JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Sun Server X2-4

Security Guide

search filter icon
search icon

Document Information

Sun Server X2-4 Security Guide

Basic Security

Using Server Configuration and Management Tools Securely

Planning a Secure Environment

Maintaining a Secure Environment

Maintaining a Secure Environment

After the initial installation and setup, use Oracle hardware and software security features to continue controlling hardware and software assets.

Contact your IT Security Officer for additional security requirements that pertain to your system and specific environment.

Power Control

You can use software to turn power on and off to some Oracle systems. The power distribution units (PDUs) for some system cabinets can be enabled and disabled remotely. Authorization for these commands is typically set up during system configuration and is usually limited to system administrators and service personnel.

Refer to your system or cabinet documentation for further information.

Asset Tracking

Use serial numbers to track inventory. Oracle embeds serial numbers in firmware on option cards and system motherboards. You can read these serial numbers through local area network (LAN) connections.

You can also use wireless radio frequency identification (RFID) readers to further simplify asset tracking. An Oracle white paper, How to Track Your Oracle Sun System Assets by Using RFID, is available at:

http://www.oracle.com/technetwork/articles/systems-hardware-architecture/o11-001-rfid-oracle-214567.pdf

Updates for Software and Firmware

Security enhancements are introduced through new software releases and patches. Effective proactive patch management is a critical part of system security. For best security practices, update your system with the most recent software release, and all necessary security patches.

Network Security

After the networks are configured based on security principles, regular review and maintenance are needed.

Follow these guidelines to secure local and remote access to your systems:

For more information about network security, refer to the Oracle ILOM Security Guide, which is part of the Oracle ILOM documentation library. You can find the Oracle ILOM documentaiton at:

http://www.oracle.com/goto/ILOM/docs

Data Protection and Security

Follow these guidelines to maximize data protection and security:

Log Maintenance

Inspect and maintain your log files on a regular schedule. Use these methods to secure log files: