Overview

The following provides an overview of techniques for hardening security in EFA.

Some basic knowledge of security principles and operations of the Linux operating system and associated technologies is assumed.

Note: This document assumes that EFA has been installed in secure mode and is operational. For details on how to achieve this, refer to the Extreme Fabric Automation Administration Guide, 2.7.0 , which includes details on EFA security options and commands.

Security hardening topics included in this document are: