Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Linux Networking Cookbook
SPECIAL OFFER: Upgrade this ebook with O’Reilly
A Note Regarding Supplemental Files
Preface
Audience
Contents of This Book
What Is Included
Which Linux Distributions Are Used in the Book
Downloads and Feedback
Conventions
Using Code Examples
Comments and Questions
Safari® Books Online
Acknowledgments
1. Introduction to Linux Networking
1.0. Introduction
Connecting to the Internet
Overview of Internet Service Options
Cable, DSL, and Dial-Up
Cable
DSL
Dial-up
Cable, DSL, and dial-up gotchas
Regulated Broadband Services
Private Networks
Latency, Bandwidth, and Throughput
Hardware Options for Your Linux Firewall/Gateway
High-End Enterprise Routers
Not-So-High-End Commercial Routers
Switches
Management port
Serial port
MDI/MDI-X (Medium Dependent Interfaces)
Lots of blinky lights
Jumbo frames
Port trunking
VLANs
QoS
Per-port access controls
Network Interface Cards (NICs)
Gigabit Ethernet Gotchas
Cabling
Wireless Networking
2. Building a Linux Gateway on a Single-Board Computer
2.0. Introduction
Required Hardware
Software
What to Do with Old PCs?
2.1. Getting Acquainted with the Soekris 4521
Problem
Solution
Discussion
See Also
2.2. Configuring Multiple Minicom Profiles
Problem
Solution
Discussion
See Also
2.3. Installing Pyramid Linux on a Compact Flash Card
Problem
Solution
Discussion
See Also
2.4. Network Installation of Pyramid on Debian
Problem
Solution
Discussion
See Also
2.5. Network Installation of Pyramid on Fedora
Problem
Solution
Discussion
See Also
2.6. Booting Pyramid Linux
Problem
Solution
Discussion
See Also
2.7. Finding and Editing Pyramid Files
Problem
Solution
Discussion
See Also
2.8. Hardening Pyramid
Problem
Solution
Discussion
See Also
2.9. Getting and Installing the Latest Pyramid Build
Problem
Solution
Discussion
See Also
2.10. Adding Additional Software to Pyramid Linux
Problem
Solution
Discussion
See Also
2.11. Adding New Hardware Drivers
Problem
Solution
Discussion
See Also
2.12. Customizing the Pyramid Kernel
Problem
Solution
Discussion
See Also
2.13. Updating the Soekris comBIOS
Problem
Solution
Discussion
See Also
3. Building a Linux Firewall
3.0. Introduction
Separating Private and Public
Windows Security
Iptables and NAT, SNAT, and DNAT
When Is a Firewall Needed?
iptables Overview
iptables Policies and Rules
Tables Overview
Specialized Linux Firewall and Routing Distributions
Important Disclaimer
3.1. Assembling a Linux Firewall Box Problem
Solution
Discussion
Cabling
Network interfaces
See Also
3.2. Configuring Network Interface Cards on Debian
Problem
Solution
Discussion
Configuration definitions
See Also
3.3. Configuring Network Interface Cards on Fedora
Problem
Solution
Discussion
See Also
3.4. Identifying Which NIC Is Which
Problem
Solution
Discussion
See Also
3.5. Building an Internet-Connection Sharing Firewall on a Dynamic WAN IP Address
Problem
Solution
Discussion
See Also
3.6. Building an Internet-Connection Sharing Firewall on a Static WAN IP Address
Problem
Solution
Discussion
See Also
3.7. Displaying the Status of Your Firewall
Problem
Solution
Discussion
See Also
3.8. Turning an iptables Firewall Off
Problem
Solution
Discussion
See Also
3.9. Starting iptables at Boot, and Manually Bringing Your Firewall Up and Down
Problem
Solution
Discussion
See Also
3.10. Testing Your Firewall
Problem
Solution
Discussion
Application-level security
See Also
3.11. Configuring the Firewall for Remote SSH Administration
Problem
Solution
Discussion
See Also
3.12. Allowing Remote SSH Through a NAT Firewall
Problem
Solution
Discussion
See Also
3.13. Getting Multiple SSH Host Keys Past NAT
Problem
Solution
Discussion
See Also
3.14. Running Public Services on Private IP Addresses
Problem
Solution
Discussion
See Also
3.15. Setting Up a Single-Host Firewall
Problem
Solution
Discussion
See Also
3.16. Setting Up a Server Firewall
Problem
Solution
Discussion
See Also
3.17. Configuring iptables Logging
Problem
Solution
See Also
3.18. Writing Egress Rules
Problem
Solution
Discussion
See Also
4. Building a Linux Wireless Access Point
4.0. Introduction
Security
See Also
4.1. Building a Linux Wireless Access Point
Problem
Solution
Discussion
See Also
4.2. Bridging Wireless to Wired
Problem
Solution
Discussion
See Also
4.3. Setting Up Name Services
Problem
Solution
Discussion
See Also
4.4. Setting Static IP Addresses from the DHCP Server
Problem
Solution
Discussion
See Also
4.5. Configuring Linux and Windows Static DHCP Clients
Problem
Solution
Discussion
See Also
4.6. Adding Mail Servers to dnsmasq
Problem
Solution
Discussion
See Also
4.7. Making WPA2-Personal Almost As Good As WPA-Enterprise
Problem
Solution
Discussion
See Also
4.8. Enterprise Authentication with a RADIUS Server
Problem
Solution
Discussion
See Also
4.9. Configuring Your Wireless Access Point to Use FreeRADIUS
Problem
Solution
Discussion
See Also
4.10. Authenticating Clients to FreeRADIUS
Problem
Solution
Discussion
See Also
4.11. Connecting to the Internet and Firewalling
Problem
Solution
Discussion
See Also
4.12. Using Routing Instead of Bridging
Problem
Solution
Discussion
See Also
4.13. Probing Your Wireless Interface Card
Problem
Solution
Discussion
See Also
4.14. Changing the Pyramid Router's Hostname
Problem
Solution
Discussion
See Also
4.15. Turning Off Antenna Diversity
Problem
Solution
Discussion
See Also
4.16. Managing dnsmasq's DNS Cache
Problem
Solution
Discussion
See Also
4.17. Managing Windows' DNS Caches
Problem
Solution
Discussion
See Also
4.18. Updating the Time at Boot
Problem
Solution
Discussion
See Also
5. Building a VoIP Server with Asterisk
5.0. Introduction
Test-lab Hardware and Software
Production Hardware and Software
Call Quality
Digium, Asterisk, and the Zapata Telephony Project
Asterisk Implementations
Using Asterisk
See Also
5.1. Installing Asterisk from Source Code
Problem
Solution
Discussion
See Also
5.2. Installing Asterisk on Debian
Problem
Solution
Discussion
See Also
5.3. Starting and Stopping Asterisk
Problem
Solution
Discussion
See Also
5.4. Testing the Asterisk Server
Problem
Solution
Discussion
See Also
5.5. Adding Phone Extensions to Asterisk and Making Calls
Problem
Solution
Discussion
sip.conf
Dialplans
See Also
5.6. Setting Up Softphones
Problem
Solution
Discussion
See Also
5.7. Getting Real VoIP with Free World Dialup
Problem
Solution
Discussion
See Also
5.8. Connecting Your Asterisk PBX to Analog Phone Lines
Problem
Solution
Discussion
See Also
5.9. Creating a Digital Receptionist
Problem
Solution
Discussion
See Also
5.10. Recording Custom Prompts
Problem
Solution
Discussion
See Also
5.11. Maintaining a Message of the Day
Problem
Solution
Discussion
See Also
5.12. Transferring Calls
Problem
Solution
Discussion
See Also
5.13. Routing Calls to Groups of Phones
Problem
Solution
Discussion
See Also
5.14. Parking Calls
Problem
Solution
Discussion
See Also
5.15. Customizing Hold Music
Problem
Solution
Discussion
See Also
5.16. Playing MP3 Sound Files on Asterisk
Problem
Solution
See Also
5.17. Delivering Voicemail Broadcasts
Problem
Solution
Discussion
See Also
5.18. Conferencing with Asterisk
Problem
Solution
Discussion
See Also
5.19. Monitoring Conferences
Problem
Solution
Discussion
See Also
5.20. Getting SIP Traffic Through iptables NAT Firewalls
Problem
Solution
Discussion
See Also
5.21. Getting IAX Traffic Through iptables NAT Firewalls
Problem
Solution
Discussion
See Also
5.22. Using AsteriskNOW, "Asterisk in 30 Minutes"
Problem
Solution
Discussion
See Also
5.23. Installing and Removing Packages on AsteriskNOW
Problem
Solution
Discussion
See Also
5.24. Connecting Road Warriors and Remote Users
Problem
Solution
Discussion
See Also
6. Routing with Linux
6.0. Introduction
Exterior Protocols
Linux Routing and Networking Commands
6.1. Calculating Subnets with ipcalc
Problem
Solution
Discussion
See Also
6.2. Setting a Default Gateway
Problem
Solution
Discussion
See Also
6.3. Setting Up a Simple Local Router
Problem
Solution
Discussion
See Also
6.4. Configuring Simplest Internet Connection Sharing
Problem
Solution
Discussion
See Also
6.5. Configuring Static Routing Across Subnets
Problem
Solution
Discussion
See Also
6.6. Making Static Routes Persistent
Problem
Solution
Discussion
See Also
6.7. Using RIP Dynamic Routing on Debian
Problem
Solution
Discussion
See Also
6.8. Using RIP Dynamic Routing on Fedora
Problem
Solution
Discussion
See Also
6.9. Using Quagga's Command Line
Problem
Solution
Discussion
See Also
6.10. Logging In to Quagga Daemons Remotely
Problem
Solution
Discussion
See Also
6.11. Running Quagga Daemons from the Command Line
Problem
Solution
Discussion
See Also
6.12. Monitoring RIPD
Problem
Solution
Discussion
See Also
6.13. Blackholing Routes with Zebra
Problem
Solution
Discussion
See Also
6.14. Using OSPF for Simple Dynamic Routing
Problem
Solution
Discussion
See Also
6.15. Adding a Bit of Security to RIP and OSPF
Problem
Solution
Discussion
See Also
6.16. Monitoring OSPFD
Problem
Solution
Discussion
See Also
7. Secure Remote Administration with SSH
7.0. Introduction
OpenSSH
SSH Tunneling
OpenSSH Components
Using OpenSSH
Key types
7.1. Starting and Stopping OpenSSH
Problem
Solution
Discussion
See Also
7.2. Creating Strong Passphrases
Problem
Solution
Discussion
7.3. Setting Up Host Keys for Simplest Authentication
Problem
Solution
Discussion
See Also
7.4. Generating and Copying SSH Keys
Problem
Solution
Discussion
See Also
7.5. Using Public-Key Authentication to Protect System Passwords
Problem
Solution
Discussion
See Also
7.6. Managing Multiple Identity Keys
Problem
Solution
Discussion
See Also
7.7. Hardening OpenSSH
Problem
Solution
Discussion
See Also
7.8. Changing a Passphrase
Problem
Solution
Discussion
See Also
7.9. Retrieving a Key Fingerprint
Problem
Solution
Discussion
See Also
7.10. Checking Configuration Syntax
Problem
Solution
Discussion
See Also
7.11. Using OpenSSH Client Configuration Files for Easier Logins
Problem
Solution
Discussion
See Also
7.12. Tunneling X Windows Securely over SSH
Problem
Solution
Discussion
See Also
7.13. Executing Commands Without Opening a Remote Shell
Problem
Solution
Discussion
See Also
7.14. Using Comments to Label Keys
Problem
Solution
Discussion
See Also
7.15. Using DenyHosts to Foil SSH Attacks
Problem
Solution
Discussion
See Also
7.16. Creating a DenyHosts Startup File
Problem
Solution
Discussion
See Also
7.17. Mounting Entire Remote Filesystems with sshfs
Problem
Solution
Discussion
See Also
8. Using Cross-Platform Remote Graphical Desktops
8.0. Introduction
rdesktop
FreeNX
VNC
Built-in Remote Desktop Sharing in KDE and Gnome
8.1. Connecting Linux to Windows via rdesktop
Problem
Solution
Discussion
See Also
8.2. Generating and Managing FreeNX SSH Keys
Problem
Solution
Discussion
See Also
8.3. Using FreeNX to Run Linux from Windows
Problem
Solution
Set up the server
Get the client
Set up the connection
Discussion
See Also
8.4. Using FreeNX to Run Linux from Solaris, Mac OS X, or Linux
Problem
Solution
Discussion
See Also
8.5. Managing FreeNX Users
Problem
Solution
Discussion
See Also
8.6. Watching Nxclient Users from the FreeNX Server
Problem
Solution
Discussion
See Also
8.7. Starting and Stopping the FreeNX Serve
Problem
Solution
Discussion
See Also
8.8. Configuring a Custom Desktop
Problem
Solution
Discussion
See Also
8.9. Creating Additional Nxclient Sessions
Problem
Solution
Discussion
See Also
Problem
Solution
Discussion
See Also
8.10. Enabling File and Printer Sharing, and Multimedia in Nxclient
Problem
Solution
Discussion
See Also
8.11. Preventing Password-Saving in Nxclient
Problem
Solution
Discussion
See Also
8.12. Troubleshooting FreeNX
Problem
Solution
See Also
8.13. Using VNC to Control Windows from Linux
Problem
Solution
Discussion
See Also
8.14. Using VNC to Control Windows and Linux at the Same Time
Problem
Solution
Discussion
See Also
8.15. Using VNC for Remote Linux -to-Linux Administration
Problem
Solution
Discussion
See Also
8.16. Displaying the Same Windows Desktop to Multiple Remote Users
Problem
Solution
Discussion
See Also
8.17. Changing the Linux VNC Server Password
Problem
Solution
Discussion
See Also
8.18. Customizing the Remote VNC Desktop
Problem
Solution
Discussion
See Also
8.19. Setting the Remote VNC Desktop Size
Problem
Solution
Discussion
See Also
8.20. Connecting VNC to an Existing X Session
Problem
Solution
Discussion
See Also
8.21. Securely Tunneling x11vnc over SSH
Problem
Solution
Discussion
See Also
8.22. Tunneling TightVNC Between Linux and Windows
Problem
Solution
Discussion
See Also
9. Building Secure Cross-Platform Virtual Private Networks with OpenVPN
9.0. Introduction
What About IPSec?
OpenVPN
9.1. Setting Up a Safe OpenVPN Test Lab
Problem
Solution
Discussion
See Also
9.2. Starting and Testing OpenVPN
Problem
Solution
Discussion
See Also
9.3. Testing Encryption with Static Keys
Problem
Solution
Discussion
See Also
9.4. Connecting a Remote Linux Client Using Static Keys
Problem
Solution
Discussion
See Also
9.5. Creating Your Own PKI for OpenVPN
Problem
Solution
Discussion
See Also
9.6. Configuring the OpenVPN Server for Multiple Clients
Problem
Solution
Discussion
See Also
9.7. Configuring OpenVPN to Start at Boot
Problem
Solution
Discussion
See Also
9.8. Revoking Certificates
Problem
Solution
Discussion
See Also
9.9. Setting Up the OpenVPN Server in Bridge Mode
Problem
Solution
Discussion
See Also
9.10. Running OpenVPN As a Nonprivileged User
Problem
Solution
Discussion
See Also
9.11. Connecting Windows Clients
Problem
Solution
Discussion
See Also
10. Building a Linux PPTP VPN Server
10.0. Introduction
Windows Client Necessary Updates
PPTP Security
IPSec VPN
Linux Requirements
Is PPTP Really Easier?
See Also
10.1. Installing Poptop on Debian Linux
Problem
Solution
Discussion
See Also
10.2. Patching the Debian Kernel for MPPE Support
Problem
Solution
Discussion
See Also
10.3. Installing Poptop on Fedora Linux
Problem
Solution
Discussion
See Also
10.4. Patching the Fedora Kernel for MPPE Support
Problem
Solution
Discussion
See Also
10.5. Setting Up a Standalone PPTP VPN Server
Problem
Solution
Discussion
See Also
10.6. Adding Your Poptop Server to Active Directory
Problem
Solution
Discussion
See Also
10.7. Connecting Linux Clients to a PPTP Server
Problem
Solution
Discussion
See Also
10.8. Getting PPTP Through an iptables Firewall
Problem
Solution
Discussion
See Also
10.9. Monitoring Your PPTP Server
Problem
Solution
Discussion
See Also
10.10. Troubleshooting PPTP
Problem
Solution
Discussion
See Also
11. Single Sign-on with Samba for Mixed Linux/Windows LANs
11.0. Introduction
Replacing an NT4 Domain Controller
Hardware Requirements
11.1. Verifying That All the Pieces Are in Place
Problem
Solution
Discussion
See Also
11.2. Compiling Samba from Source Code
Problem
Solution
Discussion
See Also
11.3. Starting and Stopping Samba
Problem
Solution
Discussion
See Also
11.4. Using Samba As a Primary Domain Controller
Problem
Solution
Discussion
See Also
11.5. Migrating to a Samba Primary Domain Controller from an NT4 PDC
Problem
Solution
Discussion
See Also
11.6. Joining Linux to an Active Directory Domain
Problem
Solution
Discussion
See Also
11.7. Connecting Windows 95/98/ME to a Samba Domain
Problem
Solution
Discussion
See Also
11.8. Connecting Windows NT4 to a Samba Domain
Problem
Solution
Discussion
See Also
11.9. Connecting Windows NT/2000 to a Samba Domain
Problem
Solution
Discussion
See Also
11.10. Connecting Windows XP to a Samba Domain
Problem
Solution
Discussion
See Also
11.11. Connecting Linux Clients to a Samba Domain with Command-Line Programs
Problem
Solution
Discussion
See Also
11.12. Connecting Linux Clients to a Samba Domain with Graphical Programs
Problem
Solution
Discussion
Konqueror
Nautilus
Smb4k
LinNeighborhood
See Also
12. Centralized Network Directory with OpenLDAP
12.0. Introduction
LDAP Directory Structure
Schemas, objectClasses, and Attributes
The "Secret" RootDSE
Deciding How Deep Your Directory Is
12.1. Installing OpenLDAP on Debian
Problem
Solution
Discussion
See Also
12.2. Installing OpenLDAP on Fedora
Problem
Solution
Discussion
See Also
12.3. Configuring and Testing the OpenLDAP Server
Problem
Solution
Discussion
See Also
12.4. Creating a New Database on Fedora
Problem
Solution
Discussion
ObjectClasses and attributes
See Also
12.5. Adding More Users to Your Directory
Problem
Solution
Discussion
See Also
12.6. Correcting Directory Entries
Problem
Solution
Discussion
See Also
12.7. Connecting to a Remote OpenLDAP Server
Problem
Solution
Discussion
See Also
12.8. Finding Things in Your OpenLDAP Directory
Problem
Solution
Discussion
See Also
12.9. Indexing Your Database
Problem
Solution
Discussion
See Also
12.10. Managing Your Directory with Graphical Interfaces
Problem
Solution
Discussion
See Also
12.11. Configuring the Berkeley DB
Problem
Solution
Discussion
See Also
12.12. Configuring OpenLDAP Logging
Problem
Solution
Discussion
See Also
12.13. Backing Up and Restoring Your Directory
Problem
Solution
Discussion
See Also
12.14. Refining Access Controls
Problem
Solution
Discussion
See Also
12.15. Changing Passwords
Problem
Solution
Discussion
See Also
13. Network Monitoring with Nagios
13.0. Introduction
See Also
13.1. Installing Nagios from Sources
Problem
Solution
Discussion
See Also
13.2. Configuring Apache for Nagios
Problem
Solution
Discussion
See Also
13.3. Organizing Nagios' Configuration Files Sanely
Problem
Solution
Discussion
See Also
13.4. Configuring Nagios to Monitor Localhost
Problem
Solution
Discussion
See Also
13.5. Configuring CGI Permissions for Full Nagios Web Access
Problem
Solution
Discussion
See Also
13.6. Starting Nagios at Boot
Problem
Solution
Discussion
See Also
13.7. Adding More Nagios Users
Problem
Solution
Discussion
See Also
13.8. Speed Up Nagios with check_icmp
Problem
Solution
Discussion
See Also
13.9. Monitoring SSHD
Problem
Solution
Discussion
Command definitions
Host definitions
Service definitions
See Also
13.10. Monitoring a Web Server
Problem
Solution
Discussion
See Also
13.11. Monitoring a Mail Server
Problem
Solution
Discussion
See Also
13.12. Using Servicegroups to Group Related Services
Problem
Solution
Discussion
See Also
13.13. Monitoring Name Services
Problem
Solution
Discussion
See Also
13.14. Setting Up Secure Remote Nagios Administration with OpenSSH
Problem
Solution
Discussion
See Also
13.15. Setting Up Secure Remote Nagios Administration with OpenSSL
Problem
Solution
Discussion
See Also
14. Network Monitoring with MRTG
14.0. Introduction
14.1. Installing MRTG
Problem
Solution
Discussion
See Also
14.2. Configuring SNMP on Debian
Problem
Solution
Discussion
See Also
14.3. Configuring SNMP on Fedora
Problem
Solution
Discussion
See Also
14.4. Configuring Your HTTP Service for MRTG
Problem
Solution
Discussion
See Also
14.5. Configuring and Starting MRTG on Debian
Problem
Solution
Discussion
See Also
14.6. Configuring and Starting MRTG on Fedora
Problem
Solution
Discussion
See Also
14.7. Monitoring Active CPU Load
Problem
Solution
Discussion
See Also
14.8. Monitoring CPU User and Idle Times
Problem
Solution
Discussion
See Also
14.9. Monitoring Physical Memory
Problem
Solution
Discussion
See Also
14.10. Monitoring Swap Space and Memory
Problem
Solution
Discussion
See Also
14.11. Monitoring Disk Usage
Problem
Solution
Discussion
See Also
14.12. Monitoring TCP Connections
Problem
Solution
Discussion
See Also
14.13. Finding and Testing MIBs and OIDs
Problem
Solution
Discussion
See Also
14.14. Testing Remote SNMP Queries
Problem
Solution
Discussion
See Also
14.15. Monitoring Remote Hosts
Problem
Solution
Discussion
See Also
14.16. Creating Multiple MRTG Index Pages
Problem
Solution
Discussion
See Also
14.17. Running MRTG As a Daemon
Problem
Solution
Discussion
See Also
15. Getting Acquainted with IPv6
15.0. Introduction
Barriers to Adoption
Anatomy of IPv6 Addresses
IPv6 address types and ranges
Counting in Hexadecimal
Mac and Windows IPv6 Support
15.1. Testing Your Linux System for IPv6 Support
Problem
Solution
Discussion
See Also
15.2. Pinging Link Local IPv6 Hosts
Problem
Solution
Discussion
See Also
15.3. Setting Unique Local Unicast Addresses on Interfaces
Problem
Solution
Discussion
See Also
15.4. Using SSH with IPv6
Problem
Solution
Discussion
See Also
15.5. Copying Files over IPv6 with scp
Problem
Solution
Discussion
See Also
15.6. Autoconfiguration with IPv6
Problem
Solution
Discussion
See Also
15.7. Calculating IPv6 Addresses
Problem
Solution
Discussion
See Also
15.8. Using IPv6 over the Internet
Problem
Solution
Discussion
See Also
16. Setting Up Hands-Free Network Installations of New Systems
16.0. Introduction
PXE Boot
USB Boot
Installation
16.1. Creating Network Installation Boot Media for Fedora Linux
Problem
Solution
Discussion
See Also
16.2. Network Installation of Fedora Using Network Boot Media
Problem
Solution
Discussion
See Also
16.3. Setting Up an HTTP-Based Fedora Installation Server
Problem
Solution
Discussion
See Also
16.4. Setting Up an FTP-Based Fedora Installation Server
Problem
Solution
Discussion
See Also
16.5. Creating a Customized Fedora Linux Installation
Problem
Solution
Discussion
See Also
16.6. Using a Kickstart File for a Hands-off Fedora Linux Installation
Problem
Solution
Discussion
See Also
16.7. Fedora Network Installation via PXE Netboot
Problem
Solution
Discussion
See Also
16.8. Network Installation of a Debian System
Solution
Discussion
See Also
16.9. Building a Complete Debian Mirror with apt-mirror
Problem
Solution
Discussion
See Also
16.10. Building a Partial Debian Mirror with apt-proxy
Problem
Solution
Discussion
See Also
16.11. Configuring Client PCs to Use Your Local Debian Mirror
Problem
Solution
Discussion
See Also
16.12. Setting Up a Debian PXE Netboot Server
Problem
Solution
Discussion
See Also
16.13. Installing New Systems from Your Local Debian Mirror
Problem
Solution
Discussion
See Also
16.14. Automating Debian Installations with Preseed Files
Problem
Solution
Discussion
See Also
17. Linux Server Administration via Serial Console
17.0. Introduction
17.1. Preparing a Server for Serial Console Administration
Problem
Solution
Discussion
Modems
See Also
17.2. Configuring a Headless Server with LILO
Problem
Solution
Discussion
See Also
17.3. Configuring a Headless Server with GRUB
Problem
Solution
Discussion
See Also
17.4. Booting to Text Mode on Debian
Problem
Solution
Discussion
See Also
17.5. Setting Up the Serial Console
Problem
Solution
Discussion
File permissions
See Also
17.6. Configuring Your Server for Dial-in Administration
Problem
Solution
Discussion
See Also
17.7. Dialing In to the Server
Problem
Solution
Discussion
See Also
17.8. Adding Security
Problem
Solution
Discussion
See Also
17.9. Configuring Logging
Problem
Solution
Discussion
See Also
17.10. Uploading Files to the Server
Problem
Solution
Discussion
See Also
18. Running a Linux Dial-Up Server
18.0. Introduction
18.1. Configuring a Single Dial-Up Account with WvDial
Problem
Solution
Discussion
See Also
18.2. Configuring Multiple Accounts in WvDial
Problem
Solution
Discussion
See Also
18.3. Configuring Dial-Up Permissions for Nonroot Users
Problem
Solution
Discussion
See Also
18.4. Creating WvDial Accounts for Nonroot Users
Problem
Solution
Discussion
See Also
18.5. Sharing a Dial-Up Internet Account
Problem
Solution
Discussion
See Also
18.6. Setting Up Dial-on-Demand
Problem
Solution
Discussion
See Also
18.7. Scheduling Dial-Up Availability with cron
Problem
Solution
Discussion
See Also
18.8. Dialing over Voicemail Stutter Tones
Problem
Solution
Discussion
See Also
18.9. Overriding Call Waiting
Problem
Solution
Discussion
See Also
18.10. Leaving the Password Out of the Configuration File
Problem
Solution
Discussion
See Also
18.11. Creating a Separate pppd Logfile
Problem
Solution
Discussion
19. Troubleshooting Networks
19.0. Introduction
Testing and Tracing Cabling
Spares for Testing
19.1. Building a Network Diagnostic and Repair Laptop
Problem
Solution
Discussion
See Also
19.2. Testing Connectivity with ping Problem
Problem
Solution
Discussion
See Also
19.3. Profiling Your Network with FPing and Nmap
Problem
Solution
Discussion
See Also
19.4. Finding Duplicate IP Addresses with arping
Problem
Solution
Discussion
See Also
19.5. Testing HTTP Throughput and Latency with httping
Problem
Solution
Discussion
See Also
19.6. Using traceroute, tcptraceroute, and mtr to Pinpoint Network Problems
Problem
Solution
Discussion
See Also
19.7. Using tcpdump to Capture and Analyze Traffic
Problem
Solution
Discussion
See Also
19.8. Capturing TCP Flags with tcpdump
Problem
Solution
Discussion
See Also
19.9. Measuring Throughput, Jitter, and Packet Loss with iperf
Problem
Solution
Discussion
See Also
19.10. Using ngrep for Advanced Packet Sniffing
Problem
Solution
Discussion
See Also
19.11. Using ntop for Colorful and Quick Network Monitoring
Problem
Solution
Discussion
See Also
19.12. Troubleshooting DNS Servers
Problem
Solution
Discussion
See Also
19.13. Troubleshooting DNS Clients
Problem
Solution
Discussion
See Also
19.14. Troubleshooting SMTP Servers
Problem
Solution
Discussion
See Also
19.15. Troubleshooting a POP3, POP3s, or IMAP Server
Problem
Solution
Discussion
See Also
19.16. Creating SSL Keys for Your Syslog-ng Server on Debian
Problem
Solution
Discussion
See Also
19.17. Creating SSL Keys for Your Syslog-ng Server on Fedora
Problem
Solution
Discussion
See Also
19.18. Setting Up stunnel for Syslog-ng
Problem
Solution
Discussion
See Also
19.19. Building a Syslog Server
Problem
Solution
Discussion
See Also
A. Essential References
B. Glossary of Networking Terms
C. Linux Kernel Building Reference
C.1. Building a Custom Kernel
Prerequisites
Building a Vanilla Kernel
Configuration Options
Adding New Loadable Kernel Modules
Patching a Kernel
Customizing Fedora Kernels
Customizing Debian Kernels
See Also
About the Author
Colophon
SPECIAL OFFER: Upgrade this ebook with O’Reilly
← Prev
Back
Next →
← Prev
Back
Next →