• Table of Contents
• Reviews
• Reader Reviews
• Errata
• Academic
Linux Network Administrators Guide, 3rd Edition
By Tony Bautts, Terry Dawson, Gregor N. Purdy
Publisher: OReilly
Pub Date: February 2005
ISBN: 0-596-00548-2
Pages: 362
Copyright
Preface
Purpose and Audience for This Book
Sources of Information
Obtaining Linux
Filesystem Standards
Standard Linux Base
About This Book
Overview
Conventions Used in This Book
Safari Enabled
How to Contact Us
Acknowledgments
Chapter 1. Introduction to Networking
Section 1.1. History
Section 1.2. TCP/IP Networks
Section 1.3. Linux Networking
Section 1.4. Maintaining Your System
Chapter 2. Issues of TCP/IP Networking
Section 2.1. Networking Interfaces
Section 2.2. IP Addresses
Section 2.3. The Internet Control Message Protocol
Chapter 3. Configuring the Serial Hardware
Section 3.1. Communications Software for Modem Links
Section 3.2. Accessing Serial Devices
Section 3.3. Using the Configuration Utilities
Section 3.4. Serial Devices and the login: Prompt
Chapter 4. Configuring TCP/IP Networking
Section 4.1. Understanding the /proc Filesystem
Chapter 5. Name Service and Configuration
Section 5.1. The Resolver Library
Section 5.2. How DNS Works
Section 5.3. Alternatives to BIND
Chapter 6. The Point-to-Point Protocol
Section 6.1. PPP on Linux
Section 6.2. Running pppd
Section 6.3. Using Options Files
Section 6.4. Using chat to Automate Dialing
Section 6.5. IP Configuration Options
Section 6.6. Link Control Options
Section 6.7. General Security Considerations
Section 6.8. Authentication with PPP
Section 6.9. Debugging Your PPP Setup
Section 6.10. More Advanced PPP Configurations
Section 6.11. PPPoE Options in Linux
Chapter 7. TCP/IP Firewall
Section 7.1. Methods of Attack
Section 7.2. What Is a Firewall?
Section 7.3. What Is IP Filtering?
Section 7.4. Netfilter and iptables
Section 7.5. iptables Concepts
Section 7.6. Setting Up Linux for Firewalling
Section 7.7. Using iptables
Section 7.8. The iptables Subcommands
Section 7.9. Basic iptables Matches
Section 7.10. A Sample Firewall Configuration
Section 7.11. References
Chapter 8. IP Accounting
Section 8.1. Configuring the Kernel for IP Accounting
Section 8.2. Configuring IP Accounting
Section 8.3. Using IP Accounting Results
Section 8.4. Resetting the Counters
Section 8.5. Flushing the Rule Set
Section 8.6. Passive Collection of Accounting Data
Chapter 9. IP Masquerade and Network Address Translation
Section 9.1. Side Effects and Fringe Benefits
Section 9.2. Configuring the Kernel for IP Masquerade
Section 9.3. Configuring IP Masquerade
Section 9.4. Handling Nameserver Lookups
Section 9.5. More About Network Address Translation
Chapter 10. Important Network Features
Section 10.1. The inetd Super Server
Section 10.2. The tcpd Access Control Facility
Section 10.3. The xinetd Alternative
Section 10.4. The Services and Protocols Files
Section 10.5. Remote Procedure Call
Section 10.6. Configuring Remote Login and Execution
Chapter 11. Administration Issues with Electronic Mail
Section 11.1. What Is a Mail Message?
Section 11.2. How Is Mail Delivered?
Section 11.3. Email Addresses
Section 11.4. How Does Mail Routing Work?
Section 11.5. Mail Routing on the Internet
Chapter 12. sendmail
Section 12.1. Installing the sendmail Distribution
Section 12.2. sendmail Configuration Files
Section 12.3. sendmail.cf Configuration Language
Section 12.4. Creating a sendmail Configuration
Section 12.5. sendmail Databases
Section 12.6. Testing Your Configuration
Section 12.7. Running sendmail
Section 12.8. Tips and Tricks
Section 12.9. More Information
Chapter 13. Configuring IPv6 Networks
Section 13.1. The IPv4 Problem and Patchwork Solutions
Section 13.2. IPv6 as a Solution
Chapter 14. Configuring the Apache Web Server
Section 14.1. Apache HTTPD ServerAn Introduction
Section 14.2. Configuring and Building Apache
Section 14.3. Configuration File Options
Section 14.4. VirtualHost Configuration Options
Section 14.5. Apache and OpenSSL
Section 14.6. Troubleshooting
Chapter 15. IMAP
Section 15.1. IMAPAn Introduction
Section 15.2. Cyrus IMAP
Chapter 16. Samba
Section 16.1. SambaAn Introduction
Chapter 17. OpenLDAP
Section 17.1. Understanding LDAP
Section 17.2. Obtaining OpenLDAP
Chapter 18. Wireless Networking
Section 18.1. History
Section 18.2. The Standards
Section 18.3. 802.11b Security Concerns
Appendix A. Example Network: The Virtual Brewery
Section A.1. Connecting the Virtual Subsidiary Network
Colophon