JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Sun Server X3-2L

Security Guide

search filter icon
search icon

Document Information

Sun Server X3-2L Security Guide

Security Principles

Using Server Configuration and Management Tools

Planning a Secure Environment

Maintaining a Secure Environment

Planning a Secure Environment

Use the following information when installing and configuring the server and related equipment.

Contact your IT Security Officer for additional security requirements that pertain to your system and specific environment.

Password Protection

Passwords are an important aspect of security since poorly chosen passwords could result in unauthorized access to company resources. Implementing password management best practices ensures that users adhere to a set of guidelines for creating and protecting their passwords. Typical components of a password policy should define:

Enforce the following standard practices for creating strong complex passwords:

Change passwords on a regular basis. This helps to prevent malicious activity and ensures that passwords adhere to current password policies.

Oracle Operating System Guidelines

Refer to Oracle operating system (OS) documents for information on:

Security Guide documents for supported Oracle operating systems are part of the documentation library for the operating system. To find the Security Guide document for an Oracle operating system, go to the Oracle operating system documentation library:

For information on operating systems from other vendors, such as Red Hat Enterprise Linux, SUSE Linux Enterprise Server, Windows, and VMware ESXi, refer to the vendor's documentation.

Network Ports and Switches

Different switches offer different levels of port security features. Refer to the switch documentation to learn how to do the following.

VLAN Security

If you set up a virtual local area network (VLAN), remember that VLANs share bandwidth on a network and require additional security measures.

Infiniband Security

Keep Infiniband hosts secure. An Infiniband fabric is only as secure as its least secure Infiniband host.