Book Image

Mastering Linux Network Administration

By : Jay LaCroix
Book Image

Mastering Linux Network Administration

By: Jay LaCroix

Overview of this book

Linux is everywhere. Whether you run a home office, a small business, or manage enterprise systems, Linux can empower your network to perform at its very best. Armed with the advanced tools and best practice guidance of this practical guide, you'll be able to mold Linux networks to your will, empowering your systems and their users to take advantage of all that Linux-based networks have to offer. Understand how Linux networks function and get to grips with essential tips and tricks to manage them - whether you're already managing a networks, or even just starting out. With Debian and CentOS as its source, this book will divulge all the details you need to manage a real Linux-based network. With detailed activities and instructions based on real-world scenarios, this book will be your guide to the exciting world of Linux networking.
Table of Contents (17 chapters)
Mastering Linux Network Administration
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Scanning your network with Nmap and Zenmap


The nmap utility is a network scanner that can give you a great deal of information regarding network resources. All you should have to do is install the nmap package. Once you have this utility in your arsenal, you can do some pretty neat things on your network. In most cases, nmap is used to interrogate systems and extract information. While nmap itself doesn't solve any actual problems, it helps you discover information you can use in order to build an understanding of what's happening on your network at any given time.

It also needs to be used with great care, as nmap is capable of disclosing information regarding a network that may be private, and unless you have express permission to use it, you should exercise discretion. Since nmap can be used for purposes of hacking, it's definitely a red flag to a network administrator (if that person isn't you) if they see this type of activity on the network. But in real-world scenarios, nmap can really...