Solaris CX-310-301 Instrukcja Użytkownika Strona 10

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 77
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 9
Solaris 9 Security CX-310-301 9
Undoing SST .......................................................................................................................... 69
Verifying SST.......................................................................................................................... 70
Network Connection Access, Authentication and Encryption .................................71
TCP Wrappers ........................................................................................................................... 71
Configuring TCP Wrappers .................................................................................................... 71
Denying and Allowing Host Connects .................................................................................... 72
Denying Connections with a Banner Message ...................................................................... 72
Logging................................................................................................................................... 73
Validating TCP Wrappers....................................................................................................... 73
Cryptology .................................................................................................................................. 74
Terminology............................................................................................................................ 74
Solaris Secure Shell................................................................................................................... 74
Configuring the Server ........................................................................................................... 75
Starting and Stopping SSHD.................................................................................................. 75
Configuring the Client............................................................................................................. 75
Generating a Client Key .........................................................................................................76
Using ssh................................................................................................................................ 76
Przeglądanie stron 9
1 2 ... 5 6 7 8 9 10 11 12 13 14 15 ... 76 77

Komentarze do niniejszej Instrukcji

Brak uwag