JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Sun Server X4-2

Security Guide

search filter icon
search icon

Document Information

Sun Server X4-2 Security Guide

Security Principles

Using Server Configuration and Management Tools

Planning a Secure Environment

Maintaining a Secure Environment

Maintaining a Secure Environment

After the initial installation and configuration, use Oracle hardware and software security features to continue controlling hardware and tracking system assets.

Contact your IT Security Officer for additional security requirements that pertain to your system and specific environment.

Hardware Power Control

You can use software to turn power on and off to some Oracle systems. The power distribution units (PDUs) for some system cabinets can be enabled and disabled remotely. Authorization for these commands is typically set up during system configuration and is usually limited to system administrators and service personnel. Refer to your system or cabinet documentation for further information.

Asset Tracking

Use serial numbers to track inventory. Oracle embeds serial numbers in firmware on option cards and system motherboards. You can read these serial numbers through local area network connections.

You can also use wireless radio frequency identification (RFID) readers to further simplify asset tracking. An Oracle white paper, How to Track Your Oracle Sun System Assets by Using RFID, is available at:

http://www.oracle.com/technetwork/articles/systems-hardware-architecture/o11-001-rfid-oracle-214567.pdf

Updates for Software and Firmware

For security reasons, update the firmware on your system with the most recent firmware whenever a new version becomes available. This is important so that you take advantage of bug fixes and enhancements that improve the overall quality and security of the system.

Network Security

Follow these guidelines to secure local and remote access to your systems.

For more information about network security, refer to the Oracle ILOM Security Guide, which is part of the Oracle ILOM documentation library. You can find the Oracle ILOM documentation at:

http://www.oracle.com/goto/ILOM/docs

Data Protection and Security

Follow these guidelines to maximize data protection and security.

Log Maintenance

Inspect and maintain your log files on a regular schedule. Use these methods to secure log files.