Release 7 Final Nethesis

Release 7 Final Nethesis

NethServer Documentation Release 7 Final Nethesis Jul 05, 2021 Release notes 1 Release notes 7 3 1.1 Major changes on 2020-11-26......................................3 1.2 Major changes on 2020-05-05......................................4 1.3 Major changes on 2019-10-07......................................5 1.4 Major changes on 2018-12-17......................................5 1.5 Major changes on 2018-06-11......................................6 1.6 Major changes on 2017-10-26......................................6 1.7 Major changes on 2017-07-31......................................7 1.8 Major changes on 2017-01-30......................................7 1.9 Deprecated features and packages....................................8 1.10 Upgrading NethServer 6 to NethServer 7................................9 2 Installation 11 2.1 Minimum requirements......................................... 11 2.2 Installation types............................................. 11 2.3 Installing from ISO............................................ 12 2.4 Install on CentOS............................................ 15 2.5 Next steps................................................ 15 3 Accessing the Server Manager 17 3.1 Login................................................... 17 3.2 Hints................................................... 17 3.3 Change the current password....................................... 18 3.4 Logout.................................................. 18 4 Subscription 19 4.1 Registering the system.......................................... 19 4.2 Removing a subscription......................................... 20 5 Base system 21 5.1 Network................................................. 22 5.2 Services.................................................. 25 5.3 Certificates................................................ 25 5.4 Storage.................................................. 26 5.5 Trusted networks............................................. 26 5.6 SSH.................................................... 26 5.7 Disk analyzer............................................... 27 i 5.8 Settings.................................................. 27 5.9 Logs................................................... 29 6 Applications 31 6.1 Shortcuts................................................. 31 6.2 Removing applications.......................................... 31 7 Authentication 33 7.1 Role delegation.............................................. 33 7.2 Two-factor authentication (2FA)..................................... 34 8 Software center 37 8.1 Applications installation......................................... 37 8.2 Software updates............................................. 37 9 Users and groups 41 9.1 Account providers............................................ 41 9.2 Users................................................... 46 9.3 Groups.................................................. 47 9.4 Admin account.............................................. 47 9.5 Password management.......................................... 47 9.6 Import and delete accounts from plain-text files............................. 49 10 DNS 51 10.1 Hosts................................................... 51 10.2 Alias................................................... 52 10.3 Domain redirection............................................ 52 11 DHCP and PXE server 53 11.1 DHCP configuration........................................... 53 11.2 Host IP reservation............................................ 54 11.3 Boot from network configuration.................................... 54 12 TLS policy 57 12.1 Policy 2020-05-10............................................ 57 12.2 Policy 2018-10-01............................................ 57 12.3 Policy 2018-06-21............................................ 58 12.4 Policy 2018-03-30............................................ 58 12.5 Default upstream policy......................................... 59 13 Backup 61 13.1 Settings.................................................. 61 13.2 Selective restore of files......................................... 63 14 Web server 65 14.1 Web server dashboard.......................................... 65 14.2 Settings.................................................. 66 14.3 Virtual hosts............................................... 66 14.4 Reverse proxy.............................................. 67 14.5 FTP server................................................ 69 15 Email 71 15.1 Domains................................................. 72 15.2 Filter................................................... 73 15.3 Mailboxes................................................ 76 15.4 Addresses................................................. 78 ii 15.5 Connectors................................................ 79 15.6 Synchronization............................................. 79 15.7 Queue................................................... 80 15.8 Relay................................................... 80 15.9 Settings.................................................. 82 15.10 Logs................................................... 82 15.11 Client configuration........................................... 83 15.12 Kerberos-based authentication...................................... 84 16 Webmail 85 16.1 Plugins.................................................. 85 16.2 Skins................................................... 86 16.3 Access.................................................. 86 16.4 Removing................................................ 87 17 Shared folders 89 17.1 Requirements............................................... 89 17.2 Authorizations.............................................. 90 17.3 Network access.............................................. 90 17.4 Network recycle bin........................................... 90 17.5 Hide a shared folder........................................... 91 17.6 Home share................................................ 91 17.7 Change resource permissions from Windows clients.......................... 91 17.8 Administrative access.......................................... 92 17.9 Auditing................................................. 92 18 Nextcloud 93 18.1 Installation................................................ 93 18.2 Configuration............................................... 94 19 Team chat (Mattermost) 97 19.1 Configuration............................................... 97 19.2 Authentication.............................................. 98 20 Chat 99 20.1 Configuration............................................... 99 20.2 Administrators.............................................. 100 20.3 Clients.................................................. 100 21 Antivirus 103 22 Firewall 105 22.1 Apply and revert............................................. 105 22.2 Policy................................................... 106 22.3 Settings.................................................. 106 22.4 Rules................................................... 107 22.5 WAN................................................... 109 22.6 Port forward............................................... 110 22.7 SNAT 1:1................................................. 112 22.8 Traffic shaping.............................................. 112 22.9 Firewall objects.............................................. 113 22.10 Connections............................................... 114 23 Web proxy 115 23.1 Authenticated mode........................................... 115 iii 23.2 Client configuration........................................... 116 23.3 SSL Proxy................................................ 116 23.4 Bypass.................................................. 116 23.5 Priority and divert rules......................................... 117 23.6 Content filter............................................... 117 23.7 Report.................................................. 118 23.8 Cache................................................... 118 23.9 Safe ports................................................. 119 23.10 Logs................................................... 119 24 Fail2ban 121 24.1 Configuration............................................... 121 24.2 Unban IP................................................. 122 24.3 Command line tools........................................... 122 25 VPN 125 25.1 OpenVPN................................................ 125 25.2 IPsec................................................... 128 26 IPS (Suricata) 129 26.1 Rule categories.............................................. 129 26.2 Bypass.................................................. 132 26.3 EveBox.................................................. 132 27 Threat shield 133 27.1 Configuration............................................... 133 27.2 Incident response............................................. 134 27.3 Statistics................................................. 134 27.4 Geo-blocking............................................... 134 28 Bandwidth monitor 137 28.1 Dashboard................................................ 137 28.2 Settings.................................................. 138 28.3 Logs................................................... 138 29 Hotspot (Dedalo) 139 29.1 How it works?.............................................. 139 29.2 How to install it............................................. 140 29.3 Configuration............................................... 140 30 FreePBX 143 30.1

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    302 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us