Documentation
>
Security Guide
>
◀
▶
Part III. Network Security
Contents
13. SSH: Secure Network Operations
13.1. The OpenSSH Package
13.2. The ssh Program
13.3. scp—Secure Copy
13.4. sftp—Secure File Transfer
13.5. The SSH Daemon (sshd)—Server-Side
13.6. SSH Authentication Mechanisms
13.7. X, Authentication, and Forwarding Mechanisms
13.8. Configuring An SSH Daemon with YaST
13.9. For More Information
14. Masquerading and Firewalls
14.1. Packet Filtering with iptables
14.2. Masquerading Basics
14.3. Firewalling Basics
14.4. SuSEfirewall2
14.5. For More Information
15. Configuring VPN Server
15.1. Overview
15.2. Creating the Simplest VPN Example
15.3. Setting Up Your VPN Server Using Certificate Authority
15.4. Changing Nameservers in VPN
15.5. KDE- and GNOME Applets For Clients
15.6. For More Information
16. Managing X.509 Certification
16.1. The Principles of Digital Certification
16.2. YaST Modules for CA Management