This chapter contains:
Any trusted user can install Oracle Database Firewall. You do not need administrative privileges to complete the installation.
You must install each Database Firewall and Management Server onto an Intel x86 server, which will be used solely for Oracle Database Firewall. The requirements for each are the same. Remember that the installation process re-images the computer, so do not use a computer that is used for other activities.
This section contains:
You must have Oracle Linux version 5.5 x86 DVD for the installation procedure. You can download Oracle Linux from the following Web site:
Each Intel x86 server must have at minimum 1 GB of RAM. You can check the memory by running the following command:
grep MemTotal /proc/meminfo
Each Intel x86 server must have a single hard drive with a minimum 80 GB of disk space. You can check the disk space by running the following command:
df -h
These databases (also called the protected databases) are the databases that you will monitor using Oracle Database Firewall. Table 2-1 shows the database products supported for regular monitoring, as well as Direct Database Interrogation (DDI), User Role Auditing (URA), Stored Procedure Auditing (SPA), and Local Monitor.
Table 2-1 Supported Databases with Supported Database Firewall Features
If you want to use the remote monitor software, ensure that the servers that you plan to use meet the following requirements:
You can use the remote monitor on the Linux, UNIX, AIX platforms.
The same database platforms that Oracle Database Firewall supports, as described in "Supported Database Versions"
The following utilities:
GNU Netcat networking utility, which you can download from the following Web site:
Tcpdump packet analyzer; see the following Web site for more information:
Oracle Database Firewall and Database Firewall Analyzer are available in English only, but can support Unicode character sets.
You can use Oracle Database Firewall with the following third-party products:
HP ArcSight Security Information Event Management (SIEM), which logs, analyzes, and manages network user activity that is recorded in syslog messages from different sources
F5 BIG-IP ASM (Application Security Manager) (versions 9.5.x and 10.x), which provides protection against Web-based attacks