Synopses & Reviews
The Linux Network Administrator's Guide, Third Edition dispenses all the practical advice you need to join a network. Along with some hardware considerations, this highly acclaimed guide takes an in-depth look at all of the essential networking software that comes with the operating system--including basic infrastructure (TCP/IP, wireless networking, firewalling) and the most popular services on Linux systems.But as the follow-up to a classic, the third edition of the Linux Network Administrator's Guide does more than just spruce up the basics. It also provides the very latest information on the following cutting-edge services:
- Wireless hubs
- Spam filtering
Featuring a litany of insider tips and techniques, the Linux Network Administrator's Guide
, Third Edition is an invaluable companion for any network administrator interested in integrating Linux into their Windows environmentAuthored by Terry Dawson, Tony Bautts, and Gregor N. Purdy, the Linux Network Administrator's Guide
, Third Edition emerged from the Linux Documentation Project (LDP). The LDP's goal is to centralize all of the issues of Linux documentation, ranging from online documentation topics such as installing, using, and running Linux.
About the Author
Tony Bautts is an independent security consultant who has worked with Fortune 500 companies in the US and Japan. He has spoken at security-related events for The Information Systems Audit and Control Association (ISACA) and has spoken and chaired events for the MIS Training Institute. Tony is the co-author of Hack Proofing Your Wireless Network, Nokia Network Solutions Handbook, and the Security Certification Handbook and has, additionally, served as technical reviewer for Implementing IPv6 on Cisco IOS by Syngress Publishing.
Terry Dawson is an amateur radio operator and long time Linux enthusiast. He is the author of a number of network related HOWTO documents for the Linux Documentation Project, co-author the 2nd edition of O'Reilly's Linux Network Administrators Guide and is an active participant in a number of other Linux projects. Terry has 15 years professional experience in telecommunications and is currently engaged in network management research in the Telstra Research Laboratories.
Gregor N. Purdy is engineering manager in the large account services group at Amazon.com. Before joining Amazon.com in 2003, Gregor worked for ten years as a consultant in high-end data warehousing, system integration, and prior art research in software and Internet patents. He has also contributed to a number of open source projects, including Perl core and extensionmodules, the Perl Shell, and the Parrot virtual machine for Perl 6.
Table of Contents
Preface; Purpose and Audience for This Book; Sources of Information; Obtaining Linux; Filesystem Standards; Standard Linux Base; About This Book; Overview; Conventions Used in This Book; Safari Enabled; How to Contact Us; Acknowledgments; Chapter 1: Introduction to Networking; 1.1 History; 1.2 TCP/IP Networks; 1.3 Linux Networking; 1.4 Maintaining Your System; Chapter 2: Issues of TCP/IP Networking; 2.1 Networking Interfaces; 2.2 IP Addresses; 2.3 The Internet Control Message Protocol; Chapter 3: Configuring the Serial Hardware; 3.1 Communications Software for Modem Links; 3.2 Accessing Serial Devices; 3.3 Using the Configuration Utilities; 3.4 Serial Devices and the login: Prompt; Chapter 4: Configuring TCP/IP Networking; 4.1 Understanding the /proc Filesystem; Chapter 5: Name Service and Configuration; 5.1 The Resolver Library; 5.2 How DNS Works; 5.3 Alternatives to BIND; Chapter 6: The Point-to-Point Protocol; 6.1 PPP on Linux; 6.2 Running pppd; 6.3 Using Options Files; 6.4 Using chat to Automate Dialing; 6.5 IP Configuration Options; 6.6 Link Control Options; 6.7 General Security Considerations; 6.8 Authentication with PPP; 6.9 Debugging Your PPP Setup; 6.10 More Advanced PPP Configurations; 6.11 PPPoE Options in Linux; Chapter 7: TCP/IP Firewall; 7.1 Methods of Attack; 7.2 What Is a Firewall?; 7.3 What Is IP Filtering?; 7.4 Netfilter and iptables; 7.5 iptables Concepts; 7.6 Setting Up Linux for Firewalling; 7.7 Using iptables; 7.8 The iptables Subcommands; 7.9 Basic iptables Matches; 7.10 A Sample Firewall Configuration; 7.11 References; Chapter 8: IP Accounting; 8.1 Configuring the Kernel for IP Accounting; 8.2 Configuring IP Accounting; 8.3 Using IP Accounting Results; 8.4 Resetting the Counters; 8.5 Flushing the Rule Set; 8.6 Passive Collection of Accounting Data; Chapter 9: IP Masquerade and Network Address Translation; 9.1 Side Effects and Fringe Benefits; 9.2 Configuring the Kernel for IP Masquerade; 9.3 Configuring IP Masquerade; 9.4 Handling Nameserver Lookups; 9.5 More About Network Address Translation; Chapter 10: Important Network Features; 10.1 The inetd Super Server; 10.2 The tcpd Access Control Facility; 10.3 The xinetd Alternative; 10.4 The Services and Protocols Files; 10.5 Remote Procedure Call; 10.6 Configuring Remote Login and Execution; Chapter 11: Administration Issues with Electronic Mail; 11.1 What Is a Mail Message?; 11.2 How Is Mail Delivered?; 11.3 Email Addresses; 11.4 How Does Mail Routing Work?; 11.5 Mail Routing on the Internet; Chapter 12: sendmail; 12.1 Installing the sendmail Distribution; 12.2 sendmail Configuration Files; 12.3 sendmail.cf Configuration Language; 12.4 Creating a sendmail Configuration; 12.5 sendmail Databases; 12.6 Testing Your Configuration; 12.7 Running sendmail; 12.8 Tips and Tricks; 12.9 More Information; Chapter 13: Configuring IPv6 Networks; 13.1 The IPv4 Problem and Patchwork Solutions; 13.2 IPv6 as a Solution; Chapter 14: Configuring the Apache Web Server; 14.1 Apache HTTPD Server--An Introduction; 14.2 Configuring and Building Apache; 14.3 Configuration File Options; 14.4 VirtualHost Configuration Options; 14.5 Apache and OpenSSL; 14.6 Troubleshooting; Chapter 15: IMAP; 15.1 IMAP--An Introduction; 15.2 Cyrus IMAP; Chapter 16: Samba; 16.1 Samba--An Introduction; Chapter 17: OpenLDAP; 17.1 Understanding LDAP; 17.2 Obtaining OpenLDAP; Chapter 18: Wireless Networking; 18.1 History; 18.2 The Standards; 18.3 802.11b Security Concerns; Appendix A: Example Network: The Virtual Brewery; A.1 Connecting the Virtual Subsidiary Network; Colophon;