ProductsServer Desktop & Workstation Developer Subscriptions Satellite OpenStack Platform For IBM POWER For SAP Business Applications Management For Scientific ComputingExtended Update Support High Availability High Performance Network Load Balancer Resilient Storage Scalable File System Smart Management Extended Lifecycle SupportA-MQ Accelerate Automate Integrate Application Platform BPM Suite BRMS JBoss community or Red Hat JBoss Middleware Data Grid Data Virtualization Developer Studio Portfolio Edition Fuse Fuse Service Works Operations Network Portal Web Framework Kit Web Server
SolutionsWhy Red Hat Why open hybrid cloud? The new IT Public cloud Cloud resource library Private cloud Infrastructure-as-a-Service (IaaS) Platform-as-a-Service (PaaS) Cloud applications and workloadsSolaris to Red Hat Enterprise Linux Migration overview Migrate from your UNIX platform How to migrate to Red Hat Enterprise Linux Upgrade to the latest Red Hat Enterprise Linux release Red Hat JBoss Middleware Benefits of migrating to Red Hat Enterprise Linux Migration services Start a conversation with Red Hat
TrainingPopular and new courses Red Hat JBoss Administration curriculum Core System Administration curriculum Red Hat JBoss Middleware development curriculum Advanced System Administration curriculum Linux Development curriculum Cloud Computing, Virtualization, and Storage curriculum
ConsultingSOA and integration Business process management Custom Software Development Enterprise Data and Storage Systems management Migrations
Restrict access to systems from networks
A first line of defense for a computing system is to secure its network connection. Limiting access to necessary services, such as a web server or email Internet Message Access Protocol (IMAP) server, removes any risk of vulnerabilities in other services.
The many forms of firewalls
Firewalls take many forms, from hardware appliances that intercept all network traffic before allowing sanctioned traffic to pass to a gateway machine, to software approaches that work at different layers of the communication stack (for example, the application level or the application-agnostic transport level).
Easy firewall configuration
Red Hat® Enterprise Linux® includes an easy-to-use Firewall Configuration GUI tool that can implement basic firewall profiles. It's built on top of iptables, which is built into the Linux kernel. The powerful iptables can be configured directly, bypassing the GUI, to solve complex requirements.
Security support and updates