Page 1
SPARC M8 and SPARC M7 Servers Security Guide Part No: E55218-02 September 2017...
Page 3
Oracle. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services, except as set forth in an applicable agreement between you and Oracle.
Page 4
Oracle Corporation et ses affiliés déclinent toute responsabilité ou garantie expresse quant aux contenus, produits ou services émanant de tiers, sauf mention contraire stipulée dans un contrat entre vous et Oracle. En aucun cas, Oracle Corporation et ses affiliés ne sauraient être tenus pour responsables des pertes subies, des coûts occasionnés ou des dommages causés par l'accès à...
Page 5
Oracle. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services, except as set forth in an applicable agreement between you and Oracle.
Page 6
Oracle Corporation et ses affiliés déclinent toute responsabilité ou garantie expresse quant aux contenus, produits ou services émanant de tiers, sauf mention contraire stipulée dans un contrat entre vous et Oracle. En aucun cas, Oracle Corporation et ses affiliés ne sauraient être tenus pour responsables des pertes subies, des coûts occasionnés ou des dommages causés par l'accès à...
Understanding Hardware Security Physical isolation and access control are the foundation on which you should build the security architecture. Ensuring that the physical server is installed in a secure environment protects the server against unauthorized access. Likewise, recording all serial numbers helps prevent the use of unauthorized hardware components.
The printed documents might be your only proof of ownership. Wireless radio frequency identification (RFID) readers can further simplify asset tracking. An Oracle white paper, How to Track Your Oracle Sun System Assets by Using RFID is available http://www.oracle.com/technetwork/articles/systems-hardware-architecture/o11- 001-rfid-oracle-214567.pdf...
Prevent Unauthorized Access (Oracle Solaris OS) Use Oracle Solaris OS commands to restrict access to the Oracle Solaris software, harden the OS, use security features, and protect applications. Obtain the Oracle Solaris Security Guidelines document for the version you are using at: ■ http://www.oracle.com/goto/solaris11/docs ■...
Obtain the SPARC M8 and SPARC M7 Servers Administration Guide at: http://docs.oracle.com/cd/E55211_01/ Prevent Unauthorized Access (Oracle VM Server for SPARC) Use Oracle VM for SPARC commands to restrict access to the Oracle VM for SPARC software. Obtain the Oracle VM for SPARC Security Guide at: http://www.oracle.com/goto/vm-sparc/ docs.
Enable the Security Mode {0} ok password New password (8 characters max): Retype new password: password The password can be one to eight characters. If you enter more than eight characters, only the first eight characters will be used. All printable characters are accepted. Control characters are not accepted.
To warn users of the acceptable use of the server. ■ To indicate that access or modifications to OpenBoot parameters is restricted to authorized ■ personnel. Use the following commands to enable a custom warning message. SPARC M8 and SPARC M7 Servers Security Guide • September 2017...
For the Oracle Solaris 10 OS, refer to the information on securing WAN boot installation ■ configuration in the Oracle Solaris Installation Guide: Network-Based Installations book.
Page 16
SPARC M8 and SPARC M7 Servers Security Guide • September 2017...
Need help?
Do you have a question about the SPARC M8 and is the answer not in the manual?
Questions and answers