Linux Networking-HOWTO (Previously the Net-3 Howto)

Total Page:16

File Type:pdf, Size:1020Kb

Linux Networking-HOWTO (Previously the Net-3 Howto) Linux Networking−HOWTO (Previously the Net−3 Howto) Linux Networking−HOWTO (Previously the Net−3 Howto) Table of Contents Linux Networking−HOWTO (Previously the Net−3 Howto).........................................................................1 Current Author: unmaintained.................................................................................................................1 1. Introduction..........................................................................................................................................1 2. Document History................................................................................................................................1 3. How to use this HOWTO.....................................................................................................................1 4. General Information about Linux Networking....................................................................................1 5. Generic Network Configuration Information......................................................................................1 6. IP− and Ethernet−Related Information................................................................................................2 7. Using common PC hardware...............................................................................................................2 8. Other Network Technologies...............................................................................................................2 9. Cables and Cabling..............................................................................................................................3 10. Glossary of Terms used in this document..........................................................................................3 11. Linux for an ISP ?..............................................................................................................................3 12. Acknowledgements............................................................................................................................3 13. Copyright...........................................................................................................................................3 1. Introduction..........................................................................................................................................3 2. Document History................................................................................................................................3 2.1 Feedback............................................................................................................................................3 3. How to use this HOWTO.....................................................................................................................4 3.1 Conventions used in this document...................................................................................................4 4. General Information about Linux Networking....................................................................................5 4.1 A brief history of Linux Networking Kernel Development...............................................................5 4.2 Linux Networking Resources............................................................................................................6 4.3 Where to get some non−linux−specific network information...........................................................7 5. Generic Network Configuration Information......................................................................................8 5.1 What do I need to start ?....................................................................................................................8 Current Kernel source(Optional).......................................................................................................8 Current Network tools.......................................................................................................................9 Network Application Programs.......................................................................................................10 IP Addresses, an Explanation..........................................................................................................10 5.2 Where should I put the configuration commands ?.........................................................................12 5.3 Creating your network interfaces.....................................................................................................13 5.4 Configuring a network interface......................................................................................................13 5.5 Configuring your Name Resolver....................................................................................................14 What's in a name ?...........................................................................................................................14 What information you will need......................................................................................................15 /etc/resolv.conf................................................................................................................................15 /etc/host.conf...................................................................................................................................16 /etc/hosts..........................................................................................................................................16 Running a name server....................................................................................................................16 5.6 Configuring your loopback interface...............................................................................................17 5.7 Routing.............................................................................................................................................17 So what does the routed program do ?............................................................................................19 5.8 Configuring your network servers and services...............................................................................21 /etc/services.....................................................................................................................................21 An example /etc/services file..........................................................................................................22 /etc/inetd.conf..................................................................................................................................25 An example /etc/inetd.conf..............................................................................................................26 i Linux Networking−HOWTO (Previously the Net−3 Howto) Table of Contents Linux Networking−HOWTO (Previously the Net−3 Howto) 5.9 Other miscellaneous network related configuration files................................................................28 /etc/protocols...................................................................................................................................28 /etc/networks...................................................................................................................................28 5.10 Network Security and access control.............................................................................................29 /etc/ftpusers.....................................................................................................................................29 /etc/securetty....................................................................................................................................29 The tcpd hosts access control mechanism.......................................................................................30 /etc/hosts.allow................................................................................................................................30 /etc/hosts.deny.................................................................................................................................31 /etc/hosts.equiv................................................................................................................................31 Configure your ftp daemon properly...............................................................................................31 Network Firewalling........................................................................................................................32 Other suggestions............................................................................................................................32 6. IP− and Ethernet−Related Information..............................................................................................32 6.1 Ethernet............................................................................................................................................32 6.2 EQL − multiple line traffic equaliser...............................................................................................32 6.3 IP Accounting (for Linux−2.0)........................................................................................................33 6.4 IP Accounting (for Linux−2.2)........................................................................................................35 6.5 IP Aliasing.......................................................................................................................................35
Recommended publications
  • IP Datagram ICMP Message Format ICMP Message Types
    ICMP Internet Control Message Protocol ICMP is a protocol used for exchanging control messages. CSCE 515: Two main categories Query message Computer Network Error message Programming Usage of an ICMP message is determined by type and code fields ------ IP, Ping, Traceroute ICMP uses IP to deliver messages. Wenyuan Xu ICMP messages are usually generated and processed by the IP software, not the user process. Department of Computer Science and Engineering University of South Carolina IP header ICMP Message 20 bytes CSCE515 – Computer Network Programming IP Datagram ICMP Message Format 1 byte 1 byte 1 byte 1 byte VERS HL Service Total Length Datagram ID FLAG Fragment Offset 0781516 31 TTL Protocol Header Checksum type code checksum Source Address Destination Address payload Options (if any) Data CSCE515 – Computer Network Programming CSCE515 – Computer Network Programming ICMP Message Types ICMP Address Mask Request and Reply intended for a diskless system to obtain its subnet mask. Echo Request Id and seq can be any values, and these values are Echo Response returned in the reply. Destination Unreachable Match replies with request Redirect 0781516 31 Time Exceeded type(17 or 18) code(0) checksum there are more ... identifier sequence number subnet mask CSCE515 – Computer Network Programming CSCE515 – Computer Network Programming ping Program ICMP Echo Request and Reply Available at /usr/sbin/ping Test whether another host is reachable Send ICMP echo_request to a network host -n option to set number of echo request to send
    [Show full text]
  • President's Corner
    TAPR PSR #137 Winter 2018 President’s Corner By Steve Bible, N7HPR TAPR will be at the HamSCI Workshop <https://tinyurl.com/y8errhsu > on February 23 and 24 at the New Jersey Institute of Technology in Newark. I, along with a handful of other TAPR officers and board members will attend the workshop, which will focus on the results of the 2017 Great American Eclipse ham radio ionospheric experiment and the development of a Personal Space Weather station. As in the past, TAPR will be at Hamvention <http://www.hamvention.org> in May with a suite of booths, our highly regarded TAPR Forum and the annual TAPR- AMSAT Banquet, President’s Corner 01 In the fall, the 37th annual ARRL/TAPR Digital Communications Conference PulsePuppy 02 (DCC) will take place September 14-16 in Albuquerque, New Mexico. The Greg Jones Memorial Endowment 03 conference invites technical papers for presentation at the conference and for Phase 4 Space Kickoff 04 publication in the Conference Proceedings (presentation at the conference is not XC-3006 06 required for publication). Papers are due by July 31, 2018, to Maty Weinberg, Evangelizing Ham Radio Data Modes 07 Set Up an IPv6 Gateway on Packet 08 ARRL, 225 Main St., Newington, CT 06111 or via e-mail to [email protected]. The TAPR Wear Available 10 Conference website <http://www.tapr.org/dcc> has full details. Aruba on a Sloper 11 Hope to see you in Newark, Xenia and Albuquerque! N7DRB SK 12 Write Here! 13 73, On the Net 13 Steve Bible, N7HPR, President TAPR The Fine Print 14 ### Our Membership App 15 TAPR is a community that provides leadership and resources to radio amateurs for the purpose of advancing the radio art.
    [Show full text]
  • Transport Layer Chapter 6
    Transport Layer Chapter 6 • Transport Service • Elements of Transport Protocols • Congestion Control • Internet Protocols – UDP • Internet Protocols – TCP • Performance Issues • Delay-Tolerant Networking Revised: August 2011 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 The Transport Layer Responsible for delivering data across networks with the desired Application reliability or quality Transport Network Link Physical CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Transport Service • Services Provided to the Upper Layer » • Transport Service Primitives » • Berkeley Sockets » • Socket Example: Internet File Server » CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Services Provided to the Upper Layers (1) Transport layer adds reliability to the network layer • Offers connectionless (e.g., UDP) and connection- oriented (e.g, TCP) service to applications CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Services Provided to the Upper Layers (2) Transport layer sends segments in packets (in frames) Segment Segment CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Transport Service Primitives (1) Primitives that applications might call to transport data for a simple connection-oriented service: • Client calls CONNECT, SEND, RECEIVE, DISCONNECT • Server calls LISTEN, RECEIVE, SEND, DISCONNECT Segment CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice
    [Show full text]
  • Ipv6 — an Introduction
    IPv6 — An introduction Owen DeLong [email protected] Portions Copyright © 2009-2014 by Hurricane Electric, used under license to Owen DeLong More IPv4 NAT Are you fscking kidding me? ©2014 Black Lotus Communications IPv6 Transition -- How ready are we? n Things that are ready Backbones CMTS Systems (DOCSIS 3) MacOS (10.4+) Linux (2.6 Kernels) Windows (7, 2008, XP (limited)) WiMax (specification, head end equipment) LTE (some) CPE (very limited) Early Adopters and some industry experts Black Lotus Me ©2014 Black Lotus Communications IPv6 Transition -- How ready are we? ▪ Things that are NOT ready ➢ PON Systems ➢ DSL Systems ➢ CMTS Systems (DOCSIS 2) ➢ WDS/EVDO/HSPA ➢ WIMAX (handsets, providers) ➢ Older Windows (XP and earlier) ➢ Embedded systems ➢ Printers ➢ Home entertainment devices ➢ CPE (most) ➢ Most IT staff and management ©2014 Black Lotus Communications An Important Decision ▪ Which Approach will you take? IPv4 is just fine. IPv4/IPv6 Dual Stack Now We just need MOAR NAT!! My dual stack network is running great! ©2014 Black Lotus Communications What we’ll cover ▪ Basics of IPv6 ▪ IPv6 Addressing Methods ➢ SLAAC ➢ DHCP ➢ Static ➢ Privacy ▪ Linux Configuration for Native Dual Stack ▪ IPv6 without a native backbone available ▪ Free IPv6? ©2014 Black Lotus Communications Some additional topics ▪ Routing ▪ Firewalls ▪ DNS ▪ Reverse DNS ▪ Troubleshooting ▪ Staff Training ©2014 Black Lotus Communications Basics: IPv4 vs. IPv6 Property IPv4 Address IPv6 Address Bits 32 128 Total address 3,758,096,384 unicast 42+ Undecilion assignable
    [Show full text]
  • AWS Site-To-Site VPN User Guide AWS Site-To-Site VPN User Guide
    AWS Site-to-Site VPN User Guide AWS Site-to-Site VPN User Guide AWS Site-to-Site VPN: User Guide Copyright © Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection with any product or service that is not Amazon's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon. AWS Site-to-Site VPN User Guide Table of Contents What is Site-to-Site VPN ..................................................................................................................... 1 Concepts ................................................................................................................................... 1 Working with Site-to-Site VPN ..................................................................................................... 1 Site-to-Site VPN limitations ......................................................................................................... 2 Pricing ...................................................................................................................................... 2 How AWS Site-to-Site VPN works ........................................................................................................ 3 Site-to-Site VPN Components .....................................................................................................
    [Show full text]
  • Internet Protocol Suite
    InternetInternet ProtocolProtocol SuiteSuite Srinidhi Varadarajan InternetInternet ProtocolProtocol Suite:Suite: TransportTransport • TCP: Transmission Control Protocol • Byte stream transfer • Reliable, connection-oriented service • Point-to-point (one-to-one) service only • UDP: User Datagram Protocol • Unreliable (“best effort”) datagram service • Point-to-point, multicast (one-to-many), and • broadcast (one-to-all) InternetInternet ProtocolProtocol Suite:Suite: NetworkNetwork z IP: Internet Protocol – Unreliable service – Performs routing – Supported by routing protocols, • e.g. RIP, IS-IS, • OSPF, IGP, and BGP z ICMP: Internet Control Message Protocol – Used by IP (primarily) to exchange error and control messages with other nodes z IGMP: Internet Group Management Protocol – Used for controlling multicast (one-to-many transmission) for UDP datagrams InternetInternet ProtocolProtocol Suite:Suite: DataData LinkLink z ARP: Address Resolution Protocol – Translates from an IP (network) address to a network interface (hardware) address, e.g. IP address-to-Ethernet address or IP address-to- FDDI address z RARP: Reverse Address Resolution Protocol – Translates from a network interface (hardware) address to an IP (network) address AddressAddress ResolutionResolution ProtocolProtocol (ARP)(ARP) ARP Query What is the Ethernet Address of 130.245.20.2 Ethernet ARP Response IP Source 0A:03:23:65:09:FB IP Destination IP: 130.245.20.1 IP: 130.245.20.2 Ethernet: 0A:03:21:60:09:FA Ethernet: 0A:03:23:65:09:FB z Maps IP addresses to Ethernet Addresses
    [Show full text]
  • The Internet Protocol, Version 4 (Ipv4)
    Today’s Lecture I. IPv4 Overview The Internet Protocol, II. IP Fragmentation and Reassembly Version 4 (IPv4) III. IP and Routing IV. IPv4 Options Internet Protocols CSC / ECE 573 Fall, 2005 N.C. State University copyright 2005 Douglas S. Reeves 1 copyright 2005 Douglas S. Reeves 2 Internet Protocol v4 (RFC791) Functions • A universal intermediate layer • Routing IPv4 Overview • Fragmentation and reassembly copyright 2005 Douglas S. Reeves 3 copyright 2005 Douglas S. Reeves 4 “IP over Everything, Everything Over IP” IP = Basic Delivery Service • Everything over IP • IP over everything • Connectionless delivery simplifies router design – TCP, UDP – Dialup and operation – Appletalk – ISDN – Netbios • Unreliable, best-effort delivery. Packets may be… – SCSI – X.25 – ATM – Ethernet – lost (discarded) – X.25 – Wi-Fi – duplicated – SNA – FDDI – reordered – Sonet – ATM – Fibre Channel – Sonet – and/or corrupted – Frame Relay… – … – Remote Direct Memory Access – Ethernet • Even IP over IP! copyright 2005 Douglas S. Reeves 5 copyright 2005 Douglas S. Reeves 6 1 IPv4 Datagram Format IPv4 Header Contents 0 4 8 16 31 •Version (4 bits) header type of service • Functions version total length (in bytes) length (x4) prec | D T R C 0 •Header Length x4 (4) flags identification fragment offset (x8) 1. universal 0 DF MF s •Type of Service (8) e time-to-live (next) protocol t intermediate layer header checksum y b (hop count) identifier •Total Length (16) 0 2 2. routing source IP address •Identification (16) 3. fragmentation and destination IP address reassembly •Flags (3) s •Fragment Offset ×8 (13) e t 4. Options y IP options (if any) b •Time-to-Live (8) 0 4 ≤ •Protocol Identifier (8) s e t •Header Checksum (16) y b payload 5 •Source IP Address (32) 1 5 5 6 •Destination IP Address (32) ≤ •IP Options (≤ 320) copyright 2005 Douglas S.
    [Show full text]
  • WAN-LAN PIM Multicast Routing and LAN IGMP FEATURE OVERVIEW and CONFIGURATION GUIDE
    Technical Guide WAN-LAN PIM Multicast Routing and LAN IGMP FEATURE OVERVIEW AND CONFIGURATION GUIDE Introduction This guide describes WAN-LAN PIM Multicast Routing and IGMP on the LAN and how to configure WAN-LAN PIM multicast routing and LAN IGMP snooping. The AlliedTelesis Next Generation Firewalls (NGFWs) can perform routing of IPv4 and IPv6 multicast, using PIM-SM and PIM-DM. Also, switching interfaces of the NGFWs are IGMP aware, and will only forward multicast steams to these switch ports that have received reports. IGMP snooping allows a device to only forward multicast streams to the links on which they have been requested. PIM Sparse mode requires specific designated routers to receive notification of all streams destined to specific ranges of multicast addresses. When a router needs to get hold of a given group, it sends a request to the designated Rendezvous Point for that group. If there is a source in the network that is transmitting a stream to this group, then the Rendezvous Point will be receiving it, and will forward it to the requesting router. C613-22042-00 REV A alliedtelesis.com x Products and software version that apply to this guide Contents Introduction.............................................................................................................................................................................1 Products and software version that apply to this guide .......................................................................2 Configuring WAN-LAN PIM Multicast Routing and LAN IGMP Snooping........................................3
    [Show full text]
  • By Steve Guendert, Ph.D. Long-Distance Extension Networks Between Data Centers
    Fibre Channel over Internet Protocol ver the past decade, extension networks for storage have become commonplace and continue to grow in size and importance. Growth isn’t limited to new Odeployments but also involves the expansion of existing deployments. Requirements for data protection will never Basics for ease, as the economies of many countries depend on successful and continued business operations; thus, laws have been passed mandating data protection. Modern-day dependence on remote data replication (RDR) means there’s little tolerance for lapses that leave data vulnerable to loss. In IBM mainframe environments, reliable and resilient networks—to the point of no frame loss and in-order frame delivery—are necessary for error-free operation, high performance and operational ease. This improves availability, reduces risk and operating expenses and, most important of all, reduces risk of data loss. A previous article, “Storage Networking Business Mainframers Continuity Solutions” (Enterprise Tech Journal, October/ November 2013, available at http://entsys.me/ixond), introduced the various topologies and protocols used for the networks associated with business continuity, disaster recovery and continuous availability (BC/DR/CA). This article focuses in-depth on one of those protocols— Fibre Channel over Internet Protocol (FCIP)—and how it’s used in a mainframe environment to provide By Steve Guendert, Ph.D. long-distance extension networks between data centers. B • Enterprise Tech Journal • Winter 2013/2014Enterprise Tech Journal • Winter 2013/2014 Because of the higher costs of long-distance dark fiber FC devices in the fabric are unaware of the presence of the connectivity compared with other communications IP network.
    [Show full text]
  • Ip Multicast Admission Control for Iptv
    IP MULTICAST ADMISSION CONTROL FOR IPTV A Thesis by Deepa Jayaraman Bachelor of Engineering, Anna University, India, 2008 Submitted to the Department of Electrical and Computer Science Engineering and the faculty of the Graduate school of Wichita State University in partial fulfillment of the requirements for the degree of Master of Science May 2012 i © Copyright 2012 by Deepa Jayaraman All Rights Reserved ii IP MULTICAST ADMISSION CONTROL FOR IPTV The following faculty members have examined the final copy of this Thesis for form and content and recommend that it be accepted in partial fulfillment of the requirements for the degree of Master of Science with a major in Electrical Engineering. __________________________________ Ravi Pendse, Committee Chair __________________________________ Linda Kliment, Committee Member __________________________________ Abu Asaduzzaman, Committee Member iii DEDICATION God, the Almighty My Parents Mrs. Lalitha Jayaraman & Mr. Jayaraman My Family Mrs. Indira Subramanian and Mr. Subramanian Mrs. Mythreyi Venkatesan and Mr. Venkatesan iv ACKNOWLEDGEMENT First I would like to thank God, the Almighty, for guiding me through every step in my life. I would like to extend my sincere thanks to Dr. Ravi Pendse, my advisor, for his constant encouragement, support and valuable advice. He has been there ever since I started my Masters in Wichita State University, guiding me and helping me in every step for the past three years. His classes and the conversations we had were very enlightening. Without him, I would never have known or found my true passion and interest. I am grateful to him for giving me an opportunity to work in the Cisco Technical Research Center which gave me a wonderful, first, work experience.
    [Show full text]
  • Multicast Over TCP/IP HOWTO Multicast Over TCP/IP HOWTO
    Multicast over TCP/IP HOWTO Multicast over TCP/IP HOWTO Table of Contents Multicast over TCP/IP HOWTO.......................................................................................................................1 Juan−Mariano de Goyeneche <[email protected]>............................................................................1 1.Introduction. .........................................................................................................................................1 2.Multicast Explained..............................................................................................................................1 3.Kernel requirements and configuration................................................................................................1 4.The MBone...........................................................................................................................................1 5.Multicast applications...........................................................................................................................1 6.Multicast programming.........................................................................................................................2 7.The internals..........................................................................................................................................2 8.Routing Policies and Forwarding Techniques......................................................................................2 9.Multicast Transport Protocols...............................................................................................................2
    [Show full text]
  • Introduction to IP Multicast Routing
    Introduction to IP Multicast Routing by Chuck Semeria and Tom Maufer Abstract The first part of this paper describes the benefits of multicasting, the Multicast Backbone (MBONE), Class D addressing, and the operation of the Internet Group Management Protocol (IGMP). The second section explores a number of different algorithms that may potentially be employed by multicast routing protocols: - Flooding - Spanning Trees - Reverse Path Broadcasting (RPB) - Truncated Reverse Path Broadcasting (TRPB) - Reverse Path Multicasting (RPM) - Core-Based Trees The third part contains the main body of the paper. It describes how the previous algorithms are implemented in multicast routing protocols available today. - Distance Vector Multicast Routing Protocol (DVMRP) - Multicast OSPF (MOSPF) - Protocol-Independent Multicast (PIM) Introduction There are three fundamental types of IPv4 addresses: unicast, broadcast, and multicast. A unicast address is designed to transmit a packet to a single destination. A broadcast address is used to send a datagram to an entire subnetwork. A multicast address is designed to enable the delivery of datagrams to a set of hosts that have been configured as members of a multicast group in various scattered subnetworks. Multicasting is not connection oriented. A multicast datagram is delivered to destination group members with the same “best-effort” reliability as a standard unicast IP datagram. This means that a multicast datagram is not guaranteed to reach all members of the group, or arrive in the same order relative to the transmission of other packets. The only difference between a multicast IP packet and a unicast IP packet is the presence of a “group address” in the Destination Address field of the IP header.
    [Show full text]