RedMax EXtreme EX-LRT Průvodce řešením problémů Strana 3

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 142
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 2
Oracle SBC Security Guide
Contents
Part 1: Overview ........................................................................................................................................... 8
Product Overview ..................................................................................................................................... 8
Net-SAFE Security Framework ............................................................................................................ 8
Net-SAFE goals .................................................................................................................................... 8
Net-SAFE Requirements....................................................................................................................... 8
General Security Principles .................................................................................................................... 10
Keep Software Up To Date ................................................................................................................. 10
Restrict Network Access to Critical Services ..................................................................................... 10
Follow the Principle of Least Privilege ............................................................................................... 10
Monitor System Activity ..................................................................................................................... 11
Keep Up To Date on Latest Security Information .............................................................................. 11
SBC Specific Security Principles ........................................................................................................... 11
Part 2: Secure Installation and Configuration ............................................................................................. 13
Recommended Deployment Topologies ................................................................................................. 13
Session Border Controller ................................................................................................................... 13
Unified Session Manager .................................................................................................................... 14
Core Session Manager ........................................................................................................................ 15
Session Router .................................................................................................................................... 16
Enterprise Communications Broker .................................................................................................... 16
Realm Design Considerations ............................................................................................................. 16
Management Interfaces ........................................................................................................................... 17
Serial (Console) Interface ................................................................................................................... 17
Management Port Configuration ......................................................................................................... 17
Passwords ............................................................................................................................................ 18
Boot Flags ........................................................................................................................................... 18
System ACLs ...................................................................................................................................... 19
Telnet/SSH .......................................................................................................................................... 19
FTP/SFTP ........................................................................................................................................... 19
GUI Management ................................................................................................................................ 19
Web Management ............................................................................................................................... 20
Resiliency ............................................................................................................................................... 20
High Availability ................................................................................................................................ 20
Link Detection and Gateway Polling ...................................................................................................... 21
Physical Link Redundancy ..................................................................................................................... 21
Zobrazit stránku 2
1 2 3 4 5 6 7 8 ... 141 142

Komentáře k této Příručce

Žádné komentáře