the image.

Note

The ability to use this image file with a USB pen drive depends on the ability of your system's BIOS to boot from a USB device.

GETTING HELP

For those that have web access, refer to http://www.redhat.com. In particular, access to our mailing lists can be found at:

http://www.redhat.com/mailing-lists

If you do not have web access you can still subscribe to the main mailing list.

To subscribe, send mail to nahant-list-request@redhat.com with subscribe in the subject line. You can leave the body empty.

EXPORT CONTROL

As required by U.S. law, user represents and warrants that it: (a) understands that certain of the software are subject to export controls under the U.S. Commerce Departments Export Administration Regulations (EAR); (b) is not located in a prohibited destination country under the EAR or U.S. sanctions regulations (currently Cuba, Iran, Iraq, Libya, North Korea, Sudan and Syria); (c) will not export, re-export, or transfer the software to any prohibited destination, entity, or individual without the necessary export license(s) or authorizations(s) from the U.S. Government; (d) will not use or transfer the software for use in any sensitive nuclear, chemical or biological weapons, or missile technology end-uses unless authorized by the U.S. Government by regulation or specific license; (e) understands and agrees that if it is in the United States and exports or transfers the Software to eligible end users, it will, as required by EAR Section 741.17(e), submit semi-annual reports to the Commerce Departments Bureau of Industry & Security (BIS), which include the name and address (including country) of each transferee; and (f) understands that countries other than the United States may restrict the import, use, or export of encryption products and that it shall be solely responsible for compliance with any such import, use, or export restrictions.