Documentation Home
> Trusted Solaris Installation and Configuration
Trusted Solaris Installation and Configuration
Book Information
Preface
Chapter 1 Security Overview
Planning for Security
Understanding the Trusted Solaris Environment
Understanding Your Site's Security Policy
Devising an Administration Strategy
Devising a Label Strategy
For International Customers
Planning User Security
Planning System Hardware and Capacity
Planning Your Network
Additional Planning for Open Networks
Planning Auditing
Devising an Installation and Configuration Strategy
Collecting Information
Backing Up the System
Installing the Trusted Solaris Software
Configuring the Software
Differences From Solaris Installation and Configuration
Installation Results from an Administrator's Perspective
Chapter 2 Installation and Configuration Task Maps
Preparing for Installation (Task Map)
Installing a System From CD-ROM (Task Map)
Installing Systems Over the Network (Task Map)
Configuring Headless Systems (Task Map)
Chapter 3 Installing the Trusted Solaris Operating Environment
Install Team Responsibilities
Differences from the Solaris 8 Installation Program
Recommendations for the Trusted Solaris Environment
Shutting Down the System to be Installed
Installing From a CD-ROM
Insert the First Trusted Solaris 8 4/01 CD and Boot
Read Booting Messages
Answer Installation Questions
Enter a root Password
Insert the Second Trusted Solaris 8 4/01 CD
Read the Log
Configure the Trusted Solaris System
Troubleshooting
Installing Over the Network
Boot Over the Network or with Custom Files
Finish Configuring Systems Installed Over the Network
Chapter 4 Configuring a System with No Name Service
Who Does What
No Name Service Configuration Tasks
Logging In and Launching a Terminal
Protecting the Machine
Setting Up Labels
Initializing the Solaris Management Console
(Optional) Configuring Routing
Configuring Network Files
Creating Roles and Users
Verifying That Roles Work
Finishing Up Configuration
Chapter 5 Configuring a Name Service Master
Who Does What
Name Service Master Configuration Tasks
Initial Configuration
(Optional) Configuring Routing
Configuring the Network
Trusted Network Summary
Setting Up the Name Server and Domain
Name Service References
Setting Up Critical Servers
Creating Roles and Users
Verifying That Roles Work
Finishing Up Configuration
Chapter 6 Configuring a Name Service Client
Who Does What
Client Configuration Tasks
Initial Configuration
(Optional) Configuring Routing
Configuring the Network
Summary of Client Network Files
Connecting to the Name Server
Sharing Critical File Systems
Finish Configuring the System
Chapter 7 Installing a Trusted Solaris System Over a Network
Setting Up Network Installation
Trusted Solaris Modifications to Network Installation
Modifications to Network Installation Commands
Setting Up Custom JumpStart Installation
Modifying Optional Custom JumpStart Procedures
Trusted Solaris Script Examples
Modifications to Creating a Disk Configuration File
Modifying a Solaris JumpStart Example
Set up the engineering systems for installation
Set up the marketing systems for installation
Chapter 8 Configuring a Headless Trusted Solaris System
Headless System Configuration Tasks
To Set Up Remote CDE Login to a Headless System
To Set Up Remote SMC Login to a Headless System
To Set Up Administration by Serial Login
To Set Up Administration by Remote Login
Chapter 9 Common Procedures
Logging In as a User
Ending a Session
Running Administrative Actions
How To Use System_Admin Actions
Using the Solaris Management Console
Copying to and from a Portable Medium
Modifying a Role's Rights
Saving and Restoring Trusted Solaris Databases
Appendix A Site Security Policy
Site Security Policy and the Operating Environment
Computer Security Recommendations
Physical Security Recommendations
Personnel Security Recommendations
Common Security Violations
Additional Security References
U.S. Government Publications
UNIX Security Publications
General Computer Security Publications
General UNIX Publications
Appendix B Checklists for a Secure Trusted Solaris Environment
Site Summary Checklist
Reading List
Checklist Summaries
Planning Labels
Label Decisions
Planning the Network
Open Network Security Information
Name Service Domain Information
Labels of Communicating Machines
Planning Auditing
Auditing Security Information
Auditing System Information
Planning System Configuration
Required System Information
Security Information for Each Machine
Appendix C Example Worksheets
How to Use the Examples
Root NIS+ Master Installation Program Example
Root NIS+ Master Disk Partitioning Example
Services Provided by Servers Example
Audit Server Installation Program Example
Audit Server Disk Partitioning Example
Audit Server Configuration Worksheet
Glossary
Index
A
B
C
D
E
F
H
I
J
L
M
N
O
P
R
S
T
U
V
W
Y
© 2010, Oracle Corporation and/or its affiliates