Sun Oracle Sun Blade X4-2B Security Manual

Hide thumbs Also See for Sun Blade X4-2B:

Advertisement

Quick Links

Sun Blade X4-2B
Security Guide
Part No: E37282–03
September 2013

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Sun Blade X4-2B and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Sun Oracle Sun Blade X4-2B

  • Page 1 Sun Blade X4-2B Security Guide Part No: E37282–03 September 2013...
  • Page 2 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means.
  • Page 3: Table Of Contents

    Contents Overview ..............................5 System Overview ..........................5 Security Principles ..........................5 Using Server Configuration and Management Tools ................7 Oracle System Assistant Security ....................7 Oracle System Assistant contains a bootable root environment ..........7 Oracle System Assistant mounts a USB storage device that is accessible to the operating system ...............................7 Oracle System Assistant can be disabled ..................8 Oracle ILOM Security ........................8...
  • Page 5: Overview

    768 GB of memory. The blade server module is inserted in to a Sun Blade 6000 chassis, which provides power and cooling to the blades. The Sun Blade X4-2B server module is an ideal blade for building enterprise cloud infrastructures.
  • Page 6 Oracle part numbers are electronically recorded on cards, modules, and components. To detect and track components, provide a security mark on all significant items of ■ computer hardware such as FRUs. Use special ultraviolet pens or embossed labels. Sun Blade X4-2B • September 2013...
  • Page 7: Using Server Configuration And Management Tools

    Using Server Configuration and Management Tools Follow these security guidelines when using software and firmware tools to configure and manage your server. Oracle System Assistant Security Oracle System Assistant is a preinstalled tool that helps you to locally or remotely configure and update server hardware and to install supported operating systems.
  • Page 8: Oracle System Assistant Can Be Disabled

    Refer to Oracle ILOM documentation to understand more about setting up passwords, managing users, and applying security-related features, including Secure Shell (SSH), Secure Socket Layer (SSL), and RADIUS authentication. For security guidelines that are specific to Sun Blade X4-2B • September 2013...
  • Page 9: Oracle Hardware Management Pack Security

    Oracle Hardware Management Pack Security Oracle ILOM, refer to the Oracle Integrated Lights Out Manager (ILOM) 3.1 Security Guide, which is part of the Oracle ILOM 3.1 documentation library. You can find the Oracle ILOM 3.1 documentation at: http://www.oracle.com/goto/ILOM/docs Oracle Hardware Management Pack Security Oracle Hardware Management Pack is available for your server, and for many other x86-based servers and some SPARC servers.
  • Page 11: Planning A Secure Environment

    Planning a Secure Environment Use the following notes before and during the installation and configuration of a server and related equipment. The following topics are covered: “Operating System Security Guidelines” on page 11 ■ “Network Ports and Switches” on page 12 ■...
  • Page 12: Network Ports And Switches

    Define VLANs to separate sensitive clusters of systems from the rest of the network. This ■ decreases the likelihood that users will gain access to information on these clients and servers. Sun Blade X4-2B • September 2013...
  • Page 13: Infiniband Security

    Hardware Physical Security Assign a unique native VLAN number to trunk ports. ■ Limit the VLANs that can be transported over a trunk to only those that are strictly ■ required. Disable VLAN Trunking Protocol (VTP), if possible. Otherwise, set the following for VTP: ■...
  • Page 14: Software Security

    Refer to the documentation that came with your software to enable any security features ■ available for the software. Implement port security to limit access based upon MAC addresses. Disable autotrunking ■ on all ports. Sun Blade X4-2B • September 2013...
  • Page 15: Maintaining A Secure Environment

    Maintaining a Secure Environment After the initial installation and setup, use Oracle hardware and software security features to continue controlling hardware and tracking system assets. “Hardware Power Control” on page 15 ■ “Asset Tracking” on page 15 ■ “Updates for Software and Firmware” on page 16 ■...
  • Page 16: Updates For Software And Firmware

    Use authentication, authorization, and accounting (AAA) features for local and remote ■ access to a switch. If possible, use the RADIUS and TACACS+ security protocols: ■ RADIUS (Remote Authentication Dial In User Service) is a client/server protocol that ■ secures networks against unauthorized access Sun Blade X4-2B • September 2013...
  • Page 17: Data Protection

    Log Maintenance TACACS+ (Terminal Access Controller Access-Control System) is a protocol that ■ permits a remote access server to communicate with an authentication server to determine if a user has access to the network. Use the port mirroring capability of the switch for intrusion detection system (IDS) access. ■...

Table of Contents