Summary
In this chapter, we have considered a unique approach to the provision and access of shared resources across a network. From NFS to cifs
, fstab
to autofs
, we have covered the process of making our mounts temporary or permanent and ensured we have argued the case to prove that CentOS can serve all operating systems. However, unlike the other chapters so far, instead of taking the direct approach to diagnosis, we have defined the role of a troubleshooter as a review of the installation process so that your understanding and appreciation of the problems typically associated with shared resources is based on the initial install rather than an event that happens post-installation. In this way, and by knowing the installation procedure, you will also know how to fix any issues associated with that service. With that in mind we will now move on to the subject of troubleshooting security issues.