Data Protection And Security - Oracle X5-2 Security Manual

Hide thumbs Also See for X5-2:
Table of Contents

Advertisement

string. Attackers can query a community to draw a very complete network map and possibly
modify management information base (MIB) values.
Always log out after using the system controller if the system controller uses a browser
interface.
Disable unnecessary network services, such as Transmission Control Protocol (TCP) or
Hypertext Transfer Protocol (HTTP). Enable necessary network services and configure
these services securely.
Create a banner message that appears at login to state that unauthorized access is prohibited.
You can inform users of any important policies or rules. The banner can be used to warn
users of special access restrictions for a given system, or to remind users of password
policies and appropriate use.
Use access control lists to apply restrictions, where appropriate.
Set time-outs for extended sessions and set privilege levels.
Use authentication, authorization, and accounting features for local and remote access to a
switch.
Use these services in very secure environments as they are secured by certificates and other
forms of strong encryption to protect the channel:
Use these services on private, secure networks where there are no suspected malicious
users:
Use the port mirroring capability of the switch for intrusion detection system (IDS) access.
Implement port security to limit access based upon a MAC address. Disable auto-trunking
on all ports.
For more information about network security, refer to the Oracle ILOM Security Guide,
which is part of the Oracle ILOM documentation library. You can find the Oracle ILOM
documentation at:
http://www.oracle.com/goto/ILOM/docs

Data Protection and Security

Follow these guidelines to maximize data protection and security:
Back up important data using devices such as external hard drives or USB storage devices.
Store the backed-up data in a second, off-site, secure location.
Active Directory
LDAP/SSL (Lightweight Directory Access Protocol/Secure Socket Layer)
RADIUS (Remote Authentication Dial In User Service)
TACACS+ (Terminal Access Controller Access-Control System)
Data Protection and Security
Maintaining a Secure Environment
21

Advertisement

Table of Contents
loading

Table of Contents