EasyManuals Logo

Sun Microsystems Netra T2000 User Manual

Sun Microsystems Netra T2000
122 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #71 background imageLoading...
Page #71 background image
55
CHAPTER
5
Securing the Server
This chapter provides important information about securing the system, explains
security recommendations, discusses domain minimization, and provides references
to Solaris Operating System security.
This chapter includes the following topics:
“Security Guidelines” on page 55
“Selecting a Remote Connection Type” on page 57
“Additional Security Considerations” on page 60
Security Guidelines
The following are security practices to consider:
Ensure that all passwords comply with security guidelines.
Change your passwords on a regular basis.
Scrutinize log files on a regular basis for any irregularities.
The practice of configuring a system to limit unauthorized access is called hardening.
There are several configuration steps that can contribute to hardening your system.
These steps are guidelines for system configuration:
Implement security modifications immediately after updating the Sun Fire™
Real-Time Operating System (RTOS) and SC application firmware, and before
configuring or installing any Sun Fire domains.
In general, restrict access to the SC operating system, RTOS.
Limit physical access to serial ports.
Expect to reboot, depending upon the configuration changes.

Table of Contents

Other manuals for Sun Microsystems Netra T2000

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Sun Microsystems Netra T2000 and is the answer not in the manual?

Sun Microsystems Netra T2000 Specifications

General IconGeneral
BrandSun Microsystems
ModelNetra T2000
CategoryServer
LanguageEnglish

Related product manuals