|Skip Navigation Links|
|Exit Print View|
|Securing the Network in Oracle Solaris 11.1 Oracle Solaris 11.1 Information Library|
This guide assumes that the Oracle Solaris operating system (Oracle Solaris OS) is installed and you are ready to secure your network.
Note - This Oracle Solaris release supports systems that use the SPARC and x86 families of processor architectures. The supported systems appear in the Oracle Solaris OS: Hardware Compatibility Lists. This document cites any implementation differences between the platform types.
This book is intended for anyone responsible for administering networked systems that run Oracle Solaris. To use this book, you should have at least two years of UNIX system administration experience. Attending UNIX system administration training courses might be helpful.
Oracle customers have access to electronic support through My Oracle Support. For information, visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=info or visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=trs if you are hearing impaired.
The following table describes the typographic conventions that are used in this book.
Table P-1 Typographic Conventions
The following table shows UNIX system prompts and superuser prompts for shells that are included in the Oracle Solaris OS. In command examples, the shell prompt indicates whether the command should be executed by a regular user or a user with privileges.
Table P-2 Shell Prompts