Red Hat Enterprise Security Network Services
Course Details
- Centralized authentication security
- – Configure an NIS server to provide directory services
- – Configure Kerberos to provide user authentication
- – Configure NFSv4 server
- – Configure a network client to use NIS for directory information
- – Configure a network client to use Kerberos for authentication
- – Configure a network client to mount an NFSv4 export
- – Configure r-clients (rlogin, rcp, etc.) and telnet to use Kerberos
- Network Services Security
- – Use xinetd and TCP wrappers to restrict access to network services
- – Configure Postfix and Sendmail to:
- – Filter mail based on message characteristics
- – Use TLS for secure communication
- – Use the Real-time Blackhole List (RBL) via DNS
- – Configure POP/IMAP to use SSL/TLS for secure communication
- – Configure the following aspects of DNS:
- – Master domain
- – Slave domain
- – Views
- – Forwarders
- – Blackhole lists (RBL)
- – TSIG
- – Use GPG tools to:
- – Generate key pairs
- – Sign documents
- – Encrypt documents
- – Decrypt documents
- – Verify document signatures
- – Configure a certificate authority (CA) and sign certificate requests
- – Configure httpd to use an SSL certificate signed by a certifying authority
- – Configure httpd to use passwords and/or network location to restrict access to content
- – Configure FTP security to:
- – Support FTP only users
- – Implement host-based access restrictions