11.01.2015 Views

Red Hat Enterprise Linux Installation Guide 5.2 - linux.meuhobby.com

Red Hat Enterprise Linux Installation Guide 5.2 - linux.meuhobby.com

Red Hat Enterprise Linux Installation Guide 5.2 - linux.meuhobby.com

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Firewall Configuration<br />

Figure 29.9. Authentication<br />

In the Authentication section, select whether to use shadow passwords and MD5 encryption<br />

for user passwords. These options are highly re<strong>com</strong>mended and chosen by default.<br />

The Authentication Configuration options allow you to configure the following methods of<br />

authentication:<br />

• NIS<br />

• LDAP<br />

• Kerberos 5<br />

• Hesiod<br />

• SMB<br />

• Name Switch Cache<br />

These methods are not enabled by default. To enable one or more of these methods, click the<br />

appropriate tab, click the checkbox next to Enable, and enter the appropriate information for the<br />

authentication method. Refer to the <strong>Red</strong> <strong>Hat</strong> <strong>Enterprise</strong> <strong>Linux</strong> Deployment <strong>Guide</strong> for more<br />

information about the options.<br />

325

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!