We see how the ease of handling Linux network. You never know when need to use the command line or when the need to support graphical interface to iptables
Network now has become a need. Whether in the home or corporate environment, the network is one aspect to computing, without a doubt, necessary to perform the work. And with some help, operating system Linux can be a king of the network, both in terms of ease of use and security. However, that does not mean that the user level (and sometimes even users who are experts) do not need some assistance. Following tips will make your Linux network a bit more smoothly.
Take advantage of the file / etc / hosts
File is used to host a static host name and is a quick way to create a network shortcut. One of the first things you must do in the Linux machine is a machine to enter a different file / etc / hosts. Thus, you do not have to type the IP address. Writing on the file format is IP_ADDRESS NICKNAME. For example, if you perform backups on the machine with the IP address 192.19.1.1 enter: 192.168.1.1 backup. Now if you want to connect to the machine, for example by using the secure shell, you can just type ssh-v-l username backup
Keep the Unwanted Users with / etc / hosts.deny
File "host" who is helping hosts.deny file. With this file, you can control access based on client or server name. This is useful in many situations. You can block a domain that is in the blacklist so it will not be able to access your network or you can block that particular user can not access a machine. But however you use it, the format remains the same. Suppose, you want to block domain bad.domain.name. To do so, open the file / etc / hosts.deny (you'll need root permissions or sudo) and add: ALL: bad.domain.name
Use WICD to Handle Wireless Network
Linux has long experience with the major wireless networks. However, it has become the past. With the current distribution, detection wireless card is no longer difficult, The problem now is the encryption. Many of the Linux wireless tools have problems when encryption is used. However, WICD tool can overcome this. Now, connect to a wireless network encryption in WPA or WPA2 with no difficulty. Use WICD to reduce the difficulty you.
Download and Install Interface for iptables
Do not assume that just because using Linux, then you are safe. You still need some security. And the best security on Linux is iptables. The only problem with iptables is rather difficult (especially for new users) fortunately, there is a graphical interface to iptables. One of the best is a firestarter. Interface makes use iptables to be easy, so you do not spend more security because only lazy learning
Identify the Command-Line Tool
Must be admitted that if we use Linux, then a certain time you need to restart the network and does not have access to the GUI. In this case, the command / etc / rc.d / network restart will overcome your problem. Of course, it is not the only tool command-line network. You also need to know tools like dhclient, traceroute, samba, ping, and netstat.
Enter the DNS Server Direct Address
You may have experienced network problems that caused the loss of DNS server address. For that, enter the DNS server address directly to the file / etc / resolve.conf. The format is as follows: nameserver IP_ADDRESS, where IP_ADDRESS is the IP address of your DNS server. You can enter the DNS server as much as possible.
Antivirus Installation
If you run a mail server, and then have an antivirus is a must. While you are running Linux and your mail server 99.99% immune to the virus, it does not mean that the entire client download from the mail server you are also immune. Thus, the administrative tasks you will be much easier if you install antivirus like ClamAV, for example, to your Linux mail server. He will give you security and tranquility that is so your users stay safe.
Know How to configure the IP Address Manually
It is true, there are GUI tools to do this properly and also all the tool works very well. However, as the later you feel if it is long enough to set up operating system, no one has the tool to do the work in the reserve. One of the best backup tools in managing the network is the Linux command ipconfig. In addition to display the network card information, you can use the ipconfig command to configure the network card manually. This is done as follows:
/ sbin / ifconfig eth0 192.168.1.1 netmask 255.255.255.0 broadcast 192.168.1.255
Identify the file / etc / interfaces (Ubuntu) or / etc / sysconfig / network-scripts (Red Hat / Fedora)
This file contains information about the network card. As you can see in the image example, all interfaces in the set up for dhcp. If you are floating, the dhcp is required. However, what if you use the interface only in one location? For that, you can configure a permanent basis.
Does not Forget When set smbpasswd Samba
When the client or phone that comes with Samba as difficulty, it is usually because the username and password they have not been included with smbpasswd. If not done, then the user will not be able to perform authentication with the Samba server. When using smbpasswd to enter a new user, do not forget to use a switch-as follows: smbpasswd-a USERNAME. After pressing [Enter] you will be prompted to enter a user password. Note: you must have access to root (or sudo) to do this.
Network now has become a need. Whether in the home or corporate environment, the network is one aspect to computing, without a doubt, necessary to perform the work. And with some help, operating system Linux can be a king of the network, both in terms of ease of use and security. However, that does not mean that the user level (and sometimes even users who are experts) do not need some assistance. Following tips will make your Linux network a bit more smoothly.
Take advantage of the file / etc / hosts
File is used to host a static host name and is a quick way to create a network shortcut. One of the first things you must do in the Linux machine is a machine to enter a different file / etc / hosts. Thus, you do not have to type the IP address. Writing on the file format is IP_ADDRESS NICKNAME. For example, if you perform backups on the machine with the IP address 192.19.1.1 enter: 192.168.1.1 backup. Now if you want to connect to the machine, for example by using the secure shell, you can just type ssh-v-l username backup
Keep the Unwanted Users with / etc / hosts.deny
File "host" who is helping hosts.deny file. With this file, you can control access based on client or server name. This is useful in many situations. You can block a domain that is in the blacklist so it will not be able to access your network or you can block that particular user can not access a machine. But however you use it, the format remains the same. Suppose, you want to block domain bad.domain.name. To do so, open the file / etc / hosts.deny (you'll need root permissions or sudo) and add: ALL: bad.domain.name
Use WICD to Handle Wireless Network
Linux has long experience with the major wireless networks. However, it has become the past. With the current distribution, detection wireless card is no longer difficult, The problem now is the encryption. Many of the Linux wireless tools have problems when encryption is used. However, WICD tool can overcome this. Now, connect to a wireless network encryption in WPA or WPA2 with no difficulty. Use WICD to reduce the difficulty you.
Download and Install Interface for iptables
Do not assume that just because using Linux, then you are safe. You still need some security. And the best security on Linux is iptables. The only problem with iptables is rather difficult (especially for new users) fortunately, there is a graphical interface to iptables. One of the best is a firestarter. Interface makes use iptables to be easy, so you do not spend more security because only lazy learning
Identify the Command-Line Tool
Must be admitted that if we use Linux, then a certain time you need to restart the network and does not have access to the GUI. In this case, the command / etc / rc.d / network restart will overcome your problem. Of course, it is not the only tool command-line network. You also need to know tools like dhclient, traceroute, samba, ping, and netstat.
Enter the DNS Server Direct Address
You may have experienced network problems that caused the loss of DNS server address. For that, enter the DNS server address directly to the file / etc / resolve.conf. The format is as follows: nameserver IP_ADDRESS, where IP_ADDRESS is the IP address of your DNS server. You can enter the DNS server as much as possible.
Antivirus Installation
If you run a mail server, and then have an antivirus is a must. While you are running Linux and your mail server 99.99% immune to the virus, it does not mean that the entire client download from the mail server you are also immune. Thus, the administrative tasks you will be much easier if you install antivirus like ClamAV, for example, to your Linux mail server. He will give you security and tranquility that is so your users stay safe.
Know How to configure the IP Address Manually
It is true, there are GUI tools to do this properly and also all the tool works very well. However, as the later you feel if it is long enough to set up operating system, no one has the tool to do the work in the reserve. One of the best backup tools in managing the network is the Linux command ipconfig. In addition to display the network card information, you can use the ipconfig command to configure the network card manually. This is done as follows:
/ sbin / ifconfig eth0 192.168.1.1 netmask 255.255.255.0 broadcast 192.168.1.255
Identify the file / etc / interfaces (Ubuntu) or / etc / sysconfig / network-scripts (Red Hat / Fedora)
This file contains information about the network card. As you can see in the image example, all interfaces in the set up for dhcp. If you are floating, the dhcp is required. However, what if you use the interface only in one location? For that, you can configure a permanent basis.
Does not Forget When set smbpasswd Samba
When the client or phone that comes with Samba as difficulty, it is usually because the username and password they have not been included with smbpasswd. If not done, then the user will not be able to perform authentication with the Samba server. When using smbpasswd to enter a new user, do not forget to use a switch-as follows: smbpasswd-a USERNAME. After pressing [Enter] you will be prompted to enter a user password. Note: you must have access to root (or sudo) to do this.
Comments
Post a Comment