NOTE: CentOS Enterprise Linux 5 is built from the Red Hat Enterprise Linux source code. Other than logo and name changes CentOS Enterprise Linux 5 is compatible with the equivalent Red Hat version. This document applies equally to both Red Hat and CentOS Enterprise Linux 5.
Hierarchy of Information Security Levels. The arrows indicate the direction in which rules allow data to flow.
Published under the terms of the GNU General Public License