Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
5Activity

Table Of Contents

Why Host Your Own Site?
INTHIS CHAPTER
OUR NETWORK
ALTERNATIVES TO IN-HOUSEWEB HOSTING
Virtual Hosting
Dedicated Hosting
FACTORS TO CONSIDER BEFORE HOSTINGYOURSELF
Is In-House Hosting Preferred?
HOW TO MIGRATE FROM AN EXTERNAL PROVIDER
IN-HOUSE SERVER CONSIDERATIONS
CONCLUSION
Introduction to Networking
THE OSI NETWORKING MODEL
AN INTRODUCTION TOTCP/IP
TCP Is a Connection-Oriented Protocol
How TCP Establishes a Connection
UDP,TCP’s “Connectionless”Cousin
TCP and UDP Ports
The TCP/IP Time to Live Feature
The ICMP Protocol and Its Relationship to TCP/IP
HOW IP ADDRESSES ARE USED TO ACCESS NETWORK DEVICES
Private IP Addresses
The localhost IP Address
Network Address Translation (NAT) Makes Private IPs Public
Port Forwarding with NAT Facilitates Home-Based Web Sites
DHCP
How DNS Links Your IP Address to Your Web Domain
IP Version 6 (IPv6)
HOW SUBNET MASKS GROUP IP ADDRESSES INTO NETWORKS
Calculating the Number of Addresses Assigned to a Subnet
Calculating the Range of Addresses on Your Network
Subnet Masks for the Typical Business DSL Line
THE PHYSICAL AND LINK LAYERS
NETWORKING EQUIPMENTTERMINOLOGY
Network Interface Cards
The Two Broad Types of Networking Equipment
Connectivity Using Hubs
Using Switches as a Faster Alternative to Hubs
Local Area Networks
How Routers Interconnect LANs
How Simple Routing Works
Default Gateways,the Routers of Last Resort
Firewalls Help Provide a Secure Routing Environment
ADDITIONAL INTRODUCTORYTOPICS
The File Transfer Protocol
Linux Help
Linux Networking
HOW TO CONFIGUREYOUR NIC’S IP ADDRESS
Determining Your IP Address
Changing Your IP Address
Multiple IP Addresses on a Single NIC
IP Address Assignment for a Direct DSL Connection
IP Address Assignment for a Cable Modem Connection
HOW TO ACTIVATE/SHUT DOWNYOUR NIC
HOW TO CHANGEYOUR DEFAULT GATEWAY
HOW TO CONFIGURETWO GATEWAYS
Adding Routes from the Command Line
Adding Routes with /etc/sysconfig/network-scripts/ Files
HOW TO DELETE A ROUTE
CHANGING NIC SPEED AND DUPLEX
Using mii-tool
Using ethtool
HOW TO CONVERTYOUR LINUX SERVER INTO A ROUTER
Configuring IP Forwarding
Configuring Proxy ARP
CONFIGURINGYOUR /ETC/HOSTS FILE
The loopback Interface’s localhost Entry
Simple Network Troubleshooting
Sources of Network Slowness
Sources of a Lack of Connectivity
DOING BASIC CABLE AND LINKTESTS
TESTINGYOUR NIC
Viewing Your Activated Interfaces
Viewing All Interfaces
Testing Link Status from the Command Line
Viewing NIC Errors
HOW TO SEE MAC ADDRESSES
USING PING TOTEST NETWORK CONNECTIVITY
USING TELNET TOTEST NETWORK CONNECTIVITY
LINUX TELNET TROUBLESHOOTING
Successful Connection
Connection Refused Messages
TELNETTROUBLESHOOTING USINGWINDOWS
Screen Goes Blank—Successful Connection
Connect Failed Messages
TESTINGWEB SITES WITH THE CURL AND WGET UTILITIES
Using curl
Using wget
THE NETSTAT COMMAND
THE LINUX IPTABLES FIREWALL
Determining Whether iptables Is Running
How to Stop iptables
How to Configure iptables Rules
USING TRACEROUTE TOTEST CONNECTIVITY
Sample traceroute Output
Possible traceroute Messages
tracerouteTime Exceeded False Alarms
traceroute Internet Slowness False Alarm
traceroute Dies at the Router Just Before the Server
Always Get a Bidirectional traceroute
Possible Reasons for a Failed traceroute
USING MTR TO DETECT NETWORK CONGESTION
VIEWING PACKET FLOWS WITH TCPDUMP
Analyzing tcpdump files
Common Problems with tcpdump
VIEWING PACKET FLOWS WITH TETHEREAL
BASIC DNS TROUBLESHOOTING
Using nslookup to Test DNS
Using the host Command to Test DNS
USING NMAP
DETERMINING THE SOURCE OF AN ATTACK
WHO HAS USED MY SYSTEM?
The last Command
The who Command
Troubleshooting Linux with syslog
SYSLOG
The /etc/syslog.conf File
Activating Changes to the syslog Configuration File
How to View New Log Entries as They Happen
Logging syslog Messages to a Remote Linux Server
syslog Configuration and Cisco Network Devices
syslog and Firewalls
LOGROTATE
The /etc/logrotate.conf File
Sample Contents of /etc/logrotate.conf
The /etc/logrotate.d Directory
Activating logrotate
Compressing Your Log Files
Installing RPM Software
WHERE TO GET COMMONLY USED RPMS
RPMs on Your Installation CDs
RPMs Downloaded from Fedora
RPMs Downloaded from rpmfind.net
GETTING RPMS USINGWEB-BASED FTP
Using the Fedora Web site
Using the rpmfindWeb site
GETTING RPMS USING COMMAND-LINE ANONYMOUS FTP
GETTING RPMS USING WGET
AUTOMATIC UPDATES WITH YUM
Configuring yum
Creating Your Own yum Server
Before You Start
Keeping Your System Current with yum
Example of a yum Package Installation
HOW TO INSTALL RPMS MANUALLY
Using Downloaded Files
Using CD-ROMs
HOW TO INSTALL SOURCE RPMS
RPM INSTALLATION ERRORS
Failed Dependencies
Signature Keys
HOW TO LIST INSTALLED RPMS
LISTING FILES ASSOCIATED WITH RPMS
Listing Files for Already Installed RPMs
Listing Files in RPM Files
Listing the RPM to Which a File Belongs
UNINSTALLING RPMS
WHICH RPMS START AT BOOTTIME?
INSTALLING SOFTWARE USING TAR FILES
The Linux Boot Process
☞ The Fedora Boot Sequence
THE FEDORA BOOT SEQUENCE
DETERMINING THE DEFAULT BOOT RUNLEVEL
GETTING A GUI CONSOLE
GET A BASICTEXTTERMINALWITHOUT EXITING THE GUI
Using a GUI Terminal Window
Using Virtual Consoles
SYSTEM SHUTDOWN AND REBOOTING
Halt/Shut Down the System
Reboot the System
Entering Single-user Mode
HOW TO SET PROGRAMS TO RUN AT EACH RUNLEVEL
chkconfig Examples
Using chkconfig to Improve Security
Final Tips on chkconfig
Configuring the DHCP Server
☞ Download and Install the DHCP Pacakge
DOWNLOAD AND INSTALL THE DHCP PACKAGE
THE /ETC/DHCPD.CONF FILE
HOW TO GET DHCP STARTED
DHCP SERVERS WITH MULTIPLE NICS
Temporary Solution
Permanent Solution
CONFIGURING LINUX CLIENTS TO USE DHCP
CONFIGURINGWINDOWS CLIENTS TO USE DHCP
SIMPLE DHCP TROUBLESHOOTING
DHCP Clients Obtaining 169.254.0.0 Addresses
Linux Users and sudo
ADDING USERS
Who Is the Super User?
How to Add Users
How to Change Passwords
How to Delete Users
How to Tell the Groups to Which a User Belongs
How to Change the Ownership of a File
USING SUDO
Example of a User Using sudo
Downloading and Installing the sudo Package
Simple /etc/sudoers Examples
Windows, Linux, and Samba
DOWNLOAD AND INSTALL PACKAGES
HOW TO GET SAMBA STARTED
THE SAMBA CONFIGURATION FILE
HOW SWAT MAKES SAMBA SIMPLER
Basic SWAT Setup
Controlling SWAT
Encrypting SWAT
How to Make SWAT Changes Immediate
CREATING A STARTER CONFIGURATION
The [global] Section
The [homes] Section
The [netlogon] and [profiles] Share Sections
The [printers] Share Section
Shares for Specific Groups of Users
SAMBA PASSWORDS
HOW TO CREATE A SAMBA PDC ADMINISTRATOR USER
Home Environment
Corporate Environment
HOW TO ADDWORKSTATIONS TOYOUR SAMBA DOMAIN
Create Samba Trust Accounts for Each Workstation
Make Your PC Clients Aware of Your Samba PDC
AUTOMATING MOUNTING WITH LINUX SAMBA CLIENTS
Samba Security and Troubleshooting
TESTING THE SMB.CONF FILE
SAMBA AND FIREWALL SOFTWARE
Linux iptables
Windows-based Zone Alarm
The Windows XP Built-In Firewall
TESTING BASIC CLIENT/SERVER NETWORK CONNECTIVITY
TESTING SAMBA CLIENT/SERVER NETWORK CONNECTIVITY
CHECKING THE SAMBA LOGS
SAMBA NETWORKTROUBLESHOOTING
BASIC SAMBA SECURITY
Linux Wireless Networking
WIRELESS LINUX-COMPATIBLE NICS
COMMONWIRELESS NETWORKINGTERMS
Wireless Access Points
Extended Service Set ID
Encryption Keys
NETWORKING WITH LINUXWIRELESSTOOLS
Using iwconfig for Wireless Tools Configuration
Permanent Wireless Tools Configuration
Wireless Tools Encryption
NETWORKING WITH LINUX-WLAN
Linux-WLAN Preparation
Identifying the Correct RPMs
Installing the RPMs
WHAT IS IPTABLES?
DOWNLOAD AND INSTALL THE IPTABLES PACKAGE
HOW TO START IPTABLES
DETERMINING THE STATUS OF IPTABLES
PACKET PROCESSING IN IPTABLES
TARGETS AND JUMPS
Targets and Jumps 215
IMPORTANT IPTABLES COMMAND SWITCH OPERATIONS
USING USER-DEFINED CHAINS
SAVINGYOUR IPTABLES SCRIPTS
FEDORA’S IPTABLES RULE GENERATOR
RECOVERING FROM A LOST SCRIPT
LOADING KERNEL MODULES NEEDED BY IPTABLES
SAMPLE IPTABLES SCRIPTS
Basic Operating System Defense
Basic iptables Initialization
Advanced iptables Initialization
Allowing DNS Access to Your Firewall
Allowing WWW and SSH Access to Your Firewall
Allowing Your Firewall to Access the Internet
Allow Your Home Network to Access the Firewall
Masquerading (Many to One NAT)
Port Forwarding Type NAT (DHCP DSL)
Static NAT
TROUBLESHOOTING IPTABLES
Checking the Firewall Logs
iptablesWon’t Start
Linux FTP Server Setup
FTP OVERVIEW
Types of FTP
PROBLEMS WITH FTP AND FIREWALLS
Client Protected by a Firewall Problem
Server Protected by a Firewall Problem
HOW TO DOWNLOAD AND INSTALLVSFTPD
HOW TO GETVSFTPD STARTED
TESTING THE STATUS OFVSFTPD
THE VSFTPD.CONF FILE
Other vsftpd.conf Options
FTP SECURITY ISSUES
The /etc/vsftpd.ftpusers File
Anonymous Upload
FTP Greeting Banner
Using SCP as Secure Alternative to FTP
TROUBLESHOOTING FTP
TUTORIAL
FTP Users with Read-Only Access to a Shared Directory
Sample Login Session to Test Functionality
TELNET, TFTP, and xinetd
MANAGING XINETD PROGRAMS
Controlling xinetd
Controlling xinetd-Managed Applications
TELNET
Using The TELNET Client
Installing the TELNET Server Software
Setting Up a TELNET Server
Stopping a TELNET Server
Basic TELNET Security
TFTP
Installing the TFTP Server Software
Configuring the TFTP Server
Saving Cisco Configurations to the TFTP Server
Uploading Cisco Configurations from the TFTP Server
Using TFTP to Restore Your Router Configuration
Secure Remote Logins and File Copying
☞ A Quick Introduction to SSH Encryption
A QUICK INTRODUCTION TO SSH ENCRYPTION
STARTING OPENSSH
TESTING THE STATUS OF SSH
THE /ETC/SSH/SSHD_CONFIG FILE
SSH Versions 1 and 2
Change the TCP Port on Which SSH Listens
THE /ETC/RESOLV.CONF FILE
CONFIGURING A CACHING NAME SERVER
IMPORTANT FILE LOCATIONS
CONFIGURING A REGULAR NAME SERVER
Configuring resolv.conf
Configuring named.conf
Configuring the Zone Files
Sample Forward Zone File
Sample Reverse Zone File
What You Need to Know About NAT and DNS
Loading Your New Configuration Files
Make Sure Your /etc/hosts File is Correctly Updated
Configure Your Firewall
Fix Your Domain Registration
TROUBLESHOOTING BIND
General Troubleshooting Steps
MIGRATINGYOURWEB SITE IN-HOUSE
DHCP CONSIDERATIONS FOR DNS
Zone Transfer Protection
Naming Convention Security
Dynamic DNS
DYNAMIC DNS PREPARATION
Testing ISP Connectivity for Your Web Site
Registering DDNS
Install a DDNS Client on Your Server
DYNAMIC DNS AND NAT ROUTER/FIREWALLS
DDNS CLIENT SOFTWARE: SOHO ROUTER/FIREWALLS
DDNS CLIENT SOFTWARE: LINUX DDCLIENT
The /etc/ddclient.conf File
How to Get DDclient Started
Finding DDclient Help
TESTINGYOUR DYNAMIC DNS
The Apache Web Server
☞ Downloading and Installing the Apache Package
DOWNLOADING AND INSTALLING THE APACHE PACKAGE
STARTING APACHE
CONFIGURING DNS FOR APACHE
DHCP AND APACHE
GENERAL CONFIGURATION STEPS
Where to Put Your Web Pages
Named Virtual Hosting
IP-Based Virtual Hosting
Virtual Hosting and SSL
CONFIGURATION: MULTIPLE SITES AND IP ADDRESSES
Testing Your Web Site Before DNS Is Fixed
Disabling Directory Listings
Handling Missing Pages
USING DATA COMPRESSION ONWEB PAGES
Compression Configuration Example
APACHE RUNNING ON A SERVER BEHIND A NAT FIREWALL
Step 1:Configure Virtual Hosting on Multiple IPs
Step 2:Configure DNS Views
PROTECTINGWEB PAGE DIRECTORIES WITH PASSWORDS
THE /ETC/HTTPD/CONF.D DIRECTORY
TROUBLESHOOTING APACHE
Testing Basic HTTP Connectivity
Browser 403 Forbidden Messages
Only the Default Apache Page Appears
Incompatible /etc/httpd/conf/http.conf Files When Upgrading
Server Name Errors
The Apache Status Log Files
The Apache Error Log Files
Configuring Linux Mail Servers
CONFIGURING SENDMAIL
How sendmailWorks
Installing sendmail
Starting sendmail
How to Restart sendmail After Editing Your Configuration Files
The /etc/mail/sendmail.mc File
Configuring DNS for sendmail
How to Configure Linux sendmail Clients
Converting From a Mail Client to a Mail Server
The /etc/mail/relay-domains File
The /etc/mail/access File
The /etc/mail/local-host-names File
Which User Should Really Receive the Mail?
sendmail Masquerading Explained
Using sendmail to Change the Sender’s E-mail Address
Troubleshooting sendmail
FIGHTING SPAM
Using Public Spam Blacklists with sendmail
A Simple PERL Script to Help Stop Spam
CONFIGURINGYOUR POP MAIL SERVER
Installing Your POP Mail Server
Starting Your POP Mail Server
How to Configure Your Windows Mail Programs
Configuring Secure POP Mail
How to Handle Overlapping E-mail Addresses
Troubleshooting POP Mail
Monitoring Server Performance
SNMP
OIDs and MIBs
SNMP Community Strings
SNMP Versions
Doing SNMP Queries
Basic SNMP Security
Simple SNMP Troubleshooting
MRTG
MRTG Download and Installation
Configuring MRTG
Getting MRTG to Poll Multiple Devices
Configuring Apache to Work with MRTG
How to View the MRTG Graphs in Your Web Browser
Using MRTG to Monitor Other Subsystems
Troubleshooting MRTG
WEBALIZER
How to View Your Webalizer Statistics
The Webalizer Configuration File
THE TOP COMMAND
THE VMSTAT COMMAND
THE FREE UTILITY
Advanced MRTG for Linux
☞ Locating and Viewing the Contents of Linux MIBs
LOCATING ANDVIEWING THE CONTENTS OF LINUX MIBS
TESTINGYOUR MIB VALUE
DIFFERENCES IN MIB AND MRTG TERMINOLOGY
THE CPU AND THE MEMORY MONITORING MIB
THETCP/IP MONITORING MIB
MANUALLY CONFIGURINGYOUR MRTG FILE
Parameter Formats
Legend Parameters
Options Parameters
Title Parameters
Scaling Parameters
Defining The MIB Target Parameters
Defining Global Variables
IMPLEMENTING ADVANCED SERVER MONITORING
A Complete Sample Configuration
Testing the Configuration
Creating a New MRTG Index Page to Include this File
Configuring CRON to Use the New MRTG File
MONITORING NON-LINUX MIB VALUES
Scenario
Find the OIDs
Testing The OIDs
TROUBLESHOOTING
The NTP Server
DOWNLOAD AND INSTALL THE NTP PACKAGE
THE /ETC/NTP.CONF FILE
HOW TO GET NTP STARTED
TESTING ANDTROUBLESHOOTING NTP
Verifying NTP is Running
Doing an Initial Synchronization
Determining If NTP Is Synchronized Properly
Your Linux NTP Clients Cannot Synchronize Properly
Fedora Core 2 File Permissions
CONFIGURING CISCO DEVICES TO USE AN NTP SERVER
Cisco IOS
CAT OS
FIREWALLS AND NTP
CONFIGURING AWINDOWS NTP CLIENT
Network-Based Linux Installation
SETTING UP THE INSTALLATION SERVER
Basic Preparation
Set Up Your Web Server
Set Up Your FTP Server
Create a Special FTP User
Set Up Your NFS Server
Configure Your DHCP Server
CREATING A BOOT CD
THE NETWORK INSTALLATION
TROUBLESHOOTING THE NETWORK INSTALLATION
DIFFERENCES BETWEEN FEDORA AND RED HAT INSTALLATION
AUTOMATING INSTALLATION WITH KICKSTART
How to Create New Kickstart Configuration Files
How to Run a Kickstart Installation
Booting With Your Kickstart Files
Linux Software RAID
RAID TYPES
Linear Mode RAID
RAID 0
RAID 1
RAID 4
RAID 5
BEFOREYOU START
IDE Drives
Serial ATA Drives
SCSI Drives
Should I Use Software RAID Partitions or Entire Disks?
Back up Your System First
Configure RAID in Single-User Mode
CONFIGURING SOFTWARE RAID
RAID Partitioning
Edit the RAID Configuration File
Create the RAID Set
Confirm RAID Is Correctly Initialized
Format the New RAID Set
Load the RAID Driver for the New RAID Set
Create a Mount Point for the RAID Set
Edit the /etc/fstab File
Start the New RAID Set’s Driver
Mount the New RAID Set
Check the Status of the New RAID
Expanding Disk Capacity
ADDING DISKS TO LINUX
Determining the Disk Types
Preparing Partitions on New Disks
Verifying Your New Partition
Putting a Directory Structure on Your New Partition
Migrating Data to Your New Partition
EXPANDING PARTITIONS WITH LVM
LVM Terms
Configuring LVM Devices
Managing Disk Usage with Quotas
SETTING UP QUOTAS
Enter Single-User Mode
Edit Your /etc/fstab File
Remount the Filesystem
Get Out of Single-User Mode
Create the Partition Quota Configuration Files
Initialize the Quota Table
Edit the User’s Quota Information
Testing
OTHER QUOTATOPICS
Editing Grace Periods
Editing Group Quotas
Getting Quota Reports
Remote Disk Access With NFS
☞ NFS Operation Overview
NFS OPERATION OVERVIEW
General NFS Rules
Key NFS Concepts
Important NFS Daemons
INSTALLING NFS
SCENARIO
CONFIGURING NFS ON THE SERVER
The /etc/exports File
Starting NFS on the Server
CONFIGURING NFS ON THE CLIENT
Starting NFS on the Client
NFS and DNS
Making NFS Mounting Permanent
ACTIVATING MODIFICATIONS TO THE /ETC/EXPORTS FILE
New Exports File
Adding a Shared Directory To An Existing Exports File
Deleting,Moving,or Modifying a Share
THE NFS AUTOMOUNTER
automounter Map Files
The Structure of Direct and Indirect Map Files
Wildcards in Map Files
Starting automounter
automounter Examples
TROUBLESHOOTING NFS
The showmount Command
The df Command
The nfsstat Command
OTHER NFS CONSIDERATIONS
Security
NFS Hanging
File Locking
Nesting Exports
Limiting root Access
Restricting Access to the NFS Server
File Permissions
Centralized Logins Using NIS
CONFIGURING THE NFS SERVER
CONFIGURING THE NFS CLIENT
CONFIGURING THE NIS SERVER
Edit Your /etc/sysconfig/network File
Edit Your /etc/yp.conf File
Start the Key NIS Server-Related Daemons
Initialize Your NIS Domain
Start the ypbind and ypxfrd Daemons
Make Sure the Daemons Are Running
ADDING NEW NIS USERS
CONFIGURING THE NIS CLIENT
Run authconfig
Start the NIS Client-Related Daemons
Verify Name Resolution
Test NIS Access to the NIS Server
Test Logins via the NIS Server
NIS SLAVE SERVERS
Configuring NIS Slave Servers
Configuring NIS Clients with Slaves
CHANGINGYOUR NIS PASSWORDS
When There Is Only an NIS Master
When There Is a NIS Master and Slave Pair
Possible Password Errors
CONSIDERATIONS FOR A NON-NFS ENVIRONMENT
NIS TROUBLESHOOTING
Centralized Logins Using LDAP and RADIUS
THE LDAP DIRECTORY STRUCTURE
DOWNLOADING AND INSTALLING THE LDAP PACKAGES
Required LDAP Server RPMs
Required LDAP Client RPMs
CONFIGURING THE LDAP SERVER
Create a Database Directory
Create an LDAP Root Password
Edit the slapd.conf File
Start the ldap Daemon
Convert the /etc/passwd File to LDIF Format
Modify the LDIF Files
Import the LDIF Files into the Database
Test the LDAP Database
CONFIGURING THE LDAP CLIENT
Edit the ldap.conf Configuration File
Edit the /etc/nsswitch File
Create Home Directories on the LDAP Client
CONFIGURING ENCRYPTED LDAP COMMUNICATION
Configuring the stunnel LDAP Client
Configuring the stunnel LDAP Server
TROUBLESHOOTING LDAP LOGINS
Test Using ldapsearch
Use SSH or the Linux Console
Use the tcpdump Command
Test Basic Connectivity
LDAP Works But Is Not Using LDAPS
stunnel Doesn’t Appear to Work
LDAP bind Errors
Possible stunnel Errors in Fedora Core 2
COMMON LDAP ADMINISTRATIVETASKS
Starting and Stopping LDAP
LDAP Users Changing Their Own Passwords
Modifying LDAP Users by User root
Adding New LDAP Users
Deleting LDAP Users
LDAP Web Management Tools
CONFIGURING RADIUS FOR LDAP
Download and Install the FreeRADIUS Packages
Starting and Stopping FreeRADIUS
Configuring the /etc/raddb/radiusd.conf File
Configuring the /etc/raddb/users File
Configuring the /etc/raddb/clients.conf File
Troubleshooting and Testing RADIUS
Controlling Web Access with Squid
DOWNLOAD AND INSTALL THE SQUID PACKAGE
STARTING SQUID
THE /ETC/SQUID/SQUID.CONF FILE
The Visible Host Name
Access Control Lists
Restricting Web Access by Time
Restricting Web Access by IP Address
Password Authentication Using NCSA
FORCING USERS TO USEYOUR SQUID SERVER
Making Your Squid Server Transparent to Users
Manually Configuring Web Browsers to Use Your Squid Server
SQUID DISK USAGE
TROUBLESHOOTING SQUID
Modifying the Linux Kernel to Improve Performance
The Pros and Cons of Kernel Upgrades
DOWNLOAD AND INSTALL THE KERNEL SOURCES PACKAGE
KERNEL MODULES
Reasons for Kernel Modules
How Kernel Modules Load When Booting
Loading Kernel Modules on Demand
CREATING A CUSTOM KERNEL
Make Sure Your Source Files Are in Order
The .config File
Customizing the .config File
Configure Dependencies
Edit the Makefile to Give the Kernel a Unique Name
Compile a New Kernel
Build the Kernel’s Modules
Install the Kernel Modules
Copy the New Kernel to the /boot Partition
UPDATING GRUB
Kernel Crash Recovery
How to Create a Boot CD
UPDATING THE KERNEL USING RPMS
Basic MySQL Configuration
PREPARING MYSQL FOR APPLICATIONS
INSTALLING MYSQL
STARTING MYSQL
THE /ETC/MY.CNF FILE
THE LOCATION OF MYSQL DATABASES
CREATING A MYSQL ROOT ACCOUNT
ACCESSING THE MYSQL COMMAND LINE
CREATING AND DELETING MYSQL DATABASES
GRANTING PRIVILEGES TO USERS
RUNNING MYSQL SCRIPTS TO CREATE DATATABLES
VIEWINGYOUR NEW MYSQL DATABASES
Listing the Data Tables in Your MySQL Database
Viewing Your MySQL Database’s Table Structure
Viewing the Contents of a Table
CONFIGURINGYOUR APPLICATION
RECOVERING AND CHANGINGYOUR MYSQL ROOT PASSWORD
MYSQL DATABASE BACKUP
MYSQL DATABASE RESTORATION
VERY BASIC MYSQL NETWORK SECURITY
BASIC MYSQL TROUBLESHOOTING
Connectivity Testing
Test Database Access
A Common Fedora Core 1 MySQL Startup Error
Configuring Linux VPNs
VPN GUIDELINES
DOWNLOAD AND INSTALL THE OPENSWAN PACKAGE
HOW TO GET OPENSWAN STARTED
How to Get Openswan Started 561
GET THE STATUS OF THE OPENSWAN INSTALLATION
How to Fix Common Status Errors
VPN CONFIGURATION STEPS USING RSA KEYS
The /etc/ipsec.conf File
VPN Configuration Steps Using RSA Keys 563
Obtaining RSA Keys
Edit the /etc/ipsec.conf Configuration File
Restart Openswan
Initialize the New Tunnel
Testing the New Tunnel
POSSIBLE CHANGES TO IP TABLES NAT/MASQUERADE RULES
HOW TO ENSURE OPENSWAN STARTSWHEN REBOOTING
USING PRE-SHARED KEYS (PSK)
TROUBLESHOOTING OPENSWAN
Determine the Tunnel Status
Testing VPN Connectivity
Check the Routes
Using tcpdump
Check syslog Error Messages
Invalid Key Messages
FEDORA CORE 3
LINUX SECURITY WITHTCP WRAPPERS
The TCP Wrappers File Format
Determining the TCP Daemon’s Name
ADJUSTING KERNEL PARAMETERS
RUNNING LINUXWITHOUT A MONITOR
Preparing to Go Headless
Configuration Steps
MAKEYOUR LINUX BOX EMULATE AVT100 DUMBTERMINAL
VPN TERMS AND METHODS
Authentication and Encryption Methods
Internet Key Exchange (IKE)
IKE’s role in Creating Security Associations
VPN Security and Firewalls
VPN User Authentication Methods for Temporary Connections
TCP/IP PACKET FORMAT
TCP/IP Packet Format 587
ICMP CODES
APACHE FILE PERMISSIONS SCRIPT
SENDMAIL SPAM FILTER SCRIPT
The mail-filter.accept File
The mail-filter.reject File
The mail-filter Script
IPTABLES SCRIPTS
FTP Client Script
FTP Server Script
NTP Server Script
Home/Small Office Protection Script
SAMPLE DNS ZONE FILES: USING BIND VIEWS
The /etc/named.conf File
Zone File for my-web-site.org (External View)
Zone File for my-web-site.org (Internal View)
Reverse Zone File for a Home Network Using NAT
SENDMAIL SAMPLES
Sample /etc/mail/access File
Sample /etc/mail/local-host-names File
Sample /etc/mail/sendmail.mc File
Sample /etc/mail/virtusertable File
FTP DIFFERENCES
DHCP DIFFERENCES
DNS DIFFERENCES
ROUTING DIFFERENCES
IPTABLES DIFFERENCES
SOFTWARE INSTALLATION DIFFERENCES
WIRELESS NETWORKING DIFFERENCES
Linux-WLAN File Locations Using Red Hat 8.0 RPMs
MRTG DIFFERENCES
File Locations
indexmaker MRTG_LIB Errors with Red Hat 9 and 8.0
Precedence Bitwise Error with Red Hat 9
WEBALIZER DIFFERENCES
CISCO ROUTERS
CATALYST CAT SWITCHES RUNNING CATOS
CISCO LOCAL DIRECTOR
CISCO PIX FIREWALLS
CISCO CSS11000 (ARROWPOINTS)
THE SAMPLE CISCO SYSLOG.CONF FILE
The Sample Cisco syslog.conf File 625
0 of .
Results for:
No results containing your search query
P. 1
linux_quick_fix_book

linux_quick_fix_book

Ratings: (0)|Views: 112 |Likes:
Published by Prince Paulson

More info:

Published by: Prince Paulson on Apr 12, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

06/03/2013

pdf

text

original

You're Reading a Free Preview
Pages 14 to 207 are not shown in this preview.
You're Reading a Free Preview
Pages 221 to 235 are not shown in this preview.
You're Reading a Free Preview
Pages 253 to 308 are not shown in this preview.
You're Reading a Free Preview
Pages 322 to 696 are not shown in this preview.

Activity (5)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Jeffry Tatuhey liked this
decon3 liked this
payakkamron liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->