
Tony Bautts, Terry Dawson, Gregor N. PurdyPublisher: OReillyPub Date: February 2005ISBN: 0-596-00548-2Pages: 362

Copyright

Preface

Purpose and Audience for This Book

Sources of Information

Obtaining Linux

Filesystem Standards

Standard Linux Base

About This Book

Overview

Conventions Used in This Book

Safari Enabled

How to Contact Us

Acknowledgments

Chapter 1.
Introduction to Networking

Section 1.1.
History

Section 1.2.
TCP/IP Networks

Section 1.3.
Linux Networking

Section 1.4.
Maintaining Your System

Chapter 2.
Issues of TCP/IP Networking

Section 2.1.
Networking Interfaces

Section 2.2.
IP Addresses

Section 2.3.
The Internet Control Message Protocol

Chapter 3.
Configuring the Serial Hardware

Section 3.1.
Communications Software for Modem Links

Section 3.2.
Accessing Serial Devices

Section 3.3.
Using the Configuration Utilities

Section 3.4.
Serial Devices and the login: Prompt

Chapter 4.
Configuring TCP/IP Networking

Section 4.1.
Understanding the /proc Filesystem

Chapter 5.
Name Service and Configuration

Section 5.1.
The Resolver Library

Section 5.2.
How DNS Works

Section 5.3.
Alternatives to BIND

Chapter 6.
The Point-to-Point Protocol

Section 6.1.
PPP on Linux

Section 6.2.
Running pppd

Section 6.3.
Using Options Files

Section 6.4.
Using chat to Automate Dialing

Section 6.5.
IP Configuration Options

Section 6.6.
Link Control Options

Section 6.7.
General Security Considerations

Section 6.8.
Authentication with PPP

Section 6.9.
Debugging Your PPP Setup

Section 6.10.
More Advanced PPP Configurations

Section 6.11.
PPPoE Options in Linux

Chapter 7.
TCP/IP Firewall

Section 7.1.
Methods of Attack

Section 7.2.
What Is a Firewall?

Section 7.3.
What Is IP Filtering?

Section 7.4.
Netfilter and iptables

Section 7.5.
iptables Concepts

Section 7.6.
Setting Up Linux for Firewalling

Section 7.7.
Using iptables

Section 7.8.
The iptables Subcommands

Section 7.9.
Basic iptables Matches

Section 7.10.
A Sample Firewall Configuration

Section 7.11.
References

Chapter 8.
IP Accounting

Section 8.1.
Configuring the Kernel for IP Accounting

Section 8.2.
Configuring IP Accounting

Section 8.3.
Using IP Accounting Results

Section 8.4.
Resetting the Counters

Section 8.5.
Flushing the Rule Set

Section 8.6.
Passive Collection of Accounting Data

Chapter 9.
IP Masquerade and Network Address Translation

Section 9.1.
Side Effects and Fringe Benefits

Section 9.2.
Configuring the Kernel for IP Masquerade

Section 9.3.
Configuring IP Masquerade

Section 9.4.
Handling Nameserver Lookups

Section 9.5.
More About Network Address Translation

Chapter 10.
Important Network Features

Section 10.1.
The inetd Super Server

Section 10.2.
The tcpd Access Control Facility

Section 10.3.
The xinetd Alternative

Section 10.4.
The Services and Protocols Files

Section 10.5.
Remote Procedure Call

Section 10.6.
Configuring Remote Login and Execution

Chapter 11.
Administration Issues with Electronic Mail

Section 11.1.
What Is a Mail Message?

Section 11.2.
How Is Mail Delivered?

Section 11.3.
Email Addresses

Section 11.4.
How Does Mail Routing Work?

Section 11.5.
Mail Routing on the Internet

Chapter 12.
sendmail

Section 12.1.
Installing the sendmail Distribution

Section 12.2.
sendmail Configuration Files

Section 12.3.
sendmail.cf Configuration Language

Section 12.4.
Creating a sendmail Configuration

Section 12.5.
sendmail Databases

Section 12.6.
Testing Your Configuration

Section 12.7.
Running sendmail

Section 12.8.
Tips and Tricks

Section 12.9.
More Information

Chapter 13.
Configuring IPv6 Networks

Section 13.1.
The IPv4 Problem and Patchwork Solutions

Section 13.2.
IPv6 as a Solution

Chapter 14.
Configuring the Apache Web Server

Section 14.1.
Apache HTTPD ServerAn Introduction

Section 14.2.
Configuring and Building Apache

Section 14.3.
Configuration File Options

Section 14.4.
VirtualHost Configuration Options

Section 14.5.
Apache and OpenSSL

Section 14.6.
Troubleshooting

Chapter 15.
IMAP

Section 15.1.
IMAPAn Introduction

Section 15.2.
Cyrus IMAP

Chapter 16.
Samba

Section 16.1.
SambaAn Introduction

Chapter 17.
OpenLDAP

Section 17.1.
Understanding LDAP

Section 17.2.
Obtaining OpenLDAP

Chapter 18.
Wireless Networking

Section 18.1.
History

Section 18.2.
The Standards

Section 18.3.
802.11b Security Concerns

Appendix A.
Example Network: The Virtual Brewery

Section A.1.
Connecting the Virtual Subsidiary Network

Colophon
