This application requires Javascript to be enabled.
Print Preferences
Show Table of Contents
Show Page Modified Info
Show Link Endnotes
Page last modified
20:07, 18 Dec 2007
by
Gavin
Print page
Table of contents
Search:
Documentation for versions 4 and higher is at docs.zmanda.com
You must be logged in to modify your watchlist.
Table of contents
1.
Data Encryption
2.
Transport Encryption
2.1.
Steps to configure ssh authentication
3.
Communication port usage
4.
Configuring firewall using iptables between Amanda server and client
4.1.
Backup process - amdump command
4.1.1.
IP tables connection tracking module for Amanda
4.1.2.
iptables rulesets
4.2.
Backup recovery process - amrecover command
5.
SE Linux environment
5.1.
SELinux targeted policy
5.2.
SELinux strict policy
6.
User Authentication through the Web-based GUI
7.
Summary
Comments / Feedback
Powered by
MindTouch Deki Open Source Edition
v.8.08.2
RSS feeds
Users
Templates
Sitemap
Popular pages
Edit page
New page
Restrict access
Attach file
Move page
Delete page
Print page
Tag
Email link
Set page properties
Talk page
Watch page
Table of contents
1.
Data Encryption
2.
Transport Encryption
2.1.
Steps to configure ssh authentication
3.
Communication port usage
4.
Configuring firewall using iptables between Amanda server and client
4.1.
Backup process - amdump command
4.1.1.
IP tables connection tracking module for Amanda
4.1.2.
iptables rulesets
4.2.
Backup recovery process - amrecover command
5.
SE Linux environment
5.1.
SELinux targeted policy
5.2.
SELinux strict policy
6.
User Authentication through the Web-based GUI
7.
Summary
dismiss message
view details
Message will close by itself in
seconds
Message timer has been stopped
Viewing Details: