Print Preferences
Page last modified 20:07, 18 Dec 2007 by Gavin
  • Print page
  • Table of contents

Documentation for versions 4 and higher is at docs.zmanda.com

  • You must be logged in to modify your watchlist.
Table of contents
  1. 1. Data Encryption
  2. 2. Transport Encryption
    1. 2.1. Steps to configure ssh authentication
  3. 3. Communication port usage
  4. 4. Configuring firewall using iptables between Amanda server and client
    1. 4.1. Backup process - amdump command
      1. 4.1.1. IP tables connection tracking module for Amanda
      2. 4.1.2. iptables rulesets
    2. 4.2. Backup recovery process - amrecover command
  5. 5. SE Linux environment
    1. 5.1. SELinux targeted policy
    2. 5.2. SELinux strict policy
  6. 6. User Authentication through the Web-based GUI
  7. 7. Summary

Retrieved from "http://legacydocs.zmanda.com/Amanda_Enterprise_Edition_Security_Features"


Comments / Feedback
Powered by MindTouch Deki Open Source Edition v.8.08.2
  • RSS feeds
  • Users
  • Templates
  • Sitemap
  • Popular pages
  • Edit page
  • New page
  • Restrict access
  • Attach file
  • Move page
  • Delete page
  • Print page
  • Tag
  • Email link
  • Set page properties
  • Talk page
  • Watch page
Table of contents
  1. 1. Data Encryption
  2. 2. Transport Encryption
    1. 2.1. Steps to configure ssh authentication
  3. 3. Communication port usage
  4. 4. Configuring firewall using iptables between Amanda server and client
    1. 4.1. Backup process - amdump command
      1. 4.1.1. IP tables connection tracking module for Amanda
      2. 4.1.2. iptables rulesets
    2. 4.2. Backup recovery process - amrecover command
  5. 5. SE Linux environment
    1. 5.1. SELinux targeted policy
    2. 5.2. SELinux strict policy
  6. 6. User Authentication through the Web-based GUI
  7. 7. Summary
  • dismiss message
  • view details
Message will close by itself in seconds Message timer has been stopped

Viewing Details: