
8.9.5 Firewall
SuSEfirewall2 can protect your machine against attacks from the Internet. Configure
it with Security and Users > Firewall. Find detailed information about SuSEfirewall2
in
Chapter 43, Masquerading and Firewalls
(page 817).
TIP: Automatic Activation of the Firewall
YaST automatically starts a firewall with suitable settings on every configured
network interface. Start this module only if you want to reconfigure the firewall
with custom settings or deactivate it.
8.10 Virtualization
Virtualization makes it possible to run several operating systems on one physical ma-
chine. The hardware for the different systems is provided virtually. Virtualization YaST
modules provide configuration for the Xen virtualization system. For detailed information
about Xen, see
Chapter 22, Virtualization
(page 421).
The following modules are available in the Virtualization section:
Installing Hypervisor and Tools
Before you start using Xen, install a kernel with Xen support and related tools. To
install them, use Virtualization > Install Hypervisor and Tools. After installation
reboot your system to use the Xen kernel.
Creating Virtual Machines
After you successfully installed the Xen hypervisor and tools, you can install virtual
machines on your virtual server. To install a virtual machine, use Virtualization >
Create Virtual Machines.
8.11 Miscellaneous
The YaST Control Center has several modules that cannot easily be classified into the
first six module groups. They can be used for things like viewing log files and installing
drivers from a vendor CD.
176
Installation and Administration
Summary of Contents for LINUX ENTERPRISE SERVER 10 - INSTALLATION AND ADMINISTRATION 11-05-2007
Page 1: ...SUSE Linux Enterprise Server www novell com 10 May 11 2007 Installation and Administration...
Page 14: ......
Page 19: ...Part I Deployment...
Page 20: ......
Page 60: ......
Page 128: ......
Page 243: ...Part II Administration...
Page 244: ......
Page 274: ......
Page 312: ......
Page 348: ......
Page 380: ......
Page 381: ...Part III System...
Page 382: ......
Page 438: ......
Page 452: ......
Page 478: ......
Page 486: ......
Page 498: ......
Page 512: ......
Page 558: ......
Page 559: ...Part IV Services...
Page 560: ......
Page 652: ......
Page 670: ......
Page 742: ......
Page 754: ......
Page 796: ......
Page 817: ...Part V Security...
Page 818: ......
Page 858: ......
Page 886: ......
Page 910: ......
Page 911: ...Part VI Troubleshooting...
Page 912: ......
Page 924: ......