SlideShare a Scribd company logo
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Oracle Network Security
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Objectives
After completing this lesson, you should be able to do
the following:
• Describe the items on the client, listener, and
network security checklists
• Secure administration of the network
• Restrict access by IP address
• Administer the listener securely
• Analyze listener log files
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Client Checklist
• Internet access to secure data requires user
authentication, rather than client-computer
authentication.
• The options are:
– Bypass client-computer configuration and rely on
user authentication to a middle tier.
– Configure the client computer:
• Authentication
• Authorization
– Administer client certificates.
– Educate users.
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Configuring the Browser
Browsers include the following security features:
• SSL encryption by using the HTTPS protocol
• Certificate authorization:
– Client
– Server
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Configuring the Client
Configure client computers to use Oracle Advanced
Security features with Oracle Net Services:
• Native encryption
• SSL authentication by using certificates
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Using Certificates
Considerations when using certificates for
authentication:
• Distinguished name and issuer uniquely identify
the user.
• Test for expiring certificates.
• Use certificate reissues to update certificate
information.
• Audit certificate revocations.
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Network Security: Checklist
• Use a firewall.
• Restrict IP addresses.
• Encrypt network traffic.
• Prevent remote administration of Connection
Manager (CMAN).
• Use network log files to monitor connections.
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Using a Firewall to Restrict
Network Access
Application
Web server
Database
server
Client
computers
Firewall Firewall
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Restricting Network IP Addresses:
Valid Node Checking
Set the following SQLNET.ORA parameters:
• Turn on the feature:
• Deny access from these nodes:
• Allow access from these nodes:
tcp.excluded_nodes = 192.168.10.102
tcp.invited_nodes =
(192.168.10.102, 192.168.10.112)
tcp.validnode_checking = YES
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Restricting Network IP Addresses:
Guidelines
Network IP restrictions can help secure access to your
server. Consider the following guidelines:
• Do not use IP restrictions as your only security. IP
addresses can be spoofed.
• Use Connection Manager to limit access by node.
• Limit access by protocol.
• Protect dispatcher ports. IP restrictions do not
prevent connections to the dispatcher.
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Restricting Open Ports
• Limit open ports to needed applications:
– Open ports are network-attack opportunities.
– Know which ports are open on your computer.
• Find open ports:
– Oracle product installation ports in portlist.ini
– Listener ports in listener.ora
– Dispatcher ports by using lsnrctl services
– Other ports by using netstat
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Encrypting Network Traffic
• Guideline: Encrypt sensitive network traffic.
• Tasks:
– Use HTTPS when sending sensitive data between
the client computer and the server.
– Use SSL or native encryption to encrypt Oracle Net
Services traffic.
• Use the TCPS protocol for TCP/IP with SSL:
...
(ADDRESS=
(PROTOCOL=tcps)
...
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Oracle Net Services Log Files
Database
server
CMADMIN
process
CMGW
processsqlnet.log
listener.log
<name>_cmadm_pid.log
<name>_cmgw_pid.log
Listener
CMAN
listener
<name>_pid.log
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Listener Security: Checklist
• Restrict the privileges of the listener.
• Secure administration by:
– Protecting the listener with a password for remote
administration
– Using SSL when administering the listener
• Protect against denial-of-service attacks.
• Monitor listener activity.
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Restricting the Privileges of the Listener
• Restrict the privileges of a separate listener
process.
• A sample configuration is:
EXTPROC_LISTENER=
(DESCRIPTION=
(ADDRESS=(PROTOCOL=ipc)(KEY=extproc)))
SID_LIST_EXTPROC_LISTENER=
(SID_LIST=
(SID_DESC=
(SID_NAME=plsextproc)
(ORACLE_HOME=
/u01/app/oracle/product/11.2.0/db_1)
(PROGRAM=extproc)))
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Use the CREATE LIBRARY
Privilege Sparingly
• External procedures:
– Are executed from a library
– Run with the privileges of the listener
• By default, the listener has the write privilege to:
– Database files
– The memory space of the instance
• To avoid misuse of this privilege:
– Use it only when needed
– Limit the privileges of the listener
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Password Protect the Listener
• Establish a password for the Oracle listener to
prevent unauthorized listener administration.
• From the Listener Control utility, issue the
following command:
LSNRCTL> CHANGE_PASSWORD
Old password: lsnrc80
New password: lsnrc90
Reenter new password: lsnrc90
LSNRCTL> SET PASSWORD
Password:
The command completed successfully
LSNRCTL> SAVE_CONFIG
The command completed successfully
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Preventing Online Administration
of the Listener
• Listener configuration cannot be changed online.
• To change the configuration, you must:
– Make the changes in the LISTENER.ORA file
– Reload the configuration
• In the LISTENER.ORA file, enter the following:
• This configuration requires the administrator to
have:
– Write privileges on the LISTENER.ORA file
ADMIN_RESTRICTIONS_LISTENER=ON
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Administering the Listener Using
TCP/IP with SSL
• Use TCP/IP with SSL when administering over an
insecure network.
• Make the TCPS protocol the first entry in the
address list.
• Example (LISTENER.ORA file configured for SSL):
LISTENER=
(DESCRIPTION=
(ADDRESS_LIST=
(ADDRESS=
(PROTOCOL=tcps)
(HOST = singleton11g.snda.com)
(PORT = 1521)))
...
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
INBOUND_CONNECT_TIMEOUT
Protect the listener from denial-of-service attacks with
the following network parameters:
• SQLNET.INBOUND_CONNECT_TIMEOUT
• INBOUND_CONNECT_TIMEOUT_listener_name
These parameters:
• Set the time allowed for a connection to complete
authentication
• Log failures with source IP addresses
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Setting Listener Logging Parameters
• In the LISTENER.ORA file:
– LOG_DIRECTORY_listener_name
– LOG_FILE_listener_name
• With Oracle Net Manager:
• With the SET command in the Listener Control
utility:
– LOG_DIRECTORY
– LOG_FILE
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Analyzing Listener Log Files
The listener log contains the following information:
• Listener log audits:
– Client connection request
– Listener Control utility commands
• Listener service registration events:
– service_register
– service_update
– service_died
• Listener direct hand-off information
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Summary
In this lesson, you should have learned how to:
• Describe the items on the client, listener, and
network security checklists
• Secure administration of the network
• Restrict access by IP address
• Administer the listener securely
• Analyze listener log files
云和恩墨 成就所托 by 王朝阳 18516271611 sonne.k.wang@gmail.com
Q&A

More Related Content

PDF
Oracle security 02-administering user security
PPT
SQL Server Security - Attack
PDF
Oracle Security Presentation
PDF
Presentation database security enhancements with oracle
PPTX
Isaca sql server 2008 r2 security & auditing
DOC
Oracle Audit vault
PDF
Présentation et démo ELK/SIEM/Wazuh
PPTX
Beyond xp_cmdshell: Owning the Empire through SQL Server
Oracle security 02-administering user security
SQL Server Security - Attack
Oracle Security Presentation
Presentation database security enhancements with oracle
Isaca sql server 2008 r2 security & auditing
Oracle Audit vault
Présentation et démo ELK/SIEM/Wazuh
Beyond xp_cmdshell: Owning the Empire through SQL Server

What's hot (20)

PDF
10 Deadly Sins of SQL Server Configuration - APPSEC CALIFORNIA 2015
PPTX
SqlSa94
PPTX
Securing Hadoop with OSSEC
PPTX
Oracle Audit Vault Training | Audit Vault - Oracle Trainings
PDF
Web Server Hardening
PPTX
2017 Secure360 - Hacking SQL Server on Scale with PowerShell
PDF
PowerUpSQL - 2018 Blackhat USA Arsenal Presentation
PPTX
Secure360 - Beyond xp cmdshell - Owning the Empire through SQL Server
PPTX
What's New in AlienVault v3.0?
PDF
TROOPERS 20 - SQL Server Hacking Tips for Active Directory Environments
PPTX
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
PDF
SQL Server Exploitation, Escalation, Pilfering - AppSec USA 2012
PPTX
2019 Blackhat Booth Presentation - PowerUpSQL
DOCX
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
PPTX
DerbyCon2016 - Hacking SQL Server on Scale with PowerShell
PPTX
2016 aRcTicCON - Hacking SQL Server on Scale with PowerShell (Slide Updates)
PPT
Securing Windows web servers
PPT
Creating Secure Applications
PPT
Security Issues in OpenStack
PDF
Memory forensics cheat sheet
10 Deadly Sins of SQL Server Configuration - APPSEC CALIFORNIA 2015
SqlSa94
Securing Hadoop with OSSEC
Oracle Audit Vault Training | Audit Vault - Oracle Trainings
Web Server Hardening
2017 Secure360 - Hacking SQL Server on Scale with PowerShell
PowerUpSQL - 2018 Blackhat USA Arsenal Presentation
Secure360 - Beyond xp cmdshell - Owning the Empire through SQL Server
What's New in AlienVault v3.0?
TROOPERS 20 - SQL Server Hacking Tips for Active Directory Environments
Cloud Security Hardening та аудит хмарної безпеки за допомогою Scout Suite
SQL Server Exploitation, Escalation, Pilfering - AppSec USA 2012
2019 Blackhat Booth Presentation - PowerUpSQL
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
DerbyCon2016 - Hacking SQL Server on Scale with PowerShell
2016 aRcTicCON - Hacking SQL Server on Scale with PowerShell (Slide Updates)
Securing Windows web servers
Creating Secure Applications
Security Issues in OpenStack
Memory forensics cheat sheet
Ad

Viewers also liked (7)

PPTX
Osobní bezpečnost na internetu
PPT
Auditing security of Oracle DB (Karel Miko)
PDF
Oracle db subprograms
PDF
Secure Technical Implementation Guide for databases by Martin Obst
PPT
Oracle Berkeley Db 11g R2
PDF
1 z0 052
PDF
Oracle Compute Cloud Service快速实践
Osobní bezpečnost na internetu
Auditing security of Oracle DB (Karel Miko)
Oracle db subprograms
Secure Technical Implementation Guide for databases by Martin Obst
Oracle Berkeley Db 11g R2
1 z0 052
Oracle Compute Cloud Service快速实践
Ad

Similar to Oracle security 08-oracle network security (20)

PPTX
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptx
PDF
OTN tour 2015 Experience in implementing SSL between oracle db and oracle cli...
PPT
ASCC-site-report-123456430523fwje0fjewew
PDF
Keep Them out of the Database
DOCX
Cman
PPT
Less05 Network
PPT
Novell® iChain® 2.3
PDF
Vtu network security(10 ec832) unit 5 notes.
PDF
Oracle 19c Network Security & Sniffing Test Scenario
PDF
Database security best_practices
PPTX
Data communication Part 11
PPTX
Remote Access Security
PDF
Ssl tls-beginners-guide
PDF
Secure PostgreSQL deployment
PDF
How to Gain Visibility into Encrypted Threats
PDF
Network and cyber security module(15ec835, 17ec835)
PPTX
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
PPTX
Internet security
PPT
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
PDF
Implementing Application Security
Oralce SSL walelt -TCPS_Troubleshooting_PB.pptx
OTN tour 2015 Experience in implementing SSL between oracle db and oracle cli...
ASCC-site-report-123456430523fwje0fjewew
Keep Them out of the Database
Cman
Less05 Network
Novell® iChain® 2.3
Vtu network security(10 ec832) unit 5 notes.
Oracle 19c Network Security & Sniffing Test Scenario
Database security best_practices
Data communication Part 11
Remote Access Security
Ssl tls-beginners-guide
Secure PostgreSQL deployment
How to Gain Visibility into Encrypted Threats
Network and cyber security module(15ec835, 17ec835)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Internet security
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Implementing Application Security

More from Zhaoyang Wang (20)

PDF
海通证券金融云思考与实践(数据技术嘉年华2017)
PDF
云管理平台助力海通金融云建设
PDF
海通证券数据库备份恢复云平台实践(OTN Tour Shanghai 2017)
PDF
Oracle Compute Cloud Service介绍
PDF
Oracle cloud 使用云市场快速搭建小型电商网站
PDF
Oracle cloud ravello介绍及测试账户申请
PDF
Oracle cloud 云介绍及测试账户申请
PDF
New awesome features in MySQL 5.7
PDF
Performance Tuning Tool01-Statspack
PDF
SQL Tuning02-Intorduction to the CBO Optimizer
PDF
SQL Tuning04-Interpreting Execution Plans
PDF
SQL Tuning01-Introduction to SQL Tuning
PDF
MySQL Fulltext Search Tutorial
PDF
Data Organization in InnoDB
PDF
Oracle enterprise manager cloud control 12c release 5 installation on oracle ...
PDF
Oracle enterprise manager cloud control 12c r5 agent installation
PDF
Why use MySQL
PDF
MYSQLCLONE Introduction
DOCX
Interpreting execution plans
DOCX
Intorduction to the cbo optimizer
海通证券金融云思考与实践(数据技术嘉年华2017)
云管理平台助力海通金融云建设
海通证券数据库备份恢复云平台实践(OTN Tour Shanghai 2017)
Oracle Compute Cloud Service介绍
Oracle cloud 使用云市场快速搭建小型电商网站
Oracle cloud ravello介绍及测试账户申请
Oracle cloud 云介绍及测试账户申请
New awesome features in MySQL 5.7
Performance Tuning Tool01-Statspack
SQL Tuning02-Intorduction to the CBO Optimizer
SQL Tuning04-Interpreting Execution Plans
SQL Tuning01-Introduction to SQL Tuning
MySQL Fulltext Search Tutorial
Data Organization in InnoDB
Oracle enterprise manager cloud control 12c release 5 installation on oracle ...
Oracle enterprise manager cloud control 12c r5 agent installation
Why use MySQL
MYSQLCLONE Introduction
Interpreting execution plans
Intorduction to the cbo optimizer

Recently uploaded (20)

PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Cloud computing and distributed systems.
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Encapsulation theory and applications.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Electronic commerce courselecture one. Pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Spectroscopy.pptx food analysis technology
Cloud computing and distributed systems.
Diabetes mellitus diagnosis method based random forest with bat algorithm
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Unlocking AI with Model Context Protocol (MCP)
Building Integrated photovoltaic BIPV_UPV.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
sap open course for s4hana steps from ECC to s4
MYSQL Presentation for SQL database connectivity
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Encapsulation theory and applications.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Electronic commerce courselecture one. Pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation

Oracle security 08-oracle network security

  • 1. 云和恩墨 成就所托 by 王朝阳 18516271611 [email protected] Oracle Network Security
  • 2. 云和恩墨 成就所托 by 王朝阳 18516271611 [email protected] Objectives After completing this lesson, you should be able to do the following: • Describe the items on the client, listener, and network security checklists • Secure administration of the network • Restrict access by IP address • Administer the listener securely • Analyze listener log files
  • 3. 云和恩墨 成就所托 by 王朝阳 18516271611 [email protected] Client Checklist • Internet access to secure data requires user authentication, rather than client-computer authentication. • The options are: – Bypass client-computer configuration and rely on user authentication to a middle tier. – Configure the client computer: • Authentication • Authorization – Administer client certificates. – Educate users.
  • 4. 云和恩墨 成就所托 by 王朝阳 18516271611 [email protected] Configuring the Browser Browsers include the following security features: • SSL encryption by using the HTTPS protocol • Certificate authorization: – Client – Server
  • 5. 云和恩墨 成就所托 by 王朝阳 18516271611 [email protected] Configuring the Client Configure client computers to use Oracle Advanced Security features with Oracle Net Services: • Native encryption • SSL authentication by using certificates
  • 6. 云和恩墨 成就所托 by 王朝阳 18516271611 [email protected] Using Certificates Considerations when using certificates for authentication: • Distinguished name and issuer uniquely identify the user. • Test for expiring certificates. • Use certificate reissues to update certificate information. • Audit certificate revocations.
  • 7. 云和恩墨 成就所托 by 王朝阳 18516271611 [email protected] Network Security: Checklist • Use a firewall. • Restrict IP addresses. • Encrypt network traffic. • Prevent remote administration of Connection Manager (CMAN). • Use network log files to monitor connections.
  • 8. 云和恩墨 成就所托 by 王朝阳 18516271611 [email protected] Using a Firewall to Restrict Network Access Application Web server Database server Client computers Firewall Firewall
  • 9. 云和恩墨 成就所托 by 王朝阳 18516271611 [email protected] Restricting Network IP Addresses: Valid Node Checking Set the following SQLNET.ORA parameters: • Turn on the feature: • Deny access from these nodes: • Allow access from these nodes: tcp.excluded_nodes = 192.168.10.102 tcp.invited_nodes = (192.168.10.102, 192.168.10.112) tcp.validnode_checking = YES
  • 10. 云和恩墨 成就所托 by 王朝阳 18516271611 [email protected] Restricting Network IP Addresses: Guidelines Network IP restrictions can help secure access to your server. Consider the following guidelines: • Do not use IP restrictions as your only security. IP addresses can be spoofed. • Use Connection Manager to limit access by node. • Limit access by protocol. • Protect dispatcher ports. IP restrictions do not prevent connections to the dispatcher.
  • 11. 云和恩墨 成就所托 by 王朝阳 18516271611 [email protected] Restricting Open Ports • Limit open ports to needed applications: – Open ports are network-attack opportunities. – Know which ports are open on your computer. • Find open ports: – Oracle product installation ports in portlist.ini – Listener ports in listener.ora – Dispatcher ports by using lsnrctl services – Other ports by using netstat
  • 12. 云和恩墨 成就所托 by 王朝阳 18516271611 [email protected] Encrypting Network Traffic • Guideline: Encrypt sensitive network traffic. • Tasks: – Use HTTPS when sending sensitive data between the client computer and the server. – Use SSL or native encryption to encrypt Oracle Net Services traffic. • Use the TCPS protocol for TCP/IP with SSL: ... (ADDRESS= (PROTOCOL=tcps) ...
  • 13. 云和恩墨 成就所托 by 王朝阳 18516271611 [email protected] Oracle Net Services Log Files Database server CMADMIN process CMGW processsqlnet.log listener.log <name>_cmadm_pid.log <name>_cmgw_pid.log Listener CMAN listener <name>_pid.log
  • 14. 云和恩墨 成就所托 by 王朝阳 18516271611 [email protected] Listener Security: Checklist • Restrict the privileges of the listener. • Secure administration by: – Protecting the listener with a password for remote administration – Using SSL when administering the listener • Protect against denial-of-service attacks. • Monitor listener activity.
  • 15. 云和恩墨 成就所托 by 王朝阳 18516271611 [email protected] Restricting the Privileges of the Listener • Restrict the privileges of a separate listener process. • A sample configuration is: EXTPROC_LISTENER= (DESCRIPTION= (ADDRESS=(PROTOCOL=ipc)(KEY=extproc))) SID_LIST_EXTPROC_LISTENER= (SID_LIST= (SID_DESC= (SID_NAME=plsextproc) (ORACLE_HOME= /u01/app/oracle/product/11.2.0/db_1) (PROGRAM=extproc)))
  • 16. 云和恩墨 成就所托 by 王朝阳 18516271611 [email protected] Use the CREATE LIBRARY Privilege Sparingly • External procedures: – Are executed from a library – Run with the privileges of the listener • By default, the listener has the write privilege to: – Database files – The memory space of the instance • To avoid misuse of this privilege: – Use it only when needed – Limit the privileges of the listener
  • 17. 云和恩墨 成就所托 by 王朝阳 18516271611 [email protected] Password Protect the Listener • Establish a password for the Oracle listener to prevent unauthorized listener administration. • From the Listener Control utility, issue the following command: LSNRCTL> CHANGE_PASSWORD Old password: lsnrc80 New password: lsnrc90 Reenter new password: lsnrc90 LSNRCTL> SET PASSWORD Password: The command completed successfully LSNRCTL> SAVE_CONFIG The command completed successfully
  • 18. 云和恩墨 成就所托 by 王朝阳 18516271611 [email protected] Preventing Online Administration of the Listener • Listener configuration cannot be changed online. • To change the configuration, you must: – Make the changes in the LISTENER.ORA file – Reload the configuration • In the LISTENER.ORA file, enter the following: • This configuration requires the administrator to have: – Write privileges on the LISTENER.ORA file ADMIN_RESTRICTIONS_LISTENER=ON
  • 19. 云和恩墨 成就所托 by 王朝阳 18516271611 [email protected] Administering the Listener Using TCP/IP with SSL • Use TCP/IP with SSL when administering over an insecure network. • Make the TCPS protocol the first entry in the address list. • Example (LISTENER.ORA file configured for SSL): LISTENER= (DESCRIPTION= (ADDRESS_LIST= (ADDRESS= (PROTOCOL=tcps) (HOST = singleton11g.snda.com) (PORT = 1521))) ...
  • 20. 云和恩墨 成就所托 by 王朝阳 18516271611 [email protected] INBOUND_CONNECT_TIMEOUT Protect the listener from denial-of-service attacks with the following network parameters: • SQLNET.INBOUND_CONNECT_TIMEOUT • INBOUND_CONNECT_TIMEOUT_listener_name These parameters: • Set the time allowed for a connection to complete authentication • Log failures with source IP addresses
  • 21. 云和恩墨 成就所托 by 王朝阳 18516271611 [email protected] Setting Listener Logging Parameters • In the LISTENER.ORA file: – LOG_DIRECTORY_listener_name – LOG_FILE_listener_name • With Oracle Net Manager: • With the SET command in the Listener Control utility: – LOG_DIRECTORY – LOG_FILE
  • 22. 云和恩墨 成就所托 by 王朝阳 18516271611 [email protected] Analyzing Listener Log Files The listener log contains the following information: • Listener log audits: – Client connection request – Listener Control utility commands • Listener service registration events: – service_register – service_update – service_died • Listener direct hand-off information
  • 23. 云和恩墨 成就所托 by 王朝阳 18516271611 [email protected] Summary In this lesson, you should have learned how to: • Describe the items on the client, listener, and network security checklists • Secure administration of the network • Restrict access by IP address • Administer the listener securely • Analyze listener log files