Oracle SDN Controller. Security Guide



Documents pareils
Oracle FS Data Protection Manager. Release Notes. Part Number E Oracle FS Data Protection Manager release 3.5.

Oracle Fabric Manager. Security Guide

Sun ZFS Appliance Monitor. Configuration Guide, Version 1.0

StorageTek Tape Analytics

Oracle Solaris 10 Security Guidelines

Quick Start Guide This guide is intended to get you started with Rational ClearCase or Rational ClearCase MultiSite.

Sun Datacenter InfiniBand Switch 36. Hardware Security Guide

Guide d'installation du serveur Sun Fire X4800 M2 pourvirtual Machine Software (VMware)

SERVEUR DÉDIÉ DOCUMENTATION

Paxton. ins Net2 desktop reader USB

Optimisation du bureau Oracle Solaris pour un environnement multiutilisateur

Introduction aux environnements de virtualisation d'oracle Solaris 11.1

SunATM 4.0 Release Notes

What s New. Sun ONE Application Server. Version 7, Enterprise Edition

Package Contents. System Requirements. Before You Begin

Lieberman Software Corporation

Folio Case User s Guide

How to Login to Career Page

Le Cloud Computing est-il l ennemi de la Sécurité?

Contents Windows

Instructions Mozilla Thunderbird Page 1

Accompagner nos clients vers.cloud. Nicolas Luneau Business Development Manager Symantec.cloud

en SCÈNE RATIONAL Rational Démonstration SDP : automatisation de la chaîne de développement Samira BATAOUCHE sbataouche@fr.ibm.com

TABLE DES MATIERES A OBJET PROCEDURE DE CONNEXION

DOCUMENTATION MODULE BLOCKCATEGORIESCUSTOM Module crée par Prestacrea - Version : 2.0

GIGABIT PCI DESKTOP ADAPTER DGE-530T. Quick Installation Guide+ Guide d installation+

Oracle Virtual Desktop Client. Notes de version de la version 3.0

WEB page builder and server for SCADA applications usable from a WEB navigator

Cheque Holding Policy Disclosure (Banks) Regulations. Règlement sur la communication de la politique de retenue de chèques (banques) CONSOLIDATION

Notice Technique / Technical Manual

VTP. LAN Switching and Wireless Chapitre 4

MELTING POTES, LA SECTION INTERNATIONALE DU BELLASSO (Association étudiante de lʼensaparis-belleville) PRESENTE :

Sécurité des systèmes d exploitation

Subject to the terms of this Agreement, Adobe hereby grants you a nonexclusive,

Instructions pour mettre à jour un HFFv2 v1.x.yy v2.0.00

Guide de récupération de Windows Server 2003 R2 pour serveurs Sun x64

SunVTS 7.0 Software Quick Reference

Monitor LRD. Table des matières

DOCUMENTATION - FRANCAIS... 2

APPENDIX 2. Provisions to be included in the contract between the Provider and the. Holder

Sun Blade G2 RAID 0/1 Expansion Module Installation Guide

CARTOON FICHE DESCRIPTIVE. Introduction. 1. Architecture

DOCUMENTATION - FRANCAIS... 2

Supervision et infrastructure - Accès aux applications JAVA. Document FAQ. Page: 1 / 9 Dernière mise à jour: 15/04/12 16:14

Règlement sur le télémarketing et les centres d'appel. Call Centres Telemarketing Sales Regulation

Tom Pertsekos. Sécurité applicative Web : gare aux fraudes et aux pirates!

Practice Direction. Class Proceedings

Archived Content. Contenu archivé

Oracle Virtual Desktop Client 2.0 Guide d'administration. February 2011

First Nations Assessment Inspection Regulations. Règlement sur l inspection aux fins d évaluation foncière des premières nations CONSOLIDATION

Academic Project. B2- Web Development. Resit Project. Version 1.0 Last update: 24/05/2013 Use: Students Author: Samuel CUELLA

Guide d'utilisation de l'assistant d'installation du matériel Oracle pour les serveurs x86

Server Architecture Overview

Logitech Tablet Keyboard for Windows 8, Windows RT and Android 3.0+ Setup Guide Guide d installation

Solaris Server Intranet Extension 1.0 Licensing Guide

Guide d installation de SugarCRM Open Source version 4.5.1

ADMINISTRATION DE ADOBE LIVECYCLE MOSAIC 9.5

WiFi Security Camera Quick Start Guide. Guide de départ rapide Caméra de surveillance Wi-Fi (P5)

SUGARCRM Sugar Open Source Guide d Installation de French SugarCRM Open Source Version 4.2

Sun Java SystemWeb Server 7.0 Documentation Center

Grandes tendances et leurs impacts sur l acquisition de produits et services TI.

CALCUL DE LA CONTRIBUTION - FONDS VERT Budget 2008/2009

Gestion des prestations Volontaire

AUDIT COMMITTEE: TERMS OF REFERENCE

Les différentes méthodes pour se connecter

Qualité et ERP CLOUD & SECURITY (HACKING) Alireza MOKHTARI. 9/12/2014 Cloud & Security

Cedric Dumoulin (C) The Java EE 7 Tutorial

Principe de TrueCrypt. Créer un volume pour TrueCrypt

COUNCIL OF THE EUROPEAN UNION. Brussels, 18 September 2008 (19.09) (OR. fr) 13156/08 LIMITE PI 53

86 rue Julie, Ormstown, Quebec J0S 1K0

Frequently Asked Questions

RULE 5 - SERVICE OF DOCUMENTS RÈGLE 5 SIGNIFICATION DE DOCUMENTS. Rule 5 / Règle 5

Name Use (Affiliates of Banks or Bank Holding Companies) Regulations

Vanilla : Virtual Box

Guide d'installation rapide TFM-560X YO.13

Domino Attachment and Object Service (DAOS)

FCM 2015 ANNUAL CONFERENCE AND TRADE SHOW Terms and Conditions for Delegates and Companions Shaw Convention Centre, Edmonton, AB June 5 8, 2015

Un système intégré totalement redondant

LOGICIEL D'ADMINISTRATION POUR E4000 & G4000 MANAGEMENT SOFTWARE FOR E4000 & G4000

Nouveautés printemps 2013

RAPID Prenez le contrôle sur vos données

SPARC M10 Systems. Security Guide

Credit Note and Debit Note Information (GST/ HST) Regulations

Acronymes et abréviations. Acronymes / Abbréviations. Signification

AMENDMENT TO BILL 32 AMENDEMENT AU PROJET DE LOI 32

Contrôle d'accès Access control. Notice technique / Technical Manual

IMS INTERNET /Paramétrage de l offre / Gateway Cisco IMS INTERNET. Paramétrage de l offre Gateway CISCO. Référence Edition Date de Diffusion Page

22/09/2014 sur la base de 55,03 euros par action

Multiple issuers. La cotation des actions ROBECO ci-dessous est suspendue sur EURONEXT PARIS dans les conditions suivantes :

Compléter le formulaire «Demande de participation» et l envoyer aux bureaux de SGC* à l adresse suivante :

PAR RINOX INC BY RINOX INC PROGRAMME D INSTALLATEUR INSTALLER PROGRAM

SAP Runs SAP Reporting Opérationnel & BI avec HANA et SAP Analytics. Pierre Combe, Enterprise Analytics Juin, 2015

Application Form/ Formulaire de demande

OUVRIR UN COMPTE CLIENT PRIVÉ

Micro-ordinateurs, informations, idées, trucs et astuces utiliser le Bureau à distance

EnerSys Canada Inc. Policy on. Accessibility Standard For Customer Service

Transcription:

Oracle SDN Controller Security Guide Part No.: E50941-01 December 2013

Copyright 2013, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related software documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms set forth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007). Oracle America, Inc., 500 Oracle Parkway, Redwood City, CA 94065. This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous applications, including applications which may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group. This software or hardware and documentation may provide access to or information on content, products, and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and services. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services. Copyright 2013, Oracle et/ou ses affiliés. Tous droits réservés. Ce logiciel et la documentation qui l accompagne sont protégés par les lois sur la propriété intellectuelle. Ils sont concédés sous licence et soumis à des restrictions d utilisation et de divulgation. Sauf disposition de votre contrat de licence ou de la loi, vous ne pouvez pas copier, reproduire, traduire, diffuser, modifier, breveter, transmettre, distribuer, exposer, exécuter, publier ou afficher le logiciel, même partiellement, sous quelque forme et par quelque procédé que ce soit. Par ailleurs, il est interdit de procéder à toute ingénierie inverse du logiciel, de le désassembler ou de le décompiler, excepté à des fins d interopérabilité avec des logiciels tiers ou tel que prescrit par la loi. Les informations fournies dans ce document sont susceptibles de modification sans préavis. Par ailleurs, Oracle Corporation ne garantit pas qu elles soient exemptes d erreurs et vous invite, le cas échéant, à lui en faire part par écrit. Si ce logiciel, ou la documentation qui l accompagne, est concédé sous licence au Gouvernement des Etats-Unis, ou à toute entité qui délivre la licence de ce logiciel ou l utilise pour le compte du Gouvernement des Etats-Unis, la notice suivante s applique : U.S. GOVERNMENT RIGHTS. Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms set forth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007). Oracle America, Inc., 500 Oracle Parkway, Redwood City, CA 94065. Ce logiciel ou matériel a été développé pour un usage général dans le cadre d applications de gestion des informations. Ce logiciel ou matériel n est pas conçu ni n est destiné à être utilisé dans des applications à risque, notamment dans des applications pouvant causer des dommages corporels. Si vous utilisez ce logiciel ou matériel dans le cadre d applications dangereuses, il est de votre responsabilité de prendre toutes les mesures de secours, de sauvegarde, de redondance et autres mesures nécessaires à son utilisation dans des conditions optimales de sécurité. Oracle Corporation et ses affiliés déclinent toute responsabilité quant aux dommages causés par l utilisation de ce logiciel ou matériel pour ce type d applications. Oracle et Java sont des marques déposées d Oracle Corporation et/ou de ses affiliés.tout autre nom mentionné peut correspondre à des marques appartenant à d autres propriétaires qu Oracle. Intel et Intel Xeon sont des marques ou des marques déposées d Intel Corporation. Toutes les marques SPARC sont utilisées sous licence et sont des marques ou des marques déposées de SPARC International, Inc. AMD, Opteron, le logo AMD et le logo AMD Opteron sont des marques ou des marques déposées d Advanced Micro Devices. UNIX est une marque déposée d The Open Group. Ce logiciel ou matériel et la documentation qui l accompagne peuvent fournir des informations ou des liens donnant accès à des contenus, des produits et des services émanant de tiers. Oracle Corporation et ses affiliés déclinent toute responsabilité ou garantie expresse quant aux contenus, produits ou services émanant de tiers. En aucun cas, Oracle Corporation et ses affiliés ne sauraient être tenus pour responsables des pertes subies, des coûts occasionnés ou des dommages causés par l accès à des contenus, produits ou services tiers, ou à leur utilisation. Please Recycle

Contents Oracle SDN Controller Security 1 System Overview 2 Security Principles 3 Security Guidelines 3 Console Security 3 CLI User Accounts 4 Disable Root Login Over SSH 4 Monitor Log Files 5 Access Control Lists 5 Network Access Controls 6 SNMP Configuration 6 Change the SNMP Read Community String 6 iii

iv Oracle SDN Controller Security Guide December 2013

Oracle SDN Controller Security Oracle SDN Controller brings high-speed Ethernet connectivity to your current IB networks. Oracle SDN Controller runs on an Oracle Linux server and provides the same features as the software stacks of the Oracle Fabric Interconnect. Oracle SDN Controller is configured and managed with Oracle Fabric Manager 4.2.0 and up, which provides a comprehensive UI for configuring PVI clouds and vnics. Key features include: Physical server auto-discovery I/O template, PVI cloud, and vnic management Multi-tenant support IB topology view This guide is intended for experienced system and network administrators. System Overview on page 2 Security Principles on page 3 Security Guidelines on page 3 Monitor Log Files on page 5 Access Control Lists on page 5 Network Access Controls on page 6 This guide does not cover Oracle Linux, Oracle Fabric Manager, or Oracle Fabric Interconnects and XgOS. For security information on these products, refer to: Oracle Linux Security Guide for Release 6 Oracle Fabric Interconnects and XgOS Security Guide Oracle Fabric Manager Security Guide 1

System Overview Two controllers are supported in the same subnet. One controller must be active and one controller must be passive. The following is an overview of an Oracle SDN Controller configuration. At startup, the controller servers are in passive mode. When a controller is made active, Oracle Fabric Manager pushes the latest configurations to that controller and periodically backs up the active controller configuration. The backups are available to send to the passive controller if the active controller goes down. 2 Oracle SDN Controller Security Guide December 2013

Security Principles The following principles are fundamental to using the Oracle SDN Controller securely. 1. For security information on system and network administration, refer to the Oracle Linux Security Guide for Release 6 at: http://docs.oracle.com/cd/e37670_01/ 2. Keep up to date on the latest security and software update information. Oracle continually improves its software and documentation. Check product and release notes often for updates at: http://docs.oracle.com/cd/e38500_01/ 3. Keep software and patches up to date. 4. Monitor system activity. See Monitor Log Files on page 5 and refer to the Oracle Fabric Manager Security Guide. 5. Ensure the hardware is in a locked environment. Security Guidelines The following topics describe security guidelines for the Oracle SDN Controller CLI. Console Security Access to the Oracle SDN Controller command line interface is provided exclusively over encrypted Secure Shell connections. Telnet is not supported. For example, connect to the Oracle SDN Controller command line interface as user admin. ssh -l admin ip-address Oracle SDN Controller Security 3

CLI User Accounts The Identity Management System (IMS) service authenticates users and grants them suitable privileges according to assigned user roles when users access the Oracle SDN Controller. The IMS service can be one of the following: Oracle SDN Controller local system, which is always present. Microsoft Active Directory (AD). Remote Authentication Dial In User Service (RADIUS). Only the local Oracle identity management features are described in this guide. Refer to the documentation on using Active Directory or RADIUS authentication services. The system is delivered with two default management accounts. The password strength controls do not apply to these accounts. Enforce complex passwords for these accounts through policy: root Allows complete administrative access to the underlying Linux based controller. This access is intended for Oracle certified personnel only. Changes to the controller configurations by the customer are not supported by Oracle. admin Allows administrative access to the CLI management tools and security including the ability to create new user accounts. Disable Root Login Over SSH 1. Login as root. Change the default password (root) on initial login. ssh -l root ip-address 2. Edit the sshd_config file. Change PermitRootLogin yes to PermitRootLogin no. vi /etc/ssh/sshd_config... PermitRootLogin no... 3. Save the file. 4. Restart sshd. # service sshd restart 4 Oracle SDN Controller Security Guide December 2013

5. Verify that you cannot login as root over SSH. Monitor Log Files Log files are stored in the /log directory. A variety of subsystems have separate log file entries, including: dmesg, apache, syslog, cli, xms, and others. Note Monitor log files regularly and archive them to facilitate security reviews in case of a security breach. 1. Show CLI login activity. # more /log/cli.log 2. Show daily boot messages. # more /log/dmesg Access Control Lists Access control lists (ACLs) classify packets. The classification result can be applied to quality-of-service (QoS) application flows (mark, police) or to network-access control (deny, allow). Strict ACL configurations are critical for enhancing security. Consider the following examples: Prioritizing outbound traffic by marking fields in the IP header Enables upstream routers to handle this marked (set) traffic in a specific way. For example, any RTP VoIP traffic within a certain port range could have its IP TOS bit set to a value of 5. Any packet that satisfies these conditions will have its IP header field set by the I/O card. Intentionally dropping packets during a denial-of-service (DoS) attack All traffic is blocked from specific IP or MAC addresses. For example, an ACL could block any traffic heading in an egress direction (server to network) with a specified IP or MAC address. Refer to the XgOS Command-Line Interface User s Guide for instructions on how to create and enforce ACLs. Oracle SDN Controller Security 5

Network Access Controls The Oracle SDN Controller advertises the following ports: Port 22 ssh CLI management. Port 80 http Unencrypted Oracle Fabric Manager client access. Port 443 https Encrypted Oracle Fabric Manager client access. Port 161 SNMP SNMP monitoring. Port 6522 Enables Oracle Fabric Manager to discover the Oracle SDN Controllers. SNMP Configuration XgOS supports SNMPv1, v2, and v3. get, getnext, and getbulk operations are supported. set operations are not supported. Community strings are read only. The default read-community string is public. Note Change the default read-community string to prevent unauthorized monitoring of the systems. Note Always use SNMPv3 and use the correct authentication protocol. Change the SNMP Read Community String Type: set snmp -read-community=string 6 Oracle SDN Controller Security Guide December 2013