JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Sun Blade X3-2B (formerly X6270 M3)

Security Guide

Oracle Technology Network
Library
PDF
Print View
Feedback
search filter icon
search icon

Document Information

Basic Security

Using Server Configuration and Management Tools Securely

Planning a Secure Environment

Password Protection

Operating System Security Guidelines

Network Switches and Ports

VLAN Security

Infiniband Security

Maintaining a Secure Environment

Planning a Secure Environment

Security guidelines should be in place before the arrival of the system. After arrival, security guidelines should be periodically reviewed and adjusted to stay current with the security requirements of your organization. Use the information in this section before and during the installation and configuration of a server and related equipment.

The following topics are covered:

Contact your IT Security Officer for additional security requirements that pertain to your system and specific environment.