Sendmail Section 10.1
Total Page:16
File Type:pdf, Size:1020Kb
TCP/IP Network Administration, 3rd Edition By Craig Hunt Publisher: O'Reilly Pub Date: April 2002 ISBN: 0-596-00297-1 Pages: 746 Table of • Slots: 1 Contents • Index • Reviews Reader • This complete hands-on guide to setting up and running a TCP/IP network Reviews starts with the fundamentals: what protocols do and how they work, how • Errata addresses and routing are used, and how to set up your network connection. The book also covers advanced routing protocols and provides tutorials on configuring important network services. The expanded third edition includes sections on Samba, Apache web server, network security, and much more. TCP/IP Network Administration, 3rd Edition By Craig Hunt Publisher: O'Reilly Pub Date: April 2002 ISBN: 0-596-00297-1 Pages: 746 Table of • Slots: 1 Contents • Index • Reviews Reader • Reviews • Errata Copyright Dedication Preface Audience Organization Unix Versions Conventions We'd Like to Hear from You Acknowledgments Chapter 1. Overview of TCP/IP Section 1.1. TCP/IP and the Internet Section 1.2. A Data Communications Model Section 1.3. TCP/IP Protocol Architecture Section 1.4. Network Access Layer Section 1.5. Internet Layer Section 1.6. Transport Layer Section 1.7. Application Layer Section 1.8. Summary Chapter 2. Delivering the Data Section 2.1. Addressing, Routing, and Multiplexing Section 2.2. The IP Address Section 2.3. Internet Routing Architecture Section 2.4. The Routing Table Section 2.5. Address Resolution Section 2.6. Protocols, Ports, and Sockets Section 2.7. Summary Chapter 3. Network Services Section 3.1. Names and Addresses Section 3.2. The Host Table Section 3.3. DNS Section 3.4. Mail Services Section 3.5. File and Print Servers Section 3.6. Configuration Servers Section 3.7. Summary Chapter 4. Getting Started Section 4.1. Connected and Non-Connected Networks Section 4.2. Basic Information Section 4.3. Planning Routing Section 4.4. Planning Naming Service Section 4.5. Other Services Section 4.6. Informing the Users Section 4.7. Summary Chapter 5. Basic Configuration Section 5.1. Kernel Configuration Section 5.2. Startup Files Section 5.3. The Internet Daemon Section 5.4. The Extended Internet Daemon Section 5.5. Summary Chapter 6. Configuring the Interface Section 6.1. The ifconfig Command Section 6.2. TCP/IP Over a Serial Line Section 6.3. Installing PPP Section 6.4. Summary Chapter 7. Configuring Routing Section 7.1. Common Routing Configurations Section 7.2. The Minimal Routing Table Section 7.3. Building a Static Routing Table Section 7.4. Interior Routing Protocols Section 7.5. Exterior Routing Protocols Section 7.6. Gateway Routing Daemon Section 7.7. Configuring gated Section 7.8. Summary Chapter 8. Configuring DNS Section 8.1. BIND: Unix Name Service Section 8.2. Configuring the Resolver Section 8.3. Configuring named Section 8.4. Using nslookup Section 8.5. Summary Chapter 9. Local Network Services Section 9.1. The Network File System Section 9.2. Sharing Unix Printers Section 9.3. Using Samba to Share Resources with Windows Section 9.4. Network Information Service Section 9.5. DHCP Section 9.6. Managing Distributed Servers Section 9.7. Post Office Servers Section 9.8. Summary Chapter 10. sendmail Section 10.1. sendmail's Function Section 10.2. Running sendmail as a Daemon Section 10.3. sendmail Aliases Section 10.4. The sendmail.cf File Section 10.5. sendmail.cf Configuration Language Section 10.6. Rewriting the Mail Address Section 10.7. Modifying a sendmail.cf File Section 10.8. Testing sendmail.cf Section 10.9. Summary Chapter 11. Configuring Apache Section 11.1. Installing Apache Software Section 11.2. Configuring the Apache Server Section 11.3. Understanding an httpd.conf File Section 11.4. Web Server Security Section 11.5. Managing Your Web Server Section 11.6. Summary Chapter 12. Network Security Section 12.1. Security Planning Section 12.2. User Authentication Section 12.3. Application Security Section 12.4. Security Monitoring Section 12.5. Access Control Section 12.6. Encryption Section 12.7. Firewalls Section 12.8. Words to the Wise Section 12.9. Summary Chapter 13. Troubleshooting TCP/IP Section 13.1. Approaching a Problem Section 13.2. Diagnostic Tools Section 13.3. Testing Basic Connectivity Section 13.4. Troubleshooting Network Access Section 13.5. Checking Routing Section 13.6. Checking Name Service Section 13.7. Analyzing Protocol Problems Section 13.8. Protocol Case Study Section 13.9. Summary Appendix A. PPP Tools Section A.1. Dial-Up IP Section A.2. The PPP Daemon Section A.3. chat Appendix B. A gated Reference Section B.1. The gated Command Section B.2. The gated Configuration Language Section B.3. Directive Statements Section B.4. Trace Statements Section B.5. Options Statements Section B.6. Interface Statements Section B.7. Definition Statements Section B.8. Protocol Statements Section B.9. static Statements Section B.10. Control Statements Section B.11. Aggregate Statements Appendix C. A named Reference Section C.1. The named Command Section C.2. named.conf Configuration Commands Section C.3. Zone File Records Appendix D. A dhcpd Reference Section D.1. Compiling dhcpd Section D.2. The dhcpd Command Section D.3. The dhcpd.conf Configuration File Appendix E. A sendmail Reference Section E.1. Compiling sendmail Section E.2. The sendmail Command Section E.3. m4 sendmail Macros Section E.4. More sendmail.cf Appendix F. Solaris httpd.conf File Appendix G. RFC Excerpts Section G.1. IP Datagram Header Section G.2. TCP Segment Header Section G.3. ICMP Parameter Problem Message Header Section G.4. Retrieving RFCs Colophon Index Copyright © 2002, 1998, 1992 Craig Hunt. All rights reserved. Printed in the United States of America. Published by O'Reilly & Associates, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O'Reilly & Associates books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles ( http://safari.oreilly.com). For more information contact our corporate/institutional sales department: 800-998-9938 or [email protected]. The O'Reilly logo is a registered trademark of O'Reilly & Associates, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O'Reilly & Associates, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. The association between the land crab and TCP/IP network administration is a trademark of O'Reilly & Associates, Inc. While every precaution has been taken in the preparation of this book, the publisher and the author assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. Dedication To Alana, the beginning of a new life. Preface The first edition of TCP/IP Network Administration was written in 1992. In the decade since, many things have changed, yet some things remain the same. TCP/IP is still the preeminent communications protocol for linking together diverse computer systems. It remains the basis of interoperable data communications and global computer networking. The underlying Internet Protocol (IP), Transmission Control Protocol, and User Datagram Protocol (UDP) are remarkably unchanged. But change has come in the way TCP/IP is used and how it is managed. A clear symbol of this change is the fact that my mother-in-law has a TCP/IP network connection in her home that she uses to exchange electronic mail, compressed graphics, and hypertext documents with other senior citizens. She thinks of this as "just being on the Internet," but the truth is that her small system contains a functioning TCP/IP protocol stack, manages a dynamically assigned IP address, and handles data types that did not even exist a decade ago. In 1991, TCP/IP was a tool of sophisticated users. Network administrators managed a limited number of systems and could count on the users for a certain level of technical knowledge. No more. In 2002, the need for highly trained network administrators is greater than ever because the user base is larger, more diverse, and less capable of handling technical problems on its own. This book provides the information needed to become an effective TCP/IP network administrator. TCP/IP Network Administration was the first book of practical information for the professional TCP/IP network administrator, and it is still the best. Since the first edition was published there has been an explosion of books about TCP/IP and the Internet. Still, too few books concentrate on what a system administrator really needs to know about TCP/IP administration. Most books are either scholarly texts written from the point of view of the protocol designer, or instructions on how to use TCP/IP applications. All of those books lack the practical, detailed network information needed by the Unix system administrator. This book strives to focus on TCP/IP and Unix and to find the right balance of theory and practice. I am proud of the earlier editions of TCP/IP Network Administration. In this edition, I have done everything I can to maintain the essential character of the book while making it better. Dynamic address assignment based on Dynamic Host Configuration Protocol (DHCP) is covered. The Domain Name System material has been updated to cover BIND 8 and, to a lesser extent, BIND 9. The email configuration is based on current version of sendmail 8, and the operating system examples are from the current versions of Solaris and Linux. The routing protocol coverage includes Routing Information Protocol version 2 (RIPv2), Open Shortest Path First (OSPF), and Border Gateway Protocol (BGP).