Difference between revisions of "Template:Menu content security"
Line 44: | Line 44: | ||
!colspan="2"|Firewall | !colspan="2"|Firewall | ||
|- | |- | ||
− | |rowspan=" | + | |rowspan="7"|Basics |
|[[Firewall principle]] | |[[Firewall principle]] | ||
|- | |- | ||
Line 56: | Line 56: | ||
|- | |- | ||
|[[Firewall INPUT filters]] | |[[Firewall INPUT filters]] | ||
+ | |- | ||
+ | |[[Firewall log dropped]] | ||
|- | |- | ||
|rowspan="2"|Advanced | |rowspan="2"|Advanced |
Revision as of 16:54, 18 November 2014
Contents
Security
How to secure your server / workstation ?
Global security
SSH
- SSH server setup
- SSH server using local user / password auth.
- SSH server using key auth.
- SSH server using LDAP user auth.
- SSH server using LDAP key auth.
Firewall
This section explains HOW to create, maintain and use a firewall with IpTables.
Firewall | |
---|---|
Basics | Firewall principle |
Firewall basics | |
Firewall core (main) protocols | |
Firewall VPN | |
Firewall OUTPUT filters | |
Firewall INPUT filters | |
Firewall log dropped | |
Advanced | Firewall port forwarding |
Firewall source address filtering | |
Installation and scripts | Firewall installation scripts |
SSL
SSL certificates and chain of trust
VPN
Remote desktop
Intrusion Detection / Protection
Protection is good, but that's not enough! We need to detect attacks.
- IDS = Intrusion Detection System : tool that detect attacks.
- IPS = Intrusion Protection System : detect an intrusion attempt and react upon it.
I'm using one of the most famous IDS: "Snort" (https://www.snort.org/).