O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Learning RHEL Networking

Book Description

Gain Linux administration skills by learning new networking concepts in Red Hat Enterprise Linux 7

In Detail

Red Hat Enterprise Linux (RHEL) is the most popular Linux distribution currently being used and can be deployed on many platforms. Enterprises that have a large number of systems need to be interconnected, configured, and managed effectively. RHEL networking lets you accomplish these tasks easily.

This is a highly-detailed guide to help with your deployments on RHEL 7 or CentOS 7. This book, based on RHEL 7.1, will introduce to you the fundamentals of networking your systems. You will learn the use of new consistent names to identify your network cards. Soon, you will move on to configuring the basic plumbing of your network, setting up time, network address assignment, and name resolution. Last, the focus moves to configuring the new kernel-based iSCSI target services on RHEL 7 and using the service to host storage area networks.

What You Will Learn

  • Master the new time daemon, chronyd, and understand why it is used over the more traditional NTP
  • Delve inside the workings of the kernel-based iSCSI target that shares disks on your network
  • Share data with your Windows network and make use of their users and groups for authentication, without the need to replace your existing infrastructure
  • Shield your users and data from the ever-present dangers that exist on the Internet by implementing and understanding SELinux
  • Deploy Apache 2.4 and make use of its new features
  • Provide saleable and fault-tolerant file systems with btrfs, more quickly than you could ever imagine
  • Protect your investment using the new firewalld process, enabling you to deploy firewall changes while the firewall is in place

Downloading the example code for this book. You can download the example code files for all Packt books you have purchased from your account at http://www.PacktPub.com. If you purchased this book elsewhere, you can visit http://www.PacktPub.com/support and register to have the files e-mailed directly to you.

Table of Contents

  1. Learning RHEL Networking
    1. Table of Contents
    2. Learning RHEL Networking
    3. Credits
    4. About the Author
    5. About the Reviewers
    6. www.PacktPub.com
      1. Support files, eBooks, discount offers, and more
        1. Why subscribe?
        2. Free access for Packt account holders
    7. Preface
      1. What this book covers
      2. What you need for this book
      3. Who this book is for
      4. Conventions
      5. Reader feedback
      6. Customer support
        1. Errata
        2. Piracy
        3. Questions
    8. 1. Introducing Enterprise Linux 7
      1. Red Hat Enterprise Linux
      2. CentOS
      3. Fedora
      4. Determining your distribution and version
        1. The /etc/system-release file
        2. The /etc/issue file
        3. Using lsb_release
        4. Determining the kernel version
      5. Summary
    9. 2. Configuring Network Settings
      1. Elevating privileges
        1. The su command
        2. Delegating with the sudo command
      2. Using ip and hostnamectl
        1. Consistent naming for network devices
        2. A real-life network device naming example
        3. Disabling consistent network device naming
        4. Using the ip command to display configurations
        5. Using the ip command to implement configuration changes
        6. Persisting network configuration changes
        7. Configuring the RHEL 7 hostname with hostnamectl
      3. Introduction to the Red Hat NetworkManager
      4. Interacting with the NetworkManager using the Control Center
      5. Adding a new profile with the Control Center
      6. Interacting with the NetworkManager using nmtui
      7. Extreme interaction with NetworkManager using nmcli
      8. Summary
    10. 3. Configuring Key Network Services
      1. Domain Name System
        1. Installing and configuring a Caching Only DNS server
        2. Configuring clients to use this server
        3. Configuring the DNS zone
          1. Referencing the zone from /etc/named.conf
          2. Creating the zone file
      2. Configuring a DHCP server
      3. Configuring time services on RHEL 7
        1. Implementing chronyd
        2. Implementing ntpd
        3. Implementing PTP on RHEL 7
      4. Implementing e-mail delivery on RHEL 7
        1. Adding an MX record to the DNS server
      5. Summary
    11. 4. Implementing iSCSI SANs
      1. The iSCSI target (server)
      2. Managing logical volumes with LVM
        1. Partitioning the disk
        2. Creating the physical volume
        3. Creating the volume group
        4. Creating logical volumes
      3. Installing the targetd service and targetcli tools
      4. Managing iSCSI targets with targetcli
        1. Creating storage backstores
      5. Creating iSCSI targets
        1. Adding LUNS to the iSCSI target
        2. Adding ACLS
      6. Working with the iSCSI Initiator
      7. Summary
    12. 5. Implementing btrfs
      1. Overview of btrfs
      2. Overview of the lab environment
      3. Installing btrfs
      4. Creating the btrfs filesystem
      5. The Copy-On-Write technology
      6. Resizing btrfs filesystems
      7. Adding devices to the btrfs filesystem
        1. Volume management the old way
        2. Volume management with btrfs
      8. Balancing the btrfs filesystem
      9. Mounting multidisk btrfs volumes from /etc/fstab
        1. Creating a RAID1 mirror
      10. Using btrfs snapshots
      11. Optimizing btrfs for solid state drives
      12. Managing snapshots with snapper
      13. Summary
    13. 6. File Sharing with NFS
      1. An overview of NFS
      2. Overview of the lab environment
      3. The NFS server configuration
        1. Simple exports
        2. Advanced exports
        3. Pseudo-root
      4. Using exportfs to create temporary exports
      5. Hosting NFSv4 behind a firewall
      6. Hosting NFSv3 behind a firewall
        1. Diagnosing NFSv3 issues
        2. Using static ports for NFSv3
        3. Configuring the NFS client
      7. Auto-mounting NFS with autofs
      8. Summary
    14. 7. Implementing Windows Shares with Samba 4
      1. An overview of Samba and Samba services
      2. An overview of the lab environment
      3. Configuring time and DNS
      4. Managing Samba services
      5. The Samba client on RHEL 7
      6. Configuring file shares in Samba
      7. Troubleshooting Samba
      8. Summary
    15. 8. Integrating RHEL 7 into Microsoft Active Directory Domains
      1. Overview of identity management
      2. An overview of the lab environment
      3. Preparing to join an Active Directory domain
      4. Using realm to manage domain enrolment
      5. Logging on to RHEL 7 using Active Directory credentials
      6. User and group management with adcli
        1. Listing the Active Directory information
        2. Creating Active Directory users
        3. Creating Active Directory groups
        4. Managing the Active Directory group membership
      7. Delegating Active Directory accounts with sudo
      8. Leaving a domain
      9. Understanding Active Directory as an identity provider for sssd
        1. Configuring NSS
        2. Configuring PAM
        3. Configuring Kerberos
        4. Configuring SSSD
      10. Summary
    16. 9. Deploying the Apache HTTPD Server
      1. Configuring the httpd service
        1. Installing Apache 2.4
        2. The configuration
        3. Configuring the DocumentRoot directory
      2. Controlling the Apache web service
        1. Setting up the server name
        2. Setting up a custom error page
      3. Loading modules
      4. Virtual servers
        1. Name-based
          1. The name resolution
          2. The Apache configuration
        2. IP-based
        3. Port-based
      5. Automating virtual hosts
      6. Summary
    17. 10. Securing the System with SELinux
      1. What is SELinux
      2. Understanding SELinux
        1. Modes
          1. The disabled mode
          2. The permissive mode
          3. The enforcing mode
        2. Labels
        3. Policy types
          1. Minimum
          2. Targeted
          3. MLS
        4. Policies
      3. Working with the targeted policy type
        1. Unconfined domains
      4. SELinux tools
        1. chcon and restorecon
        2. Boolean values
      5. Troubleshooting SELinux
        1. The log file
        2. The audit2allow command
        3. Permissive domains
      6. Summary
    18. 11. Network Security with firewalld
      1. The firewall status
      2. Routing
      3. Zone management
      4. Source management
      5. Firewall rules using services
      6. Firewall rules using ports
      7. Masquerading and Network Address Translation
      8. Using rich rules
      9. Implementing direct rules
        1. Reverting to iptables
      10. Summary
    19. Index