Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
2Activity

Table Of Contents

CHAPTER 1
CHAPTER 2
CHAPTER 3
CHAPTER 4
CHAPTER 5
Chapter 1
NThe Linux system administrator
The Linux System Administrator
Installing and Configuring Servers
Installing and Configuring Application Software
Creating and Maintaining User Accounts
Backing Up and Restoring Files
Monitoring and Tuning Performance
Configuring a Secure System
Using Tools to Monitor Security
Summary
Chapter 2
NDeciding what kind of network you need
Deciding What Kind of Network You Need
Understanding topologies
Client/server or peer-to-peer?
What’s in the mix?
Determining system requirements
Planning and Implementing Security
Addressing external and internal threats
Formulating a security policy
Planning for Recovery from Disasters
Write It Down — Good Records Can Save Your Job
NExploring your PC’s components
Exploring Your PC’s Components
Processor
Memory
Video card and monitor
Hard drive
Floppy disk drive
Keyboard and mouse
SCSI controller
CD-ROM drive
Sound card
Network card
Checking for Supported Hardware
Creating the Red Hat Boot Disk
Starting the Red Hat Linux Installation
Partitioning the Hard Disk for Red Hat Linux
Naming disks and devices
Mounting a file system on a device
Understanding the swap partition
Preparing disk partitions for Red Hat Linux
Configuring Red Hat Linux Installation
Installing the Boot Loader
Configuring the network
Setting the time zone
Setting the root password and add user accounts
Configuring password authentication
Selecting the Package Groups to Install
Completing the Installation
Using KickStart
KickStart Commands
Auth — Authentication Options
bootloader
clearpart
device --opts
driverdisk
firewall
install
Installation methods
interactive
keyboard
language
lilo
lilocheck
mouse
network
partition
raid
reboot
rootpw
skipx
timezone
upgrade
xconfig
zerombr — Partition table initialization
%packages — Package Selection
%pre — Pre-Installation Configuration Section
%post — Post-Installation Configuration Section
Starting a KickStart Installation
NUnderstanding the Red Hat Linux file system structure
Understanding the Red Hat Linux File System Structure
The / directory
Using File System Commands
ls
cp
rm
mv
chown
chgrp
chmod
chattr
ln
symlinks
stat
lsof
mknod
macutil
Working With Linux—Supported File Systems
Standard disk file systems
Nonstandard Linux file systems
Memory file systems and virtual file systems
Linux Disk Management
Partitioning an x86 machine
Mounting other OS partitions/slices
Metadevices
Examining the System Configuration Files
Systemwide shell configuration scripts
System environmental settings
System configuration files in the /etc/sysconfig directory
Examining the Network Configuration Files
Starting up network services from xinetd
Starting up network services from the rc scripts
Network configuration files in /etc/sysconfig/network-scripts
Managing the init Scripts
Managing rc scripts by hand
Managing rc scripts using chkconfig
NTCP/IP explained
TCP/IP Explained
Understanding Network Classes
Setting Up a Network Interface Card (NIC)
Configuring the network card
Configuring an internal network
Understanding Subnetting
Interpreting IP numbers
Before you subnet your network
Classless InterDomain Routing (CIDR)
Gateways and Routers
Setting up the server
Configuring the client
Configuring a Point-to-Point Protocol (PPP) Connection
Configuring a PPP server
CHAP security
Configuring a PPP client
Setting up a PPP connection
Configuring IP Masquerading
NFS Overview
Understanding NFS
NFS advantages
NFS disadvantages
Configuring an NFS Server
Overview of server configuration
Designing an NFS server
Key files, commands, and daemons
Example NFS server
Configuring an NFS Client
Overview of client configuration
Key files and commands
Configuring and starting the server daemon
Initializing the NIS maps
Starting the NIS password daemon
Starting the server transfer daemon
Starting the NIS servers at boot time
Configuring an example NIS server
Configuring an NIS Client
1.Set the NIS domain name
Configuring and starting the client daemon
Configuring the client startup files
Key NIS client files and commands
Testing your NIS configuration
Configuring an example NIS client
Strengthening NIS Security
NInstalling Samba
Installing Samba
Configuring the Samba Server
[global]
[homes]
[printers]
[nancy]
Using SWAT
Configuring the Samba Client
Using a Windows Printer from the Linux Computer
Testing the Samba Server
NUnderstanding AppleTalk
Understanding AppleTalk
AppleTalk addressing
Apple zones
Installing the AppleTalk Software
The AppleTalk DDP kernel module
Installing Netatalk
Configuring /etc/services
Configuring Netatalk
Configuring the Daemons
Configuring atalkd
Configuring AppleTalk Interfaces
Additional configuration
Configuring AppleTalk file sharing
Setting up AFP Accounts
Configuring AFS to work with AppleTalk
Configuring AppleTalk printer sharing
Configuring Red Hat as an AppleTalk Client
Accessing Apple printers
Finding the printer’s zone
ipchains
NUnderstanding DNS
Understanding DNS
Installing the Software
Understanding Types of Domain Servers
Examining Server Configuration Files
The named.conf file
Options
The named.ca file
The named.local file
Zone files
The reverse zone file
Configuring a Caching Server
Configuring a Slave Server
Configuring a Master Server
Using DNS Tools
What FTP Software is Available?
Red Hat Linux’s choice: WU-FTPD
Alternative FTP servers
Installing WU-FTPD
The enhanced /etc/ftpaccess file
Administering WU-FTPD with KWuFTPd
Maintaining the Server
Strengthening FTP Security
Understanding and mitigating the risks
Reconfiguring the system log
Monitoring the server
NE-mail explained
E-Mail Explained
Mail User Agent (MUA)
Mail Transfer Agent (MTA)
Local Delivery Agent (LDA)
Introducing SMTP
Understanding POP3
Understanding IMAP4
Configuring Sendmail
Checking that Sendmail is installed and running
The m4 Macro Processor
Understanding and managing the mail queue
Configuring POP3
Configuring IMAP4
Setting up aliases to make life easier
Using other files and commands with Sendmail
Configuring the E-Mail Client
Configuring Netscape Messenger
Filling Out the Messenger Forms
Using Netscape Messenger
Sending e-mail from the command line
Reading mail with Mail
Using Elm
Creating mail aliases in elm
Using Pine
Working with Pine attachments
Maintaining E-Mail Security
Protecting against eavesdropping
Using encryption
Using a firewall
Don’t get bombed, spammed, or spoofed
Be careful with SMTP
Using Newsgroups
Configuring the NNTP server
Reading newsgroups in Pine
Configuring Netscape for news
NIntroducing Apache
Introducing Apache
A short history of Apache
Apache features
Finding more information about Apache
How Web Servers Work
Installing Apache
Installing the binary RPMs
Installing and building the source RPMs
Additional packages to install
Configuring Apache
Apache’s startup process
Configuring global Apache behavior
Configuring the default server
Configuring virtual servers
Configuring Apache for SSI
Enabling SSI
Testing the configuration
CGI Scripts
Creating a Secure Server with SSL
Generating the encryption key
Generating a self-signed certificate
Testing the self-signed certificate
NRegistering your system
Registering Your System
Configuring the Red Hat Update Agent
Using the Red Hat Update Agent
Using the Red Hat Network via the Internet
Red Hat Network Main page tab
Your Network page tab
Search Errata Alerts tab
Preferences tab
Help Desk tab
Should You Upgrade to a New Kernel?
Upgrading versus customizing
Checking your current kernel version
Building a New Kernel
Obtaining the latest kernel version
Patching the kernel
Customizing the kernel
Compiling and installing the new kernel
Configuring GRUB
Booting the custom kernel
Administering a System at the Command Line
Administering Users and Groups
Working with user accounts
Working with group accounts
Modifying multiple accounts simultaneously
Viewing login and process information
Managing the File System
Creating and maintaining file systems
Working with files and directories
Managing disk space usage
Administering Processes
Obtaining process information
Terminating processes
Modifying process priorities
Tracking and Controlling System Usage
Maintaining the Date and Time
Creating and Restoring Backups
Understanding Bash Programming
Wildcards and special characters
Using variables
Bash operators
Flow control
Shell functions
Processing input and output
Working with command line arguments
Using Processes and Job Control
Creating Backups
Automating Scripts
Using at for one-shot jobs
Using cron for regularly scheduled jobs
Writing, Testing, and Debugging Scripts
Selecting a Scripting Language
Diagnosing Performance Problems
Overall System Status
Monitoring Running Processes
Monitoring Memory Utilization
Monitoring Disk Usage and Performance
Tracking CPU Usage
Monitoring Network Traffic
NUnderstanding the root account
Understanding the Root Account
Implementing Sudo
Deciphering Sudo’s configuration file
Sudo configuration and usage tips
Working With Users and Groups
Understanding user private groups
Adding, modifying, and deleting users
Adding, modifying, and deleting groups
Using the Red Hat User Manager
Using File System Quotas
Preparing the system for quotas
Creating the quota files
Enabling quotas
Setting and modifying quotas
Reviewing quota utilization
NWhat should be backed up?
What Should Be Backed Up?
Choosing Media for Backups
Understanding Backup Methods
Using Backup Tools
Command line tools
Advanced tools
Query mode
Package installation and removal
Verifying RPMs
Building RPMs
RPM administrative commands
Checking Software Versions
Obtaining Newer Software
Using rpmfind.org
Using Freshmeat
Using Ibiblio.org
Using Gnome-RPM
Additional software repositories
Installing Software
Installing software from source
Building and installing source RPMs
Using RPM with source tarballs
Introducing Basic Security Concepts
Security as loss prevention
Security: a distributed venture
The fundamental mindset: shades of grey
Understanding the enemy
Developing a Security Policy
Beware the security assertions ploy
Creating the policy: a first iteration
The policy itself
Recovery plans
Social engineering
Finding Security-Related Resources
Web sites
Recommended reading
Links
Exploring the Nature ofPhysicalSecurity
Building construction
Boot security
Maintaining User and PasswordSecurity
Passwords: theory and practice
Those pesky users
Checking logs
Securing File Integrity
Not for everybody, or every computer
Setting up Tripwire
Fine-tuning Tripwire
NLimiting network services
Limiting Network Services
What services are running?
Stopping running services
Monitoring network traffic
A Firewall Primer
Firewall policy
Basic layout
Designing the firewall
Understanding Host-Based Intrusion Detection Software
Using Tripwire
Installing Tripwire
Configuring Tripwire
Running Tripwire
Detecting intrusions using Tripwire
Additional Tripwire resources
Using LogWatch
Detecting Intrusions with ipchains
Detecting Intrusions with iptables
Solving Installation Problems
Unable to log in after installation
Installing Star Office
Hardware-related installation problems
Solving File System Problems
Cannot delete a file
Commands with multi-word arguments
Accessing Windows file systems
Working with floppy disks
Cannot mount a partition
Avoiding file system checks at each system reboot
Getting a Zip drive to work
Solving Networking Problems
Getting online with a modem
What to do when the boot process hangs
Using two Ethernet cards
Solving Boot Problems
Solving Miscellaneous Problems
Getting sound to work
Using screensavers and power management
Starting the X Window System
Index
0 of .
Results for:
No results containing your search query
P. 1
Red 20Hat 20Linux 20Networking 20and 20System 20Administration

Red 20Hat 20Linux 20Networking 20and 20System 20Administration

Ratings: (0)|Views: 3|Likes:

More info:

Published by: Pool Fernandez Farfan on Jul 05, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

08/30/2013

pdf

text

original

You're Reading a Free Preview
Pages 18 to 206 are not shown in this preview.
You're Reading a Free Preview
Pages 224 to 282 are not shown in this preview.
You're Reading a Free Preview
Pages 300 to 334 are not shown in this preview.
You're Reading a Free Preview
Pages 352 to 667 are not shown in this preview.
You're Reading a Free Preview
Pages 685 to 889 are not shown in this preview.

Activity (2)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->