Follow Techotopia on Twitter

On-line Guides
All Guides
eBook Store
iOS / Android
Linux for Beginners
Office Productivity
Linux Installation
Linux Security
Linux Utilities
Linux Virtualization
Linux Kernel
System/Network Admin
Scripting Languages
Development Tools
Web Development
GUI Toolkits/Desktop
Mail Systems
Eclipse Documentation

How To Guides
General System Admin
Linux Security
Linux Filesystems
Web Servers
Graphics & Desktop
PC Hardware
Problem Solutions
Privacy Policy




RedHat Fedora Core Installation Guide - Chapter 9. Security Configuration

Chapter 9. Security Configuration

The default security configuration for Fedora Core protects your system without restricting any of the functions of a desktop or laptop computer. If you are installing a server, you may need to alter these settings so others can access the system.

	  Security configuration screen.

Figure 9.1. Security Configuration Screen

Select Next to proceed after you review the security configuration and make any necessary changes.

9.1. Firewall

The firewall built into Fedora Core checks every incoming and outgoing network connection on your machine against a set of rules. These rules specify which types of connections are permitted and which are denied.

By default the firewall is enabled, with a simple set of rules that allow connections to be made from your system to others, but block incoming connections from other systems. You may make changes on this screen to allow access to specific network services on your Fedora system.

To enable access to services listed on this screen, click the check box next to the service name. After installation is complete, you can enable access to other services as well.

Avoid disabling the firewall. If you believe it is necessary to do so, select No firewall.

[Tip]Changing the Firewall Settings

To change these settings later, from the main menu, choose Desktop->System Settings->Security Level and Firewall.

  Published under the terms of the GNU General Public License Design by Interspire