Red Hat Linux Networking and System Administration / Edition 2

Red Hat Linux Networking and System Administration / Edition 2

by Terry Collings, Kurt Wall

ISBN-10: 0764544985

ISBN-13: 9780764544989

Pub. Date: 01/23/2004

Publisher: Wiley

Reviewed and approved by the experts at Red Hat, this updated guide covers all the newest Red Hat Enterprise Linux features, with everything you need to set up and manage a Linux network. Beginning with the basics, Red Hat gurus Terry Collings and Kurt Wall show you how to install and configure Red Hat Enterprise Linux; implement file-sharing with the Network File


Reviewed and approved by the experts at Red Hat, this updated guide covers all the newest Red Hat Enterprise Linux features, with everything you need to set up and manage a Linux network. Beginning with the basics, Red Hat gurus Terry Collings and Kurt Wall show you how to install and configure Red Hat Enterprise Linux; implement file-sharing with the Network File System; establish a network file system; configure mail and FTP services, TCP/IP networking, and the Network Information System; and connect to Microsoft, Apple, and Novell networks. They guide you through upgrading and customizing the new kernel, administering users and groups, and more. All-new sections cover the latest Red Hat Enterprise Linux software, unique Red Hat optimization instructions for network services and the Apache Web server, and significant updates to the Bluccurve graphical interface, customization tools, LDAP, and the Postfix mail server. This is the indispensable Red Hat system resource.

Product Details

Publication date:
Edition description:
Product dimensions:
7.50(w) x 9.30(h) x 2.20(d)

Table of Contents

Part ISystem and Network Administration Defined
Chapter 1Duties of the System Administrator3
The Linux System Administrator3
Installing and Configuring Servers5
Installing and Configuring Application Software6
Creating and Maintaining User Accounts7
Backing Up and Restoring Files7
Monitoring and Tuning Performance9
Configuring a Secure System10
Using Tools to Monitor Security11
Chapter 2Planning the Network13
Deciding What Kind of Network You Need13
Planning and Implementing Security21
Planning for Recovery from Disasters23
Writing It Down--Good Records Can Save Your Job27
Chapter 3Standard Installation29
Exploring Your PC's Components29
Checking for Supported Hardware33
Creating the Red Hat Boot Disk34
Starting the Installation35
Starting the Hard Disk39
Configuring the Installation47
Selecting the Package Groups to Install58
Creating a Boot Disk61
Configuring the X Window System62
Chapter 4Kickstart Installation67
Configuring the Kickstart File (ks.cfg)67
Configuring Kickstart Using the Graphical Interface77
Chapter 5System Startup and Shutdown95
Understanding the Boot Process95
Using GRUB102
Running Programs at Boot Time110
Init Runlevels112
Shutting Down the System113
Chapter 6The File System Explained115
Understanding the File System Structure115
Special File Locations118
Working with Linux-Supported File Systems118
Memory and Virtual File Systems124
Directories in /proc/143
Using sysctl164
Linux Disk Management165
What Is RAID?167
Chapter 7Red Hat System Configuration Files173
Examining the System Configuration Files174
The /etc/sysconfig/ Directory184
Examining the Network Configuration Files197
Managing the init Scripts206
Part IINetwork Services
Chapter 8X Servers and Clients215
The Power of X215
Desktop Environments and Window Managers222
Additional Resources229
Chapter 9Printer Configuration231
Printer Configuration Tool231
Command-Line Configuration245
Managing Your Print Jobs246
Additional Resources248
Chapter 10TCP/IP Networking251
TCP/IP Explained251
Understanding Network Classes253
Setting Up a Network Interface Card (NIC)255
Understanding Subnetting260
Classless InterDomain Routing (CIDR)266
Gateways and Routers268
Configuring Dynamic Host Configuration Protocol (DHCP)270
Configuring the Network Using the Network Configuration Tool276
Chapter 11The Network File System285
NFS Overview285
Planning an NFS Installation288
Configuring an NFS Server291
Configuring an NFS Client309
Using Automount Services312
Examining NFS Security316
Chapter 12The Network Information System319
Understanding NIS319
Planning an NIS Installation321
Configuring an NIS Server324
Configuring an NIS Client334
Strengthening NIS Security344
Chapter 13Connecting to Microsoft and Novell Networks345
Connecting to Microsoft Networks345
Connecting to Novell Networks354
Chapter 14Connecting to Apple Networks357
Understanding AppleTalk357
Installing the AppleTalk Software358
Configuring the Appletalk Daemons361
Configuring Red Hat as an AppleTalk Client368
Chapter 15Optimizing Network Services373
Optimizing the X Window System373
Optimizing NFS375
Optimizing NIS379
Optimizing Samba Networking380
Part IIIInternet Services
Chapter 16What Are Internet Services?383
Secure Services384
Less Secure Services386
Using Your Linux Machine as a Server388
xinetd vs. Stand-Alone392
Linux Firewall Packages394
Chapter 17Lightweight Directory Access Protocol (LDAP)397
Why Use LDAP?398
OpenLDAP Daemons and Utilities399
LDAP Terminology401
OpenLDAP Configuration Files402
OpenLDAP Setup Overview405
Configuring Your System to Authenticate Using OpenLDAP405
Additional Resources408
Chapter 18BIND: The Domain Name System (DNS)409
Understanding DNS409
Installing the Software412
Understanding Types of Domain Servers413
Examining Server Configuration Files414
Configuring a Caching Server430
Configuring a Slave Server431
Configuring a Master Server432
Using DNS Tools433
Chapter 19Configuring Mail Services437
E-Mail Explained437
Introducing SMTP439
Configuring Sendmail441
Configuring Postfix446
Configuring the E-Mail Client452
Maintaining E-Mail Security460
Chapter 20Configuring FTP Services463
Installing vsftpd465
Configuring vsftpd468
Advanced FTP Server Configuration475
Chapter 21Configuring Web Services477
Introducing Apache477
How Web Servers Work481
Installing and Configuring Apache482
Using the Apache Configuration Tool502
Implementing SSI518
Implementing CGI521
Creating a Secure Server with SSL523
Chapter 22Optimizing Internet Services535
Optimizing LDAP Services535
Optimizing DNS Services536
Optimizing Mail Services540
Optimizing FTP Services542
Optimizing Web Services543
Part IVSystem Maintenance
Chapter 23Using the Red Hat Network549
Registering Your System with the Red Hat Network550
Configuring the Red Hat Update Agent553
Using the Red Hat Update Agent556
Using the Red Hat Network Alert Icon559
Using the Red Hat Network via the Internet561
Chapter 24Upgrading and Customizing the Kernel569
Should You Upgrade to a New Kernel?569
Obtaining Upgraded Kernel RPMs576
Installing Kernel Source Code from the Internet578
Building a Customized Kernel585
Configuring the Boot Loader615
Chapter 25Configuring the System at the Command Line619
System Administration at the Command Line619
Administering Users and Groups621
Managing Processes629
Maintaining the File System635
Tracking and Controlling System Usage647
Automating System Maintenance655
Chapter 26Administering Users and Groups695
Understanding the Root Account695
Implementing Sudo696
Working with Users and Groups702
Using File System Quotas726
Chapter 27Installing and Upgrading Software Packages735
Using the Red Hat Package Manager735
Checking Software Versions751
Obtaining Newer Software754
Installing Software759
Chapter 28Backing Up and Restoring the File System771
Creating a Backup Plan771
Choosing Media for Backups772
Understanding Backup Methods773
Tape Rotation775
Using Backup Tools775
Part VSystem Security and Problem Solving
Chapter 29Security Basics799
Introducing Basic Security Principles799
Developing a Security Policy805
A Disaster Recovery Case Study813
Finding Security-Related Resources815
Chapter 30Implementing Local Security819
Exploring the Nature of Physical Security820
Maintaining User and Password Security829
Chapter 31Implementing Network Security839
Limiting Network Services839
Firewall Theory849
Firewalls and iptables862
Chapter 32Detecting and Preventing Intrusions875
Using Tripwire875
Using LogWatch890
Detecting Intrusions with ipchains893
Detecting Intrusions with iptables895
Chapter 33Troubleshooting and Problem Solving897
Solving Installation Problems898
Solving File System Problems902
Solving Networking Problems905
Solving NFS Problems909
Solving Boot Problems912
Solving Miscellaneous Problems915
AppendixWhat's on the CD-ROM?919
GNU General Public License971

Customer Reviews

Average Review:

Post to your social network


Most Helpful Customer Reviews

See all customer reviews