Follow Techotopia on Twitter

On-line Guides
All Guides
eBook Store
iOS / Android
Linux for Beginners
Office Productivity
Linux Installation
Linux Security
Linux Utilities
Linux Virtualization
Linux Kernel
System/Network Admin
Programming
Scripting Languages
Development Tools
Web Development
GUI Toolkits/Desktop
Databases
Mail Systems
openSolaris
Eclipse Documentation
Techotopia.com
Virtuatopia.com
Answertopia.com

How To Guides
Virtualization
General System Admin
Linux Security
Linux Filesystems
Web Servers
Graphics & Desktop
PC Hardware
Windows
Problem Solutions
Privacy Policy

  




 

 

NOTE: CentOS Enterprise Linux 5 is built from the Red Hat Enterprise Linux source code. Other than logo and name changes CentOS Enterprise Linux 5 is compatible with the equivalent Red Hat version. This document applies equally to both Red Hat and CentOS Enterprise Linux 5.

Network-Related Configuration

After explaining how to configure the network, this part discusses topics related to networking such as how to allow remote logins, share files and directories over the network, and set up a Web server.

Table of Contents

13. Network Interfaces
13.1. Network Configuration Files
13.2. Interface Configuration Files
13.2.1. Ethernet Interfaces
13.2.2. IPsec Interfaces
13.2.3. Channel Bonding Interfaces
13.2.4. Alias and Clone Files
13.2.5. Dialup Interfaces
13.2.6. Other Interfaces
13.3. Interface Control Scripts
13.4. Network Function Files
13.5. Additional Resources
13.5.1. Installed Documentation
14. Network Configuration
14.1. Overview
14.2. Establishing an Ethernet Connection
14.3. Establishing an ISDN Connection
14.4. Establishing a Modem Connection
14.5. Establishing an xDSL Connection
14.6. Establishing a Token Ring Connection
14.7. Establishing a Wireless Connection
14.8. Managing DNS Settings
14.9. Managing Hosts
14.10. Working with Profiles
14.11. Device Aliases
14.12. Saving and Restoring the Network Configuration
15. Controlling Access to Services
15.1. Runlevels
15.2. TCP Wrappers
15.2.1. xinetd
15.3. Services Configuration Tool
15.4. ntsysv
15.5. chkconfig
15.6. Additional Resources
15.6.1. Installed Documentation
15.6.2. Useful Websites
16. Berkeley Internet Name Domain (BIND)
16.1. Introduction to DNS
16.1.1. Nameserver Zones
16.1.2. Nameserver Types
16.1.3. BIND as a Nameserver
16.2. /etc/named.conf
16.2.1. Common Statement Types
16.2.2. Other Statement Types
16.2.3. Comment Tags
16.3. Zone Files
16.3.1. Zone File Directives
16.3.2. Zone File Resource Records
16.3.3. Example Zone File
16.3.4. Reverse Name Resolution Zone Files
16.4. Using rndc
16.4.1. Configuring /etc/named.conf
16.4.2. Configuring /etc/rndc.conf
16.4.3. Command Line Options
16.5. Advanced Features of BIND
16.5.1. DNS Protocol Enhancements
16.5.2. Multiple Views
16.5.3. Security
16.5.4. IP version 6
16.6. Common Mistakes to Avoid
16.7. Additional Resources
16.7.1. Installed Documentation
16.7.2. Useful Websites
16.7.3. Related Books
17. OpenSSH
17.1. Features of SSH
17.1.1. Why Use SSH?
17.2. SSH Protocol Versions
17.3. Event Sequence of an SSH Connection
17.3.1. Transport Layer
17.3.2. Authentication
17.3.3. Channels
17.4. Configuring an OpenSSH Server
17.4.1. Requiring SSH for Remote Connections
17.5. OpenSSH Configuration Files
17.6. Configuring an OpenSSH Client
17.6.1. Using the ssh Command
17.6.2. Using the scp Command
17.6.3. Using the sftp Command
17.7. More Than a Secure Shell
17.7.1. X11 Forwarding
17.7.2. Port Forwarding
17.7.3. Generating Key Pairs
17.8. Additional Resources
17.8.1. Installed Documentation
17.8.2. Useful Websites
18. Network File System (NFS)
18.1. How It Works
18.1.1. Required Services
18.2. NFS Client Configuration
18.2.1. Mounting NFS File Systems using /etc/fstab
18.3. autofs
18.3.1. What's new in autofs version 5?
18.3.2. autofs Configuration
18.3.3. autofs Common Tasks
18.4. Common NFS Mount Options
18.5. Starting and Stopping NFS
18.6. NFS Server Configuration
18.6.1. Exporting or Sharing NFS File Systems
18.6.2. Command Line Configuration
18.6.3. Hostname Formats
18.7. The /etc/exports Configuration File
18.7.1. The exportfs Command
18.8. Securing NFS
18.8.1. Host Access
18.8.2. File Permissions
18.9. NFS and portmap
18.9.1. Troubleshooting NFS and portmap
18.10. Using NFS over TCP
18.11. Additional Resources
18.11.1. Installed Documentation
18.11.2. Useful Websites
18.11.3. Related Books
19. Samba
19.1. Introduction to Samba
19.1.1. Samba Features
19.2. Samba Daemons and Related Services
19.2.1. Samba Daemons
19.3. Connecting to a Samba Share
19.3.1. Command Line
19.3.2. Mounting the Share
19.4. Configuring a Samba Server
19.4.1. Graphical Configuration
19.4.2. Command Line Configuration
19.4.3. Encrypted Passwords
19.5. Starting and Stopping Samba
19.6. Samba Server Types and the smb.conf File
19.6.1. Stand-alone Server
19.6.2. Domain Member Server
19.6.3. Domain Controller
19.7. Samba Security Modes
19.7.1. User-Level Security
19.7.2. Share-Level Security
19.8. Samba Account Information Databases
19.9. Samba Network Browsing
19.9.1. Domain Browsing
19.9.2. WINS (Windows Internetworking Name Server)
19.10. Samba with CUPS Printing Support
19.10.1. Simple smb.conf Settings
19.11. Samba Distribution Programs
19.12. Additional Resources
19.12.1. Installed Documentation
19.12.2. Related Books
19.12.3. Useful Websites
20. Dynamic Host Configuration Protocol (DHCP)
20.1. Why Use DHCP?
20.2. Configuring a DHCP Server
20.2.1. Configuration File
20.2.2. Lease Database
20.2.3. Starting and Stopping the Server
20.2.4. DHCP Relay Agent
20.3. Configuring a DHCP Client
20.4. Additional Resources
20.4.1. Installed Documentation
21. Apache HTTP Server
21.1. Apache HTTP Server 2.2
21.1.1. Features of Apache HTTP Server 2.2
21.2. Migrating Apache HTTP Server Configuration Files
21.2.1. Migrating Apache HTTP Server 2.0 Configuration Files
21.2.2. Migrating Apache HTTP Server 1.3 Configuration Files to 2.0
21.3. Starting and Stopping httpd
21.4. Apache HTTP Server Configuration
21.4.1. Basic Settings
21.4.2. Default Settings
21.5. Configuration Directives in httpd.conf
21.5.1. General Configuration Tips
21.5.2. Configuration Directives for SSL
21.5.3. MPM Specific Server-Pool Directives
21.6. Adding Modules
21.7. Virtual Hosts
21.7.1. Setting Up Virtual Hosts
21.8. Apache HTTP Secure Server Configuration
21.8.1. An Overview of Security-Related Packages
21.8.2. An Overview of Certificates and Security
21.8.3. Using Pre-Existing Keys and Certificates
21.8.4. Types of Certificates
21.8.5. Generating a Key
21.8.6. How to configure the server to use the new key
21.9. Additional Resources
21.9.1. Useful Websites
22. FTP
22.1. The File Transport Protocol
22.1.1. Multiple Ports, Multiple Modes
22.2. FTP Servers
22.2.1. vsftpd
22.3. Files Installed with vsftpd
22.4. Starting and Stopping vsftpd
22.4.1. Starting Multiple Copies of vsftpd
22.5. vsftpd Configuration Options
22.5.1. Daemon Options
22.5.2. Log In Options and Access Controls
22.5.3. Anonymous User Options
22.5.4. Local User Options
22.5.5. Directory Options
22.5.6. File Transfer Options
22.5.7. Logging Options
22.5.8. Network Options
22.6. Additional Resources
22.6.1. Installed Documentation
22.6.2. Useful Websites
23. Email
23.1. Email Protocols
23.1.1. Mail Transport Protocols
23.1.2. Mail Access Protocols
23.2. Email Program Classifications
23.2.1. Mail Transport Agent
23.2.2. Mail Delivery Agent
23.2.3. Mail User Agent
23.3. Mail Transport Agents
23.3.1. Sendmail
23.3.2. Postfix
23.3.3. Fetchmail
23.4. Mail Transport Agent (MTA) Configuration
23.5. Mail Delivery Agents
23.5.1. Procmail Configuration
23.5.2. Procmail Recipes
23.6. Mail User Agents
23.6.1. Securing Communication
23.7. Additional Resources
23.7.1. Installed Documentation
23.7.2. Useful Websites
23.7.3. Related Books
24. Lightweight Directory Access Protocol (LDAP)
24.1. Why Use LDAP?
24.1.1. OpenLDAP Features
24.2. LDAP Terminology
24.3. OpenLDAP Daemons and Utilities
24.3.1. NSS, PAM, and LDAP
24.3.2. PHP4, LDAP, and the Apache HTTP Server
24.3.3. LDAP Client Applications
24.4. OpenLDAP Configuration Files
24.5. The /etc/openldap/schema/ Directory
24.6. OpenLDAP Setup Overview
24.6.1. Editing /etc/openldap/slapd.conf
24.7. Configuring a System to Authenticate Using OpenLDAP
24.7.1. PAM and LDAP
24.7.2. Migrating Old Authentication Information to LDAP Format
24.8. Migrating Directories from Earlier Releases
24.9. Additional Resources
24.9.1. Installed Documentation
24.9.2. Useful Websites
24.9.3. Related Books
25. Authentication Configuration
25.1. User Information
25.2. Authentication
25.3. Options
25.4. Command Line Version

 
 
  Published under the terms of the GNU General Public License Design by Interspire