12.07.2015 Views

Red Hat Enterprise Linux 5 Administration Unleashed

Red Hat Enterprise Linux 5 Administration Unleashed

Red Hat Enterprise Linux 5 Administration Unleashed

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

58CHAPTER 2Post-Installation ConfigurationFIGURE 2.1Welcome to the Setup AgentThe first task is to read the License Agreement, which explains that the software can becopied, modified, and redistributed with the exception of a few image files such as the <strong>Red</strong><strong>Hat</strong> logo. You must agree to the license before continuing to use <strong>Red</strong> <strong>Hat</strong> <strong>Enterprise</strong> <strong>Linux</strong>.The next step is to determine whether or not to enable the built-in firewall (see Figure2.2). If you prefer to configure a custom firewall using IPTables (refer to Chapter 24,“Configuring a Firewall”) you can either disable the built-in firewall or enable it for nowand then disable it later after configuring IPTables.To modify the firewall settings later, start the Security Level Configuration Tool by selectingthe System menu from the top panel of the desktop and selecting <strong>Administration</strong>,Security Level and Firewall or by executing the system-config-securitylevelcommand. If you are not root when you run the tool, you will be prompted to enter theroot password before continuing.Security-Enhanced <strong>Linux</strong>, or SE<strong>Linux</strong>, allows administrators to add an additional layer ofsecurity to <strong>Linux</strong>. Instead of relying on users to secure their files with file permissions andsoftware distributors to make the default file permissions of critical system files secure,SE<strong>Linux</strong> only allows processes access to files they absolutely need to function. For detailson SE<strong>Linux</strong>, refer to Chapter 23, “Protecting Against Intruders with Security-Enhanced<strong>Linux</strong>.” Select one of three SE<strong>Linux</strong> modes (see Figure 2.3):. Enforcing: Configure SE<strong>Linux</strong> for the system using the default targeted policy. Permissive: Only warn about services protected by SE<strong>Linux</strong>. Disabled: Turn off SE<strong>Linux</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!