Linux networking cookbook / Gregory Boyce.Material type: TextPublisher: Birmingham : Packt Publishing, 2016Description: 1 online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9781785285974; 1785285971; 9781785287916; 1785287915Subject(s): Linux | Linux | Operating systems (Computers) | Computer networks -- Software | COMPUTERS -- Computer Literacy | COMPUTERS -- Computer Science | COMPUTERS -- Data Processing | COMPUTERS -- Hardware -- General | COMPUTERS -- Information Technology | COMPUTERS -- Machine Theory | COMPUTERS -- Reference | Computer networks | Operating systems (Computers)Genre/Form: Electronic books. | Software. DDC classification: 004.6 LOC classification: TK5105.5Online resources: Click here to access online
|Item type||Current library||Collection||Call number||Status||Date due||Barcode||Item holds|
Online resource; title from PDF title page (EBSCO, viewed November 16, 2016).
Over 40 recipes to help you set up and configure Linux networksAbout This Book Move beyond the basics of how a Linux machine works and gain a better understanding of Linux networks and their configuration Impress your peers by setting up and configuring a Linux server and its various network elements like a pro This is a hands-on solution guide to building, maintaining, and securing a network using LinuxWho This Book Is For This book is targeted at Linux systems administrators who have a good basic understanding and some prior experience of how a Linux machine operates, but want to better understand how various network services function, how to set them up, and how to secure them. You should be familiar with how to set up a Linux server and how to install additional software on them. What You Will Learn Route an IPv6 netblock to your local network Modify your named instance to support setting hostnames for your IPv6 addresses Use SSH for remote console access Configure NGINX with TLS Secure XMPP with TLS Leverage iptables6 to firewall your IPv6 traffic Configure Samba as an Active Directory compatible directory serviceIn Detail Linux can be configured as a networked workstation, a DNS server, a mail server, a firewall, a gateway router, and many other things. These are all part of administration tasks, hence network administration is one of the main tasks of Linux system administration. By knowing how to configure system network interfaces in a reliable and optimal manner, Linux administrators can deploy and configure several network services including file, web, mail, and servers while working in large enterprise environments. Starting with a simple Linux router that passes traffic between two private networks, you will see how to enable NAT on the router in order to allow Internet access from the network, and will also enable DHCP on the network to ease configuration of client systems. You will then move on to configuring your own DNS server on your local network using bind9 and tying it into your DHCP server to allow automatic configuration of local hostnames. You will then future enable your network by setting up IPv6 via tunnel providers. Moving on, we'll configure Samba to centralize authentication for your network services; we will also configure Linux client to leverage it for authentication, and set up a RADIUS server that uses the directory server for authentication. Toward the end, you will have a network with a number of services running on it, and will implement monitoring in order to detect problems as they occur. Style and approach This book is packed with practical recipes and a task-based approach that will walk you through building, maintaining, and securing a computer network using Linux.
Cover ; Copyright; Credits; About the Author; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Configuring a Router ; Introduction; Setting up the physical network; Configuring IPv4; Configuring IPv4 permanently; Connecting two networks; Enabling NAT to the outside; Setting up DHCP; Setting up a firewall with IPtables; Setting up port forwarding; Adding VLAN Tagging; Chapter 2: Configuring DNS ; Introduction; Setting up your system to talk to a nameserver; Setting up a local recursive resolver; Configuring dynamic DNS on your local network.
Setting up a nameserver for your public domainSetting up a slave nameserver; Chapter 3: Configuring IPv6 ; Introduction; Setting up an IPv6 tunnel via Hurricane Electric; Using ip6tables to firewall your IPv6 traffic; Route an IPv6 netblock to your local network; Chapter 4: Remote Access ; Introduction; Installing OpenSSH; Using OpenSSH as a basic shell client; Using OpenSSH to forward defined ports; Using OpenSSH as a SOCKS proxy; Using OpenVPN; Chapter 5: Web Servers ; Introduction; Configuring Apache with TLS; Improving scaling with the Worker MPM; Setting up PHP using an Apache module.
Securing your web applications using mod_securityConfiguring NGINX with TLS; Setting up PHP in NGINX with FastCGI; Chapter 6: Directory Services ; Introduction; Configuring Samba as an Active Directory compatible directory service; Joining a Linux box to the domain; Chapter 5: Setting up File Storage ; Introduction; Serving files with SMB/CIFS through Samba; Granting authenticated access; Setting up an NFS server; Configuring WebDAV through Apache; Chapter 8: Setting up E-mail ; Introduction; Configuring Postfix to send and receive e-mail; Setting up DNS records for e-mail delivery.
Configuring IMAPConfiguring authentication for outbound e-mail; Configuring Postfix to support TLS; Blocking spam with Greylisting; Filtering spam with SpamAssassin; Chapter 9: Configuring XMPP ; Introduction; Installing ejabberd; Configuring DNS for XMPP; Configuring the Pidgin client; Chapter 10: Monitoring Your Network ; Introduction; Installing Nagios; Adding Nagios users; Adding Nagios hosts; Monitoring services; Defining commands; Monitoring via NRPE; Monitoring via SNMP; Chapter 11: Mapping Your Network ; Introduction; Detecting systems on your network with NMAP.
Detecting Systems Using Arp-ScanScanning TCP ports; Scanning UDP ports; Identifying services; Identifying operating systems; Chapter 12: Watching Your Network ; Introduction; Setting up centralized logging; Installing a Snort IDS; Managing your Snort rules; Managing Snort logging; Index.