Expert Linux Administration Guide: Administer and Control Linux Filesystems, Networking, Web Server, Virtualization, Databases, and Process Control
- Length: 796 pages
- Edition: 1
- Language: English
- Publisher: BPB Publications
- Publication Date: 2022-06-08
- ISBN-10: 9355510985
- ISBN-13: 9789355510983
- Sales Rank: #1552744 (See Top 100 Books)
Linux administration based on hosted virtualization.
Key Features
- Designed for absolute beginners and early Linux users with the most up-to-date knowledge.
- Contains troubleshooting tips and best practices for running a Linux system on your own.
- Supplemental knowledge and insights in server security, threat management, and virtualization.
Description
‘Expert Linux Administration Guide’ is for the readers who are interested in developing the skills and abilities essential to operate as a professional Linux system administrator. This is the only book that explains everything about Linux practically through examples, simplified visuals, solution tips, and expert-led best practices.
This book begins with an introduction to Linux fundamentals and swiftly progresses to the day-to-day tasks of a Linux administrator. You practically learn how to plan your network by installing Linux and gaining a firm grasp of its file system and system configuration. This book covers all the Linux server settings, including DNS, mail servers, Squid proxy servers, and backup recovery. In addition, the book contains troubleshooting hints and ready-to-use solutions for server configuration, load balancing, firewall configuration, network security concerns, and virtualization. The book does not end here, as it discusses some of the advanced administrator’s responsibilities. Topics such as monitoring system performance, process controls, user provisioning, file and database recovery and backup, and software package upgrades are also covered.
By the end of this book, you’ll be able to practise and implement the latest system administration techniques in a Linux environment considerably more effectively.
What you will learn
- Learn to install and configure Linux servers quickly.
- Manage configurations, license software, and patch security flaws.
- Obtain the highest level of support for RAID configurations.
- Learn how to set up database servers, backups, and system recovery.
- Expert advice on firewalls, web servers, disc utilization, and network resources.
Who this book is for
This book is intended for System Managers, System Administrators, Network Administrators, Server Administrators, System Engineers, and others interested in becoming professional Linux Administrators. No prerequisite knowledge is required, as the book covers everything clearly and precisely.
Cover Page Title Page Copyright Page Dedication Page About the Author About the Reviewers Acknowledgements Preface Errata Table of Contents 1. Linux Fundamental Introduction Structure Objective Introduction to Linux shells Bourne Shell Bourne Shell features C-shell C shell features TC-shell TCSH features Korn shell Korn shell features Characteristics in Linux shell GNU project (GNU-not Unix) Linux distribution The Shell Login process Linux lab set-up process Introduction to Oracle Virtual Box Creating a new virtual machine Basic Linux commands with an example (bird’eye view to understand the theory) Conclusion Multiple choice questions Answers Questions 2. Files, Directories, and User Management Introduction Structure Objectives Introduction to Linux file system Ext (Extended file system) Ext2 (Extended file system2) Ext3 (Extended file system3) Ext4 (Extended file system4) File system hierarchy in Linux Basics of path Absolute path Relative path Creating a file Creating an empty file Viewing the contents of a file Creating a directory Introduction to group and ownership of a file Root user account Commands to manage user accounts Example related to useradd with -m Working of skeleton directory Commands to manage groups Inode Direct pointer Single indirect pointer Double indirect pointer Triple indirect pointer UMASK Calculation of permission using UMASK User/Owner Group Others File permission using chown/chmod/chgrp Case-1: Users (members) can access /USERDATA but others can Read data Case-2: Different directory for different users but others cannot access Permission at a Glance Wheel group Linux command basics Commands in typical condition Summary of command list Conclusion Multiple Choice Questions Answers 3. File Compression and Archival Introduction Structure Objectives Introduction to compression Compressing a file using gzip Advance use of gzip Decompressing a file using gunzip Advance use of gunzip Compressing files using bzip2 Decompressing a file using bunzip2 Compressing a file using zip Decompressing a file using unzip Conclusion Multiple choice questions Answers 4. Performing Search Introduction Structure Objective General introduction Simple Search Wild card-based search User, group, and ownership-based search Other searching option Introduction to redirection Output redirection (STDOUT) Input redirection (STDIN) Error redirection Conclusion Questions Answers 5. Vi Editor Introduction Structure Objective Introduction to vi editor Vi editor background Vi editor basic commands Conclusion Multiple choice questions Answer 6. Linux Installation Introduction Structure Objective BIOS (Basic Input Output System) overview BIOS settings for installation Linux installation modes Oracle virtual box setting for Linux deployment Scenario: Linux deployment using FTP Scenario: Linux deployment using Apache Scenario: Linux deployment using NFS (Network File Sharing) Conclusion Multiple choice questions Answers 7. System Initialization Introduction Structure Objectives Linux boot process- an overview About GRUB (Boot Loader) About kernel initialization Introduction to MBR Introduction to systemd Target Device Mount Swap Service Slice Snapshot Path Socket Timer Auto mount Scope Creating a customized systemd service in Linux for mounting a volume Run levels and related services Switching to run level Switching to runlevel2 Switching to runlevel3 Switching to runlevel4 Switching to runlevel5 Switching to runlevel6 Run level configuration Conclusion Multiple choice questions Answers 8. Overview of Network Commands Introduction Structure Objectives Assigning hostname of Linux machine Assigning hostname using Network Manager Text user interface (nmtui) Assigning IP address of the Linux machine Command line by changing the Network Adapter file About ifconfig command About netstat command 3-Way Handshake method in TCP connection at a glance About ping (Packet Internet Groper) Network statistics Conclusion Multiple choice questions Answers 9. Firewall Setup Introduction Structure Objectives Introduction to firewall Linux firewall zones Displaying zone settings Displaying the list of services Finding active zones Checking firewalld configuration Enabling/disabling panic mode Assigning network interface to zone Creating customized zones Allowing Apache web service on Linux firewall Introduction to Rich Rule Linux firewall configuration modes About whitelist Introduction to masquerading IP masquerading demo for accessing Internet Introduction to GUI mode of Linux firewall Introduction to Firewalld lockdown Conclusion Multiple choice questions Answers 10A. Partition System in CentOS7/8 Introduction Structure Objective General introduction to partition Lab preparation process using Oracle Virtual Box Step-by-step process of creating a partition Step-by-step method of assigning a file system on partition Mounting the file system using /etc/fstab Creating an extended partition using fdisk Creating a partition size larger than 2 TB Linux version 7/8 Commands related to hardware Deleting the partition Resizing the partition Introduction to Redundant Array of Independent (RAID) disks CentOS7/8 RAID levels Introduction to RAID 0 RAID 0 configurations Removing RAID from CentOS7/8 Introduction to RAID 1 (mirroring) Steps-by-step configuration of RAID-1 Deleting the RAID-1 array Introduction to RAID10 (mirroring + striping) RAID-10 configuration Deleting the RAID-10 array Adding spare disk to RAID-10 Introduction to RAID-5 Configuration of RAID-5 Assigning faulty disk and removal in RAID-5 Introduction to RAID level 6–striping with double parity Configuration of RAID-6 Conclusion Multiple choice questions Answers 10B. LVM and ISCSI CentOS7/8 Introduction Structure Objective Introduction to Logical Volume Manager (LVM) Steps to create an LVM logical volume Extending the volume group Reducing the volume group Moving one physical volume to new or existing volume group Resizing the LVM Logical Volume Extending the logical volume Reducing the logical volume Commands related to LVMs/VGs Backup and Restore the Logical Volume Group Exporting the volume group to another Linux machine Introduction to Internet Small Computer System Interface (iSCSI) iSCSI server specification iSCSI configuration steps Client-side configuration (iscsi initiator) Introduction to Openfiler Scenario using Openfiler Conclusion Multiple choice questions Answer 11. YUM Server Introduction Structure Objective Introduction to YUM Server Scenario for the YUM server using FTP Scenario for the dnf server using Apache on CentOS8 YUM/DNF server behind Squid proxy Removing/adding packages using YUM/DNF Conclusion Multiple choice questions Answers 12. Telnet Introduction Structure Objective Introduction to Telnet Installation of Telnet – Server packages Oracle Virtual Box setting for lab scenario Configuration of Telnet server (based on scenario) CentOS7/CentOS8 Client machine configuration Configuration of Telnet on Windows machine Telnet Server Scenario-2 Endian Firewall network setting for Oracle Virtual Box Telnet server network setting for Oracle Virtual Box Client machine network setting for Oracle Virtual Box Endian Firewall configuration Testing of Telnet Conclusion Multiple choice questions Answers 13. Domain Name System Introduction Structure Objective Introduction to DNS DNS database Root domain Top-level domain Second level domain Working of DNS Introduction to DNS zones Authoritative DNS server DNS caching name server Getting your own domain from registrar Primary and secondary DNS configurations DNS zones file syntax DNS resource record Allow/Deny DNS in UTM/Linux Firewall DNS Server Network Setting for Oracle Virtual Box Client machine network setting for Oracle Virtual Box Testing DNS server from Green-Zone Troubleshooting Conclusion Multiple choice questions Answers 14. Dynamic Host Control Protocol Introduction Structure Objective Introduction to DHCP server Installation of DHCP packages using YUM/dnf DHCP server configuration on CentOS7/8 Introduction to DHCP relay agent DHCP relay agent configuration on CentOS7/8 Conclusion Multiple choice questions Answers 15. Unified Threat Management (UTM) Introduction Structure Objective Introduction to UTM Introduction to Proxy Server Transparent proxy server Non-transparent proxy server Transparent proxy server using Endian firewall Configuration of non-transparent proxy (manual proxy) using Endian Firewall Introduction to Demilitarized zone (DMZ) Allow Telnet in DMZ Allow Internet in Green Zone Conclusion Multiple choice questions Answers 16. Squid Web Proxy Introduction Structure Objective Introducing Squid web proxy server Installing Squid packages using YUM Configuring the squid server Writing allow/block rule in Squid Allow networks to enable internet access Block bad URL’s Restrict file type downloads Restrict access to the internet according to the time period Monitoring internet activity using squid Changing the squid port Transparent and non-transparent squid server Configuration of transparent Squid proxy Conclusion Multiple choice questions Answer 17. Apache Web Server Introduction Structure Objective Introducing Apache web server Installing Apache web server by YUM server Configuring Apache web server based on scenario Apache web server (scenario using Oracle Virtual Box) Introduction to virtual hosting Domain name based virtual hosting IP address based virtual hosting Web server configuration based on authentication HTTP basic authentication Digest authentication Configuring redirection on Apache web server Apache configuration testing of Web Sever Configuring VPS server Introduction to SSL Installing SSL on VPS (CentOS7/CentOS8) Conclusion Multiple choice questions Answer 18. Linux as a Router Introduction Structure Objective Hardware/software requirements to set up Linux as a Router Setting up the Router Scenario Conclusion Multiple choice questions Answers 19. NIS Server Introduction Structure Objective Introduction to Network Information Server (NIS) Installation of NIS packages by Yum server Configuration of NIS server Possible troubleshoot Client-side configuration Conclusion Multiple choice questions Answers 20. NFS Server Introduction Structure Objective Introduction to Network File Sharing Server Installing NFS packages using YUM command Configuring NFS server using scenario Server-side configuration Allowing NFS in Firewall Accessing NFS share (client-side configuration) Kerberos Conclusion Multiple choice questions Answers 21. File Transfer Protocol Introduction Structure Objective Introduction to FTP (File Transfer Protocol) FTP connection modes Installing FTP packages using YUM server Configuring FTP server FTP Server (scenario 2) Endian Firewall Network setting for Oracle Virtual Box FTP Server Network setting for Oracle Virtual Box Client Machine Network setting for Oracle Virtual Box Conclusion Multiple choice questions Answers 22. Samba Configuration Introduction Structure Objective Introduction to Samba Installing samba packages using YUM Server Configuring Samba server scenario 1 Client-side configuration of Samba Assessing the samba share from Windows10 machine Configuring Samba Server (scenario 2) Endian firewall configuration Testing of samba server Conclusion Multiple choice questions Answer 23. Mail Server Configuration Introduction Structure Objective Introduction to mail sever Difference between different closed and open-source mail server Introduction to SMTP server Installing mail server packages Configuring Mail Server Scenario-1 DNS-server configuration steps Configuring mail server Accessing mail server by using public IP address/domain scenario 2 Testing of public mail server Conclusion Multiple choice questions Answers 24. Linux Hardening Introduction Structure Objective What is Linux hardening? BIOS security Disabling system booting from USB/DVD/CD or any external devices Protecting the Grub O.S updates from trusted sources Stopping or disabling unnecessary services Closing the open ports Password policy Assigning the limited privileges to users Securing SSH (Secure Shell) Scenario Limited user logins Deny users Banner Changing default port 22 Allowing port in firewall if port changed Limiting the listening address Enabling Selinux Removing graphical environment Disabling the IPv6 Locking the unused user account Disabling Ctrl + Alt + Delete Displaying banner Monitoring user activity Encrypting the disks Hardening of Linux by Bastille Testing of Linux hardening Conclusion Multiple choice questions Answers 25. Load Balancer Introduction Structure Objective Introducing load balancer Configuring load balancer for mail server Testing of load balancer Conclusion Multiple choice questions Answers 26. Setup Network Printer Services Introduction Structure Objective Introduction to printer Types of printers Installing printer scenario 1 Installing printer scenario 2 Sharing printer using organization policy Binding printer MAC to IP address Conclusion Multiple choice questions Answers 27. System Backup and Restore Process Introduction Structure Objective Introduction to backup server Full backup Incremental Differential Backup tools available in open source Installing backup tools Server-side configuration Copying VPS data using grsync Cloning the VPS disk Copying incremental data using rsync Backup using rsnapshot Maintaining integrity of backup Conclusion Multiple choice questions Answers 28. Linux Virtualization KVM Introduction Structure Objective Introduction to virtualization Desktop virtualization Server virtualization Network virtualization Storage virtualization Block level virtualization File level virtualization Types of hypervisors Installing KVM packages and VM Methods to access the VM Managing VM properties Managing VM from CLI (Command Line Interface) Conclusion Multiple choice questions Answers 29. Introduction to Open-Source Tools Introduction Structure Objective Introduction to AIDE Introduction to SNORT Introduction to NAGIOS Introduction to NGINX Installing NGINX Configuring nginx Cockpit Cacti Zimbra FreeNAS Openfiler Conclusion Multiple choice questions Answer 30. Troubleshooting Network Issues Introduction Structure Objective What is network troubleshooting? Steps involved in troubleshooting Basic network problems Software-based network troubleshooting tools ping (packet Internet gopher) traceroute nslookup Finding an A record using nslookup To check the NS records of a domain To query the SOA record of a domain About MX record Debug mode of nslookup ifconfig OPTIONS To configure IP address of Linux machine using ifconfig route Route flags- netstat Network Interface Configuration (NIC) file System log files /etc/resolv.conf /etc/hosts /etc/hostname Conclusion Multiple choice questions Answers Index
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.