Download presentation
Presentation is loading. Please wait.
Published byKellie Henry Modified over 9 years ago
1
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Security Strategies in Linux Platforms and Applications Lesson 8 Networked Filesystems and Remote Access
2
Page 2 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Learning Objective Describe Linux file-sharing and remote access solutions.
3
Page 3 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Key Concepts File-sharing with Network File System (NFS) and Samba Secure remote access tools Encryption with Secure Shell (SSH) and the Internet Protocol Security (IPsec) protocol
4
Page 4 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. DISCOVER: CONCEPTS
5
Page 5 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Common Network Services Software File Sharing SambaNetwork File System (NFS) Has built-in interoperability with Windows clients Generally faster than Samba when transferring large files Can be set up as a member server in Windows environment Easy to set up Has username/password authentication Authentication is Internet Protocol (IP)-based; however, it can support Kerberos Can configure to squash root
6
Page 6 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Common Network Services Software (Continued) Web server Database Authentication and directory services E-mail and printing File Transfer Protocol (FTP)
7
Page 7 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Remote Access Tools Open Berkeley Software Distribution (BSD) Secure Shell (OpenSSH) SSH client commands Port 22 Authentication X11 forwarding Port forwarding
8
Page 8 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Remote Access Tools (Continued) Internet Protocol Security (IPsec) Authentication Header (AH) and Encapsulated Security Payload (ESP) protocols Internet Key Exchange (IKE) protocol Racoon Free Secure Wide-Area Networking (FreeS/WAN) StrongSwan and Openswan
9
Page 9 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Remote Access Tools (Continued) Secure Sockets Layer (SSL) An SSL virtual private network (VPN) connection uses the traditional SSL over Hypertext Transfer Protocol (HTTP) certificates. SSL VPN is easier to configure and setup than IPsec. OpenVPN is the most popular Linux-based SSL VPN solution.
10
Page 10 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. DISCOVER: PROCESS
11
Page 11 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Configuring Samba
12
Page 12 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Configuring Samba (Continued)
13
Page 13 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. DISCOVER: ROLES
14
Page 14 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Authentication
15
Page 15 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Kerberos
16
Page 16 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. DISCOVER: RATIONALE
17
Page 17 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. The Problem with Clear Text
18
Page 18 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Telnet vs. SSH
19
Page 19 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Summary File-sharing with Network File System (NFS) and Samba Secure remote access tools Encryption with Secure Shell (SSH) and the Internet Protocol Security (IPsec) protocol
20
Page 20 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. OPTIONAL SLIDES
21
Page 21 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. A Request for a Passphrase
22
Page 22 Security Strategies in Linux Platforms and Applications © 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. An /etc/racoon/racoon.conf File
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.