Red Hat Enterprise Linux v.5.0 RHF0374US Manuel D’Utilisation

Codes de produits
RHF0374US
Page de 4
2   www.redhat.com
Red Hat Security Response Team, recognized as industry 
leaders for addressing security vulnerabilities. In summary, 
Red Hat Enterprise Linux provides an unmatched security 
environment for customers and their applications. View 
redhat.com/security for more detail. 
High availability. An integrated high-availability clustering 
capability allows customers to easily deploy and manage 
high-availability applications. Scaling from two to 16 nodes, 
application high availability can be managed through pol-
icy definitions. Integrated application failover agents are 
included for SAP, Sybase, and Oracle, and customers may 
customize the Red Hat-supplied resource agents for other 
applications. 
Manageability. Deploying and managing a Red Hat 
Enterprise Linux environment is enabled by Red Hat 
Network (RHN). RHN is a highly scalable management  
platform for provisioning, updating, and controlling  
Red Hat Enterprise Linux environments. RHN and its on-
premise version, RHN Satellite, provide organizations and 
their administrators with tools to lower their per-system 
deployment and management costs by automating and 
centralizing routine tasks and creating a consistent envi-
ronment, resulting in less unexpected downtime due to 
human error. 
  THE TRANSPoRTATIoN INDUSTRy  
RELIES oN RED HAT ENTERPRISE LINUX
 
"Migrating to Linux was synonymous 
with migrating to Red Hat. Its reliability 
continues to impress us daily."
 
 
 - Brad Massey 
 
 IT Support Services,  
 
Odyssey Logistics and Technology
Storage. Red Hat Enterprise Linux includes sophisticated 
disk and logical volume management capabilities that 
support numerous enterprise features, including high-
resiliency via multi-pathed storage devices, the ability to 
combine physical devices into logical units, RAID capabili-
ties, online device addition, dynamic volume expansion, 
and online filesystem growth. All storage management 
functions are available online, without impacting applica-
tion availability.
system with 1 Terabyte of memory, which previously may 
have consumed a full rack, can now be configured in a 
single 4U form factor, and can deliver improved perfor-
mance at a much lower cost. Red Hat Enterprise Linux also 
includes low-level kernel optimizations aimed at providing 
full application performance while in the lowest possible 
power states. 
Red Hat Enterprise Linux continues to regularly set new 
standards in the industry on workload benchmarks as 
diverse as ERP, Business Intelligence, TPC, and SPEC. See 
why Red Hat solutions are preferred for getting the most 
out of hardware and applications. Visit spec.org, tpc.org 
and redhat.com/rhel/details/benchmarks/. 
Virtualization. Red Hat is a driving force behind the  
development of open source virtualization technology.  
Red Hat's approach to virtualization is easy to adopt, 
because it is delivered as an integral part of the Red Hat 
Enterprise Linux platform. The original release of Red Hat 
Enterprise Linux 5 in early 2007 incorporated an enter-
prise-hardened implementation of the Xen-based hyper- 
visor technology. With Red Hat Enterprise Linux 5.4,  
Red Hat also introduced the newest virtualization technol-
ogy, Kernel-based Virtual Machine (KVM), which is inte-
grated into the Linux kernel and leverages the newest 
hardware virtualization capabilities provided by Intel  
and AMD processor platforms. The modular design of  
Red Hat Enterprise Linux allows customers to choose when 
and where to use virtualization within the context of their 
deployment. For additional flexibility, customers can deploy 
both Red Hat Enterprise Linux and Microsoft® Windows® 
as fully supported guests. Red Hat Enterprise Linux sup-
ports multiple virtualization use cases, from hardware 
abstraction for existing software stacks, to datacenter  
consolidation, to virtualized clusters and private clouds.
Security. Security for Red Hat Enterprise Linux begins 
with a core feature known as Security-Enhanced Linux 
(SELinux). Co-developed with the U.S. Government's 
National Security Agency, SELinux provides for a strong 
and flexible MAC framework to enforce role-based access 
control and multi-level security. In addition to SELinux, 
Red Hat Enterprise Linux includes system firewalls, audit 
capabilities, and system package and file integrity verifica-
tion tools for a complete security architecture that covers 
deployment models ranging from Internet-facing servers to 
trusted computers. Backing up the core technology is the