Table of Contents Table of Contents Title and Copyright Information Preface Documentation Accessibility 1 Overview Product Overview General Security Principles 2 Secure Installation Understand Your Environment Recommended Procedure for Securing ACSLS Securing ACSLS Internet Communication Secure ACSLS and Tape Libraries Behind the Corporate Firewall ACSLS Firewall Secure Option Ethernet Ports Used for ACSLS Communication Configuring Firewalls Running on the ACSLS Server Installing and Configuring Solaris Installing and Configuring Linux Auditing Linux Security SELinux Security Installing and Configuring ACSLS Configuring WebLogic Using the ACSLS GUI Install the Latest JRE Version on GUI Client Systems Accessing the ACSLS GUI ACSLS GUI Certificates SCI Certificate ACS Wallet 3 Security Features The Security Model Configuring and Using Authentication Audit Considerations Configuring and Using ACSLS Audit Logs ACSLS Log Directory ACSLS Log/sslm Directory Viewing ACSLS Audit Trails from the GUI's Log Viewer View System Events from the GUI Configuring and Using Solaris Audit Logs Configuring and Using Linux Audit Logs Configuring and Using WebLogic Audit Logs 4 Security Considerations for Developers Enable the Firewall Security on the Client Application’s Server