Skip to:Content
|
Bottom
Cover image for Red hat linux networking and system administration
Title:
Red hat linux networking and system administration
Personal Author:
Edition:
2nd ed.
Publication Information:
Indianapolis, Ind. : Wiley Publishing, 2004
Physical Description:
1 CD-ROM ; 12 cm
ISBN:
9780764544989
General Note:
Also available in printed version : QA76.76.O63 C644 2004
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010071457 CP 5268 Computer File Accompanies Open Access Book Compact Disc Accompanies Open Access Book
Searching...

On Order

Summary

Summary

* Updated to cover Red Hat Linux Enterprise Workstation with the latest on advanced Linux kernel features, the Tux Web server, the latest Apache 2.x Web server, and the expanded suite of custom configuration tools
* Starts with network planning and Red Hat installation and configuration, then progresses to optimizing network and Internet services and monitoring and maintaining the network
* Examines the basics of Red Hat Linux security and offers trouble-shooting and problem-solving advice
* Includes important new chapters that focus on optimizing standard network services, such as file and print services, and Internet-related servers, such as the Apache Web server

Copyright © 2004 by Red Hat, Inc. Material from Chapters 4-6, 8-10, 17 and 21 may be distributed only subject to the terms and conditions set forth in the Open Publication License, V1.0 or later (the latest version is presently available at http://www.opencontent.org/openpub/).


Author Notes

Terry Collings is Instructional Technologist at Muhlenberg College in Allentown, Pennsylvania
Kurt Wall manages the Content Group for TimeSys Corporation in Pittsburgh


Table of Contents

Prefacep. ix
Acknowledgmentsp. xiii
Part I System and Network Administration Defined
Chapter 1 Duties of the System Administratorp. 3
The Linux System Administratorp. 3
Installing and Configuring Serversp. 5
Installing and Configuring Application Softwarep. 6
Creating and Maintaining User Accountsp. 7
Backing Up and Restoring Filesp. 7
Monitoring and Tuning Performancep. 9
Configuring a Secure Systemp. 10
Using Tools to Monitor Securityp. 11
Summaryp. 12
Chapter 2 Planning the Networkp. 13
Deciding What Kind of Network You Needp. 13
Planning and Implementing Securityp. 21
Planning for Recovery from Disastersp. 23
Writing It Down--Good Records Can Save Your Jobp. 27
Summaryp. 28
Chapter 3 Standard Installationp. 29
Exploring Your PC's Componentsp. 29
Checking for Supported Hardwarep. 33
Creating the Red Hat Boot Diskp. 34
Starting the Installationp. 35
Starting the Hard Diskp. 39
Configuring the Installationp. 47
Selecting the Package Groups to Installp. 58
Creating a Boot Diskp. 61
Configuring the X Window Systemp. 62
Summaryp. 65
Chapter 4 Kickstart Installationp. 67
Configuring the Kickstart File (ks.cfg)p. 67
Configuring Kickstart Using the Graphical Interfacep. 77
Summaryp. 92
Chapter 5 System Startup and Shutdownp. 95
Understanding the Boot Processp. 95
Using GRUBp. 102
Running Programs at Boot Timep. 110
Init Runlevelsp. 112
Shutting Down the Systemp. 113
Summaryp. 114
Chapter 6 The File System Explainedp. 115
Understanding the File System Structurep. 115
Special File Locationsp. 118
Working with Linux-Supported File Systemsp. 118
Memory and Virtual File Systemsp. 124
Directories in /proc/p. 143
Using sysctlp. 164
Linux Disk Managementp. 165
What Is RAID?p. 167
Summaryp. 171
Chapter 7 Red Hat System Configuration Filesp. 173
Examining the System Configuration Filesp. 174
The /etc/sysconfig/ Directoryp. 184
Examining the Network Configuration Filesp. 197
Managing the init Scriptsp. 206
Summaryp. 211
Part II Network Services
Chapter 8 X Servers and Clientsp. 215
The Power of Xp. 215
XFree86p. 216
Desktop Environments and Window Managersp. 222
Fontsp. 226
Additional Resourcesp. 229
Summaryp. 230
Chapter 9 Printer Configurationp. 231
Printer Configuration Toolp. 231
Command-Line Configurationp. 245
Managing Your Print Jobsp. 246
Additional Resourcesp. 248
Summaryp. 249
Chapter 10 TCP/IP Networkingp. 251
TCP/IP Explainedp. 251
Understanding Network Classesp. 253
Setting Up a Network Interface Card (NIC)p. 255
Understanding Subnettingp. 260
Classless InterDomain Routing (CIDR)p. 266
Gateways and Routersp. 268
Configuring Dynamic Host Configuration Protocol (DHCP)p. 270
Configuring the Network Using the Network Configuration Toolp. 276
Summaryp. 284
Chapter 11 The Network File Systemp. 285
NFS Overviewp. 285
Planning an NFS Installationp. 288
Configuring an NFS Serverp. 291
Configuring an NFS Clientp. 309
Using Automount Servicesp. 312
Examining NFS Securityp. 316
Summaryp. 318
Chapter 12 The Network Information Systemp. 319
Understanding NISp. 319
Planning an NIS Installationp. 321
Configuring an NIS Serverp. 324
Configuring an NIS Clientp. 334
Strengthening NIS Securityp. 344
Summaryp. 344
Chapter 13 Connecting to Microsoft and Novell Networksp. 345
Connecting to Microsoft Networksp. 345
Connecting to Novell Networksp. 354
Summaryp. 356
Chapter 14 Connecting to Apple Networksp. 357
Understanding AppleTalkp. 357
Installing the AppleTalk Softwarep. 358
Configuring the Appletalk Daemonsp. 361
Configuring Red Hat as an AppleTalk Clientp. 368
Summaryp. 371
Chapter 15 Optimizing Network Servicesp. 373
Optimizing the X Window Systemp. 373
Optimizing NFSp. 375
Optimizing NISp. 379
Optimizing Samba Networkingp. 380
Summaryp. 380
Part III Internet Services
Chapter 16 What Are Internet Services?p. 383
Secure Servicesp. 384
Less Secure Servicesp. 386
Using Your Linux Machine as a Serverp. 388
xinetdp. 389
xinetd vs. Stand-Alonep. 392
Linux Firewall Packagesp. 394
Summaryp. 396
Chapter 17 Lightweight Directory Access Protocol (LDAP)p. 397
Why Use LDAP?p. 398
OpenLDAP Daemons and Utilitiesp. 399
LDAP Terminologyp. 401
OpenLDAP Configuration Filesp. 402
OpenLDAP Setup Overviewp. 405
Configuring Your System to Authenticate Using OpenLDAPp. 405
Additional Resourcesp. 408
Summaryp. 408
Chapter 18 BIND: The Domain Name System (DNS)p. 409
Understanding DNSp. 409
Installing the Softwarep. 412
Understanding Types of Domain Serversp. 413
Examining Server Configuration Filesp. 414
Configuring a Caching Serverp. 430
Configuring a Slave Serverp. 431
Configuring a Master Serverp. 432
Using DNS Toolsp. 433
Summaryp. 436
Chapter 19 Configuring Mail Servicesp. 437
E-Mail Explainedp. 437
Introducing SMTPp. 439
Configuring Sendmailp. 441
Configuring Postfixp. 446
Configuring the E-Mail Clientp. 452
Maintaining E-Mail Securityp. 460
Summaryp. 462
Chapter 20 Configuring FTP Servicesp. 463
vsftpp. 463
Installing vsftpdp. 465
Configuring vsftpdp. 468
Advanced FTP Server Configurationp. 475
Summaryp. 476
Chapter 21 Configuring Web Servicesp. 477
Introducing Apachep. 477
How Web Servers Workp. 481
Installing and Configuring Apachep. 482
Using the Apache Configuration Toolp. 502
Implementing SSIp. 518
Implementing CGIp. 521
Creating a Secure Server with SSLp. 523
Summaryp. 534
Chapter 22 Optimizing Internet Servicesp. 535
Optimizing LDAP Servicesp. 535
Optimizing DNS Servicesp. 536
Optimizing Mail Servicesp. 540
Optimizing FTP Servicesp. 542
Optimizing Web Servicesp. 543
Summaryp. 545
Part IV System Maintenance
Chapter 23 Using the Red Hat Networkp. 549
Registering Your System with the Red Hat Networkp. 550
Configuring the Red Hat Update Agentp. 553
Using the Red Hat Update Agentp. 556
Using the Red Hat Network Alert Iconp. 559
Using the Red Hat Network via the Internetp. 561
Summaryp. 567
Chapter 24 Upgrading and Customizing the Kernelp. 569
Should You Upgrade to a New Kernel?p. 569
Obtaining Upgraded Kernel RPMsp. 576
Installing Kernel Source Code from the Internetp. 578
Building a Customized Kernelp. 585
Configuring the Boot Loaderp. 615
Summaryp. 617
Chapter 25 Configuring the System at the Command Linep. 619
System Administration at the Command Linep. 619
Administering Users and Groupsp. 621
Managing Processesp. 629
Maintaining the File Systemp. 635
Tracking and Controlling System Usagep. 647
Timekeepingp. 648
Automating System Maintenancep. 655
Summaryp. 694
Chapter 26 Administering Users and Groupsp. 695
Understanding the Root Accountp. 695
Implementing Sudop. 696
Working with Users and Groupsp. 702
Using File System Quotasp. 726
Summaryp. 733
Chapter 27 Installing and Upgrading Software Packagesp. 735
Using the Red Hat Package Managerp. 735
Checking Software Versionsp. 751
Obtaining Newer Softwarep. 754
Installing Softwarep. 759
Summaryp. 769
Chapter 28 Backing Up and Restoring the File Systemp. 771
Creating a Backup Planp. 771
Choosing Media for Backupsp. 772
Understanding Backup Methodsp. 773
Tape Rotationp. 775
Using Backup Toolsp. 775
Summaryp. 796
Part V System Security and Problem Solving
Chapter 29 Security Basicsp. 799
Introducing Basic Security Principlesp. 799
Developing a Security Policyp. 805
A Disaster Recovery Case Studyp. 813
Finding Security-Related Resourcesp. 815
Summaryp. 817
Chapter 30 Implementing Local Securityp. 819
Exploring the Nature of Physical Securityp. 820
Maintaining User and Password Securityp. 829
Summaryp. 838
Chapter 31 Implementing Network Securityp. 839
Limiting Network Servicesp. 839
Firewall Theoryp. 849
Firewalls and iptablesp. 862
Summaryp. 873
Chapter 32 Detecting and Preventing Intrusionsp. 875
Using Tripwirep. 875
Using LogWatchp. 890
Detecting Intrusions with ipchainsp. 893
Detecting Intrusions with iptablesp. 895
Summaryp. 896
Chapter 33 Troubleshooting and Problem Solvingp. 897
Solving Installation Problemsp. 898
Solving File System Problemsp. 902
Solving Networking Problemsp. 905
Solving NFS Problemsp. 909
Solving Boot Problemsp. 912
Solving Miscellaneous Problemsp. 915
Summaryp. 917
Appendix What's on the CD-ROM?p. 919
Indexp. 921
GNU General Public Licensep. 971
Go to:Top of Page