Firewall Configuration - Red Hat LINUX 7.1 - ISERIES Manual

Official red hat linux iseries
Table of Contents

Advertisement

Section 3.13:Firewall Configuration

3.13 Firewall Configuration

Red Hat Linux also offers you firewall protection for enhanced system security. A firewall exists
between your computer and the network, and determines which resources on your computer remote
users on the network can access. A properly configured firewall can greatly increase the security of
your system.
Choose the appropriate security level for your system.
Figure 3–13 Firewall Configuration
High
If you choose
High
that are not explicitly defined by you. By default, only the following connections are allowed:
DNS replies
DHCP — so any network interfaces that use DHCP can be properly configured
If you choose
High
Active mode FTP (passive mode FTP, used by default in most clients, should still work)
, your system will not accept connections (other than the default settings)
, your firewall will not allow the following:
37

Advertisement

Table of Contents
loading

This manual is also suitable for:

Linux 7.1

Table of Contents