Table of Contents for
Linux in a Windows World

Version ebook / Retour

Cover image for bash Cookbook, 2nd Edition Linux in a Windows World by Roderick W Smith Published by O'Reilly Media, Inc., 2005
  1. Cover
  2. Linux in a Windows World
  3. Dedication
  4. Preface
  5. Contents of This Book
  6. Conventions Used in This Book
  7. Using Code Examples
  8. Comments and Questions
  9. Safari Enabled
  10. Acknowledgments
  11. I. Linux’s Place in a Windows Network
  12. 1. Linux’s Features
  13. Linux as a Server
  14. Linux on the Desktop
  15. Comparing Linux and Windows Features
  16. Summary
  17. 2. Linux Deployment Strategies
  18. Linux Desktop Migration
  19. Linux and Thin Clients
  20. Summary
  21. II. Sharing Files and Printers
  22. 3. Basic Samba Configuration
  23. The Samba Configuration File Format
  24. Identifying the Server
  25. Setting Master Browser Options
  26. Setting Password Options
  27. Summary
  28. 4. File and Printer Shares
  29. Printing with CUPS
  30. Creating a Printer Share
  31. Delivering Printer Drivers to Windows Clients
  32. Example Shares
  33. Summary
  34. 5. Managing a NetBIOS Network with Samba
  35. Enabling NBNS Functions
  36. Assuming Master Browser Duties
  37. Summary
  38. 6. Linux as an SMB/CIFS Client
  39. Accessing File Shares
  40. Printing to Printer Shares
  41. Configuring GUI Workgroup Browsers
  42. Summary
  43. III. Centralized Authentication Tools
  44. 7. Using NT Domains for Linux Authentication
  45. Samba Winbind Configuration
  46. PAM and NSS Winbind Options
  47. Winbind in Action
  48. Summary
  49. 8. Using LDAP
  50. Configuring an OpenLDAP Server
  51. Creating a User Directory
  52. Configuring Linux to Use LDAP for Login Authentication
  53. Configuring Windows to Use LDAPfor Login Authentication
  54. Summary
  55. 9. Kerberos Configuration and Use
  56. Linux Kerberos Server Configuration
  57. Kerberos Application Server Configuration
  58. Linux Kerberos Client Configuration
  59. Windows Kerberos Tools
  60. Summary
  61. IV. Remote Login Tools
  62. 10. Remote Text-Mode Administration and Use
  63. SSH Server Configuration
  64. Telnet Server Configuration
  65. Windows Remote-Login Tools
  66. Summary
  67. 11. Running GUI Programs Remotely
  68. Using Remote X Access
  69. Encrypting X by SSH Tunneling
  70. VNC Configuration and Use
  71. Running Windows Programs from Linux
  72. Summary
  73. 12. Linux Thin Client Configurations
  74. Hardware Requirements
  75. Linux as a Server for Thin Clients
  76. Linux as a Thin Client
  77. Summary
  78. V. Additional Server Programs
  79. 13. Configuring Mail Servers
  80. Configuring Sendmail
  81. Configuring Postfix
  82. Configuring POP and IMAP Servers
  83. Scanning for Spam, Worms, and Viruses
  84. Supplementing a Microsoft Exchange Server
  85. Using Fetchmail
  86. Summary
  87. 14. Network Backups
  88. Backing Up the Linux System
  89. Backing Up with Samba
  90. Backing Up with AMANDA
  91. Summary
  92. 15. Managing a Network with Linux
  93. Delivering Names with DNS
  94. Keeping Clocks Synchronized with NTP
  95. Summary
  96. VI. Appendixes
  97. A. Configuring PAM
  98. The PAM Configuration File Format
  99. PAM Modules
  100. Sample PAM Configurations
  101. Summary
  102. B. Linux on the Desktop
  103. Configuring Applications and Environments
  104. Running Windows Programs in Linux
  105. File and Filesystem Compatibility
  106. Font Handling
  107. Summary
  108. Index
  109. Colophon

Index

A

Accelerated-X, X Server Options
access control by IP address, Controlling access by IP address
ACLs (access control lists), Setting Access Control Features, Using ACLs
ACLs (Access Control Lists)
Kerberos, usage in, ACL definitions
AD (Active Directory), Using NT Domains for Linux Authentication, LDAP Software
Kerberos and, Windows Kerberized Servers
addprinc, Creating principals
administration
CUPS, web-based tool for, Adding Printers to CUPS
Kerberos realms, Realm Administration
remote text-mode tools, used for, Remote Text-Mode Administration
(see also text-mode logins)
remote via text-mode logins, Remote Text-Mode Administration
AMANDA (Advanced Maryland Automatic Network Disk Archiver), Miscellaneous Linux Servers, Backing Up with AMANDA
data backup and restoration, Backing Up and Restoring Data with AMANDA
dump type and backup set definition, Defining dump types and backup sets
Linux client configuration, Linux AMANDA Client Configuration
network protocols used by, AMANDA Principles
options, Setting AMANDA options
server configuration, Configuring an AMANDA Server
server programs, AMANDA server programs
tape preparation, Preparing tapes
Windows client configuration, Windows AMANDA Client Configuration
anti-aliasing, Linux Font-Handling Systems
antispam and antivirus tools, An Antispam and Antivirus Tool Rundown
Bogofilter (see Bogofilter)
Postfix, Postfix Antispam Options
Procmail (see Procmail)
SpamAssassin (see SpamAssassin)
AppleShare, Linux File and Print Servers
AppleTalk, Linux File and Print Servers
ATA (Advanced Technology Attachment), Typical Linux Server Hardware
authentication, Contents of This Book
domain configuration, advantages, The Role of a Domain Controller
Kerberos (see Kerberos)
LDAP (see LDAP)
Linux authentication of NT domains (see Winbind)
NetLogon authentication, The Role of a Domain Controller
pass-through authentication, The Role of a Domain Controller
NetLogon authentication and, Configuring Machine Trust Accounts
Samba (see domain controllers)
authentication servers, Linux Authentication Servers

B

backup clients, Local Versus Network Backups
backup servers, Miscellaneous Linux Servers, Local Versus Network Backups
backups (see network backups)
Bayesian tests, An Antispam and Antivirus Tool Rundown
BIND (Berkeley Internet Name Domain), Miscellaneous Linux Servers, Basic Name Server Configuration
bitmap fonts, Linux Font-Handling Systems
Bogofilter, Using Bogofilter
database file, Using Bogofilter
spamicity classification, Using Bogofilter
training, Using Bogofilter
training scripts, Using Bogofilter
broadcast name resolution, The Role of the NBNS System
browsers
domain master browsers, Setting Master Browser Options, Assuming Master Browser Duties
GUI workgroup browsers (SMB/CIFS), Configuring GUI Workgroup Browsers
local master browsers, Setting Master Browser Options, Assuming Master Browser Duties
elections, Winning (or Not Winning) Local Master Browser Elections
master browsers (see master browsers)
network browsers (SMB/CIFS), Setting Master Browser Options
BSD LPD, defining SMB/CIFS printers using, Defining SMB/CIFS Printers Using LPRng or BSD LPD

C

CAP (Columbia AppleTalk Package), Linux File and Print Servers
CAs (Certificate Authorities), Preparing Keys and Certificates
case-sensitive and case-retentive filesystems, Setting Filename Options
cdrecord and optical recorder specifications, Backing Up to Optical Media
certificates, Preparing Keys and Certificates
challenge-response tests, An Antispam and Antivirus Tool Rundown
cifs driver, Using the cifs driver
cifs filesystem type code, Mounting Shares Using mount
Citrix Metaframe, Running Windows Programs from Linux
client software, Locating Client Software
clients, Typical Linux Server Software
code examples, Using Code Examples
code pages, Setting Filename Options
Samba and, Setting Filename Options
collisions, Setting Filename Options
country code TLDs, Principles of DNS
Courier IMAP, Mail Servers
crackers, Linux Server Capabilities
cron, Running Fetchmail
CUPS (Common Unix Printing System), Printing with CUPS
adding printers, Adding Printers to CUPS
browsing and security settings, Adjusting CUPS Browsing and Security
installing, Installing CUPS
SMB/CIFS printers, defining, Defining SMB/CIFS Printers Using CUPS
web-based administration tool, Adding Printers to CUPS
cupsaddsmb, Installing drivers from Linux
cupsd.conf, Adjusting CUPS Browsing and Security
Cyrus IMAP, Mail Servers

D

deployment strategies, Linux Deployment Strategies
desktop environments, Linux on the Desktop
desktop systems, Linux on the Desktop
migration to Linux, Linux Desktop Migration
thin clients, versus, Linux and Thin Clients
DHCP (Dynamic Host Configuration Protocol), Miscellaneous Linux Servers, Delivering IP Addresses with DHCP
address assignment, Assigning Addresses
dynamic assignment, Dynamic address assignment
fixed assignment, Fixed address assignment
address broadcast and Windows clients, Kernel and Routing Requirements for DHCP
client program, Telling Clients to Use DHCP
configuration files, DHCP Configuration Files
parameters and declarations, DHCP Configuration Files
servers, Dynamic address assignment
dhcpd server versus dhcpcd client, DHCP server configuration
kernel and routing requirements, Kernel and Routing Requirements for DHCP
leases, The Role of DHCP
lease times, testing versus use, Dynamic address assignment
Linux servers, configuration for thin clients, DHCP Configuration
MAC (media access control) addresses and, Fixed address assignment
NBNS information delivery, Delivering NBNS Information via DHCP
Windows client configuration, Windows client configuration
network addressing and, The Role of DHCP
advantages, The Role of DHCP
security concerns, The Role of DHCP
packet sockets, enabling, Kernel and Routing Requirements for DHCP
server configuration, DHCP server configuration
Windows client configuration, Telling Clients to Use DHCP
dhcpd.conf, DHCP Configuration Files
example file, Dynamic address assignment
dhcpd.conf versus dhcpcd.conf, DHCP Configuration Files
directories, Using LDAP
DISPLAY environment variable, Initiating a Connection from a Text-Mode Login
distributions, Typical Linux Server Software
licensing, Picking a distribution for server use
djbdns, Miscellaneous Linux Servers
DNs (Distinguished Names) and their types, Distinguished Names
DNS (Domain Name System), Miscellaneous Linux Servers, Managing a Network with Linux, Delivering Names with DNS
BIND (Berkeley Internet Name Domain), Basic Name Server Configuration
client configuration, Pointing Clients at the Name Server
djbdns, Miscellaneous Linux Servers
domain hierarchy, Principles of DNS
domain name caching, Principles of DNS
domains, setting up, Setting Up a Domain
forward zone files, configuration, Configuring forward zone files
reverse zone files, configuration, Configuring reverse zone files
hostnames, NetBIOS Name Options
local DNS servers, advantages, Principles of DNS
name server configuration, Basic Name Server Configuration
options, Basic Name Server Configuration
zone definitions, Setting Up a Domain
name server operation, Running the server
domain controllers, Managing a NetBIOS Network with Samba
as file and print servers, The Role of a Domain Controller
authentication, advantages for, The Role of a Domain Controller
domain member configuration, Configuring Windows Clients and Servers as Domain Members
Windows 9x/ME, Activating Windows 9x/Me domain membership
Windows NT/200x/XP, Activating Windows NT/200x/XP domain membership
domain member servers, The Role of a Domain Controller, The Problem: Linux Users on an NT Domain
file shares, Common Domain Controller File Shares
domain logon shares, configuring, Configuring domain logon shares
roaming profiles, configuring, Configuring roaming profiles
machine trust accounts, Configuring Machine Trust Accounts
NT domain controllers, The Problem: Linux Users on an NT Domain
password database maintenance, Maintaining the Password Database
Samba controller parameters, Domain Controller Parameters
Samba versus NT, The Role of a Domain Controller
Windows versions, Linux authentication of (see Winbind)
domain master browsers, Setting Master Browser Options, Assuming Master Browser Duties
domain member servers, The Role of a Domain Controller, The Problem: Linux Users on an NT Domain
DOS-style filesystem flags and file permissions, Mapping DOS-style flags
Dovecot, Mail Servers, Additional Options on Advanced Servers
dovecot.conf, Additional Options on Advanced Servers
dumb terminal, Types of Thin Client Computing

F

fc-cache command, Installing Xft Fonts
Fetchmail, Using Fetchmail
configuration file, Configuring Fetchmail
cron job operation, Running Fetchmail
global directives, Configuring Fetchmail
polling, The Role of Fetchmail
purpose of, The Role of Fetchmail
remote password file permissions, Configuring Fetchmail
running and testing, Running Fetchmail
sample .fetchmailrc file, Configuring Fetchmail
server options, Configuring Fetchmail
user options, Configuring Fetchmail
file compatibility, Windows and Linux, Comparing Linux and Windows Features
file ownership, Setting Linux ownership
file permissions, Setting Linux permissions
ACLs (Access Control Lists), Setting Access Control Features, Using ACLs
DOS-style filesystem flags and, Mapping DOS-style flags
file-exchange shares and, File-Exchange Shares
Unix extensions, Enabling Unix extensions
file servers, Linux File and Print Servers
file sharing, Contents of This Book, Common File Share Options
access control, Setting Access Control Features
domain controllers and, Common Domain Controller File Shares
domain logon shares, configuring, Configuring domain logon shares
roaming profiles, configuring, Configuring roaming profiles
examples, The [homes] Share
file-exchange shares, File-Exchange Shares
Windows program shares, A Windows Program Share
[homes] share, The [homes] Share
Linux clients over SMB/CIFS systems, Accessing File Shares
printer sharing, compared to, File Shares Versus Printer Shares
write access, Setting Write Access
filename mangling, Setting Filename Options
filenames, Setting Filename Options
case-sensitivity versus case-retentivity, Setting Filename Options
character sets and, Setting Filename Options
firewalls and the X client-server model, The X Client/Server Model
font servers, Linux Font-Handling Systems
fonts, Font Handling
anti-aliasing, Linux Font-Handling Systems
bitmap fonts, Linux Font-Handling Systems
font smoothing, Linux Font-Handling Systems
OpenOffice.org, Installing Fonts in OpenOffice.org
scaleable fonts, Linux Font-Handling Systems
TrueType fonts, Linux Font-Handling Systems
X core fonts, Linux Font-Handling Systems, Installing X Core Fonts
Xft, Linux Font-Handling Systems, Installing Xft Fonts
forward lookups, Configuring forward zone files
Free SSH, Locating Client Software
full backups, Complete Versus Incremental Backups
full restores, Restoring Data Locally

G

GDM (GNOME Display Manager), Configuring GDM
generic TLDs, Principles of DNS
getent, Verifying Proper Functioning
Ghostscript, Installing CUPS, A PDF-Generation Printer Share
GINA (Graphical Identification and Authentication), Configuring Windows to Use LDAPfor Login Authentication
(see also pGina)
GNOME (GNU Network Object Model Environment), Linux on the Desktop
GNU Privacy Guard, Mail Security Concerns
GNU tar (see tar)
GPL (GNU General Public License), Linux Server Capabilities
GUI login tools, Running GUI Programs Remotely
VNC (see VNC)
X (see X)
GUI workgroup browsers, Configuring GUI Workgroup Browsers

I

ICA (Independent Computing Architecture), Types of Thin Client Computing
IMAP (Internet Message Access Protocol), Mail Servers
IMAP servers, Linux POP and IMAP Server Options, Configuring POP and IMAP Servers
authentication, Setting Authentication Options
launching, Launching POP and IMAP Servers
incremental backups, Complete Versus Incremental Backups
inetd super server, Launching a Telnet Server
init command, Creating principals
Internet Software Consortium, Miscellaneous Linux Servers
IPP (Internet Printing Protocol), Linux File and Print Servers

K

kadmin, Creating principals
kadmin.local, Creating principals
kdc.conf, Editing kdc.conf
KDCs (key distribution centers), An Overview of Kerberos Operation
startup and operation, Running the KDC
KDE (K Desktop Environment), Linux on the Desktop
KDM (KDE Display Manager), Configuring KDM
Kerberos, Obtaining and Installing OpenLDAP, Kerberos Configuration and Use
account maintenance, Kerberized account maintenance
ACLs (access control lists), ACL definitions
application servers, Kerberos Configuration and Use
configuration, Kerberos Application Server Configuration
keytabs, Preparing Application Server Principals
options, Running the Servers
principals, Preparing Application Server Principals
startup and operation, Running the Servers
available versions, Kerberos Tools for Linux
centralized single-authentication logins, The Problem: Centralized Single-Authentication Logins
clients, Linux Kerberos Client Configuration
installing, Installing Kerberized Clients
operation, Using Kerberized Clients
preparation, Preparing Kerberos Clients
Windows, Windows Kerberized Clients
dependency on clock synchronization, Miscellaneous Linux Servers
KDCs (key distribution centers), An Overview of Kerberos Operation
startup and operation, Running the KDC
Windows and Linux KDCs, comparison, Windows and Kerberos
Linux packages, Kerberos Tools for Linux
Linux servers, Linux Kerberos Server Configuration
login tools, Kerberized login tools
master keys, Creating a Master Key
permissions, Creating a Master Key
network logins using, Using Kerberos for Network Logins
PAM and, Kerberos and PAM
principals, An Overview of Kerberos Operation, Creating principals
realms, An Overview of Kerberos Operation
administration, Realm Administration
configuration, Kerberos Realm Configuration
stash files, Creating a Master Key
permissions, Creating a Master Key
TGTs (ticket-granting tickets), An Overview of Kerberos Operation
tickets, An Overview of Kerberos Operation
network time and, An Overview of Kerberos Operation
Windows and, Windows and Kerberos, Windows Kerberos Tools
application servers and Active Directory, Windows Kerberized Servers
compatibility issues, Windows and Kerberos, Using Windows’ Kerberos
Kerberos Telnet, Using Kerberos Telnet
operation, Using Windows’ Kerberos
Windows and Linux KDCs, compared, Windows and Kerberos
keys, Preparing Keys and Certificates
Konqueror, Using Konqueror
krb5.conf, Kerberos Realm Configuration
kstash, Creating a Master Key
ktadd command, Creating principals

L

LANs
NetBIOS LANs, Managing a NetBIOS Network with Samba
Windows and NetBIOS names, Using NetBIOS Name Resolution
LDAP (Lightweight Directory Access Protocol), Using LDAP
client configuration, Basic LDAP Client Configuration
configuring Linux for login authentication, Configuring Linux to Use LDAP for Login Authentication
database backends, Obtaining and Installing OpenLDAP
DNs (Distinguished Names) and their types, Distinguished Names
LDIF, Understanding LDIF
NSS configuration, Configuring the LDAP NSS Modules
OpenLDAP (see OpenLDAP)
PAM configuration, Configuring the LDAP PAM Modules
pGina, Configuring Windows to Use LDAPfor Login Authentication
client configuration, Configuring pGina for LDAP Client Use
software packages, LDAP Software
terminology, LDAP Terminology and Features
testing user authentication, Verifying Proper Functioning
Windows, configuring for login authentication, Configuring Windows to Use LDAPfor Login Authentication
certificates, registering, Registering Your Certificate
LDIF, Understanding LDIF
leases, The Role of DHCP
Legato, Miscellaneous Linux Servers
libnss_winbind.so, NSS and PAM Winbind Modules
libnss_wins.so, Using NetBIOS Name Resolution in Non-Samba Programs
licensing, Picking a distribution for server use
GPL (GNU General Public License), Linux Server Capabilities
LinNeighborhood, Using LinNeighborhood
Linux, Linux’s Features
desktop systems (see Linux desktop systems)
distributions (see distributions)
Ethernet support, Typical Linux Server Hardware
file permissions, setting, Setting Linux permissions
filesystem filenames, Setting Filename Options
hardware flexibility, Linux Server Capabilities
installation, Linux Deployment Strategies
integration, planning (see deployment strategies)
Kerberos (see Kerberos)
licensing, Linux Server Capabilities
login authentication and LDAP, Configuring Linux to Use LDAP for Login Authentication
mail servers (see mail servers)
mascot, Where Linux Fits in a Network
networks and, Where Linux Fits in a Network
NT domains, authentication (see Winbind)
resource use, Linux Server Capabilities
security, Linux Server Capabilities
servers (see servers)
thin client computing (see thin clients)
Windows applications, running on, Linux Desktop Applications for All Occasions, Running Windows Programs in Linux
Windows file and filesystem compatibility, File and Filesystem Compatibility
Windows, compared to, Comparing Linux and Windows Features
Windows, integration with, Preface
Linux desktop systems, Linux on the Desktop
applications, Linux Desktop Applications for All Occasions
as clients on Windows networks (see SMB/CIFS, Linux clients)
configuration files, Global Versus User Configuration Files
default configurations, creating, Creating Default Desktop Configurations
environment login option, Adding an Environment as a Login Option
fonts, Font Handling
OpenOffice.org, Installing Fonts in OpenOffice.org
X core fonts, Linux Font-Handling Systems, Installing X Core Fonts
Xft, Linux Font-Handling Systems, Installing Xft Fonts
GUI login tools, Running a GUI login tool
Windows file and filesystem compatibility, File and Filesystem Compatibility
Windows programs, running in, Running Windows Programs in Linux
Linux Printing web site, Installing CUPS
listed parameter values, Parameters, Values, and Comments
lmhosts file, NetBIOS Name Options
local master browsers, Setting Master Browser Options, Assuming Master Browser Duties
elections, Winning (or Not Winning) Local Master Browser Elections
login.krb5, Kerberized login tools
logins
centralized single-authentication logins via Kerberos, The Problem: Centralized Single-Authentication Logins
GUI login tools (see GUI login tools)
Kerberos login tools, Kerberized login tools
Linux configuration for LDAP login authentication, Configuring Linux to Use LDAP for Login Authentication
Linux desktops, environment login option, Adding an Environment as a Login Option
Linux Desktops, GUI login tools, Running a GUI login tool
Linux login authentication via LDAP, Configuring Linux to Use LDAP for Login Authentication
network logins using Kerberos, Using Kerberos for Network Logins
PXES and remote login servers, Configuring PXES
remote login servers, Remote Login Servers
remote logins, Contents of This Book
text-mode logins (see text-mode logins)
remote X login servers, Using Remote X Access
rlogin, Remote Login Servers, Tools for Remote Text-Mode Access
Winbind, Winbind Logins
Windows remote login tools, Windows Remote-Login Tools
Windows, configuration for LDAP authentication, Configuring Windows to Use LDAPfor Login Authentication
LPD (Line Printer Daemon), Linux File and Print Servers
LPRng, defining SMB/CIFS printers using, Defining SMB/CIFS Printers Using LPRng or BSD LPD
LTSP, Distribution Selection and Installation

M

MAC (media access control) addresses, Fixed address assignment
machine trust accounts, Enabling Domain Controller Functions, Configuring Machine Trust Accounts
mail servers, Mail Servers, Configuring Mail Servers
Dovecot, Additional Options on Advanced Servers
Fetchmail (see Fetchmail)
Microsoft Exchange servers, supplementing with Linux servers, Supplementing a Microsoft Exchange Server
options, Linux Mail Server Options
POP and IMAP servers, Linux POP and IMAP Server Options, Configuring POP and IMAP Servers
authentication, Setting Authentication Options
launching, Launching POP and IMAP Servers
push and pull protocols, Linux Mail Server Options
security, Mail Security Concerns
SMTP servers, Linux SMTP Server Options
Postfix (see Postfix)
Procmail and, Calling Procmail
sendmail (see sendmail)
spam, worm, and virus scanning, Scanning for Spam, Worms, and Viruses
antispam and antivirus tools, An Antispam and Antivirus Tool Rundown
attachments, discard or quarantine of, Discarding or Quarantining Suspicious Attachments
Bogofilter, Using Bogofilter
in Postfix, Postfix Antispam Options
in sendmail, Sendmail Antispam Options
Procmail (see Procmail)
SpamAssassin (see SpamAssassin)
main.cf, Postfix Configuration Files
master browsers, Setting Master Browser Options, Assuming Master Browser Duties
local master browser elections, Winning (or Not Winning) Local Master Browser Elections
potential conflicts, Setting Master Browser Options
services, The Role of the Master Browser
MIMEDefang tool, Calling SpamAssassin from sendmail
mount, Mounting Shares Using mount

N

name resolution, Enabling NBNS Functions
(see also DNS)
NetBIOS Name Servers (see NBNS systems)
name resolve order parameters, NetBIOS Name Options
named, Basic Name Server Configuration
named.conf, Basic Name Server Configuration
NBNS (NetBIOS Name Server) systems, NetBIOS Name Options, Enabling NBNS Functions, Principles of DNS
DHCP and, The Role of the NBNS System
information delivery via DHCP, Delivering NBNS Information via DHCP
Windows client configuration, Windows client configuration
Samba, configuration in, Defining Samba NBNS Functions
NCP (NetWare Core Protocol), Linux File and Print Servers
Netatalk, Linux File and Print Servers
NetBIOS LANs, Managing a NetBIOS Network with Samba
domain controllers (see domain controllers)
NetBIOS name resolution, Using NetBIOS Name Resolution
non-Samba programs, Using NetBIOS Name Resolution in Non-Samba Programs
smb.conf options, setting, Setting Name Resolution Options in smb.conf
NetBIOS names, NetBIOS Name Options
non-SMB/CIFS tools and, Using NetBIOS Name Resolution in Non-Samba Programs
workgroup name options, Workgroup Name Options
NetLogon authentication, The Role of a Domain Controller
NETLOGON share, Configuring domain logon shares
network backups, Network Backups
advantages, Local Versus Network Backups
AMANDA (see AMANDA)
backup servers, Local Versus Network Backups
common problems, Backup Pitfalls
hardware, Backup Hardware
backup media, Backup Hardware
hardware and software interaction, Backup Hardware
Linux and, Backing Up the Linux System
Linux backup packages, A Rundown of Linux Backup Packages
Samba, using for, Backing Up with Samba
advantages and disadvantages, Pluses and Minuses of Samba Backups
backup shares, creating, Creating a backup share
backup shares, using, Using a backup share
data restoration, Restoring Data with Samba
NTFS filesystem and, Pluses and Minuses of Samba Backups
smbtar (see smbtar)
security issues, Client- Versus Server-Initiated Backups
strategies, Backup Strategies
client- versus server-initiated backups, Client- Versus Server-Initiated Backups
complete versus incremental backups, Complete Versus Incremental Backups
local versus network backups, Local Versus Network Backups
tape, incremental backups on, Using tar for Tape and Disk Backups
tar, A Rundown of Linux Backup Packages, Using tar for Tape and Disk Backups
available functions, Using tar for Tape and Disk Backups
backups to optical media, Backing Up to Optical Media
common options, Using tar for Tape and Disk Backups
local restores, Restoring Data Locally
network protocols on Linux, Managing a Network with Linux
NFS (Network File Server), Linux File and Print Servers
NoMachine, What Can GUI Logins Do?
non-Unix printing systems, Linux File and Print Servers
NSS (Name Service Switch), Using NT Domains for Linux Authentication, Linux’s PAM and NSS Systems, PAM Principles
configuring, Configuring NSS
LDAP configuration, Configuring the LDAP NSS Modules
Winbind options, PAM and NSS Winbind Options
NT domain controllers
authentication of Linux clients, The Problem: Linux Users on an NT Domain
(see also Winbind)
versus Samba, The Role of a Domain Controller
NT domains
PAM and NSS, linking to, Winbind: Linking PAM and NSS to an NT Domain
NTP (Network Time Protocol), Miscellaneous Linux Servers, Managing a Network with Linux, Keeping Clocks Synchronized with NTP
Linux NTP client configuration, NTP Server Configuration
server configuration, NTP Server Configuration
options, NTP Server Configuration
upstream NTP servers, selecting, NTP Server Configuration
Windows client configuration, Configuring Windows Clients
NET SET command, Using NET SET
Windows NTP clients, Windows NTP clients
NX Server and NX Client, What Can GUI Logins Do?

P

PAC (Privilege Access Certificate), Windows and Kerberos
packages
samba, Installing Samba
packet sockets, Kernel and Routing Requirements for DHCP
page swapping, Typical Linux Server Hardware
PAM (Pluggable Authentication Modules), Using NT Domains for Linux Authentication, Linux’s PAM and NSS Systems, Configuring PAM
configuration files, The PAM Configuration File Format
Kerberos and, Kerberos and PAM
LDAP configuration, Configuring the LDAP PAM Modules
management features, PAM Principles
module stacks, Module Stacks
modules, PAM Modules
nonstandard, Additional PAM Modules
standard, Standard PAM Modules
sample configurations, Sample PAM Configurations
UW IMAP, usage of, Setting Authentication Options
Winbind options, PAM and NSS Winbind Options
Winbind, configuring for, Configuring PAM
pam_winbind.so, NSS and PAM Winbind Modules
parameters, Parameters, Values, and Comments
partial restores, Restoring Data Locally
pass-through authentication, The Role of a Domain Controller
password servers, Using a Password Server
passwords
domain controllers, database maintenance, Maintaining the Password Database
Samba and (see Samba, password options)
sniffing, Password Issues
PDF files, generating via printer share, A PDF-Generation Printer Share
pGina, Configuring Windows to Use LDAPfor Login Authentication
client configuration, Configuring pGina for LDAP Client Use
POP (Post Office Protocol), Mail Servers
POP servers, Linux POP and IMAP Server Options, Configuring POP and IMAP Servers
authentication, Setting Authentication Options
launching, Launching POP and IMAP Servers
Postfix, Mail Servers, Configuring Postfix
address options, Postfix Address Options
antispam options, Postfix Antispam Options
configuration files, Postfix Configuration Files
mail relay configuration, Postfix Relay Options
to forward mail, Configuring Postfix to forward mail
to relay mail, Configuring Postfix to relay mail
to use a relay, Configuring Postfix to use a relay
postfix reload command, Postfix Configuration Files
PostScript and PDF file generation, A PDF-Generation Printer Share
PostScript Type 1 font format, Linux Font-Handling Systems
principals, An Overview of Kerberos Operation
printer sharing, Contents of This Book, Linux File and Print Servers, Printing with CUPS
creating shares, Creating a Printer Share
CUPS, Printing with CUPS
adding printers to, Adding Printers to CUPS
installing, Installing CUPS
drivers, distributing to Windows clients, Delivering Printer Drivers to Windows Clients
examples, The [printers] Share
PDF-generation printer share, A PDF-Generation Printer Share
[printers] share, The [printers] Share
file sharing, compared to, File Shares Versus Printer Shares
Linux clients over SMB/CIFS networks, Printing to Printer Shares
non-PostScript printers, Installing CUPS, Sharing Non-PostScript Printers
PostScript printers, Installing CUPS, Sharing PostScript Printers
printer compatibility, determining, Installing CUPS
printer drivers, Picking a Driver
clients, installing on, Installing Drivers on Clients
defining shares, Defining Necessary Shares
Linux, installing from, Installing drivers from Linux
servers, installing on, Installing the Driver on the Server
Windows NT/200x/XP, installing from, Installing drivers from Windows NT/200x/XP
uninstalling printer software, Installing CUPS
printers.conf, Adding Printers to CUPS
Procmail, Using Procmail
calling, Calling Procmail
calling as root, The Procmail configuration file
configuration files, The Procmail configuration file
recipes, Creating Procmail recipes
actions, Creating Procmail recipes
conditions, Creating Procmail recipes
examples, Examples of Procmail recipes
flags, Creating Procmail recipes
lockfiles, Creating Procmail recipes
regular expressions, Creating Procmail recipes
techniques, Examples of Procmail recipes
SpamAssassin, calling from, Calling SpamAssassin from Procmail
promiscuous_relay, Configuring sendmail to relay mail
push and pull mail protocols, Mail Servers, Linux Mail Server Options
PuTTY, Locating Client Software, Encrypting VNC Connections
PXES, Configuring PXES
boot files, Configuring PXES
configuration, Configuring PXES
network booting, Booting a Thin Client from the Network
remote login servers and, Configuring PXES
testing, Testing Your PXES Image

Q

qmail, Mail Servers

R

rdesktop, Running Windows Programs from Linux
RDNs (Relative Distinguished Names), Distinguished Names
RDP (Remote Desktop Protocol), Running Windows Programs from Linux, Types of Thin Client Computing
realms, An Overview of Kerberos Operation
Linux, configuration on, Kerberos Realm Configuration
RealVNC, VNC Versions
recursive lookups, Principles of DNS
regular expressions, Creating Procmail recipes
Remote Desktop Protocol (RDP), Running Windows Programs from Linux
Remote Frame Buffer protocol, What Can GUI Logins Do?
remote login servers, Remote Login Servers
remote logins, Contents of This Book
(see also logins)
text-mode logins (see text-mode logins)
remote X login servers, Using Remote X Access
removable disks and backups, Backup Hardware
removable hard disks, Backup Hardware
RFB (Remote Frame Buffer), Types of Thin Client Computing
(see also VNC)

S

Samba, Miscellaneous Linux Servers, Basic Samba Configuration
access control, Setting Access Control Features
authentication services (see domain controllers)
backups, using for, Backing Up with Samba
advantages and disadvantages, Pluses and Minuses of Samba Backups
backup shares, creating, Creating a backup share
backup shares, using, Using a backup share
data restoration, Restoring Data with Samba
NTFS filesystem and, Pluses and Minuses of Samba Backups
smbtar (see smbtar)
components, Installing Samba
configuration file format, The Samba Configuration File Format
global- and share-level parameters, Configuration File Sections
delimited parameter values, Parameters, Values, and Comments
file permissions, Setting Linux permissions
file sharing (see file sharing)
filename parameters, Setting Filename Options
global-level parameters, Configuration File Sections
installing, Installing Samba
master browser configuration, Assuming Master Browser Duties
master browser options, Setting Master Browser Options
NBNS configuration, Defining Samba NBNS Functions
NetBIOS LANs, Managing a NetBIOS Network with Samba
password options, Setting Password Options
cleartext passwords, Using Cleartext Passwords
encrypted passwords, Using Encrypted Passwords
password servers, Using a Password Server
printer sharing (see printer sharing)
server identification options, Identifying the Server
name resolve order parameters, NetBIOS Name Options
NetBIOS names, NetBIOS Name Options
workgroup name options, Workgroup Name Options
UID and GID mapping, Winbind Options in smb.conf
Winbind (see Winbind)
Sample Procmail Recipes with Comments, Examples of Procmail recipes
SASL (Simple Authentication and Security Layer), Obtaining and Installing OpenLDAP
SATA (Serial ATA) disks, Typical Linux Server Hardware
SATA RAID systems, Server Requirements
scaleable fonts, Linux Font-Handling Systems
SCSI (Small Computer Systems Interface), Typical Linux Server Hardware
RAID systems, Server Requirements
security, Linux Server Capabilities
email attachments and, Discarding or Quarantining Suspicious Attachments
sendmail, Configuring Sendmail
address options, Sendmail Address Options
antispam options, Sendmail Antispam Options
configuration files, Sendmail Configuration Files
mail relay configuration, Sendmail Relay Options
promiscuous_relay, Configuring sendmail to relay mail
to forward mail, Configuring sendmail to forward mail
to relay mail, Configuring sendmail to relay mail
to use a relay, Configuring sendmail to use a relay
restarting after configuration, Sendmail Configuration Files
SpamAssassin, calling from, Calling SpamAssassin from sendmail
sendmail.cf, Sendmail Configuration Files
server programs, Contents of This Book
servers, Linux as a Server, Linux Server Options
authentication servers, Linux Authentication Servers
backup servers, Miscellaneous Linux Servers
choosing programs, Picking individual server programs
definition of, Typical Linux Server Software
disk space requirements, Typical Linux Server Hardware
DNS servers, Miscellaneous Linux Servers
file servers, Linux File and Print Servers
hardware, Typical Linux Server Hardware
mail servers, Mail Servers
remote login servers, Remote Login Servers
time servers, Miscellaneous Linux Servers
services, Typical Linux Server Software
share-level parameters, Configuration File Sections
slapd-cert.crt, Preparing Keys and Certificates, Registering Your Certificate
slapd-key.pem, Preparing Keys and Certificates
slapd.conf, Basic OpenLDAP Configuration
smb.conf, The Samba Configuration File Format
domain controller parameters, Domain Controller Parameters
file ownership parameters, Setting Linux ownership
file permission parameters, Setting Linux permissions
name resolution options, setting, Setting Name Resolution Options in smb.conf
Winbind options, Samba Winbind Configuration
SMB/CIFS (Server Message Block/Common Internet File System), Linux File and Print Servers, Basic Samba Configuration, Identifying the Server
(see also Samba)
AMANDA and, AMANDA Principles
backups using, Pluses and Minuses of Samba Backups, Configuring Windows clients to share files
Linux clients, Linux as an SMB/CIFS Client
CUPS, defining printers with, Defining SMB/CIFS Printers Using CUPS
file share access limitations, File Share Access Limitations
file shares, accessing, Accessing File Shares
GUI workgroup browsers, configuring, Configuring GUI Workgroup Browsers
LPRng or BSD LPD, defining printers, Defining SMB/CIFS Printers Using LPRng or BSD LPD
NetBIOS name resolution, Using NetBIOS Name Resolution
printer sharing, Printing to Printer Shares
network browsers, Setting Master Browser Options
password encoding, Password Issues
smbclient, Installing Samba, Using smbclient
commands, Using smbclient
parameters, Using smbclient
printing with, Printing Using smbclient
smbfs driver, Using the smbfs driver
smbfs filesystem type codes, Mounting Shares Using mount
smbmount, Installing Samba, Mounting Shares Using smbmount
parameters, Mounting Shares Using smbmount
smbpasswd command, Using Encrypted Passwords
smbpasswd file, Password Issues
smbtar, Using smbtar for Backups
important options, Backing up with smbtar
performing backups, Backing up with smbtar
Windows client file share configuration, Configuring Windows clients to share files
smbumount, Mounting Shares Using smbmount
SMTP (Simple Mail Transfer Protocol), Mail Servers
servers, Picking individual server programs, Linux SMTP Server Options
sniffing, Password Issues
spam, Scanning for Spam, Worms, and Viruses
SpamAssassin, Using SpamAssassin
calling from Procmail, Calling SpamAssassin from Procmail
calling from sendmail, Calling SpamAssassin from sendmail
Perl dependencies, SpamAssassin basics
testing and message scoring, SpamAssassin basics
SpamBouncer, Examples of Procmail recipes
SSH (Secure Shell), Remote Login Servers, SSH Server Configuration
client options, SSH Client Options and Use
server configuration, Configuring an SSH Server
server options, SSH Server Options
server startup and operation, Launching an SSH Server
tunneling, Encrypting X by SSH Tunneling
advantages and disadvantages, Advantages and Disadvantages of X SSH Tunneling
Windows clients, SSH Client Options and Use
VNC connection encryption, Encrypting VNC Connections
sshd_config, SSH Server Options
ssh_config, SSH Client Options and Use
SSL (Secure Sockets Layer), Obtaining and Installing OpenLDAP
stash files, Creating a Master Key
stratum servers, Principles of NTP
string parameter values, Parameters, Values, and Comments
SunOne, LDAP Software
super servers, identifying type, Launching a Telnet Server

T

tape backups, Backup Hardware
AMANDA, automation using (see AMANDA)
tape formats, Backup Hardware
tar, Using tar for Tape and Disk Backups
- (dash) in non-GNU versions, Using tar for Tape and Disk Backups
available functions, Using tar for Tape and Disk Backups
backups to optical media, Backing Up to Optical Media
archive on carrier filesystem, Backing Up to Optical Media
archive on optical filesystem, Backing Up to Optical Media
common options, Using tar for Tape and Disk Backups
local restores from, Restoring Data Locally
restores from
emergency boot disks and, Restoring Data Locally
emergency OS installations and, Restoring Data Locally
partial OS bootstraps, Restoring Data Locally
second computer assist, Restoring Data Locally
tape backups and the compression options, Using tar for Tape and Disk Backups
tcpd, Launching POP and IMAP Servers
Telnet, Telnet Server Configuration
drawbacks, Telnet Server Configuration
enabling and disabling, Launching a Telnet Server
encryption, adding to, Encryption
security concerns, Telnet Server Security Concerns
Terminal Services (Windows), Running Windows Programs from Linux
text-mode logins, Remote Text-Mode Administration and Use
access speed, Remote Text-Mode User Access
GUI programs, compared to, Remote Text-Mode User Access
remote administration, Remote Text-Mode Administration
SSH (see SSH)
Telnet (see Telnet)
text-mode programs, Remote Text-Mode User Access
tools for remote access, Tools for Remote Text-Mode Access
unencrypted remote access, Tools for Remote Text-Mode Access
Windows and, Windows Remote-Login Tools
TGTs (ticket-granting tickets), An Overview of Kerberos Operation
thin clients, Linux and Thin Clients, Linux Thin Client Configurations
advantages, When to Use Thin Client Computing
available protocols, Types of Thin Client Computing
client hardware, Client Requirements
dedicated clients, Client Requirements
diskless systems, Client Requirements
old PCs, Client Requirements
video RAM, Client Requirements
disadvantages, When to Use Thin Client Computing
hardware, Hardware Requirements
determining requirements, Server Requirements
ICA, Running Windows Programs from Linux
Linux clients, Linux as a Thin Client
distribution selection, Distribution Selection and Installation
PXES (see PXES)
specialty distributions, Distribution Selection and Installation
Linux servers, Linux as a Server for Thin Clients
DHCP configuration, DHCP Configuration
distribution, selecting, Linux Distribution Selection and Configuration
TFTP configuration, TFTP Configuration
XDMCP and VNC options, XDMCP and VNC Options
network equipment, Network Hardware Requirements
remote GUI access using, Running GUI Programs Remotely
SATA RAID compared to SCSI RAID systems, Server Requirements
server hardware, Server Requirements
suitable applications, When to Use Thin Client Computing
ThinStation, Distribution Selection and Installation
tickets, An Overview of Kerberos Operation
TightVNC, VNC Versions
time servers, Miscellaneous Linux Servers
TLDs (top-level domains), Principles of DNS
TLS (Transport Layer Security), Obtaining and Installing OpenLDAP
transport maps, Configuring Postfix to forward mail
TrueType fonts, Linux Font-Handling Systems
tunneling, What Can GUI Logins Do?, Advantages and Disadvantages of X SSH Tunneling
tunnelling, Remote Login Servers
Tux, Where Linux Fits in a Network

V

Veritas Netbackup, Miscellaneous Linux Servers
viruses, Mail Security Concerns, Scanning for Spam, Worms, and Viruses
VNC, VNC Configuration and Use
clients, using, Using a VNC Client
Windows, Using a VNC Client
KDE support, KDE’s VNC features
Linux VNC server configuration, Configuring a Linux VNC Server
server options, Traditional user VNC server sessions
servers, installation and configuration, Traditional user VNC server sessions
SSH encryption, using, Encrypting VNC Connections
thin client computing and, Types of Thin Client Computing
versions, VNC Versions
vncserver command, Traditional user VNC server sessions
Windows VNC server configuration, Configuring a Windows VNC Server
XDMCP servers, linking to, Linking VNC to an XDMCP server
VNC (Virtual Network Computing), Remote Login Servers
vncviewer, Using a VNC Client

W

white lists, An Antispam and Antivirus Tool Rundown
Winbind, Using NT Domains for Linux Authentication
logins, Winbind Logins
NSS (Name Service Switch), Using NT Domains for Linux Authentication, Linux’s PAM and NSS Systems
configuring, Configuring NSS
options, PAM and NSS Winbind Options
PAM (Pluggable Authentication Modules), Using NT Domains for Linux Authentication, Linux’s PAM and NSS Systems
configuring, Configuring PAM
options, PAM and NSS Winbind Options
Samba, configuration using, Samba Winbind Configuration
testing, Testing Winbind Operation
winbindd, Winbind: Linking PAM and NSS to an NT Domain, Running the Winbind Daemon
Windows
Active Directory (see AD)
clients
configuring shares on, Configuring Windows clients to share files
filenames, Setting Filename Options
printer drivers, distributing to, Delivering Printer Drivers to Windows Clients
SSH tunneling and, SSH Client Options and Use
GINA (Graphical Identification and Authentication), Configuring Windows to Use LDAPfor Login Authentication
Kerberos, Windows and Kerberos, Windows Kerberos Tools
compatibility issues, Windows and Kerberos, Using Windows’ Kerberos
Kerberos Telnet, Using Kerberos Telnet
Linux and Windows KDCs, compared, Windows and Kerberos
servers and AD (Active Directory), Windows Kerberized Servers
LDAP login authentication, configuring, Configuring Windows to Use LDAPfor Login Authentication
Linux file and filesystem compatibility, File and Filesystem Compatibility
Linux, compared to, Comparing Linux and Windows Features
Linux, integration with, Preface
Linux, running Windows applications on, Linux Desktop Applications for All Occasions, Running Windows Programs in Linux
Microsoft Exchange servers and Linux mail servers, Supplementing a Microsoft Exchange Server
networking under Linux, Where Linux Fits in a Network
NT domain controllers (see NT domain controllers)
NT domains (see NT domains)
remote-login tools, Windows Remote-Login Tools
client software, Locating Client Software
roaming profiles and, Configuring roaming profiles
Terminal Services, Running Windows Programs from Linux
text-mode logins and, Windows Telnet and SSH Servers
VNC clients, using on, Using a VNC Client
Windows networks
Linux clients on (see SMB/CIFS, Linux clients)
master browsers, Assuming Master Browser Duties
Windows X servers, Windows X Server Concerns
X servers for, X Server Options
wins server and NBNS systems, Setting Name Resolution Options in smb.conf
workgroup name options, Workgroup Name Options
workstations, Linux on the Desktop
worms, Mail Security Concerns, Scanning for Spam, Worms, and Viruses

X

X (X Window System), Using Remote X Access
SSH tunneling, Encrypting X by SSH Tunneling
text-mode logins, connection via, Initiating a Connection from a Text-Mode Login
thin client computing and, Types of Thin Client Computing
Windows X servers, Windows X Server Concerns
X client-server model, The X Client/Server Model, Types of Thin Client Computing
firewalls, The X Client/Server Model
X server options, X Server Options
rooted or rootless modes, Windows X Server Concerns
XDMCP (see XDMCP)
X core fonts, Linux Font-Handling Systems, Installing X Core Fonts
X terminals, Linux and Thin Clients, Types of Thin Client Computing
X11, X Server Options
XDM (X Display Manager), Configuring XDM
XDMCP (X Display Manager Control Protocol), Simplifying Remote X Logins with XDMCP
client configuration, Configuring an XDMCP client
configuration for VNC connections, Linking VNC to an XDMCP server
server configuration, XDMCP basics
GDM (GNOME Display Manager), Configuring GDM
KDM (KDE Display Manager), Configuring KDM
XDM, Configuring XDM
XFree86, X Server Options
Xft fonts, Linux Font-Handling Systems, Installing Xft Fonts
xinetd super server, Launching a Telnet Server
Xmanager, Windows X Server Concerns