Securing-Optimizing-RH-Linux-1_2_5
Comments and suggestions concerning this book should be mailed to gmourani@videotron.ca
© Copyright 1999-2000 Gerhard Mourani and Open Network Architecture ®
5
Chapter 6 TCP/IP Network Management 93
Linux TCP/IP Network Management
94
Install more than one Ethernet Card per Machine...........................................................................................94
Files related to networking functionality.............................................................................................................95
Configuring TCP/IP Networking manually with the command line................................................................98
Chapter 7 Networking Firewall 102
Linux IPCHAINS
103
Build a kernel with IPCHAINS Firewall support............................................................................................. 106
Some explanation of rules used in the firewall script files ........................................................................... 106
The firewall scripts files ..................................................................................................................................... 108
Configuration of the /etc/rc.d/init.d/firewall script file for the Web Server............................................... 108
Configuration of the /etc/rc.d/init.d/firewall script file for the Mail Server................................................ 118
Chapter 8 Networking Firewall with Masquerading and
Forwarding support 128
Linux Masquerading and Forwarding
129
Build a kernel with Firewall Masquerading and Forwarding support ......................................................... 129
Configuration of the /etc/rc.d/init.d/firewall script file for the Gateway Server ....................................... 130
Deny access to some address ......................................................................................................................... 144
IPCHAINS Administrative Tools....................................................................................................................... 144
Part IV Softwares-Related Reference 146
Chapter 9 Compilers Functionality147
Linux Compilers functionality
148
The necessary packages .................................................................................................................................. 148
Why would we choose to use tarballs?........................................................................................................... 149
Compiling software on your system ................................................................................................................ 149
Build and Install software on your system ...................................................................................................... 150
Editing files with the vi editor tool..................................................................................................................... 151
Some last comments ......................................................................................................................................... 152
Chapter 10 Securities Software (Monitoring Tools)153
Linux sXid
154
Configurations ..................................................................................................................................................... 155
sXid Administrative Tools.................................................................................................................................. 156
Linux Logcheck
158
Configurations ..................................................................................................................................................... 160
Linux PortSentry
162
Configurations..................................................................................................................................................... 164
Start up PortSentry............................................................................................................................................. 168
Chapter 11 Securities Software (Network Services)170
Linux SSH1 Client/Server
171
Configurations ..................................................................................................................................................... 172
Configure sshd1 to use tcp-wrappers inetd super server ............................................................................ 177
Ssh1 Per-User Configuration............................................................................................................................ 178
SSH1 Users Tools.............................................................................................................................................. 179
Linux SSH2 Client/Server
182
Configurations ..................................................................................................................................................... 183
Configure sshd2 to use tcp-wrappers inetd super server ............................................................................ 188
Ssh2 Per-User Configuration............................................................................................................................ 189
SSH2 Users Tools.............................................................................................................................................. 190