Part IV. Network-Related Configuration

After explaining how to configure the network, this part discusses topics related to networking such as how to allow remote logins, share files and directories over the network, and set up a Web server.

Table of Contents

17. Network Configuration
17.1. Overview
17.2. Establishing an Ethernet Connection
17.3. Establishing an ISDN Connection
17.4. Establishing a Modem Connection
17.5. Establishing an xDSL Connection
17.6. Establishing a Token Ring Connection
17.7. Establishing a Wireless Connection
17.8. Managing DNS Settings
17.9. Managing Hosts
17.10. Working with Profiles
17.11. Device Aliases
17.12. Saving and Restoring the Network Configuration
18. Firewalls
18.1. Netfilter and IPTables
18.1.1. IPTables Overview
18.2. Basic Firewall Configuration
18.2.1. Security Level Configuration Tool
18.2.2. Enabling and Disabling the Firewall
18.2.3. Trusted Services
18.2.4. Other Ports
18.2.5. Saving the Settings
18.2.6. Activating the IPTables Service
18.3. Using IPTables
18.3.1. IPTables Command Syntax
18.3.2. Basic Firewall Policies
18.3.3. Saving and Restoring IPTables Rules
18.4. Common IPTables Filtering
18.5. FORWARD and NAT Rules
18.5.1. Postrouting and IP Masquerading
18.5.2. Prerouting
18.5.3. DMZs and IPTables
18.6. Malicious Software and Spoofed IP Addresses
18.7. IPTables and Connection Tracking
18.8. IPv6
18.9. Additional Resources
18.9.1. Installed Documentation
18.9.2. Useful Websites
18.9.3. Related Documentation
19. Controlling Access to Services
19.1. Runlevels
19.2. TCP Wrappers
19.2.1. xinetd
19.3. Services Configuration Tool
19.4. ntsysv
19.5. chkconfig
19.6. Additional Resources
19.6.1. Installed Documentation
19.6.2. Useful Websites
19.6.3. Related Books
20. OpenSSH
20.1. Why Use OpenSSH?
20.2. Configuring an OpenSSH Server
20.3. Configuring an OpenSSH Client
20.3.1. Using the ssh Command
20.3.2. Using the scp Command
20.3.3. Using the sftp Command
20.3.4. Generating Key Pairs
20.4. Additional Resources
20.4.1. Installed Documentation
20.4.2. Useful Websites
20.4.3. Related Books
21. Network File System (NFS)
21.1. Why Use NFS?
21.2. Mounting NFS File Systems
21.2.1. Mounting NFS File Systems using /etc/fstab
21.2.2. Mounting NFS File Systems using autofs
21.2.3. Using TCP
21.2.4. Preserving ACLs
21.3. Exporting NFS File Systems
21.3.1. Command Line Configuration
21.3.2. Hostname Formats
21.3.3. Starting and Stopping the Server
21.4. Additional Resources
21.4.1. Installed Documentation
21.4.2. Useful Websites
21.4.3. Related Books
22. Samba
22.1. Why Use Samba?
22.2. Configuring a Samba Server
22.2.1. Graphical Configuration
22.2.2. Command Line Configuration
22.2.3. Encrypted Passwords
22.2.4. Starting and Stopping the Server
22.3. Connecting to a Samba Share
22.3.1. Command Line
22.3.2. Mounting the Share
22.4. Additional Resources
22.4.1. Installed Documentation
22.4.2. Useful Websites
23. Dynamic Host Configuration Protocol (DHCP)
23.1. Why Use DHCP?
23.2. Configuring a DHCP Server
23.2.1. Configuration File
23.2.2. Lease Database
23.2.3. Starting and Stopping the Server
23.2.4. DHCP Relay Agent
23.3. Configuring a DHCP Client
23.4. Additional Resources
23.4.1. Installed Documentation
24. Apache HTTP Server Configuration
24.1. Basic Settings
24.2. Default Settings
24.2.1. Site Configuration
24.2.2. Logging
24.2.3. Environment Variables
24.2.4. Directories
24.3. Virtual Hosts Settings
24.3.1. Adding and Editing a Virtual Host
24.4. Server Settings
24.5. Performance Tuning
24.6. Saving Your Settings
24.7. Additional Resources
24.7.1. Installed Documentation
24.7.2. Useful Websites
24.7.3. Related Books
25. Apache HTTP Secure Server Configuration
25.1. Introduction
25.2. An Overview of Security-Related Packages
25.3. An Overview of Certificates and Security
25.4. Using Pre-Existing Keys and Certificates
25.5. Types of Certificates
25.6. Generating a Key
25.7. Generating a Certificate Request to Send to a CA
25.8. Creating a Self-Signed Certificate
25.9. Testing The Certificate
25.10. Accessing The Server
25.11. Additional Resources
25.11.1. Useful Websites
25.11.2. Related Books
26. Authentication Configuration
26.1. User Information
26.2. Authentication
26.3. Command Line Version