Advanced Linux Networking
by Smith, Roderick W.Rent Book
New Book
We're Sorry
Sold Out
Used Book
We're Sorry
Sold Out
eBook
We're Sorry
Not Available
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Author Biography
Roderick W. Smith is an experienced Linux user and system administrator. He is also a professional computer book author whose titles include: Broadband Internet Connections (Addison-Wesley, 2002), Linux Samba Server Administration (Sybex, 2001), The Multi-Boot Configuration Handbook (Que, 2000), and Linux: Networking for Your Office (SAMS, 2000). Roderick holds a Ph.D. in Cognitive Psychology from Tufts University.
0201774232AB05172002
Table of Contents
| Preface | p. xiii |
| Low-Level Configuration | p. 1 |
| Kernel Network Configuration | p. 3 |
| Starting Kernel Configuration | p. 4 |
| Network Protocol Support | p. 6 |
| Network Hardware Options | p. 15 |
| Compiling and Installing a Kernel | p. 23 |
| Summary | p. 30 |
| TCP/IP Network Configuration | p. 31 |
| Loading Network Drivers | p. 31 |
| Using a DHCP Client | p. 33 |
| Configuring a Static IP Address | p. 36 |
| Using a PPP Link | p. 51 |
| Summary | p. 62 |
| Alternative Network Stacks | p. 63 |
| Understanding Network Stacks | p. 63 |
| AppleTalk | p. 68 |
| IPX/SPX | p. 72 |
| NetBEUI | p. 75 |
| Summary | p. 78 |
| Starting Servers | p. 79 |
| Using SysV Startup Scripts | p. 80 |
| Using inetd | p. 89 |
| Using xinetd | p. 96 |
| Using Local Startup Scripts | p. 100 |
| Using GUI Tools | p. 101 |
| When to Use Each Startup Method | p. 108 |
| Summary | p. 110 |
| Local Network Servers | p. 111 |
| Configuring Other Computers via DHCP | p. 113 |
| When to Run a DHCP Server | p. 114 |
| Kernel and Network Interface Issues | p. 116 |
| DHCP Configuration Files | p. 116 |
| Assigning Dynamic Addresses | p. 118 |
| Assigning Fixed Addresses | p. 122 |
| Integrating with Other Protocols | p. 129 |
| Summary | p. 134 |
| Authenticating Users via Kerberos | p. 135 |
| When to Run a Kerberos Server | p. 136 |
| Understanding Kerberos Operation | p. 138 |
| Setting Up a Kerberos Server | p. 143 |
| Configuring a Kerberos Application Server | p. 153 |
| Configuring a Kerberos Client | p. 155 |
| Summary | p. 166 |
| File and Printer Sharing via Samba | p. 167 |
| When to Run a Samba Server | p. 168 |
| General Samba Configuration | p. 169 |
| Serving Files with Samba | p. 179 |
| Serving Printers with Samba | p. 185 |
| Samba Scripting Features | p. 192 |
| Summary | p. 201 |
| File Sharing via NFS | p. 203 |
| When to Run an NFS Server | p. 203 |
| NFS Servers Available for Linux | p. 204 |
| Understanding the Portmapper | p. 207 |
| Serving Files with NFS | p. 208 |
| Username Mapping Options | p. 215 |
| Summary | p. 219 |
| Printer Sharing via LPD | p. 221 |
| When to Run an LPD Server | p. 222 |
| LPD Server Options for Linux | p. 224 |
| Configuring a BSD LPD Server | p. 226 |
| Configuring an LPRng Server | p. 228 |
| Configuring a CUPS Server | p. 232 |
| Summary | p. 239 |
| Maintaining Consistent Time: Time Servers | p. 241 |
| When to Run a Time Server | p. 242 |
| Setting Up an NTP Server | p. 242 |
| Using Samba to Serve Time | p. 254 |
| Summary | p. 255 |
| Pull Mail Protocols: POP and IMAP | p. 257 |
| When to Run a Pull Mail Server | p. 258 |
| Understanding POP and IMAP | p. 259 |
| Configuring a POP Server | p. 267 |
| Configuring an IMAP Server | p. 269 |
| Using Fetchmail | p. 270 |
| Summary | p. 282 |
| Running a News Server | p. 283 |
| When to Run a News Server | p. 284 |
| Understanding NNTP | p. 286 |
| Running INN | p. 288 |
| Using Leafnode | p. 298 |
| Summary | p. 306 |
| Maintaining Remote Login Servers | p. 309 |
| When to Run a Remote Login Server | p. 310 |
| Configuring rlogind | p. 310 |
| Configuring Telnet | p. 316 |
| Configuring SSH | p. 321 |
| Summary | p. 333 |
| Handling GUI Access with X and VNC Servers | p. 335 |
| When to Run a GUI Access Server | p. 336 |
| Configuring Basic X Access | p. 337 |
| Using an XDMCP Server | p. 348 |
| Running a VNC Server | p. 358 |
| A Comparison of Access Techniques | p. 369 |
| Summary | p. 370 |
| Configuring a chroot Jail | p. 627 |
| What Is a chroot Jail? | p. 627 |
| Necessary chroot Environment Files | p. 630 |
| Configuring a Server to Operate in a chroot Jail | p. 633 |
| Maintaining the chroot Environment | p. 638 |
| Summary | p. 639 |
| Advanced Router Options | p. 641 |
| When to Use Advanced Router Configurations | p. 642 |
| Advanced Kernel Options | p. 643 |
| Using iproute2 | p. 648 |
| Using Routing Protocols | p. 653 |
| Summary | p. 659 |
| Configuring iptables | p. 661 |
| What Is iptables? | p. 662 |
| Kernel Configuration for iptables | p. 664 |
| Checking Your iptables Configuration | p. 666 |
| Configuring a Firewall with iptables | p. 667 |
| Configuring NAT with iptables | p. 677 |
| Forwarding Ports with iptables | p. 682 |
| Logging iptables Activity | p. 684 |
| Summary | p. 686 |
| Using a VPN | p. 687 |
| When to Use a VPN | p. 688 |
| VPN Options for Linux | p. 691 |
| Configuring PPTP in Linux | p. 691 |
| Configuring a Linux FreeS/WAN Server | p. 701 |
| Potential Security Risks with a VPN | p. 710 |
| Summary | p. 712 |
| Table of Contents provided by Syndetics. All Rights Reserved. |
Excerpts
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.
