Nethserver Documentation Versión 7 Final

Nethserver Documentation Versión 7 Final

NethServer Documentation Versión 7 Final Nethesis 22 de septiembre de 2021 Release notes 1. Notas de lanzamiento 7 3 1.1. Major changes on 2020-11-26......................................3 1.2. Major changes on 2020-05-05......................................4 1.3. Major changes on 2019-10-07......................................5 1.4. Major changes on 2018-12-17......................................5 1.5. Major changes on 2018-06-11......................................6 1.6. Major changes on 2017-10-26......................................6 1.7. Major changes on 2017-07-31......................................7 1.8. Major changes on 2017-01-30......................................7 1.9. Deprecated features and packages....................................8 1.10. Actualizando NethServer 6 a NethServer 7...............................9 2. Tipos de instalación 11 2.1. Requerimientos mínimos......................................... 11 2.2. Tipos de instalación........................................... 11 2.3. Instalación desde ISO.......................................... 12 2.4. Instalar en CentOS............................................ 15 2.5. Próximos pasos.............................................. 15 3. Accessing the Server Manager 17 3.1. Login................................................... 17 3.2. Hints................................................... 17 3.3. Change the current password....................................... 18 3.4. Logout.................................................. 18 4. Subscription 19 4.1. Registering the system.......................................... 19 4.2. Removing a subscription......................................... 20 5. Base system 21 5.1. Network................................................. 22 5.2. Services.................................................. 25 5.3. Certificates................................................ 25 5.4. Storage.................................................. 26 5.5. Trusted networks............................................. 26 5.6. SSH.................................................... 26 5.7. Disk analyzer............................................... 27 I 5.8. Settings.................................................. 27 5.9. Logs................................................... 29 6. Applications 31 6.1. Shortcuts................................................. 31 6.2. Removing applications.......................................... 31 7. Authentication 33 7.1. Role delegation.............................................. 33 7.2. Two-factor authentication (2FA)..................................... 34 8. Centro de software 37 8.1. Applications installation......................................... 37 8.2. Actualizaciones de software....................................... 37 9. Usuarios y grupos 41 9.1. Proveedores de cuentas.......................................... 41 9.2. Usuarios................................................. 46 9.3. Grupos.................................................. 47 9.4. Cuenta de administrador......................................... 47 9.5. Gestión de contraseñas.......................................... 47 9.6. Import and delete accounts from plain-text files............................. 49 10. DNS 53 10.1. Hosts................................................... 53 10.2. Alias................................................... 54 10.3. Domain redirection............................................ 54 11. Servidor DHCP y PXE 55 11.1. Configuración DHCP........................................... 55 11.2. Reserva IP del host............................................ 56 11.3. Arranque desde la configuración de red................................. 56 12. Política de TLS 59 12.1. Policy 2020-05-10............................................ 59 12.2. Policy 2018-10-01............................................ 59 12.3. Policy 2018-06-21............................................ 60 12.4. Política 2018-03-30........................................... 60 12.5. Política de subida predeterminada.................................... 61 13. Copia de seguridad 63 13.1. Settings.................................................. 63 13.2. Selective restore of files......................................... 65 14. Web server 67 14.1. Web server dashboard.......................................... 67 14.2. Settings.................................................. 68 14.3. Virtual hosts............................................... 68 14.4. Reverse proxy.............................................. 69 14.5. FTP server................................................ 71 15. Correo electrónico 73 15.1. Dominios................................................. 74 15.2. Filtro................................................... 75 15.3. Mailboxes................................................ 78 15.4. Addresses................................................. 80 II 15.5. Connectors................................................ 81 15.6. Synchronization............................................. 81 15.7. Queue................................................... 82 15.8. Relay................................................... 82 15.9. Settings.................................................. 84 15.10.Logs................................................... 84 15.11.Configuración del cliente......................................... 85 15.12.Kerberos-based authentication...................................... 86 16. Webmail 87 16.1. Plugins.................................................. 87 16.2. Acceso.................................................. 88 16.3. Quitar................................................... 88 17. Carpetas compartidas 89 17.1. Requirements............................................... 89 17.2. Authorizations.............................................. 90 17.3. Network access.............................................. 90 17.4. Network recycle bin........................................... 90 17.5. Hide a shared folder........................................... 91 17.6. Home share................................................ 91 17.7. Change resource permissions from Windows clients.......................... 91 17.8. Administrative access.......................................... 92 17.9. Auditing................................................. 92 18. Nextcloud 93 18.1. Instalación................................................ 93 18.2. Configuration............................................... 94 19. Team chat (Mattermost) 97 19.1. Configuration............................................... 97 19.2. Authentication.............................................. 98 20. Chat 99 20.1. Configuration............................................... 99 20.2. Administradores............................................. 100 20.3. Clients.................................................. 100 21. Antivirus 103 22. Firewall 105 22.1. Apply and revert............................................. 105 22.2. Política.................................................. 106 22.3. Settings.................................................. 106 22.4. Reglas.................................................. 107 22.5. WAN................................................... 109 22.6. Reenviar puerto.............................................. 110 22.7. SNAT 1:1................................................. 112 22.8. Conformación del tráfico......................................... 112 22.9. Objetos del cortafuego.......................................... 113 22.10.Connections............................................... 114 23. Proxy web 115 23.1. Authenticated mode........................................... 115 23.2. Configuración del cliente......................................... 116 III 23.3. Proxy SSL................................................ 116 23.4. Bypass.................................................. 116 23.5. Priority and divert rules......................................... 117 23.6. Content filter............................................... 117 23.7. Reporte.................................................. 118 23.8. Cache................................................... 118 23.9. Puertos seguros.............................................. 119 23.10.Logs................................................... 119 24. Fail2ban 121 24.1. Configuration............................................... 121 24.2. Unban IP................................................. 122 24.3. Command line tools........................................... 122 25. VPN 125 25.1. OpenVPN................................................ 125 25.2. IPsec................................................... 128 26. IPS (Suricata) 129 26.1. Rule categories.............................................. 129 26.2. Bypass.................................................. 132 26.3. EveBox.................................................. 132 27. Threat shield 133 27.1. Configuration............................................... 133 27.2. Incident response............................................. 134 27.3. Statistics................................................. 134 27.4. Geo-blocking............................................... 134 28. Monitor de ancho de banda 137 28.1. Dashboard................................................ 137 28.2. Settings.................................................. 138 28.3. Logs................................................... 138 29. Punto de Acceso (Dedalo) 139 29.1. Como

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    302 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us