JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Sun Server X2-4

Security Guide

search filter icon
search icon

Document Information

Sun Server X2-4 Security Guide

Basic Security

Using Server Configuration and Management Tools Securely

Planning a Secure Environment

Maintaining a Secure Environment

Planning a Secure Environment

Security guidelines should be in place before the arrival of the system. After arrival, security guidelines should be periodically reviewed and adjusted to stay current with the security requirements of your organization.

Use the information in this section before and during the installation and configuration of a server and related equipment.

Contact your IT Security Officer for additional security requirements that pertain to your system and specific environment.

Password Protection

Passwords are an important aspect of security since poorly chosen passwords could result in unauthorized access to company resources. Implementing password management best practices ensures that users adhere to a set of guidelines for creating and protecting their passwords. Typical components of a password policy should define:

Enforce the following standard practices for creating strong, complex passwords:

Change passwords on a regular basis. This helps to prevent malicious activity and ensures that passwords adhere to current password policies.

Operating System Security Guidelines

Refer to Oracle operating system (OS) documents for information on:

Security Guide documents for supported Oracle operating systems are part of the documentation library for the operating system. To find the Security Guide document for an Oracle operating system, go to the Oracle operating system documentation library:

For information on operating systems from other vendors, such as Red Hat Enterprise Linux, SUSE Linux Enterprise Server, Microsoft Windows, and VMware ESXi, refer to the vendor's documentation.

Network Switches and Port Security

Network switches offer different levels of port security features. Refer to the switch documentation to learn how to do the following:

VLAN Security

If you set up a virtual local area network (VLAN), remember that VLANs share bandwidth on a network and require additional security measures.

Infiniband Security

Keep Infiniband hosts secure. An Infiniband fabric is only as secure as its least secure Infiniband host.

Note that partitioning does not protect an Infiniband fabric. Partitioning only offers Infiniband traffic isolation between virtual machines on a host.