
Chapter 8. Red Hat Enterprise V5.3 Linux installation 361
6. The next panel is the Authentication panel. In this configuration, we use the
default settings.
7. Figure 0-5 shows the Firewall Configuration panel. As an example, it is good
to enable SSH and to trust interface eth1 at the very minimum to access the
system later using the network.
Figure 0-5 Firewall Configuration panel (©2008 Red Hat, Inc.)
Kommentare zu diesen Handbüchern