Installation guide

Fig u re 32.9 . Aut hen t icat io n
In the Authentication section, select whether to use shadow passwords and MD5 encryption for
user passwords. These options are highly recommended and chosen by default.
The Authentication Configuration options allow you to configure the following methods of
authentication:
NIS
LDAP
Kerberos 5
Hesiod
SMB
Name Switch Cache
These methods are not enabled by default. To enable one or more of these methods, click the
appropriate tab, click the checkbox next to Enable, and enter the appropriate information for the
authentication method. Refer to the Red Hat Enterprise Linux Deployment Guide for more information
about the options.
32.7. Firewall Configurat ion
The Firewall Configuration window is similar to the screen in the installation program and the
Secu rit y Level Co n f ig urat io n T oo l.
Red Hat Ent erprise Linux 5 Inst allat ion G uide
328