Flylib.com
Advanced Linux Networking
Advanced Linux Networking
ISBN: 0201774232
EAN: 2147483647
Year: 2002
Pages: 203
Authors:
Roderick W. Smith
BUY ON AMAZON
Main Page
Table of content
Copyright
Preface
Who Should Buy This Book
Linux Distributions
How This Book Is Organized
Conventions Used in This Book
Contacting Me
Acknowledgments
Part I: Low-Level Configuration
Chapter 1. Kernel Network Configuration
Starting Kernel Configuration
Network Protocol Support
Network Hardware Options
Compiling and Installing a Kernel
Summary
Chapter 2. TCPIP Network Configuration
Loading Network Drivers
Using a DHCP Client
Configuring a Static IP Address
Using a PPP Link
Summary
Chapter 3. Alternative Network Stacks
Understanding Network Stacks
AppleTalk
IPXSPX
NetBEUI
Summary
Chapter 4. Starting Servers
Using SysV Startup Scripts
Using inetd
Using xinetd
Using Local Startup Scripts
Using GUI Tools
When to Use Each Startup Method
Summary
Part II: Local Network Servers
Chapter 5. Configuring Other Computers via DHCP
When to Run a DHCP Server
Kernel and Network Interface Issues
DHCP Configuration Files
Assigning Dynamic Addresses
Assigning Fixed Addresses
Integrating with Other Protocols
Summary
Chapter 6. Authenticating Users via Kerberos
When to Run a Kerberos Server
Understanding Kerberos Operation
Setting Up a Kerberos Server
Configuring a Kerberos Application Server
Configuring a Kerberos Client
Summary
Chapter 7. File and Printer Sharing via Samba
When to Run a Samba Server
General Samba Configuration
Serving Files with Samba
Serving Printers with Samba
Samba Scripting Features
Summary
Chapter 8. File Sharing via NFS
When to Run an NFS Server
NFS Servers Available for Linux
Understanding the Portmapper
Serving Files with NFS
Username Mapping Options
Summary
Chapter 9. Printer Sharing via LPD
When to Run an LPD Server
LPD Server Options for Linux
Configuring a BSD LPD Server
Configuring an LPRng Server
Configuring a CUPS Server
Summary
Chapter 10. Maintaining Consistent Time: Time Servers
When to Run a Time Server
Setting Up an NTP Server
Using Samba to Serve Time
Summary
Chapter 11. Pull Mail Protocols: POP and IMAP
When to Run a Pull Mail Server
Understanding POP and IMAP
Configuring a POP Server
Configuring an IMAP Server
Using Fetchmail
Summary
Chapter 12. Running a News Server
When to Run a News Server
Understanding NNTP
Running INN
Using Leafnode
Summary
Chapter 13. Maintaining Remote Login Servers
When to Run a Remote Login Server
Configuring rlogind
Configuring Telnet
Configuring SSH
Summary
Chapter 14. Handling GUI Access with X and VNC Servers
When to Run a GUI Access Server
Configuring Basic X Access
Using an XDMCP Server
Running a VNC Server
A Comparison of Access Techniques
Summary
Chapter 15. Providing Consistent Fonts with Font Servers
When to Run a Font Server
Understanding Font File Formats
Running a Traditional Font Server
Running an Expanded Font Server
Summary
Chapter 16. Maintaining a System Remotely
When to Run Remote System Maintenance Tools
The Challenge of a Cross-Distribution Configuration Tool
Running Linuxconf Remotely
Running Webmin
Running SWAT
Remote Administration Security Concerns
Summary
Chapter 17. Performing Network Backups
When to Run Network Backup Servers
Types of Network Backup Solutions
Using tar
Using SMBCIFS
Using AMANDA
Restoring Data
Summary
Part III: Internet Servers
Chapter 18. Administering a Domain via DNS
When to Run a DNS Server
Obtaining a Domain Name
DNS Server Options for Linux
Core DNS Configuration
Domain Administration Options
Running a Caching-Only Name Server
Communicating with a DHCP Server
Starting and Testing the Server
Summary
Chapter 19. Push Mail Protocol: SMTP
When to Run an SMTP Server
SMTP Server Options for Linux
Mail Domain Administration
Understanding SMTP Transport
SMTP Server Configuration Options
Basic Sendmail Configuration
Basic Exim Configuration
Basic Postfix Configuration
Using a Procmail Filter
Summary
Chapter 20. Running Web Servers
When to Run a Web Server
Web Server Options for Linux
Basic Apache Configuration
Configuring kHTTPd
Handling Forms and Scripts
Handling Secure Sites
Handling Virtual Domains
Producing Something Worth Serving
Analyzing Server Log Files
Summary
Chapter 21. Running FTP Servers
When to Run an FTP Server
FTP Server Options for Linux
Basic FTP Server Configuration
Setting Up an Anonymous FTP Server
Summary
Part IV: Network Security and Router Functions
Chapter 22. General System Security
Shutting Down Unnecessary Servers
Controlling Accounts and Passwords
Keeping the System Up to Date
Monitoring for Intrusion Attempts
Keeping Abreast of Security Developments
Summary
Chapter 23. Configuring a chroot Jail
What Is a chroot Jail?
Necessary chroot Environment Files
Configuring a Server to Operate in a chroot Jail
Maintaining the chroot Environment
Summary
Chapter 24. Advanced Router Options
When to Use Advanced Router Configurations
Advanced Kernel Options
Using iproute2
Using Routing Protocols
Summary
Chapter 25. Configuring iptables
What Is iptables ?
Kernel Configuration for iptables
Checking Your iptables Configuration
Configuring a Firewall with iptables
Configuring NAT with iptables
Forwarding Ports with iptables
Logging iptables Activity
Summary
Chapter 26. Using a VPN
When to Use a VPN
VPN Options for Linux
Configuring PPTP in Linux
Configuring a Linux FreeSWAN Server
Potential Security Risks with a VPN
Summary
Advanced Linux Networking
ISBN: 0201774232
EAN: 2147483647
Year: 2002
Pages: 203
Authors:
Roderick W. Smith
BUY ON AMAZON
Qshell for iSeries
Command-Line Arguments
Scripts - Debugging, Signals, and Traps
Grep
Appendix B Qshell versus DOS
Appendix C Qshell and CL Commands for the IFS
Beginning Cryptography with Java
Message Digests, MACs, and HMACs
Key and Certificate Management Using Keystores
SSL and TLS
Appendix A Solutions to Exercises
Appendix C Using the Bouncy Castle API for Elliptic Curve
Metrics and Models in Software Quality Engineering (2nd Edition)
Total Quality Management
Run Charts
Scatter Diagram
Measuring Process Capability
Process Improvement Economics
The CISSP and CAP Prep Guide: Platinum Edition
Information Security and Risk Management
Cryptography
Physical (Environmental) Security
Appendix E The Information System Security Management Professional (ISSMP) Certification
Appendix G Control Baselines
Cisco IOS Cookbook (Cookbooks (OReilly))
Disabling Banners on a Port
Configuring Frame Relay SVCs
NTP Server Configuration
Viewing SDLC Status Information
Restricting TCP Session Direction
Cisco CallManager Fundamentals (2nd Edition)
The Three Responsibilities of Call Routing
Manageability and Monitoring
Storage and Maintenance of CDR Data
Accessing CDR Data in the Central CDR Database
Telephony Service Solutions
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies