Release 7 Final Nethesis
Total Page:16
File Type:pdf, Size:1020Kb
NethServer Documentation Release 7 Final Nethesis Jul 05, 2021 Release notes 1 Release notes 7 3 1.1 Major changes on 2020-11-26......................................3 1.2 Major changes on 2020-05-05......................................4 1.3 Major changes on 2019-10-07......................................5 1.4 Major changes on 2018-12-17......................................5 1.5 Major changes on 2018-06-11......................................6 1.6 Major changes on 2017-10-26......................................6 1.7 Major changes on 2017-07-31......................................7 1.8 Major changes on 2017-01-30......................................7 1.9 Deprecated features and packages....................................8 1.10 Upgrading NethServer 6 to NethServer 7................................9 2 Installation 11 2.1 Minimum requirements......................................... 11 2.2 Installation types............................................. 11 2.3 Installing from ISO............................................ 12 2.4 Install on CentOS............................................ 15 2.5 Next steps................................................ 15 3 Accessing the Server Manager 17 3.1 Login................................................... 17 3.2 Hints................................................... 17 3.3 Change the current password....................................... 18 3.4 Logout.................................................. 18 4 Subscription 19 4.1 Registering the system.......................................... 19 4.2 Removing a subscription......................................... 20 5 Base system 21 5.1 Network................................................. 22 5.2 Services.................................................. 25 5.3 Certificates................................................ 25 5.4 Storage.................................................. 26 5.5 Trusted networks............................................. 26 5.6 SSH.................................................... 26 5.7 Disk analyzer............................................... 27 i 5.8 Settings.................................................. 27 5.9 Logs................................................... 29 6 Applications 31 6.1 Shortcuts................................................. 31 6.2 Removing applications.......................................... 31 7 Authentication 33 7.1 Role delegation.............................................. 33 7.2 Two-factor authentication (2FA)..................................... 34 8 Software center 37 8.1 Applications installation......................................... 37 8.2 Software updates............................................. 37 9 Users and groups 41 9.1 Account providers............................................ 41 9.2 Users................................................... 46 9.3 Groups.................................................. 47 9.4 Admin account.............................................. 47 9.5 Password management.......................................... 47 9.6 Import and delete accounts from plain-text files............................. 49 10 DNS 51 10.1 Hosts................................................... 51 10.2 Alias................................................... 52 10.3 Domain redirection............................................ 52 11 DHCP and PXE server 53 11.1 DHCP configuration........................................... 53 11.2 Host IP reservation............................................ 54 11.3 Boot from network configuration.................................... 54 12 TLS policy 57 12.1 Policy 2020-05-10............................................ 57 12.2 Policy 2018-10-01............................................ 57 12.3 Policy 2018-06-21............................................ 58 12.4 Policy 2018-03-30............................................ 58 12.5 Default upstream policy......................................... 59 13 Backup 61 13.1 Settings.................................................. 61 13.2 Selective restore of files......................................... 63 14 Web server 65 14.1 Web server dashboard.......................................... 65 14.2 Settings.................................................. 66 14.3 Virtual hosts............................................... 66 14.4 Reverse proxy.............................................. 67 14.5 FTP server................................................ 69 15 Email 71 15.1 Domains................................................. 72 15.2 Filter................................................... 73 15.3 Mailboxes................................................ 76 15.4 Addresses................................................. 78 ii 15.5 Connectors................................................ 79 15.6 Synchronization............................................. 79 15.7 Queue................................................... 80 15.8 Relay................................................... 80 15.9 Settings.................................................. 82 15.10 Logs................................................... 82 15.11 Client configuration........................................... 83 15.12 Kerberos-based authentication...................................... 84 16 Webmail 85 16.1 Plugins.................................................. 85 16.2 Skins................................................... 86 16.3 Access.................................................. 86 16.4 Removing................................................ 87 17 Shared folders 89 17.1 Requirements............................................... 89 17.2 Authorizations.............................................. 90 17.3 Network access.............................................. 90 17.4 Network recycle bin........................................... 90 17.5 Hide a shared folder........................................... 91 17.6 Home share................................................ 91 17.7 Change resource permissions from Windows clients.......................... 91 17.8 Administrative access.......................................... 92 17.9 Auditing................................................. 92 18 Nextcloud 93 18.1 Installation................................................ 93 18.2 Configuration............................................... 94 19 Team chat (Mattermost) 97 19.1 Configuration............................................... 97 19.2 Authentication.............................................. 98 20 Chat 99 20.1 Configuration............................................... 99 20.2 Administrators.............................................. 100 20.3 Clients.................................................. 100 21 Antivirus 103 22 Firewall 105 22.1 Apply and revert............................................. 105 22.2 Policy................................................... 106 22.3 Settings.................................................. 106 22.4 Rules................................................... 107 22.5 WAN................................................... 109 22.6 Port forward............................................... 110 22.7 SNAT 1:1................................................. 112 22.8 Traffic shaping.............................................. 112 22.9 Firewall objects.............................................. 113 22.10 Connections............................................... 114 23 Web proxy 115 23.1 Authenticated mode........................................... 115 iii 23.2 Client configuration........................................... 116 23.3 SSL Proxy................................................ 116 23.4 Bypass.................................................. 116 23.5 Priority and divert rules......................................... 117 23.6 Content filter............................................... 117 23.7 Report.................................................. 118 23.8 Cache................................................... 118 23.9 Safe ports................................................. 119 23.10 Logs................................................... 119 24 Fail2ban 121 24.1 Configuration............................................... 121 24.2 Unban IP................................................. 122 24.3 Command line tools........................................... 122 25 VPN 125 25.1 OpenVPN................................................ 125 25.2 IPsec................................................... 128 26 IPS (Suricata) 129 26.1 Rule categories.............................................. 129 26.2 Bypass.................................................. 132 26.3 EveBox.................................................. 132 27 Threat shield 133 27.1 Configuration............................................... 133 27.2 Incident response............................................. 134 27.3 Statistics................................................. 134 27.4 Geo-blocking............................................... 134 28 Bandwidth monitor 137 28.1 Dashboard................................................ 137 28.2 Settings.................................................. 138 28.3 Logs................................................... 138 29 Hotspot (Dedalo) 139 29.1 How it works?.............................................. 139 29.2 How to install it............................................. 140 29.3 Configuration............................................... 140 30 FreePBX 143 30.1