Summary
From the more passive positioning of SSH banners and notices to the rigid approach involved in building a host-based intrusion detection system, in this chapter we covered a number of approaches intended to provide a way forward in troubleshooting security. We have not only talked about the release of Firewalld, and how it can be used to dynamically re-engineer the entire firewall environment without an interruption in service, but we have also discussed OpenSSH and shown you the way back to using iptables.
I believe everyone would agree that security is a big subject and its methods and approaches are found throughout the pages in this book. However, having toured this chapter, I hope that this small stepping-stone will serve you well in the future before we take the next step with a discussion on troubleshooting database services.