Sun Datacenter InfiniBand Switch 36. Hardware Security Guide



Documents pareils
Oracle FS Data Protection Manager. Release Notes. Part Number E Oracle FS Data Protection Manager release 3.5.

Sun ZFS Appliance Monitor. Configuration Guide, Version 1.0

Oracle Fabric Manager. Security Guide

StorageTek Tape Analytics

Oracle SDN Controller. Security Guide

SPARC M10 Systems. Security Guide

Quick Start Guide This guide is intended to get you started with Rational ClearCase or Rational ClearCase MultiSite.

Oracle Solaris 10 Security Guidelines

Instructions Mozilla Thunderbird Page 1

Package Contents. System Requirements. Before You Begin

What s New. Sun ONE Application Server. Version 7, Enterprise Edition

Optimisation du bureau Oracle Solaris pour un environnement multiutilisateur

Paxton. ins Net2 desktop reader USB

SERVEUR DÉDIÉ DOCUMENTATION

Introduction aux environnements de virtualisation d'oracle Solaris 11.1

SunATM 4.0 Release Notes

How to Login to Career Page

First Nations Assessment Inspection Regulations. Règlement sur l inspection aux fins d évaluation foncière des premières nations CONSOLIDATION

Règlement sur le télémarketing et les centres d'appel. Call Centres Telemarketing Sales Regulation

VTP. LAN Switching and Wireless Chapitre 4

GIGABIT PCI DESKTOP ADAPTER DGE-530T. Quick Installation Guide+ Guide d installation+

Archived Content. Contenu archivé

AUDIT COMMITTEE: TERMS OF REFERENCE

Guide de récupération de Windows Server 2003 R2 pour serveurs Sun x64

Cheque Holding Policy Disclosure (Banks) Regulations. Règlement sur la communication de la politique de retenue de chèques (banques) CONSOLIDATION

APPENDIX 2. Provisions to be included in the contract between the Provider and the. Holder

WEB page builder and server for SCADA applications usable from a WEB navigator

Notice Technique / Technical Manual

DOCUMENTATION - FRANCAIS... 2

Contents Windows

Le Cloud Computing est-il l ennemi de la Sécurité?

Utiliser une WebCam. Micro-ordinateurs, informations, idées, trucs et astuces

Instructions pour mettre à jour un HFFv2 v1.x.yy v2.0.00

Cedric Dumoulin (C) The Java EE 7 Tutorial

Folio Case User s Guide

TABLE DES MATIERES A OBJET PROCEDURE DE CONNEXION

Monitor LRD. Table des matières

Solaris Server Intranet Extension 1.0 Licensing Guide

Guide d'installation du serveur Sun Fire X4800 M2 pourvirtual Machine Software (VMware)

DOCUMENTATION - FRANCAIS... 2

DOCUMENTATION MODULE BLOCKCATEGORIESCUSTOM Module crée par Prestacrea - Version : 2.0

Support Orders and Support Provisions (Banks and Authorized Foreign Banks) Regulations

en SCÈNE RATIONAL Rational Démonstration SDP : automatisation de la chaîne de développement Samira BATAOUCHE sbataouche@fr.ibm.com

Sécurité des systèmes d exploitation

RULE 5 - SERVICE OF DOCUMENTS RÈGLE 5 SIGNIFICATION DE DOCUMENTS. Rule 5 / Règle 5

LOGICIEL D'ADMINISTRATION POUR E4000 & G4000 MANAGEMENT SOFTWARE FOR E4000 & G4000

Subject to the terms of this Agreement, Adobe hereby grants you a nonexclusive,

Export Permit (Steel Monitoring) Regulations. Règlement sur les licences d exportation (surveillance de l acier) CONSOLIDATION CODIFICATION

CARTOON FICHE DESCRIPTIVE. Introduction. 1. Architecture

Grandes tendances et leurs impacts sur l acquisition de produits et services TI.

Practice Direction. Class Proceedings

Gestion des prestations Volontaire

ETABLISSEMENT D ENSEIGNEMENT OU ORGANISME DE FORMATION / UNIVERSITY OR COLLEGE:

Sun Blade G2 RAID 0/1 Expansion Module Installation Guide

FCM 2015 ANNUAL CONFERENCE AND TRADE SHOW Terms and Conditions for Delegates and Companions Shaw Convention Centre, Edmonton, AB June 5 8, 2015

Critères à l attention des fabricants et des fournisseurs de biens ou de services : dispositifs mécaniques pour bingo

AMENDMENT TO BILL 32 AMENDEMENT AU PROJET DE LOI 32

INVESTMENT REGULATIONS R In force October 1, RÈGLEMENT SUR LES INVESTISSEMENTS R En vigueur le 1 er octobre 2001

CEPF FINAL PROJECT COMPLETION REPORT

Principe de TrueCrypt. Créer un volume pour TrueCrypt

Application Form/ Formulaire de demande

Contrôle d'accès Access control. Notice technique / Technical Manual

Lieberman Software Corporation

Sun Ultra 45 and Ultra 25 Workstations Getting Started Guide

WiFi Security Camera Quick Start Guide. Guide de départ rapide Caméra de surveillance Wi-Fi (P5)

Domino Attachment and Object Service (DAOS)

If the corporation is or intends to become a registered charity as defined in the Income Tax Act, a copy of these documents must be sent to:

POLICY: FREE MILK PROGRAM CODE: CS-4

EnerSys Canada Inc. Policy on. Accessibility Standard For Customer Service

Institut français des sciences et technologies des transports, de l aménagement

Multiple issuers. La cotation des actions ROBECO ci-dessous est suspendue sur EURONEXT PARIS dans les conditions suivantes :

Sun Java SystemWeb Server 7.0 Documentation Center

Supervision et infrastructure - Accès aux applications JAVA. Document FAQ. Page: 1 / 9 Dernière mise à jour: 15/04/12 16:14

LE FORMAT DES RAPPORTS DU PERSONNEL DES COMMISSIONS DE DISTRICT D AMENAGEMENT FORMAT OF DISTRICT PLANNING COMMISSION STAFF REPORTS

COUNCIL OF THE EUROPEAN UNION. Brussels, 18 September 2008 (19.09) (OR. fr) 13156/08 LIMITE PI 53

THE LAW SOCIETY OF UPPER CANADA BY-LAW 19 [HANDLING OF MONEY AND OTHER PROPERTY] MOTION TO BE MOVED AT THE MEETING OF CONVOCATION ON JANUARY 24, 2002

MELTING POTES, LA SECTION INTERNATIONALE DU BELLASSO (Association étudiante de lʼensaparis-belleville) PRESENTE :

Nouveautés printemps 2013

Acce s aux applications informatiques Supply Chain Fournisseurs

Tom Pertsekos. Sécurité applicative Web : gare aux fraudes et aux pirates!

AVIS DE COURSE. Nom de la compétition : CHALLENGE FINN OUEST TOUR 3 Dates complètes : 14, 15 et 16 mai 2015 Lieu : Saint Pierre Quiberon

donor which means an individual person who makes a charitable contribution to The Playhouse or one of its Clients;

CALCUL DE LA CONTRIBUTION - FONDS VERT Budget 2008/2009

ADMINISTRATION DE ADOBE LIVECYCLE MOSAIC 9.5

PROJET DE LOI. An Act to Amend the Employment Standards Act. Loi modifiant la Loi sur les normes d emploi

CONVENTION DE STAGE TYPE STANDART TRAINING CONTRACT

L'Offre sera ouverte pendant 18 jours de bourse, à un prix par action de 152,30 EUR. BPCE International et Outre-Mer

Guide de sécurité du serveur Oracle Server X5-2L

INSTRUMENTS DE MESURE SOFTWARE. Management software for remote and/or local monitoring networks

that the child(ren) was/were in need of protection under Part III of the Child and Family Services Act, and the court made an order on

Un système intégré totalement redondant

Q-global Privacy Policy (Version française ci-dessous)

Natixis Asset Management Response to the European Commission Green Paper on shadow banking

Guide de démarrage du système modulaire Sun Blade 6000

86 rue Julie, Ormstown, Quebec J0S 1K0

Railway Operating Certificate Regulations. Règlement sur les certificats d exploitation de chemin de fer CODIFICATION CONSOLIDATION

1. Formation F5 - Local Traffic Manager Configuring (LTM)

SunVTS 7.0 Software Quick Reference

Transcription:

Sun Datacenter InfiniBand Switch 36 Hardware Security Guide Part No.: E26701-02 March 2013

Copyright 2011, 2013, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related software documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS. Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government. This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous applications, including applications that may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group. This software or hardware and documentation may provide access to or information on content, products, and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and services. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services. Copyright 2011, 2013, Oracle et/ou ses affiliés. Tous droits réservés. Ce logiciel et la documentation qui l accompagne sont protégés par les lois sur la propriété intellectuelle. Ils sont concédés sous licence et soumis à des restrictions d utilisation et de divulgation. Sauf disposition de votre contrat de licence ou de la loi, vous ne pouvez pas copier, reproduire, traduire, diffuser, modifier, breveter, transmettre, distribuer, exposer, exécuter, publier ou afficher le logiciel, même partiellement, sous quelque forme et par quelque procédé que ce soit. Par ailleurs, il est interdit de procéder à toute ingénierie inverse du logiciel, de le désassembler ou de le décompiler, excepté à des fins d interopérabilité avec des logiciels tiers ou tel que prescrit par la loi. Les informations fournies dans ce document sont susceptibles de modification sans préavis. Par ailleurs, Oracle Corporation ne garantit pas qu elles soient exemptes d erreurs et vous invite, le cas échéant, à lui en faire part par écrit. Si ce logiciel, ou la documentation qui l accompagne, est concédé sous licence au Gouvernement des Etats-Unis, ou à toute entité qui délivre la licence de ce logiciel ou l utilise pour le compte du Gouvernement des Etats-Unis, la notice suivante s applique : U.S. GOVERNMENT END USERS. Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government. Ce logiciel ou matériel a été développé pour un usage général dans le cadre d applications de gestion des informations. Ce logiciel ou matériel n est pas conçu ni n est destiné à être utilisé dans des applications à risque, notamment dans des applications pouvant causer des dommages corporels. Si vous utilisez ce logiciel ou matériel dans le cadre d applications dangereuses, il est de votre responsabilité de prendre toutes les mesures de secours, de sauvegarde, de redondance et autres mesures nécessaires à son utilisation dans des conditions optimales de sécurité. Oracle Corporation et ses affiliés déclinent toute responsabilité quant aux dommages causés par l utilisation de ce logiciel ou matériel pour ce type d applications. Oracle et Java sont des marques déposées d Oracle Corporation et/ou de ses affiliés.tout autre nom mentionné peut correspondre à des marques appartenant à d autres propriétaires qu Oracle. Intel et Intel Xeon sont des marques ou des marques déposées d Intel Corporation. Toutes les marques SPARC sont utilisées sous licence et sont des marques ou des marques déposées de SPARC International, Inc. AMD, Opteron, le logo AMD et le logo AMD Opteron sont des marques ou des marques déposées d Advanced Micro Devices. UNIX est une marque déposée d The Open Group. Ce logiciel ou matériel et la documentation qui l accompagne peuvent fournir des informations ou des liens donnant accès à des contenus, des produits et des services émanant de tiers. Oracle Corporation et ses affiliés déclinent toute responsabilité ou garantie expresse quant aux contenus, produits ou services émanant de tiers. En aucun cas, Oracle Corporation et ses affiliés ne sauraient être tenus pour responsables des pertes subies, des coûts occasionnés ou des dommages causés par l accès à des contenus, produits ou services tiers, ou à leur utilisation. Please Recycle

Contents Sun Datacenter InfiniBand Switch 36 Security Guide 1 Understanding Security Principles 1 Planning a Secure Environment 2 Hardware Security 2 Software Security 3 Oracle ILOM Firmware 4 VLAN Security 4 Infiniband Security 4 User Accounts 5 System Logs 5 Maintaining a Secure Environment 5 Asset Tracking 5 Updates for Software and Firmware 6 Network Access 6 Data Protection 6 Log Security 7 iii

iv Sun Datacenter InfiniBand Switch 36 Hardware Security Guide March 2013

Sun Datacenter InfiniBand Switch 36 Security Guide This document provides general security guidelines to help you protect the Sun Datacenter InfiniBand Switch 36. Topics discussed include: Understanding Security Principles on page 1 Planning a Secure Environment on page 2 Maintaining a Secure Environment on page 5 Understanding Security Principles The the four As (AAAA) of basic security principles are: access, authentication, authorization, and accounting. Access Physical and software controls protect your hardware or data from intrusion. For hardware, access limits usually mean physical access limits. For software, access is limited through both physical and virtual means. Firmware cannot be changed except through the Oracle update process. Authentication Set up the authentication features such as a password system in your switch to ensure that users are who they say they are. Ensure that your personnel use employee badges properly to enter the data center. Authorization Allow personnel to work only with hardware and software that they are trained and qualified to use. Set up a system of Read/Write/Execute permissions to control user access to commands, disk space, devices, and applications. 1

Accounting Use Oracle software and hardware features to monitor login activity and maintain hardware inventories. Use system and Oracle ILOM logs to monitor user logins. Monitor the root, ilom-admin, and root-privileged accounts in particular because these accounts can access powerful commands. Use component serial numbers to track system assets. Oracle serial numbers are physically marked on chassis and electronically recorded on all management controllers and main boards. Planning a Secure Environment Review these topic before and during the installation and configuration of the switch. Hardware Security on page 2 Software Security on page 3 Oracle ILOM Firmware on page 4 VLAN Security on page 4 Infiniband Security on page 4 User Accounts on page 5 System Logs on page 5 Hardware Security Physical hardware can be secured simply by limiting access to the hardware and recording serial numbers. Restrict access Install the switch in a locked, restricted access room. If equipment is installed in a rack with a locking door, keep the door secured at all times. Restrict access to USB consoles at the switch itself. USB consoles permit greater privileges to user management, and error and debug messaging. USB consoles are also less secure than SSH connections. Restrict access to power supplies, fan modules, and transceivers in particular because they can be easily removed. 2 Sun Datacenter InfiniBand Switch 36 Hardware Security Guide March 2013

Store spare replaceable components in a locked cabinet. Allow access to the locked cabinet by authorized personnel only. Record serial numbers Security-mark all significant items including replaceable components. Use special ultraviolet pens or embossed labels. Keep a serial number record of all your hardware. Keep copies of invoices, purchasing records, and licenses in a secure location that is easily accessible to the system manager during system emergencies. These printed documents might be the only proof of ownership. Software Security Most hardware security is implemented through software measures. Refer to the switch documentation for additional guidelines to implement security features within the firmware. Implement port security to limit access based upon MAC addresses. Disable auto-trunking on all ports. Manage the switch out-of-band on a separate dedicated network. This management network is separate from data traffic and the general network. If out-of-band management is not feasible, then dedicate a unique VLAN number solely for in-band management. Change all default passwords when installing a new switch. The switch has four default user accounts and respective passwords: ilom-admin The ilom-admin user has administrator privileges for the CLI, web, and IPMI interfaces. The default password is ilom-admin. Change the password with the Oracle ILOM set /SP/users/ilom-admin password command. ilom-operator The ilom-operator user has read-only privileges for the CLI and web interfaces. The default password is ilom-operator. Change the password with the Oracle ILOM set /SP/users/ilom-operator password command. root The root user has superuser privileges. The default password is changeme. Change the password with the passwd command. nm2user The nm2user has read-only privileges for the CLI interface. The default password is changeme. Change the password with the passwd command. Schedule and regularly change every password on the switch, especially when configured with additional user accounts. Sun Datacenter InfiniBand Switch 36 Security Guide 3

Oracle ILOM Firmware You can actively secure, manage, and monitor system components through Oracle Integrated Lights Out Manager (Oracle ILOM) management firmware which is preinstalled on the switch. To understand more about using this firmware when setting up passwords, managing users, and applying security-related features, refer to Oracle ILOM documentation: http://www.oracle.com/pls/topic/lookup?ctx=e19860-01 VLAN Security If you configure virtual local area networks (VLANs), remember that VLANs share bandwidth on a network and require additional security measures. Define VLANs so as to separate sensitive clusters of systems from the rest of the network. This decreases the likelihood that users will gain access to information on these clients and servers. Assign a unique native VLAN number to trunk ports. Limit the VLANs that can be transported over a trunk to only those that are strictly required. Disable VLAN Trunking Protocol (VTP), if possible. Otherwise, set the following for VTP: management domain, password and pruning. Then set VTP into transparent mode. Infiniband Security Keep Infiniband hosts and switches secure. An Infiniband fabric is only as secure as its least secure Infiniband switch. Configure the Subnet Managers and switches to use secret M_Keys. If you configure only readable M_Keys, you prevent inccidental misconfiguration and elevate the threshold for Subnet Manager attacks. If you configure secret M_Keys, you prevent intentional misconfiguration of the InfiniBand fabric by effectively excluding unauthorized Subnet Manager. Partitioning and implementing P_Keys do not protect an Infiniband fabric. Partitioning only offers Infiniband traffic isolation between partitions. Use static VLAN configurations when possible. Disable unused switch ports and assign them an unused VLAN number. 4 Sun Datacenter InfiniBand Switch 36 Hardware Security Guide March 2013

User Accounts The switch firmware does not support RADIUS authentication. It is important to administer local user management on the switch. Limit the use of the root superuser account. Instead, assign Oracle Integrated Lights Out Manager (Oracle ILOM) accounts such as ilom-operator and ilom-admin whenever possible. Use access control lists where appropriate. Set time-outs for extended sessions. Set privilege levels. Create a system banner to remind the user that unauthorized access is prohibited. System Logs Enable logging and send logs to a dedicated secure log host. Configure logging to include accurate time information, using NTP and timestamps. Maintaining a Secure Environment After the initial installation and setup, use Oracle hardware and software security features to continue controlling hardware and tracking system assets. Asset Tracking on page 5 Updates for Software and Firmware on page 6 Network Access on page 6 Data Protection on page 6 Log Security on page 7 Asset Tracking Use serial numbers to track inventory. Oracle embeds serial numbers in firmware on management controllers. Refer to the switch documentation for instructions how to read these serial numbers. Sun Datacenter InfiniBand Switch 36 Security Guide 5

You can also use wireless radio frequency identification (RFID) readers to further simplify asset tracking. An Oracle white paper How to Track Your Oracle Sun System Assets by Using RFID is available at: http://www.oracle.com/technetwork/articles/systems-hardware-arc hitecture/o11-001-rfid-oracle-214567.pdf Updates for Software and Firmware Keep your firmware versions current on your switch. Check regularly for updates. Always install the latest released version of the software or firmware. Network Access Follow these guidelines to secure local and remote access to your systems: Implement port security to limit access based upon a MAC address. Disable auto-trunking on all ports. Limit remote configuration to specific IP addresses using SSH instead of Telnet. Telnet passes user names and passwords in clear text, potentially allowing everyone on the LAN segment to see login credentials. Set a strong password for SSH. Configure and use version 3 (v3) of SNMP to provide secure transmissions. Versions v1 and v2c of SNMP are not secure and transmit authentication data in unencripted text. Change the default SNMP community string (PUBLIC) to a strong community string if SNMP is necessary. Attackers can query a community to draw a very complete network map and possibly modify management information base (MIB) values. Do not enable SNMP set requests unless absolutely necessary. If enabled, create separate SNMP v3 users with read-only and read-write permissions. Always log out after accessing the management controller through the web interface. Disable unused or unnecessary services, such as TCP small servers or HTTP. Only enable necessary services and configure these services securely. Data Protection Follow these guidelines to maximize data security: 6 Sun Datacenter InfiniBand Switch 36 Hardware Security Guide March 2013

Backup switch configuration files to remote, secure locations and limit their access to authorized administrators only. The configuration files should contain descriptive comments for each setting. Use data encryption software to keep confidential information on hard drives secure. The management controller s filesystem contains data equivalent to a system hard drive. When replacing an old management controller, physically destroy the controller or completely erase all the data in the controller s filesystem. Use disk wiping software to completely erase all data on the filesystem. Log Security Inspect and maintain your log files on a regular schedule. Review both system and Oracle ILOM logs for possible incidents and archive them in accordance with a security policy. Periodically archive and clear log files when they exceed a reasonable size. Maintain the archives in a secure location for possible future reference or statistical analysis. Sun Datacenter InfiniBand Switch 36 Security Guide 7

8 Sun Datacenter InfiniBand Switch 36 Hardware Security Guide March 2013