Data Protection and Security
string. Attackers can query a community to draw a very complete network map and possibly
modify management information base (MIB) values.
■
Always log out after using the system controller if the system controller uses a browser
interface.
■
Disable unnecessary network services, such as Transmission Control Protocol (TCP) or
Hypertext Transfer Protocol (HTTP). Enable necessary network services and configure
these services securely.
■
Create a banner message that appears at login to state that unauthorized access is prohibited.
You can inform users of any important policies or rules. The banner can be used to warn
users of special access restrictions for a given system, or to remind users of password
policies and appropriate use.
■
Use access control lists to apply restrictions, where appropriate.
■
Set time-outs for extended sessions and set privilege levels.
■
Use authentication, authorization, and accounting features for local and remote access to a
switch.
■
Use these services in very secure environments as they are secured by certificates and other
forms of strong encryption to protect the channel:
■
Active Directory
■
LDAP/SSL (Lightweight Directory Access Protocol/Secure Socket Layer)
■
Use these services on private, secure networks where there are no suspected malicious
users:
■
RADIUS (Remote Authentication Dial In User Service)
■
(Terminal Access Controller Access-Control System)
■
Use the port mirroring capability of the switch for intrusion detection system (IDS) access.
■
Implement port security to limit access based upon a MAC address. Disable auto-trunking
on all ports.
For more information about network security, refer to the
Oracle ILOM Security Guide
,
which is part of the Oracle ILOM documentation library. You can find the Oracle ILOM
documentation at:
http://www.oracle.com/goto/ILOM/docs
Data Protection and Security
Follow these guidelines to maximize data protection and security:
■
Back up important data using devices such as external hard drives or USB storage devices.
Store the backed-up data in a second, off-site, secure location.
Maintaining a Secure Environment
21
Содержание netra X5-2
Страница 1: ...Oracle Server X5 2 Security Guide Part No E48323 03 May 2015 ...
Страница 2: ......
Страница 6: ...6 Oracle Server X5 2 Security Guide May 2015 ...
Страница 10: ...10 Oracle Server X5 2 Security Guide May 2015 ...