Nethserver Documentation Release 7 Final

Nethserver Documentation Release 7 Final

NethServer Documentation Release 7 Final Nethesis Sep 22, 2021 Release notes 1 Release notes 7 3 1.1 Major changes on 2020-11-26......................................3 1.2 Major changes on 2020-05-05......................................4 1.3 Major changes on 2019-10-07......................................5 1.4 Major changes on 2018-12-17......................................5 1.5 Major changes on 2018-06-11......................................6 1.6 Major changes on 2017-10-26......................................6 1.7 Major changes on 2017-07-31......................................7 1.8 Major changes on 2017-01-30......................................7 1.9 Deprecated features and packages....................................8 1.10 Upgrading NethServer 6 to NethServer 7................................9 2 Installation 11 2.1 Minimum requirements......................................... 11 2.2 Installation types............................................. 11 2.3 Installing from ISO............................................ 12 2.4 Install on CentOS............................................ 15 2.5 Next steps................................................ 15 3 Accessing the Server Manager 17 3.1 Login................................................... 17 3.2 Hints................................................... 17 3.3 Change the current password....................................... 18 3.4 Logout.................................................. 18 4 Subscription 19 4.1 Registering the system.......................................... 19 4.2 Removing a subscription......................................... 20 5 Base system 21 5.1 Network................................................. 22 5.2 Services.................................................. 25 5.3 Certificates................................................ 25 5.4 Storage.................................................. 26 5.5 Trusted networks............................................. 26 5.6 SSH.................................................... 26 5.7 Disk analyzer............................................... 27 i 5.8 Settings.................................................. 27 5.9 Logs................................................... 29 6 Applications 31 6.1 Shortcuts................................................. 31 6.2 Removing applications.......................................... 31 7 Authentication 33 7.1 Role delegation.............................................. 33 7.2 Two-factor authentication (2FA)..................................... 34 8 Software center 37 8.1 Applications installation......................................... 37 8.2 Software updates............................................. 37 9 Users and groups 41 9.1 Account providers............................................ 41 9.2 Users................................................... 46 9.3 Groups.................................................. 47 9.4 Admin account.............................................. 47 9.5 Password management.......................................... 47 9.6 Import and delete accounts from plain-text files............................. 49 10 DNS 51 10.1 Hosts................................................... 51 10.2 Alias................................................... 52 10.3 Domain redirection............................................ 52 11 DHCP and PXE server 53 11.1 DHCP configuration........................................... 53 11.2 Host IP reservation............................................ 54 11.3 Boot from network configuration.................................... 54 12 TLS policy 57 12.1 Policy 2020-05-10............................................ 57 12.2 Policy 2018-10-01............................................ 57 12.3 Policy 2018-06-21............................................ 58 12.4 Policy 2018-03-30............................................ 58 12.5 Default upstream policy......................................... 59 13 Backup 61 13.1 Settings.................................................. 61 13.2 Selective restore of files......................................... 63 14 Web server 65 14.1 Web server dashboard.......................................... 65 14.2 Settings.................................................. 66 14.3 Virtual hosts............................................... 66 14.4 Reverse proxy.............................................. 67 14.5 FTP server................................................ 69 15 Email 71 15.1 Domains................................................. 72 15.2 Filter................................................... 73 15.3 Mailboxes................................................ 76 15.4 Addresses................................................. 78 ii 15.5 Connectors................................................ 79 15.6 Synchronization............................................. 79 15.7 Queue................................................... 80 15.8 Relay................................................... 80 15.9 Settings.................................................. 82 15.10 Logs................................................... 82 15.11 Client configuration........................................... 83 15.12 Kerberos-based authentication...................................... 84 16 Webmail 85 16.1 Plugins.................................................. 85 16.2 Access.................................................. 86 16.3 Removing................................................ 86 17 Shared folders 87 17.1 Requirements............................................... 87 17.2 Authorizations.............................................. 88 17.3 Network access.............................................. 88 17.4 Network recycle bin........................................... 88 17.5 Hide a shared folder........................................... 89 17.6 Home share................................................ 89 17.7 Change resource permissions from Windows clients.......................... 89 17.8 Administrative access.......................................... 90 17.9 Auditing................................................. 90 18 Nextcloud 91 18.1 Installation................................................ 91 18.2 Configuration............................................... 92 19 Team chat (Mattermost) 95 19.1 Configuration............................................... 95 19.2 Authentication.............................................. 96 20 Chat 97 20.1 Configuration............................................... 97 20.2 Administrators.............................................. 98 20.3 Clients.................................................. 98 21 Antivirus 101 22 Firewall 103 22.1 Apply and revert............................................. 103 22.2 Policy................................................... 104 22.3 Settings.................................................. 104 22.4 Rules................................................... 105 22.5 WAN................................................... 107 22.6 Port forward............................................... 108 22.7 SNAT 1:1................................................. 110 22.8 Traffic shaping.............................................. 110 22.9 Firewall objects.............................................. 111 22.10 Connections............................................... 112 23 Web proxy 113 23.1 Authenticated mode........................................... 113 23.2 Client configuration........................................... 114 iii 23.3 SSL Proxy................................................ 114 23.4 Bypass.................................................. 114 23.5 Priority and divert rules......................................... 115 23.6 Content filter............................................... 115 23.7 Report.................................................. 116 23.8 Cache................................................... 116 23.9 Safe ports................................................. 117 23.10 Logs................................................... 117 24 Fail2ban 119 24.1 Configuration............................................... 119 24.2 Unban IP................................................. 120 24.3 Command line tools........................................... 120 25 VPN 123 25.1 OpenVPN................................................ 123 25.2 IPsec................................................... 126 26 IPS (Suricata) 127 26.1 Rule categories.............................................. 127 26.2 Bypass.................................................. 130 26.3 EveBox.................................................. 130 27 Threat shield 131 27.1 Configuration............................................... 131 27.2 Incident response............................................. 132 27.3 Statistics................................................. 132 27.4 Geo-blocking............................................... 132 28 Bandwidth monitor 135 28.1 Dashboard................................................ 135 28.2 Settings.................................................. 136 28.3 Logs................................................... 136 29 Hotspot (Dedalo) 137 29.1 How it works?.............................................. 137 29.2 How to install it............................................. 138 29.3 Configuration............................................... 138 30 FreePBX 141 30.1 Installation................................................ 141 30.2

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    300 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us