Table of Contents
Introduction.......................................................................................................................................... i
1. Document Conventions......................................................................................................... ii
2. More to Come ...................................................................................................................... iv
1. Security Overview................................................................................................................. 1
1.2. Security Controls ................................................................................................... 5
1.3. Conclusion ............................................................................................................. 6
3. Security Updates ................................................................................................................. 13
3.1. Updating Packages............................................................................................... 13
4. Workstation Security........................................................................................................... 19
4.3. Password Security ................................................................................................ 22
4.6. Personal Firewalls ................................................................................................ 35
5. Server Security.................................................................................................................... 37
5.3. Securing NIS........................................................................................................ 40
5.4. Securing NFS ....................................................................................................... 42
5.6. Securing FTP ....................................................................................................... 44
5.7. Securing Sendmail ............................................................................................... 47
6.3. Why Use CIPE? ................................................................................................... 52
6.4. CIPE Installation.................................................................................................. 53
6.7. Customizing CIPE ............................................................................................... 56
6.9. IPsec..................................................................................................................... 57
6.10. IPsec Installation................................................................................................ 58
7. Firewalls.............................................................................................................................. 65
7.2. Using IPTables ..................................................................................................... 66
7.3. Common
7.4.
Filtering.............................................................................. 68
and NAT Rules..................................................................................... 69
.......................................................................................... 70
.......................................... 37
Need help?
Do you have a question about the ENTERPRISE LINUX 3 - SECURITY GUIDE and is the answer not in the manual?
Questions and answers