1.1.5 Understanding Network Security
Data access and the secure transfer of data are important considerations when deploying Oracle Database. Granting and denying access to a database is crucial for a secure network environment. Oracle Net Services enables database access control using firewall access control and valid node registration.
See Also:
"Managing Oracle Net Listener Security" for information about valid node registration
Parent topic: About Oracle Net Services
1.1.5.1 Firewall Access Control
Oracle Connection Manager can be configured to grant or deny client access to a particular database service or a computer. By specifying filtering rules, you can allow or restrict specific client access to a server, based on the following criteria:
-
Source host names or IP addresses for clients
-
Destination host names or IP addresses for servers
-
Destination database service names
-
Client use of Oracle Net Services security features
Figure 1-11 shows an Oracle Connection Manager positioned between three clients and an Oracle Database server. Oracle Connection Manager is configured to allow access to the first two clients and to deny access to the third.
Figure 1-11 Intranet Network Access Control with Oracle Connection Manager

Description of "Figure 1-11 Intranet Network Access Control with Oracle Connection Manager"
Although Oracle Connection Manager cannot be integrated with third-party firewall products, vendors can package it with their own products in a way that enables this product to serve as an application gateway.
In general, firewalls should be set to receive incoming requests, and allow outbound calls from Oracle Database. By defining filtering rules, you can limit access to the network.
Caution:
Incorrectly setting your firewall options can cause security problems. Before changing your firewall settings, discuss the options and your network site policies with your system administrator.
Figure 1-12 shows an application gateway controlling traffic between internal and external networks and providing a single checkpoint for access control and auditing. As a result, unauthorized Internet hosts cannot directly access the database inside a corporation, but authorized users can still use Internet services outside the corporate network. This capability is critical in Internet environments to restrict remote access to sensitive data.
Figure 1-12 Internet Network Access Control with an Application Gateway

Description of "Figure 1-12 Internet Network Access Control with an Application Gateway"
It is important to deploy at least two Oracle Connection Manager firewalls or Oracle Net Firewall proxies in an Internet network environment in the event that one firewall goes down.
Parent topic: Understanding Network Security