на главную   |   А-Я   |   A-Z   |   меню

Dawson Terry + Kirch Olaf

Linux Network Administrator Guide, Second Edition

Оценка: 3.5 (37)
Жанр: компьютерная литература
Описание:
This book was written to provide a single reference for network administration in a Linux environment. Beginners and experienced users alike should find the information they need to cover nearly all important administration activities required to manage a Linux network configuration. The possible range of topics to cover is nearly limitless, so of course it has been impossible to include everything there is to say on all subjects. We've tried to cover the most important and common ones. We've found that beginners to Linux networking, even those with no prior exposure to Unix-like operating systems, have found this book good enough to help them successfully get their Linux network configurations up and running and get them ready to learn more.

There are many books and other sources of information from which you can learn any of the topics covered in this book (with the possible exception of some of the truly Linux-specific features, such as the new Linux firewall interface, which is not well documented elsewhere) in greater depth. We've provided a bibliography for you to use when you are ready to explore more.
Полный текст книги (читать онлайн)
Скачать эту книгу в формате: fb2 527k, epub 1m, mobi 1m, txt, html

скрыть содержание

  1. Olaf Kirch & Terry Dawson Linux Network Administrators Guide, 2nd Edition
  2. Preface
  3. Purpose and Audience for This Book
  4. Sources of Information
  5. Linux Documentation Project guides
  6. HOWTO documents
  7. Linux Frequently Asked Questions
  8. Documentation Available via FTP
  9. Documentation Available via WWW
  10. Documentation Available Commercially
  11. Linux Journal and Linux Magazine
  12. Linux Usenet Newsgroups
  13. Linux Mailing Lists
  14. Online Linux Support
  15. Linux User Groups
  16. Obtaining Linux
  17. File System Standards
  18. Standard Linux Base
  19. About This Book
  20. The Official Printed Version
  21. Overview
  22. Conventions Used in This Book
  23. Submitting Changes
  24. Acknowledgments
  25. The Hall of Fame
  26. Chapter 1. Introduction to Networking
  27. History
  28. TCP/IP Networks
  29. Introduction to TCP/IP Networks
  30. Ethernets
  31. Other Types of Hardware
  32. The Internet Protocol
  33. IP Over Serial Lines
  34. The Transmission Control Protocol
  35. The User Datagram Protocol
  36. More on Ports
  37. The Socket Library
  38. UUCP Networks
  39. Linux Networking
  40. Different Streaks of Development
  41. Where to Get the Code
  42. Maintaining Your System
  43. System Security
  44. Chapter 2. Issues of TCP/IP Networking
  45. Networking Interfaces
  46. IP Addresses
  47. Address Resolution
  48. IP Routing
  49. IP Networks
  50. Subnetworks
  51. Gateways
  52. The Routing Table
  53. Metric Values
  54. The Internet Control Message Protocol
  55. Resolving Host Names
  56. Chapter 3. Configuring the Networking Hardware
  57. Kernel Configuration
  58. Kernel Options in Linux 2.0 and Higher
  59. Kernel Networking Options in Linux 2.0.0 and Higher
  60. A Tour of Linux Network Devices
  61. Ethernet Installation
  62. Ethernet Autoprobing
  63. The PLIP Driver
  64. The PPP and SLIP Drivers
  65. Other Network Types
  66. Chapter 4. Configuring the Serial Hardware
  67. Communications Software for Modem Links
  68. Introduction to Serial Devices
  69. Accessing Serial Devices
  70. The Serial Device Special Files
  71. Serial Hardware
  72. Using the Configuration Utilities
  73. The setserial Command
  74. The stty Command
  75. Serial Devices and the login: Prompt
  76. Configuring the mgetty Daemon
  77. Chapter 5. Configuring TCP/IP Networking
  78. Mounting the /proc Filesystem
  79. Installing the Binaries
  80. Setting the Hostname
  81. Assigning IP Addresses
  82. Creating Subnets
  83. Writing hosts and networks Files
  84. Interface Configuration for IP
  85. The Loopback Interface
  86. Ethernet Interfaces
  87. Routing Through a Gateway
  88. Configuring a Gateway
  89. The PLIP Interface
  90. The SLIP and PPP Interfaces
  91. The Dummy Interface
  92. IP Alias
  93. All About ifconfig
  94. The netstat Command
  95. Displaying the Routing Table
  96. Displaying Interface Statistics
  97. Displaying Connections
  98. Checking the ARP Tables
  99. Chapter 6. Name Service and Resolver Configuration
  100. The Resolver Library
  101. The host.conf File
  102. The nsswitch.conf File
  103. Configuring Name Server Lookups Using resolv.conf
  104. Resolver Robustness
  105. How DNS Works
  106. Name Lookups with DNS
  107. Types of Name Servers
  108. The DNS Database
  109. Reverse Lookups
  110. Running named
  111. The named.boot File
  112. The BIND 8 host.conf File
  113. The DNS Database Files
  114. Caching-only named Configuration
  115. Writing the Master Files
  116. Verifying the Name Server Setup
  117. Other Useful Tools
  118. Chapter 7. Serial Line IP
  119. General Requirements
  120. SLIP Operation
  121. Dealing with Private IP Networks
  122. Using dip
  123. A Sample Script
  124. A dip Reference
  125. The modem commands
  126. The echo command
  127. The get command
  128. The print command
  129. Variable names
  130. The if and goto commands
  131. send, wait, and sleep
  132. mode and default
  133. Running in Server Mode
  134. Chapter 8. The Point-to-Point Protocol
  135. PPP on Linux
  136. Running pppd
  137. Using Options Files
  138. Using chat to Automate Dialing
  139. IP Configuration Options
  140. Choosing IP Addresses
  141. Routing Through a PPP Link
  142. Link Control Options
  143. General Security Considerations
  144. Authentication with PPP  
  145. PAP Versus CHAP
  146. The CHAP Secrets File
  147. The PAP Secrets File
  148. Debugging Your PPP Setup
  149. More Advanced PPP Configurations
  150. PPP Server
  151. Demand Dialing
  152. Persistent Dialing
  153. Chapter 9. TCP/IP Firewall
  154. Methods of Attack  
  155. What Is a Firewall?
  156. What Is IP Filtering?
  157. Setting Up Linux for Firewalling
  158. Kernel Configured with IP Firewall
  159. The ipfwadm Utility
  160. The ipchains Utility
  161. The iptables Utility
  162. Three Ways We Can Do Filtering
  163. Original IP Firewall (2.0 Kernels)
  164. Using ipfwadm
  165. A na
  166. An important refinement
  167. Listing our rules
  168. A More Complex Example
  169. Summary of ipfwadm Arguments
  170. Categories
  171. Commands
  172. Parameters
  173. Optional arguments
  174. ICMP datagram types
  175. IP Firewall Chains (2.2 Kernels)
  176. Using ipchains
  177. ipchains Command Syntax
  178. Commands
  179. Rule specification parameters
  180. Options
  181. Our Na
  182. Listing Our Rules with ipchains
  183. Making Good Use of Chains
  184. User-defined chains
  185. The ipchains support scripts
  186. Netfilter and IP Tables (2.4 Kernels)
  187. Backward Compatability with ipfwadm and ipchains
  188. Using iptables
  189. Commands
  190. Rule specification parameters
  191. Options
  192. Extensions
  193. TCP Extensions: used with -m tcp -p tcp
  194. UDP Extensions: used with -m udp -p udp
  195. ICMP Extensions: used with -m icmp -p icmp
  196. MAC Extensions: used with -m mac
  197. Our Na
  198. TOS Bit Manipulation
  199. Setting the TOS Bits Using ipfwadm or ipchains
  200. Setting the TOS Bits Using iptables
  201. Testing a Firewall Configuration
  202. A Sample Firewall Configuration
  203. Chapter 10. IP Accounting
  204. Configuring the Kernel for IP Accounting
  205. Configuring IP Accounting
  206. Accounting by Address
  207. Accounting by Service Port
  208. Accounting of ICMP Datagrams
  209. Accounting by Protocol
  210. Using IP Accounting Results
  211. Listing Accounting Data with ipfwadm
  212. Listing Accounting Data with ipchains
  213. Listing Accounting Data with iptables
  214. Resetting the Counters
  215. Flushing the Ruleset
  216. Passive Collection of Accounting Data
  217. Chapter 11. IP Masquerade and Network Address Translation
  218. Side Effects and Fringe Benefits
  219. Configuring the Kernel for IP Masquerade
  220. Configuring IP Masquerade
  221. Setting Timing Parameters for IP Masquerade
  222. Handling Name Server Lookups
  223. More About Network Address Translation
  224. Chapter 12. Important Network Features
  225. The inetd Super Server
  226. The tcpd Access Control Facility
  227. The Services and Protocols Files
  228. Remote Procedure Call
  229. Configuring Remote Login and Execution
  230. Disabling the r; Commands
  231. Installing and Configuring ssh
  232. The ssh daemon
  233. The ssh client
  234. Using ssh
  235. Chapter 13. The Network Information System
  236. Getting Acquainted with NIS
  237. NIS Versus NIS+
  238. The Client Side of NIS
  239. Running an NIS Server
  240. NIS Server Security
  241. Setting Up an NIS Client with GNU libc
  242. Choosing the Right Maps
  243. Using the passwd and group Maps
  244. Using NIS with Shadow Support
  245. Chapter 14. The Network File System
  246. Preparing NFS
  247. Mounting an NFS Volume
  248. The NFS Daemons
  249. The exports File
  250. Kernel-Based NFSv2 Server Support
  251. Kernel-Based NFSv3 Server Support
  252. Chapter 15. IPX and the NCP Filesystem
  253. Xerox, Novell, and History
  254. IPX and Linux
  255. Caldera Support
  256. More on NDS Support
  257. Configuring the Kernel for IPX and NCPFS
  258. Configuring IPX Interfaces
  259. Network Devices Supporting IPX
  260. IPX Interface Configuration Tools
  261. The ipx_configure Command
  262. The ipx_interface Command
  263. Configuring an IPX Router
  264. Static IPX Routing Using the ipx_route Command
  265. Internal IPX Networks and Routing
  266. Mounting a Remote NetWare Volume
  267. A Simple ncpmount Example
  268. The ncpmount Command in Detail
  269. Hiding Your NetWare Login Password
  270. A More Complex ncpmount Example
  271. Exploring Some of the Other IPX Tools
  272. Server List
  273. Send Messages to NetWare Users
  274. Browsing and Manipulating Bindery Data
  275. Printing to a NetWare Print Queue
  276. Using nprint with the Line Printer Daemon
  277. Managing Print Queues
  278. NetWare Server Emulation
  279. Chapter 16. Managing Taylor UUCP
  280. UUCP Transfers and Remote Execution
  281. The Inner Workings of uucico
  282. uucico Command-line Options
  283. UUCP Configuration Files
  284. A Gentle Introduction to Taylor UUCP
  285. What UUCP Needs to Know
  286. Site Naming
  287. Taylor Configuration Files
  288. General Configuration Options Using the config File
  289. How to Tell UUCP About Other Systems Using the sys File
  290. System name
  291. Telephone number
  292. port and speed
  293. The login chat
  294. Alternates
  295. Restricting call times
  296. Identifying Available Devices Through the port File
  297. How to Dial a Number Using the dial File
  298. UUCP Over TCP
  299. Using a Direct Connection
  300. Controlling Access to UUCP Features
  301. Command Execution
  302. File Transfers
  303. Forwarding
  304. Setting Up Your System for Dialing In
  305. Providing UUCP Accounts
  306. Protecting Yourself Against Swindlers
  307. Be Paranoid: Call Sequence Checks
  308. Anonymous UUCP
  309. UUCP Low-Level Protocols
  310. Protocol Overview
  311. Tuning the Transmission Protocol
  312. Selecting Specific Protocols
  313. Troubleshooting
  314. uucico Keeps Saying "Wrong Time to Call"
  315. uucico Complains That the Site Is Already Locked
  316. You Can Connect to the Remote Site, but the Chat Script Fails
  317. Your Modem Does Not Dial
  318. Your Modem Tries to Dial but Doesn Get Out
  319. Login Succeeds, but the Handshake Fails
  320. Log Files and Debugging
  321. Chapter 17. Electronic Mail
  322. What Is a Mail Message?
  323. How Is Mail Delivered?
  324. Email Addresses
  325. RFC-822
  326. Obsolete Mail Formats
  327. Mixing Different Mail Formats
  328. How Does Mail Routing Work?
  329. Mail Routing on the Internet
  330. Mail Routing in the UUCP World
  331. Mixing UUCP and RFC-822
  332. Configuring elm
  333. Global elm Options
  334. National Character Sets
  335. Chapter 18. Sendmail
  336. Introduction to sendmail
  337. Installing sendmail
  338. Overview of Configuration Files
  339. The sendmail.cf and sendmail.mc Files
  340. Two Example sendmail.mc Files
  341. Typically Used sendmail.mc Parameters
  342. Comments
  343. VERSIONID and OSTYPE
  344. DOMAIN
  345. FEATURE
  346. Local macro definitions
  347. Defining mail transport protocols
  348. Configure mail routing for local hosts
  349. Generating the sendmail.cf File
  350. Interpreting and Writing Rewrite Rules
  351. sendmail.cf R and S Commands
  352. Some Useful Macro Definitions
  353. The Lefthand Side
  354. The Righthand Side
  355. A Simple Rule Pattern Example
  356. Ruleset Semantics
  357. Interpreting the rule in our example
  358. Configuring sendmail Options
  359. Some Useful sendmail Configurations
  360. Trusting Users to Set the From: Field
  361. Managing Mail Aliases
  362. Using a Smart Host
  363. Managing Unwanted or Unsolicited Mail (Spam)
  364. The Real-time Blackhole List  
  365. The access database
  366. Barring users from receiving mail
  367. Configuring Virtual Email Hosting
  368. Accepting mail for other domains
  369. Forwarding virtual-hosted mail to other destinations
  370. Testing Your Configuration
  371. Running sendmail
  372. Tips and Tricks
  373. Managing the Mail Spool
  374. Forcing a Remote Host to Process its Mail Queue
  375. Analyzing Mail Statistics
  376. mailstats
  377. hoststat
  378. Chapter 19. Getting Exim Up and Running
  379. Running Exim
  380. If Your Mail Doesn Get Through
  381. Compiling Exim
  382. Mail Delivery Modes
  383. Miscellaneous config Options
  384. Message Routing and Delivery
  385. Routing Messages
  386. Delivering Messages to Local Addresses
  387. Local users
  388. Forwarding
  389. Alias Files
  390. Mailing Lists
  391. Protecting Against Mail Spam
  392. UUCP Setup
  393. Chapter 20. Netnews
  394. Usenet History
  395. What Is Usenet, Anyway?
  396. How Does Usenet Handle News?
  397. Chapter 21. C News
  398. Delivering News
  399. Installation
  400. The sys File
  401. The active File
  402. Article Batching
  403. Expiring News
  404. Miscellaneous Files
  405. Control Messages
  406. The cancel Message
  407. newgroup and rmgroup
  408. The checkgroups Message
  409. sendsys, version, and senduuname
  410. C News in an NFS Environment
  411. Maintenance Tools and Tasks
  412. Chapter 22. NNTP and the nntpd Daemon
  413. The NNTP Protocol
  414. Connecting to the News Server
  415. Pushing a News Article onto a Server
  416. Changing to NNRP Reader Mode
  417. Listing Available Groups
  418. Listing Active Groups
  419. Posting an Article
  420. Listing New Articles
  421. Selecting a Group on Which to Operate
  422. Listing Articles in a Group
  423. Retrieving an Article Header Only
  424. Retrieving an Article Body Only
  425. Reading an Article from a Group
  426. Installing the NNTP Server
  427. Restricting NNTP Access
  428. NNTP Authorization
  429. nntpd Interaction with C News
  430. Chapter 23. Internet News
  431. Some INN Internals
  432. Newsreaders and INN
  433. Installing INN
  434. Configuring INN: the Basic Setup
  435. INN Configuration Files
  436. Global Parameters
  437. The inn.conf file
  438. Configuring Newsgroups
  439. The active and newsgroups files
  440. Configuring Newsfeeds
  441. The newsfeeds file
  442. The nntpsend.ctl file
  443. Controlling Newsreader Access
  444. The incoming.conf file
  445. The nnrp.access file
  446. Expiring News Articles
  447. The expire.ctl file
  448. Handling Control Messages
  449. The control.ctl file
  450. Running INN
  451. Managing INN: The ctlinnd Command
  452. Add a New Group
  453. Change a Group
  454. Remove a Group
  455. Renumber a Group
  456. Allow/Disallow Newsreaders
  457. Reject Newsfeed Connections
  458. Allow Newsfeed Connections
  459. Disable News Server
  460. Restart News Server
  461. Display Status of a Newsfeed
  462. Drop a Newsfeed
  463. Begin a Newsfeed
  464. Cancel an Article
  465. Chapter 24. Newsreader Configuration
  466. tin Configuration
  467. trn Configuration
  468. nn Configuration
  469. Appendix A. Example Network: The Virtual Brewery
  470. Connecting the Virtual Subsidiary Network
  471. Appendix B. Useful Cable Configurations
  472. A PLIP Parallel Cable
  473. A Serial NULL Modem Cable
  474. Appendix C. Copyright Information
  475. Preamble  
  476. Applicability and Definitions
  477. Verbatim Copying
  478. Copying in Quantity
  479. Modifications
  480. Combining Documents
  481. Collections of Documents
  482. Aggregation with Independent Works
  483. Translation
  484. Termination
  485. Future Revisions of this License
  486. Appendix D. SAGE: The System Administrators Guild
  487. Примечания


Ваше впечатление от этой книги  


Комментарии


Ваше имя:     Ваше впечатление от этой книги

Комментарий:


получать комментарии о книге Linux Network Administrator Guide, Second Edition на e-mail

Код авторизации Anti spam Capcha