Linux for Networking Professionals: Securely configure and operate Linux network services for the enterprise / Linux для сетевых специалистов: Безопасная настройка и эксплуатация сетевых служб Linux для предприятия Год издания: 2021 Автор: VandenBrink Rob / Ванденбринк Роб Издательство: Packt Publishing Ltd. ISBN: 978-1-80020-239-9 Язык: Английский Формат: PDF, EPUB Качество: Издательский макет или текст (eBook) Интерактивное оглавление: Да Количество страниц: 528 Описание: Get to grips with the most common as well as complex Linux networking configurations, tools, and services to enhance your professional skills Key Features Learn how to solve critical networking problems using real-world examples Configure common networking services step by step in an enterprise environment Discover how to build infrastructure with an eye toward defense against common attacks Book Description As Linux continues to gain prominence, there has been a rise in network services being deployed on Linux for cost and flexibility reasons. If you are a networking professional or an infrastructure engineer involved with networks, extensive knowledge of Linux networking is a must. This book will guide you in building a strong foundation of Linux networking concepts. The book begins by covering various major distributions, how to pick the right distro, and basic Linux network configurations. You'll then move on to Linux network diagnostics, setting up a Linux firewall, and using Linux as a host for network services. You'll discover a wide range of network services, why they're important, and how to configure them in an enterprise environment. Finally, as you work with the example builds in this Linux book, you'll learn to configure various services to defend against common attacks. As you advance to the final chapters, you'll be well on your way towards building the underpinnings for an all-Linux datacenter. By the end of this book, you'll be able to not only configure common Linux network services confidently, but also use tried-and-tested methodologies for future Linux installations. What you will learn Use Linux as a troubleshooting and diagnostics platform Explore Linux-based network services Configure a Linux firewall and set it up for network services Deploy and configure Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) services securely Configure Linux for load balancing, authentication, and authorization services Use Linux as a logging platform for network monitoring Deploy and configure Intrusion Prevention Services (IPS) Set up Honeypot solutions to detect and foil attacks Who this book is for This book is for IT and Windows professionals and admins looking for guidance in managing Linux-based networks. Basic knowledge of networking is necessary to get started with this book. Ознакомьтесь с наиболее распространенными, а также сложными сетевыми конфигурациями, инструментами и сервисами Linux, чтобы повысить свои профессиональные навыки Ключевые функции Узнайте, как решать критические сетевые проблемы на реальных примерах Пошаговая настройка общих сетевых служб в корпоративной среде Узнайте, как создавать инфраструктуру с прицелом на защиту от распространенных атак Описание книги По мере того как Linux продолжает набирать популярность, наблюдается рост числа сетевых сервисов, развертываемых на Linux по соображениям стоимости и гибкости. Если вы являетесь специалистом по сетям или инженером инфраструктуры, работающим с сетями, вам необходимы обширные знания в области сетевого взаимодействия Linux. Эта книга поможет вам создать прочную основу сетевых концепций Linux. Книга начинается с описания различных основных дистрибутивов, того, как выбрать правильный дистрибутив, и основных сетевых конфигураций Linux. Затем вы перейдете к диагностике сети Linux, настройке брандмауэра Linux и использованию Linux в качестве хоста для сетевых служб. Вы познакомитесь с широким спектром сетевых служб, узнаете, почему они важны и как их настроить в корпоративной среде. Наконец, работая с примерами сборок в этой книге по Linux, вы научитесь настраивать различные службы для защиты от распространенных атак. По мере продвижения к заключительным главам вы будете продвигаться по пути создания основы для полностью Linux-центра обработки данных. К концу этой книги вы сможете не только уверенно настраивать распространенные сетевые службы Linux, но и использовать проверенные методики для будущих установок Linux. Чему вы научитесь Использовать Linux в качестве платформы для устранения неполадок и диагностики Изучите сетевые сервисы на базе Linux Настроите брандмауэр Linux и настроите его для сетевых служб Безопасно развертывать и настраивать службы системы доменных имен (DNS) и протокола динамической настройки хоста (DHCP) Настроите Linux для служб балансировки нагрузки, аутентификации и авторизации Использовать Linux в качестве платформы ведения журнала для мониторинга сети Развертывать и настраивать службы предотвращения вторжений (IPS) Настроите решения Honeypot для обнаружения и предотвращения атак Для кого предназначена эта книга Эта книга предназначена для специалистов в области ИТ и Windows, а также администраторов, которым нужны рекомендации по управлению сетями на базе Linux. Для начала работы с этой книгой необходимы базовые знания в области сетевого взаимодействия.
Примеры страниц
Оглавление
Preface Section 1: Linux Basics 1 Welcome to the Linux Family Why Linux is a good fit for a networking team 4 Why is Linux important? 5 The history of Linux 7 Mainstream data center Linux 8 Red Hat 8 Oracle/Scientific Linux 9 SUSE 9 Ubuntu 9 BSD/FreeBSD/OpenBSD 10 Specialty Linux distributions 10 Open source firewalls 11 Kali Linux 11 SIFT 11 Security Onion 11 Virtualization 12 Linux and cloud computing 12 Picking a Linux distribution for your organization 13 Summary 14 Further reading 14 2 Basic Linux Network Configuration and Operations – Working with Local Interfaces Technical requirements 18 Working with your network settings – two sets of commands 18 Displaying interface IP information 21 Displaying routing information 24 IPv4 addresses and subnet masks 26 Special-purpose addresses 27 Private addresses – RFC 1918 29 Assigning an IP address to an interface 30 Adding a route 32 Adding a route using legacy approaches 34 Disabling and enabling an interface 34 Setting the MTU on an interface 35 More on the nmcli command 36 Summary 39 Questions 39 Further reading 39 Section 2: Linux as a Network Node and Troubleshooting Platform 3 Using Linux and Linux Tools for Network Diagnostics Technical requirements 44 Network basics – the OSI model 45 Layer 2 – relating IP and MAC addresses using ARP 47 MAC address OUI values 53 Layer 4 – how TCP and UDP ports work 54 Layer 4 – TCP and the three-way handshake 55 Local port enumeration – what am I connected to? What am I listening for? 57 Remote port enumeration using native tools 68 Remote port and service enumeration – nmap 74 NMAP scripts 82 Are there limits to Nmap? 88 Wireless diagnostic operations 89 Summary 95 Questions 96 Further reading 96 4 The Linux Firewall Technical requirements 98 Configuring iptables 98 iptables from a high level 99 The NAT table 105 The mangle table 107 Order of operations in iptables 108 Configuring nftables 110 nftables basic configuration 111 Using include files 112 Removing our Firewall Configuration 113 Table of Contents ix Summary 113 Questions 114 Further reading 114 5 Linux Security Standards with Real-Life Examples Technical requirements 116 Why do I need to secure my Linux hosts? 116 Cloud-specific security considerations 117 Commonly encountered industry-specific security standards 118 The Center for Internet Security critical controls 119 Getting a start on CIS critical security controls 1 and 2 123 OSQuery – critical controls 1 and 2, adding in controls 10 and 17 131 The Center for Internet Security benchmarks 136 Applying a CIS benchmark – securing SSH on Linux 137 SELinux and AppArmor 144 Summary 146 Questions 146 Further reading 147 Section 3: Linux Network Services 6 DNS Services on Linux Technical requirements 152 What is DNS? 152 Two main DNS server implementations 153 An organization's "internal" DNS server (and a DNS overview) 153 An internet-facing DNS server 157 Common DNS implementations 159 Basic installation: BIND for internal use 159 BIND: Internet-facing implementation specifics 163 DNS troubleshooting and reconnaissance 165 DoH 166 DoT 169 knot-dnsutils 171 Implementing DoT in Nmap 174 DNSSEC 175 Summary 177 Questions 177 Further reading 177 7 DHCP Services on Linux How does DHCP work? 181 Basic DHCP operation 182 DHCP requests from other subnets (forwarders, relays, or helpers) 183 DHCP options 185 Securing your DHCP services 187 Rogue DHCP server 187 Rogue DHCP client 190 Installing and configuring a DHCP server 191 Basic configuration 191 Static reservations 194 Simple DHCP logging and troubleshooting in everyday use 195 Summary 197 Questions 198 Further reading 198 8 Certificate Services on Linux Technical requirements 200 What are certificates? 200 Acquiring a certificate 201 Using a certificate – web server example 204 Building a private Certificate Authority 208 Building a CA with OpenSSL 208 Requesting and signing a CSR 212 Securing your Certificate Authority infrastructure 215 Legacy tried-and-true advice 215 Modern advice 215 CA-specific risks in modern infrastructures 216 Certificate Transparency 217 Using Certificate Authority for inventory or reconnaissance 218 Certificate automation and the ACME protocol 219 OpenSSL cheat sheet 221 Summary 224 Questions 224 Further reading 224 9 RADIUS Services for Linux Technical requirements 228 RADIUS basics – what is RADIUS and how does it work? 228 Implementing RADIUS with local Linux authentication 232 RADIUS with LDAP/LDAPS backend authentication 234 NTLM authentication (AD) – introducing CHAP 239 Unlang – the unlanguage 246 RADIUS use-case scenarios 247 VPN authentication using user ID and password 248 Administrative access to network devices 249 RADIUS configuration for EAP-TLS authentication 252 Wireless network authentication using 802.1x/EAP-TLS 254 Wired network authentication using 802.1x/EAP-TLS 257 Using Google Authenticator for MFA with RADIUS 260 Summary 261 Questions 262 Further reading 262 10 Load Balancer Services for Linux Technical requirements 266 Introduction to load balancing 266 Round Robin DNS (RRDNS) 266 Inbound proxy – Layer 7 load balancing 268 Inbound NAT – Layer 4 load balancing 270 DSR load balancing 272 Load balancing algorithms 275 Server and service health checks 276 Data center load balancer design considerations 277 Data center network and management considerations 280 Building a HAProxy NAT/proxy load balancer 284 Before you start configuring – NICs, addressing, and routing 285 Before you start configuring – performance tuning 285 Load balancing TCP services – web services 287 Setting up persistent (sticky) connections 291 Implementation note 292 HTTPS frontending 292 A final note on load balancer security 295 Summary 296 Questions 297 Further reading 297 11 Packet Capture and Analysis in Linux Technical requirements 300 Introduction to packet capturing – the right places to look 300 Capturing from either end 300 Switching the monitoring port 301 Intermediate in-line host 302 Network tap 302 Malicious packet capture approaches 304 Performance considerations when capturing 307 Capturing tools 309 tcpdump 309 Wireshark 309 TShark 310 Other PCAP tools 310 Filtering captured traffic 310 Wireshark capture filters (capturing your home network traffic) 311 tcpdump capture filters – VoIP phones and DHCP 313 More capture filters – LLDP and CDP 318 Collecting files from a packet capture 321 Troubleshooting an application – capturing a VoIP telephone call 324 Wireshark display filters – separating specific data in a capture 330 Summary 333 Questions 333 Further reading 334 12 Network Monitoring Using Linux Technical requirements 336 Logging using Syslog 336 Log size, rotation, and databases 337 Log analysis – finding "the thing" 338 Alerts on specific events 340 Syslog server example – Syslog 342 The Dshield project 348 Network device management using SNMP 351 SNMP NMS deployment example – LibreNMS 356 SNMPv3 363 Collecting NetFlow data on Linux 373 What is NetFlow and its "cousins" SFLOW, J-Flow, and IPFIX? 373 Flow collection implementation concepts 375 Configuring a router or switch for flow collection 376 An example NetFlow server using NFDump and NFSen 379 Summary 391 Questions 392 Further reading 392 Commonly used SNMP OIDs 394 13 Intrusion Prevention Systems on Linux Technical requirements 398 What is an IPS? 398 Architecture options – where does an IPS fit in your data center? 399 IPS evasion techniques 404 Detecting a WAF 404 Fragmentation and other IPS evasion methods 405 Classic/network-based IPS solutions – Snort and Suricata 407 Suricata IPS example 408 Constructing an IPS rule 420 Passive traffic monitoring 424 Passive monitoring with P0F – example 425 Zeek example – collecting network metadata 427 Summary 437 Questions 438 Further reading 438 14 Honeypot Services on Linux Technical requirements 442 Honeypot overview – what is a honeypot, and why do I want one? 442 Deployment scenarios and architecture – where do I put a honeypot? 444 Risks of deploying honeypots 449 Example honeypots 450 Basic port alerting honeypots – iptables, netcat, and portspoof 450 Other common honeypots 455 Distributed/community honeypot – the Internet Storm Center's DShield Honeypot Project 456 Summary 470 Questions 470 Further reading 471 Assessments Chapter 2 – Basic Linux Network Configuration and Operations – Working with Local Interfaces 473 Chapter 3 – Using Linux and Linux Tools for Network Diagnostics 474 Chapter 4 – The Linux Firewall 476 Chapter 5 – Linux Security Standards with Real-Life Examples 476 Chapter 6 – DNS Services on Linux 477 Chapter 7 – DHCP Services on Linux 478 Chapter 8 – Certificate Services on Linux 482 Chapter 9 – RADIUS Services for Linux 483 Chapter 10 – Load Balancer Services for Linux 485 Chapter 11 – Packet Capture and Analysis in Linux 486 Chapter 12 – Network Monitoring Using Linux 487 Chapter 13 – Intrusion Prevention Systems on Linux 488 Chapter 14 – Honeypot Services on Linux 489 Other Books You May Enjoy Index
VandenBrink Rob / Ванденбринк Роб - Linux for Networking Professionals: Securely configure and operate Linux network services for the enterprise / Linux для сетевых специалистов [2021, PDF, EPUB, ENG] download torrent for free and without registration
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum You cannot attach files in this forum You can download files in this forum