There is no single best architecture for accommodating Internet requests requiring access to corporate intranets. Instead, trade-offs must be made between two competing goals – security of the intranet against an Internet attack and ease of access to services by both Internet and intranet clients. This course describes how firewalls are used to restrict network access and the guidelines for positioning servers within firewalls. It also explores how to configure Oracle Connection Manager to accept or reject connection requests and log connection events, and how to read connection events from the Oracle Connection Manager log. How the PRODUCT_USER_PROFILE (PUP) table is used in SQL*Plus and how to use this table to disable commands or roles in SQL*Plus is also covered.
- Recognize how firewalls are used
- Configure Oracle Connection Manager
- Set up a firewall using CMAN
- Recognize how the PUP table is used in SQL *Plus
- Configure security using SQL *Plus
Database administrators, security administrators, security compliance auditors, security compliance professionals