Red Hat ENTERPRISE LINUX 5 - DEPLOYMENT Deployment Manual page 16

Hide thumbs Also See for ENTERPRISE LINUX 5 - DEPLOYMENT:
Table of Contents

Advertisement

Deployment Guide
43.1.6. Personal Firewalls ................................................................................ 620
43.1.7. Security Enhanced Communication Tools .............................................. 621
43.2. Server Security ............................................................................................... 621
43.2.1. Securing Services With TCP Wrappers and xinetd ................................. 622
43.2.2. Securing Portmap ................................................................................ 625
43.2.3. Securing NIS ....................................................................................... 626
43.2.4. Securing NFS ...................................................................................... 628
43.2.5. Securing the Apache HTTP Server ....................................................... 629
43.2.6. Securing FTP ...................................................................................... 630
43.2.7. Securing Sendmail ............................................................................... 633
43.2.8. Verifying Which Ports Are Listening ....................................................... 634
43.3. Single Sign-on (SSO) ...................................................................................... 635
43.3.1. Introduction .......................................................................................... 635
43.3.2. Getting Started with your new Smart Card ............................................. 637
43.3.3. How Smart Card Enrollment Works ....................................................... 638
43.3.4. How Smart Card Login Works .............................................................. 639
43.3.5. Configuring Firefox to use Kerberos for SSO ......................................... 640
43.4. Pluggable Authentication Modules (PAM) ......................................................... 642
43.4.1. Advantages of PAM ............................................................................. 643
43.4.2. PAM Configuration Files ....................................................................... 643
43.4.3. PAM Configuration File Format ............................................................. 643
43.4.4. Sample PAM Configuration Files ........................................................... 646
43.4.5. Creating PAM Modules ......................................................................... 647
43.4.6. PAM and Administrative Credential Caching .......................................... 647
43.4.7. PAM and Device Ownership ................................................................. 649
43.4.8. Additional Resources ............................................................................ 650
43.5. TCP Wrappers and xinetd ............................................................................... 651
43.5.1. TCP Wrappers ..................................................................................... 652
43.5.2. TCP Wrappers Configuration Files ........................................................ 653
43.5.3. xinetd .................................................................................................. 660
43.5.4. xinetd Configuration Files ..................................................................... 661
43.5.5. Additional Resources ............................................................................ 666
43.6. Kerberos ........................................................................................................ 667
43.6.1. What is Kerberos? ............................................................................... 667
43.6.2. Kerberos Terminology .......................................................................... 668
43.6.3. How Kerberos Works ........................................................................... 670
43.6.4. Kerberos and PAM ............................................................................... 671
43.6.5. Configuring a Kerberos 5 Server ........................................................... 672
43.6.6. Configuring a Kerberos 5 Client ............................................................ 674
43.6.7. Domain-to-Realm Mapping ................................................................... 675
43.6.8. Setting Up Secondary KDCs ................................................................. 675
43.6.9. Setting Up Cross Realm Authentication ................................................. 677
43.6.10. Additional Resources .......................................................................... 680
43.7. Virtual Private Networks (VPNs) ...................................................................... 682
43.7.1. How Does a VPN Work? ...................................................................... 682
43.7.2. VPNs and Red Hat Enterprise Linux ..................................................... 682
43.7.3. IPsec ................................................................................................... 683
43.7.4. Creating an IPsec Connection .............................................................. 683
43.7.5. IPsec Installation .................................................................................. 683
43.7.6. IPsec Host-to-Host Configuration .......................................................... 684
43.7.7. IPsec Network-to-Network Configuration ................................................ 690
xvi

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the ENTERPRISE LINUX 5 - DEPLOYMENT and is the answer not in the manual?

Questions and answers

Table of Contents