Title: SUSE Linux Enterprise Desktop Administration
1SUSE Linux Enterprise Desktop Administration
- Chapter 5
- Manage the Network Configuration
2Objectives
- Objective 1Manage the Network Configuration
Information from YaST - Objective 2Test the Network Connection with
Command-Line Tools - Objective 3Use SuSEfirewall2
- Objective 4Use Network Manager to Configure the
Network - Objective 5Provide Remote Access
3Objective 1Manage the Network Configuration
Information from YaST
- The YaST module for configuring network cards and
the network connection - Can be accessed from the YaST Control Center
- See Figure 5-1
- To activate the network configuration module,
select Network Devices gt Network Card - Network setup methods
- User Controlled with Network Manager
- Traditional Method with ifup
4Figure 5-1 The YaST module for configuring
network cards and the network connection
5Figure 5-2 List of the detected network cards
6Objective 1Manage the Network Configuration
Information from YaST (continued)
- Cards are usually autodetected by YaST
- And the correct kernel module is used
- Select the card you want to configure
- Then select Edit (see Figure 5-4)
- If the card is not recognized by YaST, the
required module must be entered manually - Use the Manual Network Card Configuration dialog
to configure (see Figure 5-3) - Network Configuration
- Kernel Module
7Figure 5-3 Manual Network Card Configuration
dialog
8Figure 5-4 Network Address Setup dialog
9Objective 1Manage the Network Configuration
Information from YaST (continued)
- Network address options
- None Address Setup
- Automatic Address Setup (via DHCP)
- Static Address Setup
- Hostname and Name Server
- Routing
- Advanced
- Hostname and Name Server configuration
- See Figure 5-6
10Figure 5-6 Hostname and Name Server Configuration
dialog
11Objective 1Manage the Network Configuration
Information from YaST (continued)
- Routing configuration
- See Figure 5-7
- General configuration options (see Figure 5-8)
- Firewall Zone
- No Zone, All Traffic Blocked
- Internal Zone (Unprotected)
- Demilitarized Zone
- External Zone
- Device Activation
- MTU (Maximum Transfer Unit)
12Figure 5-7 Routing Configuration dialog
13Figure 5-8 General tab of the Network Address
Setup dialog
14Objective 1Manage the Network Configuration
Information from YaST (continued)
- If you selected Wireless as a Device Type for a
WLAN card - A dialog appears where you can enter
WLAN-specific configuration parameters - WEP keys are entered in a separate dialog after
selecting WEP Keys - Verify that the Ethernet card is available in the
computer using the ip command
15Exercise 5-1 Manage the Network Configuration
Information from YaST
- In this exercise, change all important
configuration information into static values - Use the ip command to find out which IP address
you are currently using - Note your current hostname
- Then change the network configuration to a static
IP address, using the values you found - Use 10.0.0.254 as the default gateway and also as
the address of the name server
16Objective 2Test the Network Connection with
Command-Line Tools
- This objective will cover the following
- View and Change the Network Configuration with ip
- Test Network Connections
- Trace Network Packets
17View and Change the Network Configuration with ip
- IP address setup
- To display the IP address setup of all
interfaces, enter ip address show
18View and Change the Network Configuration with ip
(continued)
- Device attributes
- If you are only interested in the device
attributes and not in the IP address setup, you
can enter ip link show
19View and Change the Network Configuration with ip
(continued)
- Device statistics
- You can use the option -s with the ip command to
display additional statistics information about
the devices
20View and Change the Network Configuration with ip
(continued)
- Routing table
- To view the current routing table, enter ip route
show - Assign an IP address to a device
- Delete the IP address from a device
21View and Change the Network Configuration with ip
(continued)
- Change device attributes
- You can also change device attributes with the ip
tool - Basic command
- ip link set device attribute
- Set and delete routes
- Set a route to a different network
- Delete an entry from the routing table
22Test Network Connections with ping
- Tool ping
- Lets you check network connections between two
hosts in a simple way - Sends special network packets to the target
system and waits for a reply - Basic syntax ping 10.0.0.10
23Table 5-1 Options for ping
24Trace Network Packets with traceroute
- traceroute
- Diagnosis tool primarily used to check the
routing between different networks - Sends packets with an increasing TTL value to the
destination host - Uses UDP packets, which are called datagrams
- Syntax traceroute hostname
25Exercise 5-2 Test the Network Configuration
- In this exercise, you view the current network
configuration with the ip command and test it
using ping and traceroute - Use ip to view the current IP address and current
route - Use ping to access your own IP address, that of
the gateway, and that of www.novell.com - Use traceroute to view the hops an IP packet
takes to access www.novell.com
26Objective 3Use SuSEfirewall2
- Packet filtering in Linux is done by the kernel
and its netfilter framework - SuSEfirewall2
- Consists of a number of scripts that set rules to
filter IP packets using the program iptables - Can be configured using the YaST Firewall module
- An alternative would be to edit the file
/etc/sysconfig/SuSEfirewall2 with a text editor - See Figure 5-9
27Figure 5-9 YaST Firewall module
28Figure 5-10 Assign desktop system interfaces to
the External Zone
29Objective 3Use SuSEfirewall2 (continued)
- Allowing SSH services
- See Figure 5-11
- Changes are stored in the file /etc/sysconfig/SuSE
firewall2
30Figure 5-11 Allowing SSH service
31Figure 5-12 Firewall configuration summary
32Objective 4Use NetworkManager to Configure the
Network
- NetworkManager
- Allows you to change the network configuration
according to your needs - Without switching to the root account
- Runs as a root-user system level daemon
- Programs used
- /usr/sbin/NetworkManager
- /usr/sbin/NetworkManagerDispatcher
- NetworkManager will first try a wired and then a
wireless adapter
33Objective 4Use NetworkManager to Configure the
Network (continued)
- NetworkManager keeps two lists of wireless
networks - A trusted list and a preferred list
- NetworkManager applet
- Shows the current network configuration
- Also allows you to change the configuration
- To connect to a wireless network, select a
wireless network entry - Your computer will be disconnected from the wired
network and connected to the wireless network
34Figure 5-13 Switching to NetworkManager
35Objective 4Use NetworkManager to Configure the
Network (continued)
Figure 5-14 NetworkManager applet
36Objective 5Provide Remote Access
- This objective explains how to
- Use OpenSSH
- Configure VPN Connections
- Use VNC
37Use OpenSSH
- SSH suite
- Developed to provide secure transmission by
encrypting the authentication strings - And all the other data exchanged between the
hosts - SUSE Linux Enterprise Desktop 10 installs the
package OpenSSH by default - Includes programs such as ssh, scp, and sftp as
alternatives to Telnet, rlogin, rsh, rcp, and FTP
38Use OpenSSH (continued)
- Cryptography basics
- Cryptography deals with procedures and techniques
used to encrypt data - And prove the authenticity of data
- Symmetric encryption
- DES (Data Encryption Standard)
- Triple DES
- IDEA
- Blowfish
- AES (Advanced Encryption Standard)
39Use OpenSSH (continued)
- Cryptography basics (continued)
- Asymmetric encryption
- RSA
- DSA
- Diffie Hellman
- SSH features and architecture
- SSH features
- Login from a remote host
- Interactive or noninteractive command execution
on remote hosts
40Use OpenSSH (continued)
- SSH features and architecture (continued)
- SSH features (continued)
- File copying between different network hosts
optional support for compressing data - Cryptographically secured authentication and
communication across insecure networks - Automatic and transparent encryption of all
communication - Complete substitution of the r utilities
rlogin, rsh, and rcp - Port forwarding
- Tunneling
41Use OpenSSH (continued)
- SSH features and architecture (continued)
- SSH protocol versions
- Protocol Version 1 (SSH1) (see Figure 5-16)
- Protocol Version 2 (SSH2) (see Figure 5-17)
- SSH authentication mechanism configuration
- SSH server can decrypt the session key generated
and encrypted by the client only if it also has
the private key - Client can check if the public host key of the
server really belongs to the server - SSH currently does not use any directory services
or any certificates for public key management
42Figure 5-16 SSH Protocol Version 1 (SSH1)
43Figure 5-17 SSH Protocol Version 2 (SSH2)
44Use OpenSSH (continued)
- SSH features and architecture (continued)
- SSH authentication mechanism configuration
(continued) - The two most important mechanisms
- Public key (RSA/DSA) authentication
- Password authentication
- Configure the SSH server
- See Table 5-3
- Configuration file for the server is
/etc/ssh/sshd_config
45Use OpenSSH (continued)
Table 5-3 SSH Server configuration options
46Use OpenSSH (continued)
- Configure the SSH client
- Edit the file /etc/ssh/ssh_config
- Users can edit their individual settings in the
file /.ssh/config - Ensure that only servers are accepted whose keys
have been previously added to /.ssh/known_hosts
or /etc/ssh/ssh_known_hosts - Set the option StrictHostKeyChecking in the
client configuration file (/.ssh/config) to yes
47Use OpenSSH (continued)
- SSH-related commands
- See Table 5-4
- Basic syntax for ssh
- ssh options host command
- Basic syntax for scp is
- scp options sourcefile destinationfile
- SSH can also be used to protect unencrypted
traffic, like POP3, by tunneling it through an
SSH connection
48Use OpenSSH (continued)
Table 5-4 SSH-related commands
49Exercise 5-3 Practice Using OpenSSH
- Perform the following tasks
- Log in to your partners computer as root
- Execute the ps aux command on your partners
computer without logging in to his or her
computer - Copy the /etc/hosts file from your partners
computer to your /tmp directory - Copy the /etc/hosts file from your computer to
the home directory of geeko on your partners
computer - Using sftp, copy the /bin/date file from your
partners computer to /home/geeko/ on your
computer
50Use OpenSSH (continued)
- Public key authentication management
- Public key authentication process
- Public key of the user has to be stored on the
server in the home directory of the user account
being accessed - Public keys are stored on the server in the
file/.ssh/authorized_keys - The corresponding private key must be stored on
the client computer - The secret key should be protected by a passphrase
51Use OpenSSH (continued)
- Public key authentication management (continued)
- Create a key pair
- Create a key pair with the ssh-keygen command
- A different key is required for SSH1 than for
SSH2 - The keys are stored in the directory /.ssh
- Configure and use public key authentication
- For authentication using RSA or DSA keys, you
need to copy the public key to the server - And then append the public key to the file
/.ssh/authorized_keys
52Use OpenSSH (continued)
- Public key authentication management (continued)
- Configure and use public key authentication
(continued) - When authentication is done with keys, the
passphrase is required when logging in to the
server - Or when copying with scp
- The ssh-agent can be used to avoid typing this
passphrase upon each connection - The ssh-agent serves as a wrapper for any other
process - You can also use the ssh-agent with a graphical
login
53Exercise 5-4 Perform Public Key Authentication
- Create an ssh-key pair, add the public key to the
file geeko/.ssh/authorized_keys on your
partners computer, and note the difference
between logging in with and without a public key - Then, use the ssh-agent to cache the private key
and log in again to your partners machine as
geeko - As root, change the SSH server configuration to
allow only public key authentication - Restart sshd and, as root, try ssh geeko_at_localhost
54Configure VPN Connections
- VPN and IPSec basics
- VPN (Virtual Private Network)
- Technology that uses one network infrastructure
to carry the packets of another network - A VPN does not necessarily have to encrypt the
traffic, but encryption is used on most VPNs - Technologies used to implement VPNs
- IPSec, OpenVPN, L2TP, HTTPS, and SSH
55Configure VPN Connections (continued)
Figure 5-18 Virtual private network (VPN)
56Configure VPN Connections (continued)
- Configure VPN connections with NetworkManager
- The NetworkManager applet makes it easy to
connect to a VPN gateway - See Figure 5-19
- An assistant guides you through the VPN
configuration - See Figure 5-20
- Types of VPN clients
- Novell VPN client, OpenVPN client, and Compatible
Cisco VPN client (vpnc) - See Figure 5-21
57Configure VPN Connections (continued)
Figure 5-19 NetworkManager applet
58Configure VPN Connections (continued)
Figure 5-20 Create VPN Connection wizard
59Figure 5-21 Novell VPN client
60Configure VPN Connections (continued)
- Configure VPN connections with NetworkManager
(continued) - GNOME keyring
- Application that allows you to store various
credentials and protect them with a password - Advantage of using the GNOME keyring
- You only have to remember one password to unlock
the encrypted keyring - Contains various usernames and corresponding
passwords for different applications
61Use VNC
- VNC (Virtual Network Computing)
- VNC server software component transmits the
content of the screen to a remote computer - Running the VNC viewer software
- Allows someone else to view your desktop
- Allows another user to interact with the mouse
and keyboard - Implementations used on SUSE Linux Enterprise
Desktop 10 are TightVNC and vino - See Figures 5-24 and 5-25
62Use VNC (continued)
Figure 5-24 VNC remote desktop preferences
63Use VNC (continued)
Figure 5-25 User is informed of the connection
request
64Exercise 5-5 Use VNC
- In this exercise, you will work with a partner
- You start the VNC server using vino-preferences
and allow your partner to connect to your desktop
with vncviewer
65Summary
- The Network Card module of YaST can be used to
easily manage your network interface
configuration - Common IP configuration parameters include an IP
address, subnet mask, hostname, name server
(DNS), and WLAN settings for wireless network
interfaces - Network interface and IP information is stored in
the /etc/sysconfig/network directory - Different IP networks are connected to one
another via routers
66Summary (continued)
- After system initialization, you can use the ip
command to view, configure, and manage your
network interfaces, IP configuration, and routing
table - You can use the Firewall module of YaST to
configure packet filtering on your network
interfaces - NetworkManager can be used to keep track of
several wired and wireless networks on portable
or laptop computers - The SSH daemon (sshd) provides a secure
alternative to telnet, rlogin, rsh, rcp, and FTP
by encrypting traffic
67Summary (continued)
- SSH uses a combination of asymmetric and
symmetric encryption and supports several
standard encryption algorithms - You can configure the SSH type, authentication,
and encryption types in the SSH server
configuration file /etc/ssh/sshd_config - You can generate asymmetric SSH encryption keys
using the ssh-keygen command and view them using
the ssh-keyscan command - You can use the vino-preferences command to
configure a VNC server