Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Fedora Linux System Administration
  • Table Of Contents Toc
  • Feedback & Rating feedback
Fedora Linux System Administration

Fedora Linux System Administration

By : Alex Callejas
5 (5)
close
close
Fedora Linux System Administration

Fedora Linux System Administration

5 (5)
By: Alex Callejas

Overview of this book

Fedora Linux is a free and open-source platform designed for hardware, clouds, and containers that enables software developers and community members to create custom solutions for their customers. This book is a comprehensive guide focusing on workstation configuration for the modern system administrator. The book begins by introducing you to the philosophy underlying the open-source movement, along with the unique attributes of the Fedora Project that set it apart from other Linux distributions. The chapters outline best practices and strategies for essential system administration tasks, including operating system installation, first-boot configuration, storage, and network setup. As you make progress, you’ll get to grips with the selection and usage of top applications and tools in the tech environment. The concluding chapters help you get a clear understanding of the basics of version control systems, enhanced Linux security, automation, virtualization, and containers, which are integral to modern system administration. By the end of this book, you’ll have gained the knowledge needed to optimize day-to-day tasks related to Linux-based system administration.
Table of Contents (20 chapters)
close
close
1
Part 1:The Fedora Project
3
Part 2:Workstation Configuration
8
Part 3:Productivity Tools
13
Part 4:System Administration Tools

Improving network connectivity using a VPN

A VPN is a way of connecting to a local network over the internet.

A VPN connection creates a single virtual private network between two points. Each bit of data gets encrypted from point to point via tunneling. Tunneling refers to the process by which VPN packets reach their destination. VPNs operate at the operating system level, redirecting all their traffic through other servers. All traffic, including its physical location, remains hidden during network browsing. When using a VPN, the VPN router, called the proxy server, appears as the origin of the connection, not the real one. So, neither the site offering public access nor anyone else will be able to deduce who you are or what you are doing.

The following diagram shows, with a red line, the tunneling created by the VPN by connecting the workstation to the managed server through the public network:

Figure 5.33 – Virtual private network

Figure 5.33 – Virtual private network

A VPN...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech

Create a Note

Modal Close icon
You need to login to use this feature.
notes
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Delete Note

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Edit Note

Modal Close icon
Write a note (max 255 characters)
Cancel
Update Note

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY