You are using an outdated browser. Please upgrade to the latest version for the best experience.
How do I narrow my search results?

After you submit your search query:

  1. On the Refine Search results page, select one or more categories of products or services from the left sidebar.
  2. Then for a category with search results, click Select to choose your product and release filters, and then click OK.

For search queries that contain multiple words, surround the query with quotes, and then resubmit your query. Example: "database cloud service"

How do I find the documentation for my product or service?

From the home page, click the technology categories for your products or services. If you do not know which category to pick, try the following features:

  • Click the Find a product tab and search for your product or service.
  • Click Browse All Products & Services at the bottom of the home page to view an alphabetical listing of products and services.
  • Apple Safari: Version 6
  • Google Chrome: Version 29 and later
  • Mozilla Firefox: Version 24 and later
  • Microsoft Internet Explorer: Version 9 and later
Results for PRIVATE


1 to 20 of 624 results. Previous page Prev  Next next page
Results per page:   20  | 40 | 60


Event Test Reference Manual, 9i Release 2 (9.2.0.2)

Windows NT Event Tests

Private BytesDescription Private Bytes calculates the total number of bytes allocated by the process that cannot

SNMP Support Reference Guide, 9i Release 2 (9.2.0.2)

Oracle MIB Overview

Private Oracle Database MIBThe private Oracle Database MIB contains additional RDBMS statistics that are specific to the … Oracle database architecture. Like the public RDBMS MIB, the private Oracle Database MIB derives most of … configuration file. The private Oracle Database MIB is platform-independent. Thus, one Oracle Server MIB

SNMP Support Reference Guide, 9i Release 2 (9.2.0.2)

Oracle MIB Overview

Other Oracle Private MIBsIn addition to the private database MIB, Oracle has defined private MIBs for the following products

Administrator's Guide, 9i Release 2 (9.2.0.2)

Firewalls and Virtual Private Networks

VPN Connections Between the Enterprise Manager Client and Management ServerAs previously discussed, VPNs that comply with IPSEC standards allow the secure transfer of information over the internet: Remote clients can connect to a secure server with minimum configuration and maximum security. It is also possible to use VPNs in conjunction with firewalls. The following example shows a VPN environment with the Enterprise Manager Console and the Management Server on opposite

Administrator's Guide, 9i Release 2 (9.2.0.2)

Firewalls and Virtual Private Networks

To enable network communication between the Enterprise Manager Console and Management Server, severalnetwork ports must be opened in the firewall to allow TCP traffic. The port range of 7771-7777 covers all these. If the Console is running in a browser, then the firewall needs to allow HTTP traffic over port 3339 from the Enterprise Manager Website HTTP server to any browser client. Functional assignments for these ports are shown in the following table.

Administrator's Guide, 9i Release 2 (9.2.0.2)

Firewalls and Virtual Private Networks

VPN Connections Between the Management Server and Intelligent AgentsSome VPN providers may allow server processes on different nodes to communicate. In these configurations, it is possible to deploy the Management Server on one VPN-enabled node and the Agent on another VPN-enabled node. The same principles as described in the previous section apply. It is important to note that communication between the Management Server node and Agent node is bi-directional, so each

Administrator's Guide, 9i Release 2 (9.2.0.2)

Firewalls and Virtual Private Networks

Virtual Private Network Configuration for Enterprise ManagerVirtual Private Networks (VPNs) allow remote employees to connect in a secure fashion to a … private link. Figure B-3 Virtual Private Network Text description of the illustration virprivn.gif In … (IP) communications. It specifies standardized ways for securing private information transmitted over

Administrator's Guide, 9i Release 2 (9.2.0.2)

Firewalls and Virtual Private Networks

Table B-2 Port Usage Port Number Usage 1748, 1754 Management Server communicating with the Agent todiscover new targets. 7772 Agent communicating with the Management Server. 7773 Agent communicating with the Management Server via SSL. No special setup and configuration is required for the Management Server or Intelligent Agents in this situation. If the Management Server and administered database (or other managed target) are separated by a firewall, then the Management Server acts as a proxy for

Administrator's Guide, 9i Release 2 (9.2.0.2)

Firewalls and Virtual Private Networks

Firewall Communication for Enterprise ManagerFirewalls protect a company's IT infrastructure by providing the ability to restrict network traffic by examining each network packet and determining the appropriate course of action. Firewall configuration typically involves restricting the ports that are available to one side of the firewall, for example the Internet. It can also be set up to restrict the type of traffic that can pass through a

Administrator's Guide, 9i Release 2 (9.2.0.2)

Firewalls and Virtual Private Networks

Firewalls and Network Address Translation (NAT)Some firewalls use a feature called Network Address Translation (NAT). This feature masks the true IP address of a client by translating it to a different IP address. Packets sent from a remote client to a server through the firewall will be known to the server by this translated address. As the client and server communicate, the NAT software handles the mapping of the true IP address to its translated

Administrator's Guide, 9i Release 2 (9.2.0.2)

Firewalls and Virtual Private Networks

Performance Manager, Capacity Planner, and FirewallsThe Performance Manager or Capacity Planner applications can be launched separately in order to connect directly to the Intelligent Agent (which incorporates the data collection services) on a target node. If a firewall separates Performance Manager and the Agent, or Capacity Planner and the Agent, then the firewall needs to be configured as follows: Port 1808 over TCP: Used for communication between

Administrator's Guide, 9i Release 2 (9.2.0.2)

Firewalls and Virtual Private Networks

Table B-1 Port Usage Port Number Usage 3339 Communication between the Enterprise Manger HTTP serverand the Enterprise Manager browser client. 7771, 7773, 7776 Communication between the Enterprise Manager Console and the Management Server. 7774 Communication between the Oracle Applications Manager and the Management Server. 7775, 7777 Communication between the paging server and the Management Server. Special configuration is not required for either the Console or the Management Server in this case.

Administrator's Guide, 9i Release 2 (9.2.0.2)

Firewalls and Virtual Private Networks

Running the Console in Standalone ModeIf the Enterprise Manager Console is launched in Standalone mode, the Console connects directly to a managed target (e.g. database) in the traditional client-server mode, using SQL*Net to communicate. If a firewall separates the Console and its target, several options are available. These include: Use VPN software on the Enterprise Manager Console node and target node. In this case, the setup will

Administrator's Guide, 9i Release 2 (9.2.0.2)

Firewalls and Virtual Private Networks

B Firewalls and Virtual Private NetworksThis appendix discusses how to configure firewall and virtual private networks (VPNs) to allow … following topics: Firewall Communication for Enterprise Manager Virtual Private Network Configuration for

Administrator's Guide, 9i Release 2 (9.2.0.2)

Firewalls and Virtual Private Networks

Firewall Between the Console and Management ServerIn this configuration, the Enterprise Manager Console and Management Server are separated by a firewall. Figure B-1 Console and Management Server on Opposite Sides of a Firewall Text description of the illustration firewala.gif

Administrator's Guide, 9i Release 2 (9.2.0.2)

Firewalls and Virtual Private Networks

Firewall Between the Management Server and Agent(s) on Monitored NodesIn this configuration, the Intelligent Agent that runs on the managed node and the Management Server are on opposite sides of the firewall, as shown in the following illustration. Figure B-2 Firewall Between the Management Server and Agent Text description of the illustration firewalb.gif To enable network communication between the Management Server and Intelligent Agents on managed targets, several

Concepts, 9i Release 2 (9.2.0.2)

Real Application Clusters Storage Considerations

Private and Public Rollback Segmentsacquire either private or public rollback segments at startup and use them exclusively. The exception to … private rollback segments for each instance in Real Application Clusters, and that you use the same … rollback segment identifiers each time you startup a particular instance. For private rollback

Globalization Support Guide, 9i Release 2 (9.2.0.2)

Customizing Locale Data

Unicode 3.1 Private Use AreaUnicode 3.1 reserves the range E000-F8FF for the Private Use Area (PUA). The PUA is intended for … private use character definition by end users or vendors. User-defined characters can be converted

Administration, 9i Release 2 (9.2.0.2)

Administering Storage Components in Real Application Clusters

Public and Private Rollback SegmentsPublic and private rollback segments provide the same level of performance. However, private … performance. Therefore, use private rollback segments to improve performance. Public rollback segments form a … the heavier processing demands. By default, a rollback segment is private and is used by the instance

Pro*C/C++ Programmer's Guide, 9i Release 2 (9.2.0.2)

Introduction

Are All SQLLIB Functions Private?No. There are some SQLLIB functions that you can call to get information about your program, or its data. The SQLLIB public functions are shown here:  SQLLIB Public Functions Description SQLSQLDAAlloc() Used to allocate a SQL descriptor array (SQLDA) for dynamic SQL Method 4. See "How is the SQLDA Referenced?". SQLCDAFromResultSetCursor() Used to convert a Pro*C/C++ cursor variable to an OCI cursor