The following provides an overview of techniques for hardening security in EFA.
Some basic knowledge of security principles and operations of the Linux operating system and associated technologies is assumed.
Note: This document assumes that EFA has been installed in secure mode and is operational. For details on how to achieve this, refer to the Extreme Fabric Automation Administration Guide, 2.7.0 , which includes details on EFA security options and commands.
Security hardening topics included in this document are:
auditd
: Instructions for monitoring various aspect
of system runtime activities.rkhunter
: Specialized run time checks for various
types of Linux rootkits.