Back to FAQS.ORG homepage

Linux Network Administrators Guide


Table of Contents
Preface
1. Purpose and Audience for This Book
2. Sources of Information
3. File System Standards
4. Standard Linux Base
5. About This Book
6. The Official Printed Version
7. Overview
8. Conventions Used in This Book
9. Submitting Changes
10. Acknowledgments
1. Introduction to Networking
1.1. History
1.2. TCP/IP Networks
1.3. UUCP Networks
1.4. Linux Networking
1.5. Maintaining Your System
2. Issues of TCP/IP Networking
2.1. Networking Interfaces
2.2. IP Addresses
2.3. Address Resolution
2.4. IP Routing
2.5. The Internet Control Message Protocol
2.6. Resolving Host Names
3. Configuringthe NetworkingHardware
3.1. Kernel Configuration
3.2. A Tour of Linux Network Devices
3.3. Ethernet Installation
3.4. The PLIP Driver
3.5. The PPP and SLIP Drivers
3.6. Other Network Types
4. Configuring the Serial Hardware
4.1. Communications Software for Modem Links
4.2. Introduction to Serial Devices
4.3. Accessing Serial Devices
4.4. Serial Hardware
4.5. Using the Configuration Utilities
4.6. Serial Devices and the login: Prompt
5. Configuring TCP/IP Networking
5.1. Mounting the /proc Filesystem
5.2. Installing the Binaries
5.3. Setting the Hostname
5.4. Assigning IP Addresses
5.5. Creating Subnets
5.6. Writing hosts and networks Files
5.7. Interface Configuration for IP
5.8. All About ifconfig
5.9. The netstat Command
5.10. Checking the ARP Tables
6. Name Service and Resolver Configuration
6.1. The Resolver Library
6.2. How DNS Works
6.3. Running named
7. Serial Line IP
7.1. General Requirements
7.2. SLIP Operation
7.3. Dealing with Private IP Networks
7.4. Using dip
7.5. Running in Server Mode
8. The Point-to-Point Protocol
8.1. PPP on Linux
8.2. Running pppd
8.3. Using Options Files
8.4. Using chat to Automate Dialing
8.5. IP Configuration Options
8.6. Link Control Options
8.7. General Security Considerations
8.8. Authentication with PPP
8.9. Debugging Your PPP Setup
8.10. More Advanced PPP Configurations
9. TCP/IP Firewall
9.1. Methods of Attack
9.2. What Is a Firewall?
9.3. What Is IP Filtering?
9.4. Setting Up Linux for Firewalling
9.5. Three Ways We Can Do Filtering
9.6. Original IP Firewall (2.0 Kernels)
9.7. IP Firewall Chains (2.2 Kernels)
9.8. Netfilter and IP Tables (2.4 Kernels)
9.9. TOS Bit Manipulation
9.10. Testing a Firewall Configuration
9.11. A Sample Firewall Configuration
10. IP Accounting
10.1. Configuring the Kernel for IP Accounting
10.2. Configuring IP Accounting
10.3. Using IP Accounting Results
10.4. Resetting the Counters
10.5. Flushing the Ruleset
10.6. Passive Collection of Accounting Data
11. IP Masquerade and Network Address Translation
11.1. Side Effects and Fringe Benefits
11.2. Configuring the Kernel for IP Masquerade
11.3. Configuring IP Masquerade
11.4. Handling Name Server Lookups
11.5. More About Network Address Translation
12. ImportantNetwork Features
12.1. The inetd Super Server
12.2. The tcpd Access Control Facility
12.3. The Services and Protocols Files
12.4. Remote Procedure Call
12.5. Configuring Remote Loginand Execution
13. The Network Information System
13.1. Getting Acquainted with NIS
13.2. NIS Versus NIS+
13.3. The Client Side of NIS
13.4. Running an NIS Server
13.5. NIS Server Security
13.6. Setting Up an NIS Client with GNU libc
13.7. Choosing the Right Maps
13.8. Using the passwd and group Maps
13.9. Using NIS with Shadow Support
14. The NetworkFile System
14.1. Preparing NFS
14.2. Mounting an NFS Volume
14.3. The NFS Daemons
14.4. The exports File
14.5. Kernel-Based NFSv2 Server Support
14.6. Kernel-Based NFSv3 Server Support
15. IPX and the NCP Filesystem
15.1. Xerox, Novell, and History
15.2. IPX and Linux
15.3. Configuring the Kernel for IPXand NCPFS
15.4. Configuring IPX Interfaces
15.5. Configuring an IPX Router
15.6. Mounting a Remote NetWare Volume
15.7. Exploring Some of the Other IPX Tools
15.8. Printing to a NetWare Print Queue
15.9. NetWare Server Emulation
16. ManagingTaylor UUCP
16.1. UUCP Transfers and Remote Execution
16.2. UUCP Configuration Files
16.3. Controlling Access to UUCP Features
16.4. Setting Up Your System for Dialing In
16.5. UUCP Low-Level Protocols
16.6. Troubleshooting
16.7. Log Files and Debugging
17. Electronic Mail
17.1. What Is a Mail Message?
17.2. How Is Mail Delivered?
17.3. Email Addresses
17.4. How Does Mail Routing Work?
17.5. Configuring elm
18. Sendmail
18.1. Introduction to sendmail
18.2. Installing sendmail
18.3. Overview of Configuration Files
18.4. The sendmail.cf and sendmail.mc Files
18.5. Generating the sendmail.cf File
18.6. Interpreting and Writing Rewrite Rules
18.7. Configuring sendmail Options
18.8. Some Useful sendmail Configurations
18.9. Testing Your Configuration
18.10. Running sendmail
18.11. Tips and Tricks
19. Getting EximUp and Running
19.1. Running Exim
19.2. If Your Mail Doesn't Get Through
19.3. Compiling Exim
19.4. Mail Delivery Modes
19.5. Miscellaneous config Options
19.6. Message Routing and Delivery
19.7. Protecting Against Mail Spam
19.8. UUCP Setup
20. Netnews
20.1. Usenet History
20.2. What Is Usenet, Anyway?
20.3. How Does Usenet Handle News?
21. C News
21.1. Delivering News
21.2. Installation
21.3. The sys File
21.4. The active File
21.5. Article Batching
21.6. Expiring News
21.7. Miscellaneous Files
21.8. Control Messages
21.9. C News in an NFS Environment
21.10. Maintenance Tools and Tasks
22. NNTP and thenntpd Daemon
22.1. The NNTP Protocol
22.2. Installing the NNTP Server
22.3. Restricting NNTP Access
22.4. NNTP Authorization
22.5. nntpd Interaction with C News
23. Internet News
23.1. Some INN Internals
23.2. Newsreaders and INN
23.3. Installing INN
23.4. Configuring INN: the Basic Setup
23.5. INN Configuration Files
23.6. Running INN
23.7. Managing INN: The ctlinnd Command
24. Newsreader Configuration
24.1. tin Configuration
24.2. trn Configuration
24.3. nn Configuration
A. Example Network:The Virtual Brewery
A.1. Connecting the Virtual Subsidiary Network
B. Useful Cable Configurations
B.1. A PLIP Parallel Cable
B.2. A Serial NULL Modem Cable
C. Linux Network Administrator's Guide, Second Edition Copyright Information
C.1. 0. Preamble
C.2. 1. Applicability and Definitions
C.3. 2. Verbatim Copying
C.4. 3. Copying in Quantity
C.5. 4. Modifications
C.6. 5. Combining Documents
C.7. 6. Collections of Documents
C.8. 7. Aggregation with Independent Works
C.9. 8. Translation
C.10. 9. Termination
C.11. 10. Future Revisions of this License
D. SAGE: The SystemAdministrators Guild
Index

 


  Next
  Preface