Accessing Oracle SuperCluster T5-8 Security Resources
Security Information for SuperCluster Components
Understanding Oracle SuperCluster T5-8 Security Guidelines
Understanding Hardware Security Guidelines
Network Security Considerations
Understanding Oracle SuperCluster T5-8 Security Settings and Services
Changing Passwords on Default User Accounts
Change Passwords on Default Accounts
Default User Accounts and Passwords
Change the Exadata Storage Server Passwords
Change the Ethernet Switch Password
Keeping Oracle SuperCluster T5-8 Secure
Managing SuperCluster Security
Oracle ILOM for Secure Management
Oracle Identity Management Suite
Oracle Enterprise Manager Ops Center (Optional)
Workload Monitoring and Auditing
Database Activity Monitoring and Auditing
This section provides a list of services with listening ports and a description of the different port states.
For comprehensive information about securing the Oracle Supercluster T5-8 network, refer to the network documentation for Oracle Solaris:
Oracle Solaris 11 library:
Oracle Solaris 10 library
This table lists the typical listening ports for a logical domain on Oracle SuperCluster T5-8. The state listed represents the state of the port after the system is initially configured and before any users have logged in.
Table 4 Listening Ports
|
1The service uses a range of different ports so the port number might be different each time the service runs, but the number is similar to the number shown in the table.
This table provides descriptions of the different states.
Table 5 Port States
|