Red Hat ENTERPRISE LINUX AS 2.1 - Guida di Installazione Pagina 34

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 86
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 33
26 Chapter 2. Installing Red Hat Enterprise Linux
2.15. Firewall Configuration
Red Hat Enterprise Linux offers firewall protection for enhanced system security. A firewall exists
between your computer and the network, and determines which resources on your computer remote
users on the network can access. A properly configured firewall can greatly increase the security of
your system.
Figure 2-12. Firewall Configuration
Next, you can decide whether to enable a firewall for your Red Hat Enterprise Linux system.
No firewall
No firewall provides complete access to your system and does no security checking. Security
checking is the disabling of access to certain services. This should only be selected if you are
running on a trusted network (not the Internet) or plan to do more firewall configuration later.
Enable firewall
If you choose Enable firewall, connections are not accepted by your system (other than the
default settings) that are not explicitly defined by you. By default, only connections in response
to outbound requests, such as DNS replies or DHCP requests, are allowed. If access to services
running on this machine is needed, you can choose to allow specific services through the firewall.
If you are connecting your system to the Internet, this is the safest option to choose.
Next, select which services, if any, should be allowed to pass through the firewall.
Enabling these options allow the specified services to pass through the firewall. Note, these services
may not be installed on the system by default. Make sure you choose to enable any options that you
may need.
Vedere la pagina 33
1 2 ... 29 30 31 32 33 34 35 36 37 38 39 ... 85 86

Commenti su questo manuale

Nessun commento