Network administrator guide linux

Linux Network Administrator’s Guide, Second Edition

Linux Network Administrator's Guide, Second Edition

Read it now on the O’Reilly learning platform with a 10-day free trial.

O’Reilly members get unlimited access to books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.

Book description

Table of contents

  1. Linux Network Administrator’s Guide, 2nd Edition
    1. Preface
      1. Purpose and Audience for This Book
      2. Sources of Information
        1. Documentation Available via FTP
        2. Documentation Available via WWW
        3. Documentation Available Commercially
        4. Linux Journal and Linux Magazine
        5. LinuxUsenet Newsgroups
        6. Linux Mailing Lists
        7. Online Linux Support
        8. Linux User Groups
        9. Obtaining Linux
        1. The Hall of Fame
        1. History
        2. TCP/IP Networks
          1. Introduction to TCP/IP Networks
          2. Ethernets
          3. Other Types of Hardware
          4. The Internet Protocol
          5. IP Over Serial Lines
          6. The Transmission Control Protocol
          7. The User Datagram Protocol
          8. More on Ports
          9. The Socket Library
          1. Different Streaks of Development
          2. Where to Get the Code
          1. System Security
          1. Networking Interfaces
          2. IP Addresses
          3. Address Resolution
          4. IP Routing
            1. IP Networks
            2. Subnetworks
            3. Gateways
            4. The Routing Table
            5. Metric Values
            1. Kernel Configuration
              1. Kernel Options in Linux 2.0 and Higher
              2. Kernel Networking Options in Linux 2.0.0 and Higher
              1. Ethernet Autoprobing
              1. Communications Software for Modem Links
              2. Introduction to Serial Devices
              3. Accessing Serial Devices
                1. The Serial Device Special Files
                1. The setserial Command
                2. The stty Command
                1. Configuring the mgetty Daemon
                1. Mounting the /proc Filesystem
                2. Installing the Binaries
                3. Setting the Hostname
                4. Assigning IP Addresses
                5. Creating Subnets
                6. Writing hosts and networks Files
                7. Interface Configuration for IP
                  1. The Loopback Interface
                  2. Ethernet Interfaces
                  3. Routing Through a Gateway
                  4. Configuring a Gateway
                  5. The PLIP Interface
                  6. The SLIP and PPP Interfaces
                  7. The Dummy Interface
                  8. IP Alias
                  1. Displaying the Routing Table
                  2. Displaying Interface Statistics
                  3. Displaying Connections
                  1. The Resolver Library
                    1. The host.conf File
                      1. Resolver environment variables
                      1. Name Lookups with DNS
                      2. Types of Name Servers
                      3. The DNS Database
                      4. Reverse Lookups
                      1. The named.boot File
                      2. The BIND 8 host.conf File
                      3. The DNS Database Files
                      4. Caching-only named Configuration
                      5. Writing the Master Files
                      6. Verifying the Name Server Setup
                      7. Other Useful Tools
                      1. General Requirements
                      2. SLIP Operation
                      3. Dealing with Private IP Networks
                      4. Using dip
                        1. A Sample Script
                        2. A dip Reference
                          1. The modem commands
                          2. The echo command
                          3. The get command
                          4. The print command
                          5. Variable names
                          6. The if and goto commands
                          7. send, wait, and sleep
                          8. mode and default
                          1. PPP on Linux
                          2. Running pppd
                          3. Using Options Files
                          4. Using chat to Automate Dialing
                          5. IP Configuration Options
                            1. Choosing IP Addresses
                            2. Routing Through a PPP Link
                            1. PAP Versus CHAP
                            2. The CHAP Secrets File
                            3. The PAP Secrets File
                            1. PPP Server
                            2. Demand Dialing
                            3. Persistent Dialing
                            1. Methods of Attack
                            2. What Is a Firewall?
                            3. What Is IP Filtering?
                            4. Setting Up Linux for Firewalling
                              1. Kernel Configured with IP Firewall
                              2. The ipfwadm Utility
                              3. The ipchains Utility
                              4. The iptables Utility
                              1. Using ipfwadm
                                1. A naïve example
                                2. An important refinement
                                3. Listing our rules
                                1. Categories
                                2. Commands
                                3. Parameters
                                4. Optional arguments
                                5. ICMP datagram types
                                1. Using ipchains
                                2. ipchains Command Syntax
                                  1. Commands
                                  2. Rule specification parameters
                                  3. Options
                                  1. User-defined chains
                                  2. The ipchains support scripts
                                  1. Backward Compatability with ipfwadm and ipchains
                                  2. Using iptables
                                    1. Commands
                                    2. Rule specification parameters
                                    3. Options
                                    4. Extensions
                                      1. TCP Extensions: used with -m tcp -p tcp
                                      2. UDP Extensions: used with -m udp -p udp
                                      3. ICMP Extensions: used with -m icmp -p icmp
                                      4. MAC Extensions: used with -m mac
                                      1. Setting the TOS Bits Using ipfwadm or ipchains
                                      2. Setting the TOS Bits Using iptables
                                      1. Configuring the Kernel for IP Accounting
                                      2. Configuring IP Accounting
                                        1. Accounting by Address
                                        2. Accounting by Service Port
                                        3. Accounting of ICMP Datagrams
                                        4. Accounting by Protocol
                                        1. Listing Accounting Data with ipfwadm
                                        2. Listing Accounting Data with ipchains
                                        3. Listing Accounting Data with iptables
                                        1. Side Effects and Fringe Benefits
                                        2. Configuring the Kernel for IP Masquerade
                                        3. Configuring IP Masquerade
                                          1. Setting Timing Parameters for IP Masquerade
                                          1. The inetd Super Server
                                          2. The tcpd Access Control Facility
                                          3. The Services and Protocols Files
                                          4. Remote Procedure Call
                                          5. Configuring Remote Login and Execution
                                            1. Disabling the r; Commands
                                            2. Installing and Configuring ssh
                                              1. The ssh daemon
                                              2. The ssh client
                                              3. Using ssh
                                              1. Getting Acquainted with NIS
                                              2. NIS Versus NIS+
                                              3. The Client Side of NIS
                                              4. Running an NIS Server
                                              5. NIS Server Security
                                              6. Setting Up an NIS Client with GNU libc
                                              7. Choosing the Right Maps
                                              8. Using the passwd and group Maps
                                              9. Using NIS with Shadow Support
                                              1. Preparing NFS
                                              2. Mounting an NFS Volume
                                              3. The NFS Daemons
                                              4. The exports File
                                              5. Kernel-Based NFSv2 Server Support
                                              6. Kernel-Based NFSv3 Server Support
                                              1. Xerox, Novell, and History
                                              2. IPX and Linux
                                                1. Caldera Support
                                                2. More on NDS Support
                                                1. Network Devices Supporting IPX
                                                2. IPX Interface Configuration Tools
                                                3. The ipx_configure Command
                                                4. The ipx_interface Command
                                                1. Static IPX Routing Using the ipx_route Command
                                                2. Internal IPX Networks and Routing
                                                1. A Simple ncpmount Example
                                                2. The ncpmount Command in Detail
                                                3. Hiding Your NetWare Login Password
                                                4. A More Complex ncpmount Example
                                                1. Server List
                                                2. Send Messages to NetWare Users
                                                3. Browsing and Manipulating Bindery Data
                                                1. Using nprint with the Line Printer Daemon
                                                2. Managing Print Queues
                                                1. UUCP Transfers and Remote Execution
                                                  1. The Inner Workings of uucico
                                                  2. uucico Command-line Options
                                                  1. A Gentle Introduction to Taylor UUCP
                                                  2. What UUCP Needs to Know
                                                  3. Site Naming
                                                  4. Taylor Configuration Files
                                                  5. General Configuration Options Using the config File
                                                  6. How to Tell UUCP About Other Systems Using the sys File
                                                    1. System name
                                                    2. Telephone number
                                                    3. port and speed
                                                    4. The login chat
                                                    5. Alternates
                                                    6. Restricting call times
                                                    1. Command Execution
                                                    2. File Transfers
                                                    3. Forwarding
                                                    1. Providing UUCP Accounts
                                                    2. Protecting Yourself Against Swindlers
                                                    3. Be Paranoid: Call Sequence Checks
                                                    4. Anonymous UUCP
                                                    1. Protocol Overview
                                                    2. Tuning the Transmission Protocol
                                                    3. Selecting Specific Protocols
                                                    1. uucico Keeps Saying “Wrong Time to Call”
                                                    2. uucico Complains That the Site Is Already Locked
                                                    3. You Can Connect to the Remote Site, but the Chat Script Fails
                                                    4. Your Modem Does Not Dial
                                                    5. Your Modem Tries to Dial but Doesn’t Get Out
                                                    6. Login Succeeds, but the Handshake Fails
                                                    1. What Is a Mail Message?
                                                    2. How Is Mail Delivered?
                                                    3. Email Addresses
                                                      1. RFC-822
                                                      2. Obsolete Mail Formats
                                                      3. Mixing Different Mail Formats
                                                      1. Mail Routing on the Internet
                                                      2. Mail Routing in the UUCP World
                                                      3. Mixing UUCP and RFC-822
                                                      1. Global elm Options
                                                      2. National Character Sets
                                                      1. Introduction to sendmail
                                                      2. Installing sendmail
                                                      3. Overview of Configuration Files
                                                      4. The sendmail.cf and sendmail.mc Files
                                                        1. Two Example sendmail.mc Files
                                                        2. Typically Used sendmail.mc Parameters
                                                          1. Comments
                                                          2. VERSIONID and OSTYPE
                                                          3. DOMAIN
                                                          4. FEATURE
                                                          5. Local macro definitions
                                                          6. Defining mail transport protocols
                                                          7. Configure mail routing for local hosts
                                                          1. sendmail.cf R and S Commands
                                                          2. Some Useful Macro Definitions
                                                          3. The Lefthand Side
                                                          4. The Righthand Side
                                                          5. A Simple Rule Pattern Example
                                                          6. Ruleset Semantics
                                                            1. Interpreting the rule in our example
                                                            1. Trusting Users to Set the From: Field
                                                            2. Managing Mail Aliases
                                                            3. Using a Smart Host
                                                            4. Managing Unwanted or Unsolicited Mail (Spam)
                                                              1. The Real-time Blackhole List
                                                              2. The access database
                                                              3. Barring users from receiving mail
                                                              1. Accepting mail for other domains
                                                              2. Forwarding virtual-hosted mail to other destinations
                                                              1. Managing the Mail Spool
                                                              2. Forcing a Remote Host to Process its Mail Queue
                                                              3. Analyzing Mail Statistics
                                                                1. mailstats
                                                                2. hoststat
                                                                1. Running Exim
                                                                2. If Your Mail Doesn’t Get Through
                                                                3. Compiling Exim
                                                                4. Mail Delivery Modes
                                                                5. Miscellaneous config Options
                                                                6. Message Routing and Delivery
                                                                  1. Routing Messages
                                                                  2. Delivering Messages to Local Addresses
                                                                    1. Local users
                                                                    2. Forwarding
                                                                    1. Usenet History
                                                                    2. What Is Usenet, Anyway?
                                                                    3. How Does Usenet Handle News?
                                                                    1. Delivering News
                                                                    2. Installation
                                                                    3. The sys File
                                                                    4. The active File
                                                                    5. Article Batching
                                                                    6. Expiring News
                                                                    7. Miscellaneous Files
                                                                    8. Control Messages
                                                                      1. The cancel Message
                                                                      2. newgroup and rmgroup
                                                                      3. The checkgroups Message
                                                                      4. sendsys, version, and senduuname
                                                                      1. The NNTP Protocol
                                                                        1. Connecting to the News Server
                                                                        2. Pushing a News Article onto a Server
                                                                        3. Changing to NNRP Reader Mode
                                                                        4. Listing Available Groups
                                                                        5. Listing Active Groups
                                                                        6. Posting an Article
                                                                        7. Listing New Articles
                                                                        8. Selecting a Group on Which to Operate
                                                                        9. Listing Articles in a Group
                                                                        10. Retrieving an Article Header Only
                                                                        11. Retrieving an Article Body Only
                                                                        12. Reading an Article from a Group
                                                                        1. Some INN Internals
                                                                        2. Newsreaders and INN
                                                                        3. Installing INN
                                                                        4. Configuring INN: the Basic Setup
                                                                        5. INN Configuration Files
                                                                          1. Global Parameters
                                                                            1. The inn.conf file
                                                                            1. The active and newsgroups files
                                                                            1. The newsfeeds file
                                                                            2. The nntpsend.ctl file
                                                                            1. The incoming.conf file
                                                                            2. The nnrp.access file
                                                                            1. The expire.ctl file
                                                                            1. The control.ctl file
                                                                            1. Add a New Group
                                                                            2. Change a Group
                                                                            3. Remove a Group
                                                                            4. Renumber a Group
                                                                            5. Allow/Disallow Newsreaders
                                                                            6. Reject Newsfeed Connections
                                                                            7. Allow Newsfeed Connections
                                                                            8. Disable News Server
                                                                            9. Restart News Server
                                                                            10. Display Status of a Newsfeed
                                                                            11. Drop a Newsfeed
                                                                            12. Begin a Newsfeed
                                                                            13. Cancel an Article
                                                                            1. tin Configuration
                                                                            2. trn Configuration
                                                                            3. nn Configuration
                                                                            1. Connecting the Virtual Subsidiary Network
                                                                            1. A PLIP Parallel Cable
                                                                            2. A Serial NULL Modem Cable
                                                                            1. 0. Preamble
                                                                            2. 1. Applicability and Definitions
                                                                            3. 2. Verbatim Copying
                                                                            4. 3. Copying in Quantity
                                                                            5. 4. Modifications
                                                                            6. 5. Combining Documents
                                                                            7. 6. Collections of Documents
                                                                            8. 7. Aggregation with Independent Works
                                                                            9. 8. Translation
                                                                            10. 9. Termination
                                                                            11. 10. Future Revisions of this License

                                                                            Product information

                                                                            • Title: Linux Network Administrator’s Guide, Second Edition
                                                                            • Author(s):
                                                                            • Release date:
                                                                            • Publisher(s): O’Reilly Media, Inc.
                                                                            • ISBN: None

                                                                            Источник

                                                                            Kirch Olaf » Linux Network Administrator Guide, Second Edition

                                                                            This book was written to provide a single reference for network administration in a Linux environment. Beginners and experienced users alike should find the information they need to cover nearly all important administration activities required to manage a Linux network configuration. The possible range of topics to cover is nearly limitless, so of course it has been impossible to include everything there is to say on all subjects. We’ve tried to cover the most important and common ones. We’ve found that beginners to Linux networking, even those with no prior exposure to Unix-like operating systems, have found this book .

                                                                            Скачать книгу бесплатно:

                                                                            Пока отзывов к этой книге нет.

                                                                            • Second Hand — Дарк Олег
                                                                            • Second-hand — Белаш Александр
                                                                            • Linux From Scratch — Beekmans Gerard
                                                                            • Complete Stories 3 — Second Variety and Other Stories — Dick Philip
                                                                            • Unstable Networks — Sterling Bruce
                                                                            • Second Foundation — Asimov Isaac
                                                                            • Asimov’s Guide To Shakespear. Volume 1 — Asimov Isaac
                                                                            • Seconda Fondazione — Asimov Isaac
                                                                            • Second Contact — Turtledove Harry
                                                                            • Split Second — Baldacci David
                                                                            • Земля. Second edition. — Сомов Кирилл
                                                                            • A Girls Guide to Vampires — Макалистер Кейти
                                                                            • The Mastery Of Love: A Practical Guide to the Art of Relationship — Ruiz Miguel
                                                                            • Embedded Linux Primer: A Practical, Real-World Approach — Hallinan Christopher
                                                                            • Проза
                                                                            • Поэзия
                                                                            • Детективы
                                                                            • Фантастика
                                                                            • Любовные романы
                                                                            • Бизнес-литература
                                                                            • Детские книги
                                                                            • Приключения и путешествия
                                                                            • Документальная литература
                                                                            • Дом и семья
                                                                            • Компьютеры, Технологии, Интернет
                                                                            • Научно-образовательная литература
                                                                            • Пьесы и драматургия
                                                                            • Религиозная литература
                                                                            • Энциклопедии
                                                                            • Техника
                                                                            • Творчество и фольклор
                                                                            • Юмор

                                                                            Источник

                                                                            Читайте также:  Red hat linux sql server
Оцените статью
Adblock
detector