Книги автора: Linux Network Administrator Guide, Second Edition
/ Книги автора: Linux Network Administrator Guide, Second Edition
Книга: Linux Network Administrator Guide, Second Edition
Оглавление книги
- Preface
- Purpose and Audience for This Book
- Sources of Information
- Documentation Available via FTP
- Documentation Available via WWW
- Documentation Available Commercially
- Linux Journal and Linux Magazine
- Linux Usenet Newsgroups
- Linux Mailing Lists
- Online Linux Support
- Linux User Groups
- Obtaining Linux
- File System Standards
- Standard Linux Base
- About This Book
- The Official Printed Version
- Overview
- Conventions Used in This Book
- Submitting Changes
- Acknowledgments
- Chapter 1. Introduction to Networking
- History
- TCP/IP Networks
- Introduction to TCP/IP Networks
- Ethernets
- Other Types of Hardware
- The Internet Protocol
- IP Over Serial Lines
- The Transmission Control Protocol
- The User Datagram Protocol
- More on Ports
- The Socket Library
- UUCP Networks
- Linux Networking
- Maintaining Your System
- Chapter 2. Issues of TCP/IP Networking
- Networking Interfaces
- IP Addresses
- Address Resolution
- IP Routing
- The Internet Control Message Protocol
- Resolving Host Names
- Chapter 3. Configuring the Networking Hardware
- Kernel Configuration
- A Tour of Linux Network Devices
- Ethernet Installation
- The PLIP Driver
- The PPP and SLIP Drivers
- Other Network Types
- Chapter 4. Configuring the Serial Hardware
- Communications Software for Modem Links
- Introduction to Serial Devices
- Accessing Serial Devices
- Serial Hardware
- Using the Configuration Utilities
- Serial Devices and the login: Prompt
- Chapter 5. Configuring TCP/IP Networking
- Mounting the /proc Filesystem
- Installing the Binaries
- Setting the Hostname
- Assigning IP Addresses
- Creating Subnets
- Writing hosts and networks Files
- Interface Configuration for IP
- The Loopback Interface
- Ethernet Interfaces
- Routing Through a Gateway
- Configuring a Gateway
- The PLIP Interface
- The SLIP and PPP Interfaces
- The Dummy Interface
- IP Alias
- All About ifconfig
- The netstat Command
- Checking the ARP Tables
- Chapter 6. Name Service and Resolver Configuration
- The Resolver Library
- The host.conf File
- The nsswitch.conf File
- Configuring Name Server Lookups Using resolv.conf
- Resolver Robustness
- How DNS Works
- Running named
- Chapter 7. Serial Line IP
- General Requirements
- SLIP Operation
- Dealing with Private IP Networks
- Using dip
- Running in Server Mode
- Chapter 8. The Point-to-Point Protocol
- PPP on Linux
- Running pppd
- Using Options Files
- Using chat to Automate Dialing
- IP Configuration Options
- Link Control Options
- General Security Considerations
- Authentication with PPP
- Debugging Your PPP Setup
- More Advanced PPP Configurations
- Chapter 9. TCP/IP Firewall
- Methods of Attack
- What Is a Firewall?
- What Is IP Filtering?
- Setting Up Linux for Firewalling
- Three Ways We Can Do Filtering
- Original IP Firewall (2.0 Kernels)
- IP Firewall Chains (2.2 Kernels)
- Using ipchains
- ipchains Command Syntax
- Our Na?ve Example Revisited
- Listing Our Rules with ipchains
- Making Good Use of Chains
- Netfilter and IP Tables (2.4 Kernels)
- Backward Compatability with ipfwadm and ipchains
- Using iptables
- Commands
- Rule specification parameters
- Options
- Extensions
- TCP Extensions: used with -m tcp -p tcp
- UDP Extensions: used with -m udp -p udp
- ICMP Extensions: used with -m icmp -p icmp
- MAC Extensions: used with -m mac
- Our Na?ve Example Revisited, Yet Again
- TOS Bit Manipulation
- Testing a Firewall Configuration
- A Sample Firewall Configuration
- Chapter 10. IP Accounting
- Configuring the Kernel for IP Accounting
- Configuring IP Accounting
- Accounting by Address
- Accounting by Service Port
- Accounting of ICMP Datagrams
- Accounting by Protocol
- Using IP Accounting Results
- Listing Accounting Data with ipfwadm
- Listing Accounting Data with ipchains
- Listing Accounting Data with iptables
- Resetting the Counters
- Flushing the Ruleset
- Passive Collection of Accounting Data
- Chapter 11. IP Masquerade and Network Address Translation
- Side Effects and Fringe Benefits
- Configuring the Kernel for IP Masquerade
- Configuring IP Masquerade
- Handling Name Server Lookups
- More About Network Address Translation
- Chapter 12. Important Network Features
- The inetd Super Server
- The tcpd Access Control Facility
- The Services and Protocols Files
- Remote Procedure Call
- Configuring Remote Login and Execution
- Chapter 13. The Network Information System
- Getting Acquainted with NIS
- NIS Versus NIS+
- The Client Side of NIS
- Running an NIS Server
- NIS Server Security
- Setting Up an NIS Client with GNU libc
- Choosing the Right Maps
- Using the passwd and group Maps
- Using NIS with Shadow Support
- Chapter 14. The Network File System
- Preparing NFS
- Mounting an NFS Volume
- The NFS Daemons
- The exports File
- Kernel-Based NFSv2 Server Support
- Kernel-Based NFSv3 Server Support
- Chapter 15. IPX and the NCP Filesystem
- Xerox, Novell, and History
- IPX and Linux
- Configuring the Kernel for IPX and NCPFS
- Configuring IPX Interfaces
- Network Devices Supporting IPX
- IPX Interface Configuration Tools
- The ipx_configure Command
- The ipx_interface Command
- Configuring an IPX Router
- Mounting a Remote NetWare Volume
- A Simple ncpmount Example
- The ncpmount Command in Detail
- Hiding Your NetWare Login Password
- A More Complex ncpmount Example
- Exploring Some of the Other IPX Tools
- Printing to a NetWare Print Queue
- NetWare Server Emulation
- Chapter 16. Managing Taylor UUCP
- UUCP Transfers and Remote Execution
- UUCP Configuration Files
- A Gentle Introduction to Taylor UUCP
- What UUCP Needs to Know
- Site Naming
- Taylor Configuration Files
- General Configuration Options Using the config File
- How to Tell UUCP About Other Systems Using the sys File
- Identifying Available Devices Through the port File
- How to Dial a Number Using the dial File
- UUCP Over TCP
- Using a Direct Connection
- Controlling Access to UUCP Features
- Setting Up Your System for Dialing In
- Providing UUCP Accounts
- Protecting Yourself Against Swindlers
- Be Paranoid: Call Sequence Checks
- Anonymous UUCP
- UUCP Low-Level Protocols
- Troubleshooting
- uucico Keeps Saying "Wrong Time to Call"
- uucico Complains That the Site Is Already Locked
- You Can Connect to the Remote Site, but the Chat Script Fails
- Your Modem Does Not Dial
- Your Modem Tries to Dial but Doesn't Get Out
- Login Succeeds, but the Handshake Fails
- Log Files and Debugging
- Chapter 17. Electronic Mail
- What Is a Mail Message?
- How Is Mail Delivered?
- Email Addresses
- How Does Mail Routing Work?
- Configuring elm
- Chapter 18. Sendmail
- Introduction to sendmail
- Installing sendmail
- Overview of Configuration Files
- The sendmail.cf and sendmail.mc Files
- Generating the sendmail.cf File
- Interpreting and Writing Rewrite Rules
- sendmail.cf R and S Commands
- Some Useful Macro Definitions
- The Lefthand Side
- The Righthand Side
- A Simple Rule Pattern Example
- Ruleset Semantics
- Configuring sendmail Options
- Some Useful sendmail Configurations
- Trusting Users to Set the From: Field
- Managing Mail Aliases
- Using a Smart Host
- Managing Unwanted or Unsolicited Mail (Spam)
- Configuring Virtual Email Hosting
- Testing Your Configuration
- Running sendmail
- Tips and Tricks
- Chapter 19. Getting Exim Up and Running
- Running Exim
- If Your Mail Doesn't Get Through
- Compiling Exim
- Mail Delivery Modes
- Miscellaneous config Options
- Message Routing and Delivery
- Protecting Against Mail Spam
- UUCP Setup
- Chapter 20. Netnews
- Chapter 21. C News
- Delivering News
- Installation
- The sys File
- The active File
- Article Batching
- Expiring News
- Miscellaneous Files
- Control Messages
- C News in an NFS Environment
- Maintenance Tools and Tasks
- Chapter 22. NNTP and the nntpd Daemon
- The NNTP Protocol
- Connecting to the News Server
- Pushing a News Article onto a Server
- Changing to NNRP Reader Mode
- Listing Available Groups
- Listing Active Groups
- Posting an Article
- Listing New Articles
- Selecting a Group on Which to Operate
- Listing Articles in a Group
- Retrieving an Article Header Only
- Retrieving an Article Body Only
- Reading an Article from a Group
- Installing the NNTP Server
- Restricting NNTP Access
- NNTP Authorization
- nntpd Interaction with C News
- Chapter 23. Internet News
- Some INN Internals
- Newsreaders and INN
- Installing INN
- Configuring INN: the Basic Setup
- INN Configuration Files
- Global Parameters
- Configuring Newsgroups
- Configuring Newsfeeds
- Controlling Newsreader Access
- Expiring News Articles
- Handling Control Messages
- Running INN
- Managing INN: The ctlinnd Command
- Chapter 24. Newsreader Configuration
- Appendix A. Example Network: The Virtual Brewery
- Appendix B. Useful Cable Configurations
- Appendix C. Copyright Information
- Preamble
- Applicability and Definitions
- Verbatim Copying
- Copying in Quantity
- Modifications
- Combining Documents
- Collections of Documents
- Aggregation with Independent Works
- Translation
- Termination
- Future Revisions of this License
- Appendix D. SAGE: The System Administrators Guild
- Сноски из книги
- Содержание книги
- Популярные страницы
Оглавление статьи/книги
- Preface
- Chapter 1. Introduction to Networking
- Chapter 2. Issues of TCP/IP Networking
- Chapter 3. Configuring the Networking Hardware
- Chapter 4. Configuring the Serial Hardware
- Chapter 5. Configuring TCP/IP Networking
- Chapter 6. Name Service and Resolver Configuration
- Chapter 7. Serial Line IP
- Chapter 8. The Point-to-Point Protocol
- Chapter 9. TCP/IP Firewall
- Chapter 10. IP Accounting
- Chapter 11. IP Masquerade and Network Address Translation
- Chapter 12. Important Network Features
- Chapter 13. The Network Information System
- Chapter 14. The Network File System
- Chapter 15. IPX and the NCP Filesystem
- Chapter 16. Managing Taylor UUCP
- Chapter 17. Electronic Mail
- Chapter 18. Sendmail
- Chapter 19. Getting Exim Up and Running
- Chapter 20. Netnews
- Chapter 21. C News
- Chapter 22. NNTP and the nntpd Daemon
- Chapter 23. Internet News
- Chapter 24. Newsreader Configuration
- Appendix A. Example Network: The Virtual Brewery
- Appendix B. Useful Cable Configurations
- Appendix C. Copyright Information
- Appendix D. SAGE: The System Administrators Guild
- Сноски из книги
- Содержание книги
- Популярные страницы
Похожие страницы
- Chapter 11. IP Masquerade and Network Address Translation
- Chapter 12. Important Network Features
- Linux Network Administrator Guide, Second Edition
- InterBase Classic Server под Linux
- Каталог BIN в InterBase Classic Server для Linux
- Chapter 16. Commercial products based on Linux, iptables and netfilter
- 1 Введение в Linux
- 4 Файловая система Linux
- 1.2. Что такое Linux?
- 1.5.1. Red Hat Linux
- 1.5.3. SuSE Linux
- 3.6.1. Адресация в Linux