This chapter describes the actions to take to configure security on
your system. The chapter covers installing packages, configuring the system
itself, then configuring various subsystems and additional applications that
you might need, such as IPsec.