Linux Networking Cookbook

By Carla Schroder

This soup-to-nuts selection of recipes covers every little thing you must understand to accomplish your task as a Linux community administrator, even if you are new to the task or have years of expertise. With Linux Networking Cookbook, you are going to dive instantly into the gnarly hands-on paintings of creating and conserving a working laptop or computer network.

Running a community does not imply you have got all of the solutions. Networking is a posh topic with reams of reference fabric that is tricky to maintain directly, less take into account. if you'd like a booklet that lays out the stairs for particular initiatives, that essentially explains the instructions and configurations, and doesn't tax your endurance with never-ending ramblings and meanderings into thought and imprecise RFCs, this can be the e-book for you.

You will locate recipes for:

  • Building a gateway, firewall, and instant entry element on a Linux network
  • Building a VoIP server with Asterisk
  • Secure distant management with SSH
  • Building safe VPNs with OpenVPN, and a Linux PPTP VPN server
  • Single sign-on with Samba for combined Linux/Windows LANs
  • Centralized community listing with OpenLDAP
  • Network tracking with Nagios or MRTG
  • Getting conversant in IPv6
  • Setting up hands-free networks installations of latest systems
  • Linux approach management through serial console

And much more. every one recipe features a transparent, hands-on answer with demonstrated code, plus a dialogue on why it really works. if you have to remedy a community challenge instantly, and do not have the time or persistence to sweep via reference books or the internet for solutions, Linux Networking Cookbook delivers precisely what you need.

Show description

Quick preview of Linux Networking Cookbook PDF

Best Technology books

Dictionary of Landscape Architecture and Construction

In an that comprises the abilities, services, and hard work of a wide-range of execs and employees, stable communications develop into an important, and a typical vocabulary is essential to winning tasks. the various phrases utilized in panorama structure, land making plans, environmental making plans, and panorama development are unavailable, or so new, or industry-specific that they can’t be present in traditional dictionaries.

Principles of Electronic Communication Systems

Ideas of digital conversation structures 3/e offers the main up to date survey on hand for college students taking a primary direction in digital communications. Requiring in basic terms easy algebra and trigonometry, the hot version is impressive for its clarity, studying gains and diverse full-color pictures and illustrations.

Semiconductor Physics And Devices: Basic Principles

With its robust pedagogy, greater clarity, and thorough exam of the physics of semiconductor fabric, Semiconductor Physics and units, 4/e presents a foundation for knowing the features, operation, and barriers of semiconductor units. Neamen's Semiconductor Physics and units bargains with homes and features of semiconductor fabrics and units.

The Oxford Handbook of Computer Music (Oxford Handbooks)

The Oxford guide of laptop tune bargains a state of the art cross-section of the main field-defining themes and debates in machine song at the present time. a different contribution to the sphere, it situates desktop track within the huge context of its construction and function around the diversity of concerns - from song cognition to pedagogy to sociocultural themes - that form modern discourse within the box.

Additional info for Linux Networking Cookbook

Show sample text content

Pyramid runs solely in RAM. It mounts the filesystem read-only to increase the lifetime of your Flash card, and to enhance functionality. To remount the filesystem learn/ write for enhancing, run this command: pyramid:~# /sbin/rw if you end up entire, remount the filesystem read-only: pyramid:~# /sbin/ro you do not have Ubuntu's ordinary package-management instruments for querying your put in applications, like dpkg, apt-cache, apt-get, Adept, or Synaptic. How do you discover issues? With that out of date standby, the locate command. this instance searches the total root filesystem for the dossier named iptunnel: pyramid:~# locate / -name iptunnel /sbin/iptunnel in case you do not take note the precise filename, you are able to do wildcard searches: pyramid:~# locate / -name iptun* /sbin/iptunnelpyramid:~# locate / -name *ptunn* /sbin/iptunnel you can begin your seek in any listing, like so: locate / sbin-name pppd. to look the present listing, use a dot: # locate . -name foo-config dialogue in case you are horrified on the considered utilizing the locate command simply because you are used to it taking decades, do not worry—with lower than 50 MB to look, all locate searches are fast. See additionally guy 1 locate 2. eight. Hardening Pyramid challenge you will want your little routerboard to be as hardened as you can also make it. What steps are you able to take to make it as safe as attainable? resolution Your first task is to alter root's password to anything rather less noticeable than "root," the default password. Run those instructions: pyramid:~# /sbin/rw pyramid:~# passwd Then, upload an unprivileged person for distant logins over SSH: pyramid:~# useradd -m alrac pyramid:~# passwd alrac you have to to set the setuid bit at the su command in order that traditional clients can su to root: pyramid:~# chmod +s /bin/su subsequent, harden OpenSSH: disable root logins over SSH, disable password logins, and organize public-key authentication. bankruptcy 7 tells tips on how to do all this. flip off pointless providers and community interfaces. in case you are unlikely to exploit the internet interface or SSH login, flip them off. SSH is disabled by way of altering its startup command to a kill command, like this: pyramid:/etc/rc2. d# mv S20ssh K20ssh the internet GUI is disabled by way of commenting out this line in /etc/inittab: # Lighttpd (with FastCGI, SSL and Hypertext Preprocessor) HT:23:respawn:/sbin/lighttpd -f /etc/lighttpd. conf -m /lib -D > /dev/null 2>&1 Pay shut awareness for your software safety. simply because this can be a multihomed gadget, configure your purposes to exploit in simple terms the interfaces they should, and make allowance merely licensed clients. retain your person money owed tidy, and do not go away unused ones mendacity round. Use sturdy powerful passwords, written down and kept in a secure position. Run Netstat in the community and Nmap remotely to work out what providers are listening, and to work out what the skin international sees. if you are entire, make sure you run /sbin/ro to set the filesystem again to read-only. dialogue that is correct, the usual simple steps for any Linux. They paintings. See additionally bankruptcy 7, "Starting and preventing Linux," in Linux Cookbook, by means of Carla Schroder (O'Reilly) to profit tips on how to deal with prone bankruptcy eight, "Managing clients and Groups," in Linux Cookbook bankruptcy 17, "Remote Access," in Linux Cookbook 2.

Download PDF sample

Rated 4.04 of 5 – based on 50 votes