Novell LINUX ENTERPRISE DESKTOP 11 - SECURITY GUIDE 17-03-2009 Manual page 150

Hide thumbs Also See for LINUX ENTERPRISE DESKTOP 11 - SECURITY GUIDE 17-03-2009:
Table of Contents

Advertisement

Masquerading
Masquerading hides your internal network from external networks, such as the In-
ternet, while enabling hosts in the internal network to access the external network
transparently. Requests from the external network to the internal one are blocked
and requests from the internal network seem to be issued by the masquerading
server when seen externally. If special services of an internal machine need to be
available to the external network, add special redirect rules for the service.
Broadcast
In this dialog, configure the UDP ports that allow broadcasts. Add the required
port numbers or services to the appropriate zone, separated by spaces. See also the
file /etc/services.
The logging of broadcasts that are not accepted can be enabled here. This may be
problematic, because Windows hosts use broadcasts to know about each other and
so generate many packets that are not accepted.
IPsec Support
Configure whether the IPsec service should be available to the external network in
this dialog. Configure which packets are trusted under Details.
Logging Level
There are two rules for the logging: accepted and not accepted packets. Packets
that are not accepted are DROPPED or REJECTED. Select from Log All, Log
Only Critical, or Do Not Log Any for both of them.
Custom Rules
Here, set special firewall rules that allow connections, matching specified citeria
such as source network, protocol, destination port, and source port. Configure such
rules for external, internal, and demilitarized zone.
When completed with the firewall configuration, exit this dialog with Next. A zone-
oriented summary of your firewall configuration then opens. In it, check all settings.
All services, ports, and protocols that have been allowed, and all custom rules are listed
in this summary. To modify the configuration, use Back. Press Accept to save your
configuration.
138
Security Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Suse linux enterprise desktop 11

Table of Contents