Installation guide
42 Chapter 4. Installing Red Hat Enterprise Linux
Tip
To change your network configuration after you have completed the installation, use the Network
Administration Tool.
Type the system-config-network command in a shell prompt to launch the Network Administra-
tion Tool. If you are not root, it prompts you for the root password to continue.
4.19. Firewall Configuration
Red Hat Enterprise Linux offers firewall protection for enhanced system security. A firewall exists
between your computer and the network, and determines which resources on your computer remote
users on the network can access. A properly configured firewall can greatly increase the security of
your system.
Figure 4-18. Firewall Configuration
Next, you can decide whether to enable a firewall for your Red Hat Enterprise Linux system.
No firewall
No firewall provides complete access to your system and does no security checking. Security
checking is the disabling of access to certain services. This should only be selected if you are
running on a trusted network (not the Internet) or plan to do more firewall configuration later.