Nethserver Documentation Release 7 Final
Total Page:16
File Type:pdf, Size:1020Kb
NethServer Documentation Release 7 Final Nethesis Sep 22, 2021 Release notes 1 Release notes 7 3 1.1 Major changes on 2020-11-26......................................3 1.2 Major changes on 2020-05-05......................................4 1.3 Major changes on 2019-10-07......................................5 1.4 Major changes on 2018-12-17......................................5 1.5 Major changes on 2018-06-11......................................6 1.6 Major changes on 2017-10-26......................................6 1.7 Major changes on 2017-07-31......................................7 1.8 Major changes on 2017-01-30......................................7 1.9 Deprecated features and packages....................................8 1.10 Upgrading NethServer 6 to NethServer 7................................9 2 Installation 11 2.1 Minimum requirements......................................... 11 2.2 Installation types............................................. 11 2.3 Installing from ISO............................................ 12 2.4 Install on CentOS............................................ 15 2.5 Next steps................................................ 15 3 Accessing the Server Manager 17 3.1 Login................................................... 17 3.2 Hints................................................... 17 3.3 Change the current password....................................... 18 3.4 Logout.................................................. 18 4 Subscription 19 4.1 Registering the system.......................................... 19 4.2 Removing a subscription......................................... 20 5 Base system 21 5.1 Network................................................. 22 5.2 Services.................................................. 25 5.3 Certificates................................................ 25 5.4 Storage.................................................. 26 5.5 Trusted networks............................................. 26 5.6 SSH.................................................... 26 5.7 Disk analyzer............................................... 27 i 5.8 Settings.................................................. 27 5.9 Logs................................................... 29 6 Applications 31 6.1 Shortcuts................................................. 31 6.2 Removing applications.......................................... 31 7 Authentication 33 7.1 Role delegation.............................................. 33 7.2 Two-factor authentication (2FA)..................................... 34 8 Software center 37 8.1 Applications installation......................................... 37 8.2 Software updates............................................. 37 9 Users and groups 41 9.1 Account providers............................................ 41 9.2 Users................................................... 46 9.3 Groups.................................................. 47 9.4 Admin account.............................................. 47 9.5 Password management.......................................... 47 9.6 Import and delete accounts from plain-text files............................. 49 10 DNS 51 10.1 Hosts................................................... 51 10.2 Alias................................................... 52 10.3 Domain redirection............................................ 52 11 DHCP and PXE server 53 11.1 DHCP configuration........................................... 53 11.2 Host IP reservation............................................ 54 11.3 Boot from network configuration.................................... 54 12 TLS policy 57 12.1 Policy 2020-05-10............................................ 57 12.2 Policy 2018-10-01............................................ 57 12.3 Policy 2018-06-21............................................ 58 12.4 Policy 2018-03-30............................................ 58 12.5 Default upstream policy......................................... 59 13 Backup 61 13.1 Settings.................................................. 61 13.2 Selective restore of files......................................... 63 14 Web server 65 14.1 Web server dashboard.......................................... 65 14.2 Settings.................................................. 66 14.3 Virtual hosts............................................... 66 14.4 Reverse proxy.............................................. 67 14.5 FTP server................................................ 69 15 Email 71 15.1 Domains................................................. 72 15.2 Filter................................................... 73 15.3 Mailboxes................................................ 76 15.4 Addresses................................................. 78 ii 15.5 Connectors................................................ 79 15.6 Synchronization............................................. 79 15.7 Queue................................................... 80 15.8 Relay................................................... 80 15.9 Settings.................................................. 82 15.10 Logs................................................... 82 15.11 Client configuration........................................... 83 15.12 Kerberos-based authentication...................................... 84 16 Webmail 85 16.1 Plugins.................................................. 85 16.2 Access.................................................. 86 16.3 Removing................................................ 86 17 Shared folders 87 17.1 Requirements............................................... 87 17.2 Authorizations.............................................. 88 17.3 Network access.............................................. 88 17.4 Network recycle bin........................................... 88 17.5 Hide a shared folder........................................... 89 17.6 Home share................................................ 89 17.7 Change resource permissions from Windows clients.......................... 89 17.8 Administrative access.......................................... 90 17.9 Auditing................................................. 90 18 Nextcloud 91 18.1 Installation................................................ 91 18.2 Configuration............................................... 92 19 Team chat (Mattermost) 95 19.1 Configuration............................................... 95 19.2 Authentication.............................................. 96 20 Chat 97 20.1 Configuration............................................... 97 20.2 Administrators.............................................. 98 20.3 Clients.................................................. 98 21 Antivirus 101 22 Firewall 103 22.1 Apply and revert............................................. 103 22.2 Policy................................................... 104 22.3 Settings.................................................. 104 22.4 Rules................................................... 105 22.5 WAN................................................... 107 22.6 Port forward............................................... 108 22.7 SNAT 1:1................................................. 110 22.8 Traffic shaping.............................................. 110 22.9 Firewall objects.............................................. 111 22.10 Connections............................................... 112 23 Web proxy 113 23.1 Authenticated mode........................................... 113 23.2 Client configuration........................................... 114 iii 23.3 SSL Proxy................................................ 114 23.4 Bypass.................................................. 114 23.5 Priority and divert rules......................................... 115 23.6 Content filter............................................... 115 23.7 Report.................................................. 116 23.8 Cache................................................... 116 23.9 Safe ports................................................. 117 23.10 Logs................................................... 117 24 Fail2ban 119 24.1 Configuration............................................... 119 24.2 Unban IP................................................. 120 24.3 Command line tools........................................... 120 25 VPN 123 25.1 OpenVPN................................................ 123 25.2 IPsec................................................... 126 26 IPS (Suricata) 127 26.1 Rule categories.............................................. 127 26.2 Bypass.................................................. 130 26.3 EveBox.................................................. 130 27 Threat shield 131 27.1 Configuration............................................... 131 27.2 Incident response............................................. 132 27.3 Statistics................................................. 132 27.4 Geo-blocking............................................... 132 28 Bandwidth monitor 135 28.1 Dashboard................................................ 135 28.2 Settings.................................................. 136 28.3 Logs................................................... 136 29 Hotspot (Dedalo) 137 29.1 How it works?.............................................. 137 29.2 How to install it............................................. 138 29.3 Configuration............................................... 138 30 FreePBX 141 30.1 Installation................................................ 141 30.2