Nethserver Documentation Versión 7 Final
Total Page:16
File Type:pdf, Size:1020Kb
NethServer Documentation Versión 7 Final Nethesis 22 de septiembre de 2021 Release notes 1. Notas de lanzamiento 7 3 1.1. Major changes on 2020-11-26......................................3 1.2. Major changes on 2020-05-05......................................4 1.3. Major changes on 2019-10-07......................................5 1.4. Major changes on 2018-12-17......................................5 1.5. Major changes on 2018-06-11......................................6 1.6. Major changes on 2017-10-26......................................6 1.7. Major changes on 2017-07-31......................................7 1.8. Major changes on 2017-01-30......................................7 1.9. Deprecated features and packages....................................8 1.10. Actualizando NethServer 6 a NethServer 7...............................9 2. Tipos de instalación 11 2.1. Requerimientos mínimos......................................... 11 2.2. Tipos de instalación........................................... 11 2.3. Instalación desde ISO.......................................... 12 2.4. Instalar en CentOS............................................ 15 2.5. Próximos pasos.............................................. 15 3. Accessing the Server Manager 17 3.1. Login................................................... 17 3.2. Hints................................................... 17 3.3. Change the current password....................................... 18 3.4. Logout.................................................. 18 4. Subscription 19 4.1. Registering the system.......................................... 19 4.2. Removing a subscription......................................... 20 5. Base system 21 5.1. Network................................................. 22 5.2. Services.................................................. 25 5.3. Certificates................................................ 25 5.4. Storage.................................................. 26 5.5. Trusted networks............................................. 26 5.6. SSH.................................................... 26 5.7. Disk analyzer............................................... 27 I 5.8. Settings.................................................. 27 5.9. Logs................................................... 29 6. Applications 31 6.1. Shortcuts................................................. 31 6.2. Removing applications.......................................... 31 7. Authentication 33 7.1. Role delegation.............................................. 33 7.2. Two-factor authentication (2FA)..................................... 34 8. Centro de software 37 8.1. Applications installation......................................... 37 8.2. Actualizaciones de software....................................... 37 9. Usuarios y grupos 41 9.1. Proveedores de cuentas.......................................... 41 9.2. Usuarios................................................. 46 9.3. Grupos.................................................. 47 9.4. Cuenta de administrador......................................... 47 9.5. Gestión de contraseñas.......................................... 47 9.6. Import and delete accounts from plain-text files............................. 49 10. DNS 53 10.1. Hosts................................................... 53 10.2. Alias................................................... 54 10.3. Domain redirection............................................ 54 11. Servidor DHCP y PXE 55 11.1. Configuración DHCP........................................... 55 11.2. Reserva IP del host............................................ 56 11.3. Arranque desde la configuración de red................................. 56 12. Política de TLS 59 12.1. Policy 2020-05-10............................................ 59 12.2. Policy 2018-10-01............................................ 59 12.3. Policy 2018-06-21............................................ 60 12.4. Política 2018-03-30........................................... 60 12.5. Política de subida predeterminada.................................... 61 13. Copia de seguridad 63 13.1. Settings.................................................. 63 13.2. Selective restore of files......................................... 65 14. Web server 67 14.1. Web server dashboard.......................................... 67 14.2. Settings.................................................. 68 14.3. Virtual hosts............................................... 68 14.4. Reverse proxy.............................................. 69 14.5. FTP server................................................ 71 15. Correo electrónico 73 15.1. Dominios................................................. 74 15.2. Filtro................................................... 75 15.3. Mailboxes................................................ 78 15.4. Addresses................................................. 80 II 15.5. Connectors................................................ 81 15.6. Synchronization............................................. 81 15.7. Queue................................................... 82 15.8. Relay................................................... 82 15.9. Settings.................................................. 84 15.10.Logs................................................... 84 15.11.Configuración del cliente......................................... 85 15.12.Kerberos-based authentication...................................... 86 16. Webmail 87 16.1. Plugins.................................................. 87 16.2. Acceso.................................................. 88 16.3. Quitar................................................... 88 17. Carpetas compartidas 89 17.1. Requirements............................................... 89 17.2. Authorizations.............................................. 90 17.3. Network access.............................................. 90 17.4. Network recycle bin........................................... 90 17.5. Hide a shared folder........................................... 91 17.6. Home share................................................ 91 17.7. Change resource permissions from Windows clients.......................... 91 17.8. Administrative access.......................................... 92 17.9. Auditing................................................. 92 18. Nextcloud 93 18.1. Instalación................................................ 93 18.2. Configuration............................................... 94 19. Team chat (Mattermost) 97 19.1. Configuration............................................... 97 19.2. Authentication.............................................. 98 20. Chat 99 20.1. Configuration............................................... 99 20.2. Administradores............................................. 100 20.3. Clients.................................................. 100 21. Antivirus 103 22. Firewall 105 22.1. Apply and revert............................................. 105 22.2. Política.................................................. 106 22.3. Settings.................................................. 106 22.4. Reglas.................................................. 107 22.5. WAN................................................... 109 22.6. Reenviar puerto.............................................. 110 22.7. SNAT 1:1................................................. 112 22.8. Conformación del tráfico......................................... 112 22.9. Objetos del cortafuego.......................................... 113 22.10.Connections............................................... 114 23. Proxy web 115 23.1. Authenticated mode........................................... 115 23.2. Configuración del cliente......................................... 116 III 23.3. Proxy SSL................................................ 116 23.4. Bypass.................................................. 116 23.5. Priority and divert rules......................................... 117 23.6. Content filter............................................... 117 23.7. Reporte.................................................. 118 23.8. Cache................................................... 118 23.9. Puertos seguros.............................................. 119 23.10.Logs................................................... 119 24. Fail2ban 121 24.1. Configuration............................................... 121 24.2. Unban IP................................................. 122 24.3. Command line tools........................................... 122 25. VPN 125 25.1. OpenVPN................................................ 125 25.2. IPsec................................................... 128 26. IPS (Suricata) 129 26.1. Rule categories.............................................. 129 26.2. Bypass.................................................. 132 26.3. EveBox.................................................. 132 27. Threat shield 133 27.1. Configuration............................................... 133 27.2. Incident response............................................. 134 27.3. Statistics................................................. 134 27.4. Geo-blocking............................................... 134 28. Monitor de ancho de banda 137 28.1. Dashboard................................................ 137 28.2. Settings.................................................. 138 28.3. Logs................................................... 138 29. Punto de Acceso (Dedalo) 139 29.1. Como