Table Of Contents - Red Hat ENTERPRISE LINUX 3 - SECURITY GUIDE Manual

Hide thumbs Also See for ENTERPRISE LINUX 3 - SECURITY GUIDE:
Table of Contents

Advertisement

Table of Contents

Introduction.......................................................................................................................................... i
1. Document Conventions......................................................................................................... ii
2. More to Come ...................................................................................................................... iv
2.1. Send in Your Feedback ......................................................................................... iv
I. A General Introduction to Security ................................................................................................ i
1. Security Overview................................................................................................................. 1
1.1. What is Computer Security? .................................................................................. 1
1.2. Security Controls ................................................................................................... 5
1.3. Conclusion ............................................................................................................. 6
2. Attackers and Vulnerabilities ................................................................................................ 7
2.1. A Quick History of Hackers .................................................................................. 7
2.2. Threats to Network Security .................................................................................. 7
2.3. Threats to Server Security...................................................................................... 8
2.4. Threats to Workstation and Home PC Security ................................................... 10
II. Configuring Red Hat Enterprise Linux for Security................................................................ 11
3. Security Updates ................................................................................................................. 13
3.1. Updating Packages............................................................................................... 13
4. Workstation Security........................................................................................................... 19
4.1. Evaluating Workstation Security ......................................................................... 19
4.2. BIOS and Boot Loader Security .......................................................................... 19
4.3. Password Security ................................................................................................ 22
4.4. Administrative Controls....................................................................................... 27
4.5. Available Network Services................................................................................. 33
4.6. Personal Firewalls ................................................................................................ 35
4.7. Security Enhanced Communication Tools........................................................... 36
5. Server Security.................................................................................................................... 37
5.3. Securing NIS........................................................................................................ 40
5.4. Securing NFS ....................................................................................................... 42
5.5. Securing the Apache HTTP Server...................................................................... 43
5.6. Securing FTP ....................................................................................................... 44
5.7. Securing Sendmail ............................................................................................... 47
5.8. Verifying Which Ports Are Listening .................................................................. 48
6. Virtual Private Networks..................................................................................................... 51
6.1. VPNs and Red Hat Enterprise Linux ................................................................... 51
6.2. Crypto IP Encapsulation (CIPE).......................................................................... 51
6.3. Why Use CIPE? ................................................................................................... 52
6.4. CIPE Installation.................................................................................................. 53
6.5. CIPE Server Configuration .................................................................................. 53
6.6. Configuring Clients for CIPE .............................................................................. 54
6.7. Customizing CIPE ............................................................................................... 56
6.8. CIPE Key Management ....................................................................................... 57
6.9. IPsec..................................................................................................................... 57
6.10. IPsec Installation................................................................................................ 58
6.11. IPsec Host-to-Host Configuration...................................................................... 58
6.12. IPsec Network-to-Network configuration.......................................................... 60
7. Firewalls.............................................................................................................................. 65
7.1. Netfilter and IPTables .......................................................................................... 66
7.2. Using IPTables ..................................................................................................... 66
7.3. Common
7.4.
Filtering.............................................................................. 68
and NAT Rules..................................................................................... 69
.......................................................................................... 70
.......................................... 37

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the ENTERPRISE LINUX 3 - SECURITY GUIDE and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Table of Contents