mywindowsdownloads.blogspot.com
Click here for all Free Linux Downloads
Firewalls:
Data direction in iptables: This command is based on controlling data traffic in three directions: IN, OUT and THORUGH. That is, we can configure our iptables to stop data from entering into our LAN from outside network, stop data from leaving our computer, and control the data that travels forward between LAN and the internet.
Chains in iptables: Most of the firewalls are based on series of iptables commands. These commands are connected as chains. The RedHat Linux saves firewall commands in /etc/sysconfig/iptables file.
Pluggable Authentication Modules (PAM)
These modules are used to limit access to specific application, as redhat-config-network or reboot, to the root user itself. Different PAM modules let us control access by password, by access location or by user.
No comments:
Post a Comment