Get an overview of techniques for hardening security in EFA.
Learn about security hardening guidance for Extreme Fabric Automation (EFA), with an emphasis on the installation and usage of open source security tools to achieve a hardened operational security stance. It is assumed that you have some basic knowledge of security principles and operations of the Linux operating system and associated technologies.
Note: This document assumes that EFA has been installed in secure mode and is operational. For details on how to achieve this, refer to the Extreme Fabric Automation Administration Guide, 3.1.0 , which includes details on EFA security options and commands.
The following security hardening topics included in this document:
auditd: Instructions for monitoring various aspect of system runtime activities.
rkhunter: Specialized run time checks for various types of Linux rootkits.