SitemapTable of ContentsCopyrightPrefacePurpose and Audience for This BookSources of InformationObtaining LinuxFilesystem StandardsStandard Linux BaseAbout This BookOverviewConventions Used in This BookSafari EnabledHow to Contact UsAcknowledgmentsChapter 1. Introduction to NetworkingSection 1.1. HistorySection 1.2. TCP/IP NetworksSection 1.3. Linux NetworkingSection 1.4. Maintaining Your SystemChapter 2. Issues of TCP/IP NetworkingSection 2.1. Networking InterfacesSection 2.2. IP AddressesSection 2.3. The Internet Control Message ProtocolChapter 3. Configuring the Serial HardwareSection 3.1. Communications Software for Modem LinksSection 3.2. Accessing Serial DevicesSection 3.3. Using the Configuration UtilitiesSection 3.4. Serial Devices and the login: PromptChapter 4. Configuring TCP/IP NetworkingSection 4.1. Understanding the /proc FilesystemChapter 5. Name Service and ConfigurationSection 5.1. The Resolver LibrarySection 5.2. How DNS WorksSection 5.3. Alternatives to BINDChapter 6. The Point-to-Point ProtocolSection 6.1. PPP on LinuxSection 6.2. Running pppdSection 6.3. Using Options FilesSection 6.4. Using chat to Automate DialingSection 6.5. IP Configuration OptionsSection 6.6. Link Control OptionsSection 6.7. General Security ConsiderationsSection 6.8. Authentication with PPPSection 6.9. Debugging Your PPP SetupSection 6.10. More Advanced PPP ConfigurationsSection 6.11. PPPoE Options in LinuxChapter 7. TCP/IP FirewallSection 7.1. Methods of AttackSection 7.2. What Is a Firewall?Section 7.3. What Is IP Filtering?Section 7.4. Netfilter and iptablesSection 7.5. iptables ConceptsSection 7.6. Setting Up Linux for FirewallingSection 7.7. Using iptablesSection 7.8. The iptables SubcommandsSection 7.9. Basic iptables MatchesSection 7.10. A Sample Firewall ConfigurationSection 7.11. ReferencesChapter 8. IP AccountingSection 8.1. Configuring the Kernel for IP AccountingSection 8.2. Configuring IP AccountingSection 8.3. Using IP Accounting ResultsSection 8.4. Resetting the CountersSection 8.5. Flushing the Rule SetSection 8.6. Passive Collection of Accounting DataChapter 9. IP Masquerade and Network Address TranslationSection 9.1. Side Effects and Fringe BenefitsSection 9.2. Configuring the Kernel for IP MasqueradeSection 9.3. Configuring IP MasqueradeSection 9.4. Handling Nameserver Lookups