Contents Overview ..............................5 System Overview ..........................5 Security Principles ..........................5 Using Server Configuration and Management Tools ................7 Oracle System Assistant Security ....................7 Oracle System Assistant contains a bootable root environment ..........7 Oracle System Assistant mounts a USB storage device that is accessible to the operating system ...............................7 Oracle System Assistant can be disabled ..................8 Oracle ILOM Security ........................8...
768 GB of memory. The blade server module is inserted in to a Sun Blade 6000 chassis, which provides power and cooling to the blades. The Sun Blade X4-2B server module is an ideal blade for building enterprise cloud infrastructures.
Page 6
Oracle part numbers are electronically recorded on cards, modules, and components. To detect and track components, provide a security mark on all significant items of ■ computer hardware such as FRUs. Use special ultraviolet pens or embossed labels. Sun Blade X4-2B • September 2013...
Using Server Configuration and Management Tools Follow these security guidelines when using software and firmware tools to configure and manage your server. Oracle System Assistant Security Oracle System Assistant is a preinstalled tool that helps you to locally or remotely configure and update server hardware and to install supported operating systems.
Refer to Oracle ILOM documentation to understand more about setting up passwords, managing users, and applying security-related features, including Secure Shell (SSH), Secure Socket Layer (SSL), and RADIUS authentication. For security guidelines that are specific to Sun Blade X4-2B • September 2013...
Oracle Hardware Management Pack Security Oracle ILOM, refer to the Oracle Integrated Lights Out Manager (ILOM) 3.1 Security Guide, which is part of the Oracle ILOM 3.1 documentation library. You can find the Oracle ILOM 3.1 documentation at: http://www.oracle.com/goto/ILOM/docs Oracle Hardware Management Pack Security Oracle Hardware Management Pack is available for your server, and for many other x86-based servers and some SPARC servers.
Planning a Secure Environment Use the following notes before and during the installation and configuration of a server and related equipment. The following topics are covered: “Operating System Security Guidelines” on page 11 ■ “Network Ports and Switches” on page 12 ■...
Define VLANs to separate sensitive clusters of systems from the rest of the network. This ■ decreases the likelihood that users will gain access to information on these clients and servers. Sun Blade X4-2B • September 2013...
Hardware Physical Security Assign a unique native VLAN number to trunk ports. ■ Limit the VLANs that can be transported over a trunk to only those that are strictly ■ required. Disable VLAN Trunking Protocol (VTP), if possible. Otherwise, set the following for VTP: ■...
Refer to the documentation that came with your software to enable any security features ■ available for the software. Implement port security to limit access based upon MAC addresses. Disable autotrunking ■ on all ports. Sun Blade X4-2B • September 2013...
Maintaining a Secure Environment After the initial installation and setup, use Oracle hardware and software security features to continue controlling hardware and tracking system assets. “Hardware Power Control” on page 15 ■ “Asset Tracking” on page 15 ■ “Updates for Software and Firmware” on page 16 ■...
Use authentication, authorization, and accounting (AAA) features for local and remote ■ access to a switch. If possible, use the RADIUS and TACACS+ security protocols: ■ RADIUS (Remote Authentication Dial In User Service) is a client/server protocol that ■ secures networks against unauthorized access Sun Blade X4-2B • September 2013...
Log Maintenance TACACS+ (Terminal Access Controller Access-Control System) is a protocol that ■ permits a remote access server to communicate with an authentication server to determine if a user has access to the network. Use the port mirroring capability of the switch for intrusion detection system (IDS) access. ■...
Need help?
Do you have a question about the Sun Blade X4-2B and is the answer not in the manual?
Questions and answers