Linux - NetworkingThis forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
I know this may sound strange, but I really need input on this and I dont know anywhere else to ask.
There is a proxy server in the organizaion I work for, we have 7 PCs in our office, and proxy limits our options to retrive mail via POP clients that cant deal with proxy. Plus that many of those in other offices try to hack us and each other in thire free time.
So what I came to, is to build a router to deal with proxy and hackers and we live in peace, pointing to it as a gateway in the network configuration.
My problem is will this work with mail?
and which distro should i use?
Distribution: OpenBSD 4.6, OS X 10.6.2, CentOS 4 & 5
Routers and proxies do different things. Depending on how the network is designed, it might block all outbound traffic that doesn't come from the proxy, and that would force you to use the proxy. Putting your own router behind that wouldn't change anything. In fact, there's nothing you could do by putting another gateway on your local network that could get you around the proxy.
As for the other departments trying to crack your machines, you may be able to limit what they can do by errecting a firewall on your local network segment, but you would have to make sure that all your machines cannot be accessed by bypassing the firewall and routing directly to them, i.e. you would have to create a new network segment behind the firewall and move all your machines onto a switch that was connected to the firewall (or take the current switch and plug it's uplink port into the firewall, but that switch is probably in a wiring closet somewhere).
Even if you do put up a firewall, if you're allowing inbound connections through it, other people could still try to attack the services that run on those ports.