This section outlines the planning process for a secure installation and describes several recommended deployment topologies for the systems. The following will not detail the installation, configuration, and administration of the LTFS-LE application. The installation, configuration, and administration will be covered in the LTFS-LE Installation and Administration Guide 1.0.
To better understand security needs, the following questions must be asked:
For LTFS-LE, the host server and the associated network must be protected from unauthorized access
LTFS-LE should only be installed on systems that are within the same protected (firewalled) network infrastructure as the monitored devices. Customer access controls should be enforced on the systems where LTFS-LE is installed to assure restricted access to the application.
Refer to the following LTFS-LE user guides for installation instructions.
Oracle LTFS-LE Planning and Installation