EasyManuals Logo

Oracle SPARC M8 Security Guide

Default Icon
16 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #11 background imageLoading...
Page #11 background image
Understanding Software Security
Most hardware security is implemented through software measures. These sections provide
general software security guidelines for the servers.
“Prevent Unauthorized Access (Oracle Solaris OS)” on page 11
“Prevent Unauthorized Access (Oracle ILOM)” on page 11
“Prevent Unauthorized Access (Oracle VM Server for SPARC)” on page 12
“Restricting Access (OBP)” on page 12
“Oracle System Firmware” on page 15
“Secure WAN Boot” on page 15
Prevent Unauthorized Access (Oracle Solaris OS)
Use Oracle Solaris OS commands to restrict access to the Oracle Solaris
software, harden the OS, use security features, and protect applications.
Obtain the Oracle Solaris Security Guidelines document for the version you are using at:
http://www.oracle.com/goto/solaris11/docs
http://www.oracle.com/goto/solaris10/docs
Prevent Unauthorized Access (Oracle ILOM)
1.
Use Oracle ILOM commands to restrict access to the Oracle ILOM software,
change the factory-set password, limit the use of the root superuser account,
and secure the private network to the service processor.
Obtain the Oracle ILOM Security Guide at:
http://www.oracle.com/goto/ilom/docs
2.
When possible, use the platform-specific Oracle ILOM commands to secure
individual domains by creating user accounts with roles that apply to a specific
physical domain.
Understanding Software Security 11

Other manuals for Oracle SPARC M8

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Oracle SPARC M8 and is the answer not in the manual?

Oracle SPARC M8 Specifications

General IconGeneral
BrandOracle
ModelSPARC M8
CategoryServer
LanguageEnglish

Related product manuals