HostedDB - Dedicated UNIX Servers

Securing-Optimizing-RH-Linux-1_2_5
Comments and suggestions concerning this book should be mailed to gmourani@videotron.ca © Copyright 1999-2000 Gerhard Mourani and Open Network Architecture ® 5 Chapter 6  TCP/IP Network Management 93 Linux TCP/IP Network Management 94 Install more than one Ethernet Card per Machine...........................................................................................94 Files related to networking functionality.............................................................................................................95 Configuring TCP/IP Networking manually with the command line................................................................98 Chapter 7  Networking Firewall 102 Linux IPCHAINS 103 Build a kernel with IPCHAINS Firewall support............................................................................................. 106 Some explanation of rules used in the firewall script files ........................................................................... 106 The firewall scripts files ..................................................................................................................................... 108 Configuration of the “/etc/rc.d/init.d/firewall” script file for the Web Server............................................... 108 Configuration of the “/etc/rc.d/init.d/firewall” script file for the Mail Server................................................ 118 Chapter 8  Networking Firewall with Masquerading and Forwarding support    128 Linux Masquerading and Forwarding 129 Build a kernel with Firewall Masquerading and Forwarding support ......................................................... 129 Configuration of the “/etc/rc.d/init.d/firewall” script file for the Gateway Server ....................................... 130 Deny access to some address ......................................................................................................................... 144 IPCHAINS Administrative Tools....................................................................................................................... 144 Part IV  Software’s-Related Reference 146 Chapter 9  Compilers Functionality147 Linux Compilers functionality 148 The necessary packages .................................................................................................................................. 148 Why would we choose to use tarballs?........................................................................................................... 149 Compiling software on your system ................................................................................................................ 149 Build and Install software on your system ...................................................................................................... 150 Editing files with the vi editor tool..................................................................................................................... 151 Some last comments ......................................................................................................................................... 152 Chapter 10  Securities Software (Monitoring Tools)153 Linux sXid 154 Configurations ..................................................................................................................................................... 155 sXid Administrative Tools.................................................................................................................................. 156 Linux Logcheck 158 Configurations ..................................................................................................................................................... 160 Linux PortSentry 162 Configurations..................................................................................................................................................... 164 Start up PortSentry............................................................................................................................................. 168 Chapter 11  Securities Software (Network Services)170 Linux SSH1 Client/Server 171 Configurations ..................................................................................................................................................... 172 Configure sshd1 to use tcp-wrappers inetd super server ............................................................................ 177 Ssh1 Per-User Configuration............................................................................................................................ 178 SSH1 Users Tools.............................................................................................................................................. 179 Linux SSH2 Client/Server 182 Configurations ..................................................................................................................................................... 183 Configure sshd2 to use tcp-wrappers inetd super server ............................................................................ 188 Ssh2 Per-User Configuration............................................................................................................................ 189 SSH2 Users Tools.............................................................................................................................................. 190