| | Copyright |
| | Preface |
| | | Who Should Buy This Book |
| | | Linux Distributions |
| | | How This Book Is Organized |
| | | Conventions Used in This Book |
| | | Contacting Me |
| | | Acknowledgments |
|
| | Part I. Low-Level Configuration |
| | | Chapter 1. Kernel Network Configuration |
| | | Starting Kernel Configuration |
| | | Network Protocol Support |
| | | Network Hardware Options |
| | | Compiling and Installing a Kernel |
| | | Summary |
|
| | | Chapter 2. TCP/IP Network Configuration |
| | | Loading Network Drivers |
| | | Using a DHCP Client |
| | | Configuring a Static IP Address |
| | | Using a PPP Link |
| | | Summary |
|
| | | Chapter 3. Alternative Network Stacks |
| | | Understanding Network Stacks |
| | | AppleTalk |
| | | IPX/SPX |
| | | NetBEUI |
| | | Summary |
|
| | | Chapter 4. Starting Servers |
| | | Using SysV Startup Scripts |
| | | Using inetd |
| | | Using xinetd |
| | | Using Local Startup Scripts |
| | | Using GUI Tools |
| | | When to Use Each Startup Method |
| | | Summary |
|
|
| | Part II. Local Network Servers |
| | | Chapter 5. Configuring Other Computers via DHCP |
| | | When to Run a DHCP Server |
| | | Kernel and Network Interface Issues |
| | | DHCP Configuration Files |
| | | Assigning Dynamic Addresses |
| | | Assigning Fixed Addresses |
| | | Integrating with Other Protocols |
| | | Summary |
|
| | | Chapter 6. Authenticating Users via Kerberos |
| | | When to Run a Kerberos Server |
| | | Understanding Kerberos Operation |
| | | Setting Up a Kerberos Server |
| | | Configuring a Kerberos Application Server |
| | | Configuring a Kerberos Client |
| | | Summary |
|
| | | Chapter 7. File and Printer Sharing via Samba |
| | | When to Run a Samba Server |
| | | General Samba Configuration |
| | | Serving Files with Samba |
| | | Serving Printers with Samba |
| | | Samba Scripting Features |
| | | Summary |
|
| | | Chapter 8. File Sharing via NFS |
| | | When to Run an NFS Server |
| | | NFS Servers Available for Linux |
| | | Understanding the Portmapper |
| | | Serving Files with NFS |
| | | Username Mapping Options |
| | | Summary |
|
| | | Chapter 9. Printer Sharing via LPD |
| | | When to Run an LPD Server |
| | | LPD Server Options for Linux |
| | | Configuring a BSD LPD Server |
| | | Configuring an LPRng Server |
| | | Configuring a CUPS Server |
| | | Summary |
|
| | | Chapter 10. Maintaining Consistent Time: Time Servers |
| | | When to Run a Time Server |
| | | Setting Up an NTP Server |
| | | Using Samba to Serve Time |
| | | Summary |
|
| | | Chapter 11. Pull Mail Protocols: POP and IMAP |
| | | When to Run a Pull Mail Server |
| | | Understanding POP and IMAP |
| | | Configuring a POP Server |
| | | Configuring an IMAP Server |
| | | Using Fetchmail |
| | | Summary |
|
| | | Chapter 12. Running a News Server |
| | | When to Run a News Server |
| | | Understanding NNTP |
| | | Running INN |
| | | Using Leafnode |
| | | Summary |
|
| | | Chapter 13. Maintaining Remote Login Servers |
| | | When to Run a Remote Login Server |
| | | Configuring rlogind |
| | | Configuring Telnet |
| | | Configuring SSH |
| | | Summary |
|
| | | Chapter 14. Handling GUI Access with X and VNC Servers |
| | | When to Run a GUI Access Server |
| | | Configuring Basic X Access |
| | | Using an XDMCP Server |
| | | Running a VNC Server |
| | | A Comparison of Access Techniques |
| | | Summary |
|
| | | Chapter 15. Providing Consistent Fonts with Font Servers |
| | | When to Run a Font Server |
| | | Understanding Font File Formats |
| | | Running a Traditional Font Server |
| | | Running an Expanded Font Server |
| | | Summary |
|
| | | Chapter 16. Maintaining a System Remotely |
| | | When to Run Remote System Maintenance Tools |
| | | The Challenge of a Cross-Distribution Configuration Tool |
| | | Running Linuxconf Remotely |
| | | Running Webmin |
| | | Running SWAT |
| | | Remote Administration Security Concerns |
| | | Summary |
|
| | | Chapter 17. Performing Network Backups |
| | | When to Run Network Backup Servers |
| | | Types of Network Backup Solutions |
| | | Using tar |
| | | Using SMB/CIFS |
| | | Using AMANDA |
| | | Restoring Data |
| | | Summary |
|
|
| | Part III. Internet Servers |
| | | Chapter 18. Administering a Domain via DNS |
| | | When to Run a DNS Server |
| | | Obtaining a Domain Name |
| | | DNS Server Options for Linux |
| | | Core DNS Configuration |
| | | Domain Administration Options |
| | | Running a Caching-Only Name Server |
| | | Communicating with a DHCP Server |
| | | Starting and Testing the Server |
| | | Summary |
|
| | | Chapter 19. Push Mail Protocol: SMTP |
| | | When to Run an SMTP Server |
| | | SMTP Server Options for Linux |
| | | Mail Domain Administration |
| | | Understanding SMTP Transport |
| | | SMTP Server Configuration Options |
| | | Basic Sendmail Configuration |
| | | Basic Exim Configuration |
| | | Basic Postfix Configuration |
| | | Using a Procmail Filter |
| | | Summary |
|
| | | Chapter 20. Running Web Servers |
| | | When to Run a Web Server |
| | | Web Server Options for Linux |
| | | Basic Apache Configuration |
| | | Configuring kHTTPd |
| | | Handling Forms and Scripts |
| | | Handling Secure Sites |
| | | Handling Virtual Domains |
| | | Producing Something Worth Serving |
| | | Analyzing Server Log Files |
| | | Summary |
|
| | | Chapter 21. Running FTP Servers |
| | | When to Run an FTP Server |
| | | FTP Server Options for Linux |
| | | Basic FTP Server Configuration |
| | | Setting Up an Anonymous FTP Server |
| | | Summary |
|
|
| | Part IV. Network Security and Router Functions |
| | | Chapter 22. General System Security |
| | | Shutting Down Unnecessary Servers |
| | | Controlling Accounts and Passwords |
| | | Keeping the System Up to Date |
| | | Monitoring for Intrusion Attempts |
| | | Keeping Abreast of Security Developments |
| | | Summary |
|
| | | Chapter 23. Configuring a chroot Jail |
| | | What Is a chroot Jail? |
| | | Necessary chroot Environment Files |
| | | Configuring a Server to Operate in a chroot Jail |
| | | Maintaining the chroot Environment |
| | | Summary |
|
| | | Chapter 24. Advanced Router Options |
| | | When to Use Advanced Router Configurations |
| | | Advanced Kernel Options |
| | | Using iproute2 |
| | | Using Routing Protocols |
| | | Summary |
|
| | | Chapter 25. Configuring iptables |
| | | What Is iptables ? |
| | | Kernel Configuration for iptables |
| | | Checking Your iptables Configuration |
| | | Configuring a Firewall with iptables |
| | | Configuring NAT with iptables |
| | | Forwarding Ports with iptables |
| | | Logging iptables Activity |
| | | Summary |
|
| | | Chapter 26. Using a VPN |
| | | When to Use a VPN |
| | | VPN Options for Linux |
| | | Configuring PPTP in Linux |
| | | Configuring a Linux FreeS/WAN Server |
| | | Potential Security Risks with a VPN |
| | | Summary |
|
|