Part I: Low-Level Configuration
Chapter 1. Kernel Network Configuration
Compiling and Installing a Kernel
Chapter 2. TCP/IP Network Configuration
Configuring a Static IP Address
Chapter 3. Alternative Network Stacks
When to Use Each Startup Method
Part II: Local Network Servers
Chapter 5. Configuring Other Computers via DHCP
Kernel and Network Interface Issues
Integrating with Other Protocols
Chapter 6. Authenticating Users via Kerberos
Understanding Kerberos Operation
Configuring a Kerberos Application Server
Chapter 7. File and Printer Sharing via Samba
Chapter 8. File Sharing via NFS
NFS Servers Available for Linux
Chapter 9. Printer Sharing via LPD
Chapter 10. Maintaining Consistent Time: Time Servers
Chapter 11. Pull Mail Protocols: POP and IMAP
When to Run a Pull Mail Server
Chapter 12. Running a News Server
Chapter 13. Maintaining Remote Login Servers
When to Run a Remote Login Server
Chapter 14. Handling GUI Access with X and VNC Servers
When to Run a GUI Access Server
A Comparison of Access Techniques
Chapter 15. Providing Consistent Fonts with Font Servers
Understanding Font File Formats
Running a Traditional Font Server
Running an Expanded Font Server
Chapter 16. Maintaining a System Remotely
When to Run Remote System Maintenance Tools
The Challenge of a Cross-Distribution Configuration Tool
Remote Administration Security Concerns
Chapter 17. Performing Network Backups
When to Run Network Backup Servers
Types of Network Backup Solutions
Chapter 18. Administering a Domain via DNS
Running a Caching-Only Name Server
Communicating with a DHCP Server
Starting and Testing the Server
Chapter 19. Push Mail Protocol: SMTP
SMTP Server Configuration Options
Chapter 20. Running Web Servers
Producing Something Worth Serving
Chapter 21. Running FTP Servers
Basic FTP Server Configuration
Setting Up an Anonymous FTP Server
Part IV: Network Security and Router Functions
Chapter 22. General System Security
Shutting Down Unnecessary Servers
Controlling Accounts and Passwords
Monitoring for Intrusion Attempts
Keeping Abreast of Security Developments
Chapter 23. Configuring a chroot Jail
Necessary chroot Environment Files
Configuring a Server to Operate in a chroot Jail
Maintaining the chroot Environment
Chapter 24. Advanced Router Options
When to Use Advanced Router Configurations
Chapter 25. Configuring iptables
Kernel Configuration for iptables
Checking Your iptables Configuration
Configuring a Firewall with iptables
Forwarding Ports with iptables
Configuring a Linux FreeS/WAN Server
Potential Security Risks with a VPN