Books & Videos

Table of Contents

  1. Chapter 1 Introduction to Networking

    1. History

    2. TCP/IP Networks

    3. UUCP Networks

    4. Linux Networking

    5. Maintaining Your System

  2. Chapter 2 Issues of TCP/IP Networking

    1. Networking Interfaces

    2. IP Addresses

    3. Address Resolution

    4. IP Routing

    5. The Internet Control Message Protocol

    6. Resolving Host Names

  3. Chapter 3 Configuring the Networking Hardware

    1. Kernel Configuration

    2. A Tour of Linux Network Devices

    3. Ethernet Installation

    4. The PLIP Driver

    5. The PPP and SLIP Drivers

    6. Other Network Types

  4. Chapter 4 Configuring the Serial Hardware

    1. Communications Software for Modem Links

    2. Introduction to Serial Devices

    3. Accessing Serial Devices

    4. Serial Hardware

    5. Using the Configuration Utilities

    6. Serial Devices and the login: Prompt

  5. Chapter 5 Configuring TCP/IP Networking

    1. Mounting the /proc Filesystem

    2. Installing the Binaries

    3. Setting the Hostname

    4. Assigning IP Addresses

    5. Creating Subnets

    6. Writing hosts and networks Files

    7. Interface Configuration for IP

    8. All About ifconfig

    9. The netstat Command

    10. Checking the ARP Tables

  6. Chapter 6 Name Service and Resolver Configuration

    1. The Resolver Library

    2. How DNS Works

    3. Running named

  7. Chapter 7 Serial Line IP

    1. General Requirements

    2. SLIP Operation

    3. Dealing with Private IP Networks

    4. Using dip

    5. Running in Server Mode

  8. Chapter 8 The Point-to-Point Protocol

    1. PPP on Linux

    2. Running pppd

    3. Using Options Files

    4. Using chat to Automate Dialing

    5. IP Configuration Options

    6. Link Control Options

    7. General Security Considerations

    8. Authentication with PPP

    9. Debugging Your PPP Setup

    10. More Advanced PPP Configurations

  9. Chapter 9 TCP/IP Firewall

    1. Methods of Attack

    2. What Is a Firewall?

    3. What Is IP Filtering?

    4. Setting Up Linux for Firewalling

    5. Three Ways We Can Do Filtering

    6. Original IP Firewall (2.0 Kernels)

    7. IP Firewall Chains (2.2 Kernels)

    8. Netfilter and IP Tables (2.4 Kernels)

    9. TOS Bit Manipulation

    10. Testing a Firewall Configuration

    11. A Sample Firewall Configuration

  10. Chapter 10 IP Accounting

    1. Configuring the Kernel for IP Accounting

    2. Configuring IP Accounting

    3. Using IP Accounting Results

    4. Resetting the Counters

    5. Flushing the Ruleset

    6. Passive Collection of Accounting Data

  11. Chapter 11 IP Masquerade and Network Address Translation

    1. Side Effects and Fringe Benefits

    2. Configuring the Kernel for IP Masquerade

    3. Configuring IP Masquerade

    4. Handling Name Server Lookups

    5. More About Network Address Translation

  12. Chapter 12 Important Network Features

    1. The inetd Super Server

    2. The tcpd Access Control Facility

    3. The Services and Protocols Files

    4. Remote Procedure Call

    5. Configuring Remote Login and Execution

  13. Chapter 13 The Network Information System

    1. Getting Acquainted with NIS

    2. NIS Versus NIS+

    3. The Client Side of NIS

    4. Running an NIS Server

    5. NIS Server Security

    6. Setting Up an NIS Client with GNU libc

    7. Choosing the Right Maps

    8. Using the passwd and group Maps

    9. Using NIS with Shadow Support

  14. Chapter 14 The Network File System

    1. Preparing NFS

    2. Mounting an NFS Volume

    3. The NFS Daemons

    4. The exports File

    5. Kernel-Based NFSv2 Server Support

    6. Kernel-Based NFSv3 Server Support

  15. Chapter 15 IPX and the NCP Filesystem

    1. Xerox, Novell, and History

    2. IPX and Linux

    3. Configuring the Kernel for IPX and NCPFS

    4. Configuring IPX Interfaces

    5. Configuring an IPX Router

    6. Mounting a Remote NetWare Volume

    7. Exploring Some of the Other IPX Tools

    8. Printing to a NetWare Print Queue

    9. NetWare Server Emulation

  16. Chapter 16 Managing Taylor UUCP

    1. UUCP Transfers and Remote Execution

    2. UUCP Configuration Files

    3. Controlling Access to UUCP Features

    4. Setting Up Your System for Dialing In

    5. UUCP Low-Level Protocols

    6. Troubleshooting

    7. Log Files and Debugging

  17. Chapter 17 Electronic Mail

    1. What Is a Mail Message?

    2. How Is Mail Delivered?

    3. Email Addresses

    4. How Does Mail Routing Work?

    5. Configuring elm

  18. Chapter 18 Sendmail

    1. Introduction to sendmail

    2. Installing sendmail

    3. Overview of Configuration Files

    4. The sendmail.cf and sendmail.mc Files

    5. Generating the sendmail.cf File

    6. Interpreting and Writing Rewrite Rules

    7. Configuring sendmail Options

    8. Some Useful sendmail Configurations

    9. Testing Your Configuration

    10. Running sendmail

    11. Tips and Tricks

  19. Chapter 19 Getting Exim Up and Running

    1. Running Exim

    2. If Your Mail Doesn’t Get Through

    3. Compiling Exim

    4. Mail Delivery Modes

    5. Miscellaneous config Options

    6. Message Routing and Delivery

    7. Protecting Against Mail Spam

    8. UUCP Setup

  20. Chapter 20 Netnews

    1. Usenet History

    2. What Is Usenet, Anyway?

    3. How Does Usenet Handle News?

  21. Chapter 21 C News

    1. Delivering News

    2. Installation

    3. The sys File

    4. The active File

    5. Article Batching

    6. Expiring News

    7. Miscellaneous Files

    8. Control Messages

    9. C News in an NFS Environment

    10. Maintenance Tools and Tasks

  22. Chapter 22 NNTP and the nntpd Daemon

    1. The NNTP Protocol

    2. Installing the NNTP Server

    3. Restricting NNTP Access

    4. NNTP Authorization

    5. nntpd Interaction with C News

  23. Chapter 23 Internet News

    1. Some INN Internals

    2. Newsreaders and INN

    3. Installing INN

    4. Configuring INN: the Basic Setup

    5. INN Configuration Files

    6. Running INN

    7. Managing INN: The ctlinnd Command

  24. Chapter 24 Newsreader Configuration

    1. tin Configuration

    2. trn Configuration

    3. nn Configuration

  1. Appendix Example Network: The Virtual Brewery

    1. Connecting the Virtual Subsidiary Network

  2. Appendix Useful Cable Configurations

    1. A PLIP Parallel Cable

    2. A Serial NULL Modem Cable

  3. Appendix Linux Network Administrator’s Guide, Second Edition Copyright Information

    1. 0. Preamble

    2. 1. Applicability and Definitions

    3. 2. Verbatim Copying

    4. 3. Copying in Quantity

    5. 4. Modifications

    6. 5. Combining Documents

    7. 6. Collections of Documents

    8. 7. Aggregation with Independent Works

    9. 8. Translation

    10. 9. Termination

    11. 10. Future Revisions of this License

  4. Appendix SAGE: The System Administrators Guild

  5. Colophon