인쇄 보기 종료
다음 항목을 참조하여 서버 배치 시 구현할 Oracle ILOM 보안을 위한 최적의 방법을 결정할 수 있습니다.
Securing the Physical Management Connection
Choosing Whether to Configure FIPS Mode At Deployment
Securing Services and Open Network Ports
Securing Oracle ILOM User Access
Configuring Oracle ILOM Interfaces for Maximum Security
Security Best Practice Checklists for Oracle ILOM.
Post Deployment Security Best Practices for Oracle ILOM
Security Features Per Oracle ILOM Firmware Release